Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Guide That Contains This Content
[+] Expand All
[-] Collapse All



    hash-policy hash-policy-option {(layer-2 | layer-2-or-3 | layer-3-or-4):}

    Hierarchy Level

    [edit services app-engine compute-cluster compute-cluster-name compute-node compute-node-name interfaces aggregate aggregated-interface-name]

    Release Information

    Statement introduced in Junos OS Release 13.3.


    Configure hash policy. Though we do not have direct control over the data packet distribution over the slave interfaces, the standard offers us three different kinds of hashing schemes (listed below) to have good balance of traffic over these slave interfaces.


    The default hash-policy is layer-3-and-4.


    hash-policy hash-policy-option

    Three different hashing schemes are offered:

    • layer-2—Uses the MAC address of both source and destination for hashing.
    • layer-2-and-3—Uses the MAC and IP addresses of both source and destination for hashing.
    • layer-3-and-4—Uses port number and IP address of both source and destination for hashing.

    Required Privilege Level

    system—To view this statement in the configuration.

    system-control—To add this statement to the configuration.

    Published: 2014-04-04