[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]

Table of Contents

About This Guide
JUNOS Documentation and Release Notes
Objectives
Audience
Supported Platforms
Using the Indexes
Using the Examples in This Manual
Documentation Conventions
Documentation Feedback
Requesting Technical Support
Overview
Services Interfaces Overview
Services PIC Types
Supported Platforms
Services Interfaces Configuration Statements
[edit applications] Hierarchy Level
[edit forwarding-options] Hierarchy Level
[edit interfaces] Hierarchy Level
[edit logical-systems] Hierarchy Level
[edit protocols] Hierarchy Level
[edit services] Hierarchy Level
Adaptive Services
Adaptive Services Overview
Enabling Service Packages
Layer 2 Service Package Capabilities and Interfaces
Services Configuration Procedure
Packet Flow Through the Adaptive Services or MultiServices PIC
Stateful Firewall Overview
Stateful Firewall Support for Application Protocols
Stateful Firewall Anomaly Checking
Network Address Translation Overview
Traditional NAT
Twice NAT
IPsec Overview
IPsec
Security Associations
IKE
Comparison of IPsec Services and ES Interface Configuration
Layer 2 Tunneling Protocol Overview
Voice Services Overview
Class of Service Overview
Examples: Services Interfaces Configuration
Applications Configuration Guidelines
Configuring Application Protocol Properties
Configuring an Application Protocol
Configuring the Network Protocol
Configuring the ICMP Code and Type
Configuring Source and Destination Ports
Configuring the Inactivity Timeout Period
Configuring SIP
Configuring an SNMP Command for Packet Matching
Configuring an RPC Program Number
Configuring the TTL Threshold
Configuring a Universal Unique Identifier
Configuring Application Sets
ALG Descriptions
Basic TCP ALG
Basic UDP ALG
BOOTP
DCE RPC Services
FTP
H323
ICMP
IIOP
NetShow
RealAudio
RPC and RPC Portmap Services
RTSP
SMB
SNMP
SQLNet
TFTP
Traceroute
UNIX Remote-Shell Services
WinFrame
Verifying the Output of ALG Sessions
FTP Example
Sample Output
FTP System Log Messages
Analysis
Control Flows
Data Flows
Troubleshooting Questions
RTSP ALG Example
Sample Output
Analysis
Troubleshooting Questions
System Log Messages
System Log Configuration
System Log Output
JUNOS Default Groups
Examples: Referencing the Preset Statement from the JUNOS Default Group
Examples: Configuring Application Protocols
Summary of Applications Configuration Statements
application
application-protocol
application-set
applications
destination-port
icmp-code
icmp-type
inactivity-timeout
learn-sip-register
protocol
rpc-program-number
sip-call-hold-timeout
snmp-command
source-port
ttl-threshold
uuid
Stateful Firewall Services Configuration Guidelines
Configuring Stateful Firewall Rules
Configuring Match Direction for Stateful Firewall Rules
Configuring Match Conditions in Stateful Firewall Rules
Configuring Actions in Stateful Firewall Rules
Configuring IP Option Handling
Configuring Stateful Firewall Rule Sets
Examples: Configuring Stateful Firewall Rules
Summary of Stateful Firewall Configuration Statements
allow-ip-options
application-sets
applications
destination-address
destination-address-range
destination-prefix-list
from
match-direction
rule
rule-set
services
source-address
source-address-range
source-prefix-list
syslog
term
then
Network Address Translation Services Configuration Guidelines
Configuring Addresses and Ports for Use in NAT Rules
Configuring Pools of Addresses and Ports
Specifying Destination and Source Prefixes when Pools Are Not Used
Requirements for NAT Addresses
Configuring IPv6 Multicast Filters
Configuring NAT Rules
Configuring Match Direction for NAT Rules
Configuring NAT Type for Terms in NAT Rules
Configuring Match Conditions in NAT Rules
Configuring Actions in NAT Rules
Configuring NAT Rule Sets
Examples: Configuring NAT Rules
Example: Configuring Dynamic Source Translation
Example: Configuring Static Source Translation
Example: Configuring Dynamic and Static Source Translation
Example: Configuring an Oversubscribed Pool with No Fallback
Example: Configuring an Oversubscribed Pool with Fallback to NAPT
Example: Configuring Static Source Translation with Multiple Prefixes and Address Ranges
Example: Assigning Addresses from a Dynamic Pool for Static Use
Example: Configuring NAT Rules Without Defining a Pool
Example: Preventing Translation of Specific Addresses
Example: Configuring NAT for Multicast Traffic
Rendezvous Point Configuration
Router 1 Configuration
Example: Configuring Twice NAT
Example: Configuring Full-Cone NAT
Summary of Network Address Translation Configuration Statements
address
address-range
application-sets
applications
destination-address
destination-address-range
destination-pool
destination-prefix
destination-prefix-list
from
hint
ipv6-multicast-interfaces
match-direction
nat-type
no-translation
overload-pool
overload-prefix
pgcp
pool
port
ports-per-session
remotely-controlled
rule
rule-set
services
source-address
source-address-range
source-pool
source-prefix
source-prefix-list
syslog
term
then
translated
translation-type
translation-type (Traditional NAT)
translation-type (Twice NAT)
transport
Intrusion Detection Service Configuration Guidelines
Configuring IDS Rules
Configuring Match Direction for IDS Rules
Configuring Match Conditions in IDS Rules
Configuring Actions in IDS Rules
Configuring IDS Rule Sets
Examples: Configuring IDS Rules
Summary of Intrusion Detection Service Configuration Statements
aggregation
application-sets
applications
by-destination
by-pair
by-source
destination-address
destination-address-range
destination-prefix
destination-prefix-ipv6
destination-prefix-list
force-entry
from
ignore-entry
logging
match-direction
mss
rule
rule-set
services
session-limit
source-address
source-address-range
source-prefix
source-prefix-ipv6
source-prefix-list
syn-cookie
syslog
term
then
threshold
IPsec Services Configuration Guidelines
Minimum Security Association Configurations
Minimum Manual SA Configuration
Minimum Dynamic SA Configuration
Configuring Security Associations
Configuring Manual Security Associations
Configuring the Direction for IPsec Processing
Example: Using Different Configuration for the Inbound and Outbound Directions
Example: Using the Same Configuration for the Inbound and Outbound Directions
Configuring the Protocol for a Manual IPsec SA
Configuring the Security Parameter Index
Configuring the Auxiliary Security Parameter Index
Configuring Authentication for a Manual IPsec SA
Configuring Encryption for a Manual IPSec SA
Configuring Dynamic Security Associations
Clearing Security Associations
Configuring IKE Proposals
Configuring the Authentication Algorithm for an IKE Proposal
Configuring the Authentication Method for an IKE Proposal
Configuring the Diffie-Hellman Group for an IKE Proposal
Configuring the Encryption Algorithm for an IKE Proposal
Configuring the Lifetime for an IKE SA
Example: Configuring an IKE Proposal
Configuring IKE Policies
Configuring the Mode for an IKE Policy
Configuring the Proposals in an IKE Policy
Configuring the Preshared Key for an IKE Policy
Configuring the Local Certificate for an IKE Policy
Configuring a Certificate Revocation List
Configuring the Description for an IKE Policy
Configuring Local and Remote IDs for IKE Phase 1 Negotiation
Example: Configuring an IKE Policy
Configuring IPsec Proposals
Configuring the Authentication Algorithm for an IPsec Proposal
Configuring the Description for an IPsec Proposal
Configuring the Encryption Algorithm for an IPsec Proposal
Configuring the Lifetime for an IPsec SA
Configuring the Protocol for a Dynamic SA
Configuring IPsec Policies
Configuring the Description for an IPsec Policy
Configuring Perfect Forward Secrecy
Configuring the Proposals in an IPsec Policy
Example: Configuring an IPsec Policy
Configuring IPsec Rules
Configuring Match Direction for IPsec Rules
Configuring Match Conditions in IPsec Rules
Configuring Actions in IPsec Rules
Enabling IPsec Packet Fragmentation
Configuring Destination Addresses for Dead Peer Detection
Disabling IPSec Anti-Replay
Enabling System Log Messages
Specifying the MTU for IPsec Tunnels
Configuring IPsec Rule Sets
Configuring Dynamic Endpoints for IPsec Tunnels
Authentication Process
Implicit Dynamic Rules
Reverse Route Insertion
Configuring an IKE Access Profile
Referencing the IKE Access Profile in a Service Set
Configuring the Interface Identifier
Default IKE and IPsec Proposals
Tracing IPsec Operations
Examples: Configuring IPsec Services
Example: Configuring Statically Assigned Tunnels
Example: Configuring Dynamically Assigned Tunnels
Summary of IPsec Services Configuration Statements
authentication
authentication-algorithm
authentication-algorithm (IKE)
authentication-algorithm (IPsec)
authentication-method
auxiliary-spi
backup-remote-gateway
clear-dont-fragment-bit
clear-ike-sas-on-pic-restart
clear-ipsec-sas-on-pic-restart
description
destination-address
dh-group
direction
dynamic
encryption
encryption-algorithm
from
ike
initiate-dead-peer-detection
ipsec
ipsec-inside-interface
lifetime-seconds
local-certificate
local-id
manual
match-direction
mode
no-anti-replay
perfect-forward-secrecy
policy
policy (IKE)
policy (IPsec)
pre-shared-key
proposal
proposal (IKE)
proposal (IPsec)
proposals
protocol
remote-gateway
remote-id
rule
rule-set
services
source-address
spi
syslog
term
then
traceoptions
tunnel-mtu
Layer 2 Tunneling Protocol Services Configuration Guidelines
L2TP Services Configuration Overview
L2TP Minimum Configuration
Configuring L2TP Tunnel Groups
Configuring Access Profiles for L2TP Tunnel Groups
Configuring the Local Gateway Address and PIC
Configuring Window Size for L2TP Tunnels
Configuring Timers for L2TP Tunnels
Hiding Attribute-Value Pairs for L2TP Tunnels
Configuring System Logging of L2TP Tunnel Activity
Configuring the Identifier for Logical Interfaces that Provide L2TP Services
Example: Configuring Multilink PPP on a Shared Logical Interface
AS PIC Redundancy for L2TP Services
Tracing L2TP Operations
Examples: Configuring L2TP Services
Summary of Layer 2 Tunneling Protocol Configuration Statements
facility-override
hello-interval
hide-avps
host
l2tp-access-profile
local-gateway address
log-prefix
maximum-send-window
ppp-access-profile
receive-window
retransmit-interval
service-interface
services
services (Hierarchy)
services (L2TP System Logging)
syslog
traceoptions
tunnel-group
tunnel-timeout
Link Services IQ Interfaces Configuration Guidelines
Layer 2 Service Package Capabilities and Interfaces
Configuring LSQ Interface Redundancy Across Multiple Routers Using SONET APS
Configuring the Association between LSQ and SONET Interfaces
Configuring SONET APS Interoperability with Cisco Systems FRF.16
Restrictions on APS Redundancy for LSQ Interfaces
Configuring LSQ Interface Redundancy in a Single Router Using SONET APS
Configuring LSQ Interface Redundancy in a Single Router Using Virtual Interfaces
Configuring Redundant Paired LSQ Interfaces
Restrictions on Redundant LSQ Interfaces
Configuring Link State Replication for Redundant Link PICs
Examples: Configuring Redundant LSQ Interfaces for Failure Recovery
Configuring CoS Scheduling Queues on Logical LSQ Interfaces
Configuring Scheduler Buffer Size
Configuring Scheduler Priority
Configuring Scheduler Shaping Rate
Configuring Drop Profiles
Configuring CoS Fragmentation by Forwarding Class on LSQ Interfaces
Reserving Bundle Bandwidth for Link-Layer Overhead on LSQ Interfaces
Configuring Multiclass MLPPP on LSQ Interfaces
Oversubscribing Interface Bandwidth on LSQ Interfaces
Example: Oversubscribing an LSQ Interface
Configuring Guaranteed Minimum Rate on LSQ Interfaces
Example: Configuring Guaranteed Minimum Rate
Configuring Link Services and CoS on Services PICs
Configuring Link Services and CoS on J-series Services Routers
Configuring LSQ Interfaces as NxT1 or NxE1 Bundles Using MLPPP
Example: Configuring an LSQ Interface as an NxT1 Bundle Using MLPPP
Configuring LSQ Interfaces as NxT1 or NxE1 Bundles Using FRF.16
Example: Configuring an LSQ Interface as an NxT1 Bundle Using FRF.16
Configuring LSQ Interfaces for Single Fractional T1 or E1 Interfaces Using MLPPP and LFI
Example: Configuring an LSQ Interface for a Fractional T1 Interface Using MLPPP and LFI
Configuring LSQ Interfaces for Single Fractional T1 or E1 Interfaces Using FRF.12
Examples: Configuring an LSQ Interface for a Fractional T1 Interface Using FRF.12
Configuring LSQ Interfaces as NxT1 or NxE1 Bundles Using FRF.15
Configuring LSQ Interfaces for T3 Links Configured for Compressed RTP over MLPPP
Configuring LSQ Interfaces as T3 or OC3 Bundles Using FRF.12
Configuring LSQ Interfaces for ATM2 IQ Interfaces Using MLPPP
Summary of Link Services IQ Configuration Statements
cisco-interoperability
forwarding-class
fragment-threshold
fragmentation-map
fragmentation-maps
hot-standby
link-layer-overhead
lsq-failure-options
multilink-class
multilink-max-classes
no-fragmentation
no-termination-request
per-unit-scheduler
preserve-interface
primary
redundancy-options
secondary
trigger-link-failure
warm-standby
Voice Services Configuration Guidelines
Configuring Services Interfaces for Voice Services
Configuring the Logical Interface Address for the MLPPP Bundle
Configuring Compression of Voice Traffic
Configuring Delay-Sensitive Packet Interleaving
Example: Configuring Compression of Voice Traffic
Configuring Encapsulation for Voice Services
Configuring Network Interfaces for Voice Services
Configuring Voice Services Bundles with MLPPP Encapsulation
Configuring the Compression Interface with PPP Encapsulation
Configuring VoIP Routing on J-series Services Routers
Functional Components
Configuring the VoIP Interface
Configuring the Media Gateway Controller List
Configuring Dynamic Call Admission Control
Examples: Configuring Voice Services
Summary of Voice Services Configuration Statements
activation-priority
address
bearer-bandwidth-limit
bundle
compression
compression-device
dynamic-call-admission-control
encapsulation
f-max-period
family
fragment-threshold
interfaces
maximum-contexts
port
queues
rtp
unit
Class-of-Service Configuration Guidelines
Restrictions and Cautions for CoS Configuration on Services Interfaces
Configuring CoS Rules
Configuring Match Direction for CoS Rules
Configuring Match Conditions In CoS Rules
Configuring Actions in CoS Rules
Configuring Application Profiles for Use as CoS Rule Actions
Configuring Reflexive and Reverse CoS Rule Actions
Example: Configuring CoS Rules
Configuring CoS Rule Sets
Examples: Configuring CoS on Services Interfaces
Summary of Class-of-Service Configuration Statements
application-profile
application-sets
applications
destination-address
destination-prefix-list
dscp
forwarding-class
from
match-direction
(reflexive | reverse)
rule
rule-set
services
sip-text
sip-video
sip-voice
source-address
source-prefix-list
syslog
term
then
Service Set Configuration Guidelines
Configuring Service Sets to be Applied to Services Interfaces
Configuring Interface Service Sets
Configuring Next-Hop Service Sets
Determining Traffic Direction
Interface Style Service Sets
Next-Hop Style Service Sets
Configuring Service Rules
Configuring IPsec Service Sets
Configuring the Local Gateway Address for IPsec Service Sets
IKE Addresses in VRF Instances
Configuring IKE Access Profiles for IPsec Service Sets
Configuring Certification Authorities for IPsec Service Sets
Configuring Service Set Limitations
Configuring System Logging for Service Sets
Enabling Services PICs to Accept Multicast Traffic
Tracing Services PIC Operations
Configuring the Adaptive Services Log Filename
Configuring the Number and Size of Adaptive Services Log Files
Configuring Access to the Log File
Configuring a Regular Expression for Lines to Be Logged
Configuring the Trace Operations
Example: Configuring Service Sets
Summary of Service Set Configuration Statements
adaptive-services-pics
allow-multicast
facility-override
host
ids-rules
ike-access-profile
interface-service
ipsec-vpn-options
ipsec-vpn-rules
local-gateway
log-prefix
logging
max-flows
nat-rules
next-hop-service
pgcp-rules
service-interface
service-set
services
services (Hierarchy)
services (System Logging)
stateful-firewall-rules
syslog
tcp-mss
traceoptions
trusted-ca
Service Interface Configuration Guidelines
Services Interface Naming Overview
Configuring the Address and Domain for Services Interfaces
Configuring Default Timeout Settings for Services Interfaces
Configuring System Logging for Services Interfaces
Enabling Fragmentation on GRE Tunnels
Applying Filters and Services to Interfaces
Configuring Service Filters
Configuring AS or MultiServices PIC Redundancy
Examples: Configuring Services Interfaces
Summary of Service Interface Configuration Statements
address
clear-dont-fragment-bit
dial-options
facility-override
family
host
inactivity-timeout
input
interfaces
log-prefix
open-timeout
output
post-service-filter
primary
redundancy-options
secondary
service
service-domain
service-filter
service-set
services
services-options
syslog
unit
PGCP Configuration Guidelines for the BGF Feature
Summary of PGCP Configuration Statements
administrative
administrative (Control Association)
administrative (Virtual Interface)
algorithm
application-data-inactivity-detection
audit-observed-events-returns
base-root
bgf-core
cancel-graceful
cancel-graceful (Control Association)
cancel-graceful (Virtual Interface)
cleanup-timeout
context-indications
control-association-indications
controller-address
controller-failure
controller-port
data-inactivity-detection
default
delivery-function
destination-address
destination-port
detect
diffserv
disable-session-mirroring
disconnect
down
dscp
encoding
event-timestamp-notification
failover-cold
failover-warm
failure
failure (Control Association)
failure (Virtual Interface)
fast-update-filters
file
flag
gateway
gateway-address
gateway-controller
gateway-port
graceful
graceful (Control Association)
graceful (Virtual Interface)
graceful-restart
h248-options
h248-properties
h248-stack
h248-timers
hanging-termination-detection
inactivity-delay
inactivity-duration
inactivity-timer
inactivity-timeout
initial-average-ack-delay
interface
interim-ah-scheme
ip-flow-stop-detection
latch-deadlock-delay
link-loss
max-burst-size
max-burst-size (All Streams)
max-burst-size (RTCP Streams)
max-concurrent-calls
maximum-fuf-percentage
maximum-inactivity-time
maximum-net-propagation-delay
maximum-synchronization-mismatches
maximum-synchronization-time
maximum-terms
maximum-waiting-delay
media
media-service
mg-maximum-pdu-size
mg-originated-pending-limit
mg-provisional-response-timer-value
mg-segmentation-timer
mgc-maximum-pdu-size
mgc-originated-pending-limit
mgc-provisional-response-timer-value
mgc-segmentation-timer
monitor
nat-pool
network-operator-id
no-rtcp-check
normal-mg-execution-time
normal-mgc-execution-time
notification-behavior
notification-rate-limit
notification-regulation
no-dscp-bit-mirroring
overload-control
peak-data-rate
peak-data-rate (All Streams)
peak-data-rate (RTCP)
queue-limit-percentage
reconnect
reject-all-commands-threshold
reject-new-calls-threshold
report-service-change
request-timestamp
routing-instance
rtp
rtcp
rule
rule-set
sbc-utils
segmentation
send-notification-on-delay
service-change
service-change-type
service-interface
service-state
service-state (Virtual BGF)
service-state (Virtual Interface)
services
session-mirroring
source-address
source-port
state-loss
stop-detection-on-drop
sustained-data-rate
sustained-data-rate
sustained-data-rate (RTCP Streams)
timerx
tmax-retransmission-delay
traceoptions
traffic-management
up
use-lower-case
use-wildcard-response
virtual-interface
virtual-interface-down
virtual-interface-indications
virtual-interface-up
warm
Service Interface Pools Configuration Guidelines
Configuring Service Interface Pools
Summary of Service Interface Pools Statements
interface
pool
service-interface-pools
Border Signaling Gateway Configuration Guidelines
Summary of Border Signaling Gateway Configuration Statements
admission-control
admission-control (Border Signaling Gateway)
admission-control (New Call Usage Policy)
committed-burst-size
committed-information-rate
datastore
dialogs
dscp
egress-service-point
embedded-spdf
file
flag
framework
from
from (New Call Usage Policy)
from (New Transaction Policy)
from (Service Class)
gateway
media-policy
media-type
minimum
new-call-usage-policies
new-call-usage-policy
new-call-usage-policy-set
new-transaction-policies
new-transaction-policy
new-transaction-policy-set
next-hop
route
sbc-utils
service-class
service-interface
service-interface (Gateway)
service-interface (Service Point)
service-point
service-point-type
service-policies
services
session-trace
signaling
sip
sip-stack
term
term (New Call Usage Policy)
term (New Transaction Policy)
term (Service Class)
then
then (New Call Usage Policy)
then (New Transaction Policy)
then (Service Class)
timer-c
timers
traceoptions
transactions
transport-details
Dynamic Application Awareness
Dynamic Application Awareness Overview
IDP Overview
APPID Overview
AACL Overview
L-PDF Overview
Application Identification Configuration Guidelines
Defining an Application Identification
Configuring APPID Rules
Configuring Application Profiles
Configuring Application Groups
Configuring Global APPID Properties
Configuring Automatic Download of Software Updates
Tracing APPID Operations
Configuring the APPID Log Filename
Configuring the Number and Size of APPID Log Files
Configuring Access to the Log File
Configuring a Regular Expression for Lines to Be Logged
Configuring the Tracing Flags
Examples: Configuring Application Identification Properties
Summary of Application Identification Configuration Statements
address
application
application (Defining)
application (Including in Rule)
application-group
application-groups
application-system-cache-timeout
applications
automatic
destination
disable
disable (APPID Application)
disable (APPID Application Group)
disable (APPID Port Mapping)
download
idle-timeout
index
ip
max-checked-bytes
min-checked-bytes
no-application-identification
no-application-system-cache
no-clear-application-system-cache
no-signature-based
order
port-mapping
port-range
profile
rule
rule (Configuring)
rule (Including in Rule Set)
rule-set
services
session-timeout
source
traceoptions
type
type-of-service
url
Application-Aware Access List Configuration Guidelines
Configuring AACL Rules
Configuring Match Direction for AACL Rules
Configuring Match Conditions in AACL Rules
Configuring Actions in AACL Rules
Configuring AACL Rule Sets
Example: Configuring AACL Rules
Summary of AACL Configuration Statements
applications
application-groups
application-group-any
destination-address
destination-address-range
destination-prefix-list
from
match-direction
rule
rule-set
services
source-address
source-address-range
source-prefix-list
term
then
Local Policy Decision Function Configuration Guidelines
Configuring L-PDF Profiles
Applying L-PDF Profiles to Service Sets
Tracing L-PDF Operations
Summary of L-PDF Configuration Statements
aacl-fields
policy-decision-statistics-profile
traceoptions
Data Link Switching
Data Link Switching Overview
Overview
DLSw Standards
Data Link Switching Configuration Guidelines
Configuring DLSw
Minimum DLSw Configuration
Configuring the Remote Peer
Configuring Load Balancing
Configuring DLSw Timers
Configuring the Local Peer
Examples: Configuring DLSw Peers
Configuring the Initial Pacing Window
Configuring the Idle Timeout
Configuring the Multicast Address
Configuring Class of Service
Example: Configuring CoS for a DLSw Connection
Tracing DLSw Protocol Traffic
Configuring Logical Link Control on Interfaces
Example: Configuring LLC Options on an Interface
Configuring DLSw Ethernet Redundancy Using LLC2 Properties
Example: Configuring DLSw Ethernet Redundancy
Summary of Data Link Switching Configuration Statements
advertise-interval
circuit-weight
connection-idle-timeout
cost
destination
destination-interface
dlsw
dlsw-cos
explorer-wait-time
hold-time
interface
load-balance
local-mac
local-peer
map
multicast-address
no-preempt
peer
preempt
priority
promiscuous
protocols
reachability-cache-timeout
receive-initial-pacing
redundancy-group
remote-mac
remote-peer
traceoptions
track
type-of-service
Encryption Services
Encryption Overview
Encryption Interfaces Configuration Guidelines
Configuring Encryption Interfaces
Specifying the Security Association Name for Encryption Interfaces
Configuring the MTU for Encryption Interfaces
Example: Configuring an Encryption Interface
Configuring Filters for Traffic Transiting the ES PIC
Traffic Overview
Configuring the Security Association
Configuring an Outbound Traffic Filter
Example: Configuring an Outbound Traffic Filter
Applying the Outbound Traffic Filter
Example: Applying the Outbound Traffic Filter
Configuring an Inbound Traffic Filter
Example: Configuring an Inbound Traffic Filter
Applying the Inbound Traffic Filter to the Encryption Interface
Example: Applying the Inbound Traffic Filter to the Encryption Interface
Configuring an ES Tunnel Interface for a Layer 3 VPN
Configuring ES PIC Redundancy
Example: Configuring ES PIC Redundancy
Configuring IPsec Tunnel Redundancy
Summary of Encryption Configuration Statements
address
backup-destination
backup-interface
destination
es-options
family
filter
interfaces
ipsec-sa
source
tunnel
unit
Flow Monitoring and Discard Accounting Services
Flow Monitoring and Discard Accounting Overview
Passive Flow Monitoring
Active Flow Monitoring
Flow Monitoring and Discard Accounting Configuration Guidelines
Configuring Traffic Sampling
Minimum Configuration for Traffic Sampling
Configuring Traffic Sampling
Disabling Traffic Sampling
Configuring Traffic Sampling Output
Traffic Sampling Output Format
Tracing Traffic Sampling Operations
Traffic Sampling Examples
Example: Sampling a Single SONET Interface
Example: Sampling All Traffic from a Single IP Address
Example: Sampling All FTP Traffic
Configuring Flow Monitoring
Configuring Flow-Monitoring Interfaces
Configuring Flow-Monitoring Properties
Directing Traffic to Flow-Monitoring Interfaces
Exporting Flows
Configuring Time Periods when Flow Monitoring is Active and Inactive
Example: Configuring Flow Monitoring
Enabling Flow Aggregation
Configuring Flow Aggregation to Use Version 5 or Version 8 cflowd
Configuring Flow Aggregation to Use Version 9 Flow Templates
Configuring the Traffic to be Sampled
Configuring the Version 9 Template Properties
Restrictions
Fields Included in Each Template Type
MPLS Sampling Behavior
Verification
Examples: Configuring Version 9 Flow Templates
Directing Replicated Flows to Multiple Flow Servers
Directing Replicated Routing Engine–Based Sampling Flows to Multiple Servers
Directing Replicated Version 9 Flow Aggregates to Multiple Servers
Logging cflowd Flows Before Export
Configuring Port Mirroring
Configuring Tunnels
Filter-Based Forwarding with Multiple Monitoring Interfaces
Restrictions
Configuring Port Mirroring on Services Interfaces
Examples: Configuring Port Mirroring
Load Balancing Among Multiple Monitoring Interfaces
Configuring Discard Accounting
Enabling Passive Flow Monitoring
Passive Flow Monitoring for MPLS Encapsulated Packets
Removing MPLS Labels from Incoming Packets
Example: Enabling Passive Flow Monitoring
Configuring Services Interface Redundancy with Flow Monitoring
Summary of Flow-Monitoring Configuration Statements
accounting
address
aggregate-export-interval
aggregation
autonomous-system-type
cflowd
cflowd (Discard Accounting and Sampling)
cflowd (Flow Monitoring)
core-dump
destination
disable
engine-id
engine-type
export-format
family
family (Interfaces)
family (Monitoring)
family (Port Mirroring)
family (Sampling)
file
file (Sampling)
file (Trace Options)
filename
files
filter
flow-active-timeout
flow-export-destination
flow-inactive-timeout
flow-monitoring
forwarding-options
input
input (Port Mirroring)
input (Sampling)
input-interface-index
interface
interface (Accounting or Sampling)
interface (Monitoring)
interface (Port Mirroring)
interfaces
ipv4-template
ipv6-template
label-position
local-dump
max-packets-per-second
monitoring
mpls-ipv4-template
mpls-template
multiservice-options
next-hop
next-hop-group
no-core-dump
no-filter-check
no-local-dump
no-stamp
no-syslog
no-world-readable
option-refresh-rate
output
output (Accounting)
output (Monitoring)
output (Port Mirroring)
output (Sampling)
output-interface-index
passive-monitor-mode
pop-all-labels
port
port-mirroring
rate
receive-options-packets
receive-ttl-exceeded
required-depth
run-length
sampling
sampling (Forwarding Options)
sampling (Interfaces)
services
size
source-address
stamp
syslog
template
template (Forwarding Options)
template (Services)
template-refresh-rate
traceoptions
unit
version
version9
version9 (Forwarding Options)
version9 (Services)
world-readable
Flow Collection Configuration Guidelines
Configuring Flow Collection
Configuring Destination FTP Servers for Flow Records
Configuring a Packet Analyzer
Configuring File Formats
Configuring Interface Mappings
Configuring Transfer Logs
Configuring Retry Attempts
Sending cflowd Records to Flow Collector Interfaces
Configuring Flow Collection Mode and Interfaces on Services PICs
Example: Configuring Flow Collection
Summary of Flow Collection Configuration Statements
analyzer-address
analyzer-id
archive-sites
collector
data-format
destinations
filename-prefix
file-specification
file-specification (File Format)
file-specification (Interface Mapping)
flow-collector
ftp
ftp (Flow Collector Files)
ftp (Transfer Log Files)
interface-map
maximum-age
name-format
password
password (Flow Collector File Servers)
password (Transfer Log File Servers)
retry
retry-delay
transfer
transfer-log-archive
username
variant
Dynamic Flow Capture Configuration Guidelines
Dynamic Flow Capture Architecture
Liberal Sequence Windowing
Configuring Dynamic Flow Capture
Configuring the Capture Group
Configuring the Content Destination
Configuring the Control Source
Configuring the DFC PIC Interface
Configuring System Logging
Configuring Thresholds
Limiting the Number of Duplicates of a Packet
Example: Configuring Dynamic Flow Capture
Flow-Tap Configuration Guidelines
Flow-Tap Architecture
Configuring the Flow-Tap Service
Configuring the Flow-Tap Interface
Strengthening Flow-Tap Security
Restrictions on Flow-Tap Services
Configuring FlowTapLite
Examples: Configuring Flow-Tap Services
Summary of Dynamic Flow Capture and Flow-Tap Configuration Statements
address
allowed-destinations
capture-group
content-destination
control-source
duplicates-dropped-periodicity
dynamic-flow-capture
flow-tap
flow-tap-lite
g-duplicates-dropped-periodicity
g-max-duplicates
hard-limit
hard-limit-target
input-packet-rate-threshold
interface
interfaces
max-duplicates
minimum-priority
no-syslog
notification-targets
pic-memory-threshold
service-port
services
shared-key
soft-limit
soft-limit-clear
source-addresses
ttl
Link and Multilink Services
Link and Multilink Services Overview
Link and Multilink Services Configuration Guidelines
Multilink and Link Services PICs Overview
Configuring the Number of Bundles on Link Services PICs
Configuring the Links in a Multilink or Link Services Bundle
Multilink and Link Services Logical Interface Configuration Overview
Default Settings for Multilink and Link Services Logical Interfaces
Configuring Encapsulation for Multilink and Link Services Logical Interfaces
Configuring the Drop Timeout Period on Multilink and Link Services Logical Interfaces
Limiting Packet Payload Size on Multilink and Link Services Logical Interfaces
Configuring the Minimum Number of Active Links on Multilink and Link Services Logical Interfaces
Configuring MRRU on Multilink and Link Services Logical Interfaces
Configuring the Sequence Header Format on Multilink and Link Services Logical Interfaces
Configuring DLCIs on Link Services Logical Interfaces
Configuring Point-to-Point DLCIs for MLFR FRF.16 and MLPPP Bundles
Configuring Multicast-Capable DLCIs for MLFR FRF.16 Bundles
Configuring Delay-Sensitive Packet Interleaving on Link Services Logical Interfaces
Configuring LFI with DLCI Scheduling
Example: Configuring LFI with DLCI Scheduling
Configuring Compressed RTP on J-series Services Routers
Example: Configuring Compressed RTP with MLPPP Encapsulation
Example: Configuring Compressed RTP with PPP Encapsulation
Configuring Link Services Physical Interfaces
Default Settings for Link Services Interfaces
Configuring Encapsulation for Link Services Physical Interfaces
Configuring Acknowledgment Timers on Link Services Physical Interfaces
Configuring Differential Delay Alarms on Link Services Physical Interfaces with MLFR FRF.16
Configuring Keepalives on Link Services Physical Interfaces
Configuring CoS on Link Services Interfaces
CoS for Link Services Interfaces on J-series Services Routers
CoS for Link Services Interfaces on M-series and T-series Routing Platforms
Example: Configuring CoS on Link Services Interfaces
Examples: Configuring Multilink Interfaces
Example: Configuring a Multilink Interface with MLPPP
Example: Configuring a Multilink Interface with MLPPP over ATM 2 Interfaces
Configuring a Multilink Interface with MLFR FRF.15
Examples: Configuring Link Interfaces
Example: Configuring a Link Services Interface with Two Links
Example: Configuring a Link Services Interface with MLPPP
Example: Configuring a Link Services Interface with MLFR FRF.15
Example: Configuring a Link Services PIC with MLFR FRF.16
Example: Configuring Link and Voice Services Interfaces with a Combination of Bundle Types
Summary of Multilink and Link Services Configuration Statements
acknowledge-retries
acknowledge-timer
action-red-differential-delay
address
bundle
compression-device
destination
disable-mlppp-inner-ppp-pfc
dlci
drop-timeout
encapsulation
encapsulation (Logical Interface)
encapsulation (Physical Interface)
family
fragment-threshold
hello-timer
interfaces
interleave-fragments
lmi-type
minimum-links
mlfr-uni-nni-bundle-options
mrru
mtu
multicast-dlci
n391
n392
n393
red-differential-delay
short-sequence
t391
t392
unit
yellow-differential-delay
Real-Time Performance Monitoring Services
Real-Time Performance Monitoring Services Overview
Real-Time Performance Monitoring Configuration Guidelines
Configuring BGP Neighbor Discovery Through RPM
Configuring Real-Time Performance Monitoring
Configuring RPM Probes
Configuring RPM Receiver Servers
Limiting the Number of Concurrent RPM Probes
Configuring RPM Timestamping
Configuring RPM Timestamps on M-series, MX-series, and T-series Routing Platforms
Configuring RPM Timestamps on J-series Services Routers
Configuring TWAMP
Configuring TWAMP Interfaces
Configuring TWAMP Servers
Examples: Configuring BGP Neighbor Discovery Through RPM
Examples: Configuring Real-Time Performance Monitoring
Summary of Real-Time Performance Monitoring Configuration Statements
authentication-mode
client-list
data-fill
data-size
destination-interface
destination-port
dscp-code-point
hardware-timestamp
history-size
inactivity-timeout
logical-system
maximum-connections
maximum-connections-per-client
maximum-sessions
maximum-sessions-per-connection
moving-average-size
one-way-hardware-timestamp
port
port (RPM)
port (TWAMP)
probe
probe-count
probe-interval
probe-limit
probe-server
probe-type
routing-instance
routing-instances
rpm
server
services
source-address
target
tcp
test
test-interval
thresholds
traps
twamp
twamp-server
udp
Tunnel Services
Tunnel Services Overview
Tunnel Interfaces Configuration Guidelines
Configuring Unicast Tunnels
Configuring a Key Number on GRE Tunnels
Enabling Fragmentation on GRE Tunnels
Specifying an MTU Setting for the Tunnel
Configuring a GRE Tunnel to Copy ToS Bits to the Outer IP Header
Configuring Packet Reassembly
Restricting Tunnels to Multicast Traffic
Configuring Logical Tunnel Interfaces
Connecting Logical Systems
Configuring Logical Tunnels on J-series Platforms
Configuring Tunnel Interfaces for Routing Table Lookup
Configuring Virtual Loopback Tunnels for VRF Table Lookup
Configuring PIM Tunnels
Configuring IPv6-over-IPv4 Tunnels
Configuring Dynamic Tunnels
Configuring Tunnel Interfaces on MX-series Routers
Examples: Configuring Unicast Tunnels
Example: Configuring a Virtual Loopback Tunnel for VRF Table Lookup
Example: Configuring an IPv6-over-IPv4 Tunnel
Example: Configuring Logical Tunnels
Summary of Tunnel Services Configuration Statements
allow-fragmentation
backup-destination
copy-tos-to-outer-ip-header
destination
destination (Tunnel Remote End)
destination (Routing Instance)
destination-networks
do-not-fragment
dynamic-tunnels
interfaces
key
multicast-only
peer-unit
reassemble-packets
routing-instance
routing-instances
routing-options
source
source-address
ttl
tunnel
tunnel-type
unit
Index
Index
Index of Statements and Commands

[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]