JUNOS 9.4 System Basics Configuration Guide
DVD Home
Techpubs Home
Report an Error
Collapse TOC
List of Figures
List of Tables
Index
Index of Statements and Commands
Entire manual as PDF
-
About This Guide
-
-
Objectives
-
Audience
-
Supported Platforms
-
Using the Indexes
-
Using the Examples in This Manual
-
Documentation Conventions
-
-
List of Technical Publications
-
Documentation Feedback
-
Requesting
Technical Support
-
Introduction to JUNOS Software
-
-
Product Architecture
-
-
Hardware Overview
-
Routing Process Architecture
-
-
Packet Forwarding Engine
-
Routing
Engine
-
Configuration Architecture
-
JUNOS Software Components
-
Routing Engine Software
-
-
Routing Engine Kernel
-
Initialization Process
-
Management Process
-
Process Limits
-
Routing Protocol Process
-
-
IPv4 Routing
Protocols
-
IPv6 Routing Protocols
-
Routing and Forwarding Tables
-
Routing
Policy
-
VPNs
-
Interface Process
-
Chassis Process
-
SNMP and MIB II Processes
-
JUNOS Configuration Basics
-
-
Configuring the Software from External Devices
-
Methods for Configuring the JUNOS Software
-
-
JUNOS Command-Line Interface (CLI)
-
ASCII File
-
J-Web Package
-
JUNOScript API Software
-
NETCONF API Software
-
Configuration Commit Scripts
-
Configuring a Router for the First Time
-
-
Configuring the JUNOS Software the First Time on a Router with
a Single Routing Engine
-
Configuring the JUNOS Software the First Time on a Router with
Dual Routing Engines
-
JUNOS Software Default Settings That Protect the Router
-
Configuring Software Properties
-
Activating a Configuration
-
Managing Available Disk Space
-
Using Software Monitoring Tools
-
Router Security
-
-
Router Access
-
User Authentication
-
Specifying Plain-Text Passwords
-
Routing Protocol Security Features
-
Firewall Filters
-
Auditing for Security
-
System Management Overview
-
-
Specifying IP Addresses, Network Masks, and Prefixes
-
Specifying Filenames and URLs
-
Directories on the Router
-
Tracing and Logging Operations
-
Configuring Protocol Authentication
-
Configuring User Authentication
-
System Management Configuration Statements
-
Configuring Basic System Management
-
-
Configuring the Router’s Name and Addresses
-
-
Configuring the Router’s Name
-
Mapping the Router’s Name to IP Addresses
-
Configuring an ISO System Identifier
-
Example: Configuring a Router’s Name, IP Address, and
System ID
-
Configuring the Router’s Domain Name
-
-
Example: Configuring the Router’s Domain Name
-
Configuring Which Domains to Search
-
-
Example: Configuring Which Domains to Search
-
Configuring a DNS Name Server
-
-
Example: Configuring a DNS Name Server
-
Configuring a Backup Router
-
-
Example: Configuring a Backup Router Running IPv4
-
Example: Configuring a Backup Router Running IPv6
-
Configuring Flash Disk Mirroring
-
Configuring the System Location
-
Configuring the Root Password
-
-
Example: Configuring the Root Password
-
Example: Configuring SSH Authentication for Root Logins
-
Configuring Special Requirements for Plain-Text Passwords
-
-
Example: Configuring Special Requirements for Plain-Text Passwords
-
Configuring Multiple Routing Engines to Synchronize Configurations
Automatically
-
Compressing the Current Configuration File
-
Configuring User Access
-
-
Defining Login Classes
-
-
Configuring Access Privilege Levels
-
-
Example: Configuring
Access Privilege Levels
-
Denying or Allowing Individual Commands
-
-
Specifying
Operational Mode Commands
-
-
Example 1: Defining Access
Privileges to Individual Operational Mode Commands
-
Example 2: Configuring
Access Privileges to Individual Operational Mode Commands
-
Specifying Configuration Mode Commands
-
-
Example 3: Defining Access Privileges
to Individual Configuration Mode Commands
-
Example 4: Configuring
Access Privileges to Individual Configuration Mode Commands
-
Configuring the Timeout Value for Idle Login Sessions
-
Configuring Tips
-
Configuring User Accounts
-
-
Example: Configuring User Accounts
-
Limiting the Number of Login Attempts for SSH and Telnet Sessions
-
-
Example: Limiting the Number of Login Attempts for SSH and
Telnet Sessions
-
JUNOS-FIPS Crypto Officer and User Accounts
-
-
Crypto Officer User Configuration
-
FIPS User Configuration
-
Configuring System Authentication
-
-
Configuring RADIUS Authentication
-
-
Configuring
Juniper Networks Vendor-Specific RADIUS Attributes
-
Configuring MS-CHAPv2 for Password-Change Support
-
Example: Configuring MS-CHAPv2 on the Router
-
Configuring TACACS+ Authentication
-
-
Configuring
Juniper Networks Vendor-Specific TACACS+ Attributes
-
Specifying a Source Address for RADIUS and TACACS+ Servers
-
Configuring the Same Authentication Service for Multiple TACACS+
Servers
-
-
Example: Configuring Multiple TACACS+ Servers
-
Configuring Template Accounts for RADIUS and TACACS+ Authentication
-
-
Using Remote Template Accounts
-
Using Local User Template Accounts
-
-
Example: Using the Local
User Template
-
Using Regular Expressions to Allow
or Deny Access to Commands
-
Configuring the Authentication Order
-
-
Using RADIUS or TACACS+ Authentication
-
Using Local Password Authentication
-
Order of Authentication Attempts
-
Example: Removing an Order Set from the Authentication Order
-
Example: Inserting an Order Set in the Authentication Order
-
Examples: Configuring System Authentication
-
Recovering the Root Password
-
Configuring Time
-
-
Setting the Time Zone
-
-
Examples: Setting the Time Zone
-
Configuring the Network Time Protocol
-
-
Configuring the NTP Boot Server
-
Specifying a Source Address for an NTP Server
-
Configuring the NTP Time Server and Time Services
-
-
Configuring
the Router to Operate in Client Mode
-
-
Example: Configuring Client Mode
-
Configuring the Router to Operate in Symmetric
Active Mode
-
Configuring the Router to Operate in Broadcast Mode
-
Configuring
the Router to Operate in Server Mode
-
-
Example: Configuring Server Mode
-
Configuring NTP Authentication Keys
-
Configuring the Router to Listen for Broadcast Messages
-
Configuring the Router to Listen for Multicast Messages
-
Setting a Custom Time Zone
-
-
Usage Guidelines for Setting a Custom Time Zone
-
-
How to Import and Install Time Zone Files
-
Configuring System Log Messages
-
-
System Logging Configuration Statements
-
Minimum and Default System Logging Configuration
-
-
Minimum System Logging Configuration
-
Default System Log Settings
-
Configuring System Logging for a Single-Chassis System
-
-
Specifying the Facility and Severity of Messages to Include
in the Log
-
Directing Messages to a Log File
-
-
Logging Messages
in Structured-Data Format
-
Directing Messages to a User Terminal
-
Directing Messages to the Console
-
Directing Messages to a Remote Machine or the Other Routing
Engine
-
-
Specifying
an Alternative Source Address for System Log Messages
-
Changing
the Alternative Facility Name for Remote Messages
-
-
Examples: Assigning an Alternative
Facility
-
Adding a Text String to System Log Messages
-
-
Example: Adding a String
-
Specifying Log File Size, Number, and Archiving Properties
-
Including Priority Information in System Log Messages
-
Including the Year or Millisecond in Timestamps
-
Using Regular Expressions to Refine the Set of Logged Messages
-
-
Example: Using Regular Expressions
-
Disabling Logging of a Facility
-
Examples: Configuring System Logging
-
Configuring System Logging for a Routing Matrix
-
-
Configuring Message Forwarding in the Routing Matrix
-
-
Messages Logged
When Local and Forwarded Severity Levels Are the Same
-
Messages
Logged When Local Severity Level Is Lower
-
Messages
Logged When Local Severity Level Is Higher
-
Configuring Optional Features for Forwarded Messages
-
-
Including Priority Information in Forwarded Messages
-
Adding a Text String to Forwarded
Messages
-
Using Regular Expressions to Refine the
Set of Forwarded Messages
-
Directing Messages to a Remote Destination from the Routing
Matrix
-
Configuring System Logging Differently on Each Platform
-
Configuring Miscellaneous System Management Features
-
-
Configuring Console and Auxiliary Port Properties
-
Disabling the Sending of Redirect Messages on the Router
-
Configuring the Source Address for Locally Generated TCP/IP
Packets
-
Configuring the Router or Interface to Act as a DHCP/BOOTP
Relay Agent
-
Disabling the Response to Multicast Ping Packets
-
Disabling the Reporting of IP Address and Timestamps in Ping
Responses
-
Configuring System Services
-
-
Configuring clear-text or SSL Service for JUNOScript Client
Applications
-
-
Configuring
clear-text Service for JUNOScript Client Applications
-
Configuring
SSL Service for JUNOScript Client Applications
-
Configuring a DHCP Server
-
-
DHCP Overview
-
-
Network Address
Assignments (Allocating a New Address)
-
Network Address Assignments (Reusing a Previously Assigned
Address)
-
Static and Dynamic
Bindings
-
Compatibility with Autoinstallation
-
Conflict Detection and
Resolution
-
DHCP Statement Hierarchy
and Inheritance
-
Configuring Address Pools
-
Configuring
Manual (Static) Bindings
-
Specifying DHCP Lease Times
-
Configuring a Boot File and Boot Server
-
Configuring a DHCP Server Identifier
-
Configuring a Domain Name and Domain Search List
-
Configuring
Routers Available to the Client
-
Creating User-Defined DHCP
-
Example:
Complete DHCP Server Configuration
-
Example:
Viewing DHCP Bindings
-
Example: Viewing DHCP
Address Pools
-
Example: Viewing and
Clearing DHCP Conflicts
-
Tracing
DHCP Processes
-
-
Configuring
the DHCP Processes Log Filename
-
Configuring the Number and Size of DHCP Processes Log Files
-
Configuring
Access to the Log File
-
Configuring a Regular Expression for Line to Be Logged
-
Configuring the Trace Operations
-
Configuring the Extended DHCP Local Server
-
-
Interaction Among the DHCP Client, Extended DHCP Local
Server, and Address-Assignment Pools
-
Using Address Assignment Pools
-
Configuring How the Extended DHCP Local
Server Determines Which Address-Assignment Pool to Use
-
-
Matching Client IP Address to Address-Assignment Pool
-
Matching Option 82 Information to Named
Address Ranges
-
Using Default Options
-
Using External
AAA Authentication Services
-
-
Grouping Interfaces with Common DHCP Configurations
-
Configuring Passwords for Usernames
-
Creating Unique Usernames
-
Example: Configuring a Unique
Username
-
Providing Client Configuration
Information
-
Tracing Extended
DHCP Local Server Operations
-
-
Configuring the Extended DHCP Local Server
Processes Log Filename
-
Configuring the Number and Size
of Extended DHCP Local Server Processes Log Files
-
Configuring Access to the Log File
-
Configuring a Regular Expression
for Line to Be Logged
-
Configuring Trace Option Flags
-
Example: Minimum Extended
DHCP Local Server Configuration
-
Example: Extended DHCP Local Server Configuration
with Optional Pool Matching
-
Verifying and Managing DHCP Local
Server Configuration
-
Configuring DTCP-over-SSH Service for the Flow-Tap Application
-
Configuring Finger Service
-
Configuring FTP Service
-
Configuring SSH Service
-
-
Configuring
the Root Login
-
Configuring
the SSH Protocol Version
-
Configuring Outbound SSH Service
-
-
Understanding the Client
-
Identifying the Device to the Client
-
Sending the Router’s Public SSH Key
-
Using the Standard SSH Sequence
-
Configuring Keepalive Messages
-
Configuring the reconnect-strategy Statement
-
Configuring the services Statement
-
Configuring Outbound SSH Clients
-
Configuring Telnet Service
-
Configuring Console Access to PICs
-
Configuring a System Login Message
-
Configuring a System Login Announcement
-
Configuring JUNOS Software Processes
-
-
Disabling JUNOS Software Processes
-
Configuring Failover to Backup Media if a Software Process
Fails
-
Configuring the Password on the Diagnostics Port
-
Viewing Core Files from JUNOS Processes
-
Saving Core Files from JUNOS Processes
-
Configuring
Logical System Administrators
-
Configuring a Router to Transfer Its Configuration to an Archive
Site
-
-
Configuring the Transfer Interval
-
Configuring Transfer on a Commit Operation
-
Configuring Archive Sites for Configuration Files
-
Specifying the Number of Configurations Stored on the CompactFlash
Card
-
Configuring RADIUS System Accounting
-
-
Specifying Events
-
Configuring RADIUS Accounting
-
Example: Configuring RADIUS Accounting
-
Configuring TACACS+ System Accounting
-
-
Specifying Events
-
Configuring TACACS+ Accounting
-
Configuring TACACS+ Accounting on a TX Matrix Platform
-
Enabling the SRC Software
-
Configuring the ICMP4 Rate Limit
-
Configuring the ICMPv6 Rate Limit
-
Configuring IP-IP Path MTU Discovery
-
Configuring
TCP MSS for Session Negotiation
-
Configuring IPv6 Path MTU Discovery
-
Configuring IPv6 Duplicate Address Detection Transmits
-
Configuring Acceptance of IPv6 Packets with Zero Hop-Limit
-
Configuring GRE Path MTU Discovery
-
Configuring Path MTU Discovery
-
Configuring Source Quench
-
Configuring the Router to Drop Packets with the SYN and FIN
Bits Set
-
Configuring No TCP RFC 1323 Extensions
-
Configuring No TCP RFC 1323 PAWS Extension
-
Configuring the Range of Port Addresses
-
Configuring ARP Learning and Aging
-
-
Configuring Passive ARP Learning for Backup VRRP Routers
-
Adjusting the ARP Aging Timer
-
Configuring System Alarms to Appear Automatically
-
Security Configuration Example
-
-
Configuring System Information
-
-
Configuring RADIUS
-
Creating Login Classes
-
Defining User Login Accounts
-
Defining RADIUS Template Accounts
-
Enabling Connection Services
-
Configuring System Logging
-
Configuring the Time Source
-
Configuring Interfaces
-
Configuring SNMP
-
Configuring Protocol-Independent Routing Properties
-
-
Reserved IRI IP Addresses
-
-
Sample Output
-
Configuring Routing Protocols
-
-
Configuring BGP
-
Configuring IS-IS
-
Configuring Firewalls
-
Example: Consolidated Security Configuration
-
Summary of System Management Configuration Statements
-
-
accounting
-
accounting-port
-
allow-commands
-
allow-configuration
-
allow-transients
-
announcement
-
archival
-
archive
-
-
archive (All System Log Files)
-
archive (Individual System Log File)
-
archive-sites
-
-
archive-sites (Configuration)
-
archive-sites (System Log)
-
arp
-
authentication
-
-
authentication (Login)
-
authentication (Subscriber Access Management)
-
authentication-key
-
authentication-order
-
autoinstallation
-
auxiliary
-
backup-router
-
boot-file
-
boot-server
-
-
boot-server (DHCP)
-
boot-server (NTP)
-
broadcast
-
broadcast-client
-
bucket-size
-
change-type
-
circuit-type
-
class
-
-
class (Assign a Class to an Individual User)
-
class (Define Login Classes)
-
client-identifier
-
commit
-
commit synchronize
-
compress-configuration-files
-
configuration
-
configuration-servers
-
connection-limit
-
console
-
-
console (Physical Port)
-
console (System Logging)
-
default-address-selection
-
default-lease-time
-
delimiter
-
deny-commands
-
deny-configuration
-
destination
-
destination-override
-
dhcp
-
dhcp-local-server
-
diag-port-authentication
-
domain-name
-
-
domain-name (DHCP)
-
domain-name (Subscriber Access Management)
-
domain-name (Router)
-
domain-search
-
dump-device
-
events
-
explicit-priority
-
facility-override
-
file
-
-
file (Commit Scripts)
-
file (System Logging)
-
files
-
finger
-
flow-tap-dtcp
-
format
-
ftp
-
full-name
-
gre-path-mtu-discovery
-
group
-
host
-
host-name
-
http
-
https
-
icmpv4-rate-limit
-
icmpv6-rate-limit
-
idle-timeout
-
inet6-backup-router
-
interface
-
-
interface (ARP Aging Timer)
-
interface (DHCP Local Server)
-
interfaces
-
internet-options
-
ip-address-first
-
ipip-path-mtu-discovery
-
ipv6-duplicate-addr-detection-transmits
-
ipv6-path-mtu-discovery
-
ipv6-path-mtu-discovery-timeout
-
ipv6-reject-zero-hop-limit
-
limits
-
load-key-file
-
local-certificate
-
location
-
log-prefix
-
logical-system-name
-
login
-
login-alarms
-
login-tip
-
mac-address
-
match
-
max-configurations-on-flash
-
maximum-lease-time
-
maximum-length
-
message
-
minimum-changes
-
minimum-length
-
mirror-flash-on-disk
-
multicast-client
-
name-server
-
no-compress-configuration-files
-
no-gre-path-mtu-discovery
-
no-ipip-path-mtu-discovery
-
no-ipv6-reject-zero-hop-limit
-
no-multicast-echo
-
no-path-mtu-discovery
-
no-ping-record-route
-
no-ping-time-stamp
-
no-redirects
-
no-remote-trace
-
no-saved-core-context
-
no-source-quench
-
no-tcp-rfc1323
-
no-tcp-rfc1323-paws
-
no-world-readable
-
ntp
-
option-60
-
option-82
-
-
option-82 (Extended DHCP Local Server)
-
option-82 (Subscriber Access Management)
-
optional
-
outbound-ssh
-
packet-rate
-
password
-
-
password (Login)
-
password (Subscriber Access Management)
-
path-mtu-discovery
-
peer
-
permissions
-
pic-console-authentication
-
pool
-
pool-match-order
-
port
-
-
port (HTTP/HTTPS)
-
port (RADIUS Server)
-
port (SRC Server)
-
port (TACACS+ Server)
-
ports
-
processes
-
protocol-version
-
radius
-
radius-options
-
radius-server
-
rate-limit
-
refresh
-
refresh-from
-
retry
-
retry-options
-
root-authentication
-
root-login
-
router
-
routing-instance-name
-
saved-core-context
-
saved-core-files
-
scripts
-
secret
-
server
-
-
server (NTP)
-
server (RADIUS Accounting)
-
server (TACACS+ Accounting)
-
server-identifier
-
servers
-
service-deployment
-
services
-
session
-
single-connection
-
size
-
source
-
source-address
-
-
source-address (NTP, RADIUS, System Logging, or TACACS+)
-
source-address (SRC Software)
-
source-port
-
source-quench
-
ssh
-
start-time
-
static-binding
-
static-host-mapping
-
structured-data
-
syslog
-
system
-
tacplus
-
tacplus-options
-
tacplus-server
-
tcp-drop-synfin-set
-
tcp-mss
-
telnet
-
time-format
-
timeout
-
time-zone
-
traceoptions
-
-
traceoptions (Address-Assignment Pool)
-
traceoptions (Commit Scripts)
-
traceoptions (DHCP Server on J-series Services Routers)
-
traceoptions (Extended DHCP Local Server)
-
tracing
-
transfer-interval
-
-
transfer-interval (Configuration)
-
transfer-interval (System Log)
-
transfer-on-commit
-
trusted-key
-
uid
-
user
-
-
user (Access)
-
user (System Logging)
-
username-include
-
user-prefix
-
web-management
-
wins-server
-
world-readable
-
xnm-clear-text
-
xnm-ssl
-
Configuring Access
-
-
Configuring the Point-to-Point Protocol
-
-
Example: PPP Challenge Handshake Authentication Protocol
-
Example: CHAP Authentication with RADIUS
-
Configuring the Authentication Order
-
Tracing Access Processes
-
-
Configuring the Access Processes Log Filename
-
Configuring the Number and Size of Access Processes Log Files
-
Configuring Access to the Log File
-
Configuring a Regular Expression for Lines to Be Logged
-
Configuring the Trace Operations
-
Configuring the Layer 2 Tunneling Protocol
-
-
Minimum L2TP Configuration
-
Configuring the Address Pool
-
Configuring the Group Profile
-
-
Configuring
L2TP for a Group Profile
-
Configuring
the PPP Attributes for a Group Profile
-
Example:
Group Profile Configuration
-
Configuring the Profile
-
-
Configuring
the Authentication Order
-
Configuring
the Accounting Order
-
Configuring
the Client
-
-
Example: Defining
the Default Tunnel Client
-
Example:
Defining the User Group Profile
-
Configuring
the CHAP Secret
-
Example:
Configuring PPP CHAP
-
Referencing the Group Profile
-
Configuring
L2TP Properties for a Profile
-
Example: PPP MP for L2TP
-
Example: L2TP Multilink PPP Support on Shared Interfaces
-
Configuring the Password Authentication Protocol Password for
an L2TP Profile
-
Example:
Configuring PAP for an L2TP Profile
-
Configuring the PPP Properties for a Profile
-
Applying
a Configured PPP Group Profile to a Tunnel
-
Example:
Applying a User Group Profile on the M7i or M10i Router
-
Example: Configuring the Profile
-
Example: Configuring L2TP
-
Configuring RADIUS Authentication for L2TP
-
-
Configuring
RADIUS Attributes for L2TP
-
Example:
RADIUS Authentication for L2TP
-
Configuring the RADIUS Disconnect Server for L2TP
-
-
Example: Configuring the RADIUS Disconnect
Server
-
Configuring RADIUS Authentication for an L2TP Profile
-
-
Example: RADIUS Authentication
for an L2TP Profile
-
Configuring an Internet Key Exchange (IKE) Access Profile
-
Managing Subscriber Access
-
-
AAA Service Framework Overview
-
Using RADIUS Authentication and Accounting for Subscriber Access
Management
-
-
Configuring How the Router Interacts with RADIUS Servers
-
Configuring Authentication and Accounting Parameters
-
-
Specifying the Authentication and Accounting Methods
-
Configuring How Accounting Statistics
Are Collected
-
Configuring RADIUS Parameters
-
-
Specifying the RADIUS Authentication and Accounting
Servers to Use for Subscriber Access Management
-
Configuring Options for RADIUS
Servers
-
Configuring How RADIUS Attributes Are Used
-
Example: Configuring RADIUS-Based Subscriber Authentication
and Accounting
-
RADIUS Attributes and Juniper Networks VSAs Supported by the
AAA Service Framework
-
-
RADIUS IETF Attributes Supported by the AAA Service
Framework
-
Juniper Networks VSAs Supported by the AAA
Service Framework
-
Attaching Access Profiles
-
Verifying and Managing Subscriber Access Information
-
Configuring Address-Assignment Pools
-
-
License Requirements
-
Configuring the Pool Name and Network Address
-
Configuring a Named Address Range for Dynamic Address Assignment
-
Configuring Static Address Assignment
-
Configuring DHCP Client-Specific Attributes
-
Example: Configuring an Address-Assignment Pool
-
Tracing Address-Assignment Pool Processes
-
-
Configuring the Address-Assignment Pool Trace Log Filename
-
Configuring the Number and Size of Address-Assignment Pool
Processes Log Files
-
Configuring Access to the Log File
-
Configuring a Regular Expression for Lines to Be Logged
-
Configuring the Trace
-
Summary of Access Configuration Statements
-
-
accounting
-
accounting-order
-
accounting-port
-
accounting-server
-
accounting-session-id-format
-
accounting-stop-on-access-deny
-
accounting-stop-on-failure
-
address
-
address-assignment
-
address-pool
-
address-range
-
allowed-proxy-pair
-
attributes
-
authentication-order
-
authentication-server
-
boot-file
-
boot-server
-
cell-overhead
-
chap-secret
-
circuit-id
-
client
-
dhcp-attributes
-
domain-name
-
drop-timeout
-
encapsulation-overhead
-
ethernet-port-type-virtual
-
exclude
-
fragmentation-threshold
-
framed-ip-address
-
framed-pool
-
grace-period
-
group-profile
-
-
group-profile (Group Profile)
-
group-profile (Profile)
-
hardware-address
-
host
-
idle-timeout
-
ignore
-
ike
-
ike-policy
-
immediate-update
-
initiate-dead-peer-detection
-
interface-description-format
-
interface-id
-
ip-address
-
keepalive
-
l2tp
-
-
l2tp (Group Profile)
-
l2tp (Profile)
-
lcp-renegotiation
-
local-chap
-
maximum-lease-time
-
maximum-sessions-per-tunnel
-
multilink
-
name-server
-
nas-identifier
-
nas-port-extended-format
-
netbios-node-type
-
network
-
option
-
options
-
option-82
-
option-match
-
order
-
override-nas-information
-
pap-password
-
pool
-
port
-
ppp
-
-
ppp (Group Profile)
-
ppp (Profile)
-
ppp-authentication
-
ppp-profile
-
pre-shared-key
-
primary-dns
-
primary-wins
-
profile
-
radius
-
radius-disconnect
-
radius-disconnect-port
-
radius-server
-
range
-
remote-id
-
retry
-
revert-interval
-
router
-
routing-instance
-
secondary-dns
-
secondary-wins
-
secret
-
shared-secret
-
source-address
-
statistics
-
tftp-server
-
timeout
-
traceoptions
-
update-interval
-
user-group-profile
-
vlan-nas-port-stacked-format
-
wins-server
-
Security Services Overview
-
-
IPSec Overview
-
Security Associations
-
IKE
-
IPSec Requirements for JUNOS-FIPS
-
Security Services Configuration Guidelines
-
-
Configuring IPSec (ES PIC)
-
-
Minimum Manual SA Configuration
-
Minimum IKE Configuration
-
Minimum Digital Certificates Configuration for IKE (ES PIC)
-
Configuring Security Associations
-
-
Configuring
the Description for an SA
-
Configuring IPSec Mode
-
-
Configuring
Transport Mode
-
Configuring
Tunnel Mode
-
Configuring Manual Security Associations
-
-
Configuring
the Processing Direction
-
-
Example: Configuring
Inbound and Outbound Processing
-
Example: Configuring Bidirectional Processing
-
Configuring the Protocol for a Manual SA
-
Configuring the Security Parameter Index
-
Configuring the Auxiliary Security Parameter Index
-
Configuring the Authentication Algorithm and Key
-
Configuring the Encryption Algorithm and Key
-
Configuring Dynamic Security Associations
-
Configuring an IKE Proposal (Dynamic SAs Only)
-
-
Configuring
the Authentication Algorithm for an IKE Proposal
-
Configuring the Authentication Method for an IKE Proposal
-
Configuring the Description for an IKE Proposal
-
Configuring the Diffie-Hellman Group for an IKE Proposal
-
Configuring
the Encryption Algorithm for an IKE Proposal
-
Configuring the Lifetime for an IKE SA
-
Example: Configuring an IKE Proposal
-
Configuring an IKE Policy for Preshared Keys
-
-
Configuring
the Description for an IKE Policy
-
Configuring the Mode for an IKE Policy
-
Configuring the Preshared Key for an IKE Policy
-
Associating Proposals with an IKE Policy
-
Example:
Configuring an IKE Policy
-
Configuring an IPSec Proposal (ES PIC)
-
-
Configuring
the Authentication Algorithm for an IPSec Proposal
-
Configuring the Description for an IPSec Proposal
-
Configuring the Encryption Algorithm for an IPSec Proposal
-
Configuring the Lifetime for an IPSec SA
-
Configuring
the Protocol for a Dynamic IPSec SA
-
Configuring the IPSec Policy (ES PIC)
-
-
Configuring
Perfect Forward Secrecy
-
Example:
IPSec Policy Configuration
-
Using Digital Certificates (ES PIC)
-
-
Digital Certificates Overview
-
Obtaining a Certificate from a Certificate Authority (ES PIC)
-
-
Requesting
a CA Digital Certificate
-
-
Example:
Requesting a CA Digital Certificate
-
Generating a Private and Public Key
-
-
Example: Generating a Key Pair
-
Configuring Digital Certificates (ES PIC)
-
-
Configuring
the Certificate Authority Properties
-
-
Specifying
the Certificate Authority Name
-
Configuring
the Certificate Revocation List
-
Configuring the Type of Encoding Your CA Supports
-
Specifying an Enrollment URL
-
Specifying
a File to Read the Digital Certificate
-
Specifying an LDAP URL
-
Configuring the Cache Size
-
Configuring
the Negative Cache
-
Configuring
the Number of Enrollment Retries
-
Configuring
the Maximum Number of Peer Certificates
-
Configuring
the Path Length for the Certificate Hierarchy
-
Configuring an IKE Policy for Digital Certificates (ES PIC)
-
-
Configuring
the Type of Encoding Your CA Supports
-
Configuring the Identity to Define the Remote Certificate Name
-
Specifying
the Certificate Filename
-
Specifying
the Private and Public Key File
-
Obtaining a Signed Certificate from the CA (ES PIC)
-
-
Example: Obtaining
a Signed Certificate
-
Configuring the ES PIC
-
-
Example: Configuring the ES PIC
-
Configuring Traffic
-
-
Example: Configuring an Outbound Traffic Filter
-
Example: Applying an Outbound Traffic Filter
-
Example: Configuring an Inbound Traffic Filter for Policy Check
-
Example: Applying an Inbound Traffic Filter to ES PIC for Policy
Check
-
Configuring an ES Tunnel Interface for a Layer 3 VPN
-
Configuring Digital Certificates for Adaptive Services Interfaces
-
-
Configuring the Certificate Authority Properties
-
-
Specifying
the CA Profile Name
-
Specifying an Enrollment URL
-
Specifying
the Enrollment Properties
-
Configuring the Certificate Revocation List
-
-
Specifying
an LDAP URL
-
Configuring
the Interval Between CRL Updates
-
Overriding
Certificate Verification if CRL Download Fails
-
Managing Digital Certificates
-
-
Requesting
a CA Digital Certificate
-
-
Example: Requesting
a CA Digital Certificate
-
Generating a Public/Private Key Pair
-
-
Example: Generating
a Key Pair
-
Generating and Enrolling a Local Digital Certificate
-
-
Example: Generating a Local Certificate
Manually
-
Configuring the Auto-Reenrollment Properties
-
-
Specify the Certificate ID
-
Specify the CA Profile
-
Specify the Challenge Password
-
Specify the Reenroll Trigger Time
-
Specify the Regenerate Key Pair
-
Specify the Validity Period
-
Configuring Trace
-
Authentication Key Update Mechanism
-
-
Configuring Authentication Key Updates
-
Configuring BGP and LDP for Authentication Key Updates
-
Configuring SSH Host Keys for Secure Copy
-
-
Configuring SSH Known Hosts
-
Configuring Support for SCP File Transfer
-
Updating SSH Host Key Information
-
-
Retrieving Host Key Information Manually
-
Importing Host Key Information
from a File
-
Importing SSL Certificates for JUNOScript Support
-
Configuring Internal IPSec for JUNOS-FIPS
-
-
Configuring the SA Direction
-
Configuring the IPSec SPI
-
Configuring the IPSec Key
-
Example: Configuring Internal IPSec
-
Summary of Security Services Configuration Statements
-
-
algorithm
-
authentication
-
authentication-algorithm
-
-
authentication-algorithm (IKE)
-
authentication-algorithm (IPSec)
-
authentication-key-chains
-
authentication-method
-
auto-re-enrollment
-
auxiliary-spi
-
ca-identity
-
ca-name
-
ca-profile
-
cache-size
-
cache-timeout-negative
-
certificate-id
-
certificates
-
certification-authority
-
challenge-password
-
crl
-
-
crl (Encryption Interface on M-series and T-series Routing
Platforms Only)
-
crl (Adaptive Services Interfaces Only)
-
description
-
dh-group
-
direction
-
-
direction (JUNOS Software)
-
direction (JUNOS-FIPS Software)
-
dynamic
-
encoding
-
encryption
-
-
encryption (JUNOS Software)
-
encryption (JUNOS-FIPS Software)
-
encryption-algorithm
-
enrollment
-
enrollment-retry
-
enrollment-url
-
file
-
identity
-
ike
-
internal
-
ipsec
-
key
-
ldap-url
-
lifetime-seconds
-
local
-
local-certificate
-
local-key-pair
-
manual
-
-
manual (JUNOS Software)
-
manual (JUNOS-FIPS Software)
-
maximum-certificates
-
mode
-
-
mode (IKE)
-
mode (IPSec)
-
path-length
-
perfect-forward-secrecy
-
pki
-
policy
-
-
policy (IKE)
-
policy (IPSec)
-
pre-shared-key
-
proposal
-
-
proposal (IKE)
-
proposal (IPSec)
-
proposals
-
protocol
-
-
protocol (JUNOS Software)
-
protocol (JUNOS-FIPS Software)
-
re-enroll-trigger-time
-
re-generate-keypair
-
refresh-interval
-
retry
-
retry-interval
-
revocation-check
-
security-association
-
-
security-association (JUNOS Software)
-
security-association (JUNOS-FIPS Software)
-
spi
-
-
spi (JUNOS Software)
-
spi (JUNOS-FIPS Software)
-
ssh-known-hosts
-
traceoptions
-
url
-
validity-period
-
SDK Applications Overview
-
SDK Applications Configuration Guidelines
-
-
Enabling the SDK Service Process and SDK Application Deployment
-
-
Example: extensions Statement
-
Configuring the MultiServices PIC
-
-
Example: extension-provider Statement
-
Configuring SDK Service Sets
-
-
Service Order
-
-
Example:
Service Set Configuration
-
Example: Service Order Configuration
-
Interface and Next-Hop Service Sets
-
-
Example: Interface Service Set
-
Example: Next-Hop Service Set
-
Limitations and Constraints for SDK Services Sets
-
Configuring Traffic Sampling for SDK Applications
-
-
Enabling Sampling on a MultiServices PIC
-
Example: Traffic Sampling on a MultiServices PIC
-
Limitations and Constraints
-
Tracing Process Monitoring Operations
-
Tracing System Resource Cleanup Operations
-
Using Configuration Mode Commands with SDK Applications
-
-
Displaying Additional Information About Installed SDK Application
Packages
-
-
Example: show jnx-example | display detail Command
-
Displaying and Deleting the Configuration for SDK Applications
-
-
Using the extension show Command to Match Package Names
-
Using the extension show Command to Display a Specific Package’s
Configuration
-
Using the extension delete Command
-
Summary of SDK Configuration Mode Commands
-
-
extension package-name (show | delete)
-
show | display detail
-
Summary of SDK Configuration Statements
-
-
extension-provider
-
extension-service
-
extensions
-
process-monitor
-
resource-cleanup
-
service-order
-
syslog
-
traceoptions
-
-
traceoptions (Process Monitor)
-
traceoptions (Resource Cleanup)
-
Summary of SDK Operational Commands
-
-
show chassis pic
-
show extension-provider system connections
-
show extension-provider system packages
-
show extension-provider system processes
-
show extension-provider system uptime
-
show extension-provider system virtual-memory
-
show system processes
-
show system processes health
-
show system processes providers
-
show system resource-cleanup processes
-
show version
-
Router Chassis Configuration Guidelines
-
-
Minimum Chassis Configuration
-
Configuring a Flexible PIC Concentrator to Stay Offline
-
Configuring an SFM to Stay Offline
-
Configuring Aggregated Devices
-
-
Configuring Virtual Links for Aggregated Devices
-
Configuring LACP Link Protection at the Chassis Level
-
Enabling LACP Link Protection
-
Configuring System Priority
-
Configuring ATM Cell-Relay Accumulation Mode on an ATM1 PIC
-
Configuring Port Mirroring Instances
on MX-series Routers
-
-
Configuring Port Mirroring Instances at the DPC Level on MX-series
Routers
-
Configuring Port Mirroring Instances at the PIC Level on MX-series
Routers
-
Precedence of Port-Mirroring Instances at Different Levels
of the Chassis
-
Configuring 12-Port T1/E1 Circuit Emulation
PICs
-
Configuring Conditions That Trigger Alarms
-
-
Chassis Conditions That Trigger Alarms
-
-
Backup Routing Engine Alarms
-
Silencing External Devices
-
Disabling Physical Operation of the Craft Interface
-
Configuring Service Packages on Adaptive Services Interfaces
-
Configuring Next-Generation SONET Phase I PICs
-
Configuring SONET/SDH Framing
-
Configuring an External Synchronization Interface
-
Configuring Sparse DLCI Mode
-
Configuring Channelized PIC Operation
-
-
Concatenated and Nonconcatenated Mode
-
Configuring Channelized DS3-to-DS0 Naming
-
Configuring Eight Queues on IQ Interfaces
-
Configuring Channelized E1 Naming
-
Configuring Channelized STM1 Interface Virtual Tributary Mapping
-
Configuring ATM2 Intelligent Queuing Layer 2 Circuit Transport
Mode
-
Enabling ILMI for Cell Relay
-
Configuring Tunnel Interfaces on MX-Series Ethernet Services
Routers
-
-
Example: Configuring Tunnel Interfaces on a Gigabit Ethernet
40-Port DPC
-
Example: Configuring Tunnel Interfaces on a 10-Gigabit Ethernet
4-Port DPC
-
Configuring Packet Scheduling
-
Configuring the Link Services PICs
-
-
Multiclass Extension to MLPPP (RFC 2686)
-
Configuring the Idle Cell Format
-
Configuring an MTU Path Check for a Routing Instance
-
-
Enabling MTU Check for a Routing Instance
-
Assigning an IP Address to an Interface in the Routing Instance
-
Configuring Redundancy
-
Configuring FPC to FEB Connectivity on M120 Routers
-
-
Example: Configuring FPC to FEB Connectivity on the M120 Router
-
Configuring a Routing Engine to Reboot or Halt on Hard Disk
Errors
-
Configuring the CONFIG Button
-
Configuring Larger Delay Buffers
-
Configuring an Entry-Level M320 Router
-
Configuring the uPIM Mode on J-series Routers
-
-
Setting J-Series PIMs Offline
-
Disabling Power Management on the J-series Chassis
-
Configuring the IP and Ethernet Services Mode in MX-series
Routers
-
Restrictions on JUNOS Features for MX-series Routers
-
Configuring J-series Services Router Switching Interfaces
-
-
Example: Configuring J-series Services Router Switching Interfaces
-
TX Matrix Platform and T640 Routing Node Configuration Guidelines
-
-
Routing Matrix Overview
-
Running Different JUNOS Software Releases
-
Software Upgrades and Reinstallation
-
Rebooting Process
-
Committing Configurations
-
Configuring a T640 Routing Node Within a Routing Matrix
-
Chassis and Interface Names
-
Upgrading Switch Interface Boards
-
-
Downgrading Switch Interface Boards
-
Configuring the Online Expected Alarm
-
Creating Configuration Groups
-
Configuring System Log Messages
-
Summary of Router Chassis Configuration Statements
-
-
adaptive-services
-
aggregate-ports
-
aggregated-devices
-
alarm
-
atm-cell-relay-accumulation
-
atm-l2circuit-mode
-
bandwidth
-
ce1
-
channel-group
-
chassis
-
config-button
-
craft-lockout
-
ct3
-
device-count
-
disk-failure-action
-
e1
-
ethernet
-
fabric upgrade-mode
-
fpc
-
-
fpc (M320, T320, T640 Routing Platforms)
-
fpc (MX-Series Ethernet Services Routers)
-
fpc (TX Matrix Platform)
-
fpc-feb-connectivity
-
framing
-
idle-cell-format
-
lacp
-
lcc
-
link-protection
-
max-queues-per-interface
-
mlfr-uni-nni-bundles
-
network-services
-
no-concatenate
-
non-revertive
-
offline
-
on-disk-failure
-
online-expected
-
packet-scheduling
-
pem
-
pic
-
-
pic (M-series and T-series Routing Platforms)
-
pic (TX Matrix Platform)
-
port
-
power
-
q-pic-large-buffer
-
red-buffer-occupancy
-
routing-engine
-
sfm
-
service-package
-
sib
-
sonet
-
sparse-dlcis
-
synchronization
-
system-priority
-
t1
-
timeslots
-
traffic-manager
-
tunnel-services
-
vrf-mtu-check
-
vtmapping
-
Index
-
-
Index
-
Index of Statements and Commands