Juniper NETWORK AND SECURITY MANAGER 2010.3 - M-SERIES AND MX-SERIES DEVICES GUIDE REV1 Manual page 389

M-series and mx-series devices guide
Table of Contents

Advertisement

Related Topics
Copyright © 2010, Juniper Networks, Inc.
Table 200: RSVP Configuration Details (continued)
Task
Preempt RSVP sessions.
Enable RSVP protocol–level
trace options.
Enable ultimate-hop
popping on
point-to-multipoint LSPs.
Configuring the ILMI Protocol (NSM Procedure) on page 255
Configuring Link Management Protocol (NSM Procedure) on page 275
Your Action
1.
Click Preemption next to Rsvp.
2.
In the Comment box, enter the comment.
3.
Select one of the following:
disabled—To stop preempt RSVP sessions.
normal—To preempt RSVP sessions to accommodate new
higher-priority sessions when bandwidth is insufficient to
handle all sessions.
aggressive—To preempt RSVP sessions whenever
bandwidth is insufficient to handle all sessions.
4.
Click Soft Preemption next to Preemption.
5.
From the Cleanup Timer list, select a timer value for soft
preemption
A value of 0 disables soft preemption.
Range: 0 through 180 seconds
Default: 30 seconds
1.
Click Traceoptions next to Rsvp.
2.
In the Comment box, enter the comment for the traceoptions.
3.
Click File next to Traceoptions.
4.
In the Comment box, enter the comment for the filename.
5.
In the Filename box, enter the name of the file to receive the
output of the tracing operation.
6.
In the Size box, enter the maximum trace file size.
7.
From the Files list, select the maximum number of trace files.
8.
Select one of the following:
no-world-readable—To restrict the file access to owner.
world-readable—To enable unrestricted access.
9.
Click Flag next to Traceoptions.
10.
Click Add new entry next to Flag.
11.
From the Name list, select the flag to perform the trace
operation.
12.
In the Comment box, enter the comment for the flag.
13.
Select the corresponding modifier for the tracing flag.
1.
Click Tunnel Services next to Rsvp.
2.
Click Devices next to Tunnel Services.
3.
Click Add new entry next to Devices.
4.
In the New devices window, enter the device names that
specify which virtual tunnel interfaces are used to handle the
RSVP traffic.
Range: 0 to 8 devices
Chapter 20: Configuring Protocols
357

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.3 - M-SERIES AND MX-SERIES DEVICES GUIDE REV1 and is the answer not in the manual?

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents