Juniper NETWORK AND SECURITY MANAGER 2010.3 - M-SERIES AND MX-SERIES DEVICES GUIDE REV1 Manual page 135

M-series and mx-series devices guide
Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Table 48: FPC Configuration Details (continued)
Task
Configure data used in a
hash key for the multiservice
protocol family when
configuring PIC-level
symmetrical hashing for
load balancing on an
802.3ad link aggregation
group.
Configure the channelized
T3 port number on the PIC.
Configure delay buffers.
Your Action
1.
Click Multiservice next to Family.
2.
In the Comment box, enter the comment.
3.
Select the Source Mac check box to include source MAC
address in the hash key.
4.
Select the Destination Mac check box to include destination
MAC address in the hash key.
5.
Click Payload next to Multiservice.
6.
Click Ip next to Payload.
7.
In the Comment box, enter the comment.
8.
Select the Layer 4 check box to include Layer 4 IP information
in the hash key.
9.
Click Layer 3 next to Ip.
10.
Select one of the following:
source-ip-only—To include source IP only in hash-key.
destination-ip-only—To include desintation IP only in
hash-key.
11.
Click Symmetric Hash next to Multiservice.
12.
In the Comment box, enter the comment.
13.
Select the Complement check box to include the complement
of the symmetric hash in the hash key.
1.
Click Add new entry next to Fpc.
2.
Click Pic next to fpc.
3.
Click Add new entry next to Pic.
4.
Click Port next to pic.
5.
From the Name list, select the port number.
6.
In the Comment box, enter the comment.
7.
From the Framing list, select the framing type.
1.
Click Add new entry next to Fpc.
2.
Click Pic next to fpc.
3.
Click Add new entry next to Pic.
4.
Click Q Pic Large Buffer next to pic.
5.
In the Comment box, enter the comment.
Chapter 11: Configuring Chassis
103

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.3 - M-SERIES AND MX-SERIES DEVICES GUIDE REV1 and is the answer not in the manual?

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents