Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Junos CLI Reference
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

disable-routing-engine (DDoS)

date_range 19-Nov-23

Syntax

content_copy zoom_out_map
disable-routing-engine;

Hierarchy Level

content_copy zoom_out_map
[edit system ddos-protection global],
[edit system ddos-protection protocols protocol-group (aggregate | packet-type)],
[edit system ddos-protection protocols protocol-group aggregate]

Description

(ACX Series routers, MX Series routers with only MPCs, T4000 Core Routers with only FPC5s, or EX9200 switches) Disable DDoS Routing Engine policers for debugging purposes for a particular packet type as follows:

  • Within a protocol group—Use this option in the protocols statement hierarchy.

  • Globally for all packet types in all protocol groups—Use this option in the global statement hierarchy.

This statement does not affect the state of the line card policers.

Note:

ACX Series routers only support aggregate policers and don’t support policing at the line card level. Changes to default settings at the Routing Engine level propagate down to the Packet Forwarding Engine (PFE) chipset level. As a result, disabling Routing Engine policers globally on ACX Series routers effectively disables control plane DDoS protection on the device.

Required Privilege Level

admin—To view this statement in the configuration.

admin-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 11.2.

footer-navigation