Table of Contents
- About the Documentation
- Chapters
- Planning Your Network
- Platform Considerations
- Edge Applications Overview
- Layered Approach
- Line Modules, I/O Modules, and IOAs
- Interfaces
- General Configuration Tasks
- Configuring Virtual Routers
- Configuring IPsec
- Configuring Physical Layer Interfaces
- Line Module Features
- Configurable HDLC Parameters
- Configuring Channelized T3 Interfaces
- Configuring T3 and E3 Interfaces
- Configuring OCx/STMx and OC48 Interfaces
- Configuring Channelized OCx/STMx Line Interfaces
- Configuring Ethernet Interfaces
- Configuring IPsec Service Interfaces
- Configuring Tunnel Service Interfaces
- Configuring Data Link-Layer Interfaces
- Configuring IP Tunnels, Shared IP Interfaces, and Subscriber Interfaces
- Configuring Routing Protocols
- Configuring VRRP
- Configuring Routing Policy
- Configuring QoS
- Configuring Policy Management
- Configuring Remote Access
- Command-Line Interface
- Overview
- Platform Considerations
- Accessing the CLI
- CLI Command Privileges
- CLI Privilege Groups
- Examples Using Privilege Group Membership
- CLI Command Exceptions
- CLI Keyword Mapping
- Setting Privileges for Ambiguous Commands
- Setting Privilege Levels for no or default Versions
- Setting Privilege Levels for Multiple Commands
- Setting Default Line Privilege
- Viewing CLI Privilege Information
- Using Help
- Using Command-Line Editing
- Accessing Command Modes
- Exec Modes
- Global Configuration Mode
- AAA Profile Configuration Mode
- Address Family Configuration Mode
- ATM VC Configuration Mode
- ATM VC Class Configuration Mode
- Classifier Group Configuration Mode
- Color Mark Profile Configuration Mode
- Control Plane Configuration Mode
- Controller Configuration Mode
- DHCP Local Pool Configuration Mode
- Domain Map Configuration Mode
- Domain Map Tunnel Configuration Mode
- DoS Protection Group Configuration Mode
- Drop Profile Configuration Mode
- Explicit Path Configuration Mode
- Flow Cache Configuration Mode
- Interface Configuration Mode
- IP NAT Pool Configuration Mode
- IP PIM Data MDT Configuration Mode
- IP Service Profile Configuration Mode
- IPsec CA Identity Configuration Mode
- IPsec Identity Configuration Mode
- IPsec IKE Policy Configuration Mode
- IPsec Manual Key Configuration Mode
- IPsec Peer Public Key Configuration Mode
- IPsec Transport Profile Configuration Mode
- IPsec Tunnel Profile Configuration Mode
- IP Tunnel Destination Profile Mode
- IPv6 Local Pool Configuration Mode
- L2 Transport Load-Balancing-Circuit Configuration Mode
- L2TP Destination Profile Configuration Mode
- L2TP Destination Profile Host Configuration Mode
- L2TP Tunnel Switch Profile Configuration Mode
- Layer 2 Control Configuration Mode
- Layer 2 Control Neighbor Configuration Mode
- LDP Configuration Mode
- Line Configuration Mode
- Local IPsec Transport Profile Configuration
- Local User Configuration Mode
- Map Class Configuration Mode
- Map List Configuration Mode
- Parent Group Configuration Mode
- Policy List Configuration Mode
- Policy List Parent Group Configuration Mode
- Policy Parameter Configuration Mode
- PPPoE Service Name Table Configuration Mode
- Profile Configuration Mode
- QoS Interface Set Configuration Mode
- QoS Interface Superset Configuration Mode
- QoS Parameter Definition Configuration Mode
- QoS Profile Configuration Mode
- QoS Shared Shaper Control Configuration
- Queue Profile Configuration Mode
- RADIUS Configuration Mode
- RADIUS Relay Configuration Mode
- Rate Limit Profile Configuration Mode
- Redundancy Configuration Mode
- Remote Neighbor Configuration Mode
- Route Map Configuration Mode
- Router Configuration Mode
- RSVP Configuration Mode
- RTR Configuration Mode
- Scheduler Profile Configuration Mode
- Service Session Profile Configuration Mode
- SNMP Event Manager Configuration Mode
- Statistics Profile Configuration Mode
- Subinterface Configuration Mode
- Subscriber Policy Configuration Mode
- Traffic Class Configuration Mode
- Traffic Class Group Configuration Mode
- Tunnel Group Configuration Mode
- Tunnel Group Tunnel Configuration Mode
- Tunnel Profile Configuration Mode
- Tunnel Server Configuration Mode
- VRF Configuration Mode
- VR Group Configuration Mode
- Installing JunosE Software
- Overview
- Platform Considerations
- Installing Software When a Firewall Exists
- Task 1: Obtain the Required Information
- Task 2: Divert Network Traffic to Another Router
- Task 3: Access Privileged Exec Mode
- Task 4: Configure IP on an Interface
- Task 5: Copy the Release Files to the Network Host
- Task 6: Configure Access to the Network Host
- Task 7: Enable the FTP Server on the Router
- Task 8: Identify the Files to Transfer
- Task 9: Transfer Files to the User Space
- Task 10: Install Files on the System Space
- Task 11: Save the Current Configuration
- Task 12: Reboot the System
- Installing Software When a Firewall Does Not Exist
- Installing Software in Normal Operational Mode
- Task 1: Obtain the Required Information
- Task 2: Divert Network Traffic to Another Router
- Task 3: Access Privileged Exec Mode
- Task 4: Configure IP on an Interface
- Task 5: Configure Access to the Network Host
- Task 6: Copy the Release Files to the Network Host
- Task 7: Copy the Software Release File to the Router
- Task 8: Save the Current Configuration
- Task 9: Reboot the System
- Installing Software in Boot Mode
- Task 1: Obtain the Required Information
- Task 2: Divert Network Traffic to Another System
- Task 3: Access the Boot Mode
- Task 4: Assign an IP Address
- Task 5: Configure Access to the Network Host
- Task 6: Resetting the SRP Module
- Task 7: Copy the Release Files to the Network Host
- Task 8: Copy the Software Release File to the Router
- Task 9: Reboot the System
- Copying Release Files from One Router to Another
- Upgrading Systems That Are Operating with Two SRP Modules
- Upgrading JunosE Software
- Downgrading JunosE Software
- Configuring SNMP
- Overview
- Platform Considerations
- References
- Before You Configure SNMP
- SNMP Configuration Tasks
- Configuring Traps
- Configuring the SNMP Server Event Manager
- Collecting Bulk Statistics
- Interface Strings
- Understanding Counter Discontinuity
- Configuring Collectors and Receivers
- Deleting All Bulkstats Configurations
- Monitoring Collection Statistics
- Understanding Schemas
- Configuring Schemas
- Mapping Bulkstats Output to MIB Flies and CLI Configurations for Bulk Statistics Schema
- Monitoring Schema Statistics
- Configuring Interface Numbering Mode
- Using the Bulk Statistics Formatter
- Managing Virtual Routers
- Monitoring SNMP
- Managing the System
- System Management Overview
- System Management Platform Considerations
- Naming the System
- Configuring the Switch Fabric Bandwidth
- Configuring System Timing
- Navigating the CLI
- Configuring vty Lines
- Clearing vty and Console Lines
- Configuration Output Organization
- Managing System Configuration Files
- Autoconfiguration Script for the System Overview
- Overview of Saving the Current System Configuration
- Saving the Current System Configuration
- Using the Desktop Tool for Viewing the Uncompressed Text Configuration
- Customizing the User Interface
- Sending Messages to the Terminals
- Memory Management Overview
- File Management
- Transferring Files
- File Transfer Overview
- File Transfer Protocols References
- Overview of Copying and Redirecting Files
- Types of Files Transferred Using the copy Command
- Transferring Files Between the System Space and a Network Host
- Copying a File
- Adding or Modifying an Entry in the Host Table
- Determining the Encrypted Values for Usernames and Passwords
- Configuring the Source Interface for FTP Packets
- Example: Copying a File Using the copy Command
- Redirecting the Output of a Command to a Remote File
- File Transfer Using TFTP Overview
- FTP Server
- Example: Copying Partial Releases
- NFS Client
- Configuring a Loopback Interface
- Configuring the Embedded Telnet Client
- Domain Name Service
- Troubleshooting the System Using Core Dump Files
- Tracking IP Prefix Reachability
- Gathering Information for Customer Support
- Managing the Resource Threshold Monitor
- Monitoring the System
- Setting the Baseline for the Most Recent Delta Count Statistics
- Monitoring System Timing Settings
- Monitoring vty Lines
- Monitoring the Current Configuration of the System in Auto Commit Mode
- Monitoring the Current Configuration of the System in Manual Commit Mode
- Displaying the Background Monitoring Time of the SRP
- Monitoring Console Sessions
- Monitoring Files
- Monitoring the FTP Server
- Monitoring the Subsystems in the Software Release or Release File
- Monitoring the NFS Client
- Monitoring the Name Servers on the System
- Monitoring the Core Dump
- Monitoring the IP Prefix Reachability Tracking Details
- Monitoring Gathered Technical Support Information
- Monitoring Resource Threshold Information
- Monitoring the Physical Environment of the Router
- Monitoring the Multicast-to-Unicast Ratio for the Router Switch Fabric
- Monitoring Memory Management Protection Information
- Monitoring CPU Usage
- Monitoring Memory-Related Resources Used by the System Processes
- Monitoring the History of System and Module Resets
- Monitoring the Armed and Running Releases in the Router
- Managing Modules
- Overview
- Platform Considerations
- Disabling and Reenabling Line Modules, SRP Modules, and SFMs
- Disabling and Reenabling IOAs
- Removing an SRP Module
- Replacing Line Modules on ERX Routers, the E120 Router, and the E320 Router
- Replacing IOAs on the E120 Router and the E320 Router
- Software Compatibility
- Configuring Performance Rate of Line Modules on ERX7xx Models and the ERX1410 Router
- Managing Flash Cards on SRP Modules
- Flash Features
- Flash Features on the E120 Router and the E320 Router
- Installing and Removing Flash Cards
- Synchronizing Flash Cards
- Validating and Recovering Redundant SRP File Integrity
- Reformatting the Primary Flash Card
- Copying the Image on the Primary SRP Module
- Scanning Flash Cards
- Monitoring Flash Cards
- Updating the Router with JunosE Hotfix Files
- Managing the Ethernet Port on the SRP Module
- Enabling Warm Restart Diagnostics on Modules
- Ignoring Diagnostic Test Failures
- Monitoring Modules
- Passwords and Security
- Passwords and Security Overview
- Passwords and Security Platform Considerations
- Setting Basic and Enable Password Parameters
- Setting and Erasing Passwords
- Vty Line Authentication and Authorization Overview
- Configuring Simple Vty Line Authentication
- Configuring AAA Authentication and AAA Authorization for Vty Lines
- Setting Virtual Terminal Access Lists
- Secure System Administration with SSH Overview
- Configuring SSH
- Monitoring the Current Status of the SSH Server
- Restricting User Access Overview
- Understanding DoS Protection
- DoS Protection Group Configuration Example
- Monitoring DoS Protection Groups
- Monitoring Suspicious Control Flow Statistics
- Monitoring Suspicious Flows
- Monitoring Suspicious Flow Information
- Monitoring Suspicious Control Flow Protocol
- Writing CLI Macros
- Platform Considerations
- Writing Macros
- Environment Commands
- Capturing Output of Commands
- Adding Regular Expression Matching to Macros
- Extracting a Substring Based on Regular Expression Matching
- Adding Global Variables for Availability to the onError Macro
- Unique IDs for Macros
- Accurate Use of Error Status When Accessed Outside of onError Macro
- Variables
- Literals
- Operators
- Arithmetic Operations
- Conditional Execution
- Passing Parameters in Macros
- Generating Macro Output
- Invoking Other Macros
- Detecting and Recording Macro Errors
- Running Macros
- Scheduling Macros
- Practical Examples
- Booting the System
- Configuring the System Clock
- Configuring Virtual Routers
- Reference Material
- Index
Hide Navigation Pane
Show Navigation Pane
SHA1