Juniper JUNOSE SOFTWARE 11.2.X - LINK LAYER CONFIGURATION GUIDE 7-7-2010 Configuration Manual page 755

Software for e series broadband services routers link layer configuration guide
Table of Contents

Advertisement

ipv6 nd other-config-flag.........................................570
ipv6 nd prefix-advertisement.................................570
ipv6 nd ra-interval.......................................................570
ipv6 nd reachable-time.............................................570
ipv6 nd suppress-ra....................................................570
ipv6 policy......................................................................570
ipv6 sa-validate...........................................................570
ipv6 unnumbered........................................................570
ipv6 virtual-router.......................................................570
IPv6 neighbor discovery commands
ipv6 nd reachable-time.............................................570
IPv6 profile...............................................................................561
ITU (International Telecommunication Union)
recommendation, ATM OAM standards.....................14
IWF
configuration scenarios
multiple DSLAMs connected to an access
concentrator.....................................................392
single DSLAM connected to an access
concentrator.....................................................392
defined by the DSL Forum
for conversion of PPPoA and PPPoE over
ATM sessions...................................................382
definition of, uses........................................................382
enabling migration of DSL networks
from ATM to Ethernet links.............................382
PPPoE sessions
dynamic encapsulation type lockout..........523
with duplicate MAC
addresses.......................................382, 383, 391
with duplicate protection feature
enabled..............................................................385
IWF PPPoE sessions
duplicate protection of
guidelines for configuring.................................391
dynamic encapsulation type lockout
configuration example......................................525
guidelines for configuring................................524
using DSL Forum VSAs as criteria................523
processing of
duplicate MAC addresses in multiple
sessions..............................................................391
dynamic encapsulation type lockout..........523
with duplicate MAC addresses of clients
ATM-to-Ethernet interworking......................383
dependence on pppoe sessions command
configuration....................................................385
limit on maximum number of
sessions.............................................................385
Copyright © 2010, Juniper Networks, Inc.
scenario, multiple DSLAMs linked to a
B-RAS.................................................................392
scenario, single DSLAM linked to a
B-RAS.................................................................392
IWF PPPoE tag
insertion in the PADR packet
sent from the PPPoE client to the access
concentrator....................................................383
used to distinguish
between an IWF and a non-IWF PPPoE
session...............................................................383
IWF-Session DSL Forum VSA
absence in PADR packets
duplicate protection, disabled........................391
duplicate protection, enabled........................391
presence in PADR packets
and B-RAS application...........................382, 383
duplicate protection, disabled........................391
duplicate protection, enabled........................391
duplicate protection, guidelines....................391
dynamic encapsulation type lockout..........523
enabling multiple sessions with the same
MAC address....................................................385
suboption for
field code...............................................................393
length field, value...............................................393
J
J-Flow commands
ip route-cache flow sampled.................................566
K
keepalive timer, setting.........................................................28
L
L2TP (Layer 2 Tunneling Protocol)................................156
profile characteristics................................................560
using PPPoE remote circuit ID........................377, 413
l2tp commands
l2tp policy.......................................................................570
L2TP Proxy Authenticate Extensions for
EAP—draft-ietf-l2tpext-proxy-authen-ext-eap-01.txt
(December 2006 expiration)............................265, 270
LACP (Link Aggregation Control Protocol).................198
PPPoE subinterfaces.......................................202, 205
redundant member link behavior...........................212
Index
723

Advertisement

Table of Contents
loading

This manual is also suitable for:

Junose 11.2

Table of Contents