Juniper NETWORK AND SECURITY MANAGER 2010.4 - M-SERIES AND MX-SERIES DEVICES GUIDE REV 1 Manual page 393

Network and security manager
Table of Contents

Advertisement

Related
Documentation
Copyright © 2010, Juniper Networks, Inc.
Table 200: RSVP Configuration Details (continued)
Task
Preempt RSVP sessions.
Enable RSVP protocol–level
trace options.
Enable ultimate-hop
popping on
point-to-multipoint LSPs.
Configuring the ILMI Protocol (NSM Procedure) on page 257
Configuring Link Management Protocol (NSM Procedure) on page 277
Your Action
1.
Click Preemption next to Rsvp.
2. In the Comment box, enter the comment.
3. Select one of the following:
disabled—To stop preempt RSVP sessions.
normal—To preempt RSVP sessions to accommodate new
higher-priority sessions when bandwidth is insufficient to
handle all sessions.
aggressive—To preempt RSVP sessions whenever bandwidth
is insufficient to handle all sessions.
4. Click Soft Preemption next to Preemption.
5. From the Cleanup Timer list, select a timer value for soft
preemption
A value of 0 disables soft preemption.
Range: 0 through 180 seconds
Default: 30 seconds
1.
Click Traceoptions next to Rsvp.
2. In the Comment box, enter the comment for the traceoptions.
3. Click File next to Traceoptions.
4. In the Comment box, enter the comment for the filename.
5. In the Filename box, enter the name of the file to receive the
output of the tracing operation.
6. In the Size box, enter the maximum trace file size.
7. From the Files list, select the maximum number of trace files.
8. Select one of the following:
no-world-readable—To restrict the file access to owner.
world-readable—To enable unrestricted access.
9. Click Flag next to Traceoptions.
10. Click Add new entry next to Flag.
11. From the Name list, select the flag to perform the trace
operation.
12. In the Comment box, enter the comment for the flag.
13. Select the corresponding modifier for the tracing flag.
1.
Click Tunnel Services next to Rsvp.
2. Click Devices next to Tunnel Services.
3. Click Add new entry next to Devices.
4. In the New devices window, enter the device names that specify
which virtual tunnel interfaces are used to handle the RSVP
traffic.
Range: 0 to 8 devices
Chapter 20: Configuring Protocols
357

Advertisement

Table of Contents
loading

This manual is also suitable for:

M-seriesMx-series

Table of Contents