Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

Configuring JunosE Parent-Group References (SRC CLI)

 

For JunosE policies, you can apply filter conditions to the input (ingress) and output (egress) side of the router interface. Typically, you use filter conditions with hierarchical rate-limit actions.

Use the following configuration statements to configure match conditions for a JunosE filter:

To add JunosE filter conditions to a classify-traffic condition:

  1. From configuration mode, create a classify-traffic condition. For example, to create a traffic-condition called tcpg within policy rule pr:

  2. (Optional) Configure the condition to match one match condition.

  3. (Optional) Configure the condition to match one or more parent groups in a hierarchical rate-limit action.

  4. (Optional) Configure the condition to match an external parent group. For example, to add a reference called epg1-ref:

    • Specify the name of the external parent group you want to reference. For example, to reference the external parent group epg1:

    • Specify the name of the hierarchical policy parameter you want to reference. For example, to reference the hierarchical policy parameter hpp1:

    • Specify the attributes of the hierarchical policy parameter you are referencing.

      For information about configuring the attributes of the hierarchical policy parameter, see Configuring Hierarchical Policy Parameters for External Parent Groups (SRC CLI).

  5. (Optional) Configure the condition to match packets based on the source route class.

  6. (Optional) Configure the condition to match packets based on the destination route class.

  7. (Optional) Configure the condition to match packets based on the traffic class.

  8. (Optional) Configure the condition to match packets based on the packet color.

  9. (Optional) Configure the condition to match packets based on the user packet class action number.

  10. (Optional) Configure the condition to match packets based on packets destined for a local interface.

  11. (Optional) Verify the secondary input policy configuration.