Juniper JUNOSE SOFTWARE FOR E SERIES 11.3.X - SYSTEM BASICS CONFIGURATION GUIDE 2010-10-04 Configuration Manual page 621

Software for e series broadband services routers system basics configuration guide
Hide thumbs Also See for JUNOSE SOFTWARE FOR E SERIES 11.3.X - SYSTEM BASICS CONFIGURATION GUIDE 2010-10-04:
Table of Contents

Advertisement

IPSec Peer Public Key Configuration mode...........70, 92
IPSec Transport Profile Configuration
mode................................................................................70, 92
IPSec Tunnel Profile Configuration mode.....................93
IPv6 Local Configuration mode........................................94
IPv6 Local Pool Configuration mode................................71
IS-IS protocol............................................................................23
issuing commands from other CLI modes.................243
J
Juniper Networks E Series enterprise SNMP
MIB.........................................................................................138
K
keywords.............................................................................29, 30
partial-keyword .............................................................60
L
L2 Transport Load-Balancing-Circuit Configuration
mode.................................................................................71, 95
L2C commands
l2c.........................................................................................81
neighbor.............................................................................81
L2TP (Layer 2 Tunneling Protocol)..................................25
l2tp commands
l2tp destination profile.................................................81
l2tp rate-limit-profile.....................................................81
l2tp switch-profile..........................................................81
L2TP Destination Profile Configuration
mode.................................................................................71, 95
L2TP Destination Profile Host Configuration
mode.................................................................................71, 95
L2TP Tunnel Switch Profile Configuration
mode.................................................................................71, 96
Layer 2 Control Configuration mode.........................71, 96
Layer 2 Control Neighbor Configuration
mode.................................................................................72, 97
Layer 2 Tunneling Protocol. See L2TP
layered approach to network configuration....................6
LDP Configuration mode...............................................72, 97
Left Arrow key..........................................................................64
levels of CLI access...............................................................431
line command......................................................410, 413, 419
Line Configuration mode...............................................72, 97
line module configurations
deleting..................................................................357, 358
line modules
allowed combinations....................................360, 363
bandwidth.....................................................................360
Copyright © 2010, Juniper Networks, Inc.
combinations.....................................................359, 360
disabling.........................................................................346
enabling...........................................................................347
erasing configurations......................................357, 358
initialization sequence.................................................45
line rates.............................................................................10
performance rate.........................................................359
replacing.........................................................................350
restricted combinations............................................363
slot groups...........................................................360, 363
software
compatibility........................................................359
switch usage.................................................................360
troubleshooting...........................................................309
line rates......................................................................................10
line vty command.........................................................97, 246
lines
clearing............................................................................248
configuring.....................................................................246
monitoring......................................................................246
setting on terminal screen.......................................269
link-up, link-down traps, SNMP.......................................162
linking to an FTP server. See FTP access
listing commands available...............................................60
listing configuration settings. See show commands
listing files on system..........................................................282
LMI (local management interface)...................................17
Local IPSec Transport Profile Configuration
mode.........................................................................72, 76, 98
Local User Configuration mode.................................72, 98
location of SNMP server.....................................................150
log commands......................................................................309
log severity......................................................................162
logging in to system...............................................................45
logging system events
viewing logs...................................................................476
login banner............................................................................273
login commands
login................................................................269, 410, 413
login authentication....................................................418
login conditions
configuring.......................................................................271
long scripts, copying...........................................................368
M
MAC (media access control) addresses
configuring for SSH.....................................................422
macro (.mac) files......................................................278, 459
macro command..................................................................481
Index
591

Advertisement

Table of Contents
loading

This manual is also suitable for:

Junose 11.3

Table of Contents