Juniper JUNOSE SOFTWARE FOR E SERIES 11.3.X - IP SERVICES CONFIGURATION GUIDE 2010-10-01 Configuration Manual page 348

Software for e series broadband services routers ip services configuration guide
Table of Contents

Advertisement

JunosE 11.3.x IP Services Configuration Guide
community lists, BGP............................................................37
conventions
notice icons....................................................................xxiii
text and syntax.............................................................xxiv
CRL (certificate revocation list).....................................206
checking.........................................................................208
viewing.............................................................................228
customer support..................................................................xxv
contacting JTAC............................................................xxv
D
dead peer detection. See DPD
default-information originate command......................26
destination profiles
configuring.....................................................................255
monitoring......................................................................259
destruct timeout period for single-shot
tunnels.................................................................................284
digital certificates
authenticating the peer............................................208
base64............................................................................205
CA hierarchy..................................................................208
certificate chains.........................................................208
checking CRLs..............................................................208
configuring.......................................................................213
file extensions..............................................................208
generating private/public key pairs......................208
monitoring......................................................................228
obtaining a public key certificate..........................208
obtaining a root CA certificate...............................208
obtaining public keys without........................212, 224
offline configuration....................................................213
offline enrollment.......................................................208
online configuration.....................................................219
online enrollment........................................................208
overview..........................................................................205
signature authentication..........................................207
standards.......................................................................208
viewing........................................................208, 209, 228
X.509v3...........................................................................207
documentation set
comments on.................................................................xxv
DPD (dead peer detection)...............................................133
DVMRP (Distance Vector Multicast Routing
Protocol)
reassembly of tunnel packets................................270
tunnels.............................................................................238
dvmrp destination profile command............................257
322
DVMRP with IPSec
how it works..................................................................288
setting up secure connection.................................288
dynamic IP tunnels
configuring.....................................................................255
monitoring......................................................................259
overview...........................................................................251
dynamic tunnels....................................................................251
E
enable commands
enable ipsec-transport.............................................285
enable ipsec-transport command.................................257
endpoints, tunnel..................................................................237
F
filter lists, BGP..........................................................................22
filtering
AS paths.............................................................................22
network prefixes.............................................................20
undesirable traffic..........................................................32
firewall
configuring......................................................................107
monitoring........................................................................114
firewall commands
license firewall maximum-virtual-router..............111
flow statistics commands
cache entries...................................................................95
cache timeout.................................................................95
enabled..............................................................................95
export destination ........................................................95
export source...................................................................95
ip flow-aggregation cache ........................................95
mask destination ..........................................................95
FQDN (fully qualified domain name)..........127, 143, 148
aggressive mode...........................................................134
user@fqdn format........................................................127
with digital certificates................................................127
with preshared keys.....................................................127
fully qualified domain name. See FQDN
G
GRE (Generic Routing Encapsulation)
reassembly of tunnel packets................................270
tunnels.............................................................................237
gre destination profile command..................................258
GRE with IPSec
how it works..................................................................288
setting up secure connection.................................288
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Junose 11.3

Table of Contents