[an error occurred while processing this directive]
J-series™ Services Router Advanced WAN Access Configuration Guide

Techpubs Home
Report an Error

Collapse TOC
Show Index

Entire manual as PDF

 

About This Guide
Objectives
Audience
Document Conventions
Related Juniper Networks Documentation
Documentation Feedback
Requesting Support
Multiprotocol Label Switching Overview
MPLS and VPN Terms
MPLS Overview
Label Switching
Label-Switched Paths
Label-Switching Routers
Labels
Label Operations
Penultimate Hop Popping
LSP Establishment
Static LSPs
Dynamic LSPs
Signaling Protocols Overview
Label Distribution Protocol
LDP Operation
LDP Messages
Resource Reservation Protocol
RSVP Fundamentals
Bandwidth Reservation Requirement
Explicit Route Objects
Constrained Shortest Path First
Link Coloring
VPN Overview
VPN Components
VPN Routing Requirements
VPN Routing Information
VRF Instances
Route Distinguishers
Route Targets to Control the VRF Table
Types of VPNs
Layer 2 VPNs
Layer 2 Circuits
Layer 3 VPNs
Configuring Signaling Protocols for Traffic Engineering
Signaling Protocol Overview
LDP Signaling Protocol
RSVP Signaling Protocol
Before You Begin
Configuring LDP and RSVP with a Configuration Editor
Configuring LDP-Signaled LSPs
Configuring RSVP-Signaled LSPs
Verifying an MPLS Configuration
Verifying an LDP-Signaled LSP
Verifying an RSVP-Signaled LSP
Configuring Virtual Private Networks
VPN Configuration Overview
Sample VPN Topology
Basic Layer 2 VPN Configuration
Basic Layer 2 Circuit Configuration
Basic Layer 3 VPN Configuration
Before You Begin
Configuring VPNs with a Configuration Editor
Configuring Interfaces Participating in a VPN
Configuring Protocols Used by a VPN
Configuring MPLS for VPNs
Configuring a BGP Session
Configuring Routing Options for VPNs
Configuring an IGP and a Signaling Protocol
Configuring LDP for Signaling
Configuring RSVP for Signaling
Configuring a Layer 2 Circuit
Configuring a VPN Routing Instance
Configuring a VPN Routing Policy
Configuring a Routing Policy for Layer 2 VPNs
Configuring a Routing Policy for Layer 3 VPNs
Verifying a VPN Configuration
Pinging a Layer 2 VPN
Pinging a Layer 3 VPN
Pinging a Layer 2 Circuit
Configuring CLNS VPNs
CLNS Terms
CLNS Overview
Before You Begin
Configuring CLNS with a Configuration Editor
Configuring a VPN Routing Instance (Required)
Configuring ES-IS
Configuring IS-IS for CLNS
Configuring CLNS Static Routes
Configuring BGP for CLNS
Verifying CLNS VPN Configuration
Configuring IPSec for Secure Packet Exchange
IPSec Tunnel Overview
Security Associations
Translating Outgoing Traffic
Public Key Infrastructure (PKI) and Digital Certificates Overview
Before You Begin
Configuring an IPSec Tunnel with Quick Configuration
Configuring an IPSec Tunnel with a Configuration Editor
Configuring IPSec Services Interfaces
Configuring IPSec Service Sets
Configuring an IPSec Stateful Firewall Filter Rule
Configuring a NAT Pool
Configuring Digital Certificates for IPSec Tunnels
Configuring a CA Profile with a Configuration Editor
Requesting a CA Certificate from a CA
Generating a Public and Private Key Pair
Generating and Enrolling a Local Digital Certificate
Loading a Digital Certificate on a Services Router
Applying the Local Digital Certificate to an IPSec Tunnel
Deleting a Digital Certificate
Verifying the IPSec Tunnel Configuration
Multicast Overview
Multicast Terms
Multicast Architecture
Upstream and Downstream Interfaces
Subnetwork Leaves and Branches
Multicast IP Address Ranges
Notation for Multicast Forwarding States
Dense and Sparse Routing Modes
Strategies for Preventing Routing Loops
Reverse-Path Forwarding for Loop Prevention
Shortest-Path Tree for Loop Prevention
Administrative Scoping for Loop Prevention
Multicast Protocol Building Blocks
Configuring a Multicast Network
Before You Begin
Configuring a Multicast Network with a Configuration Editor
Configuring SAP and SDP (Optional)
Configuring IGMP (Required)
Configuring the PIM Static RP (Optional)
Configuring a PIM RPF Routing Table (Optional)
Verifying a Multicast Configuration
Configuring Data Link Switching
DLSw Terms
DLSw Overview
Switch-to-Switch Protocol for DLSw
DLSw Operational Stages
DLSw Capabilities Exchange
DLSw Circuits Establishment
Before You Begin
Configuring DLSw with Quick Configuration
Configuring DLSw with a Configuration Editor
Configuring Basic DLSw (Required)
Configuring LLC Type 2 Properties on an Ethernet Interface
Configuring DLSw on the Local Services Router
Configuring DLSw on the Remote Services Router
Configuring Class-of-Service (CoS) for DLSw (Optional)
Configuring DLSw Ethernet Redundancy (Optional)
Verifying DLSw Configuration
Policy Framework Overview
Routing and Firewall Filter Policy Terms
Routing Policy Overview
Routing Policy Components
Routing Policy Terms
Routing Policy Match Conditions
Routing Policy Actions
Default and Final Actions
Applying Routing Policies
Firewall Filter Overview
Stateful and Stateless Firewall Filters
Summary of Stateful Firewall Filter and NAT Match Conditions and Actions
Planning a Stateless Firewall Filter
Stateless Firewall Filter Match Conditions, Actions, and Action Modifiers
Configuring Routing Policies
Before You Begin
Configuring a Routing Policy with a Configuration Editor
Configuring the Policy Name (Required)
Configuring a Policy Term (Required)
Rejecting Known Invalid Routes (Optional)
Injecting OSPF Routes into the BGP Routing Table (Optional)
Grouping Source and Destination Prefixes in a Forwarding Class (Optional)
Configuring a Policy to Prepend the AS Path (Optional)
Configuring Damping Parameters (Optional)
Configuring Stateful Firewall Filters and NAT
Before You Begin
Configuring a Stateful Firewall Filter with Quick Configuration
Configuring a Stateful Firewall Filter with a Configuration Editor
Verifying Stateful Firewall Filter Configuration
Configuring Stateless Firewall Filters
Before You Begin
Configuring a Stateless Firewall Filter with Quick Configuration
Configuring IPv4 and IPv6 Stateless Firewall Filters
Assigning IPv4 and IPv6 Firewall Filters to Interfaces
Configuring a Stateless Firewall Filter with a Configuration Editor
Stateless Firewall Filter Strategies
Strategy for a Typical Stateless Firewall Filter
Strategy for Handling Packet Fragments
Configuring a Routing Engine Firewall Filter for Services and Protocols from Trusted Sources
Configuring a Routing Engine Firewall Filter to Protect Against TCP and ICMP Floods
Configuring a Routing Engine Firewall Filter to Handle Fragments
Applying a Stateless Firewall Filter to an Interface
Verifying Stateless Firewall Filter Configuration
Class-of-Service Overview
CoS Terms
Benefits of CoS
JUNOS CoS Functions
How CoS Components Work
CoS Values and Aliases
Default Forwarding Class Queue Assignments
Default Scheduler Settings
Default Behavior Aggregate Classifiers
CoS Value Rewrites
Sample Behavior Aggregate Classification
Configuring Class of Service
Before You Begin
Configuring CoS with Quick Configuration
Defining CoS Components
Assigning CoS Components to Interfaces
Configuring CoS with a Configuration Editor
Configuring a Policer for a Firewall Filter
Configuring and Applying a Firewall Filter for a Multifield Classifier
Assigning Forwarding Classes to Output Queues
Configuring and Applying Rewrite Rules
Configuring and Applying Behavior Aggregate Classifiers
Configuring RED Drop Profiles for Assured Forwarding Congestion Control
Configuring Schedulers
Configuring and Applying Scheduler Maps
Configuring and Applying Virtual Channels
Configuring and Applying Adaptive Shaping for Frame Relay
Verifying a CoS Configuration
Index

 



[an error occurred while processing this directive]