Table of Contents
- About the Documentation
- Chapters
- Planning Your Network
- Platform Considerations
- Edge Applications Overview
- Layered Approach
- Line Modules, I/O Modules, and IOAs
- Interfaces
- General Configuration Tasks
- Configuring Virtual Routers
- Configuring IPSec
- Configuring Physical Layer Interfaces
- Line Module Features
- Configurable HDLC Parameters
- Configuring Channelized T3 Interfaces
- Configuring T3 and E3 Interfaces
- Configuring OCx/STMx and OC48 Interfaces
- Configuring Channelized OCx/STMx Line Interfaces
- Configuring Ethernet Interfaces
- Configuring IPSec-Service Interfaces
- Configuring Tunnel Service Interfaces
- Configuring Data Link-Layer Interfaces
- Configuring IP Tunnels, Shared IP Interfaces, and Subscriber Interfaces
- Configuring Routing Protocols
- Configuring VRRP
- Configuring Routing Policy
- Configuring QoS
- Configuring Policy Management
- Configuring Remote Access
- Command-Line Interface
- Overview
- Platform Considerations
- Accessing the CLI
- CLI Command Privileges
- CLI Privilege Groups
- Examples Using Privilege Group Membership
- CLI Command Exceptions
- CLI Keyword Mapping
- Setting Privileges for Ambiguous Commands
- Setting Privilege Levels for no or default Versions
- Setting Privilege Levels for Multiple Commands
- Setting Default Line Privilege
- Viewing CLI Privilege Information
- Using Help
- Using Command-Line Editing
- Accessing Command Modes
- Exec Modes
- Global Configuration Mode
- AAA Profile Configuration Mode
- Address Family Configuration Mode
- ATM VC Configuration Mode
- ATM VC Class Configuration Mode
- Classifier Group Configuration Mode
- Color Mark Profile Configuration Mode
- Control Plane Configuration Mode
- Controller Configuration Mode
- DHCP Local Pool Configuration Mode
- Domain Map Configuration Mode
- Domain Map Tunnel Configuration Mode
- DoS Protection Group Configuration Mode
- Drop Profile Configuration Mode
- Explicit Path Configuration Mode
- Flow Cache Configuration Mode
- Interface Configuration Mode
- IP NAT Pool Configuration Mode
- IP PIM Data MDT Configuration Mode
- IP Service Profile Configuration Mode
- IPSec CA Identity Configuration Mode
- IPSec Identity Configuration Mode
- IPSec IKE Policy Configuration Mode
- IPSec Manual Key Configuration Mode
- IPSec Peer Public Key Configuration Mode
- IPSec Transport Profile Configuration Mode
- IPSec Tunnel Profile Configuration Mode
- IP Tunnel Destination Profile Mode
- IPv6 Local Pool Configuration Mode
- L2 Transport Load-Balancing-Circuit Configuration Mode
- L2TP Destination Profile Configuration Mode
- L2TP Destination Profile Host Configuration Mode
- L2TP Tunnel Switch Profile Configuration Mode
- Layer 2 Control Configuration Mode
- Layer 2 Control Neighbor Configuration Mode
- LDP Configuration Mode
- Line Configuration Mode
- Local IPSec Transport Profile Configuration
- Local User Configuration Mode
- Map Class Configuration Mode
- Map List Configuration Mode
- Parent Group Configuration Mode
- Policy List Configuration Mode
- Policy List Parent Group Configuration Mode
- Policy Parameter Configuration Mode
- PPPoE Service Name Table Configuration Mode
- Profile Configuration Mode
- QoS Interface Set Configuration Mode
- QoS Interface Superset Configuration Mode
- QoS Parameter Definition Configuration Mode
- QoS Profile Configuration Mode
- QoS Shared Shaper Control Configuration
- Queue Profile Configuration Mode
- RADIUS Configuration Mode
- RADIUS Relay Configuration Mode
- Rate Limit Profile Configuration Mode
- Redundancy Configuration Mode
- Remote Neighbor Configuration Mode
- Route Map Configuration Mode
- Router Configuration Mode
- RSVP Configuration Mode
- RTR Configuration Mode
- Scheduler Profile Configuration Mode
- Service Session Profile Configuration Mode
- SNMP Event Manager Configuration Mode
- Statistics Profile Configuration Mode
- Subinterface Configuration Mode
- Subscriber Policy Configuration Mode
- Traffic Class Configuration Mode
- Traffic Class Group Configuration Mode
- Tunnel Group Configuration Mode
- Tunnel Group Tunnel Configuration Mode
- Tunnel Profile Configuration Mode
- Tunnel Server Configuration Mode
- VRF Configuration Mode
- VR Group Configuration Mode
- Installing JunosE Software
- Overview
- Platform Considerations
- Installing Software When a Firewall Exists
- Task 1: Obtain the Required Information
- Task 2: Divert Network Traffic to Another Router
- Task 3: Access Privileged Exec Mode
- Task 4: Configure IP on an Interface
- Task 5: Copy the Release Files to the Network Host
- Task 6: Configure Access to the Network Host
- Task 7: Enable the FTP Server on the Router
- Task 8: Identify the Files to Transfer
- Task 9: Transfer Files to the User Space
- Task 10: Install Files on the System Space
- Task 11: Save the Current Configuration
- Task 12: Reboot the System
- Installing Software When a Firewall Does Not Exist
- Installing Software in Normal Operational Mode
- Task 1: Obtain the Required Information
- Task 2: Divert Network Traffic to Another Router
- Task 3: Access Privileged Exec Mode
- Task 4: Configure IP on an Interface
- Task 5: Configure Access to the Network Host
- Task 6: Copy the Release Files to the Network Host
- Task 7: Copy the Software Release File to the Router
- Task 8: Save the Current Configuration
- Task 9: Reboot the System
- Installing Software in Boot Mode
- Task 1: Obtain the Required Information
- Task 2: Divert Network Traffic to Another System
- Task 3: Access the Boot Mode
- Task 4: Assign an IP Address
- Task 5: Configure Access to the Network Host
- Task 6: Resetting the SRP Module
- Task 7: Copy the Release Files to the Network Host
- Task 8: Copy the Software Release File to the Router
- Task 9: Reboot the System
- Copying Release Files from One Router to Another
- Upgrading Systems That Are Operating with Two SRP Modules
- Upgrading JunosE Software
- Downgrading JunosE Software
- Configuring SNMP
- Overview
- Platform Considerations
- References
- Before You Configure SNMP
- SNMP Configuration Tasks
- Configuring Traps
- Configuring the SNMP Server Event Manager
- Collecting Bulk Statistics
- Interface Strings
- Understanding Counter Discontinuity
- Configuring Collectors and Receivers
- Deleting All Bulkstats Configurations
- Monitoring Collection Statistics
- Understanding Schemas
- Configuring Schemas
- Mapping Bulkstats Output to MIB Flies and CLI Configurations for Bulk Statistics Schema
- Monitoring Schema Statistics
- Configuring Interface Numbering Mode
- Using the Bulk Statistics Formatter
- Managing Virtual Routers
- Monitoring SNMP
- Managing the System
- Overview
- Platform Considerations
- Naming the System
- Configuring the Switch Fabric Bandwidth
- Configuring Timing
- Using the CLI
- Managing vty Lines
- Clearing Lines
- Monitoring the Current Configuration
- Configuring the System Automatically
- Saving the Current Configuration
- Using the Desktop Tool for Viewing Uncompressed Text Configuration
- Customizing the User Interface
- Sending Messages
- Managing Memory
- Managing Files
- Transferring Files
- Configuring the NFS Client
- Using a Loopback Interface
- Using the Telnet Client
- Configuring DNS
- Troubleshooting the System
- Managing and Monitoring Resources
- Monitoring the System
- Managing Modules
- Overview
- Platform Considerations
- Disabling and Reenabling Line Modules, SRP Modules, and SFMs
- Disabling and Reenabling IOAs
- Removing an SRP Module
- Replacing Line Modules on ERX Routers, the E120 Router, and the E320 Router
- Replacing IOAs on the E120 Router and the E320 Router
- Software Compatibility
- Configuring Performance Rate of Line Modules on ERX7xx Models and the ERX1410 Router
- Managing Flash Cards on SRP Modules
- Flash Features
- Flash Features on the E120 Router and the E320 Router
- Installing and Removing Flash Cards
- Synchronizing Flash Cards
- Validating and Recovering Redundant SRP File Integrity
- Reformatting the Primary Flash Card
- Copying the Image on the Primary SRP Module
- Scanning Flash Cards
- Monitoring Flash Cards
- Updating the Router with JunosE Hotfix Files
- Managing the Ethernet Port on the SRP Module
- Enabling Warm Restart Diagnostics on Modules
- Ignoring Diagnostic Test Failures
- Monitoring Modules
- Passwords and Security
- Overview
- Platform Considerations
- Setting Basic Password Parameters
- Setting and Erasing Passwords
- Vty Line Authentication and Authorization
- Virtual Terminal Access Lists
- Secure System Administration with SSH
- Restricting User Access
- Denial of Service (DoS) Protection
- Suspicious Control Flow Detection
- Suspicious Control Flow Monitoring
- Configurable Options
- Display Options
- Traps and Logs
- Suspicious Control Flow Commands
- Monitoring Suspicious Control Flow
- Denial-of-Service Protection Groups
- Group Parameters
- Attaching Groups
- Protocol Mapping
- DoS Protection Group Configuration Example
- DoS Protection Group Commands
- Monitoring DoS Protection Groups
- Writing CLI Macros
- Platform Considerations
- Writing Macros
- Environment Commands
- Capturing Output of Commands
- Adding Regular Expression Matching to Macros
- Extracting a Substring Based on Regular Expression Matching
- Adding Global Variables for Availability to the onError Macro
- Unique IDs for Macros
- Accurate Use of Error Status When Accessed Ourside of onError Macro
- Variables
- Literals
- Operators
- Arithmetic Operations
- Conditional Execution
- Passing Parameters in Macros
- Generating Macro Output
- Invoking Other Macros
- Detecting and Recording Macro Errors
- Running Macros
- Scheduling Macros
- Practical Examples
- Booting the System
- Configuring the System Clock
- Configuring Virtual Routers
- Reference Material
- Index
Hide Navigation Pane
Show Navigation Pane
SHA1