JUNOS Software Administration Guide
Techpubs Home
Report an Error
Collapse TOC
Index
Entire manual as PDF
|  |
-
About This Guide
-
-
Objectives
-
Audience
-
Supported Routing Platforms
-
Document Conventions
-
-
JUNOS Software Documentation for J-series Services Routers
and SRX-series Services Gateways
-
Documentation Feedback
-
Requesting
Technical Support
-
Support for Administration Features on Different Device Types
-
User Interface Overview
-
-
User Interface Support On Different Device Types
-
User Interface Overview
-
-
J-Web Overview
-
CLI Overview
-
Before You Begin
-
Using the J-Web Interface
-
-
Starting the J-Web Interface
-
J-Web Layout
-
Elements of the J-Web Interface
-
-
Top Pane Elements
-
Main Pane Elements
-
Side Pane Elements
-
Navigating the J-Web Interface
-
-
Navigating the Quick
Configuration Pages
-
Navigating
the J-Web Configuration Editor
-
Getting J-Web
Help
-
J-Web Sessions
-
Using the Command-Line Interface
-
-
CLI Command Hierarchy
-
Starting the CLI
-
CLI Operational Mode
-
CLI Configuration Mode
-
CLI Basics
-
-
Editing Keystrokes
-
Command
Completion
-
Online Help
-
Configuring
the CLI Environment
-
Configuring Secure Web Access
-
-
Secure Web Access Support On Different Device Types
-
Secure Web Access Terms
-
Secure Web Access Overview
-
Before You Begin
-
-
Generating SSL Certificates
-
Configuring Secure Web Access
-
Configuring Secure Web Access with a Configuration Editor
-
Verifying Secure Web Access
-
-
Displaying an SSL Certificate Configuration
-
Displaying a Secure Access Configuration
-
Managing Administrator Authentication
-
-
Administrator Authentication Support On Different Device Types
-
User Authentication Terms
-
User Authentication Overview
-
-
User Authentication
-
User Accounts
-
Login Classes
-
-
Permission Bits
-
Denying or Allowing
Individual Commands
-
Template Accounts
-
Before You Begin
-
Managing User Authentication with Quick Configuration
-
-
Adding a RADIUS Server for Authentication
-
Adding a TACACS+ Server for Authentication
-
Configuring System Authentication
-
Adding New Users
-
Managing User Authentication with a Configuration Editor
-
-
Setting Up RADIUS Authentication
-
Setting Up TACACS+ Authentication
-
Configuring Authentication Order
-
Controlling User Access
-
-
Defining Login
Classes
-
Creating User Accounts
-
Setting Up Template Accounts
-
-
Creating a
Remote Template Account
-
Creating
a Local Template Account
-
Securing the Console Port
-
Accessing Remote Devices with the CLI
-
-
Using the telnet Command
-
Using the ssh Command
-
Configuring Password Retry Limits for Telnet and SSH Access
-
Setting Up USB Modems for Remote Management
-
-
USB Modem Remote Management Support On Different Device Types
-
USB Modem Terms
-
USB Modem Overview
-
-
USB Modem Interfaces
-
How the Device Initializes USB Modems
-
USB Modem Connection and Configuration Overview
-
Before You Begin
-
Connecting the USB Modem to the USB Port
-
Configuring USB Modem Interfaces with a Configuration Editor
-
-
Configuring a USB Modem Interface (Required)
-
Configuring a Dialer Interface (Required)
-
Configuring Dial-In (Required)
-
Configuring CHAP on Dialer Interfaces (Optional)
-
Connecting to the Device from the User End
-
-
Configuring a Dial-Up Modem Connection at the User End
-
Connecting to the Device from the User End
-
Administering USB Modems
-
-
Modifying USB Modem Initialization Commands
-
Resetting USB Modems
-
Verifying the USB Modem Configuration
-
-
Verifying a USB Modem Interface
-
Verifying Dialer Interface Configuration
-
Configuring SNMP for Network Management
-
-
SNMP Network Management Support On Different Device Types
-
SNMP Architecture
-
-
Management Information Base
-
SNMP Communities
-
SNMP Traps
-
Spoofing SNMP Traps
-
SNMP Health Monitor
-
Before You Begin
-
Configuring SNMP with Quick Configuration
-
Configuring SNMP with a Configuration Editor
-
-
Defining System Identification Information (Required)
-
Configuring SNMP Agents and Communities (Required)
-
Managing SNMP Trap Groups (Required)
-
Controlling Access to MIBs (Optional)
-
Verifying the SNMP Configuration
-
-
Verifying SNMP Agent Configuration
-
Verifying SNMP Health Monitor Configuration
-
Configuring the Device for DHCP
-
-
DHCP Support On Different Device Types
-
DHCP Terms
-
DHCP Overview
-
-
DHCP Server Operation
-
-
DHCP Options
-
Compatibility with Autoinstallation
-
DHCP Client Operation
-
Propagation of TCP/IP Settings
-
DHCP Relay Operation
-
Conflict Detection and Resolution
-
Interface Restrictions
-
Before You Begin
-
Configuring DHCP with Quick Configuration
-
-
Configuring DHCP Service with Quick Configuration
-
Configuring the Device as a DHCP Client with Quick Configuration
-
Configuring BOOTP or DHCP Relay with Quick Configuration
-
Configuring DHCP with a Configuration Editor
-
-
Configuring the Device as a DHCP Server
-
Configuring the Device as a DHCP Client
-
-
Configuring the Device as a DHCP Relay Agent
-
Configuring the Device as a BootP/DHCP Relay Agent
-
Verifying a DHCP Configuration
-
-
Displaying Global DHCP Information
-
Verifying the DHCP Binding Database
-
Verifying the DHCP Client
-
Verifying DHCP Server Operation
-
Displaying DHCP Relay Statistics
-
Configuring the Device as a DNS Proxy
-
-
DNS Proxy Support On Different Device Types
-
DNS Proxy Overview
-
-
DNS Proxy with Split DNS
-
DNS Proxy Cache
-
Dynamic Domain Name System Client
-
Configuring DNS Proxy with Quick Configuration
-
-
Configuring the DNS Proxy Service with Quick Configuration
-
Configuring Dynamic DNS with Quick Configuration
-
Configuring the Device as a DNS Proxy with the CLI
-
-
Configuring DNS Proxy Servers
-
Configuring the DNS Static Cache
-
Sample DNS Proxy Configuration
-
Verifying the DNS Server Configuration
-
-
Verifying the DNS Proxy Configuration
-
Verifying DNS Proxy Cache
-
Verifying the Dynamic DNS Client
-
Verifying Dynamic DNS Client Details
-
Configuring Autoinstallation
-
-
Autoinstallation Support On Different Device Types
-
Autoinstallation Terms
-
Autoinstallation Overview
-
-
Supported Autoinstallation Interfaces and Protocols
-
Typical Autoinstallation Process on a New Device
-
Before You Begin
-
Configuring Autoinstallation with a Configuration Editor
-
Verifying Autoinstallation
-
-
Verifying Autoinstallation Status
-
Automating Network Operations and Troubleshooting
-
-
Network Operations and Troubleshooting Automation Support On
Different Device Types
-
Defining and Enforcing Configuration Rules with Commit Scripts
-
-
Commit Script Overview
-
Enabling Commit Scripts
-
Disabling Commit Scripts
-
Automating Network Management and Troubleshooting with Operation
Scripts
-
-
Operation Script Overview
-
Enabling Operation Scripts
-
Executing Operation Scripts
-
Disabling Operation Scripts
-
Running Self-Diagnostics with Event Policies
-
-
Event Policy Overview
-
Configuring Event Policies
-
Monitoring the Device and Routing Operations
-
-
Monitoring Terms
-
Monitoring Overview
-
-
Monitoring Tools Overview
-
Filtering Command Output
-
Before You Begin
-
Using the Monitoring Tools
-
-
Monitoring System Properties
-
Monitoring the Chassis
-
Monitoring the Interfaces
-
Monitoring Routing Information
-
-
Monitoring
Route Information
-
Monitoring BGP Routing
Information
-
Monitoring OSPF Routing
Information
-
Monitoring RIP Routing
Information
-
Monitoring DLSw
Routing Information
-
Monitoring Class-of-Service Performance
-
-
Monitoring CoS
Interfaces
-
Monitoring CoS Classifiers
-
Monitoring CoS Value Aliases
-
Monitoring CoS RED Drop Profiles
-
Monitoring CoS Forwarding Classes
-
Monitoring CoS Rewrite
Rules
-
Monitoring CoS Scheduler
Maps
-
Monitoring MPLS Traffic Engineering Information
-
-
Monitoring
MPLS Interfaces
-
Monitoring MPLS
LSP Information
-
Monitoring MPLS
LSP Statistics
-
Monitoring RSVP
Session Information
-
Monitoring MPLS
RSVP Interfaces Information
-
Monitoring RPM Probes
-
Monitoring PPP
-
Monitoring PPPoE
-
Monitoring ALGs
-
-
Monitoring SIP
ALG Information
-
-
Monitoring
SIP ALG Calls
-
Monitoring
SIP ALG Counters
-
Monitoring
SIP ALG Rate Information
-
Monitoring SIP ALG Transactions
-
Monitoring
H.323 ALG Information
-
Monitoring
MGCP ALG Information
-
-
Monitoring MGCP ALG Calls
-
Monitoring MGCP ALG Counters
-
Monitoring MGCP ALG Endpoints
-
Monitoring
SCCP ALG Information
-
-
Monitoring
SCCP ALG Calls
-
Monitoring
SCCP ALG Counters
-
Monitoring Security Policies
-
Monitoring VPNs
-
-
Monitoring
IKE Gateway Information
-
Monitoring
IPsec VPN Information
-
Monitoring Firewall Authentication
-
-
Monitoring Firewall Authentication Table
-
Monitoring Firewall Authentication History
-
Monitoring the WAN Acceleration Interface
-
Monitoring Firewall/NAT
-
-
Monitoring Incoming Table Information
-
Monitoring Interface NAT Information
-
Monitoring
Source NAT Information
-
Monitoring
Static NAT Information
-
Monitoring Screen Counters
-
Monitoring Flow Session Statistics
-
-
Monitoring Flow Session Statistics Summary Information
-
Monitoring
Flow Information for All Sessions
-
Monitoring Flow Information for Application Sessions
-
Monitoring Flow Session Destination Port Information
-
Monitoring Flow Session Destination Prefix Information
-
Monitoring Flow Session Interface Information
-
Monitoring Flow Session Protocol Information
-
Monitoring Flow Session Resource Manager
-
Monitoring
Flow Session Identifier Session
-
Monitoring Flow Session Source Port Information
-
Monitoring
Flow Session Source Prefix Information
-
Monitoring Flow Session Tunnel Information
-
Monitoring Flow Gate Information
-
Monitoring DNS
-
-
Monitoring Dynamic DNS
-
Monitoring DNS Proxy
-
Monitoring DHCP
-
-
Monitoring DHCP Service Statistics
-
Monitoring DHCP Client Bindings
-
Monitoring DHCP Conflicts
-
Monitoring DHCP Clients
-
Monitoring DHCP Relay Statistics
-
Monitoring Enhanced Switching
-
-
Monitoring Spanning Tree
-
Monitoring GVRP
-
Monitoring Dot1X
-
Monitoring IDP
-
Monitoring Events and Managing System Log Files
-
-
System Log File Support on Different Device Types
-
System Log Message Terms
-
System Log Messages Overview
-
-
System Log Message Destinations
-
System Log Facilities and Severity Levels
-
Control and Data Plane Logs
-
Regular Expressions
-
Before You Begin
-
Configuring System Log Messages with a Configuration Editor
-
-
Sending System Log Messages to a File
-
Sending System Log Messages to a User Terminal
-
Archiving System Logs
-
Disabling System Logs
-
Monitoring System Log Messages with the J-Web Event Viewer
-
-
Filtering System Log Messages
-
Viewing System Log Messages
-
Configuring and Monitoring Alarms
-
-
Alarms Support On Different Device Types
-
Alarm Terms
-
Alarm Overview
-
-
Alarm Types
-
Alarm Severity
-
Alarm Conditions
-
-
Interface Alarm
Conditions
-
System Alarm Conditions and Corrective Actions
-
Before You Begin
-
Configuring Alarms with a Configuration Editor
-
Checking Active Alarms
-
Verifying the Alarms Configuration
-
-
Displaying Alarm Configurations
-
Performing Software Upgrades and Reboots
-
-
Upgrade and Reboot Support On Different Device Types
-
Upgrade and Downgrade Overview
-
-
Upgrade Software Packages
-
Recovery Software Packages
-
Before You Begin
-
Downloading Software Upgrades from Juniper Networks
-
Installing Software Upgrades
-
-
Installing Software Upgrades with the J-Web Interface
-
-
Installing Software Upgrades from a Remote Server
-
Installing Software Upgrades by Uploading Files
-
Installing Software Upgrades Using the CLI
-
Downgrading the Software
-
-
Downgrading the Software with the J-Web Interface
-
Downgrading the Software with the CLI
-
Configuring Boot Devices
-
-
Configuring a Boot Device for Backup with the J-Web Interface
-
Configuring a Boot Device for Backup with the CLI
-
Configuring a Boot Device to Receive Software Failure Memory
Snapshots
-
Rebooting or Halting the Device
-
-
Rebooting or Halting the Device with the J-Web
Interface
-
Rebooting the Device with the CLI
-
Halting the Device with the CLI
-
Bringing Chassis Components Online and Offline
-
Chassis Control Restart Options
-
Understanding and Changing Secure and Router Contexts
-
-
Secure and Router Context Support On Different Device Types
-
Understanding Secure and Router Contexts
-
-
Secure Context
-
Router Context
-
Secure Context Configuration Settings
-
Router Context Configuration Settings
-
Changing from Secure Context to Router Context
-
-
Secure-to-Router Context Task Overview
-
Changing to Router Context
-
Changing from Router Context to Secure Context
-
-
Router-to-Secure Context Task Overview
-
Installing and Managing Licenses
-
-
Licensed Features on Different Device Types
-
JUNOS Software with Enhanced Services License Overview
-
-
License Enforcement
-
Software Feature Licenses
-
License Key Components
-
Before You Begin
-
Managing JUNOS Software with Enhanced Services Licenses with
the CLI
-
-
Adding New Licenses with the CLI
-
Deleting a License with the CLI
-
Saving License Keys with the CLI
-
Verifying JUNOS Software with Enhanced Services License Management
-
-
Displaying Installed Licenses
-
Displaying License Usage
-
Displaying Installed License Keys
-
Managing Files
-
-
File Management Support On Different Device Types
-
Before You Begin
-
Managing Files with the J-Web Interface
-
-
Cleaning Up Files
-
Downloading Files
-
Deleting Files
-
Deleting the Backup Software Image
-
Cleaning Up Files with the CLI
-
Managing Accounting Files
-
Encrypting and Decrypting Configuration Files
-
-
Encrypting Configuration Files
-
Decrypting Configuration Files
-
Modifying the Encryption Key
-
Using Diagnostic Tools
-
-
Diagnostic Tools Support On Different Device Types
-
Diagnostic Terms
-
Diagnostic Tools Overview
-
-
J-Web Diagnostic Tools Overview
-
CLI Diagnostic Commands Overview
-
MPLS Connection Checking
-
Before You Begin
-
-
General Preparation
-
Ping MPLS Preparation
-
-
MPLS Enabled
-
Loopback
Address
-
Source
Address for Probes
-
Pinging Hosts from the J-Web Interface
-
-
Using the J-Web Ping Host Tool
-
Ping Host Results and Output Summary
-
Checking MPLS Connections from the J-Web Interface
-
-
Using the J-Web Ping MPLS Tool
-
Ping MPLS Results and Output
-
Tracing Unicast Routes from the J-Web Interface
-
-
Using the J-Web Traceroute Tool
-
Traceroute Results and Output Summary
-
Capturing and Viewing Packets with the J-Web Interface
-
-
Using J-Web Packet Capture
-
Packet Capture Results and Output Summary
-
Using CLI Diagnostic Commands
-
-
Pinging Hosts from the CLI
-
Checking MPLS Connections from the CLI
-
-
Pinging RSVP-Signaled LSPs and LDP-Signaled LSPs
-
Pinging Layer 3 VPNs
-
Pinging Layer 2 VPNs
-
Pinging Layer 2 Circuits
-
Tracing Unicast Routes from the CLI
-
-
Using the traceroute
Command
-
Using the traceroute monitor Command
-
Tracing Multicast Routes from the CLI
-
-
Using the
mtrace from-source Command
-
Using
the mtrace monitor Command
-
Displaying Log and Trace Files from the CLI
-
Monitoring Interfaces and Traffic from the CLI
-
-
Using the
monitor interface Command
-
Using the monitor traffic Command
-
Configuring Packet Capture
-
-
Packet Capture Support On Different Device Types
-
Packet Capture Terms
-
Packet Capture Overview
-
-
Packet Capture on Device Interfaces
-
Firewall Filters for Packet Capture
-
Packet Capture Files
-
Analysis of Packet Capture Files
-
Before You Begin
-
Configuring Packet Capture with a Configuration Editor
-
-
Enabling Packet Capture (Required)
-
Configuring Packet Capture on an Interface (Required)
-
Configuring a Firewall Filter for Packet Capture (Optional)
-
Disabling Packet Capture
-
Deleting Packet Capture Files
-
Changing Encapsulation on Interfaces with Packet Capture Configured
-
Verifying Packet Capture
-
-
Displaying a Packet Capture Configuration
-
Displaying a Firewall Filter for Packet Capture Configuration
-
Verifying Captured Packets
-
Configuring RPM Probes
-
-
RPM Probe Support On Different Device Types
-
RPM Terms
-
RPM Overview
-
-
RPM Probes
-
RPM Tests
-
Probe and Test Intervals
-
Jitter Measurement with Hardware Timestamping
-
RPM Statistics
-
RPM Thresholds and Traps
-
RPM for BGP Monitoring
-
Before You Begin
-
Configuring RPM with Quick Configuration
-
Configuring RPM with a Configuration Editor
-
-
Configuring Basic RPM Probes
-
Configuring TCP and UDP Probes
-
Tuning RPM Probes
-
Configuring RPM Probes to Monitor BGP Neighbors
-
-
Configuring RPM Probes
for BGP Monitoring
-
Directing RPM
Probes to Select BGP Routers
-
Verifying an RPM Configuration
-
-
Verifying RPM Services
-
Verifying RPM Statistics
-
Verifying RPM Probe Servers
-
Index
-
-
Index
|