suspicious control flow detection.................................436
display options.............................................................436
logs...................................................................................436
parameters....................................................................436
traps.................................................................................436
suspicious control flow monitoring...............................437
suspicious-control-flow-detection commands
baseline suspicious-control-flow-detection
counts.........................................................................436
clear suspicious-control-flow-detection...........436
suspicious-control-flow-detection
grouping-off..............................................................436
suspicious-control-flow-detection off...............436
suspicious-control-flow-detection protocol
backoff-time............................................................436
suspicious-control-flow-detection protocol
low-threshold...........................................................436
suspicious-control-flow-detection protocol
threshold....................................................................436
switch fabric modules. See SFMs
switch usage, line modules..............................................360
synchronization process....................................................368
synchronization reserve file..............................................369
synchronize command.............................................369, 373
system
autoupgrade feature...................................................241
basic parameters........................................................403
booting.................................................................495, 504
rebooting...............................................................500
command-line interface. See CLI
configuring automatically........................................264
environment information..........................................323
exiting.................................................................................46
FTP client........................................................................287
FTP server.......................................................................287
initializing line modules...............................................45
levels of access....................................................431, 432
logging in...........................................................................45
logging/troubleshooting, commands
for........................................................................309, 335
managing........................................................................239
monitoring......................................................................322
passwords......................................................................403
patching with hotfixes...............................................378
physical slots, rebooting..........................................500
RADIUS password authentication.........................421
software reset button................................................410
system configuration files.........................................277
system name................................................................240
Copyright © 2010, Juniper Networks, Inc.
TFTP client.....................................................................287
timing................................................................................241
updating with hotfixes...............................................378
virtual router limitations............................................525
system clock
setting................................................................................511
system commands
privilege.............................................................................49
privilege-group alias.....................................................49
privilege-group membership.....................................49
privilege-group membership clear..........................49
write core.........................................................................312
system configuration
saving current...............................................................264
saving startup...............................................................264
system passwords. See passwords
system security.....................................................................403
system.log file........................................................................278
T
T1 lines, controllers for............................................................12
T3 interfaces
configuring.........................................................................13
controllers for....................................................................12
line rates.............................................................................10
Tab key................................................................................32, 60
TACACS+
aaa authentication login...........................................416
restricting access to commands............................431
tag-group command..........................................................258
tech-support encoded-string command.....................319
technical support
contacting JTAC...........................................................xxix
Telnet
access lists.....................................................................420
client, using....................................................................305
configuring to listen in nondefault virtual
router...........................................................................305
logins...................................................................................45
telnet commands
telnet................................................................................305
telnet listen....................................................................305
terminal
configuring display......................................................269
displaying configuration............................................274
displaying international characters......................270
sending messages to..................................................276
setting length (in lines).............................................269
setting width (in characters)..................................269
Index
599
Need help?
Do you have a question about the JUNOSE SOFTWARE FOR E SERIES 11.3.X - SYSTEM BASICS CONFIGURATION GUIDE 2010-10-04 and is the answer not in the manual?
Questions and answers