Configuring Fate Sharing (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.4 - M-SERIES AND MX-SERIES DEVICES GUIDE REV 1 Manual

Network and security manager
Table of Contents

Advertisement

M-series and MX-series Devices

Configuring Fate Sharing (NSM Procedure)

364
Table 204: Dynamic Tunnels Configuration Details (continued)
Task
Define tracing operations
that track all routing protocol
functionality in the router
Fate sharing allows you to create a database of information that the constrained shortest
path first (CSPF) algorithm uses to compute one or more backup routing paths to use
in case the primary path becomes unstable. The database describes the relationships
between elements of the network. Through fate sharing, you can configure backup paths
that minimize the number of shared links and fiber optic cables, to ensure that in the
event of damage to a fiber optic cable, only the minimum amount of data is lost and that
a path still exists to the destination. For a backup path to work optimally, it must not
share links or physical fiber optic cables with the primary path. This ensures that a single
point of failure will not affect the primary and backup paths at the same time.
This feature enables you to specify groups of objects that share characteristics resulting
in backup paths to be used if primary paths fail. All objects are treated as /32 host
addresses. You can specify one or more objects within a group. The objects can be LAN
interfaces, device IDs, or point-to-point links.
To configure fate sharing in NSM:
Your Action
1.
Click Traceoptions next to Dynamic Tunnels.
2. Expand Traceoptions.
3. In the Comment box, enter the comment for the traceoptions.
4. Click File next to Traceoptions.
5. In the Comment box, enter the comment for the filename.
6. In the Filename box, enter the name of the file to receive the
output of the tracing operation.
7. In the Size box, enter the maximum trace file size.
8. From the Files list, select the maximum number of trace files.
9. Select one of the following:
Select no-world-readable—To restrict the file access to
owner.
Select world-readable—To enable unrestricted access.
10. Click Flag next to Traceoptions.
11. Click Add new entry next to Flag.
12. From the Name list, select the flag to perform the trace
operation.
13. In the Comment box, enter the comment for the flag.
14. Select the Disable check box to disable the tracing operation.
15. Select the modifier for the tracing flag. You can specify one or
more of these modifiers:
Select the Send check box for packets being transmitted.
Select Receive check box for packets being received.
Select the Detail check box for detailed trace information.
Select the Disable check box to disable the tracing
operation.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

M-seriesMx-series

Table of Contents