[an error occurred while processing this directive]
J-series™ Services Router Advanced WAN Access Configuration Guide

Techpubs Home
Report an Error

Collapse TOC
Index

Entire manual as PDF

 

About This Guide
Objectives
Audience
Document Conventions
Related Juniper Networks Documentation
Documentation Feedback
Requesting Technical Support
Multiprotocol Label Switching Overview
MPLS and VPN Terms
MPLS Overview
Label Switching
Label-Switched Paths
Label-Switching Routers
Labels
Label Operations
Penultimate Hop Popping
LSP Establishment
Static LSPs
Dynamic LSPs
Traffic Engineering with MPLS
Point-to-Multipoint LSPs
Point-to-Multipoint LSP Properties
Point-to-Multipoint LSP Configuration
Signaling Protocols Overview
Label Distribution Protocol
LDP Operation
LDP Messages
Resource Reservation Protocol
RSVP Fundamentals
Bandwidth Reservation Requirement
Explicit Route Objects
Constrained Shortest Path First
Link Coloring
VPN Overview
VPN Components
VPN Routing Requirements
VPN Routing Information
VRF Instances
Route Distinguishers
Route Targets to Control the VRF Table
Types of VPNs
Layer 2 VPNs
Layer 2 Circuits
Layer 3 VPNs
Configuring Signaling Protocols for Traffic Engineering
Signaling Protocol Overview
LDP Signaling Protocol
RSVP Signaling Protocol
Before You Begin
Configuring LDP and RSVP with a Configuration Editor
Configuring LDP-Signaled LSPs
Configuring RSVP-Signaled LSPs
Verifying an MPLS Configuration
Verifying an LDP-Signaled LSP
Verifying LDP Neighbors
Verifying LDP Sessions
Verifying the Presence of LDP-Signaled LSPs
Verifying Traffic Forwarding over the LDP-Signaled LSP
Verifying an RSVP-Signaled LSP
Verifying RSVP Neighbors
Verifying RSVP Sessions
Verifying the Presence of RSVP-Signaled LSPs
Configuring Virtual Private Networks
VPN Configuration Overview
Sample VPN Topology
Basic Layer 2 VPN Configuration
Basic Layer 2 Circuit Configuration
Basic Layer 3 VPN Configuration
Before You Begin
Configuring VPNs with a Configuration Editor
Configuring Interfaces Participating in a VPN
Configuring Protocols Used by a VPN
Configuring MPLS for VPNs
Configuring a BGP Session
Configuring Routing Options for VPNs
Configuring an IGP and a Signaling Protocol
Configuring LDP for Signaling
Configuring RSVP for Signaling
Configuring a Layer 2 Circuit
Configuring a VPN Routing Instance
Configuring a VPN Routing Policy
Configuring a Routing Policy for Layer 2 VPNs
Configuring a Routing Policy for Layer 3 VPNs
Verifying a VPN Configuration
Pinging a Layer 2 VPN
Pinging a Layer 3 VPN
Pinging a Layer 2 Circuit
Configuring CLNS VPNs
CLNS Terms
CLNS Overview
Before You Begin
Configuring CLNS with a Configuration Editor
Configuring a VPN Routing Instance (Required)
Configuring ES-IS
Configuring IS-IS for CLNS
Configuring CLNS Static Routes
Configuring BGP for CLNS
Verifying CLNS VPN Configuration
Displaying CLNS VPN Configuration
Configuring IPsec for Secure Packet Exchange
IPsec Terms
IPsec Overview
Authentication and Encryption Algorithms in IPsec
Authentication Methods in IPsec
Preshared Keys
Digital Certificates
Certificate Revocation Lists (CRLs)
Traffic Protection in IPsec
Security Associations
Dynamic Security Associations and IKE Protocol
IPsec Modes
Before You Begin
Configuring an IPsec Tunnel with Quick Configuration
Configuring IPsec with a Configuration Editor
Configuring IPsec Manual Security Associations
Configuring IPsec Dynamic Security Associations
Configuring an IKE Proposal
Configuring an IKE Policy
Configuring an IPsec Proposal
Configuring an IPsec Policy
Configuring IPsec Rules
Configuring IPsec Services Interfaces
Configuring Service Sets
Configuring a Local Gateway
Configuring Next-Hop Services Interfaces
Configuring Interface Service Sets
Applying IPsec Rules to Service Sets
Configuring a NAT Pool
Configuring Digital Certificates for IPsec Tunnels
Configuring a CA Profile with a Configuration Editor
Requesting a CA Certificate from a CA
Generating a Public and Private Key Pair
Generating and Enrolling a Local Digital Certificate
Loading a Digital Certificate on a Services Router
Applying the Local Digital Certificate to an IPsec Tunnel
Deleting a Digital Certificate
Verifying the IPsec Tunnel Configuration
Verifying IPsec Tunnel Statistics
Multicast Overview
Multicast Terms
Multicast Architecture
Upstream and Downstream Interfaces
Subnetwork Leaves and Branches
Multicast IP Address Ranges
Notation for Multicast Forwarding States
Dense and Sparse Routing Modes
Strategies for Preventing Routing Loops
Reverse-Path Forwarding for Loop Prevention
Shortest-Path Tree for Loop Prevention
Administrative Scoping for Loop Prevention
Multicast Protocol Building Blocks
Configuring a Multicast Network
Before You Begin
Configuring a Multicast Network with a Configuration Editor
Configuring SAP and SDP (Optional)
Configuring IGMP (Required)
Configuring the PIM Static RP (Optional)
Filtering PIM Register Messages from Unauthorized Groups and Sources (Optional)
Rejecting Incoming PIM Register Messages on an RP Router
Stopping Outgoing PIM Register Messages on a Designated Router
Configuring a PIM RPF Routing Table (Optional)
Verifying a Multicast Configuration
Verifying SAP and SDP Addresses and Ports
Verifying the IGMP Version
Verifying the PIM Mode and Interface Configuration
Verifying the PIM RP Configuration
Verifying the RPF Routing Table Configuration
Configuring Data Link Switching
DLSw Terms
DLSw Overview
Switch-to-Switch Protocol for DLSw
DLSw Operational Stages
DLSw Capabilities Exchange
DLSw Circuits Establishment
Class of Service for DLSw
DLSw Ethernet Redundancy
DLSw Peer Preference and Load Balancing
Before You Begin
Configuring DLSw with Quick Configuration
Configuring DLSw with a Configuration Editor
Configuring Basic DLSw (Required)
Configuring LLC Type 2 Properties on an Ethernet Interface
Configuring DLSw on the Local Services Router
Configuring DLSw on the Remote Services Router
Configuring CoS for DLSw (Optional)
Configuring DLSw Ethernet Redundancy (Optional)
Configuring DLSw Peer Preference and Load Balancing (Optional)
Clearing the DLSw Reachability Cache
Verifying DLSw Configuration
Displaying LLC Type 2 Properties on a Fast Ethernet Interface
Displaying DLSw Capabilities
Displaying DLSw Circuit State
Displaying Details of a DLSw Circuit State
Displaying DLSw Peers
Displaying Details of DLSw Peers
Displaying DLSw Reachability Information
Displaying DLSw Ethernet Redundancy Properties
Displaying DLSw Ethernet Redundancy Statistics
Policy Framework Overview
Policy Framework Terms
Routing Policies
Routing Policy Overview
Routing Policy Terms
Default and Final Actions
Applying Routing Policies
Routing Policy Match Conditions
Routing Policy Actions
Stateful Firewall Filters
Stateful Firewall Filter Overview
Stateful Firewall Filter Match Conditions
Stateful Firewall Filter Actions
Stateless Firewall Filters
Stateless Firewall Filter Overview
Stateless Firewall Filter Terms
Chained Stateless Firewall Filters
Planning a Stateless Firewall Filter
Stateless Firewall Filter Match Conditions
Stateless Firewall Filter Actions and Action Modifiers
Network Address Translation
NAT Overview
Source Static NAT
Source Dynamic NAT with NAPT
Source Dynamic NAT Without NAPT
Destination Static NAT
Full-Cone NAT (Bidirectional NAT)
NAT Components
NAT Pools
NAT Rules
Configuring Routing Policies
Before You Begin
Configuring a Routing Policy with a Configuration Editor
Configuring the Policy Name (Required)
Configuring a Policy Term (Required)
Rejecting Known Invalid Routes (Optional)
Injecting OSPF Routes into the BGP Routing Table (Optional)
Grouping Source and Destination Prefixes in a Forwarding Class (Optional)
Configuring a Policy to Prepend the AS Path (Optional)
Configuring Damping Parameters (Optional)
Configuring NAT
Before You Begin
Configuring NAT with a Configuration Editor
Configuring Basic Source Static NAT
Configuring Destination Static NAT
Statically Assigning NAT Addresses from a Dynamic Pool
Configuring Full-Cone NAT
Configuring NAT Rules Without Defining Pools
Defining an Overload Pool or an Overload Prefix
Defining Rules for Transparent NAT
Applying NAT to an Interface
Verifying NAT Configuration
Displaying NAT Configurations
Verifying NAT
Configuring Stateful Firewall Filters and NAT
Before You Begin
Configuring a Stateful Firewall Filter with Quick Configuration
Configuring a Stateful Firewall Filter with a Configuration Editor
Verifying Stateful Firewall Filter Configuration
Displaying Stateful Firewall Filter Configurations
Verifying a Stateful Firewall Filter
Configuring Stateless Firewall Filters
Before You Begin
Configuring a Stateless Firewall Filter with Quick Configuration
Configuring IPv4 and IPv6 Stateless Firewall Filters
Assigning IPv4 and IPv6 Firewall Filters to Interfaces
Configuring a Stateless Firewall Filter with a Configuration Editor
Stateless Firewall Filter Strategies
Strategy for a Typical Stateless Firewall Filter
Strategy for Handling Packet Fragments
Configuring a Routing Engine Firewall Filter for Services and Protocols from Trusted Sources
Configuring a Routing Engine Firewall Filter to Protect Against TCP and ICMP Floods
Configuring a Routing Engine Firewall Filter to Handle Fragments
Applying a Stateless Firewall Filter to an Interface
Verifying Stateless Firewall Filter Configuration
Displaying Stateless Firewall Filter Configurations
Displaying Stateless Firewall Filter Logs
Displaying Firewall Filter Statistics
Verifying a Services, Protocols, and Trusted Sources Firewall Filter
Verifying a TCP and ICMP Flood Firewall Filter
Verifying a Firewall Filter That Handles Fragments
Class-of-Service Overview
CoS Terms
Benefits of CoS
CoS Across the Network
JUNOS CoS Components
Code-Point Aliases
Classifiers
Behavior Aggregate Classifiers
Multifield Classifiers
Forwarding Classes
Loss Priorities
Forwarding Policy Options
Transmission Queues
Schedulers
Transmit Rate
Delay Buffer Size
Scheduling Priority
Shaping Rate
RED Drop Profiles
Virtual Channels
Policers for Traffic Classes
Rewrite Rules
How CoS Components Work
CoS Process on Incoming Packets
CoS Process on Outgoing Packets
Default CoS Settings
Default CoS Values and Aliases
Forwarding Class Queue Assignments
Scheduler Settings
Default Behavior Aggregate Classifiers
CoS Value Rewrites
Sample Behavior Aggregate Classification
Transmission Scheduling on J-series Services Routers
Configuring Class of Service
Before You Begin
Configuring CoS with Quick Configuration
Defining CoS Components
Defining CoS Value Aliases
Defining Forwarding Classes
Defining Classifiers
Defining Rewrite Rules
Defining Schedulers
Defining Virtual Channel Groups
Assigning CoS Components to Interfaces
Configuring CoS Components with a Configuration Editor
Configuring a Policer for a Firewall Filter
Configuring and Applying a Firewall Filter for a Multifield Classifier
Assigning Forwarding Classes to Output Queues
Configuring and Applying Rewrite Rules
Configuring and Applying Behavior Aggregate Classifiers
Configuring RED Drop Profiles for Congestion Control
Configuring Schedulers
Configuring and Applying Scheduler Maps
Configuring and Applying Virtual Channels
Configuring and Applying Adaptive Shaping for Frame Relay
Configuring Strict High Priority for Queuing with a Configuration Editor
Configuring Large Delay Buffers with a Configuration Editor
Maximum Delay Buffer Sizes Available to Interfaces
Delay Buffer Size Allocation Methods
Specifying Delay Buffer Sizes for Queues
Configuring a Large Delay Buffer on a Channelized T1 interface
Verifying a CoS Configuration
Verifying Multicast Session Announcements
Verifying a Virtual Channel Configuration
Verifying a Virtual Channel Group Configuration
Verifying an Adaptive Shaper Configuration
Index
Index