Sign In
Upload
Manuals
Brands
Juniper Manuals
Network Router
MX Series
Juniper MX Series Manuals
Manuals and User Guides for Juniper MX Series. We have
5
Juniper MX Series manuals available for free PDF download: Manual, Configuration Manual, Datasheet, Quick Start
Juniper MX Series Manual (628 pages)
Network and Security Manager
Brand:
Juniper
| Category:
Software
| Size: 7.8 MB
Table of Contents
Table of Contents
7
About this Guide
31
Audience
31
Documentation Conventions
31
Objectives
31
Table 1: Notice Icons
32
Table 2: Text Conventions
32
About this Guide
33
Documentation
33
Table 3: Syntax Conventions
33
Table 4: Network and Security Manager Publications
33
Requesting Technical Support
34
Self-Help Online Tools and Resources
35
Opening a Case with JTAC
35
Getting Started
37
Before You Begin Adding M-Series and MX-Series Devices
37
Chapter 1 Getting Started with NSM
39
Introduction to Network and Security Manager
39
Installing NSM
39
Role-Based Administration
40
Chapter 2 Understanding the JUNOS CLI and NSM
41
NSM and Device Management Overview
41
Understanding the CLI and NSM
42
Comparing the CLI to the NSM UI
43
Understanding the JUNOS CLI and NSM
43
Figure 1: Overview of the User Interface
44
NSM Services Supported for M-Series and MX-Series Devices
46
How NSM Works with the CLI and Distributed Data Collection
47
Device Schemas
48
Figure 2: NSM Network Architecture
48
Documentation
48
Communication between a Device and NSM
49
Chapter 3 Before You Begin Adding M-Series and MX-Series Devices
51
M-Series and MX-Series Devices Supported by NSM
51
Table 5: M Series Multiservice Edge Routers and MX Series Ethernet Services Routers
51
Related M-Series and MX-Series Devices Supported by NSM
51
Considering the Device Status
52
Configuring a Deployed M-Series or MX-Series Device for Importing to NSM
53
The Device
53
Check Network Connectivity
54
Check Connectivity to the NSM Server
54
Configure a Static Route to the NSM Server
54
Establish a Telnet or an Sshv2, and a NETCONF Protocol over SSH Connection to the NSM Server
56
Integrating M-Series and MX-Series Devices
59
Adding M-Series and MX-Series Devices Overview
61
Chapter 4 Adding M-Series and MX-Series Devices Overview
61
About Device Creation
61
Related about Device Creation
61
Supported Add Device Workflows for M-Series and MX-Series Devices
62
Importing Devices Overview
63
Modeling Devices Overview
64
Adding Multiple Devices Using Automatic Discovery (JUNOS Software Devices
64
Only)
65
Adding Device Groups Overview
65
Adding Multiple Devices Using Automatic Discovery (JUNOS Software Devices Only)
65
Documentation
66
Chapter 5 Updating M-Series and MX-Series Devices Overview
67
About Updating M-Series and MX-Series Devices
67
How the Update Process Works
68
Job Manager
69
Updating M-Series and MX-Series Devices Overview
69
Tracking Updated Devices Using Job Manager
70
Reviewing Job Information Displayed in Job Manager
71
Figure 3: Job Information Dialog Box
71
Device States Displayed in Job Manager During Update
72
Documentation
72
Understanding Updating Errors Displayed in the Job Manager
73
Table 6: Device States During Update
73
Figure 4: Failed Update Job Information Dialog Box
74
Configuring M-Series and MX-Series Devices
77
Configuring M-Series and MX-Series Devices Overview
77
Chapter 6 Configuring M-Series and MX-Series Devices Overview
79
About Device Configuration
79
M-Series and MX-Series Device Configuration Settings Supported in NSM
80
Table 7: the JUNOS Configuration Hierarchy and the NSM Configuration
80
Configuring M-Series and MX-Series Devices
81
Configuring Device Features
82
Example: Configuration of Interfaces for MPLS in the CLI and NSM
83
Figure 5: MPLS Configuration in the CLI
83
Figure 6: MPLS Configuration in NSM
84
Configuring Access
85
Chapter 7 Configuring Access
85
Configuring Address-Assignment Pools (NSM Procedure)
85
Table 8: Address Assignment Configuration Details
86
Configuring Access Address Pools (NSM Procedure)
88
Configuring Access Group Profile (NSM Procedure)
89
Table 9: Access Address Pool Configuration Details
89
Table 10: Access Group Profile Configuration Details
89
Configuring the LDAP Options (NSM Procedure)
90
Configuring the LDAP Server (NSM Procedure)
91
Table 11: LDAP Options Configuration Details
91
Configuring Access Profiles for L2TP or PPP Parameters (NSM Procedure)
92
Table 12: LDAP Server Configuration Details
92
Configuring Access Profile (NSM Procedure)
93
Procedure)
93
Configuring RADIUS Parameters for AAA Subscriber Management
93
Table 13: Access Profile Properties Configuration Details
93
Configuring the Accounting Order (NSM Procedure)
94
Table 14: Accounting Parameter Configuration Details
94
Configuring the Authentication Order (NSM Procedure)
95
Configuring the Authorization Order (NSM Procedure)
95
Table 15: Accounting Order Configuration Details
95
Table 16: Authentication Order Configuration Details
95
Configuring the L2TP Client (NSM Procedure)
96
Table 17: Authorization Order Configuration Details
96
Table 18: Client Configuration Details
96
Configuring the Client Filter Name (NSM Procedure)
97
Configuring the LDAP Options (NSM Procedure)
98
Table 19: Client Filter Name Configuration Details
98
Table 20: Ldap Options Configuration Details
98
Configuring the LDAP Server (NSM Procedure)
99
Configuring the Provisioning Order (NSM Procedure)
100
Table 21: Ldap Server Configuration Details
100
Table 22: Provisioning Order Configuration Details
100
Procedure)
101
Table 23: RADIUS Parameter Configuration Details
101
Configuring the RADIUS Parameters (NSM Procedure)
104
Table 24: RADIUS Parameters Configuration Details
104
Configuring Session Limit (NSM Procedure)
105
Configuring the RADIUS for Subscriber Access Management, L2TP, or PPP
105
(NSM Procedure)
105
Table 25: RADIUS Server Configuration Details
105
Configuring the RADIUS for Subscriber Access Management, L2TP, or PPP
106
Procedure)
106
Table 26: Session Limit Configuration Details
106
Configuring the RADIUS for Subscriber Access Management, L2TP, or PPP (NSM Procedure)
106
Configuring the Securid Server (NSM Procedure)
107
Table 27: RADIUS Server Configuration Details
107
Configuring the Access Profile (NSM Procedure)
108
Table 28: Securid Server Configuration Details
108
Table 29: Access Profile Configuration Details
108
Chapter 8 Configuring Accounting Options
109
Configuring Accounting Options (NSM Procedure)
109
Configuring Class Usage Profiles (NSM Procedure)
109
Configuring a Log File (NSM Procedure)
110
Table 30: Class Usage Profile Configuration Details
110
Configuring the Filter Profile (NSM Procedure)
111
Table 31: Log File Configuration Details
111
Configuring the Interface Profile (NSM Procedure)
112
Table 32: Filter Profile Configuration Details
112
Configuring the Policy Decision Statistics Profile (NSM Procedure)
113
Table 33: Interface Profile Configuration Details
113
Configuring the MIB Profile (NSM Procedure)
114
Table 34: Policy Decision Statistics Profile Configuration Details
114
Configuring the Routing Engine Profile (NSM Procedure)
115
Table 35: MIB Profile Configuration Details
115
Table 36: Routing Engine Profile Configuration Details
116
Configuring Applications
117
Chapter 9 Configuring Applications
117
Configuring the Application and Application Set (NSM Procedure)
117
Table 37: Applications Configuration Details
118
Chapter 10 Configuring Bridge Domains
119
Configuring Bridge Domains Properties (NSM Procedure)
119
Configuring a Bridge Domain (NSM Procedure)
119
Configuring Layer 2 Learning and Forwarding Properties for a Bridge Domain (NSM Procedure)
120
Table 38: Bridge Domain Configuration Details
120
Table 39: Bridge Options Configuration Details
121
Configuring Forwarding Options (NSM Procedure)
122
Table 40: Forwarding Options Configuration Details
122
Configuring Logical Interfaces (NSM Procedure)
123
Configuring Multicast Snooping Options (NSM Procedure)
124
Table 41: Logical Interface Configuration Details
124
Table 42: Multicast Snooping Options Configuration Details
125
Configuring IGMP Snooping (NSM Procedure)
127
Table 43: Igmp Snooping Configuration Details
128
Configuring VLAN ID (NSM Procedure)
132
Table 44: VLAN ID Configuration Details
133
Configuring Chassis
135
Chapter 11 Configuring Chassis
135
Configuring Aggregated Devices (NSM Procedure)
135
Configuring Chassis Alarms (NSM Procedure)
136
Table 45: Aggregated Devices Configuration Details
136
Configuring Container Interfaces (NSM Procedure)
137
Table 46: Chassis Alarms Configuration Details
137
Table 47: Container Interfaces Configuration Details
137
Configuring Chassis FPC (NSM Procedure)
138
Table 48: FPC Configuration Details
138
Configuring a T640 Router on a Routing Matrix (NSM Procedure)
143
Table 49: Lcc Configuration Details
143
Configuring Routing Engine Redundancy (NSM Procedure)
148
Table 50: Chassis Redundancy Configuration Details
148
Configuring a Routing Engine to Reboot or Halt on Hard Disk Errors (NSM Procedure)
149
Table 51: Chassis Routing Engine Configuration Details
149
Configuring Authentication
151
Chapter 12 Configuring Authentication
151
Configuring RADIUS Authentication (NSM Procedure)
151
Table 52: RADIUS Authentication Configuration Details
151
Configuring TACACS+ Authentication (NSM Procedure)
152
Table 53: TACACS+ Authentication Configuration Details
152
Configuring Authentication Order (NSM Procedure)
153
Configuring User Access (NSM Procedure)
154
Configuring Login Classes
154
Table 54: Login Class Authentication Configuration Details
154
Configuring User Accounts
155
Configuring Template Accounts (NSM Procedure)
155
Table 55: User Authentication Configuration Details
155
Creating a Remote Template Account
156
Table 56: Remote Template Account Details
156
Creating a Local Template Account
157
Table 57: Local Template Account Details
157
Chapter 13 Configuring Class of Service Features
159
Configuring Cos Classifiers (NSM Procedure)
160
Table 58: Configuring and Applying Behavior Aggregate Classifiers
160
Configuring Cos Code Point Aliases (NSM Procedure)
162
Configuring Cos Drop Profile (NSM Procedure)
163
Table 59: Configuring Code Point Aliases
163
Table 60: Drop Profile Configuration Fields
164
Configuring Cos Forwarding Classes (NSM Procedure)
165
Table 61: Assigning Forwarding Classes to Output Queues
166
Configuring Cos Forwarding Policy (NSM Procedure)
167
Table 62: Forwarding Policy Configuration Details
167
Configuring Cos Fragmentation Maps (NSM Procedure)
168
Configuring Cos Host Outbound Traffic (NSM Procedure)
169
Table 63: Fragmentation Maps Configuration Details
169
Configuring Cos Interfaces (NSM Procedure)
170
Table 64: Host Outbound Traffic Configuration Details
170
Table 65: Interfaces Configuration Fields
171
Configuring Cos Routing Instances (NSM Procedure)
176
Table 66: Routing Instances Configuration Details
176
Configuring Cos Schedulers (NSM Procedure)
177
Table 67: Configuring Schedulers
178
Configuring Cos and Applying Scheduler Maps (NSM Procedure)
179
Table 68: Assigning Forwarding Classes to Output Queues
179
Configuring Cos Restricted Queues (NSM Procedure)
180
Configuring Tracing Operations (NSM Procedure)
181
Table 69: Restricted Queue Configuration Details
181
Table 70: Traceoptions Configuration Details
181
Configuring Cos Traffic Control Profiles (NSM Procedure)
182
Configuring Cos Translation Table (NSM Procedure)
183
Table 71: Traffic Control Profile Configuration Details
183
Table 72: Translation Table Configuration Details
184
Chapter 14 Configuring Event Options
189
Configuring Destinations for File Archiving (NSM Procedure)
189
Table 73: Destination Configuration Details
189
Configuring Event Script (NSM Procedure)
190
Table 74: Event Script Configuration Details
191
Generating Internal Events (NSM Procedure)
192
Configuring Event Policy (NSM Procedure)
192
Table 75: Generate Event Details
192
Table 76: Configure Event Policy Details
193
Configuring Event Policy Tracing Operations (NSM Procedure)
195
Table 77: Event Options Traceoptions Configuration Details
196
Configuring Firewall
197
Chapter 15 Configuring Firewall
197
Configuring the Firewall Filter for any Family Type (NSM Procedure)
197
Table 78: Firewall Filter Configuration Details
198
Configuring the Firewall Filter for Bridge Family Type (NSM Procedure)
199
Table 79: Bridge Filter Configuration Details
199
Configuring the Firewall Filter for CCC Family Type (NSM Procedure)
201
Table 80: CCC Filter Configuration Details
201
Configuring Filters for Inet Family Type (NSM Procedure)
203
Configuring Firewall Filter for Inet Family Type (NSM Procedure)
203
Table 81: Firewall Filter Configuration Details
203
Configuring Prefix-Specific Actions (NSM Procedure)
205
Configuring Service Filters (NSM Procedure)
206
Table 82: Prefix Actions Details
206
Table 83: Service Filter Configuration Details
206
Configuring Simple Filters (NSM Procedure)
207
Configuring Filters for Inet6 Family Type (NSM Procedure)
208
Table 84: Simple Filter Details
208
Configuring Firewall Filter for Inet6 Family Type (NSM Procedure)
209
Table 85: Inet6 Firewall Filter Configuration Details
209
Configuring Service Filters for Inet6 (NSM Procedure)
211
Table 86: Inet6 Service Filter Configuration Details
211
Configuring the Firewall Filter for MPLS Family Type (NSM Procedure)
212
Table 87: MPLS Firewall Filter Configuration Details
213
Configuring the Firewall Filter for VPLS Family Type (NSM Procedure)
215
Table 88: VPLS Firewall Filter Configuration Details
216
Configuring a Policer for a Firewall Filter
218
Table 89: Configuring a Policer for a Firewall Filter
218
Chapter 16 Configuring Forwarding Options
221
Configuring Accounting Options (NSM Procedure)
221
Table 90: Accounting Options Configuration Details
221
Configuring the Extended DHCP Agent (NSM Procedure)
223
Configuring Authentication Support for the DHCP Relay Agent
223
Procedure)
223
Configuring Group (NSM Procedure)
224
Table 91: Authentication Configuration Details
224
Overriding the Default Configuration Settings for the Extended DHCP Relay
225
Agent (NSM Procedure)
225
Table 92: Group Configuration Details
225
Table 93: Overrides Configuration Details
226
Configuring Relay Option 60 Information for Forwarding Client Traffic to
227
Specific DHCP Servers (NSM Procedure)
227
Table 94: Relay Option 60 Configuration Details
227
Configuring Relay Option 82 for a DHCP Server (NSM Procedure)
228
Specifying the Name of a Group of DHCP Server Addresses for Use by the Extended DHCP Relay Agent (NSM Procedure)
229
Table 95: Relay Option 82 Configuration Details
229
Configuring Operations for Extended DHCP Relay Agent Processes
230
Procedure)
230
Table 96: Sever Group Configuration Details
230
Table 97: DHCP Relay Traceoptions Configuration Details
230
Specifying Address Family for Filters (NSM Procedure)
231
Table 98: Address Family Details
231
Configuring Load Balancing Using Hash Key (NSM Procedure)
232
Configuring Helpers (NSM Procedure)
233
Table 99: Load Balance Configuration Details
233
Configuring a Router or Interface to Act as a Bootstrap Protocol Relay
234
Agent
234
Table 100: BOOTP Configuration Details
234
Enabling DNS Request Packet Forwarding
237
Table 101: DNS and TFTP Configuration Details
238
Configuring a Port for a DHCP or BOOTP Relay Agent
239
Configuring Tracing Operations for BOOTP, DNS, and TFTP Packet
240
Forwarding
240
Table 102: Port Configuration Details
240
Configuring Per-Flow and Per-Prefix Load Balancing (NSM Procedure)
241
Table 103: Traceoptions Configuration Details
241
Configuring Port Mirroring (NSM Procedure)
242
Table 104: Load Balancing Configuration Details
242
Table 105: Port Mirroring Configuration Details
243
Configuring Interfaces
245
Chapter 17 Configuring Interfaces
245
Configuring Interfaces on the Routing Platform (NSM Procedure)
245
Configuring Interface Properties (NSM Procedure)
245
Configuring Tracing Operations of an Individual Router Interface
245
Table 106: Interface Properties Configuration Details
246
Damping Interface Transitions (NSM Procedure)
247
Table 107: Hold Time Configuration Details
247
Configuring Receive Bucket Properties on Interfaces (NSM Procedure)
248
Procedure)
248
Table 108: Receive Bucket Configuration Details
248
Configuring Transmit Leaky Bucket Properties (NSM Procedure)
249
Table 109: Trace Options Configuration Details
249
Configuring Logical Interface Properties (NSM Procedure)
250
Configuring Epd Threshold for the Logical Interface
250
Configuring Logical Unit Properties (NSM Procedure)
250
Table 110: Transmit Bucket Configuration Details
250
Configuring an IP Demux Underlying Interface (NSM Procedure)
251
Table 111: Logical Unit Configuration Details
251
Configuring the Logical Demux Source Family Type on the IP Demux Underlying Interface (NSM Procedure)
252
Procedure)
252
Table 112: IP Demux Configuration Details
252
Table 113: IP Demux Source Configuration Details
252
Configuring Protocol Family Information for the Logical Interface
253
Configuring Protocol Family (CCC) Information for the Logical Interface (NSM Procedure)
253
Procedure)
253
Table 114: Epd Threshold Configuration Details
253
Table 115: CCC Family Configuration Details
254
(NSM Procedure)
255
Configuring Protocol Family (Inet) Information for the Logical Interface
255
Table 116: Inet Family Configuration Details
256
(NSM Procedure)
261
Configuring Protocol Family (Inet6) Information for the Logical Interface (NSM
261
Table 117: Inet6 Family Configuration Details
262
(NSM Procedure)
267
Configuring Protocol Family (ISO) Information for the Logical Interface (NSM
267
(NSM Procedure)
268
Configuring Protocol Family (MPLS) Information for the Logical Interface (NSM
268
Table 118: Iso Family Configuration Details
268
Table 119: MPLS Family Configuration Details
269
(NSM Procedure)
270
Configuring Protocol Family (TCC) Information for the Logical Interface (NSM
270
Configuring the Traffic Shaping Profile (NSM Procedure)
270
Table 120: TCC Family Configuration Details
270
Table 121: Traffic Shaping Configuration Details
271
Configuring Interface Set on the Routing Platform (NSM Procedure)
272
Table 122: Interface Set Configuration Details
272
Configuring Trace Options on the Routing Platform (NSM Procedure)
273
Table 123: Traceoption Configuration Details
273
Chapter 18 Configuring Multicast Snooping Options
275
Configuring Multicast Snooping Options (NSM Procedure)
275
Table 124: Multicast Snooping Options Configuration Details
276
Chapter 19 Configuring Policy Options
279
Configuring an as Path in a BGP Routing Policy (NSM Procedure)
279
Configuring an as Path Group in a BGP Routing Policy (NSM Procedure)
280
Table 125: as Path Configuration Details
280
Configuring a Community for Use in BGP Routing Policy Conditions
281
Procedure)
281
Table 126: as Path Group Configuration Details
281
Configuring a BGP Export Policy Condition (NSM Procedure)
282
Table 127: Community Configuration Details
282
Configuring Flap Damping to Reduce the Number of BGP Update Messages(NSM Procedure)
283
Table 128: Condition Configuration Details
283
Table 129: Damping Configuration Details
284
Configuring a Routing Policy Statement (NSM Procedure)
285
Table 130: Configuring Policy Statement Fields
285
Configuring Prefix List (NSM Procedure)
286
Table 131: Configuring Prefix List Fields
287
Configuring Protocols
289
Chapter 20 Configuring Protocols
289
Configuring the BFD Protocol (NSM Procedure)
289
Configuring BGP (NSM Procedure)
290
Table 132: Configuring Bfd Fields
290
Table 133: BGP Configuration Fields
291
Configuring the ILMI Protocol (NSM Procedure)
293
Table 134: Trace Options Configuration Details
293
Configuring Layer 2 Address Learning and Forwarding Properties
294
Procedure)
294
Configuring Layer 2 Address Learning and Forwarding Properties (NSM Procedure)
294
Configuring Layer 2 Circuit (NSM Procedure)
295
Configuring Local Interface Switching (NSM Procedure)
295
Table 135: L2 Learning Configuration Details
295
Configuring the Neighbor Interface for the Layer 2 Circuit
296
Procedure)
296
Table 136: Local Switching Configuration Details
296
Table 137: Neighbor Interface Configuration Details
297
Tracing Layer 2 Circuit Creation and Changes (NSM Procedure)
299
Table 138: Layer2 Circuit Traceoption Configuration Details
299
Configuring Layer 2 Protocol Tunneling and BPDU Protection
300
Procedure)
300
Table 139: Layer2 Circuit Configuration Details
300
Configuring Layer 2 Protocol Tunneling and BPDU Protection (NSM Procedure)
300
Configuring Label Distribution Protocol (NSM Procedure)
302
Table 140: LDP Configuration Details
303
Configuring Link Management Protocol (NSM Procedure)
313
Table 141: Link Management Protocol Configuration Details
314
Configuring MPLS Protocol (NSM Procedure)
317
Enabling MPLS on the Router (NSM Procedure)
317
Table 142: MPLS Configuration Details
318
Configuring Administrative Group (NSM Procedure)
320
Configuring Administrative Groups (NSM Procedure)
320
Table 143: Administrative Group Configuration Details
320
Configuring Bandwidth for the Reroute Path (NSM Procedure)
321
Table 144: Administrative Groups Configuration Details
321
Configuring Diffserv-Aware Traffic Engineering (NSM Procedure)
322
Table 145: Automatic Policers Configuration Details
322
Configuring MPLS on Interfaces (NSM Procedure)
323
Table 146: Diffserv-Aware Traffic Engineering Configuration Details
323
Table 147: Interface Configuration Details
324
Configure a Label Switched Path (LSP) to Use in Dynamic MPLS
325
Configuring Label Switched Path (NSM Procedure)
325
Table 148: LSP Configuration Details
326
Configuring Administrative Group (NSM Procedure)
328
Configuring Automatic Bandwidth Allocation for Lsps (NSM Procedure)
328
Table 149: Administrative Group Configuration Details
328
Configuring Bandwidth for the Reroute Path (NSM Procedure)
329
Table 150: Automatic Bandwidth Configuration Details
329
Configuring Fast Reroute (NSM Procedure)
330
Table 151: Bandwidth Configuration Details
330
Table 152: Fast Reroute Configuration Details
330
Adding LSP-Related Routes to the Inet.3 Routing Table (NSM Procedure)
331
Configuring MPLS Lsps for GMPLS (NSM Procedure)
332
Table 153: Install Configuration Details
332
Configuring BFD for MPLS Ipv4 Lsps (NSM Procedure)
333
Table 154: Lsp Attributes Configuration Details
333
Table 155: Oam Configuration Details
334
Configuring the Primary Point-To-Multipoint LSP (NSM Procedure)
335
Configuring Policers for Lsps (NSM Procedure)
336
Table 156: P2Mp Configuration Details
336
Table 157: Policer Configuration Details
336
Configuring Primary Paths for an LSP (NSM Procedure)
337
Table 158: Primary Paths Configuration Details
337
Table 159: Administrative Group Configuration Details
339
Table 160: Bandwidth Configuration Details
340
Table 161: Oam Configuration Details
340
Configuring Secondary Paths for an LSP (NSM Procedure)
342
Table 162: Secondary Paths Configuration Details
343
Table 163: Administrative Group Configuration Details
345
Table 164: Bandwidth Configuration Details
346
Table 165: Oam Configuration Details
346
Table 166: Egress Router Address Configuration Details
349
Table 167: LSP Traceoptions Configuration Details
349
Procedure)
350
Table 168: Log Updown Configuration Details
350
Configuring BFD for MPLS Ipv4 Lsps (NSM Procedure)
351
Table 169: Oam Configuration Details
351
Configuring Named Paths (NSM Procedure)
353
Configuring MTU Signaling in Rsvps (NSM Procedure)
354
Table 170: Named Path Configuration Details
354
Table 171: Path MTU Configuration Details
354
Configuring Static Lsps on the Ingress Router (NSM Procedure)
355
Table 172: Static Path Configuration Details
355
Configuring MPLS Statistics (NSM Procedure)
356
Table 173: MPLS Statistics Configuration Details
357
Tracing MPLS Packets and Operations (NSM Procedure)
357
Configuring MSDP Protocol (NSM Procedure)
358
Configuring MSDP on the Router (NSM Procedure)
358
Table 174: Traceoptions Configuration Details
358
Configuring the MSDP Active Source Limit (NSM Procedure)
359
Table 175: MSDP Configuration Details
359
Configuring Export Policy (NSM Procedure)
360
Table 176: Active Source Limit Configuration Details
360
Table 177: Export Policy Configuration Details
360
Configuring MSDP Peer Group
361
Configuring MSDP Peer Group (NSM Procedure)
361
Table 178: Peer Group Configuration Details
361
Configuring MSDP Peers (NSM Procedure)
362
Table 179: MSDP Peer Configuration Details
363
Configuring a Routing Table Group with MSDP (NSM Procedure)
364
Table 180: Rib Group Configuration Details
364
Configuring MSDP Traceoptions (NSM Procedure)
365
Configuring Per-Source Active Source Limit (NSM Procedure)
365
Table 181: Active Source Limit Configuration Details
365
Configuring MSTP (NSM Procedure)
366
Table 182: MSDP Traceoption Configuration Details
366
Table 183: MSTP Configuration Fields
367
Configuring OSPF (NSM Procedure)
368
Table 184: OSPF Configuration Fields
369
Configuring RIP (NSM Procedure)
372
Table 185: RIP Configuration Fields
373
Configuring Ripng Protocol (NSM Procedure)
374
Configuring Ripng on the Router (NSM Procedure)
374
Configuring Graceful Restart for Ripng (NSM Procedure)
375
Table 186: Ripng Configuration Details
375
Table 187: Graceful Restart Configuration Details
375
Configuring Group
376
Configuring Group-Specific Ripng Properties (NSM Procedure)
376
Table 188: Group Configuration Details
376
Applying Policies to Routes Exported by Ripng (NSM Procedure)
377
Applying Policies to Routes Imported by Ripng (NSM Procedure)
378
Table 189: Ripng Export Policy Configuration Details
378
Table 190: Import Policy Configuration Details
378
Configuring Ripng Neighbor Properties
379
Table 191: Neighbor Properties Configuration Details
379
Table 192: Import Policy Configuration Details
380
Table 193: Receive Message Update Configuration Details
380
Enable or Disable Receiving of Update Messages (NSM Procedure)
381
Table 194: Send Update Message Configuration Details
381
Configuring Ripng Send Update Messages (NSM Procedure)
382
Configuring Ripng Traceoptions (NSM Procedure)
382
Table 195: Receive Message Update Configuration Details
382
Table 196: Ripng Send Configuration Details
382
Configuring Router Advertisement (NSM Procedure)
383
Table 197: Ripng Traceoption Configuration Details
383
Table 198: Router Advertisement Configuration Details
384
Configuring ICMP Router Discovery (NSM Procedure)
385
Table 199: Router Discovery Configuration Details
386
Configuring RSVP (NSM Procedure)
387
Table 200: RSVP Configuration Details
388
Configuring VRRP (NSM Procedure)
394
Table 201: VRRP Configuration Fields
394
Configuring VSTP (NSM Procedure)
395
Table 202: VSTP Configuration Fields
396
Chapter 21 Configuring Routing Options
397
Configuring Confederation (NSM Procedure)
398
Table 203: Confederation Fields
398
Configuring Dynamic Tunnels (NSM Procedure)
399
Table 204: Dynamic Tunnels Configuration Details
399
Configuring Fate Sharing (NSM Procedure)
400
Table 205: Fate Sharing Fields
401
Configuring Flow Route (NSM Procedure)
402
Table 206: Flow Route Fields
403
Configuring Forwarding Table (NSM Procedure)
404
Configuring Generated Routes (NSM Procedure)
405
Table 207: Forwarding Table Fields
405
Configuring Instance Export (NSM Procedure)
406
Table 208: Generated Routes Fields
406
Configuring Instance Import (NSM Procedure)
407
Configuring Interface Routes (NSM Procedure)
408
Table 209: Interface Routes Fields
408
Configuring Martian Addresses (NSM Procedure)
409
Configuring Maximum Paths (NSM Procedure)
410
Table 210: Configuring Martian Address Fields
410
Configuring Maximum Prefixes (NSM Procedure)
411
Table 211: Configuring Maximum Paths Fields
411
Table 212: Configuring Maximum Prefixes Fields
412
Configuring Multicast (NSM Procedure)
413
Table 213: Configuring Multicast Fields
413
Configuring Options (NSM Procedure)
416
Configuring Routing Tables (NSM Procedure)
417
Table 214: Configuring Options Fields
417
Table 215: Rib Fields
418
Configuring Routing Table Groups (NSM Procedure)
419
Configuring Source Routing (NSM Procedure)
420
Table 216: Rib Group Fields
420
Configuring Static Routes (NSM Procedure)
421
Table 217: Source Routing Fields
421
Table 218: Static Fields
422
Configuring Topologies (NSM Procedure)
423
Configuring Traceoptions (NSM Procedure)
423
Table 219: Topology Configuration Details
423
Table 220: Traceoption Fields
424
Configuring Security
425
Chapter 22 Configuring Security
425
Configuring Authentication Key Updates (NSM Procedure)
425
Configuring Certificates (NSM Procedure)
426
Table 221: Security Authentication Key Configuration Details
426
Table 222: Certificates Configuration Details
426
Configuring Certification Authority (NSM Procedure)
427
Table 223: Certification Authority Configuration Details
427
Configuring Firewall Authentication (NSM Procedure)
428
Configuring the Local Certificate (NSM Procedure)
428
Table 224: Local Configuration Details
428
Configuring a Flow (NSM Procedure)
429
Table 225: Firewall Authentication Configuration Details
429
Configuring a Bridge (NSM Procedure)
430
Table 226: Flow Configuration Details
430
Configuring the TCP MSS Option (NSM Procedure)
431
Table 227: Bridge Configuration Details
431
Table 228: TCP MSS Configuration Details
431
Configuring the TCP Session Option (NSM Procedure)
432
Configuring Traceoptions (NSM Procedure)
433
Table 229: TCP Session Configuration Details
433
Configuring File Options (NSM Procedure)
434
Table 230: Traceoptions Configuration Details
434
Table 231: File Configuration Details
434
Configuring Flag Options (NSM Procedure)
435
Configuring Packet Filter Options (NSM Procedure)
435
Table 232: Flag Configuration Details
435
Configuring Forwarding Options (NSM Procedure)
436
Table 233: Packet Filter Configuration Details
436
Configuring IKE (NSM Procedure)
437
Table 234: Forwarding Options Configuration Details
437
Configuring a Gateway (NSM Procedure)
438
Table 235: Gateway Configuration Details
438
Configuring a Policy (NSM Procedure)
440
Table 236: Policy Configuration Details
440
Configuring a Respond Bad SPI (NSM Procedure)
442
Configuring Traceoptions (NSM Procedure)
442
Table 237: Respond Bad SPI Configuration Details
442
Configuring the File Options (NSM Procedure)
443
Table 238: Traceoptions Configuration Details
443
Table 239: File Configuration Details
443
Configuring Flag Options (NSM Procedure)
444
Configuring Ipsec (NSM Procedure)
444
Table 240: Flag Configuration Details
444
Configuring a Policy (NSM Procedure)
445
Table 241: Policy Configuration Details
445
Configuring a VPN (NSM Procedure)
446
Configuring Traceoptions (NSM Procedure)
446
Table 242: Traceoptions Configuration Details
446
Table 243: VPN Configuration Details
447
Configuring VPN Monitor Options (NSM Procedure)
449
Table 244: VPN Monitor Options Configuration Details
449
Configuring a PKI (NSM Procedure)
450
Configuring Auto Re-Enrollment (NSM Procedure)
450
Configuring a CA Profile (NSM Procedure)
451
Table 245: Auto Re-Enrollment Configuration Details
451
Table 246: CA Profile Configuration Details
452
Configuring Traceoptions (NSM Procedure)
453
Table 247: Traceoptions Configuration Details
453
Configuring the File Options (NSM Procedure)
454
Table 248: File Configuration Details
454
Configuring Flag Options (NSM Procedure)
455
Configuring NAT (NSM Procedure)
455
Table 249: Flag Configuration Details
455
Configuring a Destination (NSM Procedure)
456
Table 250: Traceoptions Configuration Details
456
Configuring the Destination Nat (NSM Procedure)
457
Configuring the Interface (NSM Procedure)
458
Table 251: Destination NAT Configuration Details
458
Table 252: Interface Configuration Details
458
Configuring a Proxy Address Resolution Protocol (NSM Procedure)
460
Configuring a Source (NSM Procedure)
461
Table 253: Proxy ARP Configuration Details
461
Table 254: Source Configuration Details
462
Configuring Traceoptions (NSM Procedure)
464
Table 255: Traceoptions Configuration Details
464
Configuring Flag Options (NSM Procedure)
465
Configuring the File Options (NSM Procedure)
465
Table 256: File Configuration Details
465
Table 257: Flag Configuration Details
466
Configuring Services
467
Advertisement
Juniper MX Series Manual (200 pages)
3D Universal Edge Routers Solutions Junos OS
Brand:
Juniper
| Category:
Network Router
| Size: 2.34 MB
Table of Contents
Table of Contents
5
List of Figures
9
List of Tables
11
About this Guide
13
Junos Documentation and Release Notes
13
Audience
14
Objectives
14
Merging a Full Example
15
Supported Routing Platforms
15
Using the Examples in this Manual
15
Using the Indexes
15
Documentation Conventions
16
Merging a Snippet
16
Table 1: Notice Icons
17
Table 2: Text and Syntax Conventions
17
Documentation Feedback
18
Requesting Technical Support
18
Opening a Case with JTAC
19
Self-Help Online Tools and Resources
19
Overview
21
Overview of Ethernet Solutions
21
Ethernet Terms and Acronyms
23
Overview of Ethernet Solutions
23
Networking and Internetworking with Bridges and Routers
26
Network Addressing at Layer 2 and Layer 3
27
Networking at Layer 2: Benefits of Ethernet Frames
29
Networking at Layer 2: Challenges of Ethernet MAC Addresses
30
Networking at Layer 2: Forwarding VLAN Tagged Frames
31
Figure 2: a Metro Ethernet Network
35
Figure 3: a Metro Ethernet Network with MX Series Routers
36
Figure 4: VLAN Tags on a Metro Ethernet Network
36
Figure 5: Bridging Network with MX Series Routers
43
Figure 6: Designated, Root, and Alternate Ports
53
Example Step: Configuring Integrated Bridging and Routing
54
Virtual Switches
59
Figure 1: Native (Normal) and VLAN-Tagged Ethernet Frames
32
Networking at Layer 2: Forwarding Dual-Tagged Frames
33
Networking at Layer 2: Logical Interface Types
34
A Metro Ethernet Network with MX Series Routers
35
Example Configuration Summary
44
Example Step: Configuring Interfaces and VLAN Tags
44
Example Step: Configuring Bridge Domains
50
Example Step: Configuring Spanning Tree Protocols
52
Layer 2 Networking Standards
37
Basic Layer 2 Features on MX Series Routers
39
Basic Solutions for MX Series Routers
39
MX Series Router in an ATM Ethernet Interworking Function
39
Basic Layer 2 Features on MX Series Routers
41
Layer 2 Features for a Bridging Environment
41
Example Roadmap: Configuring a Basic Bridge Domain Environment
42
Example Topology
42
Example Scenario
43
Chapter 3 Virtual Switches
59
Layer 2 Features for a Switching Environment
59
Configuring Virtual Switches as Separate Routing Instances
60
Vlans Within a Bridge Domain or VPLS Instance
63
Vlans Within Bridge Domain and VPLS Environments
63
Packet Flow through a Bridged Network with Normalized Vlans
64
Configuring a Normalized VLAN for Translation or Tagging
65
Implicit VLAN Translation to a Normalized VLAN
65
Vlans Within Bridge Domain and VPLS Environments
65
Configuring a Normalized VLAN
66
Sending Tagged or Untagged Packets over VPLS Virtual Interfaces
66
Configuring Learning Domains for VLAN Ids Bound to Logical Interfaces
67
Example: Configuring a Provider Bridge Network with Normalized VLAN Tags
67
Figure 7: Provider Bridge Network Using Normalized VLAN Tags
68
Example: Configuring a Provider VPLS Network with Normalized VLAN Tags
71
Figure 8: VLAN Tags and VPLS Labels
72
Figure 9: Many Vlans on One VPLS Instance
76
Bulk Administration of Layer 2 Features on MX Series Routers
79
Bulk Configuration of Vlans and Bridge Domains
79
Example: Configuring VLAN Translation with a VLAN ID List
79
Example: Configuring Multiple Bridge Domains with a VLAN ID List
80
Dynamic Profiles for VLAN Interfaces and Protocols
83
Dynamic Profiles for VPLS Pseudowires
83
Example: Configuring VPLS Pseudowires with Dynamic Profiles-Basic
83
Solutions
83
VPLS Pseudowire Interfaces Without Dynamic Profiles
84
VPLS Pseudowire Interfaces and Dynamic Profiles
85
CE Routers Without Dynamic Profiles
86
CE Routers and Dynamic Profiles
87
Configuration of Routing Instance and Interfaces Using Dynamic
88
Configuration of Routing Instance and Interfaces Without Dynamic
88
Example: Configuring VPLS Pseudowires with Dynamic Profiles-Complex
88
Profiles
88
Solutions
88
Profiles
89
Configuration of Tag Translation Using Dynamic Profiles
92
MX Series Router as a DHCP Relay Agent
93
MX Series Router as a Layer 2 DHCP Relay Agent
93
Example: Configuring DHCP Relay in a Bridge Domain VLAN Environment
94
Example: Configuring DHCP Relay in a VPLS Routing Instance Environment
95
Figure 10: ATM Ethernet VLAN Interworking
97
MX Series Router ATM Ethernet Interworking Function
97
MX Series Router in an ATM Ethernet Interworking Function
97
Figure 11: ATM Ethernet VLAN Interworking Packet Structure
98
Figure 12: CCC to Stacked VLAN Translation
98
Figure 13: ATM Ethernet VLAN Interworking
99
Configuring Router PE2 with a Layer 2 Circuit
100
Configuring Router PE2 with a Layer 2 Circuit over Aggregated Ethernet
102
Configuring Router PE2 with a Remote Interface Switch
105
Configuring Router PE2 with a Remote Interface Switch over Aggregated
108
Ethernet
108
Ethernet Filtering, Monitoring, and Fault Management Solutions for MX Series Routers
113
Firewall Filters for Bridge Domains and VPLS Instances
115
Layer 2 Firewall Filters
115
Example: Configuring Policing and Marking of Traffic Entering a VPLS Core
116
Figure 14: Policing and Marking Traffic Entering a VPLS Core
116
Layer 2 Firewall Filters
116
Example: Configuring Filtering of Frames by MAC Address
118
Example: Configuring Filtering of Frames by IEEE 802.1P Bits
119
Example: Configuring Filtering of Frames by Packet Loss Priority
121
Ethernet Operations, Administration, and Maintenance
123
IEEE 802.1Ag OAM Connectivity-Fault Management
123
Ethernet OAM Connectivity Fault Management
124
Example: Configuring Ethernet CFM over VPLS
125
IEEE 802.1Ag OAM Connectivity-Fault Management
125
Figure 15: Ethernet OAM with VPLS
126
Example: Configuring Ethernet CFM on Bridge Connections
132
Figure 16: Ethernet CFM over a Bridge Network
132
Example: Configuring Ethernet CFM on Physical Interfaces
136
Figure 17: Ethernet CFM on Physical Interfaces
136
Ethernet Frame Delay Measurements
139
ITU-T Y.1731 Ethernet Frame Delay Measurements
139
Figure 18: Ethernet OAM Overview
140
Configuring MEP Interfaces to Support Ethernet Frame Delay Measurements
142
Table 3: Monitor Ethernet Delay Command Parameters
143
Triggering an Ethernet Frame Delay Measurements Session
143
Viewing Ethernet Frame Delay Measurements Statistics
144
Example: Configuring One-Way Ethernet Frame Delay Measurements with Single-Tagged Interfaces
145
Table 4: Show Ethernet Delay Command Parameters
145
Example: Configuring Two-Way Ethernet Frame Delay Measurements with Single-Tagged Interfaces
150
Interfaces
154
Ethernet OAM Link Fault Management
157
IEEE 802.3Ah OAM Link-Fault Management
157
Example: Configuring Ethernet LFM between PE and CE
158
Figure 19: Ethernet LFM between PE and CE
158
Example: Configuring Ethernet LFM for CCC
159
Figure 20: Ethernet LFM for CCC
159
Example: Configuring Ethernet LFM for Aggregated Ethernet
160
Figure 21: Ethernet LFM for Aggregated Ethernet
160
Example: Configuring Ethernet LFM with Loopback Support
162
Ethernet Ring Protection
165
Ethernet Ring Protection Using Ring Instances for Load Balancing
167
Example Topology
168
Example: Configuring Ethernet Ring Protection for MX Series Routers
168
Router 1 (RPL Owner) Configuration
169
Router 2 Configuration
170
Router 3 Configuration
172
Series Routers
174
Table 5: Components of the Network Topology
176
Example: Viewing Ethernet Ring Protection Status-Normal Ring Operation
191
Example: Viewing Ethernet Ring Protection Status-Ring Failure Condition
192
Example: Configuring One VPLS Instance for Several Vlans
75
Example: Configuring MX Series Router ATM Ethernet Interworking
99
Juniper MX Series Configuration Manual (35 pages)
Routers with MS-DPC/MS-PIC
Brand:
Juniper
| Category:
Network Router
| Size: 0.47 MB
Table of Contents
Table of Contents
2
1 Introduction
4
2 Scope
4
3 Design Considerations
4
4 Terminology
4
5 Implementation: Juniper 6Rd Solution
5
6Rd Feature Summary
5
Figure 1: Packet Flow on the Br
5
7 Configuration Examples
6
Topology
6
Figure 2: Topology Illustrating Multiple 6Rd Domains
6
Basic 6Rd Configuration
7
6Rd Routes
8
Advertising 6Rd Routes
8
Interface Style Service Set
8
Next-Hop Style Service Set
10
Pinging 6Rd Softwire Concentrator
12
6Rd Domain to Internet
12
Interfaces Configuration
12
Service Set Configuration
13
Softwire Concentrator Configuration
13
Stateful Firewall Configuration
13
Interfaces Configuration
14
Service Set Configuration
15
Softwire Concentrator Configuration
15
Stateful Firewall Configuration
16
6To4 Using 6Rd
16
Interfaces Configuration
16
Service Set Configuration
17
Softwire Concentrator Configuration
17
Stateful Firewall Configuration
17
6Rd Anycast (Redundancy)
18
Interfaces Configuration
18
Service Set Configuration
19
Softwire Concentrator Configuration
19
Stateful Firewall Configuration
21
6Rd + DS-Lite in same Service Set
21
Interfaces Configuration
21
Service Set Configuration
22
Softwire Concentrator Configuration
23
Stateful Firewall Configuration
24
NAT Configuration
24
8 Configuration Tips
25
Configuration Tips
25
9 Operations and Management
25
6Rd CLI
25
Flows and Conversations
25
Softwire
26
Debug CLI
27
12 Appendix
27
Figure 3: Topology Used to Illustrate CLI Commands for 6Rd Deployment and Operations
32
10 ALG Support
27
11 Summary
27
13 Bibliography
35
About Juniper Networks
35
Advertisement
Juniper MX Series Datasheet (8 pages)
MX Series 3D UNIVERSAL EDGE ROUTERS
Brand:
Juniper
| Category:
Network Router
| Size: 0.74 MB
Table of Contents
Product Description
1
Features and Benefits
3
Specifications
6
Agency Approvals
6
Ordering Information
7
About Juniper Networks
8
Juniper MX Series Quick Start (2 pages)
Brand:
Juniper
| Category:
Network Router
| Size: 0.19 MB
Advertisement
Related Products
Juniper MX240
Juniper MX2020
Juniper MX5
Juniper MX10
Juniper MX80
Juniper MX10008
Juniper Networks MX150
Juniper MX2010
Juniper MX10003
Juniper Day One+ MX304
Juniper Categories
Network Router
Switch
Gateway
Software
Network Hardware
More Juniper Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL