Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All

    hash-policy

    Syntax

    hash-policy hash-policy-option {(layer-2 | layer-2-or-3 | layer-3-or-4):}

    Hierarchy Level

    [edit services app-engine compute-cluster compute-cluster-name compute-node compute-node-name interfaces aggregate aggregated-interface-name]

    Release Information

    Statement introduced in Junos OS Release 13.3.

    Description

    Configure hash policy. Though we do not have direct control over the data packet distribution over the slave interfaces, the standard offers us three different kinds of hashing schemes (listed below) to have good balance of traffic over these slave interfaces.

    Default

    The default hash-policy is layer-3-and-4.

    Options

    hash-policy hash-policy-option

    Three different hashing schemes are offered:

    • layer-2—Uses the MAC address of both source and destination for hashing.
    • layer-2-and-3—Uses the MAC and IP addresses of both source and destination for hashing.
    • layer-3-and-4—Uses port number and IP address of both source and destination for hashing.

    Required Privilege Level

    system—To view this statement in the configuration.

    system-control—To add this statement to the configuration.

    Published: 2014-04-04