Symbols
- !
- regular expression operator 1, 2,
- system logging 1
- ?
- regular expression operator
- system logging 1
- /altconfig directory 1,
- /altroot directory 1,
- /config directory
- location of configuration files 1,
- /var/db/config directory 1,
- /var/home directory 1,
- /var/log directory 1,
- /var directory 1,
- .
- regular expression operator 1,
- system logging 1
- ^
- regular expression operator 1, 2,
- system logging 1
- ( )
- regular expression operator 1, 2,
- system logging 1
- ( ), in syntax descriptions 1,
- [ ]
- regular expression operator
- system logging 1
- [ ], in configuration statements 1,
- { }, in configuration statements 1,
- $
- regular expression operator 1, 2,
- system logging 1
- *
- regular expression operator 1,
- system logging 1
- \
- regular expression operator 1, 2,
- #, comments in configuration statements 1,
- +
- regular expression operator 1,
- system logging 1
- < >, in syntax descriptions 1,
- |
- regular expression operator
- system logging 1
- | (pipe), in syntax descriptions 1,
A
- AAA Service Framework 1,
- access
- tracing operations 1,
- access, router remotely 1,
- access privilege levels
- login classes 1,
- user accounts 1,
- accounting
- order 1,
- accounting-order statement 1,
- usage guidelines 1,
- accounting-port statement 1,
- RADIUS server 1,
- usage guidelines 1,
- accounting-server statement 1,
- accounting-session-id-format statement 1,
- accounting statement 1, 2,
- authentication
- usage guidelines 1, 2
- accounting-stop-on-access-deny statement 1,
- accounting-stop-on-failure statement 1,
- activating a configuration 1,
- adaptive-services statement 1,
- usage guidelines 1,
- address-assignment pool
- tracing operations 1,
- address-assignment statement 1,
- usage guidelines 1,
- addresses
- IP addresses 1,
- router source addresses 1, 2,
- address-pool statement 1,
- usage guidelines 1,
- address-range statement 1,
- usage guidelines 1,
- address statement 1,
- usage guidelines 1,
- aggregated devices, configuring 1,
- aggregated-devices statement 1,
- usage guidelines 1,
- aggregate-ports statement 1,
- aging timer
- ARP 1,
- alarm conditions 1,
- backup Routing Engine 1,
- chassis alarm conditions 1,
- silencing alarm devices 1,
- alarm cutoff button 1,
- alarm statement 1,
- usage guidelines 1,
- alert (system logging severity level 1) 1,
- algorithm statement 1, 2,
- usage guidelines 1,
- alias option for static-host-mapping statement 1,
- alias statement 1,
- all (tracing flag)
- VRRP 1, 2,
- allow-commands statement 1,
- usage guidelines 1,
- allow-configuration statement 1,
- usage guidelines 1,
- allowed-proxy-pair statement 1,
- usage guidelines 1,
- allowing commands to login classes 1,
- allow-transients statement 1,
- alternative media 1,
- announcements
- system login 1,
- announcement statement 1,
- usage guidelines 1,
- any (system logging facility) 1,
- any (system logging severity level) 1,
- archival statement 1,
- usage guidelines 1,
- archive router configuration 1,
- archive-sites statement
- configuration files 1,
- system log files 1,
- system logging
- usage guidelines 1
- usage guidelines 1,
- archive statement 1, 2,
- usage guidelines 1,
- ARP
- aging timer 1,
- arp statement 1,
- usage guidelines 1,
- ASCII file, JUNOS software, configuring using 1,
- ATM 1,
- ATM2 IQ interfaces
- Layer 2 circuit transport mode 1,
- atm-cell-relay-accumulation statement 1,
- usage guidelines 1,
- ATM interfaces
- PIC alarm conditions 1,
- atm-l2circuit-mode statement 1,
- usage guidelines 1, 2,
- usage guidelines 1,
- attributes statement 1,
- authentication
- diagnostics port 1,
- diagnostics port password 1,
- NTP authentication keys 1,
- order 1, 2, 3,
- protocol 1,
- RADIUS 1, 2, 3,
- example 1
- root password 1, 2,
- shared user accounts 1, 2,
- TACACS+ 1, 2, 3,
- user 1,
- users 1,
- authentication-algorithm statement
- IKE 1,
- usage guidelines 1
- IPSec 1,
- usage guidelines 1
- IKE 1,
- IPSec 1,
- authentication-key-chains statement 1,
- authentication-key statement 1,
- usage guidelines 1,
- authentication key update mechanism 1,
- authentication-method statement
- IKE 1,
- usage guidelines 1
- authentication-order statement 1, 2,
- usage guidelines 1, 2, 3,
- authentication-server statement 1,
- authentication statement 1, 2,
- login 1,
- subscriber access management 1,
- usage guidelines 1, 2,
- authorization (system logging facility) 1,
- option to facility-override statement 1,
- autoinstallation statement 1,
- auto-re-enrollment statement 1,
- auxiliary port
- properties 1,
- auxiliary-spi statement 1,
- usage guidelines 1,
- auxiliary statement 1,
- usage guidelines 1,
B
- backup router configuration 1,
- backup routers 1, 2,
- backup-router statement 1,
- usage guidelines 1,
- bandwidth statement 1,
- usage guidelines 1,
- BGP
- security configuration example 1,
- boot-file statement 1, 2,
- usage guidelines 1,
- BOOTP relay agent 1,
- boot server
- NTP 1,
- boot-server statement 1,
- DHCP 1,
- NTP 1,
- usage guidelines 1,
- braces, in configuration statements 1,
- brackets
- angle, in syntax descriptions 1,
- square, in configuration statements 1,
- brief statement
- system logging 1,
- usage guidelines 1
- broadcast
- NTP 1, 2,
- synchronizing NTP 1,
- broadcast-client statement 1,
- usage guidelines 1,
- broadcast messages, synchronizing NTP 1,
- broadcast statement 1,
- usage guidelines 1,
- bucket-size statement 1,
C
- cables
- console port, connecting 1,
- Ethernet rollover, connecting 1,
- cache-size statement 1,
- usage guidelines 1,
- cache-timeout-negative statement 1,
- usage guidelines 1,
- ca-identity statement 1,
- usage guidelines 1,
- ca-name statement 1,
- usage guidelines 1,
- ca-profile statement 1,
- usage guidelines 1,
- ce1 statement 1,
- usage guidelines 1,
- cell-overhead statement 1,
- usage guidelines
- client profile 1
- group profile 1
- certificate-id statement 1,
- certificates statement 1,
- usage guidelines 1,
- certification-authority statement 1,
- usage guidelines 1,
- cfeb statement 1, 2,
- challenge-password statement 1,
- change-log (system logging facility) 1,
- change-type statement 1,
- usage guidelines 1,
- channel-group statement 1,
- usage guidelines 1,
- channelized DS3-to-DS0 naming 1,
- channelized E1 naming 1,
- channelized mode 1,
- chap-secret statement 1,
- usage guidelines 1,
- chassis
- configuration
- alarm conditions 1
- chassis interface names 1,
- chassis process 1,
- chassis statement 1,
- usage guidelines 1, 2,
- circuit-id statement 1,
- circuit-type statement 1,
- class statement 1,
- usage guidelines 1, 2,
- CLI
- JUNOS software, configuring using 1, 2,
- client address statement
- usage guidelines 1,
- client-identifier statement 1,
- usage guidelines 1,
- client mode, NTP 1, 2,
- client statement 1,
- usage guidelines 1, 2,
- commands
- allowing or denying to login classes 1,
- filenames, specifying 1,
- URLs, specifying 1,
- comments, in configuration statements 1,
- commit scripts
- JUNOS software, configuring using 1, 2, 3,
- commit statement 1,
- commit synchronize command 1,
- commit synchronize statement 1,
- usage guidelines 1,
- Common Criteria
- system logging 1,
- CompactFlash cards
- mirroring to hard disk 1,
- compress-configuration-files statement 1,
- usage guidelines 1, 2,
- usage guidelines 1,
- compressing configuration files 1, 2,
- concatenated mode 1,
- config-button statement 1,
- usage guidelines 1,
- configuration
- activating 1,
- aggregated devices 1,
- files See configuration files
- configuration files
- compressing 1, 2,
- filename, specifying 1,
- URL, specifying 1,
- configuration-servers statement 1,
- configuration statement 1,
- configuration statements
- specifying IP addresses in 1,
- usage guidelines 1,
- configuring
- JUNOS software 1,
- conflict-log (system logging facility) 1,
- connection-limit statement 1,
- usage guidelines 1,
- connectivity
- FPC to FEB, M120 routers 1,
- console port
- adapter 1,
- properties 1,
- console statement
- physical port 1,
- usage guidelines 1
- system logging 1,
- usage guidelines 1
- control-cores statement 1,
- conventions
- text and syntax 1,
- core dump files
- usage guidelines 1,
- viewing 1,
- craft interface
- alarm conditions
- chassis 1
- M20 router 1
- M40e and M160 routers 1
- M40 router 1
- overview 1
- T320 router and T640 routing node 1
- alarm cutoff button 1,
- disabling 1,
- craft-lockout statement 1,
- usage guidelines 1,
- critical (system logging severity level 2) 1,
- crl statement
- AS and MultiServices PICs 1,
- ES PIC 1,
- usage guidelines (AS and MultiServices PICs) 1,
- usage guidelines (ES PIC) 1,
- Crypto Officer 1,
- user configuration 1,
- ct3 statement 1,
- usage guidelines 1,
- curly braces, in configuration statements 1,
- customer support 1,
- contacting JTAC 1,
D
- daemon (system logging facility) 1,
- option to facility-override statement 1,
- database (tracing flag) 1, 2,
- data-cores statement 1,
- debug (system logging severity level 7) 1,
- default-address-selection statement 1,
- usage guidelines 1,
- default-lease-time statement 1,
- usage guidelines 1,
- delimiter statement 1,
- deny-commands statement 1,
- usage guidelines 1,
- deny-configuration statement 1,
- usage guidelines 1,
- denying commands to login classes 1,
- description statement
- IKE policy 1,
- usage guidelines 1
- IKE proposal 1,
- usage guidelines 1
- IPSec policy 1,
- usage guidelines 1
- IPSec proposal 1,
- usage guidelines 1
- IPSec SA 1,
- usage guidelines 1
- usage guidelines 1, 2, 3,
- IPSec SA
- usage guidelines 1
- destination option 1,
- destination statement 1,
- usage guidelines 1, 2,
- device-count statement 1,
- usage guidelines 1,
- dfc (system logging facility) 1,
- DHCP
- tracing operations 1,
- DHCP/BOOTP relay agent 1,
- dhcp-attributes statement 1,
- dhcp-local-server statement 1,
- usage guidelines 1,
- dhcp statement 1,
- usage guidelines 1,
- dh-group statement 1,
- usage guidelines 1, 2, 3,
- diagnostics port password 1, 2,
- diag-port-authentication statement 1,
- usage guidelines 1,
- direction, IPSec 1,
- direction statement 1,
- usage guidelines 1, 2,
- directories
- JUNOS software 1,
- disk-failure-action statement 1,
- disk space, available
- managing 1,
- DNS name servers 1,
- documentation set
- comments on 1,
- domain names on routers 1,
- domain-name statement 1, 2, 3,
- subscriber access management 1,
- usage guidelines 1,
- domain-search statement 1,
- usage guidelines 1,
- domains to be searched 1, 2,
- DPC
- bound to a Layer 2 port-mirroring instance 1,
- drop-timeout statement 1,
- DS1 interfaces, PIC alarm conditions 1,
- dump-device statement 1,
- dynamic security associations 1,
- dynamic security associations (IPSec) 1,
- dynamic service activation 1,
- dynamic statement 1,
- usage guidelines 1,
E
- e1 statement 1,
- usage guidelines 1,
- E3 interfaces
- PIC alarm conditions 1,
- emergency (system logging severity level 0) 1,
- encapsulation-overhead statement 1,
- usage guidelines
- client profile 1
- group profile 1
- encoding statement 1,
- usage guidelines
- certificate authority 1
- IKE policy 1
- encrypted-password option 1, 2,
- encrypted passwords 1, 2, 3,
- encryption-algorithm statement 1,
- usage guidelines
- IKE 1
- IPSec 1
- encryption-algorithm statement (IKE)
- usage guidelines 1,
- encryption statement 1,
- usage guidelines 1, 2,
- enrollment-retry statement 1,
- usage guidelines 1,
- enrollment statement 1,
- usage guidelines 1,
- enrollment-url statement 1,
- usage guidelines 1,
- error (system logging severity level 3) 1,
- ES PIC 1,
- Ethernet
- PIC alarm conditions 1, 2,
- ethernet-port-type-virtual statement 1,
- Ethernet rollover cable, connecting the router to a management device 1,
- ethernet statement 1, 2,
- usage guidelines 1,
- Ethernet switching interfaces 1, 2,
- event policy
- all (tracing flag) 1,
- configuration (tracing flag) 1,
- database (tracing flag) 1,
- events (tracing flag) 1,
- policy (tracing flag) 1,
- server (tracing flag) 1,
- timer-events (tracing flag) 1,
- events statement 1,
- usage guidelines 1, 2,
- exclude statement 1,
- explicit-priority statement 1,
- usage guidelines
- routing matrix 1
- single-chassis system 1
- export routing policies 1,
- extension
- defined 1,
- extension package-name statement 1,
- extension-provider 1,
- extension-provider statement 1, 2,
- extension-service 1,
- extension-service statement 1,
- extensions statement 1,
- external synchronization interface 1,
- usage guidelines 1,
F
- fabric upgrade-mode statement 1,
- facilities (system logging)
- alternate for remote machine 1,
- default for remote machine 1,
- for local machine 1,
- mapping of codes to names 1,
- facility-override statement 1,
- system logging
- usage guidelines 1
- failover, configuring 1,
- failover statement 1, 2,
- usage guidelines 1,
- fan alarm conditions
- M120 routers 1,
- M20 routers 1,
- M320 routers 1,
- M40e and M160 routers 1,
- M40 routers 1,
- M5 and M10 routers 1,
- M7i and M10i routers 1,
- MX240 routers 1,
- MX480 routers 1,
- MX960 routers 1,
- FEB alarm condition 1,
- M120 routers 1,
- feb statement 1, 2, 3,
- filenames, specifying in commands 1,
- files
- configuration, compressing 1,
- configuration files, compressing 1,
- system log messages, archiving 1,
- files statement 1,
- system logging
- usage guidelines 1
- file statement 1,
- security
- usage guidelines 1
- system logging 1,
- usage guidelines 1
- finger statement 1,
- usage guidelines 1,
- FIPS
- See also JUNOS-FIPS 1,
- user configuration 1,
- firewall (system logging facility) 1,
- firewall filters 1,
- security configuration example 1,
- first-time router configuration 1,
- flow-tap-dtcp statement 1,
- usage guidelines 1,
- font conventions 1,
- format statement 1,
- forwarding table 1,
- FPC, configuring to stay offline 1,
- FPC alarm condition
- M20 routers 1,
- M320 routers 1,
- M40e and M160 routers 1,
- M40 routers 1,
- T320 routers and T640 routing nodes 1,
- M5 and M10 routers 1,
- fpc-feb-connectivity statement 1,
- usage guidelines 1,
- fpc statement 1,
- usage guidelines 1,
- FPC-to-FEB connectivity
- configuring, M120 routers 1,
- example, M120 routers 1,
- fragmentation-threshold statement 1,
- usage guidelines 1,
- framed-ip-address statement 1,
- usage guidelines 1,
- framed-pool statement 1,
- usage guidelines 1, 2,
- group profile 1
- client profile 1
- framing statement
- usage guidelines 1,
- ftp (system logging facility) 1,
- option to facility-override statement 1,
- FTP service, configuring 1,
- ftp statement 1,
- usage guidelines 1,
- full names, in user accounts 1,
- full-name statement 1,
- usage guidelines 1,
G
- general (tracing flag) 1, 2,
- global tracing operations 1,
- graceful-switchover statement 1, 2,
- grace-period statement 1,
- gre-path-mtu-discovery statement 1,
- usage guidelines 1,
- group-profile statement 1,
- usage guidelines 1, 2,
- group statement 1,
- usage guidelines 1,
H
- hard disk
- mirroring CompactFlash cards 1,
- hard disk errors 1,
- hardware-address statement 1,
- hardware components 1,
- HMAC-MD5 authentication 1,
- host-name statement 1,
- usage guidelines 1,
- host statement 1, 2,
- system logging
- usage guidelines for routing matrix 1
- usage guidelines for single-chassis system 1
- hot-swapping alarm condition 1,
- https statement 1,
- http statement 1,
I
- icmpv4-rate-limit statement 1,
- usage guidelines 1,
- icmpv6-rate-limit statement 1,
- usage guidelines 1,
- icons defined, notice 1,
- identity statement 1,
- usage guidelines 1,
- idle-cell-format statement 1,
- usage guidelines 1,
- idle-timeout statement 1, 2,
- usage guidelines 1,
- group profile 1
- idle timeout values
- login classes 1,
- ignore statement 1,
- IKE 1, 2,
- authentication algorithm 1,
- authentication method 1,
- DH group
- usage guidelines 1
- Diffie-Hellman group 1,
- dynamic SAs 1,
- encryption algorithm 1,
- encryption-algorithm statement
- usage guidelines 1
- lifetime statement
- usage guidelines 1
- policy configuration, example 1,
- policy description 1,
- policy mode 1,
- policy statement
- usage guidelines 1
- preshared key 1,
- proposal description 1,
- proposals associated with policy 1,
- SA lifetime 1,
- ike statement 1, 2,
- usage guidelines 1,
- ILMI with cell relay 1,
- immediate-update statement 1,
- import routing policies 1,
- inet6-backup-router statement 1,
- usage guidelines 1,
- inet statement 1,
- usage guidelines 1,
- info (system logging severity level 6) 1,
- initial configuration
- JUNOS software 1,
- initialization process
- init 1,
- initiate-dead-peer-detection statement 1,
- insecure statement 1,
- usage guidelines 1,
- interactive-commands (system logging facility) 1,
- interface-description-format statement 1,
- interface-id statement 1,
- usage guidelines 1, 2,
- client profile 1
- interface naming
- routing matrix 1,
- TX Matrix platform 1,
- interface process 1,
- interfaces
- tracing operations 1,
- interfaces (tracing flag) 1, 2,
- interfaces statement 1,
- interface statement 1,
- usage guidelines 1,
- internal statement 1,
- usage guidelines 1,
- internet-options statement 1,
- usage guidelines 1, 2, 3, 4, 5, 6, 7, 8, 9,
- IP addresses 1,
- router mapping 1,
- router names, mapping 1,
- specifying in configuration statements 1,
- ip-address-first statement 1,
- usage guidelines 1,
- ip-address statement 1,
- ipip-path-mtu-discovery statement 1,
- usage guidelines 1,
- IP packets
- router source addresses 1, 2,
- IPSec
- algorithm 1,
- authentication 1,
- authentication algorithm 1,
- auxiliary security parameter index 1,
- configuring internal 1,
- digital certificates, configuring (AS and MultiServices PICs) 1,
- digital certificates, configuring (ES PIC) 1,
- direction 1, 2,
- direction of processing 1,
- dynamic security associations 1,
- encryption 1, 2, 3,
- encryption algorithm 1, 2,
- example 1,
- inbound traffic filter, applying 1
- inbound traffic filter, configuring 1
- outbound traffic filter, applying 1
- outbound traffic filter, configuring 1
- example configuration
- outbound traffic 1
- internal 1,
- key 1,
- lifetime of SA 1,
- manual 1, 2,
- minimum configurations
- dynamic SA 1
- manual SA 1
- overview 1,
- Perfect Forward Secrecy 1,
- policy 1,
- proposal 1,
- proposal description 1,
- SA description 1,
- security associations 1,
- security parameter index 1,
- security services overview 1,
- SPI 1,
- statements 1,
- ES PIC 1,
- IKE 1,
- ipsec-policy statement 1,
- usage guidelines 1,
- ipsec statement 1,
- usage guidelines 1,
- ipv6-duplicate-addr-detection-transmits statement 1,
- usage guidelines 1,
- ipv6-path-mtu-discovery statement 1,
- usage guidelines 1,
- ipv6-path-mtu-discovery-timeout statement 1,
- ipv6-reject-zero-hop-limit statement 1,
- usage guidelines 1,
- IS-IS
- security configuration example 1,
J
- J-series routers 1, 2,
- J-series Services Routers 1,
- juniper.conf file, compressing 1, 2,
- Juniper-Allow-Commands attribute (RADIUS) 1,
- Juniper-Allow-Configuration attribute (RADIUS) 1,
- Juniper-Configuration-Change attribute (RADIUS) 1,
- Juniper-Deny-Commands attribute (RADIUS) 1,
- Juniper-Deny-Configuration attribute (RADIUS) 1,
- Juniper-Interactive-Command attribute (RADIUS) 1,
- Juniper-Interface-ID attribute (RADIUS for L2TP) 1,
- Juniper-IP-Pool-Name attribute (RADIUS for L2TP) 1,
- Juniper-Keep-Alive attribute (RADIUS for L2TP) 1,
- Juniper-Local-User-Name attribute (RADIUS) 1,
- Juniper Networks VSAs
- subscriber access management 1,
- Juniper-Primary-DNS attribute (RADIUS for L2TP) 1,
- Juniper-Primary-WINS attribute (RADIUS for L2TP) 1,
- Juniper-Secondary-DNS attribute (RADIUS for L2TP) 1,
- Juniper-Secondary-WINS attribute (RADIUS for L2TP) 1,
- Juniper-User-Permissions attribute (RADIUS) 1,
- JUNOScript API
- JUNOS software, configuring using 1, 2,
- JUNOScript SSL service 1,
- JUNOScript xnm-ssl service 1,
- JUNOS-FIPS
- dual Routing Engines 1,
- IPSec requirements 1, 2,
- network security 1,
- password requirements 1, 2, 3,
- remote services 1,
- system logging 1,
- user accounts 1,
- JUNOS software 1,
- directories stored in 1,
- introduction 1,
- methods for configuring 1,
- ASCII file 1, 2
- CLI 1, 2
- commit scripts 1, 2, 3
- JUNOScript API 1, 2
- J-Web GUI 1, 2
- NETCONF API 1, 2
- monitoring tools 1,
- passwords, plain-text, requirements 1,
- redundant Routing Engines, initial configuration 1,
- security, default settings 1,
- software properties, configuring 1,
- J-Web graphical user interface (GUI)
- JUNOS software, configuring using 1, 2,
K
- keepalive statement 1,
- usage guidelines
- client profile 1
- keepalive-time statement 1, 2,
- kernel, Routing Engine 1,
- kernel (system logging facility) 1,
- option to facility-override statement 1,
- key, IPSec 1,
- key statement 1,
- usage guidelines 1,
L
- l2tp statement 1,
- usage guidelines 1, 2,
- lacp statement 1,
- laptop See management device
- large delay buffers 1,
- LCC
- prefix 1,
- T640 routing node 1,
- TX Matrix platform 1, 2,
- lcc statement 1,
- usage guidelines 1,
- lcp-renegotiation statement 1,
- usage guidelines 1, 2,
- ldap-url statement 1,
- usage guidelines 1,
- license requirements
- address-assignment pool 1,
- lifetime-seconds statement 1,
- usage guidelines
- IKE 1
- IPSec 1
- limits statement 1,
- line-card chassis See LCC
- link protection
- non-revertive statement 1,
- link-protection statement
- LACP
- chassis 1
- Link Services PIC 1,
- lo0 interface 1, 2,
- load-key-file command
- usage guidelines 1, 2,
- load-key-file statement 1,
- usage guidelines 1, 2, 3,
- local0 - local7 (options to facility-override statement) 1,
- local-certificate statement 1, 2,
- usage guidelines 1,
- local-chap statement 1,
- usage guidelines 1,
- local-key-pair statement 1,
- usage guidelines 1,
- local password authentication 1,
- local statement 1,
- usage guidelines 1,
- local user
- template accounts 1,
- template example 1,
- location statement 1,
- usage guidelines 1,
- log files
- specifying properties 1,
- logging in as root 1,
- logging operations
- security configuration example 1,
- tracing operations 1,
- logical devices 1,
- logical-system-name statement 1,
- login-alarms statement 1,
- usage guidelines 1,
- login announcements, system 1,
- login classes
- access privilege levels 1,
- commands, allowing or denying 1,
- defining 1, 2,
- idle timeout values 1,
- security configuration example 1,
- login messages, system 1,
- login statement 1,
- usage guidelines 1, 2, 3,
- login-tip statement 1,
- usage guidelines 1,
- log-out-on-disconnect statement 1,
- usage guidelines 1,
- log-prefix statement
- system logging 1,
- usage guidelines 1
M
- mac-address statement 1,
- management device
- connecting through the CLI 1, 2,
- connecting to console port 1, 2,
- recovering root password from 1,
- management Ethernet interface
- PIC alarm conditions 1,
- management process
- mgd 1,
- manuals
- comments on 1,
- manual security association 1,
- manual statement 1,
- usage guidelines 1, 2,
- martian addresses 1,
- match statement 1,
- usage guidelines 1,
- max-configurations-on-flash statement 1,
- usage guidelines 1,
- maximum-certificates statement 1,
- usage guidelines 1,
- maximum-lease-time statement 1, 2,
- usage guidelines 1, 2,
- maximum-length statement 1,
- usage guidelines 1,
- maximum-sessions-per-tunnel statement 1,
- usage guidelines 1,
- max-queues-per-interface statement 1,
- usage guidelines 1,
- MD5 authentication 1,
- messages
- broadcast messages, NTP 1, 2,
- multicast, NTP 1,
- redirect 1,
- system login 1,
- message statement 1,
- usage guidelines 1,
- MIB II process 1,
- minimum-changes statement 1,
- usage guidelines 1,
- minimum-length statement 1,
- usage guidelines 1,
- mirror-flash-on-disk statement 1,
- usage guidelines 1,
- mlfr-uni-nni-bundles statement 1,
- usage guidelines 1,
- mode statement
- IKE 1,
- usage guidelines 1
- IPSec 1,
- usage guidelines 1,
- monitoring tools
- tracing operations 1,
- monitoring tools for JUNOS software 1,
- MPLS routing table 1,
- ms-chapv2
- changing password ms-chapv2 1,
- multicast
- NTP messages 1,
- multicast-client statement 1,
- usage guidelines 1,
- multicast routing table 1,
- multilink statement 1,
- usage guidelines 1,
- multiplexed mode 1,
N
- names
- domain names on routers 1,
- names 1,
- router 1, 2,
- name servers, DNS 1,
- name-server statement 1, 2,
- usage guidelines 1,
- nas-identifier statement 1,
- nas-port-extended-format statement 1,
- netbios-node-type statement 1,
- NETCONF API
- JUNOS software, configuring using 1, 2,
- network
- masks 1,
- network-services 1,
- network statement 1,
- Next-generation SONET/SDH PICs
- configuring 1,
- no-auto-failover statement 1, 2,
- no-compress-configuration-files statement 1,
- usage guidelines 1,
- no-concatenate statement 1,
- usage guidelines 1,
- no-gre-path-mtu-discovery statement 1,
- no-ipip-path-mtu-discovery statement 1,
- no-multicast-echo statement 1,
- usage guidelines 1,
- nonconcatenated mode 1,
- non-revertive statement 1,
- no-packet-scheduling statement 1,
- usage guidelines 1,
- no-path-mtu-discovery statement 1,
- no-ping-record-route statement 1,
- no-ping-time-stamp statement 1,
- no-redirects statement 1,
- usage guidelines 1,
- normal (tracing flag) 1, 2,
- no-saved-core-context statement 1,
- usage guidelines 1,
- no-source-quench statement 1,
- no-tcp-rfc1323-paws statement 1,
- no-tcp-rfc1323 statement 1,
- usage guidelines 1, 2,
- notice (system logging severity level 5) 1,
- notice icons defined 1,
- no-world-readable statement
- system logging 1,
- usage guidelines 1
- NTP
- authentication keys 1,
- boot server 1,
- broadcast mode 1, 2,
- client mode 1, 2,
- configuring 1,
- listening
- for broadcast messages 1, 2
- for multicast messages 1
- security configuration example 1,
- server mode 1,
- symmetric active mode 1, 2,
- ntp statement 1,
- usage guidelines 1,
O
- object-cache-size statement 1,
- offline statement 1, 2,
- usage guidelines 1, 2,
- on-disk-failure statement 1, 2, 3,
- usage guidelines 1,
- online-expected statement 1,
- usage guidelines 1, 2,
- on-loss-of-keepalives statement 1, 2,
- Open IP Solution Development Program (OSDP) 1,
- operators, regular expression 1, 2,
- system logging 1,
- option-60 statement 1,
- option-82 statement 1, 2,
- extended DHCP local server 1,
- subscriber access management 1,
- usage guidelines 1,
- optional statement 1,
- option-match statement 1,
- options statement 1,
- option statement 1,
- order statement
- accounting 1,
- authentication 1,
- OSDP (Open IP Solution Development Program) 1,
- other-routing-engine option to host statement 1,
- usage guidelines
- routing matrix 1
- single-chassis system 1
- outbound-ssh
- router-initiated ssh 1,
- outbound-ssh service
- configuring 1,
- outbound-ssh statement 1,
- usage guidelines 1,
- override-nas-information statement 1,
P
- package statement 1,
- Packet Forwarding Engine 1,
- bound to a Layer 2 port-mirroring instance 1,
- packet-rate statement 1,
- packets
- router source addresses 1, 2,
- packets (tracing flag) 1, 2,
- packet scheduling 1,
- packet-scheduling statement 1,
- usage guidelines 1,
- pap-password statement 1,
- usage guidelines 1,
- parentheses, in syntax descriptions 1,
- passive ARP learning
- VRRP 1,
- passwords
- diagnostics port 1, 2,
- RADIUS 1,
- root 1, 2,
- root password, recovering 1,
- shared user 1,
- shared user accounts 1,
- passwords statement
- usage guidelines 1,
- password statement 1,
- login 1,
- subscriber access management 1,
- path-length statement 1,
- usage guidelines 1,
- path-mtu-discovery statement 1,
- usage guidelines 1,
- PC See management device
- peer statement 1,
- usage guidelines 1,
- pem statement 1,
- usage guidelines 1,
- perfect-forward-secrecy statement 1,
- usage guidelines 1,
- permissions statement 1,
- usage guidelines 1,
- pfe (system logging facility) 1,
- physical devices, aggregating 1,
- physical interfaces framing modes 1,
- pic-console-authentication statement 1,
- usage guidelines 1,
- pic statement 1,
- usage guidelines 1,
- pki statement 1,
- plain-text password
- requirements 1,
- plain-text-password option 1, 2,
- plain-text passwords 1,
- for a diagnostic port 1,
- for user accounts 1,
- root password 1, 2,
- policy statement
- IKE 1,
- usage guidelines, digital certificates (ES PIC) 1
- usage guidelines, preshared keys 1
- IPSec 1,
- usage guidelines 1
- pool-match-order statement 1,
- usage guidelines 1,
- pool statement 1, 2,
- usage guidelines 1,
- port mirroring, Layer 2
- for a specific DPC 1,
- for a specific PFE 1,
- order of precedence if applied at multiple levels 1,
- port-mirroring instance, Layer 2
- binding to a specific DPC 1,
- binding to a specific PFE 1,
- ports
- auxiliary port properties 1,
- console port properties 1,
- diagnostics port 1, 2,
- insecure 1,
- log-out-on-disconnect 1,
- RADIUS server 1,
- ports statement 1,
- usage guidelines 1,
- port statement 1, 2, 3,
- HTTP/HTTPS 1,
- RADIUS 1,
- SRC 1,
- TACACS+ 1,
- usage guidelines 1
- usage guidelines 1, 2, 3,
- usage guidelines 1,
- power statement (fpc) 1,
- usage guidelines 1,
- power supply alarm conditions 1,
- ppp-authentication statement 1,
- usage guidelines 1, 2,
- ppp-profile statement 1,
- usage guidelines 1,
- ppp statement 1,
- usage guidelines 1,
- prefixes
- specifying in configuration statements 1,
- pre-shared-key statement 1, 2,
- usage guidelines 1,
- primary-dns statement 1,
- usage guidelines 1,
- group profile 1
- primary-wins statement 1,
- usage guidelines
- client profile 1
- group profile 1
- priorities
- system logging, including in log message
- for routing matrix 1
- for single-chassis system 1
- processes
- configuring failover 1, 2,
- processes statement 1,
- process-monitor statement 1,
- profile statement 1,
- usage guidelines 1, 2,
- proposals statement 1,
- usage guidelines
- IKE 1
- IPSec 1
- proposal statement 1,
- IKE
- usage guidelines 1
- IPSec
- usage guidelines 1
- protocol
- for dynamic SA 1,
- for internal SA 1, 2, 3,
- for manual SA 1,
- protocols
- authentication 1,
- redirect messages 1,
- protocol-specific tracing operations 1,
- protocol statement 1,
- usage guidelines
- dynamic SA 1
- internal SA 1
- manual SA 1
- protocol-version statement 1,
- usage guidelines 1,
- provider
- defined 1,
- provider ID
- enabling 1,
- providers statement 1,
Q
- q-pic-large-buffer statement 1,
- usage guidelines 1,
R
- RADIUS accounting 1,
- subscriber access management 1,
- RADIUS attributes
- subscriber access management 1,
- RADIUS authentication 1, 2, 3, 4,
- in a private network 1,
- L2TP 1, 2,
- security configuration example 1,
- subscriber access management 1,
- TACACS+ 1,
- RADIUS authorization See RADIUS authentication
- radius-disconnect-port statement 1,
- usage guidelines 1,
- radius-disconnect statement 1,
- usage guidelines 1,
- radius-options statement 1,
- RADIUS servers
- configuring interaction with 1,
- radius-server statement 1, 2,
- usage guidelines 1, 2,
- radius statement 1,
- RADIUS templates
- security configuration example 1,
- range statement 1,
- rate-limit statement 1,
- usage guidelines 1,
- red alarm conditions 1,
- red-buffer-occupancy statement 1,
- redirect messages
- disabling 1,
- redundancy
- configuring failover 1, 2,
- redundancy-group statement 1,
- redundancy statement 1, 2, 3,
- re-enroll-trigger-time statement 1,
- refresh-from statement 1,
- refresh-interval statement 1,
- usage guidelines 1,
- refresh statement 1,
- re-generate-keypair statement 1,
- regular expression operators 1, 2,
- system logging 1,
- remote
- access, configuring 1,
- user names 1,
- template account 1,
- remote access, router, establishing 1,
- remote-id statement 1,
- replay-window-size statement 1,
- usage guidelines 1,
- request security certificate command 1,
- usage guidelines 1,
- request security key-pair
- usage guidelines 1,
- retry-interval statement 1,
- usage guidelines 1,
- retry-options statement 1,
- usage guidelines 1,
- retry statement 1, 2, 3,
- usage guidelines 1, 2,
- revert-interval statement 1,
- revocation-check statement 1,
- RJ-45 to DB-9 serial port adapter 1,
- rlogin service, configuring 1,
- rollover cable, connecting the console port 1,
- root-authentication statement 1,
- usage guidelines 1, 2,
- root-login statement 1,
- usage guidelines 1,
- root password 1, 2,
- root password recovery 1,
- route prefixes 1,
- router chassis See chassis
- routers
- backup 1, 2,
- DNS name servers, configuring 1,
- domain names 1,
- domains to be searched 1, 2,
- failover, configuring 1, 2,
- hardware components 1,
- initial configuration 1,
- JUNOS software
- initial configuration for redundant Routing Engines 1
- login classes 1,
- names
- configuring 1, 2
- mapping to IP addresses 1, 2
- NTP 1,
- Packet Forwarding Engine 1,
- physical system location 1,
- ports
- auxiliary port properties 1
- console port properties 1
- diagnostics port 1, 2
- RADIUS server 1
- redirect 1,
- remote access, establishing 1,
- root login, controlling 1,
- Routing Engine 1,
- security features 1,
- source addresses 1, 2,
- system services, configuring 1,
- time zone setting 1,
- user accounts 1,
- router security 1,
- access 1,
- firewall filters 1,
- JUNOS software, security, default settings 1,
- routing protocol security features 1,
- system log messages 1,
- user authentication 1,
- router statement 1, 2,
- Routing Engines 1,
- available disk space, managing 1,
- chassis process 1,
- initialization process 1,
- kernel 1,
- management process 1,
- MIB II process 1,
- overview 1,
- redundant
- JUNOS software, initial configuration 1
- routing protocol process 1,
- single
- JUNOS software, initial configuration 1
- SNMP process 1,
- software components 1,
- routing-engine statement
- reboot or halt on disk failure 1,
- redundancy 1,
- usage guidelines 1,
- routing-instance-name statement 1,
- routing-instance statement 1, 2,
- usage guidelines 1, 2,
- routing matrix 1, 2,
- configuration guidelines 1,
- interface naming 1,
- LCC 1,
- online expected alarm 1,
- overview 1,
- system logging 1,
- configuring T640 routing nodes offline 1,
- routing protocol process
- IPv4 routing protocols 1,
- IPv6 routing protocols 1,
- routing policy 1,
- routing tables 1,
- routing protocols, overview 1,
- routing protocol security features 1,
- routing tables 1,
S
- saved-core-context statement 1,
- usage guidelines 1,
- saved-core-files statement 1,
- usage guidelines 1,
- SCB alarm condition 1,
- SCC 1, 2, 3,
- scc-master option to host statement 1,
- usage guidelines 1,
- scheduling packets 1,
- SCP 1,
- scripts statement 1,
- SDH
- interfaces
- framing mode 1
- SDH interfaces
- framing 1, 2,
- PIC alarm conditions 1,
- SDK (Software Development Kit)
- overview 1,
- SDK applications
- defined 1,
- SDK service process See ssd
- secondary-dns statement 1,
- usage guidelines
- client profile 1
- group profile 1
- secondary-wins statement 1,
- usage guidelines
- client profile 1
- group profile 1
- secret statement
- access 1,
- usage guidelines, RADIUS authentication 1
- usage guidelines, RADIUS disconnect 1
- authentication 1,
- usage guidelines, RADIUS 1
- usage guidelines, TACACS+ 1
- secure copy See SCP
- security
- configuration example 1,
- router, features 1,
- router, JUNOS software default settings 1,
- tracing operations 1,
- security association statement
- usage guidelines 1,
- security-association statement 1,
- usage guidelines 1,
- security services configuration guidelines 1,
- server-identifier statement 1,
- usage guidelines 1,
- server mode, usage guidelines 1,
- servers statement 1,
- usage guidelines 1,
- server statement
- usage guidelines 1,
- service-deployment statement 1,
- usage guidelines 1,
- service-package statement 1,
- usage guidelines 1,
- service sets
- SDK, configuring 1,
- services statement 1,
- usage guidelines 1,
- session statement 1,
- severity levels for system logging 1, 2,
- sfm (offline) statement 1,
- usage guidelines 1,
- SFMs
- alarm condition 1,
- offline 1,
- sfm statement 1,
- shared-secret statement 1,
- usage guidelines 1,
- shared user accounts 1,
- sib statement 1,
- usage guidelines 1,
- simple authentication 1,
- single-connection statement 1,
- usage guidelines 1,
- size statement 1,
- system logging
- usage guidelines 1
- SNMP
- security configuration example 1,
- SNMP process 1,
- Software Development Kit See SDK
- software processes
- configuring failover 1, 2,
- SONET
- interfaces
- framing 1, 2
- framing mode 1
- PIC alarm conditions 1
- sonet statement 1,
- usage guidelines 1,
- source-address statement 1,
- NTP
- usage guidelines 1
- NTP, RADIUS, System Logging, TACACS+ 1,
- RADIUS and TACACS+ 1,
- usage guidelines 1
- SDX
- usage guidelines 1
- SRC 1,
- system logging 1,
- usage guidelines for routing matrix 1
- usage guidelines for single-chassis system 1
- usage guidelines
- usage guidelines, RADIUS 1
- source-port statement 1,
- usage guidelines 1, 2,
- source-quench statement 1,
- usage guidelines 1,
- source statement 1,
- sparse-dlcis statement 1,
- usage guidelines 1,
- SPI
- IPSec 1,
- spi statement 1,
- usage guidelines 1, 2,
- SRC software 1, 2,
- SSB
- alarm condition 1, 2,
- ssb statement 1, 2,
- ssd (SDK service process)
- enabling 1,
- ssh key files 1, 2,
- ssh-known-hosts statement 1,
- usage guidelines 1,
- ssh service
- configuring 1,
- limiting login attempts 1,
- root login 1,
- ssh protocol version 1,
- ssh statement 1,
- usage guidelines 1,
- SSL 1,
- start-time 1,
- start-time statement
- system logging
- usage guidelines 1
- state (tracing flag) 1, 2,
- static-binding statement 1,
- usage guidelines 1,
- static-host-mapping statement 1,
- usage guidelines 1,
- statistics statement 1,
- structured-data statement 1,
- usage guidelines 1,
- subnet masks 1,
- subscriber access
- configuring 1,
- subscriber access management
- configuring RADIUS accounting 1,
- configuring RADIUS authentication 1,
- configuring RADIUS parameters 1,
- overview 1,
- RADIUS server options 1,
- specifying RADIUS servers 1,
- supported Juniper Networks VSAs 1,
- supported RADIUS attributes 1,
- using RADIUS attributes 1,
- support, technical See technical support
- symmetric active mode, NTP
- configuring 1,
- defined 1,
- synchronization statement 1, 2,
- synchronized timing 1,
- syntax conventions 1,
- sysid statement 1,
- usage guidelines 1,
- syslog statement
- SDK applications 1,
- system processes 1,
- usage guidelines 1
- system authentication
- authentication order 1,
- RADIUS
- configuring 1
- example 1
- remote template accounts 1,
- TACACS+ 1,
- system identifier, IS-IS
- configuring 1,
- system logging
- Common Criteria 1,
- configuration statements 1,
- defaults 1,
- different on each node in routing matrix 1,
- disabling 1,
- examples 1,
- facilities
- alternate for remote machine 1
- default for remote machine 1
- for local machine 1
- mapping of codes to names 1
- files, archiving 1,
- forwarding messages in routing matrix 1,
- JUNOS-FIPS 1,
- regular expression filtering 1,
- regular expression operators 1,
- routing matrix 1,
- severity levels 1, 2,
- single-chassis system 1,
- timestamp, modifying 1,
- system login 1, 2,
- system log messages 1,
- system-priority statement
- LACP
- interface 1
- system services
- DHCP 1,
- DHCP local server 1,
- finger 1,
- ftp 1,
- outbound-ssh 1,
- ssh 1,
- telnet 1,
- system statement 1,
- usage guidelines 1,
T
- t1 statement 1,
- usage guidelines 1,
- T3 interfaces
- PIC alarm conditions 1,
- T640 routing nodes 1,
- role in routing matrix 1,
- TACACS+ accounting 1,
- usage guidelines, TX Matrix platform 1,
- TACACS+ authentication
- configuring 1,
- overview 1,
- tacplus-options statement
- no-cmd-attribute-value option 1,
- usage guidelines 1,
- tacplus-server statement 1,
- usage guidelines 1,
- tcp-drop-synfin-set statement 1,
- usage guidelines 1,
- tcp-mss statement
- usage guidelines 1, 2,
- technical support
- contacting JTAC 1,
- telnet
- service, configuring 1,
- service, limiting login attempts 1,
- telnet statement 1,
- usage guidelines 1,
- temperature alarm conditions 1,
- template accounts 1, 2,
- terminal type 1, 2,
- tftp-server statement 1,
- time
- security configuration example 1,
- time-format statement 1,
- usage guidelines 1,
- timeout statement 1,
- access 1,
- usage guidelines 1
- authentication
- usage guidelines, RADIUS 1
- usage guidelines, TACACS+ 1
- timer (tracing flag) 1, 2,
- timeslots statement 1,
- usage guidelines 1,
- time zone setting, routers 1,
- time-zone statement 1,
- usage guidelines 1,
- trace operations
- VRRP 1, 2,
- traceoptions statement 1,
- access 1,
- usage guidelines 1
- address-assignment pool 1,
- usage guidelines 1
- DHCP 1,
- usage guidelines 1
- DHCP local server 1,
- process monitor 1,
- security 1,
- usage guidelines 1
- usage guidelines 1,
- VRRP
- usage guidelines 1, 2
- tracing 1,
- destination-override 1,
- tracing flags
- event policy
- all 1
- configuration 1
- database 1
- events 1
- policy 1
- server 1
- timer-events 1
- tracing operations 1,
- access 1,
- address-assignment pool 1,
- DHCP 1,
- DVMRP 1,
- security 1,
- traffic
- inbound (application of filter) 1,
- inbound (decryption) 1,
- outbound (application of filter) 1,
- outbound (encryption) 1,
- traffic-manager statement 1,
- traffic sampling
- in SDK applications 1,
- transfer-interval
- usage guidelines 1,
- transfer-interval statement 1,
- configuration 1,
- system log 1,
- system logging
- usage guidelines 1
- transfer-on-commit statement 1,
- usage guidelines 1,
- transferring router configuration to archive site 1,
- troubleshooting
- root password recovery 1,
- trusted-key statement 1,
- usage guidelines 1,
- tunnel interfaces
- configuring, MX-series routers 1,
- tunnel-services statement 1,
- usage guidelines 1,
- TX Matrix platform
- chassis and interface names 1,
- committing configurations 1,
- configure a T640 routing node 1,
- interface naming 1,
- online expected alarm 1,
- overview 1,
- rebooting process 1,
- reinstallation 1,
- router chassis properties 1,
- software upgrades 1,
- system logging 1,
- offline 1,
- type statement
- auxiliary port
- usage guidelines 1
- console port
- usage guidelines 1
U
- UIDs 1,
- uid statement 1,
- usage guidelines 1,
- unicast routing table 1,
- update-interval statement 1,
- uPIM Ethernet interfaces 1, 2,
- URLs, specifying in commands 1,
- url statement 1,
- user (system logging facility) 1,
- option to facility-override statement 1,
- user access
- login classes 1,
- user accounts 1, 2,
- user accounts
- configuring 1,
- in JUNOS-FIPS 1,
- security configuration example 1,
- shared user accounts 1,
- user authentication
- methods 1,
- methods for 1,
- protocols for central authentication 1,
- router security 1,
- user-group-profile statement 1,
- usage guidelines 1,
- user identifiers See UIDs
- username-include statement 1,
- user-prefix statement 1,
- user statement
- access 1,
- usage guidelines 1
- system logging 1,
- usage guidelines 1
- using outbound-ssh
- connect routers behind firewalls 1,
V
- validity-period statement 1,
- virtual links
- aggregated devices 1,
- vlan-nas-port-stacked-format statement 1,
- VPNs 1,
- vrf-mtu-check statement 1,
- usage guidelines 1, 2,
- VRRP
- passive ARP learning 1,
- trace operations 1, 2,
- tracing flag 1, 2,
- vtmapping statement 1,
- usage guidelines 1,
W
- warning (system logging severity level 4) 1,
- web-management statement 1,
- wins-server statement 1, 2,
- usage guidelines 1,
- world-readable statement
- system logging 1,
- usage guidelines 1
X
- xnm-clear-text statement 1,
- usage guidelines 1
- xnm-ssl statement 1,
- usage guidelines 1
Y
- yellow alarm condition 1