Table of Contents
- About the Documentation
- E Series and JunosE Documentation and Release Notes
- Audience
- E Series and JunosE Text and Syntax Conventions
- Obtaining Documentation
- Documentation Feedback
- Requesting Technical Support
- Chapters
- Planning Your Network
- Platform Considerations
- Interface Specifiers
- Edge Applications Overview
- Private Line Aggregation
- xDSL Session Termination
- Layered Approach
- Line Modules, I/O Modules, and IOAs
- Interfaces
- Subinterfaces
- interface Command
- General Configuration Tasks
- Configuring Virtual Routers
- Configuring IPSec
- Configuring Physical Layer Interfaces
- Line Module Features
- Configurable HDLC Parameters
- Configuring Channelized T3 Interfaces
- Configuring T3 and E3 Interfaces
- Configuring OCx/STMx and OC48 Interfaces
- Configuring Channelized OCx/STMx Line Interfaces
- Configuring Ethernet Interfaces
- Configuring IPSec-Service Interfaces
- Configuring Tunnel Service Interfaces
- Configuring Data Link-Layer Interfaces
- Configuring IP/Frame Relay
- Configuring IP/ATM
- Configuring IP/PPP
- Configuring IP/HDLC
- Configuring IP/Ethernet
- Configuring IP Tunnels, Shared IP Interfaces, and Subscriber
Interfaces
- Configuring IP Tunnels
- Configuring Shared Interfaces and Subscriber Interfaces
- Configuring Routing Protocols
- Configuring VRRP
- Configuring Routing Policy
- Configuring QoS
- Configuring Policy Management
- Configuring Remote Access
- Command-Line Interface
- Overview
- Command Modes
- Command-Line Prompts
- Keywords and Parameters
- Keywords
- Parameters
- Keywords and Parameters
Together
- Using CLI Commands
- Abbreviated Commands
- The ? Key
- Backspace or Delete
- Enter
- Tab
- Arrow Keys
- The no Version
- run and do Commands
- show Commands
- Redirection of show Command Output
- Regular Expressions
- Metacharacters
- Using Metacharacters as
Literal Tokens
- The - -More- - Prompt
- Responding
to Prompts
- CLI Status Indicators
- Levels of Access
- User Level
- Privileged Level
- Initialization Sequence
- Platform Considerations
- Accessing the CLI
- Logging In
- Privileged-Level Access
- Defining CLI Levels of Privilege
- Accessing the Privileged
Exec Level
- Moving from Privileged Exec to User Exec Mode
- Logging Out
- CLI Command Privileges
- CLI Privilege Groups
- Examples Using Privilege Group Membership
- CLI Command Exceptions
- CLI Keyword Mapping
- Setting Privileges for Ambiguous Commands
- Setting Privilege Levels for no or default Versions
- Setting Privilege Levels for Multiple Commands
- Setting Privilege Levels for All
Commands in a Mode
- Setting Privilege Levels
for a Group of Commands
- Using the
Order of Precedence
- Superseding Privilege
Levels with the all Keyword
- Removing the
all Keyword
- Setting Default Line Privilege
- Viewing CLI Privilege Information
- Viewing the Current User Privilege
Level
- Viewing
Privilege Levels for All Connected Users
- Viewing Privilege Levels
for Changed CLI Commands
- Using Help
- ? (Question Mark Key)
- help Command
- Partial-keyword <Tab>
- Using Command-Line Editing
- Basic Editing
- Command-Line Editing Keys
- Command History Keys
- Pagination Keys
- Accessing Command Modes
- Exec Modes
- Password Protection
- Global Configuration Mode
- Executing a Script
File
- AAA Profile Configuration Mode
- Address Family Configuration Mode
- ATM VC Configuration Mode
- ATM VC Class Configuration Mode
- Classifier Group Configuration Mode
- Color Mark Profile Configuration Mode
- Control Plane Configuration Mode
- Controller Configuration Mode
- DHCP Local Pool Configuration Mode
- Domain Map Configuration Mode
- Domain Map Tunnel Configuration Mode
- DoS Protection Group Configuration Mode
- Drop Profile Configuration Mode
- Explicit Path Configuration Mode
- Flow Cache Configuration Mode
- Interface Configuration Mode
- IP NAT Pool Configuration Mode
- IP PIM Data MDT Configuration Mode
- IP Service Profile Configuration Mode
- IPSec CA Identity Configuration Mode
- IPSec Identity Configuration Mode
- IPSec IKE Policy Configuration Mode
- IPSec Manual Key Configuration Mode
- IPSec Peer Public Key Configuration Mode
- IPSec Transport Profile Configuration Mode
- IPSec Tunnel Profile Configuration Mode
- IP Tunnel Destination Profile Mode
- IPv6 Local Pool Configuration Mode
- L2 Transport Load-Balancing-Circuit Configuration Mode
- L2TP Destination Profile Configuration Mode
- L2TP Destination Profile Host Configuration Mode
- L2TP Tunnel Switch Profile Configuration Mode
- Layer 2 Control Configuration Mode
- Layer 2 Control Neighbor Configuration Mode
- LDP Configuration Mode
- Line Configuration Mode
- Local IPSec Transport Profile Configuration
- Local User Configuration Mode
- Map Class Configuration Mode
- Map List Configuration Mode
- Parent Group Configuration Mode
- Policy List Configuration Mode
- Policy List Parent Group Configuration Mode
- Policy Parameter Configuration Mode
- PPPoE Service Name Table Configuration Mode
- Profile Configuration Mode
- QoS Interface Set Configuration Mode
- QoS Interface Superset Configuration Mode
- QoS Parameter Definition Configuration Mode
- QoS Profile Configuration Mode
- QoS Shared Shaper Control Configuration
- Queue Profile Configuration Mode
- RADIUS Configuration Mode
- RADIUS Relay Configuration Mode
- Rate Limit Profile Configuration Mode
- Redundancy Configuration Mode
- Remote Neighbor Configuration Mode
- Route Map Configuration Mode
- Router Configuration Mode
- RSVP Configuration Mode
- RTR Configuration Mode
- Scheduler Profile Configuration Mode
- Service Session Profile Configuration Mode
- SNMP Event Manager Configuration Mode
- Statistics Profile Configuration Mode
- Subinterface Configuration Mode
- Subscriber Policy Configuration Mode
- Traffic Class Configuration Mode
- Traffic Class Group Configuration Mode
- Tunnel Group Configuration Mode
- Tunnel Group Tunnel Configuration Mode
- Tunnel Profile Configuration Mode
- Tunnel Server Configuration Mode
- VRF Configuration Mode
- VR Group Configuration Mode
- Installing JunosE Software
- Overview
- Identifying the Software Release File
- Platform Considerations
- Installing Software When a Firewall Exists
- Task 1: Obtain the Required Information
- Task 2: Divert Network Traffic to Another Router
- Task 3: Access Privileged Exec Mode
- Task 4: Configure IP on an Interface
- Task 5: Copy the Release Files to the Network Host
- Task 6: Configure Access to the Network Host
- Task 7: Enable the FTP Server on the Router
- Task 8: Identify the Files to Transfer
- Task 9: Transfer Files to the User Space
- Task 10: Install Files on the System Space
- Task 11: Save the Current Configuration
- Task 12: Reboot the System
- Installing Software When a Firewall Does Not Exist
- Installing Software in Normal Operational Mode
- Task 1: Obtain the Required Information
- Task 2: Divert Network
Traffic to Another Router
- Task 3: Access Privileged
Exec Mode
- Task 4: Configure
IP on an Interface
- Task 5: Configure
Access to the Network Host
- Task 6: Copy the
Release Files to the Network Host
- Task 7: Copy the Software
Release File to the Router
- Task 8: Save the Current
Configuration
- Task 9: Reboot
the System
- Installing Software in Boot Mode
- Task 1: Obtain the Required Information
- Task 2: Divert Network
Traffic to Another System
- Task 3: Access the Boot
Mode
- Task 4: Assign an
IP Address
- Task 5: Configure
Access to the Network Host
- Task 6: Resetting
the SRP Module
- Task 7: Copy the Release
Files to the Network Host
- Task 8: Copy the Software
Release File to the Router
- Task 9: Reboot the System
- Copying Release Files from One Router to Another
- Upgrading Systems That Are Operating with Two SRP Modules
- Upgrading JunosE Software
- Upgrading Software Remotely Through Telnet or FTP
- Upgrading Software from an NVS Card
- Upgrading a System That Contains
One SRP Module
- Upgrading a System That
Contains Two SRP Modules
- Downgrading JunosE Software
- Configuring SNMP
- Overview
- Terminology
- SNMP Features Supported
- SNMP Client
- SNMP Server
- SNMP MIBs
- Standard SNMP MIBs
- Juniper Networks E Series
Enterprise MIBs
- Accessing Supported SNMP
MIBs
- SNMP Versions
- Security Features
- Management Features
- Virtual Routers
- Creating SNMP Proxy
- Disabling and Reenabling
SNMP Proxy
- Communicating with the SNMP Engine
- SNMP Attributes
- SNMP Operations
- SNMP PDU Types
- Platform Considerations
- References
- Before You Configure SNMP
- SNMP Configuration Tasks
- Enabling SNMP
- Configuring SNMP v1/v2c Community
- Community Name
- Privilege Levels
- IP Access List
- Configuring SNMPv3 Users
- Configuring SNMP Dynamic Groups and Views
- Setting Server Parameters
- Configuring SNMP Packet Size
- Configuring Memory Warning
- Configuring Encoding Method
- Managing Interface Sublayers
- Compressing Interfaces
- Controlling
Interface Numbering
- Monitoring
Interface Tables
- Configuring Traps
- IP Hosts
- Trap Categories
- Trap Severity Levels
- Specifying an Egress Point for SNMP Traps
- Configuring Trap Queues
- Configuring Trap Notification Logs
- Recovering Lost Traps
- Configuring the SNMP Server Event Manager
- Event MIB Purpose
- Event MIB Structure
- Trigger Table
- Objects Table
- Event Table
- Configuration Tasks
- Defining a Boolean Test
- Defining an Existence
Test
- Defining a Threshold
Test
- Monitoring Events
- Collecting Bulk Statistics
- Interface Strings
- Understanding Counter Discontinuity
- Configuring Collectors and Receivers
- Deleting All Bulkstats Configurations
- Monitoring Collection Statistics
- Understanding Schemas
- If-Stats Schema Objects
- IGMP Schema Objects
- Policy Schema Objects
- QoS Schema Objects
- Configuring Schemas
- Mapping Bulkstats Output to MIB Flies and CLI Configurations
for Bulk Statistics Schema
- Monitoring Schema Statistics
- Configuring Interface Numbering Mode
- Using the Bulk Statistics Formatter
- Setting Remote Filenames
- Guidelines
- Specifying End of Line Format
- Managing Virtual Routers
- Monitoring SNMP
- Establishing a Baseline
- Viewing SNMP Status
- Output Filtering
- Managing the System
- Overview
- Platform Considerations
- Naming the System
- Configuring the Switch Fabric Bandwidth
- Configuring Timing
- Monitoring Timing
- Using the CLI
- Managing vty Lines
- Configuring vty Lines
- Monitoring vty Lines
- Clearing Lines
- Monitoring the Current Configuration
- Defining the Configuration Output Format
- Customizing the Configuration Output
- Detecting Corrupt File Configurations
- Automatically Recovering Corrupt Configuration Files
- Configuring the System Automatically
- Saving the Current Configuration
- Using the Desktop Tool for Viewing Uncompressed Text Configuration
- Installation Prerequisites for the Desktop Tool
- Requirements for Microsoft Windows Systems
- Requirements for Sun Solaris Systems
- Requirements for Linux Systems
- Usage Notes for the Perl Script
- Customizing the User Interface
- Setting the Console Speed
- Configuring the Display Terminal
- Specifying the Character Set
- Configuring Login Conditions
- Setting Time Limits for User Login
- Setting Time Limits for User Input
- Configuring CLI Messages
- Monitoring the Console Settings
- Sending Messages
- Managing Memory
- Managing Files
- Managing the User Space from a Network Host
- File Commands and FTP Servers
- Renaming Files
- Deleting Files
- Monitoring Files
- Viewing Files
- Transferring Files
- References
- Copying and Redirecting Files
- Using the copy Command
- copy Command Examples
- Using TFTP to Transfer Files
- Configuring the FTP Server
- Features
- FTP Passive Mode
- Configuring Authentication
- Configuration Tasks
- Configuration Example
- Monitoring the FTP Server
- Copying Partial Releases
- Configuring the NFS Client
- References
- Prerequisites
- Configuration Tasks
- Monitoring the NFS Client
- Using a Loopback Interface
- Using the Telnet Client
- Configuring DNS
- References
- Assigning Name Servers
- Using One Name Resolver for Multiple Virtual Routers
- Monitoring DNS
- Troubleshooting the System
- Creating Core Dump Files
- Boot Mode
- Global Configuration Mode
- Managing Core Dump Files
- Enabling and Disabling the Core Dump Monitor
- Specifying the Core Dump Monitor Interval
- Viewing Core Dump Monitor Status
- Accessing the Core Dump File
- Capturing and Writing Core Dumps
- Understanding the Core Dump File
- Tracking IP Prefix Reachability
- Gathering Information for Customer Support
- Managing and Monitoring Resources
- Enabling and Disabling the Resource Threshold Monitor
- Viewing Resource Threshold Information
- Monitoring the System
- Managing Modules
- Overview
- Platform Considerations
- ERX7xx Models, ERX14xx Models, and the ERX310 Broadband Services
Router
- Line Modules and I/O Modules
- SRP Modules
- E120 and E320 Broadband Services Routers
- Line Modules and IOAs
- SRP Modules and SFMs
- Disabling and Reenabling Line Modules, SRP Modules, and SFMs
- Disabling and Reenabling IOAs
- Removing an SRP Module
- Replacing Line Modules on ERX Routers, the E120 Router, and
the E320 Router
- Replacing a Line Module by Erasing the Slot Configuration
- Replacing a Line Module Without Erasing the Slot Configuration
- Replacing IOAs on the E120 Router and the E320 Router
- Replacing SRP Modules and SFMs
- Software Compatibility
- Line Modules
- I/O Modules and IOAs
- Configuring Performance Rate of Line Modules on ERX7xx Models
and the ERX1410 Router
- Choosing a Combination of Line Modules
- Slot Groups
- SRP Modules Bandwidth
- Line Modules Bandwidth
and Switch Usage
- Allowed Combinations for
Line Rate Performance
- Specifying the Type of Performance
- Monitoring Bandwidth Oversubscription
- Troubleshooting Bandwidth Oversubscription
- Managing Flash Cards on SRP Modules
- Flash Features
- Flash Features on the E120 Router and the E320 Router
- Installing and Removing Flash Cards
- Synchronizing Flash Cards
- Synchronizing
Flash Cards of Different Capacities
- Disabling Autosynchronization
- Validating and Recovering Redundant SRP File Integrity
- Reformatting the Primary Flash Card
- Copying the Image on the Primary SRP Module
- Scanning Flash Cards
- Monitoring Flash Cards
- Updating the Router with JunosE Hotfix Files
- Hotfix Compatibility and Dependency
- Removing Hotfixes
- Hotfixes and Backup Settings
- Hotfixes and Standby SRP Modules
- Hotfixes and Line Modules
- Monitoring Hotfixes
- Example: Using
and Monitoring Hotfixes
- Managing the Ethernet Port on the SRP Module
- Monitoring Statistics
- Monitoring the Ethernet Configuration for the SRP Module
- Enabling Warm Restart Diagnostics on Modules
- Enabling Warm Restart Diagnostics
- Enabling Diagnostics
- Ignoring Diagnostic Test Failures
- Monitoring Modules
- Passwords and Security
- Overview
- Platform Considerations
- Setting Basic Password Parameters
- Creating Encrypted Passwords
- Creating Secrets
- Encrypting Passwords in Configuration File
- Commands and Guidelines
- Setting and Erasing Passwords
- Privilege Levels
- Accessing Privilege Levels
- Setting Enable Passwords
- Erasing Enable Passwords
- Setting a Console Password
- Erasing the Console Password
- Monitoring Passwords
- Vty Line Authentication and Authorization
- Configuring Simple Authentication
- Configuring AAA Authentication and AAA Authorization
- Virtual Terminal Access Lists
- Secure System Administration with SSH
- Transport
- User Authentication
- Connection
- Key Management
- User Key Management
- Host Key Management
- Performance
- Security Concerns
- Before You Configure SSH
- SSH Configuration Tasks
- Configuring Encryption
- Configuring User Authentication
- Configuring Message Authentication
- Enabling and Disabling SSH
- Displaying SSH Status
- Terminating an SSH Session
- Restricting User Access
- Restricting Access to Commands with RADIUS
- Per-User Enable Authentication
- Restricting Access to Virtual Routers
- VSA Configuration Examples
- Commands Available to Users
- Denial of Service (DoS) Protection
- Suspicious Control Flow Detection
- Suspicious Control Flow Monitoring
- Configurable Options
- Display Options
- Traps and Logs
- Suspicious Control Flow Commands
- Monitoring Suspicious Control Flow
- Denial-of-Service Protection Groups
- Group Parameters
- Attaching Groups
- Protocol Mapping
- DoS Protection Group Configuration Example
- DoS Protection Group Commands
- Monitoring DoS Protection Groups
- Writing CLI Macros
- Platform Considerations
- Writing Macros
- Environment Commands
- Capturing Output of Commands
- Adding Regular Expression Matching to Macros
- Extracting a Substring Based on Regular Expression Matching
- Adding Global Variables for Availability to the onError Macro
- Unique IDs for Macros
- Accurate Use of Error Status When Accessed Ourside of onError
Macro
- Variables
- Literals
- Operators
- Assignment
- Increment
and Decrement
- String Operations
- Extraction
Operations
- Arithmetic Operations
- Relational Operations
- Logical Operations
- Miscellaneous
Operations
- Conditional Execution
- If Constructs
- While Constructs
- Passing Parameters in Macros
- Generating Macro Output
- Invoking Other Macros
- Detecting and Recording Macro Errors
- Detectable Macro Errors
- Logging Macro Results
- Viewing Macro Errors
- onError Macro Examples
- Detecting Invalid Command Formats
- Detecting Invalid Commands
- Detecting Missing Macros
- Running Macros
- Scheduling Macros
- Practical Examples
- Configuring Frame Relay
- Configuring ATM Interfaces
- Booting the System
- Platform Considerations
- Configuring Your System for Booting
- Booting the GE-2 Line Module
- Rebooting Your System
- Rebooting When a Command Takes a Prolonged Time to Execute
- Configuration Caching
- Operations in Boot Mode
- Displaying Boot Information
- Output Filtering
- Configuring the System Clock
- Overview
- NTP
- System Operation as an NTP Client
- Synchronization
- Preliminary Synchronization
- Frequency Calibration
- Progressive Synchronization
- System Operation as an NTP Server
- Platform Considerations
- References
- Setting the System Clock Manually
- Before You Configure NTP
- Choosing NTP Servers
- NTP Configuration Tasks
- Enabling NTP Services
- NTP Client Configuration
- Directing Responses
from NTP Servers
- Refusing Broadcasts from NTP Servers
- NTP Server Configuration
- Configuration Examples
- Monitoring NTP
- Configuring Virtual Routers
- Overview
- Default Virtual Router
- Virtual Router Instances
- Routing Protocols
- VPNs and VRFs
- VPNs
- VRFs
- Platform Considerations
- References
- Configuring Virtual Routers
- Monitoring Virtual Routers
- Reference Material
- Abbreviations and Acronyms
- References
- RFCs
- Draft RFCs
- Other Software Standards
- Hardware Standards
- Index
- Index