Software Installation and Upgrade
Software Installation and Upgrade
Modified: 2018-04-09
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.
®
Junos OS Installation and Upgrade Guide
Copyright © 2018 Juniper Networks, Inc. All rights reserved.
The information in this document is current as of the date on the title page.
Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the
year 2038. However, the NTP application is known to have some difficulty in the year 2036.
The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks
software. Use of such software is subject to the terms and conditions of the End User License Agreement (“EULA”) posted at
https://www.juniper.net/support/eula/. By downloading, installing or using such software, you agree to the terms and conditions of that
EULA.
Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Configuration File Selection Sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Remote Storage of Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Understanding Download Manager for SRX Series Devices . . . . . . . . . . . . . . . . . . 52
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Using Download Manager to Upgrade Junos OS . . . . . . . . . . . . . . . . . . . . . . . 53
Handling Errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Chapter 2 Installing, Upgrading, and Downgrading Software . . . . . . . . . . . . . . . . . . . . . 55
Software Installation Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Installation Type Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Standard Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Category Change Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Recovery Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Understanding Software Installation on EX Series Switches . . . . . . . . . . . . . . . . . 59
Overview of the Software Installation Process . . . . . . . . . . . . . . . . . . . . . . . . 59
Software Package Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Installing Software on a Virtual Chassis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Installing Software on Switches with Redundant Routing Engines . . . . . . . . 60
Installing Software Using Automatic Software Download . . . . . . . . . . . . . . . 60
Autoinstalling a Configuration File on an EX2200 or EX3300 Switch from
a Disk-on-Key USB Memory Stick . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Installing Software on an EX2300 or EX3400 Switch . . . . . . . . . . . . . . . . . . . 61
Configuration Image Validation on EX Series Switches . . . . . . . . . . . . . . . . . . 61
Troubleshooting Software Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Understanding Junos OS Upgrades for SRX Series Devices . . . . . . . . . . . . . . . . . . 61
Understanding Junos OS Upgrades . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Junos OS Upgrade Methods on the SRX Series Devices . . . . . . . . . . . . . . . . . 62
Overview of Upgrading to 64-bit Junos OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Upgrading Redundant Routing Engines from 32-bit to 64-bit Junos OS . . . . 64
Upgrading a Single Routing Engine from 32-bit to 64-bit Junos OS Using
One Slot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Upgrading a Single Routing Engine from 32-bit to 64-bit Junos OS Using
Two Slots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Overview of CoS Upgrade Requirements (Junos OS Release 11.1 or 11.2 to a Later
Release) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Understanding How to Back Up an Installation on Switches . . . . . . . . . . . . . . . . . 70
Understanding System Snapshot on QFX Switches . . . . . . . . . . . . . . . . . . . . 70
Understanding System Snapshot on EX Series Switches . . . . . . . . . . . . . . . . 70
Backing Up the Existing Installation on Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Ensuring Sufficient Disk Space for Junos OS Upgrades on SRX Devices . . . . . . . . 74
Verifying Available Disk Space on SRX Series Devices . . . . . . . . . . . . . . . . . . 74
Cleaning Up the System File Storage Space . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Downloading Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Downloading Software by Using a Browser . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Installing Software Using the Command-Line Interface . . . . . . . . . . . . . . . . . 77
Installing Software Packages on QFX Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Installing a Standard Software Package on QFX5100, QFX5110, QFX5200,
QFX5210, and EX4600 Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Installing a Standard Software Package on QFX10002 Switches . . . . . . . . . 80
Upgrading Software from Junos OS Release 15.1X53-D3X to Junos OS
Release 15.1X53-D60, 15.1X53-D61.7, 15.1X53-D62, and 15.1X53-D63 on
QFX10008 and QFX10016 Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Installing a Software Package on QFX10008 and QFX10016 Switches . . . . 84
Preparing the Switch for Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Installing Software on the Backup Routing Engine . . . . . . . . . . . . . . . . . 85
Installing Software on the Master Routing Engine . . . . . . . . . . . . . . . . . . 86
Installing the Software Package on a Device with a Single Routing Engine . . . . . 88
Installing Software on an EX Series Switch with a Single Routing Engine (CLI
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Installing the Software Package on a Router with Redundant Routing
Engines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Preparing the Router for the Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Installing Software on the Backup Routing Engine . . . . . . . . . . . . . . . . . . . . . 93
Installing Software on the Remaining Routing Engine . . . . . . . . . . . . . . . . . . 95
Finalizing the Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Installing Software on an EX Series Switch with Redundant Routing Engines
(CLI Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Preparing the Switch for the Software Installation . . . . . . . . . . . . . . . . . . . . . 99
Installing Software on the Backup Routing Engine . . . . . . . . . . . . . . . . . . . . 100
Installing Software on the Default Master Routing Engine . . . . . . . . . . . . . . . 101
Returning Routing Control to the Default Master Routing Engine
(Optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Upgrading Junos OS with Upgraded FreeBSD . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Determining Which Package or Packages to Install . . . . . . . . . . . . . . . . . . . . 103
Installing Junos OS with Upgraded FreeBSD Over Plain Junos OS . . . . . . . . 106
Installing Junos OS with Upgraded FreeBSD Over Junos OS with Upgraded
FreeBSD of a Different Release . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Downgrading Junos OS from Upgraded FreeBSD . . . . . . . . . . . . . . . . . . . . . . . . . 109
Downgrading from Junos OS with Upgraded FreeBSD to Junos OS . . . . . . . 109
Downgrading from Junos OS with Upgraded FreeBSD Release 17.4 or Later
to an Earlier Release of Junos OS with Upgraded FreeBSD . . . . . . . . . . 110
Downgrading from Junos OS with Upgraded FreeBSD Release 17.3 or Earlier
to an Earlier Release of Junos OS with Upgraded FreeBSD . . . . . . . . . . . 111
Installing Junos OS Software with Junos Automation Enhancements . . . . . . . . . 112
Upgrading Software by Using Automatic Software Download . . . . . . . . . . . . . . . 117
Upgrading the Loader Software on the Line Cards in a Standalone EX8200
Switch or an EX8200 Virtual Chassis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Example: Installing Junos OS Upgrade Packages on SRX Series Devices . . . . . . 120
Reverting the Junos OS Software Image Back to the Previous Version . . . . . . . . 123
Table 21: Routing Engines and Storage Media Names (ACX Series, M Series, MX
Series, T Series, TX Matrix, TX Matrix Plus, and JCS 1200 Routers) . . . . . . . 210
Table 22: Storage Media Names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Chapter 8 Performing a Recovery Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Table 23: Autorecovery Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Chapter 10 Automatic Installation of Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . 279
Table 24: Interfaces and Protocols for IP Address Acquisition During
Autoinstallation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
Chapter 11 Installation, Upgrade, and Recovery of VM Host Support on Devices with
Routing Engines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
Table 25: Hardware Specifications of the RE-MX-X6, RE-MX-X8, RE-PTX-X8,
and RCBPTX, Routing Engines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304
Chapter 12 Installing and Managing Software Licenses . . . . . . . . . . . . . . . . . . . . . . . . . 325
Table 26: Junos OS EFL Part Number on EX2200 Switches . . . . . . . . . . . . . . . . 328
Table 27: Junos OS EFL Part Number on EX2300 Switches . . . . . . . . . . . . . . . . . 329
Table 28: Junos OS EFL Part Number on EX3300 Switches . . . . . . . . . . . . . . . . 330
Table 29: Junos OS AFL Part Number on EX3300 Switches . . . . . . . . . . . . . . . . . 331
Table 30: Junos OS EFL Part Number on EX3400 Switches . . . . . . . . . . . . . . . . . 331
Table 31: Junos OS EFL Part Number on EX4300 Switches . . . . . . . . . . . . . . . . . 332
Table 32: Junos OS AFL Part Number on EX4300 Switches . . . . . . . . . . . . . . . . 333
Table 33: Junos OS AFL Part Number on EX4600 Switches . . . . . . . . . . . . . . . . 333
Table 34: Junos OS AFL Part Number on EX3200, EX4200, EX4500, EX4550,
EX6200, EX8200, and EX9200 Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
Table 35: Junos OS Feature License Model Number for M Series, MX Series, and
T Series Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
Table 36: Junos OS Feature License Model Number for M Series Routers . . . . . . 341
Table 37: Junos OS Feature License Model Number for MX Series Routers . . . . 342
Table 38: Standard Junos OS Feature Licenses and Model Numbers for QFX
Series Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
Table 39: Disaggregated Junos OS Feature Licenses and Associated SKU’s . . . 353
Table 40: Upgrade Licenses for Enhancing Port Capacity . . . . . . . . . . . . . . . . . . 356
Table 41: Port Activation License Model for MX104 Routers . . . . . . . . . . . . . . . . . 357
Table 42: License Variants for MPCs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
Chapter 15 Operational Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
Table 43: request system storage cleanup Output Fields . . . . . . . . . . . . . . . . . . . 514
Table 44: request system storage cleanup Output Fields . . . . . . . . . . . . . . . . . . 522
Table 45: show system autoinstallation status Output Fields . . . . . . . . . . . . . . . 533
Table 46: show system autorecovery state Output Fields . . . . . . . . . . . . . . . . . . 534
Table 47: show system auto-snapshot status Output Fields . . . . . . . . . . . . . . . . 543
Table 48: show system download Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . 545
Table 49: show system license Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . 548
Table 50: show system license Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . 556
Table 51: show system login lockout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559
Table 52: show system software restore-point status Output Fields . . . . . . . . . 562
Table 53: show system software usb-software-version Output Fields . . . . . . . . 563
Table 54: show system snapshot Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . 566
If the information in the latest release notes differs from the information in the
documentation, follow the product Release Notes.
Juniper Networks Books publishes books by Juniper Networks engineers and subject
matter experts. These books go beyond the technical documentation to explore the
nuances of network architecture, deployment, and administration. The current list can
be viewed at https://www.juniper.net/books.
Supported Platforms
For the features described in this document, the following platforms are supported:
• ACX Series
• M Series
• MX Series
• T Series
• EX Series
• PTX Series
• QFabric System
• QFX Series
• SRX Series
If you want to use the examples in this manual, you can use the load merge or the load
merge relative command. These commands cause the software to merge the incoming
configuration into the current candidate configuration. The example does not become
active until you commit the candidate configuration.
If the example configuration contains the top level of the hierarchy (or multiple
hierarchies), the example is a full example. In this case, use the load merge command.
If the example configuration does not start at the top level of the hierarchy, the example
is a snippet. In this case, use the load merge relative command. These procedures are
described in the following sections.
1. From the HTML or PDF version of the manual, copy a configuration example into a
text file, save the file with a name, and copy the file to a directory on your routing
platform.
For example, copy the following configuration to a file and name the file ex-script.conf.
Copy the ex-script.conf file to the /var/tmp directory on your routing platform.
system {
scripts {
commit {
file ex-script.xsl;
}
}
}
interfaces {
fxp0 {
disable;
unit 0 {
family inet {
address 10.0.0.1/24;
}
}
}
}
2. Merge the contents of the file into your routing platform configuration by issuing the
load merge configuration mode command:
[edit]
user@host# load merge /var/tmp/ex-script.conf
load complete
Merging a Snippet
To merge a snippet, follow these steps:
1. From the HTML or PDF version of the manual, copy a configuration snippet into a text
file, save the file with a name, and copy the file to a directory on your routing platform.
For example, copy the following snippet to a file and name the file
ex-script-snippet.conf. Copy the ex-script-snippet.conf file to the /var/tmp directory
on your routing platform.
commit {
file ex-script-snippet.xsl; }
2. Move to the hierarchy level that is relevant for this snippet by issuing the following
configuration mode command:
[edit]
user@host# edit system scripts
[edit system scripts]
3. Merge the contents of the file into your routing platform configuration by issuing the
load merge relative configuration mode command:
For more information about the load command, see CLI Explorer.
Documentation Conventions
Caution Indicates a situation that might result in loss of data or hardware damage.
Laser warning Alerts you to the risk of personal injury from a laser.
Table 2 on page xxiv defines the text and syntax conventions used in this guide.
Bold text like this Represents text that you type. To enter configuration mode, type the
configure command:
user@host> configure
Fixed-width text like this Represents output that appears on the user@host> show chassis alarms
terminal screen.
No alarms currently active
Italic text like this • Introduces or emphasizes important • A policy term is a named structure
new terms. that defines match conditions and
• Identifies guide names. actions.
• Junos OS CLI User Guide
• Identifies RFC and Internet draft titles.
• RFC 1997, BGP Communities Attribute
Italic text like this Represents variables (options for which Configure the machine’s domain name:
you substitute a value) in commands or
configuration statements. [edit]
root@# set system domain-name
domain-name
Text like this Represents names of configuration • To configure a stub area, include the
statements, commands, files, and stub statement at the [edit protocols
directories; configuration hierarchy levels; ospf area area-id] hierarchy level.
or labels on routing platform • The console port is labeled CONSOLE.
components.
< > (angle brackets) Encloses optional keywords or variables. stub <default-metric metric>;
# (pound sign) Indicates a comment specified on the rsvp { # Required for dynamic MPLS only
same line as the configuration statement
to which it applies.
[ ] (square brackets) Encloses a variable for which you can community name members [
substitute one or more values. community-ids ]
GUI Conventions
Bold text like this Represents graphical user interface (GUI) • In the Logical Interfaces box, select
items you click or select. All Interfaces.
• To cancel the configuration, click
Cancel.
> (bold right angle bracket) Separates levels in a hierarchy of menu In the configuration editor hierarchy,
selections. select Protocols>Ospf.
Documentation Feedback
• Online feedback rating system—On any page of the Juniper Networks TechLibrary site
at https://www.juniper.net/documentation/index.html, simply click the stars to rate the
content, and use the pop-up form to provide us with information about your experience.
Alternately, you can use the online feedback form at
https://www.juniper.net/documentation/feedback/.
Technical product support is available through the Juniper Networks Technical Assistance
Center (JTAC). If you are a customer with an active J-Care or Partner Support Service
support contract, or are covered under warranty, and need post-sales technical support,
you can access our tools and resources online or open a case with JTAC.
• JTAC hours of operation—The JTAC centers have resources available 24 hours a day,
7 days a week, 365 days a year.
• Find solutions and answer questions using our Knowledge Base: https://kb.juniper.net/
To verify service entitlement by product serial number, use our Serial Number Entitlement
(SNE) Tool: https://entitlementsearch.juniper.net/entitlementsearch/
Software Overview
Junos OS Overview
Starting with Junos OS Release 15.1, certain hardware platforms run Junos OS based on
an upgraded FreeBSD kernel instead of older versions of FreeBSD. Basing Junos OS on
the newer kernel (referred to as Junos OS with upgraded FreeBSD) provides Junos OS
with sophisticated processing, efficiency, and security features which do not have to be
reproduced in Junos OS.
Starting in Junos OS Release 16.1, virtualized Routing Engines are supported that not only
provide increased control plane scalability and performance but also provide virtualization
capabilities to the Junos OS infrastructure. These virtualized Routing Engines, or VM hosts
are the Routing Engines RE-MX-X6, RE-MX-X8, and RE-PTX-X8.
The Junos OS is preinstalled on your Juniper Networks device when you receive it from
the factory. Thus, when you first power on the device, all software starts automatically.
You simply need to configure the software so that the device can participate in the
network.
You can upgrade the device software as new features are added or software problems
are fixed. You normally obtain new software by downloading the software installation
packages from the Juniper Networks Support Web page onto your device or onto another
system on your local network. You then install the software upgrade onto the device.
Juniper Networks routing platforms run only binaries supplied by Juniper Networks, and
currently do not support third-party binaries. Each Junos OS image includes a digitally
signed manifest of executables that are registered with the system only if the signature
can be validated. Junos OS will not execute any binary without a registered signature.
This feature protects the system against unauthorized software and activity that might
compromise the integrity of your device.
Secure Boot
Secure Boot is a significant system security enhancement based on the UEFI standard
(see www.uefi.org). It works by safeguarding the BIOS itself from tampering or modification
and then maintaining that protection throughout the boot process.
The Secure Boot process begins with Secure Flash, which ensures that unauthorized
changes cannot be made to the firmware. Authorized releases of Junos OS carry a digital
signature produced by either Juniper Networks directly or one of its authorized partners.
At each point of the boot-up process, each component verifies the next link is sound by
checking the signature to ensure that the binaries have not been modified. The boot
process cannot continue unless the signature is correct. This "chain of trust" continues
until the operating system takes control. In this way, overall system security is enhanced,
increasing resistance to some firmware-based persistent threats.
Start Run
Kernel
BIOS Loader
g200108
Core Root of Trust
For information on which Junos OS releases and hardware support Secure Boot, see
Feature Explorer and enter Secure Boot.
Both virtualized Routing Engines (or VM hosts) and non-virtualized Routing Engines run
Junos OS with upgraded FreeBSD. For more information on VM hosts, see “Routing
Engines with VM Host Support” on page 303 and “VM Host Installation” on page 312.
The major processing changes in Junos OS with upgraded FreeBSD are as follow:
• Interactions between Junos OS and the upgraded FreeBSD kernel use well-established
interfaces because Junos OS is now layered on a minimally modified and current version
of FreeBSD.
• Storage space for JUNOS root partition is 4 G and 16 G for var and config partitions,
which is same as in the legacy JUNOS image.
Limitations:
The following limitations exist on the upgraded FreeBSD for SRX Series devices:
• The underlying FreeBSD is 64 bits, while there are specific 32-bit processes and utilities.
• If you downgrade from Junos OS Release 17.4 to any previous releases, all the data in
the disk will be lost, and system boots up with default factory configuration.
There are also major changes in file structures and software packages. These changes
are as follows:
• Multiple package sets (a collection of installed packages) are stored on the device at
the same time. Sets can be active (the currently used set), pending (the set that should
be used at the next reboot), or previous (a formerly active set). Nonrecovery snapshots
(but not recoverable image snapshots) are available for the package sets to preserve
package content lists.
For other changes in Junos OS with upgraded FreeBSD, see the following subsections:
In Junos OS Release 16.1, with the release of virtualized Routing Engines RE-MX-X6,
RE-MX-X8, and RE-PTX-X8, Junos OS with upgraded FreeBSD could run as a guest virtual
machine (VM) on a Linux VM host.
To find which platforms support Junos OS with upgraded FreeBSD, see Feature Explorer
and enter one of the following:
• For non-virtualized, enter freebsd and select Junos kernel upgrade to FreeBSD 10+.
• For virtualized, enter virtualization and select Virtualization of the Routing Engine.
Junos OS with upgraded FreeBSD packages use XML description files instead of scripts.
Installation package names for VM hosts begin with the junos-vmhost-install prefix.
For information on and examples of other installation package names for Junos OS with
upgraded FreeBSD, see the following subsections:
The following are components of the Junos OS with upgraded FreeBSD package-naming
conventions for Linux-based packages such as those for SRX Series, ACX Series, NFX
Series, OCX Series, and PTX Series:
• Prefix—Linux-based devices use the jinstall-host prefix for Junos OS with upgraded
FreeBSD.
• Platform—This field indicates the major product group, such as acx, nfx, ocx, or ptx.
• Architecture—This field indicates the CPU architecture of the platforms. Values include
x86 for Intel and arm for Advanced RISC Machines CPUs.
• Application Binary Interface (ABI)—This field indicates the “word length” of the CPU
architecture. Values include 32 for 32-bit architectures and 64 for 64-bit architectures.
• Edition—The edition field is null (empty) for standard (domestic) images. For
jurisdictions with limits on dataplane encryption, this field is set to limited.
Examples of valid Junos OS with upgraded FreeBSD package names include the following:
• jinstall-host-acx5k-17.2R1.13-signed.tgz
• jinstall-host-nfx-2-flex-x86-32-17.2R1.13-secure-signed.tgz
There are multiple conventions for naming installation packages for EX Series switches.
• The EX9200 switch is based on the MX Series routers and has the same
package-naming convention as the MX Series routers. See “MX Series Routers Package
Names” on page 35.
• The EX4600 switch is based on the QFX5100 platform and has the same
package-naming convention as the QFX5100 platform. See “QFX Series and EX4600
Switches Package Names” on page 36.
• Prefix—This is junos-arm. This prefix takes the place of the jinstall prefix used in earlier
releases of Junos OS.
• Media keyword—Added to the prefix, a media keyword is only used when the image
is not for use with the request system software add command. Media keywords
follow the term media in the package name. Values for the media keyword include
the following:
• Application Binary Interface (ABI)—This field indicates the “word length” of the CPU
architecture. Values include 32 for 32-bit architectures and 64 for 64-bit architectures.
• Edition—The edition field is null (empty) for standard (domestic) images. For
jurisdictions with limits on dataplane encryption, this field is set to limited.
• Prefix—This is junos-install. This prefix takes the place of the jinstall prefix used in earlier
releases of Junos OS.
• Media keyword—Added to the prefix, a media keyword is only used when the image is
not for use with the request system software add command. Media keywords follow
the term media in the package name. Values for the media keyword include the
following:
• Platform—This field indicates the major product group, such as ex92xx or mx.
• Architecture—This field indicates the CPU architecture of the platforms. Values include
x86 for Intel and arm for Advanced RISC Machines CPUs.
• Application Binary Interface (ABI)—This field indicates the “word length” of the CPU
architecture. Values include 32 for 32-bit architectures and 64 for 64-bit architectures.
• Edition—The edition field is null (empty) for standard (domestic) images. For
jurisdictions with limits on dataplane encryption, this field is set to limited.
Examples of valid Junos OS with upgraded FreeBSD package names include the following:
• Prefix—Linux-based devices use the jinstall-host prefix for Junos OS with upgraded
FreeBSD.
• Platform—This field indicates the major product group, such as ex-4600 or qfx.
• Architecture—This field indicates the CPU architecture of the platforms. Values include
x86 for Intel and arm for Advanced RISC Machines CPUs.
• Application Binary Interface (ABI)—This field indicates the “word length” of the CPU
architecture. Values include 32 for 32-bit architectures and 64 for 64-bit architectures.
• Edition—The edition field is null (empty) for standard (domestic) images. For
jurisdictions with limits on dataplane encryption, this field is set to limited.
Examples of valid Junos OS with upgraded FreeBSD package names include the following:
• jinstall-host-ex-4600-17.2R1.13-limited-signed.tgz
• jinstall-host-ex-4600-17.2R1.13-signed.tgz
• jinstall-host-qfx-5e-x86-64-17.2R1.13.tgz
• jinstall-host-qfx-10-f-flex-x86-64-17.2R1.13-secure-signed.tgz
• jinstall-host-qfx-10-m-x86-64-17.2R1.13-secure-limited-signed.tgz
• jinstall-host-qfx-5-17.2R1.13-limited-signed.tgz
• Prefix—This is junos-install. This prefix takes the place of the prefix junos-srx5000.
• Media keyword—Added to the prefix, a media keyword is only used when the image is
not for use with the request system software add command. Values for the media
keyword include usb for images installed from a USB drive or net for images installed
from the loader prompt; for example, the entire prefix of your package might be
junos-install-media-net or junos-install-media-usb.
• Architecture—This field indicates the CPU architecture of the platforms. Values include
x86 for Intel and arm for Advanced RISC Machines CPUs.
• Application binary interface (ABI)—This field indicates the “word length” of the CPU
architecture. Values include 32 for 32-bit architectures and 64 for 64-bit architectures.
• Edition—The edition field is null (empty) for the standard (domestic) images. For
jurisdictions with limits on dataplane encryption, this field is set to limited.
One major change between Junos OS and Junos OS with upgraded FreeBSD is the
distinction between recovery snapshots and nonrecovery snapshots.
The upgraded FreeBSD kernel requires changes to several commands and statements
and their related parameters. The new and changed actions are summarized in
Table 3 on page 38. For details on the changes listed in Table 3 on page 38, see the topics
covering the specific command or statement.
For changed actions for VM hosts, see “VM Host Operations and Management” on page 322.
Table 3: New and Changed Commands and Statements for Junos OS with Upgraded
FreeBSD
request system reboot (junos | network | oam | usb} Changed action with new media options
The upgraded FreeBSD kernel also requires that several commands and statements in
Junos OS be deprecated in Junos OS with upgraded FreeBSD. The deprecated commands
and statements are summarized in Table 4 on page 38. The date of deprecation is the
release date for that platform supporting Junos OS with upgraded FreeBSD. To find which
platforms support Junos OS with upgraded FreeBSD, see Feature Explorer and enter one
of the following:
• For non-virtualized, enter freebsd and select Junos kernel upgrade to FreeBSD 10+.
• For virtualized, enter virtualization and select Virtualization of the Routing Engine.
Table 4: Deprecated Commands and Statements for Junos OS with Upgraded FreeBSD
Deprecated Command
Table 4: Deprecated Commands and Statements for Junos OS with Upgraded FreeBSD
(continued)
See Also • request system snapshot (Junos OS with Upgraded FreeBSD) on page 465
Junos OS with upgraded FreeBSD has two volumes: dev/gpt/junos (/junos for short) and
a separate operations, administration, and maintenance (OAM) volume dev/gpt/oam
(/oam for short).
/junos Volume
The /junos volume is used for running device software and holds configuration information
and logs.
The /junos volume contains a directory named /packages/db that has all the components
present on the device, such as os-kernel-123, os-kernel-456, and so on. A sibling directory
named /package-sets is also present. Package sets are an important concept in Junos
OS with upgraded FreeBSD.
The /package-sets directory contains a package listing that gathers all the components
of the running Junos OS into an XML format in the /active subdirectory. So os-kernel-123
could be a component in the /package-sets/active subdirectory, but then os-kernel-456
could not be in the same XML package. Package sets do not contain the kernel software
itself (for example), but tell the device where to find the kernel component needed for
the software package. The same kernel can be present in several package listings, but
only one package can be active and running on the device at any given time.
There are several directories on the /junos volume where a particular software package
listing can be found:
• /previous—The package set in this directory contains the list of all the components
that ran on the device before the last upgrade.
• /active—The package set in this directory contains the list of all the software
components currently running on the device.
• /pending—The package set in this directory contains the list of all the software
components on the device that will run after the next reboot.
NOTE: After a successful reboot, the package set in the /pending directory
becomes the active package set, and the package set in the /active directory
becomes the previous set.
The /junos volume also contains non-recovery snapshots taken with the request system
snapshot command. These types of snapshots are new to Junos OS with upgraded
FreeBSD and cannot be used for recovery of a failed system. Non-recovery snapshots
are a special type of package set that includes a copy of the configuration. For more
information on non-recovery snapshots, see “Changes in Use of Snapshots for Junos OS
with Upgraded FreeBSD” on page 41.
/oam Volume
The compact flash drive is the /oam volume. In case of failure of the main drive (that is,
the /junos volume), the /oam volume can be used to boot the system. In order to perform
this reboot, the /oam volume needs to have all of the information required to provide the
system with a running configuration. This information is provided by the recovery snapshot,
created with the request system snapshot recovery command. Although it can take a
while to perform, the recovery snapshot establishes an .izo or .iso image of the running
Junos OS. For more information on recovery snapshots, see “Changes in Use of Snapshots
for Junos OS with Upgraded FreeBSD” on page 41.
Junos OS with upgraded FreeBSD has two types of snapshots: recovery snapshots (which
are not the same thing as recovery snapshots taken using the older Junos OS) and
non-recovery snapshots. Recovery snapshots and non-recovery snapshots have different
content, locations, and purposes, so it is important that they are created and maintained
properly. We recommend that you generate both a non-recovery and a recovery snapshot
after you successfully upgrade to Junos OS with upgraded FreeBSD, and refresh these
snapshots periodically.
Recovery Snapshots
• Recovery snapshots are full copies of the packages and configuration taken at the
time the snapshot command is issued.
Recovery snapshots take some time to complete because of the level of detail captured.
Recovery snapshots can be used to recover the Junos OS volume. There is only ever one
recovery snapshot on the system.
A recovery snapshot is automatically taken when, for the first time, you upgrade from a
pre-FreeBSD-based Junos OS release to Junos OS with upgraded FreeBSD. Therefore,
unless someone manually deletes the recovery snapshot, there should always be a
recovery snapshot.
If a device does not have a recovery snapshot, then the only way to recover the device
would be to do a media install (network or USB).
• show system snapshot—As of Junos OS Release 17.2, use this command to list the
recovery snapshot.
• Previous to Junos OS Release 17.2, use the following shell command to see if a recovery
snapshot exits on the device:
# oamctl list-snapshorts
Non-Recovery Snapshots
• Non-recovery snapshots refer to the current running set of packages and a copy of the
configuration at the time the snapshot command is issued.
• Non-recovery snapshots do not need to copy the whole Junos OS installation and so
are very fast.
• Non-recovery snapshots can be requested as the boot image for the next reboot.
• There can be many non-recovery snapshots on the device, and the files can be renamed.
Non-recovery snapshots consume little space, except for the config.tgz file.
A non-recovery snapshot is also a package set in a sense, with the addition of a copy of
the configuration at the time that the non-recovery snapshot is taken.
Packages that are no longer referenced by any package set or non-recovery snapshot
are automatically deleted. We recommend deleting any old non-recovery snapshots
after an upgrade so that old packages can be deleted and space recovered.
The snapshot script (which is the script that generates output for non-recovery snapshots)
does not generate XML output. In such cases, the <output> tag is used.
• show system snapshot—Use this command to list all the available non-recovery
snapshots.
See Also • show system snapshot (Junos OS with Upgraded FreeBSD) on page 568
The installation package is used to upgrade or downgrade from one release to another.
When installed, the installation package completely reinstalls the software, rebuilds the
Junos OS file system, and can erase system logs and other auxiliary information from
the previous installation. The installation package does, however, retain the configuration
files from the previous installation.
prefix-release-edition-signed.extension
For enhanced automation variants of Junos OS, the installation package looks like this:
prefix-flex-release-edition-signed.extension
The signed part of the filename indicates that the software is delivered in signed packages
that contain digital signatures, Secure Hash Algorithm (SHA-1), and Message Digest 5
(MD5) checksums. A package is installed only if the checksum within it matches the hash
recorded in its corresponding file. Which checksum is used depends on the software
version:
• Digital signatures are used when you upgrade or downgrade between Junos OS
Release 7.0 and a later version.
• The SHA-1 checksum is used when you upgrade or downgrade between Junos OS
Release 6.4 and a later version.
• The MD5 checksum is used when you upgrade or downgrade between Junos OS
Release 6.3 or earlier and a later version.
Starting in 2015, the word signed appears less frequently after the edition in the filename.
But you might still see it in software installation packages. Whether signed appears or
not, all Junos OS images from Junos OS Release 15.1 on are signed for validation.
For more detail on the makeup of the installation package filename, see the following
sections:
Starting in Junos OS Release 15.1, certain hardware platforms run a Junos OS based on
an upgraded FreeBSD kernel (hereafter called Junos OS with upgraded FreeBSD).
Table 5 on page 44 also indicates the prefixes used for the different platforms running
Junos OS with upgraded FreesBSD.
SRX Series packages use the following naming convention for package prefixes:
junos-product
Table 5 on page 44 lists several examples of installation package prefixes for the SRX
Series.
Table 5 on page 44 does not list packages you do not use with the request system software
add command. For information on packages you load onto a USB drive to install, see
Chapter 10 of the Software Installation and Upgrade Guide.
jinstall-ppc* Junos OS for the ACX Series, MX5, MX10, MX40, MX80,
and MX104 routers.
junos-install-media-usb-srxhe-x86*
(USB)
junos-srxhe-x86* (CLI)
web page, you download the Junos OS installation package for a particular Junos OS
release number.
m.nZb.s
The software release number 17.2R1.13, for example, maps to this format as follows:
Release
Type Description
R First revenue ship (FRS) or maintenance release software. R1 is FRS. R2 onward are
maintenance releases.
F Feature velocity release. Feature velocity releases are only in Junos OS Release 15.1.
I Internal release software. These are private software releases for verifying fixes.
Starting with Junos OS Release 12.1X44-D10, SRX Series devices follow a special
naming convention for Junos OS releases. For more information, refer to the
Knowledge Base article KB30092 at
https://kb.juniper.net/InfoCenter/index?page=home.
NOTE: Prior to Junos OS Release 11.4, the software release number format
for service releases was same as other releases. For example, 10.4S4.2
represented the 4th service release and 2nd respin of 10.4.
Junos OS Editions
Editions show up in the installation package name after the release number string and
before signed.
In releases earlier than Junos OS Release 15.1, installation packages came in several major
software package categories or editions, such as domestic, worldwide, or Federal
Information Processing Standard (FIPS). For those still using packages with names
including these terms, here is what they indicate:
• domestic—Junos OS for customers in the United States and Canada and for all other
customers with a valid encryption agreement. This edition includes high-encryption
capabilities such as IPsec and SSH for data leaving the router or switch. Later images
use a null, or empty, edition field for this category.
• limited—Junos OS for all other customers. This edition does not include any
high-encryption capabilities for data leaving the router or switch. Sometimes referred
to as the Export edition, starting in Junos OS Release 15.1R1, this category is is renamed
to the limited edition.
• fips—Junos OS that provides advanced network security for customers who need
software tools to configure a network of Juniper Networks routers and switches in a
Federal Information Processing Standards (FIPS) 140-2 environment. For more
information about Junos-FIPS, see FIPS 140-2 Security Compliance. In later images,
FIPS, instead of being a separate edition, is an option you select on installation.
• Junos OS with a null (empty) edition field is the standard image for Junos OS.
Related • Changes in Package Names for Junos OS with Upgraded FreeBSD on page 33
Documentation
For advanced network security, a special version of Junos OS, called Junos-FIPS 140-2,
is available. Junos-FIPS 140-2 provides customers with software tools to configure a
network of Juniper Networks devices in a FIPS environment. FIPS support includes:
Juniper Networks devices start using the installed Junos OS. Bootable copies of Junos
OS are stored in various locations: the internal flash disk, the hard drive, the removable
media. The following subsections discuss the order of locations checked for a valid
bootable operating system.
NOTE: For information about which Routing Engines are supported by each
device, see
https://www.juniper.net/documentation/en_US/release-independent/
junos/topics/reference/general/routing-engine-m-mx-t-series-support-by-chassis.html.
The ACX Series routers attempt to boot from the storage media in the following order:
MX80 routers attempt to boot from the storage media in the following order:
MX104 routers attempt to boot from the storage media in the following order:
The M Series and MX Series with a Routing Engine that has a solid-state drive (SSD)
attempt to boot from the storage media in the following order:
2. CompactFlash card
3. Solid-state drive (SSD) in the SSD slot 1 or SSD slot 2 (if present)
The M Series and MX Series (except for the MX80 routers and the MX104 routers) routers
with a Routing Engine that has a hard disk attempt to boot from the storage media in
the following order:
3. Hard disk
The PTX Series Packet Transport Routers attempt to boot from the storage media in the
following order:
2. CompactFlash card
The T Series and TX Matrix routers with a Routing Engine that has a hard disk attempt
to boot from the storage media in the following order:
3. Hard disk
The T Series routers with a Routing Engine that has a solid-state drive (SSD), and TX
Matrix Plus routers attempt to boot from the storage media in the following order:
If the router boots from an alternate boot device, Junos OS displays a message indicating
this when you log in to the router. For example, the following message shows that the
software booted from the hard disk (/dev/ad1s1a):
login: username
Password: password
Last login: date on terminal
This situation results when the router detects a problem with the primary boot
device—usually the CompactFlash card—that prevents it from booting, and consequently
boots from the alternate boot device (the hard disk drive). When this happens, the primary
boot device is removed from the list of candidate boot devices. The problem is usually
a serious hardware error. We recommend you contact the Juniper Networks Technical
Assistance Center (JTAC).
NOTE: On MX104 routers, if the router boots from an alternate boot device,
Junos OS does not display any message indicating this when you log in to the
router.
When the router boots from the alternate boot device, the software and configuration
are only as current as the most recent request system snapshot command. However, if
the mirror-flash-on-disk command was enabled, then the hard disk drive contains a
synchronized, mirror image of the compact flash drive and therefore the current software
and configuration.
Configuration Files
All configuration settings for the device are handled in the configuration files on the
device. These files are saved in the /config directory on the device.
/config/juniper.conf.gz /config/juniper.conf.1.gz
NO NO
g016922
NO
The factory.conf file is the initial device configuration file shipped with the system. All
configuration settings are returned to the factory default, and access to the device is
restricted to the console. For more information about setting up your device from the
factory default configuration, see the specific hardware guide for your device.
For SRX Series Services Gateways running Junos OS Release 10.0 or later, the current
operational Junos OS configuration is stored in the juniper.conf.gz file. The last three
committed configurations are stored in the files juniper.conf.1.gz through juniper.conf.3.gz.
The rescue configuration is stored in the rescue.conf.gz file. These files are located in the
/config directory. The remaining archived configuration files juniper.conf.4.gz through
juniper.conf.49.gz are saved in the /var/db/config directory. Configuration files are located
in the SRX series compact flash drive.
To list the configuration files, use the file list /config operational mode command.
When the configuration file is stored off the device, you can encrypt the configuration
files using the Data Encryption Standard (DES) encryption algorithm.
• Overview on page 52
• Using Download Manager to Upgrade Junos OS on page 53
• Handling Errors on page 53
• Considerations on page 54
Overview
This download manager feature facilitates download of large files over low-bandwidth
links. It enables you to download large Junos OS packages over low-bandwidth/flaky
links so that the system can be upgraded. This feature allows you to download multiple
files while monitoring their status and progress individually. It takes automatic action
when required and displays status information when requested.
• Bandwidth-limited downloads
• Scheduled downloads
NOTE: This feature supports only the FTP and HTTP protocols.
1. To download the Junos OS image to your device, use the request system download
start command (set a bandwidth limit, if required). The file is saved to the /var/tmp
directory on your device.
You can continue to use the device while the download runs in the background.
2. Use the show system download command to verify that the file has been downloaded.
The command displays the state as "completed" when the downloaded file is ready
to be installed.
3. Use the request system software add command to install the downloaded image file
from the /var/tmp directory.
Handling Errors
If you encounter any problem with a download, use the show system download id
command to obtain details about the download.
Table 7 on page 53 lists the output fields for the show system download command. Use
this information to diagnose problems. Output fields are listed in the approximate order
in which they appear.
Start Time Time the download actually started (if it has already started).
Retry Time Time for next retry (if the download is in the error state).
Retries Left Number of times the system will retry the download automatically before stopping.
Most Recent Error Message indicating the cause of the most recent error.
Considerations
• When no download limit is specified for a specific download or for all downloads, a
download uses all available network bandwidth.
• Because the download limit that you set indicates an average bandwidth limit, it is
possible that certain bursts might exceed the specified limit.
• When a download from an HTTP server fails, the server returns an HTML page.
Occasionally, the error page is not recognized as an error page and is downloaded in
place of the Junos image file.
• Remote server logins and passwords are stored by the download manager for the
duration of a download. To encrypt these credentials provided along with the login
keyword, define an encryption key with the request system set-encryption-key command.
Any changes to encryption settings while download is in progress can cause the
download to fail.
• A download command issued on a particular node in a chassis cluster takes place only
on that node and is not propagated to the other nodes in the cluster. Downloads on
different nodes are completely independent of each other. In the event of a failover, a
download continues only if the server remains reachable from the node from which
the command was issued. If the server is no longer reachable on that node, the
download stops and returns an error.
A device is delivered with the Juniper Networks operating system (Junos OS) preinstalled.
As new features and software fixes become available, you can upgrade your software
to use them.
When you power on the device, it starts (boots) using the installed software. To determine
which software packages are running on the device and to get information about these
packages, use the show version operational mode command at the top level of the
command-line interface (CLI).
NOTE: The show version command does not show the software edition
installed, only the release number of the software.
You upgrade (or downgrade) the version of Junos OS on a device by copying a software
installation package to your device or other system on your local network and then using
the CLI to install the new software on the device. You then reboot the device, which boots
from the upgraded software.
To prepare for installation, back up the system, select the install package you require,
and download it from the Juniper Networks download page.
We recommend that you upgrade all individual software packages using an out-of-band
connection from the console or management Ethernet interface, because in-band
connections can be lost during the upgrade process.
Console ports allow root access to the Junos operating system (Junos OS) devices
through a terminal or laptop interface, regardless of the state of the Junos OS device,
unless it is completely powered off. By connecting to the console port, you can access
the root level of the Junos OS device without using the network to which the device might
or might not be connected. This creates a secondary path to the Junos OS device without
relying on the network.
Using the terminal interface provides a technician sitting in a Network Operations Center
a long distance away the ability to restore a Junos OS device or perform an initialization
configuration securely, using a modem, even if the primary network has failed. Without
a connection to the console port, a technician would have to visit the site to perform
repairs or initialization. A remote connection to the Junos OS device through a modem
requires the cable and connector (provided in the device accessory box), plus a DB-9
male to DB-25 male (or similar) adapter for your modem, which you must purchase
separately. For more information about connecting to the console port, see the
administration guide for your particular router or switch.
To configure the device initially, you must connect a terminal or laptop computer to the
device through the console port, as shown in Figure 2 on page 57.
g003810
When you upgrade or downgrade Junos OS, we recommend that you include the validate
option with the request system software add command to check that the candidate
software is compatible with the current configuration. By default, when you add a package
with a different release number, the validation check is done automatically.
NOTE: On an ACX Series router, you must ensure that the primary and backup
partitions are synchronized after an upgrade by issuing the request system
snapshot command.
During a successful upgrade, the installation package removes all files from the /var/tmp
directory of the device and completely reinstalls the existing software. It retains
configuration files and similar information, such as secure shell and host keys, from the
previous version. The previous software package is preserved in a separate disk partition,
and you can manually revert to it if necessary. If the software installation fails for any
reason, such as loss of power during the installation process, the system returns to the
originally active installation when you reboot.
If you encounter any difficulties during software installation or an upgrade, you can use
the recovery installation procedure to install the Junos OS on the device.
After a successful upgrade, you should back up the new existing configuration to a
secondary device.
The three types of installations used to upgrade or downgrade your routing platform are
standard installation, category change, and recovery. The standard installation is the
standard method of upgrading and downgrading the software. Use a category change
installation when you are moving from one software category to another; for example,
if you are changing the device from using the standard Junos OS to the Junos-FIPS
category. Perform a recovery installation when the software on the device is damaged
or otherwise unable to accommodate a software upgrade or downgrade.
Standard Installation
A standard installation is the typical method used to upgrade or downgrade software
on the server. This method uses the installation package that matches the installation
package already installed on the system. For example, you might upgrade an M120 router
running Junos OS installed using the jinstall* installation package. If you upgrade the
router from Release 9.0R2.10 to Release 9.1R1.8, you use the
jinstall-9.1R1.8–domestic-signed.tgz installation package. For information on the different
installation packages available, see “Junos OS Installation Packages Prefixes” on page 44.
NOTE: Juniper Networks does not support using the request system software
rollback command to restore a different installation category on the device.
When installing a different Junos OS category on a device, once the installation
is complete, you should execute a request system snapshot command to
delete the backup installation from the system.
Recovery Installation
A recovery installation is performed to repair a device with damaged software or a
condition that prevents the upgrade, downgrade, or change in installation category of
the software.
For example, you may need to perform a recovery installation to change a device’s
software category from Junos-FIPS to standard Junos OS.
A Juniper Networks EX Series Ethernet Switch is delivered with the Juniper Networks
Junos operating system (Junos OS) preinstalled. As new features and software fixes
become available, you must upgrade your software to use them. You can also downgrade
Junos OS to a previous release.
During a successful upgrade, the upgrade package removes all files from /var/tmp and
completely reinstalls the existing software. It retains configuration files, and similar
information, such as secure shell and host keys, from the previous version. The previous
software package is preserved in a separate disk partition, and you can manually revert
back to it if necessary. If the software installation fails for any reason, such as loss of
power during the installation process, the system returns to the originally active installation
when you reboot.
For ease of management, a Virtual Chassis provides flexible methods to upgrade software
releases. You can deploy a new software release to all member switches of a Virtual
Chassis or to only a particular member switch.
You can also upgrade the software on a Virtual Chassis using nonstop software upgrade
(NSSU). NSSU takes advantage of graceful Routing Engine switchover (GRES) and
nonstop active routing (NSR) to ensure no disruption to the control plane during the
upgrade. You can minimize disruption to network traffic by defining link aggregation
groups (LAGs) such that the member links of each LAG reside on different line cards or
on different members . During an NSSU, the line cards and Virtual Chassis members are
upgraded one at a time, so that traffic continues to flow through the other line cards or
members while that line card or member is being upgraded.
• Perform an NSSU—An NSSU upgrades both Routing Engines with a single command
and with a minimum of network disruption. An NSSU takes advantage of GRES and
NSR to ensure no disruption to the control plane. You can minimize disruption to
network traffic by defining LAGs such that the member links of each LAG reside on
different line cards. The line cards are upgraded one at a time, so that traffic continues
to flow through the other line cards while a line card is being upgraded.
For more information about NSSU, see Understanding Nonstop Software Upgrade on
EX Series Switches.
• Ensure that at least 620 MB of disk space is available in the system before downloading
the software installation package to the /var/tmp directory. Use the command show
system storage to get details of the available space.
• If the space available is inadequate, use the command request system storage cleanup.
Additionally, you can manually delete any other log or unwanted files from the /var/tmp
or /var/log directories.
You can now follow the procedure in “Installing Software on an EX Series Switch with a
Single Routing Engine (CLI Procedure)” on page 90 to complete the software installation.
NOTE: You can also use this procedure to load two versions of Junos OS in
separate partitions on the switch.
SRX Series devices are delivered with Junos OS preinstalled on them. When you power
on a device, it starts (boots) up using its primary boot device. These devices also support
secondary boot devices, allowing you to back up your primary boot device and
configuration.
As new features and software fixes become available, you must upgrade Junos OS to
use them. Before an upgrade, we recommend that you back up your primary boot device.
If the SRX Series device does not have a secondary boot device configured and the
primary boot device becomes corrupted, you can reload the Junos OS package onto the
corrupted internal media from a USB flash drive or TFTP server.
NOTE: Junos OS Release 12.1X45 and later do not support single root
partitioning.
Existing SRX Series devices that are running Junos OS Release 9.6 or earlier use the
single-root partitioning scheme. While upgrading these devices to Junos OS Release 10.0
or later, you can choose to format the storage media with dual-root partitioning (strongly
recommended) or retain the existing single-root partitioning.
Certain Junos OS upgrade methods format the internal media before installation, whereas
other methods do not. To install Junos OS Release 10.0 or later with the dual-root
partitioning scheme, you must use an upgrade method that formats the internal media
before installation.
• Installation from the CLI using the partition option (available in Junos OS Release 10.0)
NOTE: Once the media has been formatted with the dual-root partitioning
scheme, you can use conventional CLI or J-Web user interface installation
methods, which retain the existing partitioning and contents of the media,
for subsequent upgrades.
12.1X46 SRX100, SRX110, SRX210, SRX220, and SRX240 devices with 2 GB RAM
cannot be upgraded to any Junos OS 12.1X46 Release after 12.1X46-D65.
Attempting to upgrade to this release on devices with 2 GB RAM will trigger
the following error: ERROR: Unsupported platform for 12.1X46 releases
after 12.1X46-D65
12.1X45-D10 Junos OS Release 12.1X45 and later do not support single root partitioning
• Installing Junos OS Upgrade Packages on SRX Series Devices from a Remote Server
Just like any other operating system, the 64-bit version of Junos OS can address more
memory than the 32-bit version of Junos OS. In order to support larger Routing Engine
memory sizes, an upgrade from the 32-bit to the 64-bit Junos OS running on the Routing
Engine hardware is necessary.
The in-service software upgrade (ISSU) procedure is not supported while upgrading from
the 32-bit version of Junos OS to the 64-bit version of Junos OS. The upgrade process
involves some downtime, so traffic will be affected.
If you are starting with 32-bit Junos OS running on Routing Engines that are not 64-bit
capable, there are two parts of the upgrade: upgrading the hardware and upgrading the
software. This topic provides an overview of the upgrade tasks and the order in which
they must be performed. For more detailed information about replacing the Routing
Engines, see the hardware guide for your router.
RE0
Primary
1 Both Routing Engines 32-bit Junos OS
have 32-bit Junos OS 32-bit Junos OS
RE1
RE0
Primary
2 Upgrade RE1 hardware and 32-bit Junos OS
install 64-bit Junos OS on it 64-bit Junos OS
RE1
RE0
3 Switch mastership from RE0 to RE1
(Allow 32-bit Junos OS to run 32-bit Junos OS
Primary
on RE0 as backup for 64-bit
64-bit Junos OS
Junos OS on RE1)
RE1
RE0
4 Upgrade RE0 hardware and
install Junos OS 64-bit on it 64-bit Junos OS
Primary
(Both Routing Engines
64-bit Junos OS
have 64-bit Junos OS)
RE1
RE0
Primary
5 Optional: 64-bit Junos OS
Switch mastership back to RE0 64-bit Junos OS
g017475
RE1
To upgrade redundant Routing Engines from 32-bit Junos OS to 64-bit Junos OS:
1. If the backup Routing Engine in slot 1 is not 64-bit capable, replace it with a 64-bit
capable Routing Engine.
For instructions on replacing a Routing Engine, see the hardware guide for your router.
2. Log in to the primary Routing Engine in slot 0, and prepare the router for software
package upgrade.
CAUTION: Mixing 32-bit Junos OS and 64-bit Junos OS can only be done
temporarily. It is not supported for normal operations.
5. If the Routing Engine in slot 0 is not 64-bit capable, replace it with a 64-bit capable
Routing Engine.
For instructions on replacing a Routing Engine, see the hardware guide for your router.
Upgrading a Single Routing Engine from 32-bit to 64-bit Junos OS Using One Slot
To upgrade a single Routing Engine, from 32-bit to 64-bit Junos using one slot:
1. If the Routing Engine is not 64-bit capable, replace it with a 64-bit capable Routing
Engine.
For instructions on replacing a Routing Engine, see the hardware guide for your router.
2. Install 64-bit Junos OS on the Routing Engine using the no-validate option.
For more details on installing software on a single router, see Installing the Software
Package on a Router with a Single Routing Engine.
3. Reboot.
Upgrading a Single Routing Engine from 32-bit to 64-bit Junos OS Using Two Slots
This procedure provides a way to upgrade to a 64-bit Junos OS using two Routing Engine
slots. Using two slots reduces the amount of network downtime.
If you have only one slot, use procedure “Upgrading a Single Routing Engine from 32-bit
to 64-bit Junos OS Using One Slot” on page 66.
For a diagram of this procedure, see Figure 4 on page 67. In this procedure, slot 1 is initially
empty.
Figure 4: Upgrading a Single Routing Engine to 64-bit Junos OS Using Two Slots
RE0
Primary
1 Single Routing Engine 32-bit Junos OS
has 32-bit Junos OS Blank
RE1
RE0
Primary
2 Add RE1 hardware and install 32-bit Junos
64-bit Junos OS on it 64-bit Junos OS
RE1
RE0
3 Switch mastership
32-bit Junos
(Routing Engine in RE0 is now Primary
the backup Routing Engine) 64-bit Junos OS
RE1
RE0
g017477
RE1
To upgrade a single Routing Engine to 64-bit Junos OS using two Routing Engine slots:
For instructions on installing a Routing Engine, see the hardware guide for your router.
You need to remove the Routing Engine from slot 0 to avoid mixing 32-bit Junos OS
and 64-bit Junos OS.
4. When the 64-bit Junos OS is configured properly, remove the Routing Engine from
slot 0 .
For instructions on removing a Routing Engine, see the hardware guide for your router.
Related • Installing the Software Package on a Router with Redundant Routing Engines on
Documentation page 92
• Installing the Software Package on a Router with a Single Routing Engine on page 88
Overview of CoS Upgrade Requirements (Junos OS Release 11.1 or 11.2 to a Later Release)
Before you upgrade to Junos OS Release 11.3, you must deactivate the CoS configuration
if the CoS configuration includes any of the following features:
• excess-rate option
• Any of the Junos OS Release 11.1 or 11.2 default multidestination forwarding classes
CAUTION: If your CoS configuration contains any of the features listed above
and you attempt to upgrade from Junos OS Release 11.1 or 11.2 to a later version
without first editing the configuration, the Junos OS might not restart.
Junos OS Release 11.3 and later for QFX Series no longer supports the excess-rate
statement, the strict priority option, or the default multidestination forwarding classes
used in Junos OS Release 11.1 and 11.2. In addition, Junos OS Release 11.3 introduces new
restrictions on how to configure and use strict-high priority queues.
This topic does not describe how to perform the software upgrade procedure. It describes
how to deactivate your CoS configuration, edit your CoS configuration, and reactivate
your CoS configuration at the appropriate times.
Use the following procedure to upgrade safely from Junos OS Release 11.1 or 11.2 to a later
release:
3. Make the following changes to the CoS configuration while the CoS configuration is
still deactivated:
• Remove the excess-rate statement from the CoS configuration if you have used it
at the [edit class-of-service schedulers] or [edit class-of-service
traffic-control-profiles] hierarchy level.
• Remove the strict-high and strict priority queue configurations if you have used them
at the [edit class-of-service schedulers] hierarchy level.
user@switch# commit
NOTE: If you configured the transmit-rate option for any queues under the
[edit class-of-service schedulers] hierarchy level, if the rate is configured as
an exact rate in Mbps, we recommend that you reconfigure the transmit-rate
option as a percentage. This is because the scheduler converts exact rates
to percentages, and when the exact rate is below 1 Gbps, some granularity
may be lost in the conversion. You can avoid this potential issue by specifying
the transmit-rate option as a percentage.
You can create copies of the software running on a switch using the system snapshot
feature. The system snapshot feature takes a “snapshot” of the files currently used to
run the switch—the complete contents of the /config and /var directories, which include
the running Junos OS, the active configuration, and the rescue configuration—and copies
all of these files into an alternate (internal, meaning internal flash, or an external, meaning
USB flash) memory source. You can then use this snapshot to boot the switch at the
next boot up or as a backup boot option.
You can only use snapshots to move files to external memory if the switch was booted
from internal memory, or to move files to internal memory if the switch was booted from
external memory. You cannot create a snapshot in the memory source that booted the
switch even if the snapshot is being created on a different partition in the same memory
source.
Snapshots are particularly useful for moving files onto USB flash drives. You cannot use
the copy command or any other file-moving technique to move files from an internal
memory source to USB memory on the switch.
• You cannot use snapshots to move files to any destination outside of the switch other
than an installed external USB flash drive.
Snapshots are particularly useful for moving files onto USB flash drives. You cannot use
the copy command or any other file-moving technique to move files from an internal
memory source to USB memory on the switch.
• If you create the snapshot on the media that the switch did not boot from, the following
partitions on the boot media are included in the snapshot: root, altroot, var, var/tmp,
and config.
The root partition is the primary boot partition, and the altroot partition is the backup
boot partition.
• If you create the snapshot on the media that the switch booted from, the root partition
that the switch booted from is copied to the alternate root partition. The var, var/tmp,
and config partitions are not copied as part of the snapshot because they already exist
on the boot media.
• You cannot use snapshots to move files to any destination outside the switch other
than an installed external USB flash drive or switches that are members of the same
Virtual Chassis as the switch on which you created the snapshot.
• Snapshot commands, like all commands executed on a Virtual Chassis, are executed
on the local member switch. If different member switches request the snapshot, the
snapshot command is pushed to the Virtual Chasis member creating the snapshot
and is executed on that member, and the output is then returned to the switch that
initiated the process. For instance, if the command to create an external snapshot on
member 3 is entered on member 1, the snapshot of internal memory on member 3 is
taken on external memory on member 3. The output of the process is seen on member
1. No files move between the switches.
During a successful upgrade, the upgrade package completely reinstalls the existing
Junos OS. It retains configuration files, log files, and similar information from the previous
version, that is, all stored files except the juniper.conf and SSH files are removed. Creating
a backup has the following advantages:
• The device can boot from a backup and come back online in case of failure or corruption
of the primary boot device in the event of power failure during an upgrade.
• The device can recover from a known, stable environment in case of an unsuccessful
upgrade.
You can use either the J-Web user interface or the CLI to back up the primary boot device
on to the secondary storage device.
For information about backing up the existing installation on SRX Series Services
Gateways, see Backing Up the Existing Installation on SRX Series Devices.
After a successful upgrade, remember to back up the new current configuration to the
secondary device.
On routers, you should back up the existing installation so that you can return to it if
needed.
In a dual Routing Engine system, you need to back up both Routing Engines.
When the request system snapshot command is issued, the /root file system is backed
up to /altroot, and /config is backed up to /altconfig. The /root and /config file systems
are on the router’s CompactFlash card, and the /altroot and /altconfig file systems
are on the router’s hard disk or SSD. When the backup is completed, the current and
backup software installations are identical.
NOTE: On routers without a CompactFlash card, where the hard disk is the
primary boot device, you cannot back up your software installation. On MX104
routers, which do not have a CompactFlash card, you can back up your
software installation on an external USB storage media device.
• Issue the request system snapshot media CLI operational command. For example:
On MX104 routers, when you issue the request system snapshot operational command
to back up the current software installation, the backup is done on the first USB storage
media device.
To back up files from the NAND flash device to a USB storage media device:
When you issue the request system snapshot operational command to back up the
NAND flash device, the backup is done on the first USB storage media device.
On ACX Series routers, when you issue the request system snapshot slice alternate
command, the command backs up the files to the router’s NAND flash.
• Issue the request system snapshot slice alternate CLI operational command. For
example:
When this command is issued, the /root file system is backed up to /altroot, and
/config is backed up to /altconfig on the router’s NAND flash device.
To back up the files to an external USB storage device, you need to run the following
command:
On ACX5000 line of routers, when you issue the request system snapshot slice alternate
command, the command backs up the files to an external USB storage device.
NOTE: ACX5000 line of routers do not have a NAND flash memory and
alternate slice for Junos OS. Junos OS for ACX5000 line of routers runs as a
VM on a host image.
• Issue the request system snapshot slice alternate CLI operational command. For
example:
If an external USB is not inserted to the router, then the command shows the following
error:
Before you begin upgrading Junos OS on an SRX Series device, perform the following
tasks:
If the amount of free disk space on a device is insufficient for installing Junos OS, you
might receive a warning similar to the following messages, that the /var filesystem is low
on free disk space:
WARNING: This package requires 1075136k free, but there is only 666502k available.
To determine the amount of free disk space on the device, issue the show system storage
detail command. The command output displays statistics about the amount of free disk
space in the device file systems.
A sample of the show system storage detail command output is shown below:
user@host% cli
user@host> configure/var: write failed, filesystem is full
You can clean up the file storage on the device by deleting system files using the request
system storage cleanup command as shown in following procedure:
Downloading Software
NOTE: To access the download section, you must have a service contract
and an access account. If you need help obtaining an account, complete the
registration form at the Juniper Networks website:
https://userregistration.juniper.net/entitlement/setupAccountInfo.do.
3. Select the software package that you want to download. You can select software
that supports a specific platform or technology.
4. On the page that appears, click the Software tab and select the Junos OS installation
package to download.
6. On the Download Software page that appears, the following options are available:
• If you want to download the software on your local host, click the CLICK HERE link
and save the file to your system. If you want to place the file on a remote system,
you must make sure that the file can be accessible by the router, switch, or services
gateway by using HTTP, FTP, or SCP. Proceed with the installation. See “Installing
Software Using the Command-Line Interface” on page 77 for more details.
• If you want to download the software on your device, use the following procedure
to download and install the software on the device.
NOTE: The URL string generated remains active only for 15 minutes.
In the command, paste the copied URL string (for URL) and then enter /var/tmp
(as the destination on your hard disk).
Example:
NOTE: Ensure that the URL string is enclosed within quotation marks.
Also ensure that there is sufficient free space available on the device.
d. (Optional) Validate the software image by using the request system software
validate package-name command.
Example:
e. Install the software by using the request system software add package-name
command.
Example:
NOTE: To access the download section, you must have a service contract
and an access account. If you need help obtaining an account, complete the
registration form at the Juniper Networks website:
https://userregistration.juniper.net/entitlement/setupAccountInfo.do.
Before you transfer the software package, ensure that the FTP service is enabled on the
device.
Enable the FTP service using the set system services ftp command:
1. From the router or switch command line, initiate an FTP session with the local system
(host) where the package is located by using the ftp command:
3. Navigate to the software package location on the local system, and transfer the
package by using the get command:
user@host> bye
Goodbye
1. From the local system command line, initiate an FTP session with the device using
the ftp command:
3. Navigate to the software package location on the local system, and transfer the
package by using the put command:
user@host> bye
Goodbye
We recommend that you connect to the console port while installing the installation
package so you can respond to any required user input and detect any errors that may
occur.
Before you install the new installation package, back up your current configuration files
because the upgrade process removes all of the stored files on the switch.
Executing this command saves a copy of your configuration files to a remote location
such as an external USB device.
NOTE: Before you install the software, back up any critical files in /var/home.
For more information regarding how to back up critical files, contact Customer
Support at https://www.juniper.net/support.
• Upgrading the Host OS is not required for every software upgrade, as noted
above.
NOTE: On QFX5100 and EX4600 switches, you must use the force-host
option if you are downgrading from Junos OS Release 14.1X53-D40 to any
release earlier than 14.1X53-D40 otherwise the switch will issue core dumps.
If the installation package resides locally on the switch, execute the request system
software add <pathname><source> reboot command.
For example:
If the Install Package resides remotely, execute the request system software add
<pathname><source> reboot command.
For example:
After the reboot has finished, verify that the new version of software has been properly
installed by executing the show version command.
NOTE: Before you install the software, back up any critical files in /var/home.
For more information regarding how to back up critical files, contact Customer
Support at https://www.juniper.net/support.
Table 8: Caveats for Downgrading from Junos OS Release 15.1X53-D60 to Previous Software Releases
15.1X53-D33 Yes, but the configuration is lost, and Yes, but the configuration is lost, and
there is no workaround. We recommend there is no workaround. We recommend
that you save the configuration to an that you save the configuration to an
external location, such as a remote external location, such as a remote
server, and then load the configuration server, and then load the configuration
after you have successfully downgraded. after you have successfully downgraded.
15.1X53-D32 Yes, but the configuration is lost, and Yes, but the configuration is lost, and
there is no workaround. We recommend there is no workaround. We recommend
that you save the configuration to an that you save the configuration to an
external location, such as a remote external location, such as a remote
server, and then load the configuration server, and then load the configuration
after you have successfully downgraded. after you have successfully downgraded.
NOTE: You must downgrade to Junos NOTE: You must downgrade to Junos
OS Release 15.1X53-D33 before you OS Release 15.1X53-D33 before you
downgrade to Junos OS Release downgrade to Junos OS Release
15.1X53-D30. 15.1X53-D32.
• If the installation package resides locally on the switch, execute the request system
software add <pathname><source> reboot command.
For example:
• If the Install Package resides remotely, execute the request system software add
<pathname><source> reboot command.
For example:
After the reboot has finished, verify that the new version of software has been properly
installed by executing the show version command.
NOTE: Before you install the software, back up any critical files in /var/home.
For more information regarding how to back up critical files, contact Customer
Support at https://www.juniper.net/support.
Table 9: Caveats for Downgrading from Junos OS Release 15.1X53-D60 to Previous Software Releases
15.1X53-D33 Yes, but the configuration is lost, and Yes, but the configuration is lost, and
there is no workaround. We recommend there is no workaround. We recommend
that you save the configuration to an that you save the configuration to an
external location, such as a remote external location, such as a remote
server, and then load the configuration server, and then load the configuration
after you have successfully downgraded. after you have successfully downgraded.
15.1X53-D32 Yes, but the configuration is lost, and Yes, but the configuration is lost, and
there is no workaround. We recommend there is no workaround. We recommend
that you save the configuration to an that you save the configuration to an
external location, such as a remote external location, such as a remote
server, and then load the configuration server, and then load the configuration
after you have successfully downgraded. after you have successfully downgraded.
NOTE: You must downgrade to Junos NOTE: You must downgrade to Junos
OS Release 15.1X53-D33 before you OS Release 15.1X53-D33 before you
downgrade to Junos OS Release downgrade to Junos OS Release
15.1X53-D30. 15.1X53-D32.
The switch contains two routing engines, so you will need to install the software on each
routing engine (re0 and re1).
If the installation package resides locally on the switch, execute the request system
software add <pathname><source> command.
If the Install Package resides remotely from the switch, execute the request system
software add <pathname><source> re0 command.
For example:
If the Install Package resides remotely from the switch, execute the request system
software add <pathname><source> re1 command.
For example:
For example:
After the reboot has finished, verify that the new version of software has been properly
installed by executing the show version command.
NOTE: Before you install the software, back up any critical files in /var/home.
For more information regarding how to back up critical files, contact Customer
Support at https://www.juniper.net/support.
For more information about logging in to the Routing Engine through the console port,
see the specific hardware guide for your switch.
user@switch> configure
4. Disable nonstop-bridging:
user@switch# exit
After the switch has been prepared, you first install the new Junos OS release on the
backup Routing Engine, while keeping the currently running software version on the
master Routing Engine. This enables the master Routing Engine to continue operations,
minimizing disruption to your network.
After making sure that the new software version is running correctly on the backup Routing
Engine, you are ready to switch routing control to the backup Routing Engine, and then
upgrade or downgrade the software version on the other Routing Engine.
1. Log in to the console port on the other Routing Engine (currently the backup).
For more information about logging in to the Routing Engine through the console port,
see the specific hardware guide for your switch.
2. Install the new software package using the request system software add command:
For more information about the request system software add command, see the CLI
Explorer.
3. Reboot the switch to start the new software using the request system reboot command:
NOTE: You must reboot the switch to load the new installation of Junos
OS on the switch.
To abort the installation, do not reboot your switch. Instead, finish the
installation and then issue the request system software delete
<package-name> command. This is your last chance to stop the installation.
All the software is loaded when you reboot the switch. Installation can take between
5 and 10 minutes. The switch then reboots from the boot device on which the software
was just installed. When the reboot is complete, the switch displays the login prompt.
While the software is being upgraded, the Routing Engine on which you are performing
the installation is not sending traffic.
4. Log in and issue the show version command to verify the version of the software
installed.
Once the software is installed on the backup Routing Engine, you are ready to switch
routing control to the backup Routing Engine, and then upgrade or downgrade the master
Routing Engine software:
For more information about logging in to the Routing Engine through the console port,
see the specific hardware guide for your switch.
For more information about the request chassis routing-engine master command, see
the CLI Explorer.
3. Verify that the backup Routing Engine (slot 1) is the master Routing Engine:
4. Install the new software package using the request system software add command:
For more information about the request system software add command, see the CLI
Explorer.
5. Reboot the Routing Engine using the request system reboot command:
NOTE: You must reboot to load the new installation of Junos OS on the
switch.
To abort the installation, do not reboot your system. Instead, finish the
installation and then issue the request system software delete jinstall
<package-name> command. This is your last chance to stop the installation.
The software is loaded when you reboot the system. Installation can take between 5
and 10 minutes. The switch then reboots from the boot device on which the software
was just installed. When the reboot is complete, the switch displays the login prompt.
While the software is being upgraded, the Routing Engine on which you are performing
the installation does not send traffic.
6. Log in and issue the show version command to verify the version of the software
installed.
For more information about the request chassis routing-engine master command, see
the CLI Explorer.
8. Verify that the master Routing Engine (slot 0) is indeed the master Routing Engine:
1. Download the software packages you need from the Juniper Networks Support Web
site at https://www.juniper.net/support/. For information about downloading software
packages, see “Downloading Software” on page 76.
2. Back up the currently running and active file system so that you can recover to a known,
stable environment in case something goes wrong with the upgrade:
3. Install the new software package using the request system software add command:
For M Series, MX Series, and T Series routers running Junos OS Release 12.2 and later,
you can use the request system software add set command to install multiple software
packages at one time:
user@host> request system software add set /var/tmp/installation-package
WARNING: Do not include the re0 | re1 option when you install a package
using the request system software add command, if the Routing Engine on
which the package is located and the Routing Engine on which you want
to install the package are the same. In such cases, the package gets
deleted after a successful upgrade.
For more information about the request system software add command, see the CLI
Explorer.
Use the request system software add set command to retain any SDK configuration
by installing the SDK add-on packages along with the core Junos OS installation
package.
This message indicates that someone manually deleted or changed an item that was
in a package. You do not need to take any action; the package is still properly deleted.
For more information about the request system software add command, see the CLI
Explorer.
4. Reboot the device to start the new software using the request system reboot command:
NOTE: You must reboot the device to load the new installation of Junos
OS on the device.
To abort the installation, do not reboot the device. Instead, finish the
installation and then issue the request system software delete jinstall
command. This is your last chance to stop the installation.
The software is loaded when you reboot the system. Installation can take between 5
and 10 minutes. The device then reboots from the boot device on which the software
was just installed. When the reboot is complete, the device displays the login prompt.
While the software is being upgraded, the Routing Engine on which you are performing
the installation does not route traffic.
5. Log in and issue the show version command to verify the version of the software
installed.
6. After you have upgraded or downgraded the software and are satisfied that the new
software is successfully running, issue the request system snapshot command to back
up the new software.
NOTE: On an ACX router, you must issue the request system snapshot slice
alternate command.
Related • Repartitioning Routing Engine System Storage to Increase the Swap Partition on
Documentation page 212
Installing Software on an EX Series Switch with a Single Routing Engine (CLI Procedure)
You can use this procedure to upgrade Junos OS on a single routing engine in any EX
Series switch, including all switches that do not support redundant Routing Engines. You
can also use this procedure to upgrade software on all EX Series Virtual Chassis, with
the exception of the EX8200 Virtual Chassis.
This procedure can be used to upgrade the following switches or Virtual Chassis:
• EX2200 switch
• EX2300 switch
• EX3200 switch
• EX3300 switch
• EX3400 switch
• EX4200 switch
• EX4300 switch
• EX4500 switch
• EX4550 switch
To upgrade software on an EX6200 or EX8200 switch running two Routing Engines, see
“Installing Software on an EX Series Switch with Redundant Routing Engines (CLI
Procedure)” on page 98 or Upgrading Software on an EX6200 or EX8200 Standalone
Switch Using Nonstop Software Upgrade (CLI Procedure).
To upgrade software on an EX8200 Virtual Chassis, see Installing Software for All Devices
in an EX8200 Virtual Chassis.
3. (Optional) Copy the software package to the switch. We recommend that you use
FTP to copy the file to the /var/tmp directory.
This step is optional because Junos OS can also be upgraded when the software
image is stored at a remote location. These instructions describe the software upgrade
process for both scenarios.
• ftp://hostname/pathname/package.tgz
• http://hostname/pathname/package.tgz
Include the optional member option to install the software package on only one
member of an EX4200 Virtual Chassis:
Other members of the Virtual Chassis are not affected. To install the software on all
members of the Virtual Chassis, do not include the member option.
NOTE: To abort the installation, do not reboot your device; instead, finish
the installation and then issue the request system software delete
package.tgz command, where package.tgz is, for example,
jinstall-ex-4200-10.2R1.8-domestic-signed.tgz. This is your last chance to
stop the installation.
6. After the reboot has completed, log in and verify that the new version of the software
is properly installed:
user@switch> show version
7. To ensure that the resilient dual-root partitions feature operates correctly, execute
the following command to copy the new Junos OS image into the alternate root
partition:
To update the alternate root partitions on all members of a Virtual Chassis, use this
command:
user@switch> request system snapshot slice alternate all-members
Resilient dual-root partitions allow the switch to boot transparently from the alternate
root partition if the system fails to boot from the primary root partition.
NOTE: EX2300 and EX3400 switches have two volumes: JUNOS volume
and OAM (recovery) volume. To store a snapshot (non-recovery) on JUNOS
volume, use the command request system snapshot. To create snapshot
(recovery) on the OAM volume, use the command request system snapshot
recovery.
If the router has two Routing Engines, perform a Junos OS installation on each Routing
Engine separately to avoid disrupting network operation.
Before you begin, download the software installation package you want to install and
place it on the primary Routing Engine (in slot 0) in the /var/tmp directory.
For more information about logging in to the Routing Engine through the console port,
see the specific hardware guide for your router.
{master}
user@host> configure
Entering configuration mode
{master} [edit]
user@host#
{master}[edit]
user@host# delete protocols layer2-control nonstop-bridging
{master}[edit]
user@host# (delete | deactivate) chassis redundancy graceful-switchover
{master}[edit]
user@host# commit synchronize
re0:
configuration check succeeds
re1:
commit complete
re0:
commit complete
[edit]
user@host# exit
Before you start this procedure, decide which software package you need and download
it to the /var/tmp directory of the primary Routing Engine. For information on which
packages to use for which upgrades, see “Junos OS Installation Package Names” on
page 43.
1. Log in to the console port on the current primary Routing Engine in slot 0.
2. Install the new software package on the backup Routing Engine (re1) using the request
system software add command:
WARNING: Do not include the re0 or re1 option when you install a package
using the request system software add command if the Routing Engine on
which the package is located and the Routing Engine on which you want
to install the package are the same. In such cases, the package gets
deleted after a successful upgrade.
For M Series, MX Series, and T Series routers running Junos OS Release 12.2 and later,
you can use the request system software add set command to install multiple software
packages at the same time:
For more information about the request system software add set command, see request
system software add or the CLI Explorer.
You must reboot the device to load the new installation of Junos OS on the router.
You can combine steps 2 and 3 by adding reboot to the request system software add
command. But if you do the steps separately, make sure you reboot the Routing Engine
you just added system software to.
NOTE: To abort the installation, do not reboot your device. Instead, finish
the installation and then issue the request system software delete
software-package-name command. This is your last chance to stop the
installation.
All the software is loaded when you reboot the device. Installation can take between
5 and 10 minutes. The router then reboots from the boot device on which the software
was just installed. When the reboot is complete, the router displays the login prompt.
While the software is being upgraded, the Routing Engine on which you are performing
the installation is not routing traffic.
4. Issue the show version invoke-on other-routing-engine command to verify the new
software is installed.
user@host> show version invoke-on other-routing-engine
re1:
--------------------------------------------------------------------------
Hostname: host1
Model: mx240
Junos: package-name
. . .
user@host>
5. (Optional) Add the jweb package using the request system software add command.
Before you can add this package, you must first download the software as you did
the installation package. For more information about downloading the jweb package,
see “Downloading Software” on page 76.
The jweb installation module adds a router management graphical user interface that
you can use to view and configure your router.
1. Transfer routing control from the primary to the backup Routing Engine:
Resolving mastership...
Complete. The other routing engine becomes the master.
For more information about the request chassis routing-engine master command, see
the CLI Explorer.
2. Verify that the Routing Engine in slot 1 is now the primary Routing Engine:
3. Install the new software package on the Routing Enigne in slot 0 using the request
system software add command:
WARNING: Do not include the re0 or re1 option when you install a package
using the request system software add command if the Routing Engine on
which the package is located and the Routing Engine on which you want
to install the package are the same. In such cases, the package gets
deleted after a successful upgrade.
For M Series, MX Series, and T Series routers running Junos OS Release 12.2 and later,
you can use the request system software add set command to install multiple software
packages at the same time:
For more information about the request system software add set command, see request
system software add or the CLI Explorer.
4. Reboot the Routing Engine using the request system reboot command:
You must reboot the device to load the new installation of Junos OS on the router.
You can combine steps 3 and 4 by adding reboot to the request system software add
command. But if you do the steps separately, make sure you reboot the Routing Engine
you just added system software to.
NOTE: To abort the installation, do not reboot your device. Instead, finish
the installation and then issue the request system software delete
software-package-name command. This is your last chance to stop the
installation.
The software is loaded when you reboot the system. Installation can take between 5
and 10 minutes. The router then reboots from the boot device on which the software
was just installed. When the reboot is complete, the router displays the login prompt.
While the software is being upgraded, the Routing Engine on which you are performing
the installation does not route traffic.
5. Log in to the current backup Routing Engine (slot 0) and issue the show version
command to verify the version of the software installed.
user@host> show version
6. (Optional) Add the jweb package using the request system software add command.
Before you can add this package, you must first download the software as you did
the installation package. For more information about downloading the jweb package,
see “Downloading Software” on page 76.
The jweb installation module adds a router management graphical user interface that
you can use to view and configure your router.
1. Restore the configuration that existed before you started this procedure (from
“Preparing the Router for the Installation” on page 92):
user@host> configure
[edit]
user@host# rollback 1
NOTE: The number on the rollback command should match the number
of commits you did in preparing the router for the installation. For example,
if you did a separate commit for disabling Routing Engine redundancy and
disabling nonstop-bridging, you need to use rollback 2 in this step.
[edit]
user@host# commit synchronize and-quit
3. Transfer routing control back to the original primary Routing Engine in slot 0:
{backup}
user@host> request chassis routing-engine master switch
warning: Traffic will be interrupted while the PFE is re-initialized
Toggle mastership between routing engines ? [yes,no] (no) yes
Resolving mastership...
Complete. The other routing engine becomes the master.
For more information about the request chassis routing-engine master command, see
the CLI Explorer.
4. Verify that the Routing Engine (slot 0) is indeed the primary Routing Engine:
{master}
user@host> show chassis routing-engine
Routing Engine status:
Slot 0:
Current state Master
Election priority Master (default)
outing Engine status:
Slot 1:
Current state Backup
Election priority Backup (default)
5. After you have installed the new software and are satisfied that it is successfully
running, back up the new software on both primary and backup Routing Engines.
• For backing up Junos OS with upgraded FreeBSD, use the request system snapshot
recovery command. To find which platforms in which releases use Junos OS with
upgraded FreeBSD, see Feature Explorer and enter Junos kernel upgrade to FreeBSD
10+. For more information, see “Changes in Use of Snapshots for Junos OS with
Upgraded FreeBSD” on page 41.
{master}
user@host> request system snapshot
{master}
user@host> request routing-engine login other-routing-engine
{backup}
user@host-re1> request system snapshot
{backup}
user@host-re1> request routing-engine login other-routing-engine
{master}
user@host>
The root file system is backed up to /altroot, and /config is backed up to /altconfig.
The root and /config file systems are on the router’s CompactFlash card, and the
/altroot and /altconfig file systems are on the router’s hard disk or solid-state drive
(SSD).
For more information about the request system snapshot command, see the CLI
Explorer.
NOTE: After you issue the request system snapshot command, you cannot
return to the previous version of the software because the running copy
and backup copy of the software are identical.
Related • Repartitioning Routing Engine System Storage to Increase the Swap Partition on
Documentation page 212
For an EX6200 switch or an EX8200 switch with redundant Routing Engines, you can
minimize disruption to network operation during a Junos OS upgrade by upgrading the
Routing Engines separately, starting with the backup Routing Engine.
To upgrade the software package on an EX6200 switch or an EX8200 switch with one
installed Routing Engine, see “Installing Software on an EX Series Switch with a Single
Routing Engine (CLI Procedure)” on page 90.
To upgrade redundant Routing Engines, you first install the new Junos OS release on the
backup Routing Engine while keeping the currently running software version on the master
Routing Engine. After making sure that the new software version is running correctly on
the backup Routing Engine, you switch device control to the backup Routing Engine.
Finally, you install the new software on the new backup Routing Engine.
4. Returning Routing Control to the Default Master Routing Engine (Optional) on page 102
For information on logging in to the Routing Engine through the console port, see
Connecting and Configuring an EX Series Switch (CLI Procedure).
user@switch:RE% cli
user@switch> configure
{master}[edit]
user@switch# delete routing-options nonstop-routing
{master}[edit]
user@switch# delete nonstop-bridging nonstop-bridging
{master}[edit]
user@switch# deactivate chassis redundancy graceful-switchover
{master}[edit]
[edit]
user@switch# exit
After you have prepared the switch for software installation, install the software on the
backup Routing Engine. During the installation, the master Routing Engine continues
operations, minimizing the disruption to network traffic.
2. Copy the software package to the switch. We recommend that you use FTP to copy
the file to the /var/tmp directory.
NOTE: To abort the installation, do not reboot your device; instead, finish
the installation and then issue the request system software delete
package.tgz command, where package.tgz is, for example,
jinstall-ex-8200-10.2R1.8-domestic-signed.tgz. This is your last chance to
stop the installation.
NOTE: You must reboot the switch to load the new installation of the
Junos OS.
6. After the reboot has completed, log in and verify the new version of the software is
properly installed:
user@switch> show version
3. Verify that the default backup Routing Engine (shown as slot 1 in the command output)
is now the master Routing Engine:
user@switch> show chassis routing-engine
When the reboot completes, the prompt will reappear. Wait for this prompt to reappear
before proceeding to the next step.
6. Log in to the default backup Routing Engine (slot 1) through the console port.
[edit]
Re-enabling graceful Routing Engine switchover allows any future Routing Engine
switchovers to occur without loss of any network traffic.
[edit]
user@switch# set routing-options nonstop-routing
[edit]
user@switch# commit synchronize
10. To ensure that the resilient dual-root partitions feature operates correctly, execute
the following command to copy the new Junos OS image into the alternate root
partition on each Routing Engine:
Resilient dual-root partitions allow the switch to boot transparently from the alternate
root partition if the system fails to boot from the primary root partition.
If you want to return routing control to the Routing Engine that was the master Routing
Engine at the beginning of the procedure (the default master Routing Engine), perform
the next task.
2. Verify that the default master Routing Engine (slot 0) is indeed the master Routing
Engine:
user@switch> show chassis routing-engine
NOTE: If you are upgrading or installing Junos OS on a VM host, see “VM Host
Installation” on page 312.
Starting in Junos OS Release 15.1, certain hardware platforms run an upgraded FreeBSD
kernel instead of older versions of FreeBSD.
Direct validation of the running configuration does not work for upgrading to Junos OS
with upgraded FreeBSD from Junos OS based on older versions of the FreeBSD kernel.
Therefore, when upgrading or downgrading between Junos OS and Junos OS with
upgraded FreeBSD, you might have to validate on a different host. It does not matter
where that other host is, as long as you can reach it with NETCONF over SSH (see
Establishing an SSH Connection for a NETCONF Session). The target system uses the
network to contact the other host, run the validation and authentication, and return the
result.
Table 10 on page 105 indicates how to upgrade your device from a Junos OS release to a
release that supports Junos OS with upgraded FreeBSD.
• For non-virtualized, enter freebsd and select Junos kernel upgrade to FreeBSD 10+.
• For virtualized, enter virtualization and select Virtualization of the Routing Engine.
The Junos OS release currently running on the device determines the upgrade path
you need to follow to upgrade to Junos OS with upgraded FreeBSD, as shown in
Table 10 on page 105. In using Table 10 on page 105, be aware of the following:
• You can upgrade only to one of the three releases next to your current release. If
you want to upgrade across more releases than this, you need to perform multiple
upgrades.
• In determining what constitutes skipping no more than two releases, you must take
into account which platforms you are upgrading. Whereas routing and switching
platforms have released software in each main release, security platforms have
had only the following releases: 17.4, 17.3, 15.1X49, and 12.3X48. Therefore, for a
router to upgrade from Release 12.3 to the first release supporting Junos OS with
upgraded FreeBSD (Release 15.1) would take multiple upgrades. But for a security
device to upgrade from Release 12.3 to the first release supporting Junos OS with
upgraded FreeBSD (Release 17.3) would take only one upgrade.
Current
Release Router’s
Sequence Junos OS Release Supporting Junos OS
Type Release with Upgraded FreeBSD Upgrade Path Example
Routing earlier 15.1 Upgrade in multiple steps, To upgrade from Release 12.1,
and than skipping no more than two upgrade first to Release 13.1,
Switching Release releases in one upgrade. then to Release 14.1, then from
12.3 there to either Release 15.1 or
16.1.
12.3 to 13.2 15.1 Upgrade in two steps. To upgrade from Release 12.3,
first upgrade to Release 13.3,
then upgrade to Release 15.1.
13.3 to 14.2 15.1 Upgrade in a single step. To upgrade from Release 13.3,
upgrade directly to Release 15.1.
Security 12.3 to 17.2 17.3 Upgrade in a single step. To upgrade from Release
12.3X48, upgrade directly to
Release 17.3.
NOTE: You can also downgrade from Junos OS Release with upgraded
FreeBSD to a pre-upgraded-FreeBSD release of Junos OS, as long as the
path complies with the Junos OS policy of skipping at most two earlier
releases.
See “Changes in Package Names for Junos OS with Upgraded FreeBSD” on page 33.
• /config
• /etc/localtime
• /var/db
• /var/etc/master.passwd
• /var/etc/inetd.conf
• /var/etc/pam.conf
• /var/etc/resolv.conf
• /var/etc/syslog.conf
• /var/etc/localtime
• /var/etc/exports
• /var/etc/extensions.allow
• /var/preserve
• /var/tmp/baseline-config.conf
• /var/tmp/preinstall_boot_loader.conf
NOTE: On EX2300 and EX3400 switches, the following directories are not
applicable:
• /etc/localtime
• /var/etc/localtime
• /var/etc/exports
• /var/preserve
• /var/tmp/preinstall_boot_loader.conf
Before you begin, if you have important files in other directories that are not preserved,
copy them from the router or switch to a secure location before upgrading the router or
switch.
Use the no-validate option with the request system software add command. If you
leave out the no-validate option, the command uses the validate option by default,
and direct validation of the running configuration does not work for upgrading to Junos
OS with upgraded FreeBSD from Junos OS based on older versions of the FreeBSD
kernel.
NOTE: You can also use the reboot option along with the request system
software add command, but it is not recommended to do this in a single
step while upgrading from a FreeBSD 6.1 based Junos OS to Junos OS with
upgraded FreeBSD.
2. Reboot the device to start the new software using the request system reboot command:
NOTE: You must reboot the device to load the newly installed version of
Junos OS on the device.
To abort the installation, do not reboot the device. Instead, finish the
installation and then issue the request system software delete
install-package-name.tgz command. This is your last chance to stop the
installation (not applicable on EX2300 and EX3400 platforms).
The software is loaded when you reboot the system. Installation can take between 5
and 10 minutes. The device then reboots from the boot device on which the software
was just installed. When the reboot is complete, the device displays the login prompt.
While the software is being upgraded, the Routing Engine on which you are performing
the installation does not route traffic.
3. Log in and issue the show version command to verify the version of the software
installed.
NOTE: The output shows the OS kernel, OS runtime, and other packages
installed on the device.
Installing Junos OS with Upgraded FreeBSD Over Junos OS with Upgraded FreeBSD of a Different
Release
To install Junos OS with upgraded FreeBSD over Junos OS with upgraded FreeBSD of a
different release:
1. Enter the request system software add package-name validate reboot command from
the operational mode in the CLI:
Use the validate and reboot options with the request system software add command.
The command uses the validate option by default. We encourage users to validate
using the validate option when upgrading from Junos OS to Junos OS or from Junos
OS with upgraded FreeBSD to Junos OS with upgraded FreeBSD.
If you leave out the reboot option, you can take care of that in a separate reboot step.
NOTE: The output shows the OS kernel, OS runtime, and other packages
installed on the device.
Starting in Junos OS Release 15.1, certain hardware platforms run a Junos OS based on
an upgraded FreeBSD kernel instead of older versions of FreeBSD. If you have previously
upgraded to Junos OS with upgraded FreeBSD, you can downgrade to earlier versions
versions of Junos OS, as long as the downgrade conforms to the Junos OS policy of
skipping at most two earlier releases.
1. Verify that you have previously upgraded to Junos OS with the upgraded FreeBSD
kernel, as described in “Upgrading Junos OS with Upgraded FreeBSD” on page 103.
1. Enter the request system software add package-name no-validate reboot command
from the operational mode in the CLI.
Use the no-validate and reboot options with the request system software add command.
If you leave out the no-validate option, the command uses the validate option by
default, and direct validation of running configuration does not work for downgrading
to Junos OS from Junos OS with upgraded FreeBSD.
If you leave out the reboot option, you can take care of that in a separate reboot step.
NOTE: The output shows the OS kernel, OS runtime, and other packages
installed on the router.
Downgrading from Junos OS with Upgraded FreeBSD Release 17.4 or Later to an Earlier Release
of Junos OS with Upgraded FreeBSD
This procedure is applicable when downgrading from Junos OS with Upgraded FreeBSD
Release 17.4 or later to an earlier release of Junos OS with Upgraded FreeBSD.
NOTE: If you have important files in other directories, copy them from the
router or switch to a secure location before upgrading the router or switch.
To downgrade from Junos OS with upgraded FreeBSD Release 17.3 or earlier to an earlier
release of Junos OS with upgraded FreeBSD:
1. Enter the request system software add package-name no-validate reboot command
from the operational mode in the CLI:
Use the no-validate and reboot options with the request system software add command.
If you leave out the no-validate option, the command uses the validate option by
default, and direct validation of running configuration does not work for downgrading
to an earlier release of Junos OS with upgraded FreeBSD from Junos OS with upgraded
FreeBSD Release 17.4 or later.
If you leave out the reboot option, you can take care of that in a separate reboot step.
NOTE: The output shows the OS kernel, OS runtime, and other packages
installed on the router.
Downgrading from Junos OS with Upgraded FreeBSD Release 17.3 or Earlier to an Earlier Release
of Junos OS with Upgraded FreeBSD
This procedure is applicable when downgrading from Junos OS with Upgraded FreeBSD
Releases 17.3 through 15.1 to an earlier release of Junos OS with Upgraded FreeBSD.
NOTE: If you have important files in other directories, copy them from the
router or switch to a secure location before upgrading the router or switch.
To downgrade from Junos OS with upgraded FreeBSD Release 17.3 or earlier to an earlier
release of Junos OS with upgraded FreeBSD:
1. Enter the request system software add package-name validate reboot command from
the operational mode in the CLI:
Use the validate and reboot options with the request system software add command.
The command uses the validate option by default. We encourage users to validate
using the validate option when upgrading from Junos OS to Junos OS, or from Junos
OS with upgraded FreeBSD Release 17.3 or earlier to Junos OS with upgraded FreeBSD
Release 17.2 or earlier.
If you leave out the reboot option, you can take care of that in a separate reboot step.
NOTE: The output shows the OS kernel, OS runtime, and other packages
installed on the router.
BEST PRACTICE: Before you install the software, back up any critical files in
/var/home. For more information regarding how to back up critical files,
contact Customer Support at https://www.juniper.net/support.
1. Execute the request system software add command with the validate option:
• If the installation package resides locally on the switch, execute the request system
software add validate pathname source reboot command, using the following
format:
• If the installation package resides remotely, execute the request system software
add validate pathname source reboot command, using the following format:
2. After the reboot has finished, verify that the new version of software has been properly
installed by executing the show version command.
NOTE: If you are upgrading a device from standard Junos OS to use Junos
Automation Enhancements and you are not loading the new factory default
configuration, you need to use the following procedure.
[edit]
user@switch# set system extensions providers juniper license-type juniper
deployment-scope commercial
user@switch# set system extensions providers chef license-type juniper
deployment-scope commercial
Upgrading the Loader Software on the Line Cards in a Standalone EX8200 Switch or
an EX8200 Virtual Chassis
You are almost never required to upgrade the loader software on the line cards in an
EX8200 switch.
Upgrading the loader software version for a line card is not a requirement to complete
any software upgrade. In rare cases, a line card might go offline immediately after a
software upgrade because the loader software version on the line card requires an upgrade
to become compatible with the upgraded Junos OS. You can upgrade the loader software
on the line cards as a best practice to avoid this problem and other less severe issues.
The loader software on any line card in an EX8200 switch is updated using the same
loader software package that upgrades the EX8200 Routing Engine loader software.
The line card software loader contains two banks, each with a single loader software
version. This procedure is used to upgrade the loader software for both banks of a line
card in a standalone EX8200 switch or an EX8200 Virtual Chassis.
To upgrade the loader software on the line cards in a standalone EX8200 switch or an
EX8200 Virtual Chassis:
NOTE: If you are upgrading Junos OS, the Routing Engine loader software,
and the line card loader software, we recommend that you upgrade in this
order: Junos OS, line card loader software, Routing Engine loader software.
1. Determine the version of the loader software for the line cards:
NOTE: On an EX8200 Virtual Chassis, you cannot execute the show chassis
firmware command on the master external Routing Engine. You must
execute this command on each member switch.
a. From the master external Routing Engine, start a shell session on the member
switch, for example:
b. Enter the CLI and execute the show chassis firmware command.
The loader software version appears after the timestamp (see the Version column in
the output) for each component. For example, In the example given in this step, look
at the first FPC listed (FPC 6). Ignore the U-Boot version number (1.1.6) and find the
loader software version number (2.3.0) after the timestamp (U-Boot 1.1.6 (Jan 13
2009 - 06:55:22). The U-Boot version number has nothing to do with the loader
software version that you need to determine.
If the loader software version is earlier than 3.5.0 for any FPC, you should consider
upgrading the loader software for that line card.
2. Download the loader software package from the Juniper Networks website and place
the software package on an internal software distribution site or in a local directory
on the switch. We recommend using /var/tmp as the local directory on the switch.
NOTE: To obtain the loader software package, see the Download Software
page at https://www.juniper.net/support/downloads/junos.html. Click on
the version, then the Software tab, and then the name of the software
install package. In the pop-up Alert box, click the link to the PSN document.
3. Disable graceful Routing Engine switchover (GRES) and nonstop active routing (NSR),
if enabled. Commit the configuration:
• For a software package in the /var/tmp directory on the switch or external Routing
Engine—/var/tmp/package.tgz.
• ftp://hostname/pathname/package.tgz
• http://hostname/pathname/package.tgz
• To upgrade the loader software for a line card on a standalone EX8200 switch:
• To upgrade the loader software for a line card on an EX8200 member switch in an
EX8200 Virtual Chassis:
user@switch> request system firmware upgrade fpc slot slot-number member member-id
Firmware upgrade initiated....
Please wait for ~2mins for upgrade to complete....
The status is UPGRADED SUCCESSFULLY if the boot loader version update process
is complete.
The status is PROGRAMMING if the boot loader version update process is still in
progress.
Do not proceed to the next step until the show system firmware output confirms that
the loader software upgrade is complete.
NOTE: You can monitor the status of the line card restart by using the
show chassis fpc command.
8. After the line card restart has completed, confirm the loader software version update:
The current version has updated to 3.5.0. You have upgraded the loader software for
one bank of the line card.
9. Repeat Steps 4 through 7 to upgrade the loader software on the other bank of the
line card.
10. Repeat Steps 4 through 8 for all other line cards that require a line card loader version
upgrade.
This example shows how to install Junos OS upgrades on SRX Series devices.
Requirements
Before you begin:
• Copy the software package to the device if you are installing the software package
from a local directory on the device. We recommend that you copy it to the /var/tmp
directory.
Overview
By default, the request system software add package-name command uses the validate
option to validate the software package against the current configuration as a prerequisite
to adding the software package. This validation ensures that the device can reboot
successfully after the software package is installed. This is the default behavior when
you are adding a software package.
• no-copy option to install the software package but do not save the copies of package
files. You must include this option if you do not have enough space on the internal
media to perform an upgrade that keeps a copy of the package on the device.
• no-validate option to bypass the compatibility check with the current configuration
before installation starts.
Configuration
CLI Quick To quickly configure this section of the example, copy the following commands, paste
Configuration them into a text file, remove any line breaks, change any details necessary to match your
network configuration, copy and paste the commands into the CLI at the [edit] hierarchy
level, and then enter commit from configuration mode.
2. On the Upload Package page, specify the software package to upload. Click Browse
to navigate to the software package location and select
junos-srxsme-10.0R2-domestic.tgz.
3. Select the Reboot If Required check box to set the device to reboot automatically
when the upgrade is complete.
4. Select the Do not save backup check box to bypass saving the backup copy of the
current Junos OS package (SRX Series).
5. Click Upload Package. The software is activated after the device has rebooted.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
From operational mode, install the new package on the device with the no-copy and
no-validate options, and format and re-partition the media before installation, and reboot
the device after installation is completed.
When the reboot is complete, the device displays the login prompt.
Results From configuration mode, confirm your configuration by entering the show system
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
This example shows how to downgrade Junos OS on the SRX Series devices.
Requirements
No special configuration beyond device initialization is required before configuring this
feature.
Overview
When you upgrade your software, the device creates a backup image of the software
that was previously installed in addition to installing the requested software upgrade.
To downgrade the software, you can revert to the previous image using the backup image.
You can use this method to downgrade to only the software release that was installed
on the device before the current release. To downgrade to an earlier version, follow the
procedure for upgrading, using the software image labeled with the appropriate release.
This example returns software to the previous Junos OS version.
Configuration
CLI Quick To quickly configure this section of the example, copy the following commands, paste
Configuration them into a text file, remove any line breaks, change any details necessary to match your
network configuration, copy and paste the commands into the CLI at the [edit] hierarchy
level, and then enter commit from configuration mode.
user@host>
request system software rollback
request system reboot
NOTE: After you perform this operation, you cannot undo it.
3. Click Maintain>Reboot from the J-Web user interface to reboot the device.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
The device is now running the previous version of Junos OS. To downgrade to an
earlier version, follow the procedure for upgrading, using the software image labeled
with the appropriate release.
Results From configuration mode, confirm your configuration by entering the show system
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Related • Example: Creating a Snapshot and Using It to Boot an SRX Series Device on page 220
Documentation
• Understanding Junos OS Upgrades for SRX Series Devices on page 61
• Example: Installing Junos OS Upgrade Packages on SRX Series Devices on page 120
Jloader software contains a boot loader (Uboot), which is used to bring up QFX Series
devices and load the Junos OS from the flash memory of these devices. You can upgrade
Jloader software on QFX3500 switches, QFX3500 and QFX3600 Node devices, and
QFX3600-I and QFX3008-I Interconnect devices.
NOTE: Before you upgrade the Jloader software, see Table 11 on page 125,
Table 12 on page 126, and Table 13 on page 126 to make sure that you are
upgrading to the right version of Jloader software for the Junos OS software
release running on your QFX3500 switches, or Node devices and Interconnect
devices in your QFabric system.
See Table 14 on page 126 to see which Uboot software versions are available and the
filenames of the Jloader software packages.
Table 11: Junos OS and Jloader Software Compatibility Matrix for the QFX3500 Switch and QFX3500 Node Device
11.3R1 and later (QFX3500 switch) Supported Supported Not supported Supported and
recommended
11.3X30.6 and later (QFX3500 Node Supported Supported Not supported Supported and
device) recommended
Table 11: Junos OS and Jloader Software Compatibility Matrix for the QFX3500 Switch and QFX3500 Node
Device (continued)
12.1X49-D1 and later (QFX3500 Supported Supported Not supported Supported and
switch) recommended
12.2X50-D1 and later (QFX3500 Supported Supported Not supported Supported and
switch and QFX3500 Node device) recommended
Table 12: Junos OS and Jloader Software Compatibility Matrix for the QFX3008-I Interconnect Device
11.3X30.9 and later (QFX3008-I Supported Supported Not supported Supported and
Interconnect device) recommended
11.3X30.6 and later (QFX3008-I Supported Supported Not supported Supported and
Interconnect device) recommended
12.2X50-D10.3 and later (QFX3008-I Supported Supported Not supported Supported and
Interconnect device) recommended
Table 13: Junos OS and Jloader Software Compatibility Matrix for the QFX3600-I Interconnect Device and QFX3600
Node Device
Table 14: Uboot Software Release and Jloader Software Compatibility Matrix
1.1.2 jloader-qfx-11.3X30.9-signed.tgz
Table 14: Uboot Software Release and Jloader Software Compatibility Matrix (continued)
• If you have Junos OS Release 11.3 installed and want to upgrade the Jloader software
from version 1.1.2 to version 1.1.4, you need to upgrade using the
jloader-qfx-11.3I20120127_0733_dc-builder-signed.tgz software package.
• If you have Junos OS Release 11.3R2 installed and want to upgrade to Junos OS Release
12.1, you do not need to upgrade the Jloader Release and can continue to use Jloader
Release 1.1.2.
• If you have Junos OS Release 12.1 installed and want to upgrade the Jloader software
from version 1.1.2 to version 1.1.4, you need to upgrade using the
jloader-qfx-12.1-20120125_pr.0-signed.tgz software package.
• If you upgrade to Junos OS Release 12.1, you can upgrade to Jloader Release 1.1.4 using
the jloader-qfx-12.1-20120125_pr.0-signed.tgz software package.
NOTE: If you are running Junos OS Release 11.3R1 or Junos OS Release 11.3R2,
you must use the no-validate option when you issue the request system
software add command to upgrade the Jloader software. Otherwise, the
installation will fail and you receive a configuration error. The no-validate
option is not required for Junos OS Release 11.3R3 and later.
NOTE: After you upgrade the Jloader software on the first bank, the software
package is deleted after you reboot. Make sure that you have either
downloaded the Jloader software package to either a remote site or in a local
directory on the switch, such as the /var/tmp directory on the QFX3500
device.
1. In a browser, go to https://www.juniper.net/support/downloads/junos.html .
2. In the QFX Series section of the Junos Platforms Download Software download page,
select the QFX Series platform software you want to download.
3. Select the number of the software version that you want to download in the Release:
pull-down window to the right of the tabs on the Download Software page.
4. Select the Software tab and then select the install package you want to download
in the Install Package section.
5. In the pop-up Alert box, click the link to the Product Support Notification (PSN)
document.
7. Read the End User License Agreement, click the I agree radio button, and then click
Proceed.
9. Log in to the QFX3500 switch and enter the shell. We recommend using a console
connection.
10. Determine the version of the Jloader software package installed on the switch.
For example:
root@switch% ls
gres-tp krt_gencfg_filter.txt
jloader-qfx-11.3-20110510.0-signed.tgz
11. Determine the version of the Uboot software that is running in the bank:
For example:
12. Enter the CLI and install the Jloader software package.
• To install a Jloader software package that is located in the /var/tmp directory, issue
the request system software add /var/tmp/jloader-qfx-version.tgz no-validate
command:
For example:
juniper@qfx3500>
• To install a Jloader software package located on a remote server using FTP, issue
the request system software add
/ftp://hostname/pathname/jloader-qfx-version-signed.tgz no-validate
command.
For example:
• To install a Jloader software package located on a remote server using HTTP, issue
the request system software add /http://hostname/pathname/jloader-qfx-
version-signed.tgz no-validate command.
For example:
13. When prompted, reboot the Control Board by issuing the request system reboot
command.
For example:
14. Enter the shell and verify that the version of the Uboot software in the primary bank
is the version you just installed.
For example:
15. To install the Jloader software package on the current backup bank, repeat Step 10
through Step 14.
NOTE: Before you upgrade the Jloader software, make sure you have the
serial numbers of the Node devices, Interconnect devices, and Control Boards
in the Interconnect devices you want to upgrade.
1. Issue the show chassis hardware node-device ? command to view the serial numbers
of the Node devices.
For example:
2. Issue the show chassis hardware interconnect-device ? command to view the serial
numbers of the Interconnect devices.
For example:
3. Issue the show chassis hardware interconnect-device name command to view the
serial numbers of the Control Boards in the Interconnect device.
For example:
4. Issue the show chassis firmware node-device name command to see which version
of Uboot software you have installed on your Node device.
For example:
The Uboot software version is 1.1.1. The loader software version appears after the
timestamp for U-Boot 1.1.6.
5. Issue the show chassis firmware interconnect-device name command to see which
version of Uboot software you have installed on the Routing Engines located on the
Control Boards of the Interconnect device.
For example:
The Uboot software version is 1.1.4. The loader software version appears after the
timestamp for U-Boot 1.1.6.
6. In a browser, go to https://www.juniper.net/support/downloads/junos.html .
7. In the QFX Series section of the Junos Platforms Download Software download page,
select the QFX Series platform software you want to download.
8. Select the number of the software version that you want to download in the Release:
pull-down window to the right of the tabs on the Download Software page.
9. Select the Software tab and then select the install package you want to download in
the Install Package section.
10. In the pop-up Alert box, click the link to the Product Support Notification (PSN)
document.
12. Read the End User License Agreement, click the I agree radio button, and then click
Proceed.
14. Retrieve the software from the location in which you downloaded it. To do this, issue
the request system software download /path/package-name command.
For example:
15. Log in to the Director device as root and enter the shell to verify that you have
downloaded the Jloader software package. We recommend using a console
connection. The software package is copied from where you downloaded it and is
placed locally on the QFabric system in the /pbdata/packages directory.
For example:
[root@dg0] # pwd
/pbdata/packages
[root@dg0] # ls
jloader-qfx-11.3X30.9-signed.tgz
16. Before you copy over the Jloader software package to the Node device or Interconnect
device, determine the directory that matches the serial number of the Node device or
Interconnect device that you want to upgrade. View the remote logs and the Node
device and Interconnect device serial numbers by issuing the ls /pdbata/export/rlogs
command at the command line of the Director device before you copy the software
package over to the device.
For example:
BBAK1186 is the serial number of the Node device that needs to be upgraded.
17. Copy the Jloader software package from the /var/tmp directory to the
/pbdata/export/rlogs/BBAK1186 directory.
For example:
18. Confirm that the Jloader software package you copied over is in the
/pbdata/export/rlogs/BBAK1186 directory.
For example:
19. Issue the /root/dns.dump command to find out the internal IP addresses of the Node
device or Interconnect device.
169.254.128.19
dcfnode-ad55b89e-828b-11e1-b70e-00e081c57938.pkg.test.device.net. 45 IN A
169.254.128.20
dcfnode-BBAK1186.pkg.test.device.net. 45 IN A 169.254.128.14
20. Upgrade the Jloader software on the Node device or Interconnect device.
Before you can upgrade the Jloader software, you need to use SSH to log in to the
Node device or Interconnect device and verify that the software is in the
/tftpboot/logfiles directory.
For example:
b. Verify that the Jloader software package is in the tftpboot/logfiles directory of the
Node device or Interconnect device.
For example:
root@sng3% ls /tftpboot/logfiles
.index jloader-qfx-11.3X30.9-signed.tgz
c. Copy the Jloader software package from the /tftpboot/logfiles directory to the
/var/tmp directory of the Node device or Interconnect device.
For example:
d. Verify that the Jloader software package is in the /var/tmp directory of the Node
device or Interconnect device.
For example:
root@sng3% ls /var/tmp
.snap jloader-qfx-11.3X30.9-signed.tgz
tmp
gres-tp krt_gencfg_filter.txt
vc-autoupgrade
if-rtsdb rtsdb
e. Enter CLI mode and issue the request system software add
/var/tmp/jloader-qfx-version-signed.tgz command.
For example:
root@sng3% cli
fpc0:
Verified jloader-qfx-11.3X30.9.tgz signed by PackageProduction_11_3_0
Adding jloader-qfx...
Installation in progress, please wait...
Mounted jloader-qfx package on /dev/md10...
Verified manifest signed by PackageProduction_11_3_0
Verified jloader-qfx-11.3X30.9 signed by PackageProduction_11_3_0
#######################################
################################################################################################################################################################################################
Installation finished successfully.
Please reboot to activate the package
Saving package file in /var/sw/pkg/jloader-qfx-11.3X30.9-signed.tgz ...
Saving state for rollback ...
f. Reboot both the Node device and Interconnect device twice, because they each
contain two partitions.
For example:
root@sng3>
g. Verify that the Uboot software on the Node device or Interconnect device has been
upgraded to the new Uboot software by logging in to the QFabric CLI and issuing
either the show chassis firmware node-device name command or the show
chassis firmware interconnect-device name command.
For example:
The Uboot software version is now 1.1.2. The loader software version appears after
the timestamp for U-Boot 1.1.6.
• Preparing the USB Flash Drive to Upgrade Junos OS on SRX Series Devices on page 139
• Installing Junos OS on SRX Series Devices Using a USB Flash Drive on page 141
• Booting an EX Series Switch Using a Software Package Stored on a USB Flash
Drive on page 142
• Upgrading the Boot Loader on SRX Series Devices on page 143
• Installing Junos OS on SRX Series Devices from the Boot Loader Using a TFTP
Server on page 144
• Installing Junos OS on SRX Series Devices from the Boot Loader Using a USB Storage
Device on page 147
• Verifying Junos OS and Boot Loader Software Versions on an EX Series
Switch on page 147
Preparing the USB Flash Drive to Upgrade Junos OS on SRX Series Devices
This feature simplifies the upgrading of Junos OS images in cases where there is no
console access to an SRX Series device located at a remote site. This functionality allows
you to upgrade the Junos OS image with minimum configuration effort by simply copying
the image onto a USB flash drive, inserting it into the USB port of the SRX Series device,
and performing a few simple steps. You can also use this feature to reformat a boot
device and recover an SRX Series device after boot media corruption.
All USB flash drives used on SRX Series devices must have the following features:
NOTE: For the list of recommended USB drives, see Knowledge Base article
KB31622.
CAUTION: Any USB memory product not listed as supported for SRX Series
devices has not been tested by Juniper Networks. The use of any unsupported
USB memory product could expose your SRX Series device to unpredictable
behavior. Juniper Networks Technical Assistance Center (JTAC) can provide
only limited support for issues related to unsupported hardware. We strongly
recommend that you use only supported USB flash drives.
• Copy the Junos OS upgrade image and its autoinstall.conf file to the USB device.
• Ensure that adequate space is available on the SRX Series device to install the software
image.
To prepare the USB flash drive and copy the Junos OS image onto the USB flash drive:
1. Insert the USB flash drive into the USB port of a PC or laptop computer running
Windows.
For the installation process to succeed, copy only one image onto the USB device.
Only images named junos-srxsme* are recognized by the system.
5. Check the drive name detected in My Computer for the USB device. Open the command
prompt window and type:
For example, if the drive detected is drive F, type echo “ “ > F:\autoinstall.conf at the
command prompt. This empty file indicates to the system that the automatic
installation of the Junos OS image from the USB device is supported.
6. (Optional) Create a text file named junos-config.conf and copy the file to the USB
device. For example, the following file supports an automatic configuration update
during the installation process:
system {
host-name host-1;
domain-name example.net;
domain-search [ abc.exmaple.net example.net device1.example.net];
root-authentication {
encrypted-password "$ABC123"; ## SECRET-DATA
}
}
...
...
routing-options {
static {
route 0.0.0.0/0 next-hop 10.207.31.254;
}
}
To install the Junos OS image on an SRX Series device using a USB flash drive:
1. Insert the USB flash drive into the USB port of the SRX Series device and wait for the
LEDs to blink amber, then steadily turn amber, indicating that the SRX Series device
detects the Junos OS image.
If the LEDs do not change to amber, press the Power button or turn the device off and
then on again and wait for the LEDs to blink amber.
2. Press the Reset Config button on the SRX Series device to start the installation and
wait for the LEDs to glow steadily amber.
When the LEDs glow green, the Junos OS upgrade image has been successfully
installed.
If the USB device is plugged in, the Reset Config button always performs as an image
upgrade button. Any other functionality of this button is overridden until you remove
the USB flash drive.
The SRX Series device restarts automatically and loads the new Junos OS version.
NOTE: If an installation error occurs, the LEDs turn red, which might indicate
that the Junos OS image on the USB flash drive is corrupted. An installation
error can also occur if the current configuration on the SRX Series device is
not compatible with the new Junos OS version on the USB or if there is not
enough space on the SRX Series device to install the image. You must have
console access to the SRX Series device to troubleshoot an installation error.
NOTE: You can use the set system autoinstallation usb disable command to
prevent the automatic installation from the USB device. After using this
command, if you insert the USB device into the USB port of the SRX Series
device, the installation process does not work.
Booting an EX Series Switch Using a Software Package Stored on a USB Flash Drive
There are two methods of getting Junos OS stored on a USB flash drive before using the
software to boot the switch. You can pre-install the software onto the USB flash drive
before inserting the USB flash drive into the USB port, or you can use the system snapshot
feature to copy files from internal switch memory to the USB flash drive.
To move files into USB flash memory by using a system snapshot and use those files to
boot the switch, see “Creating a Snapshot and Using It to Boot an EX Series Switch” on
page 215. We recommend that you use this method to boot the switch from a USB flash
drive if your switch is running properly.
If you need to pre-install the software onto the USB flash drive, you can use the method
described in this topic. Pre-installing Junos OS onto a USB flash drive to boot the switch
can be done at any time and is particularly useful when the switch boots to the loader
prompt because the switch cannot locate the Junos OS in internal flash memory.
Ensure that you have the following tools and parts available to boot the switch from a
USB flash drive:
• A USB flash drive that meets the EX Series switch USB port specifications. See USB
Port Specifications for an EX Series Switch.
• A computer or other device that you can use to download the software package from
the Internet and copy it to the USB flash drive.
To download a Junos OS package onto a USB flash drive before inserting the USB flash
drive:
1. Download the Junos OS package that you want to place onto the EX Series switch
from the Internet onto the USB flash drive by using your computer or other device.
2. Remove the USB flash drive from the computer or other device.
3. Insert the USB flash drive into the USB port on the switch.
4. This step can be performed only when the prompt for the loader script (loader>) is
displayed. The loader script starts when the Junos OS loads but the CLI is not working
for any reason or if the switch has no software installed.
where source represents the name and location of the Junos OS package on the USB
flash drive. The Junos OS package on a flash drive is commonly stored in the root drive
as the only file—for example, file://jinstall-ex-4200-9.4R1.5-domestic-signed.tgz.
Related • Installing Software on an EX Series Switch with a Single Routing Engine (CLI Procedure)
Documentation on page 90
• See Switch Fabric and Routing Engine (SRE) Module in an EX6200 Switch for USB port
location.
• See Switch Fabric and Routing Engine (SRE) Module in an EX8208 Switch for USB port
location.
• See Routing Engine (RE) Module in an EX8216 Switch for USB port location.
1. Upgrade to Junos OS Release 10.0 or later (with or without dual-root support enabled).
The Junos OS 10.0 image contains the latest boot loader binaries in this path:
/boot/uboot, /boot/loader.
NOTE: For the new version to take effect, you should reboot the system after
upgrading the boot loader.
To verify the boot loader version on the SRX Series device, enter the show chassis
routing-engine bios command.
NOTE: You can use the following commands to upgrade U-Boot or perform
cyclic redundancy check (CRC):
Installing Junos OS on SRX Series Devices from the Boot Loader Using a TFTP Server
You can install Junos OS using the Trivial File Transfer Protocol (TFTP) method. The
device is shipped with Junos OS loaded on the primary boot device. During Junos OS
installation from the loader, the device retrieves the Junos OS package from a TFTP
server. The internal media is then formatted, and the Junos OS image is installed.
NOTE: Installation from a TFTP server can only be performed using the
first onboard Ethernet interface.
Installation from the loader-over-TFTP method does not work reliably over
slow speeds or large latency networks.
• You have access to the TFTP server with the Junos OS package to be installed.
• That the TFTP server supports BOOTP or DHCP. If the TFTP server does not support
BOOTP or DHCP, you must set the environment variables before performing the
installation from the TFTP server.
• Functional network connectivity exists between the device and the TFTP server over
the first onboard Ethernet interface.
1. To access the U-boot prompt, use the console connection to connect to the device.
Clearing DRAM........ done BIST check passed. Net: pic init done (err = 0)octeth0 POST
Passed
6. To access the loader prompt, use the console connection to connect to the device.
Loading /boot/defaults/loader.conf
NOTE: The URL path is relative to the TFTP server’s TFTP root directory,
where the URL is tftp://tftp-server-ipaddress/package.
After Junos OS is installed, the device boots from the internal media. Once the system
boots up with Junos OS Release 10.0 or later, you must upgrade the U-boot and boot
loader immediately.
Installing Junos OS on SRX Series Devices from the Boot Loader Using a USB Storage
Device
To install Junos OS Release 10.0 or later from the boot loader using a USB storage device:
3. Plug the USB storage device into the SRX Series device.
4. Stop the device at the loader prompt and issue the following command:
This formats the internal media and installs the new Junos OS image on the media
with dual-root partitioning.
5. Once the system boots up with Junos OS Release 10.0 or later, upgrade the U-boot
and boot loader immediately.
Before or after upgrading or downgrading Junos OS, you might need to verify the Junos
OS version. You might also need to verify the boot loader software version if you are
upgrading to or downgrading from a release that supports resilient dual-root partitions
(Junos OS Release 10.4R3 and later).
• Verifying the Number of Partitions and File System Mountings on page 148
• Verifying the Loader Software Version on page 149
Purpose Between Junos OS Release 10.4R2 and Release 10.4R3, upgrades were made to further
increase resiliency of root partitions, which required reformatting the disk from three
partitions to four partitions. If your switch is running Release 10.4R2 or earlier, it has three
partitions, and if it is running Release 10.4R3 or later, it has four partitions.
Action Verify how many partitions the disk has, as well as where each file system is mounted,
by using the following command:
Meaning The presence of the partition name containing s4d indicates that there is a fourth slice.
If this were a three-slice partition scheme, in place of s1a, s3e, s3d, and s4d, you would
see s1a, s1f, s2a, s2f, s3d, and s3e, and you would not see s4d.
Purpose For the special case of upgrading from Junos OS Release 10.4R2 or earlier to Release
10.4R3 or later, you must upgrade the loader software.
Meaning For EX Series switches other than EX8200 switches, with Junos OS Release 10.4R3 or
later installed:
• If there is version information following the timestamp for U-Boot (1.0.0 in the preceding
example), then the loader software does not require upgrading.
• If there is no version number following the timestamp for U-boot, then the loader
software requires upgrading.
For EX8200 switches, if the version number following the timestamp for U-Boot is earlier
than 3.5.0, you must upgrade the loader software when you upgrade the software version.
Purpose Switches running Release 10.4R3 or later have resilient dual-root partition functionality,
which includes the ability to boot transparently from the inactive partition if the system
fails to boot from the primary root partition.
You can verify which root partition is active using the following command:
Meaning The Currently booted from: field shows which root partition is active.
Purpose Each switch contains two root partitions. We recommend that you copy the same Junos
OS version in each partition when you upgrade. In Junos OS Release 10.4R2 and earlier,
you might choose to have different Junos OS release versions in each partition. You might
have different versions during a software upgrade and before you have finished verifying
the new software installation. To enable a smooth reboot if corruption is found in the
primary root file system, ensure that the identical Junos OS images are in each root
partition. For Release 10.4R2 and earlier, you must manually reboot the switch from the
backup root partition. However, for Release 10.4R3 and later, the switch reboots
automatically from the backup root partition if it fails to reboot from the active root
partition.
Action Verify whether both root partitions contain the same image by using the following
command:
Meaning The command shows which Junos OS version is installed on each media partition. Verify
that the same version is installed on both partitions.
Before you begin installing or upgrading the firmware on the MIC or PIC, complete the
following steps:
1. Verify that a previous version of the firmware package is installed on the router by
using the show version command.
If the output of the show version command displays JUNOS jfirmware.. among the list
of packages that are installed on the router, then a previous version of the firmware
package is installed on the router. If the output of the show version command does
not display JUNOS jfirmware.. among the list of packages that are installed on the
router, the firmware package is not installed on the router.
2. If a previous version of the firmware package is installed on the router, delete the
firmware package from the router by using the request system firmware delete
command. If a previous version of the firmware package is not installed on the router,
then proceed to install the firmware package. For information about how to install
the firmware package, see “Installing Firmware on the 100-Gigabit DWDM OTN MIC
(MIC3-100G-DWDM)” on page 161 or “Installing Firmware on the 5-Port 100-Gigabit
DWDM OTN PIC (PTX-5-100G-WDM)” on page 158.
3. To verify that the firmware package is removed from the router, use the show version
command.
If the firmware package is uninstalled successfully, the output of the show version
command does not display JUNOS jfirmware.. among the list of packages that are
installed on the router.
Table 16 on page 155 Lists the CLI commands used for manual BIOS upgrade.
request system firmware upgrade re bios request system firmware upgrade re bios backup
2. Install the package using the request system software add <path to jloader-srxsme
package> no-copy no-validate command.
2. Verify that the required images for upgrade are installed. Use the show system firmware
to verify that the correct BIOS image version is available for upgrade.
Active BIOS:
1. Initiate the upgrade using the request system firmware upgade re bios command.
2. Monitor the upgrade status using the show system firmware command.
NOTE: The device must be rebooted for the upgraded active BIOS to
take effect.
Backup BIOS:
1. Initiate the upgrade using the request system firmware upgade re bios backup
command.
2. Monitor the upgrade status using the show system firmware command.
• During Junos OS upgrade through either the J-Web user interface or the CLI (using the
request system software add no-copy no-validate software-image). In this case, only
the active BIOS is upgraded.
• During loader installation using TFTP or USB (using the install tftp:///software-image
command). In this case, only the active BIOS is upgraded.
• During system boot-up. In this case, both the active BIOS and the backup BIOS are
upgraded.
• Installing Junos OS on SRX Series Devices from the Boot Loader Using a TFTP Server
on page 144
• Installing Junos OS on SRX Series Devices from the Boot Loader Using a USB Storage
Device on page 147
The auto BIOS upgrade feature is enabled by default. You can disable the feature using
the CLI in operational mode.
To disable the automatic upgrade of the BIOS on an SRX Series device, use the chassis
routing-engine bios command as following:
NOTE: The command disables automatic upgrade of the BIOS only during
Junos OS upgrade or system boot-up. It does not disable automatic BIOS
upgrade during loader installation.
Starting in Junos OS Release 15.1X49-D70 and in Junos OS Release 17.3R1, the set chassis
routing-engine bios uninterrupt command is introduced on SRX300, SRX320, SRX340,
and SRX345 devices to disable user inputs at U-boot and boot loader stage.
Starting in Junos OS Release 15.1X49-D120, the set chassis routing-engine bios uninterrupt
command can be used on SRX300, SRX320, SRX340, and SRX345 devices to disable
user inputs at U-boot, boot loader and and Junos-Kernel boot stage.
To disable the user inputs at u-boot, boot loader and Junos Kernel boot stage, use the
chassis routing-engine bios command as following:
NOTE: To disable user inputs at U-boot and boot loader stage using the
chassis routing-engine bios command, SRX devices must have u-boot version
of v3.2 or a higher version, and loader version of v2.9 or a higher version.
You can check the version number at console output when your device boots
up as shown in the following sample:
You can also check the u-boot and loader version at Junos shell prompt as
shown the following sample:
root@% kenv
LINES="24"
boot.ver="3.5"
loader.name="FreeBSD/MIPS U-Boot bootstrap loader"
loader.version="2.9"
root@%
WARNING: On SRX Series devices, if both set system ports console insecure
and set chassis routing-engine bios uninterrupt options are configured, there
is no alternative recovery method available incase Junos OS fails to boot and
the device might become unusable.
Before you install the firmware package, ensure that a previous version is not installed
on the router. For more information, see “Before You Begin Installing or Upgrading the
Firmware” on page 153.
1. Upgrade Junos OS on the router to the version that supports the firmware package.
See “Installing the Software Package on a Router with Redundant Routing Engines”
on page 92 or “Installing the Software Package on a Router with a Single Routing
Engine” on page 88 for more information.
4. Install the firmware package by using the request system firmware add
path/package-name command. For example, to install the jfirmware-15.1F6.9.tgz
package:
5. Run the show version command to verify that the firmware package is installed.
After the firmware package is installed successfully, the output of the show version
command displays Junos jfirmware.. among the list of packages that are installed on
the router.
Related • Before You Begin Installing or Upgrading the Firmware on page 153
Documentation
• Configuring OTN Interfaces on PTX-5-100G-WDM PIC
Before you upgrade the firmware package, ensure that a previous version is not installed
on the router. For more information, see “Before You Begin Installing or Upgrading the
Firmware” on page 153.
1. Run the show system firmware command to view the list of components installed on
the router and the firmware version for each component.
The output of the show system firmware command displays the current firmware
version of the PIC as .0 and the available firmware version as 1.0.
2. To upgrade the firmware of the PIC, use the request system firmware upgrade pic
command. For example, to upgrade the firmware version of the PIC from .0 to 1.0,
specify the FPC slot and PIC slot in the command.
Confirm that you want to perform the firmware upgrade by typing Yes so the firmware
upgrade is initiated.
3. To monitor the progress of the upgrade, use the show system firmware command.
During the installation process, the status of the PIC changes to PROGRAMMING.
When the installation process is complete, the status of the PIC changes to UPGRADED
SUCCESSFULLY.
4. Restart the FPC that the PIC is installed in by using the request chassis fpc fpc-slot
restart command.
5. (Optional) After the firmware upgrade is successfully completed, uninstall the firmware
package from the router by using the request system software delete command.
Related • Before You Begin Installing or Upgrading the Firmware on page 153
Documentation
• Configuring OTN Interfaces on PTX-5-100G-WDM PIC
Before you install the firmware package, ensure that a previous version is not installed
on the router. For more information, see “Before You Begin Installing or Upgrading the
Firmware” on page 153.
1. Upgrade Junos OS on the router to the version that supports the firmware package.
See “Installing the Software Package on a Router with Redundant Routing Engines”
on page 92 or “Installing the Software Package on a Router with a Single Routing
Engine” on page 88 for more information.
4. Install the firmware package by using the request system firmware add
/var/path/package-name command. For example, to install the
jfirmware-x86-32-15.1F6.9.tgz package:
5. Run the show version command to verify that the firmware package is installed.
After the firmware package is installed successfully, the output of the show version
command displays JUNOS jfirmware.. among the list of packages that are installed
on the router.
Related • Before You Begin Installing or Upgrading the Firmware on page 153
Documentation
• Configuring OTN Interfaces on MIC3-100G-DWDM MIC
Before you upgrade the firmware package, ensure that a previous version is not installed
on the router. For more information, see “Before You Begin Installing or Upgrading the
Firmware” on page 153.
To upgrade the version of your firmware package, complete the following steps:
1. Run the show system firmware command to view the list of components installed on
the router and the firmware version for each component.
The output of the show system firmware command displays the current firmware
version of the MIC as .0 and the available firmware version as 1.0.
2. To upgrade the firmware of the MIC, use the request system firmware upgrade pic
command. For example, to upgrade the firmware version of the MIC from .0 to 1.0,
specify the MPC slot and MIC slot in the command.
Confirm that you want to perform the firmware upgrade by typing Yes so the firmware
upgrade is initiated.
3. To monitor the progress of the upgrade, use the show system firmware command.
During the installation process, the status of the MIC changes to PROGRAMMING.
When the installation process is complete, the status of the MIC changes to UPGRADED
SUCCESSFULLY.
4. Restart the MPC that the MIC is installed in by using the request chassis fpc fpc-slot
restart command.
5. (Optional) After the firmware upgrade is successfully completed, uninstall the firmware
package from the router by using the request system software delete command.
Related • Before You Begin Installing or Upgrading the Firmware on page 153
Documentation
• Installing Firmware on the 100-Gigabit DWDM OTN MIC (MIC3-100G-DWDM) on
page 161
Reinstalling Software
Table 17 on page 165 provides links and commands for reinstalling Junos OS.
2. Log the Hardware Version Information on page 168 show chassis hardware | save filename
3. Log the Chassis Environment Information on page 169 show chassis environment | save filename
4. Log the System Boot-Message Information on page 169 show system boot-messages | save filename
5. Log the Active Configuration on page 171 show configuration | save filename
6. Log the Interfaces on the Router on page 171 show interface terse | save filename
7. Log the BGP, IS-IS, and OSPF Adjacency Information on show bgp summary | save filename
page 172 show isis adjacency brief | save filename
show ospf neighbor brief | save filename
8. Log the System Storage Information on page 173 show system storage | save filename
9. Back Up the Currently Running and Active File System request system snapshot
on page 174
10. https://www.juniper.net/support
“Reinstall Junos OS” on page 175 Insert the floppy and reboot the system.
2. Protecting Network Security by Configuring the Root set system root-authentication plain-text-password
Password on page 177 set system root-authentication encrypted-password password
set system root-authentication ssh-rsa key
commit
exit
4. Copy Backup Configurations to the Router on page 179 file copy var/tmp
configure
[edit]
load merge /config/filename or load replace /config/filename
[edit]
commit
Purpose The purpose of this action is to log the Junos OS version information.
Sample Output
user@host> show version | save test
Wrote 39 lines of output to ‘test’
Meaning The sample output shows the hostname, router model, and the different Junos OS
packages, processes, and documents.
Related •
Documentation
Purpose You should log hardware version information in the rare event that a router cannot
successfully reboot and you cannot obtain the Routing Engine serial number. The Routing
Engine serial number is necessary for Juniper Networks Technical Assistance Center
(JTAC) to issue a return to manufacturing authorization (RMA). Without the Routing
Engine serial number, an onsite technician must be dispatched to issue the RMA.
Action To log the router chassis hardware version information, use the following Junos OS CLI
operational mode command:
Sample Output The output for the M-series routers varies depending on the chassis components of each
router. All routers have a chassis, midplanes or backplanes, power supplies, and Flexible
PIC Concentrators (FPCs). Refer to the hardware guides for information about the different
chassis components.
Meaning The sample output shows the hardware inventory for an M160 router with a chassis serial
number of 101. For each component, the output shows the version number, part number,
serial number, and description.
Action To log the router chassis environment information, use the following Junos OS CLI
operational mode command:
Sample Output The following example shows output from the show chassis environment command for
an M5 router:
Meaning The sample output shows the environmental information about the router chassis,
including the temperature and information about the fans, power supplies, and Routing
Engine.
Action To log the system boot-message information, use the following Junos OS CLI operational
mode command:
[email protected]:/p/build/20000216-0905/4.1/release_kernel/sys/compile/GENERIC
CPU: Pentium Pro (332.55-MHz 686-class CPU)
Origin = "GenuineIntel" Id = 0x66a Stepping=10
Features=0x183f9ff<FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,SEP,MTRR,PGE,MCA,CMOV,<b16>,<b17>,MMX,<b24>>
Teknor CPU Card Recognized
real memory = 805306368 (786432K bytes)
avail memory = 786280448 (767852K bytes)
Probing for devices on PCI bus 0:
chip0 <generic PCI bridge (vendor=8086 device=7192 subclass=0)> rev 3 class 60000
on pci0:0:0
chip1 <Intel 82371AB PCI-ISA bridge> rev 1 class 60100 on pci0:7:0
chip2 <Intel 82371AB IDE interface> rev 1 class 10180 on pci0:7:1
chip3 <Intel 82371AB USB interface> rev 1 class c0300 int d irq 11 on pci0:7:2
smb0 <Intel 82371AB SMB controller> rev 1 class 68000 on pci0:7:3
pcic0 <TI PCI-1131 PCI-CardBus Bridge> rev 1 class 60700 int a irq 15 on pci0:13:0
TI1131 PCI Config Reg: [pci only][FUNC0 pci int]
pcic1 <TI PCI-1131 PCI-CardBus Bridge> rev 1 class 60700 int b irq 12 on pci0:13:1
TI1131 PCI Config Reg: [pci only][FUNC1 pci int]
fxp0 <Intel EtherExpress Pro 10/100B Ethernet> rev 8 class 20000 int a irq 12 on
pci0:16:0
chip4 <generic PCI bridge (vendor=1011 device=0022 subclass=4)> rev 4 class 60400
on pci0:17:0
fxp1 <Intel EtherExpress Pro 10/100B Ethernet> rev 8 class 20000 int a irq 10 on
pci0:19:0
Probing for devices on PCI bus 1:mcs0 <Miscellaneous Control Subsystem> rev 12
class ff0000 int a irq 12 on pci1:13:0
fxp2 <Intel EtherExpress Pro 10/100B Ethernet> rev 8 class 20000 int a irq 10 on
pci1:14:0
Probing for devices on the ISA bus:
sc0 at 0x60-0x6f irq 1 on motherboard
sc0: EGA color <16 virtual consoles, flags=0x0>
ed0 not found at 0x300
ed1 not found at 0x280
ed2 not found at 0x340
psm0 not found at 0x60
sio0 at 0x3f8-0x3ff irq 4 flags 0x20010 on isa
sio0: type 16550A, console
sio1 at 0x3e8-0x3ef irq 5 flags 0x20000 on isa
sio1: type 16550A
sio2 at 0x2f8-0x2ff irq 3 flags 0x20000 on isa
sio2: type 16550A
pcic0 at 0x3e0-0x3e1 on isa
PC-Card ctlr(0) TI PCI-1131 [CardBus bridge mode] (5 mem & 2 I/O windows)
pcic0: slot 0 controller I/O address 0x3e0
npx0 flags 0x1 on motherboard
npx0: INT 16 interface
fdc0: direction bit not set
Meaning The sample output shows the initial messages generated by the system kernel upon
boot. This is the content of the /var/run/dmesg.boot file.
Action To log the active configuration on the router, use the following Junos OS CLI operational
mode command:
Meaning The sample output shows the configuration currently running on the router, which is the
last committed configuration.
Action To log the interfaces on the router, use the following Junos OS CLI operational mode
command:
Meaning The sample output displays summary information about the physical and logical interfaces
on the router.
Purpose The following commands log useful information about Border Gateway Protocol (BGP),
Intermediate System-to-Intermediate System (IS-IS), and Open Shortest Path First
(OSPF) protocols. If you have other protocols installed, such as Multiprotocol Label
Switching (MPLS), Resource Reservation Protocol (RSVP), or Protocol Independent
Multicast (PIM), you also might log summary information for them.
Action To log the protocol peer information, use the following Junos OS CLI operational mode
commands:
Meaning Sample output 1 displays summary information about BGP and its neighbors. Sample
output 2 displays information about IS-IS neighbors. Sample output 3 displays information
about all OSPF neighbors.
Action To log the system storage statistics for the amount of free disk space in the router’s file
system, use the following Junos OS CLI operational mode command:
Meaning The sample output displays statistics about the amount of free disk space in the router’s
file system. Values are displayed in 1024-byte (1-KB) blocks.
Action To back up the currently running and active file system so that you can recover to a known,
stable environment in case there is a problem during the reinstall, use the following Junos
OS CLI operational mode command:
Meaning The root file system is backed up to /altroot, and /config is backed up to /altconfig. The
root and /config file systems are on the router’s internal flash drive, and the /altroot and
/altconfig file systems are on the router’s hard drive.
NOTE: After you issue the request system snapshot command, you cannot
return to the previous version of the software because the running and backup
copies of the software are identical.
Reinstall Junos OS
2. Reboot the router, either by power-cycling it or by issuing the request system reboot
command from the CLI.
WARNING: The installation will erase the contents of your disk. Do you wish
to continue (y/n)?
The router copies the software from the removable medium onto your system,
occasionally displaying status messages. This can take up to 10 minutes.
The router reboots from the primary boot device on which the software is installed.
When the reboot is complete, the router displays the login prompt.
Reconfigure Junos OS
After you have reinstalled the software, you must copy the router’s configuration files
back to the router. (You also can configure the router from scratch, as described in Junos
System Basics Configuration Guide) However, before you can copy the configuration files,
you must establish network connectivity.
root# cli
root@>
cli> configure
[edit]
root@#
4. Configure the name of the machine. If the name includes spaces, enclose the entire
name in quotation marks (" "):
[edit]
root@# set system host-name host-name
[edit]
root@# set system domain-name domain-name
6. Configure the IP address and prefix length for the router’s management Ethernet
interface:
[edit]
root@# set interfaces fxp0 unit 0 family inet address address / prefix-length
7. Configure the IP address of a default router. This system is called the backup router
because it is used only while the routing protocol process is not running.
[edit]
root@# set system backup-router address
[edit]
root@# set system name-server address
After a new router is initially powered on, you log in as the user root with no password.
Junos OS requires configuration of the root password before it accepts a commit
operation. On a new device, the root password must always be a part of the configuration
submitted with your initial commit.
To set the root password, you have a few options as shown in Step 1 of the following
procedure.
The most secure options of these three are using an already encrypted password or an
ssh public key string. Pre-encrypting your password or using a ssh public key string means
the plain-text version of your password will never be transferred over the internet,
protecting it from being intercepted by a man-in-the-middle attack.
2. (Optional) Strengthen security by only allowing root access from the console port.
3. If you used a configuration group in Step 2, apply the configuration group, substituting
global with the appropriate group name.
[edit]
user@host# set apply-groups global
root@# commit
Action To check that the router has network connectivity, issue a ping command to a system
on the network:
If there is no response, verify that there is a route to the address using the show route
command. If the address is outside your fxp0 subnet, add a static route. Once the backup
configuration is loaded and committed, the static route is no longer needed and should
be deleted.
1. To copy the existing configuration and any backup configurations back onto the router,
use the file copy command. Place the files in the /var/tmp directory.
root@> configure
[edit]
root@# load merge/config/filename or load replace/config/filename
[edit]
root@# commit
To configure the machine name, domain name, and various addresses, follow these
steps:
root# cli
root@>
cli> configure
[edit]
root@#
4. Configure the name of the machine. If the name includes spaces, enclose the entire
name in quotation marks (" "):
[edit]
root@# set system host-name host-name
[edit]
root@# set system domain-name domain-name
6. Configure the IP address and prefix length for the router’s management Ethernet
interface:
[edit]
root@# set interfaces fxp0 unit 0 family inet address address / prefix-length
7. Configure the IP address of a default router. This system is called the backup router
because it is used only while the routing protocol process is not running.
[edit]
root@# set system backup-router address
[edit]
root@# set system name-server address
Configuring the root password on your Junos OS-enabled router helps prevent
unauthorized users from making changes to your network. The root user (also referred
to as superuser) has unrestricted access and full permissions within the system, so it is
crucial to protect these functions by setting a strong password when setting up a new
router.
After a new router is initially powered on, you log in as the user root with no password.
Junos OS requires configuration of the root password before it accepts a commit
operation. On a new device, the root password must always be a part of the configuration
submitted with your initial commit.
To set the root password, you have a few options as shown in Step 1 of the following
procedure.
The most secure options of these three are using an already encrypted password or an
ssh public key string. Pre-encrypting your password or using a ssh public key string means
the plain-text version of your password will never be transferred over the internet,
protecting it from being intercepted by a man-in-the-middle attack.
2. (Optional) Strengthen security by only allowing root access from the console port.
3. If you used a configuration group in Step 2, apply the configuration group, substituting
global with the appropriate group name.
[edit]
user@host# set apply-groups global
root@# commit
Action To check that the router has network connectivity, issue a ping command to a system
on the network:
If there is no response, verify that there is a route to the address using the show route
command. If the address is outside your fxp0 subnet, add a static route. Once the backup
configuration is loaded and committed, the static route is no longer needed and should
be deleted.
1. To copy the existing configuration and any backup configurations back onto the router,
use the file copy command. Place the files in the /var/tmp directory.
root@> configure
[edit]
root@# load merge/config/filename or load replace/config/filename
[edit]
root@# commit
To verify that the new version of the Junos OS is running as expected after the reinstall,
follow these steps:
1. Compare Information Logged Before and After the Reinstall on page 183
2. Back Up the New Software on page 184
Purpose Compare the operation of the system before and after the reinstall to ensure that
everything is working as expected.
Compare the information from these commands with the information you obtained
before the reinstall.
Purpose After a week or so, when you are satisfied that the new software is running successfully,
we recommend that you back up the reinstalled software.
Action To back up the reinstalled software, use the following Junos OS CLI operational mode
command:
The root file system is backed up to /altroot, and /config is backed up to /altconfig. The
root and /config file systems are on the router’s internal flash drive, and the /altroot and
/altconfig file systems are on the router’s hard drive.
NOTE: After you issue the request system snapshot command, you cannot
return to the previous version of the software because the running and backup
copies of the software are identical.
Purpose Compare the operation of the system before and after the reinstall to ensure that
everything is working as expected.
Compare the information from these commands with the information you obtained
before the reinstall.
Purpose After a week or so, when you are satisfied that the new software is running successfully,
we recommend that you back up the reinstalled software.
Action To back up the reinstalled software, use the following Junos OS CLI operational mode
command:
The root file system is backed up to /altroot, and /config is backed up to /altconfig. The
root and /config file systems are on the router’s internal flash drive, and the /altroot and
/altconfig file systems are on the router’s hard drive.
NOTE: After you issue the request system snapshot command, you cannot
return to the previous version of the software because the running and backup
copies of the software are identical.
• Allows the switch to boot transparently from the second (alternate) root partition if
the system fails to boot from the primary root partition.
• Provides separation of the root Junos OS file system from the /var file system. If
corruption occurs in the /var file system (a higher probability than in the root file system
because of the greater frequency of reads and writes in /var), the root file system is
insulated from the corruption.
• Resilient Dual-Root Partition Scheme (Junos OS Release 10.4R3 and Later) on page 188
• Automatic Fixing of Corrupted Primary Root Partition with the Automatic Snapshot
Feature on page 188
• Earlier Partition Scheme (Junos OS Release 10.4R2 and Earlier) on page 189
• Understanding Upgrading or Downgrading Between Resilient Dual-Root Partition
Releases and Earlier Releases on page 190
In the resilient dual-root partition scheme, the /var file system is contained in a separate
slice (Slice 3) from the root file systems, the /config directory is contained in its own slice
(Slice 4), and switches ship from the factory with identical Junos OS images in Slice 1
and Slice 2. The /var file system, which has a greater frequency of reads and writes than
the root file systems and is therefore more likely to have corruption issues, is isolated
from the root directories and the /config directory. If the switch fails to boot from the
active partition, the switch automatically boots from the alternate root partition and
triggers an alarm.
Automatic Fixing of Corrupted Primary Root Partition with the Automatic Snapshot Feature
Resilient dual-root partitioning also provides the automatic snapshot feature, which
allows the switch to automatically fix a corrupt Junos OS file in the primary root partition.
If the automatic snapshot feature is enabled, the switch automatically takes a snapshot
of the Junos OS root file system in the alternate root partition and copies it onto the
primary root partition, thereby repairing the corrupt file in the primary root partition. The
automatic snapshot procedure takes place whenever the system reboots from the
alternate root partition, regardless of whether the reboot is due to a command or due to
corruption of the primary root partition.
NOTE:
• EX9200 switches do not support the automatic snapshot feature.
• EX4550 switches
• If the automatic snapshot feature was disabled by default before the switch
was upgraded to Junos OS Release 12.3R1 or later, the feature remains
disabled (for backward compatibility) by default after the upgrade.
The automatic snapshot feature provides an additional layer of fault protection if you
maintain the same version of Junos OS in both partitions of resilient dual-root partitions.
When auto-snapshot is enabled, repair happens automatically. Therefore, the switch
does not issue an alarm to indicate that the system has rebooted from the alternate
partition. However, it does log the event. You cannot execute a manual snapshot when
an automatic snapshot procedure is in process. The login banner indicates that an
automatic snapshot operation is in progress and that banner is removed only after the
snapshot operation is complete. The next reboot happens from the primary partition.
NOTE: EX Series switches that ship with Junos OS Release 10.4R3 or later
are configured with identical Junos OS images in the primary root partition
(Slice 1) and the alternate root partition (Slice 2).
When automatic snapshot is disabled and the system reboots from the
alternate root partition, it triggers an alarm indicating that the system has
rebooted from its alternate partition.
This is the partitioning scheme for a switch shipped with Release 10.4R2 or earlier (or
after you reformat the disk during a downgrade from Release 10.4R3 or later to Release
10.4R2 or earlier). In this partitioning scheme, the switch comes from the factory with
only one Junos OS image installed in the root Junos OS partition of Slice 1. The first time
that you perform a software upgrade, the new Junos OS image is installed in Slice 2. If
the switch fails to boot, you must manually trigger it to boot from the alternate partition
(rebooting from the alternate partition does not occur automatically).
• You must install a new loader software package in addition to installing the new Junos
OS image.
• Rebooting after the upgrade reformats the disk from three partitions to four partitions.
See Table 18 on page 188.
You can perform all operations for this special software upgrade from the CLI.
CAUTION: Back up any important log files because the /var/log files are not
saved or restored during an upgrade from Release 10.4R2 or earlier to a release
that supports resilient dual-root partitions (Release 10.4R3 or later).
We recommend that you also save your /config files and any important log
files to an external medium because if there is a power interruption during
the upgrade process, they might be lost.
Junos OS Release 10.0 and later support dual-root partitioning on SRX Series devices.
Dual-root partitioning allows the SRX Series device to remain functional even if there is
file system corruption and to facilitate easy recovery of the file system.
SRX Series devices running Junos OS Release 9.6 or earlier support a single-root
partitioning scheme where there is only one root partition. Because both the primary and
backup Junos OS images are located on the same root partition, the system fails to boot
if there is corruption in the root file system. The dual-root partitioning scheme guards
against this scenario by keeping the primary and backup Junos OS images in two
independently bootable root partitions. If the primary root partition becomes corrupted,
the system can still boot from the backup Junos OS image located in the other root
partition and remain fully functional.
SRX Series devices that ship with Junos OS Release 10.0 or later are formatted with
dual-root partitions from the factory. SRX Series devices that are running Junos OS
Release 9.6 or earlier can be formatted with dual-root partitions when they are upgraded
to Junos OS Release 10.0 or later.
NOTE: Although you can install Junos OS Release 10.0 or later on SRX Series
devices with the single-root partitioning scheme, we strongly recommend
the use of the dual-root partitioning scheme.
• Boot Media and Boot Partition on SRX Series Devices on page 191
• Important Features of the Dual-Root Partitioning Scheme on page 192
• Understanding Automatic Recovery of the Primary Junos OS Image with Dual-Root
Partitioning on page 193
• Understanding How the Primary Junos OS Image with Dual-Root Partitioning Recovers
Devices on page 194
• Understanding How Junos OS Release 10.0 or Later Upgrades with Dual-Root
Partitioning on page 196
Table 20 on page 191 provides information on the storage media available on SRX Series
devices.
SRX100, SRX210, and SRX240 • Internal NAND flash (default; always present)
• USB storage device (alternate)
With the dual-root partitioning scheme, the SRX Series device first tries to boot Junos
OS from the primary root partition and then from the backup root partition on the default
storage media. If both primary and backup root partitions of a media fail to boot, then
the SRX Series device tries to boot from the next available type of storage media. The
SRX Series device remains fully functional even if it boots Junos OS from the backup root
partition of the storage media.
• The primary and backup copies of Junos OS images reside in separate partitions. The
partition containing the backup copy is mounted only when required. With the
single-root partitioning scheme, there is one root partition that contains both the
primary and the backup Junos OS images.
• The request system software add command for a Junos OS package erases the contents
of the other root partition. The contents of the other root partition will not be valid
unless software installation is completed successfully.
• Add-on packages, such as jais or jfirmware, can be reinstalled as required after a new
Junos OS image is installed.
• The request system software rollback command does not delete the current Junos OS
image. It is possible to switch back to the image by issuing the rollback command again.
• The request system software delete-backup and request system software validate
commands do not take any action.
Understanding Automatic Recovery of the Primary Junos OS Image with Dual-Root Partitioning
The auto-snapshot feature repairs the corrupted primary root when the device reboots
from the alternate root. This is accomplished by taking a snapshot of the alternate root
onto the primary root automatically rather than manually from the CLI.
When this feature is enabled, and the device reboots from the alternate root (because
of a corrupted primary root or power cycle during restart), the following actions take
place:
1. A prominent message is displayed indicating a failure to boot from the primary root.
***********************************************************************
** **
** WARNING: THIS DEVICE HAS BOOTED FROM THE BACKUP JUNOS IMAGE **
** **
** It is possible that the primary copy of JUNOS failed to boot up **
** properly, and so this device has booted from the backup copy. **
** **
** Please re-install JUNOS to recover the primary copy in case **
** it has been corrupted and if auto-snapshot feature is not **
** enabled. **
** **
***********************************************************************
2. A system boot from backup root alarm is set. This is useful for devices that do not have
console access.
4. Once the snapshot is complete, the system boot from backup root alarm is cleared.
During the next reboot, the system determines the good image on the primary root and
boots normally.
NOTE: We recommend performing the snapshot once all the processes start.
This is done to avoid any increase in the reboot time.
NOTE:
• Auto-snapshot feature is supported on SRX300, SRX320, SRX340, SRX345,
and SRX550M devices.
• When automatic snapshot is disabled and the system reboots from the
alternate root partition, it triggers an alarm indicating that the system has
rebooted from its alternate partition.
Enable this feature with the set system auto-snapshot command. Once the primary root
partition is recovered using this method, the device will successfully boot from the primary
root partition on the next reboot.
Execute the delete system auto-snapshot command to delete all backed up data and
disable auto-snapshot, if required.
Use the show system auto-snapshot command to check the auto-snapshot status.
NOTE: If you log into the device when the snapshot is in progress, the
following banner appears: The device has booted from the alternate partition,
auto-snapshot is in progress.
Understanding How the Primary Junos OS Image with Dual-Root Partitioning Recovers Devices
If the SRX Series Services Gateway is unable to boot from the primary Junos OS image,
and boots up from the backup Junos OS image in the backup root partition, a message
appears on the console at the time of login indicating that the device has booted from
the backup Junos OS image.
login: user
Password:
***********************************************************************
** **
** WARNING: THIS DEVICE HAS BOOTED FROM THE BACKUP JUNOS IMAGE **
** **
** properly, and so this device has booted from the backup copy. **
** **
** **
***********************************************************************
Because the system is left with only one functional root partition, you must immediately
restore the primary Junos OS image using one of the following methods:
• Install a new image using the CLI or J-Web user interface. The newly installed image
will become the primary image, and the device will boot from it on the next reboot.
• Use a snapshot of the backup root partition by entering the request system snapshot
slice alternate command. Once the primary root partition is recovered using this method,
the device will successfully boot from the primary root partition on the next reboot.
After the procedure, the primary root partition will contain the same version of Junos
OS as the backup root partition.
NOTE: You can use the CLI command request system snapshot slice
alternate to back up the currently running root file system (primary or
secondary) to the other root partition on the system along with following:
• Save an image of the primary root partition in the backup root partition
when system boots from the primary root partition.
• Save an image of the backup root partition in the primary root partition
when system boots from the backup root partition.
WARNING: The process of restoring the alternate root by using the CLI
command request system snapshot slice alternate takes several minutes
to complete. If you terminate the operation before completion, the alternate
root might not have all required contents to function properly.
Understanding How Junos OS Release 10.0 or Later Upgrades with Dual-Root Partitioning
To format the media with dual-root partitioning while upgrading to Junos OS Release
10.0 or later, use one of the following installation methods:
• Installation from the boot loader using a TFTP server. We recommend this if console
access to the system is available and a TFTP server is available in the network. See
“Installing Junos OS on SRX Series Devices from the Boot Loader Using a TFTP Server”
on page 144
• Installation from the boot loader using a USB storage device. We recommend this
method if console access to the system is available and the system can be physically
accessed to plug in a USB storage device. See “Installing Junos OS on SRX Series
Devices from the Boot Loader Using a USB Storage Device” on page 147
• Installation from the CLI using the partition option. We recommend this method only
if console access is not available. This installation can be performed remotely.
NOTE: After upgrading to Junos OS Release 10.0 or later, the U-boot and
boot loader must be upgraded for the dual-root partitioning scheme to work
properly.
Example: Installing Junos OS on SRX Series Devices Using the Partition Option
This example shows how to install Junos OS Release 10.0 or later with the partition option.
Requirements
Before you begin, back up any important data.
Overview
This example formats the internal media and installs the new Junos OS image on the
media with dual-root partitioning. Reinstall the Release 10.0 or later image from the CLI
using the request system software add command with the partition option. This copies
the image to the device, and then reboots the device for installation. The device boots
up with the Release 10.0 or later image installed with the dual-root partitioning scheme.
When the partition option is used, the format and install process is scheduled to run on
the next reboot. Therefore, we recommend that this option be used together with the
reboot option.
NOTE: The process might take 15 to 20 minutes. The system is not accessible
over the network during this time.
WARNING: Using the partition option with the request system software add
command erases the existing contents of the media. Only the current
configuration is preserved. You must back up any important data before
starting the process.
• no-copy option to install the software package but do not save the copies of package
files. You must include this option if you do not have enough space on the internal
media to perform an upgrade that keeps a copy of the package on the device.
• no-validate option to bypass the compatibility check with the current configuration
before installation starts.
Configuration
CLI Quick To install Junos OS Release 10.0 or later with the partition option, enter the following
Configuration command from operational mode:
GUI Step-by-Step To install Junos OS Release 10.0 or later with the partition option:
Procedure
1. In the J-Web user interface, select Maintain>Software>Install Package.
2. On the Install Package page, specify the FTP or HTTP server, file path, and software
package name. Type the full address of the software package location on the FTP or
HTTP. Example: ftp://hostname/pathname/junos-srxsme-xx.0R2-domestic.tgz or
http://hostname/pathname/junos-srxsme-xx.0R2-domestic.tgz.
NOTE: Specify the username and password, if the server requires one.
3. Select the Reboot If Required check box to set the device to reboot automatically
when the upgrade is complete.
4. Select the Do not save backup check box to bypass saving the backup copy of the
current Junos OS package.
5. Select the Format and re-partition the media before installation check box to format
the internal media with dual-root partitioning.
6. Click Fetch and Install Package. The software is activated after the device reboots.
This formats the internal media and installs the new Junos OS image on the media
with dual-root partitioning.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
1. Upgrade the device to Junos OS Release 10.0 or later using the CLI.
2. After the device reboots, upgrade the boot loader to the latest version. See “Preparing
the USB Flash Drive to Upgrade Junos OS on SRX Series Devices” on page 139.
Results From configuration mode, confirm your configuration by entering the show system storage
partitions command. If the output does not display the intended configuration, repeat
the configuration instructions in this example to correct it.
Partitions Information:
Partition Size Mountpoint
s1a 898M /
s1e 24M /config
s1f 61M /var
Partitions Information:
Partition Size Mountpoint
s1a 293M altroot
s2a 293M /
s3e 24M /config
s3f 342M /var
s4a 30M recovery
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Verify that the partitioning scheme details on the SRX Series device were configured.
Action From operational mode, enter the show system storage partitions command.
Junos OS Release 9.6 and earlier is not compatible with the dual-root partitioning scheme.
These releases can only be installed if the media is reformatted with single-root
partitioning. Any attempt to install Junos OS Release 9.6 or earlier on a device with
dual-root partitioning without reformatting the media will fail with an error. You must
install the Junos OS Release 9.6 or earlier image from the boot loader using a TFTP server
or USB storage device.
NOTE: Junos OS Release 12.1X45 and later do not support single root
partitioning.
NOTE: You do not need to reinstall the earlier version of the boot loader if
you are installing Junos OS Release 9.6.
You can install the Junos OS Release 9.6 (9.6R3 and 9.6R4 [only]) on a
system with dual-root partitioning using request system software add
command with partition option.
1. Enter the request system software add partition command to install the previous
Junos OS version (9.6R3 and 9.6R4):
The previous software version gets installed after rebooting the device.
NOTE: Using the request system software add CLI command with the partition
option to install Junos OS Release 9.6 (9.6R3 and 9.6R4) reformats the
media with single-root partitioning. This process erases the dual-root
partitioning scheme from the system, so the benefits of dual-root partitioning
will no longer be available.
Storage Media
Juniper Networks routing platforms are made up of two basic routing components:
• Routing Engine—The Routing Engine controls the routing updates and system
management.
From a system administration perspective, you install the software onto the Routing
Engine and during the installation, the appropriate software is forwarded to other
components as necessary. Most Routing Engines include a CompactFlash card that
stores Junos OS. On M Series Multiservice Edge Routers; MX240, MX480, and MX960
3D Universal Edge Routers; T Series Core Routers; and TX Matrix routers, the system also
includes a hard disk or solid-state drive (SSD) that acts as a backup boot drive. PTX
Series Packet Transport Routers and the TX Matrix Plus router include a solid-state drive
as a backup boot drive.
NOTE: The MX80 router is a single-board router with a built-in Routing Engine
and single Packet Forwarding Engine. On an MX80 router, Junos OS is stored
on dual, internal NAND flash devices. These devices provide the same
functionality as a CompactFlash card and hard disk or solid-state drive (SSD).
NOTE: The ACX Series router is a single board router with a built-in Routing
Engine and one Packet Forwarding Engine. The ACX router supports dual-root
partitioning, which means that the primary and backup Junos OS images are
kept in two independently bootable root partitions. If the primary partition
becomes corrupted, the system remains fully functional by booting from the
backup Junos OS image located in the other root partition.
On routing platforms with dual Routing Engines, each Routing Engine is independent
with regard to upgrading the software. To install new software on both Routing Engines,
you need to install the new software on each Routing Engine. On platforms with dual
Routing Engines configured for high availability, you can use the unified in-service software
upgrade procedure to upgrade the software. For more information about this procedure,
see the High Availability Feature Guide for Routing Devices.
The ACX Series, M Series, MX Series, PTX Series, T Series, TX Matrix, and TX Matrix Plus
routers include the following:
System Memory
Starting with Junos OS Release 9.0, all routing platforms require a minimum of 512 MB
of system memory on each Routing Engine. All M7i and M10i routers delivered before
December 7, 2007, had 256 MB of memory. These routers require a system memory
upgrade before you install Junos OS Release 9.0 or a later release. To determine the
amount of memory currently installed on your system, use the show chassis routing-engine
command in the command-line interface (CLI).
For more information about upgrading your M7i or M10i router, see the Customer Support
Center JTAC Technical Bulletin PSN-2007-10-001:
https://www.juniper.net/alerts/viewalert.jsp?txtAlertNumber=PSN-2007-10-001&actionBtn=Search.
ACX2000 routers are shipped with 2 GB of memory and ACX1000 routers with 1 GB of
memory.
Storage Media
Except for the ACX Series, MX80 routers, and MX104 routers, the M Series, MX Series,
PTX Series, T Series, TX Matrix, and TX Matrix Plus routers use the following media
storage devices:
NOTE: M7i and M10i routers using RE-400 are not delivered from the factory
with the CompactFlash card installed. In this case, the hard disk is the
primary and only boot device. The M7i and M10i routers with RE-400 can
be upgraded to include the CompactFlash card.
• Hard disk or solid -state drive—For most routers, a hard disk or solid-state drive is the
secondary boot device. When the CompactFlash card is not installed on the router,
the hard disk or the solid-state drive becomes the primary boot device. The hard disk
or solid-state drive is also used to store system log files and diagnostic dump files.
• Emergency boot device—Depending on the router, the emergency boot device can be
a PC card, a USB storage device, or an LS-120 floppy disk.
On MX80 routers, the internal NAND flash devices (first da0, then da1) act as the primary
and secondary boot devices.
On ACX Series routers, the internal NAND flash devices (first da0s1, then da0s2) act as
the primary and secondary boot devices.
Emergency boot devices can be used to revive a routing platform that has a damaged
Junos OS. When an emergency boot device is attached to the router, the router attempts
to boot from that device before it boots from the CompactFlash card, solid-state drive
(SSD), or hard disk.
On an ACX Series router, the emergency boot device is a USB storage device.
On MX104 routers, the internal NAND flash device (da0) mounted on the internal eUSB
card acts as the primary boot and storage device. On MX104 routers, the emergency boot
device is a USB storage device that is plugged into one of the USB ports in the front plate.
When booting from an emergency boot device, the router requests a boot
acknowledgment on the console interface. If you enter yes, the emergency boot device
repartitions the primary boot device and reloads Junos OS onto the primary boot device.
After the loading is complete, the routing platform requests that you remove the
emergency boot device and reboot the system. After the reboot is complete, you must
perform an initial configuration of the router before it can be used on your network.
System Memory and Storage Media for SRX Series Services Gateways
g000121
g005246
LEDs Console Reset
port button
HA ports QSFP ports SFP+ ports USB port SSL slots ToD PPS/GPS
g009549
Management Console Reset BITs
port port
System Memory
The amount of free disk space necessary to upgrade a device with a new version of Junos
OS can vary from one release to another for different SRX Series devices. Check the Junos
OS software version you are installing to determine the free disk space requirements.
To determine the amount of free disk space on the device, issue the show system storage
detail command. The command output displays statistics about the amount of free disk
space in the device file systems.
Storage Media
The SRX100, SRX210, SRX240, Services Gateway can boot from the following storage
media (in the order of priority):
The SRX550 and SRX650 Services Gateway can boot from the following storage media
(in the order of priority):
The SRX300, SRX320, SRX340, 345 Services Gateway can boot from the following
storage media (in the order of priority):
• Internal NAND flash device mounted on the internal eUSB card (default; always present)
The SRX550M Services Gateway can boot from the following storage media (in the order
of priority):
• SSD
SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800 devices use the following
media storage devices:
NOTE: You can also use a Junos OS image stored on a USB flash drive that
you insert into the Routing Engine faceplate.
The SRX4100 and SRX4200 devices include the following storage media:
• SSD
• SSD
Routing Engines and Storage Media Names (ACX Series, M Series, MX Series, PTX
Series, T Series, TX Matrix, TX Matrix Plus, and JCS 1200 Routers)
Table 21 on page 210 specifies the storage media names by Routing Engine. The storage
media device names are displayed when the router boots.
Table 21: Routing Engines and Storage Media Names (ACX Series, M Series, MX Series,
T Series, TX Matrix, TX Matrix Plus, and JCS 1200 Routers)
Removable
Media
CompactFlash Solid-State Emergency
Routing Engine Card Hard Disk Drive Boot Device
SSD2: ad2
SSD2: ad2
SSD1: ad1
Table 21: Routing Engines and Storage Media Names (ACX Series, M Series, MX Series,
T Series, TX Matrix, TX Matrix Plus, and JCS 1200 Routers) (continued)
Removable
Media
CompactFlash Solid-State Emergency
Routing Engine Card Hard Disk Drive Boot Device
SSD1: sda
SSD2: sdb
SSD1: sda
SSD2: sdb
SSD1: sda
SSD2: sdb
NOTE: On MX80 routers, the Routing Engine is a built-in device and has no
model number. The dual internal NAND flash devices are da0 and da1. The
USB storage device is da2.
NOTE: On ACX Series routers, the Routing Engine is a built-in device which
does not have a model number. The dual internal NAND flash devices are
da0s1 and da0s2. The USB storage device is da0s2a. Use the show chassis
hardware models command to obtain the field-replaceable unit (FRU) model
number—for example, ACX2000BASE-DC for the ACX2000 router.
To view the storage media currently available on your system, use the CLI show system
storage command.
Table 22 on page 212 specifies the storage media names used by the SRX Series devices.
The storage media device names are displayed as the device boots.
To view the storage media currently available on your system, use the CLI show system
storage command.
You can increase the size of the swap partition by repartitioning the drive (hard disk or
solid-state drive [SSD]) on the Routing Engine. This feature is first available in Junos OS
Release 10.4R5, 11.1R3, and 11.2R1; in earlier Junos OS releases, the swap partition is not
increased by the methods described here.
This behavior applies only to Routing Engines with more than 2 GB of RAM. The new size
of the swap partition depends on the size of the drive and the amount of Routing Engine
RAM.
• When the drive is larger than 32 GB, the swap partition matches the size of the Routing
Engine RAM.
• During the installation of a Junos OS software package (jinstall*), issue the request
system reboot media disk command to boot from the drive instead of issuing the request
system reboot command. The drive is automatically repartitioned. The request system
reboot media disk command repartitions the drive only during a software upgrade.
• Manually partition the drive by issuing the request system partition hard-disk command,
and then reboot the router when the command completes.
CAUTION: Repartitioning the drive re-creates the /config and /var directories
in the router file system. Although the contents of /config and /var/db are
preserved, the remaining contents of /var are lost. For this reason, we
recommend that you back up the /var directory before you repartition the
SSD on a router with this configuration.
Related • Installing the Software Package on a Router with a Single Routing Engine on page 88
Documentation
• Installing the Software Package on a Router with Redundant Routing Engines on
page 92
On PTX1000 routers, you can only view the USB storage information from Junos OS by
using the CLI command show vmhost hardware, but cannot access it. However, you can
access the USB storage information from the Linux host. From the Linux host, you can
also send the USB storage device information with images across different sites where
PTX1000 routers are deployed.
1. In Junos OS, ensure that the PTX1000 USB image to be copied to the USB storage
device is present on the var/tmp folder of Junos OS. To copy the image from the
/var/tmp directory of Junos OS to the /var/tmp directory of a Linux host, execute the
following command on Junos OS:
vhclient -s
In the command above, /dev/sdc is the USB storage device detected by the Linux
host. You can determine the name of the USB storage device from host logs as shown
in the sample below:
user@host # dmesg
...
...
[645888.884431] usb 1-1.2: new high-speed USB device number 5 using ehci-pci
[645889.131217] usb-storage 1-1.2:1.0: USB Mass Storage device detected
[645889.131275] scsi8 : usb-storage 1-1.2:1.0
[645890.134290] scsi 8:0:0:0: Direct-Access JetFlash Transcend 8GB
NOTE: The /var/tmp directory of a Linux host is mounted on the RAM (at
the ramfs location), which is volatile storage, and is thus lost when you
perform power cycling of or reboot the device. However, the Junos OS
/var/tmp directory resides on the physical (nonvolatile) hard disk and thus
exists even after rebooting or power cycling.
The system snapshot feature takes a “snapshot” of the files currently used to run the
switch and copies them to an alternate storage location. You can then use this snapshot
to boot the switch at the next bootup or as a backup boot option.
• Creating a Snapshot on a USB Flash Drive and Using It to Boot the Switch on page 216
Creating a Snapshot on a USB Flash Drive and Using It to Boot the Switch
You can create a snapshot on USB flash memory after a switch is booted by using files
stored in internal memory.
Ensure that you have the following tools and parts available before creating a snapshot
on a USB flash drive:
• A USB flash drive that meets the switch USB port specifications. See USB Port
Specifications for an EX Series Switch.
To create a snapshot on USB flash memory and use it to boot the switch:
2. (Optional) Perform this step if you want to boot the switch now using the snapshot
stored on the USB flash drive.
Creating a Snapshot and Using It to Boot a QFX3500 and QFX3600 Series Switch
The system snapshot feature takes a “snapshot” of the files currently used to run the
QFX Series switch—the complete contents of the /config and /var directories, which
include the running Juniper Networks Junos OS, the active configuration, and the rescue
configuration—and copies all of these files into an alternate (internal, meaning internal
flash, or an external, meaning USB flash) memory source. You can then use these
snapshots to boot the switch at the next bootup or as a backup boot option.
The system snapshot feature is especially effective as a bootup option after a partition
corruption, as it is the only recovery option that allows you to completely restore the
Junos OS and configuration in the event of a corrupted partition.
• Creating a Snapshot on a USB Flash Drive and Using It to Boot the Switch on page 216
• Creating a Snapshot on an Internal Flash Drive and Using it to Boot the
Switch on page 217
• Creating a Snapshot on the Alternate Slice of the Boot Media on page 218
Creating a Snapshot on a USB Flash Drive and Using It to Boot the Switch
A snapshot can be created on USB flash memory after a switch is booted using files
stored in internal memory.
Ensure that you have the following tools and parts available before creating a snapshot
on a USB Flash drive:
• A USB flash drive that meets the QFX Series switch USB port specifications. See USB
Port Specifications for the QFX Series.
To create a snapshot on USB flash memory and use it to boot the switch:
NOTE: This example uses the partition option. If you have already created
a partition for the snapshot, you don’t need to use the partition option.
2. (Optional) Perform this step if you want to boot the switch now using the snapshot
stored on the external USB flash drive. If you created the snapshot as a backup, do
not perform this step.
• To reboot the switch using a snapshot in a specific partition on the USB flash drive:
Creating a Snapshot on an Internal Flash Drive and Using it to Boot the Switch
A snapshot can be created on internal memory after a switch is booted using files stored
in external memory.
NOTE: This example uses the partition option. If you have already created
a partition for the snapshot, you don’t need to use the partition option.
2. (Optional) Perform this step if you want to boot the switch now using the newly
created snapshot. If you created the snapshot as a backup, do not perform this step.
To create a snapshot of the currently booted software image on the backup slice of the
boot media:
After the system boots up, you will see the following message before the login prompt:
WARNING: THIS DEVICE HAS BOOTED FROM THE BACKUP JUNOS IMAGE
It is possible that the primary copy of JUNOS failed to boot up properly, and so this device
has booted up from the backup copy.
Please re-install JUNOS to recover the primary copy in case it has been corrupted.
The system will generate an alarm indicating that the switch has booted from the backup
slice.
The system snapshot feature takes a “snapshot” of the files currently used to run the
device—the complete contents of the /config directories, which include the running
Juniper Networks Junos OS, the active configuration, and the rescue configuration, as
well as the host OS—and copies all of these files into an external USB flash drive.
You can use the snapshot to boot the device at the next bootup or as a backup boot
option.
The system snapshot feature is especially effective as a bootup option after a partition
corruption, as it is the only recovery option that allows you to completely restore the
Junos OS and configuration in the event of a corrupted partition on a switch.
• Creating a Snapshot on an External USB Flash Drive and Using It to Boot the
Device on page 218
Creating a Snapshot on an External USB Flash Drive and Using It to Boot the Device
A snapshot can be created on an external USB flash drive after a device is booted using
files stored in internal memory.
Ensure that you have the following tools and parts available before creating a snapshot
on an external USB flash drive:
• An external USB flash drive that meets the device USB port specifications. See USB
Port Specifications for the QFX Series.
To create a snapshot on the external USB flash drive and use it to boot the device:
3. (Optional) Perform this step if you want to boot the device now using the snapshot
stored on the external USB flash drive. If you created the snapshot as a backup, do
not perform this step.
• Select Install Junos Snapshot to install the snapshot located on the external USB
flash drive to the device.
The device copies the software from the external USB flash drive, occasionally
displaying status messages. When the software is finished being copied from the
external USB flash drive to the device, the device then reboots from the internal
flash storage on which the software was just installed. When the reboot is complete,
the device displays the Junos OS login prompt:
root@device#
Requirements
Before you begin, ensure that the backup device has a storage capacity of at least 1 GB.
See “Preparing Your SRX Series Device for Junos OS Upgrades” on page 74.
Overview
You can configure a boot device to replace the primary boot device on your SRX Series
device or to act as a backup boot device. Use either the J-Web user interface or the CLI
to take a snapshot of the configuration currently running on the device, or of the original
factory configuration and a rescue configuration, and save it to an alternate medium.
If the primary storage medium becomes corrupted and no backup medium is in place,
you can recover the primary internal media from the TFTP installation.
You can also configure a boot device to store snapshots of software failures for use in
troubleshooting.
NOTE: After a boot device is created with the default factory configuration,
it can operate only in an internal media slot.
This example configures a boot device to back up the currently running and active file
system partitions by rebooting from internal media and including only files shipped from
the factory.
Configuration
CLI Quick To quickly configure this section of the example, copy the following commands, paste
Configuration them into a text file, remove any line breaks, change any details necessary to match your
network configuration, copy and paste the commands into the CLI at the [edit] hierarchy
level, and then enter commit from configuration mode.
2. On the Snapshot page, specify the boot device to copy the snapshot to. From the
Target Media list, select the internal boot device.
3. Select the Factory check box to copy only default files that were loaded on the internal
media when it was shipped from the factory, plus the rescue configuration if one has
been set.
4. Select the Partition check box to partition the medium that you are copying the
snapshot to. This process is usually necessary for boot devices that do not already
have software installed on them.
5. Click Snapshot.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
Results From configuration mode, confirm your configuration by entering the show system
snapshot media internal command. If the output does not display the intended
configuration, repeat the configuration instructions in this example to correct it.
If you are done configuring the device, enter commit from configuration mode.
Creating a Snapshot on a USB Flash Drive and Using It to Boot the SRX Series Device
Step-by-Step You can create a snapshot on a USB flash drive and use it to boot the SRX series device.
Procedure
To create a snapshot on a USB flash memory and use it to boot the SRX series device:
2. (Optional) Perform this step, if you want to boot the SRX now using the newly
created snapshot on the USB flash drive. If you created the snapshot as a backup,
do not perform this step.
Verification
Confirm that the configuration is working properly.
Purpose Verify that the snapshot information for both root partitions on SRX Series devices were
configured.
Action From operational mode, enter the show system snapshot media command.
The command output displays the snapshot creation time and Junos OS Release version
on a media for both the primary and backup roots.
NOTE: You can use the show system snapshot media internal command to
determine the partitioning scheme present on the internal media. Information
for only one root is displayed for single-root partitioning, whereas information
for both roots is displayed for dual-root partitioning.
NOTE: Any removable media that has been formatted with dual-root
partitioning will not be recognized correctly by the show system snapshot CLI
command on systems that have single-root partitioning. Intermixing dual-root
and single-root formatted media on the same system is strongly discouraged.
If the device’s Junos OS software is damaged in some way that prevents Junos OS
software from loading completely, you can use the emergency boot device to revive the
device. The emergency boot device repartitions the primary disk and reloads a fresh
installation of Junos OS software.
The procedures outlined in this section discuss how to create an emergency boot device
for any ACX Series, M Series, MX Series, T Series, TX Matrix, and TX Matrix Plus router.
1. Use FTP to copy the installation media into the router’s /var/tmp directory.
2. Insert the PC Card into the external PC Card slot or USB storage device into the USB
port.
start shell
cd /var/tmp
4. Log in as su:
su [enter]
password: [enter SU password]
5. For Junos OS with upgraded FreeBSD only, expand the image, for example:
gzip -d installMedia.img.gz
where installMedia refers to the installation media downloaded into the /var/tmp
directory. For example, for Junos OS with upgraded FreeBSD, the filename might be
junos-install-media-usb-mx-x86-64-16.1R2.11.img.gz. (To determine which platforms
use Junos OS with upgraded FreeBSD, see “Release Information for Junos OS with
Upgraded FreeBSD” on page 32.)
where:
exit
Related • Routing Engines and Storage Media Names (ACX Series, M Series, MX Series, PTX
Documentation Series, T Series, TX Matrix, TX Matrix Plus, and JCS 1200 Routers) on page 210
If Junos OS on the device is damaged in some way that prevents the software from
loading properly, you can use an emergency boot device to repartition the primary disk
and load a fresh installation of Junos OS. Use the following procedure to create an
emergency boot device.
Before you begin, you need to download the installation media image for your device
and Junos OS release from https://www.juniper.net/customers/support/ .
NOTE: You can create the emergency boot device on another Juniper
Networks switch or router, or any PC or laptop that supports Linux. The steps
you take to create the emergency boot device vary, depending on the device.
1. Use FTP to copy the installation media image into the /var/tmp directory on the device.
% su
Password: password
NOTE: The password is the root password for the device. If you logged in
to the device as root, you do not need to perform this step.
The device writes the installation media image to the USB device:
root@device% exit
% exit
user@device>
If Junos OS on your device is damaged in some way that prevents the software from
loading correctly, you may need to perform a recovery installation using an emergency
boot device (for example, a USB flash drive) to restore the default factory installation.
Once you have recovered the software, you need to restore the device configuration. You
can either create a new configuration as you did when the device was shipped from the
factory, or if you saved the previous configuration, you can simply restore that file to the
device.
If at all possible, you should try to perform the following steps before you perform the
recovery installation:
1. Ensure that you have an emergency boot device to use during the installation. See
“Creating an Emergency Boot Device” on page 224 for information on how to create an
emergency boot device.
2. Copy the existing configuration in the file /config/juniper.conf.gz from the device to a
remote system, such as a server, or to an emergency boot device. For extra safety,
you can also copy the backup configurations (the files named /config/juniper.conf.n,
where n is a number from 0 through 9) to a remote system or to an emergency boot
device.
You can use the system snapshot feature to complete this step. The system snapshot
feature takes a “snapshot” of the files currently used to run the QFX Series switch—the
complete contents of the /config and /var directories, which include the running Juniper
Networks Junos OS, the active configuration, and the rescue configuration—and copies
all of these files into a memory source. See “Creating a Snapshot and Using It to Boot
a Device” on page 218.
The emergency boot device is detected. At this time, you can load the Junos OS from
the emergency boot device onto the internal flash storage.
3. The software prompts you with the following option if you have a snapshot saved on
the emergency boot device:
The software prompts you with the following option if you have Junos OS software
from the factory installed on the emergency boot device.
Select Install Juniper Linux Platform to install the Junos OS software from the
emergency boot device.
4. The device copies the software from the emergency boot device, occasionally
displaying status messages. Copying the software can take up to 12 minutes.
When the software is finished being copied from the emergency device to the device,
the device reboots from the internal flash storage on which the software was just
installed. When the reboot is complete, the device displays the Junos OS login prompt:
root@switch#
5. Create a new configuration as you did when the device was shipped from the factory,
or restore the previously saved configuration file to the device.
If the device’s software is corrupted or otherwise damaged, you may need to perform a
recovery installation, using the emergency boot device to restore the default factory
installation. Once you have recovered the software, you will need to restore the router
or switch’s configuration. You can either create a new configuration as you did when the
device was shipped from the factory, or if you saved the device’s previous configuration,
you can simply restore that file to the system.
Depending on the situation, you should try to perform the following steps before you
perform the recovery installation:
1. Ensure you have an emergency recovery disk to use during the installation. When the
router or switch is first shipped, an emergency recovery disk is provided with it. For
instructions on creating an emergency boot device, see “Creating an Emergency Boot
Device” on page 223
2. Copy the existing configuration in the file /config/juniper.conf.gz from the device to a
remote system. For extra safety, you can also copy the backup configurations (the
files named /config/juniper.conf.n, where n is a number from 0 through 9).
1. Insert the removable media emergency boot device into the device.
If the CLI is still active, issue the request system reboot command from command
mode to reboot the device.
If the CLI is not working, manually power off the device using the main power switch,
wait 10 seconds, and then power the device back on.
3. When the software prompts you with the following question, type y:
WARNING: The installation will erase the contents of your disk. Do you wish
to continue (y/n)? y
The device copies the software from the removable media emergency boot device
onto your system, occasionally displaying status messages. Copying the software can
take up to 45 minutes, depending on the device. When the process is complete, the
router boots into Amnesiac state and the login prompt is displayed.
5. Log in as root on the device’s console port and issue the request system reboot
command from command mode to reboot the device.
The device reboots from the boot device on which the software was just installed.
When the reboot is complete, the device displays the login prompt.
6. Create a new configuration as you did when the device was shipped from the factory,
or restore a previously saved configuration file to the system. For more information,
see Creating a New Configuration on a Single Routing Engine, Creating a New
Configuration with Redundant Routing Engines, and “Restoring a Saved Configuration”
on page 247.
Problem Description: If the Junos OS appears to have been installed but the CLI does not work,
or if the switch has no software installed, you can use this recovery installation procedure
to install the Junos OS.
Solution If a Junos OS image already exists on the switch, you can either install the new Junos OS
package in a separate partition, in which case both Junos OS images remain on the switch,
or you can remove the existing Junos OS image before you start the new installation
process.
Press the Spacebar to enter the manual loader. The loader> prompt appears.
The “Select a recovery image” menu appears on the console when one of
these switches is booted and unable to load a version of Junos OS. Follow
the instructions in the “Select a recovery image” menu to load the recovery
version of Junos OS for one of these switches.
You can ignore the remainder of this procedure if you are using a QFX5100,
QFX5200, EX4600, QFX10000, or OCX Series switch.
where:
• format—Enables you to erase the installation media before installing the installation
package. If you do not include this option, the system installs the new Junos OS in
a different partition from that of the most recently installed Junos OS.
• external—Installs the installation package onto external media (a USB stick, for
example).
• Network address of the server and the path on the server; for example,
tftp://192.0.2.0/junos/jinstall-qfx-5e-flex-15.1X53-D30.5-domestic-signed.tgz
• Junos OS package on a USB device (commonly stored in the root drive as the
only file), for example,
file:///jinstall-qfx-5e-flex-15.1X53-D30.5-domestic-signed.tgz).
The installation now proceeds normally and ends with a login prompt.
Related • Creating a Snapshot and Using It to Boot a QFX3500 and QFX3600 Switch on page 216
Documentation
• Creating a Snapshot and Using It to Boot a Device on page 218
Installing and Recovering Software Using the Open Network Install Environment (ONIE)
ONIE, the open network install environment from Cumulus Networks, is a network OS
installer that installs Junos OS and third party applications on a switch. Juniper Network
switches come preinstalled with ONIE. When you turn on a switch, the ONIE discovery
and execution (ODE) application locates the management Ethernet interface and the
Junos OS software package, which can be found either locally on the switch or on the
network using HTTP, FTP, or TFTP. After the switch discovers and downloads the Junos
OS software package, the switch installs the Junos OS software, reboots, and then boots
from Junos OS. Junos OS then becomes the default software image .
NOTE: If you want to use the Junos OS CLI to install software, see “Upgrading
Software” on page 79.
• Go to ONIE Loader
• ONIE: Rescue
• ONIE: Uninstall OS
You can use the following commands to install and uninstall Junos OS and start and
stop the ONIE ODE application:
• onie-nos-install
Installs Junos OS from any URL, such as http://, ftp://, and file://.
• onie-uninstaller
• onie-discovery-start
The discovery process starts automatically. However, if you stop the discovery process
by issuing the onie-discovery-stop command, you can restart the discovery process
by issuing the onie-discovery-start command.
• onie-discovery-stop
Stops the discovery process. To restart the discovery process, issue the
onie-discovery-start command.
NOTE: To access the download site, you must have a service contract with
Juniper Networks and an access account. If you need help obtaining an
account, complete the registration form at the Juniper Networks website
https://www.juniper.net/registration/Register.jsp .
3. In the By Technology box, click Switching > QFX Series > QFX10002.
4. Click the Software tab and select the install package from the Install Package box.
6. Read the End User License Agreement, click the I agree radio button, and then click
Proceed.
8. Open or save the installation package either to the local system in the var/tmp
directory or to a remote location. If you are copying the installation package to a
remote system, make sure that you can access it using HTTP, TFTP, FTP, or SCP.
Executing this command saves a copy of your configuration files to a remote location
such as an external USB device.
By default, the ONIE discovery and execution (ODE) application attempts to discover
and fetch an image from a configured DCHP or webserver and the management IP
address of the switch and the IP address of the default gateway. If you want to
manually configure static addressing for the management IP address of the switch,
issue onie-discovery-stop command at the ONIE prompt, and then manually configure
the management IP address and IP address of the default gateway.
For example:
ONIE:/ # onie-discovery-stop
ONIE:/ # ifconfig eth0 10.204.32.96 netmask 255.255.254.0
ONIE:/ # route add default gw 10.204.47.254
To restart the ONIE discovery and execution (ODE) application, issue the
onie-discovery-start command.
For example:
ONIE:/ # onie-discovery-start
Installing a Junos OS Software Package That Resides on a Webserver or DHCP Server with
DHCP Options Configured
To install a Junos OS software package residing on a webserver or DHCP server:
1. Copy the software image with the filename onie-installer to the var/www/html directory
of the webserver or DHCP server.
2. Configure the DHCP option 114 in the DHCP server to redirect to the webserver to fetch
the Junos OS software image.
Here is a sample Windows Open DHCP server configuration with DHCP option 114
configured.
Here is a sample boot initialization log, showing the options you just configured:
The log shows that the installation process has fetched the Junos OS software image
from the DHCP server and is installing the Junos OS software.
By default, the ONIE discovery and execution (ODE) application attempts to discover
and fetch an image from a configured webserver. If you do not have DHCP configured,
you will need to stop the ONIE discovery and execution (ODE) application and manually
configure static addressing for the management IP address of the switch,
For example:
ONIE:/ # onie-discovery-stop
ONIE:/ # ifconfig eth0 10.204.32.96 netmask 255.255.254.0
ONIE:/ # route add default gw 10.204.47.254
2. Use SCP to copy the Junos OS image from a server or other location to the /var/tmp
directory on the switch.
For example:
ONIE:/var/tmp # onie-nos-install
file:///var/tmp/jnpr-qfx-5e-jdm-onie-updater-15.1-20150819_ups.4.bin
By default, the ONIE discovery and execution (ODE) application attempts to discover
and fetch an image from a configured webserver. If you do not have DHCP configured,
you will need to stop the ONIE discovery and execution (ODE) application and manually
configure static addressing for the management IP address of the switch,
For example:
ONIE:/ # onie-discovery-stop
ONIE:/ # ifconfig eth0 10.204.32.96 netmask 255.255.254.0
ONIE:/ # route add default gw 10.204.47.254
3. Issue the onie-nos-install command at the ONIE prompt to install the Junos OS
software.
ONIE:/ # onie-nos-install
ftp://<username>:<password>@10.209.152.22/jnpr-qfx-5e-jdm-onie-updater-15.1-20150819_ups.4.bin
ONIE:/ # onie-nos-install
tftp://10.207.66.147/jnpr-qfx-5e-jdm-onie-updater-15.1-20150819_ups.4.bin
Installing Junos OS Software Using DHCP Server with No DHCP Options Configured
Use this installation method if you cannot modify or set the DHCP options on your DHCP
server.
To install the Junos OS software using a DHCP server with no DHCP options configured:
3. Issue the onie-nos-install command at the ONIE prompt to install the Junos OS
software.
For example:
ONIE:/ # onie-nos-install
http://10.207.66.147/jnpr-qfx-5e-jdm-onie-updater-15.1-20150819_ups.4.bin
ONIE:/ # ifconfig
eth0 Link encap:Ethernet HWaddr 94:DE:80:AA:F2:E1
inet addr:10.204.42.250 Bcast:10.204.47.255 Mask:255.255.240.0
<<<---- --> Received IP address from DHCP server, but auto redirected to web
server. Installation will not happen because DHCP option (114) is not
configured.
This log shows that the installation process has fetched the Junos OS software image
from the webserver and is installing the Junos OS software.
1. Because the switch comes preinstalled with the Junos OS to be used with the Junos
OS CLI, you need to uninstall this version of software before you can install the Junos
OS image to be used with ONIE.
By default, the ONIE discovery and execution (ODE) application attempts to discover
and fetch an image from a configured webserver. Because you do not have DHCP
configured, you will need to stop the ONIE discovery and execution (ODE) application
and manually configure static addressing for the management IP address of the
switch.
For example:
ONIE:/ # onie-discovery-stop
ONIE:/ # ifconfig eth0 10.204.32.96 netmask 255.255.254.0
ONIE:/ # route add default gw 10.204.47.254
4. Issue the onie-nos-install command at the ONIE prompt to install the Junos OS
software.
For example:
ONIE:/ # onie-nos-install
http://10.204.35.100/jnpr-qfx-5e-jdm-onie-updater-15.1-20150819_ups.4.bin
The log shows that the installation process has fetched the Junos OS software image
from the webserver and is installing the Junos OS software.
2. Copy the software image with the filename onie-installer to the USB stick and insert
the USB stick into the front USB port of the switch.
The Junos OS is uninstalled, the switch reboots, and the software is installed from
the USB stick.
Version : master-201412161452.0.1
Build Date: 2014-12-16T14:56+0800
Info: Mounting kernel filesystems... done.
Info: Mounting LABEL=ONIE-BOOT on /mnt/onie-boot ...
Info: Using eth0 MAC address: 94:de:80:aa:f2:e1
Info: eth0: Checking link... scsi 6:0:0:0: Direct-Access SanDisk Ultra
2.01 P6
sd 6:0:0:0: [sdb] 31266816 512-byte logical blocks: (16.0 GB/14.9 GiB)
sd 6:0:0:0: [sdb] Write Protect is off
sd 6:0:0:0: [sdb] Write cache: disabled, read cache: enabled, doesn't support
DPO or FUA
sd 6:0:0:0: [sdb] Attached SCSI disk
up.
Info: Trying DHCPv4 on interface: eth0
ONIE: Using DHCPv4 addr: eth0: 10.204.42.250 / 255.255.240.0
Starting: dropbear ssh daemon... done.
Starting: telnetd... done.
discover: installer mode detected. Running installer.
Starting: discover... done.
Please press Enter to activate this console. Info: eth0: Checking link... up.
Info: Trying DHCPv4 on interface: eth0
ONIE: Using DHCPv4 addr: eth0: 10.204.42.250 / 255.255.240.0
ONIE: Starting ONIE Service Discovery
ONIE: Executing installer: file://dev/sdb/onie-installer <<<<--- Installing
from external(dev/sdb) attached USB.
Verifying image checksum ... OK.
Purpose Verify that the software was installed successfully on the switch.
Action To verify that the software was properly installed, issue the show version command.
Solution If Junos OS does not boot, and the console displays the Yocto GNU Linux shell instead,
it could mean that you have booted in the Juniper Linux Debug mode. If you see an error
message that says, “[Error] Does not seem to be an QFX10002.” could mean that the
EEPROM does not contain vendor-specific information. To verify the vendor-specific
information, perform an ONIE: Rescue installation, and then verify the contents of the
/var/run/*.dat file.
For example:
ONIE:/ # onie-syseeprom
TlvInfo Header:
Id String: TlvInfo
Version: 1
Total Length: 315
TLV Name Code Len Value
-------------------- ---- --- -----
Base MAC Address 0x24 6 54:2A:A2:FB:DC:00
MAC Addresses 0x2A 2 256
Product Name 0x21 23 QFX10000-ÿÿÿÿÿÿÿ
Serial Number 0x23 12 116G1EC00032
Part Number 0x22 16 1AES48S6Q.A2Gÿÿÿ
Device Version 0x26 1 1
Manufacture Date 0x25 19 01/13/2015 21:40:30
Vendor Name 0x2D 20 JUNIPER NETWORKS INC
Manufacturer 0x2B 14 JUNIPER NETWORKS INC
Vendor Extension 0xFD 48 0x00 0x00 0x7C 0x82 0x01 0x00 0x41 0x32 0xFF
0xFF 0xFF 0xFF 0xFF 0xFF 0x0F
Vendor Extension 0xFD 62 0x00 0x00 0x0A 0x4C 0x51 0x06 0x52 0x45 0x56
0x20 0x30 0x31 0x52 0x0C 0x3F
Platform Name 0x28 37 x86_64-alpha_networks_snx60a0_486f-r0
Loader Version 0x29 23 master-201412161452.0.1
CRC-32 0xFE 4 0xB88C8885
Checksum is valid.
From the output, you can see that the vendor-specific information confirms that it is
for Juniper Networks.
NOTE: In the following procedure, we assume that you are creating the
emergency boot device on a switch. You can create the emergency boot
device on any PC or laptop that supports Linux.
1. Insert the USB device into the front USB port of the switch.
2. Issue the following command from the directory on the switch in which the ISO file is
located:
You can also issue the dd command using the full path to where the ISO file is located.
ONIE:/ # dd if=/var/tmp/jnpr-qfx-5e-jdm-onie-updater-15.1-20150819_ups.4.bin
of=<usb-detected-drive> bs=1M
The switch writes the installation media image to the USB device:
3. Remove the USB device from the USB port of the switch.
NOTE: Before you can perform a recovery installation, make sure you have
an emergency boot device loaded with ONIE software.
5. Select Unigen PQS1000 under Legacy USB, and then press Enter.
6. Select ONIE: Embed ONIE from the ONIE Installer menu, and then press Enter.
8. Verify that the ONIE software was installed by looking at the installation log file.
For example:
Installation log files are displayed automatically during the installation process, but
if you want to verify installation log files at a different time, you can find them in the
in the /var/log/ directory. To view an installation log file, issue the tail -f
/var/log/onie.log command.
9. Issue the parted /dev/sda print command to verify that the ONIE partitions have
been created.
For example:
Overview
The autorecovery feature is supported on dual-partitioned SRX Series devices. With this
feature, information on disk partitioning, configuration, and licenses is recovered
automatically in the event it becomes corrupted.
• Detect corruption in disk partitioning during system bootup and attempt to recover
partitions automatically
• Detect corruption in the Junos OS rescue configuration during system bootup and
attempt to recover the rescue configuration automatically
• Detect corruption in Junos OS licenses during system bootup and attempt to recover
licenses automatically
• The feature provides the request system autorecovery state save command, which
backs up important data such as disk partitioning information, licenses, and Junos OS
rescue configuration.
• Once the backup copies are saved, they are used to check the integrity of the working
copies of the data on every bootup.
• Prepare the router for deployment with the necessary licenses and configuration.
• After you finalize the state, execute the request system autorecovery state save
command to back up the state.
• After you save the state, integrity check and recovery actions (if any) occur
automatically on every bootup.
• If subsequent maintenance activities change the state of the router by adding licenses
or updating the configuration, you need to execute the request system autorecovery
state save command again to update the saved state.
• Execute the show system autorecovery state command any time to view the status of
the saved information and the integrity check status of each saved item.
• Execute the request system autorecovery state clear command to delete all backed up
data and disable autorecovery, if required.
• License keys
Data is backed up only when you execute the request system autorecovery state save
command. Disk-partitioning information is backed up automatically from factory defaults
(for new systems), on installation from the boot loader, and on snapshot creation.
Troubleshooting Alarms
Table 23 on page 245 lists types of autorecovery alarms, descriptions, and required actions.
Alarm
Alarm Type Description Action Required
Autorecovery information Minor This alarm indicates: • Ensure that the system has all
needs to be saved required licenses and
• Unsaved data needs to be saved, or saved configuration.
data contains problems and another save
• Execute the request system
is required.
autorecovery state save command.
Alarm
Alarm Type Description Action Required
Autorecovery was unable Major This alarm indicates: • The system might be experiencing
to recover data completely a fatal malfunction.
• Boot time integrity check failed for certain
items, which could not be recovered
successfully.
Considerations
• Devices must have dual-root partitioning for autorecovery to work.
• The request system configuration rescue save command regenerates the rescue
configuration from the current Junos OS configuration and then saves it. Therefore,
executing the save command overwrites any existing rescue configuration.
• In general, the saved contents of the rescue configuration are not updated
automatically. If you add licenses, you must execute the request system autorecovery
state save command again.
Related • Example: Creating a Snapshot and Using It to Boot an SRX Series Device on page 220
Documentation
• Example: Installing Junos OS Upgrade Packages on SRX Series Devices on page 120
• Reverting the Junos OS Software Image Back to the Previous Version on page 123
A rescue configuration file is helpful in the event that your device’s configuration file has
been misconfigured. You can restore the device to this rescue configuration to bring the
device back online. If you save this file off the device, the rescue configuration can also
be used to restore your device in the event of a software failure.
1. Edit the configuration file on the device to reflect the base configuration you wish to
use.
For more information about editing the configuration, see Overview for Routing Devices.
2. In the CLI operational mode, save this edited base configuration as the rescue
configuration file:
user@host> request system configuration rescue save
user@host1% cd /config/
user@host1% ls -lrt rescue.conf.gz
user@host1%ftp host2
Name: username
Password: password
User user logged in.
ftp> cd /var/tmp
ftp> lcd /config
ftp> bin
ftp> put rescue.conf.gz
local: rescue.conf.gz remote: rescue.conf.gz
Transfer complete.
ftp> bye
Goodbye.
To roll back to the rescue configuration, use the rollback rescue command.
load complete
NOTE: After rolling back to the rescue configuration, you must commit the
configuration to activate it:
user@host#commit
login: root
Password: [Enter]
Initially, access to the router is limited to the console port after a recovery installation.
Access through the management ports and interfaces is set in the configuration. For
information about accessing the router through the console port, see the administration
guide for your particular router.
# cli
3. Copy the configuration file on the remote server to the router’s /var/tmp directory:
[edit]
user@host#
2. Load the file into the current configuration. You should override the existing file.
user@host#
load override /var/tmp/filename
load complete
user@host# commit
commit complete
user@host# exit
user@host>
After you have installed the software on the router, committed the configuration, and
are satisfied that the new configuration is successfully running, issue the request
system snapshot command to back up the new software to the /altconfig file system.
If you do not issue the request system snapshot command, the configuration on the
alternate boot drive will be out of sync with the configuration on the primary boot
drive.
The request system snapshot command causes the root file system to be backed up
to /altroot, and /config to be backed up to /altconfig. The root and /config file systems
are on the router’s CompactFlash card, and the /altroot and /altconfig file systems
are on the router’s hard disk or solid-state drive (SSD).
Reverting to the Default Factory Configuration by Using the request system zeroize
Command
The request system zeroize command is a standard Junos OS operational mode command
that removes all configuration information and resets all key values. The operation unlinks
all user-created data files, including customized configuration and log files, from their
directories. The switch then reboots and reverts to the factory-default configuration.
To completely erase user-created data so that it is unrecoverable, use the request system
zeroize media command.
CAUTION: Before issuing request system zeroize, use the request system
snapshot command to back up the files currently used to run the switch to a
secondary device.
2. Type yes to remove configuration and log files and revert to the factory default
configuration.
[edit]
user@switch# load override filename
[edit]
Requirements
Before rebooting the device, save and commit any Junos OS updates.
Overview
This example shows how to reboot a device fifty minutes from when you set the time
from the internal media while sending a text message of ’stop’ to all system users before
the device reboots.
Configuration
CLI Quick To quickly configure this section of the example, copy the following commands, paste
Configuration them into a text file, remove any line breaks, change any details necessary to match your
network configuration, copy and paste the commands into the CLI at the [edit] hierarchy
level, and then enter commit from configuration mode.
2. Select Reboot in 50 minutes to reboot the device fifty minutes from the current time.
3. Select the internal (for SRX Series devices) boot device from the Reboot From Media
list.
4. In the Message box, type stop as the message to display to any user on the device
before the reboot occurs.
5. Click Schedule. The J-Web user interface requests confirmation to perform the reboot.
• If the reboot is scheduled to occur immediately, the device reboots. You cannot
access J-Web until the device has restarted and the boot sequence is complete.
After the reboot is complete, refresh the browser window to display the J-Web login
page.
• If the reboot is scheduled to occur in the future, the Reboot page displays the time
until reboot. You have the option to cancel the request by clicking Cancel Reboot
on the J-Web user interface Reboot page.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
To reboot a device:
From operational mode, schedule a reboot of the device to occur fifty minutes from when
you set the time from the internal media while sending a text message of ’stop’ to all
system users before the device reboots.
Enter:
Results From configuration mode, confirm your configuration by entering the show system
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
If you are done configuring the device, enter commit from configuration mode.
Verification
See Also • Example: Creating a Snapshot and Using It to Boot an SRX Series Device on page 220
• Example: Installing Junos OS Upgrade Packages on SRX Series Devices on page 120
• Reverting the Junos OS Software Image Back to the Previous Version on page 123
Requirements
Before halting the device, save and commit any Junos OS updates.
Overview
When the device is halted, all software processes stop and you can access the device
through the console port only. Reboot the device by pressing any key on the keyboard.
NOTE: If you cannot connect to the device through the console port, shut
down the device by pressing and holding the power button on the front panel
until the POWER LED turns off. After the device has shut down, you can power
on the device by pressing the power button again. The POWER LED turns on
during startup and remains steadily green when the device is operating
normally.
This example shows how to halt the system and stop software processes on the device
immediately.
Configuration
CLI Quick To quickly configure this section of the example, copy the following commands, paste
Configuration them into a text file, remove any line breaks, change any details necessary to match your
network configuration, copy and paste the commands into the CLI at the [edit] hierarchy
level, and then enter commit from configuration mode.
NOTE: The request system halt command used for halting the system and
stopping software processes on the device is not supported on SRX1500,
SRX4100, and SRx4200 devices.
2. Select Halt Immediately. After the software stops, you can access the device through
the console port only.
4. Click OK to confirm the operation. If the device halts, all software processes stop and
you can access the device through the console port only. Reboot the device by pressing
any key on the keyboard.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
To halt a device:
Results From configuration mode, confirm your configuration by entering the show system
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
If you are done configuring the device, enter commit from configuration mode.
Verification
See Also • Example: Creating a Snapshot and Using It to Boot an SRX Series Device on page 220
• Example: Installing Junos OS Upgrade Packages on SRX Series Devices on page 120
• Reverting the Junos OS Software Image Back to the Previous Version on page 123
To bring chassis components online and offline, enter these request chassis commands:
Where <fru> in the request chassis command can be any of the following (for SRX300,
SRX320, SRX340, SRX345, and SRX550M devices):
Where <fru> in the request chassis command can be any of the following (for SRX5800,
SRX5600, and SRX5400 devices):
NOTE: The request chassis command is not supported for bringing SPCs
online and offline.
Example:
To bring specific pic and the corresponding fpc slot online, from operational mode enter
the following request chassis command:
See Also • Example: Creating a Snapshot and Using It to Boot an SRX Series Device on page 220
• Example: Installing Junos OS Upgrade Packages on SRX Series Devices on page 120
• Reverting the Junos OS Software Image Back to the Previous Version on page 123
See Also • Example: Creating a Snapshot and Using It to Boot an SRX Series Device on page 220
• Example: Installing Junos OS Upgrade Packages on SRX Series Devices on page 120
• Reverting the Junos OS Software Image Back to the Previous Version on page 123
Zero touch provisioning (ZTP) allows you to provision new Juniper Networks switches
and routers in your network automatically, without manual intervention. When you
physically connect a switch or router to the network and boot it with a default factory
configuration, it attempts to upgrade the Junos OS software automatically and autoinstall
a configuration file from the network.
• As of Junos OS Release 15.2, you can provision using a script to be executed, as well
as a configuration file to be loaded, for either switches or routers.
• As of Junos OS Release 15.1, you can provision using a script to be executed, as well as
a configuration file to be loaded, but only for switches.
• In releases earlier than Junos OS Release 15.1, you can automatically provision switches
only, and only by loading a configuration file.
The switch or router uses information that you configure on a Dynamic Host Configuration
Protocol (DHCP) server to locate the necessary software image and configuration files
on the network or to find the script to execute. If you do not configure the DHCP server
to provide this information, the device boots with the preinstalled software and default
factory configuration. To make sure you have the default factory configuration loaded
on the switch or router, issue the request system zeroize command on the device you
want to provision.
Upon connection and booting of a new router or switch, if Junos OS detects a file on the
DHCP server, the first line of the file is examined. If Junos OS finds the characters #!
followed by an interpreter path, it treats the file as a script file and executes the script
with the interpreter mentioned. If the script returns error (that is, a nonzero value), the
ZTP state machine refetches the script and attempts to execute the script again. This
continues until the script executes successfully. The script can be, for example, a shell
script (#!/bin/sh), a slax script (#!/usr/bin/slax), or a python script (#!/usr/bin/python).
If Junos OS does not find the characters #! followed by an interpreter path, it treats the
file as a Junos OS configuration in text format and loads the file.
The zero touch provisioning process will either upgrade or downgrade the Junos OS
release.
NOTE: In Junos OS Release 18.1R1, if you are upgrading the software, you
must perform a full software upgrade. A full upgrade includes upgrading both
the Junos OS software and the host software packages.
• If you downgrade to a software version earlier than Junos OS Release 12.2, in which
zero touch provisioning is not supported, the configuration file autoinstall phase of the
zero touch provisioning process does not happen.
• To downgrade to a software version that does not support resilient dual-root partitions
(Junos OS Release 10.4R2 or earlier), you must perform some manual work on the
switch. For more information, see “Understanding Resilient Dual-Root Partitions on
Switches” on page 187.
NOTE: On QFX3500 and QFX3600 switches running the original CLI, you
cannot use ZTP to upgrade from Junos OS Release 12.2 or later to Junos OS
Release 13.2X51-D15 or later.
When you boot a switch or router with the default factory configuration, the following
process happens:
1. If DHCP option 43, suboption 00 (the name of the software image file on the FTP,
HTTP, or TFTP server) is configured, the switch or router downloads the software
image and then checks the software version. If the software version is same, the
software is not upgraded.
NOTE: When the DHCP server cannot use suboption 00, configure the
image file using suboption 04. If both suboption 00 and suboption 4 are
defined, suboption 04 is ignored.
2. If DHCP option 43, suboption 01 (the name of the configuration file or the script file
on the FTP, TFTP, or HTTP server) is configured, the switch or router downloads the
file from the FTP, TFTP or HTTP server. If the file is a Junos OS configuration file, it is
loaded with an override option in the system after the software image is installed. If
the file is a script, the interpreter path mentioned in the file is used to execute the
script after the software image is installed. You can view the script output in
/var/log/op-script.log .
If DHCP option 43, suboption 01 is not specified, the switch or router uses the default
factory configuration.
If both DHCP option 43, suboption 01 and suboption 2 are specified, suboption 01 is
processed before suboption 02. Junos OS is upgraded, and then the configuration or
script file is applied.
4. If DHCP option 43, suboption 03 (the transfer mode setting) is configured, the switch
or router accesses the FTP, HTTP, or TFTP server using the specified transfer mode
setting, for example, FTP.
If DHCP option 43, suboption 03 is not configured, TFTP becomes the transfer mode
automatically.
5. If DHCP option 43, suboption 04 (the name of the software image file on the FTP,
HTTP, or TFTP server) is configured, the router or switch downloads the software
image and then checks the software version. If the software version is same, the
software is not upgraded.
NOTE: When the DHCP server cannot use suboption 00, configure the
image file using suboption 04. If both suboption 00 and suboption 4 are
defined, suboption 04 is ignored.
6. If DHCP option 150 or option 66 is specified, the IP address of the FTP, HTTP, or TFTP
server is configured.
NOTE: You must configure either option 150 or option 66. If you configure
both option 150 and option 66, option 150 takes precedence and option
66 is ignored. Also, make sure you specify an IP address, not a hostname,
because name resolution is not supported.
7. (Optional) If DHCP option 7 is specified, you can configure one or more syslog servers.
8. (Optional) If DHCP option 42 is specified, you can configure one or more NTP servers.
9. (Optional) If DHCP option 12 is specified, you can configure the hostname of the switch
or router.
NOTE: If you are upgrading the software, you must perform a full software
upgrade. A full upgrade includes upgrading both the Junos OS software and
the host software packages.
Zero touch provisioning (ZTP) allows you to provision new switches or routers in your
network automatically, without manual intervention. You can use either management
ports or network ports on your switch to connect to the network. When you physically
connect a switch or router to the network and boot it with a default configuration, it
attempts to upgrade the Junos OS software automatically using information detected
on a Dynamic Host Control Protocol (DHCP) server. You can include this information on
the DHCP server either as a script to be executed or as a configuration file to be loaded
on the router or switch. The presence or absence of the characters !# plus a script
interpreter are what determines whether the file is treated as a script or as a configuration
file. If you do not configure the DHCP server to provide this information, the switch or
router boots with the preinstalled software and default configuration.
NOTE: If you have both DHCP and ZTP enabled, the switch or router
broadcasts a DHCP DISCOVER packet every six minutes. If a DHCP server on
the network responds with a DHCP ACK packet with DHCP vendor options
set with the necessary values to initiate ZTP, then ZTP proceeds.
NOTE:
• For detailed information regarding the DHCP and DHCP options, refer to
RFC 2131 (http://www.ietf.org/rfc/rfc2131.txt ) and RFC 2132
(www.ietf.org/rfc/rfc2132.txt). Also, this document refers to Internet
Systems Consortium (ISC) DHCP version 4.2. For more information
regarding this version, refer to
http://www.isc.org/software/dhcp/documentation.
• Ensure that the switch or router has access to the following network resources:
• The DHCP server that provides the location of the software image and configuration
files on the network
• The File Transfer Protocol (anonymous FTP), Hypertext Transfer Protocol (HTTP),
or Trivial File Transfer Protocol (TFTP) server on which the software image and
configuration files are stored
• (Optional) A system log (syslog) server to manage system log messages and alerts
• Locate and record the MAC address printed on the switch or router chassis.
1. Make sure the switch or router has the default factory configuration installed.
Issue the request system zeroize command on the switch or router that you want to
provision.
2. Download the software image file and the configuration file to the FTP, HTTP, or TFTP
server from which the switch or router will download these files.
3. Configure the DHCP server to provide the necessary information to the switch or router.
You can configure dynamic or static IP address assignment for the management
address of the switch or router. To determine the management MAC address for static
IP address mapping, add 1 to the last byte of the MAC address of the switch or router,
which you noted before you began this procedure.
4. Define the format of the vendor-specific information for DHCP option 43 in the
dhcpd.conf file.
5.
NOTE: You must configure either option 150 or option 66. If you configure
both option 150 and option 66, option 150 takes precedence, and option
66 is ignored. Also, make sure you specify an IP address, not a hostname,
because name resolution is not supported.
Configure DHCP option 150 to specify the IP address of the FTP, HTTP, or TFTP server.
6. Configure DHCP option 66 to specify the IP address of the FTP, HTTP, or TFTP server.
NOTE: When the DHCP server cannot use suboption 00, configure the
software image file name using suboption 04. If both suboption 00 and
suboption 4 are defined, suboption 04 is ignored.
option NEW_OP.image-file-name
"/dist/images/jinstall-ex-4200-13.2R1.1-domestic-signed.tgz";
• Suboption 02: The symbolic link to the software image file to install.
• Suboption 03: The transfer mode that the switch or router uses to access the TFTP,
FTP, or HTTP server. If you select FTP as the transfer mode, Junos OS uses the
anonymous FTP login to download files from the FTP server.
NOTE: When the DHCP server cannot use suboption 00, configure the
image file using suboption 04. If both suboption 00 and suboption 4
are defined, suboption 04 is ignored.
option NEW_OP.alt-image-file-name
"/dist/images/jinstall-ex-4200-13.2R1.1-domestic-signed.tgz";
8. (Optional) Configure DHCP option 7 to specify one or more system log (syslog) servers.
10. (Optional) Configure DHCP option 12 to specify the hostname of the switch or router.
The following sample configuration shows the DHCP options you just configured:
host jn-switch35 {
hardware ethernet ac:4b:c8:29:5d:02;
fixed-address 10.100.31.36;
option tftp-server-name "10.100.31.71";
option host-name "jn-switch35";
option log-servers 10.100.31.72;
option ntp-servers 10.100.31.73;
option NEW_OP.image-file-name
"/dist/images/jinstall-ex-4200-13.2R1.1-domestic-signed.tgz";
Based on the DHCP options you just configured, the following statements are
appended to the Junos OS configuration file (for example, jn-switch35.config):
system {
host-name jn-switch35;
syslog {
host 10.100.31.72 {
any any;
}
}
ntp {
server 10.100.31.73;
}
}
11. Connect the switch or router to the network that includes the DHCP server and the
FTP, HTTP, or TFTP server.
13. Monitor the ZTP process by looking at the following log files:
• /var/log/dhcp_logfile
• /var/log/image_load_log
• /var/log/op-script.log
• /var/log/event-script.log
• Op Script Overview
• Reverting to the Default Factory Configuration by Using the request system zeroize
Command on page 249
Zero Touch Provisioning (ZTP) enables you to provision and configure devices
automatically, minimizing most of the manual intervention required for adding devices
to a network. ZTP is supported on SRX300, SRX320, SRX340, SRX345, SRX550M, and
SRX1500 devices.
ZTP on SRX Series devices is responsible for the initial bootup and configuration of the
device when the device is powered on. This functionality includes:
• Providing the bare-minimum bootstrapping of the device. The SRX Series device is
shipped with a factory-default configuration. The factory-default configuration includes
the URL of the redirect server, that is used to connect to the central server by using a
secure encrypted connection.
• Automatically connecting to the server over the Internet, and downloading the
configuration and Junos OS image as specified by the customer or user from the server
when the SRX Series device boots up with the factory-default configuration. The new
image is installed first and then the initial configuration is applied and committed on
the SRX Series device.
The ZTP process uses Network Activator to initially provision SRX Series devices.
Network Service Activator enables fast device discovery and provisioning for automated
configuration to eliminate complex device setup.
Network Activator initially provisions SRX Series devices (henceforth referred to as remote
devices in this documentation), which reside at end users’ sites. The remote devices
download a boot image and initial configuration files from servers hosting Network
Activator, using a process that provides full authorization and authentication for all
interactions. When initial provisioning is complete, the remote device communicates
with a management server, which then starts to manage and monitor the remote device.
Figure 13 on page 268 Illustrates the distributed architecture and the components involved
in the initial provisioning process.
g043412
The roles of the components in the initial provisioning process are as follows:
• The remote device sends requests for initial provisioning. The remote device resides
at the end user’s location.
• The Redirect Tool provides authentication and authorization for remote devices to
access their assigned regional servers through use of ITU-T X.509 private key
infrastructure (PKI) digital certificates. Redirect service is hosted on Amazon Web
Services (AWS), operated and maintained by Juniper Networks.
• The central server hosts Network Activator and communicates with the regional
activator servers. Administrators at a service provider or central enterprise location
interact with this server to install and set up Network Activator. The central server is
located at a central geographic location for the service provider.
• The regional server also hosts Network Activator. This server stores information about
its assigned remote devices and communicates directly with those devices. This server
typically resides at a regional administrative location the provider designates for the
end user.
3
Remote device
communicates 7
with Redirect Tool REMOTE DEVICE
4
to obtain contact Remote device
information for starts and
regional server. management server
starts managing
the device.
REDIRECT
TOOL MANAGEMENT
on Juniper Networks SERVER
website Remote device
obtains boot image
5 and configuration
from regional server.
ADMINISTRATOR
• Installs and sets up
Network Activator
on central server. 1
• Adds device and
corresponding
regional server
to Redirect Tool.
CENTRAL REGIONAL
SERVER
2 SERVER
6
g043413
server.
3. The end user powers on the remote device, connects it to a computer, and enters the
authentication code in the webpage to send a request for initial provisioning.
4. The device transmits its X.509 certificate and fully qualified domain name (FQDN)
as a provisioning request to the Redirect Tool.
5. The Redirect Tool searches its data store for the regional server that the administrator
specified for this device, and confirms that the device’s request corresponds to the
X.509 certificate specified for the server.
6. The Redirect Tool sends contact information for the regional server to the device.
7. The device sends a request to the regional server for the URL of the boot image and
the location of the initial configuration.
9. The device obtains the boot image and configuration from the regional server.
10. The device uses the boot image and configuration to start and become operational.
For more details on Network Activator, see Network Activator User Guide .
Limitations
• There are no restrictions on the number of attempts for entering the correct activation
code.
• If the remote device is not able to reach the server (because the configured address
in the factory-default configuration is not correct or the server is down, and so on), the
remote device attempts to connect to an alternative server (if configured in the
factory-default configuration). If there is only one server configured, then you can
reattempt to connect. In such scenarios, we recommend that you configure the device
manually through the console.
• Unpack the device, install it, complete the necessary cabling, connect a laptop or any
other terminal device, and power on the device. See the Hardware installation Guide
for your device more information.
• For SRX300, SRX320, SRX340, SRX345, and SRX550M devices, connect the
management device and access the J-Web interface.
For more information, see Quick Start guides of respective devices at SRX300, SRX320,
SRX340, SRX345, and SRX550M.
You are provided with an option to use ZTP; you can use this option or skip it and
continue with J-Web wizards.
• For SRX1500 devices, before you can use J-Web to configure your device, you must
access the CLI to configure the root authentication and the management interface.
For more information, see How to Set Up Your SRX1500 Services Gateway.
1. Connect a management device (PC or laptop) to any front panel Ethernet port (WAN
port) of the SRX Series device.
2. Launch a Web browser from the management device and enter the authentication
code in the webpage as shown in Figure 15 on page 271.
At this step:
• The activation code is sent to the server, and if the authentication is successful, the
server pushes the initial configuration to the device. If the authentication is
unsuccessful, you are asked to provide the correct code.
• The server can optionally pushes a new software image on the SRX Series device.
In that case, the new image is installed first and then the initial configuration is
applied and committed on the device.
The new image is installed and then the initial configuration is applied and committed
on the device. When the process is complete, a confirmation message is displayed,
as shown in Figure 17 on page 272.
After successfully installing the new software image and configuration on the system,
the client sends the bootstrap-complete notification to the server that provided the image
and the configuration. After the notification is sent, the configuration that includes the
names of servers is deleted from the system. When you use ZTP the next time, you must
explicitly configure the URL of the redirect server.
NOTE: In case of failure at any stage, the procedure is started all over again.
NOTE: The ZTP process either upgrades or downgrades the Junos OS version.
During a downgrade on an SRX Series device, if you downgrade to a software
version earlier than Junos OS Release 15.1X49-D100, in which ZTP is not
supported, the autoinstallation phase of the ZTP process does not happen.
For SRX300, SRX320, SRX340, SRX345, and SRX550M devices, ZTP is the default
method for provisioning the devices. However, if you want to use J-Web-based provisioning
(J-Web setup wizards supported for the SRX300 line of devices and SRX550M devices),
then instead of ZTP, you can use the option provided in the client portal to skip to J-Web
setup wizards for performing the initial software configuration of your device.
If you select the Skip to JWeb option, you must configure the system root authentication
password as shown in Figure 18 on page 273.
NOTE: For SRX1500 devices, the Skip to JWeb option is not supported. To
access J-Web, the ZTP client configuration must be deleted during the initial
setup of SRX1500 through CLI.
Understanding Factory-Default Configuration on SRX Series Device for Zero Touch Provisioning
Your services gateway is shipped with a factory-default configuration. Following is a
sample of the default configuration that includes configuration for ZTP:
system {
phone-home {
rfc-compliant;
server https://redirect.juniper.net;
}
}
• server indicates the name or IP address of the server. The factory-default configuration
on an SRX Series device might include IP addresses of more than one servers.
• rfc-compliant indicates that after an upgrade, the server enforces certain behaviors
that are compliant with RFC standards.
Starting in Junos OS Release 12.2, you can use the console and operational commands
to monitor Zero Touch Provisioning.
4. Using System Log Files to Monitor Zero Touch Provisioning on page 275
• File names of configuration and image files, names of file servers, protocols used to
fetch files, and times when DHCP servers fetch configuration and image files.
• Failure states caused by files not being on servers, or unreachable servers, and time
outs.
• Number of attempts made, and number of attempts remaining, for retry in current ZTP
cycle.
Purpose In this example, the system log alert alerts you that the auto-image upgrade will start.
Action Use the following system log alert to monitor the auto-image upgrade process.
“ALERT:Auto-image upgrade will start. This can terminate config CLI session(s).
Modified configuration will be lost. To stop Auto-image, in CLI do the
following: 'edit; delete chassis auto-image-upgrade; commit'.”
Meaning This system log alert indicates that the auto-image upgrade will start, and provides
information on how to stop the auto-image upgrade process.
Purpose Error messages provide information on which DHCP options are not configured.
Action Use the information in the following error message to find out which DHCP options are
not configured.
Meaning The error message indicates that the DHCP log server, hostname, and NTP server options
are not configured.
Purpose System log files provide information on the state of the auto-upgrade process, lists of
bound and unbound DHCP client interfaces, IP addresses of file servers, names and
locations of image and configuration files, and successful and failed attempts at fetching
configuration and image files.
Action Use the information in the following system log files to monitor the auto-upgrade process.
Auto Image Upgrade: Start fetching config-file file from server 10.1.1.1 through
irb using ftp
Auto Image Upgrade: Tried [2] attempts to fetch config-file file from server
10.1.1.1 through irb. Summary: "Retrieving /config-file
:: Failed to open file.". To retry [4] times.
Auto Image Upgrade: Tried [4] attempts to fetch config-file file from server
10.1.1.1 through irb. Summary: "Retrieving /config-fileconfig-file
:: Failed to open file.". To retry [2] times.
Auto Image Upgrade: Tried [6] attempts to fetch config-file file from server
10.1.1.1 through irb. Summary: "Retrieving /config-file
:: Failed to open file.". To retry [0] times.
Auto Image Upgrade: All [6] attempts to fetch config-file file from server 10.1.1.1
through irb FAILED. Start retry again in few minutes.
Meaning These system log files indicate that there were six failed attempts to fetch the
configuration file from the file server, the IP address of the file server, the DHCP client
interface name, and the number of times the retry process occurred.
Purpose Issue the show dhcp client binding command to display DHCP client binding information
Action Issue the show dhcp client binding command to display the IP address of the DHCP client,
the hardware address of the DHCP client, number of seconds in which the DHCP client’s
IP address lease expires, state of the DHCP client IP address in the binding table, and the
name of the interface that has active client bindings.
Meaning The output of this command shows that there is one client interface that is bound, and
that there are three interfaces that are receiving DHCP offers from the DHCP server.
Purpose Issue the show dhcp client statistics command to display DHCP client statistics.
Action Issue the show dhcp client statistics command to display DHCP client statistics, such as
the number of packets dropped, and the number DHCP and BOOTP messages sent and
received.
Send error 14
Messages received:
BOOTREPLY 5
DHCPOFFER 1
DHCPACK 4
DHCPNAK 0
DHCPFORCERENEW 0
Messages sent:
BOOTREQUEST 6751
DHCPDECLINE 0
DHCPDISCOVER 6747
DHCPREQUEST 4
DHCPINFORM 0
DHCPRELEASE 0
DHCPRENEW 0
DHCPREBIND 0
Meaning The output of this command displays how many packets were dropped with errors, the
number of BOOTREPLY and DHCPOFFER messages that were received, and the number
of BOOTREQUEST and DHCPREQUEST messages that were sent.
12.2 Starting in Junos OS Release 12.2, you can use the console and operational
commands to monitor Zero Touch Provisioning.
Autoinstallation Overview
If you are setting up many devices, autoinstallation can help automate the configuration
process by loading configuration files onto new or existing devices automatically over
the network. You can use either the J-Web configuration editor or the CLI configuration
editor to configure a device for autoinstallation.
Autoinstallation provides automatic configuration for a new device that you connect to
the network and turn on, or for a device configured for autoinstallation. The
autoinstallation process begins any time a device is powered on and cannot locate a
valid configuration file in the CompactFlash (CF) card. Typically, a configuration file is
unavailable when a device is powered on for the first time, or if the configuration file is
deleted from the CF card. The autoinstallation feature enables you to deploy multiple
devices from a central location in the network.
For the autoinstallation process to work, you must store one or more host-specific or
default configuration files on a configuration server in the network and have a service
available—typically Dynamic Host Configuration Protocol (DHCP)—to assign an IP address
to the device.
Autoinstallation takes place automatically when you connect an Ethernet or serial port
on a new Juniper Networks device to the network and power on the device. To simplify
the process, you can explicitly enable autoinstallation on a device and specify a
configuration server, an autoinstallation interface, and a protocol for IP address acquisition.
To encrypt the files, we recommend the OpenSSL tool. You can get the OpenSSL tool
at http://www.openssl.org/. To encrypt the file, use the following syntax:
For example, if you are encrypting the active configuration file juniper.conf.gz, the
passphrase is juniper.conf. The openSSL syntax used to encrypt the file is:
Table 24: Interfaces and Protocols for IP Address Acquisition During Autoinstallation
Ethernet LAN interface with High-Level Data Link Control (HDLC) DHCP, BOOTP, or Reverse Address Resolution Protocol
(RARP)
Table 24: Interfaces and Protocols for IP Address Acquisition During Autoinstallation (continued)
Serial WAN interface with HDLC Serial Line Address Resolution Protocol (SLARP)
If the server with the autoinstallation configuration file is not on the same LAN segment
as the new device, or if a specific device is required by the network, you must configure
an intermediate device directly attached to the new device through which the new device
can send Trivial File Transfer Protocol (TFTP), BOOTP, and Domain Name System (DNS)
requests. In this case, you specify the IP address of the intermediate device as the location
to receive TFTP requests for autoinstallation.
1. The new device sends out DHCP, BOOTP, RARP, or SLARP requests on each connected
interface simultaneously to obtain an IP address.
If a DHCP server responds, it provides the device with some or all of the following
information:
• The location of the TFTP (typically), Hypertext Transfer Protocol (HTTP), or FTP
server on which the configuration file is stored.
• The name of the configuration file to be requested from the TFTP server.
If the DHCP server provides only the hostname, a DNS server must be available on
the network to resolve the name to an IP address.
2. After the new device acquires an IP address, the autoinstallation process on the device
attempts to download a configuration file in the following ways:
a. If the DHCP server specifies the host-specific configuration file (boot file)
hostname.conf, the device uses that filename in the TFTP server request. (In the
filename, hostname is the hostname of the new device.) The autoinstallation
process on the new device makes three unicast TFTP requests for hostname.conf.
If these attempts fail, the device broadcasts three requests to any available TFTP
server for the file.
b. If the new device cannot locate hostname.conf, the autoinstallation process unicasts
or broadcasts TFTP requests for a default device configuration file called
c. If network.conf contains no hostname entry for the new device, the autoinstallation
process sends out a DNS request and attempts to resolve the new device's IP
address to a hostname.
d. If the new device can determine its hostname, it sends a TFTP request for the
hostname.conf file.
e. If the new device is unable to map its IP address to a hostname, it sends TFTP
requests for the default configuration file router.conf.
3. After the new device locates a configuration file on a TFTP server, autoinstallation
downloads the file, installs the file on the device, and commits the configuration.
NOTE:
• If you configure the DHCP server to provide only the TFTP server hostname,
add an IP address-to-hostname mapping entry for the TFTP server to the
DNS database file on the DNS server in the network.
• If the new device is not on the same network segment as the DHCP server
(or other device providing IP address resolution), configure an existing
device as an intermediate to receive TFTP and DNS requests and forward
them to the TFTP server and the DNS server. You must configure the LAN
or serial interface on the intermediate device with the IP addresses of the
hosts providing TFTP and DNS service. Connect this interface to the new
device.
license {
autoupdate {
url https://ae1.juniper.net/junos/key_retrieval;
}
}
syslog {
archive size 100k files 3;
user * {
any emergency;
}
file messages {
any notice;
authorization info;
}
file interactive-commands {
interactive-commands any;
}
}
NOTE: The QFX5200 switches only work with HTTP for autoinstallation.
TFTP and FTP protocols are not supported.
• To deploy and update multiple devices from a central location in the network.
You can set up the following configuration files for autoinstallation on the switch:
If the server with the autoinstallation configuration file is not on the same LAN segment
as the new device, or if a specific device is required by the network, you must configure
an intermediate device directly attached to the new switch, through which the new switch
can send TFTP, Boot Protocol (BOOTP), and Domain Name System (DNS) requests. In
this case, you specify the IP address of the intermediate device as the location to receive
TFTP requests for autoinstallation.
1. The switch sends out DHCP or BOOTP requests on each connected interface
simultaneously to obtain an IP address.
If a DHCP server responds to these requests, it provides the switch with some or all
of the following information:
• The location of the (typically) TFTP server, Hypertext Transfer Protocol (HTTP)
server, or FTP server on which the configuration file is stored.
• The name of the configuration file to be requested from the TFTP server.
If the DHCP server provides the server’s hostname, a DNS server must be available
on the network to resolve the name to an IP address.
2. After the switch acquires an IP address, the autoinstallation process on the switch
attempts to download a configuration file in the following ways:
a. If the DHCP server specifies the host-specific configuration file hostname.conf, the
switch uses that filename in the TFTP server request. The autoinstallation process
on the new switch makes three unicast TFTP requests for hostname.conf. If these
attempts fail, the switch broadcasts three requests to any available TFTP server
for the file.
b. If the switch does not locate a hostname.conf file, the autoinstallation process
sends three unicast TFTP requests for a network.conf file that contains the switch’s
hostname-to-IP-address mapping information. If these attempts fail, the switch
broadcasts three requests to any available TFTP server for the file.
c. If the switch fails to find a network.conf file that contains a hostname entry for the
switch, the autoinstallation process sends out a DNS request and attempts to
resolve the switch's IP address to a hostname.
d. If the switch determines its hostname, it sends a TFTP request for the
hostname.conf file.
e. If the switch is unable to map its IP address to a hostname, it sends TFTP requests
for the default configuration file switch.conf. The TFTP request procedure is the
same as for the network.conf file.
3. After the switch locates a configuration file on a TFTP server, the autoinstallation
process downloads the file, installs the file on the switch, and commits the
configuration.
To specify autoinstallation to run when you power on a switch already installed in your
network, you can enable it by specifying one or more interfaces, protocols, and
configuration servers to be used for autoinstallation.
Before you explicitly enable and configure autoinstallation on the switch, perform these
tasks as needed for your network’s configuration:
• Configure a DHCP server on your network to meet your network requirements. You can
configure a switch to operate as a DHCP server. For more information, see Configuring
a DHCP Server on Switches (CLI Procedure).
• Create one of the following configuration files, and store it on a TFTP server (or HTTP
server or FTP server) in the network:
• A host-specific file with the name hostname.conf for each switch undergoing
autoinstallation. Replace hostname with the name of a switch. The hostname.conf
file typically contains all the configuration information necessary for the switch with
this hostname.
• Physically attach the switch to the network using a Gigabit Ethernet port.
• If you configure the DHCP server to provide only the TFTP server hostname, add an IP
address-to-hostname mapping entry for the TFTP server to the DNS database file on
the Domain Name System (DNS) server in the network.
• If the switch is not on the same network segment as the DHCP server (or other device
providing IP address resolution), configure an existing device as an intermediate device
to receive TFTP and DNS requests and forward them to the TFTP server and the DNS
server. You must configure the LAN or serial interface on the intermediate device with
the IP addresses of the hosts providing TFTP and DNS services. Connect this interface
to the switch.
• If you are using hostname.conf files for autoinstallation, you must also complete the
following tasks:
• Configure the DHCP server to provide a hostname.conf filename to each switch. Each
switch uses its hostname.conf filename to request a configuration file from the TFTP
server. Copy the necessary hostname.conf configuration files to the TFTP server.
• Create a default configuration file named network.conf, and copy it to the TFTP
server. This file contains IP-address-to-hostname mapping entries. If the DHCP
server does not send a hostname.conf filename to a new switch, the switch uses
network.conf to resolve its hostname based on its IP address.
Alternatively, you can add the IP-address-to-hostname mapping entry for the switch
to a DNS database file.
The switch uses the hostname to request a hostname.conf file from the TFTP server.
To configure autoinstallation:
1. Specify the URL address of one or more servers from which to obtain configuration
files.
[edit system]
user@switch# set autoinstallation configuration-servers tftp://tftpconfig.example.com
2. Configure one or more Ethernet interfaces to perform autoinstallation and one or two
procurement protocols for each interface. The switch uses the protocols to send a
request for an IP address for the interface:
[edit system]
user@switch# set autoinstallation interfaces ge-0/0/0 bootp
To verify autoinstallation:
1. From the CLI, enter the show system autoinstallation status command.
Action From the CLI, enter the show system autoinstallation status command.
Sample Output
Meaning The output shows the settings configured for autoinstallation. Verify that the values
displayed are correct for the switch when it is deployed on the network.
Requirements
Before you begin:
• Configure a DHCP server on your network to meet your network requirements. You can
configure a device to operate as a DHCP server.
• Create one of the following configuration files, and store it on a TFTP server in the
network (see “Configuration Files” on page 50):
• A host-specific file with the name hostname.conf for each device undergoing
autoinstallation. Replace hostname with the name of a device. The hostname.conf
file typically contains all the configuration information necessary for the device with
this hostname.
• Physically attach the device to the network using one or more of the following interface
types:
• Fast Ethernet
• Gigabit Ethernet
Overview
No configuration is required on a device on which you are performing autoinstallation,
because it is an automated process. However, to simplify the process, you can specify
one or more interfaces, protocols, and configuration servers to be used for autoinstallation.
The device uses these protocols to send a request for an IP address for the interface.
Configuration
CLI Quick To quickly configure this section of the example, copy the following commands, paste
Configuration them into a text file, remove any line breaks, change any details necessary to match your
network configuration, copy and paste the commands into the CLI at the [edit] hierarchy
level, and then enter commit from configuration mode.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
1. Enable autoinstallation and specify the URL address of one or more servers from
which to obtain configuration files.
[edit system]
user@host# set autoinstallation configuration-servers tftp://tftpconfig.sp.com
[edit system]
user@host# set autoinstallation interfaces ge-0/0/0 bootp rarp
Results From configuration mode, confirm your configuration by entering the show system
autoinstallation status command. If the output does not display the intended configuration,
repeat the configuration instructions in this example to correct it.
[edit]
user@host# show system autoinstallation status
Autoinstallation status:
Master state: Active
Last committed file: None
Configuration server of last committed file: 10.25.100.1
Interface:
Name: ge-0/0/0
State: Configuration Acquisition
Acquired:
Address: 192.168.124.75
Hostname: host-ge-000
Hostname source: DNS
Configuration filename: router-ge-000.conf
Configuration filename server: 10.25.100.3
Address acquisition:
Protocol: BOOTP Client
Acquired address: None
Protocol: RARP Client
Acquired address: None
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Verifying Autoinstallation
Purpose Verify that the device has been configured for autoinstallation.
Action From operational mode, enter the show system autoinstallation status command. The
output shows the settings configured for autoinstallation. Verify that the values displayed
are correct for the device when it is deployed on the network.
If you have a new EX2200 or EX3300 switch, you can use a Disk-on-Key USB memory
stick (“USB key”) to configure the switch, using either a text configuration file or an XML
configuration file.
Before you begin this task, ensure you have the following items:
• A Junos Space platform to generate a valid XML file (if you will be installing the XML
configuration file).
• A Disk-on-Key device with one of the following 16-bit or 32-bit FAT file systems:
• FAT32
• FAT32, LBA-mapped
To configure the switch by using a Disk-on-Key device that contains the configuration
file in text format:
1. Using a text editor on the PC or laptop, create the configuration file, named
juniper-config.txt, as a sequence of configuration commands (set commands). To
reuse the configuration from another switch, save the configuration in configuration
mode as a sequence of configuration commands on the switch using the show | display
set | save filename command and then copying the file to the PC or switch as
juniper-config.txt.
NOTE: Ensure that the first line in the juniper-config.txt is [edit] and that
the last line in the file is commit and-quit.
3. Plug the Disk-on-Key device into the USB port on the switch.
5. Observe the LEDs on the Disk-on-Key device, and wait as the switch starts and then
accesses the Disk-on-Key device.
The switch reads the juniper-config.txt file from the Disk-on-Key device and commits
the configuration.
NOTE: Before you remove the Disk-on-Key device from the switch, ensure
that the configuration has been applied to the switch. You can issue the
show configuration operational mode command on the switch to see the
configuration.
To configure the switch by using a Disk-on-Key device that contains the configuration
file in XML format:
[edit]
user@switch# load factory-default
[edit]
user@switch# set system autoinstallation delete-upon-commit
[edit]
user@switch# set system root-authentication plain-text-password
[edit]
user@switch# commit
4. Using the Junos Space platform, create a valid configuration file in XML format, and
name it juniper-config.xml.
6. Plug the Disk-on-Key device into the USB port on the switch.
8. Observe the LEDs on the Disk-on-Key device, and wait as the switch starts and then
accesses the Disk-on-Key device.
The switch reads the juniper-config.xml file from the Disk-on-Key device and commits
the configuration.
NOTE: Before you remove the Disk-on-Key device from the switch, ensure
that the configuration has been applied to the switch . You can issue the
show configuration operational mode command on the switch to see the
configuration.
and ACX Series Universal Access Routers, that are managed by the controller are
considered.
To configure autoinstallation:
1. Load the JNU factory-default configuration file on the satellite device to enable the
device to function in JNU mode.
An override operation discards the current candidate configuration and loads the
configuration in the specified filename or the one that you type at the terminal. When
you use the override option and commit the configuration, all system processes reparse
the configuration.
2. Specify the URL address of one or more servers from which to obtain configuration
files:
[edit system]
user@host# set autoinstallation configuration-servers tftp://tftpconfig.sp.com
[edit system]
user@host# set autoinstallation interfaces ge-0/0/0 bootp
4. Set the root password, entering a clear-text password that the system will encrypt,
a password that is already encrypted, or an SSH public key string.
[edit system]
user@host# set root-authentication plain-text-password
New password: type password here
Retype new password: retype password here
[edit]
root# set system root-authentication encrypted-password encrypted-password
[edit]
root# set system root-authentication ssh-rsa key
5. Save the Junos OS configuration changes, activate the configuration on the device,
and exit configuration mode, using the commit-and-quit command.
[edit]
user@host# commit-and-quit
When the satellite device reboots, it triggers the autoinstallation mechanism to retrieve
its initial configuration and downloads the settings from the configuration file stored on
a configuration server in the network. On the controller, you must enable the FTP service
by using the set system services ftp command and save the configuration on the satellite
device at the /var/jnu/ directory.
The following configuration is generated on the satellite device as a result of the preceding
procedure to configure autoinstallation:
system {
autoinstallation {
traceoptions {
flags {
all;
}
file autod;
level all;
}
delete-after-commit; /* After initial config, no need to keep */
interfaces {
ge-* {
bootp;
}
xe-* {
bootp;
}
configuration-servers {
"ftp://192.168.0.1/var/jnu/sat1.conf";
}
}
}
root-authentication {
encrypted-password "$ABC123";
}
}
Related • Autoinstallation of Satellite Devices in a Junos Node Unifier Group on page 300
Documentation
• Autoinstallation Process on Satellite Devices in a Junos Node Unifier Group on page 298
• configuration-servers
Autoinstallation provides automatic configuration for a new router that you connect to
the network and power on, or for a router configured for autoinstallation. The
autoinstallation process begins any time a router is powered on and cannot locate a valid
configuration file in the CompactFlash card. Typically, a configuration file is unavailable
when a router is powered on for the first time, or if the configuration file is deleted from
the CompactFlash card. The autoinstallation feature enables you to deploy multiple
routers from a central location in the network.
For the autoinstallation process to work, you must store one or more host-specific or
default configuration files on a configuration server in the network and have a service
available—typically Dynamic Host Configuration Protocol (DHCP)—to assign an IP address
to the router.
If the server with the autoinstallation configuration file is not on the same LAN segment
as the new router, or if a specific router is required by the network, you must configure
an intermediate router directly attached to the new router, through which the new router
can send HTTP, FTP, Trivial File Transfer Protocol (TFTP), BOOTP, and Domain Name
System (DNS) requests. In this case, you specify the IP address of the intermediate router
as the location to receive HTTP, FTP, or TFTP requests for autoinstallation.
1. The new router sends out DHCP, BOOTP, or RARP requests on each connected
interface simultaneously to obtain an IP address.
If a DHCP server responds, it provides the router with some or all of the following
information:
• The location of the TFTP (typically), HTTP, or FTP server on which the configuration
file is stored.
• The name of the configuration file to be requested from the HTTP, FTP, or TFTP
server.
If the DHCP server provides only the hostname, a DNS server must be available on
the network to resolve the name to an IP address.
2. After the new router acquires an IP address, the autoinstallation process on the router
attempts to download a configuration file in the following ways:
a. If the configuration file is specified as a URL, the router fetches the configuration
file from the URL by using HTTP, FTP, or TFTP, depending on the protocol specified
in the URL.
b. If the DHCP server specifies the host-specific configuration file (boot file)
hostname.conf, the router uses that filename in the TFTP server request. (In the
filename, hostname is the hostname of the new router.) The autoinstallation process
on the new router makes three unicast TFTP requests for hostname.conf. If these
attempts fail, the router broadcasts three requests to any available TFTP server
for the file.
c. If the new router cannot locate hostname.conf, the autoinstallation process unicasts
or broadcasts TFTP requests for a default router configuration file called
network.conf, which contains hostname-to-IP address mapping information, to
attempt to find its hostname.
d. If network.conf contains no hostname entry for the new router, the autoinstallation
process sends out a DNS request and attempts to resolve the new router’s IP
address to a hostname.
e. If the new router can determine its hostname, it sends a TFTP request for the
hostname.conf file.
f. If the new router is unable to map its IP address to a hostname, it sends TFTP
requests for the default configuration file router.conf.
3. After the new router locates a configuration file on a TFTP server, the autoinstallation
process downloads the file, installs the file on the router, and commits the
configuration.
Related • Autoinstallation of Satellite Devices in a Junos Node Unifier Group on page 300
Documentation
• Configuring Autoinstallation on JNU Satellite Devices on page 295
• configuration-servers
In a Junos Node Unifier (JNU) group that contains an MX Series router as a controller that
manages satellite devices, such as EX Series Ethernet Switches, QFX Series devices, and
ACX Series Universal Access Routers, the autoinstallation functionality is supported for
the satellite devices. JNU has an autoinstallation mechanism that enables a satellite
device to configure itself out-of-the-box with no manual intervention, using the
configuration available either on the network or locally through a removable media, or
using a combination of both. This autoinstallation method is also called the zero-touch
facility.
• The router can be sent from the warehouse to the deployment site without any
preconfiguration steps.
• The procedure required to deploy the device at the cell site is simplified, resulting in
reduced operational and administrative costs.
• You can roll out large numbers of these devices in a very short time.
The factory default setting is autoinstallation-enabled. After you make the first
configuration to the router, you can do either of the following:
• A JNU factory default file, jnu-factory.conf, is present in the /etc/config/ directory and
contains the configuration to perform autoinstallation on satellite devices. The
zero-touch configuration can be disabled by including the delete-after-commit
statement at the [edit system autoinstallation] hierarchy level and committing the
configuration. This way, the saved configuration is used the next time the system
reboots.
• Alternatively, if the router must get the configuration from the server each time a system
reboot occurs, the zero-touch configuration must not be changed (that is, you must
not include the delete-after-commit statement at the [edit system autoinstallation]
hierarchy level and commit the settings).
Related • Autoinstallation Process on Satellite Devices in a Junos Node Unifier Group on page 298
Documentation
• Configuring Autoinstallation on JNU Satellite Devices on page 295
• configuration-servers
Purpose After you have configured autoinstallation, display the status of autoinstallation on a
satellite device, such as an ACX Series router, an EX Series switch, or a QFX Series device,
in a Junos Node Unifier (JNU) group that is managed by a controller, which is an MX Series
router.
Action From the CLI, enter the show system autoinstallation status command. The following
example displays the autoinstallation settings of an ACX Series router that operates as
a satellite in a JNU group.
Sample Output
Meaning The output shows the settings configured for autoinstallation. Verify that the values
displayed are correct for the router when it is deployed on the network.
Related • Autoinstallation of Satellite Devices in a Junos Node Unifier Group on page 300
Documentation
• Autoinstallation Process on Satellite Devices in a Junos Node Unifier Group on page 298
• configuration-servers
The Routing Engines RE-MX-X6, RE-MX-X8, RE-PTX-X8 and RCBPTX not only provide
increased control plane scalability and performance but also provide virtualization
capabilities to the Junos OS infrastructure to support greater computing demands.
On the RE-MX-X6, RE-MX-X8, RE-PTX-X8, and RCBPTX Routing Engines, one instance
of Junos OS runs as a VM over a Linux-based host (VM host) and serves as the VM
operating in the administrative context. Junos OS manages all configurations, chassis
control, communication with the host OS, and user interface command execution, thus
providing near-native Junos OS experience to the end user.
Table 25 on page 304 lists the hardware specifications of the Routing Engines.
Table 25: Hardware Specifications of the RE-MX-X6, RE-MX-X8, RE-PTX-X8, and RCBPTX, Routing Engines
RCBPTX PTX3000 • Wellsburg PCH-based Routing Engine with 64-GB DRAM and two
64-GB SSDs
• Multi-core Haswell CPU
Figure 19 on page 305 illustrates the architecture of RE-MX-X6, RE-MX-X8, and RE-PTX-X8
Routing Engines. It comprises the following components:
The server at the hardware layer contains the physical network interface cards (NICs),
CPUs, memory, and Ethernet management port. The NICs support hardware virtualization
based on single root I/O virtualization (SR-IOV). With SR-IOV, the physical NICs (known
as a physical functions) are managed by the host, while the virtual functions are managed
by the guest OS. Over the hardware layer, a Linux-based OS provides the host environment
along with the kernel-based virtual machine (KVM) and Quick Emulator (QEMU). This
host OS manages the boot complex, CPU memory storage, and various other hardware
components such as the physical functions. Junos OS runs as guest OS, manages the
virtual functions, and serves as the administrative framework. Additionally, it also provides
the interface for managing the host and the hypervisor.
The additional applications and utilities running on the host OS assist in providing the
following functionality:
While continuing to provide the same end-user experience, the new architecture provides
a better performing Routing Engine.
Platform Virtualization
Platform virtualization by the introduction of a middle layer that comprises the host OS
and the KVM (or the hypervisor).
Of the two SSDs, one SSD is the primary disk and the other SSD is the backup disk. Two
sets of software boot images are available on the primary disk. You can use one set of
images for booting and the other set of images for upgrade purposes. Until a software
upgrade or a software rollback is performed, the BIOS is programmed to boot from the
same set of images on the SSD.
Both the SSDs are partitioned to provide host boot partition, root partition, and partition
for the guest image storage. The host boot partition contains the boot loader, which is
the software responsible for booting the OS, Linux kernel, and RAM file system. The root
partition contains the root file system for the host OS.
Each SSD partition contains more than one set of fully functional host software. In case
of a boot failure on the primary SSD, the router can boot by using the snapshot available
on the alternate SSD. This snapshot can be generated by a fresh installation or by using
the request vmhost snapshot command.
Starting in Junos OS Release 18.1R1, the Routing Engines on the MX240, MX480,MX960,
MX2010, MX2020, and PTX5000 support Secure Boot.
The Routing Engines with Secure Boot support have both RAM and SSD upgraded to
128GB and 2x200GB respectively. The increased SSD size facilitates increased storage
of core and log files.
The following table provides information on the SSD size for different Routing Engines:
RE-S-X6-128G-S 2x200GB
RE-PTX-X8-128G-S 2x200GB
RE-MX2K-X8-64G-LT 2x100GB
RE-MX2K-X8-128G-S 2x200GB
You can use the show vmhost hardware command to display the increased RAM size,
SSD size, and other hardware information.
The following illustrations explains the partition of the host to facilitate the increased
storage of core files and log files. Figure 21 on page 308 illustrates the partition of the host
on MX240, MX480, MX960 and PTX5000 routers with the 200-GB SSDs. A virtual disk
of size 56-GB will be allocated from VM partition to the guest as var-config.disk. The
current size of this disk is 15-GB.
Figure 21: Host partition table for Routing Engines with 200-GB SSDs
g200090
Root (/) Junos VM Spare
8G 32G 141.7G 8M
Figure 22 on page 308 illustrates the storage allocation of the guest VM.
g200093
OAM Root Swap Config VAR
2G 10G 3G 1.6G 54G
NOTE: For Routing Engines with 50GB SSD, the host partition remains as–is.
Figure 23 on page 308 and Figure 24 on page 308illustrates the host partition table and the
storage allocation of the guest VM for the MX2010 and MX2020 routers respectively.
Figure 23: Host partition table for Routing Engines on MX2010 and MX2020 routers with
100GB SSD
g200091
Root (/) Junos VM Spare
7.1G 32G 49.4G 8M
A virtual disk of size 32-GB is allocated from VM partition to the guest Junos OS as
var-config.disk.
A reformatting of the SSD is required to implement the enhancement of the /var size.
The upgrade can be implemented by any of the following methods:
• Installation from SSD Disk2-Boot the host OS from the backup disk (SSD Disk2) and
install the junos-vmhost-install-x.tgz image.
• Upgrading the SSD Firmware on Routing Engines with VM Host Support on page 320
Autorecovery
The automatic recovery (autorecovery) feature provides the following functions:
During the process of recovery, the host OS tries to launch the Junos VM from the image
available on the primary disk. However, if the Junos VM fails to launch, the host OS
attempts to launch the Junos VM from the snapshot of the host OS image and Junos OS
image available in the backup disk, provided request vmhost snapshot was the last
operation performed. If the backup disk does not contain the snapshot, the host OS
attempts to launch the Junos VM from the software available in the alternate set in the
primary disk, provided request vmhost upgrade was the last operation performed.
The autorecovery feature is enabled by default on the guest OS. If you need to disable
autorecovery—for example, to examine the failure state for debugging—use the following
command:
Related • Disabling Autorecovery on Routing Engines with VM Host Support on page 322
Documentation
Guest OS reboot implies that only the Junos OS is rebooted, and that the host OS is up
and running. The following are a few of the reasons that trigger a guest OS reboot:
• VJUNOS watchdog from host—Guest reboot due to emulated watchdog timer expiry
Host OS reboot implies that both the host OS and the guest OS (here, Junos OS) are
rebooted. The following are a few reasons that trigger a host OS and guest OS reboot:
• Hypervisor reboot
• Reset-button reset—Reboot triggered by the pressing of the reset button on the front
panel.
• Thermal shutdown
You can find the reason for the reboot by using the show chassis routing-engine command
or the show vmhost uptime command.
For example:
host@router> show vmhost uptime re0 | match “Vmhost last reboot reason”
Vmhost last reboot reason: 0x2000:hypervisor reboot
If the Routing Engine finishes booting and if you need to power off the router again, run
the request vmhost power-off command. If you want the Routing Engine to reboot, use
the request vmhost reboot command.
The boot process involves configuring the basic parameters through the console port
and filename synchronization.
After hardware and field-programmable gate array (FPGA) level initialization is complete,
the Unified Extensible Firmware Interface (UEFI) selects the boot device to launch the
host OS. The host OS launches the default guest Junos OS, which is the administrative
context for the user. After the router has powered on completely, a login prompt is
displayed on the console port.
Boot Sequence
The Routing Engine boots from the storage media in the following sequence:
• USB
Related • Creating an Emergency Boot Device for Routing Engines with VM Host Support on
Documentation page 318
For more information about configuring the router’s basic properties, see Accessing a
Junos OS Device the First Time.
• If the Junos OS-configured hostname has less than or equal to 58 characters, then the
hostname supported by the host OS (Linux) has the format Junos hostname-node.
For example, if the Junos OS-configured hostname is xx..xx, the hostname is xx..xx-node.
• If the Junos OS-configured hostname is greater than 58 characters in length, then the
synchronization process truncates characters from the 59th character onward and
replaces the truncated characters with -node.
• Creating an Emergency Boot Device for Routing Engines with VM Host Support on
page 318
VM Host Installation
You can install the Junos OS software package and host software package on the router.
The following installation options are available:
• Fresh installation—This installation method can be used for factory installation as well
as for recovery after corruption. Fresh installation can be done using Preboot Execution
Environment (PXE)/NetBoot or a USB install media package. This method of installation
installs the host OS, tools, and the Junos VMs.
You can choose to use the USB disk installation method when the router fails to reboot
because of internal media failure or when there is no installed Junos OS. For more
information, see “Creating an Emergency Boot Device for Routing Engines with VM
Host Support” on page 318.
On a fresh installation using USB, the following directories are populated with the Junos
OS image on both the SSDs:
• Current.p
• Backup.p
• Backup.b
VM Host Upgrade
Every Junos OS release is a group of files bundled together. The Routing Engines
RE-MX-X6, RE-MX-X8, and RE-PTX-X8 support only the 64-bit version of Junos OS.
NOTE: If you have important files in directories other than /config and /var,
copy the files to a secure location before upgrading the router. The files under
/config and /var (except /var/etc) are preserved after the VM host upgrade.
• Junos OS upgrade—Use the regular junos-install-x.tgz image upgrade. When you use
this method, you must specify the regular package in the request system software add
command. If the host software does not meet the minimum version as specified in the
regular upgrade package, then you need to upgrade the host OS as well.
The upgrade applies to one partition of the SSD (primary). In case of a boot failure on
the primary SSD, the router can boot by using the snapshot available on the alternate
SSD.
When the upgrade happens through a VM host package, the build components are
compatible with each other. However, during a subcomponent or a package upgrade,
such as a Junos OS image upgrade, you must check the installed base version and
ensure the compatibility. Each relevant subpackage has the logic to fetch the VM host
version and compare it with the supported version. In case of a version compatibility
mismatch, a suitable warning is displayed and the installation is aborted.
The following example illustrates the upgrade operation. You can Install multiple software
packages and software add-on packages at the same time.
VM Host Rollback
You can revert to the software version that was loaded at the last successful request
vmhost software add operation. You can roll back to the previous set of software packages,
including the host OS packages, by using the request vmhost software rollback command.
The following example illustrates the software rollback operation. The Routing Engine
that has booted from the primary disk by using the set p had booted using the set b before
the upgrade.
Version: set p
VMHost Version: 2.951
VMHost Root: vmhost-x86_64-15.1I20160210_2212_builder
VMHost Core: vmhost-core-x86_64-15.1I20160210_2212_builder
kernel: 3.10.79-ovp-rt74-WR6.0.0.20_preempt-rt
Junos Disk: junos-install-x86-64-15.1F5.5
Version: set b
VMHost Version: 2.953
VMHost Root: vmhost-x86_64-15.1F520160222_1052_builder
VMHost Core: vmhost-core-x86_64-15.1F520160222_1052_builder
kernel: 3.10.79-ovp-rt74-WR6.0.0.20_preempt-rt
Junos Disk: junos-install-x86-64-15.1F5.6
Version: set p
VMHost Version: 2.951
VMHost Root: vmhost-x86_64-15.1I20160210_2212_builder
VMHost Core: vmhost-core-x86_64-15.1I20160210_2212_builder
kernel: 3.10.79-ovp-rt74-WR6.0.0.20_preempt-rt
Junos Disk: junos-install-x86-64-15.1F5.5
Version: set b
VMHost Version: 2.953
VMHost Root: vmhost-x86_64-15.1F520160222_1052_builder
VMHost Core: vmhost-core-x86_64-15.1F520160222_1052_builder
kernel: 3.10.79-ovp-rt74-WR6.0.0.20_preempt-rt
Junos Disk: junos-install-x86-64-15.1F5.6
Version: set p
VMHost Version: 2.951
VMHost Root: vmhost-x86_64-15.1I20160210_2212_builder
VMHost Core: vmhost-core-x86_64-15.1I20160210_2212_builder
kernel: 3.10.79-ovp-rt74-WR6.0.0.20_preempt-rt
Junos Disk: junos-install-x86-64-15.1F5.5
Version: set b
VMHost Version: 2.953
VMHost Root: vmhost-x86_64-15.1F520160222_1052_builder
VMHost Core: vmhost-core-x86_64-15.1F520160222_1052_builder
kernel: 3.10.79-ovp-rt74-WR6.0.0.20_preempt-rt
Junos Disk: junos-install-x86-64-15.1F5.6
VM Host Snapshot
The snapshot feature enables you to create copies of the currently running and active
file system partitions on a router.
On the router, you can back up the snapshot of the host OS image along with the Junos OS
image. You can use the request vmhost snapshot command to create a VM host recovery
snapshot on the backup disk.
If the state of the primary disk (disk1) is good and the backup disk (disk2) has to be
recovered then use the request vmhost snapshot command to recover the backup disk
assuming the Routing Engine is booted from the primary disk. If the state of the secondary
disk is not known or the file systems in disk are not in a consistent state, then include
partition option in the command i.e. request vmhost snapshot partition.
If the state of the backup disk (disk2) is good and the primary disk (disk1) has to be
recovered then use the request vmhost snapshot recovery command to recover the primary
disk assuming the Routing Engine is booted from the backup disk. If the state of the
primary disk is not known or the partition tables are in bad condition, then include partition
option in the command i.e. request vmhost snapshot recovery partition.
To boot from desired disk, you can execute request vmhost reboot {disk1, disk2}command.
You can install the host OS, tools, and the Junos virtual machines (VMs) on the routers
with RE-MX-X6, RE-MX-X8, and RE-PTX-X8 Routing Engines by using the Preboot
Execution Environment (PXE) boot method. This is one of the methods used for a fresh
installation. A PXE boot prepares a client/server environment to boot devices by using
a network interface that is independent of available data storage devices or installed
operating systems. The image of the operating system is stored on a TFTP server.
1. Copy the downloaded installation media to the /var/tmp directory in the PXE boot
server.
scp
/volume/build/junos/15.1/release/15.1F3.9/ship/junos-vmhost-install-net-x86-64-15.1F3.9.tgz
user@host:/var/tmp/
2. Log in to the PXE boot server and verify the installation file.
4. Remove the previously installed files, if any, from the /tftpboot directory.
user@host> rm -f
/tftpboot/{vmhost-version.sh,bootpxe64.efi,vmhost-version,grub.cfg,initramfs,vmlinuz}
user@host>ls -lh /tftpboot//
total 45M
6. Rename or delete the previously installed root file system/scripts from the /var/install
directory. Create a new /var/install directory.
./vm/note
./vm/grub.cfg.ngre
./vm/vsmartd-1.0-0.x86_64.rpm
./vm/re_fpga-1.0-0.x86_64.rpm
./vm/veccd-1.0-0.x86_64.rpm
./vmhost-version.sh
./vmhost/
./vmhost/vmhost-x86_64-15.1I20151019_1021_builder.img.gz
...
...
./junos/junos-mtre-upgrade.sh
./vmhost-core-x86_64-15.1I20151019_1021_builder.tgz
./junos/
./junos/junos-install-x86-64-15.1F3.9.img.gz
8. Set permissions for the files in the /var/install and /tftpboot directories.
user@host> exit
Creating an Emergency Boot Device for Routing Engines with VM Host Support
If Junos OS on your router is damaged during loading in a way that prevents it from loading
completely, you can use the emergency boot device to revive the router. The emergency
boot device repartitions the primary disk and reloads a fresh installation of Junos OS. For
RE-MX-X6, RE-MX-X8, RE-PTX-X8, and RCBPTX Routing Engines, you can use a USB
storage device with at least 8 GB of free space to create an emergency boot device.
2. Insert the USB storage device into the router’s USB port.
start shell
cd /var/tmp
4. Log in as su:
su [enter]
password: [enter SU password]
where:
The following code example can be used to create an emergency boot device by using
a USB storage device:
dd if=/path/to/junos-vmhost-install-usb-mx-x86-64-15.1F6.8.img of=/dev/da0
bs=4M
exit
Starting in Junos OS Release 17.2R1, you can upgrade the solid-state drive (SSD) firmware
on MX Series routers with the RE-S-X6-64G and RE-MX2K-X8-64G Routing Engines. A
set of two SSDs, disk1 and disk2 , is available for normal functioning of the Routing Engine.
This topic shows how to perform the upgrade.
NOTE: You should only upgrade SSD firmware under the direction of a Juniper
Networks support representative.
Before you begin check the current firmware version of the SSD.
If the value of Current version is less than the value of Available version then the following
procedure can be used for the SSD firmware upgrade.
If the file has been obtained from JTAC, use FTP or SCP to load the firmware file on
the device. Save the file in the /var/tmp directory.
NOTE: You should upgrade the SSD on a master Routing Engine only. For
upgrading firmware on the backup Routing Engine, switch mastership
using the following command and then log in to the backup Routing Engine.
Then, monitor the upgrade status using the show system firmware command.
After a successful upgrade, confirm that the Current version and Available version of
the SSD firmware are identical.
Monitor the upgrade status using the show system firmware command.
After a successful upgrade, confirm that the Current version and Available version of
the SSD firmware are identical.
17.2R1 Starting in Junos OS Release 17.2R1, you can upgrade the solid-state drive
(SSD) firmware on MX Series routers with the RE-S-X6-64G and
RE-MX2K-X8-64G Routing Engines.
The autorecovery feature helps recover the Junos OS automatically in the event of a
corruption, thereby ensuring that the Junos OS is available for operations and management
always. The host Junos OS tries to launch the Junos VM from the image available on the
primary disk. However, if the guest Junos OS fails to launch, the host OS attempts to
launch the Junos VM from the snapshot of the host OS image and Junos OS image
available in the backup disk, provided request vmhost snapshot was the last operation
performed. If the backup disk does not contain the snapshot, the host OS attempts to
launch the Junos VM from the software available in the alternate set in the primary disk,
provided request vmhost upgrade was the last operation performed.
The autorecovery feature is enabled by default on the guest Junos OS. For debugging
purposes, if you do not want the host to recover the Junos VM automatically, you can
disable the auto-recovery by the host.
To disable the guest auto-recovery, include the no-auto-recovery statement at the [edit
vmhost] hierarchy level:
[edit vmhost]
no-auto-recovery
With the virtualization of the Routing Engine, Junos OS supports new request and show
commands associated with the host and hypervisor processes. The commands are
related to:
The following request commands are not available on the RE-MX-X6, RE-MX-X8, and
RE-PTX-X8 Routing Engines:
The following commands can be used only for the guest Junos OS:
You can use the following new request vmhost commands on the host OS:
Some Junos OS software features require a license to activate the feature. To enable a
licensed feature, you need to purchase, install, manage, and verify a license key that
corresponds to each licensed feature. To conform to Junos OS feature licensing
requirements, you must purchase one license per feature per device. The presence of the
appropriate software license key on your device determines whether you are eligible to
configure and use the licensed feature.
and your device uses the licensed feature for the first time, but not necessarily when you
install the license. After the grace period expires, the system generates system log
messages saying that the feature requires a license. To clear the error message and use
the licensed feature properly, you must install and verify the required license.
Data center customers, for example those using the QFX platform, use universal licenses.
Starting in Junos OS Release 15.1, to ensure that license keys are used properly, Juniper
Networks license key generation is enhanced to specify a customer ID in the license key.
You can see the customer ID displayed in the output of the show system license command.
For information about how to purchase software licenses, contact your Juniper Networks
sales representative.
15.1 Starting in Junos OS Release 15.1, to ensure that license keys are used properly,
Juniper Networks license key generation is enhanced to specify a customer
ID in the license key.
When you purchase a license for a Junos OS feature that requires a separate license, you
receive a license key.
• License ID—Alphanumeric string that uniquely identifies the license key. When a license
is generated, it is given a license ID.
• License data—Block of binary data that defines and stores all license key objects.
For example, in the following typical license key, the string Junos204558 is the license
ID, and the trailing block of data is the license data:
The license data defines the device ID for which the license is valid and the version of the
license.
Related • Managing Licenses for the EX Series Switch (CLI Procedure) on page 357
Documentation
• Managing Licenses for the EX Series Switch (J-Web Procedure)
To enable and use some of the Juniper Networks operating system (Junos OS) features,
you must purchase, install, and manage separate software licenses. If the switch has the
appropriate software license, you can configure and use these features.
The Junos OS feature license (that is, the purchased authorization code) is universal.
However, to conform to Junos OS feature licensing requirements, you must install a
unique license key (a combination of the authorization code and the switch’s serial
number) on each switch.
For a Virtual Chassis deployment, two license keys are recommended for redundancy—one
for the device in the master role and the other for the device in the backup role:
• In an EX8200 Virtual Chassis, the devices in the master and backup roles are always
XRE200 External Routing Engines.
• In all other Virtual Chassis, the devices in the master and backup roles are switches.
You do not need additional license keys for Virtual Chassis member switches that are in
the linecard role or for the redundant Routing Engine (RE) modules or the redundant
Switch Fabric and Routing Engine (SRE) modules in an EX8200 member switch.
NOTE: You are required to provide the 12-digit serial number when purchasing
a license for an XRE200 External Routing Engine in an EX8200 Virtual Chassis.
The serial number listed on the XRE200 External Routing Engine serial ID
label is 16 digits long. Use the last 12 digits of the 16-digit serial number to
purchase the license.
You can use the show chassis hardware command output to display the 12-digit
serial number of the XRE200 External Routing Engine.
• IGMP (Internet Group Management Protocol) version 1 (IGMPv1), IGMPv2, and IGMPv3
• Protocol Independent Multicast (PIM) dense mode, PIM source-specific mode, PIM
sparse mode
• Virtual Router
Table 26 on page 328 lists the EFLs that you can purchase for EX2200 switch models. If
you have the license, you can run all of the enhanced software features mentioned above
on your EX2200 switch.
EX2200-C-12P-2G EX-12-EFL
EX2200-C-12T-2G
EX2200-24T-4G EX-24-EFL
EX2200-24P-4G
EX2200-24T-DC-4G
EX2200-48T-4G EX-48-EFL
EX2200-48P-4G
To use the following features on the EX2300 switches, you must install an EFL:
• IGMP (Internet Group Management Protocol) version 1 (IGMPv1), IGMPv2, and IGMPv3
• IPv6 routing protocols: Multicast Listener Discovery version 1 and 2 (MLD v1/v2), OSPFv3,
PIM multicast, VRRPv3
• OSPF v2/v3
• Protocol Independent Multicast (PIM) dense mode, PIM source-specific mode, PIM
sparse mode
Table 27 on page 329 lists the EFLs that you can purchase for EX2300 switch models. If
you have the license, you can run all of the enhanced software features mentioned above
on your EX2300 switch.
EX2300-24T EX-24-EFL
EX2300-24P
EX2300-C-12P
EX2300-C-12T
EX2300-48T EX-48-EFL
EX2300-48P
To use the following features on the EX3300 switches, you must install an EFL:
• IGMP (Internet Group Management Protocol) version 1 (IGMPv1), IGMPv2, and IGMPv3
• IPv6 routing protocols: Multicast Listener Discovery version 1 and 2 (MLD v1/v2), OSPFv3,
PIM multicast, VRRPv3, virtual router support for unicast and filter-based forwarding
(FBF)
• OSPFv1/v2
• Protocol Independent Multicast (PIM) dense mode, PIM source-specific mode, PIM
sparse mode
• Virtual Router
Table 28 on page 330 lists the EFLs that you can purchase for EX3300 switch models. If
you have the license, you can run all of the enhanced software features mentioned above
on your EX3300 switch.
EX3300-24T EX-24-EFL
EX3300-24P
EX3300-24T-DC
EX3300-48T EX-48-EFL
EX3300-48T-BF
EX3300-48P
To use the following feature on EX3300 switches, you must install an AFL:
Table 29 on page 331 lists the AFLs that you can purchase for EX3300 switch models. For
EX3300 switches, you must purchase and install a corresponding EFL along with the AFL
to enable the advanced license features. If you have both these licenses, you can run all
of the advanced software features mentioned above on your EX3300 switch.
EX3300-24T EX-24-AFL
EX3300-24P
EX3300-24T-DC
EX3300-48T EX-48-AFL
EX3300-48T-BF
EX3300-48P
To use the following features on the EX3400 switches, you must install an EFL:
• IGMP (Internet Group Management Protocol) version 1 (IGMPv1), IGMPv2, and IGMPv3
• IPv6 routing protocols: : Multicast Listener Discovery version 1 and 2 (MLD v1/v2),
OSPFv3, PIM multicast, VRRPv3, virtual router support for unicast and filter-based
forwarding (FBF)
• OSPF v2/v3
• Protocol Independent Multicast (PIM) dense mode, PIM source-specific mode, PIM
sparse mode
• Virtual Router
Table 30 on page 331 lists the EFLs that you can purchase for EX3400 switch models. If
you have the license, you can run all of the enhanced software features mentioned above
on your EX3400 switch.
EX3400-24T EX-24-EFL
EX3400-24P
EX3400-48T EX-48-EFL
EX3400-48P
EX3400-48T-AFI
To use the following features on the EX4300 switches, you must install an EFL:
• IGMP (Internet Group Management Protocol) version 1 (IGMPv1), IGMPv2, and IGMPv3
• OSPFv2/v3
• Protocol Independent Multicast (PIM) dense mode, PIM source-specific mode, PIM
sparse mode
• Virtual Router
Table 31 on page 332 lists the EFLs that you can purchase for EX4300 switch models. If
you have the license, you can run all of the enhanced software features mentioned above
on your EX4300 switch.
EX4300-24T EX4300-24-EFL
EX4300-24P
EX4300-48P EX4300-48-EFL
EX4300-48T
EX4300-48T-AFI
EX4300-48T-DC
EX4300-48T-DC-AFI
EX4300-32F EX4300-32F-EFL
EX4300-32F-DC
To use the following features on EX4300 switches, you must install an AFL:
Table 32 on page 333 lists the AFLs that you can purchase for EX4300 switch models. For
EX4300 switches, you must purchase and install a corresponding EFL along with the
AFL to enable the advanced license features. If you have both these licenses, you can
run all of the advanced software features mentioned above on your EX4300 switch.
EX4300-24T EX4300-24-AFL
EX4300-24P
EX4300-48P EX4300-48-AFL
EX4300-48T
EX4300-48T-AFI
EX4300-48T-DC
EX4300-48T-DC-AFI
EX4300-32F EX4300-32F-AFL
EX4300-32F-DC
You must download a MACsec feature license to enable MACsec. The MACsec feature
license is an independent feature license; the enhanced feature licenses (EFLs) or
advanced feature licenses (AFLs) that must be purchased to enable some features on
EX Series switches cannot be purchased to enable MACsec.
To purchase a feature license for MACsec, contact your Juniper Networks sales
representative (https://www.juniper.net/us/en/contact-us/sales-offices). The Juniper
sales representative will provide you with a feature license file and a license key.
Table 33 on page 333 lists the AFLs that you can purchase for EX4600 switch models.
EX4600-40F EX4600-AFL
You must download a MACsec feature license to enable MACsec. The MACsec feature
license is an independent feature license; the enhanced feature licenses (EFLs) or
advanced feature licenses (AFLs) that must be purchased to enable some features on
EX Series switches cannot be purchased to enable MACsec.
To purchase a feature license for MACsec, contact your Juniper Networks sales
representative (https://www.juniper.net/us/en/contact-us/sales-offices). The Juniper
sales representative will provide you with a feature license file and a license key.
Features Requiring a License on EX3200, EX4200, EX4500, EX4550, EX6200, EX8200, and
EX9200 Switches
To use the following features on EX3200, EX4200, EX4500, EX4550, EX8200, and
EX9200 switches, you must install an advanced feature license (AFL):
• IPv6 routing protocols: IS-IS for IPv6, IPv6 BGP, IPv6 for MBGP
To use the following features on Juniper Networks EX6200 Ethernet Switches, you must
install an advanced feature license (AFL):
Table 34 on page 334 lists the AFLs that you can purchase for EX3200, EX4200, EX4500,
EX4550, EX6200, EX8200, and EX9200 switches. If you have the license, you can run
all of the advanced software features mentioned above on your EX3200, EX4200,
EX4500, EX4550, EX6200, EX8200, or EX9200 switch. An EFL is not applicable to this
range of switches.
Table 34: Junos OS AFL Part Number on EX3200, EX4200, EX4500, EX4550, EX6200,
EX8200, and EX9200 Switches
EX3200-24P EX-24-AFL
EX3200-24T
EX4200-24F
EX4200-24P
EX4200-24PX
EX4200-24T
Table 34: Junos OS AFL Part Number on EX3200, EX4200, EX4500, EX4550, EX6200,
EX8200, and EX9200 Switches (continued)
EX3200-48P EX-48-AFL
EX3200-48T
EX4200-48F
EX4200-48P
EX4200-48PX
EX4200-48T
EX4500-40F-BF EX-48-AFL
EX4500-40F-BF-C
EX4500-40F-FB
EX4500-40F-FB-C
EX4550 EX4550-AFL
EX6210 EX6210-AFL
EX8208 EX8208-AFL
EX8216 EX8216-AFL
EX-XRE200 EX-XRE200-AFL
EX9204 EX9204-AFL
EX9208 EX9208-AFL
EX9214 EX9214-AFL
You must download a MACsec feature license to enable MACsec. The MACsec feature
license is an independent feature license; the enhanced feature licenses (EFLs) or
advanced feature licenses (AFLs) that must be purchased to enable some features on
EX Series switches cannot be purchased to enable MACsec.
To purchase a feature license for MACsec, contact your Juniper Networks sales
representative (https://www.juniper.net/us/en/contact-us/sales-offices). The Juniper
sales representative will provide you with a feature license file and a license key.
If you have not purchased the AFL or EFL and installed the license key, you receive
warnings when you try to commit the configuration:
[edit protocols]
'bgp'
warning: requires 'bgp' license
error: commit failed: (statements constraint check failed)
The system generates system log (syslog) alarm messages notifying you that the feature
requires a license—for example:
Sep 3 05:59:11 craftd[806]: Minor alarm set, BGP Routing Protocol usage
requires a license
Sep 3 05:59:11 alarmd[805]: Alarm set: License color=YELLOW, class=CHASSIS,
reason=BGP Routing Protocol usage requires a license
Sep 3 05:59:11 alarmd[805]: LICENSE_EXPIRED: License for feature bgp(47) expired
Output of the show system alarms command displays the active alarms:
Related • Managing Licenses for the EX Series Switch (CLI Procedure) on page 357
Documentation
• Monitoring Licenses for the EX Series Switch on page 358
License Enforcement
For features or scaling levels that require a license, you must install and properly configure
the license to meet the requirements for using the licensable feature or scale level. The
device enables you to commit a configuration that specifies a licensable feature or scale
without a license for a 30-day grace period. The grace period is a short-term grant that
enables you to start using features in the pack or scale up to the system limits (regardless
of the license key limit) without a license key installed. The grace period begins when the
licensable feature or scaling level is actually used by the device (not when it is first
committed). In other words, you can commit licensable features or scaling limits to the
device configuration, but the grace period does not begin until the device uses the
licensable feature or exceeds a licensable scaling level.
The device reports any license breach as a warning log message whenever a configuration
is committed that contains a feature or scale limit usage that requires a license. Following
the 30-day grace period, the device periodically reports the breach to syslog messages
until a license is installed and properly configured on the device to resolve the breach.
Each license is tied to one software feature pack, and that license is valid for only one
device.
NOTE: This is not a complete list of licenses. Contact your Juniper Networks
representative for license information.
For information about how to purchase software licenses, contact your Juniper Networks
sales representative at https://www.juniper.net/in/en/contact-us/.
Software Features That Require Licenses on M Series, MX Series, and T Series Routers
Table 35 on page 338 lists the licenses you can purchase for each M Series, MX Series,
and T Series software feature. Each license allows you to run the specified software
feature on a single device.
NOTE: The DHCP server functionality for Junos OS is part of the subscriber
management feature. You must have the S-SA-FP, S-MX80-SA-FP or
S-MX104-SA-FP license in order to enable the DHCP server. For service
accounting, you must also have S-SSM-FP.
For information about how to purchase a software license, contact your Juniper Networks
sales representative at https://www.juniper.net/in/en/contact-us/.
Table 35: Junos OS Feature License Model Number for M Series, MX Series, and T Series Routers
Generalized Multiprotocol Label Switching M10i, M7i, M120, M160, M20, M320, M40e, T320, JS-GMPLS
(GMPLS) Support on Junos OS T640, and MX Series Routers
IPv6 Support on Junos OS M120, M160, M20, M320, M40e, T320, T640, and JS-IPv6
MX Series Routers
Logical Router Support for Junos OS M10i, M120, M160, M20, M320, M40e, M7i, T320, JS-LR
T640, and MX Series Routers
J-Flow accounting license for Adaptive M10i, M120, M160, M20, M320, M40e, M7i, T320, S-ACCT
Services (AS) PIC and Multiservices PIC M10, M5, T640, and T1600
Chassis license for Application Traffic MX104, MX240, MX480, MX960, M Series, and T S-ATO
Optimization service, policy enforcement and Series Routers
application statistics. This license includes
S-AI and S-LDPF fucntionality and 1-year
Signature Subscription License
Software License for Passive Monitoring Flow M320, T640, T320, T1600 S-COLLECTOR-100K
Collector Application, supporting 100 Kpps
throughput; Chassis based license for
Multiservices PIC
License to use Compressed Real-Time M10i, M120, M160, M20, M320, M40e, M7i, T320, S-CRTP
Transport Protocol (CRTP) feature in AS PIC M10, M5, T640, and T1600
and Multiservices PIC
Table 35: Junos OS Feature License Model Number for M Series, MX Series, and T Series Routers (continued)
Software License for Passive Monitoring DFC M320, T640, T320, and T1600 S-DFC-100K
Application, supporting 100Kpps throughput;
Chassis based license for Multiservices PIC
Security Services license for AS PIC and M10i, M7i, M5, M120, M160, M20, M320, M40e, T320, S-ES
Multiservices PIC T640, M10, and T1600
Chassis license for IDP service, policy MX104, MX240, MX480, MX960, M Series, and T S-IDP
enforcement. This license includes S-AI and Series Routers
S-LDPF fucntionality and 1-year Signature
Subscription License
Junos-FIPS Software License M10i, M7i, M320, M40e, T320, and T640 S-JUNOS-FIPS
Link Services Software License—up to 1023 M5, M7i, M10, M10i, M20, M40e, M120, M320, T320, S-LSSL-1023
ML bundles per Chassis for Multiservices PIC T640, T1600, MX240, MX480, and MX960
and Multiservices Dense Port Concentrator
(DPC)
Link Services Software Ugrade License—from M5, M7i, M10, M10i, M20, M40e, M120, M320, T320, S-LSSL-1023-UPG
255 to 1023 ML bundles per Chassis for T640, T1600, MX240, MX480, and MX960
Multiservices PIC and Multiservices DPC
Link Services Software Ugrade License—from M5, M7i, M10, M10i, M20, M40e, M120, M320, T320, S-LSSL-255-UPG
64 to 255 ML bundles per Chassis for AS PIC, T640, T1600, MX240, MX480, and MX960
Multiservices PIC, and Multiservices DPC
Link Services Software License—up to 255 M10, M7i, M5, M120, M20, M320, M40e, T320, T640, S-LSSL-256
ML bundles per Chassis for AS PIC, M10i, T1600, MX240, MX480, and MX960
Multiservices PIC, and Multiservices DPC
Link Services Software License—up to 4 ML M10i, M120, M20, M320, M40e, M7i, T320, M10, M5, S-LSSL-4
bundles per Chassis for AS PIC, Multiservices T640, T1600, MX240, MX480, and MX960
PIC, and Multiservices DPC
Link Services Software License—up to 64 ML M10, M7i, M5, M120, M20, M320, M40e, T320, T640, S-LSSL-64
bundles per Chassis for AS PIC, MS PIC and M10i, T1600, MX240, MX480, and MX960
MS DPC
Link Services Software Upgrade M5, M7i, M10, M10i, M20, M40e, M120, M320, T320, S-LSSL-64-UPG
License—from 4 to 64 ML bundles per T640, T1600, MX240, MX480, and MX960
Chassis for AS PIC, Multiservices PIC, and
Multiservices DPC
Software License for Passive Monitoring Flow M320, T640, T320, and T1600 S-MONITOR-1M
Monitor Application, supporting 1M flows.
Chassis based license for Multiservices PIC
Network Address Translation (NAT), FW M10, M7i, M5, M120, M160, M20, M320, M40e, T320, S-NAT-FW-MULTI
license on AS PIC and Multiservices PIC: T640, M10i, and T1600
Multi-instance
Table 35: Junos OS Feature License Model Number for M Series, MX Series, and T Series Routers (continued)
NAT, FW license on AS PIC and Multiservices M10, M7i, M5, M120, M160, M20, M320, M40e, T320, S-NAT-FW-SINGLE
PIC: Single-instance T640, M10i, and T1600
Software license for Packet trigger subscriber MX240, MX480, MX960, M120, and M320 S-PTSP
policy
Subscriber Access Feature Pack License MX104, MX240, MX480, MX960, M120, and M320 S-SA-128K
Scaling (128000)
Subscriber Access Feature Pack License MX104, MX240, MX480, MX960, M120, and M320 S-SA-32K
Scaling (32000)
Subscriber Access Feature Pack License MX104, MX240, MX480, MX960, M120, M320, and S-SA-4K
Scaling (4000) MX80
Subscriber Access Feature Pack License MX104, MX240, MX480, MX960, M120, and M320 S-SA-64K
Scaling (64000)
Subscriber Access Feature Pack License MX104, MX240, MX480, MX960, M120, M320, and S-SA-8K
Scaling (8000) MX80
Subscriber Access Feature Pack License MX104, MX240, MX480, MX960, M120, and M320 S-SA-96K
Scaling (96000)
Subscriber Access Feature Pack license MX104, MX240, MX480, MX960, M120, and M320 S-SA-FP
Stateful Failover for Services on AS PIC and M10, M7i, M5, M120, M160, M20, M320, M40e, T320, S-SERVICES-SFO
Multiservices PIC: Multilink PPP (MLPPP) T640, M10i, and T1600
only
Subscriber Service Management Feature MX104, MX240, MX480, MX960, M120, and M320 S-SSM-FP
Packet License (RADIUS/SRC based Service
Activation and Deactivation) Per-Service
Accounting Features for Subscribers
Subscriber Traffic Lawful Intercept Feature MX240, MX480, MX960, M120, M320, and MX80 S-SSP-FP
Pack License
Software license for application aware traffic MX240, MX480, MX960, M120, and M320 S-TFDIRECT-APP
direct feature
Software license for subscriber aware traffic MX240, MX480, MX960, M120, and M320 S-TFDIRECT-SUB
direct feature
Video Services Feature Pack license M120, M320, MX80, MX104, MX240, MX480, and S-VIDEO-FP
MX960
Table 35: Junos OS Feature License Model Number for M Series, MX Series, and T Series Routers (continued)
For information about how to purchase a software license, contact your Juniper Networks
sales representative at https://www.juniper.net/in/en/contact-us/.
Table 36: Junos OS Feature License Model Number for M Series Routers
Layer 2 Tunneling Protocol (L2TP) L2TP Network Server (LNS) M120 S-LNS-16K
license for 16000 sessions on Multiservices PIC
L2TP LNS license for 2000 sessions on AS PIC or Integrated M7i, M10i, and M120 S-LNS-2K
Adaptive Services Module and Multiservices PIC
L2TP LNS license for 4000 sessions on AS PIC or Integrated M7i, M10i, and M120 S-LNS-4K
Adaptive Services Module and Multiservices PIC
L2TP LNS license Upgrade—from 2000 to 4000 sessions on AS M7i, M10i, and M120 S-LNS-4K-UPG
PIC or Integrated Adaptive Services Module and Multiservices PIC
L2TP LNS license for 8000 sessions on Multiservices PIC M7i, M10i, and M120 S-LNS-8K
L2TP LNS license Upgrade—from 4000 to 8000 sessions on AS M7i, M10i, and M120 S-LNS-8K-UPG
PIC and Multiservices PIC
Link services software license on integrated ASM and Integrated M7i S-LSSL-BB
Multi Services Module—up to 4 ML bundles
NAT, FW license on Integrated ASM and Integrated Multi Services M7i S-NAT-FW-MULTI-BB
Module: Multi instance
Table 36: Junos OS Feature License Model Number for M Series Routers (continued)
NAT, FW license on Integrated ASM and Integrated Multi Services M7i S-NAT-FW-SINGLE-BB
Module: Single instance
Tunnel services software license for AS PIC and Multiservices PIC M7i and M10i S-TUNNEL
(chassis license)
NOTE: The DHCP server functionality for Junos OS is part of the subscriber
management feature. You must have the S-SA-FP, S-MX80-SA-FP or
S-MX104-SA-FP license in order to enable the DHCP server. For service
accounting, you must also have S-SSM-FP.
NOTE: This is not a complete list of licenses. Contact your Juniper Networks
representative for license information.
For information about how to purchase a software license, contact your Juniper Networks
sales representative at https://www.juniper.net/in/en/contact-us/.
Table 37: Junos OS Feature License Model Number for MX Series Routers
Table 37: Junos OS Feature License Model Number for MX Series Routers (continued)
Chassis-based software license for MX5, MX10, M40, MX80, and MX104 S-JFLOW-CH-MX5-104
inline J-Flow monitoring on MX5, MX10,
M40, MX80, and MX104 Series routers
Software License for in-line J-Flow MX240, MX480, and MX960 S-ACCT-JFLOW-IN
service on Trio MPCs
Table 37: Junos OS Feature License Model Number for MX Series Routers (continued)
2000 IKE sessions on MS-DPC; Chassis MX240, MX480, and MX960 S-ES-2K
based, limited to 6000 per Chassis
4000 IKE sessions on MS-DPC; Chassis MX240, MX480, and MX960 S-ES-4K
based, limited to 6000 per Chassis
Upgrade from 2000 IKE sessions to MX240, MX480, and MX960 S-ES-4K-UPG
4000 IKE sessions on MS-DPC; Chassis
based, limited to 6000 per Chassis
6000 IKE sessions on MS-DPC; Chassis MX240, MX480, and MX960 S-ES-6K
based, limited to 6000 per Chassis
Upgrade from 4000 IKE sessions to MX240, MX480, and MX960 S-ES-6K-UPG
6000 IKE Sessions on MS-DPC; Chassis
based, limited to 6000 per Chassis
License to support DS3 Channelization MX80, MX104, MX240, MX480, and S-MIC-3D-8CHDS3
(down to DS0) on each Modular MX960
Interface Card (MIC) for
MIC-3D-8DS3-E3; also requires license
S-MX80-Q when used on the MX80
platform
Table 37: Junos OS Feature License Model Number for MX Series Routers (continued)
License to run one instance of the NAT MX240, MX480, and MX960 S-NAT
software on one NPU per MS-DPC
License to support inline NAT software MX5, MX10, MX40, MX80, and MX104 S-NAT-IN-MX5-104 (Replaces
on MX5, MX10, MX40, MX80, MX104 S-NAT-IN-MX40-MX80 and
S-NAT-IN-MX5-MX10)
License to run one instance of the NAT MX80, MX104, MX240, MA480, MX960, S-NAT-NPU (Replaces
software on one NPU per MS-MIC, MX2010, and MX2020 S-NAT-IN-MX40-MX80-UPG)
MS-DPC, or MS-MPC
License to run NAT using any MPC in an MX240, MX480, and MX960 S-NAT-IN-MX-CHASSIS
MX Chassis
Subscriber Access Feature Pack License MX240, MX480, MX960, M120, M320, S-SA-4K
Scaling (4000) and MX80
Table 37: Junos OS Feature License Model Number for MX Series Routers (continued)
Subscriber Access Feature Pack License MX240, MX480, MX960, M120, M320, S-SA-8K
Scaling (8000) and MX80
Subscriber Access Feature Pack License MX240, MX480, MX960, and MX80 S-SA-16K
Scaling (16,000)
Subscriber Access Feature Pack License MX240, MX480, MX960, M120, and S-SA-32K
Scaling (32,000) M320
Subscriber Access Feature Pack License MX240, MX480, MX960, M120, and S-SA-64K
Scaling (64,000) M320
Subscriber Access Feature Pack License MX240, MX480, MX960, M120, and S-SA-96K
Scaling (96,000) M320
Subscriber Access Feature Pack License MX240, MX480, MX960, M120, and S-SA-128K
Scaling (128,000) M320
Subscriber Access Feature Pack License MX240, MX480, and MX960 S-SA-256K
Scaling (256,000)
Subscriber Access Feature Pack License MX240, MX480, MX960, M120, and S-SA-FP
M320
Software License for Secure Flow MX80, MX104, MX240, MX480, and S-SFM-FLOWTAP-IN
Mirroring Service (FlowTap) (does not MX960
require MS-DPC)
License to run one instance of the SFW MX960, MX480, and MX240 S-SFW
and software on a MS-DPC
Subscriber Service Management Feature MX240, MX480, MX960, M120, and S-SSM-FP
Packet License—RADIUS and M320
SRC-based service activation and
deactivation per-service accounting
features
Software license for one member of an MX960, MX480, and MX240 S-VCR
MX Virtual Chassis
Table 37: Junos OS Feature License Model Number for MX Series Routers (continued)
Table 37: Junos OS Feature License Model Number for MX Series Routers (continued)
Each feature license is tied to exactly one software feature, and that license is valid for
exactly one device.
NOTE: For the most up-to-date license models available, contact your Juniper
account team.
• (EX2200 only) Internet Group Management Protocol version 1 (IGMPv1), IGMPv2, and
IGMPv3
• (EX2200 only) Protocol Independent Multicast (PIM) dense mode, PIM source-specific
mode, PIM sparse mode
• (EX3200, EX4200, EX4500, EX6200, and EX8200) Border Gateway Protocol (BGP)
and multiprotocol BGP (MBGP)
• (EX3200, EX4200, EX4500, EX6200, and EX8200) IPv6 protocols: OSPFv3, PIPng,
IS-IS for IPv6, IPv6 BGP
For more details regarding EX Series feature licenses, see “Understanding Software
Licenses for EX Series Switches” on page 327.
For information about how to purchase a software license, contact your Juniper Networks
sales representative at https://www.juniper.net/in/en/contact-us/.
NOTE: If you try to configure a feature that is not licensed, you will receive
syslog messages saying that you are using a feature that is licensable and
that you do not possess a license for the feature. If you try to commit
configuration changes for a feature that is not licensed, you will receive a
commit warning saying that you have exceeded the allowed license limit for
the feature.
NOTE: There is no separate license for Virtual Chassis like there is for Virtual
Chassis Fabric.
Table 38 on page 350 lists the standard Junos OS features licenses and supported QFX
Series devices. For information on disaggregated Junos OS feature licenses on the
QFX5200-32C switch, see “Disaggregated Software Features That Require Licenses on
the QFX Series” on page 352.
For information about how to purchase a software license, contact your Juniper Networks
sales representative.
Table 38: Standard Junos OS Feature Licenses and Model Numbers for QFX Series Devices
Number of
Licensed Software Licenses
Feature Supported Devices Required Model Number
Table 38: Standard Junos OS Feature Licenses and Model Numbers for QFX Series Devices (continued)
Number of
Licensed Software Licenses
Feature Supported Devices Required Model Number
Table 38: Standard Junos OS Feature Licenses and Model Numbers for QFX Series Devices (continued)
Number of
Licensed Software Licenses
Feature Supported Devices Required Model Number
QFX Series advanced QFX3100 Director device One per Node QFX-JSL-DRCTR-ADV1
feature license for Border device in a
Gateway Protocol (BGP) network Node
group
QFX Series feature license QFX3500 and QFX3600 One per device QFX3000-JSL-EDGE-FAB
for enabling fabric mode device
QFX Series feature license QFX3100 Director device One per QFX3008-JSL-DRCTR-FAB
for base software for QFX3000-G
QFX3000-G QFabric QFabric system
system
QFX Series feature license QFX3100 Director device One per QFX3000M-JSL-DRCTR-FAB
for base software for QFX3000-M
QFX3000-M QFabric QFabric system
system
QFX and EX Series feature QFX switches that support One per switch, EX-QFX-MACSEC-AGG
license for enabling Media MACsec. See Understanding two per Virtual
Access Control security Media Access Control Security Chassis,
(MACsec) (MACsec).
Virtual Chassis Fabric Any member device in a Two per Virtual QFX-VCF-LIC
(VCF) feature license Virtual Chassis Fabric (VCF) Chassis Fabric
(VCF)
The Junos OS software is disaggregated from the hardware. With disaggregated Junos
OS, you can purchase the following feature licenses, which are available on a perpetual
basis:
NOTE: You must purchase the JBS license to use basic functions, but you
do not need to install the license key in Junos OS Release 15.1X53-D30. JBS
basic functions work with this release without installing the license key.
However, you will need to install the license key in a future release of Junos
OS to be determined, so make sure to retain the authorization code you
received from the License Management System to generate a license key
for the JBS license.
Includes features supported in JBS license and Border Gateway Protocol (BGP),
Intermediate System-to-Intermediate System (IS-IS), and Virtual Extensible Local
Area Network (VXLAN). You need to install the license key to use these features.
Includes features supported in JAS license and Multi-protocol Label Switching (MPLS)
feature set. You need to install the license key to use these features.
For information about how to purchase a software feature license, contact your Juniper
Networks sales representative.
Additionally, an upgrade license key can be generated for a release-tied licensed feature.
An upgrade license key is used for carrying forward a capacity license to the upgrade
release. Although an upgrade license might be an acceptable license on the current
release, it does not add to the existing capacity limit. The capacity added in the upgrade
license key is valid for the upgrade software release only.
The release number embedded in the license key indicates the maximum release number
up to which Junos OS can be upgraded.
As an example, assume that your system is running Junos OS Release 12.2 and is using
the scale-subscriber licensed feature with a later release-tied upgrade license key installed.
If you request a software upgrade to the later release of Junos OS, the software upgrade
operation fails and the following error message is displayed:
In this example, to successfully upgrade to the later release of Junos OS, the release
number included in the upgrade license key should be greater than or equal to the later
release number. Also, you can perform software upgrades up to the previous release
without any additional license keys to retain the existing scale limit.
NOTE:
When you install a release-tied license, the following apply:
• You can purchase an upgrade capacity license only if a base capacity license
for the same scale-tier has already been generated or purchased.
• You cannot install an upgrade license if the capacity does not match any
of the existing base capacity licenses on the system.
• The license installation fails when you install a lower release number license
key on a higher software release number.
The base capacity of a router is identified by the Ideeprom assembly ID (I2C ID), which
defines the board type. However, the Junos OS licensing infrastructure allows the use of
restricted ports without a license for a grace period of 30 days. After the grace period
expires, the router reverts back to the base capacity if no upgrade license is purchased
and installed for the locked ports. The I2C ID along with an upgrade license determine
the final capacity of an MX5, MX10, or MX40 router.
The MX5, MX10, MX40, and MX80 routers support the following types of MICs:
Feature ID
and
Chassis Port Feature
Type Capacity I2C ID Base Capacity Name Upgrade Capacity
MX10 40G 0x555 Slot 1 and 2 f2—MX10 to Slot 2 and first 2 ports on Slot 0
MX40
• 1/MIC0 upgrade • 1/MIC1
• 1/MIC1 • First 2 ports on 0/MIC0
MX40 60G 0x554 Slot 1, SLot 2 and first 2 f3—MX40 Slot 2 and all ports on Slot 0
ports on Slot 0 to MX80
upgrade • 1/MIC1
• 1/MIC0 • All 4 ports on 0/MIC0
• 1/MIC1
• First 2 ports on 0/MIC0
When installing an upgrade license for enhancing port capacity on MX5, MX10 and MX40
routers, consider the following:
• To upgrade an MX5 router to MX80 router capacity, licenses for all three features (f1,
f2, f3) must be installed. All three features can be provided in a single license key.
• To upgrade an MX10 router to MX40 router capacity, installing a license key with f2
feature is sufficient.
• Non-applicable feature IDs in a license key reject the upgrade license. For example:
• Feature IDs f1 and f2 on an MX40 upgrade license key reject the entire license.
A feature ID is assigned to every license for activating the built-in ports on the MX104
router. The port license model with the feature ID is described in Table 41 on page 357.
F1 MX104 2X10G Port Activate (0 and 1) Ability to activate first two built-in ports (xe-2/0/0 and
xe-2/0/1)
F2 MX104 2X10G Port Activate (2 and 3) Ability to activate next two built-in ports (xe-2/0/2 and
xe-2/0/3)
Both the features are also provided in a single license key for ease of use. To activate all
four ports, you must either install the licenses for both the features listed in
Table 41 on page 357 or the single license key for both features. If you install the single
license key when feature IDs F1 and F2 are already installed, the license does not get
rejected. Also, MX104 routers do not support the graceful license expiry policy. A graceful
license expiry policy allows the use of a feature for a certain period of time (usually a
grace period of 30 days), and reverts if the license for that feature is not installed after
the grace period.
To enable and use some Junos OS features on an EX Series switch, you must purchase,
install, and manage separate software licenses. Each switch requires one license. For a
Virtual Chassis deployment, two licenses are recommended for redundancy. After you
have configured the features, you see a warning message if the switch does not have a
license for the feature.
• Obtained the needed licenses. For information about how to purchase software licenses,
contact your Juniper Networks sales representative.
• Understand what makes up a license key. For more information, see “License Key
Components for the EX Series Switch” on page 326.
• To add one or more license keys from a file or URL, specify the filename of the file
or the URL where the key is located:
2. When prompted, enter the license key, separating multiple license keys with a blank
line.
If the license key you enter is invalid, an error appears in the CLI output when you press
Ctrl+d to exit the license entry mode.
Deleting Licenses
To delete one or more license keys from the switch with the CLI, specify the license ID:
For example, the following command saves the installed license keys to a file named
license.conf:
To enable and use some Junos OS features on the EX Series switch, you must purchase,
install, and manage the appropriate software licenses. Each switch requires one license.
For a Virtual Chassis deployment, two licenses are recommended for redundancy.
Purpose Verify that the expected license is installed and active on the switch and fully covers the
switch configuration.
Action From the CLI, enter the show system license command. (To display only the License usage
list, enter the show system license usage command. To display only the Licenses installed
output, enter show system license installed.)
bgp 1 1 0 permanent
isis 0 1 0 permanent
ospf3 0 1 0 permanent
ripng 0 1 0 permanent
mpls 0 1 0 permanent
Licenses installed:
License version: 2
Features:
permanent
Meaning The output shows the license or licenses (for Virtual Chassis deployments) installed on
the switch and license usage. Verify the following information:
• The appropriate number of licenses is installed. Each switch requires one license. For
a Virtual Chassis deployment, two licenses are recommended for redundancy.
Purpose Verify that the expected license keys are installed on the switch.
Action From the CLI, enter the show system license keys command.
Meaning The output shows the license key or keys (for Virtual Chassis deployments) installed on
the switch. Verify that each expected license key is present.
Related • Managing Licenses for the EX Series Switch (CLI Procedure) on page 357
Documentation
• Managing Licenses for the EX Series Switch (J-Web Procedure)
When you purchase a Junos OS software feature license for a device, you receive an
e-mail containing an authorization code for the feature license from Juniper Networks.
You can use the authorization code to generate a unique license key (a combination of
the authorization code and the device’s serial number) for the device, and then add the
license key on the device.
• Purchase the required licenses for the device. See “Software Features That Require
Licenses on the QFX Series” on page 349 and “Disaggregated Software Features That
Require Licenses on the QFX Series” on page 352.
• Note down the authorization code in the e-mail you received from Juniper Networks
when you purchased the license.
• Determine the serial number of the device. For instructions, see Locating the Serial
Number on a QFX3500 Device or Component.
NOTE: This procedure shows you how to generate license keys on a QFX
Series device, but you can follow the same procedure for any device.
NOTE: To access the licensing site, you must have a service contract with
Juniper Networks and an access account. If you need help obtaining an
account, complete the registration form at the Juniper Networks website
https://www.juniper.net/registration/Register.jsp .
2. On the Generate Licenses tab, select QFX Series Product from the drop-down list, and
click Go.
3. Select the QFX Series Product Device option button, and click Continue.
4. In the Device Serial Number field, enter the serial number for the device.
5. In the Authorization Code field, enter the authorization code in the e-mail you received
from Juniper Networks when you purchased the license.
6. (Optional) If you want to enter another authorization code for the same device, click
Enter More Authorization Codes to display a new authorization code field. Enter the
authorization code in this field.
7. Click Confirm.
8. Review the information to ensure everything is correct and then click Generate License.
The Generate Licenses - QFX Series Product Devices page appears, displaying a
summary of your license keys, including a link that displays the details of your new
license keys.
9. Select the file format in which you want to obtain your new license keys.
10. Select the delivery method you want to use to obtain your new license keys.
• Select the Download to this computer option button, and click OK.
• Select the Send e-mail to e-mail ID option button, and click OK.
Related • Software Features That Require Licenses on the QFX Series on page 349
Documentation
• Adding New Licenses (CLI Procedure) on page 362
• Establish basic network connectivity with the router or switch. For instructions on
establishing basic connectivity, see the Getting Started Guide or Quick Start Guide for
your device.
There are two ways to add licenses using the Junos OS CLI:
• The system license keys key configuration statement enables you to configure and
delete license keys in a Junos OS CLI configuration file.
• The request system license add operational command installs a license immediately.
NOTE: The system license keys key configuration statement is not required
to install a license. The operational command request system license add
installs a license immediately. But because the set system license keys key
command is a configuration statement, you can use it to install a license as
part of a configuration commit, either directly or by configuration file.
The license keys are validated and installed after a successful commit of the configuration
file. If a license key is invalid, the commit fails and issues an error message. You can
configure individual license keys or multiple license keys by issuing Junos OS CLI
commands or by loading the license key configuration contained in a file. All installed
license keys are stored in the /config/license/ directory.
The name parameter includes the license ID and the license key. For example:
[edit]
user@device# set system license keys key "JUNOS_TEST_LIC_FEAT xxxxxx xxxxxx
xxxxxx xxxxxx xxxxxx xxxxxx xxxxxx xxxxxx xxxxxx xxxxxx xxxxxx xxxxxx xxxxxx"
To install multiple license keys in the Junos OS CLI, issue the set system license keys
key name statement for each license key to install. For example:
[edit]
user@device# set system license keys key "key_1"
set system license keys key "key_2"
set system license keys key "key_2"
set system license keys key "key_4"
[edit]
user@device# commit
commit complete
For example:
License usage:
Licenses Licenses Licenses Expiry
Feature name used installed needed
sdk-test-feat1 0 1 0 permanent
Licenses installed:
License identifier: JUNOS_TEST_LIC_FEAT
License version: 2
Features:
sdk-test-feat1 - JUNOS SDK Test Feature 1
permanent
Alternatively, you can issue the show system license command from operational mode.
Before you begin, prepare the configuration file. In this example, use the Unix shell cat
command to write the license.conf file:
1. Go to the shell.
[edit]
user@device# exit
user@device> exit
%
• For multiple license keys, for example, type something like this:
system {
license {
keys {
key "key_1"
key "key_2"
key "key_3"
...
key "key_n"
}
}
}
% cli
user@device> configure
[edit]
user@device#
For example:
For example:
[edit]
user@device# show | compare
[edit system]
+ license {
+ keys {
+ key "JUNOS_TEST_LIC_FEAT xxxxxx xxxxxx xxxxxx xxxxxx xxxxxx
xxxxxx xxxxxx xxxxxx xxxxxx xxxxxx xxxxxx xxxxxx xxxxxx";
+ }
+ }
[edit]
user@device# commit
5. To verify that the license key was installed, issue the show system license command.
For example:
License usage:
Licenses Licenses Licenses Expiry
Feature name used installed needed
sdk-test-feat1 0 1 0 permanent
Licenses installed:
License identifier: JUNOS_TEST_LIC_FEAT
License version: 2
Features:
sdk-test-feat1 - JUNOS SDK Test Feature 1
permanent
1. From the CLI operational mode, enter one of the following CLI commands:
• To add a license key from a file or URL, enter the following command, specifying
the filename or the URL where the key is located:
• To add a license key from the terminal, enter the following command:
2. When prompted, enter the license key, separating multiple license keys with a blank
line.
If the license key you enter is invalid, an error appears in the CLI output when you press
Ctrl+d to exit license entry mode.
On routers that have graceful Routing Engine switchover (GRES) enabled, after
successfully adding the new license on the master Routing Engine, the license keys are
automatically synchronized on the backup Routing Engine as well. However, in case GRES
is not enabled, the new license is added on each Routing Engine separately. This ensures
that the license key is enabled on the backup Routing Engine during changeover of
mastership between the Routing Engines.
To add a new license key to a router with dual Routing Engines without GRES:
1. After adding the new license key on the master Routing Engine, use the request chassis
routing-engine master switch command to have the backup Routing Engine become
the master Routing Engine.
2. Log in to the active Routing Engine and add the new license key, repeat the same step.
NOTE: Adding a license key to the router or switch might be delayed if a kernel
resynchronization operation is in progress at that time. The following message
is displayed on the CLI when the license-adding operation is about to be
delayed:
A kernel re-sync operation is in progress. License update may take several minutes
to complete.
Before deleting a license, ensure that the features enabled by the license will not be
needed.
You can use the request system license delete operational command, or the delete or
deactivate configuration command to delete a license:
2. To delete a license key or keys from a device using the CLI operational mode, select
one of the following methods:
• Delete a single license by specifying the license ID. Using this option, you can delete
only one license at a time.
• Delete multiple license keys from the device. Specify the license identifier for each
key and enclose the list of identifiers in brackets.
Delete license(s) ?
[yes,no] (no) yes
3. Verify the license was deleted by entering the show system license command.
The following procedure uses the delete command, but you could use the deactivate
command as well.
NOTE: You can use the deactivate command instead of the delete command
in this procedure.
Issue the run request system license delete license-identifier-list ? command from the
configuration mode of the CLI.
[edit]
user@host# run request system license delete license-identifier-list ?
Possible completions:
E00468XXX4 License key identifier
JUNOS10XXX1 License key identifier
JUNOS10XXX2 License key identifier
JUNOS10XXX3 License key identifier
JUNOS10XXX4 License key identifier
[ Open a set of values
[edit]
[edit]
user@host# delete system license keys
4. Verify the license was deleted by entering the show system license command.
16.1 Starting in Junos OS Release 16.1, to remove licenses from the configuration,
you can use either the delete or deactivate configuration command.
• To save the installed license keys to a file or URL, enter the following command:
For example, the following command saves the installed license keys to a file named
license.config:
• To output installed license keys to the terminal, enter the following command:
Purpose Verify that the expected licenses are installed and active on the device.
Action From the CLI, enter the show system license command.
Sample Output
Licenses installed:
License identifier: E000185416
License version: 2
Features:
subscriber-acct - Per Subscriber Radius Accounting
permanent
subscriber-auth - Per Subscriber Radius Authentication
permanent
subscriber-addr - Address Pool Assignment
permanent
subscriber-vlan - Dynamic Auto-sensed Vlan
permanent
subscriber-ip - Dynamic and Static IP
permanent
Meaning The output shows a list of the license usage and a list of the licenses installed on the
device. Verify the following information:
• Each license is present. Licenses are listed in ascending alphanumeric order by license
ID.
NOTE: A state of invalid indicates that the license key is not a valid license
key. Either it was entered incorrectly or it is not valid for the specific device.
• The feature for each license is the expected feature. The features enabled are listed
by license. An all-inclusive license has all features listed.
• All configured features have the required licenses installed. The Licenses needed
column must show that no licenses are required.
Purpose Verify that the licenses fully cover the feature configuration on the device.
Action From the CLI, enter the show system license usage command.
Sample Output
Meaning The output shows any licenses installed on the device and how they are used. Verify the
following information:
• Any configured licenses appear in the output. The output lists features in ascending
alphabetical order by license name. The number of licenses appears in the third column.
Verify that you have installed the appropriate number of licenses.
• The number of licenses used matches the number of configured features. If a licensed
feature is configured, the feature is considered used. The sample output shows that
the subscriber address pooling feature is configured.
• A license is installed on the device for each configured feature. For every feature
configured that does not have a license, one license is needed.
For example, the sample output shows that the subscriber address feature is configured
but that the license for the feature has not yet been installed. The license must be
installed within the remaining grace period to be in compliance.
Enhanced MPCs are available in three license variants. Before Junos OS Release 16.1,
there were two variants: infrastructure routing (IR) and routing (R). Starting in Junos OS
Release 16.1, there is also a base variant, making a total of three licence variants. All
variants support an identical feature set, but with a few scale
differences.Table 42 on page 372 describes the three license variants.
base No special suffix in the license name. • All Layer 2, Layer 2.5, and Layer 3 features.
• Up to 32 Layer 3 routing instances of the virtual
routing and forwarding (VRF) instance type.
• Up to 2 million routes in the forwarding information
base (FIB), provided there is hardware support.
(FIB is also known as forwarding table.)
• Up to 6 million routes in the routing information
base (RIB), also known as routing table.
IR -IR suffix in the license name. • All Layer 2, Layer 2.5, and Layer 3 features.
• Up to 32 Layer 3 routing instances of the virtual
routing and forwarding (VRF) instance type.
R -R suffix in the license name. Full-scale Layer 2, Layer 2.5, and Layer 3 features.
Scale is determined by the hardware capabilities.
Suppose you have purchased two MPC4Es: one with IR license and one with R license.
After the MPCs are installed on a router, both MPCs appear identical. To distinguish
between an MPC with an IR license and an MPC with an R license after the MPC is installed
on the router, you must configure the license mode based on the license purchased. For
instance, if you have purchased an MPC with the IR license, you must configure the license
mode for that MPC as IR. The license mode settings are set specific to each MPC slot. If
the MPC is installed in a different slot, or moved to another device, the license mode
settings must be reconfigured on the new slot or device. Also, the license mode settings
previously configured must be deleted.
NOTE: The license mode settings are used only to provide information. You
cannot set or alter the license of the MPC by configuring the license mode.
To view the current license mode settings on an MPC, from the configuration mode, use
the show chassis fpc command. To view the current license mode settings on an MPC,
from the operational mode, use the show chassis hardware extensive command. To delete
the existing license mode settings on an MPC, use the delete chassis fpc command.
16.1 Starting in Junos OS Release 16.1, there is also a base variant, making a
total of three licence variants.
Related • Configuring the License Mode for Specific Enhanced MPCs on MX Series Routers on
Documentation page 373
Configuring the License Mode for Specific Enhanced MPCs on MX Series Routers
Starting with Junos OS Release 14.2, you can set the license mode for enhanced MPCs
such as MPC4E, MPC5E, and MPC6. Configuring the license mode enables you to
distinguish between an MPC with an IR license and an MPC with an R license after the
MPC is installed on the router. An MPC with an R license supports all the Layer 2, Layer
2.5, and Layer 3 features. An MPC with an IR license offers partial support for these
features. For more information about the license variants, see “License Modes for
Enhanced MPCs Overview” on page 372
NOTE: The license mode settings are used only to provide information. You
cannot set or alter the license of the MPC when you configure the license
mode.
Before you configure the license mode of the MPC, verify the license of the MPC. You will
need this information do configure the license mode.
Do not try to set the license mode while the card is rebooting or the following error
message will appear: Card not online or TRIO/DPC based.
1. Configure the license mode for the MPC in a specified MPC slot.
If the MPC has an IR license, configure the license mode as IR. If the MPC has an R
license, configure the license mode of the MPC as R.
[edit]
user@host# set chassis fpc slot-number ir-mode ir-mode
[edit]
user@host# show chassis
fpc 1 {
ir-mode IR;
}
3. After verifying the license mode, commit the changes by using the commit statement.
[edit]
user@host# commit
14.2 Starting with Junos OS Release 14.2, you can set the license mode for
enhanced MPCs such as MPC4E, MPC5E, and MPC6.
Related • Example: Configuring the License Mode for MPC5E on page 374
Documentation
• License Modes for Enhanced MPCs Overview on page 372
• ir-mode
This example describes how to configure the license mode for MPC5E on the MX480
router. It also describes how to remove the license mode settings and reconfigure the
license mode settings on a new slot.
Requirements
This example uses the following hardware and software components:
Overview
Configuring the license mode for an MPC enables you to distinguish between an MPC
with an IR license and an MPC with an R license after the MPC is installed on the router.
NOTE: The license mode settings are used only to provide information. You
cannot set or alter the license of the MPC when you configure the license
mode.
The license mode settings are set specific to each MPC slot. If the MPC is installed in a
different slot, or moved to another device, the license mode settings must be reconfigured
on the new slot or device. Also, the license mode settings configured previously must be
removed. You can view the license mode settings from both configuration mode and
operational mode.
Topology
In this example, an MPC5E is installed in slot 4 of an MX480 router and has an R license.
The R license indicates that all Layer 2, Layer 2.5, and Layer 3 features are supported on
the MPC. You first configure the license mode of the MPC5E in slot 4 to R. After configuring
the license mode, you can verify the license mode settings. You then install the MPC5E
in slot 2 of the same router. License mode settings are set specific to each MPC slot.
Therefore, the license mode setting must be reconfigured. After you move the MPC5E,
delete the license mode setting on slot 4 and then reconfigure the license mode setting
on slot 2.
Configuration
To configure the license mode for the MPC5E according to the topology specified in the
overview section, perform these tasks:
[edit]
user@host# set chassis fpc 4 ir-mode R
3. After verifying the license mode, commit the changes by using the commit statement.
[edit]
user@host# commit
[edit]
user@host# delete chassis fpc 4 ir-mode R
3. After verifying the license mode, commit the changes by using the commit statement.
[edit]
user@host# commit
[edit]
user@host# set chassis fpc 2 ir-mode R
3. After verifying the license mode, commit the changes by using the commit statement.
[edit]
user@host# commit
Verification
To confirm that you have accurately configured the license mode settings on MPC5E,
perform these tasks:
• Verifying That License Mode Is Configured for MPC5E in Slot 4 on page 377
• Verifying That the Configured License Mode Is Deleted on page 377
• Verifying That the License Mode Is Configured for MPC5E in Slot 2 on page 378
Purpose To verify that license mode R is configured for the MPC5E in slot 4.
Action From operational mode, enter the show chassis hardware extensive command.
Action From operational mode, enter the show chassis hardware extensive command.
Meaning The license mode setting has been removed for the MPC5E in slot 4.
Purpose To verify that license mode R is configured for the MPC5E in slot 2.
Action From operational mode, enter the show chassis hardware extensive command.
• Configuring the License Mode for Specific Enhanced MPCs on MX Series Routers on
page 373
Problem Description: If Junos OS loads but the CLI is not working, or if the switch has no software
installed, use this recovery installation procedure to install Junos OS.
Solution If there is already a Junos OS image on the system, you can either install the new Junos
OS package in a separate partition and have both Junos OS images remain on the system,
or you can wipe the disk clean before the new installation proceeds.
where:
• format—Use this option to wipe the installation media before installing the software
package. If you do not include this option, the system installs the new Junos OS
package in a different partition from the partition used by the most recently installed
Junos OS package.
• Network address of the server and the path on the server; for example,
tftp://192.168.1.28/junos/jinstall-ex-4200-9.4R1.5-domestic-signed.tgz
• The Junos OS package on a USB device is commonly stored in the root drive as
the only file; for example, file:///jinstall-ex-4200-9.4R1.5-domestic-signed.tgz
The boot process proceeds as normal and ends with a login prompt.
Problem Description: EX Series switches shipped with Junos OS Release 10.4R2 or earlier have
Junos OS loaded on the system disk in partition 1. The first time you upgrade, the new
software package is installed in partition 2. When you finish the installation and reboot,
partition 2 becomes the active partition. Similarly, subsequent software packages are
installed in the inactive partition, which becomes the active partition when you reboot
at the end of the installation process.
On switches shipped with Release 10.4R3 and later, the same Junos OS image is loaded
in each of the two root partitions, and you should copy the new software image to the
alternate partition each time you upgrade.
If you performed an upgrade and rebooted, the system resets the active partition. You
can use this procedure to manually boot from the inactive partition.
NOTE: If you have completed the installation of the software image but have
not yet rebooted, issue the request system software rollback command to
return to the original software installation package.
NOTE: If you cannot access the CLI, you can reboot from the inactive partition
using the following procedure from the loader script prompt:
1. Unload and clear the interrupted boot from the active partition:
loader> unload
loader> unset vfs.root.mountfrom
You must include the colon (:) at the end of this command.
loader> boot
Problem Description: The software installation process requires a certain amount of unused disk
space. If there is not enough space, you might receive an error message such as:
Solution Identify and delete unnecessary files by using the request system storage cleanup
command.
Installation from the Boot Loader Generates ’cannot open package’ Error
Problem Description: When installing a Junos OS software image from the loader prompt, a
“cannot open package error” is generated:
Solution This might be due to the IP address, gateway IP address, netmask address, or server IP
address not being properly set. You can set these values either from the shell or from the
u-boot prompt.
To set these values from the u-boot prompt, log in to a console connection, reboot, and
stop at the u-boot prompt (Cntrl+c):
Related • Installing Software on an EX Series Switch with a Single Routing Engine (CLI Procedure)
Documentation on page 90
• show system storage partitions (EX Series Switches Only) on page 571
Troubleshooting a Switch That Has Booted from the Backup Junos OS Image
Problem Description: The switch boots from the backup root file partition. It is possible that the
primary copy of Junos OS failed to boot properly, which could indicate that it is corrupted.
This event is flagged in two ways:
• Upon login through the console or management port, the following warning message
is displayed:
WARNING: THIS DEVICE HAS BOOTED FROM THE BACKUP JUNOS IMAGE
If the switch is in a Virtual Chassis, the switch member number appears in the Description
field, where the switch is called a host.
Solution Install a new Junos OS image on the partition that had the corruption, or take a snapshot
(use request system snapshot) of the currently active partition and use it to replace the
image in the alternate partition:
If the switch is a standalone switch or a Virtual Chassis master switch, enter this command:
If the switch is a Virtual Chassis member switch (not the master), enter this command
on the Virtual Chassis:
Related • Verifying Junos OS and Boot Loader Software Versions on an EX Series Switch on
Documentation page 147
• show system storage partitions (EX Series Switches Only) on page 571
A Junos OS installation or upgrade may fail if your router has a shortage of disk space. If
a disk space error occurs, use one or more of the following options to complete the
installation:
• Use the request system storage cleanup command to delete unnecessary files and
increase storage space on the router.
• Specify the unlink option when you use the request system software add command to
install the Junos OS:
• On the M Series, MX Series, and T Series routers, the unlink option removes the
software package after a successful upgrade.
• Download the software packages you need from the Juniper Networks Support Web
site at https://www.juniper.net/support/. The download program provides intelligent
disk space management to enable installation.
On Juniper Networks routing platforms, you can typically install any combination of
Physical Interface Cards (PICs) on a single Enhanced Flexible PIC Concentrator (FPC)
or in two PIC slots served by a single Layer 2/Layer 3 Packet Processing
application-specific integrated circuit (ASIC).
Newer Junos OS services for some PICs can require significant Internet Processor ASIC
memory, and some configuration rules limit certain combinations of PICs if they are
installed on some platforms.
During software installation, the configuration checker in the installation program checks
the router’s PICs. If any configuration rules affect your PIC combinations, the installation
process stops and displays a message similar to the following:
The combination of PICS in FPC slot 3 is not supported with this release
PIC slot 0 -
PIC slot 1 - 1x OC-12 ATM-II IQ
PIC slot 2 - 1x G/E IQ, 1000 BASE
PIC slot 3 - 1x Link Service (4)
If you continue the installation, one or more PICs on
FPC slot 3 might appear to be online but
cannot be enabled and cannot pass traffic with this release of JUNOS.
See the Release Notes for more information.
WARNING: This installation attempt will be aborted. If you
WARNING: wish to force the installation despite these warnings
WARNING: you may use the 'force' option on the command line.
pkg_add: package /var/tmp/jbundle-7.6R1.x-domestic-signed.tgz fails requirements
- not installed
• If a PIC is offline when you upgrade the router with new software, the configuration
checker cannot detect PIC combinations affected by configuration rules and cannot
warn about them.
• If you specify the force option when you upgrade the Junos OS, the configuration
checker warns about the affected PIC combination and the software installation
continues. However, after rebooting, one or more PICs might fail to initialize.
• The configuration checker looks for combinations of three affected PICs. If an Enhanced
FPC contains four affected PICs, the script generates multiple warnings.
If you install a PIC into a router already running Junos OS, you can identify the presence
of affected PIC combinations from messages in the system logging (syslog) file:
Feb 6 17:57:40 CE1 feb BCHIP 0: uCode overflow - needs 129 inst space to load
b3_atm2_LSI_decode for stream 12
Feb 6 17:57:41 CE1 chassisd[2314]: CHASSISD_IFDEV_DETACH_PIC:
ifdev_detach_pic(0/3)
Feb 6 17:57:41 CE1 feb BCHIP 0: binding b3_atm2_LSI_decode to stream 12 failed
Feb 6 17:57:41 CE1 feb PFE: can not bind B3 ucode prog b3_atm2_LSI_decode to FPC
0: stream 12
For more information about checking for unsupported PIC combinations, see the
corresponding PIC guide for your router, the Junos OS Release Notes, and Technical Support
Bulletin PSN-2004-12-002, PIC Combination Notes Summary on the Juniper Networks
Support Web site at https://www.juniper.net/support/.
SRX5600 and SRX5800 devices support IOC or SPC on any given card slot, and there
is no complexity in equipping the services gateways with the perfect balance of processing
and I/O capacity. You can install up to 11 (on SRX5800) and 5 (SRX5600) SPCs and
IOCs on the device. However, you must install at least one SPC on device. For more details,
see SRX5600 and SRX5800 Services Gateway Card Guide.
SRX3600 supports a maximum of up to seven SPCs,three NPCs, six IOCs, and 11 NP-IOCs
per chassis. However you must install at least one SPcs and NPC on the chassis. SRX3400
supports a maximum of up to four SPCs,two NPCs, four IOCs, and six NP-IOCs per chassis.
However you must install at least one SPcs and NPC on the chassis. On SRX3400 and
SRX3600 devices you must install PICs on the front slots of the chassis. For more details,
see SR X1400 , SRX3400 , and SRX3600 Services Gateway Module Guide.
Configuration Statements
auto-configuration
Syntax auto-configuration {
command binary-file-path;
disable;
}
auto-configuration (System)
Syntax auto-configuration {
traceoptions {
file {
filename;
files number;
match reqular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
level (all | error | info | notice | verbose | warning);
no-remote-trace;
}
}
• filename—Name of the file to receive the output of the tracing operation. Enclose
the name within quotation marks. All files are placed in the directory /var/log. By
default, the name of the file is the name of the process being traced.
• files number—Maximum number of trace files. When a trace file named trace-file
reaches its maximum size, it is renamed to trace-file.0, then trace-file.1, and so on,
until the maximum number of trace files is reached. The oldest archived file is
overwritten.
If you specify a maximum number of files, you also must specify a maximum file size
with the size option and a filename.
Default: 10 files
• match regular-expression—Refine the output to include lines that contain the regular
expression.
If you specify a maximum number of files, you also must specify a maximum file size
with the size option and a filename.
Range: 10 KB through 1 GB
Default: 128 KB
• flag—Specify the tracing operation to perform. To specify more than one tracing
operation, include multiple flag statements. You can include the following flags.
• configuration—Trace configurations.
auto-image-upgrade
Syntax auto-image-upgrade;
Release Information Statement introduced in Junos OS Release 9.6 for EX Series switches.
Description Enable automatic software download on an EX Series switch acting as a DHCP client.
The DHCP client EX Series switch compares the software package name in the DHCP
server message to the name of the software package that booted the switch. If the
software packages are different, the DHCP client EX Series switch downloads and installs
the software package specified in the DHCP server message.
Before you upgrade software using automatic software download, ensure that you have
configured DHCP services for the switch, including configuring a path to a boot server
and a boot file. See the Junos OS System Basics Configuration Guide for information about
using the CLI to configure DHCP services and settings. See Configuring DHCP Services
(J-Web Procedure) for information about using the J-Web interface to configure DHCP
services and settings.
auto-snapshot
Syntax auto-snapshot;
Release Information Statement introduced in Junos OS Release 12.3 for EX Series switches.
Description Enable the automatic snapshot feature, which allows the switch to automatically fix a
corrupt Junos OS file in the primary root partition. If the automatic snapshot feature is
enabled, the switch automatically takes a snapshot of the Junos OS root file system in
the alternate root partition and copies it onto the primary root partition, thereby repairing
the corrupt file in the primary root partition. The automatic snapshot procedure takes
place whenever the system reboots from the alternate root partition, regardless of
whether the reboot is due to a command or due to corruption of the primary root partition.
Default • The automatic snapshot feature is enabled by default on the following EX Series
switches:
• EX4550 switches
• If the automatic snapshot feature was disabled by default before the switch was
upgraded to Junos OS Release 12.3R1 or later, the feature remains disabled (for
backward compatibility) by default after the upgrade.
autoinstallation
Syntax autoinstallation {
configuration-servers {
url {
password password;
}
}
interfaces {
interface-name {
bootp;
rarp;
}
}
usb {
disable;
}
}
Options The remaining statements are explained separately. See CLI Explorer.
Syntax autoinstallation {
delete-after-commit;
configuration-servers {
url;
}
interfaces {
interface-name {
bootp;
rarp;
}
}
}
Release Information Statement introduced in Junos OS Release 13.3 for satellite devices in a Junos Node
Unifier (JNU) group.
Description (Satellite devices in a JNU group) Download a configuration file automatically from an
FTP or HTTP server. When you power on a router or switch configured for autoinstallation,
it requests an IP address from a Dynamic Host Configuration Protocol (DHCP) server.
When the router or switch has an address, it sends a request to a configuration server
and downloads and installs a configuration.
Options The remaining statements are explained separately. See CLI Explorer.
Related • Autoinstallation of Satellite Devices in a Junos Node Unifier Group on page 300
Documentation
• Autoinstallation Process on Satellite Devices in a Junos Node Unifier Group on page 298
• configuration-servers
bootp
Syntax bootp {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
• failover—Configure the device to reboot if the software process fails four times within
30 seconds, and specify the software to use during the reboot.
Related •
Documentation
commit
Syntax commit {
delta-export;
peers {
authentication string;
user user-name;
}
persist-groups-inheritance;
server {
commit-interval seconds;
days-to-keep-error-logs days;
maximum-aggregate-pool number;
maximum entries number;
traceoptions {
file {
filename;
files number;
microsecond-stamp;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
}
}
peers-synchronize;
}
Options delta-export —(Optional) Configure system commit to export only the changes made
in the candidate configuration instead of exporting the entire candidate configuration
to the configuration database.
configuration-servers
Syntax configuration-servers {
url {
password password;
}
}
Description Configure the URL address of a server from which the configuration files must be obtained.
You can download a configuration file automatically from an FTP, Hypertext Transfer
Protocol (HTTP), or Trivial FTP (TFTP) servers. Examples of URLs:
• tftp://hostname/path/filename
• ftp://username:[email protected]
• http://hostname/path/filename
• http://usenamer:[email protected]
Options • url—Specify the URL address of the server containing the configuration files.
Syntax delete-after-commit;
Release Information Statement introduced in Junos OS Release 13.3 for satellite devices in a Junos Node
Unifier (JNU) group.
Description Specify that during the subsequent commit operation of configuration settings (after
the autoinstallation process successfully retrieves, installs, and commits the
configuration), the autoinstallation configuration parameters be removed from the router.
Removal of the autoinstallation parameters and statements from the committed
configuration on the router ensures that the router does not attempt to perform an
autoinstallation process when it is powered on the next time. Although you can optionally
specify the interfaces to perform autoinstallation or configuration servers from which
the files are to be downloaded, you must include the delete-after-commit statement to
prevent the router from entering a recursive loop and repeatedly performing an
autoinstallation every time it is powered on.
Related • Autoinstallation of Satellite Devices in a Junos Node Unifier Group on page 300
Documentation
• Autoinstallation Process on Satellite Devices in a Junos Node Unifier Group on page 298
• configuration-servers
Syntax file {filename <files number> | match | no-world-readable | size size | world-readable
}
Release Information Statement introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Statement introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Trace file information for the Virtual Machine Management Daemon ( vmmd), which
communicates with the host OS.
Options filename—Name of the file in which the trace information is stored. By default, the file is
created in the /var/log directory.
files number—(Optional) Maximum number of trace files. When a trace file reaches the
size specified by the size option, the filename is appended with 0 and compressed.
For example, when a trace file named trace-file-log reaches size size, it is compressed
and renamed as trace-file-log.0.gz. When trace-file-log reaches size size for the
second time, trace-file-log.0.gz is renamed as trace-file-log.1.gz and trace-file-log
is compressed and renamed as trace-file-log.0.gz. This renaming sheme ensures
that the older logs have a greater index number. When number of trace files reaches
number, the oldest file is deleted.
If you specify a maximum number of files, you also must specify a maximum file size
with the size option and a filename.
Range: 2 through 1000
Default: 10
match—Refine the output to include only those lines that match the given regular
expression.
no-world-readable—Restrict file access to the user who created the trace files.
sizesize—Maximum size of each trace file . By default, the number entered is treated as
bytes. Alternatively, you can include a suffix to the number to indicate kilobytes (KB),
megabytes (MB), or gigabytes (GB). If you specify a maximum file size, you also
must specify a maximum number of trace files with the files option.
Range: 10 KB through 1 GB
Default: 128 KB
Related • traceoptions (App Engine Virtual Machine Management Service) on page 408
Documentation
• level (App Engine Virtual Machine Management Service) on page 405
Syntax flag (all |ccif | configuration | heartbeat | init | miscellaneous | platform | pxe |
routing-instances | snmp)
Release Information Statement introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Statement introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Perform different tracing operations. To specify more than one tracing operation, include
multiple flag statements.
Related • traceoptions (App Engine Virtual Machine Management Service) on page 408
Documentation
• file (App Engine Virtual Machine Management Service) on page 401
interfaces (Autoinstallation)
Syntax interfaces {
interface-name {
bootp;
rarp;
}
}
Description Configure the interface on which to perform autoinstallation. A request for an IP address
is sent from the interface. Specify the IP address procurement protocol.
NOTE: When you run the system autoinstallation command, the command
will configure unit 0 logical interface for all the active state physical interfaces.
However, few commands like fabric-options do not allow its physical interface
to be configured with a logical interface. If the system autoinstallation and
the fabric-options commands are configured together the following message
is displayed incompatible with 'system autoinstallation’.
Release Information Statement introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Statement introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Default info
Related • traceoptions (App Engine Virtual Machine Management Service) on page 408
Documentation
• flag (App Engine Virtual Machine Management Service) on page 403
license
Syntax license {
autoupdate {
url url <password password>;
}
keys {
key key
}
renew {
before-expiration number;
interval interval-hours;
}
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
}
}
Release Information Statement introduced in Junos OS Release 8.5 for SRX Series and vSRX.
Options keys introduced in Junos OS Release 14.1X53-D10.
Statement introduced in Junos OS Release 14.1X53-D10 for EX Series and QFX Series,
with option keys included.
Statement introduced in Junos OS Release 15.1 for M Series, MX Series, PTX Series, and
T Series, with option keys included.
[edit]
user@device# set system license keys key "key_1"
user@device# set system license keys key "key_2"
user@device# set system license keys key "key_3"
Related
Documentation
Syntax traceoptions {
file (App Engine Virtual Machine Management Service) filename <files number> | match
| no-world-readable |<size size> <world-readable >;
flag (App Engine Virtual Machine Management Service) (all |ccif | configuration | heartbeat
| init | miscellaneous | platform | pxe | routing-instances | snmp);
level (App Engine Virtual Machine Management Service) (all | error| info | notice | verbose
| warning)
}
Release Information Statement introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Statement introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Enable traceoptions for the app-engine virtual machine management service system
process.
Related • system
Documentation
• processes
Syntax traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
}
Release Information Statement introduced in Junos OS Release 8.5 for SRX Series and vSRX.
Statement introduced in Junos OS Release 14.1X53-D10 for EX Series and QFX Series.
Statement introduced in Junos OS Release 15.1 for M Series, MX Series, and T Series.
filename—Name of the file to receive the output of the tracing operation. Enclose
the name within quotation marks. All files are placed in the directory /var/log.
By default, the name of the file is the name of the process being traced.
files number—Maximum number of trace files. When a trace file named trace-file
reaches its maximum size, it is renamed trace-file.0, then trace-file.1, and so on,
until the maximum number of trace files is reached. Then the oldest trace file
is overwritten.
If you specify a maximum number of files, you also must specify a maximum
file size with the size maximum file-size option.
Range: 2 through 1000 files
Default: 10 files
match regular-expression—Refine the output to include lines that contain the regular
expression.
size size—Maximum size of each trace file, in kilobytes (KB), megabytes (MB), or
gigabytes (GB). If you specify a maximum file size, you also must specify a
maximum number of trace files with the files number option.
Range: 10 KB through 1 GB
Default: 128 KB
any user to read the file. To explicitly set the default behavior, use the
no-world-readable option.
flag flag—Specify which tracing operation to perform. To specify more than one tracing
operation, include multiple flag statements. You can include the following flags.
Related
Documentation
vmhost
Syntax vmhost {
management-if
no-auto-recovery
}
Release Information Statement introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Statement introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Configure VM host management properties. Set values in the edit vmhost hierarchy of
the configuration.
Description Disable the host interface eth0, which serves as the management port. You can the
disable the interface if there are any issues associated with security or any hardware
failures either at the local end or the remote end of the interface. if you disable the
interface, the transmitter is turned off and the link partner experiences a link-down
condition.
Default The host interface eth0 which serves as the management port is enabled.
Description Configure the link mode of the host interface eth0, which serves as the management
port as half-duplex or full-duplex. You can also manually select the link mode option as
either half-duplex or full-duplex.
Default The link partners auto-negotiate the speed and duplex link mode and select the highest
common capability.
Options automatic—Autonegotiate the link mode of the management interface. if you set the
link mode to automatic, you must also set the link speed to automatic.
Description Configure the link speed of the host interface eth0, which serves as the management
port. If you set the link speed as 10m or 100m, autonegotiation is turned off and the link
speed is the speed that you specify.
Default The link partners auto-negotiate the speed and duplex link mode and select the highest
common capability.
Options automatic—Autonegotiate the link speed of the management interface. If you set the
link speed as automatic, speed and link mode are auto-negotiated with the link
partner.
1g—Set the link speed of the management interface to 1Gbps. If you set link speed to
1Gbps, autonegotiation is enabled. However, the interface advertises only 1Gbps
speed and full-duplex mode.
usb
Syntax usb {
disable;
}
vmhost
Syntax vmhost {
management-if
no-auto-recovery
}
Release Information Statement introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Statement introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Configure VM host management properties. Set values in the edit vmhost hierarchy of
the configuration.
Operational Commands
Description Unlock the user account locked as a result of invalid login attempts.
Related • lockout-period
Documentation
• show system login lockout on page 559
Release Information Command introduced in Junos OS Release 11.2 for SRX300, SRX320, SRX345, and
SRX550M devices.
Description Prepare the system for autorecovery of configuration, licenses, and disk information.
Options save—Save the current state of the disk partitioning, configuration, and licenses for
autorecovery.
The active Junos OS configuration is saved as the Junos rescue configuration, after
which the rescue configuration, licenses, and disk partitioning information is saved
for autorecovery. Autorecovery information must be initially saved using this
command for the autorecovery feature to verify integrity of data on every bootup.
NOTE:
• Any recovery performed at a later stage will restore the data to the
same state as it was when the save command was executed.
After autorecovery data has been saved, the integrity of saved items is always
checked automatically on every bootup. The recovery command allows you to forcibly
re-run the tests at any time if required.
Only the autorecovery information is deleted; the original copies of the data used by
the router are not affected. Clearing the autorecovery information also disables all
autorecovery integrity checks performed during bootup.
List of Sample Output request system autorecovery state save on page 421
request system autorecovery state recover on page 421
request system autorecovery state clear on page 421
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Sample Output
Configuration:
File Recovery Information Integrity Check Action / Status
rescue.conf.gz Saved Passed None
Licenses:
File Recovery Information Integrity Check Action / Status
JUNOS282736.lic Saved Passed None
JUNOS282737.lic Saved Failed Recovered
BSD Labels:
Slice Recovery Information Integrity Check Action / Status
s1 Saved Passed None
s2 Saved Passed None
s3 Saved Passed None
s4 Saved Passed None
Sample Output
Release Information Command introduced in Junos OS Release 11.2 for SRX300, SRX320, SRX340, SRX345,
and SRX550M devices.
Command introduced in Junos OS Release 13.2X50-D15 for EX Series switches.
Description Abort a download. The download instance is stopped and cannot be resumed. Any
partially downloaded file is automatically deleted to free disk space. Information regarding
the download is retained and can be displayed with the show system download command
until a request system download clear operation is performed.
NOTE: Only downloads in the active, paused, and error states can be aborted.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Release Information Command introduced in Junos OS Release 11.2 for SRX300, SRX320, SRX340, SRX345,
and SRX550M devices.
Command introduced in Junos OS Release 13.2X50-D15 for EX Series switches.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Release Information Command introduced in Junos OS Release 11.2 for SRX300, SRX320, SRX340, SRX345,
and SRX550M devices.
Command introduced in Junos OS Release 13.2X50-D15 for EX Series switches.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Release Information Command introduced in Junos OS Release 11.2 for SRX300, SRX320, SRX340, SRX345,
and SRX550M devices.
Command introduced in Junos OS Release 13.2X50-D15 for EX Series switches.
Description Resume a download that has been paused. Download instances that are not in progress
because of an error or that have been explicitly paused by the user can be resumed by
the user. The file will continue downloading from the point where it paused. By default,
the download resumes with the same bandwidth specified with the request system
download start command. The user can optionally specify a new (maximum) bandwidth
with the request system download resume command.
NOTE: Only downloads in the paused and error states can be resumed.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Syntax request system download start (sftp-url | delay | identity-file | login | max-rate | passphrase
| save as )
Release Information Command introduced in Junos OS Release 11.2 for SRX300, SRX320, SRX340, SRX345,
and SRX550M devices.
Command introduced in Junos OS Release 13.2X50-D15 for EX Series switches.
Description Create a download instance and identify it with a unique integer called the download ID.
Options sftp-url—(Required) The FTP or HTTP URL location of the file to be downloaded securely.
delay—(Optional) The number of hours after which the download should start (range
from 1 through 48 hours).
identity-file—(Required) The name of the file requesting a Secure FTP (SFTP) download.
The SFTP in smart download leverages public key authentication to authenticate a
download request. Users need to generate a private or public key pair before starting a
download, and then upload a public key to an SFTP server.
login—(Optional) The username and password for the server in the format
username:password.
passphrase—(Required) The passphrase to protect the private key file stored on the file
system. This option does not allow the user to enter a weak passphrase, which ensures
stronger security.
save-as—(Optional) The filename to be used for saving the file in the /var/tmp location.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
re—Upgrade baseboard BIOS/FPGA. There is an active BIOS image and a backup BIOS
image.
NOTE: Starting in Junos OS Release 17.2R1, you can upgrade the SSD
firmware on MX Series routers with the RE-S-X6-64G and
RE-MX2K-X8-64G Routing Engines.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
message message— Message that is displayed to all system users before stopping the
system.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Shutdown NOW!
[pid 7560]
root@quickland> Dec 8 08:57:37 Waiting (max 60 seconds) for system process `vnlru'
to stop...done
Waiting (max 60 seconds) for system process `vnlru_mem' to stop...done
Waiting (max 60 seconds) for system process `bufdaemon' to stop...done
Waiting (max 60 seconds) for system process `syncer' to stop...
Syncing disks, vnodes remaining...2 2 2 2 2 2 2 2 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0
0 0 0 0 0 done
Options filename—License key from a file or URL. Specify the filename or the URL where the key
is located.
Additional Information Although the | display xml rpc filter returns “xml rpc equivalent of this command is not
available,” the following RPC is supported for license installation:
<rpc>
<request-license-add>
<key-data> key </key-data>
</request-license-add>
</rpc>
<rpc>
<request-license-add>
<source> key-file </source>
</request-license-add>
</rpc>
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
jx4s5x hiri
E408408918: successfully added
add license complete (no errors)
Description Delete a license key. You can choose to delete one license at a time, all licenses at once,
or a list of license identifiers enclosed in brackets.
Related
Documentation
Options filename—License key from a file or URL. Specify the filename or the URL where the key
is located.
Additional Information Although the | display xml rpc filter returns “xml rpc equivalent of this command is not
available,” the following RPC is supported for saving installed license keys to a file or
URL:
<rpc>
<request-license-save>
<destination>destination</destination>
</request-license-save>
</rpc>
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Description If your device supports initial install from the EMS server in Products Supporting Juniper
Agile Licensing, you can use this command to install all licenses from the EMS server.
You can also autoupdate license keys from the LMS or EMS server.
NOTE: The request system license update command always uses the default
Juniper license server:
Options trial—(For non-Juniper Agile Licensing keys only) Immediately updates trial license keys
from the LMS server.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Trying to update license keys from https://ae1.juniper.net has been sent, use
show system license to check status.
Description Reboots the device and repartitions the compact flash. The CompactFlash card is
repartitioned only if it is possible to restore all the data on the CompactFlash card.
Otherwise, the operation is aborted, and a message is displayed indicating that the current
disk usage needs to be reduced.
List of Sample Output request system partition compact-flash (If Yes) on page 437
request system partition compact-flash (If No) on page 437
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Sample Output
message message— Message that is displayed to all system users before powering off
the system.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Shutdown NOW!
[pid 3300]
root@quickland> Dec 8 09:37:45 Waiting (max 60 seconds) for system process `vnlru'
to stop...done
Waiting (max 60 seconds) for system process `vnlru_mem' to stop...done
Waiting (max 60 seconds) for system process `bufdaemon' to stop...done
Waiting (max 60 seconds) for system process `syncer' to stop...
Syncing disks, vnodes remaining...2 2 2 2 2 2 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0
0 0 0 0 done
<in minutes>
<local>
<media (external | internal)>
<member member-id>
<message "text">
<other-routing-engine>
NOTE: Starting with Junos OS Release 15.1F3, the statement request system
reboot reboots only the guest operating system on the PTX5000 with
RE-PTX-X8-64G and, MX240, MX480, and MX960 with RE-S-X6-64G.
Starting with Junos OS Release 15.1F5, the statement request system reboot
reboots only the guest operating system on the MX2010, and MX2020 with
REMX2K-X8-64G.
all-lcc—(TX Matrix routers andTX Matrix Plus routers only) (Optional) On a TX Matrix
router or TX Matrix Plus router, reboot all line card chassis connected to the TX Matrix
or TX Matrix Plus router, respectively.
at time—(Optional) Time at which to reboot the software, specified in one of the following
ways:
• hh:mm—Absolute time on the current day at which to stop the software, specified
in 24-hour time.
in minutes—(Optional) Number of minutes from now to reboot the software. This option
is an alias for the at +minutes option.
lcc number——(TX Matrix routers and TX Matrix Plus routers only) (Optional) Line-card
chassis number.
Replace number with the following values depending on the LCC configuration:
• 0 through 7, when T1600 routers are connected to a TX Matrix Plus router with 3D
SIBs in a routing matrix.
local—(EX4200 switches and MX Series routers only) (Optional) Reboot the software
on the local Virtual Chassis member.
media (external | internal)—(EX Series switches and MX Series routers only) (Optional)
Reboot the boot media:
partition—(TX Matrix Plus routers only) (Optional) Reboot using the specified partition
on the boot media. This option has the following suboptions:
scc—(TX Matrix routers only) (Optional) Reboot the Routing Engine on the TX Matrix
switch-card chassis. If you issue the command from re0, re0 is rebooted. If you issue
the command from re1, re1 is rebooted.
sfc number—(TX Matrix Plus routers only) (Optional) Reboot the Routing Engine on the
TX Matrix Plus switch-fabric chassis. If you issue the command from re0, re0 is
rebooted. If you issue the command from re1, re1 is rebooted. Replace number with
0.
slice slice—(EX Series switches only) (Optional) Reboot a partition on the boot media.
This option has the following suboptions:
Additional Information Reboot requests are recorded in the system log files, which you can view with the show
log command (see show log). Also, the names of any running processes that are scheduled
to be shut down are changed. You can view the process names with the show system
processes command (see show system processes).
On a TX Matrix or TX Matrix Plus router, if you issue the request system reboot command
on the master Routing Engine, all the master Routing Engines connected to the routing
matrix are rebooted. If you issue this command on the backup Routing Engine, all the
backup Routing Engines connected to the routing matrix are rebooted.
NOTE: To reboot a router that has two Routing Engines, reboot the backup
Routing Engine (if you have upgraded it) first, and then reboot the master
Routing Engine.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Release Information Command introduced in Junos OS Release 9.0 for EX Series switches.
Option partition changed to slice in Junos OS Release 10.0 for EX Series switches.
Reboot requests are recorded in the system log files, which you can view with the show
log command. You can view the process names with the show system processes
command.
• local—Reboots the local switch, meaning the switch you are logged into, only.
at time—(Optional) Time at which to reboot the software, specified in one of the following
ways:
• hh:mm—Absolute time on the current day at which to reboot the software, specified
in 24-hour time.
in minutes—(Optional) Number of minutes from now to reboot the software. This option
is an alias for the at +minutes option.
media (external | internal)—(Optional) Boot medium for the next boot. The external
option reboots the switch using a software package stored on an external boot
source, such as a USB flash drive. The internal option reboots the switch using a
software package stored in an internal memory source.
message “text”—(Optional) Message to display to all system users before rebooting the
software.
• alternate—Reboot from the alternate partition, which is the partition that did not
boot the switch at the last bootup.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
The following example, which assumes that the time is 5 PM (17:00), illustrates three
different ways to request the system to reboot in two hours:
To reboot the system at 1:20 AM, enter the following command. Because 1:20 AM is the
next day, you must specify the absolute time.
Release Information Command introduced in Junos OS Release 15.1 for MX240, MX480, MX960, MX2010,
and MX2020 routers and EX9200 switches.
Command introduced in Junos OS Release 15.1X53-D30 for QFX5200 switches.
at time—(Optional) Time at which to reboot the software, specified in one of the following
ways:
• hh:mm—Absolute time on the current day at which to stop the software, specified
in 24-hour time.
in minutes—(Optional) Number of minutes from now to reboot the software. This option
is an alias for the at +minutes option.
Engine, the backup Routing Engine is rebooted. Similarly, if you issue the command
from the backup Routing Engine, the master Routing Engine is rebooted.
Additional Information Reboot requests are recorded in the system log files, which you can view with the show
log command (see show log). Also, the names of any running processes that are scheduled
to be shut down are changed. You can view the process names with the show system
processes command (see show system processes).
NOTE: To reboot a router or switch that has two Routing Engines, reboot the
backup Routing Engine (if you have upgraded it) first, and then reboot the
master Routing Engine.
Related • request system snapshot (Junos OS with Upgraded FreeBSD) on page 465
Documentation
• show system snapshot (Junos OS with Upgraded FreeBSD) on page 568
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Release Information Command introduced in Junos OS Release 15.1 for MX240, MX480, MX960, MX2010,
and MX2020 routers and EX9200 switches only.
Command introduced in Junos OS Release 15.1X53-D30 for QFX5200 switches.
Command introduced in Junos OS Release 15.1X53-D60 for QFX10000 switches.
Command introduced in Junos OS Release 16.1R1 for VM host on MX240, MX480, MX960,
MX2010, and MX2020 routers and PTX5000 routers.
Command introduced in Junos OS Release 17.3 for SRX5400, SRX5600, and SRX5800
devices.
Options junos-volume—Specify the /junos volume to be recovered. The /junos volume is the main
drive and contains all the software and files needed for the day-to-day running of
the device, including configuration information and logs. The/junos volume also
contains non-recovery snapshots, which are new with Junos OS with upgraded
FreeBSD. Non-recovery snapshots cannot be used for recovery of a failed system.
oam-volume—Specify the /oam volume to be recovered. The compact flash drive is the
/oam volume and stores recovery snapshot backup information. In case of failure
of the /junos volume, the /oam volume can be used to boot the system. The /oam
volume has the recovery snapshot, which is created with the request system snapshot
recovery command. A recovery snapshot is always replaced when a new recovery
snapshot is taken.
Additional Information If you try to recover the junos volume while you are booted on the junos volume, you will
get an error message.
List of Sample Output request system recover junos-volume (While booted on the junos volume) on page 453
request system recover junos-volume (While booted on the oam volume) on page 453
request system recover oam-volume on page 453
Sample Output
Description CLI command to install AI-Script (jais) packages on Juniper Networks devices.
NOTE: If you use the no-copy option during the jais installation, the jais
package cannot be rolled back.
Description CLI command to delete AI-Script (jais) packages on Juniper Networks devices.
Description Attempt to roll back to most recent installation of AI-Scripts (jais) package.
Option media usb-port-number introduced in Junos OS Release 13.2 for MX104 routers.
Options <config-partition>, <root-partition>, and <slice> deprecated for Junos OS with
Upgraded FreeBSD in Junos OS Release 15.1
Description • On the router, back up the currently running and active file system partitions to standby
partitions that are not running. Specifically, the root file system (/) is backed up to
/altroot, and /config is backed up to /altconfig. The root and /config file systems are
on the router's flash drive, and the /altroot and /altconfig file systems are on the router's
hard drive.
• On the switch, take a snapshot of the files currently used to run the switch—the
complete contents of the root (/) , /altroot, /config, /var, and /var-tmp directories,
which include the running Junos OS, the active configuration, and log files.
CAUTION: After you run the request system snapshot command, you cannot
return to the previous version of the software, because the running and backup
copies of the software are identical.
NOTE: Starting with Junos OS Release 15.1F3, the statement request system
snapshot creates a snapshot of the guest OS image only for the PTX5000
with RE-DUO-C2600-16G, and the MX240, MX480, and MX960 routers with
RE-S-1800X4-32G-S.
Starting with Junos OS Release 15.1F5, the statement request system snapshot
creates a snapshot of the guest OS image only for the MX2010 and MX2020
routers with REMX2K-1800-32G-S.
On these routers, in order to create snapshot of the host OS image along with
Junos OS image, use the request vmhost snapshot command.
Options The specific options available depend upon the router or switch:
• On the router, back up the currently running and active file system partitions to
standby partitions that are not running. Specifically, the root file system (/) is
backed up to /altroot, and /config is backed up to /altconfig. The root and /config
file systems are on the router's flash drive, and the /altroot and /altconfig file
systems are on the router's hard drive.
• On the switch, take a snapshot of the files currently used to run the switch and
copy them to the media that the switch did not boot from. If the switch is booted
from internal media, the snapshot is copied to external (USB) media. If the switch
is booted from external (USB) media, the snapshot is copied to internal media.
• If the snapshot destination is external media but a USB flash drive is not
connected, an error message is displayed.
all-chassis | all-lcc | lcc number —(TX Matrix and TX Matrix Plus router only) (Optional)
• all-chassis—On a TX Matrix router, archive data and executable areas for all Routing
Engines in the chassis. On a TX Matrix Plus router, archive data and executable
areas for all Routing Engines in the chassis.
• all-lcc—On a TX Matrix router, archive data and executable areas for all T640
routers (or line-card chassis) connected to a TX Matrix router. On a TX Matrix Plus
router, archive data and executable areas for all routers (or line-card chassis)
connected to a TX Matrix Plus router.
• lcc number—On a TX Matrix router, archive data and executable areas for a specific
T640 router (or line-card chassis) that is connected to a TX Matrix router. On a
TX Matrix Plus router, archive data and executable areas for a specific router
(line-card chassis) that is connected to a TX Matrix Plus router.
Replace number with the following values depending on the LCC configuration:
• 0 through 7, when T1600 routers are connected to a TX Matrix Plus router with
3D SIBs in a routing matrix.
media type—(ACX Series, M320, T640, MX960 routers, and EX Series switches
only)(Optional) Specify the boot device the software is copied to:
• usb—(ACX Series, M320, T640, MX960 routers only) Copy software to the device
connected to the USB port.
• usb0—(MX104 routers only) Copy software to the device connected to the USB0
port.
• usb1—(MX104 routers only) Copy software to the device connected to the USB1
port.
partition—(Optional) Repartition the flash drive before a snapshot occurs. If the partition
table on the flash drive is corrupted, the request system snapshot command fails
and reports errors. The partition option is only supported for restoring the software
image from the hard drive to the flash drive.
(Routers only) You cannot issue the request system snapshot command when you
enable flash disk mirroring. We recommend that you disable flash disk mirroring
when you upgrade or downgrade the software. For more information, see the Junos
OS Administration Library.
(EX Series switches only) If the snapshot destination is the media that the switch
did not boot from, you must use the partition option.
root-partition—(M, MX, T, TX Series routers only) Create a snapshot of the root partition
only and store it onto the default /altroot on the hard disk device or an /altroot on a
USB device. Option deprecated for Junos OS with Upgraded FreeBSD in Junos OS
Release 15.1.
slice alternate—(EX Series switches only) (Optional) Take a snapshot of the active root
partition and copy it to the alternate slice on the boot media.
Option deprecated for Junos OS with Upgraded FreeBSD in Junos OS Release 15.1.
scc—(TX Matrix router only) (Optional) Archive data and executable areas for a TX Matrix
router (or switch-card chassis).
sfc number—(TX Matrix Plus router only) (Optional) Archive data and executable areas
for a TX Matrix Plus router (or switch-fabric chassis). Replace number with 0.
Additional Information • (Routers only) Before upgrading the software on the router, when you have a known
stable system, issue the request system snapshot command to back up the software,
including the configuration, to the /altroot and /altconfig file systems. After you have
upgraded the software on the router and are satisfied that the new packages are
successfully installed and running, issue the request system snapshot command again
to back up the new software to the /altroot and /altconfig file systems.
• (Routers only) You cannot issue the request system snapshot command when you
enable flash disk mirroring. We recommend that you disable flash disk mirroring when
you upgrade or downgrade the software. For more information, see the Junos OS
Administration Library
• (TX Matrix and TX Matrix Plus router only) On a routing matrix, if you issue the request
system snapshot command on the master Routing Engine, all the master Routing
Engines connected to the routing matrix are backed up. If you issue this command on
the backup Routing Engine, all the backup Routing Engines connected to the routing
matrix are backed up.
Related • request system snapshot (Junos OS with Upgraded FreeBSD) on page 465
Documentation
• show system snapshot on page 565
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
lcc2-re0:
--------------------------------------------------------------------------
Copying '/' to '/altroot' .. (this may take a few minutes)
Copying '/config' to '/altconfig' .. (this may take a few minutes)
The following filesystems were archived: / /config
fpc1:
--------------------------------------------------------------------------
fpc2:
--------------------------------------------------------------------------
Copying '/dev/da0s2a' to '/dev/da0s1a' .. (this may take a few minutes)
The following filesystems were archived: /
fpc3:
--------------------------------------------------------------------------
Copying '/dev/da0s2a' to '/dev/da0s1a' .. (this may take a few minutes)
The following filesystems were archived: /
fpc4:
--------------------------------------------------------------------------
Copying '/dev/da0s2a' to '/dev/da0s1a' .. (this may take a few minutes)
The following filesystems were archived: /
fpc5:
--------------------------------------------------------------------------
Copying '/dev/da0s2a' to '/dev/da0s1a' .. (this may take a few minutes)
The following filesystems were archived: /
Release Information Command introduced in Junos OS Release 15.1 for MX240, MX480, MX960, MX2010,
and MX2020 routers and EX9200 switches.
Command introduced in Junos OS Release 17.3 for SRX5400, SRX5600, and SRX5800
devices.
Command introduced for all platforms using Junos OS with upgraded FreeBSD. To find
which platforms in which releases use Junos with upgraded FreeBSD, see Feature Explorer,
enter freebsd, and select Junos kernel upgrade to FreeBSD 10+.
Description Junos OS with upgraded FreeBSD has two types of snapshots: recovery snapshots and
non-recovery snapshots. Non-recovery snapshots are the ones taken with the request
system snapshot command. Non-recovery snapshots are essentially lists of software
components and configuration files, which can be helpful when major software or
configuration changes are occurring and establishment of a known stable system baseline
is required.
On the router or switch, back up the currently running and active file system partitions
to standby partitions that are not running. Non-recovery snapshots are named
snap.date.time and stored in the /packages/sets directory.
CAUTION: After you run the request system snapshot command, you cannot
return to the previous version of the software, because the running and backup
copies of the software are identical.
Options none—On the router or switch, back up the currently running and active file system
partitions to standby partitions that are not running. Specifically, this creates a
non-recovery snapshot named snap.<date>.<time> which is stored in /packages/sets.
media type—(Optional) Specify the boot device the software is copied to:
• usb—(MX960 routers only) Copy software to the device connected to the USB
port.
Additional Information Before upgrading the software on the router or switch, when you have a known stable
system, issue the request system snapshot command to back up the software, including
the configuration, to the /packages/sets file systems. After you have upgraded the
software on the router or switch and are satisfied that the new packages are successfully
installed and running, issue the request system snapshot command again to back up the
new software to the /packages/sets file systems.
The snapshot script (which is the script that generates output for non-recovery snapshots)
does not generate XML output. In such cases, the <output> tag is used.
Related • Changes in Use of Snapshots for Junos OS with Upgraded FreeBSD on page 41
Documentation
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Description Back up the currently running and active file system partitions on the device.
NOTE: USB option is available on all SRX series devices; hard disk and
compact-flash options are available only on SRX5800, SRX5600, and
SRX5400 devices; media internal option is available only on SRX300,
SRX320, SRX340, SRX345, and SRX550M devices.
• external— Copies the snapshot to an external storage device. This option is available
for the compact flash on the SRX650 Services Gateway.
• partition—(Default) Specify that the target media should be repartitioned before the
backup is saved to it.
• factory— (Optional) Specifies that only the files shipped from the factory are included
in the snapshot.
• node—(Optional) Specify the archive data and executable areas of a specific node.
• slice—(Optional) Take a snapshot of the root partition the system has currently booted
from to another slice in the same media.
• alternate—(Optional) Store the snapshot on the other root partition in the system.
NOTE: The slice option cannot be used along with the other request system
snapshot options, because the options are mutually exclusive. If you use
the factory, media, or partition option, you cannot use the slice option; if
you use the slice option, you cannot use any of the other options.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Release Information Command introduced in Junos OS Release 11.2 for SRX300, SRX320, SRX340, SRX345,
and SRX550M devices.
Description Abort an in-band cluster upgrade (ICU). This command must be issued from a router
session other than the one on which you issued the request system in-service-upgrade
command that launched the ICU. If an ICU is in progress, this command aborts it. If the
node is being upgraded, this command will cancel the upgrade. The command is also
helpful in recovering the node in case of a failed ICU.
NOTE: We recommend that you use the command only when there is an
issue with the ongoing session of ISSU. You may need to manually intervene
to bring the system to sane state if after issuing the command the system
does not recover from the abort.
List of Sample Output request system software abort in-service-upgrade on page 471
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
<unlink>
<upgrade-with-config>
<validate>
<validate-on-host hostname>
<validate-on-routing-engine routing-engine>
Description NOTE: We recommend that you always download the software image to
/var/tmp only. On EX Series and QFX Series switches, you must use the
/var/tmp directory. Other directories are not supported.
For information on valid filename and URL formats, see Format for Specifying Filenames
and URLs in Junos OS CLI Commands.
NOTE: Starting with Junos OS Release 15.1F3, the statement request system
software add installs a software package for the guest OS only for the
PTX5000 router with RE-DUO-C2600-16G, and for MX240, MX480, and
MX960 routers with RE-S-1800X4-32G-S.
Starting with Junos OS Release 15.1F5, the statement request system software
add installs a software package for the guest OS only for the MX2010 and
MX2020 routers with REMX2K-1800-32G-S.
On these routers, in order to install both Junos software and host software
packages, use the request vmhost software add command.
NOTE:
• The pathname in the protocol is the relative path to the user’s home
directory on the remote system and not the root directory.
• Do not use the scp protocol in the request system software add
command to download and install a software package or bundle from
a remote location. The previous statement does not apply to the
QFabric switch. The software upgrade is handled by the management
process (mgd), which does not support scp.
Use the file copy command to copy the software package or bundle
from the remote location to the /var/tmp directory on the hard disk:
file copy scp://source/package-name /var/tmp
Then install the software package or bundle using the request system
software add command:
request system software add /var/tmp/package-name
force—(Optional) Force the addition of the software package or bundle (ignore warnings).
lcc number —(TX Matrix routers and TX Matrix Plus routers only) (Optional) In a routing
matrix based on the TX Matrix router, install a software package or bundle on a T640
router that is connected to the TX Matrix router. In a routing matrix based on the TX
Matrix Plus router, install a software package or bundle on a router that is connected
to the TX Matrix Plus router.
Replace number with the following values depending on the LCC configuration:
• 0 through 7, when T1600 routers are connected to a TX Matrix Plus router with 3D
SIBs in a routing matrix.
partition —(QFX3500 switches only) (Optional) Format and repartition the media before
installation.
satellite slot-id—(Junos Fusion only) (Optional) Install the satellite software package
onto the specified satellite device using the satellite devices FPC slot identifier.
scc—(TX Matrix routers only) (Optional) Install a software package or bundle on a Routing
Engine on a TX Matrix router (or switch-card chassis).
sfc number—(TX Matrix Plus routers only) (Optional) Install a software package or bundle
on a Routing Engine on a TX Matrix Plus router. Replace number with 0.
no-copy—(Optional) Install a software package or bundle, but do not save copies of the
package or bundle files.
reboot—(Optional) After adding the software package or bundle, reboot the system. On
a QFabric switch, the software installation is not complete until you reboot the
component for which you have installed the software.
• In the case of mixed EX4200 and EX4500 Virtual Chassis, install two software
packages—a package for an EX4200 switch and the same release of the package
for an EX4500 switch—to upgrade all member switches in a mixed EX4200 and
EX4500 Virtual Chassis.
• In the case of M Series, MX Series, and T Series routers, install multiple (two or
more) software packages and software add-on packages at the same time. The
variable package-name can either be a list of installation packages, each separated
by a blank space, or the full URL to the directory or tar file containing the list of
installation packages.
Use the request system software add set command to retain any SDK configuration
by installing the SDK add-on packages along with the core Junos OS installation
package.
unlink—(Optional) On M Series, T Series, and MX Series routers, use the unlink option to
remove the software package from this directory after a successful upgrade is
completed.
NOTE: Configuration files specified with this option must have the
extension .text or .xml and have the extension specified. Using the
extension .txt will not work.
NOTE: The validate option only works on systems that do not have
graceful-switchover (GRES) enabled. To use the validate option on a
system with GRES, either disable GRES for the duration of the installation,
or install using the command request system software in-service-upgrade,
which requires nonstop active routing (NSR) to be enabled when using
GRES.
Additional Information Before upgrading the software on the router or switch, when you have a known stable
system, issue the request system snapshot command to back up the software, including
the configuration, to the /altroot and /altconfig file systems. After you have upgraded
the software on the router or switch and are satisfied that the new package or bundle is
successfully installed and running, issue the request system snapshot command again
to back up the new software to the /altroot and /altconfig file systems.
After you run the request system snapshot command, you cannot return to the previous
version of the software because the running and backup copies of the software are
identical.
If you are upgrading more than one package at the same time, delete the operating
system package, jkernel, last. Add the operating system package, jkernel, first and the
routing software package, jroute, last. If you are upgrading all packages at once, delete
and add them in the following order:
By default, when you issue the request system software add package-name command on
a TX Matrix master Routing Engine, all the T640 master Routing Engines that are
connected to it are upgraded to the same version of software. If you issue the same
command on the TX Matrix backup Routing Engine, all the T640 backup Routing Engines
that are connected to it are upgraded to the same version of software.
Likewise, when you issue the request system software add package-name command on
a TX Matrix Plus master Routing Engine, all the T1600 or T4000 master Routing Engines
that are connected to it are upgraded to the same version of software. If you issue the
same command on the TX Matrix Plus backup Routing Engine, all the T1600 or T4000
backup Routing Engines that are connected to it are upgraded to the same version of
software.
When you install a software package and request a system reboot or install a package
that rebuilds the Junos OS schema, such as an OpenConfig package, the device deletes
all ephemeral configuration data in the process. To restore the ephemeral configuration
data, you must load and commit the data to the ephemeral configuration database.
Related • Format for Specifying Filenames and URLs in Junos OS CLI Commands
Documentation
• request system software delete on page 489
List of Sample Output request system software add validate on page 482
request system software add /var/tmp/ no-validate on page 482
request system software add no-copy no-validate reboot on page 483
request system software add validate-on-host on page 483
request system software add (Mixed EX4200 and EX4500 Virtual Chassis) on page 484
request system software add component all (QFabric Systems) on page 485
request system software add upgrade-group (Junos Fusion) on page 485
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Verified metatags
Verified package.xml
Verified pkgtools.tgz
camcontrol: not found
camcontrol: not found
Verified manifest signed by PackageProductionEc_2015
Saving the config files ...
NOTICE: uncommitted changes have been saved in
/var/db/config/juniper.conf.pre-install
Saving package file in
/var/sw/pkg/junos-install-x86-32-domestic-20150618.043753_builder_junos_151_r1.tgz
...
Saving state for rollback ...
Using jkernel-15.1-20150516_ib_15_2_psd.0
Verified manifest signed by PackageDevelopmentEc_2015
Using jroute-15.1-20150516_ib_15_2_psd.0
Verified manifest signed by PackageDevelopmentEc_2015
Using jcrypto-15.1-20150516_ib_15_2_psd.0
Verified manifest signed by PackageDevelopmentEc_2015
Using jweb-15.1-20150516_ib_15_2_psd.0
Verified manifest signed by PackageDevelopmentEc_2015
Using /var/packages/jtools-15.1-20150516_ib_15_2_psd.0
Verified manifest signed by PackageDevelopmentEc_2015
Using /var/tmp/config.tgz
Hardware Database regeneration succeeded
Validating against /config/juniper.conf.gz
mgd: warning: schema: init: 'logical-systems-vlans' contains-node 'juniper-config
vlans': not found
mgd: commit complete
Validation succeeded
Installing package
'/var/tmp/jinstall-15.1-20150516_ib_15_2_psd.0-domestic-signed.tgz' ...
Verified jinstall-15.1-20150516_ib_15_2_psd.0-domestic.tgz signed by
PackageDevelopmentEc_2015
Adding jinstall...
Sample Output
request system software add (Mixed EX4200 and EX4500 Virtual Chassis)
user@switch> request system software add set
[/var/tmp/jinstall-ex-4200-11.1R1.1-domestic-signed.tgz
/var/tmp/jinstall-ex-4500-11.1R1.1-domestic-signed.tgz]
...
Release Information Partition option introduced in the command in Junos OS Release 10.1.
Description Install the new software package on the device, for example: request system software
add junos-srxsme-10.0R2-domestic.tgz no-copy no-validate partition reboot.
Options • delay–restart—Install the software package but does not restart the software process.
• no-copy—Install the software package but does not saves the copies of package files.
Release Information Command introduced in Junos OS Release 11.3 for the QFX Series.
Description Save the currently active configuration and any installation-specific parameters such as
a configuration that you have entered outside of the CLI, Director group IP addresses,
and the default partition IP address.
Options path—(QFabric System) Provide the path to the location of the backup configuration
files. You can save the backup configuration files to either a URL, local directory, remote
server, or removable drive.
Required Privilege configure—To enter configuration mode, but other required privilege levels depend on
Level where the statement is located in the configuration hierarchy.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Release Information Command introduced in Junos OS Release 11.3 for the QFX Series.
Description Restore a previously saved configuration and any installation-specific parameters, such
as a configuration that you have entered outside of the CLI, Director group IP addresses,
and the default partition IP address.
Options path—(QFabric System) Provide the path to the location of the backup configuration
files. The path can be to a local file, a file on an external flash drive, or an SCP or FTP
destination.
Required Privilege configure—To enter configuration mode, but other required privilege levels depend on
Level where the statement is located in the configuration hierarchy.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Options software-package—Software package or bundle name. You can delete any or all of the
following software bundles or packages:
lcc number—(TX Matrix routers and TX Matrix Plus routers only) (Optional) In a routing
matrix, delete a software package or bundle on a T640 router indicated by lcc number
that is connected to the TX Matrix router. In a routing matrix, delete a software
package or bundle on a router indicated by lcc number that is connected to the TX
Matrix Plus router.
Replace number with the following values depending on the LCC configuration:
• 0 through 7, when T1600 routers are connected to a TX Matrix Plus router with 3D
SIBs in a routing matrix.
reboot—As of Junos OS 12.3 and greater, automatically reboot upon completing the
request system software delete command.
scc—(TX Matrix routers only) (Optional) Remove an extension or upgrade package from
the TX Matrix router (or switch-card chassis).
sfc number—(TX Matrix Plus routers only) (Optional) Remove an extension or upgrade
package from the TX Matrix Plus router. Replace number with 0.
A satellite software upgrade group is a group of satellite devices in the same Junos
Fusion that are designated to upgrade to the same satellite software version using
the same satellite software package.
Additional Information Before upgrading the software on the router or switch, when you have a known stable
system, issue the request system snapshot command to back up the software, including
the configuration, to the /altroot and /altconfig file systems (on routers) or the /, /altroot,
/config, /var, and /var/tmp file systems (on switches). After you have upgraded the
software on the router or switch and are satisfied that the new packages are successfully
installed and running, issue the request system snapshot command again to back up the
new software to the /altroot and /altconfig file systems (on routers) or the /, /altroot,
/config, /var, and /var/tmp file systems (on switches). After you run the request system
snapshot command, you cannot return to the previous version of the software, because
the running and backup copies of the software are identical.
List of Sample Output request system software delete jdocs on page 491
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
The following example displays the system software packages before and after the jdocs
package is deleted through the request system software delete command:
Comment:
JUNOS Base OS Software Suite [7.2R1.7]
Comment:
JUNOS Crypto Software Suite [7.2R1.7]
Comment:
JUNOS Online Documentation [7.2R1.7]
Comment:
JUNOS Kernel Software Suite [7.2R1.7]
...
Comment:
JUNOS Base OS Software Suite [7.2R1.7]
Comment:
JUNOS Crypto Software Suite [7.2R1.7]
Comment:
JUNOS Kernel Software Suite [7.2R1.7]
...
Release Information Command introduced in Junos OS Release 11.3 for the QFX Series.
Description Download a software package from a location on the Director device, mounted external
USB flash drive, remote FTP or SCP location, or other location.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Release Information Command introduced in Junos OS Release 14.1X53-D15 for the QFX Series.
Sample Output
Release Information Command introduced in Junos OS Release 14.1X53-D15 for the QFX Series.
Sample Output
LV Name /dev/VolGroup00/LogVol03
Restore volume selected is /dev/VolGroup00/LogVol03
Formatting restore volume
mke2fs 1.39 (29-May-2006)
Filesystem label=
OS type: Linux
Block size=4096 (log=2)
Fragment size=4096 (log=2)
62504960 inodes, 124993536 blocks
6249676 blocks (5.00%) reserved for the super user
First data block=0
Maximum filesystem blocks=4294967296
3815 block groups
32768 blocks per group, 32768 fragments per group
16384 inodes per group
Superblock backups stored on blocks:
32768, 98304, 163840, 229376, 294912, 819200, 884736, 1605632, 2654208,
4096000, 7962624, 11239424, 20480000, 23887872, 71663616, 78675968,
102400000
Description This command reverts to the last successfully installed package before the request
system software (add | delete) command. It uses the copy stored in the /var/sw/pkg
directory.
Additional Information
• On Junos Fusion, the request system software rollback command can be used to roll
back the version of satellite software associated with a satellite software upgrade
group. Rolling back the version of satellite software associated with a satellite software
upgrade group triggers a satellite software upgrade.
• On M Series and T Series routers, if request system software add <jinstall> reboot was
used for the previous installation, then request system software rollback has no effect.
In this case, use jinstall to reinstall the required package.
• On M Series and T Series routers, if request system software add <sdk1> was used for
the previous installation, then request system software rollback removes the last
installed SDK package (sdk1 in this example).
• On SRX Series devices with dual root systems, when request system software rollback
is run, the system switches to the alternate root. Each root can have a different version
of Junos OS. Roll back takes each root back to the previously installed image.
• On QFX3500 and QFX3600 devices in a mixed Virtual Chassis, when the request system
software rollback command is issued, the system does not rollback to the image stored
in the alternate partition.
• On QFX5100 switches, the reboot option has been removed. To reboot the switch after
a software rollback, issue the request system reboot command as a separate, secondary
command.
lcc number—(TX Matrix routers and TX Matrix Plus routers only) (Optional) On a TX
Matrix router, attempt to roll back to the previous set of packages on a T640 router
connected to the TX Matrix router. On a TX Matrix Plus router, attempt to roll back
to the previous set of packages on a connected router connected to the TX Matrix
Plus router.
Replace number with the following values depending on the LCC configuration:
• 0 through 7, when T1600 routers are connected to a TX Matrix Plus router with 3D
SIBs in a routing matrix.
local—(EX4200 switches and MX Series routers only) (Optional) Attempt to roll back
to the previous set of packages on the local Virtual Chassis member.
none—For all versions of Junos OS up to and including Junos OS 11.4, revert to the set of
software as of the last successful request system software add. As of Junos OS 12.1
and later, revert to the last known good state before the most recent request system
software (add | delete) command.
reboot—For Junos OS 12.3 and later, the system reboots automatically to complete the
rollback.
satellite slot-id—(Junos Fusion only) (Optional) Roll back the satellite software package
onto the specified satellite device using the satellite devices FPC slot identifier.
scc—(TX Matrix routers only) (Optional) Attempt to roll back to the previous set of
packages on the TX Matrix router (or switch-card chassis).
sfc number—(TX Matrix Plus routers only) (Optional) Attempt to roll back to the previous
set of packages on the TX Matrix Plus router. Replace number with 0.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Description Revert to the software that was loaded at the last successful request system software
add command. The FreeBSD 11 Junos OS image provides an option to save a recovery
image in an Operation, Administration, and Maintenance (OAM) partition, but that option
will save only the Junos OS image, not the Linux image. If a user saves the Junos OS image
and recovers it later, it might not be compatible with the Linux software loaded on the
system.
Description Validate candidate software against the current configuration of the router, the switch,or
a remote host.
Options lcc number—(TX Matrix routers and TX Matrix Plus routers only) (Optional) On a TX
Matrix router, validate the software bundle or package on a specific T640 router (or
line-card chassis) that is connected to the TX Matrix router. On a TX Matrix Plus
router, validate the software bundle or package for a specific router that is connected
to the TX Matrix Plus router.
Replace number with the following values depending on the LCC configuration:
• 0 through 7, when T1600 routers are connected to a TX Matrix Plus router with 3D
SIBs in a routing matrix.
member member-id—(MX Series routers only) (Optional) Validate the software bundle
or package on the specified member of the Virtual Chassis configuration. For an MX
Series Virtual Chassis, replace member-id with a value of 0 or 1.
scc—(TX Matrix routers only) (Optional) Validate the software bundle or package for
the TX Matrix router (or switch-card chassis).
sfc number—(TX Matrix Plus routers only) (Optional) Validate the software bundle or
package for the TX Matrix Plus router.
The options are validated during the validation process and applied to
the router or switch during the upgrade process. If the upgrade process
is successful, the options are removed from the configuration. If the
upgrade process fails, the configuration file is renamed with the .failed
suffix.
Additional Information By default, when you issue the request system software validate command on a TX Matrix
master Routing Engine, all the T640 master Routing Engines that are connected to it are
validated. If you issue the same command on the TX Matrix backup Routing Engine, all
the T640 backup Routing Engines that are connected to it are upgraded to the same
version of software.
Likewise, if you issue the request system software validate command on a TX Matrix Plus
master Routing Engine, all the T1600 or T4000 master Routing Engines that are
connected to it are validated. If you issue the same command on a TX Matrix Plus backup
Routing Engine, all the T1600 or T4000 backup Routing Engines that are connected to
it are upgraded to the same version of software.
List of Sample Output request system software validate (Successful Case) on page 506
request system software validate (Failure Case) on page 507
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
lcc0-re0:
gzip: stdin: not in gzip format
tar: child returned status 1
ERROR: Not a valid package: /var/tmp/test
Release Information Command introduced in Junos OS Release 15.1 for supported platforms. See Feature
Explorer.
Description Direct validation of a running configuration is not possible on a device running Junos OS
with upgraded FreeBSD. Nevertheless, validation is an important step in the installation
of an upgraded operating system. This command allows validation on a device that is
not running Junos OS with upgraded FreeBSD.
This command validates the current configuration on a Routing Engine that is not running
Junos OS with upgraded FreeBSD or a remote host.
Additional Information If the authenticity of the remote host cannot be established, you are prompted to continue
the validation or not. If you choose not to continue, the validation process does not take
place.
Related • request system reboot (Junos OS with Upgraded FreeBSD) on page 449
Documentation
• show system snapshot (Junos OS with Upgraded FreeBSD) on page 568
List of Sample Output request system software validate on host on page 509
request system software validate on routing-engine on page 509
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
Description Free storage space on the router or switch by rotating log files and proposing a list of files
for deletion. User input is required for file deletion. On a QFabric system, you can delete
debug files located on individual devices or on the entire QFabric system.
Options all-members—(EX4200 switches and MX Series routers only) (Optional) Delete files
on the Virtual Chassis master Routing Engine only.
component (UUID | serial number | all)—(QFabric systems only) (Optional) Delete files
located on individual QFabric system devices or on the entire QFabric system.
infrastructure name—(QFabric systems only) (Optional) Delete files on the fabric control
Routing Engine and fabric manager Routing Engine.
local—(EX4200 switches and MX Series routers only) (Optional) Delete files on the local
Virtual Chassis member.
name-tag name-tag—(QFabric systems only) (Optional) Delete debug files that match
a specific regular expression.
node-group name—(QFabric systems only) (Optional) Delete files on the Node group.
prune—(QFabric systems only) (Optional) Delete debug files located in either the core
or log debug repositories of a QFabric system device.
qfabric component name—(QFabric systems only) (Optional) Delete debug files located
in the debug repositories of a QFabric system device.
When Routing Engine is specified, the below message is shown before listing the
files and deleting them.
Please check the list of files to be deleted using the dry-run option. i.e.
request system storage cleanup dry-run
Do you want to proceed ? [yes,no] (no)
repository (core | log)—(QFabric systems only) (Optional) Specify the repository on the
QFabric system device for which you want to delete debug files.
Additional Information If logging is configured and being used, the dry-run option rotates the log files. In that
case, the output displays the message “Currently rotating log files, please wait.” If no
logging is currently under way, the output displays only a list of files to delete.
List of Sample Output request system storage cleanup dry-run on page 514
request system storage cleanup on page 515
request system storage cleanup director-group (QFabric Systems) on page 515
request system storage cleanup infrastructure device-name (QFabric
Systems) on page 517
request system storage cleanup interconnect-device device-name (QFabric
Systems) on page 518
request system storage cleanup node-group group-name (QFabric Systems) on page 519
request system storage cleanup qfabric component device-name (QFabric
Systems) on page 520
request system storage cleanup qfabric component device-name repository core
(QFabric Systems) on page 520
request system storage cleanup qfabric component all (QFabric Systems) on page 520
Output Fields Table 43 on page 514 describes the output fields for the request system storage cleanup
command. Output fields are listed in the approximate order in which they appear.
Repository scope: Repository where core-dump files and log files are stored. The
core-dump files are located in the core repository, and the log files
are located in the log repository. The default Repository scope is
shared since both the core and log repositories are shared by all of
the QFabric system devices.
Sample Output
Directory to delete:
45M 2011-11-08 10:57:43 /tmp/sfc-captures
Directory to delete:
49M 2011-11-08 10:45:20 /tmp/sfc-captures
re0:
--------------------------------------------------------------------------
EE3093:
--------------------------------------------------------------------------
request system storage cleanup qfabric component device-name repository core (QFabric Systems)
user@switch> request system storage cleanup qfabric component Test repository core
Repository scope: shared
Repository head: /pbdata/export
Repository name: core
Creating list of debug artifacts to be removed under: /pbdata/export/rdumps/Test
NOTE: core repository under /pbdata/export/rdumps/Test empty
Release Information Command introduced in Junos OS Release 9.2 for SRX Series.
Description Free storage space on the device by rotating log files and proposing a list of files for
deletion. User input is required for file deletion.
Options dry-run—(Optional) List files proposed for deletion (without deleting them).
Additional Information If logging is configured and being used, the dry-run option rotates the log files. In that
case, the output displays the message “Currently rotating log files, please wait.” If no
logging is currently under way, the output displays only a list of files to delete.
List of Sample Output request system storage cleanup dry-run on page 522
request system storage cleanup on page 524
Output Fields Table 43 on page 514 describes the output fields for the request system storage cleanup
command. Output fields are listed in the approximate order in which they appear.
Sample Output
Description Remove all configuration information on the Routing Engines and reset all key values on
the device where you run the command.
• If the device has dual Routing Engines, the command is broadcast to all Routing Engines
on the device.
The command removes all data files, including customized configuration and log files,
by unlinking the files from their directories. The command removes all user-created files
from the system, including all plain-text passwords, secrets, and private keys for SSH,
local encryption, local authentication, IPsec, RADIUS, TACACS+, and SNMP.
This command reboots the device and sets it to the factory default configuration. After
the reboot, you cannot access the device through the management Ethernet interface.
Log in through the console as root and start the Junos OS CLI by typing cli at the prompt.
NOTE: Starting with Junos OS Release 15.1F3, the request system zeroize
command removes all configuration information on the guest OS for the
PTX5000 router with RE-DUO-C2600-16G, and MX240, MX480, and MX960
with RE-S-1800X4-32G-S.
Starting with Junos OS Release 15.1F5, the request system zeroize command
removes all configuration information on the guest OS for the MX2010 and
MX2020 with REMX2K-1800-32G-S.
To completely erase user-created data so that it is unrecoverable, use the media option.
Options media—(Optional) In addition to removing all configuration and log files, causes memory
and the media to be scrubbed, removing all traces of any user-created files. Every
storage device attached to the system is scrubbed, including disks, flash drives,
removable USBs, and so on. The duration of the scrubbing process is dependent on
the size of the media being erased. As a result, the request system zeroize media
operation can take considerably more time than the request system zeroize operation.
However, the critical security parameters are all removed at the beginning of the
process.
local—(Optional) Remove all the configuration information and restore all the key values
on the active Routing Engine.
• Reverting to the Default Factory Configuration by Using the request system zeroize
Command on page 249
Sample Output
0 1 1 0 0 0 done
Booting [/kernel]...
Kernel entry at 0x800000e0 ...
GDB: no debug ports present
KDB: debugger backends: ddb
KDB: current backend: ddb
Copyright (c) 1996-2011, Juniper Networks, Inc.
All rights reserved.
Copyright (c) 1992-2006 The FreeBSD Project.
Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
The Regents of the University of California. All rights reserved.
JUNOS 11.1R1.8 #0: 2011-03-09 20:14:25 UTC
[email protected]:/volume/build/junos/11.1/release/11.1R1.8/obj-powerpc/bsd/kernels/
JUNIPER-EX/kernel
Timecounter "decrementer" frequency 50000000 Hz quality 0
cpu0: Freescale e500v2 core revision 2.2
cpu0: HID0 80004080
...
{master:0}
root> Waiting (max 60 seconds) for system process `vnlru' to stop...done
. . .
Syncing disks, vnodes remaining...2 4 2 4 3 2 1 1 0 0 0 done
Loading /boot/defaults/loader.conf
/kernel data=0x9abfdc+0xb06e4 syms=[0x4+0x83b30+0x4+0xbd7c6]
Amnesiac (ttyu0)
Description Display the current status of any USB mass storage device and whether the USB ports
are enabled or disabled.
Related • Installing Junos OS on SRX Series Devices Using a USB Flash Drive on page 141
Documentation
Sample Output
Description (ACX Series routers, and EX Series switches only) Display autoinstallation status
information.
• autoinstallation
Output Fields Table 45 on page 533 describes the output fields for the show system autoinstallation
status command. Output fields are listed in the approximate order in which they appear.
• Address acquisition—Display IP address acquired and protocol used for acquisition upon startup.
• Protocol—Protocol used for acquisition: BOOTP/DHCP or RARP.
• Acquired address—IP address acquired from the DHCP server.
Sample Output
Release Information Command introduced in Junos OS Release 11.2 for SRX300, SRX320, SRX340, SRX345,
and SRX550M devices.
Output Fields Table 46 on page 534 lists the output fields for the show system autorecovery state
command. Output fields are listed in the approximate order in which they appear.
File The name of the file on which autorecovery checks are performed.
Recovery Information Indicates whether autorecovery information for the file or slice has been saved.
Integrity Check Displays the status of the file's integrity check (passed or failed).
Action / Status Displays the status of the item, or the action required to be taken for that item.
Sample Output
Configuration:
File Recovery Information Integrity Check Action / Status
rescue.conf.gz Saved Passed None
Licenses:
File Recovery Information Integrity Check Action / Status
JUNOS282736.lic Saved Passed None
JUNOS282737.lic Not Saved Not checked Requires save
BSD Labels:
Slice Recovery Information Integrity Check Action / Status
s1 Saved Passed None
s2 Saved Passed None
Description Display initial messages generated by the system kernel upon startup. These messages
are the contents of /var/run/dmesg.boot.
all-chassis—(TX Matrix routers andTX Matrix Plus routers only) (Optional) Display boot
time messages for all of the chassis.
all-lcc—(TX Matrix routers and TX Matrix Plus routers only) (Optional) On a TX Matrix
router, display boot time messages for all T640 routers connected to a TX Matrix
router. On a TX Matrix Plus router, display boot time messages for all connected
T1600 or T4000 LCCs.
lcc number—(TX Matrix routers and TX Matrix Plus routers only) (Optional) On a TX
Matrix router, display boot time messages for a specific T640 router connected to
a TX Matrix router. On a TX Matrix Plus router, display boot time messages for a
specific router connected to a TX Matrix Plus router.
Replace number with the following values depending on the LCC configuration:
• 0 through 7, when T1600 routers are connected to a TX Matrix Plus router with 3D
SIBs in a routing matrix.
local—(EX4200 switches and MX Series routers only) (Optional) Display boot time
messages on the local Virtual Chassis member.
scc—(TX Matrix routers only) (Optional) Display boot time messages for the TX Matrix
router (or switch-card chassis).
sfc number—(TX Matrix Plus routers only) (Optional) Display boot time messages for
the TX Matrix Plus router. Replace number with 0.
Additional Information By default, when you issue the show system boot-messages command on the master
Routing Engine of a TX Matrix router or a TX Matrix Plus router, the command is broadcast
to all the master Routing Engines of the LCCs connected to it in the routing matrix.
Likewise, if you issue the same command on the backup Routing Engine of a TX Matrix
or a TX Matrix Plus router, the command is broadcast to all backup Routing Engines of
the LCCs that are connected to it in the routing matrix.
List of Sample Output show system boot-messages (TX Matrix Router) on page 538
show system boot-messages lcc (TX Matrix Router) on page 539
show system boot-messages (TX Matrix Plus Router) on page 540
show system boot-messages (QFX3500 Switch) on page 540
Sample Output
pci0:16:0
chip4 <generic PCI bridge (vendor=1011 device=0022 subclass=4)> rev 4 class 6040
0 on pci0:17:0
fxp1 <Intel EtherExpress Pro 10/100B Ethernet> rev 8 class 20000 int a irq 10 on
pci0:19:0
Probing for devices on PCI bus 1:
mcs0 <Miscellaneous Control Subsystem> rev 12 class ff0000 int a irq 12 on pci1:
13:0
fxp2 <Intel EtherExpress Pro 10/100B Ethernet> rev 8 class 20000 int a irq 10 on
pci1:14:0
Probing for devices on the ISA bus:
sc0 at 0x60-0x6f irq 1 on motherboard
sc0: EGA color <16 virtual consoles, flags=0x0>
ed0 not found at 0x300
ed1 not found at 0x280
ed2 not found at 0x340
psm0 not found at 0x60
sio0 at 0x3f8-0x3ff irq 4 flags 0x20010 on isa
sio0: type 16550A, console
sio1 at 0x3e8-0x3ef irq 5 flags 0x20000 on isa
sio1: type 16550A
sio2 at 0x2f8-0x2ff irq 3 flags 0x20000 on isa
sio2: type 16550A
pcic0 at 0x3e0-0x3e1 on isa
PC-Card ctlr(0) TI PCI-1131 [CardBus bridge mode] (5 mem & 2 I/O windows)
pcic0: slot 0 controller I/O address 0x3e0
npx0 flags 0x1 on motherboard
npx0: INT 16 interface
fdc0: direction bit not set
fdc0: cmd 3 failed at out byte 1 of 3
fdc0 not found at 0x3f0
wdc0 at 0x1f0-0x1f7 irq 14 on isa
wdc0: unit 0 (wd0): <SunDisk SQFXB-80>, single-sector-i/o
wd0: 76MB (156672 sectors), 612 cyls, 8 heads, 32 S/T, 512 B/S
wdc0: unit 1 (wd1): <IBM-DCXA-210000>
wd1: 8063MB (16514064 sectors), 16383 cyls, 16 heads, 63 S/T, 512 B/S
wdc1 not found at 0x170
wdc2 not found at 0x180
ep0 not found at 0x300
fxp0: Ethernet address 00:a0:a5:12:05:5a
fxp1: Ethernet address 00:a0:a5:12:05:59
fxp2: Ethernet address 02:00:00:00:00:01
swapon: adding /dev/wd1s1b as swap device
Automatic reboot in progress...
/dev/rwd0s1a: clean, 16599 free (95 frags, 2063 blocks, 0.1% fragmentation)
/dev/rwd0s1e: clean, 9233 free (9 frags, 1153 blocks, 0.1% fragmentation)
/dev/rwd0s1a: clean, 16599 free (95 frags, 2063 blocks, 0.1% fragmentation)
/dev/rwd1s1f: clean, 4301055 free (335 frags, 537590 blocks, 0.0% fragmentation)
[email protected]:/build/benten-b/7.0/20040912.0/obj-i386/sys/compile/JUNIPER
Timecounter "i8254" frequency 1193182 Hz
Timecounter "TSC" frequency 601368936 Hz
CPU: Pentium III/Pentium III Xeon/Celeron (601.37-MHz 686-class CPU)
Origin = "GenuineIntel" Id = 0x68a Stepping = 10
Features=0x387f9ff<FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,PN,MMX,FXSR,SSE>
real memory = 2147467264 (2097136K bytes)
sio0: gdb debugging port
avail memory = 2084040704 (2035196K bytes)
Preloaded elf kernel "kernel" at 0xc06d9000.
DEVFS: ready for devices
Pentium Pro MTRR support enabled
md0: Malloc disk
DRAM Data Integrity Mode: ECC Mode with h/w scrubbing
npx0: <math processor> on motherboard
npx0: INT 16 interface
pcib0: <ServerWorks NB6635 3.0LE host to PCI bridge> on motherboard
pci0: <PCI bus> on pcib0
pcic-pci0: <TI PCI-1410 PCI-CardBus Bridge> irq 15 at device 1.0 on pci0
pcic-pci0: TI12XX PCI Config Reg: [pwr save][pci only]
fxp0: <Intel Embedded 10/100 Ethernet> port 0x1000-0x103f mem
0xfb800000-0xfb81ffff,0xfb820000-0xfb820fff irq 9 at device 3.0 on pci0
fxp1: <Intel Embedded 10/100 Ethernet> port 0x1040-0x107f mem
0xfb840000-0xfb85ffff,0xfb821000-0xfb821fff irq 11 at device 4.0 on pci0
...
[email protected]:/volume/build/junos/9.6/release/9.6B3.3/obj-i386/bsd/sys/compile/JUNIPER
MPTable: Timecounter "i8254" frequency 1193182 Hz quality 0 CPU: Intel(R) Xeon(R)
CPU L5238 @ 2.66GHz (2660.01-MHz 686-class CPU) Origin =
"GenuineIntel" Id = 0x1067a Stepping = 10 Features=0xbfebfbff
...
lcc1-re0:
--------------------------------------------------------------------------
Copyright (c) 1996-2009, Juniper Networks, Inc.
All rights reserved.
Copyright (c) 1992-2006 The FreeBSD Project.
Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
The Regents of the University of California. All rights reserved.
JUNOS 9.6-20090617.0 #0: 2009-06-17 04:15:14 UTC
[email protected]:/volume/build/junos/9.6/production/20090617.0/obj-i386/bsd/sys/compile/JUNIPER
Timecounter "i8254" frequency 1193182 Hz quality 0
CPU: Intel(R) Xeon(R) CPU @ 1.86GHz (1862.01-MHz 686-class CPU)
Release Information Command introduced in Junos OS Release 12.3 for EX Series switches.
Command introduced in Junos OS Release 12.1X45-D10 for SRX Series devices.
Description Display automatic snapshot status information. When the automatic snapshot feature
is enabled and the system reboots from the alternate root partition, the switch
automatically takes a snapshot of the root file system in the alternate root partition and
copies it onto the primary root partition. This automatic snapshot procedure takes place
whenever the system reboots from the alternate partition, regardless of whether the
reboot from the alternate partition is due to a command or due to a corruption of the
primary partition.
Output Fields Table 47 on page 543 describes the output fields for the show system auto-snapshot
command. Output fields are listed in the approximate order in which they appear.
• Completed—The automatic snapshot procedure has completed copying the alternate partition to
the primary partition and the alarm has been cleared.
• Disabled—The automatic snapshot procedure is inactive.
• In progress—The automatic snapshot procedure is in progress. It takes about 10 to 15 minutes to
complete, depending upon disk size.
Sample Output
Release Information Command introduced in Junos OS Release 11.2 for SRX300, SRX320, SRX340, SRX345,
and SRX550M devices.
Description Display a brief summary of all the download instances along with their current state and
extent of progress. If a download-id is provided, the command displays a detailed report
of the particular download instance.
Output Fields Table 48 on page 545 lists the output fields for the show system download command.
Output fields are listed in the approximate order in which they appear.
URL Displays the URL from which the file was downloaded.
Sample Output
Download ID : 1
Status : Active
Progress : 6%
URL : ftp://ftp-server//tftpboot/1m_file
Local Path : /var/tmp/1m_file
Maximum Rate : 1k
Creation Time : May 4 06:28:36
Scheduled Time : May 4 06:28:36
Start Time : May 4 06:28:37
Error Count : 0
Description Display licenses and information about how they are used.
keys—(Optional) Display a list of license keys. Use this information to verify that each
expected license key is present.
Related
Documentation
List of Sample Output show system license (vMX Routers with Juniper Agile Licensing) on page 548
show system license on page 549
show system license installed on page 550
show system license keys on page 550
show system license usage on page 550
show system license (MX104 Routers) on page 550
show system license installed (MX104 Routers) on page 551
show system license keys (MX104 Routers) on page 551
show system license usage (MX104 Routers) on page 551
show system license (MX104 Routers) on page 551
show system license installed (MX104 Routers) on page 552
show system license keys (MX104 Routers) on page 552
show system license usage (MX104 Routers) on page 552
show system license (MX104 Routers) on page 553
show system license installed (MX104 Routers) on page 553
Output Fields Table 49 on page 548 lists the output fields for the show system license command. Output
fields are listed in the approximate order in which they appear.
Feature name Name assigned to the configured feature. You use this information to verify that all the features for
which you installed licenses are present.
Licenses used Number of licenses used by a router or switch. You use this information to verify that the number of
licenses used matches the number configured. If a licensed feature is configured, the feature is
considered used.
NOTE: In Junos OS Release 10.1 and later, the Licenses used column displays the actual usage count
based on the number of active sessions or connections as reported by the corresponding feature
daemons. This is applicable for scalable license-based features such as Subscriber Access
(scale-subscriber), L2TP (scale-l2tp), Mobile IP (scale-mobile-ip), and so on.
Licenses needed Number of licenses required for features being used but not yet properly licensed.
Expiry Amount of time left within the grace period before a license is required for a feature being used.
Sample Output
Licenses installed:
License identifier: RMS818090001
License version: 1
Software Serial Number: AID000000001
Customer ID: LABJuniperTest
License count: 1
Features:
VMX-SCALE - Max scale supported by the VMX
date-based, 2017-03-15 05:30:00 IST - 2017-05-14 05:30:00 IST
License usage:
Licenses Licenses Licenses Expiry
Feature name used installed needed
subscriber-accounting 2 2 0 permanent
subscriber-authentication 1 2 0 permanent
subscriber-address-assignment 2 2 0 permanent
subscriber-vlan 2 2 0 permanent
subscriber-ip 0 2 0 permanent
scale-subscriber 2 3 0 permanent
scale-l2tp 4 5 0 permanent
scale-mobile-ip 1 2 0 permanent
Licenses installed:
License identifier: XXXXXXXXXX
License version: 2
Customer ID: ACME CORPORATIOM
Features:
subscriber-accounting - Per Subscriber Radius Accounting
permanent
subscriber-authentication - Per Subscriber Radius Authentication
permanent
subscriber-address-assignment - Radius/SRC Address Pool Assignment
permanent
subscriber-vlan - Dynamic Auto-sensed Vlan
permanent
subscriber-ip - Dynamic and Static IP
permanent
In the following output, ports 0 and 1 are activated by installing the license to activate
the first two built-in ports.
Licenses installed:
License identifier: XXXXXXXXXX
License version: 2
Features:
MX104-2x10Gig-port-0-1 - MX104 2X10Gig Builtin Port(xe-2/0/0 & xe-2/0/1)
upgrade
permanent
In the following output, ports 0 and 1 are activated by installing the license to activate
the first two built-in ports.
In the following output, ports 0 and 1 are activated by installing the license to activate
the first two built-in ports.
In the following output, ports 0 and 1 are activated by installing the license to activate
the first two built-in ports.
In the following output, ports 2 and 3 are activated by installing the license to activate
the next two built-in ports after installing the license to activate the first two built-in
ports.
Licenses installed:
License identifier: XXXXXXXXXX
License version: 2
Features:
MX104-2x10Gig-port-0-1 - MX104 2X10Gig Builtin Port(xe-2/0/0 & xe-2/0/1)
upgrade
permanent
In the following output, ports 2 and 3 are activated by installing the license to activate
the next two built-in ports after installing the license to activate the first two built-in
ports.
In the following output, ports 2 and 3 are activated by installing the license to activate
the next two built-in ports after installing the license to activate the first two built-in
ports.
In the following output, ports 2 and 3 are activated by installing the license to activate
the next two built-in ports after installing the license to activate the first two built-in
ports.
In the following output, ports 0,1,2, and 3 are activated by installing a single license key
to activate all four built-in ports.
Licenses installed:
License identifier: XXXXXXXXXX
License version: 2
Features:
MX104-2x10Gig-port-0-1 - MX104 2X10Gig Builtin Port(xe-2/0/0 & xe-2/0/1)
upgrade
permanent
MX104-2x10Gig-port-2-3 - MX104 2X10Gig Builtin Port(xe-2/0/2 & xe-2/0/3)
upgrade
permanent
In the following output, ports 0,1,2, and 3 are activated by installing a single license key
to activate all four built-in ports.
In the following output, ports 0,1,2, and 3 are activated by installing a single license key
to activate all four built-in ports.
In the following output, ports 0,1,2, and 3 are activated by installing a single license key
to activate all four built-in ports.
Licenses installed:
License identifier: JUNOS797095
License version: 4
Software Serial Number: 91730A00223925
Customer ID: Juniper
Features:
JUNOS-BASE-SERVICES-CLASS-1 - QFX Junos Base Services license for Class 1 HW
{master:0}
Release Information Command introduced in Junos OS Release 9.5. Logical system status option added in
Junos OS Release 11.2.
Description Display licenses and information about how licenses are used.
keys—(Optional) Display a list of license keys. Use this information to verify that each
expected license key is present.
status—(Optional) Display license status for a specified logical system or for all logical
systems.
Output Fields Table 50 on page 556 lists the output fields for the show system license command. Output
fields are listed in the approximate order in which they appear.
Feature name Name assigned to the configured feature. You use this information to verify that all the features for
which you installed licenses are present.
Licenses used Number of licenses used by the device. You use this information to verify that the number of licenses
used matches the number configured. If a licensed feature is configured, the feature is considered
used.
Licenses needed Number of licenses required for features being used but not yet properly licensed.
Expiry Time remaining in the grace period before a license is required for a feature being used.
Logical system license Displays whether a license is enabled for a logical system.
status
Sample Output
License usage:
Licenses Licenses Licenses Expiry
Feature name used installed needed
av_key_kaspersky_engine 1 1 0 2012-03-30
01:00:00 IST
wf_key_surfcontrol_cpa 0 1 0 2012-03-30
01:00:00 IST
dynamic-vpn 0 1 0 permanent
ax411-wlan-ap 0 2 0 permanent
Licenses installed:
License identifier: JUNOS301998
License version: 2
Valid for device: AG4909AA0080
Features:
av_key_kaspersky_engine - Kaspersky AV
date-based, 2011-03-30 01:00:00 IST - 2012-03-30 01:00:00 IST
Features:
av_key_kaspersky_engine - Kaspersky AV
date-based, 2011-03-30 01:00:00 IST - 2012-03-30 01:00:00 IST
Related • lockout-period
Documentation
• clear system login lockout on page 419
Output Fields Table 51 on page 559 lists the output fields for the show system login lockout command.
Output fields are listed in the approximate order in which they appear.
Lockout start Date and time the username was locked All levels
Lockout end Date and time the username was unlocked All levels
Sample Output
Description Display the contents of a previously committed configuration, or the differences between
two previously committed configurations.
Options number—Number of a configuration to view. The output displays the configuration. The
range of values is 0 through 49.
Sample Output
+ input mf_plp;
+ }
+ address 10.1.1.1/10;
+ }
+ }
+ }
+ ge-1/3/0 {
+ unit 0 {
+ family inet {
+ filter {
+ input mf_plp;
+ }
+ address 10.1.1.1/10;
+ }
+ }
+ }
+}
Release Information Command introduced in Junos OS Release 14.1X53-D15 for the QFX Series.
Description Display the status of the restore point for the QFabric system. A restore-point contains
both a snapshot of the software and a configuration file for the QFabric system. You can
only create one restore-point. When you create a new restore-point, the existing
restore-point, if available, is erased.
List of Sample Output show system software restore-point status on page 562
Output Fields Table 52 on page 562 lists the output fields for the show system software restore-point
status command. Output fields are listed in the approximate order in which they appear.
Restore volume Name and path to restore volume used to create the restore-point.
Sample Output
Release Information Command introduced in Junos OS Release 14.1X53-D40 for the QFX Series.
Description (QFabric systems only) Display the version of software present on a standard USB
installer key attached to each Director Group (DG) device.
Additional Information When issuing the show system software usb-software-version command, the USB
installer key must be attached to either or both DGs.
The format of the USB installer key (including partitions) must conform to the standard
specifications of the Juniper-provided USB installer.
Output Fields Table 53 on page 563 lists the output fields for the show system software
usb-software-version command. Output fields are listed in the approximate order in which
they appear.
Sample Output
• On the routers, display information about the backup software, which is located in the
/altroot, and /altconfig file systems or on the alternate media.
• On the switches, display information about the backup of the root file system (/) and
directories /altroot,/config, /var, and /var/tmp, which are located either on an external
USB flash drive or in internal flash memory.
• local—Display the snapshot on the member of the Virtual Chassis that you are
currently logged into.
• member member-id—Display the snapshot for the specified member of the Virtual
Chassis.
media (external | internal)—(EX Series switch only) (Optional) Display the destination
media location for the snapshot. The external option specifies the snapshot on an
external mass storage device, such as a USB flash drive. The internal option specifies
the snapshot on an internal memory source, such as internal flash memory. If no
additional options are specified, the command displays the snapshot stored in both
slices.
Output Fields Table 54 on page 566 lists the output fields for the show system snapshot command.
Output fields are listed in the approximate order in which they appear.
Sample Output
jroute-ex: 12.1I20120111_0048_user
jswitch-ex: 12.1I20120111_0048_user
jweb-ex: 12.1I20120111_0048_user
Information for snapshot on external (/dev/da1s2a) (primary)
Creation date: Mar 19 03:38:25 2012
JUNOS version on snapshot:
jbase : ex-12.2I20120305_2240_user
jcrypto-ex: 12.2I20120305_2240_user
jdocs-ex: 12.2I20120305_2240_user
jroute-ex: 12.2I20120305_2240_user
jswitch-ex: 12.2I20120305_2240_user
jweb-ex: 12.2I20120305_2240_user
Release Information Command introduced starting in Junos OS Release 15.1 for supported platforms. See
Feature Explorer.
Output for recovery snapshots provided in Junos Release 17.2 for all platforms using Junos
OS with upgraded FreeBSD.
Description Display information about the non-recovery backup software, which is located in the
junos file system on the hard disk drive or solid-state drive (SSD).
Related • request system snapshot (Junos OS with Upgraded FreeBSD) on page 465
Documentation
• request system reboot (Junos OS with Upgraded FreeBSD) on page 449
Output Fields When you enter this command, you are provided feedback on the status of your request.
If there are no snapshots available, the command returns null output.
Sample Output
Sample Output
Snapshot snap.20170112.105151:
Location: /packages/sets/snap.20170112.105151
Creation date: Jan 12 10:51:51 2017
Junos version: 17.2I20170112_0239
Snapshot snap.20170112.112307:
Location: /packages/sets/snap.20170112.112307
Creation date: Jan 12 11:23:07 2017
Junos version: 17.2I20170112_0239
Snapshot snap.20170112.112314:
Location: /packages/sets/snap.20170112.112314
Creation date: Jan 12 11:23:14 2017
Junos version: 17.2I20170112_0239
Recovery Snapshots:
Snapshots available on the OAM volume:
recovery.ufs
Date created: Wed Jan 11 15:59:35 PST 2017
Junos version: 17.2I20170111_2242
Description Display the snapshot information for both root partitions on SRX Series devices
Related • Example: Creating a Snapshot and Using It to Boot an SRX Series Device on page 220
Documentation
List of Sample Output show system snapshot media internal on page 570
show system snapshot media usb on page 570
Sample Output
Release Information Command introduced in Junos OS Release 10.2 for SRX300, SRX320, SRX340, SRX345,
and SRX550HM devices.
Command introduced in Junos OS Release 11.1 for EX Series switches.
local—(Virtual Chassis systems only) (Optional) Display partition information for the
local Virtual Chassis member.
Related • Verifying Junos OS and Boot Loader Software Versions on an EX Series Switch on
Documentation page 147
• Example: Installing Junos OS on SRX Series Devices Using the Partition Option on
page 196
List of Sample Output show system storage partitions (EX Series) on page 572
show system storage partitions (SRX Series, Dual Root Partitioning) on page 572
show system storage partitions (SRX Series, Single Root Partitioning) on page 573
show system storage partitions (SRX Series, USB) on page 573
Output Fields Table 55 on page 572 describes the output fields for the show system storage partitions
command. Output fields are listed in the approximate order in which they appear.
Boot Media Media (internal or external) from which the switch was booted.
Currently booted from Partition from which the switch was last booted.
• Partition—Partition identifier.
• Size—Size of partition.
• Mountpoint—Directory on which the partition is mounted.
Sample Output
Partitions information:
Partition Size Mountpoint
s1a 184M /
s2a 184M altroot
s3d 369M /var/tmp
s3e 123M /var
s4d 62M /config
s4e unused (backup config)
Partitions Information:
Partition Size Mountpoint
s1a 293M altroot
s2a 293M /
s3e 24M /config
s3f 342M /var
s4a 30M recovery
Partitions Information:
Partition Size Mountpoint
s1a 293M /
s2a 293M altroot
s3e 24M /config
s3f 342M /var
s4a 30M recovery
show version
Description Display the hostname and version information about the software running on the device.
Options none—Display standard information about the hostname and version of the software
running on the device.
Sample Output
show version
user@host> show version
node0:
--------------------------------------------------------------------------
Hostname: srx01
Model: srx1400
JUNOS Software Release [12.3I20141112_x_srx_12q3_x48_intgr.0-681573]
JUNOS wmi Daemon [12.1I20140304_0803_tjzhang]
...
...
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Clean up temporary files, crash generated files, and log files located in the /var/tmp,
/var/crash, and /var/log directories respectively on the host OS.
Options none—Clean up temporary files, crash generated files, and log files located in the /var/tmp,
/var/crash, and /var/log directories on the host OS running on the Routing Engine on the
local Virtual Chassis member.
invoke-on—(Optional) Clean up temporary files, crash generated files, and log files on
all the Routing Engines or the other Routing Engine.
Clean up files in /var/tmp, /var/crash, and /var/log on the host OS running on a router
that has dual Routing Engines. You can use the all-routing-engine option to clean up
the files in these directories on the host OS running on all the Routing Engines or the
other-routing-engine option to clean up the files in these directories on the host OS
running on the other Routing Engine. If you issue the command from the master
Routing Engine, the backup Routing Engine is referred to as the other Routing Engine.
re0 | re1—(Optional) On routers that support dual or redundant Routing Engines, clean
up files in /var/tmp, /var/crash, and /var/log on the host OS running on the Routing
Engine in slot 0 (re0) or the Routing Engine in slot 1 (re1).
routing-engine—(Optional) Specify the Routing Engine for which the files in /var/tmp,
/var/crash, and /var/log on the host OS are to be cleaned up. The following options
are available:
• other—If you issue the command from the master Routing Engine, the backup
Routing Engine is referred to as the other Routing Engine.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Syntax request vmhost file-copy (crash|log) j-node host file-name v-junos host file-name
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Copy crash files or log files from the host OS to Junos OS. You can use these files for
analysis and debugging purposes.
to v-junos filename—Name of the Junos OS file to which the host file is copied.
Additional Information You can use the show vmhost crash and show vmhost logs commands to list or identify
the files in the host OS to be copied to Junos OS.
Sample Output
....
root@host:/var/tmp #
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
re0 | re1—(Optional) On routers that support dual or redundant Routing Engines, stop
the host OS and Junos OS running on the Routing Engine in slot 0 (re0) or the Routing
Engine in slot 1 (re1).
routing-engine—(Optional) Specify the Routing Engine on which the host OS and Junos
OS needs to be stopped. The following options are available:
• other—If you issue the command from the master Routing Engine, the backup
Routing Engine is referred to as the other Routing Engine.
Sample Output
...
...
Operating system halted.
Please press any key to reboot.
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Run memory and diagnostics monitoring test on the solid-state drive (SSD). The test
output provides information about the various attributes of the SSD that is help monitor
the status of the hard disk memory.
Sample Output
...
...
...
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Power off the Routing Engine on which Junos OS and the host OS are running. In a
PTX3000, the Routing and Control Board is powered off.
other-routing-engine—(Optional) Power off the other Routing Engine on which the Junos
OS and the host OS are running. For example, if you issue the command from the
master Routing Engine, the backup Routing Engine is powered off. Similarly, if you
issue the command from the backup Routing Engine, the master Routing Engine is
powered off.
Sample Output
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Power on the Routing Engine on which Junos OS and the host OS are running. In a
PTX3000, the Routing and Control Board is powered on.
Options other-routing-engine—Power on the other Routing Engine on which the Junos OS and
the host OS are running. For example, if you issue the command from the master
Routing Engine, the backup Routing Engine is powered on. Similarly, if you issue the
command from the backup Routing Engine, the master Routing Engine is powered
on.
Sample Output
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Reboot both the Junos OS and the host OS running on the router.
disk1—(Optional) Reboot both Junos OS and the host OS on the Routing Engine and
boot the Routing Engine from the primary disk.
disk2—(Optional) Reboot both Junos OS and the host OS on the Routing Engine and
boot the Routing Engine from backup disk.
network—(Optional) Reboot both Junos OS and the host OS on the Routing Engine and
boot the Routing Engine from network by using the PXE boot method.
re0 | re1—(Optional) On routers that support dual or redundant Routing Engines, reboot
both Junos OS and the host OS on the Routing Engine in slot 0 (re0) or on the the
Routing Engine in slot 1 (re1).
routing-engine—(Optional) Specify the Routing Engine on which Junos OS and the host
OS are to be rebooted. The following options are available:
• other—If you issue the command from the master Routing Engine, the backup
Routing Engine is referred to as the other Routing Engine.
usb—(Optional) Reboot both Junos OS and the host OS on the Routing Engine using the
USB installation media.
Sample Output
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Create a recovery snapshot of the currently running and active file system partitions on
the backup disk to recover the primary disk in case of failure.
On the router, back up the snapshot of the host OS image along with the Junos OS image.
In case of failure of the primary disk, you can boot from the image available in the backup
disk and then recover the primary disk with the snapshot created using the recovery
option.
Options none—Create a snapshot from the current disk to the target disk without partitioning the
target disk. Contents on target disk is lost.
partition—(Optional) Create a snapshot from the current disk to target disk and partition
the target disk. Contents on the target disk are lost
re0 | re1—(Optional) Create a snapshot from the current disk to target disk and partition
the target disk on Routing Engine in slot 0 (re0) or on the Routing Engine in slot 1
(re1). The snapshot is taken without partitioning the target disk on corresponding
Routing Engines. Contents on the target disk on the Routing Engines are lost.
For PTX1000 routers, since there is only one RE, re0|re1 is not supported.
recovery—(Optional) Recover the primary disk from the snapshot content stored in the
backup disk. This option is applicable only when the Routing engine is booted from
backup disk. Contents in the primary disk are lost.
Sample Output
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Abort unified in-service software upgrade (unified ISSU). The unified ISSU must be in
progress and you must issue this command from a router session other than the one on
which you issued the request vmhost software in-service-upgrade command to launch
the unified ISSU.
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1X65 for the PTX1000 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
For installing the host software as well as Junos OS, specify the package name
junos-vmhost-install-x.tgz in the request vmhost software add command. Junos OS
installation alone can be achieved by specifying the regular package name
junos-install-x.tgz in the request system software add command. However, installation
using the vmhost package is recommended as it upgrades both the host software and
Junos OS.
NOTE: You must load the PTX1000, PTX10008, and PTX10016 routers only
with junos-vmhost-install-x.tgz package using the request vmhost software
add command. The junos-vmhost-install-x.tgz package upgrades both the
host software and Junos OS. The PTX1000, PTX10008, and PTX10016 routers
does not support Junos only upgrade. If you try to load Junos only image, then
these routers goes down or vmhost commands does not work or router state
is unpredictable.
Options none—Install Junos OS and host software packages on the Routing Engine on the local
Virtual Chassis member.
NOTE:
• The pathname in the protocol is the relative path to the user’s home
directory on the remote system and not the root directory.
• Do not use the scp protocol in the request vmhost software add
command to download and install a software package or bundle from
a remote location. The software upgrade is handled by the mgd process
that does not support SCP.
1. Use the file copy command to copy the software package or bundle
from the remote location to the /var/tmp directory on the hard disk:
file copy scp://source/package-name /var/tmp
re0 | re1—(Optional) Load a software package or bundle on the Routing Engine in slot 0
(re0) or the Routing Engine in slot 1 (re1).
NOTE: The option re1 is not supported on the PTX1000 Packet Transport
Router.
reboot—(Optional) After adding the software package or bundle, reboot the system.
set [package-names]—(Optional)
Additional Information Before upgrading the software on the router, when you have a known stable system,
issue the request vmhost snapshot command to back up the software. After you have
upgraded the software on the router and are satisfied that the new package or bundle
is successfully installed and running, issue the request vmhost snapshot command again
to back up the new software to the backup disk.
After you run the request vmhost snapshot command, you cannot return to the previous
version of the snapshot, because the previous snapshot is replaced by the new snapshot.
List of Sample Output request vmhost software add (Multiple Packages) on page 596
Sample Output
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Perform a unified in-service software upgrade (ISSU). A unified ISSU enables you to
upgrade from one Junos OS release and host OS release to another with no disruption
on the control plane and with minimal disruption of traffic. For an unified ISSU, graceful
Routing Engine switchover (GRES) and nonstop active routing (NSR) must be enabled.
must manually reboot the former master (new backup) Routing Engine by using the
request vmhost reboot command.
• Unified ISSU is not supported on every platform. For a list of supported platforms, see
Unified ISSU System Requirements.
• Unsupported PICs are restarted during a unified ISSU on certain routing devices. For
information about supported PICs, see the Junos OS High Availability Library for Routing
Devices.
• During a unified ISSU, any unsupported protocols running on the device causes packet
loss. For information about supported protocols, see the Junos OS High Availability
Library for Routing Devices.
• During a unified ISSU, you cannot bring any PICs online or take them offline on certain
routing devices.
For more information, see the Junos OS High Availability Library for Routing Devices.
Sample Output
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Roll back the Junos OS and the host OS software packages to the previous versions. You
can revert to the previous versions of software packages that were loaded at the last
successful request vmhost software add command.
Options none—Roll back the software packages of the Routing Engine on the local Virtual Chassis
member.
re0 | re1—(Optional) On routers that support dual or redundant Routing Engines, roll
back the software packages in Routing Engine in slot 0 (re0) or software packages
in the Routing Engine in slot 1 (re1).
Sample Output
Version: set p
VMHost Version: 2.951
VMHost Root: vmhost-x86_64-15.1I20160210_2212_builder
VMHost Core: vmhost-core-x86_64-15.1I20160210_2212_builder
kernel: 3.10.79-ovp-rt74-WR6.0.0.20_preempt-rt
Junos Disk: junos-install-x86-64-15.1F5.5
Version: set b
VMHost Version: 2.953
VMHost Root: vmhost-x86_64-15.1F520160222_1052_builder
VMHost Core: vmhost-core-x86_64-15.1F520160222_1052_builder
kernel: 3.10.79-ovp-rt74-WR6.0.0.20_preempt-rt
Junos Disk: junos-install-x86-64-15.1F5.6
Version: set p
VMHost Version: 2.951
VMHost Root: vmhost-x86_64-15.1I20160210_2212_builder
VMHost Core: vmhost-core-x86_64-15.1I20160210_2212_builder
kernel: 3.10.79-ovp-rt74-WR6.0.0.20_preempt-rt
Junos Disk: junos-install-x86-64-15.1F5.5
Version: set b
VMHost Version: 2.953
VMHost Root: vmhost-x86_64-15.1F520160222_1052_builder
VMHost Core: vmhost-core-x86_64-15.1F520160222_1052_builder
kernel: 3.10.79-ovp-rt74-WR6.0.0.20_preempt-rt
Junos Disk: junos-install-x86-64-15.1F5.6
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Remove all configuration information on the Routing Engines and reset all key values. If
the device has dual Routing Engines, the command is broadcast to both Routing Engines
on the device. The command removes all data files, including customized configuration
and log files, by unlinking the files from their directories. The command removes all
user-created files from the system including all plain-text passwords, secrets, and private
keys for SSH, local encryption, local authentication, IPsec, RADIUS, TACACS+, and SNMP.
This command reboots the device and sets it to the factory-default configuration. After
the reboot, you cannot access the device through the management Ethernet interface.
Log in through the console as the root user and start the Junos OS CLI by typing cli at the
prompt.
Options none—Remove all configuration information on all the Routing Engines and reset all key
values.
re0 | re1—(Optional) Remove all configuration information on the Routing Engine in slot
0 (re0) or the Routing Engine in slot 1 (re1).
Sample Output
re0:
--------------------------------------------------------------------------
warning: Vmhost will reboot and may not boot without configuration
warning: Proceeding with vmhost zeroize
Zeroise secondary internal disk ...
Proceeding with zeroize on secondary disk
Mounting device in preparation for zeroize...
Cleaning up target disk for zeroize ...
Zeroize done on target disk.
Zeroize of secondary disk completed
Zeroize primary internal disk ...
Proceeding with zeroize on primary disk
Mounting device in preparation for zeroize...
Cleaning up target disk for zeroize ...
Zeroize done on target disk.
Zeroize of primary disk completed
Zeroize done
mv: cannot stat '/tmp/zero-UytUWY/tgt_jlvmrootfs/etc/fstab': No such file or
directory mv: cannot stat '/tmp/zero-UytUWY/fstab': No such file or directory mv:
cannot stat '/tmp/zero-6gvrWj/tgt_jlvmrootfs/etc/fstab': No such file or directory
mv: cannot stat '/tmp/zero-6gvrWj/fstab': No such file or directory
warning: Proceeding with vmhost reboot
re1:
--------------------------------------------------------------------------
warning: Vmhost will reboot and may not boot without configuration
warning: Proceeding with vmhost zeroize
Zeroise secondary internal disk ...
Proceeding with zeroize on secondary disk
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Display bridge table information. The bridge table provides information about the
interfaces used for communication between host and guest operating systems.
re0 | re1—(Optional) On routers that support dual or redundant Routing Engines, display
bridge table information about the Routing Engine in slot 0 (re0) or the Routing
Engine in slot 1 (re1).
routing-engine—(Optional) Specify the Routing Engine for which the bridge information
is to be displayed. The following options are available:
• other—If you issue the command from the master Routing Engine, the backup
Routing Engine is referred to as the other Routing Engine.
Sample Output
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Display the number of times the host OS crashed. The crash dumps are available at
/var/crash.
Sample Output
Crash Info
==========
total 0
Release Information Command introduced in Junos OS Release 17.2R1 for the PTX5000, MX240, MX480,
MX960 , MX2010, and MX2020 routers.
Description Display memory and diagnostics monitoring test status on the solid-state drive (SSD).
The test output provides information about the various attributes of the SSD that help
to monitor the status of the hard disk memory. This command should be used only after
initiating the disk test with the request vmhost hard-disk-test command.
Sample Output
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Display details of RAM and solid-state drives (SSDs) installed in the Routing Engine.
invoke-on—(Optional) Display the details of RAM and solid-state drives (SSDs) installed
on a router that has dual Routing Engines. You can use the all-routing-engine option
to display the hardware information of all the Routing Engines or the
other-routing-engine option to display the hardware information of the other Routing
Engine. For example, if you issue the command from the master Routing Engine, the
backup Routing Engine is referred to as the other Routing Engine.
re0 | re1—(Optional) On routers that support dual or redundant Routing Engines, display
hardware information about the Routing Engine in slot 0 (re0) or the Routing Engine
in slot 1 (re1).
routing-engine—(Optional) Specify the Routing Engine for which the details of the installed
RAM and solid-state drives (SSDs) is to be displayed. The following options are
available:
• other— If you issue the command from the master Routing Engine, the backup
Routing Engine is referred to as the other Routing Engine.
Sample Output
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Display information about the host—such as IP address of the host Routing Engine, host
OS version, model number or name of the Routing Engine, and so on.
Options invoke-on—(Optional) Display information about the host on a router that has dual
Routing Engines. You can use the all-routing-engine option to display information
about the host of all the Routing Engines or the other-routing-engine option to display
the information about the host of the other Routing Engine. If you issue the command
from the master Routing Engine, the backup Routing Engine is referred to as the
other Routing Engine .
re0 | re1—(Optional) On routers that support dual or redundant Routing Engines, display
information about the host of Routing Engine in slot 0 (re0) or the Routing Engine
in slot 1 (re1).
routing-engine—(Optional) Specify the Routing Engine for which the information about
the host is to be displayed. The following options are available:
• other—If you issue the command from the master Routing Engine, the backup
Routing Engine is referred to as the other Routing Engine.
Sample Output
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Options re0 | re1—(Optional) On routers that support dual or redundant Routing Engines, display
trace logs information of the host os running on the Routing Engine in slot 0 (re0)
or the Routing Engine in slot 1 (re1).
routing-engine—(Optional) Specify the Routing Engine for which the trace logs
information of the host OS is to be displayed. The following options are available:
• other—If you issue the command from the master Routing Engine, the backup
Routing Engine is referred to as the other Routing Engine.
Sample Output
Logs Info
=========
total 104844
drwxr-xr-x. 2 root root 4096 Dec 10 19:56 sa
-rw-r--r--. 1 root root 400 Dec 10 19:56 postinstall.log
drwxr-xr-x. 2 root root 4096 Dec 10 19:56 audit
drwxr-xr-x. 5 root root 4096 Dec 10 19:56 glusterfs
drwxr-xr-x. 2 root root 4096 Dec 10 19:56 wdmd_disk_io
drwxr-xr-x. 2 root root 4096 Dec 10 19:56 openvswitch
drwxr-xr-x. 3 root root 4096 Dec 10 20:05 libvirt
-rw-r-----. 1 root root 228224 Dec 11 00:00 syslog-20151211.gz
-rw-r-----. 1 root root 987114 Dec 12 00:00 syslog-20151212.gz
-rw-r-----. 1 root root 3100 Dec 12 20:12 mail.log-20151213
-rw-r-----. 1 root root 3100 Dec 12 20:12 mail.info-20151213
-rw-r-----. 1 root root 5730 Dec 12 20:15 user.log-20151213
-rw-r-----. 1 root root 434831 Dec 12 23:52 kern.log-20151213
-rw-r-----. 1 root root 7349109 Dec 12 23:59 debug-20151213
-rw-r-----. 1 root root 955140 Dec 13 00:00 syslog-20151213.gz
-rw-r-----. 1 root root 266098 Dec 13 00:00 messages-20151213
-rw-r-----. 1 root root 10252576 Dec 13 00:00 auth.log-20151213
-rw-r--r--. 1 root root 26464360 Dec 13 04:11 daemon.log-20151213
-rw-r-----. 1 root root 242 Dec 13 04:12 mail.warn-20151213
-rw-r-----. 1 root root 242 Dec 13 04:12 mail.err-20151213
-rw-r-----. 1 root root 12373338 Dec 14 00:00 syslog-20151214
-rw-r-----. 1 root adm 1592 Dec 14 00:10 boot.4.gz
-rw-r-----. 1 root adm 1570 Dec 14 00:42 boot.3.gz
-rw-r-----. 1 root adm 1552 Dec 14 06:38 boot.2.gz
-rw-r-----. 1 root adm 1589 Dec 14 07:54 boot.1.gz
-rw-r-----. 1 root adm 5186 Dec 14 18:50 boot.0
-rw-r--r--. 1 root root 292 Dec 14 21:57 lastlog
-rw-r--r--. 1 root root 1638 Dec 14 21:57 sanlock.log
-rw-r-----. 1 root root 1098 Dec 14 21:57 mail.warn
-rw-r-----. 1 root root 8939 Dec 14 21:57 mail.log
-rw-r-----. 1 root root 8939 Dec 14 21:57 mail.info
-rw-r-----. 1 root root 968 Dec 14 21:57 mail.err
-rw-r-----. 1 root adm 5077 Dec 14 21:57 boot
-rw-rw-r--. 1 root root 61824 Dec 14 21:57 wtmp
--w-r-----. 1 root root 80275 Dec 14 21:57 resild
-rw-r-----. 1 root root 31314 Dec 14 21:59 user.log
-rw-r-----. 1 root root 951929 Dec 14 22:57 messages
-rw-r-----. 1 root root 1577908 Dec 14 22:57 kern.log
-rw-r-----. 1 root root 4810073 Dec 14 23:10 auth.log
-rw-r-----. 1 root root 11130442 Dec 14 23:14 syslog
-rw-r-----. 1 root root 7305132 Dec 14 23:14 debug
-rw-r--r--. 1 root root 21884828 Dec 14 23:14 daemon.log
Description Display the administrative status, speed and operational mode of the host interface eth0,
which serves as a management interface.
Sample Output
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Display network statistics information for the host OS. The statistics contains information
related to the interfaces used for the communication between the host and the guest,
such as the IP address of the destination, IP address of the gateway, mask, flags, and so
on.
Options invoke-on—(Optional) Display the network statistics for the host OS on a router that
has dual Routing Engines. You can use the all-routing-engine option to display the
network statistics information for the host OS running on all the Routing Engines or
the other-routing-engine option to display the network statistics information for the
host OS running on the other Routing Engine. For example, If you issue the command
from the master Routing Engine, the backup Routing Engine is referred to as the
other Routing Engine .
re0 | re1—(Optional) On routers that support dual or redundant Routing Engines, display
the network statistics information for the host OS running on the Routing Engine in
slot 0 (re0) or the Routing Engine in slot 1 (re1).
routing-engine—(Optional) Specify the Routing Engine for which the network statistics
information for the host OS is to be displayed. The following options are available:
• other—If you issue the command from the master Routing Engine, the backup
Routing Engine is referred to as the other Routing Engine.
Sample Output
Netstat
=======
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Display information about the host processes that are running on the router.
Options invoke-on—(Optional) Display information about the host processes that are running
on a router with dual Routing Engines. You can use the all-routing-engine option to
display information about the host processes running on all the Routing Engines or
the other-routing-engine option to display information about the host processes
running on the other Routing Engine. For example, If you issue the command from
the master Routing Engine, the backup Routing Engine is referred to as the other
Routing Engine .
re0 | re1—(Optional) On routers that support dual or redundant Routing Engines, display
information about the host processes running on the Routing Engine in slot 0 (re0)
or on the Routing Engine in slot 1 (re1).
routing-engine—(Optional) Specify the Routing Engine for which the information about
the host processes is to be displayed. The following options are available:
• other—If you issue the command from the master Routing Engine, the backup
Routing Engine is referred to as the other Routing Engine.
Sample Output
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Display the current usage of solid-state drive (SSD), RAM, and CPU resources of the host
OS.
Options invoke-on—(Optional) Display information about resources used by the host OS running
on a router that has dual Routing Engines. You can use the all-routing-engine option
to display information about resources used by the host OS on all the Routing Engines
or the other-routing-engine option to display information about resources used by
the host OS on the other Routing Engine. For example, If you issue the command
from the master Routing Engine, the backup Routing Engine is referred to as the
other Routing Engine.
re0 | re1—(Optional) On routers that support dual or redundant Routing Engines, display
information about resources used by the host OS on the Routing Engine in slot 0
(re0) or on the Routing Engine in slot 1 (re1).
routing-engine—(Optional) Specify the Routing Engine for which the information about
resources used by the host OS is to be displayed. The following options are available:
• other—If you issue the command from the master Routing Engine, the backup
Routing Engine is referred to as the other Routing Engine.
Sample Output
Memory Usage
============
total used free shared buffers cached
Mem: 63851 51388 12462 0 35 123
Swap: 0 0 0
Disk Usage
==========
Filesystem Size Used Avail Use% Mounted on
rootfs 3.3G 127M 3.0G 5% /
/dev/sda4 2.0G 1.7G 166M 91% /.old
tmpfs 32G 1.2M 32G 1% /.old/run
none 32G 4.0K 32G 1% /.old/dev
tmpfs 32G 0 32G 0% /.old/tmp
tmpfs 32G 0 32G 0% /.old/tdev
/dev/mapper/jvg_P-jlvmrootrw 3.3G 127M 3.0G 5% /.old/tdev/.union/.s
unionfs 3.3G 127M 3.0G 5% /
none 32G 4.0K 32G 1% /dev
tmpfs 32G 180K 32G 1% /run
tmpfs 32G 8.0K 32G 1% /var/volatile
/dev/mapper/jvg_P-jlvmjunos 32G 13G 18G 43% /junos
/dev/mapper/jvg_P-jlvmvm 6.1G 2.7G 3.1G 47% /vm
/dev/mapper/jvg_P-jlvmspare 287M 2.1M 266M 1% /spare
cgroup 32G 0 32G 0% /sys/fs/cgroup
unionfs 3.3G 127M 3.0G 5% /run/named-chroot/etc/bind
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Display snapshot details including Linux host kernel version, software version, and other
package version details for both the sets of software in the backup disk.
re0 | re1—(Optional) On routers that support dual or redundant Routing Engines, display
host snapshot information about the Routing Engine in slot 0 (re0) or the Routing
Engine in slot 1 (re1).
routing-engine—(Optional) Specify the Routing Engine for which the host snapshot
details is to be displayed. The following options are available:
• other—If you issue the command from the master Routing Engine, the backup
Routing Engine is referred to as the other Routing Engine.
Sample Output
Version: set p
VMHost Version: 2.897
VMHost Root: vmhost-x86_64-15.1I20151203_0011_rbu-builder
VMHost Core: vmhost-core-x86_64-15.1I20151203_0011_rbu-builder
kernel: 3.10.79-ovp-rt74-WR6.0.0.20_preempt-rt
Junos Disk: junos-install-x86-64-15.1F-20151204.0
Version: set b
VMHost Version: 2.897
VMHost Root: vmhost-x86_64-15.1I20151203_0011_rbu-builder
VMHost Core: vmhost-core-x86_64-15.1I20151203_0011_rbu-builder
kernel: 3.10.79-ovp-rt74-WR6.0.0.20_preempt-rt
Junos Disk: junos-install-x86-64-15.1F-20151204.0
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Display information about the status of communication between the host OS and the
guest OS. The following status outputs are displayed:
• Offline—Communication with the host is lost. Any state other than Online is considered
as Offline.
Options invoke-on—(Optional) Display the status of communication between the host OS and
the guest OS running on a router with dual Routing Engines. You can use the
all-routing-engine option to display the status of host-to-guest communication on
all the Routing Engines or the other-routing-engine option to display the status of
host-to-guest communication on the other Routing Engine. For example, If you issue
the command from the master Routing Engine, the backup Routing Engine is referred
to as the other Routing Engine.
re0 | re1—(Optional) On routers that support dual or redundant Routing Engines, display
the status of communication between the host OS and the guest OS on the Routing
Engine in slot 0 (re0) or on the Routing Engine in slot 1 (re1).
• other—If you issue the command from the master Routing Engine, the backup
Routing Engine is referred to as the other Routing Engine.
Sample Output
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Display the current time and information such as how long the host OS has been running,
number of users, average load, and reason for the last reboot that occurred.
Options invoke-on—(Optional) Display the uptime information about the host on a router with
dual Routing Engines. You can use the all-routing-engine option to display the uptime
information about the host on all the Routing Engines or the other-routing-engine
option to display the uptime information about the host on the other Routing Engine.
For example, If you issue the command from the master Routing Engine, the backup
Routing Engine is referred to as the other Routing Engine.
re0 | re1—(Optional) On routers that support dual or redundant Routing Engines, display
the uptime information about the hoston the Routing Engine in slot 0 (re0) or on the
Routing Engine in slot 1 (re1).
routing-engine—(Optional) Specify the Routing Engine for which the uptime information
about the host is to be displayed. The following options are available:
• other—If you issue the command from the master Routing Engine, the backup
Routing Engine is referred to as the other Routing Engine.
Sample Output
Release Information Command introduced in Junos OS Release 15.1F3 for the PTX5000, MX240, MX480, and
MX960 routers.
Command introduced in Junos OS Release 15.1F5 for the MX2010 and MX2020 routers.
Command introduced in Junos OS Release 16.1R4 for the PTX3000 routers.
NOTE: PTX3000 router supports the Routing and Control Board, RCBPTX.
Description Display host version information including Linux host kernel version, host software version,
and other package version details for both the sets of software in the primary disk.
Options invoke-on—(Optional) Display the version information of the host running on a router
with dual Routing Engines. You can use the all-routing-engine option to display the
version information of the host software running on all the Routing Engines or the
other-routing-engine option to display the version information of the host software
running on other Routing Engine. For example, If you issue the command from the
master Routing Engine, the backup Routing Engine is referred to as the other Routing
Engine.
re0 | re1—(Optional) On routers that support dual or redundant Routing Engines, display
version information of the host software on the Routing Engine in slot 0 (re0) or on
the Routing Engine in slot 1 (re1).
routing-engine—(Optional) Specify the Routing Engine for which the version information
of the host software is to be displayed. The following options are available:
• other—If you issue the command from the master Routing Engine, the backup
Routing Engine is referred to as the other Routing Engine.
Sample Output
Version: set p
VMHost Version: 2.900
VMHost Root: vmhost-x86_64-15.1F420151130_1049_builder
VMHost Core: vmhost-core-x86_64-15.1F420151130_1049_builder
kernel: 3.10.79-ovp-rt74-WR6.0.0.20_preempt-rt
Junos Disk: junos-install-x86-64-15.1F4.10
Version: set b
VMHost Version: 2.901
VMHost Root: vmhost-x86_64-15.1I20151210_0011_rbu-builder
VMHost Core: vmhost-core-x86_64-15.1I20151210_0011_rbu-builder
kernel: 3.10.79-ovp-rt74-WR6.0.0.20_preempt-rt
Junos Disk: junos-install-x86-64-15.1F-20151211.0