
JunosE 13.2.x System Basics Configuration Guide
Copyright and Trademark Information
Table of Contents
List of Figures
List of Tables
About the Documentation
Chapters
Planning Your Network
Platform Considerations
Edge Applications Overview
Layered Approach
Line Modules, I/O Modules, and IOAs
Interfaces
General Configuration Tasks
Configuring Virtual Routers
Configuring IPsec
Configuring Physical Layer Interfaces
Line Module Features
Configurable HDLC Parameters
Configuring Channelized T3 Interfaces
Configuring T3 and E3 Interfaces
Configuring OCx/STMx and OC48 Interfaces
Configuring Channelized OCx/STMx Line Interfaces
Configuring Ethernet Interfaces
Configuring IPsec Service Interfaces
Configuring Tunnel Service Interfaces
Configuring Data Link-Layer Interfaces
Configuring IP Tunnels, Shared IP Interfaces, and Subscriber
Interfaces
Configuring Routing Protocols
Configuring VRRP
Configuring Routing Policy
Configuring QoS
Configuring Policy Management
Configuring Remote Access
Command-Line Interface
Overview
Platform Considerations
Accessing the CLI
CLI Command Privileges
CLI Privilege Groups
Examples Using Privilege Group Membership
CLI Command Exceptions
CLI Keyword Mapping
Setting Privileges for Ambiguous Commands
Setting Privilege Levels for no or default Versions
Setting Privilege Levels for Multiple Commands
Setting Default Line Privilege
Viewing CLI Privilege Information
Using Help 
Using Command-Line Editing
Accessing Command Modes
Exec Modes
Global Configuration Mode
AAA Profile Configuration Mode
Address Family Configuration Mode
ATM VC Configuration Mode
ATM VC Class Configuration Mode
Classifier Group Configuration Mode
Color Mark Profile Configuration Mode
Control Plane Configuration Mode
Controller Configuration Mode
DHCP Local Pool Configuration Mode
Domain Map Configuration Mode
Domain Map Tunnel Configuration Mode
DoS Protection Group Configuration Mode
Drop Profile Configuration Mode
Explicit Path Configuration Mode
Flow Cache Configuration Mode
Interface Configuration Mode
IP NAT Pool Configuration Mode
IP PIM Data MDT Configuration Mode
IP Service Profile Configuration Mode
IPsec CA Identity Configuration Mode
IPsec Identity Configuration Mode
IPsec IKE Policy Configuration Mode
IPsec Manual Key Configuration Mode
IPsec Peer Public Key Configuration Mode
IPsec Transport Profile Configuration Mode
IPsec Tunnel Profile Configuration Mode
IP Tunnel Destination Profile Mode
IPv6 Local Pool Configuration Mode
L2 Transport Load-Balancing-Circuit Configuration Mode
L2TP Destination Profile Configuration Mode
L2TP Destination Profile Host Configuration Mode
L2TP Tunnel Switch Profile Configuration Mode
Layer 2 Control Configuration Mode
Layer 2 Control Neighbor Configuration Mode
LDP Configuration Mode
Line Configuration Mode
Local IPsec Transport Profile Configuration
Local User Configuration Mode
Map Class Configuration Mode
Map List Configuration Mode
Parent Group Configuration Mode
Policy List Configuration Mode
Policy List Parent Group Configuration Mode
Policy Parameter Configuration Mode
PPPoE Service Name Table Configuration Mode
Profile Configuration Mode
QoS Interface Set Configuration Mode
QoS Interface Superset Configuration Mode
QoS Parameter Definition Configuration Mode
QoS Profile Configuration Mode
QoS Shared Shaper Control Configuration
Queue Profile Configuration Mode
RADIUS Configuration Mode
RADIUS Relay Configuration Mode
Rate Limit Profile Configuration Mode
Redundancy Configuration Mode
Remote Neighbor Configuration Mode
Route Map Configuration Mode
Router Configuration Mode
RSVP Configuration Mode
RTR Configuration Mode
Scheduler Profile Configuration Mode
Service Session Profile Configuration Mode
SNMP Event Manager Configuration Mode
Statistics Profile Configuration Mode
Subinterface Configuration Mode
Subscriber Policy Configuration Mode
Traffic Class Configuration Mode
Traffic Class Group Configuration Mode
Tunnel Group Configuration Mode
Tunnel Group Tunnel Configuration Mode
Tunnel Profile Configuration Mode
Tunnel Server Configuration Mode
VRF Configuration Mode
VR Group Configuration Mode
Installing JunosE Software 
Overview
Platform Considerations
Installing Software When a Firewall Exists
Task 1: Obtain the Required Information
Task 2: Divert Network Traffic to Another Router
Task 3: Access Privileged Exec Mode
Task 4: Configure IP on an Interface
Task 5: Copy the Release Files to the Network Host
Task 6: Configure Access to the Network Host
Task 7: Enable the FTP Server on the Router
Task 8: Identify the Files to Transfer
Task 9: Transfer Files to the User Space
Task 10: Install Files on the System Space
Task 11: Save the Current Configuration
Task 12: Reboot the System
Installing Software When a Firewall Does Not Exist
Installing Software in Normal Operational Mode
Task 1: Obtain the Required Information
Task 2: Divert Network Traffic to Another Router
Task 3: Access Privileged Exec Mode
Task 4: Configure IP on an Interface
Task 5: Configure Access to the Network Host
Task 6: Copy the Release Files to the Network Host
Task 7: Copy the Software Release File to the Router
Task 8: Save the Current Configuration
Task 9: Reboot the System
Installing Software in Boot Mode
Task 1: Obtain the Required Information
Task 2: Divert Network Traffic to Another System
Task 3: Access the Boot Mode
Task 4: Assign an IP Address
Task 5: Configure Access to the Network Host
Task 6: Resetting the SRP Module
Task 7: Copy the Release Files to the Network Host
Task 8: Copy the Software Release File to the Router
Task 9: Reboot the System
Copying Release Files from One Router to Another
Upgrading Systems That Are Operating with Two SRP Modules
Upgrading JunosE Software
Downgrading JunosE Software
Configuring SNMP 
Overview
Platform Considerations
References
Before You Configure SNMP
SNMP Configuration Tasks
Configuring Traps
Configuring the SNMP Server Event Manager
Collecting Bulk Statistics
Interface Strings
Understanding Counter Discontinuity
Configuring Collectors and Receivers
Deleting All Bulkstats Configurations
Monitoring Collection Statistics 
Understanding Schemas
Configuring Schemas
Mapping Bulkstats Output to MIB Flies and CLI Configurations
for Bulk Statistics Schema
Monitoring Schema Statistics
Configuring Interface Numbering Mode
Using the Bulk Statistics Formatter
Managing Virtual Routers
Monitoring SNMP
Managing the System
System Management Overview
System Management Platform Considerations
Naming the System
Configuring the Switch Fabric Bandwidth
Configuring System Timing
Navigating the CLI
Configuring vty Lines
Clearing vty and Console Lines
Configuration Output Organization
Managing System Configuration Files
Autoconfiguration Script for the System Overview
Overview of Saving the Current System Configuration
Saving the Current System Configuration
Using the Desktop Tool for Viewing the Uncompressed Text Configuration
Customizing the User Interface
Sending Messages to the Terminals
Memory Management Overview
File Management
Transferring Files
File Transfer Overview
File Transfer Protocols References
Overview of Copying and Redirecting Files
Types of Files Transferred Using the copy Command
Transferring Files Between the System Space and a Network Host
Copying a File
Adding or Modifying an Entry in the Host Table
Determining the Encrypted Values for Usernames and Passwords
Configuring the Source Interface for FTP Packets
Example: Copying a File Using the copy Command
Redirecting the Output of a Command to a Remote File
File Transfer Using TFTP Overview
FTP Server
Example: Copying Partial Releases
NFS Client
Configuring a Loopback Interface
Configuring the Embedded Telnet Client
Domain Name Service
Troubleshooting the System Using Core Dump Files
Tracking IP Prefix Reachability
Gathering Information for Customer Support
Managing the Resource Threshold Monitor
Monitoring the System
Setting the Baseline for the Most Recent Delta Count Statistics
Monitoring System Timing Settings
Monitoring vty Lines
Monitoring the Current Configuration of the System in Auto
Commit Mode
Monitoring the Current Configuration of the System in Manual
Commit Mode
Displaying the Background Monitoring Time of the SRP
Monitoring Console Sessions
Monitoring Files
Monitoring the FTP Server
Monitoring the Subsystems in the Software Release or Release
File
Monitoring the NFS Client
Monitoring the Name Servers on the System
Monitoring the Core Dump
Monitoring the IP Prefix Reachability Tracking Details
Monitoring Gathered Technical Support Information
Monitoring Resource Threshold Information
Monitoring the Physical Environment of the Router
Monitoring the Multicast-to-Unicast Ratio for the Router Switch
Fabric
Monitoring Memory Management Protection Information
Monitoring CPU Usage
Monitoring Memory-Related Resources Used by the System Processes
Monitoring the History of System and Module Resets
Monitoring the Armed and Running Releases in the Router
Managing Modules
Overview
Platform Considerations
Disabling and Reenabling Line Modules, SRP Modules, and SFMs
Disabling and Reenabling IOAs
Removing an SRP Module
Replacing Line Modules on ERX Routers, the E120 Router, and
the E320 Router
Replacing IOAs on the E120 Router and the E320 Router
Software Compatibility
Configuring Performance Rate of Line Modules on ERX7xx Models
and the ERX1410 Router
Managing Flash Cards on SRP Modules
Flash Features
Flash Features on the E120 Router and the E320 Router
Installing and Removing Flash Cards
Synchronizing Flash Cards
Validating and Recovering Redundant SRP File Integrity
Reformatting the Primary Flash Card
Copying the Image on the Primary SRP Module
Scanning Flash Cards
Monitoring Flash Cards
Updating the Router with JunosE Hotfix Files
Managing the Ethernet Port on the SRP Module
Enabling Warm Restart Diagnostics on Modules
Ignoring Diagnostic Test Failures
Monitoring Modules
Passwords and Security
Passwords and Security Overview
Passwords and Security Platform Considerations
Setting Basic and Enable Password Parameters
Setting and Erasing Passwords
Vty Line Authentication and Authorization Overview
Configuring Simple Vty Line Authentication
Configuring AAA Authentication and AAA Authorization for Vty
Lines
Setting Virtual Terminal Access Lists
Secure System Administration with SSH Overview
Configuring SSH
Monitoring the Current Status of the SSH Server
Restricting User Access Overview
Understanding DoS Protection
DoS Protection Group Configuration Example
Monitoring DoS Protection Groups
Monitoring Suspicious Control Flow Statistics
Monitoring Suspicious Flows
Monitoring Suspicious Flow Information
Monitoring Suspicious Control Flow Protocol
Writing CLI Macros
Platform Considerations
Writing Macros
Environment Commands
Capturing Output of Commands
Adding Regular Expression Matching to Macros
Extracting a Substring Based on Regular Expression Matching
Adding Global Variables for Availability to the onError Macro
Unique IDs for Macros
Accurate Use of Error Status When Accessed Outside of onError
Macro
Variables
Literals
Operators
Arithmetic Operations
Conditional Execution
Passing Parameters in Macros
Generating Macro Output
Invoking Other Macros
Detecting and Recording Macro Errors
Running Macros
Scheduling Macros
Practical Examples
Booting the System 
Configuring the System Clock
Configuring Virtual Routers
Reference Material
IndexSymbols
- --More-- prompt 1, 2, 3, 4, 5
- .cnf files 1, 2, 3, 4, 5, 6
- .dmp files 1, 2, 3
- .hty files
- .log files
- .pub files
- .rel files 1
- .scr files
- .sts files
- .txt files
- 3des-cbc encryption algorithm for SSH 1, 2
- ? command 1, 2, 3
A
- AAA (authentication, authorization, accounting)
- aaa commands
- AAA Profile Configuration mode 1, 2
- AAL5 layer (ATM)
- abbreviating keywords
- abbreviations and acronyms
- access and uplink methods
- access levels (CLI)
- access lists 1
- access-list command
- adapter commands
- Address Family Configuration mode 1, 2
- address-family ipv4 command
- address-family vpnv4 command
- agent, SNMP 1, 2
- algorithm negotiation, SSH
- arrow keys 1, 2, 3
- assembly numbers, displaying for hardware
- assembly revisions, displaying for hardware
- assigning an IP address 1, 2, 3, 4
- ATM interfaces
- ATM VC Class Configuration mode 1, 2
- ATM VC Configuration mode 1, 2
- attributes, SNMP
- authentication
- authentication trap, SNMP
- authorization
- Automatic Commit mode
- automatic synchronization
- autoupgrade
- avp command
B
- B-RAS applications
- B-RAS commands
- backing up software configuration
- Backspace key
- backup router
- bandwidth
- bandwidth errors
- bandwidth oversubscription
- bandwidth oversubscription command
- banner command
- banners
- baseline commands
- BGP (Border Gateway Protocol)
- blowfish-cbc encryption algorithm for SSH
- boot commands
- Boot mode 1, 2
- booting the system 1, 2, 3, 4, 5
- Border Gateway Protocol. See BGP
- bottom-up approach to network configuration
- bridge commands
- broadcasts, NTP
- bulk statistics, SNMP
- bulkstats commands 1, See also show bulkstats commands
- bulkstats collector 1, 2, 3, 4
- bulkstats collector collect-mode
- bulkstats collector description
- bulkstats collector interval
- bulkstats collector max-size
- bulkstats collector primary-receiver
- bulkstats collector secondary-receiver
- bulkstats collector single-interval
- bulkstats file-format endOfLine-Lf
- bulkstats interface-type
- bulkstats interfaces description-format common
- bulkstats receiver remote-name
- bulkstats schema
- bulkstats schema subtree
- bulkstats schema subtree policy
- bulkstats traps
- bulkstats virtual-router-group
C
- caching, configuration
- capitalization. See case sensitivity
- case sensitivity
- channelized E1 interfaces
- channelized T1 interfaces
- channelized T3 interfaces
- characters on terminal screen, setting bits for
- Classifier Group Configuration mode 1, 2
- clear commands
- CLI (command-line interface) 1
- abbreviating keywords 1, 2
- accessing
- command modes. See command modes
- context-sensitive help 1, 2
- editing keys
- editing on
- logging in
- pausing
- system prompts
- CLI access levels, VSA descriptions 1, 2
- CLI command execution by macro file
- CLI messages
- CLI status indicator
- client, SNMP 1, 2
- clock
- clock commands 1
- cOCx/STMx interfaces
- coldStart, SNMP trap
- Color Mark Profile Configuration mode 1, 2
- color-mark-profile command
- command history keys
- command modes 1, 2
- command-line interface. See CLI
- command-line prompts
- commands
- abbreviating
- editing on CLI
- issuing from other command modes 1, 2
- listing available
- pausing before executing
- using
- commands for troubleshooting
- community table, SNMP
- community, SNMP 1, 2, 3
- configuration caching
- configuration file 1
- configuration modes. See command modes
- configuration tasks, general
- configuration, software 1, 2
- configure command 1, 2, 3
- configuring. See specific feature or protocol
- confirmations explicit command
- console
- console lines
- contact person for SNMP server
- context-sensitive help 1, 2
- control flow monitoring
- Control Plane Configuration mode 1, 2, 3
- control plane security
- control-plane command
- controller commands
- Controller Configuration mode 1, 2
- conventions
- copy commands
- copying the software release file 1, 2, 3
- core dump files for troubleshooting 1, 2
- core dumps
- corrupted files. See flash cards, scanning
- crypto key dss command
- Ctrl-key combinations (CLI)
- current configuration
- customer support 1
D
- data link-layer interfaces
- data set ready signal. See DSR
- data-character-bits command
- default version
- default virtual router
- delete command
- Delete key
- denial of service (DoS) 1
- DHCP Pool Configuration mode 1, 2, 3
- diag command
- diag-level command
- diagnostics
- Diffie-Hellman key exchange
- digital subscriber line access multiplexers. See DSLAMs
- disable command 1, 2
- disable-autosync command
- display terminal
- displaying configuration information. See show commands
- distributed denial of service (DDoS) attack
- distribution lists
- DNS (Domain Name System) 1
- do command 1, 2
- documentation set
- Domain Map Configuration mode 1, 2
- Domain Map Tunnel Configuration mode 1, 2
- DoS protection group commands
- atm dos-protection-group
- bridge1483 dos-protection-group
- dos-protection-group
- ethernet dos-protection-group
- frame-relay dos-protection-group
- hdlc dos-protection-group
- ip dos-protection-group
- ipv6 dos-protection-group
- lag dos-protection-group
- ppp dos-protection-group
- pppoe dos-protection-group
- priority burst
- priority over-subscription-factor
- priority rate
- protocol burst
- protocol drop-probability
- protocol priority
- protocol rate
- protocol skip-priority-rate-limiter
- protocol weight
- use canned-group
- vlan dos-protection-group
- Down Arrow key
- draft RFCs
- Drop Profile Configuration mode 1, 2
- drop-profile command
- DS1 channels
- DS3 channels
- DSLAMs (digital subscriber line access multiplexers) 1, 2, 3, 4
- DSR (data set ready), restricting login with
- dsr-detect command
- dump files, core
E
- E120 and E320 Broadband Services Routers
- E3 interfaces
- E320 Broadband Services Routers
- edge aggregation applications 1
- editing on command-line interface
- enable commands
- enable 1, 2, 3, 4
- enable privilege-level
- enable passwords, erasing
- encryption
- end command
- Enter key 1, 2, 3
- Enterprise SNMP MIB
- entity, SNMP
- environment, system
- erase secrets command
- Esc-key combinations (CLI)
- Ethernet
- Ethernet port on SRP module 1
- events
- exception commands 1, See also show exception commands
- exclude-subsystem command
- exec-banner command
- exec-timeout command
- exit command 1, 2
- exiting the system
- Explicit Path Configuration mode 1, 2
- E Series routers 1
- assigning IP address to
- booting 1, 2, 3, 4
- remote access. See B-RAS applications
F
- Fast Ethernet interfaces
- file corruptions
- file system configuration, saving current
- files
- flash (NVS or nonvolatile storage) cards 1
- copying
- device names
- different capacities
- E120 and E320 Broadband Services Routers features
- formatting
- halt command to prevent corruption
- installing
- managing
- monitoring
- primary
- rebooting and configuration data
- rebooting in response to corrupt sectors
- replacing
- scanning
- scanning utility
- secondary
- synchronizing
- synchronizing with different capacities
- validating and recovering file integrity
- flash-disk commands
- Frame Relay interfaces
- FTP access 1, 2
- FTP client
- FTP server 1
- ftp-server enable command
G
H
- halt command 1, 2
- hardware
- monitoring information
- standards
- versions, displaying 1, 2
- HDLC parameters
- help 1
- help command 1, 2, 3
- history command
- hmac-md5 authentication for SSH
- hmac-sha1 authentication for SSH
- hmac-sha1-96 authentication for SSH
- host command
- host ftp command
- host table, modifying 1, 2
- hostname command
- hotfix activate command
- hotfix files, monitoring
- hotfixes 1
I
- I/O adapters. See IOAs
- I/O modules
- if constructs, macro
- ILMI (integrated local management interface)
- image on primary SRP module, copying
- installing system software 1, 2
- interactive help system. See help
- interface commands
- interface 1, 2, 3
- interface fastEthernet
- interface loopback
- Interface Configuration mode 1, 2
- interfaces 1
- configuring
- Fast Ethernet
- physical, configuring 1, 2
- shared interfaces
- subscriber interfaces
- IOA configurations
- IOAs
- IP access list, SNMP
- IP addresses
- assigning 1, 2, 3
- configuring
- ip commands
- IP multicast
- IP NAT Pool Configuration mode 1, 2
- ip nfs commands
- ip rate-limit-profile command
- ip ssh commands
- IP support
- IP tunnels
- ip vrf commands
- IPsec (IP Security)
- IPsec CA Identity Configuration mode
- ipsec commands
- IPsec Identity Configuration mode 1, 2
- IPsec IKE Policy Configuration mode 1, 2
- IPsec Manual Key Configuration mode 1, 2, 3
- IPsec Peer Public Key Configuration mode 1, 2
- IPsec Transport Profile Configuration mode 1, 2
- IPsec Tunnel Profile Configuration mode
- IPv6 Local Configuration mode
- IPv6 Local Pool Configuration mode
- IPv6 NdRa Pool Configuration mode
- IS-IS protocol
- issuing commands from other CLI modes 1, 2
J
K
L
- L2 Transport Load-Balancing-Circuit Configuration mode 1, 2
- L2C commands
- L2TP (Layer 2 Tunneling Protocol)
- l2tp commands
- L2TP Destination Profile Configuration mode 1, 2
- L2TP Destination Profile Host Configuration mode 1, 2
- L2TP Destination Profile Sessions Limit Configuration
- L2TP Tunnel Switch Profile Configuration mode 1, 2
- Layer 2 Control Configuration mode 1, 2
- Layer 2 Control Neighbor Configuration mode 1, 2
- Layer 2 Tunneling Protocol. See L2TP
- layered approach to network configuration
- LDP Configuration mode 1, 2
- Left Arrow key
- levels of CLI access
- Line Configuration mode 1, 2
- line module configurations
- line modules
- allowed combinations 1, 2
- bandwidth
- combinations 1, 2
- disabling 1, 2
- enabling
- erasing configurations 1, 2, 3
- initialization sequence
- line rates
- performance rate
- replacing
- restricted combinations
- slot groups 1, 2, 3
- software
- switch usage
- troubleshooting
- line rates
- line vty command 1, 2
- lines
- link-up, link-down traps, SNMP
- linking to an FTP server. See FTP access
- listing commands available
- listing configuration settings. See show commands
- LMI (local management interface) 1, 2, 3
- Local IPsec Transport Profile Configuration mode 1, 2, 3
- Local User Configuration mode 1, 2, 3
- location of SNMP server
- log commands 1
- logging in to system
- logging system events
- login banner
- login commands
- login conditions
- long scripts, copying
M
- MAC (media access control) addresses
- macro (.mac) files 1, 2
- macro command
- macros
- comments
- conditional execution
- control expressions
- environment commands
- if constructs
- invoking from another macro file 1, 2
- literals
- naming
- noncontrol expressions
- operators 1
- resetting system while running
- variables
- while constructs
- writing 1, 2
- managed object, SNMP
- Management Information Bases. See MIBs
- Manual Commit mode
- manuals
- Map Class Configuration mode 1, 2
- Map List Configuration mode 1, 2
- map-class frame-relay command
- map-list command
- master router
- master, NTP
- MD5 authentication
- memory (hardware), displaying
- memory management
- memory warning command
- message authentication code. See MAC addresses
- message-of-the-day (MOTD) banner 1, 2
- MIBs (Management Information Bases)
- modules
- monitor. See terminal
- motd-banner command
- mount command
- mounting a CD on an FTP server 1, 2, 3
- MPLS (Multiprotocol Label Switching)
- mpls commands
- Multiprotocol Label Switching. See MPLS
N
- names
- network configuration 1
- network elements, SNMP
- Network File System. See NFS client
- network planning 1
- access lists
- BGP
- COCX-F3 modules
- configurable HDLC parameters
- configuration overview 1, 2
- CT3 12-F0 modules
- data link-layer interfaces
- distribution lists
- E3 modules
- Ethernet modules
- general configuration tasks
- interfaces and subinterfaces
- IP multicast
- IP/ATM
- IP/Frame Relay
- IP/HDLC
- IP/PPP
- L2TP
- layered approach
- line module features
- MPLS
- non-PPP equal access
- OSPF 1, 2
- physical layer interfaces
- policy management
- private line aggregation
- RIP
- route maps
- routing policy
- routing protocols
- SONET
- virtual routers
- VRRP
- network servers, displaying list of
- Network Time Protocol. See NTP
- new model AAA authentication
- NFS client
- no boot hotfix all-releases command
- no command 1, 2
- non-PPP equal access
- nonvolatile storage. See flash (NVS or nonvolatile storage) cards
- notice icons
- NTP (Network Time Protocol)
- best server
- broadcasts
- client-server associations
- configuring
- master
- monitoring 1, 2
- overview
- peers
- replies
- requests
- servers 1, 2, 3
- synchronization
- virtual routers 1, 2
- NTP client
- ntp commands 1, See also show ntp commands
- NTP control queries
- NTP servers
O
- objects, tracking reachability 1, 2
- OC48/STM16 interfaces, configuring
- OCx/STMx interfaces
- Open Shortest Path First. See OSPF
- OSPF (Open Shortest Path First)
- output filtering
- oversubscription, bandwidth
- overview, NTP
P
- packet mirroring
- packet size, SNMP
- pagination keys
- parameters 1, 2
- parent-group command 1, 2, 3
- partial releases, copying
- password command
- passwords 1, 2, 3, 4, See also Privileged Exec mode
- passwords and secrets
- patching the system with hotfixes
- pausing before command execution
- PDU (protocol data unit)
- performance rate, line modules 1, 2
- physical errors in flash cards
- physical interfaces, configuring 1, 2
- physical slots
- ping command 1, 2
- platform considerations
- Policy List Configuration mode 1, 2
- Policy List Parent Group Configuration mode 1, 2, 3, 4, 5, 6, 7, 8, 9
- policy management 1
- QoS classification and marking
- rate limiting
- types of services 1, 2
- xDSL session termination
- polling NTP servers
- POS interfaces
- PPP (Point-to-Point Protocol)
- PPPoE Service Name Table Configuration mode 1, 2
- pppoe-service-name-table command
- primary flash card
- primary NTP servers
- private line aggregation
- privilege groups
- privilege level
- privilege level command
- Privileged Exec mode 1, 2, 3, 4, 5, 6, See also passwords
- privileged-level access (CLI) 1, 2, 3, See also Privileged Exec mode
- profile commands
- Profile Configuration mode 1, 2
- progress indicator (CLI)
- prompts, CLI system
- protocol data unit. See PDU
- proxy, SNMP 1, 2
- pvc command
Q
- QoS (quality of service)
- QoS commands
- QoS Interface Set Configuration mode 1, 2
- QoS Interface Superset Configuration mode 1, 2
- QoS Parameter Configuration mode
- QoS Parameter Definition Configuration mode 1, 2
- QoS Profile Configuration mode 1, 2
- QoS Shared Shaper Control Configuration mode
- qos-profile command
- qos-shared-shaper-control command
- Queue Profile Configuration mode 1, 2
- queue-profile command
R
- RADIUS (Remote Authentication Dial-In User Service)
- authentication, restricting access
- password authentication
- per-user enable authentication
- restricting access to commands 1, 2
- user authentication
- radius commands
- RADIUS Configuration mode 1, 2
- radius relay commands
- RADIUS Relay Configuration mode
- Rate Limit Profile Configuration mode 1, 2
- rate limiting
- reachability, tracking 1, 2
- reaching an FTP server. See FTP access
- reboot history (reboot.hty) file
- reboot history, displaying
- rebooting the system 1, 2
- redistribute routes
- Redundancy Configuration mode 1, 2
- references
- refusing NTP broadcasts
- regular expressions 1, 2
- metacharacters 1
- releasing available memory
- reload commands
- reload 1, 2
- reload at
- reload in
- reload slot
- Remote Authentication Dial-In User Service. See RADIUS
- remote host command
- Remote Neighbor Configuration mode 1, 2
- remote-neighbor command
- rename command
- renaming files
- replies, NTP
- reset button, software
- resetting while running scripts or macros
- resource commands
- resources
- revisions, displaying assembly
- RFC 1213 interface numbering
- RFCs 1
- Right Arrow key
- RIP (Routing Information Protocol)
- Route Map Configuration mode 1, 2
- route maps
- route-map command
- router commands
- router
- router bgp
- router ospf
- router pim
- router rip 1, 2
- Router Configuration mode 1, 2
- routers. See system
- Routing Information Protocol. See RIP
- routing policy
- routing protocols 1
- routing, IP
- RSVP Configuration mode 1, 2
- rtr commands
- RTR Configuration mode 1, 2
- run command 1, 2, 3
S
- schedule-profile command
- Scheduler Profile Configuration mode 1, 2
- screen. See terminal
- script files
- scripts
- secondary NTP servers
- secure IP tunnels
- Secure Shell Server protocol. See SSH
- security
- security features of SNMP
- send command
- sending messages to terminals
- serial numbers, displaying for hardware
- servers, NTP
- service commands
- service
- service ctrl-x-reboot 1, 2
- service manual-commit
- service password-encryption
- Service Manager commands
- Service Session Profile Configuration mode 1, 2
- Set operation, SNMP
- SetRequest PDU type, SNMP
- SFMs (switch fabric modules)
- shared interfaces
- show aaa commands
- show bandwidth oversubscription
- show boot command
- show bulkstats commands 1
- show command output, filtering
- show commands 1, 2
- show output filtering feature 1, 2
- show policy-list
- show redirecting output
- show configuration commands 1
- show configuration 1, 2
- show configuration category
- show configuration interface
- show configuration virtual-router 1, 2
- show environment command
- show exception commands
- show fabric weights command
- show flash command
- show ftp-server command
- show hardware command 1, 2
- show hosts command
- show hotfix command
- show ip commands
- show ip nfs command
- show last-reset command
- show line console 0 command
- show line vty command
- show log commands
- show memory-management protection command
- show ntp commands
- show nvs command
- show processes command 1, 2
- show reboot-history command
- show reload command
- show running-configuration command
- show secrets command
- show snmp commands
- show subsystems command
- show suspicious-control-flow-detection commands
- show tech-support command
- show terminal command
- show timing command
- show users command
- show utilization command 1, 2
- show version command 1, 2, 3, 4
- show virtual-router command
- Simple Network Management Protocol. See SNMP
- sleep command
- slot commands
- slot accept
- slot disable
- slot enable
- slot erase 1, 2
- slot groups and module arrangements 1, 2
- SNMP (Simple Network Management Protocol) 1
- agent software 1, 2
- attributes
- bulk statistics collection
- client software 1, 2
- communities 1, 2, 3
- compressing interfaces
- configuration tasks
- enabling
- encoding method
- engine
- entity
- group
- interface numbering
- management features
- managing interface sublayers
- memory warning
- monitoring interface tables
- monitoring status 1, 2
- multiple virtual routers 1, 2
- operations
- packet mirroring
- packet size, setting
- PDU
- proxy, creating
- RFC 1213 compatibility
- schema
- security features
- server
- server parameters, setting
- traps. See SNMP traps
- users, configuring
- versions
- view 1, 2
- viewing status
- virtual routers
- SNMP commands 1, See also bulkstats commands
- snmp commands
- snmp interfaces description-format
- snmp trap ip link-status
- snmp trap link-status
- snmp-server
- snmp-server community
- snmp-server contact
- snmp-server enable traps
- snmp-server host 1, 2, 3
- snmp-server interfaces compress
- snmp-server interfaces compress-restriction
- snmp-server interfaces rfc1213
- snmp-server location
- snmp-server notificationLog ageOut
- snmp-server notificationLog entryLimit
- snmp-server notificationLog log
- snmp-server packetsize
- snmp-server trap-proxy
- snmp-server trap-source
- snmp-server user
- SNMP Event Manager Configuration mode 1, 2
- SNMP traps 1, 2, 3
- software
- compatibility
- configuration 1, 2
- installing 1, 2
- line rates
- release file
- updating
- upgrading 1, 2, 3
- software release file 1
- accessing 1, 2, 3
- specifying for reboot
- software reset button
- software standards
- software versions, displaying 1, 2
- Space key 1, 2
- speed command
- SRP module configurations
- SRP module redundancy
- SRP modules
- SSH (Secure Shell Server) 1
- algorithm negotiation
- client configuration
- configuration prerequisites
- configuring
- connections
- disabling
- enabling
- encryption algorithms
- encryption, configuring
- generating host keys
- host key management
- key exchange
- message authentication
- monitoring
- performance issues
- security concerns
- server public key files
- terminating
- user authentication 1
- user key management
- standards
- startup configuration
- static host maps, adding 1, 2
- static tunnels
- statistics
- statistics (.sts) files
- Statistics Profile Configuration mode 1, 2
- statistics-profile command
- status indicator (CLI)
- stratum 1 servers. See NTP servers, primary
- structural errors in flash data
- Subinterface Configuration mode 1, 2
- subinterfaces 1, 2
- subscriber interfaces
- subscriber policy commands
- Subscriber Policy Configuration mode 1, 2
- summer time, specifying
- support, technical See technical support
- suspicious control flow detection 1
- suspicious control flow monitoring
- suspicious-control-flow-detection commands
- baseline suspicious-control-flow-detection counts
- clear suspicious-control-flow-detection
- suspicious-control-flow-detection grouping-off
- suspicious-control-flow-detection off
- suspicious-control-flow-detection protocol backoff-time
- suspicious-control-flow-detection protocol low-threshold
- suspicious-control-flow-detection protocol threshold
- switch fabric modules. See SFMs
- switch usage, line modules
- synchronization process 1, 2
- synchronization reserve file
- synchronize command 1, 2
- system
- autoupgrade feature
- basic parameters
- booting 1, 2
- command-line interface. See CLI
- configuring automatically
- environment information
- exiting
- FTP client
- FTP server
- initializing line modules
- levels of access 1, 2
- logging in
- logging/troubleshooting, commands for 1, 2
- managing
- monitoring
- passwords
- patching with hotfixes
- physical slots, rebooting
- RADIUS password authentication
- software reset button
- system configuration files
- system name
- TFTP client
- timing
- updating with hotfixes
- virtual router limitations
- system clock
- system commands
- system configuration
- saving current 1, 2, 3
- saving startup
- system passwords. See passwords
- system security
- system.log file
T
- T1 lines, controllers for
- T3 interfaces
- Tab key 1, 2, 3
- TACACS+
- tag-group command
- tech-support encoded-string command
- technical support
- Telnet
- telnet commands
- terminal
- terminal commands 1, See also show terminal command
- text and syntax conventions
- text files
- TFTP client
- thermal protection mode
- time limits, setting
- time zone, specifying
- timeout login response command
- timing commands
- timing, system 1, See also system clock
- trace command
- tracking objects 1, 2
- Traffic Class Configuration mode 1, 2
- Traffic Class Group Configuration mode 1, 2
- traffic-class command
- traffic-class-group command
- transport protocols, xDSL
- traps command
- traps, SNMP
- troubleshooting core dump files
- tunnel commands
- Tunnel Group Configuration mode 1, 2, 3
- Tunnel Group Tunnel Configuration mode 1, 2, 3
- Tunnel Profile Configuration mode 1, 2
- Tunnel Server Configuration mode 1, 2
- tunnel-server command
- tunnels, IP
- twofish-cbc encryption algorithm for SSH
U
- Universal Coordinated Time. See UTC
- Up Arrow key
- updating the system software
- updating the system with hotfixes
- upgrading software
- uplink methods
- user access, restricting
- user authentication, configuring 1, 2, See also authentication
- User Exec mode 1, 2, 3, See also Privileged Exec mode
- user interface commands
- user interface, customizing
- user level access (CLI)
- UTC (Universal Coordinated Time) 1, 2
V
- vc-class atm command
- vendor-specific attributes. See VSAs
- versions
- view, SNMP 1, 2
- viewing files, See also show commands
- virtual interfaces (subinterfaces)
- virtual router commands
- Virtual Router Redundancy Protocol (VRRP). See VRRP
- virtual routers 1, 2
- VPN routing and forwarding instance. See VRF
- VPNs (virtual private networks)
- VR Group Configuration mode 1, 2
- VRF (VPN routing and forwarding instance)
- VRF Configuration mode 1, 2
- VRRP (Virtual Router Redundancy Protocol) 1, 2
- VSAs (vendor-specific attributes)
- vty lines
W
X