[an error occurred while processing this directive] J-series™ Services Router Administration Guide

Techpubs Home
Report an Error

Collapse TOC
Show Index

Entire manual as PDF

About This Guide
Objectives
Audience
Document Conventions
Related Juniper Networks Documentation
Documentation Feedback
Requesting Support
Managing User Authentication and Access
User Authentication Terms
User Authentication Overview
User Authentication
User Accounts
Login Classes
Permission Bits
Denying or Allowing Individual Commands
Template Accounts
Before You Begin
Managing User Authentication with Quick Configuration
Adding a RADIUS Server for Authentication
Adding a TACACS+ Server for Authentication
Configuring System Authentication
Adding New Users
Managing User Authentication with a Configuration Editor
Setting Up RADIUS Authentication
Setting Up TACACS+ Authentication
Configuring Authentication Order
Controlling User Access
Defining Login Classes
Creating User Accounts
Setting Up Template Accounts
Creating a Remote Template Account
Creating a Local Template Account
Securing the Console Port
Accessing Remote Devices with the CLI
Using the telnet Command
Using the ssh Command
Configuring Password Retry Limits for Telnet and SSH Access
Configuring SNMP for Network Management
Network Management Overview
Managers and Agents
SMI, MIBs, and OIDs
Standard and Enterprise MIBs
SNMP Requests
SNMP Communities
SNMP Traps
SNMP Health Monitor
Before You Begin
Configuring SNMP with Quick Configuration
Configuring SNMP with a Configuration Editor
Defining System Identification Information (Required)
Configuring SNMP Agents and Communities (Required)
Managing SNMP Trap Groups (Required)
Controlling Access to MIBs (Optional)
Verifying the SNMP Configuration
Configuring the Router as a DHCP Server
DHCP Terms
DHCP Overview
DHCP Options
Compatibility with Autoinstallation
Conflict Detection and Resolution
Interface Restrictions
Before You Begin
Configuring the DHCP Server with Quick Configuration
Configuring the DHCP Server with a Configuration Editor
Verifying a DHCP Server Configuration
Automating Network Operations and Troubleshooting
Defining and Enforcing Configuration Rules with Commit Scripts
Commit Script Overview
Enabling Commit Scripts
Disabling Commit Scripts
Automating Network Management and Troubleshooting with Operation Scripts
Operation Script Overview
Enabling Operation Scripts
Executing Operation Scripts
Disabling Operation Scripts
Running Self-Diagnostics with Event Policies
Event Policy Overview
Configuring Event Policies
Monitoring the Router and Routing Operations
Monitoring Terms
Monitoring Overview
Monitoring Tools Overview
Filtering Command Output
Before You Begin
Using the Monitoring Tools
Monitoring System Properties
Monitoring System Process Information
Monitoring the Chassis
Monitoring the Interfaces
Monitoring Routing Information
Monitoring Routing Information
Monitoring BGP Routing Information
Monitoring OSPF Routing Information
Monitoring RIP Routing Information
Monitoring DLSw Routing Information
Monitoring Class-of-Service Performance
Monitoring CoS Interfaces
Monitoring CoS Classifiers
Monitoring CoS Value Aliases
Monitoring CoS RED Drop Profiles
Monitoring CoS Forwarding Classes
Monitoring CoS Rewrite Rules
Monitoring CoS Scheduler Maps
Monitoring MPLS Traffic Engineering Information
Monitoring MPLS Interfaces
Monitoring MPLS LSP Information
Monitoring MPLS LSP Statistics
Monitoring RSVP Session Information
Monitoring MPLS RSVP Interfaces Information
Monitoring Service Sets
Monitoring Firewalls
Monitoring Stateful Firewall Statistics
Monitoring Stateful Firewall Filters
Monitoring Firewall Intrusion Detection Services (IDS)
Monitoring IPSec Tunnels
Monitoring NAT Pools
Monitoring DHCP
Monitoring RPM Probes
Monitoring PPP
Monitoring PPPoE
Monitoring Events and Managing System Log Files
System Log Message Terms
System Log Messages Overview
System Log Message Destinations
System Log Facilities and Severity Levels
Regular Expressions
Before You Begin
Configuring System Log Messages with a Configuration Editor
Sending System Log Messages to a File
Sending System Log Messages to a User Terminal
Archiving System Logs
Disabling System Logs
Monitoring System Log Messages with the J-Web Event Viewer
Filtering System Log Messages
Viewing System Log Messages
Configuring and Monitoring Alarms
Alarm Terms
Alarm Overview
Alarm Types
Alarm Severity
Alarm Conditions
Interface Alarm Conditions
Chassis Alarm Conditions and Corrective Actions
System Alarm Conditions and Corrective Actions
Before You Begin
Configuring Alarms with a Configuration Editor
Checking Active Alarms
Verifying the Alarms Configuration
Performing Software Upgrades and Reboots
Upgrade and Downgrade Overview
Upgrade Software Packages
Recovery Software Packages
Before You Begin
Downloading Software Upgrades from Juniper Networks
Installing Software Upgrades
Installing Software Upgrades with the J-Web Interface
Installing Software Upgrades from a Remote Server
Installing Software Upgrades by Uploading Files
Installing Software Upgrades with the CLI
Downgrading the Software
Downgrading the Software with the J-Web Interface
Downgrading the Software with the CLI
Configuring Boot Devices
Configuring a Boot Device for Backup with the J-Web Interface
Configuring a Boot Device for Backup with the CLI
Configuring a Boot Device to Receive Software Failure Memory Snapshots
Recovering Primary Boot Devices
Why Compact Flash Recovery Might Be Necessary
Recommended Recovery Hardware and Software
Configuring Primary Compact Flash Recovery
Rebooting or Halting a Services Router
Rebooting or Halting a Services Router with the J-Web Interface
Rebooting a Services Router with the CLI
Halting a Services Router with the CLI
Managing Files
Before You Begin
Managing Files with the J-Web Interface
Cleaning Up Files
Downloading Files
Deleting Files
Cleaning Up Files with the CLI
Encrypting and Decrypting Configuration Files
Encrypting Configuration Files
Decrypting Configuration Files
Modifying the Encryption Key
Using Services Router Diagnostic Tools
Diagnostic Terms
Diagnostic Tools Overview
J-Web Diagnostic Tools Overview
CLI Diagnostic Commands Overview
MPLS Connection Checking
Before You Begin
General Preparation
Ping MPLS Preparation
MPLS Enabled
Loopback Address
Source Address for Probes
Pinging Hosts from the J-Web Interface
Using the J-Web Ping Host Tool
Ping Host Results and Output Summary
Checking MPLS Connections from the J-Web Interface
Using the J-Web Ping MPLS Tool
Ping MPLS Results and Output
Tracing Unicast Routes from the J-Web Interface
Using the J-Web Traceroute Tool
Traceroute Results and Output Summary
Capturing and Viewing Packets with the J-Web Interface
Using J-Web Packet Capture
Packet Capture Results and Output Summary
Using CLI Diagnostic Commands
Pinging Hosts from the CLI
Checking MPLS Connections from the CLI
Pinging RSVP-Signaled LSPs and LDP-Signaled LSPs
Pinging Layer 3 VPNs
Pinging Layer 2 VPNs
Pinging Layer 2 Circuits
Tracing Unicast Routes from the CLI
Using the traceroute Command
Using the traceroute monitor Command
Tracing Multicast Routes from the CLI
Using the mtrace from-source Command
Using the mtrace monitor Command
Displaying Log and Trace Files from the CLI
Monitoring Interfaces and Traffic from the CLI
Using the monitor interface Command
Using the monitor traffic Command
Configuring Packet Capture
Packet Capture Terms
Packet Capture Overview
Packet Capture on Router Interfaces
Firewall Filters for Packet Capture
Packet Capture Files
Analysis of Packet Capture Files
Before You Begin
Configuring Packet Capture with a Configuration Editor
Enabling Packet Capture (Required)
Configuring Packet Capture on an Interface (Required)
Configuring a Firewall Filter for Packet Capture (Optional)
Disabling Packet Capture
Deleting Packet Capture Files
Changing Encapsulation on Interfaces with Packet Capture Configured
Verifying Packet Capture
Configuring RPM Probes
RPM Terms
RPM Overview
RPM Probes
RPM Tests
Probe and Test Intervals
RPM Statistics
RPM Thresholds and Traps
RPM for BGP Monitoring
Before You Begin
Configuring RPM with Quick Configuration
Configuring RPM with a Configuration Editor
Configuring Basic RPM Probes
Configuring TCP and UDP Probes
Tuning RPM Probes
Configuring RPM Probes to Monitor BGP Neighbors
Configuring RPM Probes for BGP Monitoring
Directing RPM Probes to Select BGP Routers
Verifying an RPM Configuration
Index


[an error occurred while processing this directive]