Table of Contents
- About This Guide
- Overview
- Adaptive Services
- Adaptive Services Overview
- Adaptive Services Overview
- Enabling Service Packages
- Services Configuration Procedure
- Packet Flow Through the Adaptive Services or Multiservices PIC
- Stateful Firewall Overview
- Network Address Translation Overview
- IPsec Overview
- Layer 2 Tunneling Protocol Overview
- Voice Services Overview
- Class of Service Overview
- Examples: Services Interfaces Configuration
- Applications Configuration Guidelines
- Configuring Application Protocol Properties
- Configuring an Application Protocol
- Configuring the Network Protocol
- Configuring the ICMP Code and Type
- Configuring Source and Destination Ports
- Configuring the Inactivity Timeout Period
- Configuring SIP
- Configuring an SNMP Command for Packet Matching
- Configuring an RPC Program Number
- Configuring the TTL Threshold
- Configuring a Universal Unique Identifier
- Configuring Application Sets
- ALG Descriptions
- Verifying the Output of ALG Sessions
- Junos Default Groups
- Examples: Configuring Application Protocols
- Summary of Applications Configuration Statements
- Stateful Firewall Services Configuration Guidelines
- Summary of Stateful Firewall Configuration Statements
- Network Address Translation Services Configuration Guidelines
- Configuring Addresses and Ports for Use in NAT Rules
- Configuring NAT Rules
- Configuring NAT Rule Sets
- Examples: Configuring NAT Rules
- Example: Configuring Dynamic Address-only Source Translation
- Example: Configuring Dynamic Source Translation (NAPT)
- Example: Configuring Static Source Translation
- Example: Configuring Dynamic and Static Source Translation
- Example: Configuring an Oversubscribed Pool with No Fallback
- Example: Configuring an Oversubscribed Pool with Fallback to NAPT
- Example: Configuring Static Source Translation with Multiple Prefixes and Address Ranges
- Example: Assigning Addresses from a Dynamic Pool for Static Use
- Example: Configuring NAT Rules Without Defining a Pool
- Example: Preventing Translation of Specific Addresses
- Example: Configuring NAT for Multicast Traffic
- Example: Configuring Twice NAT
- Example: Configuring NAT in Mixed IPv4 and IPv6 Networks
- Summary of Network Address Translation Configuration Statements
- address
- address-range
- application-sets
- applications
- destination-address
- destination-address-range
- destination-pool
- destination-prefix
- destination-prefix-list
- from
- hint
- ipv6-multicast-interfaces
- match-direction
- no-translation
- overload-pool
- overload-prefix
- pgcp
- pool
- port
- ports-per-session
- remotely-controlled
- rule
- rule-set
- services
- source-address
- source-address-range
- source-pool
- source-prefix
- source-prefix-list
- syslog
- term
- then
- translated
- translation-type
- transport
- Intrusion Detection Service Configuration Guidelines
- Summary of Intrusion Detection Service Configuration Statements
- aggregation
- application-sets
- applications
- by-destination
- by-pair
- by-source
- destination-address
- destination-address-range
- destination-prefix
- destination-prefix-ipv6
- destination-prefix-list
- force-entry
- from
- ignore-entry
- logging
- match-direction
- mss
- rule
- rule-set
- services
- session-limit
- source-address
- source-address-range
- source-prefix
- source-prefix-ipv6
- source-prefix-list
- syn-cookie
- syslog
- term
- then
- threshold
- IPsec Services Configuration Guidelines
- Minimum Security Association Configurations
- Configuring Security Associations
- Configuring Manual Security Associations
- Configuring Dynamic Security Associations
- Clearing Security Associations
- Configuring IKE Proposals
- Configuring the Authentication Algorithm for an IKE Proposal
- Configuring the Authentication Method for an IKE Proposal
- Configuring the Diffie-Hellman Group for an IKE Proposal
- Configuring the Encryption Algorithm for an IKE Proposal
- Configuring the Lifetime for an IKE SA
- Example: Configuring an IKE Proposal
- Configuring IKE Policies
- Configuring the Mode for an IKE Policy
- Configuring the Proposals in an IKE Policy
- Configuring the Preshared Key for an IKE Policy
- Configuring the Local Certificate for an IKE Policy
- Configuring the Description for an IKE Policy
- Configuring Local and Remote IDs for IKE Phase 1 Negotiation
- Example: Configuring an IKE Policy
- Configuring IPsec Proposals
- Configuring IPsec Policies
- IPsec Policy for Dynamic Endpoints
- Configuring IPsec Rules
- Configuring IPsec Rule Sets
- Configuring Dynamic Endpoints for IPsec Tunnels
- Tracing IPsec Operations
- Examples: Configuring IPsec Services
- Example: Configuring Statically Assigned Tunnels
- Example: Configuring Dynamically Assigned Tunnels
- Multitask Example: Configuring IPsec Services
- Configuring the IKE Proposal
- Configuring the IKE Policy (and Referencing the IKE Proposal)
- Configuring the IPsec Proposal
- Configuring the IPsec Policy (and Referencing the IPsec Proposal)
- Configuring the IPsec Rule (and Referencing the IKE and IPsec Policies)
- Configuring IPsec Trace Options
- Configuring the Access Profile (and Referencing the IKE and IPsec Policies)
- Configuring the Service Set (and Referencing the IKE Profile and the IPsec Rule)
- Summary of IPsec Services Configuration Statements
- anti-replay-window-size
- authentication
- authentication-algorithm
- authentication-method
- auxiliary-spi
- backup-remote-gateway
- clear-dont-fragment-bit
- clear-ike-sas-on-pic-restart
- clear-ipsec-sas-on-pic-restart
- description
- destination-address
- dh-group
- direction
- dynamic
- encryption
- encryption-algorithm
- from
- ike
- initiate-dead-peer-detection
- ipsec
- ipsec-inside-interface
- lifetime-seconds
- local-certificate
- local-id
- manual
- match-direction
- mode
- no-anti-replay
- no-ipsec-tunnel-in-traceroute
- perfect-forward-secrecy
- policy
- pre-shared-key
- proposal
- proposals
- protocol
- remote-gateway
- remote-id
- rule
- rule-set
- services
- source-address
- spi
- syslog
- term
- then
- traceoptions
- tunnel-mtu
- Layer 2 Tunneling Protocol Services Configuration Guidelines
- Summary of Layer 2 Tunneling Protocol Configuration Statements
- Link Services IQ Interfaces Configuration Guidelines
- Layer 2 Service Package Capabilities and Interfaces
- Configuring LSQ Interface Redundancy Across Multiple Routers Using SONET APS
- Configuring LSQ Interface Redundancy in a Single Router Using SONET APS
- Configuring LSQ Interface Redundancy in a Single Router Using Virtual Interfaces
- Configuring CoS Scheduling Queues on Logical LSQ Interfaces
- Configuring CoS Fragmentation by Forwarding Class on LSQ Interfaces
- Reserving Bundle Bandwidth for Link-Layer Overhead on LSQ Interfaces
- Configuring Multiclass MLPPP on LSQ Interfaces
- Oversubscribing Interface Bandwidth on LSQ Interfaces
- Configuring Guaranteed Minimum Rate on LSQ Interfaces
- Configuring Link Services and CoS on Services PICs
- Configuring LSQ Interfaces as NxT1 or NxE1 Bundles Using MLPPP
- Configuring LSQ Interfaces as NxT1 or NxE1 Bundles Using FRF.16
- Configuring LSQ Interfaces for Single Fractional T1 or E1 Interfaces Using MLPPP and LFI
- Configuring LSQ Interfaces for Single Fractional T1 or E1 Interfaces Using FRF.12
- Configuring LSQ Interfaces as NxT1 or NxE1 Bundles Using FRF.15
- Configuring LSQ Interfaces for T3 Links Configured for Compressed RTP over MLPPP
- Configuring LSQ Interfaces as T3 or OC3 Bundles Using FRF.12
- Configuring LSQ Interfaces for ATM2 IQ Interfaces Using MLPPP
- Summary of Link Services IQ Configuration Statements
- cisco-interoperability
- forwarding-class
- fragment-threshold
- fragmentation-map
- fragmentation-maps
- hot-standby
- link-layer-overhead
- lsq-failure-options
- multilink-class
- multilink-max-classes
- no-fragmentation
- no-termination-request
- per-unit-scheduler
- preserve-interface
- primary
- redundancy-options
- secondary
- trigger-link-failure
- warm-standby
- Voice Services Configuration Guidelines
- Summary of Voice Services Configuration Statements
- Class-of-Service Configuration Guidelines
- Summary of Class-of-Service Configuration Statements
- Service Set Configuration Guidelines
- Configuring Service Sets to be Applied to Services Interfaces
- Configuring Service Rules
- Configuring IPsec Service Sets
- Configuring the Local Gateway Address for IPsec Service Sets
- Configuring IKE Access Profiles for IPsec Service Sets
- Configuring Certification Authorities for IPsec Service Sets
- Configuring or Disabling Antireplay Service
- Clearing the Don’t-Fragment Bit
- Configuring Passive-Mode Tunneling
- Configuring the Tunnel MTU Value
- Configuring Service Set Limitations
- Configuring System Logging for Service Sets
- Enabling Services PICs to Accept Multicast Traffic
- Tracing Services PIC Operations
- Example: Configuring Service Sets
- Summary of Service Set Configuration Statements
- adaptive-services-pics
- allow-multicast
- anti-replay-window-size
- bypass-traffic-on-exceeding-flow-limits
- bypass-traffic-on-pic-failure
- clear-dont-fragment-bit
- facility-override
- host
- ids-rules
- ike-access-profile
- interface-service
- ipsec-vpn-options
- ipsec-vpn-rules
- local-gateway
- log-prefix
- logging
- max-flows
- nat-rules
- next-hop-service
- no-anti-replay
- passive-mode-tunneling
- pgcp-rules
- ptsp-rules
- service-interface
- service-set
- services
- stateful-firewall-rules
- syslog
- tcp-mss
- traceoptions
- trusted-ca
- tunnel-mtu
- Service Interface Configuration Guidelines
- Services Interface Naming Overview
- Configuring the Address and Domain for Services Interfaces
- Configuring Default Timeout Settings for Services Interfaces
- Configuring System Logging for Services Interfaces
- Enabling Fragmentation on GRE Tunnels
- Applying Filters and Services to Interfaces
- Configuring AS or Multiservices PIC Redundancy
- Examples: Configuring Services Interfaces
- Summary of Service Interface Configuration Statements
- PGCP Configuration Guidelines for the BGF Feature
- Summary of PGCP Configuration Statements
- administrative
- algorithm
- application-data-inactivity-detection
- audit-observed-events-returns
- base-root
- bgf-core
- cancel-graceful
- cleanup-timeout
- context-indications
- control-association-indications
- controller-address
- controller-failure
- controller-port
- data-inactivity-detection
- default
- delivery-function
- destination-address
- destination-port
- detect
- diffserv
- disable-session-mirroring
- disconnect
- down
- dscp
- encoding
- event-timestamp-notification
- failover-cold
- failover-warm
- failure
- fast-update-filters
- file
- flag
- gateway
- gateway-address
- gateway-controller
- gateway-port
- graceful
- graceful-restart
- h248-options
- h248-profile
- h248-properties
- h248-stack
- h248-timers
- hanging-termination-detection
- inactivity-delay
- inactivity-duration
- inactivity-timeout
- inactivity-timer
- initial-average-ack-delay
- interim-ah-scheme
- ip-flow-stop-detection
- ipsec-transport-security-association
- latch-deadlock-delay
- max-burst-size
- max-concurrent-calls
- maximum-fuf-percentage
- maximum-inactivity-time
- maximum-net-propagation-delay
- maximum-synchronization-mismatches
- maximum-terms
- maximum-waiting-delay
- media
- mg-maximum-pdu-size
- mg-originated-pending-limit
- mg-provisional-response-timer-value
- mg-segmentation-timer
- mgc-maximum-pdu-size
- mgc-originated-pending-limit
- mgc-provisional-response-timer-value
- mgc-segmentation-timer
- monitor
- network-operator-id
- no-dscp-bit-mirroring
- no-rtcp-check
- normal-mg-execution-time
- normal-mgc-execution-time
- notification-behavior
- notification-rate-limit
- notification-regulation
- overload-control
- peak-data-rate
- platform
- profile-name
- profile-version
- queue-limit-percentage
- reconnect
- reject-all-commands-threshold
- reject-new-calls-threshold
- report-service-change
- request-timestamp
- routing-instance
- rtcp
- rtp
- rule
- rule-set
- sbc-utils
- segmentation
- send-notification-on-delay
- service-change
- service-change-type
- service-interface
- service-state
- services
- session-mirroring
- source-address
- source-port
- state-loss
- stop-detection-on-drop
- sustained-data-rate
- timerx
- tmax-retransmission-delay
- traceoptions
- traffic-management
- up
- use-lower-case
- use-wildcard-response
- virtual-interface
- virtual-interface-down
- virtual-interface-indications
- virtual-interface-up
- warm
- Service Interface Pools Configuration Guidelines
- Summary of Service Interface Pools Statements
- Border Signaling Gateway Configuration Guidelines
- Summary of Border Signaling Gateway Configuration Statements
- actions
- accelerations
- admission-control
- availability-check-profiles
- blacklist-period
- clusters
- committed-burst-size
- committed-information-rate
- data-inactivity-detection
- datastore
- default-media-realm
- dialogs
- dscp
- egress-service-point
- embedded-spdf
- file
- flag
- forward-manipulation
- framework
- from
- gateway
- inactivity-duration
- manipulation-rule
- media-policy
- media-type
- message-manipulation
- maximum-records-in-cache
- maximum-time-in-cache
- message-manipulation-rules
- minimum
- name-resolution-cache
- new-call-usage-input-policies
- new-call-usage-output-policies
- new-call-usage-policy
- new-call-usage-policy-set
- new-transaction-input-policies
- new-transaction-output-policies
- new-transaction-policy
- new-transaction-policy-set
- next-hop
- on-3xx-response
- request-uri
- reverse-manipulation
- route
- routing-destinations
- sbc-utils
- servers
- service-class
- service-interface
- service-point
- service-point-type
- service-policies
- services
- session-trace
- signaling
- signaling-realms
- sip
- sip-header
- sip-stack
- term
- then
- timer-c
- timers
- traceoptions
- transactions
- transport-details
- PTSP Configuration Guidelines
- Summary of PTSP Configuration Statements
- application-group-any
- application-groups
- applications
- count-type
- demux
- forward-rule (Configuring)
- forward-rule (Including in Rule)
- from (Forward Rule)
- from (Rule)
- local-address
- local-address-range
- local-port-range
- local-ports
- local-prefix-list
- match-direction
- protocol
- remote-address
- remote-address-range
- remote-port-range
- remote-ports
- remote-prefix-list
- rule (Configuring)
- rule (Including in Rule Set)
- rule-set
- services
- term (Forward Rule)
- term (Rule)
- then (Forward Rule)
- then (Rule)
- Dynamic Application Awareness for Junos OS
- Dynamic Application Awareness for Junos OS Overview
- Application Identification Configuration Guidelines
- Defining an Application Identification
- Configuring APPID Rules
- Using Stateful Firewall Rules to Identify Data Sessions
- Configuring Application Profiles
- Configuring Application Groups
- Configuring Global APPID Properties
- Configuring Automatic Download of Application Package Updates
- Tracing APPID Operations
- Examples: Configuring Application Identification Properties
- Summary of Application Identification Configuration Statements
- address
- application
- application-group
- application-groups
- application-system-cache-timeout
- applications
- automatic
- destination
- disable
- disable-global-timeout-override
- download
- idle-timeout
- ignore-errors
- inactivity-non-tcp-timeout
- inactivity-tcp-timeout
- index
- ip
- max-checked-bytes
- min-checked-bytes
- no-application-identification
- no-application-system-cache
- no-clear-application-system-cache
- no-protocol-method
- no-signature-based
- order
- port-mapping
- port-range
- profile
- rule
- rule-set
- services
- session-timeout
- source
- traceoptions
- type
- type-of-service
- url
- Application-Aware Access List Configuration Guidelines
- Summary of AACL Configuration Statements
- Local Policy Decision Function Configuration Guidelines
- Summary of L-PDF Configuration Statements
- Encryption Services
- Encryption Overview
- Encryption Interfaces Configuration Guidelines
- Configuring Encryption Interfaces
- Configuring Filters for Traffic Transiting the ES PIC
- Configuring an ES Tunnel Interface for a Layer 3 VPN
- Configuring ES PIC Redundancy
- Configuring IPsec Tunnel Redundancy
- Summary of Encryption Configuration Statements
- Flow Monitoring and Discard Accounting Services
- Flow Monitoring and Discard Accounting Overview
- Flow Monitoring and Discard Accounting Configuration Guidelines
- Configuring Traffic Sampling
- Configuring Flow Monitoring
- Enabling Flow Aggregation
- Configuring Flow Aggregation to Use Version 5 or Version 8 cflowd
- Configuring Flow Aggregation to Use Version 9 Flow Templates
- Configuring Sampling Instances
- Directing Replicated Flows to Multiple Flow Servers
- Logging cflowd Flows Before Export
- Configuring Port Mirroring
- Load Balancing Among Multiple Monitoring Interfaces
- Configuring Discard Accounting
- Enabling Passive Flow Monitoring
- Configuring Services Interface Redundancy with Flow Monitoring
- Summary of Flow-Monitoring Configuration Statements
- accounting
- address
- aggregate-export-interval
- aggregation
- autonomous-system-type
- cflowd
- core-dump
- destination
- disable
- disable-all-instances
- engine-id
- engine-type
- export-format
- family
- file
- filename
- files
- filter
- flow-active-timeout
- flow-export-destination
- flow-inactive-timeout
- flow-monitoring
- forwarding-options
- input
- input-interface-index
- instance
- interface
- interfaces
- ipv4-template
- ipv6-template
- label-position
- local-dump
- max-packets-per-second
- monitoring
- mpls-ipv4-template
- mpls-template
- multiservice-options
- next-hop
- next-hop-group
- no-core-dump
- no-filter-check
- no-local-dump
- no-stamp
- no-syslog
- no-world-readable
- option-refresh-rate
- output
- output-interface-index
- passive-monitor-mode
- pop-all-labels
- port
- port-mirroring
- rate
- receive-options-packets
- receive-ttl-exceeded
- required-depth
- run-length
- sample-once
- sampling
- services
- size
- source-address
- stamp
- syslog
- template
- template-refresh-rate
- traceoptions
- unit
- version
- version9
- world-readable
- Flow Collection Configuration Guidelines
- Summary of Flow Collection Configuration Statements
- Dynamic Flow Capture Configuration Guidelines
- Flow-Tap Configuration Guidelines
- Summary of Dynamic Flow Capture and Flow-Tap Configuration Statements
- address
- allowed-destinations
- capture-group
- content-destination
- control-source
- duplicates-dropped-periodicity
- dynamic-flow-capture
- flow-tap
- g-duplicates-dropped-periodicity
- g-max-duplicates
- hard-limit
- hard-limit-target
- input-packet-rate-threshold
- interface
- interfaces
- max-duplicates
- minimum-priority
- no-syslog
- notification-targets
- pic-memory-threshold
- service-port
- services
- shared-key
- soft-limit
- soft-limit-clear
- source-addresses
- ttl
- Link and Multilink Services
- Link and Multilink Services Overview
- Link and Multilink Services Configuration Guidelines
- Multilink and Link Services PICs Overview
- Configuring the Number of Bundles on Link Services PICs
- Configuring the Links in a Multilink or Link Services Bundle
- Multilink and Link Services Logical Interface Configuration Overview
- Configuring Encapsulation for Multilink and Link Services Logical Interfaces
- Configuring the Drop Timeout Period on Multilink and Link Services Logical Interfaces
- Limiting Packet Payload Size on Multilink and Link Services Logical Interfaces
- Configuring the Minimum Number of Active Links on Multilink and Link Services Logical Interfaces
- Configuring MRRU on Multilink and Link Services Logical Interfaces
- Configuring the Sequence Header Format on Multilink and Link Services Logical Interfaces
- Configuring DLCIs on Link Services Logical Interfaces
- Configuring Delay-Sensitive Packet Interleaving on Link Services Logical Interfaces
- Configuring Link Services Physical Interfaces
- Default Settings for Link Services Interfaces
- Configuring Encapsulation for Link Services Physical Interfaces
- Configuring Acknowledgment Timers on Link Services Physical Interfaces
- Configuring Differential Delay Alarms on Link Services Physical Interfaces with MLFR FRF.16
- Configuring Keepalives on Link Services Physical Interfaces
- Configuring CoS on Link Services Interfaces
- Examples: Configuring Multilink Interfaces
- Examples: Configuring Link Interfaces
- Example: Configuring a Link Services Interface with Two Links
- Example: Configuring a Link Services Interface with MLPPP
- Example: Configuring a Link Services Interface with MLFR FRF.15
- Example: Configuring a Link Services PIC with MLFR FRF.16
- Example: Configuring Link and Voice Services Interfaces with a Combination of Bundle Types
- Summary of Multilink and Link Services Configuration Statements
- acknowledge-retries
- acknowledge-timer
- action-red-differential-delay
- address
- bundle
- destination
- disable-mlppp-inner-ppp-pfc
- dlci
- drop-timeout
- encapsulation
- family
- fragment-threshold
- hello-timer
- interfaces
- interleave-fragments
- lmi-type
- minimum-links
- mlfr-uni-nni-bundle-options
- mrru
- mtu
- multicast-dlci
- n391
- n392
- n393
- red-differential-delay
- short-sequence
- t391
- t392
- unit
- yellow-differential-delay
- Real-Time Performance Monitoring Services
- Real-Time Performance Monitoring Services Overview
- Real-Time Performance Monitoring Configuration Guidelines
- Summary of Real-Time Performance Monitoring Configuration Statements
- authentication-mode
- client-list
- data-fill
- data-size
- destination-interface
- destination-port
- dscp-code-point
- hardware-timestamp
- history-size
- inactivity-timeout
- logical-system
- maximum-connections
- maximum-connections-per-client
- maximum-sessions
- maximum-sessions-per-connection
- moving-average-size
- one-way-hardware-timestamp
- port
- probe
- probe-count
- probe-interval
- probe-limit
- probe-server
- probe-type
- routing-instance
- routing-instances
- rpm
- server
- services
- source-address
- target
- tcp
- test
- test-interval
- thresholds
- traps
- twamp
- twamp-server
- udp
- Tunnel Services
- Tunnel Services Overview
- Tunnel Interfaces Configuration Guidelines
- Configuring Unicast Tunnels
- Configuring GRE Keepalive Time
- Restricting Tunnels to Multicast Traffic
- Configuring Logical Tunnel Interfaces
- Configuring Tunnel Interfaces for Routing Table Lookup
- Configuring Virtual Loopback Tunnels for VRF Table Lookup
- Configuring PIM Tunnels
- Configuring IPv6-over-IPv4 Tunnels
- Configuring Dynamic Tunnels
- Configuring Tunnel Interfaces on MX Series Routers
- Examples: Configuring Unicast Tunnels
- Example: Configuring a Virtual Loopback Tunnel for VRF Table Lookup
- Example: Configuring an IPv6-over-IPv4 Tunnel
- Example: Configuring Logical Tunnels
- Example: Configuring Keepalive for a GRE Interface
- Summary of Tunnel Services Configuration Statements
- Index
Hide Navigation Pane
Show Navigation Pane
Download
SHA1