Juniper JUNOSE SOFTWARE FOR E SERIES 11.3.X - POLICY MANAGEMENT CONFIGURATION GUIDE 2010-10-04 Configuration Manual page 302

Software for e series broadband services routers policy management configuration guide
Hide thumbs Also See for JUNOSE SOFTWARE FOR E SERIES 11.3.X - POLICY MANAGEMENT CONFIGURATION GUIDE 2010-10-04:
Table of Contents

Advertisement

JunosE 11.3.x Policy Management Configuration Guide
filtering IP options..........................................................35
matching IP flags in a CLACL......................................12
matching IP fragmentation offset in a
CLACL..............................................................................12
matching TCP flags in a CLACL.................................12
merging policies..............................................................97
modifying a one-rate rate-limit profile..................79
modifying a two-rate rate-limit profile..................84
monitoring packet flow ...................................173, 205
one-rate rate-limit profile...........................................93
overview...............................................................................3
packet logging...................................................................4
packet mirroring................................................................3
packet tagging............................................................3, 35
policy actions and rate-limit profiles.......................81
policy routing......................................................................3
policy rules, creating......................................................27
QoS classification and marking..................................3
RADIUS support................................................................3
rate limiting traffic flows.............................................94
rate-limit profile actions...............................................81
rate-limit profile attributes..........................................81
rate-limit profile calculations....................................89
rate-limit profile defaults.....................................89, 91
resources..............................................................................5
security..................................................................................3
policy management configuration tasks..........................6
policy parameter
considerations..................................................................71
quick configuration........................................................73
reference-rate.................................................................69
policy rule commands
forward...............................................................................33
forward interface............................................................33
forward next-hop...........................................................33
policy rules
creating...............................................................................27
precedence.......................................................................29
supported commands.................................................29
R
rate limiting
aggregate traffic flows.................................................94
for interfaces....................................................................58
hierarchical.......................................................................59
individual traffic flows..................................................94
rate-limit hierarchies.............................................................59
classifier groups..............................................................59
color-aware configuration..........................................68
278
rate-limit actions............................................................59
rate-limit profiles...........................................................59
rate-limit rules.................................................................59
rate-limit profiles
attributes............................................................................81
burst size...........................................................................69
calculations .....................................................................89
configuration procedure..............................................73
creating.......................................................................79, 84
default values...........................................................89, 91
modifying...................................................................79, 84
percent-based rates.....................................................69
policy actions...................................................................81
rates....................................................................................69
rate-limit rule
with mark rule.................................................................85
rate-limit-profile one-rate command.............................89
rate-limit-profile two-rate command..............................91
rate-limiting SRP traffic flows...........................................95
resolving merge conflicts....................................................99
S
secure audit logging for packet mirroring.........249, 254
secure policy-list command.............................................225
Service Manager
merging policies..............................................................97
show commands
show color-mark-profile ...........................................179
show control-plane policer ......................................179
show frame-relay subinterface..............................180
show gre tunnel.............................................................181
show interfaces.............................................................183
show ipv6 interface.....................................................189
show parent-group..............195, 196, 202, 203, 205
show policy-parameter.............................................202
show rate-limit-profile .............................................203
show secure classifier-list........................................264
show vlan subinterfaces..................................175, 205
show ip commands
show ip interface................................................185, 258
show ip mirror interface............................................259
show mirror commands
show mirror log..................................................260, 268
show mirror rules..........................................................261
show mirror subscribers............................................262
show radius commands
show radius servers....................................................263
show radius statistics................................................263
show secure policy-list command.................................267
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Junose 11.3

Table of Contents