JUNOSe 10.0.x System Basics Configuration Guide
Home
Techpubs Home
Report an Error
Collapse TOC
List of Figures
List of Tables
Index
Entire manual as PDF
-
About the Documentation
-
-
E-series and JUNOSe Documentation and Release Notes
-
Audience
-
E-series and JUNOSe Text and Syntax Conventions
-
-
Related E-series and JUNOSe Documentation
-
Obtaining Documentation
-
Documentation Feedback
-
Requesting Technical Support
-
Planning Your Network
-
-
Platform Considerations
-
-
Interface Specifiers
-
Edge Applications Overview
-
-
Private Line Aggregation
-
xDSL Session Termination
-
Layered Approach
-
Line Modules, I/O Modules, and IOAs
-
Interfaces
-
-
Subinterfaces
-
interface Command
-
General Configuration Tasks
-
Configuring Virtual Routers
-
Configuring IPSec
-
Configuring Physical Layer Interfaces
-
-
Line Module Features
-
Configurable HDLC Parameters
-
Configuring Channelized T3 Interfaces
-
Configuring T3 and E3 Interfaces
-
Configuring OCx/STMx and OC48 Interfaces
-
Configuring Channelized OCx/STMx Line Interfaces
-
Configuring Ethernet Interfaces
-
Configuring IPSec-Service Interfaces
-
Configuring Tunnel Service Interfaces
-
Configuring Data Link-Layer Interfaces
-
-
Configuring IP/Frame Relay
-
Configuring IP/ATM
-
Configuring IP/PPP
-
Configuring IP/HDLC
-
Configuring IP/Ethernet
-
Configuring IP Tunnels, Shared IP Interfaces, and Subscriber
Interfaces
-
-
Configuring IP Tunnels
-
Configuring Shared Interfaces and Subscriber Interfaces
-
Configuring Routing Protocols
-
Configuring VRRP
-
Configuring Routing Policy
-
Configuring QoS
-
Configuring Policy Management
-
Configuring Remote Access
-
Command-Line Interface
-
-
Overview
-
-
Command Modes
-
Command-Line Prompts
-
Keywords and Parameters
-
-
Keywords
-
Parameters
-
Keywords and Parameters
Together
-
Using CLI Commands
-
-
Abbreviated Commands
-
The ? Key
-
Backspace or Delete
-
Enter
-
Tab
-
Arrow Keys
-
The no Version
-
run and do Commands
-
show Commands
-
Redirection of show Command Output
-
Regular Expressions
-
-
Metacharacters
-
Using Metacharacters as
Literal Tokens
-
The - -More- - Prompt
-
Responding
to Prompts
-
CLI Status Indicators
-
Levels of Access
-
-
User Level
-
Privileged Level
-
Initialization Sequence
-
Platform Considerations
-
Accessing the CLI
-
-
Logging In
-
Privileged-Level Access
-
-
Defining CLI Levels of Privilege
-
Accessing the Privileged
Exec Level
-
Moving from Privileged Exec to User Exec Mode
-
Logging Out
-
CLI Command Privileges
-
-
CLI Privilege Groups
-
Examples Using Privilege Group Membership
-
CLI Command Exceptions
-
CLI Keyword Mapping
-
Setting Privileges for Ambiguous Commands
-
Setting Privilege Levels for no or default Versions
-
Setting Privilege Levels for Multiple Commands
-
-
Setting Privilege Levels for All
Commands in a Mode
-
Setting Privilege Levels
for a Group of Commands
-
Using the
Order of Precedence
-
Superseding Privilege
Levels with the all Keyword
-
Removing the
all Keyword
-
Setting Default Line Privilege
-
Viewing CLI Privilege Information
-
-
Viewing the Current User Privilege
Level
-
Viewing
Privilege Levels for All Connected Users
-
Viewing Privilege Levels
for Changed CLI Commands
-
Using Help
-
-
? (Question Mark Key)
-
help Command
-
Partial-keyword <Tab>
-
Using Command-Line Editing
-
-
Basic Editing
-
Command-Line Editing Keys
-
Command History Keys
-
Pagination Keys
-
Accessing Command Modes
-
-
Exec Modes
-
-
Password Protection
-
Global Configuration Mode
-
-
Executing a Script
File
-
AAA Profile Configuration Mode
-
Address Family Configuration Mode
-
ATM VC Configuration Mode
-
ATM VC Class Configuration Mode
-
Classifier Group Configuration Mode
-
Color Mark Profile Configuration Mode
-
Control Plane Configuration Mode
-
Controller Configuration Mode
-
DHCP Local Pool Configuration Mode
-
Domain Map Configuration Mode
-
Domain Map Tunnel Configuration Mode
-
DoS Protection Group Configuration Mode
-
Drop Profile Configuration Mode
-
Explicit Path Configuration Mode
-
Flow Cache Configuration Mode
-
Interface Configuration Mode
-
IP NAT Pool Configuration Mode
-
IP PIM Data MDT Configuration Mode
-
IP Service Profile Configuration Mode
-
IPSec CA Identity Configuration Mode
-
IPSec Identity Configuration Mode
-
IPSec IKE Policy Configuration Mode
-
IPSec Manual Key Configuration Mode
-
IPSec Peer Public Key Configuration Mode
-
IPSec Transport Profile Configuration Mode
-
IPSec Tunnel Profile Configuration Mode
-
IP Tunnel Destination Profile Mode
-
L2 Transport Load-Balancing-Circuit Configuration Mode
-
L2TP Destination Profile Configuration Mode
-
L2TP Destination Profile Host Configuration Mode
-
L2TP Tunnel Switch Profile Configuration Mode
-
Layer 2 Control Configuration Mode
-
Layer 2 Control Neighbor Configuration Mode
-
LDP Configuration Mode
-
Line Configuration Mode
-
Local IPSec Transport Profile Configuration
-
Local User Configuration Mode
-
Map Class Configuration Mode
-
Map List Configuration Mode
-
Parent Group Configuration Mode
-
Policy List Configuration Mode
-
Policy List Parent Group Configuration Mode
-
Policy Parameter Configuration Mode
-
PPPoE Service Name Table Configuration Mode
-
Profile Configuration Mode
-
QoS Interface Set Configuration Mode
-
QoS Interface Superset Configuration Mode
-
QoS Parameter Definition Configuration Mode
-
QoS Profile Configuration Mode
-
QoS Shared Shaper Control Configuration
-
Queue Profile Configuration Mode
-
RADIUS Configuration Mode
-
RADIUS Relay Configuration Mode
-
Rate Limit Profile Configuration Mode
-
Redundancy Configuration Mode
-
Remote Neighbor Configuration Mode
-
Route Map Configuration Mode
-
Router Configuration Mode
-
RSVP Configuration Mode
-
RTR Configuration Mode
-
Scheduler Profile Configuration Mode
-
Service Session Profile Configuration Mode
-
SNMP Event Manager Configuration Mode
-
Statistics Profile Configuration Mode
-
Subinterface Configuration Mode
-
Subscriber Policy Configuration Mode
-
Traffic Class Configuration Mode
-
Traffic Class Group Configuration Mode
-
Tunnel Group Configuration Mode
-
Tunnel Group Tunnel Configuration Mode
-
Tunnel Profile Configuration Mode
-
Tunnel Server Configuration Mode
-
VRF Configuration Mode
-
VR Group Configuration Mode
-
Installing JUNOSe Software
-
-
Overview
-
-
Identifying the Software Release File
-
Platform Considerations
-
Installing Software When a Firewall Exists
-
-
Task 1: Obtain the Required Information
-
Task 2: Divert Network Traffic to Another Router
-
Task 3: Access Privileged Exec Mode
-
Task 4: Configure IP on an Interface
-
Task 5: Copy the Release Files to the Network Host
-
Task 6: Configure Access to the Network Host
-
Task 7: Enable the FTP Server on the Router
-
Task 8: Identify the Files to Transfer
-
Task 9: Transfer Files to the User Space
-
Task 10: Install Files on the System Space
-
Task 11: Save the Current Configuration
-
Task 12: Reboot the System
-
Installing Software When a Firewall Does Not Exist
-
-
Installing Software in Normal Operational Mode
-
-
Task 1: Obtain the Required Information
-
Task 2: Divert Network
Traffic to Another Router
-
Task 3: Access Privileged
Exec Mode
-
Task 4: Configure
IP on an Interface
-
Task 5: Configure
Access to the Network Host
-
Task 6: Copy the
Release Files to the Network Host
-
Task 7: Copy the Software
Release File to the Router
-
Task 8: Save the Current
Configuration
-
Task 9: Reboot
the System
-
Installing Software in Boot Mode
-
-
Task 1: Obtain the Required Information
-
Task 2: Divert Network
Traffic to Another System
-
Task 3: Access the Boot
Mode
-
Task 4: Assign an
IP Address
-
Task 5: Configure
Access to the Network Host
-
Task 6: Resetting
the SRP Module
-
Task 7: Copy the Release
Files to the Network Host
-
Task 8: Copy the Software
Release File to the Router
-
Task 9: Reboot the System
-
Copying Release Files from One Router to Another
-
Upgrading Systems That Are Operating with Two SRP Modules
-
Upgrading from Release 5.1.1 or Lower-Numbered Releases
-
-
Upgrading Software Remotely Through Telnet or FTP
-
Upgrading Software from an NVS Card
-
-
Upgrading a System That Contains
One SRP Module
-
Upgrading a System That
Contains Two SRP Modules
-
Downgrading JUNOSe Software
-
Configuring SNMP
-
-
Overview
-
-
Terminology
-
SNMP Features Supported
-
SNMP Client
-
SNMP Server
-
SNMP MIBs
-
-
Standard SNMP MIBs
-
Juniper Networks E-series
Enterprise MIBs
-
Accessing Supported SNMP
MIBs
-
SNMP Versions
-
Security Features
-
Management Features
-
Virtual Routers
-
-
Creating SNMP Proxy
-
Disabling and Reenabling
SNMP Proxy
-
Communicating with the SNMP Engine
-
SNMP Attributes
-
SNMP Operations
-
SNMP PDU Types
-
Platform Considerations
-
References
-
Before You Configure SNMP
-
SNMP Configuration Tasks
-
-
Enabling SNMP
-
Configuring SNMP v1/v2c Community
-
-
Community Name
-
Privilege Levels
-
IP Access List
-
Configuring SNMPv3 Users
-
Configuring SNMP Dynamic Groups and Views
-
Setting Server Parameters
-
Configuring SNMP Packet Size
-
Configuring Memory Warning
-
Configuring Encoding Method
-
Managing Interface Sublayers
-
-
Compressing Interfaces
-
Controlling
Interface Numbering
-
Monitoring
Interface Tables
-
Configuring Traps
-
-
IP Hosts
-
Trap Categories
-
Trap Severity Levels
-
Specifying an Egress Point for SNMP Traps
-
Configuring Trap Queues
-
Configuring Trap Notification Logs
-
Recovering Lost Traps
-
Configuring the SNMP Server Event Manager
-
-
Event MIB Purpose
-
Event MIB Structure
-
-
Trigger Table
-
Objects Table
-
Event Table
-
Configuration Tasks
-
-
Defining a Boolean Test
-
Defining an Existence
Test
-
Defining a Threshold
Test
-
Monitoring Events
-
Collecting Bulk Statistics
-
-
Interface Strings
-
Understanding Counter Discontinuity
-
Configuring Collectors and Receivers
-
Deleting All Bulkstats Configurations
-
Monitoring Collection Statistics
-
Configuring Schemas
-
-
igmp Objects
-
if-stats Objects
-
policy Objects
-
Mapping Bulkstats Output to MIB Flies and CLI Configurations
-
Monitoring Schema Statistics
-
Configuring Interface Numbering Mode
-
Using the Bulk Statistics Formatter
-
-
Setting Remote Filenames
-
-
Guidelines
-
Specifying End of Line Format
-
Managing Virtual Routers
-
Monitoring SNMP
-
-
Establishing a Baseline
-
Viewing SNMP Status
-
Output Filtering
-
Managing the System
-
-
Overview
-
Platform Considerations
-
Naming the System
-
Configuring the Switch Fabric Bandwidth
-
Configuring Timing
-
-
Monitoring Timing
-
Using the CLI
-
Managing vty Lines
-
-
Configuring vty Lines
-
Monitoring vty Lines
-
Clearing Lines
-
Monitoring the Current Configuration
-
-
Defining the Configuration Output Format
-
Customizing the Configuration Output
-
Detecting Corrupt File Configurations
-
Configuring the System Automatically
-
Saving the Current Configuration
-
Using the Desktop Tool for Viewing Uncompressed Text Configuration
-
-
Installation Prerequisites for the Desktop Tool
-
-
Requirements for Microsoft Windows Systems
-
Requirements for Sun Solaris Systems
-
Requirements for Linux Systems
-
Usage Notes for the Perl Script
-
Customizing the User Interface
-
-
Setting the Console Speed
-
Configuring the Display Terminal
-
Specifying the Character Set
-
Configuring Login Conditions
-
Setting Time Limits for User Login
-
Setting Time Limits for User Input
-
Configuring CLI Messages
-
Monitoring the Console Settings
-
Sending Messages
-
Managing Memory
-
Managing Files
-
-
Managing the User Space from a Network Host
-
File Commands and FTP Servers
-
Renaming Files
-
Deleting Files
-
Monitoring Files
-
Viewing Files
-
Transferring Files
-
-
References
-
Copying and Redirecting Files
-
Using the copy Command
-
copy Command Examples
-
Using TFTP to Transfer Files
-
Configuring the FTP Server
-
-
Features
-
FTP Passive Mode
-
Configuring Authentication
-
Configuration Tasks
-
Configuration
Example
-
Monitoring the FTP Server
-
Copying Partial Releases
-
Configuring the NFS Client
-
-
References
-
Prerequisites
-
Configuration Tasks
-
Monitoring the NFS Client
-
Using a Loopback Interface
-
Using the Telnet Client
-
Configuring DNS
-
-
References
-
Assigning Name Servers
-
Using One Name Resolver for Multiple Virtual Routers
-
Monitoring DNS
-
Troubleshooting the System
-
-
Creating Core Dump Files
-
-
Boot Mode
-
Global Configuration
Mode
-
Managing Core Dump Files
-
-
Enabling and Disabling the Core Dump
Monitor
-
Specifying
the Core Dump Monitor Interval
-
Viewing
Core Dump Monitor Status
-
Accessing the Core Dump File
-
Capturing and Writing Core Dumps
-
Understanding the Core Dump File
-
Tracking IP Prefix Reachability
-
Gathering Information for Customer Support
-
Managing and Monitoring Resources
-
-
Enabling and Disabling the Resource Threshold Monitor
-
Viewing Resource Threshold Information
-
Monitoring the System
-
Managing Modules
-
-
Overview
-
Platform Considerations
-
-
ERX-7xx Models, ERX-14xx Models, and the ERX-310 Router
-
-
Line Modules and I/O Modules
-
SRP Modules
-
E120 Router and E320 Router
-
-
Line Modules and IOAs
-
SRP Modules and SFMs
-
Disabling and Reenabling Line Modules, SRP Modules, and SFMs
-
Disabling and Reenabling IOAs
-
Removing an SRP Module
-
Replacing Line Modules on ERX Routers, the E120 Router, and
the E320 Router
-
-
Replacing a Line Module by Erasing the Slot Configuration
-
Replacing a Line Module Without Erasing the Slot Configuration
-
Replacing IOAs on the E120 Router and the E320 Router
-
-
Replacing SRP Modules and SFMs
-
Software Compatibility
-
-
Line Modules
-
I/O Modules and IOAs
-
Configuring Performance Rate of Line Modules on ERX-7xx Models
and the ERX-1410 Router
-
-
Choosing a Combination of Line Modules
-
-
Slot Groups
-
SRP Modules Bandwidth
-
Line Modules Bandwidth
and Switch Usage
-
Allowed Combinations for
Line Rate Performance
-
Specifying the Type of Performance
-
Monitoring Bandwidth Oversubscription
-
Troubleshooting Bandwidth Oversubscription
-
-
Line Module Redundancy
-
-
Module Requirements
-
-
ERX-7xx Models and ERX-14xx Models
-
E120 Router and E320 Router
-
-
IOA Behavior When the Router Reboots
-
Line Module Behavior When
Disabling or Enabling IOAs
-
Automatic Switchover
-
-
Limitations of Automatic Switchover
-
Reversion after Switchover
-
Configuring Line Module Redundancy
-
Managing Line Module Redundancy
-
SRP Module Redundancy
-
SRP Module Behavior
-
Specifying the Configuration for Redundant SRP Modules
-
Installing a Redundant SRP Module
-
Managing SRP Module Redundancy
-
Switching to the Redundant SRP Module
-
Upgrading Software on a Redundant SRP Module
-
Monitoring the Status LEDs
-
Monitoring Line Module and SRP Module Redundancy
-
Managing Flash Cards on SRP Modules
-
-
Flash Features
-
Flash Features on the E120 Router and the E320 Router
-
Installing and Removing Flash Cards
-
Synchronizing Flash Cards
-
-
Synchronizing
Flash Cards of Different Capacities
-
Disabling Autosynchronization
-
Validating and Recovering Redundant SRP File Integrity
-
Reformatting the Primary Flash Card
-
Copying the Image on the Primary SRP Module
-
Scanning Flash Cards
-
Monitoring Flash Cards
-
Updating the Router with JUNOSe Hotfix Files
-
-
Hotfix Compatibility and Dependency
-
Removing Hotfixes
-
Hotfixes and Backup Settings
-
Hotfixes and Standby SRP Modules
-
Hotfixes and Line Modules
-
Monitoring Hotfixes
-
-
Example: Using
and Monitoring Hotfixes
-
Managing the Ethernet Port on the SRP Module
-
-
Monitoring Statistics
-
Monitoring the Ethernet Configuration for the SRP Module
-
Enabling Warm Restart Diagnostics on Modules
-
-
Enabling Warm Restart Diagnostics
-
Enabling Diagnostics
-
Ignoring Diagnostic Test Failures
-
Monitoring Modules
-
Managing High Availability
-
-
Understanding High Availability
-
Platform Considerations
-
-
Module Requirements
-
Redundancy Modes of Operation
-
-
File System Synchronization Mode
-
High Availability Mode
-
Understanding SRP State Behavior
-
-
Disabled State
-
Initializing State
-
Active State
-
Pending State
-
Application Support
-
Before Activating High Availability
-
Activating High Availability
-
Deactivating High Availability
-
-
Setting the IP Interface Priority
-
Upgrading Software
-
Monitoring High Availability
-
-
High Availability show Commands
-
Clearing the Redundancy History
-
Configuring a Unified In-Service Software Upgrade
-
-
Unified ISSU Overview
-
-
Router Behavior During a Unified In-Service Software Upgrade
-
Unified ISSU Platform Considerations
-
Unified ISSU Terms That Describe SRP and Line Module Behavior
-
Unified ISSU References
-
Unified ISSU Phases Overview
-
-
Unified ISSU Initialization Phase Overview
-
-
Application Data Upgrade on the Standby
SRP Module
-
SNMP Traps
-
Unified ISSU Upgrade Phase Overview
-
-
Exceptions During the Upgrade Phase
-
Verification of Requirements
-
Upgrade Setup
-
-
Line Module Arming
-
Line Module Control Plane
Upgrade
-
SRP Module Switchover
-
Line Module Forwarding
Plane Upgrade
-
Unified ISSU Service Restoration Phase Overview
-
Application Support for Unified ISSU
-
Unexpected Application-Specific Behavior During Unified ISSU
-
-
AAA Authentication and Authorization Disabled
-
ATM Affected Behaviors
-
-
ILMI Sessions Not Maintained
-
OAM CC Effects on VCC
-
OAM VC Integrity Verification
Cessation
-
Port Data Rate Monitoring
Cessation
-
VC and VP Statistics Monitoring
Halts Unified ISSU Progress
-
DHCP Affected Behaviors
-
-
DHCP Common Component Information
Suspended
-
DHCP External Server Prevents
Unified ISSU Operation
-
DHCP Relay and DHCP Relay
Proxy Prevent Unified ISSU
-
DHCP Packet Capture Halted
on Line Modules
-
DoS Protection State Freeze
-
Ethernet Affected Behaviors
-
-
ARP Packets Briefly Not Sent or Received
-
Link Aggregation interruption
-
Port Data Rate Monitoring
Halted
-
VLAN Statistics Monitoring
Halts Unified ISSU Progress
-
FTP Server File Transfer Behaviors
-
IS-IS Effects on Graceful Restart and Network Stability
-
-
Configuring Graceful Restart
Before Unified ISSU Begins
-
Configuring Graceful Restart
When BGP And LDP Are Configured
-
Routing Around the Restarting
Router to Minimize Network Instability
-
L2TP Failover of Established Tunnels
-
OSPF Effects on Graceful Restart, Timeouts, and Network Stability
-
-
Configuring Graceful Restart
Before Unified ISSU Begins
-
Configuring Graceful Restart
When BGP And LDP Are Configured
-
Configuring a Longer Dead
Interval Than Normal
-
Routing Around the Restarting
Router to Minimize Network Instability
-
PIM Suspended During Unified ISSU
-
Subscriber Logins and Logouts Suspended During Unified ISSU
-
-
Subscriber Statistics Accumulation
or Deletion
-
SONET/SDH Behavior During Unified ISSU
-
T3
-
TACACS+ Services Not Available
-
Interruption in Traffic Forwarding for Layer 3 Routing and
Signaling Protocols
-
Recommended Routing Protocol Timer Settings
-
Before You Begin a Unified In-Service Software Upgrade
-
-
Hardware Requirements for Unified ISSU
-
Software Requirements for Unified ISSU
-
Upgrading Router Software with Unified ISSU
-
Halting the Unified ISSU Process and Restoring the Original
State of the Router
-
-
Halting Unified ISSU During Initialization Phase
-
Halting Unified ISSU During Upgrade Phase
-
Monitoring a Unified In-Service Software Upgrade
-
Passwords and Security
-
-
Overview
-
Platform Considerations
-
Setting Basic Password Parameters
-
-
Creating Encrypted Passwords
-
Creating Secrets
-
Encrypting Passwords in Configuration File
-
Commands and Guidelines
-
Setting and Erasing Passwords
-
-
Privilege Levels
-
-
Accessing Privilege Levels
-
Setting Enable Passwords
-
Erasing Enable Passwords
-
Setting a Console Password
-
Erasing the Console Password
-
Monitoring Passwords
-
Vty Line Authentication and Authorization
-
-
Configuring Simple Authentication
-
Configuring AAA Authentication and AAA Authorization
-
Virtual Terminal Access Lists
-
Secure System Administration with SSH
-
-
Transport
-
User Authentication
-
Connection
-
Key Management
-
-
User Key Management
-
Host Key
Management
-
Performance
-
Security Concerns
-
Before You Configure SSH
-
SSH Configuration Tasks
-
-
Configuring Encryption
-
Configuring
User Authentication
-
Configuring
Message Authentication
-
Enabling
and Disabling SSH
-
Displaying
SSH Status
-
Terminating
an SSH Session
-
Restricting User Access
-
-
Restricting Access to Commands with RADIUS
-
Per-User Enable Authentication
-
Restricting Access to Virtual Routers
-
-
VSA Configuration Examples
-
Commands
Available to Users
-
Denial of Service (DoS) Protection
-
-
Suspicious Control Flow Detection
-
Suspicious Control Flow Monitoring
-
Configurable Options
-
Display Options
-
Traps and Logs
-
Suspicious Control Flow Commands
-
Monitoring Suspicious Control Flow
-
Denial-of-Service Protection Groups
-
Group Parameters
-
Attaching Groups
-
Protocol Mapping
-
DoS Protection Group Configuration Example
-
DoS Protection Group Commands
-
Monitoring DoS Protection Groups
-
Writing CLI Macros
-
-
Platform Considerations
-
Writing Macros
-
-
Environment Commands
-
Capturing Output of Commands
-
Adding Regular Expression Matching to Macros
-
Extracting a Substring Based on Regular Expression Matching
-
Adding Global Variables for Availability to the onError Macro
-
Unique IDs for Macros
-
Accurate Use of Error Status When Accessed Ourside of onError
Macro
-
Variables
-
Literals
-
Operators
-
-
Assignment
-
Increment
and Decrement
-
String Operations
-
Extraction
Operations
-
Arithmetic Operations
-
-
Relational Operations
-
Logical Operations
-
Miscellaneous
Operations
-
Conditional Execution
-
-
If Constructs
-
While Constructs
-
Passing Parameters in Macros
-
Generating Macro Output
-
Invoking Other Macros
-
Detecting and Recording Macro Errors
-
-
Detectable Macro Errors
-
Logging Macro Results
-
Viewing Macro Errors
-
onError Macro Examples
-
-
Detecting Invalid Command Formats
-
Detecting Invalid Commands
-
Detecting Missing Macros
-
Running Macros
-
Scheduling Macros
-
Practical Examples
-
-
Configuring Frame Relay
-
Configuring ATM Interfaces
-
Booting the System
-
-
Platform Considerations
-
Configuring Your System for Booting
-
-
Booting the GE-2 Line Module
-
Rebooting Your System
-
-
Rebooting When a Command Takes a Prolonged Time to Execute
-
Configuration Caching
-
Operations in Boot Mode
-
Displaying Boot Information
-
-
Output Filtering
-
Configuring the System Clock
-
-
Overview
-
-
NTP
-
System Operation as an NTP Client
-
-
Synchronization
-
-
Preliminary Synchronization
-
Frequency Calibration
-
Progressive Synchronization
-
System Operation as an NTP Server
-
Platform Considerations
-
References
-
Setting the System Clock Manually
-
Before You Configure NTP
-
-
Choosing NTP Servers
-
NTP Configuration Tasks
-
-
Enabling NTP Services
-
NTP Client Configuration
-
-
Directing Responses
from NTP Servers
-
Refusing Broadcasts from NTP Servers
-
NTP Server Configuration
-
Configuration Examples
-
Monitoring NTP
-
Configuring Virtual Routers
-
-
Overview
-
-
Default Virtual Router
-
Virtual Router Instances
-
Routing Protocols
-
VPNs and VRFs
-
-
VPNs
-
VRFs
-
Platform Considerations
-
References
-
Configuring Virtual Routers
-
Monitoring Virtual Routers
-
Abbreviations and Acronyms
-
References
-
-
RFCs
-
Draft RFCs
-
Other Software Standards
-
Hardware Standards
-
Index
-
-
Index