Juniper NETWORK AND SECURITY MANAGER - NSM CONFIGURATION GUIDE FOR EX SERIES DEVICES REV 3 Configuration Manual page 105

Nsm configuration guide for ex series devices
Table of Contents

Advertisement

Table 56: BGP Configuration Fields
Field
General
Path Selection
Traceoptions
Metric Out
Multihop
Copyright © 2010, Juniper Networks, Inc.
Select
.
3.
BGP
Add/Modify the parameters under the respective tabs as specified in Table 56 on
4.
page 89.
Click one:
5.
OK—To save the changes.
Cancel—To cancel the modifications.
Apply — To apply the protocol settings.
NOTE: After you make changes to a device configuration, you must push that
updated device configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See Updating
Devices for more information.
Function
The general parameters to be set up for
applying BGP.
Enables you to specify the path selection
criteria.
Defines trace options for IGMP snooping.
Enables you to specify the metric value
to add to the routes transmitted to the
neighbor.
If an EBGP peer is more than one hop
away from the local router, you must
specify the next hop to the peer so that
the two systems can establish a BGP
session. This type of session is called a
multihop BGP session.
Chapter 8: Configuring Protocols
Your Action
1.
Expand the
tree.
Protocol
2. Select
and select
BGP
General
3. Specify the general parameters like
comment, description, local address,
hold time, etc.
1.
Expand the
Protocol
tree.
2. Select
and select
BGP
Path Selection
tab.
3. Set up the path selection parameters
and med plus IGP.
1.
Expand the
tree.
Protocol
2. Select
BGP
and select
Traceoptions
tab.
3. Set up the file and flag parameters.
1.
Expand the
tree.
Protocol
2. Select
and select
BGP
Metric Out
3. Set up the metric value and minimum
IGP.
1.
Expand the
tree.
Protocol
2. Select
and select
BGP
Multihop
3. Set up the comment, Ttl and specify
whether the next hop has to be
changed.
tab.
tab.
tab.
89

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents