EasyManuals Logo

Juniper EX3300 Hardware Guide

Juniper EX3300
354 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #31 background imageLoading...
Page #31 background image
If the remote end of the LAG link is a security device, LACP might not be supported
because security devices require a deterministic configuration. In such a scenario, do not
configure LACP. All links in the LAG are permanently operational unless the switch detects
a link failure within the Ethernet physical layer or data link layers.
Related
Documentation
Understanding EX Series Virtual Chassis Port Link Aggregation
Understanding Link Aggregation in an EX8200 Virtual Chassis
Understanding Redundant Trunk Links
Configuring Aggregated Ethernet Links (CLI Procedure) on page 82
Configuring Aggregated Ethernet LACP (CLI Procedure) on page 86
Configuring LACP Link Protection of Aggregated Ethernet Interfaces (CLI Procedure)
on page 87
Junos OS Network Interfaces Configuration Guide
Understanding the Algorithm Used to Hash LAG Bundle and Egress Next-Hop ECMP
Traffic
Juniper Networks EX Series and QFX Series use a hashing algorithm to determine how
to forward traffic over a link aggregation group (LAG) bundle or to the next-hop device
when equal-cost multipath (ECMP) is enabled.
The hashing algorithm makes hashing decisions based on values in various packet fields,
as well as on some internal values like source port ID and source device ID. You can
configure some of the fields that are used by the hashing algorithm.
This topic contains the following sections:
Understanding the Hashing Algorithm on page 11
IP (IPv4 and IPv6) on page 12
MPLS on page 14
MAC-in-MAC Packet Hashing on page 15
Layer 2 Header Hashing on page 15
Understanding the Hashing Algorithm
The hashing algorithm is used to make traffic-forwarding decisions for traffic entering a
LAG bundle or for traffic exiting a switch when ECMP is enabled.
For LAG bundles, the hashing algorithm determines how traffic entering a LAG bundle is
placed onto the bundle’s member links. The hashing algorithm tries to manage bandwidth
by evenly load-balancing all incoming traffic across the member links in the bundle.
For ECMP, the hashing algorithm determines how incoming traffic is forwarded to the
next-hop device.
11Copyright © 2015, Juniper Networks, Inc.
Chapter 1: Interfaces Overview

Table of Contents

Other manuals for Juniper EX3300

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Juniper EX3300 and is the answer not in the manual?

Juniper EX3300 Specifications

General IconGeneral
Ethernet LANYes
Authentication methodRADIUS, TACACS+
Connectivity technologyWired
Ethernet interface typeGigabit Ethernet
Number of VLANs4096
Networking standardsIEEE 802.1ab, IEEE 802.1D, IEEE 802.1Q, IEEE 802.1s, IEEE 802.1w, IEEE 802.1x, IEEE 802.3, IEEE 802.3ab, IEEE 802.3ad, IEEE 802.3x, IEEE 802.3z
Ethernet LAN data rates10, 100, 1000 Mbit/s
Copper ethernet cabling technology1000BASE-T, 100BASE-TX, 10BASE-T
Console port-
ExpressCard slotNo
Fiber ports quantity4
USB 2.0 ports quantity0
Basic switching RJ-45 Ethernet ports quantity48
Throughput130 Mpps
Number of queues8
MAC address table16000 entries
Maximum data transfer rate176 Gbit/s
Supported data transfer rates10, 100, 1000Mbps
Switch typeManaged
Switch layerL2
Security algorithmsSSH-2
Power sourceAC
AC input voltage100 - 240 V
Power consumption (typical)100 W
Form factor1U
Product colorBlack
Flash memory1024 MB
Processor frequency1000 MHz
Compatible operating systemsJunos
Operating altitude0 - 3049 m
Non-operating altitude0 - 4877 m
Storage temperature (T-T)-40 - 70 °C
Operating temperature (T-T)0 - 45 °C
Storage relative humidity (H-H)0 - 95 %
Operating relative humidity (H-H)10 - 85 %
Supported network protocolsIPv6
Weight and Dimensions IconWeight and Dimensions
Depth310 mm
Width437 mm
Height44 mm
Weight4900 g

Related product manuals