[an error occurred while processing this directive]
JUNOS Software Administration Guide

Techpubs Home
Report an Error

Collapse TOC
Index

Entire manual as PDF

 

About This Guide
Objectives
Audience
Supported Routing Platforms
Document Conventions
JUNOS Software Documentation for J-series Services Routers and SRX-series Services Gateways
Documentation Feedback
Requesting Technical Support
Support for Administration Features on Different Device Types
User Interface Overview
User Interface Support On Different Device Types
User Interface Overview
J-Web Overview
CLI Overview
Before You Begin
Using the J-Web Interface
Starting the J-Web Interface
J-Web Layout
Elements of the J-Web Interface
Top Pane Elements
Main Pane Elements
Side Pane Elements
Navigating the J-Web Interface
Navigating the Quick Configuration Pages
Navigating the J-Web Configuration Editor
Getting J-Web Help
J-Web Sessions
Using the Command-Line Interface
CLI Command Hierarchy
Starting the CLI
CLI Operational Mode
CLI Configuration Mode
CLI Basics
Editing Keystrokes
Command Completion
Online Help
Configuring the CLI Environment
Configuring Secure Web Access
Secure Web Access Support On Different Device Types
Secure Web Access Terms
Secure Web Access Overview
Before You Begin
Generating SSL Certificates
Configuring Secure Web Access
Configuring Secure Web Access with a Configuration Editor
Verifying Secure Web Access
Displaying an SSL Certificate Configuration
Displaying a Secure Access Configuration
Managing Administrator Authentication
Administrator Authentication Support On Different Device Types
User Authentication Terms
User Authentication Overview
User Authentication
User Accounts
Login Classes
Permission Bits
Denying or Allowing Individual Commands
Template Accounts
Before You Begin
Managing User Authentication with Quick Configuration
Adding a RADIUS Server for Authentication
Adding a TACACS+ Server for Authentication
Configuring System Authentication
Adding New Users
Managing User Authentication with a Configuration Editor
Setting Up RADIUS Authentication
Setting Up TACACS+ Authentication
Configuring Authentication Order
Controlling User Access
Defining Login Classes
Creating User Accounts
Setting Up Template Accounts
Creating a Remote Template Account
Creating a Local Template Account
Securing the Console Port
Accessing Remote Devices with the CLI
Using the telnet Command
Using the ssh Command
Configuring Password Retry Limits for Telnet and SSH Access
Setting Up USB Modems for Remote Management
USB Modem Remote Management Support On Different Device Types
USB Modem Terms
USB Modem Overview
USB Modem Interfaces
How the Device Initializes USB Modems
USB Modem Connection and Configuration Overview
Before You Begin
Connecting the USB Modem to the USB Port
Configuring USB Modem Interfaces with a Configuration Editor
Configuring a USB Modem Interface (Required)
Configuring a Dialer Interface (Required)
Configuring Dial-In (Required)
Configuring CHAP on Dialer Interfaces (Optional)
Connecting to the Device from the User End
Configuring a Dial-Up Modem Connection at the User End
Connecting to the Device from the User End
Administering USB Modems
Modifying USB Modem Initialization Commands
Resetting USB Modems
Verifying the USB Modem Configuration
Verifying a USB Modem Interface
Verifying Dialer Interface Configuration
Configuring SNMP for Network Management
SNMP Network Management Support On Different Device Types
SNMP Architecture
Management Information Base
SNMP Communities
SNMP Traps
Spoofing SNMP Traps
SNMP Health Monitor
Before You Begin
Configuring SNMP with Quick Configuration
Configuring SNMP with a Configuration Editor
Defining System Identification Information (Required)
Configuring SNMP Agents and Communities (Required)
Managing SNMP Trap Groups (Required)
Controlling Access to MIBs (Optional)
Verifying the SNMP Configuration
Verifying SNMP Agent Configuration
Verifying SNMP Health Monitor Configuration
Configuring the Device for DHCP
DHCP Support On Different Device Types
DHCP Terms
DHCP Overview
DHCP Server Operation
DHCP Options
Compatibility with Autoinstallation
DHCP Client Operation
Propagation of TCP/IP Settings
DHCP Relay Operation
Conflict Detection and Resolution
Interface Restrictions
Before You Begin
Configuring DHCP with Quick Configuration
Configuring DHCP Service with Quick Configuration
Configuring the Device as a DHCP Client with Quick Configuration
Configuring BOOTP or DHCP Relay with Quick Configuration
Configuring DHCP with a Configuration Editor
Configuring the Device as a DHCP Server
Configuring the Device as a DHCP Client
Configuring the Device as a DHCP Relay Agent
Configuring the Device as a BootP/DHCP Relay Agent
Verifying a DHCP Configuration
Displaying Global DHCP Information
Verifying the DHCP Binding Database
Verifying the DHCP Client
Verifying DHCP Server Operation
Displaying DHCP Relay Statistics
Configuring the Device as a DNS Proxy
DNS Proxy Support On Different Device Types
DNS Proxy Overview
DNS Proxy with Split DNS
DNS Proxy Cache
Dynamic Domain Name System Client
Configuring DNS Proxy with Quick Configuration
Configuring the DNS Proxy Service with Quick Configuration
Configuring Dynamic DNS with Quick Configuration
Configuring the Device as a DNS Proxy with the CLI
Configuring DNS Proxy Servers
Configuring the DNS Static Cache
Sample DNS Proxy Configuration
Verifying the DNS Server Configuration
Verifying the DNS Proxy Configuration
Verifying DNS Proxy Cache
Verifying the Dynamic DNS Client
Verifying Dynamic DNS Client Details
Configuring Autoinstallation
Autoinstallation Support On Different Device Types
Autoinstallation Terms
Autoinstallation Overview
Supported Autoinstallation Interfaces and Protocols
Typical Autoinstallation Process on a New Device
Before You Begin
Configuring Autoinstallation with a Configuration Editor
Verifying Autoinstallation
Verifying Autoinstallation Status
Automating Network Operations and Troubleshooting
Network Operations and Troubleshooting Automation Support On Different Device Types
Defining and Enforcing Configuration Rules with Commit Scripts
Commit Script Overview
Enabling Commit Scripts
Disabling Commit Scripts
Automating Network Management and Troubleshooting with Operation Scripts
Operation Script Overview
Enabling Operation Scripts
Executing Operation Scripts
Disabling Operation Scripts
Running Self-Diagnostics with Event Policies
Event Policy Overview
Configuring Event Policies
Monitoring the Device and Routing Operations
Monitoring Terms
Monitoring Overview
Monitoring Tools Overview
Filtering Command Output
Before You Begin
Using the Monitoring Tools
Monitoring System Properties
Monitoring the Chassis
Monitoring the Interfaces
Monitoring Routing Information
Monitoring Route Information
Monitoring BGP Routing Information
Monitoring OSPF Routing Information
Monitoring RIP Routing Information
Monitoring DLSw Routing Information
Monitoring Class-of-Service Performance
Monitoring CoS Interfaces
Monitoring CoS Classifiers
Monitoring CoS Value Aliases
Monitoring CoS RED Drop Profiles
Monitoring CoS Forwarding Classes
Monitoring CoS Rewrite Rules
Monitoring CoS Scheduler Maps
Monitoring MPLS Traffic Engineering Information
Monitoring MPLS Interfaces
Monitoring MPLS LSP Information
Monitoring MPLS LSP Statistics
Monitoring RSVP Session Information
Monitoring MPLS RSVP Interfaces Information
Monitoring RPM Probes
Monitoring PPP
Monitoring PPPoE
Monitoring ALGs
Monitoring SIP ALG Information
Monitoring SIP ALG Calls
Monitoring SIP ALG Counters
Monitoring SIP ALG Rate Information
Monitoring SIP ALG Transactions
Monitoring H.323 ALG Information
Monitoring MGCP ALG Information
Monitoring MGCP ALG Calls
Monitoring MGCP ALG Counters
Monitoring MGCP ALG Endpoints
Monitoring SCCP ALG Information
Monitoring SCCP ALG Calls
Monitoring SCCP ALG Counters
Monitoring Security Policies
Monitoring VPNs
Monitoring IKE Gateway Information
Monitoring IPsec VPN Information
Monitoring Firewall Authentication
Monitoring Firewall Authentication Table
Monitoring Firewall Authentication History
Monitoring the WAN Acceleration Interface
Monitoring Firewall/NAT
Monitoring Incoming Table Information
Monitoring Interface NAT Information
Monitoring Source NAT Information
Monitoring Static NAT Information
Monitoring Screen Counters
Monitoring Flow Session Statistics
Monitoring Flow Session Statistics Summary Information
Monitoring Flow Information for All Sessions
Monitoring Flow Information for Application Sessions
Monitoring Flow Session Destination Port Information
Monitoring Flow Session Destination Prefix Information
Monitoring Flow Session Interface Information
Monitoring Flow Session Protocol Information
Monitoring Flow Session Resource Manager
Monitoring Flow Session Identifier Session
Monitoring Flow Session Source Port Information
Monitoring Flow Session Source Prefix Information
Monitoring Flow Session Tunnel Information
Monitoring Flow Gate Information
Monitoring DNS
Monitoring Dynamic DNS
Monitoring DNS Proxy
Monitoring DHCP
Monitoring DHCP Service Statistics
Monitoring DHCP Client Bindings
Monitoring DHCP Conflicts
Monitoring DHCP Clients
Monitoring DHCP Relay Statistics
Monitoring Enhanced Switching
Monitoring Spanning Tree
Monitoring GVRP
Monitoring Dot1X
Monitoring IDP
Monitoring Events and Managing System Log Files
System Log File Support on Different Device Types
System Log Message Terms
System Log Messages Overview
System Log Message Destinations
System Log Facilities and Severity Levels
Control and Data Plane Logs
Regular Expressions
Before You Begin
Configuring System Log Messages with a Configuration Editor
Sending System Log Messages to a File
Sending System Log Messages to a User Terminal
Archiving System Logs
Disabling System Logs
Monitoring System Log Messages with the J-Web Event Viewer
Filtering System Log Messages
Viewing System Log Messages
Configuring and Monitoring Alarms
Alarms Support On Different Device Types
Alarm Terms
Alarm Overview
Alarm Types
Alarm Severity
Alarm Conditions
Interface Alarm Conditions
System Alarm Conditions and Corrective Actions
Before You Begin
Configuring Alarms with a Configuration Editor
Checking Active Alarms
Verifying the Alarms Configuration
Displaying Alarm Configurations
Performing Software Upgrades and Reboots
Upgrade and Reboot Support On Different Device Types
Upgrade and Downgrade Overview
Upgrade Software Packages
Recovery Software Packages
Before You Begin
Downloading Software Upgrades from Juniper Networks
Installing Software Upgrades
Installing Software Upgrades with the J-Web Interface
Installing Software Upgrades from a Remote Server
Installing Software Upgrades by Uploading Files
Installing Software Upgrades Using the CLI
Downgrading the Software
Downgrading the Software with the J-Web Interface
Downgrading the Software with the CLI
Configuring Boot Devices
Configuring a Boot Device for Backup with the J-Web Interface
Configuring a Boot Device for Backup with the CLI
Configuring a Boot Device to Receive Software Failure Memory Snapshots
Rebooting or Halting the Device
Rebooting or Halting the Device with the J-Web Interface
Rebooting the Device with the CLI
Halting the Device with the CLI
Bringing Chassis Components Online and Offline
Chassis Control Restart Options
Understanding and Changing Secure and Router Contexts
Secure and Router Context Support On Different Device Types
Understanding Secure and Router Contexts
Secure Context
Router Context
Secure Context Configuration Settings
Router Context Configuration Settings
Changing from Secure Context to Router Context
Secure-to-Router Context Task Overview
Changing to Router Context
Changing from Router Context to Secure Context
Router-to-Secure Context Task Overview
Installing and Managing Licenses
Licensed Features on Different Device Types
JUNOS Software with Enhanced Services License Overview
License Enforcement
Software Feature Licenses
License Key Components
Before You Begin
Managing JUNOS Software with Enhanced Services Licenses with the CLI
Adding New Licenses with the CLI
Deleting a License with the CLI
Saving License Keys with the CLI
Verifying JUNOS Software with Enhanced Services License Management
Displaying Installed Licenses
Displaying License Usage
Displaying Installed License Keys
Managing Files
File Management Support On Different Device Types
Before You Begin
Managing Files with the J-Web Interface
Cleaning Up Files
Downloading Files
Deleting Files
Deleting the Backup Software Image
Cleaning Up Files with the CLI
Managing Accounting Files
Encrypting and Decrypting Configuration Files
Encrypting Configuration Files
Decrypting Configuration Files
Modifying the Encryption Key
Using Diagnostic Tools
Diagnostic Tools Support On Different Device Types
Diagnostic Terms
Diagnostic Tools Overview
J-Web Diagnostic Tools Overview
CLI Diagnostic Commands Overview
MPLS Connection Checking
Before You Begin
General Preparation
Ping MPLS Preparation
MPLS Enabled
Loopback Address
Source Address for Probes
Pinging Hosts from the J-Web Interface
Using the J-Web Ping Host Tool
Ping Host Results and Output Summary
Checking MPLS Connections from the J-Web Interface
Using the J-Web Ping MPLS Tool
Ping MPLS Results and Output
Tracing Unicast Routes from the J-Web Interface
Using the J-Web Traceroute Tool
Traceroute Results and Output Summary
Capturing and Viewing Packets with the J-Web Interface
Using J-Web Packet Capture
Packet Capture Results and Output Summary
Using CLI Diagnostic Commands
Pinging Hosts from the CLI
Checking MPLS Connections from the CLI
Pinging RSVP-Signaled LSPs and LDP-Signaled LSPs
Pinging Layer 3 VPNs
Pinging Layer 2 VPNs
Pinging Layer 2 Circuits
Tracing Unicast Routes from the CLI
Using the traceroute Command
Using the traceroute monitor Command
Tracing Multicast Routes from the CLI
Using the mtrace from-source Command
Using the mtrace monitor Command
Displaying Log and Trace Files from the CLI
Monitoring Interfaces and Traffic from the CLI
Using the monitor interface Command
Using the monitor traffic Command
Configuring Packet Capture
Packet Capture Support On Different Device Types
Packet Capture Terms
Packet Capture Overview
Packet Capture on Device Interfaces
Firewall Filters for Packet Capture
Packet Capture Files
Analysis of Packet Capture Files
Before You Begin
Configuring Packet Capture with a Configuration Editor
Enabling Packet Capture (Required)
Configuring Packet Capture on an Interface (Required)
Configuring a Firewall Filter for Packet Capture (Optional)
Disabling Packet Capture
Deleting Packet Capture Files
Changing Encapsulation on Interfaces with Packet Capture Configured
Verifying Packet Capture
Displaying a Packet Capture Configuration
Displaying a Firewall Filter for Packet Capture Configuration
Verifying Captured Packets
Configuring RPM Probes
RPM Probe Support On Different Device Types
RPM Terms
RPM Overview
RPM Probes
RPM Tests
Probe and Test Intervals
Jitter Measurement with Hardware Timestamping
RPM Statistics
RPM Thresholds and Traps
RPM for BGP Monitoring
Before You Begin
Configuring RPM with Quick Configuration
Configuring RPM with a Configuration Editor
Configuring Basic RPM Probes
Configuring TCP and UDP Probes
Tuning RPM Probes
Configuring RPM Probes to Monitor BGP Neighbors
Configuring RPM Probes for BGP Monitoring
Directing RPM Probes to Select BGP Routers
Verifying an RPM Configuration
Verifying RPM Services
Verifying RPM Statistics
Verifying RPM Probe Servers
Index
Index