Juniper SYSTEM BASICS - CONFIGURATION GUIDE V 11.1.X Configuration Manual page 637

System basics configuration guide software for e series broadband services routers
Table of Contents

Advertisement

message authentication
configuring..................................................437
hmac-md5...................................................437
hmac-sha1...................................................437
hmac-sha1-96..............................................437
monitoring..........................................................437
performance issues.............................................437
security concerns................................................437
server public key files.........................................291
terminating.........................................................437
user authentication.............................................435
configuring..................................................437
user key management........................................435
standards
draft RFCs...........................................................584
hardware standards............................................590
non-RFC software standards...............................587
RFCs...................................................................571
startup configuration
saving.................................................................277
static host maps, adding....................................301, 316
static tunnels................................................................23
statistics
SNMP..........................................................195, 237
statistics (.sts) files.....................................................291
Statistics Profile Configuration mode...................83, 119
statistics-profile command.........................................119
status indicator (CLI)....................................................43
stratum 1 servers. See NTP servers, primary
structural errors in flash data.....................................384
Subinterface Configuration mode.........................83, 119
subinterfaces............................................................8, 88
configuring............................................................88
subscriber interfaces....................................................23
subscriber policy commands
subscriber-policy...................................................88
Subscriber Policy Configuration mode.................84, 120
summer time, specifying............................................525
support, technical See technical support
suspicious control flow detection...............................451
display options....................................................451
logs.....................................................................451
parameters.........................................................451
traps...................................................................451
suspicious control flow monitoring............................452
suspicious-control-flow-detection commands
baseline suspicious-control-flow-detection
counts.............................................................451
clear suspicious-control-flow-detection................451
suspicious-control-flow-detection
grouping-off.....................................................451
suspicious-control-flow-detection off...................451
suspicious-control-flow-detection protocol
backoff-time....................................................451
suspicious-control-flow-detection protocol
low-threshold..................................................451
suspicious-control-flow-detection protocol
threshold.........................................................451
switch fabric modules. See SFMs
switch usage, line modules.........................................373
synchronization process.............................................381
synchronization reserve file.......................................383
synchronize command.......................................382, 386
system
autoupgrade feature............................................253
basic parameters................................................417
booting.......................................................509, 517
rebooting.....................................................514
command-line interface. See CLI
configuring automatically....................................276
environment information....................................337
exiting..................................................................49
FTP client............................................................300
FTP server..........................................................300
initializing line modules........................................48
levels of access...........................................446, 447
logging in..............................................................48
logging/troubleshooting, commands
for...........................................................323, 348
managing............................................................251
monitoring..........................................................337
passwords...........................................................417
patching with hotfixes.........................................392
physical slots, rebooting......................................514
RADIUS password authentication........................435
software reset button..........................................424
system configuration files...................................290
system name......................................................252
TFTP client..........................................................300
timing.................................................................253
updating with hotfixes........................................392
virtual router limitations.....................................539
system clock
setting.................................................................525
system commands
privilege................................................................52
privilege-group alias..............................................52
privilege-group membership.................................52
privilege-group membership clear.........................52
write core...........................................................326
system configuration
saving current.....................................................277
saving startup.....................................................277
system passwords. See passwords
system security..........................................................417
system.log file............................................................290
T
T1 lines, controllers for................................................12
Index
607
Index

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SYSTEM BASICS - CONFIGURATION GUIDE V 11.1.X and is the answer not in the manual?

This manual is also suitable for:

Junose 11.1

Table of Contents