Juniper J2320 User manual

Add to My manuals
675 Pages

advertisement

Juniper J2320 User manual | Manualzz

J-series™ Services Router

User Guide

Release 7.0

Juniper Networks, Inc.

1194 North Mathilda Avenue

Sunnyvale, California 94089

USA

408-745-2000

www.juniper.net

Part Number: 530-011657-01, Revision 1

This product includes the Envoy SNMP Engine, developed by Epilogue Technology, an Integrated Systems Company. Copyright

© 1986-1997, Epilogue Technology Corporation. All rights reserved. This program and its documentation were developed at private expense, and no part of them is in the public domain.

This product includes memory allocation software developed by Mark Moraes, copyright © 1988, 1989, 1993, University of Toronto.

This product includes FreeBSD software developed by the University of California, Berkeley, and its contributors. All of the documentation and software included in the 4.4BSD and 4.4BSD-Lite Releases is copyrighted by the Regents of the University of California. Copyright © 1979, 1980,

1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994. The Regents of the University of California. All rights reserved.

GateD software copyright © 1995, the Regents of the University. All rights reserved. Gate Daemon was originated and developed through release

3.0 by Cornell University and its collaborators. Gated is based on Kirton’s EGP, UC Berkeley’s routing daemon (routed), and DCN’s HELLO routing protocol. Development of Gated has been supported in part by the National Science Foundation. Portions of the GateD software copyright © 1988,

Regents of the University of California. All rights reserved. Portions of the GateD software copyright © 1991, D. L. S. Associates.

This product includes software developed by Maker Communications, Inc., Copyright © 1996, 1997, Maker Communications, Inc.

Juniper Networks, the Juniper Networks logo, NetScreen, NetScreen Technologies, the NetScreen logo, NetScreen-Global Pro, ScreenOS, and

GigaScreen are registered trademarks of Juniper Networks, Inc. in the United States and other countries.

The following are trademarks of Juniper Networks, Inc.: ERX, ESP, E-series, Instant Virtual Extranet, Internet Processor, J2300, J4300, J6300, J-Protect,

J-series, J-Web, JUNOS, JUNOScope, JUNOScript, JUNOSe, M5, M7i, M10, M10i, M20, M40, M40e, M160, M320, M-series, MMD, NetScreen-5GT,

NetScreen-5XP, NetScreen-5XT, NetScreen-25, NetScreen-50, NetScreen-204, NetScreen-208, NetScreen-500, NetScreen-5200, NetScreen-5400,

NetScreen-IDP 10, NetScreen-IDP 100, NetScreen-IDP 500, NetScreen-Remote Security Client, NetScreen-Remote VPN Client, NetScreen-SA 1000 Series,

NetScreen-SA 3000 Series, NetScreen-SA 5000 Series, NetScreen-SA Central Manager, NetScreen Secure Access, NetScreen-SM 3000, NetScreen-Security

Manager, NMC-RX, SDX, Stateful Signature, T320, T640, T-series, and TX Matrix. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. All specifications are subject to change without notice.

Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.

Copyright © 2004, Juniper Networks, Inc. All rights reserved.

J-series™ Services Router User Guide,

Copyright © 2004, Juniper Networks, Inc.

All rights reserved. Printed in USA.

Writing: Michael Bushong, Taffy Everts, Walter Goralski, Joshua Kim, Jerry Isaac, Frank Reade, Swapna Steiger, and Alan Twhigg

Editing: Taffy Everts

Illustration: Faith Bradford Brown and Nathaniel Woodward

Cover Design: Edmonds Design

Revision History

4 November 2004—Revision 1.

The information in this document is current as of the date listed in the revision history.

Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer or otherwise revise this publication without notice.

Products made or sold by Juniper Networks (including the ERX-310, ERX-705, ERX-710, ERX-1410, ERX-1440, M5, M7i, M10, M10i, M20, M40, M40e,

M160, M320, and T320 routers, T640 routing node, and the JUNOS and SDX-300 software) or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479,

6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785.

YEAR 2000 NOTICE

Juniper Networks hardware and software products are Year 2000 compliant. The JUNOS software has no known time-related limitations through the year

2038. However, the NTP application is known to have some difficulty in the year 2036.

SOFTWARE LICENSE

The terms and conditions for using this software are described in the software license contained in the acknowledgment to your purchase order or, to the extent applicable, to any reseller agreement or end-user purchase agreement executed between you and Juniper Networks. By using this software, you indicate that you understand and agree to be bound by those terms and conditions. Generally speaking, the software license restricts the manner in which you are permitted to use the software and may contain prohibitions against certain uses. The software license may state conditions under which the license is automatically terminated. You should consult the license for further details. For complete product documentation, please see the

Juniper Networks Web site at www.juniper.net/techpubs.

ii

End User License Agreement

READ THIS END USER LICENSE AGREEMENT ("AGREEMENT") BEFORE DOWNLOADING, INSTALLING, OR USING THE SOFTWARE. BY DOWNLOADING,

INSTALLING, OR USING THE SOFTWARE OR OTHERWISE EXPRESSING YOUR AGREEMENT TO THE TERMS CONTAINED HEREIN, YOU (AS CUSTOMER

OR IF YOU ARE NOT THE CUSTOMER, AS A REPRESENTATIVE/AGENT AUTHORIZED TO BIND THE CUSTOMER) CONSENT TO BE BOUND BY THIS

AGREEMENT. IF YOU DO NOT OR CANNOT AGREE TO THE TERMS CONTAINED HEREIN, THEN (A) DO NOT DOWNLOAD, INSTALL, OR USE THE

SOFTWARE, AND (B) YOU MAY CONTACT JUNIPER NETWORKS REGARDING LICENSE TERMS.

1.

The Parties. The parties to this Agreement are Juniper Networks, Inc. and its subsidiaries (collectively "Juniper"), and the person or organization that originally purchased from Juniper or an authorized Juniper reseller the applicable license(s) for use of the Software ("Customer") (collectively, the "Parties").

2.

The Software. In this Agreement, "Software" means the program modules and features of the Juniper or Juniper-supplied software, and updates and releases of such software, for which Customer has paid the applicable license or support fees to Juniper or an authorized Juniper reseller.

3.

License Grant. Subject to payment of the applicable fees and the limitations and restrictions set forth herein, Juniper grants to Customer a non-exclusive and non-transferable license, without right to sublicense, to use the Software, in executable form only, subject to the following use restrictions: a.

Customer shall use the Software solely as embedded in, and for execution on, Juniper equipment originally purchased by Customer from

Juniper or an authorized Juniper reseller, unless the applicable Juniper documentation expressly permits installation on non-Juniper equipment.

b.

Customer shall use the Software on a single hardware chassis having a single processing unit, or as many chassis or processing units for which Customer has paid the applicable license fees.

c.

Other Juniper documentation for the Software (such as product purchase documents, documents accompanying the product, the

Software user manual(s), Juniper’s website for the Software, or messages displayed by the Software) may specify limits to Customer’s use of the

Software. Such limits may restrict use to a maximum number of seats, concurrent users, sessions, subscribers, nodes, or transactions, or require the purchase of separate licenses to use particular features, functionalities, or capabilities, or provide temporal or geographical limits.

Customer’s use of the Software shall be subject to all such limitations and purchase of all applicable licenses.

The foregoing license is not transferable or assignable by Customer. No license is granted herein to any user who did not originally purchase the applicable license(s) for the Software from Juniper or an authorized Juniper reseller.

4.

Use Prohibitions. Notwithstanding the foregoing, the license provided herein does not permit the Customer to, and Customer agrees not to and shall not: (a) modify, unbundle, reverse engineer, or create derivative works based on the Software; (b) make unauthorized copies of the Software (except as necessary for backup purposes); (c) rent, transfer, or grant any rights in and to any copy of the Software, in any form, to any third party; (d) remove any proprietary notices, labels, or marks on or in any copy of the Software; (e) distribute any copy of the Software to any third party, including as may be embedded in Juniper equipment sold in the secondhand market; (f) use any ’locked’ or key-restricted feature, function, or capability without first purchasing the applicable license(s) and obtaining a valid key from Juniper, even if such feature, function, or capability is enabled without a key; (g) distribute any key for the Software provided by Juniper to any third party; (h) use the Software in any manner that extends or is broader than the uses purchased by Customer from Juniper or an authorized Juniper reseller; (i) use the Software on non-Juniper equipment where the Juniper documentation does not expressly permit installation on non-Juniper equipment; (j) use the Software (or make it available for use) on Juniper equipment that the Customer did not originally purchase from Juniper or an authorized Juniper reseller; or (k) use the Software in any manner other than as expressly provided herein.

5.

Audit. Customer shall maintain accurate records as necessary to verify compliance with this Agreement. Upon request by Juniper, Customer shall furnish such records to Juniper and certify its compliance with this Agreement.

6.

Confidentiality. The Parties agree that aspects of the Software and associated documentation are the confidential property of Juniper. As such,

Customer shall exercise all reasonable commercial efforts to maintain the Software and associated documentation in confidence, which at a minimum includes restricting access to the Software to Customer employees and contractors having a need to use the Software.

7.

Ownership. Juniper and Juniper’s licensors, respectively, retain ownership of all right, title, and interest (including copyright) in and to the Software, associated documentation, and all copies of the Software. Nothing in this Agreement constitutes a transfer or conveyance of any right, title, or interest in the Software or associated documentation, or a sale of the Software, associated documentation, or copies of the Software.

8.

Warranty, Limitation of Liability, Disclaimer of Warranty. If the Software is distributed on physical media (such as CD), Juniper warrants for 90 days from delivery that the media on which the Software is delivered will be free of defects in material and workmanship under normal use. This limited warranty extends only to the Customer. Except as may be expressly provided in separate documentation from Juniper, no other warranties apply to the Software, and the Software is otherwise provided AS IS. Customer assumes all risks arising from use of the Software. Customer’s sole remedy and

Juniper’s entire liability under this limited warranty is that Juniper, at its option, will repair or replace the media containing the Software, or provide a refund, provided that Customer makes a proper warranty claim to Juniper, in writing, within the warranty period. Nothing in this Agreement shall give rise to any obligation to support the Software. Any such support shall be governed by a separate, written agreement. To the maximum extent permitted by law,

Juniper shall not be liable for any liability for lost profits, loss of data or costs or procurement of substitute goods or services, or for any special, indirect, or consequential damages arising out of this Agreement, the Software, or any Juniper or Juniper-supplied software. In no event shall Juniper be liable for damages arising from unauthorized or improper use of any Juniper or Juniper-supplied software.

EXCEPT AS EXPRESSLY PROVIDED HEREIN OR IN SEPARATE DOCUMENTATION PROVIDED FROM JUNIPER AND TO THE EXTENT PERMITTED BY

LAW, JUNIPER DISCLAIMS ANY AND ALL WARRANTIES IN AND TO THE SOFTWARE (WHETHER EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE),

INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT DOES iii

JUNIPER WARRANT THAT THE SOFTWARE, OR ANY EQUIPMENT OR NETWORK RUNNING THE SOFTWARE, WILL OPERATE WITHOUT ERROR OR

INTERRUPTION, OR WILL BE FREE OF VULNERABILITY TO INTRUSION OR ATTACK.

9.

Termination. Any breach of this Agreement or failure by Customer to pay any applicable fees due shall result in automatic termination of the license granted herein. Upon such termination, Customer shall destroy or return to Juniper all copies of the Software and related documentation in

Customer’s possession or control.

10.

Taxes. All license fees for the Software are exclusive of taxes, withholdings, duties, or levies (collectively "Taxes"). Customer shall be responsible for paying Taxes arising from the purchase of the license, or importation or use of the Software.

11.

Export. Customer agrees to comply with all applicable export laws and restrictions and regulations of any United States and any applicable foreign agency or authority, and not to export or re-export the Software or any direct product thereof in violation of any such restrictions, laws or regulations, or without all necessary approvals. Customer shall be liable for any such violations. The version of the Software supplied to you may contain encryption or other capabilities restricting your ability to export the Software without an export license.

12.

Commercial Computer Software. The Software is "commercial computer software" and is provided with restricted rights. Use, duplication, or disclosure by the United States government is subject to restrictions set forth in this Agreement and as provided in DFARS 227.7201 through 227.7202-4,

FAR 12.212, FAR 27.405(b)(2), FAR 52.227-19, or FAR 52.227-14(ALT III) as applicable.

13.

Miscellaneous. This Agreement shall be governed by the laws of the State of California without reference to its conflicts of laws principles. For any disputes arising under this Agreement, the Parties hereby consent to the personal and exclusive jurisdiction of, and venue in, the state and federal courts within Santa Clara County, California. This Agreement constitutes the entire and sole agreement between Juniper and the Customer with respect to the

Software, and supersedes all prior and contemporaneous agreements relating to the Software, whether oral or written (including any inconsistent terms contained in a purchase order), except that the terms of a separate written agreement executed by an authorized Juniper representative and Customer shall govern to the extent such terms are inconsistent or conflict with terms contained herein. No modification to this Agreement nor any waiver of any rights hereunder shall be effective unless expressly assented to in writing by the party to be charged. If any portion of this Agreement is held invalid, the

Parties agree that such invalidity shall not affect the validity of the remainder of this Agreement.

If you have any questions about this agreement, contact Juniper Networks at the following address:

Juniper Networks, Inc.

1194 North Mathilda Avenue

Sunnyvale, CA 94089

USA

Attn: Contracts Administrator iv

Abbreviated Table of Contents

About This Guide

Part 1

J-series Overview

Part 2

Chapter 1

Chapter 2

Introducing the J-series Services Router . .

System Overview . .

7

Installing the J-series Services Router

3

Part 3

Chapter 3

Chapter 4

Chapter 5

Chapter 6

Installing and Connecting a Services Router . .

Establishing Basic Connectivity . .

47

Managing J-series Licenses . .

69

Configuring Network Interfaces . .

79

Using the J-series User Interfaces

109

127

Part 4

Chapter 7

Chapter 8

J-series User Interface Overview . .

Using J-series Configuration Tools . .

Managing the Services Router

35

Chapter 9

Chapter 10

Managing Users and Operations . .

163

Monitoring and Diagnosing a Services Router . .

197

xxv

Abbreviated Table of Contents v

J-series™ Services Router User Guide

Part 5

Chapter 11 Configuring SNMP for Network Management . .

Configuring Routing Protocols

241

Part 6

Chapter 12

Chapter 13

Chapter 14

Chapter 15

Chapter 16

Routing Overview . .

Configuring Static Routes . .

255

Configuring a RIP Network . .

Configuring an OSPF Network . .

Configuring BGP Sessions . .

285

297

309

331

Configuring Routing Policy, Firewall Filters, and Class of

Service

Part 7

Chapter 17

Chapter 18

Chapter 19

Chapter 20

Policy, Firewall Filter, and Class-of-Service Overview . .

Configuring Routing Policies . .

375

Configuring Firewall Filters and NAT . .

Configuring Class of Service with DiffServ

. .

389

427

Managing Multicast Transmissions

351

Part 8

Chapter 21

Chapter 22

Multicast Overview . .

461

Configuring a Multicast Network . .

Managing Packet Security

471

Chapter 23 Configuring IPSec for Secure Packet Exchange . .

483

vi

Abbreviated Table of Contents

Abbreviated Table of Contents

Part 9

Upgrading the Services Router

Part 10

Chapter 24

Chapter 25

Performing Software Upgrades and Reboots . .

Replacing and Troubleshooting Hardware Components . .

501

J-series Requirements and Specifications

517

Part 11

Chapter 26

Chapter 27

Chapter 28

Preparing for Router Installation . .

541

Network Cable Specifications and Connector Pinouts . .

Safety and Regulatory Compliance Information . .

563

551

Customer Support and Product Return

Part 12

Chapter 29 Contacting Customer Support and Returning Hardware . .

Index

603

Abbreviated Table of Contents vii

J-series™ Services Router User Guide viii

Abbreviated Table of Contents

Table of Contents

Part 1

About This Guide xxv

Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv

Audience. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvi

How to Use This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvi

Document Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xxvii

Related Juniper Networks Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxviii

Documentation Feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxx

Requesting Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxx

J-series Overview

Chapter 1

Chapter 2

Introducing the J-series Services Router . .

3

J-series Services Router Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3

J-series Software Features and Licenses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4

System Overview . .

7

J2300 Services Router Hardware Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7

J2300 Chassis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7

J2300 Routing Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

J2300 Boot Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

J2300 Boot Sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11

J2300 Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11

ALARM LED. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11

Power Button and POWER ON LED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

CONFIG Button and LED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

Console Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

J2300 USB Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

J2300 Physical Interface Module (PIM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

J2300 LAN Ports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

J2300 Power System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

J2300 Cooling System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

J4300 and J6300 Services Router Hardware Features . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

J4300 and J6300 Chassis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

Midplane. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

J4300 and J6300 Routing Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

J4300 and J6300 Boot Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

J4300 and J6300 Boot Sequence. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

J4300 and J6300 Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

ALARM LED. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

Table of Contents ix

J-series™ Services Router User Guide

Part 2

Power Button and POWER ON LED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

CONFIG Button and Configuration LED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

Console Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

J4300 and J6300 USB Port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

J4300 and J6300 LAN Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

J4300 and J6300 Removable Compact Flash Drive . . . . . . . . . . . . . . . . . . . . 25

J4300 and J6300 Physical Interface Modules (PIMs) . . . . . . . . . . . . . . . . . . . . . . . . 25

J4300 Power System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

J6300 Power System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

J4300 and J6300 Cooling System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

Software Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

Routing Engine and Packet Forwarding Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

Kernel and Microkernel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

Management Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

Chassis Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

Routing Protocols Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

Interface Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

Forwarding Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

User Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

Installing the J-series Services Router

Chapter 3

Chapter 4

Installing and Connecting a Services Router . .

35

Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

Unpacking the J-series Services Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

Installing the J2300 Services Router. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Installing the J2300 Services Router on a Desk. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Installing the J2300 Services Router on a Wall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

Installing the J2300 Services Router into a Rack . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

Installing the J4300 or J6300 Services Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

Connecting Interface Cables to the Services Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

Chassis Grounding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

Connecting Power to the Services Router. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

Powering a Services Router On and Off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

Establishing Basic Connectivity . .

47

Basic Connectivity Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

Basic Connectivity Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

Router Identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

Root Password. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

Time Zone and System Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

Network Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

Default Gateway. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

Backup Router. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

Loopback Address. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

Management Interface Address. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

Before Initial Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

During Initial Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

x

Table of Contents

Table of Contents

Chapter 5

Chapter 6

After Initial Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

Management Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

Configuring the Services Router with J-Web Quick Configuration . . . . . . . . . . . . . . 53

Connecting to the J-Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

Configuring Basic Settings with Quick Configuration . . . . . . . . . . . . . . . . . . . . . . . 55

Configuring the Services Router with a Configuration Editor . . . . . . . . . . . . . . . . . . . 58

Connecting to the CLI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

Configuring Basic Settings with a Configuration Editor . . . . . . . . . . . . . . . . . . . . . 60

Configuring Autoinstallation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

Autoinstallation Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

Autoinstallation Requirements for End Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

Autoinstallation Requirements for Service Providers. . . . . . . . . . . . . . . . . . . . . . . . 66

Enabling Autoinstallation with the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

Verifying Basic Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

Displaying Basic Connectivity Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

Managing J-series Licenses . .

69

J-series License Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69

Software Feature Licenses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69

Port Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70

License Key Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

Managing J-series Licenses with the J-Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

Adding New Licenses with the J-Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

Deleting Licenses with the J-Web User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

Displaying License Keys with the J-Web Interface. . . . . . . . . . . . . . . . . . . . . . . . . . . 74

Downloading Licenses with the J-Web Interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

Managing J-series Licenses with the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

Adding New Licenses with the CLI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

Deleting a License with the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

Saving License Keys with the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76

Verifying J-series License Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76

Displaying Installed Licenses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76

Displaying License Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77

Displaying Installed License Keys. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78

Configuring Network Interfaces . .

79

Network Interfaces Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79

Interfaces Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

Network Interface Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

Interfaces and Interface Naming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

Configuring Network Interfaces with Quick Configuration . . . . . . . . . . . . . . . . . . . . . . 84

Configuring an E1 Interface with Quick Configuration . . . . . . . . . . . . . . . . . . . . . 86

Configuring a Fast Ethernet Interface with Quick Configuration . . . . . . . . . . . 89

Configuring a T1 Interface with Quick Configuration . . . . . . . . . . . . . . . . . . . . . . . 91

Configuring a T3 Interface with Quick Configuration . . . . . . . . . . . . . . . . . . . . . . . 95

Configuring a Serial Interface with Quick Configuration. . . . . . . . . . . . . . . . . . . . 98

Configuring Network Interfaces with a Configuration Editor. . . . . . . . . . . . . . . . . . . 102

Adding a Network Interface with a Configuration Editor . . . . . . . . . . . . . . . . . . 102

Deleting a Network Interface with a Configuration Editor . . . . . . . . . . . . . . . . . 103

Table of Contents xi

J-series™ Services Router User Guide

Part 3

Verifying Interface Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

Verifying the Link State of All Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

Verifying Interface Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

Using the J-series User Interfaces

Chapter 7

Chapter 8

J-series User Interface Overview . .

109

User Interface Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

J-Web Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

CLI Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110

Comparison of Configuration Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110

Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112

Using the J-Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112

Starting the J-Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112

J-Web Layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

J-Web Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117

Using the Command-Line Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117

CLI Command Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117

Starting the CLI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118

CLI Operational Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119

CLI Configuration Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .120

CLI Basics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121

Editing Keystrokes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121

Command Completion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .122

Online Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .123

Configuring the CLI Environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .124

Using J-series Configuration Tools . .

127

Configuration Tools Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .127

Configuration Tools Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .128

Editing and Committing a Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .128

J-Web Configuration Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .129

CLI Configuration Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .129

Filtering Configuration Command Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . .130

Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .130

Using J-Web Quick Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131

Using the J-Web Configuration Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .132

Editing and Committing the Clickable Configuration . . . . . . . . . . . . . . . . . . . . . .132

Editing the Clickable Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .132

Discarding Parts of a Candidate Configuration . . . . . . . . . . . . . . . . . . . . . . . .135

Committing a Clickable Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .136

Viewing the Configuration Text . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .136

Editing and Committing the Configuration Text. . . . . . . . . . . . . . . . . . . . . . . . . . . .137

Uploading a Configuration File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .138

Managing Configuration Files with the J-Web Interface . . . . . . . . . . . . . . . . . . . . . . . .139

Configuration Database and History Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . .140

Displaying Users Editing the Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .142

Comparing Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .142

Downloading a Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .144

xii

Table of Contents

Table of Contents

Part 4

Loading a Previous Configuration File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .145

Setting a Rescue Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .145

Using the CLI Configuration Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .146

Entering and Exiting Configuration Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .146

Navigating the Configuration Hierarchy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .148

Modifying the Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .149

Adding or Modifying a Statement or Identifier . . . . . . . . . . . . . . . . . . . . . . . .150

Deleting a Statement or Identifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .150

Copying a Statement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151

Renaming an Identifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151

Inserting an Identifier. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .152

Deactivating a Statement or Identifier. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .153

Committing a Configuration with the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .154

Verifying a Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .154

Committing a Configuration and Exiting Configuration Mode . . . . . . .155

Committing a Configuration That Requires Confirmation . . . . . . . . . . . .155

Scheduling and Canceling a Commit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .155

Loading a Previous Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .156

Entering Operational Mode Commands During Configuration. . . . . . . . . . . .157

Managing Configuration Files with the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .158

Loading a New Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .158

Saving a Configuration File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .160

Managing the Services Router

Chapter 9 Managing Users and Operations . .

163

System Management Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .163

System Management Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .164

System Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .164

User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .164

Login Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .165

Permission Bits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .165

Denying or Allowing Individual Commands . . . . . . . . . . . . . . . . . . . . . . . . . . .167

Template Accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .167

System Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .168

Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .168

Managing Users and Files with the J-Web Interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . .169

Managing Users with Quick Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .169

Adding a RADIUS Server for Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . .169

Adding a TACACS+ Server for Authentication . . . . . . . . . . . . . . . . . . . . . . . . . 171

Configuring System Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .173

Adding New Users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .175

Managing Files with the J-Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .177

Cleaning Up Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .177

Downloading Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .179

Deleting Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .180

Managing Users and Files with a Configuration Editor . . . . . . . . . . . . . . . . . . . . . . . . .182

Setting Up RADIUS Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .182

Setting Up TACACS+ Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .183

Configuring Authentication Order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .185

Controlling User Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .186

Table of Contents xiii

J-series™ Services Router User Guide

Chapter 10

Chapter 11

Defining Login Classes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .186

Creating User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .188

Setting Up Template Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .189

Creating a Remote Template Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .189

Creating a Local Template Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .190

Using System Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

Sending System Log Messages to a File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .192

Sending System Log Messages to a User Terminal . . . . . . . . . . . . . . . . . . . .193

Archiving System Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .194

Disabling System Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .194

Accessing Remote Devices with the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .194

Using the telnet Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .195

Using the ssh Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .195

Monitoring and Diagnosing a Services Router . .

197

Monitoring and Diagnostic Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .197

Monitoring and Diagnostic Tools Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .198

Monitoring Tools Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .198

J-Web Diagnostic Tools Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .200

CLI Diagnostic Commands Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201

Filtering Command Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .202

Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .203

Using the Monitoring Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .203

Monitoring System Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .204

Monitoring the Chassis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .206

Monitoring the Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .208

Monitoring Routing Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210

Monitoring Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214

Monitoring IPSec Tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216

Monitoring NAT Pools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217

Using J-Web Diagnostic Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218

Using the J-Web Ping Host Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218

Using the J-Web Traceroute Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .222

Using CLI Diagnostic Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .226

Using the ping Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .226

Using the traceroute Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .228

Using the monitor interface Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .229

Using the monitor traffic Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231

Using the monitor file Command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .235

Using mtrace Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .235

Using the mtrace from-source Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .236

Using the mtrace monitor Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .238

Configuring SNMP for Network Management . .

241

Network Management Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241

Managers and Agents. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241

SMI, MIBs, and OIDs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .242

Standard and Enterprise MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .242

SNMP Requests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .242

SNMP Communities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .242

SNMP Traps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .243

xiv

Table of Contents

Table of Contents

Part 5

Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .243

Configuring SNMP with Quick Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .243

Configuring SNMP with a Configuration Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .247

Defining System Identification Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .247

Configuring SNMP Agents and Communities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .248

Managing SNMP Trap Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .249

Controlling Access to MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .250

Verifying the SNMP Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251

Verifying SNMP Agent Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .252

Configuring Routing Protocols

Chapter 12 Routing Overview . .

255

Routing Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .255

Routing Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .259

Networks and Subnetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .259

Autonomous Systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .260

Interior and Exterior Gateway Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .260

Routing Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .260

Forwarding Tables. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261

Dynamic and Static Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .262

Route Advertisements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .263

Route Aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .263

RIP Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .265

Distance-Vector Routing Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .265

Maximizing Hop Count . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .266

RIP Packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .267

Split Horizon and Poison Reverse Efficiency Techniques . . . . . . . . . . . . . . . . . .267

Limitations of Unidirectional Connectivity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .268

OSPF Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .269

Link-State Advertisements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270

Role of the Designated Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270

Path Cost Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271

Areas and Area Border Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271

Role of the Backbone Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .272

Stub Areas and Not-So-Stubby Areas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .273

BGP Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .274

Point-to-Point Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .275

BGP Messages for Session Establishment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .276

BGP Messages for Session Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .276

IBGP and EBGP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .276

Route Selection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .277

Local Preference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .278

AS Path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .279

Origin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .279

Multiple Exit Discriminator. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .280

Scaling BGP for Large Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .280

Route Reflectors—for Added Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281

Confederations—for Subdivision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .283

Table of Contents xv

J-series™ Services Router User Guide

Chapter 13

Chapter 14

Chapter 15

Configuring Static Routes . .

285

Static Routing Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .285

Static Route Preferences. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .285

Qualified Next Hops . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .286

Control of Static Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .286

Route Retention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .286

Readvertisement Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .287

Forced Rejection of Passive Route Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .287

Default Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .287

Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .287

Configuring Static Routes with Quick Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . .288

Configuring Static Routes with a Configuration Editor. . . . . . . . . . . . . . . . . . . . . . . . . .290

Configuring a Basic Set of Static Routes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .290

Controlling Static Route Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291

Controlling Static Routes in the Routing and Forwarding Tables . . . . . . . . . .293

Defining Default Behavior for All Static Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . .294

Verifying the Static Route Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .295

Displaying the Routing Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .295

Configuring a RIP Network . .

297

RIP Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .297

RIP Traffic Control with Metrics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .297

Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .298

Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .298

Configuring a RIP Network with Quick Configuration . . . . . . . . . . . . . . . . . . . . . . . . . .298

Configuring a RIP Network with a Configuration Editor . . . . . . . . . . . . . . . . . . . . . . . . 301

Configuring a Basic RIP Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301

Controlling Traffic in a RIP Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .302

Controlling Traffic with the Incoming Metric. . . . . . . . . . . . . . . . . . . . . . . . . . .303

Controlling Traffic with the Outgoing Metric . . . . . . . . . . . . . . . . . . . . . . . . . . .304

Enabling Authentication for RIP Exchanges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .305

Enabling Authentication with Plain-Text Passwords . . . . . . . . . . . . . . . . . . .306

Enabling Authentication with MD5 Authentication . . . . . . . . . . . . . . . . . . . .306

Verifying the RIP Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307

Verifying the RIP-Enabled Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307

Verifying Reachability of All Hosts in the RIP Network . . . . . . . . . . . . . . . . . . . .308

Configuring an OSPF Network . .

309

OSPF Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .309

Enabling OSPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .309

OSPF Areas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310

Path Cost Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310

Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310

Configuring an OSPF Network with Quick Configuration . . . . . . . . . . . . . . . . . . . . . . 310

Configuring an OSPF Network with a Configuration Editor . . . . . . . . . . . . . . . . . . . . 314

Configuring the Router Identifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314

Configuring a Single-Area OSPF Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315

Configuring a Multiarea OSPF Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316

Creating the Backbone Area. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317

Creating Additional OSPF Areas. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317

Configuring Area Border Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318

xvi

Table of Contents

Table of Contents

Part 6

Chapter 16

Configuring Stub and Not-So-Stubby Areas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319

Tuning an OSPF Network for Efficient Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321

Controlling Route Selection in the Forwarding Table . . . . . . . . . . . . . . . . . . . . . . . 321

Controlling the Cost of Individual Network Segments . . . . . . . . . . . . . . . . . . . . .322

Enabling Authentication for OSPF Exchanges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .323

Controlling Designated Router Election . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .324

Verifying an OSPF Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .325

Verifying OSPF-Enabled Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .325

Verifying OSPF Neighbors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .326

Verifying the Number of OSPF Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .327

Verifying Reachability of All Hosts in an OSPF Network. . . . . . . . . . . . . . . . . . .328

Configuring BGP Sessions . .

331

BGP Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331

BGP Peering Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331

IBGP Full Mesh Requirement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .332

Route Reflectors and Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .332

BGP Confederations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .332

Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .332

Configuring a BGP Network with Quick Configuration . . . . . . . . . . . . . . . . . . . . . . . . .333

Configuring BGP Networks with a Configuration Editor . . . . . . . . . . . . . . . . . . . . . . . .335

Configuring a Point-to-Point Peering Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .335

Configuring BGP Within a Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .338

Configuring a Route Reflector. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .339

Configuring BGP Confederations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .342

Verifying a BGP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .344

Verifying BGP Neighbors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .344

Verifying BGP Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .345

Verifying BGP Summary Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .346

Verifying Reachability of All Peers in a BGP Network . . . . . . . . . . . . . . . . . . . . . .347

Configuring Routing Policy, Firewall Filters, and Class of

Service

Chapter 17 Policy, Firewall Filter, and Class-of-Service Overview . .

351

Policy, Firewall Filter, and CoS Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351

Routing Policy Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .353

Routing Policy Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .353

Routing Policy Terms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .354

Routing Policy Match Conditions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .354

Routing Policy Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .356

Default and Final Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .358

Applying Routing Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .358

Firewall Filter Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .358

Stateful and Stateless Firewall Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .359

Process for Configuring a Stateful Firewall Filter and NAT. . . . . . . . . . . . . . . . .359

Summary of Stateful Firewall Filter and NAT Match Conditions and

Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .360

Planning a Stateless Firewall Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .362

Table of Contents xvii

J-series™ Services Router User Guide

Chapter 18

Chapter 19

Chapter 20

Stateless Firewall Filter Match Conditions, Actions, and Action

Modifiers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .363

Class-of-Service Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .366

Benefits of DiffServ CoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .367

DSCPs and Forwarding Service Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .367

JUNOS CoS Functions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .369

How Forwarding Classes and Schedulers Work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370

Default Forwarding Class Queue Assignments. . . . . . . . . . . . . . . . . . . . . . . . . 370

Default Scheduler Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371

Default Behavior Aggregate (BA) Classifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . .372

DSCP Rewrites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .373

Sample BA Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .373

Configuring Routing Policies . .

375

Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .376

Configuring a Routing Policy with a Configuration Editor . . . . . . . . . . . . . . . . . . . . . .376

Configuring the Policy Name. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .377

Configuring a Policy Term . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .377

Rejecting Known Invalid Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .378

Injecting OSPF Routes into the BGP Routing Table . . . . . . . . . . . . . . . . . . . . . . . . .380

Grouping Source and Destination Prefixes in a Forwarding Class . . . . . . . .382

Configuring Policy to Prepend the AS Path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .383

Configuring Damping Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .385

Configuring Firewall Filters and NAT . .

389

Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .389

Configuring a Stateful Firewall Filter with Quick Configuration . . . . . . . . . . . . . . . .390

Configuring a Stateful Firewall Filter with a Configuration Editor. . . . . . . . . . . . . .393

Configuring a Stateless Firewall Filter with a Configuration Editor . . . . . . . . . . . .399

Stateless Firewall Filter Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .400

Strategy for a Typical Stateless Firewall Filter. . . . . . . . . . . . . . . . . . . . . . . . . .400

Strategy for Handling Packet Fragments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .400

Configuring a Routing Engine Firewall Filter for Services and Protocols from

Trusted Sources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .400

Configuring a Routing Engine Firewall Filter to Protect Against TCP and

ICMP Floods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .404

Configuring a Routing Engine Firewall Filter to Handle Fragments . . . . . . .409

Applying a Stateless Firewall Filter to an Interface . . . . . . . . . . . . . . . . . . . . . . . . . 414

Verifying Firewall Filter Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415

Displaying Firewall Filter Configurations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415

Verifying a Stateful Firewall Filter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .420

Displaying Firewall Filter Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421

Displaying Firewall Filter Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .422

Verifying a Services, Protocols, and Trusted Sources Firewall Filter. . . . . . .423

Verifying a TCP and ICMP Flood Firewall Filter. . . . . . . . . . . . . . . . . . . . . . . . . . . . .424

Verifying a Firewall Filter That Handles Fragments . . . . . . . . . . . . . . . . . . . . . . . .425

Configuring Class of Service with DiffServ . .

427

Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .428

Configuring CoS with DiffServ with a Configuration Editor . . . . . . . . . . . . . . . . . . . .428

xviii

Table of Contents

Table of Contents

Part 7

Configuring a Policer for a Firewall Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .429

Configuring and Applying a Firewall Filter for a Multifield Classifier . . . . .430

Assigning Forwarding Classes to Output Queues. . . . . . . . . . . . . . . . . . . . . . . . . . .434

Configuring and Applying Rewrite Rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .435

Configuring and Applying Behavior Aggregate Classifiers . . . . . . . . . . . . . . . . .440

Configuring RED Drop Profiles for Assured Forwarding Congestion

Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .443

Configuring Schedulers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .446

Configuring and Applying Scheduler Maps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .450

Configuring and Applying Virtual Channels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .453

Verifying a DiffServ Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .457

Verifying Multicast Session Announcements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .457

Managing Multicast Transmissions

Part 8

Chapter 21

Chapter 22

Multicast Overview . .

461

Multicast Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461

Multicast Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .463

Upstream and Downstream Interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .464

Subnetwork Leaves and Branches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .464

Multicast IP Address Ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .465

Notation for Multicast Forwarding States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .465

Dense and Sparse Routing Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .466

Strategies for Preventing Routing Loops . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .466

Reverse-Path Forwarding for Loop Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .466

Shortest-Path Tree for Loop Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .467

Administrative Scoping for Loop Prevention. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .467

Multicast Protocol Building Blocks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .467

Configuring a Multicast Network . .

471

Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .472

Configuring a Multicast Network with a Configuration Editor. . . . . . . . . . . . . . . . . .472

Configuring SAP and SDP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .472

Configuring IGMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .473

Configuring the PIM Static RP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .474

Configuring a PIM RPF Routing Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .476

Verifying a Multicast Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .478

Verifying SAP and SDP Addresses and Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .478

Verifying the IGMP Version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .478

Verifying the PIM Mode and Interface Configuration . . . . . . . . . . . . . . . . . . . . . .479

Verifying the PIM RP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .479

Verifying the RPF Routing Table Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . .480

Managing Packet Security

Chapter 23 Configuring IPSec for Secure Packet Exchange . .

483

IPSec Tunnel Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .483

Security Associations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .483

Table of Contents xix

J-series™ Services Router User Guide

Part 9

Securing IncomingTraffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .484

Translating Outgoing Traffic. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .484

Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .484

Configuring an IPSec Tunnel with Quick Configuration . . . . . . . . . . . . . . . . . . . . . . . .484

Configuring an IPSec Tunnel with a Configuration Editor . . . . . . . . . . . . . . . . . . . . . .486

Configuring IPSec Services Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .487

Configuring IPSec Service Sets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .488

Configuring an IPSec Stateful Firewall Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .492

Configuring a NAT Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .494

Verifying the IPSec Tunnel Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .496

Verifying IPSec Tunnel Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .497

Upgrading the Services Router

Chapter 24

Chapter 25

Performing Software Upgrades and Reboots . .

501

Upgrade Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .502

Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .502

Downloading Software Upgrades from Juniper Networks . . . . . . . . . . . . . . . . . . . . . .502

Installing Software Upgrades with J-Web Quick Configuration . . . . . . . . . . . . . . . . .503

Installing Software Upgrades from a Remote Server . . . . . . . . . . . . . . . . . . . . . . .503

Installing Software Upgrades by Uploading Files . . . . . . . . . . . . . . . . . . . . . . . . . . .505

Installing Software Upgrades with the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .506

Downgrading the Software with the J-Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . 507

Downgrading the Software with the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507

Configuring Boot Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .508

Configuring Boot Devices with the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .508

Copying Software Images to Boot Devices with UNIX . . . . . . . . . . . . . . . . . . . . .509

Copying Software Images to Boot Devices with Cygwin. . . . . . . . . . . . . . . . . . . 510

Configuring a Boot Device to Receive Software Failure Memory Snapshots . . 511

Deleting a Rescue Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511

Rebooting or Halting a Services Router with the J-Web Interface. . . . . . . . . . . . . . 512

Rebooting the Services Router with the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514

Halting the Services Router with the CLI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514

Replacing and Troubleshooting Hardware Components . .

517

Replacing Hardware Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517

Tools and Parts Required . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518

Replacing the Console Port Cable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518

Replacing a PIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518

Removing a PIM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519

Installing a PIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .520

Replacing PIM Cables. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521

Removing a PIM Cable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .522

Installing a PIM Cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .522

Removing and Installing the Primary Compact Flash Disk . . . . . . . . . . . . . . . .523

Removing the Primary Compact Flash Disk . . . . . . . . . . . . . . . . . . . . . . . . . . .523

Installing the Primary Compact Flash Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . .524

Removing and Installing the Removable Compact Flash Disk . . . . . . . . . . . .525

Removing the Removable Compact Flash Disk. . . . . . . . . . . . . . . . . . . . . . . .525

xx

Table of Contents

Table of Contents

Part 10

Installing the Removable Compact Flash Disk . . . . . . . . . . . . . . . . . . . . . . . . .527

Removing and Installing the USB Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .527

Removing the USB Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .528

Installing the USB Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .529

Removing and Installing DRAM Modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .529

Removing a DRAM Module. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .529

Installing a DRAM Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531

Replacing a Power Supply Cord in a J2300 or J4300 Router . . . . . . . . . . . . . .532

Replacing Power System Components in a J6300 Router . . . . . . . . . . . . . . . . .533

Removing a Power Supply in a J6300 Router . . . . . . . . . . . . . . . . . . . . . . . . . .534

Installing a Power Supply in a J6300 Router . . . . . . . . . . . . . . . . . . . . . . . . . . .535

Replacing a Power Supply Cord in a J6300 Router . . . . . . . . . . . . . . . . . . . .536

Troubleshooting Hardware Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .536

Chassis Alarm Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .536

Contacting the Juniper Networks Technical Assistance Center . . . . . . . . . . . .538

J-series Requirements and Specifications

Chapter 26

Chapter 27

Preparing for Router Installation . .

541

General Site Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541

Desktop and Wall Mounting Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .542

Rack Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .542

Rack Size and Strength . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .542

Spacing of Mounting Holes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .543

Connection to Building Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .543

Router Environmental Tolerances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .543

Fire Safety Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .544

Fire Suppression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .544

Fire Suppression Equipment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .544

Power Guidelines, Requirements, and Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . .545

Site Electrical Wiring Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .545

Signaling Limitations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .545

Radio Frequency Interference. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .546

Electromagnetic Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .546

Router Power Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .546

AC Power, Connection, and Power Cord Specifications . . . . . . . . . . . . . . . . . . . .547

Network Cable Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .548

Site Preparation Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .548

Network Cable Specifications and Connector Pinouts . .

551

Serial PIM Cable Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551

RS-232 DTE Cable Pinout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .552

RS-232 DCE Cable Pinout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .552

RS-422/449 (EIA-449) DTE Cable Pinout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .553

RS-422/449 (EIA-449) DCE Cable Pinout. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .554

EIA-530A DTE Cable Pinout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .555

EIA-530A DCE Cable Pinout. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .556

V.35 DTE Cable Pinout. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .556

V.35 DCE Cable Pinout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .557

X.21 DTE Cable Pinout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .558

Table of Contents xxi

J-series™ Services Router User Guide

Chapter 28

X.21 DCE Cable Pinout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .559

RJ-45 Connector Pinouts for the Routing Engine (Ethernet) Port . . . . . . . . . . . . . .559

DB-9 Connector Pinouts for the Console Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .559

E1 and T1 RJ-48 Cable Pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .560

Safety and Regulatory Compliance Information . .

563

Definition of Safety Warning Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .563

Safety Guidelines and Warnings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .565

General Safety Guidelines and Warnings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .565

Qualified Personnel Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .567

Preventing Electrostatic Discharge Damage . . . . . . . . . . . . . . . . . . . . . . . . . . .567

Electrical Safety Guidelines and Warnings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .568

General Electrical Safety Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .569

AC Power Electrical Safety Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .569

Grounded Equipment Warning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 570

Warning Statement for Norway and Sweden . . . . . . . . . . . . . . . . . . . . . . . . . . 571

In Case of Electrical Accident . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 571

Multiple Power Supplies Disconnection Warning . . . . . . . . . . . . . . . . . . . . . .572

Power Disconnection Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .573

TN Power Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .574

Telecommunication Line Cord Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .576

Installation Safety Guidelines and Warnings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .577

Chassis Lifting Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .577

Installation Instructions Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .578

Rack-Mounting Requirements and Warnings . . . . . . . . . . . . . . . . . . . . . . . . . .578

Ramp Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .583

Laser and LED Safety Guidelines and Warnings . . . . . . . . . . . . . . . . . . . . . . . . . . . .584

General Laser Safety Guidelines. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .584

Class 1 Laser Product Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .585

Class 1 LED Product Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .585

Laser Beam Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .586

Radiation from Open Port Apertures Warning . . . . . . . . . . . . . . . . . . . . . . . . .587

Maintenance and Operational Safety Guidelines and Warnings . . . . . . . . . .588

Battery Handling Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .589

Jewelry Removal Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .590

Lightning Activity Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .592

Operating Temperature Warning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .593

Product Disposal Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .595

Agency Approvals. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .597

Compliance Statements for EMC Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .598

Canada. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .598

Japan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .598

Taiwan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .599

United States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .599

FCC Part 15 Statement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .599

FCC Part 68 Statement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .600

xxii

Table of Contents

Table of Contents

Part 11

Customer Support and Product Return

Part 12

Chapter 29 Contacting Customer Support and Returning Hardware . .

603

Locating Component Serial Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .603

PIM Serial Number Label . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .605

J6300 Power Supply Serial Number Labels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .605

Contacting Customer Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .605

Information You Might Need to Supply to JTAC. . . . . . . . . . . . . . . . . . . . . . . . . . . . .606

Return Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .606

Packing a Router or Component for Shipment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607

Tools and Parts Required . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607

Packing the Services Router for Shipment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607

Packing Components for Shipment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .609

Index

Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613

Table of Contents xxiii

J-series™ Services Router User Guide xxiv

Table of Contents

About This Guide

This preface provides the following guidelines for using this manual and related

Juniper Networks, Inc., technical documents:

Objectives on page xxv

Audience on page xxvi

How to Use This Guide on page xxvi

Document Conventions on page xxvii

Related Juniper Networks Documentation on page xxviii

Documentation Feedback on page xxx

Requesting Support on page xxx

Objectives

This guide contains instructions for installing, configuring, and managing a Services

Router. It explains how to prepare your site for installation, unpack and install the hardware, power on the router, configure secure routing, monitor network operations, and perform routine maintenance and troubleshooting.

NOTE: This guide documents Release 7.0 of the JUNOS software. For additional information about J-series Services Routers—either corrections to or omissions from this guide—see the J-series release notes at http://www.juniper.net

.

J-series Services Routers run on the JUNOS Internet software, which you control through either a Web browser or a command-line interface (CLI) to perform the

tasks shown in Table 1.

Objectives xxv

J-series™ Services Router User Guide

Table 1: Capabilities of J-series Interfaces

J-series Interface

J-Web graphical browser interface

JUNOS CLI

Capabilities

Quick (basic) configuration

Monitoring, configuration, diagnosis, and management

Monitoring, configuration, diagnosis, and management

This guide provides complete instructions for using the J-Web interface, but it is not a comprehensive resource for using the JUNOS CLI. For CLI information, see

“Related Juniper Networks Documentation” on page xxviii.

Audience

This guide is designed for anyone who installs, configures, and maintains a J-series

Services Router or prepares a site for Services Router installation. The guide is intended for the following audiences:

Customers with technical knowledge of and experience with networks and the Internet

Network administrators who install, configure, and manage Internet routers but are unfamiliar with the JUNOS software

Network administrators who install, configure, and manage products of

Juniper Networks

Personnel operating the equipment must be trained and competent; must not conduct themselves in a careless, willfully negligent, or hostile manner; and must abide by the instructions provided by the documentation.

How to Use This Guide

Because you can configure and manage a J-series Services Router in several ways, most chapters in this guide contain multiple sets of instructions:

Configuration—For many Services Router features, you can use J-Web Quick

Configuration for basic setup. For more extensive configuration of all

Services Router features, use the J-Web configuration editor or the JUNOS CLI configuration editor.

Maintenance—To monitor, diagnose, and manage a Services Router, use the

J-Web interface for common tasks, or use CLI operational mode commands.

Table 2 shows where Quick Configuration, J-Web, and CLI instructions are located.

xxvi

How to Use This Guide

About This Guide

Table 2: Location of Instructions in a Chapter

Configuration or Management Method

J-Web Quick Configuration pages (where applicable)

J-Web configuration editor pages

JUNOS CLI configuration editor (configuration mode statements)

J-Web monitor, diagnose, and manage pages

JUNOS CLI operational mode commands

Location of Instructions in a Chapter

In a table, before configuration editor instructions.

Together in a task table—after Quick Configuration instructions (where applicable).

In a verification section at the end of a configuration chapter.

Information about common monitoring and diagnostic tasks

is located in “Monitoring and Diagnosing a Services Router” on page 197.

Document Conventions

Table 3 defines notice icons used in this guide.

Table 3: Notice Icons

Icon

NOTE:

CAUTION:

WARNING:

Meaning

Informational note

Caution

Warning

Description

Indicates important features or instructions.

Indicates a situation that might result in loss of data or hardware damage.

Alerts you to the risk of personal injury or death.

Table 4: Text and Syntax Conventions

Convention Description

Represents text that you type.

Bold sans serif typeface

Italic typeface

Table 4 defines the text and syntax conventions used in this guide.

Introduces important new terms.

Identifies book names.

Identifies RFC and Internet draft titles.

Examples

To enter configuration mode, type the configure command: user@host> configure

A policy term is a named structure that defines match conditions and actions.

JUNOS System Basics

Configuration Guide

RFC 1997, BGP Communities

Attribute

Document Conventions xxvii

J-series™ Services Router User Guide

Convention

Italic sans serif typeface

Sans serif typeface

< > (angle brackets)

| (pipe symbol)

# (pound sign)

[ ] (square brackets)

Indention and braces ( { } )

; (semicolon)

J-Web GUI Conventions

Bold typeface

> (bold right angle bracket)

Description Examples

Represents variables (options for which you substitute a value) in commands or configuration statements.

Configure the machine’s domain name:

[edit] root@# set system domain-name

domain-name

Represents names of configuration statements, commands, files, and directories; IP addresses; configuration hierarchy levels; or labels on routing platform components.

To configure a stub area, include the stub statement at the [edit protocols ospf area area-id

] h ierarchy level.

The console port is labeled

CONSOLE.

Enclose optional keywords or variables.

stub <default-metric metric >;

Indicates a choice between the mutually exclusive keywords or variables on either side of the symbol. The set of choices is often enclosed in parentheses for clarity.

Indicates a comment specified on the same line as the configuration statement to which it applies.

Enclose a variable for which you can substitute one or more values.

Identify a level in the configuration hierarchy.

Identifies a leaf statement at a configuration hierarchy level.

broadcast | multicast

( string1 | string2 | string3 ) rsvp { # Required for dynamic MPLS only community name members [

community-ids ]

}

[edit] routing-options { static {

} route default { nexthop address ; retain;

}

Represents J-Web graphical user interface (GUI) items you click or select.

Separates levels in a hierarchy of J-Web selections.

In the Logical Interfaces box, select All Interfaces.

To cancel the configuration, click Cancel.

In the configuration editor hierarchy, select Protocols>Ospf.

Related Juniper Networks Documentation

Although this guide provides instructions for configuring and managing a J-series

Services Router with the JUNOS CLI, it is not a comprehensive JUNOS software resource. For complete documentation of the statements and commands described

in this guide, see the JUNOS software manuals listed in Table 5.

xxviii

Related Juniper Networks Documentation

About This Guide

Table 5: Related JUNOS Software Publications

Chapter in This Guide

Part 2, “Installing the J-series Services Router”

“Configuring Network Interfaces” on page 79

Corresponding JUNOS Software Manual

JUNOS Network Interfaces and Class of Service

Configuration Guide

JUNOS Network and Services Interfaces Command

Reference

JUNOS System Basics Configuration Guide

Part 3, “Using the J-series User Interfaces”

“J-series User Interface Overview” on page 109

“Using J-series Configuration Tools” on page 127

Part 4, “Managing the Services Router”

“Managing Users and Operations” on page 163

“Monitoring and Diagnosing a Services Router” on page 197

JUNOS System Basics Configuration Guide

JUNOS System Basics Configuration Guide

JUNOS Protocols, Class of Service, and System Basics

Command Reference

JUNOS Network and Services Interfaces Command

Reference

JUNOS Network Management Configuration Guide

“Configuring SNMP for Network Management” on page 241

Part 5, “Configuring Routing Protocols”

“Routing Overview” on page 255

“Configuring Static Routes” on page 285

“Configuring a RIP Network” on page 297

“Configuring an OSPF Network” on page 309

JUNOS Routing Protocols Configuration Guide

“Configuring BGP Sessions” on page 331

Part 6, “Configuring Routing Policy, Firewall Filters, and Class of Service”

“Policy, Firewall Filter, and Class-of-Service Overview” on page 351

JUNOS Policy Framework Configuration Guide

“Configuring Routing Policies” on page 375

“Configuring Firewall Filters and NAT” on page 389

JUNOS Network Interfaces and Class of Service

Configuration Guide

JUNOS Policy Framework Configuration Guide

“Configuring Class of Service with DiffServ” on page 427

JUNOS Services Interfaces Configuration Guide

JUNOS Network Interfaces and Class of Service Configuration

Guide

Part 7, “Managing Multicast Transmissions”

“Multicast Overview” on page 461

“Configuring a Multicast Network” on page 471

JUNOS Multicast Protocols Configuration Guide

Related Juniper Networks Documentation xxix

J-series™ Services Router User Guide

Chapter in This Guide

Part 8, “Managing Packet Security”

“Configuring IPSec for Secure Packet Exchange” on page 483

Corresponding JUNOS Software Manual

JUNOS System Basics Configuration Guide

JUNOS Services Interfaces Configuration Guide

Documentation Feedback

We encourage you to provide feedback, comments, and suggestions so that we can improve the documentation. You can send your comments to [email protected], or fill out the documentation feedback form at http://www.juniper.net/techpubs/docbug/docbugreport.html

. If you are using e-mail, be sure to include the following information with your comments:

Document name

Document part number

Page number

Software release version

Requesting Support

For technical support, open a support case using the Case Manager link at http://www.juniper.net/support/ or call 1-888-314-JTAC (within the United States) or

1-408-745-9500 (outside the United States).

xxx

Requesting Support

Part 1

J-series Overview

Introducing the J-series Services Router on page 3

System Overview on page 7

J-series Overview 1

2

J-series Overview

Chapter 1

Introducing the J-series Services Router

J-series Services Routers provide stable, reliable, efficient IP routing, WAN and LAN connectivity, and management services for small to medium-sized enterprise networks. Services Routers typically connect small, branch, or regional offices to a central site router, and link Internet service provider (ISP) networks.

This chapter contains the following topics:

J-series Services Router Overview on page 3

J-series Software Features and Licenses on page 4

J-series Services Router Overview

J-series Services Routers are available in three models of increasing

bandwidth, described in Table 6.

All J-series Services Routers run on the JUNOS software and are reachable through the J-Web browser interface on the JUNOS command-line interface.

For details, see “J-series User Interface Overview” on page 109.

Table 6: J-series Models

Model

J2300 Services Router

Description

Remote or branch office customer premises equipment (CPE).

Smaller chassis (1 U) with a nonredundant AC power supply,

256 MB to 512 MB of memory, and a Universal Serial Bus (USB) port for external storage. Three available versions have two Fast Ethernet LAN interfaces plus one of the following sets of fixed WAN interfaces:

Dual T1 interfaces

Dual E1 interfaces

Two synchronous serial ports

Bandwidth

Up to 4 Mbps

20,000 to 50,000 packets per second

(pps)

J-series Services Router Overview

3

J-series™ Services Router User Guide

Model

J4300 Services Router

J6300 Services Router

Description

Regional office CPE.

Bandwidth

Up to 16 Mbps

Larger chassis (2 U) with a nonredundant

AC power supply, 256 MB to 512 MB of memory, and a Universal Serial

Bus (USB) port for external storage.

In addition to two Fast Ethernet LAN interfaces, this model has six open slots for the following WAN Physical Interface

Modules (PIMs):

50,000 to 80,000 pps

2–port Fast Ethernet PIM

2–port T1 or E1 PIM

2–port Serial PIM

Corporate CPE.

Up to 90 Mbps

Larger chassis (2 U) with a redundant

AC power supply, 256 MB to 1 GB of memory, and a Universal Serial Bus

(USB) port for external storage. In addition to two Fast Ethernet LAN interfaces, this model has six open slots for the following WAN Physical Interface

Modules (PIMs):

100,000 to 150,000 pps

2–port Fast Ethernet PIM

2–port T1 or E1 PIM

2–port Serial PIM

1–port DS3 PIM

J-series Software Features and Licenses

J-series Services Routers provide the software features listed in Table 7. You must

purchase a separate software license to obtain some software features.

Table 7: Summary of J-series Features and License Requirements

Feature Category J-series Feature

Internet Protocols

Routing and

Multicast

IPv4 only

Open Shortest Path First (OSPF)

Border Gateway Protocol (BGP)

Routing Information Protocol version 1 (RIPv1) and RIPv2

Static routes

Separate License

License required for advanced BGP

4

J-series Software Features and Licenses

Introducing the J-series Services Router

Feature Category J-series Feature

Intermediate System-to-Intermediate System (IS-IS)

Multicast:

Separate License

Internet Group Management Protocol version 3 (IGMPv3)

Protocol Independent Multicast (PIM)

Distance Vector Multicast Routing Protocol (DVMRP)

Single-source multicast

Static addresses IP Address

Management

Encapsulation

Ethernet:

Media access control (MAC) encapsulation

Traffic Management

Security

Voice Support

High Availability

System Management

802.1p tagging

Synchronous Point-to-Point Protocol (PPP)

Frame Relay

High-level Data Link Control (HDLC)

Serial encapsulation over RS-232, RS-449, X.21, V.35, and EIA-530 connections

802.1Q filtering and forwarding

Multilink Frame Relay

Multilink PPP

Policing and shaping

Class-based queuing with prioritization

Weighted random early detection (WRED)

Queuing by virtual LAN (VLAN), data link connection identifier (DLCI), interface, or bundle

Network attack detection

Denial-of-service (DoS) and distributed DoS protection

Generic routing encapsulation (GRE), IP-in-IP, and IP Security (IPSec) tunnels License required for

IPSec

56-bit Data Encryption Standard (DES) and 168-bit 3DES encryption

MD5 and Secure Hash Algorigthm (SHA-1) authentication

Replay attack prevention

Stateful firewall packet filters

Compressed Real-time Transport Protocol (CRTP)

Virtual Router Redundancy Protocol (VRRP)

Graceful restart according to IETF standards

Redundant interfaces

JUNOScope network manager

License required

J-series Software Features and Licenses

5

J-series™ Services Router User Guide

Feature Category J-series Feature

Traffic Analysis

J-Web browser interface—for Services Router configuration and management

JUNOScript XML application programming interface (API)

JUNOS command-line interface (CLI)—for Services Router configuration and management through the console, telnet, or SSH

Simple Network Management Protocol version 1 (SNMPv1) and SNMPv2

J-Flow flow monitoring and accounting

Separate License

License required for

J-Flow

Activity Logging and

Monitoring

System log

Administration

Traceroute

Supports the following external administrator databases:

RADIUS

Lightweight Directory Access Protocol (LDAP)

SecurID

Autoinstallation

Configuration rollback

Button-operated configuration rescue (CONFIG)

Confirmation of configuration changes

Software upgrades

6

J-series Software Features and Licenses

Chapter 2

System Overview

J-series Services Routers are available in three models.

This chapter contains the following topics:

J2300 Services Router Hardware Features on page 7

J4300 and J6300 Services Router Hardware Features on page 16

Software Overview on page 28

J2300 Services Router Hardware Features

This section contains the following topics:

J2300 Chassis on page 7

J2300 Routing Engine on page 10

J2300 Front Panel on page 11

J2300 Physical Interface Module (PIM) on page 13

J2300 LAN Ports on page 14

J2300 Power System on page 15

J2300 Cooling System on page 15

J2300 Chassis

The J2300 Services Router chassis is a rigid sheet metal structure that houses all

the other router components (see Figure 1, Figure 2, and Figure 3). The chassis

can be installed in many types of racks or cabinets, on a wall, or on a desk. For

information about acceptable rack types, see “Rack Requirements” on page 542.

J2300 Services Router Hardware Features

7

J-series™ Services Router User Guide

In addition to the features described in subsequent sections, the chassis

includes the following features (see Figure 1 and Figure 2):

One pair of metal brackets that can be attached to the side of the chassis. You can use the brackets for mounting the chassis in a rack or cabinet or on a wall.

One electrostatic discharge (ESD) point, a PEM nut at the rear of the chassis.

WARNING: Before removing or installing components of a functioning router, attach an ESD strap to an ESD point and place the other end of the strap around your bare wrist. Failure to use an ESD strap could result in damage to the router.

The router is connected to earth ground through the AC power cord. The router must be connected to earth ground during normal operation.

For additional safety information, see “Safety and Regulatory Compliance

Information” on page 563.

Figure 1: Front of J2300 Chassis

Mounting bracket

Figure 2: Rear of J2300 Chassis

J2300

CONSOLE

USB

Power button

Console port

USB port

PORT0

PORT1

STATUS

PORT2

SYNC

SERIAL PORT3

STATUS

LAN ports

Physical interface module (PIM)

Mounting bracket

Protective earthing terminal

Primary compact flash drive

Power appliance inlet

Power supply fan exhaust

8

J2300 Services Router Hardware Features

System Overview

Figure 3: J2300 Hardware Components

Front

Physical

Interface

Module

(PIM)

Processor

Power supply

DRAM

Rear

Primary compact flash drive

Routing Engine

Table 8 summarizes the physical specifications for the router chassis.

Table 8: J2300 Physical Specifications

Description

Chassis dimensions

Router weight

Value

1.75 in. (4.4 cm) high

17.25 in. (43.8 cm) wide—19 in. (48.3 cm) wide with mounting brackets attached

12.37 in. (31.4 cm) deep—plus 0.5 in. (1.27 cm) of hardware that protrudes from the chassis front

12 lb (5.4 kg)

J2300 Services Router Hardware Features

9

J-series™ Services Router User Guide

J2300 Routing Engine

The Routing Engine provides three main functions:

Creates the packet forwarding switch fabric for the Services Router, providing route lookup, filtering, and switching on incoming data packets, then directing outbound packets to the appropriate interface for transmission to the network.

Maintains the routing tables used by the router and controls the routing protocols that run on the router.

Provides control and monitoring functions for the router, including controlling power and monitoring system status.

The Routing Engine consists of the following components:

Processor—Creates the packet forwarding switch fabric for the router and runs

JUNOS Internet software to maintain the router’s routing tables and routing protocols. The Routing Engine has a Pentium-class processor.

DRAM—Buffers incoming packets and provides storage for the routing and forwarding tables and for other Routing Engine processes.

Compact flash drive—Provides primary storage for software images, configuration files, and microcode. The compact flash drive is accessible from the rear of the router, and is field-replaceable. For information about

replacing the compact flash drive, see “Removing and Installing the Primary

Compact Flash Disk” on page 523.

PCI bus—Provides the interface to the PIMs.

EPROM—Stores the serial number of the Routing Engine.

NOTE: For specific information about Routing Engine components (for example, the amount of DRAM installed), issue the show chassis routing-engine command.

J2300 Boot Devices

The J2300 Services Router can boot from two devices:

Primary compact flash disk

USB drive

10

J2300 Services Router Hardware Features

System Overview

J2300 Boot Sequence

Normally, the Services Router boots from the primary compact flash disk. If the compact flash disk fails, the router attempts to boot from the removable

USB drive, if present, which is the alternate boot device.

J2300 Front Panel

The front panel of the Services Router (Figure 4) allows you to view router status

LEDs, access the console port, and perform simple control functions.

Figure 4: Front Panel of J2300 Services Router

ALARM LED Configuration LED Physical Interface Module (PIM)

J2300

ALARM

POWER ON

CONSOLE

USB

CONFIG

POWER ON

LED

Power button

CONFIG button

Console port

USB port

PORT 0 PORT 1

STATUS

LAN ports

SYNC

SERIAL

STATUS

For information about the components of the front panel, see the following sections:

ALARM LED on page 11

Power Button and POWER ON LED on page 12

CONFIG Button and LED on page 12

Console Port on page 13

J2300 USB Port on page 13

ALARM LED

The

ALARM

LED is located to the left of the power button on the front

panel (see Figure 4). The yellow (amber) LED lights to indicate a critical

condition that can result in a system shutdown or a less severe condition that requires monitoring or maintenance.

NOTE: The

ALARM

LED on the Services Router is a single-color alarm regardless of the severity of the alarm condition (critical, major, or minor). When an alarm condition triggers the LED, the yellow light turns on.

J2300 Services Router Hardware Features

11

J-series™ Services Router User Guide

Table 9: POWER ON LED

Color

Green

To deactivate alarms, you must clear the condition that caused the alarm. For a list

of alarms that can occur on the router, see “Chassis Alarm Conditions” on page 536.

Power Button and POWER ON LED

The power button is located on the left side of the front panel (see

Figure 4). You can use the power button to power the Services Router

on and off. When you power on the router, the Routing Engine boots as the power supply completes its startup sequence.

The

POWER ON

LED is located to the left of the power button on the front

panel. Table 9 describes the

POWER ON

LED.

State

Off

On steadily

Blinking

Description

Router is unplugged, or is powered off and in standby mode.

Router is powered on and is either booting or functioning normally.

Power button has been pressed and quickly released, and the router is gracefully shutting down.

After the router is powered on, status indicators—such as LEDs on the front panel and show chassis command output—can take up to 60 seconds to indicate that the power supply is functioning normally. Ignore error indicators that appear during the first 60 seconds.

If you need to power off the router after the Routing Engine finishes booting, use the J-Web interface or the CLI to halt the Services Router first. For instructions, see

“Rebooting or Halting a Services Router with the J-Web Interface” on page 512.

CONFIG Button and LED

You can use the

CONFIG button to return the router to a configuration that you have determined is a stable, known configuration. The

CONFIG button is recessed to prevent it from being pressed accidentally.

When you press and release the

CONFIG button, the rescue configuration is loaded and committed.

When you press and hold the

CONFIG button for more than 15 seconds, all configurations on the router (including the rescue configuration and backup configurations) are deleted, and the factory configuration is loaded and committed.

Table 10 describes the configuration LED.

12

J2300 Services Router Hardware Features

System Overview

Table 10: Configuration LED

Color

Green

Red

State

Blinking

On steadily

Blinking

On steadily

Description

Rescue configuration is being loaded.

Rescue or factory configuration is loaded and committed.

Current committed configuration and all previous versions are being deleted.

Factory configuration is being loaded.

Operation to return the router to the rescue or factory configuration failed.

Console Port

You can use the console port to connect to the Routing Engine through an

RJ-45 serial cable. From the console port, you can use the CLI to configure the router. The console port is configured as data terminal equipment

(DTE) and supports the RS-232 (EIA-232) standard.

J2300 USB Port

The slot labeled

USB

on the front panel of the router (see Figure 4) accepts a

USB drive or USB drive adapter with a compact flash disk installed, as defined in the CompactFlash Specification published by the CompactFlash Association.

When the USB drive is installed and configured, it automatically acts as a secondary boot device, if the primary compact flash disk fails on startup.

Depending on the size of the USB drive, you can also configure it to receive any core files generated during a failure. For information about configuring a USB

drive, see “Configuring Boot Devices with the CLI” on page 508.

NOTE: For a list of supported USB drives, see the J-series release notes at http://www.juniper.net

.

J2300 Physical Interface Module (PIM)

The fixed Physical Interface Modules (PIM) in a J2300 Services Router provide the physical connection to various network media types, receiving incoming packets from the network and transmitting outgoing packets to the network. The PIM is equipped with a dedicated network processor that forwards incoming data packets to the Routing Engine, and receives outgoing data packets from the Routing Engine. During this process, the PIM performs framing and line-speed signaling for its medium type.

J2300 Services Router Hardware Features

13

J-series™ Services Router User Guide

Table 11: PIM Status LED

Color

Green

Red

Each PIM supported on the router has the following components:

One or more cable connector ports—Accept a network media connector.

Status LED—Indicates port status. Table 11 describes the meaning of the

LED states.

For pinouts of PIM cable connectors, see “Network Cable Specifications and Connector Pinouts” on page 551. For PIM replacement instructions,

see “Replacing a PIM” on page 518.

State

On steadily

On steadily

Description

Online with no alarms or failures.

Active with a local alarm; router has detected a failure.

J2300 LAN Ports

Table 12: LAN Port LEDs

Function

Link

Activity

Color

Green

Green

All J-series Services Routers include two fixed 10/100Base-TX Fast Ethernet ports. The LAN ports receive incoming packets from the network and transmit outgoing packets to the network. Each port is equipped with a dedicated network processor that forwards incoming data packets to the Routing Engine, and receives outgoing data packets from the Routing Engine.

The LAN ports are located on the front panel of the router (see Figure 4) and

are configured like the ports on a Physical Interface Module (PIM). The LAN ports are not field-replaceable. The ports, labeled

PORT 0 and

PORT 1

, correspond to fe-0/0/0 and fe-0/0/1 respectively, for configuration.

For pinouts of Fast Ethernet cable connectors, see “Network Cable

Specifications and Connector Pinouts” on page 551.

Each port has two LEDs located on each side of the bottom of the port.

Table 12 describes the LAN port LEDs.

State

On steadily

Blinking

Off

Description

Port is online.

Port is receiving data.

Port might be on, but is not receiving data.

14

J2300 Services Router Hardware Features

System Overview

J2300 Power System

The J2300 Services Router uses AC power. The autosensing power supply

(see Figure 2) distributes the different output voltages to the router

components according to their voltage requirements.

The power supply is fixed in the chassis, and is not field-replaceable. It has a single AC appliance inlet that requires a dedicated AC power feed.

For information about site power preparations, see “Power Guidelines,

Requirements, and Specifications” on page 545. For information about

connecting the router to power and ground, see “Connecting Power to the Services Router” on page 43.

J2300 Cooling System

The cooling system consists of the following components:

A fan on the Routing Engine’s processor

A fan on the power supply

The airflow produced by these fans keeps router components within the

acceptable temperature range (see Figure 5).

J2300 Services Router Hardware Features

15

J-series™ Services Router User Guide

Figure 5: Airflow Through the J2300 Chassis

Front

Rear

The Routing Engine monitors the temperature of the router components. If the ambient maximum temperature specification is exceeded and the router cannot be adequately cooled, the Routing Engine shuts down the hardware components.

J4300 and J6300 Services Router Hardware Features

This section contains the following topics:

J4300 and J6300 Chassis on page 17

Midplane on page 21

J4300 and J6300 Routing Engine on page 21

J4300 and J6300 Front Panel on page 22

J4300 and J6300 Physical Interface Modules (PIMs) on page 25

J4300 Power System on page 26

J6300 Power System on page 26

16

J4300 and J6300 Services Router Hardware Features

System Overview

J4300 and J6300 Cooling System on page 27

J4300 and J6300 Chassis

The J4300 and J6300 Services Router chassis is a rigid sheet metal structure that

houses all the other router components (see Figure 6, Figure 7, Figure 8, and

Figure 9). The chassis can be installed in many types of racks or cabinets. For

information about acceptable rack types, see “Rack Requirements” on page 542.

In addition to the features described in subsequent sections, the chassis includes

the following features (see Figure 6, Figure 7, and Figure 8:

One pair of metal brackets attached to the side of the chassis. You can use the brackets for mounting the chassis in a rack or cabinet.

One electrostatic discharge (ESD) point, a banana plug receptacle at the front of the chassis.

WARNING: Before removing or installing components of a functioning router, attach an ESD strap to the ESD point and place the other end of the strap around your bare wrist. Failure to use an ESD strap could result in damage to the router.

The router is connected to earth ground through the AC power cord. The router must be connected to earth ground during normal operation.

For additional safety information, see “Safety and Regulatory Compliance

Information” on page 563.

One protective earthing terminal, a PEM nut at the rear of the chassis.

J4300 and J6300 Services Router Hardware Features

17

J-series™ Services Router User Guide

Figure 6: Front of J4300 and J6300 Chassis

Mounting bracket

Physical Interface

Module (PIM)

Blank

PIM panel

Mounting bracket

Figure 7: Rear of J4300 Chassis

ESD point

J4300

ALAR

M

POWE

R ON

PORT

1

STATU

S

PORT

0

STATU

S

CONFIG

CONSOLE

USB

Power button

PORT

0

PORT

1

EJECT

IN

USE COMP

ACT FLASH

Console port

USB port

LAN ports

Removable compact flash drive

Protective earthing terminal

Primary compact flash drive

AC Power appliance inlet

Power supply fan exhaust

18

J4300 and J6300 Services Router Hardware Features

Figure 8: Rear of J6300 Chassis

Power supply ejector tabs

Protective earthing terminal

Primary compact flash drive

AC power appliance inlets

Power supply fan exhaust

System Overview

J4300 and J6300 Services Router Hardware Features

19

J-series™ Services Router User Guide

Figure 9: J4300 and J6300 Hardware Components

Power supply

Primary compact flash drive

Rear

Processor

DRAM

Routing

Engine

Midplane

Fan Physical

Interface

Module (PIM)

Front

Removable compact flash drive

Table 13 summarizes the physical specifications for the router chassis.

20

J4300 and J6300 Services Router Hardware Features

System Overview

Table 13: J4300 and J6300 Physical Specifications

Description

Chassis dimensions

Router weight

Value

3.50 in. (8.9 cm) high

17.00 in. (43.2 cm) wide—19 in. (48.3 cm) wide with mounting brackets attached

19.00 in. (48.3 cm) deep—plus 0.5 in. (1.27 cm) of hardware that protrudes from the chassis front

J4300 router minimum configuration (no PIMs): 18 lb (8.2 kg)

J4300 router maximum configuration (six PIMs): 21 lb (9.5 kg)

J6300 router minimum configuration (no PIMs and one power supply): 18.5 lb (8.4 kg)

J6300 router maximum configuration (six PIMs and two power supplies): 24 lb (10.9 kg)

Midplane

The midplane is located in the center of the chassis and forms the rear of

the PIM card cage (see Figure 9). You install the PIMs into the midplane

from the front of the chassis. Data packets are transferred across the midplane from the PIM to the Routing Engine, and from the Routing

Engine across the midplane to the destination PIM.

J4300 and J6300 Routing Engine

The Routing Engine provides three main functions:

Creates the packet forwarding switch fabric for the Services Router, providing route lookup, filtering, and switching on incoming data packets, then directing outbound packets to the appropriate interface for transmission to the network.

Maintains the routing tables used by the router and controls the routing protocols that run on the router.

Provides control and monitoring functions for the router, including controlling power and monitoring system status.

The Routing Engine consists of the following components:

Processor—Creates the packet forwarding switch fabric for the router and runs

JUNOS Internet software to maintain the router’s routing tables and routing protocols. The Routing Engine has a Pentium-class processor.

DRAM—Buffers incoming packets and provides storage for the routing and forwarding tables and for other Routing Engine processes.

Compact flash drive—Provides primary storage for software images, configuration files, and microcode. The compact flash drive is accessible from the rear of the router, and is field-replaceable. For information about

J4300 and J6300 Services Router Hardware Features

21

J-series™ Services Router User Guide

replacing the compact flash drive, see “Removing and Installing the Primary

Compact Flash Disk” on page 523.

PCI bus—Provides the interface to the PIMs.

EPROM—Stores the serial number of the Routing Engine.

NOTE: For specific information about Routing Engine components (for example, the amount of DRAM installed), issue the show chassis routing-engine command.

J4300 and J6300 Boot Devices

The J4300 and J6300 Services Routers can boot from three devices:

Primary compact flash disk

Removable compact flash disk

USB drive

J4300 and J6300 Boot Sequence

Normally, the Services Router boots from the primary compact flash disk. If the compact flash disk fails, the router attempts to boot from the removable compact flash disk, which is the alternate boot device. If the removable compact flash disk is not present or fails, the router attempts to boot from the USB drive.

J4300 and J6300 Front Panel

The front panel of a J4300 or J6300 Services Router (Figure 10) allows you to view

router status LEDs, access the console port, connect to LAN ports, and perform simple control functions.

22

J4300 and J6300 Services Router Hardware Features

System Overview

Figure 10: Front Panel of J4300 and J6300

ALARM LED Configuration LED

J4300

Physical Interface Modules (PIMs)

STATUS

ALARM

POWER ON

PORT 0

CONFIG

PORT 1

CONSOLE

USB

STATUS

ESD point POWER ON

LED

Power button

CONFIG button

Console port

USB port

STATUS

PORT 0 PORT 1

PORT 0 PORT 1

IN

USE

EJECT

COMPACT FLASH

STATUS

LAN ports

IN USE

LED

Removable compact flash drive

The components of the front panel, from left to right, are described in the following sections:

ALARM LED on page 23

Power Button and POWER ON LED on page 23

CONFIG Button and Configuration LED on page 23

Console Port on page 24

J4300 and J6300 USB Port on page 24

J4300 and J6300 LAN Ports on page 24

J4300 and J6300 Removable Compact Flash Drive on page 25

ALARM LED

The

ALARM

LED on J4300 and J6300 Services Routers functions identically to the

ALARM

LED on the J2300 Services Router. See “ALARM LED” on page 11.

Power Button and POWER ON LED

The power button and

POWER ON

LED on J4300 and J6300 Services Routers function identically to the power button and

POWER ON

LED on the J2300 Services

Router. See “Power Button and POWER ON LED” on page 12.

CONFIG Button and Configuration LED

The

CONFIG button and LED on J4300 and J6300 Services Routers function identically to the

CONFIG button and configuration LED on the J2300 Services

Router. See “CONFIG Button and LED” on page 12.

J4300 and J6300 Services Router Hardware Features

23

J-series™ Services Router User Guide

Console Port

The console port on J4300 and J6300 Services Routers functions identically to the

console port on the J2300 Services Router. See “Console Port” on page 13.

J4300 and J6300 USB Port

The slot labeled

USB

on the front panel of the router (see Figure 10) accepts a USB

drive or USB drive adapter with a compact flash disk installed, as defined in the

CompactFlash Specification published by the CompactFlash Association. When the USB drive is installed and configured, it automatically acts as a secondary boot device, if the primary or removable compact flash disk fails on startup.

Depending on the size of the USB drive, you can also configure it to receive any core files generated during a failure. For information about configuring a USB

drive, see “Configuring Boot Devices with the CLI” on page 508.

NOTE: For a list of supported USB drives, see the J-series release notes at http://www.juniper.net

.

J4300 and J6300 LAN Ports

All J-series Services Routers include two fixed 10/100Base-TX Fast Ethernet ports. The LAN ports receive incoming packets from the network and transmit outgoing packets to the network. Each port is equipped with a dedicated network processor that forwards incoming data packets to the Routing Engine, and receives outgoing data packets from the Routing Engine.

The LAN ports are located on the front panel of the router (see Figure 10) and

are configured like the ports on a Physical Interface Module (PIM). The LAN ports are not field-replaceable. The ports, labeled

PORT 0 and

PORT 1

, correspond to fe-0/0/0 and fe-0/0/1 respectively, for configuration.

For pinouts of Fast Ethernet cable connectors, see “Network Cable

Specifications and Connector Pinouts” on page 551.

Each port has two LEDs located on each side of the bottom of the port.

Table 14 describes the LAN port LEDs.

Table 14: J4300 and J6300 LAN Port LEDs

Function

Link

Activity

Color

Green

Green

State

On steadily

Blinking

Off

Description

Port is online.

Port is receiving data.

Port might be on, but is not receiving data.

24

J4300 and J6300 Services Router Hardware Features

System Overview

Table 15: IN USE LED

Color

Red

J4300 and J6300 Removable Compact Flash Drive

The slot labeled

COMPACT FLASH on the front panel of the Services Router

(see Figure 10) is a removable compact flash drive that accepts a type I or

II compact flash disk, as defined in the CompactFlash Specification published by the CompactFlash Association. When the removable compact flash disk is installed and configured, it automatically acts as the secondary boot device if the primary compact flash drive fails on startup.

Depending on the capacity of the removable compact flash disk, you can also configure it to receive any core files generated during a failure.

For information about configuring a removable compact flash disk, see

“Configuring Boot Devices with the CLI” on page 508.

The

IN USE

LED indicates that the removable compact flash is being accessed.

Table 15 describes the meaning of the LED states.

State

On steadily

Description

Router has booted from the removable compact flash drive.

request system snapshot operation has been executed, and files are being copied to or from the removable compact flash drive.

Core dump of the kernel is being written to the removable compact flash drive.

savecore process is retrieving core dump information.

J4300 and J6300 Physical Interface Modules (PIMs)

Physical Interface Modules (PIMs) provide the physical connection to various network media types, receiving incoming packets from the network and

transmitting outgoing packets to the network (see Figure 11). Each PIM is equipped

with a dedicated network processor that forwards incoming data packets to the

Routing Engine, and receives outgoing data packets from the Routing Engine. During this process, the PIM performs framing and line-speed signaling for its medium type.

J4300 and J6300 Services Router Hardware Features

25

J-series™ Services Router User Guide

Figure 11: PIM

PORT 0

STATUS

PORT 1

STATUS

PIMs are removable and insertable when the router is powered off. You can install a PIM into one of the six slots in the router chassis. If a slot is not occupied by a PIM, a PIM blank panel must be installed to shield the empty slot and to allow cooling air to circulate properly through the router.

One or more cable connector ports—Accept a network media connector.

LED—Indicates port status. Table 11 describes the meaning of the LED states.

For pinouts of PIM cable connectors, see “Network Cable Specifications and Connector Pinouts” on page 551. For PIM replacement instructions,

see “Replacing a PIM” on page 518.

J4300 Power System

The J4300 Services Router uses AC power. The autosensing power supply

(see Figure 7) distributes the different output voltages to the router

components according to their voltage requirements.

The power supply is fixed in the chassis, and is not field-replaceable. It has a single AC appliance inlet that requires a dedicated AC power feed.

For information about site power preparations, see “Power Guidelines,

Requirements, and Specifications” on page 545. For information about

connecting the router to power and ground, see “Connecting Power to the Services Router” on page 43.

J6300 Power System

The J6300 Services Router uses AC power. You can install one or two autosensing, load-sharing power supplies at the bottom rear of the chassis, as shown in

Figure 8. The power supplies distribute the different output voltages to the router

components, depending on their voltage requirements. When the power supplies are installed and operational, they automatically share the electrical load.

For full redundancy, two power supplies are required. If a power supply stops functioning for any reason, the second power supply instantly begins providing all the power the router needs for normal functioning.

It can provide full power indefinitely.

26

J4300 and J6300 Services Router Hardware Features

System Overview

Each power supply has an LED located on the power supply faceplate.

Table 16 describes the J6300 power supply LED.

Table 16: J6300 Power Supply LED

State

Off

Green

Red

Description

No power flowing to the power supply.

Power supply is working correctly.

Power supply is starting up, or has failed.

For information about site power preparations, see “Power Guidelines,

Requirements, and Specifications” on page 545. For information about

connecting the router to power and ground, see “Connecting Power to the Services Router” on page 43.

Power supplies are hot-removable and hot-insertable. You can remove and replace a redundant power supply without powering down the router or disrupting the routing functions. To avoid electrical injury, carefully follow the instructions in

“Replacing Power System Components in a J6300 Router” on page 533.

J4300 and J6300 Cooling System

The cooling system consists of the following components:

A fan on the midplane

A fan on the Routing Engine’s processor

An internal fan on the power supply

The airflow produced by these fans keeps router components within the

acceptable temperature range (see Figure 12).

J4300 and J6300 Services Router Hardware Features

27

J-series™ Services Router User Guide

Figure 12: Airflow Through the J4300 and J6300 Chassis

Rear

Front

The Routing Engine monitors the temperature of the router components. If the ambient maximum temperature specification is exceeded and the router cannot be adequately cooled, the Routing Engine shuts down the hardware components.

Software Overview

Each J-series Services Router runs the JUNOS Internet software on its general-purpose processors. Designed for the large production networks typically supported by Internet service providers (ISPs), the JUNOS software includes processes for Internet Protocol (IP) routing and for managing interfaces, networks, and the router chassis.

The JUNOS Internet software runs on the Routing Engine. The Routing Engine kernel coordinates communication among the JUNOS software processes and provides a link to the Packet Forwarding Engine.

With the J-Web interface and the command-line interface (CLI) to the JUNOS software, you configure the routing protocols that run on the Services Router and set the properties of its network interfaces. After activating a software configuration, use either user interface to monitor the protocol traffic passing through the router, manage operations, and diagnose protocol and network connectivity problems.

28

Software Overview

System Overview

This section contains the following topics:

Routing Engine and Packet Forwarding Engine on page 29

Kernel and Microkernel on page 29

Processes on page 29

User Interfaces on page 31

Routing Engine and Packet Forwarding Engine

A Services Router has two primary software processing components:

Routing Engine—Creates and maintains the routing tables that determine how packets are routed through the network.

Packet Forwarding Engine—Processes packets; applies filters, routing policies, and other features; and forwards packets to the next hop along the route to their final destination.

For information about Routing Engine hardware, see “J2300 Routing Engine”

on page 10 and “J4300 and J6300 Routing Engine” on page 21.

Kernel and Microkernel

The Routing Engine kernel provides the underlying infrastructure for all

JUNOS software processes by doing the following:

Linking the routing tables maintained by the routing protocol process with the forwarding table maintained by the Routing Engine.

Coordinating communication with the Packet Forwarding Engine, primarily by synchronizing the Packet Forwarding Engine’s forwarding table with the master forwarding table maintained by the Routing Engine.

The microkernel contains device drivers and processes that the Packet Forwarding

Engine uses to govern the flow of packets through the Services Router.

Processes

The JUNOS software running on the Routing Engine and Packet Forwarding Engine consists of multiple processes that are responsible for individual Services Router functions.

The separation of functions provides operational stability, because each process accesses its own protected memory space. In addition, because each process is a separate software package, you can selectively upgrade all or part of the JUNOS software, for added flexibility.

The following processes are primary:

Software Overview

29

J-series™ Services Router User Guide

Management Process on page 30

Chassis Process on page 30

Routing Protocols Process on page 30

Interface Process on page 31

Forwarding Process on page 31

Management Process

The JUNOS management process (mgd) manages the Services

Router system as follows:

Provides communication between the other processes and an interface to the configuration database

Populates the configuration database with configuration information and retrieves the information when queried by other processes to ensure that the system operates as configured

Interacts with the other processes when commands are issued through one of the user interfaces on the router

Chassis Process

The JUNOS chassis process (chassisd) controls a Services Router chassis and its components as follows:

Detects hardware on the system that is used to configure network interfaces with the J-Web user interface

Monitors the physical status of hardware components and field-replaceable units (FRUs), detecting when environment sensors such as temperature sensors are triggered

Relays signals and interrupts—for example, when devices are taken offline, so that the system can close sessions and shut down gracefully

Routing Protocols Process

The Services Router forwards packets through a network by means of the routing protocols it uses and the routing and forwarding tables it maintains. By selecting routes and maintaining forwarding tables, the JUNOS routing protocols process (rpd) defines how routing protocols such as RIP, OSPF, and BGP operate on the router.

30

Software Overview

System Overview

Interface Process

The JUNOS interface process (ifd) supplies the programs that configure and monitor network interfaces by defining physical characteristics such as link encapsulation, hold times, and keepalive timers.

Forwarding Process

The JUNOS forwarding process ( fwdd

) is responsible for most of the packet transmission through a Services Router. The overall performance of the router is largely determined by the effectiveness of the forwarding process.

User Interfaces

The user interfaces on a Services Router interact with the management process to execute commands and store and retrieve information from the configuration database. The user interfaces operate as clients that communicate with the JUNOS

Internet software through an application programming interface (API).

The following primary user interfaces are shipped with the router:

J-Web graphical user interface—Includes quick configuration capabilities for performing the minimum required steps to enable a feature, plus a built-in configuration editor with access to the entire configuration hierarchy to fully configure the router. The J-Web interface also provides tools for monitoring, managing, and diagnosing router operation.

Command-line interface (CLI)—Grants access to the complete JUNOS command and configuration hierarchies, to monitor and diagnose the router and configure it completely.

For more information, see “J-series User Interface Overview” on page 109.

Other user interfaces for the Services Router interact with the management process through the common API interface. These interfaces are designed to facilitate the configuration of one or, in some cases, many routers on the network.

Among the supported interfaces are the JUNOScope and Service Deployment

System (SDX) applications. For more information about these products, see the

JUNOScope Software User Guide and the SDX Software Basics Guide.

Software Overview

31

J-series™ Services Router User Guide

32

Software Overview

Part 2

Installing the J-series Services Router

Installing and Connecting a Services Router on page 35

Establishing Basic Connectivity on page 47

Managing J-series Licenses on page 69

Configuring Network Interfaces on page 79

Installing the J-series Services Router 33

34

Installing the J-series Services Router

Chapter 3

Installing and Connecting a Services

Router

Make the appropriate preparations and verify the J-series equipment before installing a J-series Services Router and connecting it to a power source and the network.

This chapter contains the following topics:

Before You Begin on page 35

Unpacking the J-series Services Router on page 36

Installing the J2300 Services Router on page 37

Installing the J4300 or J6300 Services Router on page 40

Connecting Interface Cables to the Services Router on page 42

Chassis Grounding on page 42

Connecting Power to the Services Router on page 43

Powering a Services Router On and Off on page 44

Before You Begin

Before you begin installation, complete the following tasks:

Read the information in “Maintenance and Operational Safety Guidelines

and Warnings” on page 588, with particular attention to “Chassis Lifting

Guidelines” on page 577.

Determine where to install the Services Router, and verify that the rack or

installation site meets the requirements described in “Preparing for Router

Installation” on page 541.

For installation, gather the equipment and tools listed in Table 17.

Before You Begin

35

J-series™ Services Router User Guide

Table 17: Equipment and Tools Required for Services Router Installation

Desk Installation—J2300

Services Router Only

Rubber feet (provided)

Wall Installation—J2300 Services

Router Only

Rubber feet (provided)

Mounting brackets and screws

(provided)

Number 2 Phillips screwdriver

Four wall screws or four mounting screws and anchors capable of supporting the full weight of the chassis, up to

12 lb (5.4 kg)

Rack Installation

Mounting brackets and screws

(provided)

Number 2 Phillips screwdriver

Four (J2300) or eight (J4300 and J6300) mounting screws appropriate for your rack

To connect the router to power and ground, have ready a 14 AWG grounding

cable and lug, as specified in “Chassis Grounding” on page 42, and the power

cord or cords shipped with the router.

To connect network interfaces, have ready a length of cable used by the

interface, as specified in “Network Cable Specifications and Connector

Pinouts” on page 551.

Unpacking the J-series Services Router

The Services Router is shipped in a cardboard carton and secured with foam packing material. The carton also contains an accessory box and quick start instructions.

NOTE: The router is maximally protected inside the shipping carton. Do not unpack it until you are ready to begin installation.

To unpack the router:

1.

2.

Move the shipping carton to a staging area as close to the installation site as possible, but where you have enough room to remove the router.

Position the carton so that the arrows are pointing up.

3.

4.

5.

Open the top flaps on the shipping carton.

Remove the accessory box, and verify the contents against the parts inventory on the label attached to the carton.

Pull out the packing material holding the router in place.

6.

Verify the contents of the carton against the packing list included with the

router. A generic parts inventory appears in Table 18.

36

Unpacking the J-series Services Router

Installing and Connecting a Services Router

7.

Save the shipping carton and packing materials in case you later need to move or ship the router.

Table 18: Generic Inventory of Services Router Shipping Carton

Component

Chassis

Physical Interface Module

(PIM)

J2300 Services Router

1

2 Fast Ethernet ports and 1 of the following interfaces:

2-port E1

2-port Serial

Power supply

Mounting brackets

Blank panels for slots without components

2-port T1

2

0

NOTE:

The interfaces installed in the J2300

Services Router are not field-replaceable. For more

information, see “J2300

Physical Interface Module

(PIM)” on page 13.

1 (fixed)

J4300 Services Router

1

J6300 Services Router

1

Between 0 and 6 of the following in any combination:

1-port DS3 (T3) PIM

2-port E1 PIM

2-port Fast Ethernet PIM

2-port Serial PIM

2-port T1 PIM

1 (fixed)

2 (fixed)

Depends on router configuration

1 or 2

2 (fixed)

Depends on router configuration

Installing the J2300 Services Router

You can install the J2300 Services Router on a desk, on a wall, or in a rack. The

J2300 Services Router includes mounting brackets that support either wall or rack mounting, and rubber feet for desk and wall mounting.

Install the J2300 Services Router as appropriate for your site, with one of the following procedures:

Installing the J2300 Services Router on a Desk on page 37

Installing the J2300 Services Router on a Wall on page 38

Installing the J2300 Services Router into a Rack on page 39

Installing the J2300 Services Router on a Desk

You can install the J2300 Services Router on a desk, table, or other level surface.

The router is shipped with rubber feet in the accessory box. The rubber feet are necessary to stabilize the router on the desk.

Installing the J2300 Services Router

37

J-series™ Services Router User Guide

To install the J2300 router on a desk:

1.

Turn the chassis upside-down on the desk or work surface where you intend to operate the router.

2.

3.

Attach the provided rubber feet to the bottom of the chassis, as shown in

Figure 13.

Turn the chassis right-side up on the desk or work surface.

Figure 13: Attaching Rubber Feet to the J2300 Services Router

J2300

CONSOLE

USB

PORT0

PORT1

STATUS

PORT2

SYNC

SERIAL PORT3

STATUS

Rubber feet

Installing the J2300 Services Router on a Wall

You can install the J2300 Services Router on a wall. The router is shipped with mounting brackets and rubber feet in the accessory box. The rubber feet help stabilize the router on the wall and enhance airflow.

To install the J2300 router on a wall:

1.

2.

Turn the chassis upside-down on a desk or work surface near where you intend to operate the router.

Attach the provided rubber feet to the bottom of the chassis, as shown in

Figure 13.

4.

5.

3.

6.

Turn the chassis right-side up, and place it on a flat surface.

Position a mounting bracket on each side of the chassis as shown in Figure 14.

Use a number 2 Phillips screwdriver to install the screws that secure the mounting brackets to the chassis.

If you are using wall anchors to support the chassis, install two pairs of anchors on the wall, spaced 19 in. (48.3 cm) apart.

38

Installing the J2300 Services Router

Installing and Connecting a Services Router

CAUTION: Mounting screws and wall anchors must be strong enough to support the full weight of the chassis, up to 12 lb (5.4 kg). Attaching the router to wall studs or using wall anchors provides extra support for the chassis.

7.

8.

9.

Have one person grasp the sides of the router, lift the router, and position it on the wall.

Have a second person install two pairs of mounting screws through the bracket holes on either side of the router, to secure the router to the wall.

Verify that the mounting screws on one side are aligned with the mounting screws on the opposite side and that the router is level.

Figure 14: Attaching Mounting Brackets to Install a J2300 Services Router on a Wall

J2300

CONSOLE

USB

PORT0

PORT1

STATUS

PORT2

SYNC

SERIAL PORT3

STATUS

Installing the J2300 Services Router into a Rack

You can front-mount the J2300 Services Router in a rack. The router is shipped with mounting brackets in the accessory box. Many types of racks are acceptable, including four-post (telco) racks, enclosed cabinets, and open-frame racks.

For more information about the type of rack or cabinet the J-series router

can be installed into, see “Rack Requirements” on page 542.

NOTE: If you are installing multiple routers in one rack, install the lowest one first and proceed upward in the rack.

CAUTION: The chassis weighs up to 12 lb (5.4 kg). Installing it into the rack requires one person to lift and a second person to secure the mounting screws.

To install the J2300 router into a rack:

1.

Position a mounting bracket on each side of the chassis as shown in Figure 15.

Installing the J2300 Services Router

39

J-series™ Services Router User Guide

2.

3.

4.

5.

6.

Use a number 2 Phillips screwdriver to install the screws that secure the mounting brackets to the chassis.

Have one person grasp the sides of the router, lift the router, and position it in the rack.

Align the bottom hole in each mounting bracket with a hole in each rack rail, making sure the chassis is level.

Have a second person install a mounting screw into each of the two aligned holes. Use a number 2 Phillips screwdriver to tighten the screws.

Install the second screw in each mounting bracket.

7.

Verify that the mounting screws on one side of the rack are aligned with the mounting screws on the opposite side and that the router is level.

Figure 15: Attaching Mounting Brackets to Install a J2300 Services Router in a Rack

J2300

CONSOLE

USB

PORT0

PORT1

STATUS

PORT2

SYNC

SERIAL

PORT3

STATUS

Installing the J4300 or J6300 Services Router

You can front-mount the J4300 Services Router or J6300 Services Router in a rack.

The router is shipped with mounting brackets installed. Many types of racks are acceptable, including four-post (telco) racks, enclosed cabinets, and open-frame racks. For more information about the type of rack or cabinet the J-series router

can be installed into, see “Rack Requirements” on page 542.

NOTE: If you are installing multiple routers in one rack, install the lowest one first and proceed upward in the rack.

CAUTION: The chassis weighs between 18 lb (8.2 kg) and 24 lb (10.9 kg). Installing it into the rack requires one person to lift and a second person to secure the mounting screws.

To install the J4300 router or J6300 router into a rack:

40

Installing the J4300 or J6300 Services Router

Installing and Connecting a Services Router

4.

5.

1.

2.

3.

Have one person grasp the sides of the router, lift the router, and position it in the rack.

Align the bottom hole in each mounting bracket with a hole in each rack rail as

shown in Figure 16, making sure the chassis is level.

Have a second person install a mounting screw into each of the two aligned holes. Use a number 2 Phillips screwdriver to tighten the screws.

Install the remaining screws in each mounting bracket.

Verify that the mounting screws on one side of the rack are aligned with the mounting screws on the opposite side and that the router is level.

Figure 16: Installing the J4300 or J6300 Services Router

Center-mounting rack

Chassis rack-mounting bracket

Installing the J4300 or J6300 Services Router

41

J-series™ Services Router User Guide

Connecting Interface Cables to the Services Router

You connect the interfaces installed in the Services Router to various network media. For more information about the network interfaces supported on the

router, see “Configuring Network Interfaces” on page 79.

1.

2.

Have ready a length of the type of cable used by the interface, as specified in

“Network Cable Specifications and Connector Pinouts” on page 551.

Insert the cable connector into the cable connector port on the interface faceplate.

3.

Arrange the cable as follows to prevent it from dislodging or developing stress points: a.

Secure the cable so that it is not supporting its own weight as it hangs to the floor.

b.

Place excess cable out of the way in a neatly coiled loop.

c.

Place fasteners on the loop to help maintain its shape.

Chassis Grounding

To meet safety and electromagnetic interference (EMI) requirements and to ensure proper operation, the Services Router must be adequately grounded before power is connected. In addition to the grounding pin on the power plug cord, a threaded insert (PEM nut), screw, and washer are provided on the rear of the chassis to connect the router to earth ground.

CAUTION: Before router installation begins, a licensed electrician must attach a cable lug to the grounding cable that you supply. A cable with an incorrectly attached lug can damage the router (for example, by causing a short circuit).

The grounding cable must be 14 AWG single-strand wire cable, and must be able to handle the following amperage:

J2300 router—up to 4 A

J4300 router and J6300 router—up to 6 A

The grounding lug must be a ring-type, vinyl-insulated TV14–10R lug, or equivalent, to accommodate the 14 AWG cable.

To ground the router before connecting power, you connect the grounding cable to earth ground and then attach the lug on the cable to the chassis grounding point,

with the screw. (See “Connecting Power to the Services Router” on page 43.)

42

Chassis Grounding

Installing and Connecting a Services Router

Connecting Power to the Services Router

J2300 and J4300 Services Routers have a single fixed power supply. The J6300

Services Router has one or two field-replaceable power supplies. For more

information about the J-series power specifications, see “Power Guidelines,

Requirements, and Specifications” on page 545.

The AC power cord shipped with the router connects the router to earth ground when plugged into an AC grounding-type power outlet. The router must be connected to earth ground during normal operation.

To connect power to the router:

1.

2.

3.

4.

5.

Locate the power cord or cords shipped with the router, which has a plug appropriate for your geographical location. For power cord specifications, see

“Power Guidelines, Requirements, and Specifications” on page 545.

Attach an electrostatic discharge (ESD) grounding strap to your bare wrist, and connect the strip to the ESD point on the chassis. For more information about

ESD, see “Preventing Electrostatic Discharge Damage” on page 567.

Use a grounding cable to connect the router to earth ground: (For cable

requirements, see “Chassis Grounding” on page 42.)

a.

Verify that a licensed electrician has attached an appropriate grounding cable lug to the grounding cable.

b.

Connect one end of the grounding cable to a proper earth ground, such as the rack in which the router is installed.

c.

With a Phillips screwdriver, remove the screw and washer from the PEM nut at the grounding point on the rear of the chassis.

d.

Place the grounding lug at the other end of the cable over the grounding

point, as shown in Figure 17, Figure 18, and Figure 19.

e.

Secure the cable lug to the grounding point, first with the washer, then with the screw.

For each power supply: a.

Insert the appliance coupler end of a power cord into the appliance inlet on

the power supply faceplate, as shown in Figure 17, Figure 18, and Figure 19.

b.

Insert the plug into an AC power source receptacle.

Verify that the power cord does not block access to router components or drape where people can trip on it.

Connecting Power to the Services Router

43

J-series™ Services Router User Guide

Figure 17: Connecting Power to the J2300 Services Router

To ground

Washer

Grounding lug

Figure 18: Connecting Power to the J4300 Services Router

To ground

Washer

Grounding lug

Figure 19: Connecting Power to the J6300 Services Router

To ground

Washer

Grounding lug

Powering a Services Router On and Off

To power on a Services Router, press the power button. The Routing Engine boots as the power supply completes its startup sequence. The

POWER ON

LED lights during startup and remains on steadily when the router is operating normally.

44

Powering a Services Router On and Off

Installing and Connecting a Services Router

To power off a Services Router, do one of the following:

Press and release the power button. The router begins gracefully shutting down the operating system and then powers itself off.

Press the power button and hold it for more than 5 seconds. The router immediately powers itself off without shutting down the operating system.

To remove power completely from the router, unplug the power cord. The power button on the Services Router is a standby power switch. If the router is connected to an AC power source receptacle when you press the power button to power the router off, the router remains in standby mode and a small amount

(5 V and 3.3 V) of standby voltage is still available in the chassis.

Powering a Services Router On and Off

45

J-series™ Services Router User Guide

46

Powering a Services Router On and Off

Chapter 4

Establishing Basic Connectivity

The JUNOS software is preinstalled on the Services Router. When the router is powered on, it is ready to be configured. If the router does not have a configuration from the factory or your service provider, you must configure the software to establish basic connectivity.

If you are setting up a Services Router for the first time, you can use either J-Web

Quick Configuration or the JUNOS CLI configuration editor to configure basic connectivity.

If you are setting up many Services Routers, autoinstallation can help automate the installation process.

This chapter contains the following topics. For more information about basic connectivity, see the JUNOS System Basics Configuration Guide.

Basic Connectivity Terms on page 47

Basic Connectivity Overview on page 48

Before You Begin on page 53

Configuring the Services Router with J-Web Quick Configuration on page 53

Configuring the Services Router with a Configuration Editor on page 58

Configuring Autoinstallation on page 65

Verifying Basic Connectivity on page 67

Basic Connectivity Terms

Before configuring basic connectivity, become familiar with the

terms defined in Table 19.

Basic Connectivity Terms

47

J-series™ Services Router User Guide

Table 19: Basic Connectivity Terms

Term

domain name

Dynamic Host Configuration Protocol (DHCP) gateway hostname loopback address

Network Time Protocol (NTP) root user secure shell (SSH) telnet

Definition

Name that identifies the network or subnetwork a router belongs to.

Protocol for assigning dynamic IP addresses to devices on a network.

Packets destined for IP addresses not identified in the routing table are sent to the default gateway.

Unique name that identifies a router on the network.

IP address of a Services Router on logical interface lo0.0 that is always active and available to external hosts and as the source address for outgoing packets.

Protocol that provides a reliable way of synchronizing the system time of a router.

A superuser or system administrator who can perform any task in the file system.

Software that provides a secured method of logging in to a remote network system.

Software that allows a computer to act as a remote terminal on a network system.

Basic Connectivity Overview

To connect your Services Router to the network and establish basic connectivity, you enter information about your network. This overview includes the following topics:

Router Identification on page 49

Root Password on page 49

Time Zone and System Time on page 49

Network Settings on page 49

Default Gateway on page 50

Backup Router on page 50

Loopback Address on page 50

Management Interface Address on page 50

Management Access on page 51

48

Basic Connectivity Overview

Establishing Basic Connectivity

Router Identification

The domain name defines the network or subnetwork that the Services Router belongs to. The hostname refers to the specific machine, while the domain name is shared among all the devices in a given network. Together the hostname and domain name identify the router in the network.

Root Password

The root user has complete privileges to configure the Services Router, and manage files in the router’s file system. Initially, the root password is not defined on the router. To ensure basic security, you must define the root password during initial configuration. If you use a plain-text password, the router displays the password as a encrypted string so that users viewing the configuration cannot easily see the password.

The root password must meet the following conditions:

The password must be at least 6 characters long.

You can include most character classes in a password (alphabetic, numeric, and special characters), except control characters.

Valid passwords must contain at least one change of case or character class.

Time Zone and System Time

You define the time zone for the location where you plan to operate the Services Router by using a designation that consists of the following information for the location:

Name of the continent or ocean—For example,

America or

Atlantic

Name of the major city or other geographic feature in the time zone—For example,

Detroit or

Azores

A Network Time Protocol (NTP) server provides accurate time across a network.

The router synchronizes the system time with the NTP server, and periodically accesses the NTP server to maintain the correct time.

The time zone and system time must be accurate so that the router schedules events and operations as expected.

Network Settings

A Domain Name System (DNS) server on the network maintains a database for resolving hostnames and IP addresses. Network devices can query the DNS server by hostnames rather than IP addresses. The router accesses the DNS servers that are added to the configuration to resolve hostnames in the order in which you list them.

Basic Connectivity Overview

49

J-series™ Services Router User Guide

Default Gateway

A default gateway is a static route that is used to direct packets addressed to networks not explicitly listed in the router’s routing table. If a packet arrives at the Services Router with an address that the router does not have routing information for, the router sends the packet to the default gateway. The default gateway entry is always present in the routing and forwarding tables.

Backup Router

If you plan to include your router in several domains, you can add these domains to the configuration so that they are included in a DNS search. When DNS searches are requested, the domain suffixes are appended to the hostnames.

You can specify a backup router to take over when the Services Router’s routing protocol process is not running, usually when the Services Router is booting, or if its routing protocol process has failed. Packets arriving at a

Services Router in this situation are routed to the backup router. When the routing protocol process starts up again, the address of the backup router is removed from the Services Router’s routing and forwarding tables. The backup router must be located on the same subnet.

NOTE: To configure a backup router, you must use the CLI or J-Web configuration editor. You cannot configure a backup router with J-Web Quick Configuration.

Loopback Address

The loopback address is the IP address of the Services Router itself. The loopback address ensures that the Services Router provides an IP address to management applications. Because it must always be available to hosts attempting to route packets to the Services Router, the loopback address resides on an interface that is always active, known as the loopback interface ( lo0.0

). Setting a loopback address ensures that the Services Router can receive packets addressed to the loopback address as long as the router is reachable though any ingress interface.

In addition, applications such as NTP, RADIUS, and TACACS+ can use the loopback address as the source address for outgoing packets.

If you use the J-Web Set Up Quick Configuration page, you can either set a loopback address of your choice or have the loopback address automatically set to

127.0.0.1

when you click Apply or OK to commit the configuration.

Management Interface Address

The Fast Ethernet interface fe-0/0/0

, labeled

PORT 0 on the front panel of the

Services Router, is the network interface through which you perform initial router setup. After the router is initially configured, you can attach fe-0/0/0 to the management network for use as a management interface.

50

Basic Connectivity Overview

Establishing Basic Connectivity

Before Initial Configuration

Before initial configuration, when the factory default configuration is active:

1.

The Services Router attempts to perform autoinstallation by obtaining a router configuration through all its connected interfaces, including fe-0/0/0

. The

Services Router acts as a DHCP client out the fe-0/0/0 interface.

2.

If the Services Router does not find a DHCP server within a few seconds, it sets the address of fe-0/0/0 to

192.168.1.1/24 and becomes a DHCP server out the fe-0/0/0 interface.

With the router temporarily acting as a DHCP server, you can manually configure it with the J-Web interface. Any DHCP client host (a PC or laptop computer, for example) directly connected to fe-0/0/0 receives an address on the

192.168.1.1/24 network.

During Initial Configuration

Once you connect your laptop or PC to fe-0/0/0

, you can use a Web browser to visit the address

192.168.1.1/24

, access the J-Web Set Up Quick

Configuration page, and initially configure the router.

After Initial Configuration

After you perform the initial configuration and commit it by clicking Apply or OK on the Set Up page, the configured router can no longer act as a

DHCP server. You can do either of the following:

Continue to use the J-Web Quick Configuration and leave the IP address and prefix length as

192.168.1.1/24

. You can continue configuring the router until the DHCP lease expires, or the physical connection is lost because the cable is disconnected or the router is rebooted.

Change the IP address and prefix length. You lose access to the router until you either adjust the IP address of the management device to be on the same subnetwork as the router, or connect to the router through the console port.

Management Access

Telnet allows you to connect to the Services Router and access the CLI to execute commands from a remote system. Telnet connections are not encrypted and therefore can be intercepted.

Telnet access to the root user is prohibited. You must use more secure methods, such as SSH, to log in as root

.

If you are using a JUNOScript server to configure and monitor routers, you can activate clear-text access on the router to allow unencrypted text to be sent directly over a TCP connection without using any additional protocol (such as

Basic Connectivity Overview

51

J-series™ Services Router User Guide

SSH, SSL, or telnet). Information sent in clear-text is not encrypted and therefore can be intercepted. For more information about the JUNOScript application programming interface (API), see the JUNOScript API Guide

SSH also allows you to connect to the router and access the CLI to execute commands from a remote system. However, unlike telnet, SSH encrypts the password so that it cannot be intercepted.

SSH connections are authenticated by a digital certificate. SSH uses public-private key technology for both connection and authentication. The SSH client software must be installed on the machine where the client application runs. If the SSH private key is encrypted (for greater security), the SSH client must be able to access the passphrase used to decrypt the key. For information about obtaining

SSH software, see http://www.ssh.com

and http://www.openssh.com

.

52

Basic Connectivity Overview

Establishing Basic Connectivity

Before You Begin

Before you begin initial configuration, complete the following tasks:

Install the Services Router in its permanent location, as described in “Installing and Connecting a Services Router” on page 35.

Gather the following information:

Hostname for the router on the network

Domain that the router belongs to on the network

Password for the root user

Time zone where the router is located

IP address of an NTP server (if NTP is used to set the time on the router)

IP address of a DNS server

List of domains that can be appended to hostnames for DNS resolution

IP address of the default gateway

IP address to be used for the loopback interface

IP address of the fe-0/0/0 interface

If you are performing the initial configuration with the J-Web interface, collect the following equipment:

A management device, such as a laptop, with an Ethernet port

An Ethernet cable

If you are performing the initial configuration with the CLI, collect the following equipment:

A management device, such as a PC or laptop, with a serial port and an asynchronous terminal application (such as Microsoft Windows

Hyperterminal)

An RJ-45 to DB-9 serial port adapter (provided)

A rollover Ethernet cable (provided)

Configuring the Services Router with J-Web Quick Configuration

If you plan to use the J-Web interface to configure the Services Router, you must connect through

LAN PORT 0

, as shown in Figure 20 and Figure 21.

Configuring the Services Router with J-Web Quick Configuration

53

J-series™ Services Router User Guide

Before you configure the router, gather the information described in “Before You

Begin” on page 53.

To configure the router with J-Web Quick Configuration, perform the following procedures:

Connecting to the J-Web Interface on page 54

Configuring Basic Settings with Quick Configuration on page 55

Connecting to the J-Web Interface

When the Services Router is powered on for the first time, if no configuration is present, the fe-0/0/0 interface on

LAN PORT 0 acts as a DHCP server and assigns an

IP address within the

192.168.1/24 subnetwork to any devices connected to it.

To connect to the J-Web interface using

LAN PORT 0 on the router

(see Figure 20 and Figure 21):

1.

On the management device, such as a PC or laptop, that you will use to access the J-Web interface, verify that the address of the port that you connect to the router is set to one of the following:

An Ethernet address other than

192.168.1.1

on the

192.168.1/24 subnetwork

An Ethernet address from a DHCP server

2.

3.

4.

Turn off the power to the management device.

Plug one end of the Ethernet cable into the Ethernet port on the management device.

Connect the other end of the Ethernet cable to

LAN PORT 0 on the router.

5.

6.

7.

Power on the router by pressing the power button on the front panel. Verify that the

POWER ON

LED on the front panel turns green.

Turn on the power to the management device. The router assigns an IP address to the management device within the

192.168.1/24 subnetwork if the device is configured to use DHCP.

From the management device, open a Web browser and enter the IP address

192.168.1.1

in the address field. The Set Up Quick Configuration page appears.

54

Configuring the Services Router with J-Web Quick Configuration

Establishing Basic Connectivity

Figure 20: Connecting to the Fast Ethernet Port on the J2300 Services Router

Ethernet port

J2300

CONSOL

E

USB

PORT0

PORT1

STATUS

PORT2

SYNC

SERIAL

PORT3

STATUS

Ethernet port

RJ-45 cable

Figure 21: Connecting to the Fast Ethernet Port on the J4300 or J6300 Services Router

Ethernet port

J4300

ALAR

M

POWE

R ON

PORT

0

CONF

IG

PORT

1

STATUS

CONS

OLE

USB

PORT

0

PORT

1

EJECT

IN

USE

COMP

ACT F

LASH

Ethernet port

RJ-45 cable

Configuring Basic Settings with Quick Configuration

To configure basic settings in the J-Web interface:

Configuring the Services Router with J-Web Quick Configuration

55

J-series™ Services Router User Guide

1.

2.

Enter information into the fields described in Table 20 on the Set Up Quick

Configuration page.

Click one of the following buttons:

To apply the configuration and stay in the Set Up Quick Configuration page, click Apply.

To apply the configuration and return to the Quick Configuration page, click OK.

To cancel your entries and return to the Quick Configuration page, click Cancel.

NOTE: Once initial configuration is complete, the Services Router stops functioning as a DHCP server. If you change the IP address of fe-0/0/0 and have the management device configured to use DHCP, you lose your DHCP lease and your connection to the router through the J-Web interface. To reestablish a connection, either set the IP address on the management device manually, or connect fe-0/0/0 to the management network and access the router another way—for example, through the console port.

3.

To check the configuration, see “Displaying Basic Connectivity Configurations” on page 67.

Table 20: Set Up Quick Configuration Field Descriptions

Function Field

Identification

Host Name (required)

Domain Name

Root Password (required)

Verify Root Password (required)

Your Action

Defines the hostname of the router.

Defines the network or subnetwork that the machine belongs to.

Sets the root password that user “root” can use to log in to the router.

Verifies the root password has been typed correctly.

Type the hostname.

Type the domain name.

Type a plain-text password that the system encrypts.

NOTE:

After a root password has been defined, it is required when you log in to the J-Web user interface or the CLI.

Retype the password.

Time

Time Zone

Identifies the time zone that the router is located in.

From the drop-down list, select the appropriate time zone.

56

Configuring the Services Router with J-Web Quick Configuration

Field

NTP Servers

Current System Time

Network

DNS Name Servers

Domain Search

Default Gateway

Loopback Address

Establishing Basic Connectivity

Function

Specify an NTP server that the router can reach to synchronize the system time.

Synchronizes the system time with the

NTP server, or manually set the system time and date.

Your Action

To add an IP address, type it in the box to the left of the Add button, then click

Add.

To delete an IP address, click on it in the box above the Add button, then click

Delete.

To immediately set the time using the NTP server, click Set

Time via NTP. The router sends a request to the NTP server and synchronizes the system time.

NOTE:

If you are configuring other settings on this page, the router also synchronizes the system time using the

NTP server when you click Apply or OK.

To set the time manually, click

Set Time Manually. A pop-up window allows you to select the current date and time from drop-down lists.

Specify a DNS server that the router can use to resolve hostnames into addresses.

To add an IP address, type it in the box to the left of the Add button, then click

Add.

Adds each domain name that the router is included in to the configuration so that they are included in a DNS search.

To delete an IP address, click on it in the box above the Add button, then click

Delete.

To add a domain name, type it in the box to the left of the Add button, then click Add.

To delete a domain name, click on it in the box above the Add button, then click Delete.

Type a 32-bit IP address, in dotted decimal notation.

Defines a default gateway through which to direct packets addressed to networks not explicitly listed in the routing table.

Defines a reserved IP address that is always available on the router. If no address is entered, this address is set to 127.0.0.1/32.

Type a 32-bit IP address and prefix length, in dotted decimal notation.

Configuring the Services Router with J-Web Quick Configuration

57

J-series™ Services Router User Guide

Field fe-0/0/0 Address

Function

Defines the IP address and prefix length of fe-0/0/0. The interface fe-0/0/0 is typically used as the management interface for accessing the router. By default this address is set to

192.168.1.1/24.

Your Action

Type a 32-bit IP address and prefix length, in dotted decimal notation.

NOTE:

If you change the fe-0/0/0 address, you will lose your connection to the J-Web interface when you click

Apply or OK. If you need to change this address but want to continue using the

J-Web interface after applying the initial configuration, set the IP address on the management device manually.

Management Access

Allow Telnet Access

Allow JUNOScript over Clear-Text Access Allows JUNOScript to access the router using a protocol for sending unencrypted text over a TCP connection.

Allow SSH Access

Allows remote access to the router using telnet.

Allows remote access to the router using

SSH.

To enable telnet access, select the check box.

To enable JUNOScript access over clear-text, select the check box.

To enable SSH access, select the check box.

Configuring the Services Router with a Configuration Editor

If you plan to use the CLI to configure the router, you must connect through the

CONSOLE

port, as shown in Figure 22 and Figure 23.

You can configure basic settings in the J-Web interface from a device attached to the fe-0/0/0 on

LAN PORT 0

. For instructions, see “Connecting to the J-Web Interface” on page 54.

Before you configure the router, gather the information described in “Before You

Begin” on page 53

This section contains the following topics:

Connecting to the CLI on page 58

Configuring Basic Settings with a Configuration Editor on page 60

Connecting to the CLI

To connect to the CLI using the console port on the router:

1.

Turn off the power to the management device, such as a PC or laptop computer, that you are using to access the CLI.

2.

Plug one end of an Ethernet rollover cable into the RJ-45 to DB-9 serial port

adapter (see Figure 22 and Figure 23).

58

Configuring the Services Router with a Configuration Editor

Establishing Basic Connectivity

NOTE: The Ethernet rollover cable and RJ-45 to DB-9 serial port adapter are provided in the router’s accessory box.

3.

Plug the RJ-45 to DB-9 serial port adapter into the serial port on the

management device (see Figure 22 and Figure 23).

5.

6.

4.

7.

Connect the other end of the Ethernet rollover cable to the console port on the

router (see Figure 22 and Figure 23).

Turn on the power to the management device.

Start your asynchronous terminal emulation application (such as Microsoft

Windows Hyperterminal) and select the appropriate

COM port to use (for example,

COM1

).

Configure the port settings as follows:

Bits per second: 9600

Data bits: 8

Parity: None

Stop bits: 1

Flow control: None

8.

Power on the router by pressing the power button on the front panel. Verify that the

POWER ON

LED on the front panel turns green.

9.

The terminal emulation screen on your management device displays the boot sequence. When the router has finished booting, a login prompt appears.

Log in as the user “root”. There is no password.

Configuring the Services Router with a Configuration Editor

59

J-series™ Services Router User Guide

Figure 22: Connecting to the Console Port on the J2300 Services Router

Serial port

Adapter

J2300

CONSOL

E

USB

PORT0

PORT1

STATUS

PORT2

SYNC

SERIAL PORT3

STATUS

Console port

RJ-45 rollover cable

Figure 23: Connecting to the Console Port on the J4300 or J6300 Services Router

Serial port

Adapter

J4300

EJECT

IN

USE COMP

ACT F

LASH

ALAR

POWE

M

R ON

PORT

0

STATU

S

CONF

IG

CONS

OLE

USB

STATUS

PORT

0

PORT

1

Console port

RJ-45 rollover cable

Configuring Basic Settings with a Configuration Editor

To establish basic connectivity on a Services Router, you identify the router, connect the router to the network, and specify basic network settings.

60

Configuring the Services Router with a Configuration Editor

Establishing Basic Connectivity

In a typical network, the Services Router has the basic settings listed in Table 21.

Determine the values to set on the Services Router in your network.

Table 21: Sample Settings on a Services Router

Services Router Property Value

Services Router hostname

Access for user “root”

IP address of the NTP server used to synchronize system time on the Services Router

Services Router location

SSH RSA public key

10.148.2.21

Sunnyvale, California, USA, which is in the

America/Los_Angeles time zone

IP address of the DNS server to which DNS requests are sent 10.148.2.32

Domains to which the Services Router belongs lab.router.net and router.net

192.168.2.44

IP address of a backup router to use while the Services Router is booting or if the routing protocol processes fail to start

Loopback IP address and prefix length for the Services Router lo0 interface

IP address and prefix length for the Services Router fe-0/0/0 interface routera

172.16.1.24/32

192.168.2.24/24

To use a configuration editor to configure basic settings:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

2.

3.

4.

To configure basic settings, perform the configuration tasks described in

Table 22.

If you are using the J-Web interface, click Commit to view a summary of your changes, then click OK to commit the configuration. If you are using the CLI, commit the configuration by entering the commit command.

To check the configuration, see “Displaying Basic Connectivity Configurations” on page 67.

Configuring the Services Router with a Configuration Editor

61

J-series™ Services Router User Guide

Table 22: Configuring Basic Settings

Task

Navigate to the System level in the configuration hierarchy.

Define the hostname of the router.

Name the domain in which the router is located.

Allow SSH remote access.

Define root authentication for access to the router.

NOTE:

For readability, the entire key is not shown.

Define the time zone the router is located in.

J-Web Interface Configuration

Editor

1.

In the configuration editor hierarchy, select

Configuration>View and

Edit> Edit Configuration.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit system.

2.

Next to System, click Configure or

Edit.

In the Host name box, type the router’s hostname—for example, routera.

Set the hostname. For example:

In the Domain name box, type the router’s domain name—for example, lab.router.net.

1.

In the Nested configuration section, next to Services, click Configure or Edit.

set host-name routera

Set the domain name. For example: set domain-name lab.router.net

Set remote access for SSH: set services ssh

2.

Next to Ssh, click Configure or

Edit.

3.

Click OK.

4.

Click OK a second time to return to the System level in the configuration editor hierarchy.

1.

In the Nested configuration section, next to Root authentication, click

Configure or Edit.

Set the root password. For example: set root-authentication ssh-rsa

“ssh-rsa AAAAB3Nza...D9Y2gXF9ac== [email protected]

2.

Next to Ssh rsa, click Add New

Entry.

3.

In the Authorized key box, type the RSA password—for example, ssh-rsa

AAAAB3Nza...D9Y2gXF9ac== [email protected]

4.

Click OK.

5.

Click OK a second time to return to the System level in the configuration editor hierarchy.

In the Time zone drop-down list, select the time zone for your router—for example, America/Los_Angeles.

Set the time zone. For example: set time-zone America/Los_Angeles

62

Configuring the Services Router with a Configuration Editor

Establishing Basic Connectivity

Task

Define the NTP server that NTP requests can be sent to.

J-Web Interface Configuration

Editor

1.

In the Nested configuration section, next to Ntp, click Configure or

Edit.

CLI Configuration Editor

Set the address of the NTP server. For example: set ntp server address 10.148.2.21

2.

Next to Server, click Add New

Entry.

3.

In the Address box, type the NTP server’s IP address—for example,

10.148.2.21

Define the DNS server that DNS requests can be sent to.

4.

Click OK.

5.

Click OK a second time to return to the System level in the configuration editor hierarchy.

1.

Next to Name server, click Add

New Entry.

2.

In the Address box, type the address of the DNS server—for example, 10.148.2.32.

Add each domain that the router belongs to.

3.

Click OK.

1.

Next to Domain search, click Add

New Entry.

2.

In the Value box, type the name of the domain in which the rouer is located—for example, lab.router.net.

3.

Click OK.

4.

Next to Domain search, click Add

New Entry.

5.

In the Value box, type the name of another domain that the router belongs to—for example, router.net.

Define the backup router to be used when the router is booting or the routing protocol processes are not running.

6.

Click OK.

In the Backup router section, next to Address, type the IP address of the backup router—for example,

192.168.2.44.

Set the address of the DNS server. For example: set name-server 10.148.2.32

Set the domains to be searched. For example: set domain-search lab.router.net

set domain-search router.net

Set the backup router. For example: set backup router address

192.168.2.44

Configuring the Services Router with a Configuration Editor

63

J-series™ Services Router User Guide

Task

Define the IP address for lo0.0.

Define the IP address for fe-0/0/0.

J-Web Interface Configuration

Editor

1.

In the configuration editor hierarchy, next to Interfaces, click

Configure or Edit.

CLI Configuration Editor

1.

Exit the system level of the hierarchy:

2.

In the Interface table, locate the lo0 row and click Unit.

2.

From the top of the configuration hierarchy, enter edit interfaces.

3.

In the Unit table, click 0, and in the

Family section next to Inet, click

Configure or Edit.

3.

exit

Delete the existing IP address: delete lo0 unit 0 family inet address.

4.

To delete the existing IP address, click the Discard button. Select the

Delete Configuration Below This

Point radio button from the next display.

4.

Set the IP address and prefix length of lo0.0. For example: set lo0 unit 0 family inet address

172.16.1.24/32.

5.

Next to Address, click Add new

entry.

6.

In the Source box, type the address and prefix length for the loopback interface—for example,

172.16.1.24/32.

7.

Click OK.

1.

In the configuration editor hierarchy, next to Interfaces, click

Configure or Edit.

2.

In the Interface table, locate the fe–0/0/0 row and click Unit.

3.

In the Unit table, click 0, and in the

Family section next to Inet, click

Configure or Edit.

4.

To delete the existing IP address, click the Discard button. Select the

Delete Configuration Below This

Point radio button from the next display.

1.

Delete the existing IP address: delete fe-0/0/0 unit 0 family inet address.

2.

Set the IP address and prefix length of fe-0/0/0. For example: set fe-0/0/0 unit 0 family inet address 192.168.1.1/24

5.

Next to Address, click Add new

entry.

6.

In the Source box, type the address and prefix length for the management interface—for example, 192.168.1.1/24.

7.

Click OK.

64

Configuring the Services Router with a Configuration Editor

Establishing Basic Connectivity

Configuring Autoinstallation

This section contains the following topics:

Autoinstallation Overview on page 65

Autoinstallation Requirements for End Users on page 66

Autoinstallation Requirements for Service Providers on page 66

Enabling Autoinstallation with the CLI on page 66

Autoinstallation Overview

You can download a configuration file automatically from an FTP, Hypertext

Transfer Protocol (HTTP), or Trivial File Transfer Protocol (TFTP) server. When you power on a Services Router configured for autoinstallation, it requests an IP address from a DHCP server. After the Services Router has an address, it sends a request to a configuration server and downloads and installs a configuration.

Autoinstallation is enabled when you turn on power to a Services Router that does not have a valid configuration file stored in nonvolatile RAM

(NVRAM). When autoinstallation is enabled, a network manager loads an existing configuration file automatically to the Services Router that you are deploying. Autoinstallation is helpful for deploying many Services Router, because it centralizes and automates the installation process.

For autoinstallation to work, the Services Router must have or must acquire a unique IP address. Address resolution takes place in one of the following ways:

For an attached LAN interface with High-Level Data Link Control (HDLC) encapsulation, autoinstallation issues DHCP requests or bootstrap protocol

(BOOTP) requests, or uses the Reverse Address Resolution Protocol (RARP). For more information about DHCP, see RFC 2131, Dynamic Host Configuration

Protocol.

For a serial interface with Frame Relay encapsulation, autoinstallation uses

BOOTP.

For a serial interface without Frame Relay encapsulation, autoinstallation uses the Serial Line Address Resolution Protocol (SLARP).

Configuring Autoinstallation

65

J-series™ Services Router User Guide

Autoinstallation Requirements for End Users

When enabling autoinstallation as an end user, ensure that you have performed the following tasks:

Installed the Services Router

Powered on the Services Router

Connected an interface on the Services Router to a network that has access to a

DHCP server, a DHCP Relay Agent, and a TFTP server (if you want to use TFTP)

Both DHCP and TFTP can reside on the same server. As the DHCP client, the

Services Router sends a request through the DHCP Relay Agent to the DHCP server to receive an IP address. When the server assigns the IP address, the DHCP

Relay Agent sends the IP address to the Services Router. The router now has a temporary address that is taken from a DHCP pool of addresses.

Based on the IP address and based on the configuration file that it is looking up, the Services Router initiates a TFTP request. The request advertises the IP address of the Services Router and requests the configuration file. The TFTP server processes the request and sends the configuration file back to the Services

Router via FTP. The Services Router then loads the configuration file.

Autoinstallation Requirements for Service Providers

As is the normal practice, ensure that you (the service provider) have installed a bootstrap configuration with the following characteristics on several Services Routers:

Configuration under autoinstallation, and specification that autoinstallation must be enabled

If the destination URL is not specified, but DHCP is configured correctly, autoinstallation still works properly.

Configuration that specifies the Services Router interface on which to search for this configuration file

Enabling Autoinstallation with the CLI

To enable autoinstallation on a Services Router from the CLI:

1.

Enter configuration mode, and issue the edit system autoinstallation command: user@host> configure

Entering configuration mode

[edit] user@host# edit system autoinstallation

[edit system autoinstallation]

66

Configuring Autoinstallation

Establishing Basic Connectivity

2.

Specify the URL or FTP site of the configuration file that you want to automatically install on the Services Router: user@host# set configuration-servers url

3.

If the destination URL is not specified, but DHCP is configured correctly, autoinstallation still works properly.

Specify the interface that the Services Router will use to send out and receive requests, and specify the IP address procurement protocol— bootp

, rarp

, or slarp

.

Typically, the interface is fe-0/0/0

. This interface needs to be connected to a network that provides access to a DHCP server for IP address resolution.

For example, the following command configures the fe-0/0/0 interface for autoinstallation by means of BOOTP: user@host# set interfaces fe-0/0/0 bootp

Verifying Basic Connectivity

To verify that the Services Router has the settings you configured, perform the following task.

Displaying Basic Connectivity Configurations

Purpose

Action

Verify the configuration of basic connectivity. Because the basic connectivity settings appear in different places in the configuration hierarchy, displaying the entire configuration at once makes viewing the settings easier.

From the J-Web interface, select

Configuration>View and Edit>View Configuration Text.

Alternatively, from configuration mode in the CLI, enter the show command. The

following sample output displays the sample values configured in Table 22. Your

output displays the values you set.

Sample Output system { host-name routera; domain-name lab.router.net; domain-search [ lab.router.net router.net ]; backup-router 192.168.2.44; time-zone America/Los_Angeles; root-authentication { ssh-rsa "ssh-rsa [email protected]";

} name-server {

10.148.2.32;

} services {

Verifying Basic Connectivity

67

J-series™ Services Router User Guide

What It Means

} ntp { server 10.148.2.21;

}

} interfaces { fe-0/0/0 { unit 0 { family inet { address 192.168.1.1/24;

}

} lo0 {

} unit 0 { family inet { address 172.16.1.24/32;

}

}

}

}

The output shows the configuration of basic connectivity. Verify that the values displayed are correct for your Services Router. For more information about the

format of a configuration file, see “Viewing the Configuration Text” on page 136.

68

Verifying Basic Connectivity

Chapter 5

Managing J-series Licenses

To enable some JUNOS software features and use additional ports on a J-series

Services Router, you must purchase, install, and manage separate software licenses.

The presence on the router of the appropriate software license keys (passwords) determines the features and ports you can configure and use.

For information about how to purchase J-series software licenses, contact your

Juniper Networks sales representative.

This chapter contains the following topics:

J-series License Overview on page 69

Before You Begin on page 71

Managing J-series Licenses with the J-Web Interface on page 71

Managing J-series Licenses with the CLI on page 75

Verifying J-series License Management on page 76

J-series License Overview

The J-series set of licenses is composed of two primary types: feature licenses and port licenses. Each type of license is valid for only a single Services Router. To manage the licenses, you must understand the components of a license key.

This section contains the following topics:

Software Feature Licenses on page 69

Port Licenses on page 70

License Key Components on page 71

Software Feature Licenses

Each feature license is tied to exactly one software feature, and that

license is valid for exactly one Services Router. Table 23 lists the Services

Router software features that require licenses.

J-series License Overview

69

J-series™ Services Router User Guide

Table 23: J-series Services Router Software Feature Licenses

Licensed Software Feature

Stateful Firewall Filters and NAT

Stateful firewall and Network Address Translation (NAT) on the J2300 platform—all configuration statements within the

[edit services stateful-firewall] hierarchy.

Stateful firewall and NAT on the J4300 platform—all configuration statements within the [edit services stateful-firewall] hierarchy.

Stateful firewall and NAT on the J6300 platform—all configuration statements within the [edit services stateful-firewall] hierarchy.

IPSec VPN Tunneling

IPSec VPN tunneling on the J2300 platform—all configuration statements within the [edit services ipsec-vpn] hierarchy.

IPSec VPN tunneling on the J4300 platform—all configuration statements within the [edit services ipsec-vpn] hierarchy.

IPSec VPN tunneling on the J6300 platform—all configuration statements within the [edit services ipsec-vpn] hierarchy.

Traffic Analysis

J-Flow traffic analysis—all configuration statements within the [edit forwarding-options sampling] and [edit forwarding-options accounting] hierarchies.

BGP Route Reflectors

Advanced Border Gateway Protocol (BGP) features that enable route reflectors—all configuration statements within the [edit protocols bgp cluster] hierarchy. BGP clusters allow routers to act as route reflectors by enabling the readvertising of BGP routes to internal peers.

License Name

J2300 Services Router Software License for Stateful Firewall

J4300 Services Router Software License for Stateful Firewall

J6300 Services Router Software License for Stateful Firewall

J2300 Services Router Software License for IPSec Tunneling

J4300 Services Router Software License for IPSec Tunneling

J6300 Services Router Software License for IPSec Tunneling

J-series Services Router Software License for J-Flow Traffic

Analysis

J-series Services Router Software License for Advanced

Border Router Protocol Support

Port Licenses

Each port license is tied to exactly one licensed port, and that license is valid for exactly one Services Router. To enable multiple ports, you must have a license for

each licensed port.Table 24 lists the additional Services Router port licenses.

Table 24: J-series Services Router Port Licenses

Licensed Port

T1

Additional port on a T1 Physical Interface Module (PIM).

E1

License Name

J-series Services Router Software License for One Additional

T1 Port

70

J-series License Overview

Managing J-series Licenses

Licensed Port

Additional port on a E1 PIM.

Serial

Additional port on a serial PIM.

Fast Ethernet

Additional port on a Fast Ethernet PIM.

License Name

J-series Services Router Software License for One Additional

E1 Port

J-series Services Router Software License for One Additional

Serial Port

J-series Services Router Software License for One Additional

Fast Ethernet Port

The LAN ports ( fe-0/0/0 and fe-0/0/1

) do not require port licenses.

Additionally, one port per PIM can be configured without a port license. A port license is required only if you configure more than one port on a particular PIM.

License Key Components

A license key consists of two parts:

License ID—Alphanumeric string that uniquely identifies the license key.

When a license is generated, it is given a license ID.

License data—Block of binary data that defines and stores all license key objects.

For example, in the following typical license key, the string li29183743 is the license ID, and the trailing block of data is the license data: li29183743 4ky27y acasck 82fsj6 jzsn4q ix8i8d adj7kr

8uq38t ix8i8d jzsn4q ix8i8d 4ky27y acasck

82fsj6 ii8i7e adj7kr 8uq38t ks2923 a9382e

The license data defines the device ID for which the license is valid and the version of the license.

Before You Begin

Before you begin managing the J-series licenses, complete the following tasks:

Purchase the licenses you require.

Establish basic connectivity. See “Establishing Basic Connectivity” on page 47.

Managing J-series Licenses with the J-Web Interface

To manage licenses with the J-Web interface, you perform the following tasks:

Adding New Licenses with the J-Web Interface on page 73

Managing J-series Licenses with the J-Web Interface

71

J-series™ Services Router User Guide

Figure 24: Licenses Page

Deleting Licenses with the J-Web User Interface on page 74

Displaying License Keys with the J-Web Interface on page 74

Downloading Licenses with the J-Web Interface on page 74

Figure 24 shows the J-Web Licenses page.

The Licenses page displays a summary of licensed features that are configured on the Services Router and a list of the licenses that are installed on the router. The

information on the license management page is summarized in Table 25.

72

Managing J-series Licenses with the J-Web Interface

Managing J-series Licenses

Table 25: Summary of License Management Fields

Field Name

Feature Summary

Feature

Licenses Used

Licenses Installed

Licenses Needed

Definition

Name of the licensed feature or port:

J-series licenses listed in Table 23 and Table 24

All features—All-inclusive licenses

Number of licenses currently being used on the router.

Usage is determined by the configuration on the router. If a port license exists and that port is configured, the license is considered used.

Number of licenses installed on the router for the particular feature or port.

Number of licenses required for legal of use the feature or port. Usage is determined by the configuration on the router:

If a feature is configured and the license for that feature is not installed, a single license is needed.

If one or more ports are configured beyond the number of licenses installed on the router, a single license is needed for each additional configured port.

Installed Licenses

ID

State

Version

Enabled Features

Unique alphanumeric ID of the license.

Valid—The installed license key is valid.

Invalid—The installed license key is not valid.

Numeric version number of the license key.

Name of the feature that is enabled with the particular license.

Adding New Licenses with the J-Web Interface

To add a new license key on a Services Router with the J-Web license manager:

1.

In the J-Web interface, select Manage>Licenses.

2.

3.

Under Installed Licenses, click Add to add a new license key.

Do one of the following, using a blank line to separate multiple license keys:

In the License File URL box, type the full URL to the destination file containing the license key to be added.

In the License Key Text box, paste the license key text, in plain-text format, for the license to be added.

4.

Click OK to add the license key.

Managing J-series Licenses with the J-Web Interface

73

J-series™ Services Router User Guide

5.

Go on to “Verifying J-series License Management” on page 76.

Deleting Licenses with the J-Web User Interface

To delete one or more license keys from a Services Router with the J-Web license manager:

2.

3.

4.

1.

In the J-Web interface, select Manage>Licenses.

Select the check box of the license or licenses you want to delete.

Click Delete.

Go on to “Verifying J-series License Management” on page 76.

Displaying License Keys with the J-Web Interface

To display the license keys installed on a Services Router with the J-Web license manager:

1.

2.

3.

In the J-Web interface, select Manage>Licenses.

Under Installed Licenses, click Display Keys to display all the license keys installed on the router.

A screen displaying the license keys in text format appears. Multiple licenses are separated by a blank line.

Go on to “Verifying J-series License Management” on page 76.

Downloading Licenses with the J-Web Interface

To download the license keys installed on the Services Router with the J-Web license manager:

1.

2.

3.

4.

In the J-Web interface, select Manage>Licenses.

Under Installed Licenses, click Download Keys to download all the license keys installed on the router to a single file.

Select Save it to disk and specify the file to which the license keys are to be written.

Go on to “Verifying J-series License Management” on page 76.

74

Managing J-series Licenses with the J-Web Interface

Managing J-series Licenses

Managing J-series Licenses with the CLI

To manage the J-series licenses with the CLI, perform the following tasks.

Adding New Licenses with the CLI on page 75

Deleting a License with the CLI on page 75

Saving License Keys with the CLI on page 76

Adding New Licenses with the CLI

To add a new license key to the Services Router with the CLI:

1.

2.

Enter operational mode in the CLI.

Enter one of the following CLI commands:

To add a license key from a file or URL, enter the following command, specifying the filename or the URL where the key is located: request system license add filename | url

To add a license key from the terminal, enter the following command: request system license add terminal

3.

When prompted, enter the license key, separating multiple license keys with a blank line.

If the license key you enter is invalid, an error is generated when you press

Ctrl-D to exit license entry mode.

4.

Go on to “Verifying J-series License Management” on page 76.

Deleting a License with the CLI

To delete a license key from the Services Router with the CLI:

1.

2.

Enter operational mode in the CLI.

Enter the following command for each license, specifying the license ID. You can delete only one license at a time.

request system license delete license-id

3.

Go on to “Verifying J-series License Management” on page 76.

Managing J-series Licenses with the CLI

75

J-series™ Services Router User Guide

Saving License Keys with the CLI

To save the licenses installed on the Services Router to a file with the CLI:

1.

2.

Enter operational mode in the CLI.

To save the installed license keys to a file or URL, enter the following command: request system license save filename | url

For example, the following command saves the installed license keys to a file named license.config

: request system license save ftp://user@host/license.conf

3.

Go on to “Verifying J-series License Management” on page 76.

Verifying J-series License Management

To verify J-series license management, perform these tasks:

Displaying Installed Licenses on page 76

Displaying License Usage on page 77

Displaying Installed License Keys on page 78

Displaying Installed Licenses

Purpose

Action

Sample Output

Verify that the expected licenses are installed and active on the Services Router.

From the CLI, enter the show system license command.

user@router> show system license

License identifier: li29183743

State: valid

License version: 2

Valid for device: jp47859620

License identifier: li48293123

State: valid

License version: 2

Valid for device: jp47859620

Features: firewall - Stateful firewall

License identifier: li72194673

State: valid

License version: 2

Valid for device: jp47859620

76

Verifying J-series License Management

Managing J-series Licenses

Features: if-t1-4 - Four additional T1 ports

License identifier: li41597793

State: valid

License version: 2

Valid for device: jp47859620

Features: ipsec-vpn - IPSec VPN tunnelling

What It Means

The output shows a list of the licenses installed on the Services Router. Verify the following information:

Each license is present. Licenses are listed in ascending alphanumeric order by license ID.

The state of each license is valid

.

A state of invalid indicates that the license key is not a valid license key. Either it was entered incorrectly or it is not valid for the specific device.

The feature for each license is the expected feature. The features enabled are listed by license. An all-inclusive license has

All features listed.

Displaying License Usage

Purpose

Action

Sample Output

Verify that the licenses fully cover the feature configuration on the Services Router.

From the CLI, enter the show system license usage command.

What It Means user@router> show system license usage

Feature name firewall ipsec-vpn if-t1 if-se j-flow bgp-reflection

Licensed

1

1

4

4

1

0

Used

1

0

3(+1)

6(+2)

1

1

Needed

0

0

0

2

0

1

The output shows a list of the licenses installed on the Services Router and how they are used. Verify the following information:

Each licensed feature and port is present. Features and ports are listed in ascending alphabetical order by license name. The number of licenses is shown in the first column. Check that the appropriate number of licenses is installed.

The number of used licenses matches what is configured. If a licensed feature or port is configured, the feature or port is considered used. The sample output

Verifying J-series License Management

77

J-series™ Services Router User Guide shows that stateful firewall, J-Flow, and BGP route reflection are configured.

Additionally, three T1 interfaces and six serial interfaces are configured.

If free port licenses are being used, the number of free licenses being used is listed in parentheses next to the number of used licenses. The sample output shows that the user has configured four T1 interfaces (three licensed interfaces and one free interface).

A license is installed on the Services Router for each configured feature and port. For every feature or port configured that does not have a license, one license is needed.

The sample output shows that the user has configured eight serial interfaces

(six licensed interfaces and two free interfaces). This configuration requires six purchased licenses, but only four have been purchased. An additional two licenses are required to be in compliance with license agreements.

Displaying Installed License Keys

Purpose

Action

Sample Output

Verify the license keys installed on the Services Router.

From the CLI, enter the show system license keys command.

user@router> show system license keys

What It Means li29183743 jzsn4q ix8i8d 4ky27y jzsn4q ix8i8d adj7kr

8uq38t 82fsj6 ii8i7e adj7kr 82fsj6 acasck ix8i8d 4ky27y acasck 8uq38t ks2923 a938 li48293123 4ky27y acasck 82fsj6 jzsn4q ix8i8d eksi2r

8uq38t ix8i8d jzsn4q ix8i8d 4ky27y acasck

82fsj6 ii8i7e adj7kr 8uq38t ks2923 a9382e li83474929 dkdis8 adj7kr 4ky27y aclsck 82fsj6 jzsn4q

8uq38t jzsn4q 9dk2i2 ii3i8d akd239 ks2923

492idf oo8i7e adj7kr 8u3892 3ksio

The output shows a list of the license keys installed on the Services Router. Verify that each expected license key is present.

78

Verifying J-series License Management

Chapter 6

Configuring Network Interfaces

Each Services Router can support types of interfaces suited to different functions.

The router uses network interfaces to transmit and receive network traffic. For network interfaces to operate, you must configure properties such as logical interfaces, the encapsulation type, and certain settings specific to the interface type.

In addition to network interfaces, Services Routers uses permanent interfaces for internal communication, such as the services interfaces that provide additional features for regulating and manipulating traffic. For information about one of these

interfaces, see “Loopback Address” on page 50.

This chapter includes the following topics. For more information about interfaces, see the JUNOS Network Interfaces and Class of Service Configuration Guide.

Network Interfaces Terms on page 79

Interfaces Overview on page 82

Before You Begin on page 84

Configuring Network Interfaces with Quick Configuration on page 84

Configuring Network Interfaces with a Configuration Editor on page 102

Verifying Interface Configuration on page 104

Network Interfaces Terms

To understand Services Router network interfaces, become familiar

with the terms defined in Table 26.

Table 26: Network Interfaces Terms

Term

alternate mark inversion (AMI) binary 8-zero substitution (B8ZS)

Challenge Handshake Authentication

Protocol (CHAP)

Definition

Original method of formatting T1 and E1 data streams.

Improved method of formatting T1 and E1 data streams, in which a special code is substituted whenever 8 consecutive zeros are sent over the link.

Protocol that authenticates remote users. CHAP is a server-driven, three-step authentication method that depends on a shared secret password residing on both the server and the client.

Network Interfaces Terms

79

J-series™ Services Router User Guide

Term Definition

checksum channel service unit (CSU)

Cisco HDLC clock source fractional T1

See frame checksum sequence .

Unit that connects a digital telephone line to a multiplexer or other signal service.

Cisco High-level Data Link Control protocol. Proprietary Cisco encapsulation for transmitting LAN protocols over a WAN. HDLC specifies a data encapsulation method on synchronous serial links by means of frame characters and checksums. Cisco HDLC enables the transmission of multiple protocols.

Source of the consistent, periodic signal used by a router to synchronize data communication and processing tasks.

CSU compatibility mode

Subrate on a T3 interface that allows a Services Router to connect with a channel service unit (CSU) with proprietary multiplexing at the remote end of the line.

Subrating a T3 interface reduces the maximum allowable peak rate by limiting the payload encapsulated by the High-level Data Link Control protocol (HDLC).

data-link connection identifier (DLCI)

Identifier for a Frame Relay virtual connection, also called a logical interface.

data service unit (DSU) data terminal equipment (DTE)

DS3 interface data inversion

Unit that connects a data terminal equipment (DTE) device—in this case, a

Services Router—to a digital telephone line.

RS-232 interface that a Services Router uses to exchange information with a serial device.

Another name for a T3 interface.

E1 interface

Transmission of all data bits in the data stream so that zeros are transmitted as ones and ones are transmitted as zeros. Data inversion is normally used only in alternate mark inversion (AMI) mode to guarantee ones density in the transmitted stream.

Physical WAN interface for transmitting signals in European digital transmission

(E1) format. The E1 signal format carries information at a rate of 2.048 Mbps and can carry 32 channels of 64 Kbps each.

encapsulation type

Fast Ethernet interface

Flexible PIM Concentrator (FPC) frame check sequence (FCS)

Frame Relay

Type of protocol header in which data is wrapped for transmission.

Physical LAN interface for transmitting data at 100 Mbps. Fast Ethernet, also known as 100Base-T, additionally supports standard 10Base-T Ethernet transmission.

Logical identifier for a Physical Interface Module (PIM) installed on a Services

Router.

Calculation that is added to a frame to control errors in High-level Data Link

Control (HDLC), Frame Relay, and other data link layer protocols.

Efficient WAN protocol that does not require explicit acknowledgement of each frame of data. Frame Relay allows private networks to reduce costs by sharing facilities between the end-point switches of a network managed by a Frame Relay service provider. Individual data link connection identifiers (DLCIs) are assigned to ensure that customers receive only their own traffic.

fractional E1

Service also known as channelized E1, in which a 2.048-Mbps E1 link is subdivided into 32 DS0 time slots (channels) in which time slot 0 is reserved. The individual channels or groups of channels connect to different destinations, and customers pay for only the channels used and not for the entire line.

Service also known as channelized T1, in which a 1.544-Mbps T1 link is subdivided into 24 DS0 time slots (channels) in which time slot 0 is reserved. The individual channels or groups of channels connect to different destinations, and customers pay for only the channels used and not for the entire line.

80

Network Interfaces Terms

Configuring Network Interfaces

Term

High-level Data Link Control hostname logical interface maximum transmission unit (MTU)

Physical Interface Module (PIM)

Point-to-Point Protocol (PPP) serial interface

T1 interface

T3 interface

Definition

International Telecommunication Union (ITU) standard for a bit-oriented data link layer protocol on which most other bit-oriented protocols are based.

Name assigned to the Services Router during initial configuration.

Virtual interface that you create on a physical interface to identify its connection.

Creating multiple logical interfaces allows you to associate multiple virtual circuits, data line connections, or virtual LANs (VLANs) with a single interface device.

Limit on the segment size that a network can transmit.

Network interface card that is fixed or can be interchangeably installed on a

Services Router to provide the physical connections to a LAN or WAN, receiving incoming packets and transmitting outgoing packets. A PIM contains one of the following interfaces or sets of interfaces:

Two Fast Ethernet LAN interfaces

Two T1 or two E1 WAN interfaces

Single T3 (DS3) WAN interface (J6300 model only)

Two serial interfaces

Link-layer protocol that provides multiprotocol encapsulation. PPP is used for link-layer and network-layer configuration.

Physical LAN interface for transmitting data between computing devices. A

Services Router has two types of serial interfaces:

Asynchronous serial interface—Console port, with speeds up to 110.5

Kbps. The console port supports an RS-232 (EIA-232) standard serial cable with a 25-pin (DB-25) connector.

Synchronous serial interface—Port that transmits packets to and from, for example, a T1 device or microwave link, at speeds up to 8 Mbps. You cannot use this serial interface to connect a console. Services Router synchronous serial interfaces support the following cable types:

V.35—Serial cable with a 34-pin connector for speeds up to 8 Mbps

RS-232—(EIA-232) Standard serial cable with a 25-pin (DB-25) connector for speeds up to 110.5 Kbps

RS-422/449—(EIA-449) Serial cable with a 37-pin (DB-37) connector, for RS-422 and RS-423 interfaces

X.21—Standard serial cable, popular in Europe, with a 15-pin

(DB-15) connector

RS-530—(EIA-530) Serial cable with a 25-pin connector for higher speeds than RS-232

For cable details, see “Network Cable Specifications and Connector

Pinouts” on page 551.

Physical WAN interface for transmitting digital signals in the T-carrier system used in the United States, Japan, and Canada. The T1 signal format carries 24 pulse code modulation (PCM) signals using time-division multiplexing (TDM) at an overall rate of 1.544 Mbps.

Physical WAN interface for transmitting digital signals in the T-carrier system used in the United States, Japan, and Canada. T3 signals are formatted like T1 signals, but carry information at the higher rate of 44.736 Mbps. T3 is also known as DS3.

Network Interfaces Terms

81

J-series™ Services Router User Guide

Interfaces Overview

This section contains the following topics:

Network Interface Types on page 82

Interfaces and Interface Naming on page 82

Network Interface Types

J-series Services Routers support the following network interface types:

E1, Fast Ethernet, serial, T1, and T3.

T3 interfaces, which are also known as DS3 interfaces, are supported on J6300 Services Routers only.

Interfaces and Interface Naming

The interfaces on a Services Router are used for networking and services. Most interfaces are configurable, but some internally generated interfaces are not configurable. Each interface has a unique name that identifies its type and location and indicates whether it is a physical interface or an optional logical unit created on a physical interface:

The name of each interface on the router has the following format, to identify the physical device that corresponds to a single physical network connector:

type - FPC / PIM / port

Network interfaces that are fractionalized into time slots include a virtual DS0 channel number in the name, preceded by a colon (:):

type - FPC / PIM / port : channel

Each logical interface has an additional logical unit identifier, preceded by a period (.):

type - FPC / PIM / port :< channel >. logical unit

For example, e1-5/0/0 is the E1 interface on port 0 of FPC 5, e1-5/0/0:15 is channel

15 on that interface, and e1-5/0/0:15.0

is logical unit 0 on that channel.

The parts of an interface name are explained in Table 27.

82

Interfaces Overview

Configuring Network Interfaces

Table 27: Interface Name Information

Interface Name Part

type

FPC

PIM port

Meaning

Type of network medium that can connect to this interface.

Possible Values dsc—Virtual interface that discards packets.

e1—E1 WAN interface.

fe—Fast Ethernet LAN interface.

gr, gre—Generic routing encapsulation (GRE) interface for tunnel services. This interface is internally generated and not configurable.

ip, ipip—IP-over-IP interface. This interface is internally generated and not configurable.

ls, lsi—Link services interface. This interface is internally generated and not configurable.

lo—Loopback interface. This interface is internally generated and also configurable.

mtun—Multicast GRE interface. This interface is internally generated and not configurable.

pd, pimd—Protocol Independent Multicast (PIM) decapsulator interface. This interface is internally generated and not configurable.

pe, pime—PIM encapsulator interface. This interface is internally generated and not configurable.

se—Serial interface (including RS-232, RS-422/449, RS-530,

V.35, and X.21 interfaces).

t1—T1 WAN interface.

t3—T3 (also known as DS3) WAN interface.

tap—This interface is internally generated and not configurable.

On a J2300 router, always 0.

On a J4300 or J6300 router, a value from 0 through 6.

Number of the Flexible

PIM concentrator (FPC) on which the physical interface is located.

Number of the PIM on which the physical interface is located. For

Services Router interfaces, the FPC and PIM are the same physical unit, so the

PIM has no number of its own.

Number of the port on a

PIM on which the physical interface is located.

Always 0.

Either 0 or 1.

Interfaces Overview

83

J-series™ Services Router User Guide

Interface Name Part

channel logical unit

Meaning

Number of the channel

(time slot) on a fractional

T1 or E1 interface.

Number of the logical unit created on the physical interface.

Possible Values

On an E1 interface, a value from 0 through 32. The 0 and 1 time slots are reserved.

On a T1 interface, a value from 0 through 24. The 0 time slot is reserved.

A value from 0 through 16384.

Before You Begin

Before you configure network interfaces, you need to perform the following tasks:

Install Services Router hardware. For more information, see “Installing and

Connecting a Services Router” on page 35.

Establish basic connectivity. For more information, see “Establishing Basic

Connectivity” on page 47.

If you do not already have a basic understanding of physical and logical

interfaces and Juniper Networks interface conventions, read “Interfaces

Overview” on page 82.

Although not a requirement, you might also want to plan how you are going to use the various network interfaces before you start configuring them. You can see a list of the physical interfaces installed on the J-series Services Router

by displaying the Quick Configuration page, as shown in Figure 25.

Configuring Network Interfaces with Quick Configuration

The Quick Configuration page allows you to configure network interfaces on a

Services Router, as shown in Figure 25.

84

Configuring Network Interfaces with Quick Configuration

Figure 25: Quick Configuration Interfaces Page

Configuring Network Interfaces

To configure a network interface with Quick Configuration:

1.

2.

In the J-Web user interface, select Configuration>Quick

Configuration>Interfaces. You can select Interfaces in the list under Router

Configuration or from the left pane.

A list of the network interfaces present on the Services Router is displayed,

as shown in Figure 25. The third column indicates whether the interface

has been configured.

To configure properties for a network interface, select the interface name and proceed with configuration as described in one of the following topics:

Configuring an E1 Interface with Quick Configuration on page 86

Configuring a Fast Ethernet Interface with Quick Configuration on page 89

Configuring a T1 Interface with Quick Configuration on page 91

Configuring Network Interfaces with Quick Configuration

85

J-series™ Services Router User Guide

Configuring a T3 Interface with Quick Configuration on page 95

Configuring a Serial Interface with Quick Configuration on page 98

Configuring an E1 Interface with Quick Configuration

To configure properties on an E1 interface:

1.

From the Quick Configuration page, as shown in Figure 25, select the E1

interface you want to configure.

The properties you can configure on an E1 interface are displayed, as shown in

Figure 26.

Figure 26: E1 Interfaces Quick Configuration Page

86

Configuring Network Interfaces with Quick Configuration

Configuring Network Interfaces

2.

Enter information into the Quick Configuration page, as described in Table 28.

3.

Click one of the following buttons:

To apply the configuration and stay in the Quick Configuration page, click Apply.

To apply the configuration and return to the main configuration page, click OK.

To cancel your entries and return to the main page, click Cancel.

4.

To verify that the E1 interface is configured correctly, see “Verifying Interface

Configuration” on page 104.

Table 28: E1 Quick Configuration Summary

Field

Logical Interfaces

Add logical interfaces

Logical Interface Description

IPv4 Addresses and Prefixes

Physical Interface Description

Encapsulation

Encapsulation

Function Your Action

Defines one or more logical units that you connect to this physical E1 interface.

You must define at least one logical unit for an E1 interface. You can define multiple units if the encapsulation type is Frame Relay.

Click Add.

(Optional) Describes the logical interface.

Type a text description of the logical interface to more clearly identify it in monitoring displays.

Specifies one or more IPv4 addresses for the interface.

1.

Type one or more IPv4 addresses and prefixes in dotted decimal notation. For example:

10.10.10.10/24

(Optional) Adds supplementary information about the physical E1 interface.

2.

Click Add.

Type a text description of the E1 interface to more clearly identify it in monitoring displays.

Specifies the encapsulation type for traffic on the interface.

From the drop-down list, select the encapsulation for this E1 interface:

PPP

Frame Relay

Cisco HDLC

Configuring Network Interfaces with Quick Configuration

87

J-series™ Services Router User Guide

Field

Enable CHAP

Function

Enables or disables CHAP authentication on an E1 interface with PPP encapsulation only.

Your Action

To enable CHAP, select the check box.

CHAP Local Identity (available if CHAP is enabled)

Use System Host Name Specifies that the E1 interface use the

Services Router’s system hostname in

CHAP challenge and response packets.

Local Name

CHAP Peer Identity

CHAP Secret

To enable, select the check box

(the default).

If Use System Host Name is disabled, specifies the local name for CHAP to use.

Identifies the client or peer with which the Services Router communicates on this E1 interface.

Specifies the secret password for CHAP authentication, known to both sides of the connection.

To disable, clear the check box.

Type a local name for this E1 interface.

Type the CHAP client name.

Type a password that is known to the other side of the connection. Use a combination of letters and numbers that is difficult for others to guess.

E1 Options

MTU

Clocking

Specifies the maximum transmission unit size for the E1 interface.

Specifies the transmit clock source for the E1 line.

To disable CHAP, clear the check box.

Type a value between 256 and 9192 bytes. The default MTU for E1 interfaces is 1504.

From the drop-down list, select one of the following:

Framing Mode

Invert Data

Specifies the framing mode for the E1 line.

Enables or disables data inversion.

Data inversion is normally used only in alternate mark inversion (AMI) mode.

internal—Services Router’s own system clock (the default)

external—Clock received from the E1 interface

From the drop-down list, select one of the following:

g704—The default

g704–no-crc4—G704 without cyclic redundancy check 4

(CRC4)

unframed—Unframed transmission format

To enable, select the check box.

To disable, clear the check box.

88

Configuring Network Interfaces with Quick Configuration

Configuring Network Interfaces

Field

Timeslots

Frame Checksum

Function

Specifies the number of time slots allocated to a fractional E1 interface. By default, an E1 interface uses all the time slots.

Your Action

Type numeric values from 2 through

32. Separate discontinuous entries with commas, and use hyphens to indicate ranges. For example:

Specifies the number of bits in the frame checksum. A 32–bit checksum provides more reliable packet verification, but is not supported by some older equipment.

2,4,7–9

Select 16 or 32. The default checksum is 16.

Configuring a Fast Ethernet Interface with Quick Configuration

To configure properties on a Fast Ethernet interface:

1.

From the Quick Configuration page, as shown in Figure 25, select the interface

you want to configure.

The properties you can configure on a Fast Ethernet interface are displayed, as

shown in Figure 27.

Configuring Network Interfaces with Quick Configuration

89

J-series™ Services Router User Guide

Figure 27: Fast Ethernet Interfaces Quick Configuration Page

2.

3.

Enter information into the Quick Configuration page, as described in Table 29.

Click one of the following buttons:

To apply the configuration and stay in the Quick Configuration page, click Apply.

To apply the configuration and return to the main configuration page, click OK.

4.

To cancel your entries and return to the main page, click Cancel.

To verify that the Fast Ethernet interface is configured correctly, see “Verifying

Interface Configuration” on page 104.

90

Configuring Network Interfaces with Quick Configuration

Configuring Network Interfaces

Table 29: Fast Ethernet Quick Configuration Summary

Function Field

Logical Interfaces

Add logical interfaces

Logical Interface Description

IPv4 Addresses and Prefixes

Physical Interface Description

Your Action

Defines one or more logical units that you connect to this physical Fast

Ethernet interface. You must define at least one logical unit for a Fast Ethernet interface. You can define multiple units if the encapsulation type is Frame Relay.

(Optional) Describes the logical interface.

Click Add.

Specifies one or more IPv4 addresses for the interface.

Type a text description of the logical interface to more clearly identify it in monitoring displays.

1.

Type one or more IPv4 addresses and prefixes in dotted decimal notation. For example:

(Optional) Adds supplementary information about the physical Fast

Ethernet interface.

10.10.10.10/24

2.

Click Add.

Type a text description of the Fast

Ethernet interface to more clearly identify it in monitoring displays.

Configuring a T1 Interface with Quick Configuration

To configure properties on a T1 interface:

1.

From the Quick Configuration page, as shown in Figure 25, select the interface

you want to configure.

The properties you can configure on a T1 interface are displayed, as shown in

Figure 28.

Configuring Network Interfaces with Quick Configuration

91

J-series™ Services Router User Guide

Figure 28: T1 Interfaces Quick Configuration Page

2.

3.

Enter information into the Quick Configuration page, as described in Table 30.

Click one of the following buttons:

To apply the configuration and stay in the Quick Configuration page, click Apply.

To apply the configuration and return to the main configuration page, click OK.

4.

To cancel your entries and return to the main page, click Cancel.

To verify that the T1 interface is configured correctly, see “Verifying Interface

Configuration” on page 104.

92

Configuring Network Interfaces with Quick Configuration

Configuring Network Interfaces

Table 30: T1 Quick Configuration Summary

Field

Logical Interfaces

Add logical interfaces

Function Your Action

Defines one or more logical units that you connect to this physical T1 interface. You must define at least one logical unit for a T1 interface.

You can define multiple units if the encapsulation type is Frame Relay.

(Optional) Describes the logical interface.

Click Add.

Logical Interface Description

IPv4 Addresses and Prefixes Specifies one or more IPv4 addresses for the interface.

Type a text description of the logical interface to more clearly identify it in monitoring displays.

1.

Type one or more IPv4 addresses and prefixes in dotted decimal notation. For example:

10.10.10.10/24

Physical Interface Description (Optional) Adds supplementary information about the physical T1 interface.

2.

Click Add.

Type a text description of the T1 interface to more clearly identify it in monitoring displays.

Encapsulation

Encapsulation

Enable CHAP

Local Name

Specifies the encapsulation type for traffic on the interface.

Enables or disables CHAP authentication on a T1 interface with PPP encapsulation only.

From the drop-down list, select the encapsulation for this T1 interface:

PPP

Frame Relay

Cisco HDLC

To enable CHAP, select the check box.

To disable CHAP, clear the check box.

CHAP Local Identity (available if CHAP is enabled)

Use System Host Name

Specifies that the T1 interface use the

Services Router’s system hostname in

CHAP challenge and response packets.

To enable, select the check box

(the default).

To disable, clear the check box.

Type a local name for this T1 interface.

CHAP Peer Identity

CHAP Secret

If Use System Host Name is disabled, specifies the local name for CHAP to use.

Identifies the client or peer with which the Services Router communicates on this T1 interface.

Specifies the secret password for CHAP authentication, known to both sides of the connection.

Type the CHAP client name.

Type a password that is known to the other side of the connection. Use a combination of letters and numbers that is difficult for others to guess.

Configuring Network Interfaces with Quick Configuration

93

Framing Mode

Line Encoding

Byte Encoding

Invert Data

Timeslots

J-series™ Services Router User Guide

Field

T1 Options

MTU

Clocking

Function Your Action

Specifies the maximum transmission unit size for the T1 interface.

Specifies the transmit clock source for the T1 line.

Specifies the framing mode for the T1 line.

Type a value between 256 and 9192 bytes. The default MTU for T1 interfaces is 1504.

From the drop-down list, select one of the following:

internal—Services Router’s own system clock (the default)

external—Clock received from the T1 interface

From the drop-down list, select one of the following:

esf—Extended superframe (the default)

Specifies the line encoding method.

Specifies the byte encoding method.

sf—Superframe

From the drop-down list, select one of the following:

ami—Alternate mark inversion

b8zs—Binary 8 zero substitution

(the default)

From the drop-down list, select one of the following:

nx56—7 bits per byte

Enables or disables data inversion.

Data inversion is normally used only in alternate mark inversion (AMI) mode.

Specifies the number of time slots allocated to a fractional T1 interface. By default, a T1 interface uses all the time slots.

nx64—8 bits per byte (the default)

To enable, select the check box.

To disable, clear the check box.

Type numeric values from 1 through 24.

You can use any combination of time slots. To configure ranges, use hyphens.

To configure discontinuous slots, use commas. For example:

1–5,10,24

94

Configuring Network Interfaces with Quick Configuration

Configuring Network Interfaces

Field

Frame Checksum

Line Buildout

Function

Specifies the number of bits in the frame checksum. A 32–bit checksum provides more reliable packet verification, but is not supported by some older equipment.

Specifies the T1 cable length, in feet.

Your Action

Select 16 or 32. The default value is 16.

From the drop-down list, select one of the following cable lengths:

0–132 (0 m–40 m) (the default)

133–265 (40 m–81 m)

266–398 (81 m–121 m)

399–531 (121 m–162 m)

532–655 (162m–200m)

Configuring a T3 Interface with Quick Configuration

To configure properties on a T3 (DS3) interface:

1.

From the Quick Configuration page, as shown in Figure 25, select the interface

you want to configure.

The properties you can configure on a T3 interface are displayed, as shown in

Figure 29.

Configuring Network Interfaces with Quick Configuration

95

J-series™ Services Router User Guide

Figure 29: T3 Interfaces Quick Configuration Page

2.

3.

Enter information into the Quick Configuration page, as described in Table 31.

Click one of the following buttons:

To apply the configuration and stay in the Quick Configuration page, click Apply.

To apply the configuration and return to the main configuration page, click OK.

4.

To cancel your entries and return to the main page, click Cancel.

To verify that the T3 interface is configured correctly, see “Verifying Interface

Configuration” on page 104.

96

Configuring Network Interfaces with Quick Configuration

Configuring Network Interfaces

Table 31: T3 Quick Configuration Summary

Field

Logical Interfaces

Add logical interfaces

Function Your Action

Defines one or more logical units that you connect to this physical T3 interface. You must define at least one logical unit for a T3 interface.

You can define multiple units if the encapsulation type is Frame Relay.

(Optional) Describes the logical interface.

Click Add.

Logical Interface Description

IPv4 Addresses and Prefixes Specifies one or more IPv4 addresses for the interface.

Type a text description of the logical interface to more clearly identify it in monitoring displays.

1.

Type one or more IPv4 addresses and prefixes in dotted decimal notation. For example:

10.10.10.10/24

Physical Interface Description (Optional) Adds supplementary information about the physical T3 interface.

2.

Click Add.

Type a text description of the T3 interface to more clearly identify it in monitoring displays.

Encapsulation

Encapsulation

Enable CHAP

Local Name

Specifies the encapsulation type for traffic on the interface.

Enables or disables CHAP authentication on a T3 interface with PPP encapsulation only.

From the drop-down list, select the encapsulation for this T3 interface:

PPP

Frame Relay

Cisco HDLC

To enable CHAP, select the check box.

To disable CHAP, clear the check box.

CHAP Local Identity (available if CHAP is enabled)

Use System Host Name

Specifies that the T3 interface use the

Services Router’s system hostname in

CHAP challenge and response packets.

To enable, select the check box

(the default).

To disable, clear the check box.

Type a local name for this T3 interface.

CHAP Peer Identity

CHAP Secret

If Use System Host Name is disabled, specifies the local name for CHAP to use.

Identifies the client or peer with which the Services Router communicates on this T3 interface.

Specifies the secret password for CHAP authentication, known to both sides of the connection.

Type the CHAP client name.

Type a password that is known to the other side of the connection. Use a combination of letters and numbers that is difficult for others to guess.

Configuring Network Interfaces with Quick Configuration

97

J-series™ Services Router User Guide

Field

T3 Options

MTU

Clocking

C-Bit Parity

Frame Checksum

Long Buildout

Function Your Action

Specifies the maximum transmission unit size for the T3 interface.

Specifies the transmit clock source for the T3 line.

Type a value between 256 and 9192 bytes. The default MTU for T3 interfaces is 4474.

From the drop-down list, select one of the following:

internal—Services Router’s own system clock (the default)

external—Clock received from the T3 interface

To enable, select the check box.

Enables or disables C-bit parity mode, which controls the type of framing that is present on the transmitted T3 signal.

Specifies the number of bits in the frame checksum. A 32-bit checksum provides more reliable packet verification, but is not supported by some older equipment.

Specifies a short or long cable length for copper-cable-based T3 interfaces.

A long cable is longer than 225 feet

(68.6m).

To disable, clear the check box.

Select 16 or 32. The default value is 16.

To enable long buildout, select the check box.

To disable long buildout, clear the check box.

Configuring a Serial Interface with Quick Configuration

To configure properties on a serial interface:

1.

From the Quick Configuration page, as shown in Figure 25, select the interface

you want to configure.

The properties you can configure on a serial interface are displayed, as

shown in Figure 30.

98

Configuring Network Interfaces with Quick Configuration

Figure 30: Serial Interfaces Quick Configuration Page

Configuring Network Interfaces

2.

3.

Enter information into the Quick Configuration page, as described in Table 32.

Click one of the following buttons:

To apply the configuration and stay in the Quick Configuration page, click Apply.

To apply the configuration and return to the main configuration page, click OK.

To cancel your entries and return to the main page, click Cancel.

4.

To verify that the serial interface is configured correctly, see “Verifying Interface

Configuration” on page 104.

Configuring Network Interfaces with Quick Configuration

99

J-series™ Services Router User Guide

Table 32: Serial Quick Configuration Summary

Field

Logical Interfaces

Add logical interfaces

Function Your Action

Defines one or more logical units that you connect to this physical serial interface. You must define at least one logical unit for a serial interface.

You can define multiple units if the encapsulation type is Frame Relay.

(Optional) Describes the logical interface.

Click Add.

Logical Interface Description

IPv4 Addresses and Prefixes Specifies one or more IPv4 addresses for the interface.

Type a text description of the logical interface to more clearly identify it in monitoring displays.

1.

Type one or more IPv4 addresses and prefixes in dotted decimal notation. For example:

10.10.10.10/24

Physical Interface Description (Optional) Adds supplementary information about the physical serial interface.

2.

Click Add.

Type a text description of the serial interface to more clearly identify it in monitoring displays.

Encapsulation

Encapsulation Specifies the encapsulation type for traffic on the interface.

From the drop-down list, select the encapsulation for this serial interface:

PPP

Frame Relay

Enable CHAP Enables or disables CHAP authentication on a serial interface with PPP encapsulation only.

Cisco HDLC

To enable CHAP, select the check box.

To disable CHAP, clear the check box.

CHAP Local Identity (available if CHAP is enabled)

Use System Host Name

Specifies that the serial interface use the

Services Router’s system hostname in

CHAP challenge and response packets.

Local Name

To enable, select the check box

(the default).

To disable, clear the check box.

Type a local name for this serial interface.

CHAP Peer Identity

CHAP Secret

If Use System Host Name is disabled, specifies the local name for CHAP to use.

Identifies the client or peer with which the Services Router communicates on this serial interface.

Specifies the secret password for CHAP authentication, known to both sides of the connection.

Type the CHAP client name.

Type a password that is known to the other side of the connection. Use a combination of letters and numbers that is difficult for others to guess.

100

Configuring Network Interfaces with Quick Configuration

Field

Serial Options

MTU

Clocking Mode

Clock Rate

Configuring Network Interfaces

Function Your Action

Specifies the maximum transmission unit size for a serial interface.

Specifies the clock source to determine the timing on serial interfaces.

Specifies the line speed in kilohertz or megahertz for serial interfaces that use the DTE clocking mode.

Type a value between 256 and 9192 bytes. The default MTU for serial interfaces is 1504.

From the drop-down list, select one of the following timing sources:

dce—Uses a transmit clock generated by the data circuit-terminating equipment

(DCE) for the Services Router’s

DTE (the default).

internal—Uses the Services

Router’s internal clock.

loop—Uses the DCE’s receive clock. This mode is the only one supported for X.21 serial interfaces.

From the drop-down list, select one of the following clock rates:

1.2 KHz

2.4 KHz

9.6 KHz

19.2 KHz

38.4 KHz

56.0 KHz

64.0 KHz

72.0 KHz

125.0 KHz

148.0 KHz

250.0 KHz

500.0 KHz

800.0 KHz

1.0 MHz

1.3 MHz

2.0 MHz

4.0 MHz

8.0 MHz

Configuring Network Interfaces with Quick Configuration

101

J-series™ Services Router User Guide

Configuring Network Interfaces with a Configuration Editor

To enable the interfaces installed on your Services Router to work properly, you must configure their properties. You can perform basic interface configuration using

the J-Web Configuration Page, as described in “Configuring Network Interfaces with

Quick Configuration” on page 84. You can perform the same configuration tasks

using the J-Web or CLI configuration editors. In addition, you can configure a wider variety of options that are encountered less frequently.

You can perform the following tasks to configure interfaces:

Adding a Network Interface with a Configuration Editor on page 102

Deleting a Network Interface with a Configuration Editor on page 103

For information about using the J-Web and CLI configuration editors, see

“Using J-series Configuration Tools” on page 127.

Adding a Network Interface with a Configuration Editor

To configure network interfaces for the Services Router:

2.

3.

1.

Navigate to the top of the interfaces configuration hierarchy in either the

J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 33.

When you are finished configuring the interface, click the Commit button or enter the commit command to commit the configuration.

Table 33: Adding an Interface

Task

Navigate to the Interfaces level in the configuration hierarchy.

Create the new interface.

J-Web Configuration Editor

1.

In the configuration editor hierarchy, select

Configuration>View and

Edit>Edit Configuration.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit interfaces

2.

Next to Interfaces, click Configure or Edit.

1.

Next to Interface, click Add new

entry.

Create and name the interface: set interface-name

2.

Enter the name of the new interface in the Interface name box.

Make sure the name conforms to the interface naming rules. For

more information, see “Interfaces and Interface Naming” on page 82.

Make sure the name conforms to the interface naming rules. For more

information, see “Interfaces and

Interface Naming” on page 82.

3.

Click OK.

102

Configuring Network Interfaces with a Configuration Editor

Configuring Network Interfaces

Task

Create the basic configuration for the new interface.

J-Web Configuration Editor

1.

Under Interface Name in the table, click the name of the new interface.

2.

Enter values in the other fields on this page if warranted.

CLI Configuration Editor

Enter values for physical interface properties as needed. Examples include changes to the default values for physical encapsulation or MTU.

Add values for interface-specific options.

Most interface types have optional parameters that are specific to the interface type.

All these entries are optional, but you need to set values for Clocking and Encapsulation in particular if the default values are not suitable.

1.

Under Nested configuration, click

Configure for the appropriate interface type.

2.

In the interface-specific page that appears, enter the values you need to supply or change the default values.

1.

From the [edit interfaces

interface-name

] hierarchy level, enter edit interface -options

2.

Enter the statement for each interface-specific property for which you need to change the default value.

Add logical interfaces.

3.

When you are finished, click OK to confirm your changes or Cancel to cancel them and return to the previous page.

1.

In the main Interface page for this interface, next to Unit, click Add

new entry.

2.

In the Unit page for logical interfaces that appears, enter a number from 0 through 16384 in the Interface unit number box.

3.

Enter values in other fields as required for your network.

4.

To configure protocol family values if needed, under Family, click

Configure next to the appropriate protocol.

5.

To access additional subordinate hierarchies under Nested configuration, click Configure next to any parameter you want to configure.

6.

When you are finished, click OK to confirm your changes or Cancel to cancel them and return to the previous page.

1.

From the [edit interfaces

interface-name

] hierarchy level, enter set unit logical-unit-number

Replace logical-unit-number with a value from 0 through 16384.

2.

Enter additional values for properties you need to configure on the logical interface, such as logical encapsulation or protocol family.

Deleting a Network Interface with a Configuration Editor

To delete an interface on a Services Router:

Configuring Network Interfaces with a Configuration Editor

103

J-series™ Services Router User Guide

1.

2.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 34.

Table 34: Deleting an Interface

Task

Navigate to the Interfaces level in the configuration hierarchy.

J-Web Configuration Editor

1.

In the configuration editor hierarchy, select

Configuration>View and

Edit>Edit Configuration.

2.

Next to Interfaces, click Edit.

Select the interface you want to delete.

In the Interface table, under Interface name, click the name of the interface you want to delete.

Execute the selection.

1.

Click the Discard button.

2.

In the page that appears, select the appropriate radio button.

If you have not made any previous changes, the only selection available is Delete Configuration

Below This Point.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit interfaces

Enter delete interface-name

Commit the configuration change: commit

NOTE: Performing this action removes the interface from the software configuration and disables it. Network interfaces remain physically present, and their identifiers continue to appear on the J-Web Monitor and Quick Configuration pages.

Verifying Interface Configuration

To verify an interface configuration, perform these tasks:

Verifying the Link State of All Interfaces on page 104

Verifying Interface Properties on page 105

Verifying the Link State of All Interfaces

Purpose

By using the ping tool on each peer address in the network, verify that all interfaces on the Services Router are operational.

104

Verifying Interface Configuration

Configuring Network Interfaces

Action

For each interface on the Services Router:

1.

In the J-Web interface, select Diagnose>Ping Host.

2.

3.

In the Remote Host box, type the address of the interface for which you want to verify the link state.

Click Start. Output appears on a separate page.

Sample Output

What It Means

PING 10.10.10.10 : 56 data bytes

64 bytes from 10.10.10.10: icmp_seq=0 ttl=255 time=0.382 ms

64 bytes from 10.10.10.10: icmp_seq=1 ttl=255 time=0.266 ms

If the interface is operational, it generates an ICMP response. If this response is received, the round-trip time in milliseconds is listed in the time field. For more

information about the output, see Table 82.

For more information about using the J-Web interface to ping a host, see “Using the

J-Web Ping Host Tool” on page 218.

For information about the ping

command, see “Using the ping Command” on page

226 or the JUNOS Protocols, Class of Service, and System Basics Command Reference.

Verifying Interface Properties

Purpose

Action

Sample Output

Verify that the interface properties are correct.

From the CLI, enter the show interfaces detail command.

user@host> show interfaces detail

Physical interface: fe-1/0/0, Enabled, Physical link is Up

Interface index: 134, SNMP ifIndex: 27, Generation: 17

Link-level type: Ethernet, MTU: 1514, Speed: 100mbps, Loopback: Disabled,

Source filtering: Disabled, Flow control: Enabled

Device flags : Present Running

Interface flags: SNMP-Traps 16384

Link flags

CoS queues

: None

: 4 supported

Hold-times : Up 0 ms, Down 0 ms

Current address: 00:90:69:87:44:9d, Hardware address: 00:90:69:87:44:9d

Last flapped : 2004-08-25 15:42:30 PDT (4w5d 22:49 ago)

Statistics last cleared: Never

Traffic statistics:

Input bytes :

Output bytes :

Input packets:

0

0

0

0

0 bps

0 bps

0 pps

0 pps Output packets:

Queue counters:

0 best-effort

1 expedited-fo

Queued packets

0

0

Transmitted packets

0

0

Dropped packets

0

0

Verifying Interface Configuration

105

J-series™ Services Router User Guide

2 assured-forw

3 network-cont

Active alarms : None

Active defects : None

0

0

0

0

What It Means

The output shows a summary of interface information. Verify the following information:

The physical interface is

Enabled

. If the interface is shown as

Disabled

, do either of the following:

In the CLI configuration editor, delete the disable statement at the

[edit interfaces interface-name ] level of the configuration hierarchy.

In the J-Web configuration editor, clear the Disable check box on the

Interfaces> interface-name page.

The physical link is

Up

. A link state of

Down indicates a problem with the interface module, interface port, or physical connection (link-layer errors).

The

Last Flapped time is an expected value. The

Last Flapped time indicates the last time the physical interface became unavailable and then available again.

Unexpected flapping indicates likely link-layer errors.

The traffic statistics reflect expected input and output rates. Verify that the number of inbound and outbound bytes and packets matches expected throughput for the physical interface. To clear the statistics and see only new changes, use the clear interfaces statistics interface-name command.

For more information about show interfaces detail

, see the JUNOS Network and Services

Interfaces Command Reference.

0

0

106

Verifying Interface Configuration

Part 3

Using the J-series User Interfaces

J-series User Interface Overview on page 109

Using J-series Configuration Tools on page 127

Using the J-series User Interfaces 107

108

Using the J-series User Interfaces

Chapter 7

J-series User Interface Overview

You can use two user interfaces to monitor, configure, troubleshoot, and manage the Services Router—the J-Web interface and the JUNOS command-line interface

(CLI). This chapter contains the following topics:

User Interface Overview on page 109

Before You Begin on page 112

Using the J-Web Interface on page 112

Using the Command-Line Interface on page 117

User Interface Overview

This section contains the following topics:

J-Web Overview on page 109

CLI Overview on page 110

Comparison of Configuration Interfaces on page 110

J-Web Overview

The J-Web graphical user interface (GUI) allows you to monitor, configure, troubleshoot, and manage the Services Router on a client by means of an HTTP- or HTTPS-enabled Web browser. The J-Web interface provides access to all the configuration statements supported by the router, so you can fully configure it without using the CLI.

The J-Web interface provides two methods of Services Router configuration:

Quick Configuration

Configuration editor

For more information, see “Comparison of Configuration Interfaces” on page 110.

In addition to configuration, you can use the J-Web interface to perform many monitoring, troubleshooting, and management tasks on the Services Router. For

User Interface Overview

109

J-series™ Services Router User Guide example, to display a summary of routing table entries, click Monitor in the task bar, then click Routing in the side pane. The routes are displayed in the main pane.

For more information about the J-Web interface, see “Using the

J-Web Interface” on page 112.

CLI Overview

The CLI is a straightforward command interface in which you type commands on a line and press Enter to execute them. The CLI provides command help, command completion, and Emacs-style keyboard sequences for moving around on the command line and scrolling through a buffer of recently executed commands.

The CLI has two modes:

Operational mode—Complete set of commands to control the CLI environment, monitor and troubleshoot network connectivity, manage the

Services Router, and enter configuration mode.

Configuration mode—Complete set of commands to configure the Services

Router. This guide refers to configuration mode as the CLI configuration

editor. For more information, see “Comparison of Configuration Interfaces” on page 110.

For more information about the CLI, see “Using the Command-Line

Interface” on page 117.

Comparison of Configuration Interfaces

Table 35 describes and compares the interfaces you can use to

configure a Services Router.

110

User Interface Overview

J-series User Interface Overview

Table 35: Services Router Configuration Interfaces

Services

Router

Interface

J-Web Quick

Configuration

J-Web configuration editor

Description Capabilities

Web browser pages for setting up the

Services Router quickly and easily without configuring each statement individually.

Configure basic router services:

Setup

Secure Sockets Layer (SSL)

For example, use the Set Up Quick

Configuration page to configure the

Services Router for basic connectivity so you can manage it from the network.

Interfaces

User access

SNMP notifications

Routing

Security firewalls and

Network Address Translation

(NAT)

IPSec tunnels

Configure all router services: Web browser pages divided into panes in which you can do any of the following:

Expand the entire configuration hierarchy and click a configuration statement to view or edit. The main pane displays all the options for the statement, with a text box for each option.

System parameters

User access and accounting

Interfaces

SNMP network management

Routing options, including multicast routing

Paste a complete configuration hierarchy into a scrollable text box, or edit individual lines.

Upload or download a complete configuration.

CLI configuration editor

Roll back to a previous configuration.

Interface in which you do either of the following:

Type commands on a line and press Enter to create a hierarchy of configuration statements.

Create an ASCII text file that contains the statement hierarchy.

Upload a complete configuration, or roll back to a previous configuration.

Routing protocols

Routing policies

Secure access

Service interfaces, including stateful firewalls and virtual private networks (VPNs)

Traffic engineering, including

Multiprotocol Label Switching

(MPLS) and class-of-service

(CoS) packet prioritization

Chassis properties

Recommendations

Use for basic configuration.

Use for complete configuration if you are not familiar with the JUNOS CLI or prefer a graphical interface.

Use for complete configuration if you know the JUNOS CLI or prefer a command interface.

User Interface Overview

111

J-series™ Services Router User Guide

Before You Begin

Before you start the user interface, you must perform the initial Services Router

configuration described in “Establishing Basic Connectivity” on page 47.

After the initial configuration, you use your username and password, and the hostname or IP address of the router, to start the user interface.

Using the J-Web Interface

This section contains the following topics:

Starting the J-Web Interface on page 112

J-Web Layout on page 113

J-Web Sessions on page 117

Starting the J-Web Interface

To start the J-Web interface:

1.

Launch your HTTP- or HTTPS-enabled Web browser.

2.

To use HTTPS, you must have installed the certificate provided by the Services

Router. For more information, see “Managing J-series Licenses” on page 69.

After http:// or https:// in your Web browser, type the hostname or IP address of the Services Router and press Enter.

3.

The J-Web login page appears.

On the login page, type your username and password, and click Log In.

To correct or change the username or password you typed, click Reset, type the new entry or entries, and click Log In.

The J-Web Quick Configuration>Set Up (see Figure 31) or Monitor>System

page appears.

To explicitly terminate a J-Web session at any time, click Logout in the top pane.

112

Using the J-Web Interface

J-series User Interface Overview

J-Web Layout

Each page of the J-Web interface is divided into the following panes

shown in Figure 31 and Figure 32:

Top pane—Displays identifying information and links.

Main pane—Location where you monitor, configure, diagnose, and manage the Services Router by entering information in text boxes, making selections, and clicking buttons.

Side pane—Displays suboptions of the Monitor, Configuration, Diagnose, or

Manage task currently displayed in the main pane. Click a suboption to access it in the main pane.

Bottom pane—Displays copyright and trademark information.

The layout of the panes allows you to quickly navigate through the interface.

Table 36 summarizes the elements of the J-Web interface.

You navigate the J-Web interface, move forward and backward, scroll pages, and expand and collapse elements as you do in a typical Web browser interface.

Using the J-Web Interface

113

J-series™ Services Router User Guide

Figure 31: J-Web Layout

114

Using the J-Web Interface

Figure 32: J-Web Layout—Configuration Editor

J-series User Interface Overview

Table 36: Summary of J-Web Elements

Description J-Web Interface Element

Top Pane

Juniper Networks logo

Link to www.juniper.net

in a new browser window.

Using the J-Web Interface

115

J-series™ Services Router User Guide

J-Web Interface Element

hostname model

Logged in as: username

Help

About

Logout

Task bar

Main Pane

Help (?) icon

Red asterisk (*)

Path to current task

Icon Legend

Side Pane

Configuration hierarchy

Description

Hostname and model of the Services Router.

Username you used to log in to the Services Router.

Link to context-sensitive help information.

Displays information about the J-Web Interface, such as the version number.

Ends your current login session with the Services Router and returns you to the login page.

Menu of J-Web main options. Click to access.

Monitor—View information about configuration and hardware on the Services Router.

Configuration—Configure the Services Router with Quick

Configuration or the configuration editor, and view configuration history.

Diagnose—Troubleshoot network connectivity problems.

Manage—Manage files and licenses, upgrade software, and reboot the Services Router.

Displays useful information—such as the definition, format, and valid range of an option—when you move the cursor over the question mark.

Indicates a required field.

Path of main options and suboptions you selected to display the current main and side panes.

(Applies to the configuration editor only) Explains icons that appear in the user interface to provide information about configuration statements:

C—Comment. Move your cursor over the icon to view a comment about the configuration statement.

I—Inactive. The configuration statement does not affect the Services

Router.

M—Modified. The configuration statement is added or modified.

*—Mandatory. The configuration statement must have a value.

(Applies to the configuration editor only) Displays the hierarchy of committed statements in the Services Router configuration.

Click Expand all to display the entire hierarchy.

Click Hide all to display only the statements at the top level.

Click plus signs (+) to expand individual items.

Click minus signs (-) to hide individual items.

116

Using the J-Web Interface

J-series User Interface Overview

J-Web Sessions

You establish a J-Web session with the Services Router through an HTTP- or

HTTPS-enabled Web browser. The HTTPS protocol, which uses 128-bit encryption, is available only in domestic versions of the JUNOS software. To use HTTPS, you must have installed the certificate provided by the Services Router.

When you attempt to log in through the J-Web interface, the Services Router authenticates your username with the same methods used for telnet and SSH.

The Services Router supports only one J-Web session for a single username.

Although you might be able to launch multiple Web browsers for multiple views of the same J-Web session, the session can have unpredictable results.

If the Services Router does not detect any activity through the J-Web interface for 15 minutes, the session times out and is terminated. You must log in again to begin a new session.

To explicitly terminate a J-Web session at any time, click Logout in the top pane.

Using the Command-Line Interface

This section contains the following topics:

CLI Command Hierarchy on page 117

Starting the CLI on page 118

CLI Operational Mode on page 119

CLI Configuration Mode on page 120

CLI Basics on page 121

For more information about the CLI, see the JUNOS System Basics Configuration Guide.

CLI Command Hierarchy

The CLI commands are organized hierarchically, with commands that perform a similar function grouped together under the same level. For example, all commands that display information about the Services Router system and system software are grouped under the show command, and all commands that display information about the routing table are grouped under the show route

command. Figure 33

illustrates a portion of the show command hierarchy.

Using the Command-Line Interface

117

J-series™ Services Router User Guide

Figure 33: CLI Command Hierarchy Example show bgp

.......

isis

.......

brief ospf

.......

exact route system

.......

table protocol terse

To execute a command, you enter the full command name, starting at the top level of the hierarchy. For example, to display a brief view of the routes in the routing table, use the command show route brief

.

The hierarchical organization results in commands that have a regular syntax and provides the following features that simplify CLI use:

Consistent command names—Commands that provide the same type of function have the same name, regardless of the portion of the software they are operating on. For example, all show commands display software information and statistics, and all clear commands erase various types of system information.

Lists and short descriptions of available commands—Information about available commands is provided at each level of the CLI command hierarchy. If you type a question mark (?) at any level, you see a list of the available commands along with a short description of each command.

Command completion—Command completion for command names

(keywords) and command options is also available at each level of the hierarchy. If you type a partial command name followed immediately by a question mark (with no intervening space), you see a list of commands that match the partial name you typed.

Starting the CLI

To start the CLI:

1.

Establish a connection with the Services Router:

To access the router remotely from the network, enter the command you typically use to establish a remote connection (such as telnet or ssh

) using the router hostname.

To access the router through a management device attached to the console port, start the terminal application.

2.

Log in using your username and password.

After you log in, you enter a UNIX shell.

118

Using the Command-Line Interface

J-series User Interface Overview

3.

Start the CLI.

user# cli user@host>

The presence of the angle bracket (>) prompt indicates the CLI has started. By default, the prompt is preceded by a string that contains your username and the hostname of the Services Router.

To exit the CLI and return to the UNIX shell, enter the quit command.

CLI Operational Mode

The CLI has two modes: operational and configuration. When you log in to the

Services Router and the CLI starts, you are at the top level of operational mode.

To view a list of top-level operational mode commands, type a question mark (?) at the command-line prompt.

user@host> ?

Possible completions: clear configure file help monitor mtrace ping quit request restart set show ssh start telnet test traceroute

Clear information in the system

Manipulate software configuration information

Perform file operations

Provide help information

Show real-time debugging information

Trace multicast path from source to receiver

Ping remote target

Exit the management session

Make system-level requests

Restart software process

Set CLI properties, date/time, craft interface message

Show system information

Start secure shell on another host

Start shell

Telnet to another host

Perform diagnostic debugging

Trace route to remote host

Using the Command-Line Interface

119

J-series™ Services Router User Guide

At the top level of operational mode are a number of broad groups of CLI commands that are used to perform the following functions:

Control the CLI environment.

Monitor and troubleshoot the router.

Connect to other systems.

Manage files and software images.

Control software processes.

Stop and reboot the router.

Enter configuration mode.

To control the CLI environment, see “Configuring the CLI Environment” on

page 124. To enter configuration mode, see “CLI Configuration Mode” on page 120. For information about the other CLI operational mode functions,

see “Monitoring and Diagnosing a Services Router” on page 197 and

“Managing Users and Operations” on page 163.

CLI Configuration Mode

To configure the Services Router, including system parameters, routing protocols, interfaces, network management, and user access, you must enter configuration mode. In configuration mode, the CLI provides commands to configure the router, load a text (ASCII) file that contains the router configuration, activate a configuration, and save the configuration to a text file.

You enter configuration mode by entering the configure operational mode command. The CLI prompt changes from user@host> to user@host#

.

To view a list of configuration mode commands, type a question mark (?) at the command-line prompt. (You do not need to press

Enter after typing the question mark.) user@host# ?

Possible completions:

Enter activate annotate commit copy deactivate delete edit exit help insert load quit

Execute this command

Remove the inactive tag from a statement

Annotate the statement with a comment

Commit current set of changes

Copy a statement

Add the inactive tag to a statement

Delete a data element

Edit a sub-element

Exit from this level

Provide help information

Insert a new ordered data element

Load configuration from ASCII file

Quit from this level

120

Using the Command-Line Interface

J-series User Interface Overview

CLI Basics

rename rollback run save set show status top up wildcard

Rename a statement

Roll back to previous committed configuration

Run an operational-mode command

Save configuration to ASCII file

Set a parameter

Show a parameter

Show users currently editing configuration

Exit to top level of configuration

Exit one level of configuration

Wildcard operations

The JUNOS software configuration consists of a hierarchy of statements. There are two types of statements: container statements, which contain other statements, and leaf statements, which do not contain other statements. All the container and leaf statements together form the configuration hierarchy.

Each statement consists of a fixed keyword and, optionally, an identifier that you define, such as the name of an interface or a username.

To configure the Services Router or to modify an existing configuration, you add statements to the configuration with the edit and set configuration mode commands. For more information about the CLI configuration editor

and configuration mode, see “Using the CLI Configuration Editor” on page

146 and the JUNOS software configuration guides.

This section contains the following topics:

Editing Keystrokes on page 121

Command Completion on page 122

Online Help on page 123

Configuring the CLI Environment on page 124

Editing Keystrokes

In the CLI, you use keystrokes to move around on and edit the command line,

and to scroll through a list of recently executed commands. Table 37 lists some

typical CLI editing tasks and the keystrokes that perform them.

Using the Command-Line Interface

121

J-series™ Services Router User Guide

Table 37: CLI Editing Keystrokes

Task Category

Move the cursor.

Delete characters.

Action

Move the cursor back one character.

Move the cursor back one word.

Move the cursor forward one character.

Move the cursor forward one word.

Move the cursor to the end of the command line.

Delete the character before the cursor.

Keyboard Sequence

Ctrl-b

Esc b

Ctrl-f

Esc f

Ctrl-e

Ctrl-h, Delete, or

Backspace

Ctrl-d

Ctrl-k

Delete the character at the cursor.

Delete all characters from the cursor to the end of the command line.

Delete all characters on the command line.

Delete the word before the cursor.

Delete the word after the cursor.

Insert the most recently deleted text at the cursor.

Ctrl-u or Ctrl-x

Ctrl-w or Esc Backspace

Esc d

Ctrl-y Insert recently deleted text.

Redraw the screen.

Display previous command lines.

Repeat keyboard sequences.

Redraw the current line.

Scroll backward through the list of recently executed commands.

Scroll forward through the list of recently executed commands.

Search the CLI history in reverse order for lines matching the search string.

Search the CLI history by typing some text at the prompt, followed by the keyboard sequence. The CLI attempts to expand the text into the most recent word in the history for which the text is a prefix.

Specify the number of times to execute a keyboard sequence.

Replace number with a number from 1 through 9, and replace

sequence with a keyboard sequence in this table.

Ctrl-l

Ctrl-p

Ctrl-n

Ctrl-r

Esc /

Esc number sequence

Command Completion

You do not always have to remember or type the full command or option name for the CLI to recognize it. To display all possible command or option completions, type the partial command followed immediately by a question mark (?).

To complete a command or option that you have partially typed, press Tab or Spacebar. If the partially typed letters uniquely identify a command, the complete command name appears. Otherwise, a message indicates that your entry is ambiguous or invalid. Possible command completions are displayed if your entry is ambiguous.

122

Using the Command-Line Interface

J-series User Interface Overview

You can also use command completion on filenames and usernames.

To display all possible values, type one or more characters followed immediately by a question mark. To complete these partial entries, press

Tab only. Pressing Spacebar does not work.

Online Help

The CLI provides context-sensitive help at every level of the command hierarchy.

The help information tells you which commands are available at the current level in the hierarchy and provides a brief description of each.

To get help while in the CLI, type a question mark (?) in one of the following ways:

Type a question mark at the command-line prompt—The CLI lists the available

commands and options. For examples, see “CLI Operational Mode” on page

119 and “CLI Configuration Mode” on page 120.

Type a question mark after entering the complete name of a command or command option—The CLI lists the available commands and options, then redisplays the command names and options that you typed: user@host> request ?

Possible completions: chassis ipsec message routing-engine security services support system user@host> request

Perform chassis-specific operations

Perform IP Security operations

Send text message to other users

Log in to Routing Engine

Perform security-level operations

Perform service application operations

Perform JUNOS support tasks

Perform system-level operations

Type a question mark in the middle of a command name—The CLI lists possible command completions that match the letters you have entered so far, then redisplays the letters that you typed. For example, to list all operational mode commands that start with the letter s

, type the following: user@host> s?

Possible completions: set show ssh start user@host> s

Set CLI properties, date/time, craft interface message

Show system information

Start secure shell on another host

Start shell

The CLI also provides usage guidelines and summary information for text contained in configuration statements if you enter the help topic and help reference commands. For example, to display usage guidelines for the OSPF hello interval, enter the command help topic ospf hello-interval

. You can enter help commands in operational or configuration mode.

Using the Command-Line Interface

123

J-series™ Services Router User Guide

Configuring the CLI Environment

You can configure the CLI environment for your current login session. Your settings are not retained when you exit the CLI.

To display the current CLI settings, enter the show cli command: user@host> show cli

CLI complete-on-space set to on

CLI idle-timeout disabled

CLI restart-on-upgrade set to on

CLI screen-length set to 49

CLI screen-width set to 132

CLI terminal is ’vt100’

CLI is operating in enhanced mode

CLI working directory is ’/cf/var/home/remote’

To change the CLI environment, use the set cli operational mode command: user@host> set cli ?

Possible completions: complete-on-space directory idle-timeout prompt restart-on-upgrade screen-length screen-width terminal

Set whether typing space completes current word

Set working directory

Set maximum idle time before login session ends

Set CLI command prompt string

Set whether CLI prompts to restart after software upgrade

Set number of lines on screen

Set number of characters on a line

Set terminal type

Table 38 shows how you can change the CLI environment features.

Table 38: Configuring the CLI Environment

Environment Feature

Command completion

CLI Command set cli complete-on-space

(on | off)

Your working directory set cli directory path 8

Default Setting on—Pressing Tab or Spacebar completes a command.

Options

Set off to allow only

Tab for command completion.

/cf/var/home/remote

Set on to re-enable

Tab and Spacebar for command completion.

Replace path with the directory you want to enter when you log in to the

Services Router.

124

Using the Command-Line Interface

J-series User Interface Overview

Environment Feature

Minutes of idle time

Your session prompt

Restart after upgrade prompt set cli restart-on-upgrade

(on | off)

Number of CLI output line displayed at once

Number of CLI characters displayed on a line

Your terminal type.

CLI Command set cli idle-time minutes set cli prompt string set cli screen-length length set cli screen-width width

Default Setting

Your session never times out unless your login class specifies a timeout.

user@host >

CLI prompts you to restart the Services Router after a software upgrade.

Variable (depends on terminal type).

Variable (depends on terminal type).

set cli terminal terminal-type unknown, or set by console.

Options

To enable the timeout feature, replace timeout with a value between 1 and 100,000.

To disable the timeout feature, replace timeout with 0.

Replace string with the prompt you want. If the prompt contains spaces or special characters, enclose

string

in quotation marks

(“ “).

Set off to disable the prompt for the session.

Set on to re-enable the prompt.

To change the number of lines displayed on the screen, replace

length

with a value between 1 and

100,000.

To disable the display of a set number of lines, replace length with 0. (This feature can be useful when you are issuing CLI commands from scripts.)

To change the number of characters displayed on a line, replace width with a value between 0 and

100,000.

Replace terminal-type with one of the following values: ansi vt100 small-xterm xterm

Using the Command-Line Interface

125

J-series™ Services Router User Guide

126

Using the Command-Line Interface

Chapter 8

Using J-series Configuration Tools

Use J-series configuration tools to configure all services on a J-series Services Router, including system parameters, routing protocols, interfaces, network management, and user access.

This chapter contains the following topics:

Configuration Tools Terms on page 127

Configuration Tools Overview on page 128

Before You Begin on page 130

Using J-Web Quick Configuration on page 131

Using the J-Web Configuration Editor on page 132

Managing Configuration Files with the J-Web Interface on page 139

Using the CLI Configuration Editor on page 146

Managing Configuration Files with the CLI on page 158

Configuration Tools Terms

Before using the J-series configuration tools, become familiar with

the terms defined in Table 39.

Table 39: Configuration Tools Terms

Term

candidate configuration configuration group commit a configuration

Definition

A working copy of the configuration that can be edited without affecting the Services Router until it is committed.

Group of configuration statements that can be inherited by the rest of the configuration.

Have the candidate configuration checked for proper syntax, activated, and marked as the current configuration file running on the Services Router.

Configuration Tools Terms

127

J-series™ Services Router User Guide

Term Definition

configuration hierarchy rescue configuration

The JUNOS software configuration consists of a hierarchy of statements. There are two types of statements: container statements, which contain other statements, and leaf statements, which do not contain other statements. All the container and leaf statements together form the configuration hierarchy.

Configuration that recovers a Services Router from a configuration that denies management access. You set a current committed configuration through the J-Web interface or CLI for emergency use. To load and commit the rescue configuration, you press and release the

CONFIG button.

roll back a configuration

Return to a previously committed configuration.

Configuration Tools Overview

The J-Web interface provides a Quick Configuration tool for basic configuration and a configuration editor for complete configuration. You can also use the JUNOS

CLI configuration mode as a configuration editor to create and modify a complete

configuration hierarchy. For a comparison of configuration interfaces, see Table 35.

This section contains the following topics:

Editing and Committing a Configuration on page 128

J-Web Configuration Options on page 129

CLI Configuration Commands on page 129

Editing and Committing a Configuration

When you edit a configuration, you work in a copy of the current configuration to create a candidate configuration. The changes you make to the candidate configuration are visible through the user interface immediately, but do not take effect on the Services Router until you commit the changes. When you commit the configuration, the candidate file is checked for proper syntax, activated, and marked as the current, operational software configuration file. If multiple users are editing the configuration when you commit the candidate configuration, all changes made by all the users take effect.

If you are editing the configuration with the CLI, you can edit an exclusive

or private candidate configuration. For more information, see “Entering and Exiting Configuration Mode” on page 146.

When you commit a configuration, the Services Router saves the current operational version and the previous 49 versions of committed configurations. The most recently committed configuration is version 0 (the current operational version), and the oldest saved configuration is version 49. You can roll back the configuration to any saved version. Version 0 is stored in the file juniper.conf

, and the last three committed configurations are stored in the files juniper.conf.1.gz

, juniper.conf.2.gz

, and juniper.conf.3.gz

. These four files are located in the

/config directory, and the

128

Configuration Tools Overview

Using J-series Configuration Tools remaining 46 previous versions of committed configurations—files juniper.conf.4.gz

through juniper.conf.49.gz

—are stored in the

/var/db/config directory.

J-Web Configuration Options

You access the J-Web interface configuration tools by selecting Configuration

in the task bar. Table 40 describes the J-Web configuration options.

Table 40: J-Web Configuration Options

Option

Quick

Configuration

Purpose

Basic configuration

View and Edit

History

Rescue

Complete configuration

File management

Configuration recovery

Description

Displays options for quick Services Router configuration—Set Up, SSL, Interfaces, Users,

SNMP, Routing, Firewall/NAT, and IPSec Tunnels.

You can access these options in both the side and

main panes. For more information, see “Using

J-Web Quick Configuration” on page 131.

Displays the configuration editor options—View

Configuration, Edit Configuration, Edit

Configuration Text, and Upload Configuration File.

For more information, see “Using the J-Web

Configuration Editor” on page 132.

Displays the Services Router configuration history and a list of users currently editing the configuration. You can compare, roll back, or download specific versions of the configuration. For

more information, see “Managing Configuration

Files with the J-Web Interface” on page 139.

Displays options for setting the current configuration as the rescue configuration, and for viewing and deleting the rescue configuration.

For more information, see “Setting a Rescue

Configuration” on page 145.

CLI Configuration Commands

The CLI configuration commands allow you to perform the same configuration tasks you can perform using the J-Web interface. Instead of invoking the tools through a graphical interface, you enter configuration mode commands to perform the tasks.

Table 41 provides a summary of the top-level CLI configuration commands.

Table 41: Top-Level CLI Configuration Commands

Command Function

Managing the Configuration and Configuration Files commit Commit the set of configuration changes in the candidate configuration to take operational effect.

Configuration Tools Overview

129

J-series™ Services Router User Guide

Command Function edit exit quit top up load rollback

Load a configuration from an ASCII configuration file or from terminal input.

Return to a previously committed configuration.

save

Save the configuration to an ASCII file.

Modifying the Configuration and Its Statements activate annotate copy deactivate

Activate a previously deactivated statement or identifier.

Add a comment to a statement.

Copy and add a statement to the configuration.

Deactivate a statement or identifier.

delete insert rename set

Delete a statement or identifier from the configuration.

Insert an identifier into an existing hierarchy.

Rename an existing statement or identifier.

Create a statement hierarchy and set identifier values.

Navigating the Configuration Hierarchy

Move inside the specified statement hierarchy.

Exit the current level of the statement hierarchy (same function as quit).

Exit the current level of the statement hierarchy (same function as exit).

Return to the top level of configuration mode.

Move up one level in the statement hierarchy.

Miscellaneous help run show status

Provide help about statements.

Issue an operational mode command without leaving configuration mode.

Display the current configuration.

Display the users currently editing the configuration.

For more information about CLI configuration mode commands, see the JUNOS software configuration guides.

Filtering Configuration Command Output

Certain configuration commands, such as show commands, display output.

You can filter or redirect the output to a file by including a vertical bar (

|

), called a pipe, when you enter the command. For more information, see

“Monitoring and Diagnosing a Services Router” on page 197.

Before You Begin

To use the J-Web interface and CLI configuration tools, you must have the appropriate access privileges. For more information about configuring access privilege levels, see

“Adding New Users” on page 175 and the JUNOS System Basics Configuration Guide.

130

Before You Begin

Using J-series Configuration Tools

Using J-Web Quick Configuration

Use J-Web Quick Configuration to quickly and easily configure the

Services Router for basic operation. To access Quick Configuration, select

Configuration>Quick Configuration. You can select a Quick Configuration option

from either the side pane or the main pane (see Figure 34). To configure the Services

Router using Quick Configuration, see the configuration sections in this manual.

Figure 34: J-Web Quick Configuration Options

Table 42 describes the functions of the buttons that appear in the

J-Web Quick Configuration pages.

Using J-Web Quick Configuration

131

J-series™ Services Router User Guide

Table 42: J-Web Quick Configuration Buttons

Button

Add

Delete

OK

Cancel

Apply

Function

Adds statements or identifiers to the configuration.

Deletes statements or identifiers from the configuration.

Commits your entries into the configuration, and returns you one level up in the configuration hierarchy.

Clears the entries you have not yet applied to the configuration, and returns you one level up in the configuration hierarchy.

Commits your entries into the configuration, and stays at the same level in the configuration hierarchy.

Using the J-Web Configuration Editor

You can use the J-Web configuration editor to perform the following tasks:

Editing and Committing the Clickable Configuration on page 132

Viewing the Configuration Text on page 136

Editing and Committing the Configuration Text on page 137

Uploading a Configuration File on page 138

Editing and Committing the Clickable Configuration

Use the J-Web configuration editor’s clickable interface to perform the following configuration tasks on a Services Router:

Editing the Clickable Configuration on page 132

Discarding Parts of a Candidate Configuration on page 135

Committing a Clickable Configuration on page 136

Editing the Clickable Configuration

To edit the configuration on a series of pages of clickable options that steps you through the hierarchy, select Configuration>View and Edit>Edit Configuration.

The side pane displays the top level of the configured hierarchy, and the main pane

displays configured hierarchy options and the Icon Legend (see Figure 35).

132

Using the J-Web Configuration Editor

Figure 35: Edit Configuration Page (Clickable)

Using J-series Configuration Tools

To expand or hide the hierarchy of all the statements in the side pane, click

Expand all or Hide all. To expand or hide an individual statement in the hierarchy, click the expand (

+

) or collapse (

) icon to the left of the statement.

NOTE: Only those statements included in the committed configuration are displayed in the hierarchy.

The configuration information in the main pane consists of configuration options that correspond to configuration statements. Configuration options that contain subordinate statements are identified by the term Nested configuration .

Using the J-Web Configuration Editor

133

J-series™ Services Router User Guide

To include or edit statements in the candidate configuration, click one of the links

described in Table 43 in the main pane. Then specify configuration information by

typing into a field, selecting a value from a list, or clicking a check box (toggle).

Table 43: J-Web Edit Clickable Configuration Links

Link

Edit

Configure

Add new entry

identifier

Function

Displays information for a configuration option that has already been configured, allowing you to edit a statement.

Displays information for a configuration option that has not been configured, allowing you to include a statement.

Displays fields and drop-down menus for a statement identifier, allowing you to add a new identifier to a statement.

Displays fields and drop-down menus for an existing statement identifier, allowing you to edit the identifier.

As you navigate through the configuration, the hierarchy level is displayed at the top of the main pane. You can click a statement or identifier in the hierarchy to display the corresponding configuration options in the main pane.

The main pane includes icons that display information about statements

and identifiers when you place your cursor over them. Table 44

describes the meaning of these icons.

Table 44: J-Web Edit Clickable Configuration Icons

*

?

Icon

C

I

M

Meaning

Displays a comment about a statement.

Indicates that a statement is inactive.

Indicates that a statement has been added or modified, but has not been committed.

Indicates that the statement or identifier is required in the configuration.

Provides help information.

NOTE: You can annotate statements with comments or make them inactive only

through the CLI. For more information, see “Deactivating a Statement or Identifier” on page 153 and the JUNOS System Basics Configuration Guide.

After typing or selecting your configuration edits, click a button in the main

pane (described in Table 45) to apply your changes or cancel them, refresh

the display, or discard parts of the candidate configuration. An updated configuration does not take effect until you commit it.

134

Using the J-Web Configuration Editor

Using J-series Configuration Tools

Table 45: J-Web Edit Clickable Configuration Buttons

Button

OK

Cancel

Refresh

Commit

Discard

Function

Applies edits to the candidate configuration, and returns you one level up in the configuration hierarchy.

Clears the entries you have not yet applied to the candidate configuration, and returns you one level up in the configuration hierarchy.

Updates the display with any changes to the configuration made by other users.

Verifies edits and applies them to the current configuration file running on

the Services Router. For details, see “Committing a Clickable Configuration” on page 136.

Removes edits applied to, or deletes existing statements or identifiers

from, the candidate configuration. For details, see “Discarding Parts of a

Candidate Configuration” on page 135.

Discarding Parts of a Candidate Configuration

Before committing a candidate configuration, you can discard changes you applied or delete existing statements or identifiers.

To discard parts of a candidate configuration:

1.

2.

Navigate to the level of the hierarchy you want to edit and click Discard.

The main pane displays a list of target statements based on the hierarchy level and the changes you have made.

Select a radio button to specify the appropriate discard operation or deletion.

(Not all buttons appear in all situations.)

Discard Changes Below This Point—Discards changes made to the candidate configuration at the displayed hierarchy level and below. All subordinate statements and identifiers contained within a discarded statement are also discarded.

Discard All Changes—Discards all changes made to the candidate configuration.

Delete Configuration Below This Point—Deletes all changes and statements in the candidate configuration at the displayed hierarchy level and below. All subordinate statements and identifiers contained within a deleted statement are also deleted.

3.

To confirm the discard operation or deletion, click OK.

To cancel a discard operation or deletion, click Cancel.

Using the J-Web Configuration Editor

135

J-series™ Services Router User Guide

The updated candidate configuration does not take effect on the

Services Router until you commit it.

Committing a Clickable Configuration

When you finish making changes to a candidate configuration with the J-Web configuration editor’s clickable interface, you must commit the changes to use them in the current operational software running on the Services Router.

If another user is editing an exclusive candidate configuration with the CLI, you cannot commit a configuration until the user has committed the configuration. To

display a list of users, see “Displaying Users Editing the Configuration” on page

142. For more information about editing an exclusive candidate configuration,

see “Entering and Exiting Configuration Mode” on page 146.

To commit a candidate configuration:

1.

2.

In the J-Web configuration editor’s clickable interface, click Commit.

The main pane displays a summary of your changes in statement form.

To confirm the commit operation, click OK.

To cancel a commit operation, click Cancel.

3.

If multiple users are editing the configuration when you commit the candidate configuration, all changes made by all users take effect.

To display all the edits applied to the running configuration, click Refresh.

Viewing the Configuration Text

To view the entire configuration in text format, select

Configuration>View and Edit>View Configuration Text. The

main pane displays the configuration in text format (see Figure 36).

Each level in the hierarchy is indented to indicate each statement’s relative position in the hierarchy. Each level is generally set off with braces, using an open brace (

{

) at the beginning of each hierarchy level and a closing brace (

}

) at the end. If the statement at a hierarchy level is empty, the braces are not displayed. Each leaf statement ends with a semicolon (

;

), as does the last statement in the hierarchy.

This indented representation is used when the configuration is displayed or saved as an ASCII file. However, when you load an ASCII configuration file, the format of the file is not so strict. The braces and semicolons are required, but the indention and use of new lines are not required in ASCII configuration files.

136

Using the J-Web Configuration Editor

Figure 36: View Configuration Text Page

Using J-series Configuration Tools

Editing and Committing the Configuration Text

To edit the entire configuration in text format:

CAUTION: We recommend that you use this method to edit and commit the configuration only if you have experience editing configurations through the CLI.

1.

Select Configuration>View and Edit>Edit Configuration Text. The main

pane displays the configuration in a text editor (see Figure 37).

2.

For more information about the format of an ASCII configuration file, see

“Viewing the Configuration Text” on page 136.

Navigate to the hierarchy level you want to edit.

Using the J-Web Configuration Editor

137

J-series™ Services Router User Guide

3.

You can edit the candidate configuration using standard text editor operations—insert lines (by using the Enter key), delete lines, and modify, copy, and paste text.

Click OK to load and commit the configuration.

The Services Router checks the configuration for the correct syntax before committing it.

Figure 37: Edit Configuration Text Page

Uploading a Configuration File

To upload a configuration file from your local system:

138

Using the J-Web Configuration Editor

Using J-series Configuration Tools

1.

Select Configuration>View and Edit>Upload Configuration File.

2.

The main pane displays the File to Upload box (see Figure 38).

Specify the name of the file to upload using one of the following methods:

Type the absolute path and filename in the File to Upload box.

Click Browse to navigate to the file.

3.

Click OK to upload and commit the configuration.

The Services Router checks the configuration for the correct syntax before committing it.

Figure 38: J-Web Upload Configuration File Page

Managing Configuration Files with the J-Web Interface

The J-Web interface provides configuration database and history information that allows you to manage configuration files. This section contains the following topics:

Configuration Database and History Overview on page 140

Displaying Users Editing the Configuration on page 142

Managing Configuration Files with the J-Web Interface

139

J-series™ Services Router User Guide

Comparing Configuration Files on page 142

Downloading a Configuration File on page 144

Loading a Previous Configuration File on page 145

Setting a Rescue Configuration on page 145

Configuration Database and History Overview

When you commit a configuration, the Services Router saves the current operational version and the previous 49 versions of committed configurations. To manage these configuration files with the J-Web interface, select Configuration>History. The

main pane displays Database Information and Configuration History (see Figure 39).

Table 46 and Table 47 summarize the contents of the display.

Figure 39: Configuration Database and History Page

140

Managing Configuration Files with the J-Web Interface

Using J-series Configuration Tools

Table 46: J-Web Configuration Database Information Summary

Field

User Name

Start Time

Idle Time

Terminal

PID

Edit Flags

Edit Path

Description

Name of user editing the configuration.

Time of day the user logged in to the Services Router.

Elapsed time since the user issued a configuration command from the CLI.

Terminal on which the user is logged in.

Process identifier assigned to the user by the Services Router.

Designates a private or exclusive edit.

Level of the configuration hierarchy that the user is editing.

Table 47: J-Web Configuration History Summary

Field

Number

Date/Time

User

Client

Comment

Description

Version of the configuration file.

Date and time the configuration was committed.

Name of the user who committed the configuration.

Method by which the configuration was committed: cli—A user entered a JUNOS command-line interface command.

junoscript—A JUNOScript client performed the operation. Commit operations performed by users through the J-Web interface are identified in this way.

snmp—An SNMP set request started the operation.

button—The CONFIG button on the router was pressed to commit the rescue configuration (if set) or to clear all configurations except the factory configuration.

autoinstall—Autoinstallation was performed.

other—Another method was used to commit the configuration.

Comment.

Managing Configuration Files with the J-Web Interface

141

J-series™ Services Router User Guide

Field

Log Message

Action

Description

Method used to edit the configuration:

Imported via paste—Configuration was edited and loaded with the Configuration>View and

Edit>Edit Configuration Text option. For more information, see “Editing and Committing the

Configuration Text” on page 137.

Imported upload [ filename ]—Configuration was uploaded with the Configuration>View and

Edit>Upload Configuration File option. For more information, see “Uploading a Configuration

File” on page 138.

Modified via quick-configuration —Configuration was modified using the J-Web Quick

Configuration tool specified by quick-configuration . For more information, see “Using J-Web

Quick Configuration” on page 131.

Rolled back via user-interface —Configuration was rolled back to a previous version through the user interface specified by user-interface , which can be Web Interface or CLI. For more

information, see “Loading a Previous Configuration File” on page 145.

Action to perform with the configuration file. The action can be Download or Rollback. For more

information, see “Downloading a Configuration File” on page 144 and “Loading a Previous Configuration

File” on page 145.

The configuration history display allows you to perform the following operations:

View a configuration.

Compare two configurations.

Download a configuration file to your local system.

Roll back the configuration to any of the previous versions stored on the

Services Router.

For more information about saved versions of configuration files, see “Editing and Committing a Configuration” on page 128.

Displaying Users Editing the Configuration

To display a list of users editing the Services Router configuration, select

Configuration>History. The list is displayed as Database Information in the main

pane (see Figure 39). Table 46 summarizes the Database Information display.

Comparing Configuration Files

To compare any two of the past 50 committed configuration files:

1.

Select Configuration>History.

A list of the current and previous 49 configurations is displayed as

Configuration History in the main pane (see Figure 39). Table 47 summarizes

the Configuration History display.

142

Managing Configuration Files with the J-Web Interface

Using J-series Configuration Tools

2.

3.

Click two of the check boxes to the left of the configuration versions you want to compare.

Click Compare.

The main pane displays the differences between the two configuration files

at each hierarchy level as follows (see Figure 40):

Lines that have changed are highlighted side by side in green.

Lines that exist only in the more recent configuration file are displayed in red on the left.

Lines that exist only in the least recent configuration file are displayed in blue on the right.

Managing Configuration Files with the J-Web Interface

143

J-series™ Services Router User Guide

Figure 40: J-Web Configuration File Comparison Results

Downloading a Configuration File

To download a configuration file from the Services Router to your local system:

1.

Select Configuration>History.

2.

A list of the current and previous 49 configurations is displayed as

Configuration History in the main pane (see Figure 39). Table 47 summarizes

the Configuration History display.

In the Action column, click Download for the version of the configuration you want to download.

144

Managing Configuration Files with the J-Web Interface

Using J-series Configuration Tools

3.

Select the options your Web browser provides that allow you to save the configuration file to a target directory on your local system.

The file is saved as an ASCII file.

Loading a Previous Configuration File

To download a configuration file from the Services Router to your local system:

To load (roll back) and commit a previous configuration file stored on the Services Router:

1.

2.

Select Configuration>History.

A list of the current and previous 49 configurations is displayed as

Configuration History in the main pane (see Figure 39). Table 47 summarizes

the Configuration History display.

In the Action column, click Rollback for the version of the configuration you want to load.

The main pane displays the results of the rollback operation.

NOTE: When you click Rollback, the Services Router loads and commits the selected configuration. This behavior is different from entering the rollback configuration mode command from the CLI, where the configuration is loaded, but not committed.

Setting a Rescue Configuration

If someone inadvertently commits a configuration that denies management access to the Services Router, you can delete the invalid configuration and replace it with a rescue configuration by pressing the

CONFIG button on the router. You must have previously set the rescue configuration through the J-Web interface or the CLI. The rescue configuration is a previously committed, valid configuration.

CAUTION: Pressing and holding the

CONFIG button for longer than 15 seconds deletes all configurations on the router, including the backup configurations and rescue configuration, and loads and commits the factory configuration.

Managing Configuration Files with the J-Web Interface

145

J-series™ Services Router User Guide

To view, set, or delete the rescue configuration, select Configuration>Rescue. On the Rescue page, you can perform the following tasks:

View the current rescue configuration—Click View rescue configuration.

Set the current running configuration as the rescue configuration—Click

Set rescue configuration.

Delete the current rescue configuration—Click Delete rescue configuration.

Using the CLI Configuration Editor

You can use the CLI configuration editor to perform the following tasks:

Entering and Exiting Configuration Mode on page 146

Navigating the Configuration Hierarchy on page 148

Modifying the Configuration on page 149

Committing a Configuration with the CLI on page 154

Entering Operational Mode Commands During Configuration on page 157

Entering and Exiting Configuration Mode

You must have access privileges to edit the configuration. For more

information, see “Before You Begin” on page 130.

To enter and exit configuration mode:

1.

At the CLI prompt, enter the configure operational mode command.

Select the form of the configure

command (see Table 48) that is appropriate

for the way you want to edit and commit the candidate configuration. For example: user@host> configure user@host#

2.

To display the users currently editing the configuration, enter the status command: user@host# status

Users currently editing the configuration: user1 terminal p1 (pid 66847) on since 2004-04-19 12:32:56 PDT

[edit] user2 terminal p2 (pid 85743) on since 2004-04-19 11:44:06 PDT

[edit interfaces]

146

Using the CLI Configuration Editor

Using J-series Configuration Tools

3.

For each user, the CLI displays the username, terminal, process identifier, login date and time, and hierarchy level being edited. You can specify the terminal and process identifier in the request system logout command.

To exit configuration mode and return to operational mode:

For the top level, enter the following command: user@host# exit

From any level, enter the following command: user@host# exit configuration-mode

For more information about the configure command, including restrictions on entering and exiting the various configuration modes, see the

JUNOS System Basics Configuration Guide.

Table 48: Forms of the configure Command

Command configure configure exclusive configure private

Edit Access Commit Access

No one can lock the configuration. All users can make configuration changes.

No one can lock the configuration. All users can commit all changes to the candidate configuration.

When you enter configuration mode, the

CLI displays the following information:

A list of the other users editing the configuration.

Hierarchy levels the users are viewing or editing.

Whether the configuration has been changed, but not committed.

If you and another user make changes and the other user commits changes, your changes are committed as well.

One user locks the configuration and makes changes without interference from other users.

Other users can enter and exit configuration mode, but they cannot change the configuration.

If you enter configuration mode while another user has locked the configuration, the CLI displays the user and the hierarchy level the user is viewing or editing.

If you enter configuration mode while another user has locked the configuration, you can forcibly log out that user with the request system logout operational mode command. (For details, see the JUNOS Protocols, Class of Service, and System Basics Command Reference.)

Multiple users can edit the configuration at the same time.

Each user has a private candidate configuration to edit independently of other users.

When you commit the configuration, the

Services Router verifies that the operational

(running) configuration has not been modified by another user before accepting your private candidate configuration as the new operational configuration.

If the configuration has been modified by another user, you can merge the modifications into your private candidate configuration and attempt to commit again.

Using the CLI Configuration Editor

147

J-series™ Services Router User Guide

Navigating the Configuration Hierarchy

When you first enter configuration mode, you are at the top level of the configuration command hierarchy, which is indicated by the

[edit] banner.

To move down through an existing configuration command hierarchy, or to create a hierarchy and move down to that level, use the edit command, specifying the hierarchy level at which you want to be: user@host# edit < statement-path > < identifier >

Replace

statement-path

with the hierarchy level and

identifier

with a string that identifies an instance of a statement. (Not all statements require identifiers.) If the identifier contains a space, you must enclose the identifier in quotation marks (” “).

After you enter an edit command, the banner changes to indicate your current level in the hierarchy:

[edit] user@host# edit protocols ospf

[edit protocols ospf] user@host#

To move back up to the previous hierarchy level, enter the exit command. This command is, in effect, the opposite of the edit command. For example:

[edit] user@host# edit protocols ospf

[edit protocols ospf] user@host# edit area 0.0.0.0

[edit protocols ospf area 0.0.0.0] user@host# exit

[edit protocols ospf] user@host# exit

[edit] user@host#

To move up one level, enter the up command. For example:

[edit] user@host# edit protocols ospf area 0.0.0.0

[edit protocols ospf area 0.0.0.0] user@host# up

[edit protocols ospf] user@host# up

[edit protocols] user@host# up

[edit] user@host#

148

Using the CLI Configuration Editor

Using J-series Configuration Tools

To move directly to the top level of the hierarchy, enter the top command. For example:

[edit protocols ospf area 0.0.0.0] user@host# top

[edit] user@host#

To display the configuration, enter the show command: show < statement-path >

The configuration at the current hierarchy level, or at the level specified by

statement-path

, is displayed. For example, entering the show command in each of the following cases displays the same level of the configuration:

}

[edit] user@host# show interfaces fe-0/0/0 unit 0 { family inet { address 192.168.4.1/30;

}

}

[edit] user@host# edit interfaces fe-0/0/0

[edit interfaces fe-0/0/0] user@host# show unit 0 { family inet { address 192.168.4.1/30;

}

Modifying the Configuration

You can modify the configuration by performing the following operations:

Adding or Modifying a Statement or Identifier on page 150

Deleting a Statement or Identifier on page 150

Copying a Statement on page 151

Renaming an Identifier on page 151

Inserting an Identifier on page 152

Deactivating a Statement or Identifier on page 153

Using the CLI Configuration Editor

149

J-series™ Services Router User Guide

Adding or Modifying a Statement or Identifier

To add or modify statements in a configuration, use the set command: set < statement-path > statement < identifier >

Replace

statement-path

with the path to the statement from the current hierarchy level, and

statement

with the statement itself. Replace

identifier

with a string that identifies an instance of a statement. (Not all statements require identifiers.) If the identifier contains a space, you must enclose the identifier in quotation marks (” “).

If the statement or identifier does not exist in the configuration hierarchy, it is added. If the statement or identifier already exists, it is modified (unless multiple occurrences of the same statement or identifier are allowed in the configuration, in which case another instance is added to the configuration). After you enter the set command, you remain at the same level in the hierarchy.

You can enter a single set command from the top level of the hierarchy.

Alternatively, you can enter the edit command to move to the target hierarchy level, from which you can enter the set command. In either case, the CLI creates the hierarchy level if it does not exist. For example, to set the OSPF hello interval from the top level of the hierarchy, enter the set command as follows:

[edit] user@host# set protocols ospf area 0.0.0.0 interface t1-0/0/0 hello-interval 5

Alternatively, use the edit command to create and move to the

[edit protocols ospf area 0.0.0.0 interface t1-0/0/0] hierarchy level, then enter a set command to set the value of the hello-interval statement:

[edit] user@host# edit protocols ospf area 0.0.0.0 interface t1-0/0/0

[edit protocols ospf area 0.0.0.0 interface t1-0/0/0] user@host# set hello-interval 5

Deleting a Statement or Identifier

To delete a statement or identifier from the configuration, enter the delete command: delete < statement-path > < identifier >

When you delete a statement, the statement and all its subordinate statements and identifiers are removed from the configuration and revert to their default values. To delete the entire hierarchy starting at the current level, enter the delete command without specifying a statement or an identifier. You are prompted to confirm the deletion.

As with the set command, you can enter a single delete command from the top level of the hierarchy, or you can use the edit command to move to the target hierarchy level, from which you can enter the delete command.

150

Using the CLI Configuration Editor

Using J-series Configuration Tools

Copying a Statement

To make a copy of an existing statement in the configuration, use the copy command: copy existing-statement to new-statement

The existing statement and all its subordinate statements are copied and added to the configuration. After you enter the copy command, the configuration might not be valid. If necessary, modify the existing statement or the new statement to ensure the configuration is valid.

The following example shows how to copy a unit configured at the

[edit interfaces fe-0/0/0] hierarchy level:

}

[edit interfaces fe-0/0/0] user@host# show unit 0 { family inet { address 10.14.1.1/24;

}

[edit interfaces fe-0/0/0] user@host# copy unit 0 to unit 1

}

[edit interfaces fe-0/0/0] user@host# show unit 0 { family inet { address 10.14.1.1/24;

}

} unit 1 { family inet { address 10.14.1.1/24;

}

In this example, after you enter the copy command, unit

0 and unit

1 have the same IP address in the candidate configuration. To modify the IP address of unit

1 before committing the configuration, use the rename command as

described in “Renaming an Identifier” on page 151.

Renaming an Identifier

There are two ways to rename an identifier that already exists in a configuration:

Delete the identifier with the delete command, then add it back into the configuration with the set command.

Rename the identifier with the rename command: rename < statement-path > identifier1 to identifier2

Using the CLI Configuration Editor

151

J-series™ Services Router User Guide

In the example provided in “Copying a Statement” on page 151, to

rename the IP address of unit

1 from

10.14.1.1/24 to

10.14.2.1/24

, enter the rename command as follows: user@host# rename interfaces fe-0/0/0 unit 1 family inet address 10.14.1.1/24 to address 10.14.2.1/24

Inserting an Identifier

To insert an identifier into a specific location within the configuration, use the insert command: insert < statement-path > identifier1 (before | after) identifier2

Generally, you can add most identifiers into the configuration in any order.

However, when you are inserting identifiers that must be analyzed in order—such as terms in a routing policy or firewall filter—you must specify before or after

. If you do not specify where to insert an identifier with the insert command, the identifier is placed at the end of the list of similar identifiers.

In the following example, the firewall filter terms were added to the configuration in the following order: term1

, term3

, term2

. The insert command is used to insert term2 before term3

.

}

[edit] user@host# show firewall family inet { filter filter1 { term term1 { from { address {

192.168.0.0/16;

}

} then { reject;

}

} term term3 { then { reject;

}

} term term2 { from { destination-port ssh;

} then accept;

}

}

[edit] user@host# insert firewall family inet filter filter1 term term2 before term term3

152

Using the CLI Configuration Editor

Using J-series Configuration Tools

}

[edit] user@host# show firewall family inet { filter filter1 { term term1 { from { address {

192.168.0.0/16;

}

} then { reject;

}

}

} term term2 { from { destination-port ssh;

}

} term term3 { then { then accept; reject;

}

}

Deactivating a Statement or Identifier

You can deactivate a statement or identifier so that it does not take effect when you enter the commit command. Any deactivated statements and identifiers are marked with the inactive: tag and remain in the configuration.

To deactivate a statement or identifier, use the deactivate command: deactivate ( statement | identifier )

To reactivate a statement or identifier, use the reactivate command: reactivate ( statement | identifier )

Reactivate removes the inactive: tag so that a statement or identifier takes effect when you commit the configuration.

In both commands,

statement

or

identifier

must be at the current hierarchy level.

The following example shows how to deactivate interface fe-0/0/0 at the

[edit interfaces] hierarchy level:

[edit interfaces] user@host# deactivate fe-0/0/0

Using the CLI Configuration Editor

153

J-series™ Services Router User Guide

}

[edit interfaces] user@host# show inactive: fe–0/0/0 { unit 0 { family inet { address 10.14.1.1/24;

}

}

Committing a Configuration with the CLI

To save candidate configuration changes to the configuration database and activate the configuration on the Services Router, enter the commit command from any hierarchy level:

[edit] user@host# commit commit complete

If more than one user is modifying the configuration, committing it saves and activates the changes made by all the users.

The Services Router checks the configuration for syntax errors. If the syntax is correct, the configuration is activated and becomes the current, operational configuration running on the Services Router. If the configuration contains syntax errors, the router sends a message indicating the location of the error and does not activate the configuration. The error message has the following format:

[edit edit-path ]

offending-statement ;

error-message

You can specify one or more options within the commit command—or use it with the rollback command—to perform the following operations:

Verifying a Configuration on page 154

Committing a Configuration and Exiting Configuration Mode on page 155

Committing a Configuration That Requires Confirmation on page 155

Scheduling and Canceling a Commit on page 155

Loading a Previous Configuration File on page 156

Verifying a Configuration

To verify that the syntax of a configuration is correct, enter the commit check command:

[edit] user@host# commit check

154

Using the CLI Configuration Editor

Using J-series Configuration Tools configuration check succeeds

If the configuration contains syntax errors, a message indicates the location of the error.

Committing a Configuration and Exiting Configuration Mode

To save candidate configuration changes, activate the configuration on the Services

Router, and exit configuration mode, enter the commit and-quit command:

[edit] user@host# commit and-quit commit complete exiting configuration mode user@host>

If the configuration contains syntax errors, a message indicates the location of the error.

Committing a Configuration That Requires Confirmation

You can commit the current candidate configuration but require an explicit confirmation for the committed configuration to become permanent. This commit process is useful for verifying that a configuration change works correctly and does not prevent management access to the Services Router. If the change prevents access or causes other errors, an automatic rollback to the previous configuration restores access after the rollback confirmation timeout expires.

To commit the current candidate configuration, but require an explicit confirmation for the commit to become permanent, use the commit confirmed command: commit confirmed < minutes >

Replace

minutes

with the number of minutes to allow for the timeout period. The default value is 10 minutes.

To make the new configuration permanent, enter the commit or commit check command within the timeout period specified in the commit confirmed command.

If the commit is not confirmed within the timeout period, the Services Router automatically rolls back to the previous configuration.

If the configuration contains syntax errors, a message indicates the location of the error.

Scheduling and Canceling a Commit

To schedule a candidate configuration for a commit operation at a future time or the next time the Services Router is rebooted, use the commit at command: commit at string

Using the CLI Configuration Editor

155

J-series™ Services Router User Guide

Replace

string

with reboot or the time at which the configuration is to be committed, in one of the following formats:

hh

:

mm

<:

ss

>—Hours, minutes, and seconds (optional), in 24-hour format.

For example,

20:30 is 8:30 PM.

yyyy

-

mm

-

dd hh

:

mm

<:

ss

>—Year, month, date, hours, minutes, and seconds

(optional), in 24-hour format. For example,

2004-09-05 08:00 is September 5,

2004 at 8:00 AM.

The Services Router checks the configuration. If the result of the check is successful, the current user is logged out of configuration mode, and the configuration data is left in a read-only state. No other commit operation can be performed until the scheduled one is completed. If the configuration contains syntax errors, a message indicates the location of the error.

To cancel a pending commit operation, use the clear system commit operational mode command. For more information, see the JUNOS Protocols, Class

of Service, and System Basics Command Reference.

Loading a Previous Configuration File

To load, or roll back , a previous configuration file stored on the Services

Router without activating it, use the rollback command: rollback < string >

Replace

string

with a value from 0 through 49, or rescue

(if a rescue configuration exists). The default value is 0.

When you commit a configuration, the Services Router saves the current operational version and the previous 49 versions of committed configurations.

The most recently committed configuration is version 0 (the current operational version), and the oldest saved configuration is version 49.

If you have defined a rescue configuration (by using the request system configuration rescue save operational mode command), you can roll back to this configuration by entering rollback rescue

. (You can also roll back to the rescue configuration or the default factory configuration by pressing the

CONFIG button on the Services Router.

For more information, see “CONFIG Button and LED” on page 12.)

To set a rescue configuration with the J-Web interface, see “Setting a Rescue Configuration” on page 145.

For more information about saved versions of configuration files, see “Editing and Committing a Configuration” on page 128.

To activate the configuration you loaded, you must commit it:

[edit] user@host# rollback 2 load complete

[edit]

156

Using the CLI Configuration Editor

Using J-series Configuration Tools user@host# commit

To display previous configurations, including the rollback number, date, time, name of the user who committed changes, and commit method, use the rollback ?

command: user@host# rollback ?

Possible completions:

<[Enter]>

0

1

2

...

28 rescue

|

Execute this command

2004-05-27 14:50:05 PDT by root via junoscript

2004-05-27 14:00:14 PDT by root via cli

2004-05-27 13:16:19 PDT by snmpset via snmp

2004-05-21 16:56:25 PDT by root via cli

2004-05-27 14:30:23 PDT by root via cli

Pipe through a command

The access privilege level for using the rollback command is controlled by the rollback permission bit. Users for whom this permission bit is not set can return only to the most recently committed configuration. Users for whom this bit is set can return to any prior committed configuration. For more information, see the JUNOS System Basics Configuration Guide.

Entering Operational Mode Commands During Configuration

While in configuration mode, you might need to enter an operational mode command, such as show or request

. To enter a single operational mode command, first enter the run command and then specify the operational mode command as follows: user@host# run operational-mode-command

For example, to display a pending system reboot while in configuration mode, enter the show system reboot operational mode command as follows:

[edit] user@host# run show system reboot

No shutdown/reboot scheduled.

If you are in operational mode, the show cli history command displays the history of the operational mode commands issued. To display the history of the configuration mode commands issued, enter the show cli history command from configuration mode as follows:

[edit] user@host# run show cli history

15:32:51 -- exit

15:52:02 -- load merge terminal

17:07:57 -- run show ospf statistics

17:09:12 -- exit

17:18:49 -- run show cli history

Using the CLI Configuration Editor

157

J-series™ Services Router User Guide

Managing Configuration Files with the CLI

This section contains the following topics:

Loading a New Configuration File on page 158

Saving a Configuration File on page 160

Loading a New Configuration File

You can create a configuration file, copy the file to the Services Router, and then load the file into the CLI. After you load the file, you can commit it to activate the configuration on the router, or you can edit the configuration interactively with the CLI and commit it at a later time.

You can also create a configuration while typing at the terminal and then load it. Loading a configuration from the terminal is generally useful when you are cutting existing portions of the configuration and pasting them elsewhere in the configuration.

To load an existing configuration file that is located on the router, use the following version of the load command: load (merge | override | patch | replace | update) filename <relative>

To load a configuration from the terminal, use the following version of the load command: load (merge | override | patch | replace | update) terminal <relative>

Use the load

command options provided in Table 49. (The incoming

configuration is the configuration in

filename

or the one that you type at the terminal). For more information about loading a configuration, see the JUNOS System Basics Configuration Guide.

Table 49: Load Configuration File Options

Option merge override patch relative

Function

Combines the current configuration and the incoming configuration. A merge operation is useful when you are adding a new section to an existing configuration. If the existing configuration and the incoming configuration contain conflicting statements, the statements in the incoming configuration override those in the existing configuration.

Discards the current candidate configuration and loads the incoming configuration.

Changes part of the configuration with the incoming configuration and marks only those parts as changed.

Allows you to use the merge, replace, and update options without specifying the full hierarchy level.

158

Managing Configuration Files with the CLI

Using J-series Configuration Tools

Option replace update

Function

Replaces portions of the configuration based on the replace: tags in the incoming configuration. The

Services Router searches for the replace: tags, deletes the existing statements of the same name (if any), and replaces them with the incoming configuration. If no statement of the same name exists in the configuration, the replace operation adds it to the configuration.

If you are performing a replace operation and the incoming configuration does not contain any replace: tags, the replace operation is equivalent to a merge operation. If you are running automated scripts and cannot know in advance whether the scripts need to perform a replace or a merge operation, the scripts can use the replace operation to cover either case.

If you are performing an override or merge operation and the incoming configuration contains replace: tags, the tags are ignored and the override or merge operation is performed.

Replaces only the configuration that has changed. An update operation compares the current configuration to the current candidate configuration, and loads only the changes between these configurations in the incoming configuration.

Figure 41 through Figure 43 show the results of override, replace,

and merge operations.

Figure 41: Loading a Configuration with the Override Operation

Current configuration:

}

}

} interfaces {

Io0 {

unit 0 {

family inet {

address 127.0.0.1;

}

}

}

t1-3/0/0 {

unit 0 {

family inet {

address 204.69.248.181/28:

}

File contents: interfaces { replace:

t1-3/0/0 {

unit 0 {

family inet {

address 10.0.0.1/8;

}

}

}

} load override

New contents:

}

}

}

} interfaces {

t1-3/0/0 {

unit 0 {

family inet {

address 10.0.0.1/8;

Managing Configuration Files with the CLI

159

J-series™ Services Router User Guide

Figure 42: Loading a Configuration with the Replace Operation

Current configuration: inter faces {

Io0 {

unit 0 {

family inet {

address 127.0.0.1;

}

}

}

}

}

}

}

t1-3/0/0 {

unit 0 {

family inet {

address 204.69.248.181/28;

File contents:

}

} inter faces { replace:

t1-3/0/0 {

unit 0 {

family inet {

address 10.0.0.1/8;

}

} load replace

New contents: inter faces {

Io0 {

unit 0 {

family inet {

address 127.0.0.1;

}

}

}

}

}

}

}

t1-3/0/0 {

unit 0 {

family inet {

address 10.0.0.1/8;

Figure 43: Loading a Configuration with the Merge Operation

Current configuration: interfaces {

Io0 {

unit 0 {

family inet {

address 127.0.0.1;

}

}

}

t1-3/0/0 {

unit 0 {

family inet {

address 204.69.248.181/28;

}

}

}

}

File contents:

}

}

} interfaces { replace:

t1-3/0/0 {

unit 0 {

family inet {

address 10.0.0.1/8;

} load merge

New contents: interfaces {

Io0 {

unit 0 {

family inet {

address 127.0.0.1;

}

}

}

}

}

t1-3/0/0 {

unit 0 {

family inet {

address 10.0.0.1/8;

address 204.69.248.181/28;

}

}

Saving a Configuration File

To save your current configuration to an ASCII file, including any uncommitted changes made by you and all users, issue the save command: save filename

By default, the configuration is saved to a file in your home directory. For information about specifying filenames, see the JUNOS System Basics Configuration Guide.

160

Managing Configuration Files with the CLI

Part 4

Managing the Services Router

Managing Users and Operations on page 163

Monitoring and Diagnosing a Services Router on page 197

Configuring SNMP for Network Management on page 241

Managing the Services Router 161

162

Managing the Services Router

Chapter 9

Managing Users and Operations

You can use either J-Web Quick Configuration or a configuration editor to manage system functions, including RADIUS and TACACS+ servers, user login accounts, routine file operations, and system log messages.

This chapter contains the following topics. For more information about system management, see the JUNOS System Basics Configuration Guide.

System Management Terms on page 163

System Management Overview on page 164

Before You Begin on page 168

Managing Users and Files with the J-Web Interface on page 169

Managing Users and Files with a Configuration Editor on page 182

Accessing Remote Devices with the CLI on page 194

System Management Terms

Before performing system management tasks, become familiar with

the terms defined in Table 50.

Table 50: System Management Terms

Term

Remote Authentication Dial-In User Service (RADIUS)

Terminal Access Controller Access Control System Plus

(TACACS+)

Definition

Authentication method for validating users who attempt to access one or more Services Routers by means of telnet.

RADIUS is a multivendor IETF standard whose features are more widely accepted than those of TACACS+ or other proprietary systems. All one-time-password system vendors support RADIUS.

Authentication method for validating users who attempt to access one or more Services Routers by means of telnet.

System Management Terms

163

J-series™ Services Router User Guide

System Management Overview

This section contains the following topics:

System Authentication on page 164

User Accounts on page 164

Login Classes on page 165

Template Accounts on page 167

System Log Files on page 168

System Authentication

The JUNOS software supports three methods of user authentication: local password authentication, Remote Authentication Dial-In User Service (RADIUS), and

Terminal Access Controller Access Control System Plus (TACACS+).

With local password authentication, you configure a password for each user allowed to log into the Services Router.

RADIUS and TACACS+ are authentication methods for validating users who attempt to access the router using telnet. Both are distributed client/server systems—the RADIUS and TACACS+ clients run on the router, and the server runs on a remote network system.

You can configure the router to use RADIUS or TACACS+ authentication, or both, to validate users who attempt to access the router. If you set up both authentication methods, you also can configure which the router will try first.

User Accounts

User accounts provide one way for users to access the Services Router. Users can access the router without accounts if you configured RADIUS or TACACS+ servers,

as described in “Managing Users with Quick Configuration” on page 169 and

“Managing Users and Files with a Configuration Editor” on page 182. After you have

created an account, the router creates a home directory for the user. An account for the user root is always present in the configuration. For information about

configuring the password for the user root, see “Establishing Basic Connectivity” on page 47. For each user account, you can define the following:

Username—Name that identifies the user. It must be unique within the router.

Do not include spaces, colons, or commas in the username.

User’s full name—If the full name contains spaces, enclose it in quotation marks (“ ”). Do not include colons or commas.

User identifier (UID)—Numeric identifier that is associated with the user account name. The identifier must be in the range 100 through 64000 and

164

System Management Overview

Managing Users and Operations

Login Classes

must be unique within the router. If you do not assign a UID to a username, the software assigns one when you commit the configuration, preferring the lowest available number.

User’s access privilege—You can create login classes with specific permission

bits or use one of the default classes listed in Table 52.

Authentication method or methods and passwords that the user can use to access the router—You can use SSH or an MD5 password, or you can enter a plain-text password that the JUNOS software encrypts using MD5-style encryption before entering it in the password database. If you configure the plain-text-password option, you are prompted to enter and confirm the password.

All users who log into the Services Router must be in a login class. With login classes, you define the following:

Access privileges users have when they are logged into the router. For more

information, see “Permission Bits” on page 165.

Commands and statements that users can and cannot specify. For more

information, see “Denying or Allowing Individual Commands” on page 167.

How long a login session can be idle before it times out and the user is logged off.

You can define any number of login classes. You then apply one login class to an individual user account. The software contains a few predefined login classes,

which are listed in Table 52. The predefined login classes cannot be modified.

Permission Bits

Each top-level command-line interface (CLI) command and each configuration statement has an access privilege level associated with it. Users can execute only those commands and configure and view only those statements for which they have access privileges. The access privileges for each login class are

defined by one or more permission bits (see Table 51).

Two forms for the permissions control the individual parts of the configuration:

"Plain" form—Provides read-only capability for that permission type. An example is interface

.

Form that ends in

-control

—Provides read and write capability for that permission type. An example is interface-control

.

System Management Overview

165

J-series™ Services Router User Guide

Table 51: Permission Bits for Login Classes

Permission Bit admin admin-control access access-control all clear configure control field firewall firewall-control floppy interface interface-control maintenance network reset rollback routing routing-control secret secret-control security

Access

Can view user account information in configuration mode and with the show configuration command.

Can view user accounts and configure them (at the [edit system login] hierarchy level).

Can view the access configuration in configuration mode and with the show configuration operational mode command.

Can view and configure access information (at the [edit access] hierarchy level).

Has all permissions.

Can clear (delete) information learned from the network that is stored in various network databases (using the clear commands).

Can enter configuration mode (using the configure command) and commit configurations (using the commit command).

Can perform all control-level operations (all operations configured with the -control permission bits).

Reserved for field (debugging) support.

Can view the firewall filter configuration in configuration mode.

Can view and configure firewall filter information (at the [edit firewall] hierarchy level).

Can read from and write to the removable media.

Can view the interface configuration in configuration mode and with the show configuration operational mode command.

Can view chassis, class of service, groups, forwarding options, and interfaces configuration information. Can configure chassis, class of service, groups, forwarding options, and interfaces (at the [edit] hierarchy).

Can perform system maintenance, including starting a local shell on the router and becoming the superuser in the shell (by issuing the su root command), and can halt and reboot the router (using the request system commands).

Can access the network by entering the ping, ssh, telnet, and traceroute commands.

Can restart software processes using the restart command and can configure whether software processes are enabled or disabled (at the [edit system processes] hierarchy level).

Can use the rollback command to return to a previously committed configuration other than the most recently committed one.

Can view general routing, routing protocol, and routing policy configuration information in configuration and operational modes.

Can view general routing, routing protocol, and routing policy configuration information and configure general routing (at the [edit routing-options] hierarchy level), routing protocols (at the [edit protocols] hierarchy level), and routing policy (at the [edit policy-options] hierarchy level).

Can view passwords and other authentication keys in the configuration.

Can view passwords and other authentication keys in the configuration and can modify them in configuration mode.

Can view security configuration in configuration mode and with the show configuration operational mode command.

166

System Management Overview

Managing Users and Operations

Permission Bit security-control shell snmp snmp-control system system-control trace trace-control view

Access

Can view and configure security information (at the [edit security] hierarchy level).

Can start a local shell on the router by entering the start shell command.

Can view SNMP configuration information in configuration and operational modes.

Can view SNMP configuration information and configure SNMP (at the [edit snmp] hierarchy level).

Can view system-level information in configuration and operational modes.

Can view system-level configuration information and configure it (at the [edit system] hierarchy level).

Can view trace file settings in configuration and operational modes.

Can view trace file settings and configure trace file properties.

Can use various commands to display current systemwide, routing table, and protocol-specific values and statistics.

Table 52: Predefined Login Classes

Login Class operator read-only super-user and superuser unauthorized

Permission Bits Set clear, network, reset, trace, view view all

None

Denying or Allowing Individual Commands

By default, all top-level CLI commands have associated access privilege levels.

Users can execute only those commands and view only those statements for which they have access privileges. For each login class, you can explicitly deny or allow the use of operational and configuration mode commands that are otherwise permitted or not allowed by a permission bit.

Template Accounts

You use local user template accounts when you need different types of templates.

Each template can define a different set of permissions appropriate for the group of users who use that template. These templates are defined locally on the Services

Router and referenced by the TACACS+ and RADIUS authentication servers.

When you configure local user templates and a user logs in, the JUNOS software issues a request to the authentication server to authenticate the user’s login name. If a user is authenticated, the server returns the local username to the router, which then determines whether a local username is specified for that login name ( local-username for TACACS+,

Juniper-Local-User for RADIUS). If

System Management Overview

167

J-series™ Services Router User Guide so, the router selects the appropriate local user template locally configured on the router. If a local user template does not exist for the authenticated user, the router defaults to the remote template.

For more information, see “Setting Up Template Accounts” on page 189.

System Log Files

The JUNOS software generates system log messages (also called syslog messages) to record events that occur on the Services Router, including the following:

Routine operations, such as creation of an Open Shortest Path First (OSPF) protocol adjacency or a user login into the configuration database

Failure and error conditions, such as failure to access a configuration file or unexpected closure of a connection to a child or peer process

Emergency or critical conditions, such as router power-off due to excessive temperature

The JUNOS system logging utility is similar to the UNIX syslogd utility. Each system log message identifies the software process that generated the message and briefly describes the operation or error that occurred.

When you configure system logging, you can direct messages to one or more destinations:

To a named file in a local file system

To the terminal session of one or more specific users (or all users) when they are logged into the router

To the router console

To a remote machine that is running the UNIX syslogd utility

Each system log message belongs to a facility, which is a group of messages that are either generated by the same software process or concern a similar condition or activity (such as authentication attempts).

Reboot requests are recorded to the system log files, which you can view with the show log command. Also, the names of any running processes that are scheduled to be shut down are changed. You can view the process names with the show system processes command.

Before You Begin

Before you perform any system management tasks, you must perform

the initial Services Router configuration described in “Establishing

Basic Connectivity” on page 47.

168

Before You Begin

Managing Users and Operations

Managing Users and Files with the J-Web Interface

This section contains the following topics:

Managing Users with Quick Configuration on page 169

Managing Files with the J-Web Interface on page 177

Managing Users with Quick Configuration

This section contains the following topics:

Adding a RADIUS Server for Authentication on page 169

Adding a TACACS+ Server for Authentication on page 171

Configuring System Authentication on page 173

Adding New Users on page 175

Adding a RADIUS Server for Authentication

You can use the Users Quick Configuration page for RADIUS servers to configure a

RADIUS server for system authentication. This Quick Configuration page allows you to specify the IP address and secret (password) of the RADIUS server.

Figure 44 shows the Users Quick Configuration page for RADIUS servers.

Managing Users and Files with the J-Web Interface

169

J-series™ Services Router User Guide

Figure 44: Users Quick Configuration Page for RADIUS Servers

To configure a RADIUS server with Quick Configuration:

1.

In the J-Web interface, select Configuration>Quick Configuration>Users.

2.

3.

4.

Under RADIUS servers, click Add to configure a RADIUS server.

Enter information into the Users Quick Configuration page for RADIUS servers,

as described in Table 53.

Click one of the following buttons on the Users Quick Configuration page for RADIUS servers:

To apply the configuration and return to the Users Quick Configuration page, click OK.

To cancel your entries and return to the Users Quick Configuration page, click Cancel.

170

Managing Users and Files with the J-Web Interface

Managing Users and Operations

Table 53: Users Quick Configuration for RADIUS Servers Summary

Field

RADIUS Server

RADIUS Server Address (required)

Function Your Action

RADIUS Server Secret (required)

Verify RADIUS Server Secret (required)

Identifies the IP address of the RADIUS server.

The secret (password) of the RADIUS server.

Verifies the secret (password) of the

RADIUS server is entered correctly.

Type the RADIUS server’s 32-bit IP address, in dotted decimal notation.

Type the secret (password) of the

RADIUS server. Secrets can contain spaces. The secret used must match that used by the RADIUS server.

Retype the secret of the RADIUS server.

Adding a TACACS+ Server for Authentication

You can use the Users Quick Configuration page for TACACS+ servers to configure a TACACS+ server for system authentication. This Quick Configuration page allows you to specify the IP address and secret of the TACACS+ server.

Figure 45 shows the Users Quick Configuration page for TACACS+ servers.

Managing Users and Files with the J-Web Interface

171

J-series™ Services Router User Guide

Figure 45: Users Quick Configuration Page for TACACS+ Servers

To configure a TACACS+ server with Quick Configuration:

1.

2.

3.

4.

In the J-Web interface, select Configuration>Quick Configuration>Users.

Under TACACS+ servers, click Add to configure a TACACS+ server.

Enter information into the Users Quick Configuration page for TACACS+

servers, as described in Table 54.

Click one of the following buttons on the Users Quick Configuration page for

TACACS+ servers:

To apply the configuration and return to the Users Quick Configuration page, click OK.

To cancel your entries and return to the Users Quick Configuration page, click Cancel.

172

Managing Users and Files with the J-Web Interface

Managing Users and Operations

Table 54: Users Quick Configuration for TACACS+ Servers Summary

Field

TACACS+ Server

TACACS+ Server Address (required)

Function Your Action

TACACS+ Server Secret (required)

Verify TACACS+ Server Secret (required)

Identifies the IP address of the TACACS+ server.

The secret (password) of the TACACS+ server.

Verifies the secret (password) of the

TACACS+ server is entered correctly.

Type the TACACS+ server’s 32-bit IP address, in dotted decimal notation.

Type the secret (password) of the

TACACS+ server. Secrets can contain spaces. The secret used must match that used by the TACACS+ server.

Retype the secret of the TACACS+ server.

Configuring System Authentication

On the Users Quick Configuration page, you can configure the authentication methods the Services Router uses to verify that a user can gain access. For each login attempt, the router tries the authentication methods in order, starting with the first one, until the password matches.

If you do not configure system authentication, users are verified based on their configured local passwords.

Figure 46 shows the Users Quick Configuration page.

Managing Users and Files with the J-Web Interface

173

J-series™ Services Router User Guide

Figure 46: Users Quick Configuration Page

To configure system authentication with Quick Configuration:

1.

2.

In the J-Web interface, select Configuration>Quick Configuration>Users.

Under Authentication Servers, select the check box next to each authentication method the router must use when users log in:

RADIUS

TACACS+

Local Password

174

Managing Users and Files with the J-Web Interface

Managing Users and Operations

3.

Click one of the following buttons on the Users Quick Configuration page:

To apply the configuration and stay in the Users Quick Configuration page, click Apply.

To apply the configuration and return to the Quick Configuration page, click OK.

To cancel your entries and return to the Quick Configuration page, click Cancel.

Adding New Users

You can use the Users Quick Configuration page for user information to add new users to a Services Router. For each account, you define a login name and password for the user and specify a login class for access privileges.

Figure 47 shows the Quick Configuration page for adding a user.

Figure 47: Add a User Quick Configuration Page

Managing Users and Files with the J-Web Interface

175

J-series™ Services Router User Guide

To configure users with Quick Configuration:

1.

2.

3.

4.

In the J-Web interface, select Configuration>Quick Configuration>Users.

Under Users, click Add to add a new user.

Enter information into the Add a User Quick Configuration page, as described

in Table 55.

Click one of the following buttons on the Add a User Quick Configuration page:

To apply the configuration and return to the Users Quick Configuration page, click OK.

To cancel your entries and return to the Users Quick Configuration page, click Cancel.

Table 55: Add a User Quick Configuration Page Summary

Function Field

User Information

Username (required)

Full Name

Login Class (required)

Name that identifies the user.

The user’s full name.

Defines the user’s access privilege.

Your Action

Type the username. It must be unique within the router. Do not include spaces, colons, or commas in the username.

Type the user’s full name. If the full name contains spaces, enclose it in quotation marks. Do not include colons or commas.

From the drop-down list, select the user’s login class:

operator read-only super-user/superuser unauthorized

This list also includes any user-defined login classes. For more information, see

“Login Classes” on page 165.

176

Managing Users and Files with the J-Web Interface

Managing Users and Operations

Field

Login Password (required)

Verify Login Password (required)

Function

The login password for this user.

Your Action

Type the login password for this user.

The login password must meet the following criteria:

The password must be at least

6 characters long.

You can include most character classes in a password

(alphabetic, numeric, and special characters), except control characters.

The password must contain at least one change of case or character class.

Verifies the login password for this user.

Retype the login password for this user.

Managing Files with the J-Web Interface

This section contains the following topics:

Cleaning Up Files on page 177

Downloading Files on page 179

Deleting Files on page 180

Cleaning Up Files

You can use the J-Web interface to rotate and delete files on the Services

Router. If you are running low on storage space, the file cleanup procedure quickly identifies files that can be deleted.

The file cleanup procedure performs the following tasks:

Rotates log files—All information in the current log files is archived, and fresh log files are created.

Deletes log files in

/cf/var/log

—Any files that are not currently being written to are deleted.

Deletes temporary files in

/cf/var/tmp

—Any files that have not been accessed within two days are deleted.

Deletes all crash files in

/cf/var/crash

—Any core files that the router has written during an error are deleted.

Figure 48 shows the Clean Up Files page.

Managing Users and Files with the J-Web Interface

177

J-series™ Services Router User Guide

Figure 48: Clean Up Files Page

To rotate and delete files with the J-Web interface:

1.

2.

3.

4.

In the J-Web interface, select Manage>Files.

In the Clean Up Files section, click Clean Up Files. The router rotates log files and identifies the files that can be safely deleted.

The J-Web interface displays the files that you can delete and the amount of space that will be freed on the file system.

Click one of the following buttons on the confirmation page:

To delete the files and return to the Files page, click OK.

178

Managing Users and Files with the J-Web Interface

Managing Users and Operations

To cancel your entries and return to the list of files in the directory, click Cancel.

Downloading Files

You can use the J-Web interface to download a copy of an individual file from the

Services Router. When you download a file, it is not deleted from the file system.

Figure 49 shows the J-Web page from which you can download log files.

Figure 49: Log Files Page (Download)

To download files with the J-Web interface:

Managing Users and Files with the J-Web Interface

179

J-series™ Services Router User Guide

1.

In the J-Web interface, select Manage>Files.

2.

In the Download and Delete Files section, click one of the following file types:

Log Files—Lists the log files located in the

/cf/var/log directory on the router.

Temporary Files—Lists the temporary files located in the

/cf/var/tmp directory on the router.

Crash (Core) Files—Lists the core files located in the

/cf/var/crash directory on the router.

3.

4.

5.

The J-Web interface displays the files located in the directory.

To download an individual file, click Download.

Choose a location for the browser to save the file.

6.

The file is saved as a text file, with a

.txt

file extension.

To view the file, open it with a text editor.

Deleting Files

You can use the J-Web interface to delete an individual file from the Services Router.

When you delete the file, it is permanently removed from the file system.

CAUTION: If you are unsure whether to delete a file from the router, we recommend

using the Cleanup Files tool described in “Cleaning Up Files” on page 177. This

tool determines which files can be safely deleted from the file system.

Figure 50 shows the J-Web page on which you confirm the deletion of files.

180

Managing Users and Files with the J-Web Interface

Figure 50: Confirm File Delete Page

Managing Users and Operations

To rotate and delete files with the J-Web interface:

1.

In the J-Web interface, select Manage>Files.

2.

In the Download and Delete Files section, click one of the following file types:

Log Files—Lists the log files located in the

/cf/var/log directory on the router.

Temporary Files—Lists the temporary files located in the

/cf/var/tmp directory on the router.

Crash (Core) Files—Lists the core files located in the

/cf/var/crash directory on the router.

3.

4.

5.

The J-Web interface displays the files located in the directory.

Check the box next to each file you plan to delete.

Click Delete.

The J-Web interface displays the files you can delete and the amount of space that will be freed on the file system.

Managing Users and Files with the J-Web Interface

181

J-series™ Services Router User Guide

6.

Click one of the following buttons on the confirmation page:

To delete the files and return to the Files page, click OK.

To cancel your entries and return to the list of files in the directory, click Cancel.

Managing Users and Files with a Configuration Editor

This section contains the following topics:

Setting Up RADIUS Authentication on page 182

Setting Up TACACS+ Authentication on page 183

Configuring Authentication Order on page 185

Controlling User Access on page 186

Setting Up Template Accounts on page 189

Using System Logs on page 191

Setting Up RADIUS Authentication

To use RADIUS authentication, you must configure at least one RADIUS server.

The procedure provided in this section identifies the RADIUS server, specifies the secret (password) of the RADIUS server, and sets the source address of the Services Router’s RADIUS requests to the loopback address of the router. The procedure uses the following sample values:

The RADIUS server’s IP address is

172.16.98.1

.

The RADIUS server’s secret is

Radiussecret1

.

The loopback address of the router is

10.0.0.1

.

2.

3.

To configure RADIUS authentication:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 56.

If you are finished configuring the network, commit the configuration.

4.

To completely set up RADIUS authentication, you must create user template accounts and specify a system authentication order.

Go on to one of the following procedures:

182

Managing Users and Files with a Configuration Editor

Managing Users and Operations

To specify a system authentication order, see “Configuring Authentication

Order” on page 185.

To configure a remote user template account, see “Creating a Remote

Template Account” on page 189.

To configure local user template accounts, see “Creating a Local Template

Account” on page 190.

Table 56: Setting Up RADIUS Authentication

Task

Navigate to the System level in the configuration hierarchy.

Add a new RADIUS server

Specify the shared secret (password) of the RADIUS server. The secret is stored as an encrypted value in the configuration database.

Specify the source address to be included in the RADIUS server requests by the router. In most cases, you can use the loopback address of the router.

J-Web Configuration Editor

In the configuration editor hierarchy, select System.

1.

In the Radius server box, click Add

new entry.

2.

In the Address box, type the IP address of the RADIUS server: edit system

Set the IP address of the RADIUS server: set radius-server address 172.16.98.1

172.16.98.1

In the Secret box, type the shared secret of the RADIUS server:

Set the shared secret of the RADIUS server:

Radiussecret1

CLI Configuration Editor

From the top of the configuration hierarchy enter

In the Source address box, type the loopback address of the router:

10.0.0.1

set radius-server 172.16.98.1 secret

Radiussecret1

Set the router’s loopback address as the source address: set radius-server 172.16.98.1

source-address 10.0.0.1

Setting Up TACACS+ Authentication

To use TACACS+ authentication, you must configure at least one TACACS+ server.

The procedure provided in this section identifies the TACACS+ server, specifies the secret (password) of the TACACS+ server, and sets the source address of the Services Router’s TACACS+ requests to the loopback address of the router. This procedure uses the following sample values:

The TACACS+ server’s IP address is

172.16.98.24

.

The TACACS+ server’s secret is

Tacacssecret1

.

The loopback address of the router is

10.0.0.1

.

Managing Users and Files with a Configuration Editor

183

J-series™ Services Router User Guide

To configure TACACS+ authentication:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

2.

3.

Perform the configuration tasks described in Table 57.

If you are finished configuring the network, commit the configuration.

To completely set up TACACS+ authentication, you must create user template accounts and specify a system authentication order.

4.

Go on to one of the following procedures:

To specify a system authentication order, see “Configuring Authentication

Order” on page 185.

To configure a remote user template account, see “Creating a Remote

Template Account” on page 189.

To configure local user template accounts, see “Creating a Local Template

Account” on page 190.

Table 57: Setting Up TACACS+ Authentication

Task

Navigate to the System level in the configuration hierarchy.

Add a new TACACS+ server

J-Web Configuration Editor

In the configuration editor hierarchy, select System.

CLI Configuration Editor

From the top of the configuration hierarchy enter

1.

In the Tacplus server box, click Add

new entry.

edit system

Set the IP address of the TACACS+ server:

2.

In the Address box, type the IP address of the TACACS+ server: set tacplus-server address

172.16.98.24

Specify the shared secret (password) of the TACACS+ server. The secret is stored as an encrypted value in the configuration database.

Specify the source address to be included in the TACACS+ server requests by the router. In most cases, you can use the loopback address of the router.

172.16.98.24

In the Secret box, type the shared secret of the TACACS+ server:

Tacacssecret1

Set the shared secret of the TACACS+ server:

In the Source address box, type the loopback address of the router:

10.0.0.1

set tacplus-server 172.16.98.24

secret Tacacssecret1

Set the router’s loopback address as the source address: set tacplus-server 172.16.98.24

source-address 10.0.0.1

184

Managing Users and Files with a Configuration Editor

Managing Users and Operations

Configuring Authentication Order

The procedure provided in this section configures the Services Router to attempt user authentication with the local password first, then with the

RADIUS server, and finally with the TACACS+ server.

To configure authentication order:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

2.

3.

Perform the configuration tasks described in Table 58.

If you are finished configuring the network, commit the configuration.

To completely set up RADIUS or TACACS+ authentication, you must configure at least one RADIUS or TACACS+ server and create user template accounts.

4.

Go on to one of the following procedures:

To configure a RADIUS server, see “Setting Up RADIUS Authentication” on page 182.

To configure a TACACS+ server, see “Setting Up TACACS+ Authentication” on page 183.

To configure a remote user template account, see “Creating a Remote

Template Account” on page 189.

To configure local user template accounts, see “Creating a Local Template

Account” on page 190.

Table 58: Configuring Authentication Order

Task

Navigate to the System level in the configuration hierarchy.

Add RADIUS authentication to the authentication order.

Add TACACS+ authentication to the authentication order.

J-Web Configuration Editor

In the configuration editor hierarchy, select System.

CLI Configuration Editor

From the top of the configuration hierarchy enter edit system

Insert the radius statement in the authentication order:

1.

In the Authentication order box, click Add new entry.

2.

In the drop-down list, select radius.

3.

Click OK.

1.

In the Authentication Order box, click Add new entry.

2.

In the drop-down list, select

tacplus.

insert system authentication-order radius after password

Insert the tacplus statement in the authentication order: insert system authentication-order tacplus after radius

3.

Click OK.

Managing Users and Files with a Configuration Editor

185

J-series™ Services Router User Guide

Controlling User Access

This section contains the following topics:

Defining Login Classes on page 186

Creating User Accounts on page 188

Defining Login Classes

You can define any number of login classes. You then apply one login class

to an individual user account, as described in “Creating User Accounts” on

page 188 and “Setting Up Template Accounts” on page 189.

The procedure provided in this section creates a sample login class named operator-and-boot with the following privileges:

The operator-and-boot login class can reboot the Services Router using the request system reboot command.

The operator-and-boot login class can also use commands defined in the clear

, network

, reset

, trace

, and view permission bits. For more information, see

“Permission Bits” on page 165.

To define login classes:

2.

3.

4.

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 59.

If you are finished configuring the network, commit the configuration.

Go on to one of the following procedures:

To create user accounts, see “Creating User Accounts” on page 188.

To create shared user accounts, see “Setting Up Template Accounts” on page 189.

Table 59: Defining Login Classes

Task

Navigate to the System Login level in the configuration hierarchy.

J-Web Configuration Editor

In the configuration editor hierarchy, select System>Login.

CLI Configuration Editor

From the top of the configuration hierarchy enter edit system login

186

Managing Users and Files with a Configuration Editor

Managing Users and Operations

Task

Create a login class named operator-and-boot with the ability to reboot the router.

Give the operator-and-boot login class operator privileges.

J-Web Configuration Editor

1.

Next to Class, click Add new entry.

2.

Type the name of the login class:

CLI Configuration Editor

Set the name of the login class and the ability to use the request system reboot command: operator-and-boot set class operator-and-boot allow-commands “request system reboot”

3.

In the Allow commands box, type the request system reboot command enclosed in quotation marks:

“request system reboot”

4.

Click OK.

1.

Next to Permissions, click Add new

entry.

Set the permission bits for the operator-and-boot login class:

2.

In the Value drop-down list, select

clear.

set class operator-and-boot permissions [clear network reset trace view]

3.

Click OK.

4.

Next to Permissions, click Add new

entry.

5.

In the Value drop-down list, select

network.

6.

Click OK.

7.

Next to Permissions, click Add new

entry.

8.

In the Value drop-down list, select

reset.

9.

Click OK.

10.

Next to Permissions, click Add

new entry.

11.

In the Value drop-down list, select

trace.

12.

Click OK.

13.

Next to Permissions, click Add

new entry.

14.

In the Value drop-down list, select

view.

15.

Click OK.

Managing Users and Files with a Configuration Editor

187

J-series™ Services Router User Guide

Creating User Accounts

User accounts provide one way for users to access the Services Router. (Users can access the router without accounts if you configured RADIUS or TACACS+

servers, as described in “Setting Up RADIUS Authentication” on page 182

and “Setting Up TACACS+ Authentication” on page 183.)

The procedure provided in this section creates a sample user named cmartin with the following characteristics:

The user cmartin belongs to the superuser login class.

The user cmartin uses an encrypted password,

$1$14c5.$sBopasdFFdssdfFFdsdfs0

.

To create user accounts:

1.

2.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 60.

3.

If you are finished configuring the network, commit the configuration.

Table 60: Creating User Accounts

Task

Navigate to the System Login level in the configuration hierarchy.

Create a user named cmartin who belongs to the superuser login class.

Define the encrypted password for cmartin.

J-Web Configuration Editor

In the configuration editor hierarchy, select System>Login.

1.

Next to User, click Add new entry.

2.

In the User name box, type cmartin.

3.

In the Class box, type superuser.

4.

Click OK.

1.

Next to Authentication, click

Configure.

2.

In the Encrypted password box, type

$1$14c5.$sBopasdFFdssdfFFdsdfs0

3.

Click OK.

CLI Configuration Editor

From the top of the configuration hierarchy enter edit system login

Set the username and the login class for the user:

set user cmartin class superuser

Set the encrypted password for cmartin.

set user cmartin authentication encrypted-password

$1$14c5.$sBopasdFFdssdfFFdsdfs0

188

Managing Users and Files with a Configuration Editor

Managing Users and Operations

Setting Up Template Accounts

You can create template accounts that are shared by a set of users when you are using RADIUS or TACACS+ authentication. When a user is authenticated by a template account, the CLI username is the login name, and the privileges, file ownership, and effective user ID are inherited from the template account.

This section contains the following topics:

Creating a Remote Template Account on page 189

Creating a Local Template Account on page 190

Creating a Remote Template Account

You can create a remote template that is applied to users authenticated by

RADIUS or TACACS+ that do not belong to a local template account.

By default, the JUNOS software uses the remote template account when

The authenticated user does not exist locally on the Services Router.

The authenticated user’s record in the RADIUS or TACACS+ server specifies local user, or the specified local user does not exist locally on the router.

The procedure provided in this section creates a sample user named remote that belongs to the operator login class.

To create a remote template account:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

2.

3.

4.

Perform the configuration tasks described in Table 61.

If you are finished configuring the network, commit the configuration.

To completely set up RADIUS or TACACS+ authentication, you must configure at least one RADIUS or TACACS+ server and specify a system authentication order.

Go on to one of the following procedures:

To configure a RADIUS server, see “Setting Up RADIUS Authentication” on page 182.

To configure a TACACS+ server, see “Setting Up TACACS+ Authentication” on page 183.

To specify a system authentication order, see “Configuring Authentication

Order” on page 185.

Managing Users and Files with a Configuration Editor

189

J-series™ Services Router User Guide

Table 61: Creating a Remote Template Account

Task

Navigate to the System Login level in the configuration hierarchy.

Create a user named remote who belongs to the operator login class.

J-Web Configuration Editor

In the configuration editor hierarchy, select System>Login.

CLI Configuration Editor

From the top of the configuration hierarchy enter

1.

Next to User, click Add new entry.

2.

In the User name box, type remote.

edit system login

Set the username and the login class for the user: set user remote class operator

3.

In the Class box, type operator.

4.

Click OK.

Creating a Local Template Account

You can create a local template that is applied to users authenticated by RADIUS or

TACACS+ that are assigned to the local template account. You use local template accounts when you need different types of templates. Each template can define a different set of permissions appropriate for the group of users who use that template.

The procedure provided in this section creates a sample user named admin that belongs to the superuser login class.

To create a local template account:

2.

3.

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 62.

If you are finished configuring the network, commit the configuration.

4.

To completely set up RADIUS or TACACS+ authentication, you must configure at least one RADIUS or TACACS+ server and specify a system authentication order

Go on to one of the following procedures:

To configure a RADIUS server, see “Setting Up RADIUS Authentication” on page 182.

To configure a TACACS+ server, see “Setting Up TACACS+ Authentication” on page 183.

To configure a system authentication order, see “Configuring

Authentication Order” on page 185.

190

Managing Users and Files with a Configuration Editor

Managing Users and Operations

Table 62: Creating a Local Template Account

Task

Navigate to the System Login level in the configuration hierarchy.

Create a user named admin who belongs to the superuser login class.

J-Web Configuration Editor

In the configuration editor hierarchy, select System>Login.

1.

Next to User, click Add new entry.

2.

In the User name box, type admin.

3.

In the Class box, type superuser.

4.

Click OK.

CLI Configuration Editor

From the top of the configuration hierarchy enter edit system login

Set the username and the login class for the user: set user admin class superuser

Using System Logs

You can send system logging information to one or more destinations. The destinations can be one or more files, one or more remote hosts, the terminals of one or more users if they are logged in, and the system console.

For each place where you can send system logging information, you specify the class

(facility) of messages to log and the minimum severity level (level) of the message.

Table 63 lists the system logging facilities, and Table 64 lists the system logging

severity levels. For more information about system log messages, see the JUNOS

System Log Messages Reference.

Table 63: System Logging Facilities

Facility any authorization change-log cron daemon interactive-commands kernel user

Description

Any facility

Any authorization attempt

Any change to the configuration

Cron scheduling process

Various system processes

Commands executed in the CLI

Messages generated by the JUNOS kernel

Messages from random user processes

Managing Users and Files with a Configuration Editor

191

J-series™ Services Router User Guide

Table 64: System Logging Severity Levels

Severity Level (from Highest to Lowest Severity) emergency alert critical error warning notice info debug

Description

Panic or other conditions that cause the system to become unusable.

Conditions that must be corrected immediately, such as a corrupted system database.

Critical conditions, such as hard drive errors.

Standard error conditions.

System warning messages.

Conditions that are not error conditions, but that might warrant special handling.

Informational messages. This is the default.

Software debugging messages.

This section contains the following topics:

Sending System Log Messages to a File on page 192

Sending System Log Messages to a User Terminal on page 193

Archiving System Logs on page 194

Disabling System Logs on page 194

Sending System Log Messages to a File

You can direct system log messages to a file on the compact flash drive. The default directory for log files is

/var/log

. To specify a different directory on the compact flash drive, include the complete pathname. For the list of logging

facilities and severity levels, see Table 63 and Table 64.

For information about archiving log files, see “Archiving System Logs” on page 194.

The procedure provided in this section sends all security-related information to the sample file named security

.

To send messages to a file:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

2.

3.

Perform the configuration tasks described in Table 65.

If you are finished configuring the network, commit the configuration.

192

Managing Users and Files with a Configuration Editor

Managing Users and Operations

Table 65: Sending Messages to a File

Task

Navigate to the System Syslog level in the configuration hierarchy.

Create a file named security, and send log messages of the authorization class at the severity level info to the file.

J-Web Configuration Editor

In the configuration editor hierarchy, select System>Syslog.

CLI Configuration Editor

From the top of the configuration hierarchy enter

1.

Next to File, click Add new entry.

2.

In the File name box, type security.

edit system syslog

Set the filename and the facility and severity level: set file security authorization info

3.

Next to Contents, click Add new

entry.

4.

In the Facility drop-down menu, select authorization.

5.

In the Level drop-down menu, select info.

Sending System Log Messages to a User Terminal

To direct system log messages to the terminal session of one or more specific users

(or all users) when they are logged into the local Routing Engine, specify one or more JUNOS usernames. Separate multiple values with spaces, or use the asterisk

(*) to indicate all users who are logged into the local Routing Engine. For the

list of logging facilities and severity levels, see Table 63 and Table 64.

The procedure provided in this section sends send any critical messages to the terminal of the sample user frank

, if he is logged in.

To send messages to a user terminal:

2.

3.

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 66.

If you are finished configuring the network, commit the configuration.

Managing Users and Files with a Configuration Editor

193

J-series™ Services Router User Guide

Table 66: Sending Messages to a User Terminal

Task

Navigate to the System Syslog level in the configuration hierarchy.

Send all critical messages to the user frank.

J-Web Configuration Editor

In the configuration editor hierarchy, select System>Syslog.

1.

Next to User, click Add new entry.

2.

In the User name box, type frank.

3.

Next to Contents, click Add new

entry.

4.

In the Facility drop-down menu, select any.

5.

In the Level drop-down menu, select critical.

CLI Configuration Editor

From the top of the configuration hierarchy enter edit system syslog

Set the filename and the facility and severity level: set user frank any critical

Archiving System Logs

By default, the JUNOS logging utility stops writing messages to a log file when the file reaches 128 KB in size. It closes the file and adds a numerical suffix, then opens and directs messages to a new file with the original name. By default, the logging utility creates up to 10 files before it begins overwriting the contents of the oldest file. The logging utility by default also limits the users who can read log files to the root user and users who have the JUNOS maintenance permission.

To enable all users to read log files, include the world-readable statement at the

[edit system syslog archive] no-world-readable hierarchy level. To restore the default permissions, include the statement. You can include the archive statement at the

[edit system syslog file filename ] hierarchy level to configure the number of files, file size, and permissions for the specified log file. For configuration details, see the information about archiving log files in the JUNOS System Basics Configuration Guide.

Disabling System Logs

To disable logging of the messages from a facility, use the facility none configuration statement. This statement is useful when, for example, you want to log messages of the same severity level from all but a few facilities. Instead of including a configuration statement for each facility you want to log, you can configure the any level statement and then a facility none statement for each facility you do not want to log. For configuration details, see the information about disabling logging in the JUNOS System Basics Configuration Guide.

Accessing Remote Devices with the CLI

This section contains the following topics:

194

Accessing Remote Devices with the CLI

Managing Users and Operations

Using the telnet Command on page 195

Using the ssh Command on page 195

Using the telnet Command

You can use the CLI telnet command to open a telnet session to a remote device: user@host> telnet host <8bit> <bypass-routing> <inet>

<interface interface-name > <no-resolve> <port port >

<routing-instance routing-instance-name > <source address >

To escape from the telnet session to the telnet command prompt, press Ctrl-]. To exit from the telnet session and return to the CLI command prompt, enter quit

.

Table 67 describes the

telnet command options. For more information, see the

JUNOS Protocols, Class of Service, and System Basics Command Reference.

Table 67: CLI telnet Command Options

Option

8bit bypass-routing

host

inet interface source-interface no-resolve port port routing-instance

routing-instance-name

source address

Description

Use an 8-bit data path.

Bypass the routing tables and open a telnet session only to hosts on directly attached interfaces. If the host is not on a directly attached interface, an error message is returned.

Open a telnet session to the specified hostname or IP address.

Force the telnet session to an IPv4 destination.

Open a telnet session to a host on the specified interface. If you do not include this option, all interfaces are used.

Suppress the display of symbolic names.

Specify the port number or service name on the host.

Use the specified routing instance for the telnet session.

Use the specified source address for the telnet session.

Using the ssh Command

You can use the CLI ssh command to use the secure shell (SSH) program to open a connection to a remote device: user@host> ssh host <bypass-routing> <inet>

<interface interface-name > <logical-router logical-router-name >

<routing-instance routing-instance-name > <source address > <v1> <v2>

Table 68 describes the

ssh command options. For more information, see the

JUNOS Protocols, Class of Service, and System Basics Command Reference.

Accessing Remote Devices with the CLI

195

J-series™ Services Router User Guide

Table 68: CLI ssh Command Options

Option bypass-routing

host

inet interface source-interface

Description

Bypass the routing tables and open an SSH connection only to hosts on directly attached interfaces. If the host is not on a directly attached interface, an error message is returned.

Open an SSH connection to the specified hostname or IP address.

Force the SSH connection to an IPv4 destination.

Open an SSH connection to a host on the specified interface. If you do not include this option, all interfaces are used.

Use the specified routing instance for the SSH connection.

routing-instance

routing-instance-name

source address v1 v2

Use the specified source address for the SSH connection.

Force SSH to use version 1 for the connection.

Force SSH to use version 2 for the connection.

196

Accessing Remote Devices with the CLI

Chapter 10

Monitoring and Diagnosing a Services

Router

J-series Services Routers support a suite of J-Web tools and CLI operational mode commands for monitoring and managing system health and performance.

Monitoring tools and commands display the current state of the router. Diagnostic tools and commands test the connectivity and reachability of hosts in the network.

This chapter contains the following topics. For complete descriptions of CLI operational mode commands, see the JUNOS Protocols, Class of Service, and

System Basics Command Reference and the JUNOS Network and Services Interfaces

Command Reference.

Monitoring and Diagnostic Terms on page 197

Monitoring and Diagnostic Tools Overview on page 198

Before You Begin on page 203

Using the Monitoring Tools on page 203

Using J-Web Diagnostic Tools on page 218

Using CLI Diagnostic Commands on page 226

Monitoring and Diagnostic Terms

Before monitoring and diagnosing J-series Services Routers, become

familiar with the terms defined in Table 69.

Table 69: J-series Monitoring and Diagnostic Terms

Term Definition

autonomous system (AS)

Network of nodes that route packets based on a shared map of the network topology stored in their local databases.

Don’t Fragment (DF) bit

Bit in the IP header that instructs routers not to fragment a packet. You might set this bit if the destination host cannot reassemble the packet or if you want to test the path maximum transmission unit (MTU) for a destination host.

Monitoring and Diagnostic Terms

197

J-series™ Services Router User Guide

Term

Internet Control Message

Protocol (ICMP) routing instance loose source routing routing table strict source routing time to live (TTL) type of service (TOS)

Definition

TCP/IP protocol used to send error and information messages.

Collection of routing tables, interfaces, and routing protocol interfaces. The set of interfaces belongs to the routing tables, and the routing protocol parameters control the information in the routing tables.

Option in the IP header used to route a packet based on information supplied by the source. A gateway or host must route the packet using the routers specified by this information, but the packet can use other routers along the way.

Database of routes learned from one or more protocols.

Option in the IP header used to route a packet based on information supplied by the source. A gateway or host must route the packet exactly as specified by this information.

Value (octet) in the IP header that is (usually) decremented by 1 for each hop the packet passes through. If the field reaches zero, the packet is discarded and a corresponding error message is sent to the source of the packet.

Value (octet) in the IP header that defines the service the source host requests, such as the packet’s priority and the preferred delay, throughput, and reliability.

Monitoring and Diagnostic Tools Overview

Use the J-Web Monitor, Manage, and Diagnose options to monitor and diagnose a

Services Router. J-Web results are displayed in the browser.

You can also monitor and diagnose the router with CLI operational mode commands. CLI command output appears on the screen of your console or management device, or you can filter the output to a file.

This section contains the following topics:

Monitoring Tools Overview on page 198

J-Web Diagnostic Tools Overview on page 200

CLI Diagnostic Commands Overview on page 201

Filtering Command Output on page 202

Monitoring Tools Overview

J-Web monitoring tools consist of the options that appear when you select Monitor in the task bar. The Monitor options display diagnostic information about the Services Router.

Alternatively, you can enter show commands from the CLI to display the same information, and often greater detail. CLI show commands display the current configuration and information about interfaces, routing protocols, routing

198

Monitoring and Diagnostic Tools Overview

Monitoring and Diagnosing a Services Router tables, routing policy filters, and the chassis. Use the CLI clear command to clear statistics and protocol database information.

Table 70 describes the function of each J-Web Monitor option and lists

the corresponding CLI show commands.

Table 70: J-Web Monitor Options and CLI show Commands

Monitor Option

System

Chassis

Interfaces

Routing

Function

Displays Services Router system properties, such as the system identification and uptime, users, and resource usage.

For details, see “Monitoring System

Properties” on page 204.

Displays alarm, environment, and hardware information.

For details, see “Monitoring the

Chassis” on page 206.

Hierarchically displays all Services

Router physical and logical interfaces, including state and configuration information.

For details, see “Monitoring the

Interfaces” on page 208.

Displays routing information through the following options:

Route Information—Displays all routes in the routing table, including protocol, state, and parameter information. You can narrow the list of routes displayed by specifying search criteria.

OSPF Information—Displays a summary of OSPF neighbors, interfaces, and statistics.

BGP Information—Displays a summary of BGP routing and neighbor information.

RIP Information—Displays a summary of RIP neighbors and statistics.

For details, see “Monitoring Routing

Information” on page 210.

Corresponding CLI Commands show system uptime show system users show system storage show system processes show chassis alarms show chassis environment show chassis hardware show interfaces terse show interfaces detail show interfaces interface-name

Route information show route terse show route detail

OSPF information show ospf neighbors show ospf interfaces show ospf statistics

BGP information show bgp summary show bgp neighbor

RIP information show rip statistics show rip neighbors

Monitoring and Diagnostic Tools Overview

199

J-series™ Services Router User Guide

Monitor Option

Firewall

IPSec

NAT

Function

Displays firewall and intrusion detection service (IDS) information through the following options:

Stateful Firewall—Displays the stateful firewall configuration.

IDS Information—Displays information about the configured IDS.

For details, see “Monitoring Firewalls

” on page 214.

Displays configured IPSec tunnels and statistics, and IKE security associations.

For details, see “Monitoring IPSec

Tunnels” on page 216.

Displays configured NAT pools.

For details, see “Monitoring NAT

Pools” on page 217.

Corresponding CLI Commands

Stateful firewall information show services stateful-firewall conversations show services stateful-firewall flows

IDS information show services ids destination-table show services ids source-table show services ids pair-table show services ipsec-vpn ipsec statistics show services ipsec-vpn ike security-associations show services nat pool

J-Web Diagnostic Tools Overview

The J-Web diagnostic tools consist of the options that appear when you

select Diagnose and Manage in the task bar. Table 71 describes the

functions of the Diagnose and Manage options.

Table 71: J-Web Interface Diagnose and Manage Options

Option Function

Diagnose Options

Ping Host

Allows you to ping a remote host. You can configure advanced options for the ping operation.

Traceroute

Upgrade

For details, see “Using the J-Web Ping Host Tool” on page 218.

Allows you to trace a route between the Services Router and a remote host. You can configure advanced options for the traceroute operation.

For details, see “Using the J-Web Traceroute Tool” on page 222.

Manage Options

Files

Allows you manage log, temporary, and core files on the Services Router.

For details, see “Managing Files with the J-Web Interface” on page 177.

Allows you to upgrade and manage Services Router software packages.

For details, see “Performing Software Upgrades and Reboots” on page 501.

200

Monitoring and Diagnostic Tools Overview

Monitoring and Diagnosing a Services Router

Option

Licenses

Reboot

Function

Displays a summary of the licenses needed and used for each feature that requires a license. Allows you to add licenses.

For details, see “Managing J-series Licenses with the J-Web Interface” on page 71.

Allows you to reboot the Services Router at a specified time.

For details, see “Rebooting or Halting a Services Router with the J-Web Interface” on page 512.

CLI Diagnostic Commands Overview

The CLI commands available in operational mode allow you to perform the same monitoring, troubleshooting, and management tasks you can perform with the

J-Web interface. Instead of invoking the tools through a graphical interface, you use operational mode commands to perform the tasks.

Because the CLI is a superset of the J-Web interface, you can perform certain tasks only through the CLI. For example, you can use the mtrace command to display trace information about a multicast path from a source to a receiver, which is a feature available only through the CLI.

To view a list of top-level operational mode commands, type a question mark (?)

at the command-line prompt. (See “CLI Operational Mode” on page 119.)

At the top level of operational mode are the broad groups of CLI

diagnostic commands listed in Table 72.

Table 72: CLI Diagnostic Command Summary

Function Command

Controlling the CLI Environment set option

Diagnosis and Troubleshooting clear mtrace

Configures the CLI display.

monitor

Clears statistics and protocol database information.

Traces information about multicast paths from source to receiver.

For details, see “Using mtrace Commands” on page 235.

Performs real-time debugging of various software components, including the routing protocols and interfaces.

For details, see the following sections:

“Using the monitor interface Command” on page 229

“Using the monitor traffic Command” on page 231

“Using the monitor file Command” on page 235

Monitoring and Diagnostic Tools Overview

201

J-series™ Services Router User Guide

Command ping test traceroute

Function

Determines the reachability of a remote network host.

For details, see “Using the ping Command” on page 226.

Tests the configuration and application of policy filters and AS path regular expressions.

Traces the route to a remote network host.

For details, see “Using the traceroute Command” on page 228.

Connecting to Other Network Systems ssh telnet

Opens secure shell connections.

For details, see “Using the ssh Command” on page 195.

Opens telnet sessions to other hosts on the network.

For details, see “Using the telnet Command” on page 195.

Management copy restart option request start configuration quit

Copies files from one location on the Services Router to another, from the router to a remote system, or from a remote system to the router.

Restarts the various JUNOS software processes, including the routing protocol, interface, and SNMP processes.

Performs system-level operations, including stopping and rebooting the Services

Router and loading JUNOS software images.

Exits the CLI and starts a UNIX shell.

Enters configuration mode.

For details, see “CLI Configuration Mode” on page 120.

Exits the CLI and returns to the UNIX shell.

Filtering Command Output

For operational commands that display output, such as the show commands, you can redirect the output into a filter or a file. When you display help about these commands, one of the options listed is

|

, called a pipe, which allows you to filter the command output.

For example, if you enter the show configuration command, the complete

Services Router configuration is displayed on the screen. To limit the display to only those lines of the configuration that contain address

, issue the show configuration command using a pipe into the match filter: user@host> show configuration | match address address-range low 192.168.3.2 high 192.168.3.254; address-range low 192.168.71.71 high 192.168.71.254; address 192.168.71.70/21; address 192.168.2.1/24;

202

Monitoring and Diagnostic Tools Overview

Monitoring and Diagnosing a Services Router address 127.0.0.1/32;

For a complete list of the filters, type a command, followed by the pipe, followed by a question mark (?): user@host> show configuration | ?

Possible completions: compare count display except find hold last match no-more request resolve save trim

Compare configuration changes with prior version

Count occurrences

Show additional kinds of information

Show only text that does not match a pattern

Search for first occurrence of pattern

Hold text without exiting the --More-- prompt

Display end of output only

Show only text that matches a pattern

Don’t paginate output

Make system-level requests

Resolve IP addresses

Save output text to file

Trim specified number of columns from start of line

You can specify complex expressions as an option for the match and except filters.

For more information about command output filtering and creating match expressions, see the JUNOS System Basics Configuration Guide.

NOTE: To filter the output of configuration mode commands, use the filter commands provided for the operational mode commands. In configuration

mode, an additional filter is supported. See “Filtering Configuration Command

Output” on page 130.

Before You Begin

To use the J-Web interface and CLI operational tools, you must have the appropriate access privileges. For more information about configuring access privilege levels, see

“Adding New Users” on page 175 and the JUNOS System Basics Configuration Guide.

Using the Monitoring Tools

This section describes the monitoring tools in detail. It contains the following topics:

Monitoring System Properties on page 204

Monitoring the Chassis on page 206

Monitoring the Interfaces on page 208

Using the Monitoring Tools

203

J-series™ Services Router User Guide

Monitoring Routing Information on page 210

Monitoring Firewalls on page 214

Monitoring IPSec Tunnels on page 216

Monitoring NAT Pools on page 217

Monitoring System Properties

The system properties include everything from the name and IP address of the Services Router to the resource usage on the Routing Engine. To view these system properties, select Monitor>System in the J-Web interface, or enter the following CLI show commands: show system uptime show system users show system storage show system processes

Table 73 summarizes key output fields in system properties displays.

Table 73: Summary of Key System Properties Output Fields

Field Values

System Identification

Serial

Number

JUNOS

Software

Version

Router

Hostname

Router IP

Address

Serial number for the J-series Services Router.

Version of JUNOS software active on the Services

Router.

Hostname of the Services Router, as defined with the set system hostname command.

IP address, in dotted decimal notation, of the Ethernet management port (fe-0/0/0), as defined with the set interfaces fe-0/0/0 command.

Loopback

Addresses

IP address, in dotted decimal notation, of the loopback address, as defined with the set interfaces lo0 command.

Domain

Name

Servers

IP addresses, in dotted decimal notation, of the domain name servers, as defined with the set system name-server command.

Time Zone Time zone of the Services Router, as defined with the set system time-zone command.

System Time

Additional Information

204

Using the Monitoring Tools

Monitoring and Diagnosing a Services Router

Field Values

Current

Time

System

Booted

Time

Protocol

Started

Time

Last

Configured

Time

Current system time, in Coordinated Universal Time

(UTC).

Date and time when the router was last booted and how long it has been running.

Date and time when the routing protocols were last started and how long they have been running.

Date and time when a configuration was last committed. This field also shows the name of the user who issued the last commit command, through either the J-Web interface or the CLI.

Users

User

Username of any user logged in to the Services

Router.

TTY

From

Terminal through which the user is logged in.

System from which the user has logged in. A hyphen indicates that the user is logged in through the console.

Login Time

Time when the user logged in.

Additional Information

This is the LOGIN@ field in show system users command output.

Idle Time

Command

How long the user has been idle.

Processes that the user is running.

This is the WHAT field in show system users command output.

Memory Usage

Total

Memory

Available

Total RAM available on the Services Router.

Total

Memory

Used

Total RAM currently being consumed by processes actively running on the Services Router, displayed both as a quantity of memory and as a percentage of the total RAM on the router.

Process ID

Process identifier.

This is the PID field in show system processes command output.

Process

Owner

Process

Name

Name of the process owner.

Command that is currently running.

Individual processes on the Services Router are listed here. Because each process within JUNOS operates in a protected memory environment, you can diagnose whether a particular process is consuming abnormally high amounts of resources.

If a software process is using too much CPU or memory, you can restart the process by entering the restart command from the CLI.

CPU Usage Percentage of the CPU that is being used by the process.

Using the Monitoring Tools

205

J-series™ Services Router User Guide

Field

Memory

Usage

CPU Usage

Values

Percentage of the installed RAM that is being used by the process.

Total CPU

Used

Sum of CPU usages by all processes, expressed as a percentage of total CPU available.

Process ID

Process identifier.

Additional Information

This is the PID field in show system processes command output.

Process

Owner

Process

Name

Name of the process’ owner.

Command that is currently running.

Individual processes on the Services Router are listed here. Because each process within JUNOS operates in a protected memory environment, you can diagnose whether a particular process is consuming an abnormal amount of resources.

If a software process is using too much CPU or memory, you can restart the process by entering the restart command from the CLI.

CPU Usage

Percentage of the CPU that is being used by the process.

Memory

Usage

Percentage of the installed RAM that is being used by the process.

System Storage

Total Flash

Size

Usable

Flash Size

Total size, in megabytes, of the primary flash device.

Total usable memory, in megabytes, of the primary flash device.

The total usable flash memory is the total memory minus the size of the JUNOS image installed on the

Services Router.

Flash Used Total flash memory used, in megabytes and as a percentage of the total usable flash size, of the primary flash device.

Log Files Total size, in kilobytes, of the log files on the Services

Router.

Temporary

Files

Crash

(Core) Files

Total size, in kilobytes, of the temporary files on the

Services Router.

Total size, in kilobytes, of the core files on the Services

Router.

Database

Files

Total size, in kilobytes, of the configuration database files on the Services Router.

This is the sum of file sizes in the /var/log directory.

This is the sum of the file sizes in the /var/tmp directory.

This is the sum of the file sizes in the /var/crash directory.

This is the sum of the file sizes in the /var/db directory.

Monitoring the Chassis

The chassis properties include the status of any alarms on the Services Router, environment measurements, and a summary of the field-replaceable units (FRUs)

206

Using the Monitoring Tools

Monitoring and Diagnosing a Services Router on the router. To view these chassis properties, select Monitor>Chassis in the J-Web interface, or enter the following CLI show commands: show chassis alarms show chassis environment show chassis hardware

Table 74 summarizes key output fields in chassis displays.

Table 74: Summary of Key Chassis Output Fields

Field Values

Alarm Summary

Alarm Time Date and time alarm was first recorded.

Alarm Class Severity class for this alarm: Minor or Major.

Additional Information

JUNOS has system-defined alarms and configurable alarms. System-defined alarms include FRU detection alarms (power supplies removed, for instance) and environmental alarms. The values for these alarms are defined within JUNOS.

Configurable alarms are set in either of the following ways:

In the J-Web configuration editor, on the

Chassis>Alarm> interface-type page

In the CLI configuration editor, with the alarm statement at the [edit chassis] level of the configuration hierarchy

Alarm

Description

A brief synopsis of the alarm.

Environment Information

Name

Chassis component. For J-series Services Routers, the chassis components are the Routing Engine, flexible PIM concentrator (FPC), and physical interface module (PIM)—identified in the display as a PIC.

Gauge

Status

Status of the temperature gauge on the specified hardware component.

Temperature Temperature of the air flowing past the hardware component.

On Services Routers, an FPC and a PIM are the same physical unit.

Hardware Summary

Name

Chassis component. For J-series Services Routers, the chassis components are the Routing Engine,

FPC, and PIM—identified in the display as a PIC.

Version

Revision level of the specified hardware component.

On Services Routers, an FPC and a PIM are the same physical unit.

Supply the version number when reporting any hardware problems to customer support.

Using the Monitoring Tools

207

J-series™ Services Router User Guide

Field Values

Part

Number

Serial

Number

Part number of the chassis component.

Serial number of the chassis component. The serial number of the backplane is also the serial number of the router chassis.

Description Brief description of the hardware item.

Additional Information

Use this serial number when you need to contact customer support about the router chassis.

For PIMs, the description lists the number and type of the ports on the PIM—identified in the display as a PIC.

Monitoring the Interfaces

The interface information is divided into multiple parts. To view general interface information such as available interfaces, operation states of the interfaces, and descriptions of the configured interfaces, select Monitor>Interfaces in the J-Web interface. To view interface-specific properties such as administrative state or traffic statistics in the J-Web interface, select the interface name on the Interfaces page.

Alternatively, enter the following CLI show commands: show interfaces terse show interfaces detail show interfaces interface-name

Table 75 summarizes key output fields in interfaces displays.

Table 75: Summary of Key Interfaces Output Fields

Field

Admin

State

Values

Interface Summary

Interface

Name

Name of interface.

Oper State

Link state of the interface: Up or Down.

Whether the interface is enabled up (Up) or disabled

(Down).

Additional Information

Click an interface name to see more information about the interface.

The operational state is the physical state of the interface. If the interface is physically operational, even if it is not configured, the operational state is Up.

An operational state of Down indicates a problem with the physical interface.

Interfaces are enabled by default. To disable an interface:

In the J-Web configuration editor, select the Disable check box on the

Interfaces> interfaces-name page.

In the CLI configuration editor, add the disable statement at the [edit interfaces

interfaces-name ] level of the configuration hierarchy

208

Using the Monitoring Tools

Monitoring and Diagnosing a Services Router

Field Values

Description Configured description for the interface.

Interface:

interface-name

State

Link state of the interface: Up or Down.

Additional Information

Admin

State

Whether the interface is enabled up (Up) or disabled

(Down).

The operational state is the physical state of the interface. If the interface is physically operational, even if it is not configured, the operational state is Up.

An operational state of Down indicates a problem with the physical interface.

Interfaces are enabled by default. To disable an interface:

In the J-Web configuration editor, select the Disable check box on the

Interfaces> interfaces-name page.

In the CLI configuration editor, add the disable statement at the [edit interfaces

interfaces-name ] level of the configuration hierarchy

MTU

Speed

Current

Address

Hardware

Address

Last

Flapped

Active

Alarms

Maximum transmission unit (MTU) size on the physical interface.

Speed at which the interface is running.

Configured media access control (MAC) address.

Hardware MAC address.

Date, time, and how long ago the interface changed state from Down to Up.

List of any active alarms on the interface.

Configure alarms on interfaces as follows:

In the J-Web configuration editor, on the

Chassis>Alarm> interface-type page

In the CLI configuration editor, with the alarm statement at the [edit chassis] level of the configuration hierarchy

Traffic

Statistics

Number of packets and bytes received and transmitted on the physical interface.

Input Errors Input errors on the interface. (See the following rows of this table for specific error types.)

Drops

Number of packets dropped by the output queue.

If the interface is saturated, this number increments once for every packet that is dropped by the Services

Router’s random early detection (RED) mechanism.

Framing errors

Policed discards

Sum of ATM Adaptation Layer (AAL5) packets that have frame check sequence (FCS) errors, AAL5 packets that have reassembly timeout errors, and

AAL5 packets that have length errors.

Number of packets dropped as a result of routing policies configured on the interface.

Using the Monitoring Tools

209

J-series™ Services Router User Guide

Monitoring Routing Information

Routing information is divided into multiple parts:

To view the inet.0

(IPv4) routing table in the J-Web interface, select

Monitor>Routing>Route Information, or enter the following CLI commands: show route terse show route detail

To view BGP routing information, select Monitor>Routing>BGP Information, or enter the following CLI commands: show bgp summary show bgp neighbor

To view OSPF routing information, select Monitor>Routing>OSPF

Information, or enter the following CLI commands: show ospf neighbors show ospf interfaces show ospf statistics

To view RIP routing information, select Monitor>Routing>RIP Information, or enter the following CLI commands: show rip statistics show rip neighbors

Table 76 summarizes key output fields in routing displays.

Table 76: Summary of Key Routing Output Fields

Field Values

Route Information

n

destinations

Number of destinations for which there are routes in the routing table.

Additional Information

210

Using the Monitoring Tools

Monitoring and Diagnosing a Services Router

Field

n routes

Values

Number of routes in the routing table: active—Number of routes that are active.

holddown—Number of routes that are in hold-down state (neither advertised nor updated) before being declared inactive.

hidden—Number of routes not used because of routing policies configured on the Services

Router.

Destination Destination address of the route.

Additional Information

Protocol/

Preference

Next-Hop

Protocol from which the route was learned: Static,

Direct, Local, or the name of a particular protocol.

The preference is the individual preference value for the route.

Network layer address of the directly reachable neighboring system (if applicable) and the interface used to reach it.

The route preference is used as one of the route selection criteria.

If a next hop is listed as Discard, all traffic with that destination address is discarded rather than routed.

This value generally means that the route is a static route for which the discard attribute has been set.

If a next hop is listed as Reject, all traffic with that destination address is rejected. This value generally means that the address is unreachable. For example, if the address is a configured interface address and the interface is unavailable, traffic bound for that address is rejected.

If a next hop is listed as Local, the destination is an address on the host (either the loopback address or the Ethernet management port address, for example).

Age

State

How long the route has been known.

Flags for this route.

There are many possible flags. For a complete description, see the JUNOS Protocols, Class of Service,

and System Basics Command Reference.

AS Path AS path through which the route was learned. The letters of the AS path indicate the path origin:

I — IGP.

E — EGP.

? — Incomplete. Typically, the AS path was aggregated.

BGP Summary

Groups

Number of BGP groups.

Peers

Number of BGP peers.

Using the Monitoring Tools

211

J-series™ Services Router User Guide

Field

Down

Peers

Peer

InPkt

OutPkt

Flaps

Values

Number of unavailable BGP peers.

Additional Information

Last

Up/Down

State

Address of each BGP peer.

Number of packets received from the peer,

Number of packets sent to the peer.

Number of times a BGP session has changed state from Down to Up.

Last time that a session became available or unavailable, since the neighbor transitioned to or from the established state.

A multipurpose field that displays information about

BGP peer sessions. The contents of this field depend upon whether a session is established.

A high number of flaps might indicate a problem with the interface on which the BGP session is enabled.

If the BGP session is unavailable, this time might be useful in determining when the problem occurred.

If a peer is not established, the field shows the state of the peer session: Active, Connect, or Idle.

If a BGP session is established, the field shows the number of active, received, and damped routes that are received from a neighbor. For example, 2/4/0 indicates two active routes, four received routes, and no damped routes.

BGP Neighbors

Peer

Address of the BGP neighbor.

AS

Type

AS number of the peer.

Type of peer: Internal or External.

State Current state of the BGP session:

Active—BGP is initiating a TCP connection in an attempt to connect to a peer. If the connection is successful, BGP sends an open message.

Generally, the most common states are Active, which indicates a problem establishing the BGP conenction, and Established, which indicates a successful session setup. The other states are transition states, and BGP sessions normally do not stay in those states for extended periods of time.

Connect—BGP is waiting for the TCP connection to become complete.

Established—The BGP session has been established, and the peers are exchanging

BGP update messages.

Idle—This is the first stage of a connection.

BGP is waiting for a Start event.

OpenConfirm—BGP has acknowledged receipt of an open message from the peer and is waiting to receive a keepalive or notification message.

OpenSent—BGP has sent an open message and is waiting to receive an open message from the peer.

212

Using the Monitoring Tools

Monitoring and Diagnosing a Services Router

Field Values

Export

Import

Names of any export policies configured on the peer.

Names of any import policies configured on the peer.

Number of flaps

Number of times the BGP sessions has changed state from Down to Up.

OSPF Neighbors

Address

Interface

State

Address of the neighbor.

Interface through which the neighbor is reachable.

State of the neighbor: Attempt, Down, Exchange,

ExStart, Full, Init, Loading, or 2way.

Additional Information

A high number of flaps might indicate a problem with the interface on which the session is established.

Generally, only the Down state, indicating a failed

OSPF adjacency, and the Full state, indicating a functional adjacency, are maintained for more than a few seconds. The other states are transitional states that a neighbor is in only briefly while an OSPF adjacency is being established.

ID

Priority

Router ID of the neighbor.

Priority of the neighbor to become the designated router.

Dead Number of seconds until the neighbor becomes unreachable.

OSPF Interfaces

Interface

State

Name of the interface running OSPF.

State of the interface: BDR, Down, DR, DRother, Loop,

PtToPt, or Waiting.

The Down state, indicating that the interface is not functioning, and PtToPt state, indicating that a point-to-point connection has been established, are the most common states.

Area

DR ID

BDR ID

Number of the area that the interface is in.

Address of the area’s designated router.

Address of the area’s backup designated router.

Nbrs Number of neighbors on this interface.

OSPF Statistics

Packet

Type

Total

Sent/Total

Received

Last 5 seconds

Sent/Last

5 seconds

Received

Receive errors

RIP Statistics

Type of OSPF packet.

Total number of packets sent and received.

Total number of packets sent and received in the last

5 seconds.

Number and type of receive errors.

Using the Monitoring Tools

213

J-series™ Services Router User Guide

Field Values

Rip info Information about RIP on the specified interface, including UDP port number, hold-down interval

(during which routes are neither advertised nor updated), and timeout interval.

Logical interface

Routes learned

Routes advertised

RIP Neighbors

Name of the logical interface on which RIP is configured.

Number of RIP routes learned on the logical interface.

Number of RIP routes advertised on the logical interface.

Neighbor Name of the RIP neighbor.

Additional Information

This value is the name of the interface on which RIP is enabled. The name is set in either of the following ways:

In the J-Web configuration editor, on the Protocols>RIP>Group>

group-name >Neighbor page

In the CLI configuration editor, with the neighbor neighbor-name statement at the

[edit protocols rip group group-name ] level of the configuration hierarchy

State

Source

Address

Destination

Address

In Met

State of the RIP connection: Up or Dn (Down).

Local source address.

Destination address.

Value of the incoming metric configured for the RIP neighbor.

This value is the configured address of the interface on which RIP is enabled.

This value is the configured address of the immediate

RIP adjacency.

Monitoring Firewalls

Firewall information is divided into multiple parts:

To view stateful firewall information in the J-Web interface, select

Monitor>Firewall>Stateful Firewall. To display firewall information for a particular address prefix, port, or other characteristic, type or select information in one or more of the Narrow Search boxes, and click OK.

214

Using the Monitoring Tools

Monitoring and Diagnosing a Services Router

Alternatively, enter the following CLI show commands: show services stateful-firewall conversations show services stateful-firewall flows

To view intrusion detection service (IDS) information, select

Monitor>Firewall>IDS Information. Click one of the following criteria to order the display accordingly:

Bytes (received bytes)

Packets (received packets)

Flows

Anomalies

To limit the display of IDS information, type or select information in one or

more of the Narrow Search boxes listed in Table 77, and click OK.

Table 77: IDS Search-Narrowing Characteristics

Narrow Search Box

Destination Address

IDS Table

Entry or Selection

Type a destination address prefix to display IDS information for only that prefix.

Select one of the following:

Destination—Displays information for an address under attack.

Pair—Displays information for a suspected attack source and destination pair.

Source—Displays information for an address that is a suspected attacker.

Select a number between 25 and 500 to display only a particular number of entries.

Number of IDS Entries to

Display

Threshold

Service Set

Type a number to display events with only that number of bytes, packets, flows, or anomalies—whichever you selected to order the display. For example, to display all events with more than 100 flows, click Flows and then type 100 in the Threshold box.

Select a service set to display information for only the set.

Alternatively, enter the following CLI show commands: show services ids destination-table show services ids source-table show services ids pair-table

Table 78 summarizes key output fields in firewall and IDS displays.

Using the Monitoring Tools

215

J-series™ Services Router User Guide

Table 78: Summary of Key Firewall and IDS Output Fields

Values Field

Stateful Firewall

Protocol

Source IP

Source Port

Destination IP

Destination Port

Flow State

Protocol used for the specified stateful firewall flow.

Source prefix of the stateful firewall flow.

Source port number of stateful firewall flow.

Destination prefix of the stateful firewall flow.

Destination port number of the stateful firewall flow.

Status of the stateful firewall flow:

Drop—Drop all packets in the flow without response.

Forward—Forward the packet in the flow without inspecting it.

Reject—Drop all packets in the flow with response.

Watch—Inspect packets in the flow.

Direction of the flow: I (input) or O (output).

Number of frames in the flow.

Direction

Frames

IDS Information

Source Address

Destination address

Time

Bytes

Packets

Flows

Anomalies

Application

Source address for the event.

Destination address for the event.

Total time the information has been in the IDS table.

Total number of bytes sent from the source to the destination address, in thousands (k) or millions

(m).

Total number of packets sent from the source to the destination address, in thousands (k) or millions (m).

Total number of flows of packets sent from the source to the destination address, in thousands (k) or millions (m).

Total number of anomalies in the anomaly table, in thousands (k) or millions (m).

Configured application, such as FTP or telnet.

Monitoring IPSec Tunnels

IPSec tunnel information includes information about active IPSec tunnels configured on the Services Router, as well as traffic statistics through the tunnels. To view IPSec tunnel information, select Monitor>IPSec in the J-Web interface, or enter the following CLI show commands: show services ipsec-vpn ipsec statistics show services ipsec-vpn ike security-associations

Table 79 summarizes key output fields in IPSec displays.

216

Using the Monitoring Tools

Monitoring and Diagnosing a Services Router

Table 79: Summary of Key IPSec Output Fields

Values Field

IPSec Tunnels

Service Set

Rule

Term

Local Gateway

Remote Gateway

Direction

Protocol

Name of the service set for which the IPSec tunnel is defined.

Name of the rule set applied to the IPSec tunnel.

Name of the IPSec term applied to the IPSec tunnel.

Gateway address of the local system.

Gateway address of the remote system.

Direction of the IPSec tunnel: Inbound or Outbound.

Protocol supported: either Encapsulation Security Protocol (ESP) or Authentication Header and

ESP (AH+ESP).

Numeric identifier of the IPSec tunnel.

Prefix and port number of the local endpoint of the IPSec tunnel.

Prefix and port number of the remote endpoint of the IPSec tunnel.

Tunnel Index

Tunnel Local Identity

Tunnel Remote

Identity

IPSec Statistics

Service Set

Local Gateway

Remote Gateway

ESP Encrypted Bytes

ESP Decrypted Bytes

AH Input Bytes

AH Output Bytes

Name of the service set for which the IPSec tunnel is defined.

Gateway address of the local system.

Gateway address of the remote system.

Total number of bytes encrypted by the local system across the IPSec tunnel.

Total number of bytes decrypted by the local system across the IPSec tunnel.

Total number of bytes received by the local system across the IPSec tunnel.

Total number of bytes transmitted by the local system across the IPSec tunnel.

Monitoring NAT Pools

NAT pool information includes information about the address ranges configured within the pool on the Services Router. To view NAT pool information, select

Monitor>NAT in the J-Web interface, or enter the following CLI show command: show services nat pool

Table 80 summarizes key output fields in NAT displays.

Table 80: Summary of Key NAT Output Fields

Values Field

NAT Pools

NAT Pool

Pool Start Address

Name of the NAT pool.

Lower address in the NAT pool address range.

Using the Monitoring Tools

217

J-series™ Services Router User Guide

Field

Pool Address End

Port High

Port Low

Ports In Use

Values

Upper address in the NAT pool address range.

Upper port in the NAT pool port range.

Lower port in the NAT pool port range.

Number of ports allocated in this NAT pool.

Using J-Web Diagnostic Tools

This section contains the following topics:

Using the J-Web Ping Host Tool on page 218

Using the J-Web Traceroute Tool on page 222

Using the J-Web Ping Host Tool

You can use the ping host diagnostic tool to verify that a host can be reached over the network. The output is useful for diagnosing host and network connectivity problems. The Services Router sends a series of ICMP echo (ping) requests to a specified host and expects to receive ICMP echo responses.

Alternatively, you can use the CLI ping

command. (See “Using the ping Command” on page 226.)

To use the ping host tool:

1.

Select Diagnose from the task bar.

2.

3.

4.

Next to Advanced options, click the expand icon (see Figure 51).

Enter information into the Ping Host page, as described in Table 81.

The Remote Host field is the only required field.

Click Start.

The results of the ping operation are displayed in the main pane (see Figure 52).

If no options are specified, each ping response is in the following format: bytes bytes from ip-address : icmp_seq= number ttl= number time= time

5.

Table 82 summarizes the output fields of the display.

To stop the ping operation before it is complete, click OK.

218

Using J-Web Diagnostic Tools

Figure 51: Ping Host Page

Monitoring and Diagnosing a Services Router

Table 81: J-Web Ping Host Summary

Field

Remote Host

Function

Identifies the host to ping.

Advanced Options

Don’t Resolve

Addresses

Determines whether to display hostnames of the hops along the path.

Interval Specifies the interval, in seconds, between the transmission of each ping request.

Your Action

Type the hostname or IP address of the host to ping.

To suppress the display of the hop hostnames, select the check box.

To display the hop hostnames, clear the check box.

From the drop-down list, select the interval.

Using J-Web Diagnostic Tools

219

J-series™ Services Router User Guide

Field

Packet Size

Function

Specifies the size of the ping request packet.

Your Action

Type the size, in bytes, of the packet. The size can be from 0 through 65468. The router adds 8 bytes of ICMP header to the size.

Type the source IP address.

Source Address

Time-to-Live

Bypass Routing

Specifies the source address of the ping request packet.

Specifies the time-to-live (TTL) hop count for the ping request packet.

Determines whether ping requests are routed by means of the routing table.

If the routing table is not used, ping requests are sent only to hosts on the interface specified in the

Interface box. If the host is not on that interface, ping responses are not sent.

Specifies the interface on which the ping requests are sent.

From the drop-down list, select the TTL.

To bypass the routing table and send the ping requests to hosts on the specified interface only, select the check box.

To route the ping requests using the routing table, clear the check box.

Interface

Count

Don’t Fragment

Record Route

Type-of-Service

Specifies the number of ping requests to send.

Specifies the Don’t Fragment (DF) bit in the IP header of the ping request packet.

Sets the record route option in the IP header of the ping request packet. The path of the ping request packet is recorded within the packet and displayed in the main pane.

Specifies the type-of-service (TOS) value in the IP header of the ping request packet.

From the drop-down list, select the interface on which ping requests are sent. If you select any, the ping requests are sent on all interfaces.

From the drop-down list, select the number of ping requests to send.

To set the DF bit, select the check box.

To clear the DF bit, clear the check box.

To record and display the path of the packet, select the check box.

To suppress the recording and display of the path of the packet, clear the check box.

From the drop-down list, select the decimal value of the TOS field.

220

Using J-Web Diagnostic Tools

Figure 52: Ping Host Results Page

Monitoring and Diagnosing a Services Router

Table 82: J-Web Ping Host Results Summary

Field

bytes bytes from ip-address icmp_seq= number ttl= number time= time

number packets transmitted

Description

bytes

—Size of ping response packet, which is equal to the value you entered in the Packet Size box, plus 8.

ip-address

—IP address of destination host that sent the ping response packet.

number

—Sequence Number field of the ping response packet. You can use this value to match the ping response to the corresponding ping request.

number

—Time-to-live hop-count value of the ping response packet.

time

—Total time between the sending of the ping request packet and the receiving of the ping response packet, in milliseconds. This value is also known as round-trip time .

number

—Number of ping requests (probes) sent to host.

Using J-Web Diagnostic Tools

221

J-series™ Services Router User Guide

Field Description

number packets received

percentage packet loss round-trip min/avg/max/stddev =

min-time / avg-time / max-time / std-dev ms

number

—Number of ping responses received from host.

percentage

—Number of ping responses divided by the number of ping requests, specified as a percentage.

min-time

—Minimum round-trip time (see time= time field in this table).

avg-time

—Average round-trip time.

max-time

—Maximum round-trip time.

std-dev

—Standard deviation of the round-trip times.

If the Services Router does not receive ping responses from the destination host

(the output shows a packet loss of 100 percent), one of the following might apply:

The host is not operational.

There are network connectivity problems between the Services Router and the host.

The host might be configured to ignore ICMP echo requests.

The host might be configured with a firewall filter that blocks ICMP echo requests or ICMP echo responses.

The size of the ICMP echo request packet exceeds the MTU of a host along the path.

The value you selected in the Time-to-Live box was less than the number of hops in the path to the host, in which case the host might reply with an

ICMP error message.

For more information about ICMP, see RFC 792, Internet Control Message Protocol.

Using the J-Web Traceroute Tool

You can use the traceroute diagnostic tool to display a list of routers between the Services Router and a specified destination host. The output is useful for diagnosing a point of failure in the path from the Services Router to the destination host, and addressing network traffic latency and throughput problems.

The Services Router generates the list of routers by sending a series of ICMP traceroute packets in which the time-to-live (TTL) value in the messages sent to each successive router is incremented by 1. (The TTL value of the first traceroute packet is set to 1.) In this manner, each router along the path to the destination host replies with a Time Exceeded packet from which the source IP address can be obtained.

Alternatively, you can use the CLI traceroute command to generate the list.

(See “Using the traceroute Command” on page 228.)

To use the traceroute tool:

222

Using J-Web Diagnostic Tools

Monitoring and Diagnosing a Services Router

1.

Select Diagnose>Traceroute.

2.

3.

4.

Next to Advanced options, click the expand icon (see Figure 53).

Enter information into the Traceroute page, as described in Table 83.

The

Remote Host field is the only required field.

Click Start.

The results of the traceroute operation are displayed in the main pane. If no options are specified, each line of the traceroute display is in the following format: hop-number host ( ip-address ) [ as-number ] time1 time2 time3

The Services Router sends a total of three traceroute packets to each router along the path and displays the round-trip time for each traceroute operation.

If the Services Router times out before receiving a

Time Exceeded message, an asterisk (*) is displayed for that round-trip time.

Table 84 summarizes the output fields of the display.

5.

To stop the traceroute operation before it is complete, click OK while the results of the traceroute operation are being displayed.

Using J-Web Diagnostic Tools

223

J-series™ Services Router User Guide

Figure 53: Traceroute Page

Table 83: Traceroute Summary

Field

Remote Host

Function

Identifies the destination host of the traceroute.

Your Action

Type the hostname or IP address of the destination host.

Advanced Options

Don’t Resolve

Addresses

Determines whether hostnames of the hops along the path are displayed, in addition to IP addresses.

Gateway

Specifies the IP address of the gateway to route through.

To suppress the display of the hop hostnames, select the check box.

To display the hop hostnames, clear the check box.

Type the gateway IP address.

224

Using J-Web Diagnostic Tools

Monitoring and Diagnosing a Services Router

Field

Source Address

Bypass Routing

Interface

Time-to-Live

Type-of-Service

Resolve AS

Numbers

Function

Specifies the source address of the outgoing traceroute packets.

Determines whether traceroute packets are routed by means of the routing table.

If the routing table is not used, traceroute packets are sent only to hosts on the interface specified in the Interface box. If the host is not on that interface, traceroute responses are not sent.

Specifies the interface on which the traceroute packets are sent.

Your Action

Type the source IP address.

To bypass the routing table and send the traceroute packets to hosts on the specified interface only, select the check box.

To route the traceroute packets by means of the routing table, clear the check box.

Specifies the maximum time-to-live (TTL) hop count for the traceroute request packet.

Specifies the type-of-service (TOS) value to include in the IP header of the traceroute request packet.

Determines whether the autonomous system (AS) number of each intermediate hop between the router and the destination host is displayed.

From the drop-down list, select the interface on which traceroute packets are sent. If you select any, the traceroute requests are sent on all interfaces.

From the drop-down list, select the TTL.

From the drop-down list, select the decimal value of the TOS field.

To display the AS numbers, select the check box.

To suppress the display of the AS numbers, clear the check box.

Table 84: J-Web Traceroute Results Summary

Field

hop-number host ip-address as-number time1 time2 time3

Description

Number of the hop (router) along the path.

Hostname, if available, or IP address of the router. If the Don’t Resolve Addresses check box is selected, the hostname is not displayed.

IP address of the router.

AS number of the router.

Round-trip time between the sending of the first traceroute packet and the receiving of the corresponding

Time Exceeded packet from that particular router.

Round-trip time between the sending of the second traceroute packet and the receiving of the corresponding Time Exceeded packet from that particular router.

Round-trip time between the sending of the third traceroute packet and the receiving of the corresponding

Time Exceeded packet from that particular router.

Using J-Web Diagnostic Tools

225

J-series™ Services Router User Guide

If the Services Router does not display the complete path to the destination host, one of the following might apply:

The host is not operational.

There are network connectivity problems between the Services Router and the host.

The host, or a router along the path, might be configured to ignore ICMP traceroute messages.

The host, or a router along the path, might be configured with a firewall filter that blocks ICMP traceroute requests or ICMP time exceeded responses.

The value you selected in the Time Exceeded box was less than the number of hops in the path to the host. In this case, the host might reply with an

ICMP error message.

For more information about ICMP, see RFC 792, Internet Control Message Protocol.

Using CLI Diagnostic Commands

This section describes how to use the CLI diagnostic tools. Because the CLI is a superset of the J-Web interface, you can perform certain tasks only through the CLI.

For an overview of the CLI operational mode commands, along with instructions for

filtering command output, see “CLI Diagnostic Commands Overview” on page 201.

This section contains the following topics:

Using the ping Command on page 226

Using the traceroute Command on page 228

Using the monitor interface Command on page 229

Using the monitor traffic Command on page 231

Using the monitor file Command on page 235

Using mtrace Commands on page 235

Using the ping Command

Use the CLI ping command to verify that a host can be reached over the network. This command is useful for diagnosing host and network connectivity problems. The Services Router sends a series of ICMP echo (ping) requests to a specified host and expects to receive ICMP echo responses.

Alternatively, you can use the J-Web interface. (See “Using the J-Web

Ping Host Tool” on page 218.)

226

Using CLI Diagnostic Commands

Monitoring and Diagnosing a Services Router

Enter the ping

command with the following syntax. Table 85 describes

the ping command options.

user@host> ping host <interface source-interface > <bypass-routing>

<count number > <do-not-fragment> <inet> <interval seconds >

<loose-source [ hosts ]> <no-resolve> <pattern string > <rapid>

<record-route> <routing-instance routing-instance-name > <size bytes >

<source address > <strict> <strict-source [ hosts ]> <tos number >

<ttl number > <verbose> <wait seconds > <detail>

To quit the ping command, press Ctrl-C.

Table 85: CLI ping Command Options

Option Description

host

Pings the hostname or IP address you specify.

interface source-interface Sends the ping requests on the interface you specify. If you do not include this option, ping requests are sent on all interfaces.

bypass-routing count number do-not-fragment

Bypasses the routing tables and send the ping requests only to hosts on directly attached interfaces. If the host is not on a directly attached interface, an error message is returned.

Limits the number of ping requests to send. Specify a count from 0 through 1,000,000. If you do not specify a count, ping requests are continuously sent until you press Ctrl-C.

Sets the Don’t Fragment (DF) bit in the IP header of the ping request packet.

inet interval seconds loose-source [ hosts ] no-resolve

Forces the ping requests to an IPv4 destination.

Sets the interval between ping requests, in seconds. Specify an interval from 0.1 through

10,000. The default value is 1 second.

Sets the loose source routing option in the IP header of the ping request packet.

Suppresses the display of the hostnames of the hops along the path.

pattern string rapid record-route routing-instance

routing-instance-name

Includes the hexadecimal string you specify, in the ping request packet.

Sends ping requests rapidly. The results are reported in a single message, not in individual messages for each ping request. By default, five ping requests are sent before the results are reported. To change the number of requests, include the count option.

Sets the record route option in the IP header of the ping request packet. The path of the ping request packet is recorded within the packet and displayed on the screen.

Uses the routing instance you specify for the ping request.

size bytes source address strict strict-source [ hosts ] tos number ttl number

Sets the size of the ping request packet. Specify a size from 0 through 65,468. The default value is 56 bytes, which is effectively 64 bytes because 8 bytes of ICMP header data are added to the packet.

Uses the source address that you specify, in the ping request packet.

Sets the strict source routing option in the IP header of the ping request packet.

Sets the strict source routing option in the IP header of the ping request packet, and uses the list of hosts you specify for routing the packet.

Sets the type-of-service (TOS) value in the IP header of the ping request packet. Specify a value from 0 through 255.

Sets the time-to-live (TTL) value for the ping request packet. Specify a value from 0 through 255.

Using CLI Diagnostic Commands

227

J-series™ Services Router User Guide

Option verbose wait seconds detail

Description

Displays detailed output.

Sets the maximum time to wait after sending the last ping request packet.

Displays the interface on which the ping response was received.

Following is sample output from a ping command: user@host> ping host3 count 4

PING host3.site.net (176.26.232.111): 56 data bytes

64 bytes from 176.26.232.111: icmp_seq=0 ttl=122 time=0.661 ms

64 bytes from 176.26.232.111: icmp_seq=1 ttl=122 time=0.619 ms

64 bytes from 176.26.232.111: icmp_seq=2 ttl=122 time=0.621 ms

64 bytes from 176.26.232.111: icmp_seq=3 ttl=122 time=0.634 ms

--- host3.site.net ping statistics ---

4 packets transmitted, 4 packets received, 0% packet loss round-trip min/avg/max/stddev = 0.619/0.634/0.661/0.017 ms

The fields in the display are the same as those displayed by the J-Web ping

host diagnostic tool. Table 82 summarizes these output fields.

Using the traceroute Command

Use the CLI traceroute command to display a list of routers between the Services

Router and a specified destination host. This command is useful for diagnosing a point of failure in the path from the Services Router to the destination host, and addressing network traffic latency and throughput problems.

The Services Router generates the list of routers by sending a series of ICMP traceroute packets in which the time-to-live (TTL) value in the messages sent to each successive router is incremented by 1. (The TTL value of the first traceroute packet is set to 1.) In this manner, each router along the path to the destination host replies with a Time Exceeded packet from which the source IP address can be obtained.

Alternatively, you can use the J-Web interface. (See “Using the J-Web

Traceroute Tool” on page 222.)

Enter the traceroute

command with the following syntax. Table 86

describes the traceroute command options.

user@host> traceroute host <interface source-interface >

<as-number-lookup> <bypass-routing> <gateway address >

<inet> <logical-router logical-router-name > <no-resolve>

<routing-instance routing-instance-name > <source address >

<tos number > <ttl number > <wait seconds >

To quit the traceroute command, press Ctrl-C.

228

Using CLI Diagnostic Commands

Monitoring and Diagnosing a Services Router

Table 86: CLI traceroute Command Options

Option Description

host

as-number-lookup

Sends traceroute packets to the hostname or IP address you specify.

interface source-interface Sends the traceroute packets on the interface you specify. If you do not include this option, traceroute packets are sent on all interfaces.

Displays the autonomous system (AS) number of each intermediate hop between the router and the destination host.

bypass-routing gateway address

Bypasses the routing tables and send the traceroute packets only to hosts on directly attached interfaces. If the host is not on a directly attached interface, an error message is returned.

Uses the gateway you specify to route through.

Sends traceroute packets to this logical router.

logical-router

logical-router-name

inet no-resolve

Forces the traceroute packets to an IPv4 destination.

Suppresses the display of the hostnames of the hops along the path.

Uses the routing instance you specify for the traceroute.

routing-instance

routing-instance-name

source address tos number

Uses the source address you specify in the traceroute packet.

Sets the type-of-service (TOS) value in the IP header of the traceroute packet. Specify a value from 0 through 255.

ttl number wait seconds

Sets the time-to-live (TTL) value for the traceroute packet. Specify a hop count from 0 through

255.

Sets the maximum time to wait for a response.

Following is sample output from a traceroute command: user@host> traceroute host2 traceroute to 173.24.232.66 (172.24.230.41), 30 hops max, 40 byte packets

1 173.18.42.253 (173.18.42.253) 0.482 ms 0.346 ms 0.318 ms

2 host4.site1.net (173.18.253.5) 0.401 ms 0.435 ms 0.359 ms

3 host5.site1.net (173.18.253.5) 0.401 ms 0.360 ms 0.357 ms

4 173.24.232.65 (173.24.232.65) 0.420 ms 0.456 ms 0.378 ms

5 173.24.232.66 (173.24.232.66) 0.830 ms 0.779 ms 0.834 ms

The fields in the display are the same as those displayed by the J-Web traceroute

diagnostic tool. Table 84 summarizes these output fields.

Using the monitor interface Command

Use the CLI monitor interface command to display real-time traffic, error, alarm, and filter statistics about a physical or logical interface. Enter the command with the following syntax: user@host> monitor interface ( interface-name | traffic)

Replace

interface-name

with the name of a physical or logical interface. If you specify the traffic option, statistics for all active interfaces are displayed.

Using CLI Diagnostic Commands

229

J-series™ Services Router User Guide

The real-time statistics are updated every second. The

Current delta and

Delta columns display the amount the statistics counters have changed since the monitor interface command was entered or since you cleared the delta counters.

Table 87 and Table 88 list the keys you use to control the display using the

interface-name

and traffic options. (The keys are not case sensitive.)

Table 87: CLI monitor interface Output Control Keys i f

Key c n t q or ESC

Action

Clears (returns to 0) the delta counters in the Current delta column. The statistics counters are not cleared.

Freezes the display, halting the update of the statistics and delta counters.

Displays information about a different interface. You are prompted for the name of a specific interface.

Displays information about the next interface. The Services Router scrolls through the physical and logical interfaces in the same order in which they are displayed by the show interfaces terse command.

Quits the command and returns to the command prompt.

Thaws the display, resuming the update of the statistics and delta counters.

Table 88: CLI monitor interface Traffic Output Control Keys

Key b c d p r q or ESC

Action

Displays the statistics in units of bytes and bytes per second (bps).

Clears (returns to 0) the delta counters in the Delta column. The statistics counters are not cleared.

Displays the Delta column instead of the rate column—in bps or packets per second (pps).

Displays the statistics in units of packets and packets per second (pps).

Quits the command and returns to the command prompt.

Displays the rate column—in bps and pps—instead of the Delta column.

Following are sample displays from the monitor interface command: user@host> monitor interface fe-0/0/0 host1 Seconds: 11

Interface: fe-0/0/0, Enabled, Link is Up

Encapsulation: Ethernet, Speed: 100mbps

Traffic statistics:

Input bytes:

Output bytes:

Input packets:

Output packets:

Error statistics:

381588589

9707279

4064553

66683

Time: 16:47:49

Delay: 0/0/0

Current delta

[11583]

[6542]

[145]

[25]

230

Using CLI Diagnostic Commands

Monitoring and Diagnosing a Services Router

Input errors:

Input drops:

Input framing errors:

Carrier transitions:

Output errors:

Output drops:

0

0

0

0

0

0

[0]

[0]

[0]

[0]

[0]

[0]

NOTE: The output fields displayed when you enter the monitor interface interface-name command are determined by the interface you specify.

user@host> monitor interface traffic

Interface fe-0/0/0 fe-0/0/1

Link

Up

Up

Input packets

42334

587525876

(pps)

(5)

(12252)

Output packets

23306

589621478

(pps)

(3)

(12891)

Using the monitor traffic Command

Use the CLI monitor traffic command to display packet headers transmitted through network interfaces.

Enter the monitor traffic

command with the following syntax. Table 89

describes the monitor traffic command options.

user@host> monitor traffic <absolute-sequence> <count number >

<interface interface-name > <layer2-headers> <matching expression >

<no-domain-names> <no-promiscuous> <no-resolve> <no-timestamp>

<print-ascii> <print-hex> <size bytes > <brief | detail | extensive>

To quit the monitor traffic command and return to the command prompt, press Ctrl-C.

NOTE: Using the monitor traffic command can degrade Services Router performance.

We recommend that you use filtering options—such as count and matching

—to minimize the impact to packet throughput on the Services Router.

Table 89: CLI monitor traffic Command Options

Option absolute-sequence count number interface interface-name layer2-headers

Description

Displays the absolute TCP sequence numbers.

Displays the specified number of packet headers. Specify a value from 0 through 100,000. The command quits and exits to the command prompt after this number is reached.

Displays packet headers for traffic on the specified interface. If an interface is not specified, the lowest numbered interface is monitored.

Displays the link-layer packet header on each line.

Using CLI Diagnostic Commands

231

J-series™ Services Router User Guide

Option matching expression no-domain-names no-promiscuous no-resolve no-timestamp print-ascii print-hex size bytes brief detail extensive

Description

Displays packet headers that match an expression. Table 90

through Table 92 list match conditions, logical operators, and

arithmetic, binary, and relational operators you can use in the expression.

Suppresses the display of the domain name portion of the hostname.

Specifies not to place the monitored interface in promiscuous mode.

In promiscuous mode, the interface reads every packet that reaches it. In non-promiscuous mode, the interface reads only the packets addressed to it.

Suppresses the display of hostnames.

Suppresses the display of packet header timestamps.

Displays each packet header in ASCII format.

Displays each packet header, except link-layer headers, in hexadecimal format.

Displays the number of bytes for each packet that you specify. If a packet header exceeds this size, the displayed packet header is truncated. The default value is 96.

Displays minimum packet header information. This is the default.

Displays packet header information in moderate detail. For some protocols, you must also use the size option to see detailed information.

Displays the most extensive level of packet header information.

For some protocols, you must also use the size option to see extensive information.

To limit the packet header information displayed by the monitor traffic command, include the matching expression option. An expression consists of one or

more match conditions listed in Table 90, enclosed in quotation marks (“ “).

You can combine match conditions by using the logical operators listed in

Table 91 (shown in order of highest to lowest precedence).

For example, to display TCP or UDP packet headers, enter the following command: user@host> monitor traffic matching “tcp || udp”

To compare the following types of expressions, use the relational operators

listed in Table 92 (listed from highest to lowest precedence):

Arithmetic—Expressions that use the arithmetic operators listed in Table 92.

Binary—Expressions that use the binary operators listed in Table 92.

Packet data accessor—Expressions that use the following syntax: protocol

[ byte-offset

< size >]

232

Using CLI Diagnostic Commands

Monitoring and Diagnosing a Services Router

Replace

protocol

with any protocol in Table 90. Replace

byte-offset

with the byte offset, from the beginning of the packet header, to use for the comparison.

The optional

size

parameter represents the number of bytes examined in the packet header—1, 2, or 4 bytes.

For example, the following command displays all multicast traffic: user@host> monitor traffic matching “ether[0] & 1 !=0”

Table 90: CLI monitor traffic Match Conditions

Match Condition

Entity Type host [ address | hostname ]

Description network address network address mask mask port [ port-number | port-name ]

Directional

Matches packet headers that contain the specified address or hostname. You can preprend any of the following protocol match conditions, followed by a space, to host: arp, ip, rarp, or any of the Directional match conditions.

Matches packet headers with source or destination addresses containing the specified network address.

Matches packet headers containing the specified network address and subnet mask.

Matches packet headers containing the specified source or destination TCP or UDP port number or port name.

Directional match conditions can be prepended to any Entity Type match conditions, followed by a space.

Matches packet headers containing the specified destination.

Matches packet headers containing the specified source.

Matches packet headers containing the specified source and destination.

Matches packet headers containing the specified source or destination.

destination source source and destination source or destination

Packet Length less bytes greater bytes

Protocol arp ether ether [broadcast | multicast]

Matches packets with lengths less than or equal to the specified value, in bytes.

Matches packets with lengths greater than or equal to the specified value, in bytes.

ether protocol [ address | (\arp | \ip

| \rarp) icmp ip ip [broadcast | multicast]

Matches all ARP packets.

Matches all Ethernet frames.

Matches broadcast or multicast Ethernet frames. This match condition can be prepended with source or destination.

Matches Ethernet frames with the specified address or protocol type. The arguments arp, ip, and rarp are also independent match conditions, so they must be preceded with a backslash (\) when used in the ether protocol match condition.

Matches all ICMP packets.

Matches all IP packets.

Matches broadcast or multicast IP packets.

Using CLI Diagnostic Commands

233

J-series™ Services Router User Guide isis rarp tcp udp

Match Condition ip protocol [ address | (\icmp | igrp |

\tcp | \udp)]

Description

Matches IP packets with the specified address or protocol type. The arguments icmp, tcp, and udp are also independent match conditions, so they must be preceded with a backslash (\) when used in the ip protocol match condition.

Matches all IS-IS routing messages.

Matches all RARP packets.

Matches all TCP packets.

Matches all UDP packets.

Table 91: CLI monitor traffic Logical Operators

Description Logical

Operator

!

&&

||

()

Logical NOT.

Logical AND. If the first condition matches, the next condition is evaluated.

If the first condition does not match, the next condition is skipped.

Logical OR. If the first condition matches, the next condition is skipped. If the first condition does not match, the next condition is evaluated.

Group operators to override default precedence order. Parentheses are special characters, each of which must be preceded by a backslash (\).

Table 92: CLI monitor traffic Arithmetic, Binary, and Relational Operators

Operator Description

Arithmetic Operator

+

Addition operator.

/

Subtraction operator.

Division operator.

Binary Operator

&

Bitwise AND.

|

* Bitwise exclusive OR.

Bitwise inclusive OR.

Relational Operator

<=

A match occurs if the first expression is less than or equal to the second.

>=

A match occurs if the first expression is greater than or equal to the second.

<

A match occurs if the first expression is less than the second.

>

A match occurs if the first expression is greater than the second.

234

Using CLI Diagnostic Commands

Monitoring and Diagnosing a Services Router

Operator

=

!=

Description

A match occurs if the first expression is equal to the second.

A match occurs if the first expression is not equal to the second.

Following is sample output from the monitor traffic command: user@host> monitor traffic count 4 matching “arp” detail

Listening on fe-0/0/0, capture size 96 bytes

15:04:16.276780

In arp who-has 193.1.1.1 tell host1.site2.net

15:04:16.376848

In arp who-has host2.site2.net tell host1.site2.net

15:04:16.376887

In arp who-has 193.1.1.2 tell host1.site2.net

15:04:16.601923

In arp who-has 193.1.1.3 tell host1.site2.net

Using the monitor file Command

You can enter the monitor file command to display real-time additions to files such as system logs and trace files: user@host> monitor start filename

When the Services Router adds a record to the file specified by

filename

, the record is displayed on the screen. For example, if you have configured a system log file named system-log

(by including the syslog statement at the [ edit system

] hierarchy level), you can enter the monitor start system-log command to display the records added to the system log.

To display a list of files that are being monitored, enter the monitor list command. To stop the display of records for a specified file, enter the monitor stop filename command.

Using mtrace Commands

You can use CLI mtrace commands to trace information about multicast paths. This section covers the following mtrace commands: mtrace from-source

—Displays information about a multicast path from a source

to a receiver. See “Using the mtrace from-source Command” on page 236.

mtrace monitor

—Monitors and displays multicast trace operations. See “Using the mtrace monitor Command” on page 238.

For more information about the mtrace commands, see the JUNOS Protocols,

Class of Service, and System Basics Command Reference.

Using CLI Diagnostic Commands

235

J-series™ Services Router User Guide

Using the mtrace from-source Command

To display information about a multicast path from a source to a receiver, enter the mtrace from-source

command with the following syntax. Table 93

describes the mtrace from-source command options.

user@host> mtrace from-source source host <<extra-hops number >

| <group address > | <interval seconds > | <max-hops number >

| <max-queries number > | <response host > | <ttl number > |

<wait-time seconds >> <loop> <multicast-response | unicast-response>

<no-resolve> <no-router-alert> <brief | detail>

Table 93: CLI mtrace from-source Command Options

Option source host extra-hops number group address interval seconds max-hops number max-queries number response host ttl number wait-time seconds loop multicast-response unicast-response no-resolve no-router-alert brief detail

Description

Traces the path to the specified hostname or IP address.

Sets the number of extra hops to trace past nonresponsive routers. Specify a value from 0 through 255.

Traces the path for the specified group address. The default value is 0.0.0.0.

Sets the interval between statistics gathering. The default value is 10.

Sets the maximum number of hops to trace toward the source. Specify a value from 0 through 255. The default value is 32.

Sets the maximum number of queries for any hop. Specify a value from 1 through

32. The default value is 3.

Sends the response packets to the specified hostname or IP address. By default, the response packets are sent to the router that sent the requests.

Sets the time-to-live (TTL) value in the IP header of the query packets. Specify a hop count from 0 through 255. The default value for local queries to the all routers multicast group is 1. Otherwise, the default value is 127.

Sets the time to wait for a response packet. The default value is 3 seconds.

Loops indefinitely, displaying rate and loss statistics. To quit the mtrace command, press Ctrl-C.

Forces the responses to use multicast.

Forces the response packets to use unicast.

Does not display hostnames.

Does not use the router alert IP option in the IP header.

Does not display packet rates and losses.

Displays packet rates and losses if a group address is specified.

Following is sample output from the mtrace from-source command: user@host> mtrace from-source source 192.1.4.1 group 224.1.1.1

Mtrace from 192.1.4.1 to 192.1.30.2 via group 224.1.1.1

Querying full reverse path... * *

0 ? (192.1.30.2)

236

Using CLI Diagnostic Commands

Monitoring and Diagnosing a Services Router

-1 ? (192.1.30.1) PIM thresh^ 1

-2 routerC.mycompany.net (192.1.40.2) PIM thresh^ 1

-3 hostA.mycompany.net (192.1.4.1)

Round trip time 22 ms; total ttl of 2 required.

Waiting to accumulate statistics...Results after 10 seconds:

Source Response Dest

192.1.4.1

192.1.30.2

Overall

Packet

Packet Statistics For Traffic From

192.1.4.1 To 224.1.1.1

v __/

192.168.195.37

rtt 16 ms Rate Lost/Sent = Pct Rate

192.1.40.2

v

192.1.40.1

192.1.30.1

^ routerC.mycompany.net

ttl 2 0/0 = -0 pps v

192.1.30.2

Receiver

\__

?

ttl 3

192.1.30.2

Query Source

?/0 0 pps

Each line of the trace display is usually in the following format (depending on the options selected and the responses from the routers along the path): hop-number host

( ip-address ) protocol ttl

Table 94 summarizes the output fields of the display.

NOTE: The packet statistics gathered from Juniper Networks routers and routing nodes are always displayed as

0

.

Table 94: CLI mtrace from-source Command Display Summary

Field

hop-number host ip-address protocol ttl

Round trip time milliseconds ms total ttl of number required

Source

Response Dest

Overall

Packet Statistics For Traffic From

Description

Number of the hop (router) along the path.

Hostname, if available, or IP address of the router. If the no-resolve option was entered in the command, the hostname is not displayed.

IP address of the router.

Protocol used.

TTL threshold.

Total time between the sending of the query packet and the receiving of the response packet.

Total number of hops required to reach the source.

Source IP address of the response packet.

Response destination IP address.

Average packet rate for all traffic at each hop.

Number of packets lost, number of packets sent, percentage of packets lost, and average packet rate at each hop.

Using CLI Diagnostic Commands

237

J-series™ Services Router User Guide

Field

Receiver

Query Source

Description

IP address receiving the multicast packets.

IP address of the host sending the query packets.

Using the mtrace monitor Command

To monitor and display multicast trace operations, enter the mtrace monitor command: user@host> mtrace monitor

Mtrace query at Apr 21 16:00:54 by 192.1.30.2, resp to 224.0.1.32, qid 2a83aa packet from 192.1.30.2 to 224.0.0.2

from 192.1.30.2 to 192.1.4.1 via group 224.1.1.1 (mxhop=60)

Mtrace query at Apr 21 16:00:57 by 192.1.30.2, resp to 224.0.1.32, qid 25dc17 packet from 192.1.30.2 to 224.0.0.2

from 192.1.30.2 to 192.1.4.1 via group 224.1.1.1 (mxhop=60)

Mtrace query at Apr 21 16:01:00 by 192.1.30.2, resp to same, qid 20e046 packet from 192.1.30.2 to 224.0.0.2

from 192.1.30.2 to 192.1.4.1 via group 224.1.1.1 (mxhop=60)

Mtrace query at Apr 21 16:01:10 by 192.1.30.2, resp to same, qid 1d25ad packet from 192.1.30.2 to 224.0.0.2

from 192.1.30.2 to 192.1.4.1 via group 224.1.1.1 (mxhop=60)

This example displays only mtrace queries. When the Services Router captures an mtrace response, the display is similar, but the complete mtrace response is also displayed—exactly as it is displayed in mtrace from-source command output.

Table 95 summarizes the output fields of the display.

Table 95: CLI mtrace monitor Command Display Summary

Field

Mtrace operation-type at

time-of-day

by resp to address qid qid packet from source to destination from source to destination

Description

operation-type

—Type of multicast trace operation: query or response.

time-of-day

—Date and time the multicast trace query or response was captured.

IP address of the host issuing the query.

address

—Response destination address.

qid

—Query ID number.

source

—IP address of the source of the query or response.

destination

—IP address of the destination of the query or response.

source

—IP address of the multicast source.

destination

—IP address of the multicast destination.

238

Using CLI Diagnostic Commands

Field via group address mxhop= number

Description

address

—Group address being traced.

number

—Maximum hop setting.

Monitoring and Diagnosing a Services Router

Using CLI Diagnostic Commands

239

J-series™ Services Router User Guide

240

Using CLI Diagnostic Commands

Chapter 11

Configuring SNMP for Network

Management

The Simple Network Management Protocol (SNMP) is a client/server standard that helps you diagnose and monitor network health and statistics.

You can use either J-Web Quick Configuration or a configuration editor to configure

SNMP.

This chapter contains the following topics. For more information about SNMP, see the JUNOS Network Management Configuration Guide.

Network Management Overview on page 241

Before You Begin on page 243

Configuring SNMP with Quick Configuration on page 243

Configuring SNMP with a Configuration Editor on page 247

Verifying the SNMP Configuration on page 251

Network Management Overview

A network is a complex organization of nodes and processes that must operate reliably and efficiently. Having a single node or link failure in a network can undermine the network’s performance and result in a loss of service. Therefore, determining where and when a network failure is occurring is a necessity.

Additionally, gathering statistics about how a network is performing can help you diagnose the overall health of the network and pinpoint bottlenecks so that you can address network growth appropriately.

By querying individual network nodes and receiving triggered updates, SNMP clients are able to provide valuable feedback about the state of a network.

Managers and Agents

Because SNMP is a client/server protocol, SNMP nodes can be classified as either clients (SNMP managers) or servers (SNMP agents).

Network Management Overview

241

J-series™ Services Router User Guide

SNMP managers, also known as network management systems (NMSs), occupy central points in the network and they actively query and collect messages from SNMP agents in the network. SNMP agents are individual processes running on network nodes that gather information for a particular node and transfer the information to SNMP managers as queries are processed. Because

SNMP agents are individual SNMP processes running on a host, multiple agents can be active on a single network node at any given time.

SMI, MIBs, and OIDs

Agents store information in a hierarchical database called the Structure of

Management Information (SMI). The SMI resembles a file system; information is stored in individual files that are hierarchically arranged in the database. The individual files that store the information are known as Management Information

Bases (MIBs). Each MIB contains nodes of information that are stored in a tree structure. Information branches down from a root node to individual leaves in the tree, and the individual leaves comprise the information that is queried by managers for a given MIB. The nodes of information are identified by an object ID (OID). The

OID is a dotted integer identifier (

1.3.6.1.2.1.2

, for instance) or a subtree name (such as interfaces

) that corresponds to an indivisible piece of information in the MIB.

Standard and Enterprise MIBs

A set of MIBs has been defined by the IETF and documented in various RFCs. These

MIBs are common across many platforms. Additionally, individual enterprises can create their own set of enterprise-specific MIBs, provided they share the same structure as the standard MIBs. This structure is enforced through the Abstract

Syntax Notation (ASN), which is a definition language used to store information.

SNMP Requests

Information is stored in MIBs, and MIBs are queried by SNMP managers. Managers send SNMP requests to process the information. SNMP requests come in two primary forms: get requests and set requests. These requests are processed by one or more agents on a particular node, and information is retrieved or modified on the MIB. When the agent has processed the request, it generates an SNMP response that either returns retrieved information from the MIB or acknowledges that information has been modified on the MIB.

SNMP Communities

To help ensure that only specific SNMP managers can access a particular

SNMP agent, SNMP access is granted through communities. To control access, you first create an SNMP community. The community is assigned a name that is unique on the host. All SNMP requests that are sent to the agent must be configured with the same community name.

When multiple agents are configured on a particular host, the community name process ensures that SNMP requests are sorted to only those agents configured to handle the requests.

242

Network Management Overview

Configuring SNMP for Network Management

Additionally, communities allow you to specify one or more addresses or address prefixes to which you want to either allow or deny access.

By specifying a list of clients, you can control exactly which SNMP managers have access to a particular agent.

SNMP Traps

The get and set commands that SNMP uses are useful for querying hosts within a network. However, the commands do not provide a means by which events can trigger a notification. For instance, if a link fails, the health of the link is unknown until an SNMP manager next queries that agent.

SNMP has traps, which are unsolicited notifications that are triggered by events on the host. When you configure a trap, you specify the types of events that can trigger trap messages, and you configure a set of targets to receive the generated messages.

Before You Begin

Before you begin configuring SNMP, complete the following tasks:

Establish basic connectivity. See “Establishing Basic Connectivity” on page 47.

Configure network interfaces. See “Configuring Network Interfaces” on page 79.

Configuring SNMP with Quick Configuration

J-Web Quick Configuration allows you to define system identification information, create SNMP communities, and create SNMP trap groups.

Figure 54 shows the Quick Configuration page for SNMP.

Configuring SNMP with Quick Configuration

243

J-series™ Services Router User Guide

Figure 54: Quick Configuration Page for SNMP

To configure SNMP features with Quick Configuration:

1.

2.

In the J-Web user interface, select Configuration>Quick

Configuration>SNMP.

Enter information into the Quick Configuration page for SNMP, as described in

Table 96.

3.

From the SNMP Quick Configuration page, click one of the following buttons:

To apply the configuration and stay on the Quick Configuration page for SNMP, click Apply.

244

Configuring SNMP with Quick Configuration

Configuring SNMP for Network Management

To apply the configuration and return to the Quick Configuration SNMP page, click OK.

To cancel your entries and return to the Quick Configuration for SNMP page, click Cancel.

4.

To check the configuration, see “Verifying the SNMP Configuration” on page

251.

Table 96: SNMP Quick Configuration Summary

Function Field

Identification

Contact Information

System Description

Local Engine ID

System Location

System Name Override

Communities

Community Name

Authorization

Traps

Trap Group Name

Your Action

Free-form text string that specifies an administrative contact for the system.

Free-form text string that specifies a description for the system.

Provides an administratively unique identifier of an SNMPv3 engine for system identification.

The local engine ID contains a prefix and a suffix. The prefix is formatted according to specifications defined in

RFC 3411. The suffix is defined by the local engine ID. Generally, the local engine ID suffix is the MAC address of fe-0/0/0.

Free-form text string that specifies the location of the system.

Type any contact information for the administrator of the system (such as name and phone number).

Type any system information that describes the system ( J4300 with 4

PIMs , for example).

Type the MAC address of the fe-0/0/0 interface.

Type any location information for the system (lab name or rack name, for example).

Type the name of the system.

Free-form text string that overrides the system hostname defined in

“Establishing Basic Connectivity” on page 47.

Specifies the name of the SNMP community.

Specifies the type of authorization

(either read-only or read-write) for the

SNMP community being configured.

Specifies the name of the SNMP trap group being configured.

Click Add.

Type the name of the community being added.

Select the desired authorization (either read-only or read-write) from the drop-down menu.

Click Add.

Type the name of the SNMP trap group being configured.

Configuring SNMP with Quick Configuration

245

J-series™ Services Router User Guide

Field

Categories

Targets

Function

Specifies which trap categories are added to the trap group being configured.

Your Action

To generate traps for authentication failures, select Authentication.

To generate traps for chassis and environment notifications, select Chassis.

To generate traps for configuration changes, select Configuration.

To generate traps for link-related notifications (up-down transitions), select Link.

To generate traps for remote operation notifications, select

Remote operations.

To generate traps for remote network monitoring (RMON), select RMON alarm.

To generate traps for routing protocol notifications, select

Routing.

One or more hostnames or IP addresses that specify the systems to receive

SNMP traps generated by the trap group being configured.

To generate traps on system warm and cold starts, select

Startup.

To generate traps on Virtual

Router Redundancy Protocol

(VRRP) events (such as new-master or authentication failures), select VRRP events.

1.

Enter the hostname or IP address, in dotted decimal notation, of the target system to receive the SNMP traps.

2.

Click Add.

246

Configuring SNMP with Quick Configuration

Configuring SNMP for Network Management

Configuring SNMP with a Configuration Editor

To configure SNMP on a Services Router, you must perform the following tasks marked (Required):

(Required) “Defining System Identification Information” on page 247

(Required) “Configuring SNMP Agents and Communities” on page 248

(Required) “Managing SNMP Trap Groups” on page 249

(Optional) “Controlling Access to MIBs” on page 250

For information about using the J-Web and CLI configuration editors, see

“Using J-series Configuration Tools” on page 127.

Defining System Identification Information

Basic system identification information for a Services Router can be configured with SNMP and stored in various MIBs. This information can be accessed

through SNMP requests and either queried or reset. Table 97 identifies types

of basic system identification and the MIB into which it is stored.

Table 97: System Identification Information and Corresponding MIBs

System Information

Contact

System location

System description

System name override

MIB sysContact sysLocation sysDescription sysName

3.

4.

To configure basic system identification for SNMP:

1.

2.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

To configure basic system information using SNMP, perform the configuration

tasks described in Table 98.

If you are finished configuring the network, commit the configuration.

To check the configuration, see “Verifying the SNMP Configuration” on page

251.

Configuring SNMP with a Configuration Editor

247

J-series™ Services Router User Guide

Table 98: Configuring Basic System Identification

Task

Navigate to the SNMP level in the configuration hierarchy.

J-Web Configuration Editor

In the configuration editor hierarchy, select Snmp.

Configure the system contact information (such as a name and phone number).

Configure the system location information (such as a lab name and a rack name).

Configure the system description ( J4300

with 4 PIMs , for example).

In the Contact box, type the contact information as a free-form text string.

In the Location box, type the location information as a free-form text string.

In the Description box, type the description information as a free-form text string.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit snmp

Set the contact information: set contact “ contact-information

Set the location information: set location “ location-information

Set the description information: set description

description-information

Set the system name: set name name

Configure a system name to override the system hostname defined in

“Establishing Basic Connectivity” on page 47.

Configure the local engine ID to use the

MAC address of fe-0/0/0 as the engine

ID suffix.

In the System Name box, type the system name as a free-form text string.

1.

Select Engine id.

2.

In the Engine id choice box, select Use mac address from the drop-down menu.

3.

Click OK.

Set the engine ID to use the MAC address: set engine-id use-mac-address

Configuring SNMP Agents and Communities

To configure the SNMP agent, you must enable and authorize the network management system access to the Services Router, by configuring one or more communities. Each community has a community name, an authorization, which determines the kind of access the network management system has to the router, and, when applicable, a list of valid clients that can access the router.

To configure SNMP communities:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

3.

4.

2.

To configure SNMP communities, perform the configuration tasks described in

Table 99.

If you are finished configuring the network, commit the configuration.

To check the configuration, see “Verifying the SNMP Configuration” on page

251.

248

Configuring SNMP with a Configuration Editor

Configuring SNMP for Network Management

Table 99: Configuring SNMP Agents and Communities

Task

Navigate to the SNMP level in the configuration hierarchy.

Create and name a community.

Grant read-write access to the community.

Allow community access to a client at a particular IP address—for example, at

IP address 10.10.10.10.

Allow community access to a group of clients—for example, all addresses within the 10.10.10.0/24 prefix, except those within the

10.10.10.10/29 prefix.

J-Web Configuration Editor

In the configuration editor hierarchy, select Snmp.

1.

Next to Community, click Add new

entry.

edit snmp

Create a community: set community community-name

2.

In the Community box, type the name of the community as a free-form text string.

In the Authorization box, select

read-write from the drop-down menu.

Set the authorization to read-write:

1.

Next to Clients, click Add new

entry.

set community community-name authorization read-write

Configure client access for the IP address 10.10.10.10:

2.

In the Prefix box, type the

IP address, in dotted decimal notation.

3.

Click OK.

1.

Next to Clients, click Add new

entry.

set community community-name clients 10.10.10.10

1.

Configure client access for the IP address 10.10.10.0/24:

2.

In the Prefix box, type the IP address prefix 10.10.10.0/24, and click OK.

3.

Next to Clients, click Add new

entry.

4.

In the Prefix box, type the IP address prefix 10.10.10.10/29.

5.

Select the Restrict check box.

6.

Click OK.

CLI Configuration Editor

From the top of the configuration hierarchy, enter set community community-name clients 10.10.10.0/24

2.

Configure client access to restrict the IP addresses 10.10.10.10/29: set community community-name clients 10.10.10.10/29 restrict

Managing SNMP Trap Groups

SNMP traps are unsolicited notifications that are generated by conditions on the Services Router. When events trigger a trap, a notification is sent to the configured clients for that particular trap group. To manage a trap group, you must create the group, specify the types of traps that are included in the group, and define one or more targets to receive the trap notifications.

To configure SNMP trap groups:

Configuring SNMP with a Configuration Editor

249

J-series™ Services Router User Guide

1.

2.

3.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

To configure SNMP trap groups, perform the configuration tasks described

in Table 100.

If you are finished configuring the network, commit the configuration.

4.

To check the configuration, see “Verifying the SNMP Configuration” on page

251.

Table 100: Configuring SNMP Trap Groups

Task

Navigate to the SNMP level in the configuration hierarchy.

J-Web Configuration Editor

In the configuration editor hierarchy, select Snmp.

CLI Configuration Editor

From the top of the configuration hierarchy, enter

Create a trap group.

1.

Next to Trap group, click Add new

entry.

Configure the trap group to send all trap notifications to a target IP address—for example, to the IP address

192.174.6.6.

Configure the trap group to generate

SNMP notifications on authentication failures, environment alarms, and changes in link state for any of the interfaces.

2.

In the Group name box, type the name of the group as a free-form text string.

1.

Next to Targets, click Add new

entry.

2.

In the Target box, type the IP address 192.174.6.6, and click

OK.

1.

Click Categories.

2.

Select the Authentication, Chassis, and Link check boxes.

3.

Click OK.

edit snmp

Create a community: set trap-group trap-group-name

Set the trap-group target to

192.174.6.6: set trap-group trap-group-name target

192.174.6.6

Configure the trap group categories: set trap-group trap-group-name categories authentication chassis link

Controlling Access to MIBs

By default, an SNMP community is granted access to all MIBs. To control the

MIBs to which a particular community has access, configure SNMP views that include the MIBs you want to explicitly grant or deny access to.

To configure SNMP views:

1.

2.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

To configure SNMP views, perform the configuration tasks described in

Table 101.

250

Configuring SNMP with a Configuration Editor

Configuring SNMP for Network Management

3.

If you are finished configuring the network, commit the configuration.

4.

To check the configuration, see “Verifying the SNMP Configuration” on page

251.

Table 101: Configuring SNMP Views

Task

Navigate to the SNMP level in the configuration hierarchy.

Create a view.

1.

Next to View, click Add new entry.

2.

In the Name box, type the name of the view as a free-form text string.

1.

Next to Oid, click Add new entry.

Configure the view to include a MIB—for example, pingMIB.

2.

In the Name box, type the OID of the pingMIB, in either dotted integer or subtree name format.

edit snmp

Create a view: set view view-name

Set the pingMIB OID value and mark it for inclusion: set view view-name oid 1.3.6.1.2.1.80

include

Configure the view to exclude a

MIB—for example, jnxPingMIB.

3.

In the View action box, select

include from the drop-down menu, and click OK.

1.

Next to Oid, click Add new entry.

2.

In the Name box, type the OID of the jnxPingMIB, in either dotted integer or subtree name format.

Set the jnxPingMIB OID value and mark it for exclusion: set view view-name oid jnxPingMIB exclude

Associate the view with a community.

J-Web Configuration Editor

In the configuration editor hierarchy, select Snmp.

3.

In the View action box, select

exclude from the drop-down menu, and click OK twice.

1.

On the Snmp page, under

Community, click the name of the community to which you want to apply the view.

2.

In the View box, type the view name.

3.

Click OK.

CLI Configuration Editor

From the top of the configuration hierarchy, enter:

Set the community view: set community community-name view

view-name

Verifying the SNMP Configuration

To verify the SNMP configuration, perform the following verification task.

Verifying the SNMP Configuration

251

J-series™ Services Router User Guide

Verifying SNMP Agent Configuration

Purpose

Verify that SNMP is running and that requests and traps are being properly transmitted.

From the CLI, enter the show snmp statistics command.

Action

Sample Output

What It Means user@host> show snmp statistics

SNMP statistics:

Input:

Packets: 246213, Bad versions: 12, Bad community names: 12,

Bad community uses: 0, ASN parse errors: 96,

Too bigs: 0, No such names: 0, Bad values: 0,

Read onlys: 0, General errors: 0,

Total request varbinds: 227084, Total set varbinds: 67,

Get requests: 44942, Get nexts: 190371, Set requests: 10712,

Get responses: 0, Traps: 0,

Silent drops: 0, Proxy drops: 0, Commit pending drops: 0,

Throttle drops: 0,

V3 Input:

Unknown security models: 0, Invalid messages: 0

Unknown pdu handlers: 0, Unavailable contexts: 0

Unknown contexts: 0, Unsupported security levels: 1

Not in time windows: 0, Unknown user names: 0

Unknown engine ids: 44, Wrong digests: 23, Decryption errors: 0

Output:

Packets: 246093, Too bigs: 0, No such names: 31561,

Bad values: 0, General errors: 2,

Get requests: 0, Get nexts: 0, Set requests: 0,

Get responses: 246025, Traps: 0

The output shows a list of the SNMP statistics, including details about the number and types of packets transmitted. Verify the following information:

The number of requests and traps is increasing as expected with the SNMP client configuration.

Under

Bad community names

, the number of bad (invalid) communities is not increasing. A sharp increase in the number of invalid community names generally means that one or more community strings are configured incorrectly.

For more information about show snmp statistics

, see the JUNOS Protocols, Class of

Service, and System Basics Command Reference.

252

Verifying the SNMP Configuration

Part 5

Configuring Routing Protocols

Routing Overview on page 255

Configuring Static Routes on page 285

Configuring a RIP Network on page 297

Configuring an OSPF Network on page 309

Configuring BGP Sessions on page 331

Configuring Routing Protocols 253

254

Configuring Routing Protocols

Chapter 12

Routing Overview

At its most fundamental level, routing is the process of delivering a message across a network or networks. This task is divided into two primary components: the exchange of routing information to accurately forward packets from source to destination and the packet-forwarding process.

To use the routing capabilities of a J-series Services Router, you must understand the fundamentals of IP routing and the routing protocols that are primarily responsible for the transmission of unicast traffic. To read this chapter, you need a basic understanding of IP addressing and TCP/IP.

This chapter includes the following topics. For more information, see the JUNOS

Routing Protocols Configuration Guide.

Routing Terms on page 255

Routing Overview on page 259

RIP Overview on page 265

OSPF Overview on page 269

BGP Overview on page 274

Routing Terms

To understand routing, become familiar with the terms defined in Table 102 .

Table 102: Routing Terms

Term Definition

adjacency

Portion of the local routing information that pertains to the reachability of a single neighbor over a single circuit or interface.

area

Administrative group of OSPF networks within an autonomous system (AS) that operates independently from other areas in the AS. Multiple areas within an AS reduce the amount of link-state advertisement (LSA) traffic on the network and the size of topology databases.

area border router (ABR)

In OSPF, a router having interfaces in multiple areas of an autonomous system (AS) so that it can link the areas to each other. An area border router maintains a separate topological database for each area it is connected to and shares topology information between areas.

Routing Terms

255

J-series™ Services Router User Guide

Term Definition

AS path

In BGP, the list of autonomous system (ASs) that a packet must traverse to reach a given set of destinations within a single AS.

autonomous system (AS)

Network or collection of routers under a single administrative authority.

backbone area

In OSPF, the central area in an autonomous system (AS) to which all other areas are connected by area border routers (ABRs). The backbone area always has the area ID 0.0.0.0.

bidirectional connectivity

Ability of directly connected devices to communicate with each other over the same link.

Border Gateway Protocol

(BGP) broadcast cluster

Exterior gateway protocol used to exchange routing information among routers in different autonomous systems.

Operation of sending network traffic from one network node to all other network nodes.

In BGP, a set of routers that have been grouped together. A cluster consists of one system that acts as a route reflector, along with any number of client peers. The client peers receive their route information only from the route reflector system. Routers in a cluster do not need to be fully meshed.

confederation confederation sequence convergence cost designated router (DR) distance vector dynamic routing exterior gateway protocol

(EGP) external BGP (EBGP)

In BGP, a group of autonomous systems (ASs) that appears to external ASs to be a single AS.

Ordered set of autonomous systems (ASs) for a confederation. The closest AS in the path is first in the sequence.

After a topology change, the time all the routers in a network take to receive the information and update their routing tables.

Unitless number assigned to a path between neighbors, based on throughput, round-trip time, and reliability. The sum of path costs between source and destination hosts determines the overall path cost. OSPF uses the lowest cost to determine the best path.

In OSPF, a node designated to process link-state advertisements (LSAs) and distribute topology updates for an autonomous system (AS).

Number of hops to a routing destination.

Routing method that enables the route of a message through a network to change as network conditions change. Compare static routing .

Protocol that exchanges routing information between autonomous systems (ASs). BGP is an

EGP. Compare interior gateway protocol (IGP) .

BGP configuration in which sessions are established between routers in different autonomous systems (ASs).

external peer external route flooding forwarding table full mesh gateway router global AS

In BGP, a peer that resides in a different autonomous system (AS) from the Services Router.

Route to an area outside the network.

Technique by which a router forwards traffic to every node attached to the router, except the node from which the traffic arrived. Flooding is a simple but sometimes inefficient way to distribute routing information quickly to every node in a network. RIP and OSPF are flooding protocols, but BGP is not.

JUNOS software forwarding information base (FIB). The JUNOS routing protocol process installs active routes from its routing tables into the Routing Engine forwarding table. The kernel copies this forwarding table into the Packet Forwarding Engine, which is responsible for determining which interface transmits the packets.

Network in which devices are organized in a mesh topology, with each node connected to every other network node.

Node on a network that serves as an entrance to another network.

Global autonomous system (AS). An AS consisting of multiple subautonomous systems

(sub-ASs).

256

Routing Terms

Routing Overview

Term Definition

handshake hello packet hold time hop

Process of exchanging signaling information between two communications devices to establish the method and transmission speed of a connection.

In OSPF, a packet sent periodically by a router to first establish and then maintain network adjacency, and to discover neighbor routers.

Maximum number of seconds allowed to elapse between the time a BGP system receives successive keepalive or update messages from a peer.

Trip a data packet takes from one router to another in the network. The number of routers through which a packet passes to get from its source to its destination is known as the hop count. In general, the best route is the one with the shortest hop count.

Link-state, interior gateway routing protocol for IP networks that also uses the shortest-path-first

(SPF) algorithm to determine routes.

Intermediate

System-to-Intermediate

System (IS-IS) interior gateway protocol

(IGP)

Internal BGP (IBGP) internal peer keepalive message latency link-state advertisement

(LSA) local preference mesh metric

Protocol that exchanges routing information within autonomous systems (ASs). IS-IS, OSPF, and RIP are IGPs. Compare exterior gateway protocol (EGP) .

BGP configuration in which sessions are established between routers in the same autonomous systems (ASs).

In BGP, a peer that resides in the same autonomous system (AS) as the Services Router.

Periodic message sent by one BGP peer to another to verify that the session between them is still active.

Delay.

Messages that announce the presence of OSPF-enabled interfaces to adjacent OSPF interfaces

(neighbors). The exchange of LSAs establishes bidirectional connectivity between neighbors.

Optional BGP path attribute carried in internal BGP update packets that indicates the degree of preference for an external route.

Network topology in which devices are organized in a manageable, segmented manner with many, often redundant, interconnections between network nodes. See also full mesh .

Numerical value that determines how quickly a packet can reach its destination. See also cost .

Optional BGP path attribute consisting of a metric value that is used to determine the exit point to a destination when all other factors in determining the exit point are equal.

Adjacent router interface. A node can directly route packets to its neighbors only. See also peer .

Series of nodes interconnected by communication paths.

multiple exit discriminator (MED) neighbor network network diameter network topology node notification message

Maximum hop count in a network.

Arrangement of nodes and connections in a network.

Connection point that operates as a redistribution point or an end point in a network, recognizing data transmissions and either forwarding or processing them.

Message sent between BGP peers to inform the receiving peer that the sending peer is terminating the session because an error occurred, and explaining the error.

not-so-stubby area (NSSA)

In OSPF, a type of stub area in which external route advertisements can be flooded.

open message

Message sent between BGP peers to establish communication.

Open Shortest Path First protocol (OSPF) origin

A link-state interior gateway protocol (IGP) that makes routing decisions based on the shortest-path-first (SPF) algorithm (also referred to as the Dijkstra algorithm).

Value assigned to a BGP route to indicate whether the first router to advertise the route learned it from an external, internal, or unknown source.

Routing Terms

257

J-series™ Services Router User Guide

Term

path-vector protocol peer peering point of presence (POP) poison reverse propagation reachability round-robin route advertisement route aggregation route reflection

Routing Information

Protocol (RIP) routing table split horizon static routing stub area

Definition

Protocol that uses the path between autonomous systems (ASs) to select the best route, rather than the shortest distance or the characteristics of the route (link state). BGP is a path-vector protocol. In contrast, RIP is a distance-vector protocol, and OSPF and IS-IS are link-state protocols.

Immediately adjacent router with which a protocol relationship has been established. See also neighbor .

The practice of exchanging Internet traffic with directly connected peers according to commercial and contractual agreements.

Access point to the Internet, having a unique IP address, where telecommunications equipment is located. POPs usually belong to Internet service providers (ISPs) or telephone companies.

An efficiency technique in a RIP network. By setting the number of hops to an unavailable router to 16 hops or more, a router informs all the other routers in the network. Because RIP allows only up to 15 hops to another router, this technique reduces RIP updates and helps defeat large routing loops. See also split horizon .

Process of translating and forwarding route information discovered by one routing protocol in the update messages of another routing protocol. Route propagation is also known as route redistribution.

In BGP, the feasibility of a route.

Scheduling algorithm in which items have the same priority and are handled in a fixed cyclic order.

Distribution of routing information at specified intervals throughout a network, to establish adjacencies with neighbors and communicate usable routes to active destinations. See also

link-state advertisement (LSA) .

Combining groups of routes with common addresses into a single entry in the routing table, to decrease routing table size and the number of route advertisements sent by a router.

In BGP, configuring a group of routers into a cluster and having one system act as a route reflector, redistributing routes from outside the cluster to all routers in the cluster. Routers in a cluster do not need to be fully meshed.

Distance-vector routing protocol that keeps a database of routing information gathered from periodic broadcasts by each router in a network.

Table stored on a router that keeps track of all possible paths (routes) between sources and destinations in a network and, in some cases, metrics associated with the routes.

An efficiency technique in a RIP network. A router reduces the number of RIP updates in the network by not retransmitting a route advertisement out the interface through which it was received. Split-horizon updates also help prevent routing loops. See also poison reverse .

Routing method in which routes are manually entered in the routing table and do not change unless you explicitly update them. Unlike dynamic routes, which must be imported into the routing table each time a host comes online, static routes are available immediately. Static routes are generally preferred over other types of routes. Compare dynamic routing .

In OSPF, an area through which or into which autonomous system (AS) external route advertisements are not flooded.

Autonomous system (AS) members of a BGP confederation.

subautonomous system

(sub-AS) subnetwork three-way handshake

Subdivision of a network, which functions exactly like a network except that it has a more specific address and subnet mask (destination prefix).

Process by which two routers synchronize protocols and establish a bidirectional connection.

258

Routing Terms

Routing Overview

Term

topology database triggered update virtual link

Definition

Map of connections between the nodes in a network. The topology database is stored in each node.

In a network that uses RIP, a routing update that is automatically sent whenever routing information changes.

In OSPF, a link you create between two area border routers (ABRs) that have an interface to a common nonbackbone area, to connect a third area to the backbone area. One of the area border routers must be directly connected to the backbone area.

Routing Overview

Routing is the transmission of data packets from a source to a destination address.

For packets to be correctly forwarded to the appropriate host address, the host must have a unique numeric identifier or IP address. The unique IP address of the destination host forms entries in the routing table. These entries are primarily responsible for determining the path that a packet traverses when transmitted from source to destination.

This overview includes these topics:

Networks and Subnetworks on page 259

Autonomous Systems on page 260

Interior and Exterior Gateway Protocols on page 260

Routing Tables on page 260

Forwarding Tables on page 261

Dynamic and Static Routing on page 262

Route Advertisements on page 263

Route Aggregation on page 263

Networks and Subnetworks

Large groups of machines that are interconnected and can communicate with one another form networks. Typically, networks identify large systems of computers and devices that are owned or operated by a single entity. Traffic is routed between or through the networks as data is passed from host to host.

As networks grow large, the ability to maintain the network and effectively route traffic between hosts within the network becomes increasingly difficult. To accommodate growth, networks are divided into subnetworks.

Fundamentally, subnetworks behave exactly like networks, except that they are identified by a more specific network address and subnet mask

Routing Overview

259

J-series™ Services Router User Guide

(destination prefix). Subnetworks have routing gateways and share routing information in exactly the same way as large networks.

Autonomous Systems

A large network or collection of routers under a single administrative authority is termed an autonomous system (AS). Autonomous systems are identified by a unique numeric identifier that is assigned by the Internet Assigned

Numbers Authority (IANA). Typically, the hosts within an AS are treated as internal peers, and hosts in a peer AS are treated as external peers. The status of the relationship between hosts—internal or external—governs the protocol used to exchange routing information.

Interior and Exterior Gateway Protocols

Routing information that is shared within an AS is transmitted by an interior gateway protocol (IGP). Of the different IGPs, the most common are RIP, OSPF, and IS-IS. IGPs are designed to be fast acting and light duty. They typically incorporate only a moderate security system, because trusted internal peers do not require the stringent security measures that untrusted peers require.

As a result, you can usually begin routing within an AS by enabling the IGP on all internal interfaces and performing minimal additional configuration.

You do not need to establish individual adjacencies.

Routing information that is shared with a peer AS is transmitted by an exterior gateway protocol (EGP). The primary EGP in use in almost all networks is the Border Gateway Protocol (BGP). BGP is designed to be very secure. Individual connections must be explicitly configured on each side of the link. As a result, although large numbers of connections are difficult to configure and maintain, each connection is secure.

Routing Tables

To route traffic from a source host to a destination host, the routers through which the traffic will pass must learn the path that the packet is to take. Once learned, the information is stored in routing tables. The routing table maintains a list of all the

possible paths from point A to point B. Figure 55 shows a simple network of routers.

260

Routing Overview

Routing Overview

Figure 55: Simple Network Topology

Boise

Detroit

San Francisco New Yor k

Denver Cleveland

Houston

Phoenix Miami

This simple network provides multiple ways to get from host San Francisco to host Miami. The packet can follow the path through Denver and Cleveland.

Alternatively, the packet can be routed through Phoenix and directly to Miami. The routing table includes all the possible paths and combinations—an exhaustive list of all the ways to get from the source to the destination.

The routing table must include every possible path from a source to a

destination. Routing tables for the network in Figure 55 must include entries

for San Francisco-Denver, San Francisco-Cleveland, San Francisco-Miami,

Denver-Cleveland, and so on. As the number of sources and destinations increases, the routing table quickly becomes large. The unwieldy size of routing tables in the primary reason for the division of networks into subnetworks.

Forwarding Tables

If the routing table is a list of all the possible paths a packet can take, the forwarding table is a list of only the best routes to a particular destination.

The best path is determined according to the particular routing protocol being used, but generally the number of hops between the source and destination determines the best possible route.

In the network shown in Figure 55, because the path with the fewest number of

hops from San Francisco to Miami is through Phoenix, the forwarding table distills all the possible San Francisco-Miami routes into the single route through Phoenix. All traffic with a destination address of Miami is sent directly to the next hop, Phoenix.

After it receives a packet, the Phoenix router performs another route lookup, using the same destination address. The Phoenix router then routes the packet

Routing Overview

261

J-series™ Services Router User Guide appropriately. Although it considers the entire path, the router at any individual hop along the way is responsible only for transmitting the packet to the next hop in the path. If the Phoenix router is managing its traffic in a particular way, it might send the packet through Houston on its route to Miami. This scenario is likely if specific customer traffic is treated as priority traffic and routed through a faster or more direct route, while all other traffic is treated as nonpriority traffic.

Dynamic and Static Routing

Entries are imported into a router’s routing table from dynamic routing protocols or by manual inclusion as static routes. Dynamic routing protocols allow routers to learn the network topology from the network. The routers within the network send out routing information in the form of route advertisements.

These advertisements establish and communicate active destinations, which are then shared with other routers in the network.

Although dynamic routing protocols are extremely useful, they have associated costs. Because they use the network to advertise routes, dynamic routing protocols consume bandwidth. Additionally, because they rely on the transmission and receipt of route advertisements to build a routing table, dynamic routing protocols create a delay (latency) between the time a router is powered on and the time during which routes are imported into the routing table. Some routes are therefore effectively unavailable until the routing table is completely updated, when the router first comes online or when routes change within the network (due to a host going offline, for example).

Static routing avoids the bandwidth cost and route import latency of dynamic routing. Static routes are manually included in the routing table, and never change unless you explicitly update them. Static routes are automatically imported into the routing table when a router first comes online. Additionally, all traffic destined for a static address is routed through the same router. This feature is particularly useful for networks with customers whose traffic must always flow through the

same routers. Figure 56 shows a network that uses static routes.

Figure 56: Static Routing Example

Customer network

192.176.14.72

192.176.14.80

192.176.14.111

...

A

Internet

In Figure 56, the customer routes in the

192.176.14/24 subnetwork are static routes.

These are hard links to specific customer hosts that never change. Because all traffic destined for any of these routes is forwarded through router A, these routes are included as static routes in router A’s routing table. Router A then advertises these routes to other hosts so that traffic can be routed to and from them.

262

Routing Overview

Routing Overview

Route Advertisements

The routing table and forwarding table contain the routes for the routers within a network. These routes are learned through the exchange of route advertisements. Route advertisements are exchanged according to the particular protocol being employed within the network.

Generally, a router transmits hello packets out each of its interfaces.

Neighboring routers detect these packets and establish adjacencies with the router. The adjacencies are then shared with other neighboring routers, which allows the routers to build up the entire network topology

in a topology database, as shown in Figure 57.

Figure 57: Route Advertisement

D E

B C

A

In Figure 57, router A sends out hello packets to each of its neighbors. Routers B

and C detect these packets and establish an adjacent relationship with router A.

Router B and C then share this information with their neighbors, routers D and E, respectively. By sharing information throughout the network, the routers create a network topology, which they use to determine the paths to all possible destinations within the network. The routes are then distilled into the forwarding table of best routes according to the route selection criteria of the protocol in use.

Route Aggregation

As the number of hosts in a network increases, the routing and forwarding tables must establish and maintain more routes. As these tables become larger, the time routers require to look up particular routes so that packets can be forwarded becomes prohibitive. The solution to the problem of growing routing tables is to

group (aggregate) the routers by subnetwork, as shown in Figure 58.

Routing Overview

263

J-series™ Services Router User Guide

Figure 58: Route Aggregation

170.16.124.17

AS 3

170.16.124/24

172.16/16

172.16/16

AS 10

264

Routing Overview

AS 17

Figure 58 shows three different ASs. Each AS contains multiple subnetworks

with thousands of host addresses. To allow traffic to be sent from any host to any host, the routing tables for each host must include a route for each destination. For the routing tables to include every combination of hosts, the flooding of route advertisements for each possible route becomes prohibitive.

In a network of hosts numbering in the thousands or even millions, simple route advertisement is not only impractical but impossible.

By employing route aggregation, instead of advertising a route for each host in

AS 3, the gateway router advertises only a single route that includes all the routes to all the hosts within the AS. For example, instead of advertising the particular route

170.16.124.17

, the AS 3 gateway router advertises only

170.16/16

.

This single route advertisement encompasses all the hosts within the

170.16/16 subnetwork, which reduces the number of routes in the routing table from 216

(one for every possible IP address within the subnetwork) to 1. Any traffic

Routing Overview destined for a host within the AS is forwarded to the gateway router, which is then responsible for forwarding the packet to the appropriate host.

Similarly, in this example, the gateway router is responsible for maintaining 216 routes within the AS (in addition to any external routes). The division of this AS into subnetworks allows for further route aggregation to reduce this number. In the subnetwork in the example, the subnetwork gateway router advertises only a single route (

170.16.124/24

), which reduces the number of routes from 28 to 1.

RIP Overview

In a Routing Information Protocol (RIP) network, each router’s forwarding table is distributed among the nodes through the flooding of routing table information.

Because topology changes are flooded throughout the network, every node maintains the same list of destinations. Packets are then routed to these destinations based on path-cost calculations done at each node in the network.

This overview includes the following topics:

Distance-Vector Routing Protocols on page 265

Maximizing Hop Count on page 266

RIP Packets on page 267

Split Horizon and Poison Reverse Efficiency Techniques on page 267

Limitations of Unidirectional Connectivity on page 268

NOTE: The J-series Services Router supports both RIP version 1 and RIP version 2.

In this guide, the term RIP refers to both versions of the protocol.

Distance-Vector Routing Protocols

Distance-vector routing protocols transmit routing information that includes a distance vector, typically expressed as the number of hops to the destination. This information is flooded out all protocol-enabled interfaces at regular intervals (every

30 seconds in the case of RIP) to create a network map that is stored in each node’s

local topology database.Figure 59 shows how distance-vector routing works.

RIP Overview

265

J-series™ Services Router User Guide

Figure 59: Distance-Vector Protocol

C=1

D=2

E=3

A

Routing information

B

X=1

Y=2

Z=3

Route table A

C=1

D=2

E=3

X=2

Y=3

Z=4

Route table B

X=1

Y=2

Z=3

C=2

D=3

E=4

In Figure 59, routers A and B have RIP enabled on adjacent interfaces. Router A

has known RIP neighbors routers C, D, and E, which are 1, 2, and 3 hops away, respectively. Router B has known RIP neighbors routers X, Y, and Z, which are

1, 2, and 3 hops away, respectively. Every 30 seconds, each router floods its entire routing table information out all RIP-enabled interfaces. In this case, flooding exchanges routing table information across the RIP link.

When router A receives routing information from router B, it adds 1 to the hop count to determine the new hop count. For example, router X has a hop count of 1, but when router A imports the route to X, the new hop count is 2. The imported route also includes information about where the route was learned, so that the original route is imported as a route to router X through router B with a hop count of 2.

When multiple routes to the same host are received, RIP uses the distance-vector algorithm to determine which path to import into the forwarding table. The route with the smallest hop count is imported. If there are multiple routes with the same hop count, all are imported into the forwarding table, and traffic is sent along the paths in round-robin fashion.

Maximizing Hop Count

The successful routing of traffic across a RIP network requires that every node in the network maintain the same view of the topology. Topology information is broadcast between RIP neighbors every 30 seconds. If router A is many hops away from a new host, router B, the route to B might take significant time to propagate through the network and be imported into router A’s routing table. If the two routers are 5 hops away from each other, router A cannot import the route to router B until 2.5 minutes after router B is online. For large numbers of hops, the delay becomes prohibitive. To help prevent this delay from growing arbitrarily large, RIP enforces a maximum hop count of 15 hops. Any prefix that is more than 15 hops away is treated as unreachable and assigned a hop count equal to infinity. This maximum hop count is called the network diameter.

266

RIP Overview

Routing Overview

RIP Packets

Routing information is exchanged in a RIP network by RIP request and RIP response packets. A router that has just booted can broadcast a RIP request on all RIP-enabled interfaces. Any routers running RIP on those links receive the request and respond by sending a RIP response packet immediately to the router. The response packet contains the routing table information required to build the local copy of the network topology map.

In the absence of RIP request packets, all RIP routers broadcast a RIP response packet every 30 seconds on all RIP-enabled interfaces. The RIP broadcast is the primary way in which topology information is flooded throughout the network.

Once a router learns about a particular destination through RIP, it starts a timer. Every time it receives a new response packet with information about the destination, the router resets the timer to zero. However, if the router receives no updates about a particular destination for 180 seconds, it removes the destination from its RIP routing table.

In addition to the regular transmission of RIP packets every 30 seconds, if a router detects a new neighbor or detects that an interface is unavailable, it generates a triggered update. The new routing information is immediately broadcast out all RIP-enabled interfaces, and the change is reflected in all subsequent RIP response packets.

Split Horizon and Poison Reverse Efficiency Techniques

Because RIP functions by periodically flooding the entire routing table out to the network, it generates a lot of traffic. The split horizon and poison reverse techniques can help reduce the amount of network traffic originated by RIP hosts and make the transmission of routing information more efficient.

If a router receives a set of route advertisements on a particular interface, RIP determines that those advertisements do not need to be retransmitted out the same interface. This technique, known as split horizon, helps limit the amount of RIP routing traffic by eliminating information that other neighbors on that interface

have already learned. Figure 60 shows an example of the split horizon technique.

Figure 60: Split Horizon Example

C

D A B

E

RIP Overview

267

J-series™ Services Router User Guide

In Figure 60, router A advertises routes to routers C, D, and E to router B.

In this example, router A can reach router C in 2 hops. When router A advertises the route to router B, B imports it as a route to router C through router A in 3 hops. If router B then readvertised this route to router A, A would import it as a route to router C through router B in 4 hops. However, the advertisement from router B to router A is unnecessary, because router A can already reach the route in 2 hops. The split horizon technique helps reduce extra traffic by eliminating this type of route advertisement.

Similarly, the poison reverse technique helps to optimize the transmission of routing information and improve the time to reach network convergence.

If router A learns about unreachable routes through one of its interfaces, it advertises those routes as unreachable (hop count of 16) out the same interface.

Figure 61 shows an example of the poison reverse technique.

Figure 61: Poison Reverse Example

D

C

A

B

E

In Figure 61, router A learns through one of its interfaces that routes to routers

C, D, and E are unreachable. Router A readvertises those routes out the same interface as unreachable. The advertisement informs router B that hosts C,

D, and E are definitely not reachable through router A.

Limitations of Unidirectional Connectivity

Because RIP processes routing information based solely on the receipt of routing

table updates, it cannot ensure bidirectional connectivity. As Figure 62 shows,

RIP networks are limited by their unidirectional connectivity.

268

RIP Overview

Routing Overview

Figure 62: Limitations of Unidirectional Connectivity

E A B

C D

In Figure 62, routers A and D flood their routing table information to router

B. Because the path to router E has the fewest hops when routed through router A, that route is imported into router B’s forwarding table. However, suppose that router A can transmit traffic but is not receiving traffic from router B due to an unavailable link or invalid routing policy. If the only route to router E is through router A, any traffic destined for router A is lost, because bidirectional connectivity was never established.

OSPF establishes bidirectional connectivity with a three-way handshake. For

more information, see “Link-State Advertisements” on page 270.

OSPF Overview

In an Open Shortest Path First (OSPF) network, the network topology is distributed among the nodes of the autonomous system (AS) and is regularly updated through the exchange of link-state advertisements (LSAs). As a result, OSPF is known as a link-state protocol. Because topology changes are flooded throughout the network, every node maintains the same copy of the network map in its local topological database. Packets are then routed based on the shared topology using the shortest path first (SPF) algorithm.

This overview includes the following topics:

Link-State Advertisements on page 270

Role of the Designated Router on page 270

Path Cost Metrics on page 271

Areas and Area Border Routers on page 271

Role of the Backbone Area on page 272

Stub Areas and Not-So-Stubby Areas on page 273

OSPF Overview

269

J-series™ Services Router User Guide

NOTE: The J-series services gateway supports both OSPF version 2 and OSPF version 3. In this guide, the term OSPF refers to both versions of the protocol.

Link-State Advertisements

OSPF creates a topology map by flooding link-state advertisements (LSAs) across OSPF-enabled links. LSAs announce the presence of OSPF-enabled interfaces to adjacent OSPF interfaces. The exchange of LSAs establishes bidirectional connectivity between all adjacent OSPF interfaces (neighbors)

using a three-way handshake, as shown in Figure 63.

Figure 63: OSPF Three-Way Handshake

A

A transmits hello packet

B

B generates response packet

A acknowledges B’s response

In Figure 63, router A sends hello packets out all its OSPF-enabled interfaces

when it comes online. Router B receives the packet, which establishes that router

B can receive traffic from router A. Router B generates a response to router A to acknowledge receipt of the hello packet. When router A receives the response, it establishes that router B can receive traffic from router A. Router A then generates a final response packet to inform router B that router A can receive traffic from router B. This three-way handshake ensures bidirectional connectivity.

As new neighbors are added to the network or existing neighbors lose connectivity, the adjacencies in the topology map are modified accordingly through the exchange (or absence) of LSAs. These LSAs advertise only the incremental changes in the network, which helps minimize the amount of OSPF traffic on the network. The adjacencies are shared and used to create the network topology in the topological database.

Role of the Designated Router

Large local area networks (LANs) that have many routers and therefore many OSPF adjacencies can produce heavy control-packet traffic as LSAs are flooded across the network. To alleviate the potential traffic problem, OSPF uses designated routers

(DRs). Rather than broadcasting LSAs to all their OSPF neighbors, the routers send their LSAs to the designated router, which processes the LSAs, generates responses, and multicasts topology updates to all OSPF routers.

270

OSPF Overview

Routing Overview

In LANs, the election of the designated router takes place when the OSPF network is initially established. When the first OSPF links are active, the router with the highest router identifier (defined by the router-id configuration value or the loopback address) is elected designated router. The router with the second highest router identifier is elected the backup designated router (BDR). If the designated router fails or loses connectivity, the BDR assumes its role and a new

BDR election takes place between all the routers in the OSPF network.

Path Cost Metrics

Once the topology is shared across the network, OSPF uses it to route packets between network nodes. Each path between neighbors is assigned a cost based on the throughput, round-trip time, and reliability of the link. The sum of the costs across a particular path between hosts determines the overall cost of the path.

Packets are then routed along the shortest path using the shortest path first (SPF) algorithm. If multiple equal-cost paths exist between a source and destination address, OSPF routes packets along each path alternately, in round-robin fashion.

OSPF allows you to manually assign a cost (or metric) to a particular path segment to control the flow of packets across the network.

Areas and Area Border Routers

The OSPF networks in an AS are administratively grouped into areas. Each area within an AS operates like an independent network and has a unique 32-bit area ID, which functions like a network address. Within an area, the topology database contains only information about the area, LSAs are flooded only to nodes within the area, and routes are computed only within the area. Subnetworks are divided into other areas, which are connected to form the whole of the main network.

The central area of an AS, called the backbone area, has a special function and is always assigned the area ID

0.0.0.0

. Area IDs are unique numeric identifiers, in dotted decimal notation, but they are not IP addresses. Area IDs need only be unique within an AS. All other networks or areas in the AS must be directly connected to the backbone area by a router that has interfaces in more than one

area. These connecting routers are called area border routers (ABRs). Figure 64

shows an OSPF topology of three areas connected by two area border routers.

OSPF Overview

271

J-series™ Services Router User Guide

Figure 64: Multiarea OSPF Topology

Area 1

C

Area 2

B

A

Area 0

Area border routers are responsible for sharing topology information between areas. They summarize the link-state records of each area and advertise destination address summaries to neighboring areas. The advertisements contain the ID of the area in which each destination lies, so that packets are routed to the appropriate

area border router. For example, in the OSPF areas shown in Figure 64, packets sent

from router A to router C are automatically routed through area border router B.

Role of the Backbone Area

An OSPF restriction requires all areas to be directly connected to the backbone area so that packets can be properly routed. All packets are routed first to the backbone area by default. Packets that are destined for an area other than the backbone area are then routed to the appropriate area border router and on to the remote host within the destination area.

In large networks with many areas, in which direct connectivity between all areas and the backbone area is physically difficult or impossible, you can configure virtual links to connect noncontiguous areas. For example,

Figure 65 shows a virtual link between a noncontiguous area and the

backbone area through an area connected to both.

272

OSPF Overview

Routing Overview

Figure 65: OSPF Topology with a Virtual Link

Area 0.0.0.0

Virtual link

Area 0.0.0.3

Area 0.0.0.2

In the topology shown in Figure 65, a virtual link is established between area

0.0.0.3

and the backbone area through area

0.0.0.2

. All outbound traffic destined for other areas is routed through area

0.0.0.2

to the backbone area and then to the appropriate area border router. All inbound traffic destined for area

0.0.0.3

is routed to the backbone area and then through area

0.0.0.2

.

Stub Areas and Not-So-Stubby Areas

Figure 66 shows an AS across which many external routes are advertised.

If external routes make up a significant portion of a topology database, you can suppress the advertisements in areas that do not have links outside the network. By doing so, you can reduce the amount of memory the nodes use to maintain the topology database and free it for other uses.

OSPF Overview

273

J-series™ Services Router User Guide

Figure 66: OSPF AS Network with Stub Areas and NSSAs

Area 0.0.0.0

Area 0.0.0:4

Static customer routes

192.112.67.14

192.112.67.29

...

Area 0.0.0.3

To control the advertisement of external routes into an area, OSPF uses stub areas. By designating an area border router interface to the area as a stub interface, you suppress external route advertisements through the area border router. Instead, the area border router automatically advertises a default route (through itself) in place of the external routes. Packets destined for external routes are automatically sent to the area border router, which acts as a gateway for outbound traffic and routes them appropriately.

For example, area

0.0.0.3

in Figure 66 is not directly connected to the outside

network. All outbound traffic is routed through the area border router to the backbone and then to the destination addresses. By designating area

0.0.0.3

a stub area, you reduce the size of the topology database for that area by limiting the route entries to only those routes internal to the area.

Like area

0.0.0.3

in Figure 66, area

0.0.0.4

has no external connections. However, area

0.0.0.4

has static customer routes that are not internal OSPF routes. You can limit the external route advertisements to the area and advertise the static customer routes by designating it a not-so-stubby area (NSSA). External routes are flooded into the NSSA and then leaked to the other areas, but external routes from other areas are not advertised within the NSSA.

BGP Overview

The Border Gateway Protocol (BGP) is an exterior gateway protocol (EGP) used primarily to establish point-to-point connections and transmit data between peer

ASs. Unlike the IGPs RIP and OSPF, BGP must explicitly advertise the routes between its peers. The route advertisements determine prefix reachability and the

274

BGP Overview

Routing Overview way packets are routed between BGP neighbors. Because BGP uses the packet path to determine route selection, it is considered a path-vector protocol.

This overview includes the following topics:

Point-to-Point Connections on page 275

BGP Messages for Session Establishment on page 276

BGP Messages for Session Maintenance on page 276

IBGP and EBGP on page 276

Route Selection on page 277

Local Preference on page 278

AS Path on page 279

Origin on page 279

Multiple Exit Discriminator on page 280

Scaling BGP for Large Networks on page 280

Point-to-Point Connections

To establish point-to-point connections between peer ASs, you configure

a BGP session on each interface of a point-to-point link. Figure 67

shows an example of a BGP peering session.

Figure 67: BGP Peering Session

AS 3

AS 10

OSPF RIP

A

BGP

B

In Figure 67, router A is a gateway router for AS 3, and router B is a gateway

router for AS 10. For traffic internal to either AS, an IGP (OSPF, for instance) is used. To route traffic between peer ASs, a BGP session is used.

BGP Overview

275

J-series™ Services Router User Guide

BGP Messages for Session Establishment

When the routers on either end of a BGP session first boot, the session between them is in the

Idle state. The BGP session remains idle until a start event is detected. Typically, the start event is the configuration of a new BGP session or the resetting of an existing BGP session. At boot time, the start event is generated by the router as the BGP session is initiated.

After it detects a start event, the BGP host sends TCP request packets to its configured BGP neighbors. These packets are directed only to neighboring interfaces that have been explicitly configured as BGP neighbors. Upon receipt of the TCP request packet, the neighboring host generates a TCP response to complete the three-way handshake and establish a TCP connection between the peers. While this handshake is taking place, the BGP state for the connection is

Connect

. If a TCP timeout occurs while the originating host is waiting for a TCP response packet, the

BGP state for the connection is

Active

. The

Active state indicates that the router is actively listening for a TCP response and the TCP retry timer has been initiated.

Once a TCP connection has been established between both ends of a BGP session, the BGP session state is

OpenSent

, indicating that the originating router has generated an open message. The open message is an initial BGP handshake that must occur before any route advertisement can take place. Upon receipt of the open message, the neighboring router generates a keepalive message.

Receipt of the keepalive message establishes a point-to-point connection, and the

BGP session state transitions to

Established

. While the originating host waits for the keepalive response packet, the BGP session state is

OpenConfirm

.

BGP Messages for Session Maintenance

Once a BGP session has been established, the BGP peers exchange route advertisements by means of update messages. Update messages contain a one or more route advertisements, and they can contain one or more prefixes that are to be removed from the BGP routing table. If the peers need to advertise multiple routes, they generate and send multiple update messages as they detect changes to the network. In the absence of changes to the routing table, no update messages are generated.

While a BGP session is active, each router on the BGP session generates keepalive messages periodically. The timing of these messages is determined by the hold time on the session. The hold time is a negotiated value specifying the number of seconds that can elapse without keepalive messages before BGP designates the link inactive. Three messages are sent during every hold time interval.

When a peer connection is closed (either by error or if the BGP session is closed), a notification message is generated and sent to the peer router that did not experience the error or did not terminate the BGP session.

IBGP and EBGP

BGP uses two primary modes of information exchange, internal BGP (IBGP) and external BGP (EBGP), to communicate with internal and external peers, respectively.

276

BGP Overview

Routing Overview

Peer ASs establish links through an external peer BGP session. As a result, all route advertisement between the external peers takes place by means of the EBGP mode of information exchange. To propagate the routes through the AS and advertise them to internal peers, BGP uses IBGP. To advertise the routes to a different peer AS, BGP again uses EBGP.

To avoid routing loops, IBGP does not advertise routes learned from an internal

BGP peer to other internal BGP peers. For this reason, BGP cannot propagate routes throughout an AS by passing them from one router to another. Instead,

BGP requires that all internal peers be fully meshed so that any route advertised by one router is advertised to all peers within the AS.

As a network grows, the full mesh requirement becomes increasingly difficult to manage. In a network with 1000 routers, the addition of a single router requires that all the routers in the network be modified to account for the new addition. To combat these scaling problems, BGP uses route reflection and BGP confederations.

For information about route reflection, see “Scaling BGP for Large Networks” on page 280. For information about routing confederations, see “Scaling

BGP for Large Networks” on page 280.

Route Selection

A local BGP router uses the following primary criteria to select a route from the routing table for the forwarding table:

1.

2.

3.

4.

Next-hop accessible—If the next hop is inaccessible, the local router does not consider the route. The router must verify that it has a route to the BGP next-hop address. If a local route to the next hop does not exist, the local route does not include the router in its forwarding table. If such a route exists, route selection continues.

Highest local preference—The local router selects the route with the highest local preference value. If multiple routes have the same preference, route

selection continues. (For more information, see “Local Preference” on page

278.)

Shortest AS path—The local router selects the route with the fewest entries in the AS path. If multiple routes have the same AS path length, route selection

continues. (For more information, see “AS Path” on page 279.)

Lowest origin—The local router selects the route with the lowest origin value. If multiple routes have the same origin value, route selection continues. (For

more information, see “Origin” on page 279.)

5.

Lowest MED value—The local router selects the route with the lowest multiple exit discriminator (MED) value. If multiple routes have the same MED

value, route selection continues. (For more information, see “Multiple Exit

Discriminator” on page 280.)

If more than one route remains after all these criteria are evaluated, the local BGP router evaluates a set of secondary criteria to select the single route to a destination

BGP Overview

277

J-series™ Services Router User Guide for its forwarding table. The secondary criteria include whether the route was learned through an EBGP or IBGP, the IGP route metric, and the router ID.

Local Preference

The local preference is typically used to direct all outbound AS traffic to a certain peer. When you configure a local preference, all routes that are advertised through that peer are assigned the preference value. The preference is a numeric value,

and higher values are preferred during BGP route selection. Figure 68 illustrates

how to use local preference to determine BGP route selection.

Figure 68: Local Preference

Host E

Router C Router D

OC-3 OC-48

Router A Router B

Local preference = 100 Local preference = 300

The network in Figure 68 shows two possible routes to the prefixes accessible

through host E. The first route, through router A, uses an OC3 link to router

C and is then forwarded to host E. The second route, through router B, uses an OC48 link to router D and is then forwarded to host E. Although the number of hops to host E is identical regardless of the route selected, the route through router B is more desirable because of the increased bandwidth. To force traffic through router B, you can set the local preference on router A to

100 and the local preference on router B to

300

. During BGP route selection, the route with the higher local preference is selected.

278

BGP Overview

Routing Overview

NOTE: In contrast to almost every other metric associated with dynamic routing protocols, the local preference gives higher precedence to the larger value.

AS Path

Figure 69: BGP AS Path

Routes advertised by BGP maintain a list of the ASs through which the route travels.

This information is stored in the route advertisement as the AS path, and it is one of the primary criteria that a local router uses to evaluate BGP routes for inclusion in

its forwarding table. Figure 69 shows how BGP creates an AS path.

A

AS path = 4 7 17

AS 4

AS path = 7 17

AS 7

AS path = 17

B

AS 17

Origin

In the network shown in Figure 69, the route from host A to host B travels through

two intermediate ASs. As the route advertisement is propagated through the BGP network, it accumulates an AS path number each time it exits one AS and enters another. Each AS number is prepended to the AS path, which is stored as part of the route advertisement. When the route advertisement first leaves host B’s AS, the AS path is

17

. When the route is advertised between intermediate ASs, the

AS number

7 is prepended to the AS path, which becomes

7 17

. When the route advertisement exits the third AS, the AS path becomes

4 7 17

. The route with the shortest AS path is preferred for inclusion into the BGP forwarding table.

The BGP router that first advertises a route assigns it of the following values to identify its origin. During route selection, the lowest origin value is preferred.

0

—The router originally learned the route through an IGP (OSPF, IS-IS, or a static route).

1

—The router originally learned the route through an EGP (most likely BGP).

2

—The route’s origin is unknown.

BGP Overview

279

J-series™ Services Router User Guide

Multiple Exit Discriminator

Because the AS path rather than the number of hops between hosts is the primary criterion for BGP route selection, an AS with multiple connections to a neighbor AS can have multiple equivalent AS paths. When the routing table contains two routes to the same host in a neighboring AS, a multiple exit discriminator (MED) metric assigned to each route can determine which to include in the forwarding table. The

MED metric you assign can force traffic through a particular exit point in an AS.

Figure 70 illustrates how to use an MED metric to determine route selection.

Figure 70: MED Example

AS 1 E

E MED = 10

F MED = 20

C

A

AS 2

F

D

F MED = 10

E MED = 20

B

Figure 70 shows AS 1 and AS 2 connected by two separate BGP links to routers

C and D. Host E in AS 1 is located nearer router C. Host F also in AS 1, and is located nearer router D. Because the AS paths are equivalent, two routes exist for each host, one through router C and one through router D. To force all traffic destined for host E through router C, network administrator for AS 2 assigns an MED metric for each router to host E at its exit point. An MED metric of 10 is assigned to the route to host E through router C, and an MED metric of 20 is assigned to the route to host E through router D. BGP routers in AS 2 then select the route with the lower MED metric for the forwarding table.

Scaling BGP for Large Networks

BGP is not a flooding protocol like RIP or OSPF. Instead, it is a peering protocol that exchanges routes with fully meshed peers only. However, in large networks, the full mesh requirement causes scaling problems. BGP combats scaling problems with the following methods:

Route Reflectors—for Added Hierarchy on page 281

280

BGP Overview

Routing Overview

Confederations—for Subdivision on page 283

Route Reflectors—for Added Hierarchy

To use route reflection in an AS, you designate one or more routers as a route reflector—typically, one per point of presence (POP) . Route reflectors have the special BGP ability to readvertise routes learned from an internal peer to other internal peers. So rather than requiring all internal peers to be fully meshed with each other, route reflection requires only that the route reflector be fully meshed with all internal peers. The route reflector and all

its internal peers form a cluster, as shown in Figure 71.

Figure 71: Simple Route Reflector Topology (One Cluster)

RR

Cluster 127

Figure 71 shows router RR configured as the route reflector for cluster 127.

The other routers are designated internal peers within the cluster. BGP routes are advertised to router RR by any of the internal peers. RR then readvertises those routes to all other peers within the cluster.

You can configure multiple clusters and link them by configuring a full

mesh of route reflectors (see Figure 72).

BGP Overview

281

J-series™ Services Router User Guide

Figure 72: Basic Route Reflection (Multiple Clusters)

RR 2

RR 1

RR 4

RR 3

Figure 72 shows route reflectors RR1, RR2, RR3, and RR4 as fully meshed internal

peers. When a router advertises a route to reflector RR1, RR1 readvertises the route to the other route reflectors, which, in turn, readvertise the route to the remaining routers within the AS. Route reflection allows the route to be propagated throughout the AS without the scaling problems created by the full mesh requirement.

However, as clusters become large, a full mesh with a route reflector becomes difficult to scale, as does a full mesh between route reflectors. To help offset this problem, you can group clusters of routers together into clusters of

clusters for hierarchical route reflection (see Figure 73).

282

BGP Overview

Figure 73: Hierarchical Route Reflection (Clusters of Clusters)

Cluster 6

RR 1

Cluster 127

RR 2

Cluster 19

RR 3

Cluster 45

RR 4

Routing Overview

Figure 73 shows RR2, RR3, and RR4 as the route reflectors for clusters 127, 19,

and 45, respectively. Rather than fully mesh those route reflectors, the network administrator has configured them as part of another cluster (cluster 6) for which RR1 is the route reflector. When a router advertises a route to RR2, RR2 readvertises the route to all the routers within its own cluster, and then readvertises the route to RR1. RR1 readvertises the route to the routers in its cluster, and those routers propagate the route down through their clusters.

Confederations—for Subdivision

BGP confederations are another way to solve the scaling problems created by the

BGP full mesh requirement. BGP confederations effectively break up a large AS into subautonomous systems (sub-ASs). Each sub-AS must be uniquely identified within the confederation AS by a sub-AS number. Typically, sub-AS numbers are taken from the private AS numbers between 64512 and 65535.

Within a sub-AS, the same IBGP full mesh requirement exists. Connections to other confederations are made with standard EBGP, and peers outside the sub-AS are treated as external. To avoid routing loops, a sub-AS uses a confederation sequence, which operates like an AS path but uses only the privately assigned sub-AS numbers.

The confederation AS appears whole to other confederation ASs. The AS path received by other ASs shows only the globally assigned AS number. It does not include the confederation sequence or the privately assigned sub-AS numbers. The sub-AS numbers are removed when the route is advertised out of the confederation

AS. Figure 74 shows an AS divided into four confederations.

BGP Overview

283

J-series™ Services Router User Guide

Figure 74: BGP Confederations

Sub-AS 64517

AS 3

Sub-AS 64550

IBGP IBGP

EBGP

Sub-AS 65300 Sub-AS 65410

Figure 74 shows AS 3 divided into four sub-ASs, 64517, 64550, 65300, and

65410, which are linked through EBGP sessions. Because the confederations are connected by EBGP, they do not need to be fully meshed. EBGP routes are readvertised to other sub-ASs.

284

BGP Overview

Chapter 13

Configuring Static Routes

Static routes are routes that you explicitly enter into the routing table as permanent additions. Traffic through static routes is always routed the same way.

You can use either J-Web Quick Configuration or a configuration editor to configure static routes.

This chapter contains the following topics. For more information about static routes, see the JUNOS Routing Protocols Configuration Guide.

Static Routing Overview on page 285

Before You Begin on page 287

Configuring Static Routes with Quick Configuration on page 288

Configuring Static Routes with a Configuration Editor on page 290

Verifying the Static Route Configuration on page 295

Static Routing Overview

Routes that are permanent fixtures in the routing and forwarding tables are often configured as static routes. These routes generally do not change, and often include only one or very few paths to the destination.

To create a static route in the routing table, you must, at minimum, define the route as static and associate a next-hop address with it. The static route in the routing table is inserted into the forwarding table when the next-hop address is reachable. All traffic destined for the static route is transmitted to the next-hop address for transit.

Static Route Preferences

A static route destination address can have multiple next hops associated with it. In this case, multiple routes are inserted into the routing table, and route selection must occur. Because the primary criterion for route selection is the route preference, you can control the routes that are used as the primary route for a particular destination by setting the route preference associated with a particular next hop.

The routes with a higher preference are always used to route traffic. When you do not set a preferred route, traffic is alternated between routes in round-robin fashion.

Static Routing Overview

285

J-series™ Services Router User Guide

Qualified Next Hops

In general, the default properties assigned to a static route apply to all the next-hop addresses configured for the static route. If, however, you want to configure two possible next-hop addresses for a particular route and have them treated differently, you can define one as a qualified next hop.

Qualified next hops allow you to associate one or more properties with a particular next-hop address. You can set an overall preference for a particular static route and then specify a different preference for the qualified next hop.

For example, suppose two next-hop addresses (

10.10.10.10

and

10.10.10.7

) are associated with the static route

192.168.47.5/32

. A general preference is assigned to the entire static route, and then a different preference is assigned to only the qualified next-hop address

10.10.10.7

. For example: route 192.168.47.5/32 { next-hop 10.10.10.10; qualified-next-hop 10.10.10.7 { preference 2;

}

} preference 6;

In this example, the qualified next hop

10.10.10.7

is assigned the preference

2

, and the next-hop

10.10.10.10

is assigned the preference

6

.

Control of Static Routes

You can control the importation of static routes into the routing and forwarding tables in a number of ways. Primary ways include assigning one or more of the following attributes to the route: retain

—Keeps the route in the forwarding table after the routing process shuts

down or the Services Router reboots. For more information, see “Route

Retention” on page 286.

no-readvertise

—Prevents the route from being readvertised to other routing

protocols. For more information, see “Readvertisement Prevention” on page

287.

passive

—Rejects traffic destined for the route. For more information, see

“Forced Rejection of Passive Route Traffic” on page 287.

Route Retention

By default, static routes are not retained in the forwarding table when the routing process shuts down. When the routing process starts up again, any routes configured as static routes must be added to the forwarding table again. To avoid this latency, routes can be flagged as retain

, so that they are kept in the forwarding table even after the routing process shuts down. Retention ensures that the routes are always in the forwarding table, even immediately after a system reboot.

286

Static Routing Overview

Configuring Static Routes

Readvertisement Prevention

Static routes are eligible for readvertisement by other routing protocols by default.

In a stub area where you might not want to readvertise these static routes under any circumstances, you can flag the static routes as no-readvertise

.

Forced Rejection of Passive Route Traffic

Generally, only active routes are included in the routing and forwarding tables. If a static route’s next-hop address is unreachable, the route is marked passive

, and it is not included in the routing or forwarding tables. To force a route to be included in the routing tables regardless of next-hop reachability, you can flag the route as passive

. If a route is flagged passive and its next-hop address is unreachable, the route is included in the routing table and all traffic destined for the route is rejected.

Default Properties

The basic configuration of static routes defines properties for a particular route. To define a set of properties to be used as defaults on all static routes, set those properties as default values. For example: defaults { retain; no-readvertise; passive;

} route 0.0.0.0/0 next-hop 192.168.1.1;

} route 192.168.47.5/32 { next-hop 10.10.10.10; qualified-next-hop 10.10.10.7 {

} preference 6; preference 2;

In this example, the retain

, no-readvertise

, and passive attributes are set as defaults for all static routes. If any local setting for a particular route conflicts with the default values, the local setting supersedes the default.

Before You Begin

Before you begin configuring static routes, complete the following tasks:

Establish basic connectivity. See “Establishing Basic Connectivity” on page 47.

Configure network interfaces. See “Configuring Network Interfaces” on page 79.

Before You Begin

287

J-series™ Services Router User Guide

Configuring Static Routes with Quick Configuration

J-Web Quick Configuration allows you to configure static routes. Figure 75

shows the Quick Configuration Routing page for static routing.

Figure 75: Quick Configuration Routing Page for Static Routing

To configure static routes with Quick Configuration:

1.

2.

3.

In the J-Web user interface, select Configuration>Routing>Static Routing.

Enter information into the Static Routing Quick Configuration, as described

in Table 103.

From the main static routing Quick Configuration page, click one of the following buttons:

288

Configuring Static Routes with Quick Configuration

Configuring Static Routes

To apply the configuration and stay on the Quick Configuration Routing page for static routing, click Apply.

To apply the configuration and return to the Quick Configuration Routing page, click OK.

4.

To cancel your entries and return to the Quick Configuration Routing page, click Cancel.

To check the configuration, see “Verifying the Static Route Configuration” on page 295.

Table 103: Static Routing Quick Configuration Summary

Function Field

Default Route

Default Route Specifies the default gateway for the router.

Static Routes

Static Route Address (required)

Next-Hop Addresses

Your Action

Type the 32-bit IP address of the

Services Gateway’s default route in dotted decimal notation.

Specifies the static route to add to the routing table.

Specifies the next-hop address or addresses to be used when routing traffic to the static route.

1.

On the main static routing Quick

Configuration page, click Add.

2.

In the Static Route Address box, type the 32-bit IP address of the static route in dotted decimal notation.

1.

In the Add box, type the 32-bit IP address of the next-hop host.

2.

Click Add.

3.

Add more next-hop addresses as necessary.

NOTE:

If a route has multiple next-hop addresses, traffic is routed across each address in round-robin fashion.

4.

When you have finished adding next-hop addresses, click OK.

Configuring Static Routes with Quick Configuration

289

J-series™ Services Router User Guide

Configuring Static Routes with a Configuration Editor

To configure static routes on the Services Router, you must perform the following tasks marked (Required) .

(Required) “Configuring a Basic Set of Static Routes” on page 290

(Optional)“Controlling Static Route Selection” on page 291

(Optional)“Controlling Static Routes in the Routing and Forwarding Tables” on page 293

(Optional)“Defining Default Behavior for All Static Routes” on page 294

For information about using the J-Web and CLI configuration editors, see

“Using J-series Configuration Tools” on page 127.

Configuring a Basic Set of Static Routes

Customer routes that are connected to stub networks are often configured

as static routes. Figure 76 shows a sample network.

Figure 76: Customer Routes Connected to a Stub Network

10.10.10.10

192.168.47.5

192.168.47.6

...

Customer network

To configure customer routes as static routes, like the ones in Figure 76, follow

these steps on the Services Router to which the customer routes are connected:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

2.

Perform the configuration tasks described in Table 104.

290

Configuring Static Routes with a Configuration Editor

Configuring Static Routes

3.

If you are finished configuring static routes, commit the configuration.

4.

Go on to one of the following procedures:

To manually control static route selection, see “Controlling Static Route

Selection” on page 291.

To determine how static routes are imported into the routing and

forwarding tables, see “Controlling Static Routes in the Routing and

Forwarding Tables” on page 293.

To define default properties for static routes, see “Defining Default

Behavior for All Static Routes” on page 294.

To check the configuration, see “Verifying the Static Route Configuration” on page 295.

Table 104: Configuring Basic Static Routes

Task

Navigate to the Static level in the configuration hierarchy.

Add the static route 192.168.47.5/32, and define the next-hop address

10.10.10.10.

J-Web Configuration Editor

In the configuration editor hierarchy, select Routing options>Static.

1.

In the Route field, click Add new

entry.

2.

In the Destination box, enter

192.168.47.5/32.

3.

From the Next hop list, select Next

hop.

4.

In the Next hop field, click Add

new entry.

5.

In the Value box, enter 10.10.10.10.

6.

Click OK.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit routing-options static

Define the static route and set the next-hop address: set route 192.168.47.5 next-hop

10.10.10.10

Controlling Static Route Selection

When multiple next hops exist for a single static route (see Figure 77), you

can specify how traffic is to be routed to the destination.

Configuring Static Routes with a Configuration Editor

291

J-series™ Services Router User Guide

Figure 77: Controlling Static Routes in the Routing and Forwarding Tables

10.10.10.10

OC 3 OC 12

10.10.10.7

192.168.47.5

192.168.47.6

...

Customer network

2.

3.

4.

In this example, the static route

192.168.47.5/32 has two possible next hops.

Because of the links between those next-hop hosts, host

10.10.10.7

is the preferred path. To configure the static route

192.168.47.5/32 with two next hops and give preference to host

10.10.10.7

, follow these steps:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or the CLI configuration editor.

Perform the configuration tasks described in Table 105.

If you are finished configuring static routes, commit the configuration.

Go on to one of the following procedures:

To determine how static routes are imported into the routing and

forwarding tables, see “Controlling Static Routes in the Routing and

Forwarding Tables” on page 293.

To define default properties for static routes, see “Defining Default

Behavior for All Static Routes” on page 294.

To check the configuration, see “Verifying the Static Route Configuration” on page 295.

292

Configuring Static Routes with a Configuration Editor

Configuring Static Routes

Table 105: Controlling Static Route Selection

Task

Navigate to the Static level in the configuration hierarchy.

Add the static route 192.168.47.5/32, and define the next-hop address

10.10.10.10.

Set the preference for the 10.10.10.10

next hop to 7.

Define the qualified next-hop address

10.10.10.7.

Set the preference for the 10.10.10.7

qualified next hop to 6.

J-Web Configuration Editor

In the configuration editor hierarchy, select Protocols>Static.

CLI Configuration Editor

From the top of the configuration hierarchy, enter

1.

In the Route field, click Add new

entry.

2.

In the Destination box, enter

192.168.47.5/32.

3.

From the Next hop list, select Next

hop.

edit routing-options static

Define the static route and set the next-hop address: set route 192.168.47.5 next-hop

10.10.10.10

4.

In the Next hop field, click Add

new entry.

5.

In the Value box, enter 10.10.10.10.

6.

Click OK.

1.

Under Preference, in the Metric value box, enter 7.

Set the preference to 7: set route 192.168.47.5 next-hop

10.10.10.10 preference 7

Set the qualified-next-hop address:

2.

Click OK.

1.

In the Qualified next hop field, click Add new entry.

2.

In the Nexthop field, enter

10.10.10.7.

3.

Click OK.

1.

Under Preference, in the Metric value box, enter 6.

set route 192.168.47.5

qualified-next-hop 10.10.10.7

Set the preference to 6:

2.

Click OK.

set route 192.168.47.5

qualified-next-hop 10.10.10.7

preference 6

Controlling Static Routes in the Routing and Forwarding Tables

Static routes have a number of attributes that define how they are inserted and maintained in the routing and forwarding tables. To customize this behavior for the static route

192.168.47.5/32

, perform these steps:

2.

3.

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 106.

If you are finished configuring static routes, commit the configuration.

4.

Go on to one of the following procedures:

Configuring Static Routes with a Configuration Editor

293

J-series™ Services Router User Guide

To define default properties for static routes, see “Defining Default

Behavior for All Static Routes” on page 294.

To check the configuration, see “Verifying the Static Route Configuration” on page 295.

Table 106: Controlling Static Routes in the Routing and Forwarding Tables

Task

Navigate to the 192.168.47.5/32 level in the configuration hierarchy.

Specify that the route is to be retained in the forwarding table after the routing process shuts down. By default, static routes are not retained.

Specify that the static route is not to be readvertised. By default, static routes are eligible to be readvertised.

Specify that the static route is to be included in the routing table whether the route is active or not. By default, passive routes are not included in the routing table.

J-Web Configuration Editor

In the configuration editor hierarchy, select Routing options>Static, then click 192.168.47.5/32 in the Destination field.

CLI Configuration Editor

From the top of the configuration hierarchy, enter

1.

Next to Retain, select the Yes check box.

edit routing-options static route

192.168.47.5/32

Set the retain attribute: set retain

2.

Click OK.

1.

Next to Readvertise, select the No check box.

Set the no-readvertise attribute: set no-readvertise

2.

Click OK.

1.

From the Passive flag list, select

Passive.

2.

Click OK.

Set the passive attribute: set passive

Defining Default Behavior for All Static Routes

Attributes that define static route behavior can be configured either at the individual route level or as a default behavior that applies to all static routes. In the case of conflicting configuration, the configuration at the individual route level overrides static route defaults. To configure static route defaults, perform these steps:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

3.

4.

2.

Perform the configuration tasks described in Table 107.

If you are finished configuring static routes, commit the configuration.

To check the configuration, see “Verifying the Static Route Configuration” on page 295.

294

Configuring Static Routes with a Configuration Editor

Configuring Static Routes

Table 107: Defining Static Route Defaults

Task

Navigate to the Defaults level in the configuration hierarchy.

Specify that the route is to be retained in the forwarding table after the routing process shuts down. By default, static routes are not retained.

Specify that the static route is not to be readvertised. By default, static routes are eligible to be readvertised.

Specify that the static route is to be included in the routing table whether the route is active or not. By default, passive routes are not included in the routing table.

J-Web Configuration Editor

In the configuration editor hierarchy, select Protocols>Static, and then click

Configure next to Defaults.

CLI Configuration Editor

From the top of the configuration hierarchy, enter

1.

Next to Retain, select the Yes check box.

edit routing-options static defaults

Set the retain attribute: set retain

2.

Click OK.

1.

Next to Readvertise, select the No check box.

Set the no-readvertise attribute: set no-readvertise

2.

Click OK.

1.

From the Passive flag list, select

Passive.

Set the passive attribute: set passive

2.

Click OK.

Verifying the Static Route Configuration

Verify that the static routes are in the routing table and that those routes are active.

Displaying the Routing Table

Purpose

Verify static route configuration as follows by displaying the routing table and checking its contents.

From the CLI, enter the show route terse command.

Action

Sample Output user@host> show route terse inet.0: 20 destinations, 20 routes (20 active, 0 holddown, 0 hidden)

+ = Active Route, - = Last Active, * = Both

A Destination

* 192.168.47.5/32

P Prf

S

Metric 1

5

Metric 2 Next hop

Reject

AS path

* 172.16.0.0/12

* 192.168.0.0/18

* 192.168.40.0/22

* 192.168.64.0/18

S

S

S

S

5

5

5

5

>192.168.71.254

>192.168.71.254

>192.168.71.254

>192.168.71.254

* 192.168.64.0/21 D

* 192.168.71.246/32 L

* 192.168.220.4/30

* 192.168.220.5/32

D

L

* 192.168.220.8/30

* 192.168.220.9/32

* 192.168.220.12/30 D

D

L

0

0

0

0

0

0

0

>fxp0.0

Local

>fe-0/0/1.0

Local

>fe-0/0/2.0

Local

>fe-0/0/3.0

Verifying the Static Route Configuration

295

J-series™ Services Router User Guide

What It Means

* 192.168.220.13/32 L

* 192.168.220.17/32 L

* 192.168.220.21/32 L

* 192.168.220.24/30 D

* 192.168.220.25/32 L

* 192.168.220.28/30 D

* 192.168.220.29/32 L

* 224.0.0.9/32

0

R 100

0

0

0

0

0

0

1

Local

Reject

Reject

>at-1/0/0.0

Local

>at-1/0/1.0

Local

MultiRecv

The output shows a list of the routes that are currently in the inet.0

routing table.

Verify the following information:

Each configured static route is present. Routes are listed in ascending order by

IP address. Static routes are identified with an

S in the protocol (

P

) column of the output.

Each static route is active. Routes that are active show the next-hop IP address in the

Next hop column. If a route’s next-hop address is unreachable, the next-hop address is identified as

Reject

. These routes are not active routes, but they appear in the routing table because the passive attribute is set.

The preference for each static route is correct. The preference for a particular route is listed in the

Prf column of the output.

296

Verifying the Static Route Configuration

Chapter 14

Configuring a RIP Network

The Routing Information Protocol (RIP) is an interior gateway protocol that routes packets within a single autonomous system (AS). To use RIP, you must understand the basic components of a RIP network and configure the J-series Services Router to act as a node in the network.

NOTE: The J-series Services Router supports only RIP version 1 and RIP version 2.

Unless otherwise specified, the term RIP in this chapter refers to these versions of the protocol.

You can use either J-Web Quick Configuration or a configuration editor to configure a RIP network.

This chapter contains the following topics. For more information about RIP, see the

JUNOS Routing Protocols Configuration Guide.

RIP Overview on page 297

Before You Begin on page 298

Configuring a RIP Network with Quick Configuration on page 298

Configuring a RIP Network with a Configuration Editor on page 301

Verifying the RIP Configuration on page 307

RIP Overview

To achieve basic connectivity between all RIP hosts in a RIP network, you need only enable RIP on every interface that is expected to transmit and receive RIP traffic. To do so, you define RIP groups, which are logical groupings of interfaces, and add interfaces to those groups. No additional configuration is required to pass traffic on a RIP network.

RIP Traffic Control with Metrics

To tune a RIP network and control traffic flowing through the network, you modify the incoming and outgoing metric attributes, which are set to

1 by default. These attributes manually specify the metric on any route that is advertised through that

RIP Overview

297

J-series™ Services Router User Guide host. By increasing or decreasing these metrics—and thus the cost—of links throughout the network, you can control packet transmission across the network.

Authentication

RIPv2 provides authentication support so that RIP links can require authentication keys (passwords) before they become active. These authentication keys can be specified in either plain-text or MD5 form. Authentication provides an additional layer of security on the network beyond the other security features.

This type of authentication is not supported on RIPv1 networks.

Before You Begin

Before you begin configuring a RIP network, complete the following tasks:

Establish basic connectivity. See “Establishing Basic Connectivity” on page 47.

Configure network interfaces. See “Configuring Network Interfaces” on page 79.

Configuring a RIP Network with Quick Configuration

J-Web Quick Configuration allows you to create RIP networks. Figure 78

shows the Quick Configuration Routing page for RIP.

298

Configuring a RIP Network with Quick Configuration

Figure 78: Quick Configuration Routing Page for RIP

Configuring a RIP Network

To configure a RIP network with Quick Configuration:

1.

2.

3.

In the J-Web user interface, select Configuration>Routing>RIP Routing.

Enter information into the Quick Configuration page for RIP, as described

in Table 108.

From the main RIP routing Quick Configuration page, click one of the following buttons:

To apply the configuration and stay on the Quick Configuration Routing page for RIP, click Apply.

To apply the configuration and return to the Quick Configuration Routing page, click OK.

To cancel your entries and return to the Quick Configuration Routing page, click Cancel.

4.

To check the configuration, see “Verifying the RIP Configuration” on page 307.

Configuring a RIP Network with Quick Configuration

299

J-series™ Services Router User Guide

Table 108: RIP Routing Quick Configuration Summary

Function Field

RIP

Enable RIP

Advertise Default Route

RIP-Enabled Interfaces

Enables or disables RIP.

Advertises the default route using RIPv2.

Designates one or more Services Router interfaces on which RIP is enabled.

Your Action

To enable RIP, select the check box.

To disable RIP, clear the check box.

To advertise the default route using

RIPv2, select the check box.

To disable the default route advertisement, clear the check box.

The first time you configure RIP, the Logical

Interfaces box displays a list of all the logical interfaces configured on the Services Router.

Do any of the following:

To enable RIP on an interface, click the interface name to highlight it, and click the left arrow to add the interface to the RIP interfaces list.

To enable RIP on multiple interfaces at once, press Ctrl while you click multiple interface names to highlight them. Then click the left arrow to add the interfaces to the RIP interfaces list.

To enable RIP on all logical interfaces except the special fxp0 management interface, select All Interfaces in the

Logical Interfaces list and click the left arrow.

To enable RIP on all the interfaces displayed in the Logical Interfaces list, click All to highlight every interface.

Then click the left arrow to add the interfaces to the RIP interfaces list.

To disable RIP on one or more interfaces, highlight the interface(s) in the RIP interfaces box and click the right arrow to move them back to the

Logical Interfaces list.

300

Configuring a RIP Network with Quick Configuration

Configuring a RIP Network

Configuring a RIP Network with a Configuration Editor

To configure the Services Router as a node in a RIP network, you must perform the following task marked (Required) .

(Required) “Configuring a Basic RIP Network” on page 301

(Optional) “Controlling Traffic in a RIP Network” on page 302

(Optional) “Enabling Authentication for RIP Exchanges” on page 305

For information about using the J-Web and CLI configuration editors, see

“Using J-series Configuration Tools” on page 127.

Configuring a Basic RIP Network

To use RIP on the Services Router, you must configure RIP on all the RIP

interfaces within a network like the one shown in Figure 79.

Figure 79: Typical RIP Network Topology

To configure a RIP network like the one in Figure 79, perform these

steps on each Services Router in the network:

2.

3.

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 109.

If you are finished configuring the network, commit the configuration.

Configuring a RIP Network with a Configuration Editor

301

J-series™ Services Router User Guide

4.

After you add the appropriate interfaces to the RIP group, RIP begins sending routing information. No additional configuration is required to enable RIP traffic on the network.

Go on to one of the following procedures:

To control RIP traffic on the network, see “Controlling Traffic in a RIP

Network” on page 302.

To authenticate RIP exchanges, see “Enabling Authentication for RIP

Exchanges” on page 305.

To check the configuration, see “Verifying the RIP Configuration” on page 307.

Table 109: Configuring a RIP Network

Task

Navigate to the Rip level in the configuration hierarchy.

Create the RIP group alpha1.

Add interfaces to the RIP group alpha1.

J-Web Configuration Editor

In the configuration editor hierarchy, select Protocols>Rip.

CLI Configuration Editor

From the top of the configuration hierarchy, enter

1.

In the Group field, click Add new

entry.

2.

In the Group name box, type alpha1.

1.

In the Neighbor field, click Add

new entry.

edit protocols rip

1.

Create the RIP group alpha1, and add an interface: set group alpha1 neighbor fe-0/0/0.0

2.

In the Neighbor name box, type the name of an interface on the

Services Router—for example, fe-0/0/0.0—and click OK.

3.

Repeat Step 2 for each interface on this Services Router that you are adding to the backbone area. Only one interface is required.

2.

Repeat Step 1 for each interface on this Services Router that you are adding to the backbone area. Only one interface is required.

Controlling Traffic in a RIP Network

There are two primary means for controlling traffic in a RIP network: the incoming metric and the outgoing metric. To modify these attributes, see the following sections:

Controlling Traffic with the Incoming Metric on page 303

Controlling Traffic with the Outgoing Metric on page 304

302

Configuring a RIP Network with a Configuration Editor

Configuring a RIP Network

Controlling Traffic with the Incoming Metric

Depending on the RIP network topology and the links between nodes in the network, you might want to control traffic flow through the network to

maximize flow across higher-bandwidth links. Figure 80 shows a network

with alternate routes between routers A and D.

Figure 80: Controlling Traffic in a RIP Network with the Incoming Metric

A B E

Metric 3 OC 12

C D

OC 3

In this example, each of the two routes from router A to router D has two hops.

However, because the link from router B to router D has a higher bandwidth than the link from router C to D, you want traffic to flow from router A through

B to D. To force this flow, you can increase the incoming metric on router C from

1

(the default) to

3 to make this route less preferable.

To modify the incoming metric on router C and force traffic through router D:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

2.

3.

4.

Perform the configuration tasks described in Table 110.

If you are finished configuring the network, commit the configuration.

Go on to one of the following procedures:

To authenticate RIP exchanges, see “Enabling Authentication for RIP

Exchanges” on page 305.

To check the configuration, see “Verifying the RIP Configuration” on page 307.

Configuring a RIP Network with a Configuration Editor

303

J-series™ Services Router User Guide

Table 110: Modifying the Incoming Metric

Task

In the configuration hierarchy, navigate to the level of an interface in the alpha1

RIP group.

J-Web Configuration Editor

1.

In the configuration editor hierarchy, select Protocols>Rip, and click alpha1 in the Group name field.

Increase the incoming metric to 3.

2.

Click the interface name—for example, fe-0/0/0.0—in the

Neighbor name field.

In the Metric in box, type 3, and click

OK.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit protocols rip group alpha1 neighbor fe-0/0/0

Set the incoming metric to 3: set metric-in 3

Controlling Traffic with the Outgoing Metric

If a route being exported was learned from a member of the same RIP group, the metric associated with that route is the normal RIP metric. For example, a RIP route with a metric of 5 learned from a neighbor configured with an incoming metric of 2 is advertised with a combined metric of 7 when advertised to neighbors in the same group. However, if this route was learned from a RIP neighbor in a different group or from a different protocol, the route is advertised with

the metric value configured for that group with the outgoing metric. Figure 81

shows a network with alternate routes between routers A and D.

Figure 81: Controlling Traffic in a RIP Network with the Outgoing Metric

Beta 1

A B

OC 12

Beta 2

E

Alpha 1

C

OC 3

D

In this example, each of the two routes from router A to router D has two hops.

However, because the link from router B to router D has a higher bandwidth than the link from router C to D, you want traffic to flow from router A through

B to D. In this case, the A-to-B link is in a different RIP group from the B-to-D

304

Configuring a RIP Network with a Configuration Editor

Configuring a RIP Network link. As a result, the incoming metric is not sufficient to control traffic flow.

To force traffic through router B, you can increase the outgoing metric on router C to make the route through C less preferable.

2.

3.

4.

To modify the outgoing metric on router C and force traffic through router D:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 111.

If you are finished configuring the network, commit the configuration.

Go on to one of the following procedures:

To authenticate RIP exchanges, see “Enabling Authentication for RIP

Exchanges” on page 305.

To check the configuration, see “Verifying the RIP Configuration” on page 307.

Table 111: Modifying the Outgoing Metric

Task

Navigate to the alpha1 level in the configuration hierarchy.

Increase the outgoing metric to 5.

J-Web Configuration Editor

In the configuration editor hierarchy, select Protocols>Rip, and then click

alpha1 in the Group name field.

In the Metric out box, type 5, and click

OK.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit protocols rip group alpha1

Set the outgoing metric to 5: set metric-out 5

Enabling Authentication for RIP Exchanges

All RIPv2 protocol exchanges can be authenticated to guarantee that only trusted routers participate in the AS’s routing. By default, this authentication is disabled.

Authentication is performed at the area level, requiring all routers within the area to have the same authentication and corresponding key configured.

You can enable RIP authentication exchanges by either of the following methods:

Enabling Authentication with Plain-Text Passwords on page 306

Enabling Authentication with MD5 Authentication on page 306

Configuring a RIP Network with a Configuration Editor

305

J-series™ Services Router User Guide

Enabling Authentication with Plain-Text Passwords

2.

3.

4.

To configure authentication that requires a plain-text password to be included in the transmitted packet, enable simple authentication by performing these steps on all RIP Services Routers in the area:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 112.

If you are finished configuring the network, commit the configuration.

To check the configuration, see “Verifying the RIP Configuration” on page 307.

Table 112: Configuring Simple RIP Authentication

Task J-Web Configuration Editor

Navigate to Rip level in the configuration hierarchy.

In the configuration editor hierarchy, select Protocols>Rip.

Set the authentication type to simple.

Set the authentication key to a simple-text password.

The password can be from 1 through

16 contiguous characters long and can include any ASCII strings.

CLI Configuration Editor

From the top of the configuration hierarchy, enter

From the Authentication type list, select

simple.

edit protocols rip

Set the authentication type to simple:

In the Authentication key box, type a simple-text password, and click OK.

set authentication-type simple

Set the authentication key to a simple-text password: set authentication-key password

Enabling Authentication with MD5 Authentication

To configure authentication that requires an MD5 password to be included in the transmitted packet, enable MD5 authentication by performing these steps on all RIP Services Routers in the area:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

2.

3.

4.

Perform the configuration tasks described in Table 113.

If you are finished configuring the network, commit the configuration.

To check the configuration, see “Verifying the RIP Configuration” on page 307.

306

Configuring a RIP Network with a Configuration Editor

Configuring a RIP Network

Table 113: Configuring MD5 RIP Authentication

Task

Navigate to Rip level in the configuration hierarchy.

J-Web Configuration Editor

In the configuration editor hierarchy, select Protocols>Rip.

Set the authentication type to MD5.

Set the MD5 authentication key

(password).

The key can be from 1 through

16 contiguous characters long and can include any ASCII strings.

CLI Configuration Editor

From the top of the configuration hierarchy, enter

From the Authentication type list, select

md5.

edit protocols rip

Set the authentication type to md5:

In the Authentication key box, type an

MD5 authentication key, and click OK.

set authentication-type md5

Set the MD5 authentication key: set authentication-key password

Verifying the RIP Configuration

To verify the RIP configuration, perform these tasks:

Verifying the RIP-Enabled Interfaces on page 307

Verifying Reachability of All Hosts in the RIP Network on page 308

Verifying the RIP-Enabled Interfaces

Purpose

Action

Sample Output

Verify that all the RIP-enabled interfaces are available and active.

From the CLI, enter the show rip neighbor command.

What It Means user@host> show rip neighbor

Source

Neighbor

-------fe-0/0/0.0

fe-0/0/1.0

Destination

State Address

Send

-----------

Dn (null)

Up 192.168.220.5

Receive

Address

In

-----------

(null)

224.0.0.9

Mode

----

Mode Met

--------mcast both mcast both

1

1

The output shows a list of the RIP neighbors that are configured on the Services

Router. Verify the following information:

Each configured interface is present. Interfaces are listed in alphabetical order.

Each configured interface is up. The state of the interface is listed in the

Destination State column. A state of

Up indicates that the link is passing RIP traffic. A state of

Dn indicates that the link is not passing RIP traffic. In a

Verifying the RIP Configuration

307

J-series™ Services Router User Guide point-to-point link, this state generally means that either the end point is not configured for RIP or the link is unavailable.

Verifying Reachability of All Hosts in the RIP Network

Purpose

Action

By using the traceroute tool on each loopback address in the network, verify that all hosts in the RIP network are reachable from each Services Router.

For each Services Router in the RIP network:

1.

2.

3.

In the J-Web interface, select Diagnose>Traceroute.

In the Remote Host box, type the name of a host for which you want to verify reachability from the Services Router.

Click Start. Output appears on a separate page.

Sample Output

What It Means

1 172.17.40.254 (172.17.40.254) 0.362 ms 0.284 ms 0.251 ms

2 routera-fxp0.englab.mycompany.net (192.168.71.246) 0.251 ms 0.235 ms 0.200 ms

Each numbered row in the output indicates a router (“hop”) in the path to the host.

The three time increments indicate the round-trip time (RTT) between the Services

Router and the hop, for each traceroute packet.

To ensure that the RIP network is healthy, verify the following information:

The final hop in the list is the host you want to reach.

The number of expected hops to the host matches the number of hops in the traceroute output. The appearance of more hops than expected in the output indicates that a network segment is likely not reachable.

For information about the traceroute command and its output, see the JUNOS

Protocols, Class of Service, and System Basics Command Reference.

308

Verifying the RIP Configuration

Chapter 15

Configuring an OSPF Network

The Open Shortest Path First protocol (OSPF) is an interior gateway protocol (IGP) that routes packets within a single autonomous system (AS). To use OSPF, you must understand the basic components of an OSPF network and configure the J-series

Services Router to act as a node in the network.

NOTE: The J-series Services Router supports both OSPF version 2 and OSPF version 3. In this chapter, the term OSPF refers to both versions of the protocol.

You can use either J-Web Quick Configuration or a configuration editor to configure an OSPF network.

This chapter contains the following topics. For more information about OSPF, see the JUNOS Routing Protocols Configuration Guide.

OSPF Overview on page 309

Before You Begin on page 310

Configuring an OSPF Network with Quick Configuration on page 310

Configuring an OSPF Network with a Configuration Editor on page 314

Tuning an OSPF Network for Efficient Operation on page 321

Verifying an OSPF Configuration on page 325

OSPF Overview

In an OSPF network, the network topology is distributed among the nodes of the autonomous system (AS) and is regularly updated. Because topology changes are flooded throughout the network, every node maintains the same copy of the network map in its local topological database. Packets are then routed based on the shared topology.

Enabling OSPF

To activate OSPF on a network, you must enable the protocol on all interfaces within the network on which OSPF traffic is to travel. To enable OSPF on

OSPF Overview

309

J-series™ Services Router User Guide one or more interfaces, you must configure one or more interfaces on the

Services Router within an OSPF area. Once the interfaces are configured, OSPF link-state advertisements (LSAs) are transmitted on all OSPF-enabled interfaces, and the network topology is shared throughout the network.

OSPF Areas

OSPF is enabled on a per-interface basis. Those interfaces are configured as

OSPF enabled, and are assigned to an area. In a simple, single-area network, the area has the numeric identifier

0.0.0.0

, which designates it as the backbone area. As the network grows, it is divided into multiple subnetworks or areas that are identified by numeric identifiers unique to the AS.

In a multiarea network, all areas must be directly connected to the backbone area by area border routers (ABRs). Because all areas are adjacent to the backbone area,

OSPF routers send all traffic not destined for their own area through the backbone area. The ABRs in the backbone area are then responsible for transmitting the traffic through the appropriate ABR to the destination area.

Path Cost Metrics

Once the topology is shared across the network, OSPF uses it to route packets between network nodes. Each path between neighbors is assigned a cost based on the throughput, round-trip time, and reliability of the link. The sum of the costs across a particular path between hosts determines the overall cost of the path.

Packets are then routed along the shortest path using the shortest path first (SPF) algorithm. If multiple equal-cost paths exist between a source and destination address, OSPF routes packets along each path alternately, in round-robin fashion.

OSPF allows you to manually assign a cost (or metric) to a particular path segment to control the flow of packets across the network.

Before You Begin

Before you begin configuring an OSPF network, complete the following tasks:

Establish basic connectivity. See “Establishing Basic Connectivity” on page 47.

Configure network interfaces. See “Configuring Network Interfaces” on page 79.

Configuring an OSPF Network with Quick Configuration

J-Web Quick Configuration allows you to create single-area OSPF networks.

Figure 82 shows the Quick Configuration Routing page for OSPF.

310

Configuring an OSPF Network with Quick Configuration

Figure 82: Quick Configuration Routing Page for OSPF

Configuring an OSPF Network

To configure a single-area OSPF network with Quick Configuration:

1.

2.

3.

In the J-Web user interface, select Configuration>Routing>OSPF Routing.

Enter information into the Quick Configuration Routing page for OSPF,

as described in Table 114.

Click one of the following buttons:

To apply the configuration and stay on the Quick Configuration

Routing page for OSPF, click Apply.

To apply the configuration and return to the Quick Configuration Routing page, click OK.

Configuring an OSPF Network with Quick Configuration

311

J-series™ Services Router User Guide

To cancel your entries and return to the Quick Configuration Routing page, click Cancel.

4.

To check the configuration, see “Verifying an OSPF Configuration” on page 325.

Table 114: OSPF Routing Quick Configuration Summary

Function Field

Router Identification

Router Identifier (required) Uniquely identifies the router.

OSPF

Enable OSPF

OSPF Area ID

Your Action

Type the Services Router’s 32-bit IP address, in dotted decimal notation.

Enables or disables OSPF.

To enable OSPF, select the check box.

To disable OSPF, clear the check box.

Uniquely identifies the area within its AS.

Type a 32-bit numeric identifier for the area, or an integer.

If you enter an integer, the value is converted to a 32-bit equivalent. For example, if you enter 3, the value assigned to the area is 0.0.0.3.

312

Configuring an OSPF Network with Quick Configuration

Configuring an OSPF Network

Field

Area Type

OSPF-Enabled Interfaces

Function

Designates the type of OSPF area.

Designates one or more Services Router interfaces on which OSPF is enabled.

Your Action

From the drop-down list, select the type of OSPF area you are creating:

regular—A regular OSPF area, including the backbone area

stub—A stub area

nssa—A not-so-stubby area

(NSSA)

The first time you configure OSPF, the

Logical Interfaces box displays a list of all the logical interfaces configured on the

Services Router. Do any of the following:

To enable OSPF on an interface, click the interface name to highlight it, and click the left arrow to add the interface to the

OSPF interfaces list.

To enable OSPF on multiple interfaces at once, press Ctrl while you click multiple interface names to highlight them. Then click the left arrow to add the interfaces to the OSPF interfaces list.

To enable OSPF on all logical interfaces except the special fxp0 management interface, select

All Interfaces in the Logical

Interfaces list and click the left arrow.

To enable OSPF on all the interfaces displayed in the

Logical Interfaces list, click All to highlight every interface. Then click the left arrow to add the interfaces to the OSPF interfaces list.

To disable OSPF on one or more interfaces, highlight the interface or interfaces in the

OSPF interfaces box and click the right arrow to move them back to the Logical Interfaces list.

Configuring an OSPF Network with Quick Configuration

313

J-series™ Services Router User Guide

Configuring an OSPF Network with a Configuration Editor

To configure the Services Router as a node in an OSPF network, you must perform the following tasks marked (Required) .

(Required) “Configuring the Router Identifier” on page 314Configuring the

Router Identifier on page 9

(Required) “Configuring a Single-Area OSPF Network” on page 315

(Optional) “Configuring a Multiarea OSPF Network” on page 316

(Optional) “Configuring Stub and Not-So-Stubby Areas” on page 319

For information about using the J-Web and CLI configuration editors, see

“Using J-series Configuration Tools” on page 127.

Configuring the Router Identifier

The router identifier is the IP address that uniquely identifies the J-series Services Router.

OSPF uses the router identifier to elect a designated router, unless you manually specify a priority value. When the OSPF network first becomes active, by default, the router with the highest router identifier is elected the designated router.

To configure the router identifier for the Services Router:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or the CLI configuration editor.

2.

3.

Perform the configuration tasks described in Table 115.

Go on to “Configuring a Single-Area OSPF Network” on page 315.

Table 115: Configuring the Router Identifier

Task

Navigate to the Routing-options level in the configuration hierarchy.

Enter the router ID value.

Apply your configuration changes.

J-Web Configuration Editor

In the configuration editor hierarchy, select Routing-options.

CLI Configuration Editor

From the top of the configuration hierarchy, enter

In the Router Id box, type the IP address of the Services Router, in dotted decimal notation.

edit routing-options

Set the router-id value to the IP address of the Services Router, in dotted decimal notation. For example:

Click OK to apply your entries to the configuration.

set router-id 177.162.4.24

Changes in the CLI are applied automatically when you execute the set command.

314

Configuring an OSPF Network with a Configuration Editor

Configuring an OSPF Network

Configuring a Single-Area OSPF Network

To use OSPF on the Services Router, you must configure at least one

OSPF area, like the one shown in Figure 83.

Figure 83: Typical Single-Area OSPF Network Topology

A B E

Area 0

C D

To configure a single-area OSPF network with a backbone area, like the one in

Figure 83, perform these steps on each Services Router in the network:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

2.

3.

4.

Perform the configuration tasks described in Table 116.

If you are finished configuring the network, commit the configuration.

After you create the backbone area and add the appropriate interfaces to the area, OSPF begins sending LSAs. No additional configuration is required to enable OSPF traffic on the network.

Go on to one of the following procedures:

To add more areas to the AS, see “Configuring a Multiarea OSPF

Network” on page 316.

To control external route advertisement in the AS, see “Configuring Stub and Not-So-Stubby Areas” on page 319.

To improve network operation, see “Tuning an OSPF Network for Efficient

Operation” on page 321.

To check the configuration, see “Verifying an OSPF Configuration” on page 325.

Configuring an OSPF Network with a Configuration Editor

315

J-series™ Services Router User Guide

Table 116: Configuring a Single-Area OSPF Network

Task

Navigate to the Ospf level in the configuration hierarchy.

Create the backbone area with area ID

0.0.0.0.

Add interfaces as needed to the OSPF area.

J-Web Configuration Editor

In the configuration editor hierarchy, select Protocols>Ospf.

CLI Configuration Editor

From the top of the configuration hierarchy, enter

1.

In the Area box, click Add new

entry.

2.

In the Area ID box, type 0.0.0.0.

1.

In the Interface box, click Add new

entry.

2.

In the Interface name box, type the name of an interface on the

Services Router and click OK.

edit protocols ospf

1.

Set the backbone area ID to 0.0.0.0

and add an interface. For example: set area 0.0.0.0 interface fe-0/0/0

2.

Repeat Step 1 for each interface on this Services Router that you are adding to the backbone area. Only one interface is required.

3.

Repeat Step 1 and Step 2 for each interface on this Services

Router that you are adding to the backbone area. Only one interface is required.

Changes in the CLI are applied automatically when you execute the set command.

Configuring a Multiarea OSPF Network

To reduce traffic and topology maintenance for the Services Routers in an OSPF autonomous system (AS), you can group them into

multiple areas, as shown in Figure 84.

Figure 84: Typical Multiarea OSPF Network Topology

A D

B

C

Area 0

E

Area 2

To configure a multiarea OSPF network shown in Figure 84, perform the following

tasks on the appropriate Services Routers in the network. You must create a

316

Configuring an OSPF Network with a Configuration Editor

Configuring an OSPF Network backbone area. To link each additional area to the backbone area, you must configure one of the Services Routers as an area border router (ABR).

“Creating the Backbone Area” on page 317

“Creating Additional OSPF Areas” on page 317

“Configuring Area Border Routers” on page 318

Creating the Backbone Area

On each Services Router that is to operate as an ABR in the network, create backbone area

0.0.0.0

with at least one interface enabled for OSPF.

For instruction, see “Configuring a Single-Area OSPF Network” on page 315.

Creating Additional OSPF Areas

To create additional OSPF areas:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or the CLI configuration editor.

2.

3.

Perform the configuration tasks described in Table 117.

If you are finished configuring the network, commit the configuration.

Table 117: Configuring a Multiarea OSPF Network

Task

Navigate to the Ospf level in the configuration hierarchy.

J-Web Configuration Editor

In the configuration editor hierarchy, select Protocols>Ospf.

CLI Configuration Editor

From the top of the configuration hierarchy, enter

Create the additional area with a unique area ID, in dotted decimal notation.

1.

In the Area box, click Add new

entry.

Add interfaces as needed to the OSPF area.

edit protocols ospf

1.

Set the area ID to 0.0.0.2 and add an interface. For example:

2.

In the Area ID box, type 0.0.0.2.

1.

In the Interface box, click Add new

entry.

2.

In the Interface name box, type the name of an interface on the

Services Router and click OK.

3.

Repeat Step 1 and Step 2 for each interface on this Services

Router that you are adding to the backbone area. Only one interface is required.

set area 0.0.0.2 interface fe-0/0/0

2.

Repeat Step 1 for each interface on this Services Router that you are adding to the area. Only one interface is required.

Changes in the CLI are applied automatically when you execute the set command.

Configuring an OSPF Network with a Configuration Editor

317

J-series™ Services Router User Guide

Configuring Area Border Routers

A Services Router operating as an area border router (ABR) has interfaces enabled for OSPF in the backbone area and in the area you are linking to the

backbone. For example, Services Router B acts as the ABR in Figure 84 and

has interfaces in both the backbone area and area

0.0.0.3

.

2.

3.

1.

Navigate to the top of the configuration hierarchy in either the J-Web or the CLI configuration editor.

Perform the configuration tasks described in Table 118.

If you are finished configuring the network, commit the configuration.

4.

After you create the areas on the appropriate Services Routers and add and enable the appropriate interfaces to the areas, no additional configuration is required to enable OSPF traffic within or across the areas.

Go on to one of the following procedures:

To control external route advertisement in the AS, see “Configuring Stub and Not-So-Stubby Areas” on page 319.

To improve network operation, see “Tuning an OSPF Network for Efficient

Operation” on page 321.

To check the configuration, see “Verifying an OSPF Configuration” on page 325.

Table 118: Configuring Area Border Routers

Task

Navigate to the Ospf level in the configuration hierarchy.

Verify that the backbone area has at least one interface enabled for OSPF.

J-Web Configuration Editor

In the configuration editor hierarchy, select Protocols>Ospf.

CLI Configuration Editor

From the top of the configuration hierarchy, enter

Click 0.0.0.0 to display the Area ID

0.0.0.0 page, and verify that the backbone area has at least one interface enabled for OSPF.

edit protocols ospf

View the configuration using the show command: show

For example, Services Router B in

Figure 84 has the following interfaces

enabled for OSPF in the backbone area:

For example, Services Router B in

Figure 84 has the following interfaces

enabled for OSPF in the backbone area:

Interface fe-0/0/0.0

Interface fe-0/0/1.0

area 0.0.0.0 { interface fe-0/0/0.0; interface fe-0/0/1.0; }

To enable an interface on the backbone

area, see “Configuring a Single-Area

OSPF Network” on page 315.

To enable an interface on the backbone

area, see “Configuring a Single-Area

OSPF Network” on page 315.

318

Configuring an OSPF Network with a Configuration Editor

Configuring an OSPF Network

Task

Create the additional area with a unique area ID, in dotted decimal format.

J-Web Configuration Editor

1.

In the Area box, click Add new

entry.

Add interfaces as needed to the OSPF area.

CLI Configuration Editor

1.

Set the area ID to 0.0.0.2 and add an interface. For example:

2.

In the Area ID box, type 0.0.0.2.

1.

In the Interface box, click Add new

entry.

2.

In the Interface name box, type the name of an interface on the

Services Router and click OK.

3.

Repeat Step 1 and Step 2 for each interface on this Services

Router that you are adding to the backbone area. Only one interface is required.

set area 0.0.0.2 interface fe-0/0/0

2.

Repeat Step 1 for each interface on this Services Router that you are adding to the area. Only one interface is required.

Changes in the CLI are applied automatically when you execute the set command.

Configuring Stub and Not-So-Stubby Areas

To control the advertisement of external routes into an area, you can create stub areas and not-so-stubby areas (NSSAs) in an OSPF network. In the

network shown in Figure 85, area

0.0.0.7

has no external connections and can be configured as a stub area. Area

0.0.0.9

only has external connections to static routes and can be configured as an NSSA.

Figure 85: OSPF Network Topology with Stub Areas and NSSAs

Area 0 Area 3

Area 7

Area 9

Customer static routes

192.168.47.5

192.168.47.6

...

Customer network

Configuring an OSPF Network with a Configuration Editor

319

J-series™ Services Router User Guide

To configure stub areas and NSSAs in an OSPF network like the

one shown in Figure 85:

1.

Create the area and enable OSPF on the interfaces within that area.

2.

3.

4.

5.

For instructions, see “Creating Additional OSPF Areas” on page 317.

Configure an area border router to bridge the areas.

For instructions, see “Configuring Area Border Routers” on page 318.

Navigate to the top of the configuration hierarchy in either the J-Web or the CLI configuration editor.

To configure each Services Router in area

0.0.0.7

as a stub area router, perform

the configuration tasks described in Table 119.

If you are finished configuring the network, commit the configuration.

6.

Go on to one of the following procedures:

To improve network operation, see “Tuning an OSPF Network for Efficient

Operation” on page 321.

To check the configuration, see “Verifying an OSPF Configuration” on page 325.

Table 119: Configuring Stub Area and Not-So-Stubby Area Routers

Task

Navigate to the 0.0.0.7 level in the configuration hierarchy.

Configure each Services Router in area

0.0.0.7 as a stub router.

J-Web Configuration Editor

In the configuration editor hierarchy, select Protocols>Ospf>Area id

0.0.0.7.

CLI Configuration Editor

From the top of the configuration hierarchy, enter

1.

In the Stub option list, select Stub and click OK.

edit protocols ospf area 0.0.0.7

1.

Set the stub attribute: set stub

2.

Repeat Step 1 for every Services

Router in the stub area to configure them with the stub parameter for the area.

2.

Repeat Step 1 for every Services

Router in the stub area to configure them with the stub parameter for the area.

320

Configuring an OSPF Network with a Configuration Editor

Configuring an OSPF Network

Task

Navigate to the 0.0.0.9 level in the configuration hierarchy.

Configure each Services Router in area 0.0.0.9 as an NSSA router.

J-Web Configuration Editor

In the configuration editor hierarchy, select Protocols>Ospf>Area>0.0.0.9.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit protocols ospf area 0.0.0.9

1.

Set the nssa attribute:

1.

In the Stub option list, select Nssa and click OK.

2.

Repeat Step 1 for every Services

Router in the NSSA to configure them with the nssa parameter for the area.

set nssa

2.

Repeat Step 1 for every Services

Router in the NSSA to configure them with the nssa parameter for the area.

Changes in the CLI are applied automatically when you execute the set command.

Tuning an OSPF Network for Efficient Operation

To make your OSPF network operate more efficiently, you can change some default settings on the Services Router by performing the following tasks:

“Controlling Route Selection in the Forwarding Table” on page 321

“Controlling the Cost of Individual Network Segments” on page 322

“Enabling Authentication for OSPF Exchanges” on page 323

“Controlling Designated Router Election” on page 324

Controlling Route Selection in the Forwarding Table

OSPF uses route preferences to select the route that is installed in the forwarding table when several routes have the same shortest path first (SFP) calculation. To evaluate a route, OSPF calculates the sum of the individual preferences of every router along the path and selects the route with the lowest total preference.

By default, internal OSPF routes have a preference value of 10, and external

OSPF routes have a preference value of 150. Suppose all routers in your

OSPF network use the default preference values. By setting the internal preference to

7 and the external preference to

130

, you can ensure that the path through a particular Services Router is selected for the forwarding table any time multiple equal-cost paths to a destination exist.

To modify the default preferences on a Services Router:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or the CLI configuration editor.

2.

Perform the configuration tasks described in Table 120.

Tuning an OSPF Network for Efficient Operation

321

J-series™ Services Router User Guide

Table 120: Controlling Route Selection in the Forwarding Table by Setting Preferences

Task

Navigate to the Ospf level in the configuration hierarchy.

Set the external and internal route preferences.

J-Web Configuration Editor

In the configuration editor hierarchy, select Protocols>Ospf.

1.

In the External preference box, type an external preference value—for example, 7.

2.

In the Preference box, type an

3.

internal preference value—for example, 130.

Click OK.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit protocols ospf

1.

Set the internal preference. For example: set preference 7

2.

Set the external preference. For example: set external-preference 130

Changes in the CLI are applied automatically when you execute the set command.

Controlling the Cost of Individual Network Segments

When evaluating the cost of individual network segments, OSPF evaluates the reference bandwidth. For any link faster than 100 Mbps, the default cost metric is 1. When OSPF calculates the SPF algorithm, it sums the metrics of all interfaces along a path to determine the overall cost of the path. The path with the lowest metric is selected for the forwarding table.

To control the cost of the network segment, you can modify the metric value on an individual interface. Suppose all routers in the OSPF network use default metric values. If you increase the metric on an interface to

5

, all paths through this interface have a calculated metric higher than the default and are not preferred.

To manually set the cost of a network segment on the stub area’s Fast

Ethernet interface by modifying the interface metric:

1.

2.

Navigate to the top of the configuration hierarchy in either the J-Web or the CLI configuration editor.

Perform the configuration tasks described in Table 121.

322

Tuning an OSPF Network for Efficient Operation

Configuring an OSPF Network

Table 121: Controlling the Cost of Individual Network Segments by Modifying the Metric

Task

Navigate to the fe-0/0/0.0 level in the configuration hierarchy.

J-Web Configuration Editor

In the configuration editor hierarchy, select

Protocols>Ospf>Area id 0.0.0.0>

Interface name fe-0/0/0.0.

CLI Configuration Editor

From the top of the configuration hierarchy, enter

Set the interface metric and the external and route preference.

1.

In the Metric box, type an interface metric value—for example, 5.

edit protocols ospf area 0.0.0.0

interface fe-0/0/0.0

1.

Set the interface metric. For example:

2.

Click OK.

set metric 5

2.

Set the external preference. For example: set external-preference 130

Changes in the CLI are applied automatically when you execute the set command.

Enabling Authentication for OSPF Exchanges

All OSPFv2 protocol exchanges can be authenticated to guarantee that only trusted routers participate in the AS’s routing. By default, OSPF authentication is disabled.

NOTE: OSPFv3 does not support authentication.

You can enable either of two authentication types:

Simple authentication—Authenticates by means of a plain-text password (key) included in the transmitted packet.

MD5 authentication—Authenticates by means of an MD5 checksum included in the transmitted packet.

Because OSPF performs authentication at the area level, all routers within the area must have the same authentication and corresponding password

(key) configured. For MD5 authentication to work, both the receiving and transmitting routers must have the same MD5 key.

To enable OSPF authentication on the stub area:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or the CLI configuration editor.

2.

Perform the configuration tasks described in Table 122.

Tuning an OSPF Network for Efficient Operation

323

J-series™ Services Router User Guide

Table 122: Enabling OSPF Authentication

Task

Navigate to the 0.0.0.0 level in the configuration hierarchy.

Set the authentication type.

Navigate to the interface-name level in the configuration hierarchy.

Set the authentication password (key) and, if applicable, the key identifier.

J-Web Configuration Editor

In the configuration editor hierarchy, select Protocols>Ospf>Area id

0.0.0.0.

CLI Configuration Editor

From the top of the configuration hierarchy, enter

1.

From the Authentication type list, select the type of authentication to enable on the stub area: edit protocols ospf area 0.0.0.0

Set the authentication type to either simple or md5. For example: set authentication--type md5

simple md5

Changes in the CLI are applied automatically when you execute the set command.

2.

Click OK.

In the configuration editor hierarchy under

Protocols>Ospf>Area>0.0.0.0>

interface, click an interface name.

From the top of the configuration hierarchy, enter

1.

In the Key name box, type a password:

For simple authentication, type from 1 through 8 ASCII characters.

edit protocols ospf area 0.0.0.0

interface interface-name

1.

Set the authentication password:

For simple authentication, type from 1 through 8 ASCII characters.

For MD5 authentication, type from

1 through 16 ASCII characters.

2.

For MD5 authentication only, in the Key ID box, type any value between 0 (the default) and 255 to associate with the MD5 password.

3.

Click OK.

4.

Repeat Step 1 through Step 3 for each interface in the stub area for which you are enabling authentication.

For MD5 authentication, type from

1 through 16 ASCII characters.

2.

For MD5 authentication only, set the key identifier to associate with the MD5 password to any value between 0 (the default) and 255.

For example: set authentication-key Chey3nne key-id 2

Changes in the CLI are applied automatically when you execute the command.

3.

Repeat Step 1 and Step 2 for each interface in the stub area for which you are enabling authentication.

Controlling Designated Router Election

At designated router election, the router priorities are evaluated first, and the router with the highest priority is elected designated router.

By default, routers have a priority of

128

. A priority of

0 marks the router as ineligible to become the designated router. To configure a router so it is always the designated router, set its priority to

255

.

324

Tuning an OSPF Network for Efficient Operation

Configuring an OSPF Network

To change the priority of a Services Router to control designated router election:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or the CLI configuration editor.

2.

Perform the configuration tasks described in Table 123.

Table 123: Controlling Designated Router Election

Task

Navigate to the OSPF interface address for the Services Router. For example, navigate to the fe-/0/0/1 level in the configuration hierarchy.

J-Web Configuration Editor

In the configuration editor hierarchy, select Protocols>Ospf>area id

0.0.0.3> Interface name fe-/0/0/1.

Set the Services Router priority.

1.

In the Priority box, type a value between 0 and 255. The default value is 128.

2.

Click OK.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit protocols ospf area 0.0.0.3

interface fe-0/0/1

Set the priority to a value between 0 and 255. The default value is 128. For example: set priority 200

Changes in the CLI are applied automatically when you execute the set command.

Verifying an OSPF Configuration

To verify an OSPF configuration, perform these tasks:

“Verifying OSPF-Enabled Interfaces” on page 325

“Verifying OSPF Neighbors” on page 326

“Verifying the Number of OSPF Routes” on page 327

“Verifying Reachability of All Hosts in an OSPF Network” on page 328

Verifying OSPF-Enabled Interfaces

Purpose

Verify that OSPF is running on a particular interface and that the interface is in the desired area.

From the CLI, enter the show ospf interface command.

Action

Sample Output user@host> show ospf interface

Intf State Area DR ID BDR ID Nbrs

Verifying an OSPF Configuration

325

J-series™ Services Router User Guide

What It Means at-5/1/0.0

ge-2/3/0.0

lo0.0

so-0/0/0.0

so-6/0/1.0

so-6/0/2.0

so-6/0/3.0

PtToPt

DR

DR

Down

PtToPt

Down

PtToPt

0.0.0.0

0.0.0.0

0.0.0.0

0.0.0.0

0.0.0.0

0.0.0.0

0.0.0.0

0.0.0.0

192.168.4.16

192.168.4.16

0.0.0.0

0.0.0.0

0.0.0.0

0.0.0.0

0.0.0.0

192.168.4.15

0.0.0.0

0.0.0.0

0.0.0.0

0.0.0.0

0.0.0.0

The output shows a list of the Services Router interfaces that are configured for

OSPF. Verify the following information:

Each interface on which OSPF is enabled is listed.

Under

Area

, each interface shows the area for which it was configured.

Under

Intf and

State

, the Services Router loopback ( lo0.0

) interface and LAN interface that are linked to the OSPF network’s designated router (DR) are identified.

Under

DR ID

, the IP address of the OSPF network’s designated router appears.

Under

State

, each interface shows a state of

PtToPt to indicate a point-to-point connection. If the state is

Waiting

, check the output again after several seconds.

A state of

Down indicates a problem.

The designated router addresses always show a state of

DR

.

For more information about show ospf interface

, see the JUNOS Protocols, Class of

Service, and System Basics Command Reference.

1

0

1

0

0

1

1

Verifying OSPF Neighbors

Purpose

OSPF neighbors are interfaces that have an immediate adjacency. On a point-to-point connection between the Services Router and another router running

OSPF, verify that each router has a single OSPF neighbor.

From the CLI, enter the show ospf neighbor command.

Action

Sample Output user@host> show ospf neighbor

Address Intf

192.168.254.225

fxp3.0

192.168.254.230

fxp3.0

192.168.254.229

fxp3.0

10.1.1.129

10.1.1.131

10.1.2.1

10.1.2.81

fxp2.0

fxp2.0

fxp1.0

fxp0.0

State

2Way

Full

Full

Full

Full

Full

Full

ID

10.250.240.32

10.250.240.8

10.250.240.35

10.250.240.12

10.250.240.11

10.250.240.9

10.250.240.10

Pri Dead

128 36

128

128

38

33

128

128

128

128

37

38

32

33

326

Verifying an OSPF Configuration

Configuring an OSPF Network

What It Means

The output shows a list of the Services Router’s OSPF neighbors and their addresses, interfaces, states, router IDs, priorities, and number of seconds allowed for inactivity (“dead” time). Verify the following information:

Each interface that is immediately adjacent to the Services Router is listed.

The Services Router’s own loopback address and the loopback addresses of any routers with which the Services Router has an immediate adjacency are listed.

Under

State

, each neighbor shows a state of

Full

. Because full OSPF connectivity is established over a series of packet exchanges between clients, the OSPF link might take several seconds to establish. During that time, the state might be displayed as

Attempt

,

Init

, or

2way

, depending on the stage of negotiation.

If, after 30 seconds, the state is not

Full

, the OSPF configuration between the neighbors is not functioning correctly.

For more information about show ospf neighbor

, see the JUNOS Protocols, Class of

Service, and System Basics Command Reference.

Verifying the Number of OSPF Routes

Purpose

Verify that the OSPF routing table has entries for the following:

Each subnetwork reachable through an OSPF link

Each loopback address reachable on the network

For example, Figure 86 shows a sample network with an OSPF topology.

Figure 86: Sample OSPF Network Topology

192.168.5.1

10.0.21.0/24

192.168.5.2

10.0.13.0/24

192.168.5.3

10.0.16.0/24

192.168.5.4

10.0.1.0/24

192.168.5.6

10.0.2.0/24

192.168.5.5

10.0.6.0/24

10.0.20.0/24 10.0.19.0/24

192.168.5.8

10.0.5.0/24 10.0.4.0/24

192.168.5.7

10.0.11.0/24

10.0.10.0/24

192.168.5.9

Verifying an OSPF Configuration

327

J-series™ Services Router User Guide

Action

In this topology, OSPF is being run on all interfaces. Each segment in the network is identified by an address with a

/24 prefix, with interfaces on either end of the segment being identified by unique IP addresses.

From the CLI, enter the show ospf route command.

Sample Output

What It Means user@host> show ospf route

Prefix

10.10.10.1/24

10.10.10.2/24

10.10.10.4/24

10.10.10.5/24

10.10.10.6/24

10.10.10.10/24

10.10.10.11/24

10.10.10.13/24

10.10.10.16/24

10.10.10.19/24

10.10.10.20/24

10.10.10.21/24

192.168.5.1

192.168.5.2

192.168.5.3

192.168.5.4

192.168.5.5

192.168.5.6

192.168.5.7

192.168.5.8

192.168.5.9

Path

Type

Route

Type

Intra Network

Intra Network

Intra Network

Intra Network

Intra Network

Intra Network

Intra Network

Intra Network

Intra Network

Intra Network

Intra Network

Intra Network

Intra Router

Intra Router

Intra Router

Intra Router

Intra Router

Intra Router

Intra Router

Intra Router

Intra Router

IP

IP

IP

IP

IP

IP

IP

IP

IP

IP

IP

IP

NH

Type

IP

IP

IP

IP

IP

IP

IP

IP

IP

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

Metric NextHop

Interface fe-0/0/2.0

fe-0/0/2.0

fe-0/0/1.0

fe-0/0/2.0

fe-0/0/1.0

fe-0/0/2.0

fe-0/0/1.0

fe-0/0/1.0

fe-0/0/1.0

fe-0/0/1.0

fe-0/0/2.0

fe-0/0/2.0

fe-0/0/2.0

lo0 fe-0/0/1.0

fe-0/0/1.0

fe-0/0/1.0

fe-0/0/2.0

fe-0/0/2.0

fe-0/0/2.0

fe-0/0/1.0

Nexthop addr/label

10.0.21.1

10.0.21.1

10.0.13.1

10.0.21.1

10.0.13.1

10.0.21.1

10.0.13.1

10.0.13.1

10.0.13.1

10.0.21.1

10.0.21.1

10.0.13.1

10.0.13.1

10.0.13.1

10.0.21.1

10.0.21.1

10.0.21.1

10.0.13.1

The output lists each route, sorted by IP address. Routes are shown with a route type of

Network

, and loopback addresses are shown with a route type of

Router

.

For the example shown in Figure 86, verify that the OSPF routing table has

21 entries, one for each network segment and one for each router’s loopback address.

For more information about show ospf route

, see the JUNOS Protocols, Class of Service,

and System Basics Command Reference.

Verifying Reachability of All Hosts in an OSPF Network

Purpose

Action

By using the traceroute tool on each loopback address in the network, verify that all hosts in the network are reachable from each Services Router.

For each Services Router in the OSPF network:

1.

2.

In the J-Web interface, select Diagnose>Traceroute.

In the Host Name box, type the name of a host for which you want to verify reachability from the Services Router.

328

Verifying an OSPF Configuration

Configuring an OSPF Network

3.

Click Start. Output appears on a separate page.

Sample Output

What It Means

1 172.17.40.254 (172.17.40.254) 0.362 ms 0.284 ms 0.251 ms

2 routera-fxp0.englab.mycompany.net (192.168.71.246) 0.251 ms 0.235 ms 0.200 ms

Each numbered row in the output indicates a router (“hop”) in the path to the host.

The three time increments indicate the round-trip time (RTT) between the Services

Router and the hop, for each traceroute packet. To ensure that the OSPF network is healthy, verify the following information:

The final hop in the list is the host you want to reach.

The number of expected hops to the host matches the number of hops in the traceroute output. The appearance of more hops than expected in the output indicates that a network segment is likely not reachable. In this case, verify the routes with the show ospf route command.

For information about ospf route

show , see “Verifying the Number of OSPF Routes” on page 327.

For information about the traceroute command and its output, see the JUNOS

Protocols, Class of Service, and System Basics Command Reference.

Verifying an OSPF Configuration

329

J-series™ Services Router User Guide

330

Verifying an OSPF Configuration

Chapter 16

Configuring BGP Sessions

Connections between peering networks are typically made through an exterior gateway protocol, most commonly the Border Gateway Protocol (BGP).

You can use either J-Web Quick Configuration or a configuration editor to configure

BGP sessions.

This chapter contains the following topics. For more information about BGP, see the

JUNOS Routing Protocols Configuration Guide.

BGP Overview on page 331

Before You Begin on page 332

Configuring a BGP Network with Quick Configuration on page 333

Configuring BGP Networks with a Configuration Editor on page 335

Verifying a BGP Configuration on page 344

BGP Overview

BGP is a heavy-duty, secure protocol that must be configured on a per-peer basis. Once a peering session has been configured, BGP uses a TCP connection to establish a session. After a BGP session is established, traffic is passed along the BGP-enabled link.

Although BGP requires a full-mesh topology to share route information, you can use route reflectors and confederations in a large autonomous system (AS) to reduce scaling problems.

BGP Peering Sessions

Unlike RIP and OSPF links, BGP peering sessions must be explicitly configured at both ends. To establish a session between BGP peers, you must manually specify the interface address to which you are establishing a connection.

Once this configuration is complete on both ends of a link, a TCP negotiation takes place and a BGP session is established.

BGP Overview

331

J-series™ Services Router User Guide

The type of the BGP peering session depends on whether the peer is outside or inside the host’s autonomous system (AS):

Peering sessions established with hosts outside the local AS are external sessions . Traffic that passes along such links uses external BGP (EBGP) as its protocol.

Peering sessions established with hosts within the local AS are internal sessions. Traffic that passes along such links uses internal BGP (IBGP) as its protocol.

IBGP Full Mesh Requirement

By default, BGP does not readvertise routes that are learned from BGP. To share route information throughout the network, BGP requires a full mesh of internal peering sessions within an AS. To achieve an IBGP full mesh, you configure a direct peering session every host to every other host within the network. These sessions are configured on every router within the network, as type internal

.

Route Reflectors and Clusters

In larger networks, the overhead needed to implement the IBGP full-mesh requirement is prohibitive. Many networks use route reflectors to avoid having to configure an internal connection to each node for every new router.

A route reflector can readvertise routes learned through BGP to its BGP neighbors.

If you define clusters of routers and configure a single router as a route reflector within each cluster, a full mesh is required only between the route reflectors and all their internal peers within the network. The route reflector is responsible for propagating BGP routes throughout the cluster.

For more information about route reflectors, see “Route Reflectors—for

Added Hierarchy” on page 281

BGP Confederations

Large ASs can be divided into smaller sub-ASs, which are groups of routers known as confederations. You configure EBGP peering sessions between confederations, and IBGP peering sessions within confederations. Within a confederation, the IBGP full mesh is required. For more information about

confederations, see “Confederations—for Subdivision” on page 283

Before You Begin

Before you begin configuring a BGP network, complete the following tasks:

Establish basic connectivity. See “Establishing Basic Connectivity” on page 47.

Configure network interfaces. See “Configuring Network Interfaces” on page 79.

332

Before You Begin

Configuring BGP Sessions

Configuring a BGP Network with Quick Configuration

J-Web Quick Configuration allows you to create BGP peering sessions. Figure 87

shows the Quick Configuration Routing page for BGP.

Figure 87: Quick Configuration Routing Page for BGP

To configure a BGP peering session with Quick Configuration:

1.

2.

3.

In the J-Web user interface, select Configuration>Routing>BGP Routing.

Enter information into the Quick Configuration page for BGP, as described

in Table 124.

From the main BGP routing Quick Configuration page, click one of the following buttons:

To apply the configuration and stay on the Quick Configuration Routing page for BGP, click Apply.

Configuring a BGP Network with Quick Configuration

333

J-series™ Services Router User Guide

To apply the configuration and return to the Quick Configuration Routing page, click OK.

To cancel your entries and return to the Quick Configuration Routing page, click Cancel.

4.

To check the configuration, see “Verifying a BGP Configuration” on page 344.

Table 124: BGP Routing Quick Configuration Summary

Function Field

Router Identification

Router Identifier (required) Uniquely identifies the router

BGP

Enable BGP

Autonomous System Number

Peer Autonomous System Number

Peer Address

Local Address

Your Action

Type the Services Router’s 32-bit IP address, in dotted decimal notation.

Enables or disables BGP.

Sets the unique numeric identifier of the AS in which the services router is configured.

Sets the unique numeric identifier of the AS in which the peer host resides.

Specifies the IP address of the peer host’s interface to which the BGP session is being established.

Specifies the IP address of the local host’s interface from which the BGP session is being established.

To enable BGP, select the check box.

To disable BGP, clear the check box.

Type the Services Router’s 32-bit AS number, in dotted decimal notation.

If you enter an integer, the value is converted to a 32-bit equivalent. For example, if you enter 3, the value assigned to the AS is 0.0.0.3.

Type the peer host’s 32-bit AS number, in dotted decimal notation.

If you enter an integer, the value is converted to a 32-bit equivalent. For example, if you enter 3, the value assigned to the AS is 0.0.0.3.

Type the IP address of the peer host’s adjacent interface, in dotted decimal notation.

Type the IP address of the local host’s adjacent interface, in dotted decimal notation.

334

Configuring a BGP Network with Quick Configuration

Configuring BGP Sessions

Configuring BGP Networks with a Configuration Editor

To configure the Services Router as a node in a BGP network, you must perform the following tasks marked (Required) .

(Required) “Configuring a Point-to-Point Peering Session” on page 335

(Required) “Configuring BGP Within a Network” on page 338

(Optional) “Configuring a Route Reflector” on page 339

(Optional) “Configuring BGP Confederations” on page 342

For information about using the J-Web and CLI configuration editors, see

“Using J-series Configuration Tools” on page 127.

Configuring a Point-to-Point Peering Session

To enable BGP traffic across one or more links, you must configure a BGP peering session with the adjacent host. Generally, such sessions are made at network exit points with neighboring hosts outside the autonomous system.

Figure 88 shows a network with BGP peering sessions.

In the sample network, a Services Router in AS 17 has BGP peering sessions to a group of peers called external-peers

. Peers A, B, and C reside in AS 22 and have IP addresses

10.10.10.10

,

10.10.10.11

, and

10.10.10.12

.

Peer D resides in AS 79, at IP address

10.21.7.2

.

Configuring BGP Networks with a Configuration Editor

335

J-series™ Services Router User Guide

Figure 88: Typical Network with BGP Peering Sessions

AS 17

10.10.10.10

A

B

10.10.10.11

AS 22

C

10.10.10.12

D

10.21.7.2

AS 79

To configure the BGP peering sessions shown in Figure 88:

2.

3.

4.

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 125.

If you are finished configuring the network, commit the configuration.

Go on to one of the following procedures:

To configure IBGP sessions between peers, see “Configuring BGP Within a

Network” on page 338.

To configure route reflector clusters, see “Configuring a Route Reflector” on page 339.

To subdivide autonomous systems (ASs), see “Configuring BGP

Confederations” on page 342.

To check the configuration, see “Verifying a BGP Configuration” on page 344.

336

Configuring BGP Networks with a Configuration Editor

Configuring BGP Sessions

Table 125: Configuring BGP Peering Sessions

Task

Navigate to the Routing-options level in the configuration hierarchy.

J-Web Configuration Editor

In the configuration editor hierarchy, select Routing-options.

CLI Configuration Editor

From the top of the configuration hierarchy, enter

Set the network’s AS number to 17.

Navigate to the Bgp level in the configuration hierarchy.

1.

In the AS Number box, enter 17.

2.

Click OK.

In the configuration editor hierarchy, select Protocols>Bgp.

edit routing-options

Set the AS number to 17: set autonomous-system 17

From the top of the configuration hierarchy, enter

Create the BGP group external-peers, and add the external neighbor addresses to the group.

1.

In the Group box, click Add new

entry.

2.

In the Group name box, type the name of the group of external BGP peers—external-peers in this case.

3.

In the Neighbor box, click Add new

entry.

4.

In the Address box, type the IP address of an external BGP peer, in dotted decimal notation, and click

OK.

edit protocols bgp

1.

Create the group external-peers, and add the address of an external neighbor: set group external-peers neighbor

10.10.10.10

2.

Repeat Step 1 for each BGP neighbor within the external peer group that you are configuring.

At the group level, set the AS number for the group external-peers to 22.

Because three of the peers in this group

(peers A, B, and C) reside in one AS, you can set their AS number as a group.

At the individual neighbor level, set the

AS number for peer D to 79.

2.

Click OK.

1.

Under Neighbor, in the Address column, click the IP address of peer D—10.21.7.2 in this case.

Because peer D is a member of the group external-peers, it inherits the peer AS number configured at the group level. You must override this value at the individual neighbor level.

Set the group type to external.

5.

Repeat Step 3 and Step 4 for each

BGP neighbor within the external group that you are configuring.

1.

In the Peer as box, type the number of the AS in which most peers in the external-peers group reside.

2.

3.

In the Peer as box, type the AS number of the peer.

Click OK.

1.

From the Type drop-down menu, select external.

2.

Click OK.

From the [edit protocols bgp] hierarchy level: set group external-peers peer-as 22

From the [edit protocols bgp group external-peers] hierarchy level: set neighbor 10.21.7.2 peer-as 79

From the [edit protocols bgp group external-peers] hierarchy level: set type external

Configuring BGP Networks with a Configuration Editor

337

J-series™ Services Router User Guide

Configuring BGP Within a Network

To configure BGP sessions between peering networks, you must configure point-to-point sessions between the external peers of the networks. Additionally, you must configure BGP internally to provide a means by which BGP route advertisements can be forwarded throughout the network. Because of the full mesh requirement of IBGP, you must configure individual peering sessions between all internal nodes of the network—unless you use route reflectors or confederations.

Figure 89 shows a typical network with external and internal peer sessions. In the

sample network, the Services Router in AS 17 is fully meshed with its internal peers in the group internal-peers

, which have IP addresses starting at 192.168.6.4.

Figure 89: Typical Network with EBGP External Sessions and IBGP Internal Sessions

192.168.6.5

192.163.6.4

AS 17

192.168.6.6

192.168.6.7

192.168.40.4

To configure IBGP in the network shown in Figure 89:

1.

Configure all external peering sessions as described in “Configuring a

Point-to-Point Peering Session” on page 335.

3.

4.

2.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 126.

5.

If you are finished configuring the network, commit the configuration.

Go on to one of the following procedures:

To configure route reflector clusters, see “Configuring a Route Reflector” on page 339.

To subdivide autonomous systems (ASs), see “Configuring BGP

Confederations” on page 342.

338

Configuring BGP Networks with a Configuration Editor

Configuring BGP Sessions

To check the configuration, see “Verifying a BGP Configuration” on page 344.

Table 126: Configuring IBGP Peering Sessions

Task

Navigate to the Bgp level in the configuration hierarchy.

J-Web Configuration Editor

In the configuration editor hierarchy, select Protocols>Bgp.

CLI Configuration Editor

From the top of the configuration hierarchy, enter

Create the BGP group internal-peers, and add the internal neighbor addresses to the group.

1.

In the Group box, click Add new

entry.

You must configure a full IBGP mesh, which requires that each peer be configured with every other internal peer as a BGP neighbor.

2.

In the Group name box, type the name of the group of internal BGP peers—internal-peers in this case.

3.

In the Neighbor box, click Add new

entry.

edit protocols bgp

1.

Create the group internal-peers, and add the address of an internal neighbor: set group internal-peers neighbor

192.168.6.4

2.

Repeat Step 1 for each internal BGP neighbor within the network.

Set the group type to internal.

Configure a routing policy to advertise

BGP routes.

4.

In the Address box, type the IP address of an internal BGP peer, in dotted decimal notation.

5.

Click OK.

6.

Repeat Step 3 and Step 4 for each internal BGP peer within the network.

1.

From the Type drop-down menu, select internal.

From the [edit protocols bgp group internal-peers] hierarchy level:

2.

Click OK.

set type internal

See “Injecting OSPF Routes into the BGP Routing Table” on page 380.

Configuring a Route Reflector

Because of the IBGP full-mesh requirement, most networks use route reflectors to simplify configuration. Using a route reflector, you group routers into clusters, which are identified by numeric identifiers unique to the AS. Within the cluster, you must configure a BGP session from a single router (the route reflector) to each internal peer. With this configuration, the IBGP full-mesh requirement is met.

NOTE: You must have an Advanced BGP Feature license installed on each Services

Router that uses a route reflector. For license details, see “Managing J-series

Licenses” on page 69.

Configuring BGP Networks with a Configuration Editor

339

J-series™ Services Router User Guide

Figure 90 shows an IBGP network with a Services Router at IP address

192.168.40.4

acting as a route reflector. In the sample network, each router in cluster

2.3.4.5

has an internal client relationship to the route reflector. To configure the cluster:

On the Services Router, create an internal group, configure an internal peer (neighbor) relationship to every other router in the cluster, and assign a cluster identifier.

On each other router you are assigning to the cluster, create the cluster group and configure a client relationship to the route reflector.

Figure 90: Typical IBGP Network Using a Route Reflector

AS 17

Cluster 2.3.4.5

RR

To configure IBGP in the network using the Services Router as a route reflector:

3.

4.

5.

1.

2.

Configure all external peering sessions as described in “Configuring a

Point-to-Point Peering Session” on page 335.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 127.

If you are finished configuring the network, commit the configuration.

Go on to one of the following procedures:

To subdivide autonomous systems (ASs), see “Configuring BGP

Confederations” on page 342.

340

Configuring BGP Networks with a Configuration Editor

Configuring BGP Sessions

To check the configuration, see “Verifying a BGP Configuration” on page 344.

Table 127: Configuring a Route Reflector

Task

On the Services Router that you are using as a route reflector, navigate to the

Bgp level in the configuration hierarchy.

J-Web Configuration Editor

In the configuration editor hierarchy, select Protocols>Bgp.

CLI Configuration Editor

From the top of the configuration hierarchy, enter

On the Services Router that you are using as a route reflector, create the

BGP group cluster-peers, and add to the group the IP addresses of the internal neighbors that you want in the cluster.

1.

In the Group box, click Add new

entry.

2.

In the Group name box, type the name of the group in which the BGP peer is configured—cluster-peers in this case.

edit protocols bgp

1.

Create the group cluster-peers, and add the address of an internal neighbor: set group cluster-peers neighbor

192.168.6.4

3.

In the Neighbor box, click Add new

entry.

2.

Repeat Step 1 for each BGP neighbor within the cluster that you are configuring.

On the Services Router that you are using as a route reflector, set the group type to internal.

On the Services Router that you are using as a route reflector, configure the cluster identifier for the route reflector.

4.

In the Address box, type the IP address of a BGP peer, in dotted decimal notation.

5.

Click OK.

6.

Repeat Step 3 and Step 4 for each

BGP neighbor within the cluster that you are configuring.

From the Type drop-down menu, select

internal.

From the [edit protocols bgp group internal-peers] hierarchy level:

1.

In the Cluster box, enter the unique numeric cluster identifier.

2.

Click OK.

set type internal

Set the cluster identifier: set cluster 2.3.4.5

Configuring BGP Networks with a Configuration Editor

341

J-series™ Services Router User Guide

Task

On the other routers in the cluster, create the BGP group cluster-peers, and add the internal IP address of the route reflector.

J-Web Configuration Editor

On a client Services Router in the cluster:

1.

In the configuration editor hierarchy, select Protocols>Bgp.

You do not need to include the neighbor addresses of the other internal peers, or configure the cluster identifier on these route reflector clients. They need only be configured as internal neighbors.

NOTE:

If the other routers in the network are Services Routers, follow the steps in this row. Otherwise, consult the router documentation for instructions.

2.

In the Group box, click Add new

entry.

3.

In the Group name box, type the name of the group in which the BGP peer is configured—cluster-peers in this case.

4.

In the Neighbor box, click Add new

entry.

CLI Configuration Editor

On a client Services Router in the cluster:

1.

From the top of the configuration hierarchy, enter edit protocols bgp

2.

Create the group cluster-peers, and add only the route reflector address to the group: set group cluster-peers neighbor

192.168.40.4

Configure a routing policy to advertise

BGP routes.

5.

In the Address box, type the IP address of the route reflector, in dotted decimal notation—in this case, 192.168.40.4.

6.

Click OK.

See “Injecting OSPF Routes into the BGP Routing Table” on page 380.

Configuring BGP Confederations

To help solve BGP scaling problems caused by the IBGP full-mesh requirement,

you can divide your AS into sub-ASs called confederations. As Figure 91 shows,

the connections between the sub-ASs are made through EBGP sessions, and the internal connections are made through standard IBGP sessions.

In the sample network, AS 17 has two separate confederations (sub-AS 64512 and sub-AS 64513), each of which has multiple routers. Within a sub-AS, an

IGP (OSPF, for example) is used to establish network connectivity with internal peers. Between sub-ASs, an external BGP peering session is established.

342

Configuring BGP Networks with a Configuration Editor

Configuring BGP Sessions

Figure 91: Typical Network Using BGP Confederations

Sub-AS 64512

IGP

EBGP

Sub-AS 64513

IGP

AS 17

To configure the BGP confederations shown in Figure 91:

2.

3.

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 128.

If you are finished configuring the network, commit the configuration.

4.

To check the configuration, see “Verifying a BGP Configuration” on page 344.

Table 128: Configuring BGP Confederations

Task

Navigate to the Routing-options level in the configuration hierarchy.

J-Web Configuration Editor

In the configuration editor hierarchy, select Routing-options.

Set the AS number to the sub-AS number 64512.

The sub-AS number is a unique AS number that is usually taken from the pool of private AS numbers—64512 through 65535.

Navigate to the Confederation level in the configuration hierarchy.

1.

2.

In the AS Number box, enter the sub-AS number.

Click OK.

In the configuration editor hierarchy, select

Routing-options>Confederation.

Set the confederation number to the AS number 17.

In the Confederation as box, enter 17.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit routing-options

Set the sub-AS number: set autonomous-system 64512

From the top of the configuration hierarchy, enter edit routing-options confederation

Set the confederation AS number: set 17

Configuring BGP Networks with a Configuration Editor

343

J-series™ Services Router User Guide

Task

Add the sub-ASs as members of the confederation. Every sub-AS within the

AS must be added as a confederation member.

J-Web Configuration Editor CLI Configuration Editor

1.

In the Members field, click Add

new entry.

Add members to the confederation: set 17 members 64512 64513

2.

In the Value box, enter the sub-ASs that are members of this confederation. Separate multiple sub-ASs with a space.

See “Configuring a Point-to-Point Peering Session” on page 335.

Using EBGP, configure the peering session between the confederations

(from router A to router B in this example).

When setting the peer AS number for these sessions, use the sub-AS number rather than the AS number.

Using IBGP, configure internal sessions within a sub-AS. You can configure an

IBGP full mesh, or you can configure a route reflector.

To configure an IBGP full mesh, see “Configuring BGP Within a Network” on page 338.

To configure a route reflector, see “Configuring a Route Reflector” on page 339.

Verifying a BGP Configuration

To verify a BGP configuration, perform these tasks:

“Verifying BGP Neighbors” on page 344

“Verifying BGP Groups” on page 345

“Verifying BGP Summary Information” on page 346

“Verifying Reachability of All Peers in a BGP Network” on page 347

Verifying BGP Neighbors

Purpose

Verify that BGP is running on configured interfaces and that the BGP session is active for each neighbor address.

From the CLI, enter the show bgp neighbor command.

Action

Sample Output user@host> show bgp neighbor

Peer: 10.255.245.12+179 AS 35 Local: 10.255.245.13+2884 AS 35

Type: Internal State: Established (route reflector client)Flags: Sync

Last State: OpenConfirm

Last Error: None

Last Event: RecvKeepAlive

Options: Preference LocalAddress HoldTime Cluster AddressFamily Rib-group Refresh

Address families configured: inet-vpn-unicast inet-labeled-unicast

344

Verifying a BGP Configuration

Configuring BGP Sessions

What It Means

Verifying BGP Groups

Local Address: 10.255.245.13 Holdtime: 90 Preference: 170

Flags for NLRI inet-vpn-unicast: AggregateLabel

Flags for NLRI inet-labeled-unicast: AggregateLabel

Number of flaps: 0

Peer ID: 10.255.245.12

Keepalive Interval: 30

Local ID: 10.255.245.13

Active Holdtime: 90

NLRI advertised by peer: inet-vpn-unicast inet-labeled-unicast

NLRI for this session: inet-vpn-unicast inet-labeled-unicast

Peer supports Refresh capability (2)

Restart time configured on the peer: 300

Stale routes from peer are kept for: 60

Restart time requested by this peer: 300

NLRI that peer supports restart for: inet-unicast inet6-unicast

NLRI that restart is negotiated for: inet-unicast inet6-unicast

NLRI of received end-of-rib markers: inet-unicast inet6-unicast

NLRI of all end-of-rib markers sent: inet-unicast inet6-unicast

Table inet.0 Bit: 10000

RIB State: restart is complete

Send state: in sync

Active prefixes: 4

Received prefixes: 6

Suppressed due to damping: 0

Table inet6.0 Bit: 20000

RIB State: restart is complete

Send state: in sync

Active prefixes: 0

Received prefixes: 2

Suppressed due to damping: 0

Last traffic (seconds): Received 3

Input messages: Total 9

Sent 3

Updates 6

Output messages: Total 7

Output Queue[0]: 0

Updates 3

Output Queue[1]: 0

Trace options: detail packets

Trace file: /var/log/bgpgr size 131072 files 10

Checked 3

Refreshes 0

Refreshes 0

Octets 403

Octets 365

The output shows a list of the BGP neighbors with detailed session information.

Verify the following information:

Each configured peering neighbor is listed.

For

State

, each BGP session is

Established

.

For

Type

, each peer is configured as the correct type (either internal or external).

For

AS

, the AS number of the BGP neighbor is correct.

For more information about show bgp neighbor

, see the JUNOS Protocols, Class of

Service, and System Basics Command Reference.

Purpose

Action

Verify that the BGP groups are configured correctly.

From the CLI, enter the show bgp group command.

Verifying a BGP Configuration

345

J-series™ Services Router User Guide

Sample Output

What It Means user@host> show bgp group

Group Type: Internal

Name: pe-to-asbr2

Export: [ match-all ]

Total peers: 1

AS: 10045

Established: 1

4.4.4.4+179 bgp.l3vpn.0: 1/1/0 vpn-green.inet.0: 1/1/0

Local AS: 10045

Flags: Export Eval

Groups: 1

Table bgp.l3vpn.0

Peers: 1 External: 0 Internal: 1

Tot Paths Act Paths Suppressed

Down peers: 0

History Damp State

1 1 0 0 0

Flaps: 0

Pending

0

The output shows a list of the BGP groups with detailed group information. Verify the following information:

Each configured group is listed.

For

AS

, each group’s remote AS is configured correctly.

For

Local AS

, each group’s local AS is configured correctly.

For

Group Type

, each group has the correct type (either internal or external).

For

Total peers

, the expected number of peers within the group is shown.

For

Established

, the expected number of peers within the group have BGP sessions in the

Established state.

The IP addresses of all the peers within the group are present.

For more information about show bgp group

, see the JUNOS Protocols, Class of Service,

and System Basics Command Reference.

Verifying BGP Summary Information

Purpose

Action

Sample Output

Verify that the BGP configuration is correct.

From the CLI, enter the show bgp summary command.

user@host> show bgp summary

Groups: 1 Peers: 3 Down peers: 0

Table Tot Paths Act Paths Suppressed inet.0

Peer

10.0.0.2

10.0.0.3

10.0.0.4

AS

65002

65002

65002

6

InPkt

88675

54528

51597

4

OutPkt

88652

54532

51584

0

OutQ

0

History Damp State

0 0

Pending

0

Flaps Last Up/Dwn State|#Active/Re

2 42:38 2/4/0

0

0

1

0

2w4d22h 0/0/0

2w3d22h 2/2/0

346

Verifying a BGP Configuration

Configuring BGP Sessions

What It Means

The output shows a summary of BGP session information. Verify the following information:

For

Groups

, the total number of configured groups is shown.

For

Peers

, the total number of BGP peers is shown.

For

Down Peers

, the total number of unestablished peers is 0. If this value is not zero, one or more peering sessions are not yet established.

Under

Peer

, the IP address for each configured peer is shown.

Under

AS

, the peer AS for each configured peer is correct.

Under

Up/Dwn State

, the BGP state reflects the number of paths received from the neighbor, the number of these paths that have been accepted, and the number of routes being damped (such as 0/0/0). If the field is

Active

, it indicates a problem in the establishment of the BGP session.

For more information about show bgp summary

, see the JUNOS Protocols, Class of

Service, and System Basics Command Reference.

Verifying Reachability of All Peers in a BGP Network

Purpose

Action

By using the ping tool on each peer address in the network, verify that all peers in the network are reachable from each Services Router.

For each Services Router in the BGP network:

1.

In the J-Web interface, select Diagnose>Ping Host.

2.

3.

In the Remote Host box, type the name of a host for which you want to verify reachability from the Services Router.

Click Start. Output appears on a separate page.

Sample Output

What It Means

PING 10.10.10.10 : 56 data bytes

64 bytes from 10.10.10.10: icmp_seq=0 ttl=255 time=0.382 ms

64 bytes from 10.10.10.10: icmp_seq=1 ttl=255 time=0.266 ms

If a host is active, it generates an ICMP response. If this response is received, the round-trip time is listed in the time field. For more information about the ping

output, see Table 82.

For more information about using the J-Web interface to ping a host, see “Using the

J-Web Ping Host Tool” on page 218.

For information about the ping

command, see “Using the ping Command” on page

226 or the JUNOS Protocols, Class of Service, and System Basics Command Reference.

Verifying a BGP Configuration

347

J-series™ Services Router User Guide

348

Verifying a BGP Configuration

Part 6

Configuring Routing Policy, Firewall

Filters, and Class of Service

Policy, Firewall Filter, and Class-of-Service Overview on page 351

Configuring Routing Policies on page 375

Configuring Firewall Filters and NAT on page 389

Configuring Class of Service with DiffServ on page 427

Configuring Routing Policy, Firewall Filters, and Class of Service 349

350

Configuring Routing Policy, Firewall Filters, and Class of Service

Chapter 17

Policy, Firewall Filter, and

Class-of-Service Overview

Several mechanisms can help you control the way routing information and data packets are handled by a router—routing policy, firewall filters, and class-of-service

(CoS) rules. Routing policies control how information is imported to and exported from the routing tables, acting exclusively at the Routing Engine level. Firewall filters examine packets at the entry (ingress) and exit (egress) points of the Services

Router, filtering traffic at the router level. CoS rules determine packet scheduling, buffering, and queueing within the router. These three mechanisms are at the core of managing how a router forwards traffic.

To manage the flow of information into and out of a Services Router, you must understand the fundamentals of routing policies, firewall filters, and CoS rules. To read this chapter, you need a basic understanding of IP routing protocols.

This chapter contains the following topics. For more information see the JUNOS

Policy Framework Configuration Guide and the JUNOS Network Interfaces and Class of

Service Configuration Guide.

Policy, Firewall Filter, and CoS Terms on page 351

Routing Policy Overview on page 353

Firewall Filter Overview on page 358

Class-of-Service Overview on page 366

Policy, Firewall Filter, and CoS Terms

Before configuring routing policies, firewall filters, or class of service

(CoS) with Differentiated Services (DiffServ) on a Services Router, become

familiar with the terms defined in Table 129.

Policy, Firewall Filter, and CoS Terms

351

J-series™ Services Router User Guide

Table 129: Policy, Firewall Filter, and CoS Terms

Term

assured forwarding (AF) behavior aggregate (BA) classifier best-effort (BE) class of service (CoS)

Differentiated Services

(DiffServ)

DiffServ code point

(DSCP) drop profile

Definition

CoS packet forwarding class that provides a group of values you can define and includes four subclasses, AF1, AF2, AF3, and AF4, each with three drop probabilities, low, medium, and high.

Feature that can be used to determine the forwarding treatment for each packet. The BA classifier maps a code point to a loss priority. The loss priority is used later in the work flow to select one of the two drop profiles used by random early detection (RED).

CoS packet forwarding class that provides no service profile. For the BE forwarding class, loss priority is typically not carried in a code point, and random early detection (RED) drop profiles are more aggressive.

Method of classifying traffic on a packet-by-packet basis, using information in the type-of-service

(TOS) byte to assign traffic flows to different service levels.

Services based on RFC 2474, Definition of the Differentiated Services Field (DS Field) in the IPv4

and IPv6 Headers . The DiffServ method of CoS uses the type-of-service (ToS) byte to identify different packet flows on a packet-by-packet basis. DiffServ adds a Class Selector code point

(CSCP) and a DiffServ code point (DSCP).

Values for a 6-bit field defined in IP packet headers that can be used to enforce class-of-service

(CoS) distinctions in a Services Router.

Drop probabilities for different levels of buffer fullness that are used by random early detection

(RED) to determine from which Services Router scheduling queue to drop packets.

expedited forwarding (EF)

CoS packet forwarding class that provides end-to-end service with low loss, low latency, low jitter, and assured bandwidth.

multifield (MF) classifier

Firewall filter that scans through a variety of packet fields to determine the forwarding class and loss priority for a packet and polices traffic to a specific bandwidth and burst size. Typically, a classifier performs matching operations on the selected fields against a configured value.

network address port translation (NAPT)

Method of concealing a set of host ports on a private network behind a pool of public addresses.

It can be used as a security measure to protect the host ports from direct targeting in network attacks.

network address translation (NAT) network control (NC)

PLP bit

Method of concealing a set of host addresses on a private network behind a pool of public addresses. It can be used as a security measure to protect the host addresses from direct targeting in network attacks.

CoS packet forwarding class that is typically high priority because it supports protocol control.

policer

Packet loss priority bit. Used to identify packets that have experienced congestion or are from a transmission that exceeded a service provider’s customer service license agreement. A Services

Router can use the PLP bit as part of a congestion control strategy. The bit can be configured on an interface or in a filter.

Feature that limits the amount of traffic passing into or out of an interface. It is an essential component of firewall filters that is designed to thwart denial-of-service (DoS) attacks. A policer applies rate limits on bandwidth and burst size for traffic on a particular Service Router interface.

Applying rate and burst size limits to traffic on an interface.

policing random early detection

(RED)

Gradual drop profile for a given class, used for congestion avoidance. RED attempts to anticipate congestion and reacts by dropping a small percentage of packets from the head of a queue to prevent congestion.

352

Policy, Firewall Filter, and CoS Terms

Policy, Firewall Filter, and Class-of-Service Overview

Term

rule service set stateful firewall filter stateless firewall filter term trusted network untrusted network

Definition

Guide that the Services Router follows when applying services. A rule consists of a match direction and one or more terms.

Collection of services. Examples of services include stateful firewall filters and network address translation (NAT).

Type of firewall filter that evaluates the context of connections, permits or denies traffic based on the context, and updates this information dynamically. Context includes IP source and destination addresses, TCP port numbers, TCP sequencing information, and TCP connection flags.

Type of firewall filter that statically evaluates the contents of packets transiting the router, and packets originating from, or destined for, the router. Information about connection states is not maintained.

Firewall filters contain one or more terms that specify filter match conditions and actions.

Network from which all originating traffic can be trusted—for example, an internal enterprise

LAN. Stateful firewall filters allow traffic to flow from trusted to untrusted networks.

Network from which all originating traffic cannot be trusted—for example, a WAN. Unless configured otherwise, stateful firewall filters do not allow traffic to flow from untrusted to trusted networks.

Routing Policy Overview

Routing protocols send information about routes to a router’s neighbors. This information is processed and used to create routing tables, which are then distilled into forwarding tables. Routing policies control the flow of information between the routing protocols and the routing tables and between the routing tables and the forwarding tables. Using policies, you can determine which routes are advertised, specify which routes are imported into the routing table, and modify routes to control which routes are added to the forwarding table.

This section contains the following topics:

Routing Policy Components on page 353

Applying Routing Policies on page 358

Routing Policy Components

Routing policies are made up of one or more terms, which contain a set of match conditions and a set of actions. Match conditions are criteria that a route must match before the actions can be applied. If a route matches all criteria, one or more actions are applied to the route. These actions specify whether to accept or reject the route, control how a series of policies are evaluated, and manipulate the characteristics associated with a route.

Routing Policy Overview

353

J-series™ Services Router User Guide

This section contains the following topics:

“Routing Policy Terms” on page 354

“Routing Policy Match Conditions” on page 354

“Routing Policy Actions” on page 356

“Default and Final Actions” on page 358

Routing Policy Terms

A term is a named structure in which match conditions and actions are defined. Each routing policy contains one or more terms,

Generally, a Services Router compares a route against the match conditions of each term in a routing policy, starting with the first and moving through the terms in the order in which they are defined, until a match is made and an explicitly configured or default action of accept or reject is taken. If none of the terms in the policy match the route, the Services Router compares the route against the next policy, and so on, until either an action is taken or the default policy is evaluated.

Routing Policy Match Conditions

A match condition defines the criteria that a route must match for an action to take place. Each term can have one or more match conditions.

If a route matches all the match conditions for a particular term, the actions defined for that term are processed.

Each term can consist of two statements, to and from

, that define match conditions:

In the from statement, you define the criteria that an incoming route must match. You can specify one or more match conditions. If you specify more than one, all conditions must match the route for a match to occur.

In the to statement, you define the criteria that an outgoing route must match.

You can specify one or more match conditions. If you specify more than one, all conditions must match the route for a match to occur.

The order of match conditions in a term is not important, because a route must match all match conditions in a term for an action to be taken.

Table 130 summarizes the routing policy match conditions.

Table 130: Summary of Routing Policy Match Conditions

Match Condition aggregate-contributor

Description

Matches routes that are contributing to a configured aggregate. This match condition can be used to suppress a contributor in an aggregate route.

354

Routing Policy Overview

Policy, Firewall Filter, and Class-of-Service Overview

Match Condition area area-id as-path name color preference community external [type metric-type ] interface interface-name internal level level local-preference value metric metric metric2 metric neighbor address next-hop address origin value policy [ policy-names ] preference preference preference2 preference

Description

Matches a route learned from the specified OSPF area during the exporting of OSPF routes into other protocols.

Name of an AS path regular expression. BGP routes whose AS path matches the regular expression are processed.

Color value. You can specify preference values that are finer-grained than those specified in the preference match conditions. The color value can be a number from

0 through 4,294,967,295 9 (232 – 1). A lower number indicates a more preferred route.

Name of one or more communities. If you list more than one name, only one name needs to match for a match to occur. (The matching is effectively a logical

OR operation.)

Matches external OSPF routes, including routes exported from one level to another. In this construct type is an optional keyword. The metric-type value can be either 1 or 2.

When you do not specify type, this condition matches all external routes.

Name or IP address of one or more router interfaces. Do not use this qualifier with protocols that are not interface-specific, such as internal BGP (IBGP).

Depending on where the policy is applied, this match condition matches routes learned from or advertised through the specified interface.

Matches a routing policy against the internal flag for simplified next-hop self policies.

Matches the IS-IS level. Routes that are from the specified level or are being advertised to the specified level are processed.

BGP local preference attribute. The preference value can be from 0 through

4,294,967,295 9 (232 – 1).

Metric value. The metric value corresponds to the multiple exit discriminator (MED), and metric2 corresponds to the interior gateway protocol (IGP) metric if the BGP next hop runs back through another route.

Address of one or more neighbors (peers).

For BGP export policies, the address can be a directly connected or indirectly connected peer. For all other protocols, the address is the neighbor from which the advertisement is received.

Next-hop address or addresses specified in the routing information for a particular route. For BGP routes, matches are performed against each protocol next hop.

BGP origin attribute, which is the origin of the AS path information. The value can be one of the following: egp—Path information originated from another AS.

igp—Path information originated from within the local AS.

incomplete—Path information was learned by some other means.

Name of one or more policies to evaluate as a subroutine.

Preference value. You can specify a primary preference value (preference) and a secondary preference value (preference2). The preference value can be a number from 0 through 4,294,967,295 9 (232 – 1). A lower number indicates a more preferred route.

Routing Policy Overview

355

J-series™ Services Router User Guide

Match Condition prefix-list name protocol protocol route-filter destination-prefix

match-type <actions>

route-type value source-address-filter

destination-prefix match-type

<actions>

Description

Named list of IP addresses configured at the Policy-options level in the configuration hierarchy.

This match condition can be used on import policies only.

Name of the protocol from which the route was learned or to which the route is being advertised. It can be one of the following: aggregate, bgp, direct, dvmrp, isis, local, ospf, pim-dense, pim-sparse, rip, ripng, or static.

List of destination prefixes. When specifying a destination prefix, you can specify an exact match with a specific route or a less precise match using match types. You can configure either a common action that applies to the entire list or an action associated with each prefix.

Route filters can be used on import policies only.

Type of route. The value can be either external or internal.

List of multicast source addresses. When specifying a source address, you can specify an exact match with a specific route or a less precise match using match types. You can configure either a common action that applies to the entire list or an action associated with each prefix.

Source-address filters can be used on import policies only.

Routing Policy Actions

An action defines what the Services Router does with the route when the route matches all the match conditions in the from and to statements for a particular term. If a term does not have from and to statements, all routes are considered to match and the actions apply to all routes.

Each term can have one or more of the following types of actions. The actions are configured under the then statement.

Flow control actions, which affect whether to accept or reject the route and whether to evaluate the next term or routing policy

Actions that manipulate route characteristics

Trace action, which logs route matches

Table 131 summarizes the routing policy actions.

If you do not specify an action, one of the following results occurs:

The next term in the routing policy, if one exists, is evaluated.

If the routing policy has no more terms, the next routing policy, if one exists, is evaluated.

If there are no more terms or routing policies, the accept or reject action specified by the default policy is executed.

356

Routing Policy Overview

Policy, Firewall Filter, and Class-of-Service Overview

Table 131: Summary of Key Routing Policy Actions

Action

Flow Control Actions accept reject next term next policy

Route Manipulation Actions as-path-prepend as-path as-path-expand last-as count n class class-name color preference color2 preference damping name local-preference value

Description

These actions control the flow of routing information into and out of the routing table.

Accepts the route and propagates it. After a route is accepted, no other terms in the routing policy and no other routing policies are evaluated.

Rejects the route and does not propagate it. After a route is rejected, no other terms in the routing policy and no other routing policies are evaluated.

Skips to and evaluates the next term in the same routing policy. Any accept or reject action specified in the then statement is ignored. Any actions specified in the then statement that manipulate route characteristics are applied to the route.

Skips to and evaluates the next routing policy. Any accept or reject action specified in the then statement is ignored. Any actions specified in the then statement that manipulate route characteristics are applied to the route.

These actions manipulate the route characteristics.

Appends one or more autonomous system (AS) numbers at the beginning of the

AS path. If you are specifying more than one AS number, include the numbers in quotation marks.

The AS numbers are added after the local AS number has been added to the path.

This action adds AS numbers to AS sequences only, not to AS sets. If the existing AS path begins with a confederation sequence or set, the appended AS numbers are placed within a confederation sequence. Otherwise, the appended AS numbers are placed with a nonconfederation sequence.

Extracts the last AS number in the existing AS path and appends that AS number to the beginning of the AS path n times. Replace n with a number from 1 through 32.

The AS numbers are added after the local AS number has been added to the path.

This action adds AS numbers to AS sequences only, not to AS sets. If the existing AS path begins with a confederation sequence or set, the appended AS numbers are placed within a confederation sequence. Otherwise, the appended AS numbers are placed with a nonconfederation sequence.

Applies the specified class-of-service (CoS) parameters to routes installed into the routing table.

Sets the preference value to the specified value. The color and color2 preference values can be a number from 0 through 4,294,967,295 (232 – 1). A lower number indicates a more preferred route.

Applies the specified route-damping parameters to the route. These parameters override BGP’s default damping parameters.

This action is useful only in import policies.

Sets the BGP local preference attribute. The preference can be a number from 0 through 4,294,967,295 (232 – 1).

Routing Policy Overview

357

J-series™ Services Router User Guide

Action metric metric metric2 metric metric3 metric metric4 metric next-hop address

Description

Sets the metric. You can specify up to four metric values, starting with metric (for the first metric value) and continuing with metric2, metric3, and metric4.

For BGP routes, metric corresponds to the MED, and metric2 corresponds to the IGP metric if the BGP next hop loops through another router.

Sets the next hop.

If you specify address as self, the next-hop address is replaced by one of the local router’s addresses. The advertising protocol determines which address to use.

Default and Final Actions

If none of the terms’ match conditions evaluate to true, the final action is executed.

The final action is defined in an unnamed term. Additionally, you can define a default action (either accept or reject

) that overrides any action intrinsic to the protocol.

Applying Routing Policies

Once a policy is created, it must be applied before it is active. You apply routing policies using the import and export statements at the

Protocols> protocol-name level in the configuration hierarchy.

In the import statement, list the name of the routing policy to be evaluated when routes are imported into the routing table from the routing protocol.

In the export statement, list the name of the routing policy to be evaluated when routes are being exported from the routing table into a dynamic routing protocol. Only active routes are exported from the routing table.

To specify more than one policy and create a policy chain, list the policies using a space as a separator. If multiple policies are specified, the policies are evaluated in the order in which they are specified. As soon as an accept or reject action is executed, the policy chain evaluation ends.

Firewall Filter Overview

In a stateful firewall filter, all packets flowing from a trusted network to an untrusted network are allowed. Packets flowing from an untrusted network to a trusted network are allowed only if they are responses to a session originated by the trusted network, or if they are explicitly accepted by a term in the stateful firewall filter rule.

When Network Address Translation (NAT) is enabled, the source address of a packet flowing from a trusted network to an untrusted network is replaced with an address chosen from a specified range, or pool , of addresses. In addition, you can configure the Services Router to dynamically translate the source port of the packet—a process called Network Address Port Translation (NAPT) .

358

Firewall Filter Overview

Policy, Firewall Filter, and Class-of-Service Overview

This section contains the following topics:

Stateful and Stateless Firewall Filters on page 359

Process for Configuring a Stateful Firewall Filter and NAT on page 359

Summary of Stateful Firewall Filter and NAT Match Conditions and Actions on

page 360

Planning a Stateless Firewall Filter on page 362

Stateless Firewall Filter Match Conditions, Actions, and Action Modifiers on

page 363

Stateful and Stateless Firewall Filters

A stateless firewall filter can filter packets transiting the Services Router from a source to a destination, or packets originating from, or destined for, the Routing

Engine. Stateless firewall filters applied to the Routing Engine interface protect the processes and resources owned by the Routing Engine.

You can apply a stateless firewall filter to an input or output interface, or to both. Every packet, including fragmented packets, is evaluated against stateless firewall filters.

All firewall filters contain one or more terms, and each term consists of two components—match conditions and actions. The match conditions define the values or fields that the packet must contain to be considered a match. If a packet is a match, the corresponding action is taken. By default, a packet that does not match a firewall filter is discarded.

NOTE: A firewall filter with a large number of terms can adversely affect both the configuration commit time and the performance of the Routing Engine.

For more information about firewall filters, see “Configuring IPSec for Secure Packet

Exchange” on page 483 and the JUNOS Policy Framework Configuration Guide. For

more information about NAT, see the JUNOS Services Interfaces Configuration Guide.

Process for Configuring a Stateful Firewall Filter and NAT

To configure a stateful firewall filter and NAT, perform the following tasks:

Define the stateful firewall filter output and input rules. You must define an output rule that allows all traffic (application and nonapplication) to flow from the trusted network to the untrusted network.

Firewall Filter Overview

359

J-series™ Services Router User Guide

NOTE: If a packet does not match any terms in a stateful firewall filter rule, the packet is discarded.

To define the match condition in the term that allows application traffic to flow from the trusted network to the untrusted network, we recommend you specify the JUNOS default group junos-algs-outbound as the application set.

To view the configuration of this group, enter the show groups junos-defaults applications application-set junos-algs-outbound configuration mode command. For more information about JUNOS default groups, see the JUNOS System Basics

Configuration Guide.

You also must define an input rule to discard all traffic from the untrusted network that is not a response to a session originated by the trusted network.

Define the NAT address and port pool.

Define the NAT output and input rules.

Define a service set that includes all stateful firewall filter and NAT rules and the service interface. You must specify the service interface as sp-0/0/0

.

This service interface is a virtual interface that must be included at the [ edit interfaces

] hierarchy level to support stateful firewall filter and NAT services.

Apply the service set to the interfaces that make up the untrusted network.

NOTE: Do not apply the service set to the sp-0/0/0 interface.

For more information about match conditions and actions, see “Summary of

Stateful Firewall Filter and NAT Match Conditions and Actions” on page 360.

Summary of Stateful Firewall Filter and NAT Match Conditions and Actions

Table 132 lists the match conditions you can specify in stateful firewall

filter and NAT terms. Table 133 and Table 134 list actions you can

specify in stateful firewall filter and NAT terms.

Table 132: Stateful Firewall Filter and NAT Match Conditions

Match Condition application-sets [ set-names ] applications [ application-names ] destination-address address source-address address

Description

List of application set names. Application sets are defined at the [edit applications] hierarchy level.

List of applications. Applications are defined at the [edit applications] hierarchy level.

IP destination address field.

IP source address field.

360

Firewall Filter Overview

Policy, Firewall Filter, and Class-of-Service Overview

For more information about configuring applications and application sets for stateful firewall filters, see the JUNOS Services Interfaces Configuration Guide.

Table 133: Stateful Firewall Filter Actions

Actions accept allow-ip-options [ values ] discard reject syslog

Description

Accept the packet and send it to its destination.

If the IP Option header of the packet contains a value that matches one of the specified values, accept the packet. If this action is not included, only packets without

IP options are accepted. This action can be specified only with the accept action.

You can specify the IP option as text or a numeric value: any (0), ip-security (130), ip-stream (8), loose-source-route (3), route-record (7), router-alert (148), strict-source-route (9), and timestamp (4).

Do not accept the packet, and do not process it further.

Do not accept the packet, and send a rejection message. UDP sends an ICMP unreachable code and RCP sends RST. Rejected packets can be logged or sampled.

Record information in the system logging facility. This action can be used with all options except discard.

Table 134: NAT Actions

Actions syslog translated destination-pool

nat-pool-name

translated source-pool

nat-pool-name

translation-type (destination type | source type )

Description

Record information in the system logging facility.

Translate the destination address using the specified pool.

Translate the source address using the specified pool.

syslog

Translate the destination and source port using the specified type: destination static—Translate the destination address without port mapping.

This type requires the size of the source address space to be the same as the size of the destination address space. You must specify a destination-pool name. The referenced pool must contain exactly one address and no port configuration at the [edit nat pool] hierarchy level.

source dynamic—Translate the source address with port mapping by means of NAPT. You must specify a source-pool name. The referenced pool must include a port configuration at the [edit nat pool] hierarchy level.

source static—Translate the source address without port mapping. This type requires the size of the source address space to be the same as the size of the destination address space. You must specify a source-pool name. The referenced pool must contain exactly one address and no port configuration at the [edit nat pool] hierarchy level.

Information is recorded in the system logging facility.

Firewall Filter Overview

361

J-series™ Services Router User Guide

Planning a Stateless Firewall Filter

Before creating a stateless firewall filter and applying it to an interface, determine what you want the firewall filter to accomplish and how to use its match conditions and actions to achieve your goal. Also, make sure you understand how packets are matched and the default action of the resulting firewall filter.

CAUTION: If a packet does not match any terms in a stateless firewall filter rule, the packet is discarded. Take care that you do not configure a firewall filter that prevents you from accessing the Services Router after you commit the configuration. For example, if you configure a firewall filter that does not match HTTP or HTTPS packets, you cannot access the router with the J-Web interface.

To configure a stateless firewall filter, determine the following:

Purpose of the firewall filter—for example, to limit traffic to certain protocols,

IP source or destination addresses, or data rates, or to prevent denial-of-service

(DoS) attacks.

Appropriate match conditions. The packet header fields to match—for example, IP header fields (such as source and destination IP addresses, protocols, and IP options), TCP header fields (such as source and destination ports and flags), and ICMP header fields (such as ICMP packet type and code).

Action to take if a match occurs—for example, accept, discard, or evaluate the next term.

(Optional) Action modifiers. Additional actions to take if a packet matches—for example, count, log, rate limit, or police a packet.

Interface on which the firewall filter is applied. The input or output side, or both sides, of the Routing Engine interface or a non-Routing Engine interface.

For more information about what a stateless firewall filter can include, see

“Stateless Firewall Filter Match Conditions, Actions, and Action Modifiers” on page 363. For more information about stateless firewall filters, see

the JUNOS Policy Framework Configuration Guide.

362

Firewall Filter Overview

Policy, Firewall Filter, and Class-of-Service Overview

Stateless Firewall Filter Match Conditions, Actions, and Action Modifiers

Table 135 lists the match conditions you can specify in stateless firewall filter terms.

Some of the numeric range and bit-field match conditions allow you to specify a text synonym. For a complete list of the synonyms, do any of the following:

If you are using the J-Web interface, select the synonym from the appropriate drop-down list.

If you are using the CLI, type a question mark (

?

) after the from statement.

See the JUNOS Policy Framework Configuration Guide.

To specify a bit-field match condition with values, such as tcp-flags

, you must enclose the values in quotation marks (“ “). You can use bit-field logical operators to create expressions that are evaluated for matches. For example, if the following expression is used in a filter term, a match occurs if the packet is the initial packet of a TCP session: tcp-flags “syn & !ack”

Table 136 lists the bit-field logical operators in order of highest to lowest precedence.

You can use text synonyms to specify some common bit-field matches. In the previous example, you can specify tcp-initial to specify the same match condition.

NOTE: When the Services Router compares the stateless firewall filter match conditions to a packet, it compares only the header fields specified in the match condition. There is no implied protocol match. For example, if you specify a match of destination-port ssh

, the Services Router checks for a value of

0x22 in the

2-byte field that is two bytes after the IP packet header. The protocol field of the packet is not checked.

Table 135: Stateless Firewall Filter Match Conditions

Match Condition

Numeric Range Match Conditions

keyword -except

Description destination-port number

Negates a match. For example, destination-port-except number .

The following keywords accept the -except extension: destination-port, dscp, esp-spi, forwarding-class, fragment-offset, icmp-code, icmp-type, interface-group, ip-options, packet-length, port, precedence, protocol and source-port.

TCP or User Datagram Protocol (UDP) destination port field. You cannot specify both the port and destination-port match conditions in the same term. Normally, you specify this match in conjunction with the protocol tcp or protocol udp match statement to determine which protocol is being used on the port.

In place of the numeric value, you can specify a text synonym. For example, you can specify telnet or 23.

Firewall Filter Overview

363

J-series™ Services Router User Guide

Match Condition esp-spi spi-value forwarding-class class fragment-offset number icmp-code number icmp-type number interface-group group-number packet-length bytes port number precedence ip-precedence-field protocol number source-port number

Address Match Conditions address prefix destination-address prefix

Description

IPSec encapsulating security payload (ESP) security parameter index (SPI) value.

Match on this specific SPI value. You can specify the ESP SPI value in either hexadecimal, binary, or decimal form.

Forwarding class. Specify assured-forwarding, best-effort, expedited-forwarding, or network-control.

Fragment offset field.

ICMP code field. Normally, you specify this match in conjunction with the protocol icmp match statement to determine which protocol is being used on the port.

This value or keyword provides more specific information than icmp-type. Because the value’s meaning depends on the associated icmp-type, you must specify icmp-type along with icmp-code.

In place of the numeric value, you can specify a text synonym. For example, you can specify ip-header-bad or 0.

ICMP packet type field. Normally, you specify this match in conjunction with the protocol icmp match statement to determine which protocol is being used on the port.

In place of the numeric value, you can specify a text synonym. For example, you can specify time-exceeded or 11.

Interface group on which the packet was received. An interface group is a set of one or more logical interfaces. For information about configuration interface groups, see the JUNOS Policy Framework Configuration Guide.

Length of the received packet, in bytes. The length refers only to the IP packet, including the packet header, and does not include any Layer 2 encapsulation overhead.

TCP or UDP source or destination port field. You cannot specify both the port match and either the destination-port or source-port match conditions in the same term.

Normally, you specify this match in conjunction with the protocol tcp or protocol udp match statement to determine which protocol is being used on the port.

In place of the numeric value, you can specify a text synonym. For example, you can specify bgp or 179.

IP precedence field. You can specify precedence in either hexadecimal, binary, or decimal form.

In place of the numeric value, you can specify a text synonym. For example, you can specify immediate or 0x40.

IP protocol field. In place of the numeric value, you can specify a text synonym.

For example, you can specify ospf or 89.

TCP or UDP source port field. You cannot specify the port and source-port match conditions in the same term. Normally, you specify this match in conjunction with the protocol tcp or protocol udp match statement to determine which protocol is being used on the port.

In place of the numeric value, you can specify a text synonym. For example, you can specify http or 80.

IP source or destination address field. You cannot specify both the address and the destination-address or source-address match conditions in the same term.

IP destination address field. You cannot specify the destination-address and address match conditions in the same term.

364

Firewall Filter Overview

Policy, Firewall Filter, and Class-of-Service Overview

Match Condition Description destination-prefix-list prefix-list prefix-list prefix-list

IP destination prefix list field. You cannot specify the destination-prefix-list and prefix-list match conditions in the same term.

IP source or destination prefix list field. You cannot specify both the prefix-list and the destination-prefix-list or source-prefix-list match conditions in the same term.

source-address prefix source-prefix-list prefix-list

IP source address field. You cannot specify the source-address and address match conditions in the same rule.

IP source prefix list field. You cannot specify the source-prefix-list and prefix-list match conditions in the same term.

Bit-Field Match Conditions with Values fragment-flags number ip-options number tcp-flags number

IP fragmentation flags. In place of the numeric value, you can specify a text synonym.

For example, you can specify more-fragments or 0x2000.

IP options. In place of the numeric value, you can specify a text synonym. For example, you can specify record-route or 7.

TCP flags. Normally, you specify this match in conjunction with the protocol tcp match statement to determine which protocol is being used on the port. In place of the numeric value, you can specify a text synonym. For example, you can specify syn or 0x02.

Bit-Field Text Synonym Match Conditions first-fragment is-fragment tcp-established

First fragment of a fragmented packet. This condition does not match unfragmented packets.

This condition matches if the packet is a trailing fragment. It does not match the first fragment of a fragmented packet. To match both first and trailing fragments, you can use two terms, or you can use fragment-offset 0-8191.

TCP packets other than the first packet of a connection. This match condition is a synonym for "(ack | rst)".

tcp-initial

This condition does not implicitly check that the protocol is TCP. To do so, specify the protocol tcp match condition.

First TCP packet of a connection. This match condition is a synonym for

"(syn & !ack)".

This condition does not implicitly check that the protocol is TCP. To do so, specify the protocol tcp match condition.

Table 136: Stateless Firewall Filter Bit-Field Logical Operators

Description Logical

Operator

!

(...)

& or +

| or ,

Grouping

Negation

Logical AND

Logical OR

Firewall Filter Overview

365

J-series™ Services Router User Guide

Table 137 lists the actions and action modifiers you can specify

in stateless firewall filter terms.

Table 137: Stateless Firewall Filter Actions and Action Modifiers

Description Action or Action

Modifier accept discard next term reject < message-type > routing-instance

routing-instance

Action Modifiers count counter-name

Accepts a packet. This is the default if the packet matches. However, we strongly recommend that you always explicitly configure an action in the then statement.

Discards a packet silently, without sending an Internet Control Message Protocol (ICMP) message. Packets are available for logging and sampling before being discarded.

Continues to the next term for evaluation.

Discards a packet, sending an ICMP destination unreachable message. Rejected packets are available for logging and sampling. You can specify one of the following message types: administratively-prohibited (default), bad-host-tos, bad-network-tos, host-prohibited, host-unknown, host-unreachable, network-prohibited, network-unknown, network-unreachable, port-unreachable, precedence-cutoff, precedence-violation, protocol-unreachable, source-host-isolated , source-route-failed, or tcp-reset. If you specify tcp-reset, a TCP reset is returned if the packet is a TCP packet. Otherwise, nothing is returned.

Routes the packet using the specified routing instance.

Counts the number of packets passing this term. The name can contain letters, numbers, and hyphens (-), and can be up to 24 characters long. A counter name is specific to the filter that uses it, so all interfaces that use the same filter increment the same counter.

Classifies the packet to the specified forwarding class.

forwarding-class

class-name

log loss-priority priority policer policer-name sample syslog

Logs the packet’s header information in the Routing Engine. You can access this information by entering the show firewall log command at the CLI.

Sets the scheduling priority of the packet. The priority can be low or high.

Applies rate limits to the traffic using the named policer.

Samples the traffic on the interface. Use this modifier only when traffic sampling is enabled.

For more information, see the JUNOS Policy Framework Configuration Guide.

Records information in the system logging facility. This action can be used in conjunction with all options except discard.

Class-of-Service Overview

With the class-of-service (CoS) features on a Services Router, you can assign service levels with different delay, jitter (delay variation), and packet loss characteristics to particular applications served by specific traffic flows. CoS is especially useful for networks supporting time-sensitive video and audio applications. To configure CoS

features on a Services Router, see “Configuring Class of Service with DiffServ” on page 427.

366

Class-of-Service Overview

Policy, Firewall Filter, and Class-of-Service Overview

This section contains the following topics. For more information about CoS and

DiffServ, see the JUNOS Network Interfaces and Class of Service Configuration Guide.

Benefits of DiffServ CoS on page 367

DSCPs and Forwarding Service Classes on page 367

JUNOS CoS Functions on page 369

How Forwarding Classes and Schedulers Work on page 370

Benefits of DiffServ CoS

IP routers normally forward packets independently, without controlling throughput or delay. This type of packet forwarding, known as best-effort service, is as good as your network equipment and links allow. Best-effort service is sufficient for many traditional IP data delivery applications, such as e-mail or Web browsing. However, newer IP applications such as real-time video and audio (or voice) require lower delay, jitter, and packet loss than simple best-effort networks can provide.

CoS features allow a Services Router to improve its processing of critical packets while maintaining best-effort traffic flows, even during periods of congestion.

Network throughput is determined by a combination of available bandwidth and delay. CoS dedicates a guaranteed minimum bandwidth to a particular service class by reducing forwarding queue delays. (The other two elements of overall network delay, serial transmission delays determined by link speeds and propagation delays determined by media type, are not affected by CoS settings.)

Normally, packets are queued for output in their order of arrival, regardless of service class. Queueing delays increase with network congestion and often result in lost packets when queue buffers overflow. CoS packet classification assigns packets to forwarding queues by service class.

Because CoS must be implemented consistently end-to-end through the network, the CoS features on the Services Router are based on IETF Differentiated Services

(DiffServ) standards, to interoperate with other vendors’ CoS implementations.

DSCPs and Forwarding Service Classes

DiffServ specifications establish a 6-bit field in the IP packet header to indicate the forwarding service class to apply to the packet. The bit values in the DiffServ field form DiffServ code points (DSCPs) that can be set by the application or by a Services Router on the edge of a DiffServ-enabled network.

Each DiffServ forwarding service class has a well-known name and alias. Although not part of the specifications, the aliases are well known through usage. For example, the alias for DSCP

101110 is widely accepted as ef

(expedited forwarding).

The 21 well-known DSCPs establish five DiffServ service classes. Table 138 identifies

the forwarding service classes and aliases that correspond to the 21 DSCPs.

Class-of-Service Overview

367

J-series™ Services Router User Guide cs1 cs2 cs3 cs4 cs5

Table 138: Default Forwarding Service Class-to-DSCP Mapping

Forwarding Service Class and Use DiffServ

Service Class

Alias ef

IP DSCP

101110 af11 af12 af13 af21 af22 af23 af31 af32 af33 af41 af42 af43 be

001010

001100

001110

010010

010100

010110

011010

011100

011110

100010

100100

100110

000000

Expedited forwarding—The Services Router delivers assured bandwidth, low loss, low delay, and low delay variation (jitter) end-to-end for packets in this service class.

Routers accept excess traffic in this class, but in contrast to assured forwarding, out-of-profile expedited-forwarding packets can be forwarded out of sequence or dropped.

Assured forwarding—The Services Router offers a high level of assurance that the packets are delivered as long as the packet flow from the customer stays within a certain service profile that you define.

The router accepts excess traffic, but applies a random early discard (RED) drop profile to decide if the excess packets is dropped and not forwarded.

Three drop probabilities (low, medium, and high) are defined for this service class.

001000

010000

011000

100000

101000

Best-effort—The Services Router does not apply any special CoS handling to packets with 000000 in the DiffServ field, a backward compatibility feature.

These packets are usually dropped under congested network conditions.

Conversational services—The Services Router delivers assured (usually low) bandwidth with low delay and jitter for packets in this service class. Packets can be dropped, but are never delivered out of sequence.

Packetized voice is a good example of a conversational service.

nc1/cs6 nc2/cs7

110000

111000

Network control—The Services Router delivers packets in this service class with a low priority. (These packets are not delay sensitive.)

Typically, these packets represent routing protocol hello or keepalive messages.

Because loss of these packets jeopardizes proper network operation, delay is preferable to discard.

(See also the conversational services description in this table.)

368

Class-of-Service Overview

Policy, Firewall Filter, and Class-of-Service Overview

JUNOS CoS Functions

Although the DiffServ CoS specifications define the position and length of the DSCP in the packet header, the DiffServ implementation is vendor specific. DiffServ CoS functions in JUNOS software are implemented by a series of components that you configure individually or in combination to define particular service offerings.

Figure 92 shows the components of the JUNOS CoS features, illustrating the sequence in which they interact. Table 139 defines the components and explains their use.

Figure 92: Packet Flow Through JUNOS CoS-Configurable Components

Code

Point

Classifier

Multi-

Field

Classifier

Policer

Forwarding

Policy

Options

Forwarding Class

Loss Priority

Rewrite/

Marker

Scheduler/

Shaper

RED

Policer

Fabric

Scheduler

Table 139: JUNOS CoS Components

CoS Component

Classifiers

Forwarding classes

Loss priorities

Use

Associate incoming packets with a forwarding class and packet loss priority (PLP). The following types of classifiers are available:

Behavior aggregate (BA) or code point traffic classifiers—Allow you to set the forwarding class and PLP based on DSCP.

Multifield (MF) traffic classifiers—Allow you to set the forwarding class and

PLP based on firewall filter rules. This is usually done at the edge of the network for packets that do not have valid DSCPs in the packet headers.

Allow you to set the scheduling and marking of packets as they transit the Services

Router. Known as ordered aggregates in the DiffServ architecture, the forwarding class plus the loss priority determine the router’s per-hop behavior (PHB in DiffServ) for CoS.

Allow you to set the priority of dropping a packet before it is sent. Loss priority affects the scheduling of a packet without affecting the packet’s relative ordering.

Class-of-Service Overview

369

J-series™ Services Router User Guide

CoS Component

Forwarding policy options

Transmission scheduling and rate control

Rewrite markers

Use

Allow you to associate forwarding classes with next hops.

Allow you to create classification overrides, which assign forwarding classes to sets of prefixes.

Provide you with a variety of tools to manage traffic flows. The following types are available:

Schedulers—Allow you to define the priority, bandwidth, delay buffer size, rate control status, and RED drop profiles to be applied to a particular forwarding class for packet transmission. Drop profiles are useful for the assured forwarding service class.

Fabric schedulers—For M320 and T-series platforms only, fabric schedulers allow you to identify a packet as high or low priority based on its forwarding class, and to associate schedulers with the fabric priorities.

Policers for traffic classes—Allow you to limit traffic of a certain class to a specified bandwidth and burst size. Packets exceeding the policer limits can be discarded, or can be assigned to a different forwarding class or to a different loss priority, or to both. You define policers with filters that can be associated with input or output interfaces. Policers are useful for the expedited forwarding service class.

Allow you to redefine the DSCP value of outgoing packets. Rewriting or marking outbound packets is useful when the routing platform is at the border of a network and must alter the code points to meet the policies of the targeted peer.

How Forwarding Classes and Schedulers Work

This section contains the following topics:

“Default Forwarding Class Queue Assignments” on page 370

“Default Scheduler Settings” on page 371

“Default Behavior Aggregate (BA) Classifiers” on page 372

“DSCP Rewrites” on page 373

“Sample BA Classification” on page 373

Default Forwarding Class Queue Assignments

J-series routers have only four queues built into the hardware. Other routing platforms can be configured for up to eight queues. If a classifier does not assign a packet to any other queue (for example, for other than well-known

DSCPs that have not been added to the classifier), the packet is assigned by default to the class associated with queue 0.

Table 140 shows the four forwarding classes and queues that Juniper Networks

classifiers assign to packets based on the DSCP values in arriving packet headers.

370

Class-of-Service Overview

Policy, Firewall Filter, and Class-of-Service Overview

Table 140: Default Forwarding Class Queue Assignments

Forwarding Class best-effort expedited-forwarding

Forwarding Queue queue 0 queue 1 assured-forwarding network-control queue 2 queue 3

Default Scheduler Settings

Each forwarding class has an associated scheduler priority. Only two forwarding classes, best-effort and network-control

(queue 0 and queue 3), are used in the JUNOS default scheduler configuration.

By default, the best-effort forwarding class (queue 0) receives 95 percent of the output link bandwidth and buffer space, and the network-control forwarding class (queue 3) receives 5 percent of the output link bandwidth and buffer space. The default drop profile causes the buffer to fill and then discard all packets until it again has space.

The expedited-forwarding and assured-forwarding classes have no schedulers, because by default no resources are assigned to queue 1 and queue 2. However, you can manually configure resources for expedited-forwarding and assured-forwarding

.

The default scheduler settings are implicit in the configuration, although they do not appear in the output of the show class-of-service command.

[edit class-of-service] schedulers { network-control { transmit-rate percent 5; buffer-size percent 5; priority low; drop-profile-map loss-priority any protocol any; drop-profile terminal;

} best-effort {

} transmit-rate percent 95; buffer-size percent 95; priority low; drop-profile-map loss-priority any protocol any; drop-profile terminal;

}

} drop-profiles {

} terminal { fill-level 100 drop-probability 100;

Class-of-Service Overview

371

J-series™ Services Router User Guide

Default Behavior Aggregate (BA) Classifiers

Table 141 shows the forwarding class and packet loss priority (PLP) that are

assigned by default to each well-known DSCP. Although several DSCPs map to the expedited-forwarding

( ef

) and assured-forwarding

( af

) classes, by default no resources are assigned to these forwarding classes. All af classes other than af1 x are mapped to best-effort

, because RFC 2597, Assured Forwarding PHB

Group , prohibits a node from aggregating classes. Assignment to best-effort implies that the node does not support that class.

You can modify the default settings through configuration. For instructions,

see “Configuring Class of Service with DiffServ” on page 427.

Table 141: Default Behavior Aggregate (BA) Classification

DSCP Alias af41 af42 af43 be cs1 cs2 cs3 cs4 cs5 nc1/cs6 nc2/cs7 other af22 af23 af31 af32 af33 ef af11 af12 af13 af21

Forwarding Class expedited-forwarding assured-forwarding assured-forwarding assured-forwarding best-effort best-effort best-effort best-effort best-effort best-effort best-effort best-effort best-effort best-effort best-effort best-effort best-effort best-effort best-effort network-control network-control best-effort

Packet Loss Priority (PLP) low low low low low low low low low low low low low low low low low low low high high low

372

Class-of-Service Overview

Policy, Firewall Filter, and Class-of-Service Overview

DSCP Rewrites

Typically, a router rewrites the DSCPs in outgoing packets once, when packets enter the DiffServ portion of the network, either because the packets do not arrive from the customer with the proper DSCP bit set or because the service provider wants to verify the that customer has set the DSCP properly. CoS implementations that accept the DSCP and classify and schedule traffic solely on DSCP value perform behavior aggregate (BA) DiffServ functions and do not usually rewrite the DSCP.

DSCP rewrites typically occur in multifield (MF) DiffServ scenarios.

For instructions for configuring rewrite rules, see “Configuring and

Applying Rewrite Rules” on page 435.

Sample BA Classification

Table 142 shows the router forwarding classes associated with each well-known

DSCP code point and the resources assigned to their output queues for a sample

DiffServ CoS implementation. This example assigns expedited forwarding to queue 1 and a subset of the assured forwarding classes ( af1 x

) to queue 2, and distributes resources among all four forwarding classes.

Other DiffServ-based implementations are possible. For configuration information,

see “Configuring Class of Service with DiffServ” on page 427.

Table 142: Sample BA Classification Forwarding Classes and Queues

DSCP Alias ef af11 af12 af13 af21 af22 af23 af31 af32 af33 af41 af42 af43 be cs1 cs2 cs3

DSCP Bits

101110

001010

001100

001110

010010

010100

010110

011010

011100

011110

100010

100100

100110

000000

0010000

010000

011000

Forwarding Class expedited-forwarding assured-forwarding assured-forwarding assured-forwarding best-effort best-effort best-effort best-effort best-effort best-effort best-effort best-effort best-effort best-effort best-effort best-effort best-effort

PLP low low low low low low low low low high high low low low low low low

Queue

0

0

0

0

0

0

0

0

0

0

0

0

0

2

2

1

2

Class-of-Service Overview

373

J-series™ Services Router User Guide

DSCP Alias cs4 cs5 nc1/cs6 nc2/cs7 other

DSCP Bits

100000

101000

110000

111000

Forwarding Class best-effort best-effort network-control network-control best-effort

PLP low low low low low

Queue

0

0

3

3

0

374

Class-of-Service Overview

Chapter 18

Configuring Routing Policies

Use routing policies as filters to control the information from routing protocols that a Services Router imports into its routing table and the information that the router exports (advertises) to its neighbors. To create a routing policy, you configure criteria against which routes are compared, and the action that is performed if the criteria are met.

You use either the J-Web configuration editor or CLI configuration editor to configure a routing policy.

This chapter contains the following topics. For more information about routing policies, see the JUNOS Policy Framework Configuration Guide.

Before You Begin on page 376

Configuring a Routing Policy with a Configuration Editor on page 376

Class-of-Service Overview

375

J-series™ Services Router User Guide

Before You Begin

Before you begin configuring a routing policy, complete the following tasks:

If you do not already have a basic understanding of routing policies, read

“Routing Policy Overview” on page 353.

Determine what you want to accomplish with the policy, and thoroughly understand how to achieve your goal using the various match conditions and actions.

Make certain that you understand the default policies and actions for the policy you are configuring.

Configure an interface on the router. See “Configuring Network Interfaces” on page 79.

Configure an Interior Gateway Protocol (IGP) and Border Gateway Protocol

(BGP), if necessary. See “Configuring BGP Sessions” on page 331.

Configure the router interface to reject or accept routes, if necessary. See

“Configuring Firewall Filters and NAT” on page 389.

Configure static routes, if necessary. See “Configuring Static Routes” on page 285.

Configuring a Routing Policy with a Configuration Editor

A routing policy has a major impact on the flow of routing information or packets within and through the Services Router. The match conditions and actions allow you to configure a customized policy to fit your needs.

To configure a routing policy, you must perform the following tasks marked

(Required) . Perform additional tasks as needed for your router.

(Required) “Configuring the Policy Name” on page 377

(Required) “Configuring a Policy Term” on page 377

(Optional) “Rejecting Known Invalid Routes” on page 378

(Optional) “Injecting OSPF Routes into the BGP Routing Table” on page 380

(Optional) “Grouping Source and Destination Prefixes in a Forwarding Class” on page 382

(Optional) “Configuring Policy to Prepend the AS Path” on page 383

(Optional) “Configuring Damping Parameters” on page 385

For information about using the J-Web and CLI configuration editors, see

“Using J-series Configuration Tools” on page 127.

376

Configuring a Routing Policy with a Configuration Editor

Configuring Routing Policies

Configuring the Policy Name

Each routing policy is identified by a policy name. The name can contain letters, numbers, and hyphens (-) and can be up to 255 characters long. To include spaces in the name, enclose the entire name in double quotation marks.

Each routing policy name must be unique within a configuration.

To configure the policy name:

2.

3.

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 143.

Go on to “Configuring a Policy Term” on page 377.

Table 143: Configuring the Policy Name

Task

Navigate to the Policy statement level in the configuration hierarchy.

Enter the policy name.

Apply your configuration changes.

J-Web Configuration Editor

In the J-Web configuration editor hierarchy, select Policy options>Policy

statement.

In the Policy name box, type the name of the policy.

Click OK to apply your entries to the configuration.

CLI Configuration Editor

From the top of the CLI configuration hierarchy, enter edit policy-options

Type the policy-name value. For example: set policy-statement policy1

Changes in the CLI are applied automatically when you execute the set command.

Configuring a Policy Term

Each routing policy term is identified by a term name. The name can contain letters, numbers, and hyphens (-) and can be up to 255 characters long. To include spaces in the name, enclose the entire name in double quotation marks.

To configure a policy term:

2.

3.

4.

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 144.

If you are finished configuring the policy, commit the configuration.

Go on to one of the following procedures:

Configuring a Routing Policy with a Configuration Editor

377

J-series™ Services Router User Guide

To remove useless routes, see “Rejecting Known Invalid Routes” on page 378.

To advertise additional routes, see “Injecting OSPF Routes into the BGP

Routing Table” on page 380.

To create a forwarding class, see “Grouping Source and Destination

Prefixes in a Forwarding Class” on page 382.

To make a route less preferable to BGP, see “Configuring Policy to Prepend the AS Path” on page 383.

To suppress route information, see “Configuring Damping Parameters” on page 385.

Table 144: Configuring a Policy Term

Task

Navigate to the Policy statement level in the configuration hierarchy.

Create and name a policy term.

J-Web Configuration Editor

In the J-Web configuration editor hierarchy, select Policy options>Policy

statement.

1.

In the Term box, click Add new

entry.

2.

In the Term name box, type the name of a term and click OK.

CLI Configuration Editor

From the top of the CLI configuration hierarchy, enter edit policy-options policy-statement policy1

Create and name a policy term. For example: set term term1

Rejecting Known Invalid Routes

You can specify known invalid (“bad”) routes to ignore by specifying matches on destination prefixes. When specifying a destination prefix, you can specify an exact match with a specific route, or a less precise match by using match types. You can configure either a common reject action that applies to the entire list, or an

action associated with each prefix. Table 145 lists route list match types.

Table 145: Route List Match Types

Match Type exact longer

Match If ...

The route shares the same most-significant bits (described by prefix-length ), and prefix-length is equal to the route’s prefix length.

The route shares the same most-significant bits (described by

prefix-length

), and prefix-length is greater than the route’s prefix length.

378

Configuring a Routing Policy with a Configuration Editor

Configuring Routing Policies

Match Type orlonger prefix-length-range prefix-length2 - prefix-length3 through destination-prefix upto prefix-length2

Match If ...

The route shares the same most-significant bits (described by

prefix-length

), and prefix-length is equal to or greater than the route’s prefix length.

The route shares the same most-significant bits (described by prefix-length ), and the route’s prefix length falls between

prefix-length2

and prefix-length3 , inclusive.

All the following are true:

The route shares the same most-significant bits

(described by prefix-length ) of the first destination prefix.

The route shares the same most-significant bits

(described by prefix-length ) of the second destination prefix for the number of bits in the prefix length.

The number of bits in the route’s prefix length is less than or equal to the number of bits in the second prefix.

You do not use the through match type in most routing policy configurations. For more information, see the JUNOS Policy

Framework Configuration Guide.

The route shares the same most-significant bits (described by prefix-length ) and the route’s prefix length falls between

prefix-length

and prefix-length2 .

For example, to reject routes with a mask of

/8 and greater (

/8

,

/9

,

/10

, and so on) that have the first 8 bits set to

0 and accept routes less than 8 bits in length:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

2.

3.

4.

Perform the configuration tasks described in Table 146.

If you are finished configuring the policy, commit the configuration.

Go on to one of the following procedures:

To advertise additional routes, see “Injecting OSPF Routes into the BGP

Routing Table” on page 380.

To create a forwarding class, see “Grouping Source and Destination

Prefixes in a Forwarding Class” on page 382.

To make a route less preferable to BGP, see “Configuring Policy to Prepend the AS Path” on page 383.

To suppress route information, see “Configuring Damping Parameters” on page 385.

Configuring a Routing Policy with a Configuration Editor

379

J-series™ Services Router User Guide

Table 146: Creating a Policy to Reject Known Invalid Routes

Task

Navigate to the Term level in the configuration hierarchy.

Specify the routes to accept.

Accept these routes.

Specify the routes to reject.

Reject these routes.

J-Web Configuration Editor

In the J-Web configuration editor hierarchy, select Policy options>Policy

statement>Term.

CLI Configuration Editor

From the top of the CLI configuration hierarchy, enter

1.

In the From option, click Configure.

2.

In the Route filter box, click Add

new entry.

3.

In the Address box, enter the prefix of the routes.

edit policy-options policy-statement rejectpolicy1 term rejectterm1

Accept routes less than 8 bits in length: set from route-filter 0/0 up to /7 accept

4.

Click OK.

1.

In the Then option, click Configure.

2.

In the Accept option, select the Yes check box.

3.

Click OK.

1.

In the configuration editor hierarchy, select

Policy options>Policy

statement>Term.

1.

Specify routes less than 8 bits in length: set from route-filter /8 orlonger

2.

In the From option, click Configure.

3.

In the Route filter box, click Add

new entry.

4.

In the Value box, enter the prefix of the routes to reject.

2.

Reject these routes: set then reject

5.

Click OK.

1.

In the Then option, click Configure.

2.

In the Reject option, select the Yes check box.

3.

Click OK.

Injecting OSPF Routes into the BGP Routing Table

You can specify a match condition for policies based on procotols by naming a protocol from which the route is learned or to which the route is being advertised.

You can specify one of the following protocols: aggregate, BGP, direct, DVMRP,

IS-IS, local, OSPF, PIM-dense, PIM-sparse, RIP, or static

For example, you can inject or redistribute OSPF routes into the BGP routing table by creating a routing policy.

380

Configuring a Routing Policy with a Configuration Editor

Configuring Routing Policies

2.

3.

4.

To redistribute OSPF routes from area 1 only into BGP and not advertise routes learned by BGP:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 147.

If you are finished configuring the policy injectpolicy1

, commit the configuration.

Go on to one of the following procedures:

To create a forwarding class, see “Grouping Source and Destination

Prefixes in a Forwarding Class” on page 382.

To make a route less preferable to BGP, see “Configuring Policy to Prepend the AS Path” on page 383.

To suppress route information, see “Configuring Damping Parameters” on page 385.

Table 147: Creating a Policy to Inject OSPF Routes into BGP

Task

Navigate to the Term level in the configuration hierarchy.

Specify the OSPF routes.

Specify the routes from a particular

OSPF area.

Specify that the route is to be accepted if the previous conditions are matched.

J-Web Configuration Editor

In the J-Web configuration editor hierarchy, select Policy options>Policy

statement>Term.

CLI Configuration Editor

From the top of the CLI configuration hierarchy, enter edit policy-options policy-statement injectpolicy1 term injectterm1

Specify the OSPF match condition: 1.

In the From option, click Configure.

2.

In the Protocol box, click Add new

entry.

3.

In the Value drop box, select OSPF.

set from ospf

4.

Click OK.

1.

In the Area option, type 1.

2.

Click OK.

1.

Next to Then, click Configure.

2.

From the Accept reject box, Select

Accept.

Specify Area 1 as a match condition: set from area 1

Specify the action to accept: set then accept

Configuring a Routing Policy with a Configuration Editor

381

J-series™ Services Router User Guide

Task

Set the default option to reject other

OSPF routes.

Navigate to the Protocol>Bgplevel in the configuration hierarchy.

Apply the routing policy policy1 to BGP.

J-Web Configuration Editor

1.

In the configuration editor hierarchy, select

Policy options>Policy

statement>Term.

CLI Configuration Editor

Changes in the CLI are applied automatically when you execute the set command.

2.

In the Then option, click Configure.

3.

From the Accept reject box, Select

Reject.

4.

Click OK.

In the J-Web configuration editor hierarchy, select Protocols>Bgp.

From the top of the CLI configuration hierarchy, enter:

1.

In the Export box, click Add new

entry.

2.

In the Value option, enter policy1.

3.

Click OK.

edit protocols bgp

Specify the OSPF match condition: set export policy1

Grouping Source and Destination Prefixes in a Forwarding Class

Create a forwarding class that includes packets based on both the destination address and the source address in the packet.

To configure and apply a routing policy to group source and destination prefixes in a forwarding class:

1.

2.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 148.

3.

4.

If you are finished configuring the policy, commit the configuration.

Go on to one of the following procedures:

To make a route less preferable to BGP, see “Configuring Policy to

Prepend the AS Path” on page 383.

To suppress route information, see “Configuring Damping Parameters” on page 385.

382

Configuring a Routing Policy with a Configuration Editor

Configuring Routing Policies

Table 148: Creating a Policy to Group Source and Destination Prefixes in a Forwarding Class

Task

Navigate to the Term level in the configuration hierarchy.

Specify the routes to include in the route filter.

Group the source and destination prefixes.

Navigate to the Forwarding table level in the configuration hierarchy.

Apply the policy to the forwarding table.

J-Web Configuration Editor

In the J-Web configuration editor hierarchy, select Policy options>Policy

statement>Term.

CLI Configuration Editor

From the top of the CLI configuration hierarchy, enter

1.

In the From option, click Configure.

2.

In the Route filter box, click Add

new entry.

3.

In the Value box, enter the source and destination prefixes.

edit policy-options policy-statement policy1 term term1

1.

Specify source routes

10.210.0.0/16 or longer: set from route-filter

10.210.0.0/16 orlonger

2.

Specify destination routes

10.215.0.0/16 or longer:

4.

Click OK.

set from route-filter

10.215.0.0/16 orlonger

Specify the forwarding class name:

1.

In the configuration editor hierarchy, select

Policy options>Policy

statement>Term.

set then forwarding class forwarding-class-name1

2.

In the Then option, click Configure.

3.

In the Forwarding class box, enter the forwarding class name.

4.

Click OK.

In the J-Web configuration editor hierarchy, select Routing

options>Forwarding table.

From the top of the CLI configuration hierarchy, enter

1.

2.

In the Export box, click Add new

entry.

In the Value box, enter the name of the policy.

edit routing-options forwarding-table

Specify source routes 10.210.0.0/16 or longer: set export policy1

You can refer to the same routing policy one or more times in the same or a different export statement.

3.

Click OK.

The routing policy is evaluated when routes are being exported from the routing table into the forwarding table.

Only active routes are exported from the routing table.

Configuring Policy to Prepend the AS Path

You can prepend or add one or more autonomous system (AS) numbers at the beginning of an AS path. The AS numbers are added after the local AS number has been added to the path. Prepending an AS path makes a shorter AS path look longer and therefore less preferable to the Border Gateway Protocol (BGP).

Configuring a Routing Policy with a Configuration Editor

383

J-series™ Services Router User Guide

For example, from AS 1, there are two equal paths (through AS 2 and AS 3) to reach

AS 4. You might want packets from certain sources to use the path through AS 2.

Therefore, you must make the path through AS 3 look less preferable so that BGP chooses the path through AS 2. In AS 1, you can prepend multiple AS numbers.

To prepend multiple AS numbers:

2.

3.

4.

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 149.

If you are finished configuring the policy, commit the configuration.

Go on to “Configuring Damping Parameters” on page 385.

Table 149: Creating a Policy to Prepend AS Numbers

Task

Navigate to the Term level in the configuration hierarchy.

Specify the routes to prepend AS numbers to.

Specify the AS numbers to prepend.

J-Web Configuration Editor

In the J-Web configuration editor hierarchy, select Policy options>Policy

statement>Term.

3.

In the Route filter box, click Add

new entry.

4.

Click OK.

CLI Configuration Editor

From the top of the CLI configuration hierarchy, enter

1.

In the From option, click Configure.

2.

In the Value box, enter the prefixes you wish to prepend.

edit policy-options policy-statement prependpolicy1 term prependterm1

1.

Prepend routes 172.168.0.0/12 or longer: set from route-filter

172.16.0.0/12 orlonger

2.

Prepend routes 192.168.0.0/16 or longer: set from route-filter

192.168.0.0/16 orlonger

3.

Prepend routes 10.0.0.0/8 or longer:

1.

In the configuration editor hierarchy, select

Policy options>Policy

statement>Term.

2.

In the Then option, click Configure.

3.

In the AS path prepend box, enter the string of AS numbers to prepend. Separate each AS number with a space.

set from route-filter 10.0.0.0/8 orlonger

Specify the AS numbers to prepend, and enclose them inside double quotation marks: set then as-path-prepend “1 1 1 1”

4.

Click OK.

384

Configuring a Routing Policy with a Configuration Editor

Configuring Routing Policies

Task

Navigate to the Protocols>BGP> level in the configuration hierarchy.

Apply the policy as an import policy for all BGP routes.

J-Web Configuration Editor

In the J-Web configuration editor hierarchy, select Protocols>BGP>.

CLI Configuration Editor

From the top of the CLI configuration hierarchy, enter

1.

In the Import box, click Add new

entry.

2.

In the Value box, enter the name of the policy.

edit protocols bgp

Apply the policy: set import prependpolicy1

3.

Click OK.

The routing policy is evaluated when routes are being imported to the routing table.

You can refer to the same routing policy one or more times in the same or a different import statement.

Configuring Damping Parameters

Flap damping reduces the number of update messages by marking routes as ineligible for selection as the active or preferable route. Marking routes in this way leads to some delay, or suppression , in the propagation of route information, but the result is increased network stability. You typically apply flap damping to external BGP (EBGP) routes (routes in different ASs). You can also apply flap damping within a confederation, between confederation member

ASs. Because routing consistency within an AS is important, do not apply flap damping to internal BGP (IBGP) routes. (If you do, it is ignored.)

To change the default BGP flap damping values, you define actions by creating a named set of damping parameters and including it in a routing policy with the damping action. For the damping routing policy to work, you also must enable BGP route flap damping.

To configure damping, perform these steps:

2.

3.

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 150.

If you are finished configuring the policy, commit the configuration.

Configuring a Routing Policy with a Configuration Editor

385

J-series™ Services Router User Guide

Table 150: Creating a Policy to Accept and Apply Damping on Routes

Task

Navigate to the Term level in the configuration hierarchy.

Specify the routes to dampen.

J-Web Configuration Editor

In the J-Web configuration editor hierarchy, select Policy options>Policy

statement>Term.

1.

In the From option, click Configure.

2.

In the Value box, enter the prefixes you wish to dampen.

3.

In the Route filter box, click Add

new entry.

4.

In the Value box, enter the prefixes you wish to dampen.

5.

Click OK.

CLI Configuration Editor

From the top of the CLI configuration hierarchy, enter edit policy-options policy-statement dampenpolicy1 term dampenterm1

1.

Dampen routes 172.168.0.0/16 or longer: set from route-filter 172.16.0.0/12 orlonger

2.

Dampen routes 192.168.0.0/16 or longer: set from route-filter

192.168.0.0/16 orlonger

3.

Dampen routes 10.0.0.0/8 or longer:

Specify the damping parameters group to apply to the route filter.

1.

In the configuration editor hierarchy, select Policy options>Policy

statement>Term.

2.

In the Then option, click Configure.

3.

In the AS path prepend box, enter the string of AS numbers to prepend. Separate each AS number with a space.

Navigate to the Policy options level in the configuration hierarchy.

4.

Click OK.

In the J-Web configuration editor hierarchy, select Policy options.

set from route-filter 10.0.0.0/8 orlonger

Specify the AS numbers to prepend, and enclose inside them inside double quotation marks: set then as-path-prepend “1 1 1 1”

From the top of the CLI configuration hierarchy, enter edit policy-options

386

Configuring a Routing Policy with a Configuration Editor

Configuring Routing Policies

Task

Create a damping parameter group.

Configure a damping parameter group.

J-Web Configuration Editor

1.

In the Damping box, click Add new

entry.

2.

In the Damping object name box, enter the name of the damping parameter group.

3.

Click OK.

1.

In the Half life box, enter the half life duration, in minutes.

2.

In the Max suppress box, enter the maximum holddown time, in minutes.

CLI Configuration Editor

Create and configure the damping parameter groups: edit damping group1 half-life 30 suppress 3000 reuse 750 max-suppress

60 edit damping group2 half-life 40 suppress 400 reuse 1000 max-suppress

45 edit damping group3 disable

3.

In the Reuse box, enter the reuse threshold, for this damping group.

4.

In the Suppress box, enter the cutoff threshold, for this damping group.

5.

To disable damping for this damping group, select the Disable check box.

6.

Click OK.

In the J-Web configuration editor hierarchy, select Protocols>Bgp.

From the top of the CLI configuration hierarchy, enter

Navigate to the BGP level in the configuration hierarchy.

Enable damping.

1.

Select the Damping check box.

Navigate to the Neighbor level in the configuration hierarchy, for the BGP neighbor to which you want to apply the damping policy—for example, the neighbor at IP address 172.16.15.14.

Apply the policy as an import policy for the BGP neighbor.

2.

Click OK.

In the J-Web configuration editor hierarchy, select Protocols>Bgp>Group

Group1>Neighbor 172.16.15.14 .

1.

In the Import box, click Add new

entry.

2.

In the Value box, enter the name of the policy.

3.

Click OK.

The routing policy is evaluated when routes are imported to the routing table.

edit protocols bgp

Enable damping: set damping

From the top of the CLI configuration hierarchy, enter edit protocols bgp group group1 neighbor

172.16.15.14

Apply the policy: set import dampenpolicy1

You can refer to the same routing policy one or more times in the same or a different import statement.

Configuring a Routing Policy with a Configuration Editor

387

J-series™ Services Router User Guide

388

Configuring a Routing Policy with a Configuration Editor

Chapter 19

Configuring Firewall Filters and NAT

A stateful firewall filter inspects traffic flowing between a trusted network and an untrusted network. Contrasted with a stateless firewall filter that inspects packets in isolation, a stateful firewall filter provides an extra layer of security by using state information derived from past communications and other applications to make dynamic control decisions.

The Services Router uses the stateful firewall filter as a basis for performing

Network Address Translation (NAT).

NOTE: You must have a license to configure a stateful firewall filter and NAT. For

more information about licensing, see “Managing J-series Licenses” on page 69.

You can use either J-Web Quick Configuration or a configuration editor to configure stateful firewall filters and NAT. To configure a stateless firewall filter, use a configuration editor.

This chapter contains the following topics. For more information about firewall filters, see the JUNOS Policy Framework Configuration Guide. For more information about NAT, see the JUNOS Services Interfaces Configuration Guide.

Before You Begin on page 389

Configuring a Stateful Firewall Filter with Quick Configuration on page 390

Configuring a Stateful Firewall Filter with a Configuration Editor on page 393

Configuring a Stateless Firewall Filter with a Configuration Editor on page 399

Verifying Firewall Filter Configuration on page 415

Before You Begin

If you do not already have an understanding of firewall filters, read

“Firewall Filter Overview” on page 358.

Before you begin configuring stateful firewall filters and NAT, you must configure the interfaces on which to apply these services. To configure an

interface, see “Configuring Network Interfaces” on page 79.

Before You Begin

389

J-series™ Services Router User Guide

Unlike a stateful firewall filter, you can configure a stateless firewall filter before configuring the interfaces on which they are applied.

Configuring a Stateful Firewall Filter with Quick Configuration

You can use the Firewall/NAT Quick Configuration pages to configure a stateful firewall filter and NAT. These Quick Configuration pages allow you to designate the interfaces that make up the untrusted network. In addition, you can designate the applications that are allowed to operate from the untrusted network to the trusted network.

Figure 93 and Figure 94 show the Firewall/NAT Quick Configuration

main and application pages.

Figure 93: Firewall/NAT Quick Configuration Main Page

390

Configuring a Stateful Firewall Filter with Quick Configuration

Figure 94: Firewall/NAT Quick Configuration Application Page

Configuring Firewall Filters and NAT

To configure a stateful firewall filter and NAT with Quick Configuration:

1.

2.

3.

In the J-Web interface, select Configuration>Firewall/NAT.

Enter information into the Firewall/NAT Quick Configuration pages, as

described in Table 151.

Click one of the following buttons on the Firewall/NAT Quick Configuration main page:

To apply the configuration and stay in the Firewall/NAT Quick

Configuration main page, click Apply.

To apply the configuration and return to the Quick Configuration page, click OK.

Configuring a Stateful Firewall Filter with Quick Configuration

391

J-series™ Services Router User Guide

To cancel your entries and return to the Quick Configuration page, click Cancel.

4.

Go on to one of the following procedures:

To display the configuration, see “Displaying Firewall Filter

Configurations” on page 415.

To verify a stateful firewall filter, see “Verifying Firewall Filter

Configuration” on page 415.

Table 151: Firewall/NAT Quick Configuration Pages Summary

Field

Stateful Firewall

Enable Stateful Firewall

Function Your Action

Enables stateful firewall filter configuration.

Trusted Interfaces

Trusted Interfaces

Low Address in Address

Range (required)

Designates the trusted and untrusted router interfaces. The stateful firewall filter is applied to the untrusted interfaces.

The Trusted Interfaces box displays a list of all the interfaces configured on the router. Do either of the following:

To apply a stateful firewall filter to an interface, click the interface in the

Trusted Interfaces box to highlight it, and click the left arrow to add the interface to the Untrusted Interfaces list. You can select multiple interfaces by pressing Ctrl while you click the interface.

To remove a stateful firewall filter from an interface, click the interface in the

Untrusted Interfaces box to highlight it, and click the right arrow to add the interface to the Trusted Interfaces list. You can select multiple interfaces by pressing Ctrl while you click the interface.

Network Address Translation (NAT)

Enable NAT Enables NAT configuration.

To enable NAT configuration, select the check box.

Type an IP address or prefix.

High Address in Address

Range

Specifies the lowest address in the NAT pool address range. If a range of addresses is not specified, you can specify a single address or an IP prefix.

Specifies the highest address in the NAT pool address range.

Type an IP address. The total range of addresses in the pool must be limited to a maximum of 32.

Outside Applications Allowed

To enable stateful firewall filter configuration, select the check box.

392

Configuring a Stateful Firewall Filter with Quick Configuration

Configuring Firewall Filters and NAT

Field Function

Add or delete applications that are allowed to operate from the untrusted network to the trusted network.

Your Action

Click Add to move to the Firewall/NAT Quick

Configuration application page. When you have finished entering information into this page, click OK to save it.

To cancel your entries, click Cancel.

Application

Application (required)

Source Address

Designate which applications are allowed to operate from the untrusted network to the trusted network.

Any Unicast WAN Address Specifies that any unicast source address is

Source Addresses and

Prefixes allowed from the untrusted network.

Designates the source addresses and prefixes that are allowed from the untrusted network.

From the drop-down list, select the application you want to operate from the untrusted network to the trusted network.

To allow any unicast source address, select the check box.

To add an IP address and prefix, type them in the boxes above the Add button, then click

Add.

To delete an IP address and prefix, select them in the Source Addresses and Prefixes box, then click Delete.

Destination Address

Any Unicast LAN Address Specifies that any unicast destination address is allowed from the untrusted network.

Destination Addresses and

Prefixes

Designates the destination addresses and prefixes that are allowed from the untrusted network.

To allow any unicast destination address, select the check box.

To add an IP address and prefix, type them in the boxes above the Add button, then click

Add.

To delete an IP address and prefix, select them in the Destination Addresses and Prefixes box, then click Delete.

Configuring a Stateful Firewall Filter with a Configuration Editor

To configure a stateful firewall filter and NAT with a configuration editor, you do the following:

Define the filter’s input and output rules.

Configuring a Stateful Firewall Filter with a Configuration Editor

393

J-series™ Services Router User Guide

NOTE: If a packet does not match any terms in a stateful firewall filter rule, the packet is discarded.

Define an address pool and port pool for NAT.

Define NAT input and output rules.

Define a service set that includes the rules in the filter and NAT and the virtual sp-0/0/0 services interface.

Finally, apply the service set to any interfaces on the Services Router that lead to or from the untrusted network.

The example in this section shows how to create a stateful firewall filter

and NAT with the rules described in Table 152.

Table 152: Sample Stateful Firewall Filter and NAT Rules

Rule to-wan-rule from-wan-rule nat-to-wan-rule

Type

Output

Input

Output

Term or Terms app-term—Accepts packets from any of the applications defined by the JUNOS default group junos-algs-outbound application set.

accept-all-term—Accepts packets that do not match app-term.

wan-src-addr-term—Accepts input packets with a source prefix of 192.168.33.0/24.

discard-all-term—Discards all packets.

private-public-term—Translates the source address to an address within the pool 10.148.2.1 through 10.148.2.32 and dynamically translates the source port to a router-assigned port by means of NAPT

The example also assigns the name public-pool to the NAT address pool and NAPT router-assigned port.

In addition, the example creates the service set wan-service-set that includes the stateful firewall filter and NAT services and defines sp-0/0/0 as its service interface. Finally, wan-service-set is applied to the WAN interface to the untrusted network, t1-0/0/0

.

For stateful firewall match conditions and actions, see “Summary of Stateful

Firewall Filter and NAT Match Conditions and Actions” on page 360.

To configure a stateful firewall filter and NAT and apply them to the WAN interface:

394

Configuring a Stateful Firewall Filter with a Configuration Editor

Configuring Firewall Filters and NAT

2.

3.

4.

5.

1.

Navigate to the top of the configuration hierarchy in either the J-Web interface or the CLI configuration editor.

Perform the configuration tasks described in Table 153.

To apply the stateful firewall filter and NAT to the interface, perform the

configuration tasks described in Table 154.

If you are finished configuring the network, commit the configuration.

Go on to one of the following procedures:

To display the configuration, see “Displaying Firewall Filter

Configurations” on page 415.

To verify the stateful firewall filter, see “Verifying a Stateful Firewall

Filter” on page 420.

Table 153: Configuring a Stateful Firewall Filter and NAT

Task

Navigate to the Stateful

firewall level in the configuration hierarchy.

Define to-wan-rule and set its match direction.

J-Web Configuration Editor

In the configuration editor hierarchy, select

Services>Stateful firewall.

1.

Next to Rule, click Add new entry.

2.

In the Rule name box, type to-wan-rule.

3.

From the Match direction drop-down list, select output.

1.

Next to Term, click Add new entry.

Define app-term for the to-wan-rule rule.

Define the match condition for app-term—the default junos-algs-outbound application set.

2.

In the Term name box, type app-term.

1.

Next to From, click Configure.

2.

Next to Application sets, click Add new

entry.

3.

In the Application set name box, type junos-algs-outbound .

Define an action for app-term.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit services stateful-firewall.

Set the rule name, match direction, term name, and match condition: set rule to-wan-rule match-direction output term app-term from application-sets junos-algs-outbound

4.

Click OK twice.

1.

On the Term app-term page, next to Then, click Configure.

Set the action: set rule to-wan-rule term app-term then accept

2.

In the Designation drop-down list, select

Accept.

3.

Click OK twice.

Configuring a Stateful Firewall Filter with a Configuration Editor

395

J-series™ Services Router User Guide

Task

Define accept-all-term for to-wan-rule.

J-Web Configuration Editor

1.

On the Rule to-wan-rule page, next to

Term, click Add new entry.

CLI Configuration Editor

Set the term name and the action:

2.

In the Term name box, type accept-all-term.

1.

Next to Then, click Configure.

Define an action for accept-all-term. The action is taken only if a packet does not match app-term.

2.

From the Designation drop-down list, select Accept.

3.

Next to Accept, select the check box.

Define from-wan-rule and set its match direction.

4.

Click OK three times.

1.

On the Rule page, next to Rule, click Add

new entry.

set rule to-wan-rule term accept-all-term then accept

Define wan-src-addr-term for the from-wan-rule rule.

2.

In the Rule name box, type from-wan-rule.

3.

1.

From the Match direction drop-down list, select input.

Next to Term, click Add new entry.

2.

In the Term name box, type wan-src-addr-term .

1.

Next to From, click Configure.

Define the match condition for wan-src-addr-term.

2.

Next to Source address, click Add new

entry.

set rule from-wan-rule match-direction input term wan-src-addr-term from source-address

192.168.33.0/24

3.

From the Address drop-down list, select

Enter Specific Value—>.

Set the rule name, match direction, term name, and the match condition:

Define an action for wan-src-addr-term.

Define discard-all-term for from-wan-rule.

Define an action for discard-all-term. The action is taken only if a packet does not match wan-src-addr-term.

4.

In the Prefix box, type 192.168.33.0/24.

5.

Click OK twice.

1.

On the Term wan-src-addr-term page, next to Then, click Configure.

2.

In the Designation drop-down list, select

Accept.

Set the action: set rule from-wan-rule term wan-src-addr-term then accept

3.

Click OK twice.

1.

On the Rule from-wan-rule page, next to

Term, click Add new entry.

2.

In the Term name box, type discard-all-term.

1.

Next to Then, click Configure.

2.

From the Designation drop-down list, select Discard.

3.

Click OK three times.

Set the term name and the action: set rule from-wan-rule term discard-all-term then discard

396

Configuring a Stateful Firewall Filter with a Configuration Editor

Configuring Firewall Filters and NAT

Task

Navigate to the Nat level in the configuration hierarchy.

Define the public-pool address pool name and range.

Specify the NAT port pool to be automatically assigned by the router.

Define nat-to-wan-rule and private-public-term.

Set the NAT port translation type for private-public-term.

J-Web Configuration Editor

1.

In the configuration editor hierarchy, select Services.

2.

Next to NAT, click Configure.

1.

Next to Pool, click Add new entry.

2.

In the Pool name box, type public-pool.

3.

From the Address choice drop-down list, select Address range.

4.

In the High box, type 10.148.2.32. In the Low box, 10.148.2.1.

1.

Next to Port, click Configure.

2.

From the Port choice drop-down list, select Automatic.

3.

Click OK twice.

1.

On the Nat page, next to Rule, click Add

new entry.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit services nat.

Set the address pool name and the range: set pool public-pool address-range low

10.148.2.1 high 10.148.2.32

Configure the source port translation to be automatic: set pool public-pool port automatic

Set the rule name, match direction, term name, and the term’s pool name:

2.

In the Rule name box, type nat-to-wan-rule.

3.

From the Match direction drop-down list, select output.

set rule nat-to-wan-rule match-direction output term private-public-term then translated source-pool public-pool

4.

Next to Term, select Add new entry.

5.

In the Term name box, type private-public-term.

6.

Next to Then, select Configure.

7.

Next to Translated, select Configure.

8.

In the Source pool box, type public-pool.

1.

Next to Translation type, select the check box.

2.

Select Configure.

3.

From the Source drop-down list, select

dynamic.

4.

Click OK five times.

Set the NAT translation type: set rule nat-to-wan-rule match-direction output term private-public-term then translated translation-type source dynamic

Configuring a Stateful Firewall Filter with a Configuration Editor

397

J-series™ Services Router User Guide

Table 154: Applying a Stateful Firewall Filter and NAT to an Interface

Task

Navigate to the Services level in the configuration hierarchy.

Define wan-service-set and assign the stateful firewall filter rule to-wan-rule to the service set.

J-Web Configuration Editor

1.

In the configuration editor hierarchy, select Services.

1.

Next to Service set, click Add new entry.

2.

In the Service set name box, type wan-service-set.

3.

From the Stateful firewall rules choice drop-down list, select Stateful firewall

rules.

4.

Next to Stateful firewall rules, click Add

new entry.

Assign the stateful firewall filter rule from-wan-rule to the service set.

Assign the NAT rule nat-to-wan-rule to the service set.

Define the service set type and virtual interface sp–0/0/0 as the service interface for wan-service-set.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit services.

Define the service set and assign the rule: set service-set wan-service-set stateful-firewall-rules to-wan-rule

5.

In the Rule name box, type to-wan-rule.

6.

Click OK.

1.

Next to Stateful firewall rules, click Add

new entry.

Define the service set and assign the rule: set service-set wan-service-set stateful-firewall-rules from-wan-rule 2.

In the Rule name box, type from-wan-rule.

3.

Click OK.

1.

From the Nat rules choice drop-down list, select Nat rules.

Assign the rule to the service set:

2.

Next to Nat rules, click Add new entry.

3.

In the Rule name box, type nat-to-wan-rule.

4.

Click OK.

1.

From the Service type choice drop-down list, select Interface service.

set service-set wan-service-set nat-rules nat-to-wan-rule

Define the service set type and the service interface:

2.

Next to Interface service, click Configure.

3.

In the Service interface box, type sp-0/0/0.

4.

Click OK.

set service-set wan-service-set interface-service service-interface sp-0/0/0

398

Configuring a Stateful Firewall Filter with a Configuration Editor

Configuring Firewall Filters and NAT

Task

Configure the sp–0/0/0 service interface.

From the Interfaces level of the configuration hierarchy, navigate to the Inet level of the T1 interface—the untrusted interface in this example—and apply wan-service-set to the input and output sides of the t1–0/0/0 interface.

J-Web Configuration Editor

1.

In the configuration editor hierarchy, select interfaces.

CLI Configuration Editor

From the top of the configuration hierarchy, configure the interface:

2.

Next to Interface, click Add new entry.

3.

In the Interface name box, type sp-0/0/0.

set interfaces sp-0/0/0 unit 0 family inet

4.

Next to Unit, click Add new entry.

5.

In the Interface unit number box, type 0.

6.

Next to Inet, select the check box.

7.

Click Configure.

8.

Click OK.

1.

In the configuration editor hierarchy, select Interfaces>t1-0/0/0>

Unit>0>Family>Inet.

From the top of the configuration hierarchy, apply the service set to the interface: set interfaces t1-0/0/0 unit 0 family inet service input service-set wan-service-set 2.

Next to Service, click Configure.

3.

Next to Input, click Configure.

4.

Next to Service set, click Add new entry.

5.

In the Service set name box, type wan-service-set.

set interfaces t1-0/0/0 unit 0 family inet service output service-set wan-service-set

6.

Click OK.

7.

Next to Output, click Configure.

8.

Next to Service set, click Add new entry.

9.

In the Service set name box, type wan-service-set.

10.

Click OK.

Configuring a Stateless Firewall Filter with a Configuration Editor

The section contains the following topics. For stateless firewall match conditions,

actions, and modifiers, see “Stateless Firewall Filter Match Conditions, Actions, and Action Modifiers” on page 363.

Stateless Firewall Filter Strategies on page 400

Configuring a Routing Engine Firewall Filter for Services and Protocols from

Trusted Sources on page 400

Configuring a Routing Engine Firewall Filter to Protect Against TCP and ICMP

Floods on page 404

Configuring a Stateless Firewall Filter with a Configuration Editor

399

J-series™ Services Router User Guide

Configuring a Routing Engine Firewall Filter to Handle Fragments on page 409

Applying a Stateless Firewall Filter to an Interface on page 414

Stateless Firewall Filter Strategies

For best results, use the following sections to plan the purpose and contents of a stateless firewall filter before starting configuration.

CAUTION: If a packet does not match any terms in a stateless firewall filter rule, the packet is discarded. Take care that you do not configure a firewall filter that prevents you from accessing the Services Router after you commit the configuration. For example, if you configure a firewall filter that does not match HTTP or HTTPS packets, you cannot access the router with the J-Web interface.

Strategy for a Typical Stateless Firewall Filter

A primary goal of a typical stateless firewall filter is to protect the Routing

Engine processes and resources from malicious or untrusted packets. You can configure a stateless firewall filter like the sample filter protect-RE to restrict traffic destined for the Routing Engine based on its source, protocol, and application.

In addition, you can limit the traffic rate of packets destined for the Routing

Engine to protect against flood, or denial-of-service (DoS), attacks.

For details, see “Configuring a Routing Engine Firewall Filter for Services and

Protocols from Trusted Sources” on page 400 and “Configuring a Routing Engine

Firewall Filter to Protect Against TCP and ICMP Floods” on page 404.

Strategy for Handling Packet Fragments

You can configure a stateless firewall filter like the sample filter fragment-filter to address special circumstances associated with fragmented packets destined for the Routing Engine. Because the Services Router evaluates every packet against a firewall filter (including fragments), you must configure the filter to accommodate fragments that do not contain packet header information. Otherwise, the filter discards all but the first fragment of a fragmented packet.

For details, see “Configuring a Routing Engine Firewall Filter to

Handle Fragments” on page 409.

Configuring a Routing Engine Firewall Filter for Services and Protocols from Trusted

Sources

The following example shows how to create a stateless firewall filter, protect-RE

, that discards all traffic destined for the Routing Engine, except

400

Configuring a Stateless Firewall Filter with a Configuration Editor

Configuring Firewall Filters and NAT

SSH and BGP protocol packets from specified trusted sources. Table 155

lists the terms that are configured in this sample filter.

Table 155: Sample Stateless Firewall Filter protect-RE Terms to Allow Packets from Trusted Sources

Term ssh-term bgp-term discard-rest-term

Purpose

Accepts TCP packets with a source address of 192.168.122.0/24 and a destination port that specifies SSH.

Accepts TCP packets with a source address of 10.2.1.0/24 and a destination port that specifies the BGP protocol.

For all packets that are not accepted by ssh-term or bgp-term, creates a firewall filter log and system logging records, then discards all packets. To view the log, enter the show firewall log operational

mode command. (For more information, see “Displaying Firewall Filter Logs” on page 421.)

By applying firewall filter protect-RE to the Routing Engine, you specify which protocols and services, or applications, are allowed to reach the Routing Engine, and you ensure the packets are from a trusted source. This protects processes running on the Routing Engine from an external attack.

To use the configuration editor to configure the stateless firewall filter:

1.

Navigate to the top of the configuration hierarchy in either the J-Web interface or the CLI configuration editor.

2.

3.

4.

Perform the configuration tasks described in Table 156.

If you are finished configuring the network, commit the configuration.

Go on to one of the following procedures:

To display the configuration, see “Displaying Firewall Filter

Configurations” on page 415.

To apply the firewall filter to the Routing Engine, see “Applying a Stateless

Firewall Filter to an Interface” on page 414.

To verify the firewall filter, see “Verifying a Services, Protocols, and

Trusted Sources Firewall Filter” on page 423.

Table 156: Configuring a Protocols and Services Firewall Filter for the Routing Engine

Task

Navigate to the Firewall level in the configuration hierarchy.

J-Web Configuration Editor

In the configuration editor hierarchy, select

Firewall.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit firewall.

Configuring a Stateless Firewall Filter with a Configuration Editor

401

J-series™ Services Router User Guide

Task

Define protect-RE and ssh-term, and define the protocol, destination port, and source address match conditions.

Define the actions for ssh-term.

J-Web Configuration Editor

1.

Next to Filter, click Add new entry.

2.

In the Filter name box, type protect-RE.

3.

Next to Term, click Add New Entry.

4.

In the Rule name box, type ssh-term.

5.

Next to From, click Configure.

6.

In the Protocol choice drop-down list, select Protocol.

7.

Next to Protocol, click Add new entry.

8.

In the Value keyword drop-down list, select tcp.

CLI Configuration Editor

Set the term name and define the match conditions: set family inet filter protect-RE term ssh-term from protocol tcp destination-port ssh source-address 192.168.122.0/24

9.

Click OK.

10.

In the Destination port choice drop-down list, select Destination port.

11.

Next to Destination port, click Add new

entry.

12.

In the Value keyword drop-down list, select ssh.

13.

Click OK.

14.

Next to Source address, click Add new

entry.

15.

In the Address box, type

192.168.122.0/24.

16.

Click OK twice.

1.

On the Term ssh-term page, next to Then, click Configure.

Set the actions: set family inet filter protect-RE term ssh-term then accept 2.

In the Designation drop-down list, select

Accept.

3.

Click OK twice.

402

Configuring a Stateless Firewall Filter with a Configuration Editor

Configuring Firewall Filters and NAT

Task

Define bgp-term, and define the protocol, destination port, and source address match conditions.

Define the action for bgp-term.

Define discard-rest-term and its action.

J-Web Configuration Editor

1.

On the Filter protect-RE page, next to

Term, click Add New Entry.

2.

In the Rule name box, type bgp-term.

3.

Next to From, click Configure.

4.

In the Protocol choice drop-down list, select Protocol.

5.

Next to Protocol, click Add new entry.

6.

In the Value keyword drop-down list, select tcp.

7.

Click OK.

8.

In the Destination port choice drop-down list, select Destination port.

9.

Next to Destination port, click Add new

entry.

CLI Configuration Editor

Set the term name and define the match conditions: set family inet filter protect-RE term bgp-term from protocol tcp destination-port bgp source-address 10.2.1.0/24

10.

In the Value keyword drop-down list, select bgp.

11.

Click OK.

12.

Next to Source address, click Add new

entry.

13.

In the Address box, type 10.2.1.0/24.

14.

Click OK twice.

1.

On the Term bgp-term page, next to Then, click Configure.

2.

In the Designation drop-down list, select

Accept.

Set the action: set family inet filter protect-RE term bgp-term then accept

3.

Click OK twice.

1.

On the Filter protect-RE page, next to

Term, click Add New Entry.

2.

In the Rule name box, type discard-rest-term.

3.

Next to Then, click Configure.

4.

Next to Log, select the check box.

Set the term name and define its actions: set family inet filter protect-RE term discard-rest-term then log syslog discard

5.

Next to Syslog, select the check box.

6.

In the Designation drop-down list, select

Discard.

7.

Click OK four times.

Configuring a Stateless Firewall Filter with a Configuration Editor

403

J-series™ Services Router User Guide

Configuring a Routing Engine Firewall Filter to Protect Against TCP and ICMP Floods

The procedure in this section creates a sample stateless firewall filter, protect-RE

, that limits certain TCP and ICMP traffic destined for the Routing Engine. A router without this kind of protection is vulnerable to TCP and ICMP flood attacks—also known as denial-of-service (DoS) attacks. For example:

A TCP flood attack of SYN packets initiating connection requests can so overwhelm the Services Router that it can no longer process legitimate connection requests, resulting in denial of service.

An ICMP flood can overload the Services Router with so many echo requests

(ping requests) that it expends all its resources responding and can no longer process valid network traffic, also resulting in denial of service.

Applying a firewall filter like protect-RE to the Routing Engine protects against these types of attacks.

For each term in the sample filter, you first create a policer and then incorporate it into the action of the term. For more information about firewall filter policers, see the JUNOS Policy Framework Configuration Guide.

If you want to include the terms created in this procedure in the protect-RE firewall

filter configured in the previous section (see “Configuring a Routing Engine

Firewall Filter for Services and Protocols from Trusted Sources” on page 400),

perform the configuration tasks in this section first, then configure the terms as described in the previous section. This approach ensures that the rate-limiting terms are included as the first two terms in the firewall filter.

NOTE: You can move terms within a firewall filter by using the insert

CLI command.

For more information, see “Inserting an Identifier” on page 152.

Table 157 lists the terms that are configured in this sample filter.

404

Configuring a Stateless Firewall Filter with a Configuration Editor

Configuring Firewall Filters and NAT

Table 157: Sample Stateless Firewall Filter protect-RE Terms to Protect Against Floods

Term tcp-connection-term icmp-term

Purpose

Polices the following types of TCP packets with a source address of 192.168.122.0/24 or 10.2.1.0/24:

Connection request packets (SYN and

ACK flag bits equal 1 and 0)

Connection release packets (FIN flag bit equals 1)

Connection reset packets (RST flag bit equals 1)

Polices the following types of ICMP packets.

All are counted in counter icmp-counter.

Echo request packets

Echo response packets

Unreachable packets

Time-exceeded packets

Policer tcp-connection-policer—Limits the traffic rate and burst size of these TCP packets to 500,000 bps and

15,000 bytes. Packets that exceed the traffic rate are discarded.

icmp-policer—Limits the traffic rate and burst size of these ICMP packets to 1,000,000 bps and

15,000 bytes. Packets that exceed the traffic rate are discarded.

To use the configuration editor to configure the policers and the stateless firewall filter:

1.

Navigate to the top of the configuration hierarchy in either the J-Web interface or the CLI configuration editor.

2.

3.

To configure the firewall filter policers, perform the configuration tasks

described in Table 158.

To configure the prefix lists and the firewall filter, perform the configuration

tasks described in Table 159.

4.

5.

If you are finished configuring the network, commit the configuration.

Go on to one of the following procedures:

To display the configuration, see “Displaying Firewall Filter

Configurations” on page 415.

To apply the firewall filter to the Routing Engine, see “Applying a Stateless

Firewall Filter to an Interface” on page 414.

To verify the firewall filter, see “Verifying a TCP and ICMP Flood Firewall

Filter” on page 424.

Configuring a Stateless Firewall Filter with a Configuration Editor

405

J-series™ Services Router User Guide

Table 158: Configuring Policers for TCP and ICMP

Task

Navigate to the Firewall level in the configuration hierarchy.

Define tcp-connection-policer and set its rate limits.

You can use the following abbreviations when specifying the bandwidth limit: k (1000) m (1,000,000) g (1,000,000,000)

Define the policer action for tcp-connection-policer.

J-Web Configuration Editor

In the configuration editor hierarchy, select

Firewall.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit firewall.

1.

Next to Policer, click Add new entry.

2.

In the Policer name box, type tcp-connection-policer.

3.

Next to Filter specific, select the check box.

4.

Next to If Exceeding, select the check box and click Configure.

5.

In the Burst size limit box, type 15k.

The burst size limit can be from 1,500 through 100,000,000 bytes.

6.

In the Bandwidth drop-down list, select

Bandwidth limit.

7.

In the Bandwidth limit box, type 500k.

The bandwidth limit can be from 32,000 through 32,000,000,000 bps.

8.

Click OK.

1.

On the Policer tcp-connection-policer page, next to Then, click Configure.

2.

Next to Discard, select the check box.

3.

Click OK twice.

Set the policer name and its rate limits: set policer tcp-connection-policer filter-specific if-exceeding burst-size-limit 15k bandwidth-limit 500k

Set the policer action: set policer tcp-connection-policer then discard

406

Configuring a Stateless Firewall Filter with a Configuration Editor

Configuring Firewall Filters and NAT

Task

Define icmp-policer and set its rate limits.

You can use the following abbreviations when specifying the bandwidth limit: k (1000) m (1,000,000) g (1,000,000,000)

Define the policer action for icmp-policer.

J-Web Configuration Editor

1.

On the Firewall page, next to Policer, click

Add new entry.

CLI Configuration Editor

Set the policer name and its rate limits:

2.

In the Policer name box, type icmp-policer.

3.

Next to Filter specific, select the check box.

set policer icmp-policer filter-specific if-exceeding burst-size-limit 15k bandwidth-limit 1m

4.

Next to If Exceeding, select the check box and click Configure.

5.

In the Burst size limit box, type 15k.

The burst size limit can be from 1,500 through 100,000,000 bytes.

6.

In the Bandwidth drop-down list, select

Bandwidth limit.

7.

In the Bandwidth limit box, type 1m.

The bandwidth limit can be from 32,000 through 32,000,000,000 bps.

8.

Click OK.

1.

On the Policer icmp-policer page, next to

Then, click Configure.

2.

Next to Discard, select the check box.

3.

Click OK three times.

Set the policer action: set policer icmp-policer then discard

Table 159: Configuring a TCP and ICMP Flood Firewall Filter for the Routing Engine

Task

Navigate to the Policy

options level in the configuration hierarchy.

Define the prefix list trusted-addresses.

J-Web Configuration Editor

In the configuration editor hierarchy, select

Policy options.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit policy-options.

1.

Next to Prefix list, click Add new entry.

2.

In the Name box, type trusted-addresses.

3.

Next to Prefix list item, click Add new

entry.

Set the prefix list: set prefix-list trusted-addresses

192.168.122.0/24 set prefix-list trusted-addresses 10.2.1.0/24

4.

In the Prefix box, type

192.168.122.0/24.

5.

Click OK.

6.

Next to Prefix list item, click Add new

entry.

7.

In the Prefix box, type 10.2.1.0/24.

8.

Click OK three times.

Configuring a Stateless Firewall Filter with a Configuration Editor

407

J-series™ Services Router User Guide

Task

Navigate to the Firewall level in the configuration hierarchy.

Define protect-RE and tcp-connection-term, and define the source prefix list match condition.

Define the TCP flags and protocol match conditions for tcp-connection-term.

Define the actions for tcp-connection-term.

Define icmp-term, and define the protocol.

J-Web Configuration Editor

In the configuration editor hierarchy, select

Firewall.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit firewall.

1.

Next to Filter, click Add new entry.

2.

In the Filter name box, type protect-RE.

3.

Next to Term, click Add New Entry.

4.

In the Rule name box, type tcp-connection-term.

Set the term name and define the source address match condition: set family inet filter protect-RE term tcp-connection-term from source-prefix-list trusted-addresses

5.

Next to From, click Configure.

6.

Next to Source prefix list, click Add new

entry.

7.

In the Name box, type trusted-addresses.

8.

Click OK.

1.

In the TCP flags box, type

(syn & !ack) | fin | rst.

2.

In the Protocol choice drop-down list, select Protocol.

3.

Next to Protocol, click Add new entry.

4.

In the Value keyword drop-down list, select tcp.

Set the TCP flags and protocol and protocol match conditions for the term: set family inet filter protect-RE term tcp-connection-term from protocol tcp tcp-flags "(syn & !ack) | fin | rst"

5.

Click OK.

1.

On the Term tcp-connection-term page, next to Then, click Configure.

2.

In the Policer box, type tcp-connection-policer.

3.

In the Designation drop-down list, select

Accept.

4.

Click OK twice.

1.

On the Filter protect-RE page, next to

Term, click Add New Entry.

2.

In the Rule name box, type icmp-term.

3.

Next to From, click Configure.

4.

In the Protocol choice drop-down list, select Protocol.

5.

Next to Protocol, click Add new entry.

6.

In the Value keyword drop-down list, select icmp.

7.

Click OK.

Set the actions: set family inet filter protect-RE term tcp-connection-term then policer tcp-connection-policer accept

Set the term name and define the protocol: set family inet filter protect-RE term icmp-term from protocol icmp

408

Configuring a Stateless Firewall Filter with a Configuration Editor

Configuring Firewall Filters and NAT

Task

Define the ICMP type match conditions.

Define the actions for icmp-term.

J-Web Configuration Editor

1.

In the Icmp type choice drop-down list, select Icmp type.

2.

Next to Icmp type, click Add new entry.

3.

In the Value keyword drop-down list, select echo-request.

4.

Click OK.

5.

Next to Icmp type, click Add new entry.

6.

In the Value keyword drop-down list, select echo-reply.

7.

Click OK.

8.

Next to Icmp type, click Add new entry.

9.

In the Value keyword drop-down list, select unreachable.

10.

Click OK.

11.

Next to Icmp type, click Add new entry.

12.

In the Value keyword drop-down list, select time-exceeded.

13.

Click OK.

1.

On the icmp-term page, next to Then, click Configure.

2.

In the Count box, type icmp-counter.

3.

In the Policer box, type icmp-policer.

4.

In the Designation drop-down list, select

Accept.

5.

Click OK four times.

CLI Configuration Editor

Set the ICMP type match conditions: set family inet filter protect-RE term icmp-term from icmp-type [echo-request echo-reply unreachable time-exceeded]

Set the actions: set family inet filter protect-RE term icmp-term then policer icmp-policer count icmp-counter accept

Configuring a Routing Engine Firewall Filter to Handle Fragments

The procedure in this section creates a sample stateless firewall filter, fragment-RE

, that handles fragmented packets destined for the Routing Engine. By applying fragment-RE to the Routing Engine, you protect against the use of IP fragmentation as a means to disguise TCP packets from a firewall filter.

Table 160 lists the terms that are configured in this sample filter.

Configuring a Stateless Firewall Filter with a Configuration Editor

409

J-series™ Services Router User Guide

Table 160: Sample Stateless Firewall Filter fragment-RE Terms

Term small-offset-term not-fragmented-term first-fragment-term fragment-term

Purpose

Discards IP packets with a fragment offset of 1 through 5, and adds a record to the system logging facility.

Accepts unfragmented TCP packets with a source address of 10.2.1.0/24 and a destination port that specifies the BGP protocol. A packet is considered unfragmented if its MF flag and its fragment offset in the TCP header equal 0.

Accepts the first fragment of a fragmented TCP packet with a source address of 10.2.1.0/24 and a destination port that specifies the BGP protocol.

Accepts all packet fragments with an offset of 6 through 8191.

For example, consider an IP packet that is fragmented into the smallest allowable fragment size of 8 bytes (a 20-byte IP header plus an 8-byte payload). If this IP packet carries a TCP packet, the first fragment (fragment offset of

0

) that arrives at the Services Router contains only the TCP source and destination ports (first

4 bytes), and the sequence number (next 4 bytes). The TCP flags, which are contained in the next 8 bytes of the TCP header, arrive in the second fragment

(fragment offset of

1

). The fragment-RE filter works as follows:

Term small-offset-term discards small offset packets to ensure that subsequent terms in the firewall filter can be matched against all the headers in the packet.

Term fragment-term accepts all fragments that were not discarded by small-offset-term

. However, only those fragments that are part of a packet containing a first fragment accepted by first-fragment-term are reassembled by the Services Router.

For more information about IP fragment filtering, see RFC 1858, Security

Considerations for IP Fragment Filtering.

To use the configuration editor to configure the stateless firewall filter:

1.

2.

Navigate to the top of the configuration hierarchy in either the J-Web interface or the CLI configuration editor.

To configure the firewall filter, perform the configuration tasks described

in Table 161.

3.

4.

If you are finished configuring the network, commit the configuration.

Go on to one of the following procedures:

To display the configuration, see “Displaying Firewall Filter

Configurations” on page 415.

To apply the firewall filter to the Routing Engine, see “Applying a Stateless

Firewall Filter to an Interface” on page 414.

To verify the firewall filter, see “Verifying a Firewall Filter That Handles

Fragments” on page 425.

410

Configuring a Stateless Firewall Filter with a Configuration Editor

Configuring Firewall Filters and NAT

Table 161: Configuring a Fragments Firewall Filter for the Routing Engine

Task

Navigate to the Firewall level in the configuration hierarchy.

Define fragment-RE and small-offset-term, and define the fragment offset match condition.

The fragment offset can be from 1 through 8191.

J-Web Configuration Editor

In the configuration editor hierarchy, select

Firewall.

1.

Next to Filter, click Add new entry.

2.

In the Filter name box, type fragment-RE.

3.

Next to Term, click Add New Entry.

4.

In the Rule name box, type small-offset-term.

Define the action for small-offset-term.

5.

Next to From, click Configure.

6.

In the Fragment offset choice drop-down list, select Fragment offset.

7.

Next to Fragment offset, select Add New

Entry.

8.

In the Range box, type 1-5.

9.

Click OK twice.

1.

On the Term small-offset-term page, next to Then, click Configure.

2.

Next to Syslog, select the check box.

3.

In the Designation drop-down list, select

Discard.

4.

Click OK twice.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit firewall.

Set the term name and define the fragment offset match condition: set family inet filter fragment-RE term small-offset-term from fragment-offset 1-5

Set the action: set family inet filter fragment-RE term small-offset-term then syslog discard

Configuring a Stateless Firewall Filter with a Configuration Editor

411

J-series™ Services Router User Guide

Task

Define not-fragmented-term, and define the fragment, protocol, destination port, and source address match conditions.

Define the action for not-fragmented-term.

J-Web Configuration Editor

1.

On the Filter fragment-RE page, next to

Term, click Add New Entry.

2.

In the Term name box, type not-fragmented-term.

3.

Next to From, click Configure.

4.

In the Fragment flags box, type 0x0.

5.

In the Fragment offset choice drop-down list, select Fragment offset.

6.

Next to Fragment offset, select Add New

Entry.

7.

In the Range box, type 0.

8.

Click OK.

9.

In the Protocol choice drop-down list, select Protocol.

10.

Next to Protocol, click Add new entry.

11.

In the Value keyword drop-down list, select tcp.

12.

Click OK.

13.

In the Destination port choice drop-down list, select Destination port.

CLI Configuration Editor

Set the term name and define match conditions: set family inet filter fragment-RE term not-fragmented-term from fragment-flags 0x0 fragment-offset 0 protocol tcp destination-port bgp source-address 10.2.1.0/24

14.

Next to Destination port, click Add new

entry.

15.

In the Value keyword drop-down list, select bgp.

16.

Click OK.

17.

Next to Source address, click Add new

entry.

18.

In the Address box, type 10.2.1.0/24.

19.

Click OK twice.

1.

On the Term not-fragmented-term page, next to Then, click Configure.

2.

In the Designation drop-down list, select

Accept.

3.

Click OK twice.

Set the action: set family inet filter fragment-RE term not-fragmented-term then accept

412

Configuring a Stateless Firewall Filter with a Configuration Editor

Configuring Firewall Filters and NAT

Task

Define first-fragment-term, and define the fragment, protocol, destination port, and source address match conditions.

J-Web Configuration Editor

1.

On the Filter fragment-RE page, next to

Term, click Add New Entry.

2.

In the Rule name box, type first-fragment-term.

3.

Next to From, click Configure.

4.

Next to First fragment, select the check box.

5.

In the Protocol choice drop-down list, select Protocol.

Define the action for first-fragment-term.

6.

Next to Protocol, click Add new entry.

7.

In the Value keyword drop-down list, select tcp.

8.

Click OK.

9.

In the Destination port choice drop-down list, select Destination port.

10.

Next to Destination port, click Add new

entry.

11.

In the Value keyword drop-down list, select bgp.

12.

Click OK.

13.

Next to Source address, click Add new

entry.

14.

In the Address box, type 10.2.1.0/24.

15.

Click OK twice.

1.

On the Term first-fragment-term page, next to Then, click Configure.

2.

In the Designation drop-down list, select

Accept.

3.

Click OK twice.

CLI Configuration Editor

Set the term name and define match conditions: set family inet filter fragment-RE term first-fragment-term from first-fragment protocol tcp destination-port bgp source-address 10.2.1.0/24

Set the action: set family inet filter fragment-RE term first-fragment-term then accept

Configuring a Stateless Firewall Filter with a Configuration Editor

413

J-series™ Services Router User Guide

Task

Define fragment-term and define the fragment match condition.

J-Web Configuration Editor

1.

On the Filter fragment-RE page, next to

Term, click Add New Entry.

2.

In the Rule name box, type fragment-term.

3.

Next to From, click Configure.

4.

In the Fragment offset choice drop-down list, select Fragment offset.

5.

Next to Fragment offset, select Add New

Entry.

CLI Configuration Editor

Set the term name and define match conditions: set family inet filter fragment-RE term fragment-term from fragment-offset 6–8191

Define the action for fragment-term.

6.

In the Range box, type 6-8191.

7.

Click OK twice.

1.

On the Term fragment-term page, next to

Then, click Configure.

2.

In the Designation drop-down list, select

Accept.

3.

Click OK four times.

Set the action: set family inet filter fragment-RE term fragment-term then accept

Applying a Stateless Firewall Filter to an Interface

You can apply a stateless firewall to the input or output sides, or both, of an interface. To filter packets transiting the router, apply the firewall filter to any non-Routing Engine interface. To filter packets originating from, or destined for, the Routing Engine, apply the firewall filter to the loopback ( lo0

) interface.

For example, to apply a stateless firewall filter protect-RE to the input side of the Routing Engine interface, follow this procedure:

1.

2.

Perform the configuration tasks described in Table 162.

If you are finished configuring the network, commit the configuration.

Table 162: Applying a Firewall Filter to the Routing Engine Interface

Task

Navigate to the Inet level in the configuration hierarchy.

Apply protect-RE as an input filter to the lo0 interface.

J-Web Configuration Editor

In the configuration editor hierarchy, select

Interfaces>lo0> Unit>0>Family>Inet.

1.

Next to Filter, click Configure.

2.

In the Input box, type protect-RE.

3.

Click OK five times.

CLI Configuration Editor

From the top of the configuration hierarchy, apply the filter to the interface: set interfaces lo0 unit 0 family inet filter input protect-RE

414

Configuring a Stateless Firewall Filter with a Configuration Editor

Configuring Firewall Filters and NAT

To view the configuration of the Routing Engine interface, enter the show interfaces lo0 command. For example:

} user@host# show interfaces lo0 unit 0 { family inet { filter { input protect-RE;

} address 127.0.0.1/32;

}

Verifying Firewall Filter Configuration

To verify a firewall filter configuration, perform these tasks:

Displaying Firewall Filter Configurations on page 415

Verifying a Stateful Firewall Filter on page 420

Displaying Firewall Filter Logs on page 421

Displaying Firewall Filter Statistics on page 422

Verifying a Services, Protocols, and Trusted Sources Firewall Filter on page 423

Verifying a TCP and ICMP Flood Firewall Filter on page 424

Verifying a Firewall Filter That Handles Fragments on page 425

Displaying Firewall Filter Configurations

Purpose

Action

Verify the configuration of the firewall filter. You can analyze the flow of the firewall filter terms by displaying the entire configuration.

From the J-Web interface, select

Configuration>View and Edit>View Configuration Text.

Alternatively, from configuration mode in the CLI, enter the show services or show firewall command for stateful and stateless firewall filters.

Verifying Firewall Filter Configuration

415

J-series™ Services Router User Guide

Sample Output

The sample output in this section displays the following firewall filters (in order):

Stateful firewall filter and NAT configured in “Configuring a Stateful Firewall

Filter with a Configuration Editor” on page 393

Stateless protect-RE

filter configured in “Configuring a Routing Engine Firewall

Filter for Services and Protocols from Trusted Sources” on page 400

Stateless protect-RE

filter configured in “Configuring a Routing Engine Firewall

Filter to Protect Against TCP and ICMP Floods” on page 404

Stateless fragment-RE

filter configured in “Configuring a Routing Engine Firewall

Filter to Handle Fragments” on page 409

[edit] user@host# show services stateful-firewall rule to-wan-rule { match-direction output; term app-term { from { application-sets junos-algs-outbound;

} then { accept;

}

} term accept-all-term { then { accept;

}

}

} rule from-wan-rule { match-direction input; term wan-src-addr-term { from { source-address {

192.168.33.0/24;

}

} then {

} accept;

}

} term discard-all-term { then { discard;

}

}

} nat { pool public-pool {

416

Verifying Firewall Filter Configuration

Configuring Firewall Filters and NAT

} address-range low 10.148.2.1 high 10.148.2.32; port automatic;

} rule nat-to-wan-rule { match-direction output; term private-public-term { then { translated { source-pool public-pool; translation-type source dynamic;

}

}

}

}

} service-set wan-service-set {

} stateful-firewall-rules to-wan-rule; stateful-firewall-rules from-wan-rule; nat-rules nat-to-wan-rule; interface-service { service-interface sp-0/0/0;

[edit] user@host# show firewall firewall { family inet { filter protect-RE { term ssh-term { from {

} source-address {

192.168.122.0/24; protocol tcp; destination-port ssh;

} then accept;

} term bgp-term { from {

} source-address {

10.2.1.0/24; protocol tcp; destination-port bgp;

} then accept;

} term discard-rest-term { then { log; syslog; discard;

Verifying Firewall Filter Configuration

417

J-series™ Services Router User Guide

}

}

}

}

}

[edit] user@host# show firewall firewall { policer tcp-connection-policer { filter-specific; if-exceeding { bandwidth-limit 500k; burst-size-limit 15k;

} then discard;

} policer icmp-policer { filter-specific;

} if-exceeding { bandwidth-limit 1m; burst-size-limit 15k; then discard;

} family inet { filter protect-RE { term tcp-connection-term { from {

} source-prefix-list { trusted-addresses; protocol tcp; tcp-flags “(syn & !ack) | fin | rst”;

} then { policer tcp-connection-policer; accept;

}

} term icmp-term { from { protocol icmp; icmp-type [ echo-request echo-reply unreachable time-exceeded ];

} then { policer icmp-policer; count icmp-counter; accept;

}

}

additional terms ...

}

}

418

Verifying Firewall Filter Configuration

Configuring Firewall Filters and NAT

}

What It Means

}

[edit] user@host# show firewall firewall { family inet { filter fragment-RE { term small-offset-term { from { fragment-offset 1-5;

} then { syslog; discard;

}

} term not-fragmented-term { from { source-address {

10.2.1.0/24;

} fragment-offset 0; fragment-flags 0x0; protocol tcp; destination-port bgp;

} then accept;

} term first-fragment-term { from { source-address {

10.2.1.0/24;

}

} first-fragment; protocol tcp; destination-port bgp;

} then accept;

} term fragment-term { from { fragment-offset 6-8191;

} then accept;

additional terms ...

}

}

Verify that the output shows the intended configuration of the firewall filter. For

more information about the format of a configuration file, see “Viewing the

Configuration Text” on page 136.

Verifying Firewall Filter Configuration

419

J-series™ Services Router User Guide

Verify that the terms are listed in the order in which you want the packets to be tested. You can move terms within a firewall filter by using the insert

CLI command.

For more information, see “Inserting an Identifier” on page 152.

Verifying a Stateful Firewall Filter

Purpose

Action

Verify the firewall filter configured in “Configuring a Stateful Firewall Filter with a

Configuration Editor” on page 393.

To verify that the actions of the firewall filter terms are taken, send packets to and from the untrusted network that match the terms. In addition, verify that actions are not taken for packets that do not match.

Send packets—associated with the junos-algs-outbound application set—from a host in the trusted network to a host in the untrusted network. Verify that packets received from the host in the untrusted network are responses only to the session originated by the host in the trusted network. To ensure that packets from the host are not accepted because of rule from-wan-rule

, do not send packets to the host in the untrusted network with an IP address that matches

192.168.33.0/24

.

For example, send a ping request from host trusted-nw-trusted-host to host untrusted-nw-untrusted-host

, and verify that a ping response is returned. Ping requests and responses use ICMP, which belongs to the junos-algs-outbound application set.

NOTE: To view the configuration of junos-algs-outbound

, enter the show groups junos-defaults applications application-set junos-algs-outbound configuration mode command.

Sample Output

Send packets from a host in the untrusted network to a host in the trusted network. Verify that the host in the trusted network receives packets only from the host in the untrusted network with an IP address that matches

192.168.33.0/24

.

For example, send a ping request from host untrusted-nw-trusted-host with an IP address that matches

192.168.33.0/24 to host trusted-nw-trusted-host

, and verify that a ping response is returned.

Verify that the ping response displays an IP address from the configured

NAT pool.

user@trusted-nw-trusted-host> ping untrusted-nw-untrusted-host

PING untrusted-nw-untrusted-host.acme.net (172.69.13.5): 56 data bytes

64 bytes from 192.169.13.5: icmp_seq=0 ttl=22 time=8.238 ms

64 bytes from 192.169.13.5: icmp_seq=1 ttl=22 time=9.116 ms

64 bytes from 192.169.13.5: icmp_seq=2 ttl=22 time=10.875 ms

...

420

Verifying Firewall Filter Configuration

Configuring Firewall Filters and NAT

What It Means user@untrusted-nw-trusted-host> ping trusted-nw-trusted-host

PING trusted-nw-trusted-host-fe-000.acme.net (112.148.2.3): 56 data bytes

64 bytes from 10.148.2.3: icmp_seq=0 ttl=253 time=18.248 ms

64 bytes from 10.148.2.3: icmp_seq=1 ttl=253 time=10.906 ms

64 bytes from 10.148.2.3: icmp_seq=2 ttl=253 time=12.845 ms

...

Verify the following information:

A ping request from host trusted-nw-trusted-host returns a ping response from host untrusted-nw-untrusted-host

.

A ping request from host untrusted-nw-trusted-host returns a ping response from host trusted-nw-trusted-host

. Verify that the ping response displays an IP address from the configured NAT pool of

10.148.2.1

through

10.148.2.32

.

For information about using the J-Web interface to ping a host, see “Using the

J-Web Ping Host Tool” on page 218.

For more information about the ping

command, see “Using the ping Command” on page 226 or the JUNOS Protocols, Class of Service, and System Basics Command

Reference.

Displaying Firewall Filter Logs

Purpose

Action

Verify that packets are being logged. If you included the log or syslog action in a term, verify that packets matching the term are recorded in the firewall log or your system logging facility.

From operational mode in the CLI, enter the show firewall log command.

The log of discarded packets generated from the firewall filter configured in

“Configuring a Routing Engine Firewall Filter for Services and Protocols from

Trusted Sources” on page 400 is displayed in the following sample output.

Sample Output user@host> show firewall log

Log :

Time Filter

15:11:02 pfe

15:11:01 pfe

15:11:01 pfe

15:11:01 pfe

...

Action Interface

D

D

D

D fe-0/0/0.0

fe-0/0/0.0

fe-0/0/0.0

fe-0/0/0.0

Protocol Src Addr

TCP 172.17.28.19

Dest Addr

192.168.70.71

TCP

TCP

TCP

172.17.28.19

172.17.28.19

172.17.28.19

192.168.70.71

192.168.70.71

192.168.70.71

Verifying Firewall Filter Configuration

421

J-series™ Services Router User Guide

What It Means

Each record of the output contains information about the logged packet. Verify the following information:

Under

Time

, the time of day the packet was filtered is shown.

The

Filter output is always pfe

.

Under

Action

, the configured action of the term matches the action taken on the packet—

A

(accept),

D

(discard),

R

(reject).

Under

Interface

, the ingress interface on which the packet arrived is appropriate for the filter.

Under

Protocol

, the protocol in the IP header of the packet is appropriate for the filter.

Under

Src Addr

, the source address in the IP header of the packet is appropriate for the filter.

Under

Dest Addr

, the destination address in the IP header of the packet is appropriate for the filter.

For more information about the show firewall log command, see the JUNOS Protocols,

Class of Service, and System Basics Command Reference.

Displaying Firewall Filter Statistics

Purpose

Action

Verify that packets are being policed and counted.

From operational mode in the CLI, enter the show firewall filter filter-name command.

The value of the counter, icmp-counter

, and the number of packets discarded by the

policers in the firewall filter configured in “Configuring a Routing Engine Firewall

Filter to Protect Against TCP and ICMP Floods” on page 404 are displayed in

the following sample output.

Sample Output user@host> show firewall filter protect-RE

Filter: protect-RE

Counters:

Name icmp-counter

Policers:

Name tcp-connection-policer icmp-policer

Bytes

1040000

Packets

643254873

7391

Packets

5600

422

Verifying Firewall Filter Configuration

Configuring Firewall Filters and NAT

What It Means

Verify the following information:

Next to

Filter

, the name of the firewall filter is correct.

Under

Counters

:

Under

Name

, the names of any counters configured in the firewall filter are correct.

Under

Bytes

, the number of bytes that match the filter term containing the count counter-name action are shown.

Under

Packets

, the number of packets that match the filter term containing the count counter-name action are shown.

Under

Policers

:

Under

Name

, the names of any policers configured in the firewall filter are correct.

Under

Packets

, the number of packets that match the conditions specified for the policer are shown.

For more information about the show firewall filter command, see the JUNOS Protocols,

Class of Service, and System Basics Command Reference.

Verifying a Services, Protocols, and Trusted Sources Firewall Filter

Purpose

Action

Sample Output

Verify the firewall filter configured in “Configuring a Routing Engine Firewall Filter for Services and Protocols from Trusted Sources” on page 400.

To verify that the actions of the firewall filter terms are taken, send packets to the

Services Router that match the terms. In addition, verify that the filter actions are

not taken for packets that do not match.

Use the ssh host-name command from a host at an IP address that matches

192.168.122.0/24 to verify that you can log in to the Services Router using only

SSH from a host with this address prefix.

Use the show route summary command to verify that the routing table on the

Services Router does not contain any entries with a protocol other than

Direct

,

Local

,

BGP

, or

Static

.

% ssh 192.168.249.71

%ssh host user@host’s password:

--- JUNOS 6.4-20040518.0 (JSERIES) #0: 2004-05-18 09:27:50 UTC user@host>

Verifying Firewall Filter Configuration

423

J-series™ Services Router User Guide

What It Means user@host> show route summary

Router ID: 192.168.249.71

inet.0: 34 destinations, 34 routes (33 active, 0 holddown, 1 hidden)

Direct: 10 routes, 9 active

Local:

BGP:

Static:

9 routes,

10 routes,

5 routes,

9 active

10 active

5 active

...

Verify the following information:

You can successfully log in to the Services Router using SSH.

The show route summary command does not display a protocol other than

Direct

,

Local

,

BGP

, or

Static

.

For more information about the show route summary command, see the JUNOS

Protocols, Class of Service, and System Basics Command Reference.

Verifying a TCP and ICMP Flood Firewall Filter

Purpose

Action

Sample Output

Verify the firewall filter configured in “Configuring a Routing Engine Firewall Filter to Protect Against TCP and ICMP Floods” on page 404.

To verify that the actions of the firewall filter terms are taken, send packets to the

Services Router that match the terms. In addition, verify that the filter actions are

not taken for packets that do not match.

Verify that the Services Router can establish only TCP sessions with a host at an IP address that matches

192.168.122.0/24 or

10.2.1.0/24

. For example, log in to the router with the telnet host-name command from another host with one of these address prefixes.

Use the ping host-name command to verify that the Services Router responds only to ICMP packets (such as ping requests) that do not exceed the policer traffic rates.

Use the ping host-name size bytes command to exceed the policer traffic rates by sending ping requests with large data payloads.

user@host> telnet 192.168.249.71

Trying 192.168.249.71...

Connected to host.acme.net.

Escape character is ’^]’.

host (ttyp0) login: user

Password:

--- JUNOS 6.4-20040521.1 built 2004-05-21 09:38:12 UTC

424

Verifying Firewall Filter Configuration

Configuring Firewall Filters and NAT user@host> user@host> ping 192.168.249.71

PING host-fe-000.acme.net (192.168.249.71): 56 data bytes

64 bytes from 192.168.249.71: icmp_seq=0 ttl=253 time=11.946 ms

64 bytes from 192.168.249.71: icmp_seq=1 ttl=253 time=19.474 ms

64 bytes from 192.168.249.71: icmp_seq=2 ttl=253 time=14.639 ms

...

What It Means user@host> ping 192.168.249.71 size 20000

PING host-fe-000.acme.net (192.168.249.71): 20000 data bytes

^C

--- host-fe-000.acme.net ping statistics ---

12 packets transmitted, 0 packets received, 100% packet loss

Verify the following information:

You can successfully log in to the Services Router using Telnet.

The Services Router sends responses to the ping host command.

The Services Router does not send responses to the ping host size 20000 command.

For more information about the ping

command, see “Using the ping Command” on page 226 or the JUNOS Protocols, Class of Service, and System Basics Command

Reference.

For information about using the J-Web interface to ping a host, see “Using the

J-Web Ping Host Tool” on page 218.

For more information about the telnet

command, see “Using the telnet Command” on page 195 or the JUNOS Protocols, Class of Service, and System Basics Command

Reference.

Verifying a Firewall Filter That Handles Fragments

Purpose

Action

Verify the firewall filter configured in “Configuring a Routing Engine Firewall Filter to Handle Fragments” on page 409.

To verify that the actions of the firewall filter terms are taken, send packets to the

Services Router that match the terms. In addition, verify that the filter actions are

not taken for packets that do not match.

Verify that packets with small fragment offsets are recorded in the router’s system logging facility.

Use the show route summary command to verify that the routing table does not contain any entries with a protocol other than

Direct

,

Local

,

BGP

, or

Static

.

Verifying Firewall Filter Configuration

425

J-series™ Services Router User Guide

Sample Output

What It Means user@host> show route summary

Router ID: 192.168.249.71

inet.0: 34 destinations, 34 routes (33 active, 0 holddown, 1 hidden)

Direct: 10 routes, 9 active

Local:

BGP:

Static:

9 routes,

10 routes,

5 routes,

9 active

10 active

5 active

...

Verify that the show route summary command does not display a protocol other than

Direct

,

Local

,

BGP

, or

Static

. For more information about the show route summary command, see the JUNOS Protocols, Class of Service, and System Basics Command

Reference.

426

Verifying Firewall Filter Configuration

Chapter 20

Configuring Class of Service with

DiffServ

You configure class of service (CoS) with Differentiated Services (DiffServ) when you need to override the default packet forwarding behavior of a Services

Router—especially in the three areas identified in Table 163.

Table 163: Reasons to Configure Class of Service (Cos) with DiffServ

Default Behavior to Override with CoS

Packet classification—By default, the Services Router does not use DiffServ to classify packets. Packet classification applies to incoming traffic.

Scheduling queues—By default, the Services Router has only two queues enabled. Scheduling queues apply to outgoing traffic.

Packet headers—By default, the Services Router does not rewrite CoS bits in packet headers. Rewriting packet headers applies to outgoing traffic.

CoS Configuration Area

Classifiers

Schedulers

Rewrite rules

You can use either the J-Web configuration editor or CLI configuration editor to configure CoS with DiffServ. The J-Web interface does not include Quick

Configuration pages for CoS or DiffServ.

This chapter contains the following topics. For more information about CoS and

DiffServ, see the JUNOS Network Interfaces and Class of Service Configuration Guide.

Before You Begin on page 428

Configuring CoS with DiffServ with a Configuration Editor on page 428

Verifying a DiffServ Configuration on page 457

Verifying Firewall Filter Configuration

427

J-series™ Services Router User Guide

Before You Begin

Before you begin configuring a Services Router for CoS with DiffServ, complete the following tasks:

If you do not already have a basic understanding of CoS and DiffServ, read

“Policy, Firewall Filter, and Class-of-Service Overview” on page 351.

Determine whether the Services Router needs to support different traffic streams, such as voice or video. If so, CoS with DiffServ helps to make sure this traffic receives more than basic best-effort packet delivery service.

Determine whether the Services Router is directly attached to any applications that send DiffServ packets. If no sources are enabled for DiffServ, you must configure and apply rewrite rules on the interfaces to the sources.

Determine whether the Services Router must support DiffServ assured forwarding (AF) classes. Assured forwarding usually requires random early detection (RED) drop profiles to be configured and applied.

Determine whether the Services Router must support DiffServ expedited forwarding (EF) classes with a policer. Policers require you to apply a burst size and bandwidth limit to the traffic flow, and set a consequence for packets that exceed these limits—usually a high loss priority, so that packets exceeding the policer limits are discarded first.

Configuring CoS with DiffServ with a Configuration Editor

To configure the Services Router as a node in a network supporting CoS with

DiffServ, you must perform the following tasks marked (Required) .

(Required) “Configuring a Policer for a Firewall Filter” on page 429

(Required) “Configuring and Applying a Firewall Filter for a Multifield

Classifier” on page 430

(Required) “Assigning Forwarding Classes to Output Queues” on page 434

(Required) “Configuring and Applying Rewrite Rules” on page 435

(Required) “Configuring and Applying Behavior Aggregate Classifiers” on page 440

(Required) “Configuring RED Drop Profiles for Assured Forwarding Congestion

Control” on page 443

(Optional) “Configuring Schedulers” on page 446

(Optional) “Configuring and Applying Scheduler Maps” on page 450

(Optional) “Configuring and Applying Virtual Channels” on page 453

428

Configuring CoS with DiffServ with a Configuration Editor

Configuring Class of Service with DiffServ

For information about using the J-Web and CLI configuration editors, see

“Using J-series Configuration Tools” on page 127.

Configuring a Policer for a Firewall Filter

You configure a policer to detect packets that exceed the limits established for

DiffServ expedited forwarding. For DiffServ, packets that exceed these limits are given a higher loss priority than packets within the bandwidth and burst size limits.

The following example shows how to configure a policer called ef-policer that identifies for likely discard expedited forwarding packets with a burst size greater than 2000 bytes and a bandwidth greater than 10 percent.

For more information about firewall filters, see “Configuring Firewall Filters and

NAT” on page 389 and the JUNOS Policy Framework Configuration Guide .

To configure an expedited forwarding policer for a firewall filter for the Services Router:

2.

3.

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 164.

Go on to “Configuring and Applying a Firewall Filter for a Multifield Classifier” on page 430.

Table 164: Configuring a Policer for a Firewall Filter

Task

Navigate to the Firewall level in the configuration hierarchy.

J-Web Configuration Editor

In the configuration editor hierarchy, select Firewall.

Create and name the policer for expedited forwarding.

1.

Click Add new entry next to

Policer.

2.

In the Policer name box, type a name for the EF policer—for example, ef-policer.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit firewall

Enter edit policer ef-policer

Configuring CoS with DiffServ with a Configuration Editor

429

J-series™ Services Router User Guide

Task

Enter the burst limit and bandwidth for the policer.

Enter the loss priority for packets exceeding the limits established by the policer.

J-Web Configuration Editor

1.

Click Configure next to If exceeding.

CLI Configuration Editor

Enter set if-exceeding burst-limit-size 2k

2.

In the Burst size limit box, type a limit for the burst size allowed—for example, 2k.

set if-exceeding bandwidth-percent 10

3.

From the Bandwidth list, select a limit or percentage—for example,

bandwidth-percent.

4.

In the Bandwidth percent box, type a percentage for the bandwidth allowed for this type of traffic—for example, 10.

5.

Click OK.

1.

Click Configure next to Then.

2.

From the Loss priority list, select

high.

3.

Click OK three times.

Enter set then loss-priority high

Configuring and Applying a Firewall Filter for a Multifield Classifier

You configure a multifield (MF) classifier to detect packets of interest to

CoS and assign the packet to the proper forwarding class independently of the DiffServ code point (DSCP). To configure a multifield classifier on a customer-facing or host-facing link, configure a firewall filter to classify traffic.

Packets are classified as they arrive on an interface.

One common way to detect packets of CoS interest is by source or destination address. The destination address is used in this example, but many other matching criteria for packet detection are available to firewall filters.

This example shows how to configure the firewall filter mf-classifier and apply it to the Services Router’s Fast Ethernet interface fe-0/0/0

. The firewall

filter consists of the rules (terms) listed in Table 165.

Table 165: Sample mf-classifier Firewall Filter Terms

Rule (Term) assured forwarding

Purpose

Detects packets destined for

192.168.44.55, assigns them to an assured forwarding class, and gives them a low likelihood of being dropped.

Contents

Match condition: destination address

192.168.44.55

Forwarding class: af-class

Loss priority: low

430

Configuring CoS with DiffServ with a Configuration Editor

Configuring Class of Service with DiffServ

Rule (Term) expedited-forwarding network control best-effort-data

Purpose

Detects packets destined for

192.168.66.77, assigns them to an expedited forwarding class, and subjects them to the EF policer

configured in “Configuring a Policer for a Firewall Filter” on page 429.

Detects packets with a network control precedence and forwards them to the network control class.

Detects all other packets and assigns them to the best effort class.

Contents

Match condition: destination address

192.168.66.77

Forwarding class: ef-class

Policer: ef-policer

Match condition: precedence net-control

Forwarding class: nc-class

Forwarding class: be-class

For more information about firewalls filters see “Configuring Firewall Filters and

NAT” on page 389 and the JUNOS Policy Framework Configuration Guide .

To configure a firewall filter for a multifield classifier for the Services Router:

1.

2.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 166.

3.

Go on to “Assigning Forwarding Classes to Output Queues” on page 434.

Table 166: Configuring and Applying a Firewall Filter for a Multifield Classifier

Task

Navigate to the Firewall level in the configuration hierarchy.

J-Web Configuration Editor

In the configuration editor hierarchy, select Firewall.

Create and name the multifield classifier filter.

1.

Click Add new entry next to Filter.

2.

In the Filter name box, type a name for the multifield classifier filter—for example, mf-classifier.

Create and name the term for the assured forwarding traffic class.

3.

Select the check box next to

Interface specific.

1.

Click Add new entry next to Term.

2.

In the Rule name box, type a name for the assured forwarding term—for example, assured-forwarding.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit firewall

Enter edit filter mf-classifier set interface-specific

Enter edit term assured-forwarding

Configuring CoS with DiffServ with a Configuration Editor

431

J-series™ Services Router User Guide

Task

Create the match condition for the assured forwarding traffic class.

Create the priority for the assured forwarding traffic class.

Create and name the term for the expedited forwarding traffic class.

Create the match condition for the assured forwarding traffic class.

J-Web Configuration Editor

1.

Click Configure next to From.

2.

Click Add new entrynext to

Destination address.

3.

In the Address box, type the destination address for assured forwarding traffic in dotted decimal notation—for example,

192.168.44.55.

CLI Configuration Editor

Enter set from destination-address

192.168.44.55

4.

Click OK three times.

1.

Click Configure next to Then.

From the top of the configuration hierarchy, enter

2.

In the Forwarding class box, type the forwarding class for assured forwarding DiffServ traffic—for example, af-class.

3.

From the Loss priority list, select low.

edit firewall filter mf-classifier term assured-forwarding set then forwarding-class af-class set then loss-priority low

4.

Click OK twice.

1.

Click Add new entry next to Term.

2.

In the Rule name box, type a name for the expedited term—for example, expedited-forwarding.

1.

Click Configure next to From.

2.

Click Add new entry next to

Destination address.

Enter edit term expedited-forwarding

Enter set from destination-address

192.168.66.77

3.

In the Address box, type the destination address for assured forwarding traffic in dotted decimal notation—for example,

192.168.66.77.

Create the priority and apply the policer for the expedited forwarding traffic class.

4.

Click OK twice.

1.

Click Configure next to Then.

2.

In the Forwarding class box, type the forwarding class for expedited forwarding DiffServ traffic—for example, ef-class.

3.

In the Policer box, type the name of the EF policer previously configured for expedited forwarding DiffServ traffic—ef-policer.

(See “Configuring a Policer for a

Firewall Filter” on page 429.)

From the top of the configuration hierarchy, enter edit firewall filter mf-classifier term expedited-forwarding set then forwarding-class ef-class set then policer ed-policer

4.

Click OK twice.

432

Configuring CoS with DiffServ with a Configuration Editor

Configuring Class of Service with DiffServ

Task

Create and name the term for the network control traffic class.

Create the match condition for the network control traffic class.

J-Web Configuration Editor

1.

Click Add new entry next to Term.

2.

In the Rule name box, type a name for the network control term—for example, network-control.

1.

Click Configure next to From.

2.

From the Precedence choice list, select Precedence.

3.

Click Add new entry next to

Precedence.

4.

From the Value keyword list, select

net-control.

5.

Click OK twice.

CLI Configuration Editor

Enter edit term network-control

Enter set from traffic-class net-control

Create the forwarding class for the network control traffic class.

Create and name the term for the best-effort traffic class.

Create the forwarding class for the best-effort traffic class. (Because this is the last term in the filter, it has no match condition.)

Navigate to the Interfaces level in the configuration hierarchy.

Apply the multifield classifier firewall filter as an input filter on the customer-facing or host-facing interfaces.

1.

Click Configure next to Then.

2.

In the Forwarding class box, type the forwarding class for network control traffic—for example, nc-class.

3.

Click OK twice.

1.

Click Add new entry next to Term.

From the top of the configuration hierarchy, enter edit firewall filter mf-classifier term network-control set then forwarding-class nc-class

Enter

2.

In the Rule name box, type a name for the best-effort term—for example, best-effort-data.

1.

Click Configure next to Then.

2.

In the Forwarding class box, type the forwarding class for best effort traffic—for example, be-class.

3.

Click OK four times.

In the configuration editor hierarchy, select Interfaces.

edit term best-effort-data

From the top of the configuration hierarchy, enter set then forwarding-class be-class

From the top of the configuration hierarchy, enter edit interfaces

Enter set interfaces fe-0/0/0 unit 0 family inet filter input mf-classifier

1.

Click the Interface and Unit of each interface needing the filter—for example, fe-0/0/0, unit 0.

2.

Click Configure next to Inet.

3.

Click Configure next to Filter.

4.

In the Input box, type the name of the previously configured filter—for example, mf-classifier.

5.

Click OK five times.

Configuring CoS with DiffServ with a Configuration Editor

433

J-series™ Services Router User Guide

Assigning Forwarding Classes to Output Queues

You must assign the forwarding classes established by the mf-classifier multifield classifier to output queues. This example assigns output

queues as shown in Table 167.

Table 167: Sample Output Queue Assignments for mf-classifier Forwarding Queues mf-classifier Forwarding Class be-class ef-class af-class nc-class

For Traffic Type

Best-effort traffic

Expedited forwarding traffic

Assured forwarding traffic

Network control traffic

Output Queue

Queue 0

Queue 1

Queue 2

Queue 3

For multifield classifier details, see “Configuring and Applying a Firewall

Filter for a Multifield Classifier” on page 430.

2.

3.

To assign forwarding classes to output queues for the Services Router:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 168.

Go on to “Configuring and Applying Rewrite Rules” on page 435.

Table 168: Assigning Forwarding Classes to Output Queues

Task

Navigate to the Class-of-service level in the configuration hierarchy.

J-Web Configuration Editor

In the configuration editor hierarchy, select Class-of-service.

Assign best-effort traffic to queue 0.

CLI Configuration Editor

From the top of the configuration hierarchy, enter

1.

Click Configure next to Forwarding classes.

edit class-of-service

Enter set forwarding-classes queue 0 be-class

2.

Click Add new entry next to Queue.

3.

In the Queue num box, type 0.

4.

In the Class name box, type the previously configured name of the best-effort class—be-class.

5.

Click OK.

434

Configuring CoS with DiffServ with a Configuration Editor

Configuring Class of Service with DiffServ

Task

Assign expedited forwarding traffic to queue 1.

Assign assured forwarding traffic to queue 2.

Assign network control traffic to queue

3.

J-Web Configuration Editor

1.

Click Add new entry next to Queue.

CLI Configuration Editor

Enter

2.

In the Queue num box, type 1.

3.

In the Class name box, type the previously configured name of the expedited forwarding class—ef-class.

set forwarding-classes queue 1 ef-class

4.

Click OK.

1.

Click Add new entry next to Queue.

Enter

2.

In the Queue num box, type 2.

3.

In the Class name box, type the previously configured name of the assured forwarding class—af-class.

set forwarding-classes queue 2 af-class

4.

Click OK.

1.

Click Add new entry next to Queue.

Enter set forwarding-classes queue 3 nc-class 2.

In the Queue num box, type 3.

3.

In the Class name box, type the previously configured name of the expedited forwarding class—nc-class.

4.

Click OK twice.

Configuring and Applying Rewrite Rules

You optionally configure rewrite rules to replace DiffServ code points (DSCPs) on packets received from the customer or host with the values expected by other routers. You do not have to configure rewrite rules if the received packets already contain valid DSCPs. Rewrite rules apply the forwarding class information and packet loss priority used internally by the Services

Router to establish the DSCP on outbound packets. Once configured, you must apply the rewrite rules to the correct interfaces.

The following example shows how to create the rewrite rules rewrite-dscps

, and apply them to the Services Router’s Fast Ethernet interface fe-0/0/0

. The rewrite rules

replace the DSCPs on packets in the four forwarding classes, as shown in Table 169.

Table 169: Sample rewrite-dscps Rewrite Rules to Replace DSCPs mf-classifier Forwarding Class be-class

For CoS Traffic Type

Best-effort traffic rewrite-dscps Rewrite Rules

Low-priority code point: 000000

High-priority code point: 000001

Configuring CoS with DiffServ with a Configuration Editor

435

J-series™ Services Router User Guide mf-classifier Forwarding Class ef-class

For CoS Traffic Type

Expedited forwarding traffic af-class nc-class

Assured forwarding traffic

Network control traffic rewrite-dscps Rewrite Rules

Low-priority code point: 101110

High-priority code point: 101111

Low-priority code point: 001010

High-priority code point: 001100

Low-priority code point: 110000

High-priority code point: 110001

To configure and apply rewrite rules for the Services Router:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

2.

3.

4.

Perform the configuration tasks described in Table 170.

If you are finished configuring the network, commit the configuration.

Go on to “Configuring and Applying Behavior Aggregate Classifiers” on page

440.

Table 170: Configuring and Applying Rewrite Rules

Task

Navigate to the Class-of-service level in the configuration hierarchy.

J-Web Configuration Editor

In the configuration editor hierarchy, select Class of service.

Configure rewrite rules for DiffServ CoS.

1.

Click Configure next to Rewrite rules.

2.

Click Add new entry next to Dscp.

3.

In the Name box, type the name of the rewrite rules—for example, rewrite-dscps.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit class-of-service

Enter edit rewrite-rules dscp rewrite-dscps

436

Configuring CoS with DiffServ with a Configuration Editor

Configuring Class of Service with DiffServ

Task

Configure best-effort forwarding class rewrite rules.

J-Web Configuration Editor

1.

Click Add new entry next to

Forwarding class.

2.

In the Class name box, type the name of the previously configured best-effort forwarding class—be-class.

3.

Click Add new entry next to Loss priority.

4.

From the Loss val list, select low.

5.

In the Code point box, type the value of the low-priority code point for best-effort traffic—for example, 000000.

6.

Click OK.

7.

Click Add new entry next to Loss priority.

8.

From the Loss val list, select high.

9.

In the Code point box, type the value of the high-priority code point for best-effort traffic—for example, 000001.

10.

Click OK twice.

CLI Configuration Editor

Enter set forwarding-class be-class loss-priority low code points 000000 set forwarding-class be-class loss-priority high code points 000001

Configuring CoS with DiffServ with a Configuration Editor

437

J-series™ Services Router User Guide

Task

Configure expedited forwarding class rewrite rules.

J-Web Configuration Editor

1.

Click Add new entry next to

Forwarding class.

2.

In the Class name box, type the name of the previously configured expedited forwarding class—ef-class.

3.

Click Add new entry next to Loss priority.

4.

From the Loss val list, select low.

5.

In the Code point box, type the value of the low-priority code point for expedited forwarding traffic—for example, 101110.

6.

Click OK.

7.

Click Add new entry next to Loss priority.

8.

From the Loss val list, select high.

9.

In the Code point box, type the value of the high-priority code point for expedited forwarding traffic—for example, 101111.

10.

Click OK twice.

CLI Configuration Editor

Enter set forwarding-class ef-class loss-priority low code points 101110 set forwarding-class ef-class loss-priority high code points 101111

438

Configuring CoS with DiffServ with a Configuration Editor

Configuring Class of Service with DiffServ

Task

Configure assured forwarding class rewrite rules.

J-Web Configuration Editor

1.

Click Add new entry next to

Forwarding class.

CLI Configuration Editor

Enter

2.

In the Class name box, type the name of the previously configured assured forwarding class—af-class.

3.

Click Add new entry next to Loss priority.

4.

From the Loss val list, select low.

5.

In the Code point box, type the value of the low-priority code point for assured forwarding traffic—for example, 001010.

set forwarding-class af-class loss-priority low code points 001010 set forwarding-class af-class loss-priority high code points 001100

6.

Click OK.

7.

Click Add new entry next to Loss priority.

8.

From the Loss val list, select high.

9.

In the Code point box, type the value of the high-priority code point for assured forwarding traffic—for example, 001100.

10.

Click OK twice.

Configuring CoS with DiffServ with a Configuration Editor

439

J-series™ Services Router User Guide

Task

Configure network control class rewrite rules.

Apply rewrite rules to an interface.

J-Web Configuration Editor

1.

Click Add new entry next to

Forwarding class.

CLI Configuration Editor

Enter

2.

In the Class name box, type the name of the previously configured network control forwarding class—nc-class.

3.

Click Add new entry next to Loss priority.

4.

From the Loss val list, select low.

5.

In the Code point box, type the value of the low-priority code point for network control traffic—for example, 110000.

set forwarding-class nc-class loss-priority low code points 110000 set forwarding-class nc-class loss-priority high code points 110001

6.

Click OK.

7.

Click Add new entry next to Loss priority.

8.

From the Loss val list, select high.

9.

In the Code point box, type the value of the high-priority code point for network control traffic—for example, 110001.

10.

Click OK twice.

1.

Click Add new entry next to

Interfaces

2.

In the Interface name box, type the name of the interface—for example, fe-0/0/0.

3.

In the Rewrite rules box, type the name of the previously configured rewrite rules—rewrite-dscps.

4.

Click OK.

Enter set interfaces fe-0/0/0 unit 0 rewrite-rules rewrite-dscps

Configuring and Applying Behavior Aggregate Classifiers

You configure DiffServ behavior aggregate (BA) classifiers to classify packets that contain valid DSCPs to appropriate queues. Once configured, you must apply the BA classifier to the correct interfaces.

The following example shows how to configure the DSCP BA classifier ba-classifier as the default DSCP map, and apply it to the Services Router’s Fast Ethernet interface fe-0/0/0

. The BA classifier assigns loss priorities, as shown in Table 171,

to incoming packets in the four forwarding classes.

440

Configuring CoS with DiffServ with a Configuration Editor

Configuring Class of Service with DiffServ

Table 171: Sample ba-classifier Loss Priority Assignments mf-classifier Forwarding Class be-class ef-class af-class nc-class

For CoS Traffic Type

Best-effort traffic

Expedited forwarding traffic

Assured forwarding traffic

Network control traffic ba-classifier Assignments

High-priority code point: 000001

High-priority code point: 101111

High-priority code point: 001100

High-priority code point: 110001

To configure and apply BA classifiers for the Services Router:

1.

2.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 172.

3.

4.

If you are finished configuring the network, commit the configuration.

Go on to “Configuring RED Drop Profiles for Assured Forwarding Congestion

Control” on page 443.

Table 172: Configuring and Applying Behavior Aggregate Classifiers

Task

Navigate to the Class-of-service level in the configuration hierarchy.

J-Web Configuration Editor

In the configuration editor hierarchy, select Class of service.

Configure BA classifiers for DiffServ CoS.

1.

Click Configure next to Classifiers.

edit class-of-service

Enter

2.

Click Add new entry next to Dscp.

edit classifiers dscp ba-classifier

3.

In the Name box, type the name of the BA classifier—for example, ba-classifier .

set import default

4.

In the Import box, type the name of the default DSCP map, default.

CLI Configuration Editor

From the top of the configuration hierarchy, enter

Configuring CoS with DiffServ with a Configuration Editor

441

J-series™ Services Router User Guide

Task

Configure a best-effort forwarding class classifier.

J-Web Configuration Editor

1.

Click Add new entry next to

Forwarding class.

2.

In the Class name box, type the name of the previously configured best-effort forwarding class—be-class.

3.

Click Add new entry next to Loss priority.

4.

From the Loss val list, select high.

5.

In the Code point box, type the value of the high-priority code point for best-effort traffic—for example, 00001.

Configure an expedited forwarding class classifier.

6.

Click OK three times.

1.

Click Add new entry next to

Forwarding class.

2.

In the Class name box, type the name of the previously configured expedited forwarding class—ef-class.

3.

Click Add new entry next to Loss priority.

Configure an assured forwarding class classifier.

4.

From the Loss val list, select high.

5.

In the Code point box, type the value of the high-priority code point for expedited forwarding traffic—for example, 101111.

6.

Click OK three times.

1.

Click Add new entry next to

Forwarding class.

2.

In the Class name box, type the name of the previously configured assured forwarding class—af-class.

3.

Click Add new entry next to Loss priority.

4.

From the Loss val list, select high.

5.

In the Code point box, type the value of the high-priority code point for assured forwarding traffic—for example, 001100.

6.

Click OK three times.

CLI Configuration Editor

Enter set forwarding-class be-class loss-priority high code points 000001

Enter set forwarding-class ef-class loss-priority high code points 101111

Enter set forwarding-class af-class loss-priority high code points 001100

442

Configuring CoS with DiffServ with a Configuration Editor

Configuring Class of Service with DiffServ

Task

Configure a network control class classifier.

Apply the BA classifier to an interface.

J-Web Configuration Editor

1.

Click Add new entry next to

Forwarding class.

2.

In the Class name box, type the name of the previously configured network control forwarding class—nc-class.

3.

Click Add new entry next to Loss priority.

4.

From the Loss val list, select high.

5.

In the Code point box, type the value of the high-priority code point for network control traffic—for example, 110001.

CLI Configuration Editor

Enter set forwarding-class nc-class loss-priority high code points 110001

6.

Click OK three times.

1.

Click Add new entry next to

Interfaces.

2.

In the Interface name box, type the name of the interface—for example, fe-0/0/0.

3.

In the Classifiers box, type the name of the previously configured

BA classifier—ba-classifier.

4.

Click OK.

Enter set interfaces fe-0/0/0 unit 0 classifiers dscp ba-classifier

Configuring RED Drop Profiles for Assured Forwarding Congestion Control

If the Services Router must support DiffServ assured forwarding (AF), you can control congestion by configuring random early detection (RED) drop profiles.

RED drop profiles use drop probabilities for different levels of buffer fullness to determine which scheduling queue on the router is likely to drop DiffServ assured forwarding (AF) packets under congested conditions. The router can drop packets when the queue buffer becomes filled to the configured percentage.

Assured forwarding traffic with the PLP (packet loss priority) bit set is more likely to be discarded than traffic without the PLP bit set. This example shows how to configure a drop probability and a queue fill level for both PLP and non-PLP assured forwarding traffic. It is only one example of how to use RED drop profiles.

The example shows how to configure the RED drop profiles listed in Table 173.

Configuring CoS with DiffServ with a Configuration Editor

443

J-series™ Services Router User Guide

Table 173: Sample RED Drop Profiles

Drop Profile af-normal—For non-PLP (normal) assured forwarding traffic af-with-plp—For PLP (aggressive packet dropping) assured forwarding traffic

Drop Probability

Between 0 (never dropped) and

100 percent (always dropped)

Between 95 and 100 percent (always dropped)

Queue Fill Level

Between 95 and 100 percent

Between 80 and 95 percent

To configure RED drop profiles for assured forwarding congestion control on the Services Router:

2.

3.

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 174.

Go on to one of the following tasks:

“Configuring Schedulers” on page 446

“Verifying a DiffServ Configuration” on page 457

Table 174: Configuring RED Drop Profiles for Assured Forwarding Congestion Control

Task

Navigate to the Class-of-service level in the configuration hierarchy.

J-Web Configuration Editor

In the configuration editor hierarchy, select Class of service.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit class-of-service

444

Configuring CoS with DiffServ with a Configuration Editor

Configuring Class of Service with DiffServ

Task

Configure the lower drop probability for normal, non-PLP traffic.

J-Web Configuration Editor

1.

Click Add new entry next to Drop profiles.

CLI Configuration Editor

Enter edit drop-profiles af-normal interpolate

2.

In the Profile name box, type the name of the drop profile—for example, af-normal.

3.

Click Configure next to Interpolate.

4.

Click Add new entry next to

Drop probability.

5.

In the Value box, type a number for the first drop point—for example,

0.

set drop-probability 0 set drop-probability 100

6.

Click OK.

7.

Click Add new entry next to

Drop probability again.

8.

In the Value box, type a number for the next drop point—for example,

100.

Configure a queue fill level for the lower non-PLP drop probability.

9.

Click OK.

1.

Click Add new entry next to Fill level.

Enter set fill-level 95

2.

In the Value box, type a number for the first fill level—for example, 95.

3.

Click OK.

set fill-level 100

4.

In the Value box, type a number for the next fill level—for example,

100.

5.

Click OK three times.

Configuring CoS with DiffServ with a Configuration Editor

445

J-series™ Services Router User Guide

Task

Configure the higher drop probability for PLP traffic.

J-Web Configuration Editor

1.

Click Add new entry next to Drop profiles.

CLI Configuration Editor

Enter edit drop-profiles af-with-PLP interpolate

2.

In the Profile name box, type the name of the drop profile—for example, af-with-plp.

3.

Click Configure next to Interpolate.

4.

Click Add new entry next to Drop probability.

5.

In the Value box, type a number for the first drop point—for example,

95.

set drop-probability 95 set drop-probability 100

6.

Click OK.

7.

In the Value box, type a number for the next drop point—for example,

100.

Configure a queue fill level for the higher

PLP drop probability.

8.

Click OK.

1.

Click Add new entry next to Fill level.

Enter set fill-level 80

2.

In the Value box, type a number for the first fill level—for example, 80.

3.

Click OK.

set fill-level 95

4.

In the Value box, type a number for the next fill level—for example, 95.

5.

Click OK.

Configuring Schedulers

You configure schedulers to assign resources, priorities, and drop profiles to output queues. By default, only queues 0 and 4 have resources assigned.

This example creates the schedulers listed in Table 175.

Table 175: Sample Schedulers

Scheduler be-scheduler ef-scheduler

For CoS Traffic Type Assigned Priority

Best-effort traffic

Expedited forwarding traffic

Low

High

Allocated Portion of Queue Buffer

40 percent

10 percent

Assigned

Bandwidth

(Transmit Rate)

10 percent

10 percent

446

Configuring CoS with DiffServ with a Configuration Editor

Configuring Class of Service with DiffServ

Scheduler af-scheduler nc-scheduler

For CoS Traffic Type Assigned Priority

Assured forwarding traffic

High

Network control traffic

Low

Allocated Portion of Queue Buffer

45 percent

5 percent

Assigned

Bandwidth

(Transmit Rate)

45 percent

5 percent

To configure schedulers for the Services Router:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

2.

3.

Perform the configuration tasks described in Table 176.

Go on to “Configuring and Applying Scheduler Maps” on page 450.

Table 176: Configuring Schedulers

Task

Navigate to the Class-of-service level in the configuration hierarchy.

J-Web Configuration Editor

In the configuration editor hierarchy, select Class-of-service.

Configure a best-effort scheduler.

Configure a best-effort scheduler priority and buffer size.

CLI Configuration Editor

From the top of the configuration hierarchy, enter

1.

Click Add new entry next to

Schedulers.

2.

In the Scheduler name box, type the name of the best-effort scheduler—for example, be-scheduler.

1.

In the Priority box, type low.

2.

Click Configure next to Buffer size.

3.

From the Buffer size choice list, select the basis for the buffer allocation method—for example,

percent.

4.

In the Percent box, type the percentage of the buffer to be used by the best-effort scheduler—for example, 40.

5.

Click OK.

edit class-of-service

Enter edit schedulers be-scheduler

Enter set priority low set buffer-size percent 40

Configuring CoS with DiffServ with a Configuration Editor

447

J-series™ Services Router User Guide

Task

Configure a best-effort scheduler transmit rate.

Configure an expedited forwarding scheduler.

Configure an expedited forwarding scheduler priority and buffer size.

Configure an expedited forwarding scheduler transmit rate.

Configure an assured forwarding scheduler.

J-Web Configuration Editor

1.

Click Configure next to Transmit rate.

CLI Configuration Editor

Enter set transmit-rate percent 10

2.

From the Transmit rate choice list, select the basis for the transmit rate method—for example, percent.

3.

In the Percent box, type the percentage of the bandwidth to be used by the best-effort scheduler—for example, 10.

4.

Click OK twice.

1.

Click Add new entry next to

Schedulers.

Enter edit schedulers ef-scheduler

2.

In the Scheduler name box, type the name of the expedited forwarding scheduler—for example, ef-scheduler.

1.

In the Priority box, type high.

2.

Click Configure next to Buffer size.

3.

From the Buffer size choice list, select the basis for the buffer allocation method—for example,

percent.

Enter set priority high set buffer-size percent 10

4.

In the Percent box, type the percentage of the buffer to be used by the expedited forwarding scheduler—for example, 10.

5.

Click OK.

1.

Click Configure next to Transmit rate.

2.

From the Transmit rate choice list, select the basis for the transmit rate method—for example, percent.

Enter set transmit-rate percent 10

3.

In the Percent box, type the percentage of the bandwidth to be used by the expedited forwarding scheduler—for example, 10.

4.

Click OK twice.

1.

Click Add new entry next to

Schedulers.

2.

In the Scheduler name box, type the name of the assured forwarding scheduler—for example, af-scheduler.

Enter edit schedulers af-scheduler

448

Configuring CoS with DiffServ with a Configuration Editor

Configuring Class of Service with DiffServ

Task

Configure an assured forwarding scheduler priority and buffer size.

Configure an assured forwarding scheduler transmit rate.

(Optional) Configure a drop profile map for assured forwarding low and high priority. (DiffServ can have a RED drop profile associated with assured forwarding.)

J-Web Configuration Editor

1.

In the Priority box, type high.

2.

Click Configure next to Buffer size.

3.

From the Buffer size choice list, select the basis for the buffer allocation method—for example,

percent.

4.

In the Percent box, type the percentage of the buffer to be used by the assured forwarding scheduler—for example, 45.

5.

Click OK.

1.

Click Configure next to Transmit rate.

CLI Configuration Editor

Enter set priority high set buffer-size percent 45

Enter set transmit-rate percent 45

2.

From the Transmit rate choice list, select the basis for the transmit rate method—for example, percent.

3.

In the Percent box, type the percentage of the bandwidth to be used by the assured forwarding scheduler—for example, 45.

4.

Click OK.

1.

Click Add new entry next to Drop profile map.

Enter set drop-profile-map loss-priority low protocol any drop-profile af-normal

2.

From the Loss priority box, select

Low.

3.

From the Protocol box, select Any.

4.

In the Drop profile box, type the name of the drop profile—for example, af-normal.

set drop-profile-map loss-priority high protocol any drop-profile af-with-PLP

5.

Click OK.

6.

Click Add new entry next to Drop profile map.

7.

From the Loss priority box, select

High.

8.

From the Protocol box, select Any.

9.

In the Drop profile box, type the name of the drop profile—for example, af-with-PLP.

10.

Click OK.

Configuring CoS with DiffServ with a Configuration Editor

449

J-series™ Services Router User Guide

Task

Configure a network control scheduler.

Configure a network control scheduler priority and buffer size.

Configure a network control scheduler transmit rate.

J-Web Configuration Editor

1.

Click Add new entry next to

Schedulers.

2.

In the Scheduler name box, type the name of the network control scheduler—for example, nc-scheduler.

1.

In the Priority box, type low.

2.

Click Configure next to Buffer size.

3.

From the Buffer size choice list, select the basis for the buffer allocation method—for example,

percent.

CLI Configuration Editor

Enter edit schedulers nc-scheduler

Enter set priority low set buffer-size percent 5

4.

In the Percent box, type the percentage of the buffer to be used by the network control scheduler—for example, 5.

5.

Click OK.

1.

Click Configure next to Transmit rate.

2.

From the Transmit rate choice list, select the basis for the transmit rate method—for example, percent.

Enter set transmit-rate percent 5

3.

In the Percent box, type the percentage of the bandwidth to be used by the network control scheduler—for example, 5.

4.

Click OK twice.

Configuring and Applying Scheduler Maps

You configure a scheduler map to assign a forwarding class to a scheduler, then apply the scheduler map to any interface that must enforce DiffServ CoS.

The following example shows how to create the scheduler map diffserv-cos-map and apply it to the Services Router’s Fast Ethernet interface fe-0/0/0

. The map associates the mf-classifier

forwarding classes configured in “Configuring and

Applying a Firewall Filter for a Multifield Classifier” on page 430 to the schedulers

configured in “Configuring Schedulers” on page 446, as shown in Table 177.

450

Configuring CoS with DiffServ with a Configuration Editor

Configuring Class of Service with DiffServ

Table 177: Sample diffserv-cos-map Scheduler Mapping mf-classifier Forwarding Class be-class ef-class af-class nc-class

For CoS Traffic Type

Best-effort traffic

Expedited forwarding traffic

Assured forwarding traffic

Network control traffic diffserv-cos-map Scheduler be-scheduler ef-scheduler af-scheduler nc-scheduler

To configure and apply scheduler maps for the Services Router:

1.

2.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 178.

3.

4.

If you are finished configuring the network, commit the configuration.

To check the configuration, see “Verifying a DiffServ Configuration” on page

457.

Table 178: Configuring Scheduler Maps

Task

Navigate to the Class-of-service level in the configuration hierarchy.

J-Web Configuration Editor

In the configuration editor hierarchy, select Class of service.

Configure a scheduler map for DiffServ

CoS.

Configure a best-effort forwarding class and scheduler.

1.

Click Add new entry next to

Scheduler maps.

2.

In the Map name box, type the name of the scheduler map—for example, diffserv-cos-map.

1.

Click Add new entry next to

Forwarding class.

2.

In the Class name box, type the name of the previously configured best-effort forwarding class—be-class.

3.

In the Scheduler box, type the name of the previously configured best-effort scheduler—be-scheduler.

4.

Click OK.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit class-of-service

Enter edit scheduler-maps diffserv-cos-map

Enter set forwarding-class be-class scheduler be-scheduler

Configuring CoS with DiffServ with a Configuration Editor

451

J-series™ Services Router User Guide

Task

Configure an expedited forwarding class and scheduler.

Configure an assured forwarding class and scheduler.

Configure a network control class and scheduler.

J-Web Configuration Editor

1.

Click Add new entry next to

Forwarding class.

CLI Configuration Editor

Enter

2.

In the Class name box, type the name of the previously configured expedited forwarding class—ef-class.

3.

In the Scheduler box, type the name of the previously configured expedited forwarding scheduler—ef-scheduler.

4.

Click OK.

1.

Click Add new entry next to

Forwarding class.

set forwarding-class ef-class scheduler ef-scheduler

Enter

2.

In the Class name box, type the name of the previously configured assured forwarding class—af-class.

3.

In the Scheduler box, type the name of the previously configured assured forwarding scheduler—af-scheduler.

set forwarding-class af-class scheduler af-scheduler

4.

Click OK.

1.

Click Add new entry next to

Forwarding class.

2.

In the Class name box, type the name of the previously configured network control class—nc-class.

Enter set forwarding-class nc-class scheduler nc-scheduler

Apply the scheduler map to an interface.

3.

In the Scheduler box, type the name of the previously configured network control scheduler—nc-scheduler.

4.

Click OK twice.

1.

Click Add new entry next to

Interfaces.

2.

In the Interface name box, type the name of the interface—for example, fe-0/0/0.

3.

In the Scheduler map box, type the name of the previously configured scheduler map—diffserv-cos-map.

4.

Click OK.

Enter set interfaces fe-0/0/0 scheduler-map diffserv-cos-map

452

Configuring CoS with DiffServ with a Configuration Editor

Configuring Class of Service with DiffServ

Configuring and Applying Virtual Channels

You configure a virtual channel to set up queuing, packet scheduling, and accounting rules to be applied to one or more logical interfaces. You then must apply the virtual channel to a particular logical interface.

The following example shows how to create the virtual channels branch1–vc

, branch2–vc

, and branch3–vc and apply them in the firewall filter choose-vc to the Services Router’s T3 interface t3-1/0/0

.

2.

3.

To configure and apply virtual channels for the Services Router:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 179.

If you are finished configuring the network, commit the configuration.

Table 179: Configuring and Applying Virtual Channels

Task

Navigate to the Class-of-service level in the configuration hierarchy.

J-Web Configuration Editor

In the configuration editor hierarchy, select Class of service.

CLI Configuration Editor

From the top of the configuration hierarchy, enter

Define the virtual channels branch1–vc, branch2–vc, branch3–vc, and the default virtual channel. You must specify a default virtual channel.

1.

Click Add new entry next to Virtual channels.

2.

In the Channel name box, type the name of the virtual channel—for example, branch1–vc.

edit class-of-service

Enter set virtual-channels branch1–vc

Repeat this statement for branch2–vc, branch3–vc, and default-vc.

3.

Click OK.

4.

Create additional virtual channels for branch2–vc, branch3–vc, and default-vc.

Configuring CoS with DiffServ with a Configuration Editor

453

J-series™ Services Router User Guide

Task

Define the virtual channel group wan-vc-group to include the four virtual channels, and assign each virtual channel the scheduler map bestscheduler.

Specify a shaping rate of 1.5 Mbps for each virtual channel within the virtual channel group.

J-Web Configuration Editor

1.

Click Add new entry next to Virtual channel groups.

CLI Configuration Editor

1.

Enter set virtual-channel-groups wan-vc-group branch1–vc scheduler-map bestscheduler

2.

In the Group name box, type the name of the virtual channel group—wan-vc-group.

3.

Click Add new entry next to

Channel.

2.

Repeat this statement for branch2–vc, branch3–vc, and default-vc.

4.

In the Channel name box, enter the name of the previously configured virtual channels—branch1–vc.

5.

In the Scheduler map box, enter the name of the previously configured scheduler map—bestscheduler.

3.

Enter set virtual-channel-groups wan-vc-group default–vc default

6.

Click OK.

7.

Add the virtual channels branch2–vc, branch3–vc, and default-vc. Select the Default box when adding the virtual channel default-vc.

1.

Click branch1–vc in the list of virtual channels.

2.

Select the Shaping rate box.

3.

Click Configure.

4.

Select Absolute rate from the Rate choice box..

5.

In the Absolute rate box, enter the shaping rate—1.5m.

6.

Add the shaping rate for the branch2–vc and branch3–vc virtual channels.

1.

Enter set virtual-channel-groups wan-vc-group branch1–vc shaping-rate 1.5m

2.

Repeat this statement for branch2–vc and branch3–vc.

7.

Click OK.

454

Configuring CoS with DiffServ with a Configuration Editor

Configuring Class of Service with DiffServ

Task

Apply the virtual channel group to the logical interface t3–1/0/0.0.

J-Web Configuration Editor

1.

Click Add new entry next to

Interfaces.

CLI Configuration Editor

Enter

2.

In the Interface name box, type the name of the interface—t3–1/0/0.

3.

Click Add new entry next to Unit.

set interfaces t3–1/0/0 unit 0 virtual-channel-group wan-vc-group

4.

In the Unit number box, type the logical interface unit number—0.

5.

In the Virtual channel group box, type the name of the previously configured virtual channel group—wan-vc-group.

6.

Click OK.

Configuring CoS with DiffServ with a Configuration Editor

455

J-series™ Services Router User Guide

Task

Create the firewall filter choose-vc to select the traffic that is transmitted on a particular virtual channel.

J-Web Configuration Editor

1.

Navigate to the top of the configuration hierarchy and select

Firewall.

2.

Click Add new entry next to Filter.

3.

In the Filter name box, enter the name of the firewall filter—choose-vc.

4.

Click Add new entry next to Term.

5.

In the Rule name box, enter the name of the firewall term—branch1.

Apply the firewall filter choose-vc to output traffic on the t3–1/0/0.0

interface.

6.

Click Configure next to From.

7.

Click Add new entry next to

Destination address.

8.

In the Address box, enter the

IP address of the destination host—192.168.10.0/24.

9.

Click OK twice.

10.

On the firewall term page, click

Configure next to Then.

11.

Select Accept from the

Designation box.

12.

In the Virtual channel box, enter the name of the previously configured virtual channel—branch1–vc.

13.

Click OK.

14.

Repeat these steps for the virtual channels branch2–vc and branch3–vc.

1.

Navigate to the top of the configuration hierarchy and select

Interfaces.

2.

Click t3–1/0/0 in the list of configured interfaces.

3.

Click 0 in the list of configured logical units for the interface.

4.

Click Edit next to Inet.

5.

Click Configure next to Filter.

6.

In the Output box, enter the name of the previously configured firewall filter—choose–vc.

7.

Click OK.

CLI Configuration Editor

1.

From the top of the configuration hierarchy, enter edit firewall

2.

Enter set family inet filter choose-vc term branch1 from destination

192.168.10.0/24

3.

Enter set family inet filter choose-vc term branch1 then accept

4.

Enter set family inet filter choose-vc term branch1 then virtual-channel branch1–vc

5.

Repeat these steps for virtual channels branch2–vc and branch3–vc.

1.

From the top of the configuration hierarchy, enter edit interfaces

2.

Enter set t3–1/0/0 unit 0 family inet filter output choose-vc

456

Configuring CoS with DiffServ with a Configuration Editor

Configuring Class of Service with DiffServ

Verifying a DiffServ Configuration

To verify a DiffServ configuration, perform the following task.

Verifying Multicast Session Announcements

Purpose

Verify that the Services Router is listening to the appropriate groups for multicast

Session Announcement Protocol (SAP) session announcements.

From the CLI, enter the show sap listen command.

Action

Sample Output

What It Means user@host> show sap listen

Group Address

224.2.127.254

Port

9875

The output shows a list of the group addresses and ports that SAP and SDP listen on. Verify the following information:

Each group address configured, especially the default

224.2.127.254

, is listed.

Each port configured, especially the default

9875

, is listed.

For more information about show sap listen

, see the JUNOS Protocols, Class of Service,

and System Basics Command Reference.

Verifying a DiffServ Configuration

457

J-series™ Services Router User Guide

458

Verifying a DiffServ Configuration

Part 7

Managing Multicast Transmissions

Multicast Overview on page 461

Configuring a Multicast Network on page 471

Managing Multicast Transmissions 459

460

Managing Multicast Transmissions

Chapter 21

Multicast Overview

Multicast traffic lies between the extremes of unicast (one source, one destination) and broadcast (one source, all destinations). Multicast is a “one source, many destinations” method of traffic distribution, meaning that the destinations needing to receive the information from a particular source receive the traffic stream.

IP network destinations (clients) do not often communicate directly with sources

(servers), so the routers between source and destination must be able to determine the topology of the network from the unicast or multicast perspective to avoid routing traffic haphazardly. The multicast router must find multicast sources on the network, send out copies of packets on several interfaces, prevent routing loops, connect interested destinations with the proper source, and keep the flow of unwanted packets to a minimum. Standard multicast routing protocols provide most of these capabilities.

This chapter contains the following topics. For more information about multicast, see the JUNOS Multicast Protocols Configuration Guide. For configuration

instructions, see “Configuring a Multicast Network” on page 471.

Multicast Terms on page 461

Multicast Architecture on page 463

Dense and Sparse Routing Modes on page 466

Strategies for Preventing Routing Loops on page 466

Multicast Protocol Building Blocks on page 467

Multicast Terms

To understand multicast routing, you must be familiar with the terms defined

in Table 180. See Figure 95 for a general view of some of the elements

commonly used in an IP multicast network architecture.

Multicast Terms

461

J-series™ Services Router User Guide

Table 180: Multicast Terms

Term

administrative scoping any-source multicast (ASM)

Auto-RP

Bootstrap Router (BSR) protocol branch broadcast routing protocol dense mode

Distance Vector Multicast Routing Protocol (DVMRP) distribution tree downstream interface group address

Internet Group Management Protocol (IGMP) leaf listener

Definition

Multicast routing strategy that limits the routers and interfaces used to forward a multicast packet by reserving a range of multicast addresses.

Cisco multicast routing protocol that allows sparse-mode routing protocols to find rendezvous points (RPs) within a routing domain.

Multicast routing protocol that allows sparse-mode routing protocols to find rendezvous points (RPs) within a routing domain.

Part of a multicast network that is formed when a leaf subnetwork is joined to the multicast distribution tree.

Branches with no interested receivers are pruned from the tree so that multicast packets are no longer replicated on the branch.

Protocol that distributes traffic from a particular source to all destinations.

Multicast routing mode appropriate for LANs with many interested receivers.

Distributed multicast routing protocol that dynamically generates IP multicast distribution trees using reverse-path multicasting (RPM) to forward multicast traffic to downstream interfaces.

Path linking multicast receivers (listeners) to sources. The root of the tree is at the source, and the branches connect subnetworks of interested receivers (leaves). Multicast packets are replicated only where a distribution tree branches.

To shorten paths to a source at the edge of a network, sparse mode multicast protocols can use a shared distribution tree located more centrally in the network backbone.

Interface on a multicast router that is leading toward the receivers. You can configure all the logical interfaces except one as downstream interfaces.

Multicast destination address. A multicast network uses the

Class D IP address of a logical group of multicast receivers to identify a destination. IP multicast packets have a multicast group address as the destination address and a unicast source address.

Multicast routing protocol that runs between receiver hosts and routers to determine whether group members are present. Services Routers support IGMPv1, IGMPv2, and

IGMPv3.

IP subnetwork that is connected to a multicast router and that includes at least one host interested in receiving IP multicast packets. The router must send a copy of its multicast packets out on each interface with a leaf, and its action is unaffected by the number of leaves on the interface.

Another name for a receiver in a multicast network.

462

Multicast Terms

Multicast Overview

Term

multicast routing protocol

Multicast Source Discovery Protocol (MSDP)

Pragmatic General Multicast (PGM)

Protocol Independent Multicast (PIM) protocol pruning reverse-path forwarding (RPF) rendezvous point (RP)

Session Announcement Protocol (SAP)

Session Description Protocol (SDP) shortest-path tree (SPT) source-specific multicast (SSM) sparse mode unicast routing protocol upstream interface

Definition

Protocol that distributes traffic from a particular source to only the destinations needing to receive it. Typical multicast routing protocols are the Distance Vector Multicast Routing

Protocol (DVMRP) and Protocol Independent Multicast (PIM).

Multicast routing protocol that connects multicast routing domains and allows them to find rendezvous points (RPs).

Special protocol layer for multicast traffic that can be used between the IP layer and the multicast application to add reliability to multicast traffic.

Protocol-independent multicast routing protocol that can be used in either sparse or dense mode. In sparse mode,

PIM routes to multicast groups that might span WANs and interdomain Internets. In dense mode, PIM is a flood-and-prune protocol.

Removing from a multicast distribution tree branches that no longer include subnetworks with interested hosts. Pruning ensures that packets are replicated only as needed.

Multicast routing strategy that allows a router to receive packets through an interface if it is the same interface a unicast packet uses as the shortest path back to the source.

Core router operating as the root of a shared distribution tree in a multicast network.

Multicast routing protocol used with other multicast protocols—typically Session Description Protocol (SDP)—to handle session conference announcements.

Session directory protocol that advertise multimedia conference sessions and communicates setup information to participants who want to join the session.

Multicast routing strategy for sparse mode multicast protocols. SPT uses a shared distribution tree rooted in the network backbone to shorten paths to sources at the edge of a network.

Service that allows a client to receive multicast traffic directly from the source, without the help of a rendezvous point (RP).

Multicast routing mode appropriate for WANs with few interested receivers.

Protocol that distributes traffic from one source to one destination.

Interface on a multicast router that is leading toward the source. To minimize bandwidth use, configure only one upstream interface on a router receiving multicast packets.

Multicast Architecture

Multicast-capable routers replicate packets on the multicast network, which has exactly the same topology as the unicast network it is based on. Multicast routers

Multicast Architecture

463

J-series™ Services Router User Guide use a multicast routing protocol to build a distribution tree that connects receivers

(also called listeners ) to sources.

Multicast architecture includes the following topics:

Upstream and Downstream Interfaces on page 464

Subnetwork Leaves and Branches on page 464

Multicast IP Address Ranges on page 465

Notation for Multicast Forwarding States on page 465

Upstream and Downstream Interfaces

A single upstream interface on the router leads toward the source to receive multicast packets. The downstream interfaces on the router lead toward the receivers to transmit packets. A router can have as many downstream interfaces as it has logical interfaces, minus 1. To prevent looping, the router’s upstream interface must never receive copies of its own downstream multicast packets.

Subnetwork Leaves and Branches

On a multicast router, each subnetwork of hosts that includes at least one interested

receiver is a leaf on the multicast distribution tree (see Figure 95). The router must

send out a copy of the IP multicast packet on each interface with a leaf. When a new leaf subnetwork joins the tree, a new branch is built so that the router can send out replicated packets on the interface. The number of leaves on an interface does not affect the router. The action is the same for one leaf or a hundred.

A branch that no longer has leaves is pruned from the distribution tree. No multicast packets are sent out on a router interface leading to an IP subnetwork with no interested hosts. Because packets are replicated only where the distribution tree branches, no link ever carries a duplicate flow of packets.

In IP multicast networks, traffic is delivered to multicast groups based on an IP multicast group address instead of a unicast destination address.

The groups determine the location of the leaves, and the leaves determine the branches on the multicast network.

464

Multicast Architecture

Multicast Overview

Figure 95: Multicast Elements in an IP Network

Multicast

Source

(Group A)

Multicast

Host

Root

Multicast router

Distribution

Tree(s)

Multicast router

Multicast

Host

Multicast

Source

(Group B)

Prune

Multicast router

Multicast router

Join

Downstream

Upstream

Multicast router

Join

Multicast

Host

Uninterested

Host

Multicast

Host

Uninterested

Host

Multicast

Host

Interested

Host

(Group A)

Multicast

Host

Interested

Host

(Group B)

Multicast

Host

Interested

Host

(Group B)

Multicast

Host

Interested

Host

(Group B)

Leafs

Multicast IP Address Ranges

Multicast uses the Class D IP address range (

224.0.0.0

through

239.255.255.255

).

Multicast addresses usually have a prefix length of

/32

, although other prefix lengths are allowed. Multicast addresses represent logical groupings of receivers and not physical collections of devices, and can appear only as the destination in an IP packet, never as the source address.

Notation for Multicast Forwarding States

The multicast forwarding state in a router is usually represented by one of the following notations:

(S,G) notation—S refers to the unicast IP address of the source for the multicast traffic and G refers to the particular multicast group IP address for which S is the source. All multicast packets sent from this source have S as the source address and G as the destination address.

(*, G) notation—The asterisk (*) is a wildcard for the address of any multicast application source sending to group G. For example, if two sources are originating exactly the same content for multicast group

224.1.1.2

, a router can use (*,

224.1.1.2

) to represent the state of a router forwarding traffic from both sources to the group.

Multicast Architecture

465

J-series™ Services Router User Guide

Dense and Sparse Routing Modes

To keep packet replication to a minimum, multicast routing protocols use

the two primary modes shown in Table 181.

CAUTION: A common multicast guideline is not to run dense mode on a WAN

under any circumstances .

Table 181: Primary Multicast Routing Modes

Multicast Mode

Dense mode

Sparse mode

Description

Network is flooded with traffic on all possible branches, then pruned back as branches explicitly (by message) or implicitly (time-out silence) eliminate themselves.

Network establishes and sends packets only on branches that have at least one leaf indicating (by message) a need for the traffic.

Appropriate Network for Use

LANs—Networks in which all possible subnets are likely to have at least one receiver.

WANs—Network in which very few of the possible receivers require packets from this source.

Strategies for Preventing Routing Loops

Routing loops are disastrous in multicast networks because of the risk of repeatedly replicated packets, which can overwhelm a network. One of the complexities of modern multicast routing protocols is the need to avoid routing loops, packet by packet, much more rigorously than in unicast routing protocols. Three multicast strategies help prevent routing loops by defining routing paths in different ways:

Reverse-Path Forwarding for Loop Prevention on page 466

Shortest-Path Tree for Loop Prevention on page 467

Administrative Scoping for Loop Prevention on page 467

Reverse-Path Forwarding for Loop Prevention

The router’s multicast forwarding state runs more logically based on the reverse path, from the receiver back to the root of the distribution tree. In reverse-path forwarding (RPF), every multicast packet received must pass an RPF check before it can be replicated or forwarded on any interface. When it receives a multicast packet on an interface, the router verifies that the source address in the multicast

IP packet is the destination address for a unicast IP packet back to the source.

466

Strategies for Preventing Routing Loops

Multicast Overview

If the outgoing interface found in the unicast routing table is the same interface that the multicast packet was received on, the packet passes the RPF check. Multicast packets that fail the RPF check are dropped, because the incoming interface is not on the shortest path back to the source. Routers can build and maintain separate tables for RPF purposes.

Shortest-Path Tree for Loop Prevention

The distribution tree used for multicast is rooted at the source and is the shortest-path tree (SPT), but this path can be long if the source is at the periphery of the network. Providing a shared tree on the backbone as the distribution tree locates the multicast source more centrally in the network. Shared distribution trees with roots in the core network are created and maintained by a multicast router operating as a rendezvous point (RP), a feature of sparse mode multicast protocols.

Administrative Scoping for Loop Prevention

Scoping limits the routers and interfaces that can forward a multicast packet.

Multicast scoping is administrative in the sense that a range of multicast addresses is reserved for scoping purposes, as described in RFC 2365, Administratively

Scoped IP Multicast . Routers at the boundary must filter multicast packets and ensure that packets do not stray beyond the established limit.

Multicast Protocol Building Blocks

Multicast is not a single protocol, but a collection of protocols working together to form trees, prune branches, locate sources and groups, and prevent routing loops:

Distance Vector Multicast Routing Protocol (DVMRP) and Protocol Independent

Multicast (PIM) operate between routers. PIM can operate in dense mode and sparse mode.

Three versions of the Internet Group Management Protocol (IGMP) run between receiver hosts and routers.

Several other protocols enhance multicast networks by providing useful functions not included in other protocols. These include the Bootstrap Router

(BSR) and Auto-RP protocols, Multicast Source Discovery Protocol (MSDP),

Session Announcement Protocol (SAP) and Session Discovery Protocol (SDP), and Pragmatic General Multicast (PGM) protocol.

Table 182 lists and summarizes these protocols.

Multicast Protocol Building Blocks

467

J-series™ Services Router User Guide

Table 182: Multicast Protocol Building Blocks

Multicast Protocol

DVMRP

PIM dense mode

PIM sparse mode

PIM source-specific multicast (SSM)

IGMPv1

IGMPv2

Description

Dense-mode-only protocol that uses the flood-and-prune or implicit join method to deliver traffic everywhere and then determine where the uninterested receivers are. DVRMP uses source-based distribution trees in the form (S,G) and builds its own multicast routing tables for RPF checks.

Sends an implicit join message, so routers use the flood-and-prune method to deliver traffic everywhere and then determine where the uninterested receivers are.

Uses

Not appropriate for large-scale Internet use.

Most promising multicast protocol in use for LANs.

PIM dense mode uses source-based distribution trees in the form (S,G), and also supports sparse-dense mode, with mixed sparse and dense groups.

Both PIM modes use unicast routing information for RPF checks.

Sends an explicit join message, so routers determine where the interested receivers are and send join messages upstream to their neighbors, building trees from receivers to a rendezvous point (RP) router, which is the initial source of multicast group traffic.

PIM sparse mode builds distribution trees in the form (*,G), but migrates to an (S,G) source-based tree if that path is shorter than the path through the RP router for a particular multicast group’s traffic. Both PIM modes use unicast routing information for RPF checks.

Enhancement to PIM sparse mode that allows a client to receive multicast traffic directly from the source, without the help of a rendezvous point (RP).

The original protocol defined in RFC

1112, Host Extensions for IP Multicasting.

IGMPv1 sends an explicit join message to the router, but uses a time-out to determine when hosts leave a group.

Defined in RFC 2236, Internet Group

Management Protocol, Version 2. Among other features, IGMPv2 adds an explicit leave message to the join message.

Most promising multicast protocol in use for WANs.

Used with IGMPv3 to create a shortest-path tree between receiver and source.

Used by default.

468

Multicast Protocol Building Blocks

Multicast Protocol

IGMPv3

BSR

Auto-RP

MSDP

SAP and SDP

PGM

Multicast Overview

Description

Defined in RFC 3376, Internet Group

Management Protocol, Version 3. Among other features, IGMPv3 optimizes support for a single source of content for a multicast group, or source-specific

multicast (SSM).

Allow sparse-mode routing protocols to find rendezvous points (RPs) within the routing domain (autonomous system, or

AS). RP addresses can also be statically configured.

Allows groups located in one multicast routing domain to find rendezvous points (RPs) in other routing domains.

MSDP is not used on an RP if all receivers and sources are located in the same routing domain.

Uses

Used with PIM SSM to create a shortest-path tree between receiver and source.

Typically runs on the same router as

PIM sparse mode rendezvous point

(RP).

Not appropriate if all receivers and sources are located in the same routing domain.

Display multicast session names and correlate the names with multicast traffic. SDP is a session directory protocol that advertises multimedia conference sessions and communicates setup information to participants who want to join the session. A client commonly uses SDP to announce a conference session by periodically multicasting an announcement packet to a well-known multicast address and port using SAP.

Special protocol layer for multicast traffic that can be used between the IP layer and the multicast application to add reliability to multicast traffic. PGM allows a receiver to detect missing information in all cases and request replacement information if the receiver application requires it.

Multicast Protocol Building Blocks

469

J-series™ Services Router User Guide

470

Multicast Protocol Building Blocks

Chapter 22

Configuring a Multicast Network

You configure a router network to support multicast applications with a related family of protocols. To use multicast, you must understand the basic components of a multicast network and their relationships, and then configure the J-series Services

Router to act as a node in the network.

NOTE: The J-series Services Router supports both PIM version 1 and PIM version 2.

In this chapter, the term PIM refers to both versions of the protocol.

You use either the J-Web configuration editor or CLI configuration editor to configure multicast protocols. The J-Web interface does not include Quick Configuration pages for multicast protocols.

This chapter contains the following topics. For more information about multicast, see the JUNOS Multicast Protocols Configuration Guide.

Before You Begin on page 472

Configuring a Multicast Network with a Configuration Editor on page 472

Verifying a Multicast Configuration on page 478

Multicast Protocol Building Blocks

471

J-series™ Services Router User Guide

Before You Begin

Before you begin configuring a multicast network, complete the following tasks:

If you do not already have a basic understanding of multicast, read “Multicast

Overview” on page 461.

Determine whether the Services Router is directly attached to any multicast sources. Receivers must be able to locate these sources.

Determine whether the Services Router is directly attached to any multicast group receivers. If receivers are present, IGMP is needed.

Determine whether to use the sparse, dense, or sparse-dense mode of multicast operation. Each mode has different configuration considerations.

Determine the address of the rendezvous point (RP) if sparse or sparse-dense mode is used.

Determine whether to locate the RP with the static configuration, bootstrap router (BSR), or Auto-RP method.

Determine whether to configure multicast to use its own reverse-path forwarding (RPF) routing table when configuring PIM in sparse, dense, or sparse-dense modes.

Configuring a Multicast Network with a Configuration Editor

To configure the Services Router as a node in a multicast network, you must perform the following tasks marked (Required) .

(Optional) “Configuring SAP and SDP” on page 472

(Required) “Configuring IGMP” on page 473

(Optional) “Configuring the PIM Static RP” on page 474

(Optional) “Configuring a PIM RPF Routing Table” on page 476

For information about using the J-Web and CLI configuration editors, see

“Using J-series Configuration Tools” on page 127.

Configuring SAP and SDP

Multicast session announcements are handled by two protocols, the Session

Announcement Protocol (SAP) and Session Description Protocol (SDP).

These two protocols display multicast session names and correlate the names with multicast traffic. Enabling SDP and SAP allows the router to receive announcements about multimedia and other multicast sessions from sources. Enabling SAP automatically enables SDP.

472

Configuring a Multicast Network with a Configuration Editor

Configuring a Multicast Network

For more information on SAP and SDP, see the JUNOS Multicast

Protocols Configuration Guide.

The Services Router listens for session announcements on one or more addresses and ports. By default, the router listens to address and port

224.2.127.254:9875

.

To configure SAP and SDP for the Services Router:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

2.

3.

Perform the configuration tasks described in Table 183.

Go on to “Configuring IGMP” on page 473.

Table 183: Configuring SAP and SDP

Task

Navigate to the Listen level in the configuration hierarchy.

J-Web Configuration Editor

1.

In the configuration editor hierarchy, select Protocols>Sap.

(Optional) Enter one or more addresses and ports for the Services Router to listen to session announcements on. By default, the Services Router listens to address and port 224.2.127.254:9875.

2.

Click Add new entry next to Listen.

1.

In the Address box, type the multicast address the Services

Router can listen to session announcements on, in dotted decimal notation.

2.

In the Port box, type the port number in decimal notation.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit protocols sap

1.

Set the address value to the

IP address that the Services

Router can listen to session announcements on, in dotted decimal notation. For example: set listen 224.2.127.254

3.

Click OK.

2.

Set the port value to the number of the port that the Services

Router can listen to session announcements on, in decimal notation. For example: set listen 224.2.127.254 port

9875.

Configuring IGMP

The Internet Group Membership Protocol (IGMP) manages the membership of hosts and routers in multicast groups. IGMP is an integral part of IP and must be enabled on all routers and hosts that need to receive IP mulitcasts. IGMP is automatically enabled on all broadcast interfaces when you configure PIM or DVMRP.

For more information on IGMP, see JUNOS Multicast Protocols Configuration Guide.

By default, the Services Router runs IGMPv2. However, you might still want to set the IGMP version explicitly on an interface, or all interfaces. Routers running different versions of IGMP negotiate the lowest common version of IGMP supported

Configuring a Multicast Network with a Configuration Editor

473

J-series™ Services Router User Guide by hosts on their subnet. One host running IGMPv1 forces the Services Router to use that version and lose features important to other hosts.

To explicitly configure the IGMP version, perform these steps on each Services Router in the network:

2.

3.

4.

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 184.

If you are finished configuring the network, commit the configuration.

Go on to one of the following procedures:

To configure PIM sparse mode, see “Configuring the PIM Static RP” on

page 474 and Table 186.

To check the configuration, see “Verifying a Multicast Configuration” on page 478.

Table 184: Explicitly Configuring the IGMP version

Task

Navigate to the Interface level in the configuration hierarchy.

Set the IGMP version. By default, the Services Router uses IGMPv2, but this version can be changed through negotiation with hosts unless explicitly configured.

J-Web Configuration Editor

1.

In the configuration editor hierarchy, select Protocols>Igmp.

CLI Configuration Editor

From the top of the configuration hierarchy, enter

2.

Click Add new entry next to

Interface.

1.

In the Interface name box, type the name of the interface, or all.

edit protocols igmp

1.

Set the interface value to the interface name, or all. For example:

2.

In the Version box, type the version number: 1, 2, or 3.

3.

Click OK.

set igmp interface all

2.

Set the version value to 1, 2, or 3.

For example: set igmp interface all version 2

Configuring the PIM Static RP

Protocol Independent Multicast (PIM) sparse mode is the most common multicast protocol used on the Internet. PIM sparse mode is the default mode whenever

PIM is configured on any interface of the Services Router. However, because

PIM must not be configured on the network management interface of the

Services Router, you must disable it on that interface.

Each any-source multicast (ASM) group has a shared tree through which receivers learn about new multicast sources and new receivers learn about

474

Configuring a Multicast Network with a Configuration Editor

Configuring a Multicast Network all multicast sources. The rendezvous point (RP) router is the root of this shared tree and receives the multicast traffic from the source. To receive multicast traffic from the groups served by the RP, the Services Router must determine the IP address of the RP for the source.

One common way for the Services Router to locate RPs is by static configuration of the IP address of the RP. For information about alternate methods of locating

RPs, see the JUNOS Multicast Protocols Configuration Guide.

To configure PIM sparse mode, disable PIM on fe-0/0/0

, and configure the IP address of the RP perform these steps on each Services Router in the network:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

2.

3.

Perform the configuration tasks described in Table 185.

Go on to “Configuring a PIM RPF Routing Table” on page 476.

Table 185: Configuring PIM Sparse Mode and the RP

Task

Navigate to the Interface level in the configuration hierarchy.

Enable PIM on all network interfaces.

Apply your configuration changes.

Remain at the Interface level in the configuration hierarchy.

Disable PIM on the network management interface.

Apply your configuration changes.

J-Web Configuration Editor

1.

In the configuration editor hierarchy, select Protocols>Pim.

2.

Click Add new entry next to

Interface.

In the Interface name box, type all.

Click OK to apply your entries to the configuration.

Click Add new entry next to Interface.

1.

In the Interface name box, type fe-0/0/0.

2.

Select the check box next to

Disable.

Click OK to apply your entries to the configuration.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit protocols pim

Set the interface value to all. For example: set pim interface all

Changes in the CLI are applied automatically when you execute the set command.

Remain at the edit protocols pim interface configuration hierarchy level.

Disable the fe-0/0/0 interface: set pim interface fe—0/0/0 unit 0 disable

Changes in the CLI are applied automatically when you execute the set command.

Configuring a Multicast Network with a Configuration Editor

475

J-series™ Services Router User Guide

Task

Navigate to the Rp level in the configuration hierarchy.

Configure the IP address of the RP.

J-Web Configuration Editor

In the configuration editor hierarchy, select Protocols>Pim>Rp.

1.

Click Configure next to Static.

2.

Click Add new entry next to

Address.

3.

In the Addr box, type the IP address of the RP in dotted decimal notation.

edit protocols pim rp

Set the address value to the IP address of the RP in dotted decimal notation.

For example: set static address 192.168.14.27

4.

Click OK.

CLI Configuration Editor

From the top of the configuration hierarchy, enter

Configuring a PIM RPF Routing Table

By default, PIM uses inet.0

as its reverse-path forwarding (RPF) routing table group. PIM uses an RPF routing table group to resolve its RPF neighbor for a particular multicast source address and for the RP address. PIM can optionally use inet.2

as its RPF routing table group. The inet.2

routing table is organized more efficiently for RPF checks.

Once configured, the RPF routing table must be applied to PIM as a routing table group.

To configure and apply a PIM RPF routing table, perform these steps on each Services Router in the network:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

2.

3.

Perform the configuration tasks described in Table 186.

To check the configuration, see “Verifying a Multicast Configuration” on page

478.

Table 186: Configuring a PIM RPF Routing Table

Task

Navigate to the Routing options level in the configuration hierarchy.

J-Web Configuration Editor

In the configuration editor hierarchy, select Routing options.

Configure a new group for the RPF routing table.

Next to Rib groups, click Add new

entry.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit routing-options

Enter edit rib-groups

476

Configuring a Multicast Network with a Configuration Editor

Configuring a Multicast Network

Task

Configure a name for the RPF routing table group, and use inet.2 for its export routing table.

J-Web Configuration Editor

1.

In the Ribgroup name box, type a name for the RPF routing table group—for example, multicast-rfp-rib.

CLI Configuration Editor

Type the name for the RPF routing table and set the export routing table to inet.2. For example: set multicast-rpf-rib export-rib inet.2

Configure an import routing table routing information base (RIB) group for the RPF routing table.

2.

In the Export rib box, type inet.2.

1.

Click Add new entry next to Import rib.

2.

In the Value box, type inet.2.

Navigate to the Rib group level in the configuration hierarchy.

3.

Click OK three times.

In the configuration editor hierarchy, select Protocols>Pim>Rib group.

Set the import routing table to inet.2.

For example: set multicast-rpf-rib import-rib inet.2

From the top of the configuration hierarchy, enter

Apply the RPF routing table to PIM.

Create a RIB group for the interface routes.

1.

In the Inet box, type the name of the RPF routing table group—for example, multicast-rpf-rib.

2.

Click OK three times.

1.

Navigate to the Routing options level in the configuration hierarchy.

edit protocols pim

Enter set rib-group multicast-rpf-rib

From the top of the configuration hierarchy, enter

Configure a name for the RPF routing table group, and use inet.2 and inet.0

for its import routing table.

Add the RIB group to the interface routes.

2.

Next to Rib groups, click Add new

entry.

1.

In the Ribgroup name box, type a name for the RPF routing table group—for example, if-rib.

4.

Click OK twice.

1.

On the Routing options page, select Interface routes>Rib

group.

edit routing-options rib-groups.

Type the name for the RPF routing table and set the export routing table to inet.2

and inet.0. For example:

2.

Click Add new entry next to Import rib.

3.

In the Value box, type inet.2 inet.0.

set if-rib import-rib inet.2

set if-rib import-rib inet.0

From the top of the configuration hierarchy, enter edit routing-options interface-routes

2.

In the Inet box, type the name of the interface RIB group—for example, if-rib.

3.

Click OK.

set rib-group inet if-rib

Configuring a Multicast Network with a Configuration Editor

477

J-series™ Services Router User Guide

Verifying a Multicast Configuration

To verify a multicast configuration, perform these tasks:

“Verifying SAP and SDP Addresses and Ports” on page 478

“Verifying the IGMP Version” on page 478

“Verifying the PIM Mode and Interface Configuration” on page 479

“Verifying the PIM RP Configuration” on page 479

“Verifying the RPF Routing Table Configuration” on page 480

Verifying SAP and SDP Addresses and Ports

Purpose

Action

Verify that SAP and SDP are configured to listen on the correct group addresses and ports.

From the CLI, enter the show sap listen command.

Sample Output

What It Means user@host> show sap listen

Group Address

224.2.127.254

Port

9875

The output shows a list of the group addresses and ports that SAP and SDP listen on. Verify the following information:

Each group address configured, especially the default

224.2.127.254

, is listed.

Each port configured, especially the default

9875

, is listed.

For more information about show sap listen

, see the JUNOS Protocols, Class of Service,

and System Basics Command Reference.

Verifying the IGMP Version

Purpose

Action

Sample Output

Verify that IGMP version 2 is configured on all applicable interfaces.

From the CLI, enter the show igmp interface command.

user@host> show igmp interface

Interface: fe–0/0/0.0

Querier: 192.168.4.36

State: Up Timeout:

Configured Parameters:

197 Version: 2 Groups: 0

478

Verifying a Multicast Configuration

Configuring a Multicast Network

What It Means

IGMP Query Interval: 125.0

IGMP Query Response Interval: 10.0

IGMP Last Member Query Interval: 1.0

IGMP Robustness Count: 2

Derived Parameters:

IGMP Membership Timeout: 260.0

IGMP Other Querier Present Timeout: 255.0

The output shows a list of the Services Router interfaces that are configured for

IGMP. Verify the following information:

Each interface on which IGMP is enabled is listed.

Next to

Version

, the number 2 appears.

For more information about show igmp interface

, see the JUNOS Protocols, Class of

Service, and System Basics Command Reference.

Verifying the PIM Mode and Interface Configuration

Purpose

Action

Verify that PIM sparse mode is configured on all applicable interfaces.

From the CLI, enter the show pim interfaces command.

Sample Output

What It Means user@host> show pim interfaces

Instance: PIM.master

Name lo0.0

pime.32769

Stat Mode

Up Sparse

Up Sparse

IP V State Count DR address

4 2 DR 0 127.0.0.1

4 2 P2P 0

The output shows a list of the Services Router interfaces that are configured for

PIM. Verify the following information:

Each interface on which PIM is enabled is listed.

The network management interface, fe–0/0/0

, is not listed.

Under

Mode

, the word

Sparse appears.

For more information about show pim interfaces

, see the JUNOS Protocols, Class of

Service, and System Basics Command Reference.

Verifying the PIM RP Configuration

Purpose

Action

Verify that the PIM RP is statically configured with the correct IP address.

From the CLI, enter the show pim rps command.

Verifying a Multicast Configuration

479

J-series™ Services Router User Guide

Sample Output

What It Means user@host> show pim rps

Instance: PIM.master

Address family INET

RP address

192.168.14.27

Type static

Holdtime Timeout Active groups Group prefixes

0 None 2 224.0.0.0/4

The output shows a list of the RP addresses that are configured for PIM. At least one

RP must be configured. Verify the following information:

The configured RP is listed with the proper IP address.

Under

Type

, the word static appears.

Verifying the RPF Routing Table Configuration

Purpose

Action

Sample Output

Verify that the PIM RPF routing table is configured correctly.

From the CLI, enter the show multicast rpf command.

What It Means user@host> show multicast rpf

Multicast RPF table: inet.0 , 2 entries...

The output shows the multicast RPF table that is configured for PIM. If no multicast

RPF routing table is configured, RPF checks use inet.0

. Verify the following information:

The configured multicast RPF routing table is inet.0

.

The inet.0

table contains entries.

For more information about show multicast rpf

, see the JUNOS Protocols, Class of

Service, and System Basics Command Reference.

480

Verifying a Multicast Configuration

Part 8

Managing Packet Security

Configuring IPSec for Secure Packet Exchange on page 483

Managing Packet Security 481

482

Managing Packet Security

Chapter 23

Configuring IPSec for Secure Packet

Exchange

IPSec Tunnel Overview on page 483

Before You Begin on page 484

Configuring an IPSec Tunnel with Quick Configuration on page 484

Configuring an IPSec Tunnel with a Configuration Editor on page 486

Verifying the IPSec Tunnel Configuration on page 496

IPSec Tunnel Overview

An IPSec tunnel allows access to a private network through a secure tunnel.

This feature is particularly useful when a private network is divided among multiple sites, and transit between the sites must occur on a public network.

To ensure secure transport of packets across the public network to the multiple sites, individual tunnels are configured. Each tunnel is defined by a local tunnel endpoint and a remote tunnel endpoint.

Packets with a destination address matching the private network prefix are encrypted and encapsulated in a tunnel packet that is routable through the outside network. The source address of the tunnel packet is the local gateway, and the destination address is the remote gateway. Once the encapsulation packet reaches the other side, the remote end determines how to route the packet.

Security Associations

An IPSec security association (SA) is a set of rules used by IPSec tunnel gateways by which traffic is transported. IPSec security associations are established either manually, through configuration statements, or by Internet Key Exchange (IKE).

In the case of manually configured security associations, the connection is established when both ends of the tunnel are configured, and the connections last until one of the endpoints is taken offline. For IKE security associations, connections are established only when traffic is sent through the tunnel, and they dissolve after a preset amount of time or traffic.

IPSec Tunnel Overview

483

J-series™ Services Router User Guide

Securing IncomingTraffic

Incoming (ingress) traffic across the tunnel must be secured to ensure that the IPSec tunnel is protected. Typically, you secure incoming traffic by configuring a stateful firewall filter that acts on the incoming flow through the tunnel. By filtering all traffic that does not match the remote gateway address, you ensure that only traffic sent by the tunnel endpoint reaches destinations through the IPSec tunnel.

Translating Outgoing Traffic

Outgoing (egress) traffic across the tunnel must be marked with the outbound tunnel endpoint address so that it can be filtered by the stateful firewall filter on the opposite side of the tunnel. Packet tagging is performed by

Network Address Translation (NAT). The source address for outbound packets is translated to the local gateway address so that, to the remote gateway, all packets appear to originate from the local endpoint. Address translation enables the remote gateway to filter packets based on source address to determine which packets are to be transported through the tunnel.

Before You Begin

Before you begin configuring an IPSec tunnel, you must have completed these tasks:

Establish basic connectivity. See “Establishing Basic Connectivity” on page 47.

Configure network interfaces. See “Configuring Network Interfaces” on page 79.

Configure one or more routing protocols. See “Configuring Static Routes” on

page 285, “Configuring a RIP Network” on page 297, “Configuring an OSPF

Network” on page 309, or “Configuring BGP Sessions” on page 331.

Configuring an IPSec Tunnel with Quick Configuration

J-Web Quick Configuration allows you to create IPSec tunnels. Figure 96

shows the Quick Configuration page for IPSec tunnels.

484

Configuring an IPSec Tunnel with Quick Configuration

Figure 96: Quick Configuration Page for IPSec Tunnels

Configuring IPSec for Secure Packet Exchange

To configure an IPSec tunnel with Quick Configuration:

1.

2.

3.

In the J-Web user interface, select Configuration>IPSec Tunnels.

Enter information into the Quick Configuration page for IPSec Tunnels,

as described in Table 187.

From the IPSec Tunnels Quick Configuration page, click one of the following buttons:

To apply the configuration and return to the Quick Configuration IPSec

Tunnels page, click OK.

To cancel your entries and return to the Quick Configuration for IPSec

Tunnels page, click Cancel.

Configuring an IPSec Tunnel with Quick Configuration

485

J-series™ Services Router User Guide

4.

To check the configuration, see “Verifying the IPSec Tunnel Configuration” on page 496.

Table 187: IPSec Tunnels Quick Configuration Summary

Function Field

Tunnel Information

Local Tunnel Endpoint (required)

Remote Tunnel Endpoint (required)

IKE Secret Key (required)

Verify IKE Secret Key (required)

Private Prefix List

Your Action

Externally routable IP address that is the local endpoint of the IPSec tunnel

Externally routable IP address that is the peer endpoint of the IPSec tunnel

Internet Key Exchange key that is preshared to ensure authentication across the IPSec tunnel

Internet Key Exchange key that is preshared to ensure authentication across the IPSec tunnel

List of addresses or address prefixes for which the IPSec tunnel is used. Packets whose destination address matches any of the addresses or prefixes in this list are transported through the IPSec tunnel to the remote tunnel endpoint.

Type the IPSec tunnel’s local endpoint

32-bit IP address, in dotted decimal notation.

Type the IPSec tunnel’s peer endpoint

32-bit IP address, in dotted decimal notation.

Type the IKE key to be used for authentication across the IPSec tunnel.

Characters are disguised as you type.

Verify the IKE key by retyping the key to be used for authentication across the

IPSec tunnel. Characters are disguised as you type.

1.

In the text box at the bottom of the list, enter an IP address or address prefix, in dotted decimal notation.

2.

Click Add.

Configuring an IPSec Tunnel with a Configuration Editor

To configure a Services Router to transport traffic across a secure IPSec tunnel, you must define the tunnel and configure its components. To configure an IPSec tunnel, perform the following tasks:

Configuring IPSec Services Interfaces on page 487

Configuring IPSec Service Sets on page 488

Configuring an IPSec Stateful Firewall Filter on page 492

Configuring a NAT Pool on page 494

486

Configuring an IPSec Tunnel with a Configuration Editor

Configuring IPSec for Secure Packet Exchange

Configuring IPSec Services Interfaces

To configure an IPSec tunnel, you must configure the following services interfaces:

Inside services interface —Logical interface used to apply the service sets that define the behavior of the IPSec tunnel for outbound traffic (traffic whose next hop is inside the IPSec tunnel).

Outside services interface —Logical interface used to apply the service sets that define the behavior of the IPSec tunnel for inbound traffic (traffic whose next hop is outside the IPSec tunnel).

For the services to be applied, you must first define the logical interfaces to be used.

To configure IPSec inside services interfaces and outside services interfaces:

3.

4.

1.

2.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 188.

If you are finished configuring the network, commit the configuration.

Go on to “Configuring IPSec Service Sets” on page 488.

Table 188: Configuring IPSec Interfaces

Task

Navigate to the Interfaces level in the configuration hierarchy.

J-Web Configuration Editor

In the configuration editor hierarchy, select Interfaces.

CLI Configuration Editor

From the top of the configuration hierarchy, enter edit interfaces

Configuring an IPSec Tunnel with a Configuration Editor

487

J-series™ Services Router User Guide

Task

Configure the inside services interface for the IPSec tunnel.

On the J-series Services Router, the services interface is always sp-0/0/0. unit . The logical interface must have a unit number other than 0. By default, the J-Web Quick

Configuration uses the unit number

1001 for inside-service logical interfaces.

Configure the outside services interface for the IPSec tunnel.

On the J-series Services Router, the services interface is always sp-0/0/0. unit . The logical interface must have a unit number other than 0. By default, the J-Web Quick

Configuration uses the unit number

2001 for outside-service logical interfaces.

J-Web Configuration Editor

1.

In the Interface field, click Add

new entry.

CLI Configuration Editor

1.

Configure the services interface as an inside-service interface:

2.

In the Interface name field, type sp-0/0/0, and click OK.

3.

In the Interface field, click sp-0/0/0.

set sp-0/0/0 unit 1001 service-domain inside

2.

Configure the services interface as an inet interface:

4.

In the Unit field, click Add new

entry.

5.

In the Interface unit number field, type 1001.

set sp-0/0/0 unit 1001 family inet

6.

In the Service domain box, select

inside from the drop-down menu.

7.

In the Family field, click inet.

8.

Select the Primary box, and click

OK.

1.

In the Interface field, click Add

new entry.

1.

Configure the services interface as an outside-service interface:

2.

In the Interface name field, type sp-0/0/0, and click OK.

3.

In the Interface field, click sp-0/0/0.

set sp-/0/0/0 unit 2001 service-domain outside

2.

Configure the services interface as an inet interface:

4.

In the Unit field, click Add new

entry.

5.

In the Interface unit number field, type 2001.

set sp-0/0/0 unit 2001 family inet

6.

In the Service domain box, select

outside from the drop-down menu.

7.

In the Family field, click inet.

8.

Select the Primary box, and click

OK.

Configuring IPSec Service Sets

The next-hop service set defines which services interface to use for all inside-service next hops and all outside-service next hops (traffic inside the network and outside the network). The unit numbers used to define the next-hop interfaces must match exactly the unit numbers used in the interfaces configuration.

When you configure an IPSec service set, you must also configure the local gateway.

You then configure an IPSec rule to set the remote gateway on all traffic, configure a security association (SA) with a static IKE key, and configure another rule to act on input traffic. This configuration allows you to set the remote gateway address and perform IKE validation on all incoming traffic through the IPSec tunnel.

488

Configuring an IPSec Tunnel with a Configuration Editor

Configuring IPSec for Secure Packet Exchange

Finally, you apply the entire service set.

To configure IPSec service sets:

3.

4.

1.

2.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

Perform the configuration tasks described in Table 189.

If you are finished configuring the network, commit the configuration.

Go on to “Configuring an IPSec Stateful Firewall Filter” on page 492.

Table 189: Configuring IPSec Service Sets

Task

Configure the next-hop service set for the IPSec tunnel.

J-Web Configuration Editor

1.

From the top of the configuration hierarchy, click Services.

2.

In the Service sets field, click Add

new entry.

3.

In the Service set name field, type the name of the service set. The name can be any unique string.

4.

In the Service type choice field, select Next hop service from the drop-down menu.

5.

In the Nested configuration field, click Next hop service.

6.

In the Inside service interface field, type the services interface, including unit number, for the inside-service interface—for example, sp-0/0/0.1001.

7.

Click OK.

8.

In the Nested configuration field, click Next hop service.

9.

In the Outside service interface field, type the services interface, including the unit number—for example, sp–0/0/0.2002.

10.

Click OK.

CLI Configuration Editor

1.

From the top of the configuration hierarchy, enter edit services

2.

Set the inside-service interface: set service-set service-set-name next-hop-service inside-service-interface sp-0/0/0.1001

3.

Set the outside-service interface: set service-set service-set-name next-hop-service outside-service-interface sp-0/0/0.2001

Configuring an IPSec Tunnel with a Configuration Editor

489

J-series™ Services Router User Guide

Task

Configure the local gateway for the

IPSec service set.

J-Web Configuration Editor

1.

In the Ipsec vpn options field, click

Configure.

2.

In the Local gateway box, type the IP address of the local tunnel endpoint, in dotted decimal notation—for example, 1.1.1.1.

CLI Configuration Editor

Set the local gateway address for the service set: set service-set service-set-name ipsec-vpn-options local-gateway 1.1.1.1

Configure IPSec rules to set the remote gateway on all traffic to 2.2.2.2.

Because the rule applies to all traffic, you must only configure the action (or then statement) for the term.

1.

From the top of the configuration hierarchy, click

Services>Ipsec-vpn.

2.

In the Rule field, click Add new

entry.

3.

In the Rule name field, type the name of the rule. The rule name can be any unique string.

4.

In the term field, click Add new

entry.

5.

In the Term name field, type the name of the term. It can be any unique string.

6.

To configure an action, click Then.

7.

In the Remote gateway field, type the remote gateway address, in dotted decimal notation—for example, 2.2.2.2.

8.

Click OK.

1.

From the top of the configuration hierarchy, enter edit services ipsec-vpn

2.

Configure a rule with a term that sets the remote gateway to

2.2.2.2: set rule rule-name term

term-name then remote-gateway

2.2.2.2

490

Configuring an IPSec Tunnel with a Configuration Editor

Configuring IPSec for Secure Packet Exchange

Task

Configure an security association with a static IKE key.

J-Web Configuration Editor

1.

From the top of the configuration hierarchy, select

Services>Ipsec-vpn>Ike.

The IKE key is a preshared key and must be configured exactly the same way at both the local and remote endpoints of the IPSec tunnel.

2.

In the Policy field, click Add new

entry.

The IKE key is configured as ike policy and then applied using the dynamic statement.

3.

In the Name box, type the name of the IKE policy. It can be any unique string.

4.

Click Pre-shared key.

5.

In the Key choice field, select Ascii

text from the drop-down menu.

6.

In the Ascii text box, enter the IKE key in plain text.

7.

Click OK.

8.

Navigate to the IPSec rule configured previously.

From the top of the configuration hierarchy, click

Services>Ipsec-vp> rule-name

>term term-name >then.

9.

Click Dynamic.

10.

In the Ike-policy box, type the name of the IKE policy you configured.

11.

Click OK.

CLI Configuration Editor

1.

From the top of the configuration hierarchy, enter edit services ipsec-vpn ike

2.

Configure the IKE pre-shared key in

ASCII text format: set policy policy-name pre-shared-key ascii-text ike-key

3.

Navigate to the IPSec rule configured previously. From the top of the configuration hierarchy, enter edit services ipsec-vpn rule-name term term-name then.

4.

Configure a dynamic security association that applies the IKE policy: set dynamic ike-policy policy-name

Configuring an IPSec Tunnel with a Configuration Editor

491

J-series™ Services Router User Guide

Task

Configure the IPSec rule so that it acts on input traffic.

J-Web Configuration Editor

1.

From the top of the configuration hierarchy, click

Services>Ipsec-vpn>Rule>

rule-name .

2.

In the Match direction field, select

Input from the drop-down menu.

Apply the IPSec rule to all traffic through the previously configured service set.

3.

Click OK.

1.

From the top of the configuration hierarchy, click Services>Service-set>

service-set-name .

2.

In the Ipsec vpn rules choice field, select Ipsec vpn rules from the drop-down menu.

3.

In the Ipsec vpn rules field, click

Add new entry.

4.

In the Rule name box, type the name of the previously configured

IPSec rule.

5.

Click OK.

CLI Configuration Editor

1.

From the top of the configuration hierarchy, enter edit services ipsec-vpn rule

rule-name

2.

Set the match direction for the rule: set match-direction input

1.

From the top of the configuration hierarchy, enter edit services service-set

service-set-name

2.

Apply the IPSec rule previously configured: set ipsec-vpn-rules rule-name

Configuring an IPSec Stateful Firewall Filter

Configure stateful firewall filter rules to ensure that only desired traffic is permitted.

This firewall is applied to all inbound traffic from the WAN. For this IPSec tunnel, desired traffic must be from the remote tunnel endpoint, destined for the local tunnel endpoint, and using either IPSec or IKE as an application protocol.

For more information about firewall filters, see “Configuring Firewall

Filters and NAT” on page 389.

To configure an IPSec stateful firewall filter:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

2.

3.

4.

Perform the configuration tasks described in Table 190.

If you are finished configuring the network, commit the configuration.

Go on to “Configuring a NAT Pool” on page 494.

492

Configuring an IPSec Tunnel with a Configuration Editor

Configuring IPSec for Secure Packet Exchange

Table 190: Configuring an IPSec Stateful Firewall Filter

Task

Create the stateful firewall rule and apply it to inbound traffic.

Create the firewall term to match only desired traffic.

J-Web Configuration Editor

1.

From the top of the configuration hierarchy, click Services>Stateful

firewall.

CLI Configuration Editor

1.

From the top of the configuration hierarchy, enter edit services stateful-firewall

2.

In the rule field, click Add new

entry.

3.

In the Rule name box, type the name of the rule. It can be any unique string.

2.

Create the firewall rule and apply it to input traffic: set rule rule-name match-direction input

4.

In the Match direction field, select

Input from the drop-down menu.

1.

In the Term field, click Add new

entry.

1.

Create the firewall term and match all packets with a destination address that matches the local tunnel endpoint:

2.

In the Term name box, type the name of the term. It can be any unique string.

3.

Click From.

4.

In the Destination address field, click Add new entry.

set term term-name from destination-address

local-tunnel-end-point-address

2.

Match all packets with a source address that matches the remote tunnel endpoint:

5.

In the address field, select Enter

specific value from the drop-down menu.

set term term-name from source-address

remote-tunnel-end-point-address

6.

In the Address box, type the

IP address of the local tunnel endpoint, in dotted decimal notation, and click OK.

7.

In the Source address field, click

Add new entry.

3.

Match all packets using IPSec as an application protocol: set term term-name from applications junos-ipsec-esp

8.

In the address field, select Enter

specific value from the drop-down menu.

4.

Match all packets using IKE as an application protocol: set term term-name from applications junos-ike

9.

In the Address box, type the IP address of the remote tunnel endpoint, in dotted decimal notation, and click OK.

10.

In the Applications field, click Add

new entry.

11.

In the Application name field, type junos-ipsec-esp, and click OK.

12.

In the Applications field, click Add

new entry.

13.

In the Application name field, type junos-ike, and click OK.

Configuring an IPSec Tunnel with a Configuration Editor

493

J-series™ Services Router User Guide

Task

Configure the firewall term to accept only desired traffic.

Create the firewall term to reject all other traffic.

J-Web Configuration Editor

1.

Click OK to return to the Term name page, and click Then.

2.

In the Designation field, select

Accept from the drop-down menu, select the Yes box.

3.

Click OK.

1.

From the top of the configuration hierarchy, click Services>Stateful

firewall>Rule> rule-name

2.

In the Term field, click Add new

entry.

CLI Configuration Editor

Set the match action to accept: set term term-name then accept

1.

From the top of the configuration hierarchy, enter edit services stateful-firewall rule

rule-name

3.

In the Term name field, type the name of the term. The name can be any unique string.

4.

Click Then.

5.

In the Designation field, select

Discard from the drop-down menu.

2.

Configure a term to discard all traffic: set term term-name then discard

Configuring a NAT Pool

To hide internal IP addresses from the rest of the Internet, you configure the local tunnel endpoint as the only address in a Network Address Translation (NAT) pool, to ensure that it is the address used for address translation.

To configure a NAT pool for IPSec:

1.

Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.

3.

4.

2.

Perform the configuration tasks described in Table 191.

If you are finished configuring the network, commit the configuration.

To check the configuration, see “Verifying the IPSec Tunnel Configuration” on page 496.

494

Configuring an IPSec Tunnel with a Configuration Editor

Configuring IPSec for Secure Packet Exchange

Table 191: Configuring a NAT Pool for IPSec

Task

Configure the NAT pool from which the addresses for network address translation are taken.

J-Web Configuration Editor

1.

From the top of the configuration hierarchy, click Services>Nat.

2.

In the Pool field, click Add new

entry.

3.

In the Pool name field, type the name of the NAT pool. It can be any unique string less than 64 characters long.

4.

In the Address choice field, select

Address from the drop-down menu.

5.

In the Address box, type the

IP address of the local tunnel endpoint, in dotted decimal notation.

CLI Configuration Editor

1.

From the top of the configuration hierarchy, enter edit services nat

2.

Add the local tunnel endpoint to the NAT address pool: set pool pool-name address

1.1.1.1

Configuring an IPSec Tunnel with a Configuration Editor

495

J-series™ Services Router User Guide

Task

Configure the router so that all outgoing traffic is matched against the IP address of the local tunnel endpoint.

J-Web Configuration Editor

1.

From the top of the configuration hierarchy, click Services>Nat.

2.

In the Rule field, click Add new

entry.

3.

In the Rule name field, type the name of the rule. The name can be any unique string.

CLI Configuration Editor

1.

From the top of the configuration

2.

hierarchy, enter edit services nat

Configure a NAT rule and apply it to all output traffic: set rule rule-name match-direction output

4.

In the Match direction field, select

Output from the drop-down menu.

5.

In the Term field, click Add new

entry.

3.

Configure the rule to match traffic with a source address that is the same as the local tunnel endpoint:

6.

In the Term name field, type the name of the term. The name can be any unique string.

set rule rule-name term

term-name from source-address

1.1.1.1

7.

Click From.

8.

In the Source address field, click

Add new entry.

9.

In the address field, select Enter

specific value from the drop-down menu.

Configure the router so that the source address for traffic through the local endpoint is translated to the local endpoint address.

10.

In the Address box, type the

IP address of the local tunnel endpoint, in dotted decimal notation, and click OK.

1.

From the top of the configuration hierarchy, click Services>Nat>Rule>

rule-name Term> term-name

1.

From the top of the configuration hierarchy, enter edit services nat rule rule-name term term-name

2.

Click Then.

3.

Click Translated.

2.

Configure the source pool:

4.

In the Source pool field, type the name of the NAT pool in which the local tunnel endpoint is configured.

5.

In the Source field, select Static from the drop-down menu.

set then translated source-pool

pool-name

3.

Configure the type of translation: set then translated translation-type source static

Verifying the IPSec Tunnel Configuration

To verify the IPSec tunnel configuration, perform the following task.

496

Verifying the IPSec Tunnel Configuration

Configuring IPSec for Secure Packet Exchange

Verifying IPSec Tunnel Statistics

Purpose

Action

Sample Output

Verify that traffic is being sent through the configured IPSec tunnel.

From the CLI, enter the show services ipsec-vpn ipsec statistics command.

What It Means user@host> show services ipsec-vpn ipsec statistics

PIC: sp-0/0/0, Service set: service-set-1

Local gateway: 1.1.1.1, Remote gateway: 2.2.2.2, Tunnel index: 1

ESP Statistics:

Encrypted bytes:

Decrypted bytes:

0

0

Encrypted packets:

Decrypted packets:

AH Statistics:

Input bytes:

0

0

Output bytes:

Input packets:

Output packets:

Errors:

0

0

0

0

AH authentication failures: 0, Replay errors: 0

ESP authentication failures: 0, Decryption errors: 0

Bad headers: 0 Bad trailers: 0

The output shows the statistics for the particular service set that defines the IPSec tunnel, including the local and remote gateway addresses, the number of packets that have been encrypted and transported, and the number of errors and failures.

Verify the following information:

The local and remote tunnel endpoints are configured correctly.

The number of Authentication Header (AH) and Encapsulation Security

Payload (ESP) errors is zero. If these numbers are nonzero, the Services

Router might be having a problem either transmitting or receiving encrypted packets through the IPSec tunnel.

For more information about show services ipsec-vpn ipsec statistics

, see the JUNOS

Network and Services Interfaces Command Reference.

Verifying the IPSec Tunnel Configuration

497

J-series™ Services Router User Guide

498

Verifying the IPSec Tunnel Configuration

Part 9

Upgrading the Services Router

Performing Software Upgrades and Reboots on page 501

Replacing and Troubleshooting Hardware Components on page 517

Upgrading the Services Router 499

500

Upgrading the Services Router

Chapter 24

Performing Software Upgrades and

Reboots

You can upgrade the JUNOS Internet software on a Services Router by installing a new version that you download from the Web to a remote server or your computer.

Use either the J-Web interface or the CLI to perform the upgrade.

If you need to replace the primary boot device or add a backup boot device on the router, you can configure a boot device with the CLI or with a UNIX or Microsoft

Windows computer. You can also configure a boot device to receive core dumps.

Use either the J-Web interface or the CLI to schedule a reboot or system halt on the router, or to perform one immediately. For more information about installing and upgrading JUNOS software, see the JUNOS System Basics Configuration Guide.

Upgrade Overview on page 502

Before You Begin on page 502

Downloading Software Upgrades from Juniper Networks on page 502

Installing Software Upgrades with J-Web Quick Configuration on page 503

Installing Software Upgrades with the CLI on page 506

Downgrading the Software with the J-Web Interface on page 507

Downgrading the Software with the CLI on page 507

Configuring Boot Devices on page 508

Configuring a Boot Device to Receive Software Failure Memory Snapshots on page 511

Deleting a Rescue Configuration on page 511

Rebooting or Halting a Services Router with the J-Web Interface on page 512

Rebooting the Services Router with the CLI on page 514

Halting the Services Router with the CLI on page 514

Verifying the IPSec Tunnel Configuration

501

J-series™ Services Router User Guide

Upgrade Overview

The Services Router is delivered with the JUNOS Internet software preinstalled. To upgrade the software, you use the J-Web interface or CLI commands to copy a set of software images over the network to memory storage on the Routing Engine.

All junos-jseries software is delivered in signed packages that contain Secure

Hash Algorithm 1 (SHA-1) checksums. A package is installed only if the SHA-1 checksum within it matches the SHA-1 hash recorded in its corresponding

.sha1

file. (For example,

-export.tgz

contains

-export.tgz

and

-export.tgz.sha1

. The junos-jseries- release -export.tgz

package is installed only if the SHA-1 hashes match in the two

-export.tgz.sha1

files.)

The junos-jseries package completely reinstalls the software. This package rebuilds the file system but retains configuration files, log files, and similar information from the previous version.

Before You Begin

To download software upgrades, you must have a Web account with Juniper

Networks. To obtain an account, complete the registration form at the Juniper

Networks Web site: https://www.juniper.net/registration/Register.jsp

.

Before upgrading, be sure to back up the currently running and active file system and configuration so that you can recover to a known, stable environment in case the upgrade is unsuccessful. To back up the file system, you must have a removable compact flash drive installed on the J4300 or J6300 Services

Router, or a USB drive installed on any J-series Services Router.

To back up the file system to the removable compact flash drive, issue the following command: user@host> request system snapshot media removable-compact-flash

To back up the file system to the removable USB drive, issue the following command: user@host> request system snapshot media usb

For details about the request system snapshot

command, see “Configuring

Boot Devices with the CLI” on page 508.

Downloading Software Upgrades from Juniper Networks

Follow these steps to download software upgrades from Juniper Networks:

1.

Using a Web browser, follow the links to the download URL on the Juniper

Networks Web page. Choose either Canada and U.S. Version or Worldwide

Version: https://www.juniper.net/support/csc/swdist-domestic/

502

Downloading Software Upgrades from Juniper Networks

Performing Software Upgrades and Reboots https://www.juniper.net/support/csc/swdist-ww/

2.

3.

4.

Log in to the Juniper Networks authentication system using the username

(generally your e-mail address) and password supplied by Juniper Networks representatives.

Using either the J-Web interface or the CLI, choose the software package for your application.

Download the software to a local host.

Installing Software Upgrades with J-Web Quick Configuration

You can use the J-Web interface to install software upgrades from a remote server using FTP or HTTP, or by uploading the file to the router.

Installing Software Upgrades from a Remote Server on page 503

Installing Software Upgrades by Uploading Files on page 505

Installing Software Upgrades from a Remote Server

You can use the J-Web interface to install software packages on the Services Router that are retrieved with FTP or HTTP from the location specified.

Figure 97 shows the Install Remote page for the router.

Installing Software Upgrades with J-Web Quick Configuration

503

J-series™ Services Router User Guide

Figure 97: Install Remote Page

To install software upgrades from a remote server:

3.

4.

5.

1.

2.

6.

Download the software package as described in “Downloading Software

Upgrades from Juniper Networks” on page 502.

Log in to the Juniper Networks authentication system using the username

(generally your e-mail address) and password supplied by Juniper Networks representatives.

Download the software to your local host or internal software distribution site.

In the J-Web interface, select Manage>Software>Install Remote.

On the Install Remote Quick Configuration page, enter information into the

fields described in Table 192.

Click OK. The software is activated after the router has rebooted.

504

Installing Software Upgrades with J-Web Quick Configuration

Performing Software Upgrades and Reboots

Table 192: Install Remote Quick Configuration Summary

Field

Package Location (required)

Function

Specify the FTP or HTTP server on which the software package resides.

User

Password

Reboot If Required

Specify the username, if the server requires one.

Specify the password, if the server requires one.

If this box is checked, the router is automatically rebooted when the upgrade is complete.

Your Action

Type the full address of the software package location on the FTP or HTTP server.

Type the username.

Type the password.

Check the box if you want the router to reboot automatically when the upgrade is complete.

Installing Software Upgrades by Uploading Files

You can use the J-Web interface to install software packages uploaded from your computer to the Services Router.

Figure 98 shows the Upload Package page for the router.

Figure 98: Upload Package Page

Installing Software Upgrades with J-Web Quick Configuration

505

J-series™ Services Router User Guide

To install software upgrades by uploading files:

1.

Download the software package as described in “Downloading Software

Upgrades from Juniper Networks” on page 502.

2.

3.

4.

In the J-Web interface, select Manage>Software>Upload Package.

Enter information into the fields described in Table 193 into the Upload

Package Quick Configuration page.

Click Upload Package. The software is activated after the router has rebooted.

Table 193: Upload Package Quick Configuration Summary

Field

File to Upload (required)

Function

Specify the location of the software package.

Reboot If Required If this box is checked the router is automatically rebooted when the upgrade is complete.

Your Action

Type the location of the software package, or click Browse to navigate to the location.

Select the check box if you want the router to reboot automatically when the upgrade is complete.

Installing Software Upgrades with the CLI

To install software upgrades using the CLI:

1.

Download the software package as described in “Downloading Software

Upgrades from Juniper Networks” on page 502.

2.

3.

Copy the software package to the router. We recommend that you copy it to the

/var/tmp directory.

Install the new package on the Services Router:

Customers in the United States and Canada use the following command: user@host> request system software add validate path /junos-jseries release -domestic.tgz

All other customers use the following command: user@host> request system software add validate path /junos-jseries release -export.tgz

4.

Replace

path

with the full pathname to the bundle. Replace

release

with the software release version of the bundle.

Reboot the router to activate the junos-jseries software: user@host> request system reboot

506

Installing Software Upgrades with the CLI

Performing Software Upgrades and Reboots

Reboot the system ? [yes,no] (no) yes

Shutdown NOW!

5.

All the software is activated when you issue the reboot command.

The router then reboots from the primary boot device on which you just installed the software. When the reboot is complete, the router displays the login prompt.

If your compact flash is running out of space and you do not wish to downgrade the software to a previous version, you can recover up to 30 MB of space by using the request system software delete-backup

CLI command. This command deletes the backup software package.

Downgrading the Software with the J-Web Interface

You can downgrade the software from the J-Web interface. When you downgrade the software to a previous version, the software version that is saved in junos.old

is the version of JUNOS that your router is downgraded to. For your changes to take effect, you must reboot the router.

To downgrade software:

1.

Go to Manage>Software>Downgrade. The previous version (if any) is displayed on this page. For example, you can downgrade to the previously installed version of the router software,

/cf/packages/junos-7.0120040930_1745-domestic

.

NOTE: Once you perform this operation, you cannot undo it.

2.

3.

Select Downgrade to downgrade to the previous version of the software or

Cancel to cancel the downgrade process.

When the downgrade process is complete, for the new software to take effect, click Manage>Reboot to reboot the router at your convenience.

Downgrading the Software with the CLI

You can revert to the previous set of software using the request system software rollback command in the CLI. Rollback fails if the junos-jseries software bundle cannot be found in

/var/sw/pkg

.

You can roll back only to the software release that was installed on the Services

Router before the current release. Once you issue the request system software rollback command, the old release is loaded and you can not reload it again. Issuing the request system software rollback command again results in an error.

Downgrading the Software with the CLI

507

J-series™ Services Router User Guide

To downgrade to an earlier version of software, follow the procedure for upgrading, using the junos-jseries software bundle labeled for the appropriate release.

Configuring Boot Devices

You can configure boot devices to replace the primary boot device on your Services

Router, or to act as a backup boot device.

For more information about installing boot devices, see “Removing and Installing

the Primary Compact Flash Disk” on page 523, “Removing and Installing the

Removable Compact Flash Disk” on page 525, and “Removing and Installing the USB Drive” on page 527.

This section contains the following topics:

Configuring Boot Devices with the CLI on page 508

Copying Software Images to Boot Devices with UNIX on page 509

Copying Software Images to Boot Devices with Cygwin on page 510

Configuring Boot Devices with the CLI

You can use the request system snapshot

CLI command to create a boot device: user@host> request system snapshot <as-primary> <config-size size >

<data-size size > <factory> <media type > <partition> <root-size size >

<swap-size size >

Table 194 describes the

request system snapshot command options.

Table 194: CLI Request System Snapshot Command Options

Option as-primary

Description

Creates a snapshot (as with the request system snapshot command) that can be used to replace the medium in the primary compact flash drive. Using the as-primary option allows you to write a snapshot to a device other than the primary compact flash disk (either the removable compact flash disk or a USB drive) and then use that medium as the primary boot medium.

The as-primary option can be used on the removable compact flash or a USB drive.

NOTE:

Once the boot device is created as a primary compact flash drive, it can operate only in a primary compact flash drive slot.

This option causes the boot medium to be partitioned.

508

Configuring Boot Devices

Performing Software Upgrades and Reboots

Option config-size size data-size size factory media type partition root-size size swap-size size

Description

Specifies the size of the config partition, in megabytes. The default value is 10 percent of physical memory on the boot medium.

The config partition is mounted on /config. The configuration files are stored in this partition.

NOTE:

This option causes the boot medium to be partitioned.

Specifies the size of the data partition, in megabytes. The default value is 0 MB.

The data partition is mounted on /data. This space is not used by the router, and can be used for extra storage.

NOTE:

This option causes the boot medium to be partitioned.

Copies only default files that were loaded on the primary compact flash drive when it was shipped from the factory, plus the rescue configuration if one has been set.

NOTE:

Once the boot medium is created with the factory option, it can operate in only the primary compact flash drive slot.

Specifies the boot device the software is copied to: compact-flash—Copies software to the primary compact flash drive.

removable-compact-flash—Copies software to the removable compact flash drive. This option is available on J4300 and J6300 Services Routers only.

usb—Copies software to the device connected to the USB port.

NOTE:

You cannot copy software to the active boot device.

Partitions the medium. This option is usually necessary for boot devices that do not have software already installed on them.

Specifies the size of the root partition, in megabytes. The default value is the boot device’s physical memory minus the config, data, and swap partitions.

The root partition is mounted on / and does not include configuration files.

NOTE:

This option causes the boot medium to be partitioned.

Specifies the size of the swap partition, in megabytes. The default value is one-third of the physical memory on a boot medium larger than 128 MB, or 0 MB on a smaller boot device.

The swap partition is used for swap files and software failure memory snapshots.

Software failure memory snapshots are saved to the boot medium only if it is specified as the dump device. For information about the setting the dump device,

see “Configuring a Boot Device to Receive Software Failure Memory Snapshots” on page 511.

NOTE:

This option causes the boot medium to be partitioned.

Copying Software Images to Boot Devices with UNIX

To create a boot device with a UNIX computer:

1.

If you are copying a boot image to a compact flash drive, first plug the drive into a PCMCIA adapter or USB card reader.

Configuring Boot Devices

509

J-series™ Services Router User Guide

2.

3.

4.

Connect the removable medium—compact flash drive or USB—to the UNIX computer.

Determine the device address of the drive that the removable medium was mounted on.

Copy the software package to the removable medium by entering the following command:

dd if=

filename

of=/dev/r

device address

bs=64k

NOTE: The copy process can take several minutes.

The removable medium is now configured to be installed as a primary boot device on a J-series Services Router. For information about installing the boot

device, see “Removing and Installing the Primary Compact Flash Disk” on page

523, “Removing and Installing the Removable Compact Flash Disk” on page

525, or “Removing and Installing the USB Drive” on page 527.

Copying Software Images to Boot Devices with Cygwin

To access a raw device on Windows, you must install Cygwin. Cygwin is a

Linux environment for Windows. With Cygwin installed, you can use many standard UNIX utilities. These utilities can be accessed from one of the provided shells or from the Windows command prompt.

To create a boot device with Cygwin on a Windows computer:

1.

2.

If you are copying a boot image to a compact flash drive, first plug the drive into a PCMCIA adapter or USB card reader.

Connect the removable medium—compact flash drive or USB—to the Windows computer on which you have installed Cygwin.

3.

4.

Determine the device address of the drive that the removable medium was mounted on.

Copy the software package to the removable medium by entering the following command:

dd if=

filename

of=/dev/

device address

bs=64k

NOTE: The copy process can take several minutes.

The removable medium is now configured to be installed as a primary boot device on a J-series Services Router. For information about installing the boot

device, see “Removing and Installing the Primary Compact Flash Disk” on page

510

Configuring Boot Devices

Performing Software Upgrades and Reboots

523, “Removing and Installing the Removable Compact Flash Disk” on page

525, or “Removing and Installing the USB Drive” on page 527.

Configuring a Boot Device to Receive Software Failure Memory Snapshots

You can use the set system dump device

CLI command to specify the medium to use for the Services Router to store system software failure memory snapshots. In this way, when the operating system fails, if you have specified a system dump device in the configuration, the operating system preserves a snapshot of the state of the router when it failed.

After you reboot the system, the dump device is checked for a snapshot as part of the operating system boot process. If a snapshot is found, it is written to the crash dump directory on the router (

/var/crash

). The customer support team can examine this memory snapshot to help determine the cause of the system software failure.

NOTE: If the swap partition on the dump device medium is not large enough for a system memory snapshot, either a partial snapshot or no snapshot is written into the crash dump directory.

The syntax for the set system dump device

CLI command is as follows: user@host> set system dump device <compact-flash>

<removable-compact-flash > <usb>

Table 195 describes the

set system dump device command options.

Table 195: CLI Set System Dump Device Command Options

Option compact-flash removable-compact-flash usb

Description

Uses the primary compact flash as the system software failure memory snapshot device.

Uses the compact flash device on the front of the router (J4300 and J6300 only) as the system software failure memory snapshot device.

Uses the device attached to the USB port as the system software failure memory snapshot device.

Deleting a Rescue Configuration

To delete a rescue configuration using the CLI, issue the following command: user@host> request system configuration rescue delete

Alternatively, using J-web, select configuration>rescue menu>delete

rescue configuration to delete the rescue configuration.

Deleting a Rescue Configuration

511

J-series™ Services Router User Guide

Rebooting or Halting a Services Router with the J-Web Interface

You can use the J-Web interface to schedule a reboot or halt the Services Router.

Figure 99 shows the Reboot page for the router.

Figure 99: Reboot Page

To reboot or halt the router with the J-Web interface:

1.

2.

In the J-Web interface, select Manage>Reboot.

Select one of the following options:

Reboot Immediately—Reboots the router immediately.

512

Rebooting or Halting a Services Router with the J-Web Interface

Performing Software Upgrades and Reboots

Reboot in number of minutes—Reboots the router in the number of minutes from now that you specify.

Reboot when the system time is hour : minute —Reboots the router at the absolute time that you specify, on the current day. You must select a

2-digit hour in 24-hour format, and a 2-digit minute.

Halt Immediately—Stops the router software immediately. Once the router software has stopped, you can access the router through the

CONSOLE port only.

3.

Choose the boot device from the Reboot from media drop-down menu:

compact-flash—Reboots from the primary compact flash drive. This selection is the default choice.

removable-compact-flash—Reboots from the optional removable compact flash drive. This selection is available on J4300 and J6300

Services Routers only.

usb—Reboots from the USB drive.

4.

(Optional) In the Message box, type a message to be displayed to any users on the router before the reboot occurs.

5.

6.

Click Schedule. The J-Web interface requests confirmation to perform the reboot or halt.

Click OK to confirm the operation.

If the reboot is scheduled to occur immediately, the router reboots. You cannot access the J-Web interface until the router has restarted and the boot sequence is complete. Once the reboot is complete, refresh the browser window to display the J-Web interface login page.

If the reboot is scheduled to occur in the future, the Reboot page displays the time until reboot. You have the option to cancel the request by clicking Cancel Reboot on the J-Web interface Reboot page.

If the router is halted, all software processes stop and you can access the router through the

CONSOLE port only. Reboot the router by pressing any key on the keyboard.

NOTE: If you cannot connect to the router through the

CONSOLE port, shut down the router by pressing and holding the power button on the front panel until the

POWER

ON

LED turns off. Once the router has shut down, you can power on the router by pressing the power button again. The

POWER ON

LED lights during startup and remains steadily green when the router is operating normally.

Rebooting or Halting a Services Router with the J-Web Interface

513

J-series™ Services Router User Guide

Rebooting the Services Router with the CLI

You can use the request system reboot

CLI command to schedule a reboot of the Services Router: user@host> request system reboot <at time > <in minutes > <media type >

<message “text” >

Table 196 describes the

request system reboot command options.

Table 196: CLI Request System Reboot Command Options

Option none at time in minutes media type message "text"

Description

Same as at now (reboots the router immediately).

Specifies the time at which to reboot the router. You can specify time in one of the following ways: now—Reboots the router immediately. This is the default.

+ minutes —Reboots the router in the number of minutes from now that you specify.

yymmddhhmm

—Reboots the router at the absolute time on the date you specify. Enter the year, month, day, hour (in 24-hour format), and minute.

hh:mm

—Reboots the router at the absolute time you specify, on the current day. Enter the time in 24-hour format, using a colon (:) to separate hours from minutes.

Specifies the number of minutes from now to reboot the router. This option is a synonym for the at + minutes option.

Specifies the boot device to boot the router from: compact-flash—Reboots from the primary compact flash drive. This is the default.

removable-compact-flash—Reboots from the optional removable compact flash drive. This option is available on J4300 and J6300 Services Routers only.

usb—Reboots from the USB drive.

Provides a message to display to all system users before the router reboots.

Halting the Services Router with the CLI

You can use the request system halt

CLI command to halt the Services Router: user@host> request system halt <at time > <in minutes > <media type >

<message “text” >

When the router is halted, all software processes stop and you can access the router through the

CONSOLE port only. Reboot the router by pressing any key on the keyboard.

514

Halting the Services Router with the CLI

Performing Software Upgrades and Reboots

NOTE: If you cannot connect to the router through the

CONSOLE port, shut down the router by pressing and holding the power button on the front panel until the

POWER

ON

LED turns off. Once the router has shut down, you can power on the router by pressing the power button again. The

POWER ON

LED lights during startup and remains steadily green when the router is operating normally.

Table 197 describes the

request system halt command options.

Table 197: CLI Request System Halt Command Options

Option none at time in minutes media type message "text"

Description

Same as at now (stops software processes on the router immediately).

Time at which to stop the software processes on the router. You can specify time in one of the following ways: now—Stops the software processes immediately. This is the default.

+ minutes —Stops the software processes in the number of minutes from now that you specify.

yymmddhhmm

—Stops the software processes at the absolute time you specify. Enter the year, month, day, hour (in 24-hour format), and minute.

hh:mm

—Stops the software processes at the absolute time that you specify, on the current day. Enter the time in 24-hour format, using a colon (:) to separate hours from minutes.

Specifies the number of minutes from now to stop the software processes on the router. This option is a synonym for the at + minutes option.

Specifies the boot device to boot the router from after the halt: compact-flash —Reboots from the primary compact flash drive. This is the default.

removable-compact-flash—Reboots from the optional removable compact flash drive. This option is available on J4300 and J6300 Services Routers only.

usb—Reboots from the USB drive.

Provides a message to display to all system users before the software processes on the router are stopped.

Halting the Services Router with the CLI

515

J-series™ Services Router User Guide

516

Halting the Services Router with the CLI

Chapter 25

Replacing and Troubleshooting Hardware

Components

Because many of the Services Router’s hardware components are field-replaceable units (FRUs), you can remove and replace them yourself. When you need to replace a router component, contact your customer support or sales representative to order the field-replaceable unit (FRU) that contains the component. For instructions, see

“Contacting Customer Support and Returning Hardware” on page 603.

This chapter contains the following topics:

Replacing Hardware Components on page 517

Troubleshooting Hardware Components on page 536

Replacing Hardware Components

This section contains the following topics:

Tools and Parts Required on page 518

Replacing the Console Port Cable on page 518

Replacing a PIM on page 518

Replacing PIM Cables on page 521

Removing and Installing the Primary Compact Flash Disk on page 523

Removing and Installing the Removable Compact Flash Disk on page 525

Removing and Installing the USB Drive on page 527

Removing and Installing DRAM Modules on page 529

Replacing a Power Supply Cord in a J2300 or J4300 Router on page 532

Replacing Power System Components in a J6300 Router on page 533

Replacing Hardware Components

517

J-series™ Services Router User Guide

Tools and Parts Required

To replace hardware components, you need the tools and parts listed in Table 198.

Table 198: Tools and Parts Required

Tool or Part

Electrostatic bag or antistatic mat

Electrostatic discharge (ESD) grounding wrist strap

Phillips (+) screwdriver, number 2

Components

All

All

PIM

DRAM

Compact flash

Replacing the Console Port Cable

The RJ-45 port labeled

CONSOLE on the Services Router’s front panel allows you to connect the router to an external management device, such as a

laptop or a terminal server. For cable specifications, see “Network Cable

Specifications and Connector Pinouts” on page 551.

To replace the console port cable, follow this procedure:

1.

2.

3.

Locate an appropriate replacement cable and connector.

Plug the Ethernet connector at either end of the cable into the

CONSOLE port

on the front panel (see Figure 22 and Figure 23).

Plug the connector at the other end of the cable into the external management device. If you are connecting to a DB-9 serial port, use the provided RJ-45 to DB-9 serial port adapter.

Replacing a PIM

Physical Interface Modules (PIMs) in J4300 and J6300 Services Routers are field replaceable. The router must be powered off before the PIMs are removed or installed. This section contains the following topics:

“Removing a PIM” on page 519

“Installing a PIM” on page 520

518

Replacing Hardware Components

Replacing and Troubleshooting Hardware Components

Removing a PIM

The PIMs are installed in the front of the Services Router. A PIM weighs less than 1 lb (0.5 kg).

To remove a PIM (see Figure 100):

1.

2.

3.

4.

5.

Place an electrostatic bag or antistatic mat on a flat, stable surface to receive the PIM.

Attach an electrostatic discharge (ESD) grounding strap to your bare wrist and connect the strap to the ESD point on the chassis, or to an outside ESD point if the Services Router is disconnected from earth ground. For more information

about ESD, see “Preventing Electrostatic Discharge Damage” on page 567.

Press and release the power button to power off the router. Verify that the

POWER ON

LED blinks and then turns off.

Label the cables connected to the PIM so that you can later reconnect each cable to the correct PIM.

Disconnect the cables from the PIM.

6.

If necessary, arrange the cables to prevent them from dislodging or developing stress points:

Secure the cable so that it is not supporting its own weight as it hangs to the floor.

Place excess cable out of the way in a neatly coiled loop.

Use fasteners to maintain the shape of cable loops.

7.

8.

9.

Loosen the captive screws on each side of the PIM faceplate.

Grasp the handles on each side of the PIM faceplate and slide the PIM out of the router. Place it in the electrostatic bag or on the antistatic mat.

If you are not reinstalling a PIM into the emptied slot, install a blank PIM panel over the slot to maintain proper airflow.

Replacing Hardware Components

519

J-series™ Services Router User Guide

Figure 100: Removing a PIM

J4300

ALAR

M

POWE

R ON

CONS

OLE

USB

PORT

0

STATU

S

PORT

0

PORT

1

PORT

1

STATUS

EJECT

IN

USE COMP

ACT F

LASH

Captive screws

Installing a PIM

To install a PIM (see Figure 101):

1.

Attach an electrostatic discharge (ESD) grounding strap to your bare wrist and connect the strap to the ESD point on the chassis, or to an outside ESD point if the Services Router is disconnected from earth ground. For more information

about ESD, see “Preventing Electrostatic Discharge Damage” on page 567.

2.

3.

Press and release the power button to power off the router. Verify that the

POWER ON

LED blinks and then turns off.

Align the notches in the connector at the rear of the PIM with the notches in the PIM slot in the Services Router, and then slide the PIM in until it lodges firmly in the router.

CAUTION: Slide the PIM straight into the slot to avoid damaging the components on the PIM.

4.

5.

6.

Tighten the captive screws on each side of the PIM faceplate.

Insert the appropriate cables into the cable connectors on the PIM.

If necessary, arrange the cables to prevent them from dislodging or developing stress points:

520

Replacing Hardware Components

Replacing and Troubleshooting Hardware Components

Secure the cable so that it is not supporting its own weight as it hangs to the floor.

Place excess cable out of the way in a neatly coiled loop.

Use fasteners to maintain the shape of cable loops.

7.

8.

Press and release the power button to power on the router. Verify that the

POWER ON

LED lights steadily after you press the power button.

Verify that the PIM status LED lights steadily green to confirm that the PIM is online.

You can also verify correct PIM functioning by issuing the show chassis fpc pic-status command described in the JUNOS Protocols, Class of Service, and

System Basics Command Reference.

Figure 101: Installing a PIM

J4300

ALAR

M

POWE

R ON

CONS

OLE

USB

PORT

0

STATUS

PORT

0

PORT

1

PORT

1

STATUS

EJECT

IN

USE COMP

ACT F

LASH

Replacing PIM Cables

Removing and installing PIM cables does not affect Services Router function, except that a PIM does not receive or transmit data while its cable is disconnected. To replace a PIM cable, perform the following procedures:

“Removing a PIM Cable” on page 522

“Installing a PIM Cable” on page 522

Replacing Hardware Components

521

J-series™ Services Router User Guide

Removing a PIM Cable

To remove a PIM cable:

1.

If you are removing all cables connected to the PIM, issue the following CLI command to take the PIM offline: user@host> request chassis pic fpc-slot fpc-slot

pic-slot

pim-slot

offline

For example, to take the PIM in slot 4 offline, enter the following command: user@host> request chassis pic fpc-slot 4 pic-slot 0 offline

2.

3.

For more information about the command, see the JUNOS Protocols, Class of

Service, and System Basics Command Reference.

Unplug the cable from the cable connector port.

Detach the cable from the destination port.

Installing a PIM Cable

2.

3.

To install a PIM cable:

1.

Have ready a length of the type of cable used by the PIM. For cable

specifications, see “Network Cable Specifications and Connector Pinouts” on page 551.

Insert the cable connector into the cable connector port on the PIM faceplate.

Arrange the cable as necessary to prevent it from dislodging or developing stress points:

Secure the cable so that it is not supporting its own weight as it hangs to the floor.

Place excess cable out of the way in a neatly coiled loop.

5.

6.

4.

Use fasteners to maintain the shape of cable loops.

Insert the other end of the cable into the destination port.

Repeat the previous steps for any additional cables.

If the PIM is offline (its status LED is steadily red), issue the following CLI command to bring the PIM online: user@host> request chassis pic fpc-slot fpc-slot

pic-slot

pim-slot

online

522

Replacing Hardware Components

Replacing and Troubleshooting Hardware Components

For example, to bring the PIM in slot 4 online, enter the following command: user@host> request chassis pic fpc-slot 4 pic-slot 0 online

7.

For more information about the command, see the JUNOS Protocols, Class of

Service, and System Basics Command Reference.

Verify that the PIM status LED shines steadily green to confirm that the PIM is online.

You can also verify correct PIM functioning by issuing the show chassis fpc pic-status command described in the JUNOS Protocols, Class of Service, and

System Basics Command Reference.

Removing and Installing the Primary Compact Flash Disk

The primary compact flash drive is located in a slot at the rear of the Services

Router as shown in Figure 2, Figure 7, and Figure 8. The compact flash disk that

you install in the compact flash drive provides primary storage for the router. It can accommodate software images, configuration files, and microcode.

For information about configuring the primary compact flash disk, see

“Configuring Boot Devices” on page 508.

To remove and install a primary compact flash disk, perform the following procedures:

“Removing the Primary Compact Flash Disk” on page 523

“Installing the Primary Compact Flash Disk” on page 524

Removing the Primary Compact Flash Disk

To remove the primary compact flash disk (see Figure 102):

1.

2.

Place an electrostatic bag or antistatic mat on a flat, stable surface.

Attach an electrostatic discharge (ESD) grounding strap to your bare wrist and connect the strap to the ESD point on the chassis, or to an outside ESD point if the router is disconnected from earth ground. For more information about

ESD, see “Preventing Electrostatic Discharge Damage” on page 567.

3.

Press and release the power button to power off the router. Wait for the

POWER ON

LED to turn off.

4.

Re move th e powe r c ord f ro m the powe r s up ply.

5.

6.

Loosen the thumbscrew that secures the primary compact flash drive cover on the rear of the chassis.

Remove the compact flash drive cover.

Replacing Hardware Components

523

J-series™ Services Router User Guide

7.

Gently grasp the compact flash disk, and slide it out of the connector.

8.

Place the compact flash disk on the antistatic mat or in the electrostatic

bag (see Figure 102).

Figure 102: Removing the Primary Compact Flash Disk

Installing the Primary Compact Flash Disk

To install the primary compact flash disk (see Figure 103):

NOTE: If you plan to boot the Services Router from the primary compact flash disk, you must first configure the primary compact flash disk in another router or with

a computer running UNIX or Cygwin. For more information, see “Configuring

Boot Devices” on page 508.

1.

Attach an electrostatic discharge (ESD) grounding strap to your bare wrist and connect the strap to the ESD point on the chassis, or to an outside ESD point if the router is disconnected from earth ground. For more information about

ESD, see “Preventing Electrostatic Discharge Damage” on page 567.

2.

Press and release the power button to power off the router. Wait for the

POWER ON

LED to turn off.

3.

Re move th e powe r c ord f ro m

the powe r s up ply.

4.

5.

Loosen the thumbscrew that secures the primary compact flash drive cover on the rear of the chassis.

Remove the compact flash drive cover.

6.

7.

Slide the compact flash disk into the connector on the Routing Engine (see

Figure 103).

Replace the compact flash drive cover.

524

Replacing Hardware Components

Replacing and Troubleshooting Hardware Components

8.

Tighten the thumbscrew that secures the compact flash drive cover to the rear of the chassis.

Install the power cord into the power supply.

9.

10.

Press and release the power button to power on the router. Verify that the

POWER ON

LED lights steadily after you press the power button.

Figure 103: Installing the Primary Compact Flash Disk

Removing and Installing the Removable Compact Flash Disk

The removable compact flash drive is an optional component on J4300 and

J6300 Services Routers. The removable compact flash disk provides secondary storage for the router. It can accommodate software images, configuration files, and microcode. If the primary compact flash disk fails on startup, the router boots from the removable compact flash disk.

For information about configuring the removable compact flash disk,

see “Configuring Boot Devices” on page 508.

To remove and install a removable compact flash disk, perform the following procedures:

“Removing the Removable Compact Flash Disk” on page 525

“Installing the Removable Compact Flash Disk” on page 527

Removing the Removable Compact Flash Disk

NOTE: Depending on your configuration, the Services Router might not have a backup compact flash drive. If no backup compact flash drive is installed,

proceed directly to the next section, “Installing the Removable Compact Flash

Disk” on page 527.

Replacing Hardware Components

525

J-series™ Services Router User Guide

The removable compact flash drive is located in a slot on the front panel of the

Services Router. To remove the removable compact flash disk (see Figure 104):

1.

Place an electrostatic bag or antistatic mat on a flat, stable surface.

2.

Attach an electrostatic discharge (ESD) grounding strap to your bare wrist and connect the strap to the ESD point on the chassis, or to an outside ESD point if the router is disconnected from earth ground. For more information about

ESD, see “Preventing Electrostatic Discharge Damage” on page 567.

3.

Verify the

CF REMOVE

LED is off.

If the

CF REMOVE

LED is on, the router might have booted from the removable compact flash disk.

To see which device the router used to boot, issue the show system storage command from the CLI. For example: user@host> show system storage

Filesystem

/dev/ad0s1a

...

512-blocks

218254

Used

175546

Avail Capacity Mounted on

40526 81% /

7.

8.

4.

5.

6.

The boot device is mounted on

/

. The primary compact flash disk is located at ad0

. The removable compact flash disk is located at ad2

. The USB drive is located at usb0

. This example shows that the router booted from the primary compact flash disk.

If the show system storage output indicates that the router booted from the removable compact flash disk, press and release the power button to power off the router. Wait for the

POWER ON

LED to turn off before you remove the compact flash drive.

Slide the compact flash drive door up to unlatch the door, then tilt the top of

the door out (see Figure 104).

Eject the removable compact flash disk by pressing the button to the left of the compact flash drive once to unlock the button, and again to eject the compact flash drive.

Gently grasp the compact flash disk, and slide it out of the connector.

Place the compact flash disk on the antistatic mat or in the electrostatic bag.

526

Replacing Hardware Components

Figure 104: Removing the Removable Compact Flash Disk

Replacing and Troubleshooting Hardware Components

Installing the Removable Compact Flash Disk

3.

4.

5.

To install the removable compact flash disk, follow this procedure (see Figure 105):

1.

2.

Attach an electrostatic discharge (ESD) grounding strap to your bare wrist and connect the strap to the ESD point on the chassis, or to an outside ESD point if the router is disconnected from earth ground. For more information about

ESD, see “Preventing Electrostatic Discharge Damage” on page 567.

Slide the compact flash door up to unlatch the door, then tilt the top of the

door out (see Figure 105).

Slide the compact flash disk into the connector on the Routing Engine.

Tilt the compact flash door in, and slide it down until it is secured.

To configure the removable compact flash disk with the request system snapshot

command, see “Configuring Boot Devices with the CLI” on page 508.

Figure 105: Installing the Removable Compact Flash Disk

Removing and Installing the USB Drive

The USB drive is an optional component on J-series Services Routers. If installed, the USB drive provides secondary storage for the router. It can accommodate software images, configuration files, and microcode. If the

Replacing Hardware Components

527

J-series™ Services Router User Guide primary compact flash disk fails on startup, and the removable compact flash disk is not installed or fails, the router boots from the USB drive.

For information about configuring the USB drive, see “Configuring

Boot Devices” on page 508.

NOTE: For a list of supported USB drives, see the J-series release notes at http://www.juniper.net

.

To remove and install a USB drive, perform the following procedures:

“Removing the USB Drive” on page 528

“Installing the USB Drive” on page 529

Removing the USB Drive

NOTE: Depending on your configuration, the Services Router might not have a USB

drive. If no USB drive is installed, proceed directly to the next section, “Installing the USB Drive” on page 529.

The USB drive is installed into the USB port on the front panel of the

Services Router. To remove the USB drive:

1.

2.

Place an electrostatic bag or antistatic mat on a flat, stable surface.

Attach an electrostatic discharge (ESD) grounding strap to your bare wrist and connect the strap to the ESD point on the chassis, or to an outside ESD point if the router is disconnected from earth ground. For more information about

ESD, see “Preventing Electrostatic Discharge Damage” on page 567.

3.

Verify that the router did not boot from the USB drive by issuing the show system storage command from the CLI. For example: user@host> show system storage

Filesystem

/dev/ad0s1a

...

512-blocks

218254

Used

175546

Avail Capacity Mounted on

40526 81% /

4.

The boot device is mounted on

/

. The primary compact flash disk is located at ad0

. The removable compact flash disk is located at ad2

. The USB drive is located at usb0

. This example shows that the router booted from the primary compact flash disk.

If the show system storage output indicates that the router booted from the USB drive, press and release the power button to power off the router. Wait for the

POWER ON

LED to turn off before you remove the USB drive.

528

Replacing Hardware Components

Replacing and Troubleshooting Hardware Components

5.

Gently grasp the USB drive and slide it out of the USB port.

6.

Place the USB drive on the antistatic mat or in the electrostatic bag.

Installing the USB Drive

To install the USB drive:

NOTE: For a list of supported USB drives, see the J-series release notes at http://www.juniper.net

.

2.

3.

1.

4.

Attach an electrostatic discharge (ESD) grounding strap to your bare wrist and connect the strap to the ESD point on the chassis, or to an outside ESD point if the router is disconnected from earth ground. For more information about

ESD, see “Preventing Electrostatic Discharge Damage” on page 567.

Orient the USB drive with the USB port on the front panel of the router.

Insert the USB drive into the USB port. If the USB drive does not easily slide into the port, it might not be oriented correctly. Turn the USB drive upside-down and try again.

To configure the USB drive with the request system snapshot command, see

“Configuring Boot Devices with the CLI” on page 508.

Removing and Installing DRAM Modules

The DRAM installed on the Routing Engine provides storage for the routing and forwarding tables and for other Routing Engine processes. The design of the

Routing Engine allows you to modify the DRAM configuration by adding DIMM memory modules to the Routing Engine board, or removing DIMMs from the board. The Routing Engine contains one or two 168-pin DIMMs.

To modify the DRAM configuration, use the following procedures:

“Removing a DRAM Module” on page 529

“Installing a DRAM Module” on page 531

Removing a DRAM Module

NOTE: Depending on your configuration, the Services Router might have an empty

DRAM slot. If you are adding a single DIMM to the DRAM configuration, proceed

directly to the next section, “Installing a DRAM Module” on page 531.

Replacing Hardware Components

529

J-series™ Services Router User Guide

The DRAM modules are located on the top of the Routing Engine.

To remove a DRAM module:

1.

Place an electrostatic bag or antistatic mat on a flat, stable surface.

2.

Attach an electrostatic discharge (ESD) grounding strap to your bare wrist and connect the strap to the ESD point on the chassis, or to an outside ESD point if the router is disconnected from earth ground. For more information about

ESD, see “Preventing Electrostatic Discharge Damage” on page 567.

3.

4.

Press and release the power button to power off the router. Wait for the

POWER ON

LED to turn off.

Loosen the thumbscrews at the rear of the chassis that secure the cover to the chassis.

5.

6.

7.

8.

Slide the cover off the chassis.

To release the DRAM module, press the plastic ejectors on both sides of the

module (see Figure 106).

Grasp the DRAM module, being careful not to touch any electrical components on the module, and firmly pull it out of the slot on the Routing Engine.

Place the DRAM module on the antistatic mat or in the electrostatic bag.

530

Replacing Hardware Components

Figure 106: Removing a DRAM Module from the Routing Engine

Chassis rear

Replacing and Troubleshooting Hardware Components

Installing a DRAM Module

To install a DRAM module onto the Routing Engine (see Figure 107):

1.

2.

Attach an electrostatic discharge (ESD) grounding strap to your bare wrist and connect the strap to the ESD point on the chassis, or to an outside ESD point if the router is disconnected from earth ground. For more information about

ESD, see “Preventing Electrostatic Discharge Damage” on page 567.

Press and release the power button to power off the router. Wait for the

POWER ON

LED to turn off.

4.

5.

3.

Loosen the thumbscrews at the rear of the chassis that secure the cover to the chassis.

Slide the cover off the chassis.

Remove the DRAM module from its electrostatic bag.

6.

7.

To open the empty DRAM slot, press the plastic ejectors on both sides (see

Figure 107).

Grasp the DRAM module by the edges, being careful not to touch any electrical components.

Replacing Hardware Components

531

J-series™ Services Router User Guide

8.

Pressing firmly on both ends, push the module into the slot until the ejectors

return completely to the closed position (see Figure 107).

Slide the cover onto the chassis.

9.

10.

Tighten the thumbscrews at the rear of the chassis that secure the cover to the chassis.

11.

Press and release the power button to power on the router. Verify that the

POWER ON

LED lights steadily after you press the power button.

You can view the DRAM configuration and verify it was installed correctly by issuing the show chassis routing-engine command, described in the JUNOS

Protocols, Class of Service, and System Basics Command Reference.

Figure 107: Installing a DRAM Module

Chassis rear

Replacing a Power Supply Cord in a J2300 or J4300 Router

To replace the power cord for an AC power supply:

1.

Locate a replacement power cord with the type of plug appropriate for

your geographical location (see “AC Power, Connection, and Power Cord

Specifications” on page 547).

532

Replacing Hardware Components

Replacing and Troubleshooting Hardware Components

4.

5.

6.

2.

3.

7.

Attach an electrostatic discharge (ESD) grounding strap to your bare wrist and connect the strap to the ESD point on the chassis, or to an outside ESD point if the router is disconnected from earth ground. For more information about

ESD, see “Preventing Electrostatic Discharge Damage” on page 567.

Press and release the power button to power off the Services Router. Wait for the

POWER ON

LED to turn off.

Unplug the power cord from the power source receptacle.

Unplug the power cord from the appliance inlet on the power supply faceplate.

Insert the appliance coupler end of the replacement power cord into the appliance inlet on the power supply faceplate.

Insert the power cord plug into an AC power source receptacle.

NOTE: The router must be connected to a dedicated AC power feed. For information

about connecting to AC power sources, see “Connecting Power to the Services

Router” on page 43.

8.

9.

Press and release the power button to power on the router. Verify that the

POWER ON

LED lights steadily after you press the power button.

Verify that the power cord does not block access to router components or drape where people might trip on it.

Replacing Power System Components in a J6300 Router

The J6300 Services Router has one or two load-sharing AC power supplies

(see Figure 8), located at the right rear of the chassis. Each AC power supply

provides power to all components in the router. The AC power supplies are fully redundant. If one power supply fails or is removed, the remaining power supply instantly assumes the entire electrical load. One power supply can provide full power for as long as the router is operational.

Each J6300 power supply is hot-insertable and hot-removable. To replace a power supply in a J6300 router, use the following procedures:

“Removing a Power Supply in a J6300 Router” on page 534

“Installing a Power Supply in a J6300 Router” on page 535

“Replacing a Power Supply Cord in a J6300 Router” on page 536

Replacing Hardware Components

533

J-series™ Services Router User Guide

Removing a Power Supply in a J6300 Router

The power supplies are located at the right rear of the chassis. A power supply weighs 2.4 lb (1.1 kg).

CAUTION: Do not leave a power supply slot empty for more than a short time while the Services Router is operational. The power supply or a blank power supply panel must remain in the chassis for proper airflow.

To remove a power supply from a J6300 Services Router:

1.

Attach an electrostatic discharge (ESD) grounding strap to your bare wrist and connect the strap to the ESD point on the chassis, or to an outside ESD point if the router is disconnected from earth ground. For more information about

ESD, see “Preventing Electrostatic Discharge Damage” on page 567.

2.

3.

4.

Unplug the power cord from the power source receptacle.

Unplug the power cord from the appliance inlet on the power supply faceplate.

Slide the red ejector tab on the power supply faceplate to the right and hold it in place, to unlock the power supply.

5.

6.

Grasp the handle on the power supply faceplate, and pull firmly to start

removing the power supply. Slide it halfway out of the chassis (see Figure 108).

Place one hand underneath the power supply to support it and slide it completely out of the chassis.

7.

If you are not reinstalling a power supply into the emptied slot, install a blank power supply panel over the slot.

Figure 108: Removing a Power Supply

534

Replacing Hardware Components

Replacing and Troubleshooting Hardware Components

Installing a Power Supply in a J6300 Router

To install a power supply in a J6300 Services Router (see Figure 109):

1.

2.

3.

4.

Attach an electrostatic discharge (ESD) grounding strap to your bare wrist and connect the strap to the ESD point on the chassis, or to an outside ESD point if the router is disconnected from earth ground. For more information about

ESD, see “Preventing Electrostatic Discharge Damage” on page 567.

Using both hands, slide the power supply into the chassis until you feel resistance.

Firmly push the power supply into the chassis until it comes to a stop. Make sure that the power supply faceplate is flush with any adjacent power supply faceplate.

Insert the appliance coupler end of a power cord into the appliance inlet on the power supply faceplate.

5.

Insert the power cord plug into an AC power source receptacle.

NOTE: Each power supply must be connected to a dedicated AC power feed.

For information about connecting to AC power sources, see “Connecting Power to the Services Router” on page 43.

6.

Verify that the power cord does not block access to router components or drape where people might trip on it.

Figure 109: Installing an AC Power Supply

Replacing Hardware Components

535

J-series™ Services Router User Guide

Replacing a Power Supply Cord in a J6300 Router

To replace the power cord for a redundant power supply:

1.

Locate a replacement power cord with the type of plug appropriate for

your geographical location (see “AC Power, Connection, and Power Cord

Specifications” on page 547).

2.

Attach an electrostatic discharge (ESD) grounding strap to your bare wrist and connect the strap to the ESD point on the chassis, or to an outside ESD point if the router is disconnected from earth ground. For more information about

ESD, see “Preventing Electrostatic Discharge Damage” on page 567.

3.

4.

5.

Unplug the power cord from the power source receptacle.

Unplug the power cord from the appliance inlet on the power supply faceplate.

Insert the appliance coupler end of the replacement power cord into the appliance inlet on the power supply faceplate.

6.

Insert the power cord plug into an AC power source receptacle.

NOTE: Each power supply must be connected to a dedicated AC power feed.

For information about connecting to AC power sources, see “Connecting Power to the Services Router” on page 43.

7.

Verify that the power cord does not block access to Services Router components or drape where people might trip on it.

Troubleshooting Hardware Components

This section provides an overview of the resources you can use to troubleshoot hardware problems on the Services Router:

Chassis Alarm Conditions on page 536

Contacting the Juniper Networks Technical Assistance Center on page 538

Chassis Alarm Conditions

When the Routing Engine detects an alarm condition, it lights the yellow (amber)

ALARM LED on the front panel as appropriate. To view a more detailed description of the alarm cause, issue the show chassis alarms

CLI command:

536

Troubleshooting Hardware Components

Replacing and Troubleshooting Hardware Components

NOTE: The ALARM LED on the Services Router is a single color alarm regardless of the severity of the alarm condition (critical, major, or minor). When an alarm condition triggers the LED, you see the yellow light turn on.

user@host> show chassis alarms

Table 199 describes alarms that can occur for a chassis component such as

the Routing Engine or a Physical Interface Module (PIM).

Table 199: Chassis Alarm Conditions

Component

Alternative boot media

PIM

Alarm Conditions

The Services Router boots from an alternative boot device—the removable compact flash disk or the

USB drive.

Remedy

If you did not configure the router to boot from an alternative boot device, contact JTAC.

(See “Contacting the

Juniper Networks Technical

Assistance Center” on page

538.)

Typically, the router boots from the primary compact flash disk. If you configured your router to boot from an alternative boot device, ignore this alarm condition.

A PIM has failed.

When a PIM fails, it attempts to reboot. If the Routing

Engine detects that a PIM is rebooting too often, it shuts down the PIM.

Replace the failed PIM. (See

“Replacing a PIM” on page

518.)

Alarm Severity

Yellow (critical)

Red (warning)

Troubleshooting Hardware Components

537

J-series™ Services Router User Guide

Component

Routing Engine

Alarm Conditions

An error occurred during the process of reading or writing compact flash.

Remedy

Reformat the compact flash and install a bootable image.

(See “Performing Software

Upgrades and Reboots” on page 501.)

Alarm Severity

Yellow (critical)

Routing Engine temperature is too warm.

Routing Engine temperature is too hot.

If this remedy fails, you must replace the failed

Routing Engine. To contact

JTAC, see “Contacting the

Juniper Networks Technical

Assistance Center” on page

538.

Check the room temperature.

(See “Router

Environmental

Tolerances” on page

543.)

Yellow (critical)

Red (warning)

Check the air flow.

(See “General Site

Guidelines” on page

541.)

Check the fans.

(See “J2300 Cooling

System” on page 15

or “J4300 and J6300

Cooling System” on page 27.) If

you must replace a fan or the Routing

Engine, contact JTAC.

(See “Contacting the

Juniper Networks

Technical Assistance

Center” on page

538.)

Routing Engine fan has failed.

Replace the failed fan. To

contact JTAC, see “Contacting

the Juniper Networks

Technical Assistance Center” on page 538.

Red (warning)

Contacting the Juniper Networks Technical Assistance Center

If you need assistance while troubleshooting a Services Router, open a support case using the Case Manager link at http://www.juniper.net/support/

, or call 1-888-314-JTAC

(within the United States) or 1-408-745-9500 (from outside the United States).

538

Troubleshooting Hardware Components

Part 10

J-series Requirements and

Specifications

Preparing for Router Installation on page 541

Network Cable Specifications and Connector Pinouts on page 551

Safety and Regulatory Compliance Information on page 563

J-series Requirements and Specifications 539

540

J-series Requirements and Specifications

Chapter 26

Preparing for Router Installation

This chapter describes how to prepare for installation of a J-series Services Router. It discusses the following topics:

General Site Guidelines on page 541

Desktop and Wall Mounting Requirements on page 542

Rack Requirements on page 542

Router Environmental Tolerances on page 543

Fire Safety Requirements on page 544

Power Guidelines, Requirements, and Specifications on page 545

Network Cable Specifications on page 548

Site Preparation Checklist on page 548

General Site Guidelines

The following precautions help you plan an acceptable operating environment for your Services Router and avoid environmentally caused equipment failures:

For the cooling system to function properly, the airflow around the chassis must be unrestricted. Allow at least 6 in. (15.2 cm) of clearance between the front and back of the chassis and adjacent equipment. Ensure that there is adequate circulation in the installation location.

Follow ESD procedures described in “Preventing Electrostatic Discharge

Damage” on page 567, to avoid damaging equipment. Static discharge can

cause components to fail completely or intermittently over time.

Install blank PIM panels in empty slots, to prevent any interruption or reduction in the flow of air across internal components.

General Site Guidelines

541

J-series™ Services Router User Guide

Desktop and Wall Mounting Requirements

The J2300 Services Router can be installed on a desktop or wall. When choosing a location, allow at least 6 in. (15.2 cm) of clearance between the front and back of the chassis and adjacent equipment or walls.

If you are mounting the J2300 router on a wall, use wall screws or wall anchors capable of supporting the full weight of the chassis, up to 12 lb (5.4 kg). If possible, install the wall anchors into wall studs, which provide added support for the chassis.

Rack Requirements

All J-series Services Routers can be installed in a rack. J4300 and J6300 Services

Routers must be installed in a rack. Many types of racks are acceptable, including front-mount racks, four-post (telco) racks, and center-mount racks.

The following sections describe rack requirements:

Rack Size and Strength on page 542

Spacing of Mounting Holes on page 543

Connection to Building Structure on page 543

Rack Size and Strength

The Services Router is designed for installation in a rack that complies with either of the following standards:

A 19-in. rack as defined in Cabinets, Racks, Panels, and Associated Equipment

(document number EIA-310-D) published by the Electronics Industry

Association ( http://www.eia.org

)

A 600-mm rack as defined in the four-part Equipment Engineering (EE);

European telecommunications standard for equipment practice (document numbers ETS 300 119-1 through 119-4) published by the European

Telecommunications Standards Institute ( http://www.etsi.org

)

The horizontal spacing between the rails in a rack that complies with this standard is usually wider than the router’s mounting ears, which measure

19 in. (48.2 cm) from outer edge to outer edge. Use approved wing devices to narrow the opening between the rails as required.

The rack rails must be spaced widely enough to accommodate the router chassis’s external dimensions:

A J2300 chassis is 1.75 in. (4.4 cm) high, 12.37 in. (31.4 cm) deep, and

17.25 in. (43.8 cm) wide.

A J4300 or J6300 chassis is 3.5 in. (8.9 cm) high, 19 in. (48.3 cm) deep, and 17 in. (43.2 cm) wide.

542

Rack Requirements

Preparing for Router Installation

The outer edges of the mounting ears extend the width of either chassis to 19 in. (48.2 cm), and the front of the chassis extends approximately

0.5 in. (1.27 cm) beyond the mounting ears. The spacing of rails and adjacent racks must also allow for the clearances around the router and

rack. (See “General Site Guidelines” on page 541.)

CAUTION: If you are mounting the router in a cabinet, be sure that ventilation is sufficient to prevent overheating.

If a front-mount rack is used, we recommend supporting the back of the router with a shelf or other structure.

The J2300 chassis height of 1.75 in. (4.4 cm) equals 1 U. The J4300 and J6300 chassis height of 3.5 in. (8.9 cm) equals 2 U. Each U is a standard rack unit defined in Cabinets, Racks, Panels, and Associated Equipment (document number

EIA-310-D) published by the Electronics Industry Association.

Spacing of Mounting Holes

The mounting holes in the mounting brackets provided with the

J2300 Services Router chassis are spaced 1.25 in. (3.2 cm) apart, measured from the center of each hole.

The mounting holes in the mounting brackets attached to the J4300 and J6300 chassis are spaced in two groups. The space between the holes in each group is 0.6

in. (1.5 cm) apart, measured from the center of each hole. The space between the two groups is 1.75 in. (4.4 cm) apart, measured from the center of the lower hole in the top group to the upper hole in the bottom group.

Connection to Building Structure

Always secure the rack to the structure of the building. If your geographical area is subject to earthquakes, bolt the rack to the floor. For maximum stability, also secure the rack to ceiling brackets. For more information, see

“Rack-Mounting Requirements and Warnings” on page 578.

Router Environmental Tolerances

Table 200 specifies the environmental conditions required for normal

Services Router operation. In addition, the site must be as dust-free as possible. Dust can clog air intake vents, reducing cooling system efficiency.

Check vents frequently, cleaning them as necessary.

Router Environmental Tolerances

543

J-series™ Services Router User Guide

Table 200: Router Environmental Tolerances

Description

Altitude

Relative humidity

Temperature

Value

No performance degradation to 10,000 ft (3048 m)

Normal operation ensured in relative humidity range of 5% to

90%, noncondensing

Normal operation ensured in temperature range of 32°F (0°C) to

104°F (40°C)

Non-operating storage temperature in shipping carton:

–40°F (–40°C) to 158°F (70°C)

Seismic

Designed to meet Telcordia Technologies Zone 4 earthquake requirements

Maximum thermal output J2300: 1638 BTU/hour (480 W)

J4300: 2457 BTU/hour (720 W)

J6300: 2457 BTU/hour (720 W)

Fire Safety Requirements

In the event of a fire emergency involving Services Routers and other network equipment, the safety of people is the primary concern. Establish procedures for protecting people in the event of a fire emergency, provide safety training, and properly provision fire-control equipment and fire extinguishers.

In addition, establish procedures to protect your equipment in the event of a fire emergency. Juniper Networks products must be installed in an environment suitable for electronic equipment. We recommend that fire suppression equipment be available in the event of a fire in the vicinity of the equipment, and that all local fire, safety, and electrical codes and ordinances be observed when you are installing and operating your equipment.

Fire Suppression

In the event of an electrical hazard or an electrical fire, first unplug

the power cord. (For shutdown instructions, see “Powering a Services

Router On and Off” on page 44.)

Then, use a Type C fire extinguisher, which uses noncorrosive fire retardants, to extinguish the fire. For more information about fire extinguishers, see

“Fire Suppression Equipment” on page 544.

Fire Suppression Equipment

Type C fire extinguishers, which use noncorrosive fire retardants such as carbon dioxide (CO2) and Halotron, are most effective for suppressing electrical fires.

Type C fire extinguishers displace the oxygen from the point of combustion to

544

Fire Safety Requirements

Preparing for Router Installation eliminate the fire. For extinguishing fire on or around equipment that draws air from the environment for cooling, use this type of inert oxygen displacement extinguisher instead of an extinguisher that leave residues on equipment.

Do not use multipurpose Type ABC chemical fire extinguishers (dry chemical fire extinguishers) near Juniper Networks equipment. The primary ingredient in these fire extinguishers is monoammonium phosphate, which is very sticky and difficult to clean. In addition, in minute amounts of moisture, monoammonium phosphate can become highly corrosive and corrodes most metals.

NOTE: To keep warranties effective, do not use a dry chemical fire extinguisher to control a fire at or near a Juniper Networks router. If a dry chemical fire extinguisher is used, the unit is no longer eligible for coverage under a service agreement.

Any equipment in a room in which a chemical fire extinguisher has been discharged is subject to premature failure and unreliable operation. The equipment is considered to be irreparably damaged.

We recommend that you dispose of any irreparably damaged equipment in an environmentally responsible manner.

Power Guidelines, Requirements, and Specifications

All Services Routers use AC power. For information about each router’s power

system, see “J2300 Power System” on page 15, “J4300 Power System” on page 26, and “J6300 Power System” on page 26.

For site wiring and power system guidelines, requirements, and specifications, see the following sections:

Site Electrical Wiring Guidelines on page 545

Router Power Requirements on page 546

AC Power, Connection, and Power Cord Specifications on page 547

Site Electrical Wiring Guidelines

When planning the electrical wiring at your site, consider the factors discussed in the following sections.

Signaling Limitations

Improperly installed wires can emit radio interference. In addition, the potential for damage from lightning strikes increases if wires exceed recommended distances, or if wires pass between buildings. The electromagnetic pulse (EMP) caused by lightning can damage unshielded conductors and destroy electronic

Power Guidelines, Requirements, and Specifications

545

J-series™ Services Router User Guide devices. If your site has previously experienced such problems, you might want to consult experts in electrical surge suppression and shielding.

Radio Frequency Interference

You can reduce or eliminate the emission of radio frequency interference (RFI) from your site wiring by using twisted-pair cable with a good distribution of grounding conductors. If you must exceed the recommended distances, use a high-quality twisted-pair cable with one ground conductor for each data signal when applicable.

Electromagnetic Compatibility

If your site is susceptible to problems with electromagnetic compatibility

(EMC), particularly from lightning or radio transmitters, you might want to seek expert advice. Strong sources of electromagnetic interference (EMI) can destroy the signal drivers and receivers in the router and conduct power surges over the lines into the equipment, resulting in an electrical hazard.

It is particularly important to provide a properly grounded and shielded environment and to use electrical surge-suppression devices.

CAUTION: To comply with intrabuilding lightning/surge requirements, intrabuilding wiring must be shielded, and the shield for the wiring must be grounded at both ends.

Router Power Requirements

Table 201 lists the power system electrical specifications for the

J2300 Services Router.

Table 201: Power System Electrical Specifications for the J2300 Services Router

Item

AC input voltage

AC input line frequency

AC system current rating

Specification

Operating range: 100 to 240 VAC

47 to 63 Hz

4 to 2 A

Table 202 lists the power system electrical specifications for the

J4300 Services Router.

546

Power Guidelines, Requirements, and Specifications

Preparing for Router Installation

Table 202: Power System Electrical Specifications for the J4300 Services Router

Item

AC input voltage

AC input line frequency

AC system current rating

Specification

Operating range: 100 to 240 VAC

47 to 63 Hz

6 to 3 A

Table 203 lists the power system electrical specifications for the

J6300 Services Router.

Table 203: Power System Electrical Specifications J6300 Services Router

Item

AC input voltage

AC input line frequency

AC system current rating

Specification

Operating range: 100 to 240 VAC

47 to 63 Hz

6 to 3 A

AC Power, Connection, and Power Cord Specifications

Detachable AC power cords, each 2.5 m (approximately 8 ft) long, are supplied with the Services Router. The appliance coupler at the female end of the cord inserts into the appliance inlet on the faceplate of the AC power supply. The coupler is type C19 as described by International Electrotechnical Commission

(IEC) standard 60320. The plug at the male end of the power cord fits into the power source receptacle that is standard for your geographical location.

NOTE: In North America, AC power cords must not exceed 4.5 m (approximately

14.75 ft) in. length, to comply with National Electrical Code (NEC) Sections 400-8

(NFPA 75, 5-2.2) and 210-52, and Canadian Electrical Code (CEC) Section 4-010(3).

The cords supplied with the router are in compliance.

Table 204 lists power cord specifications and Figure 110 illustrates the plug

on the AC power cord provided for each country or region.

Table 204: AC Power Cord Specifications

Country

Australia

China

Europe (except Italy and

United Kingdom)

Electrical Specifications

250 VAC, 10 A, 50 Hz

250 VAC, 10 A, 50 Hz

250 VAC, 10 A, 50 Hz

Plug Standards

AS/NZ 3112–1993

GB2099.1 1996 and GB1002 1996 (CH1-10P)

CEE (7) VII

Power Guidelines, Requirements, and Specifications

547

J-series™ Services Router User Guide

Country

Italy

Japan

North America

United Kingdom

Figure 110: AC Plug Types

Electrical Specifications

250 VAC, 10 A, 50 Hz

125 VAC, 12 A, 50 Hz or 60 Hz

125 VAC, 10 A, 60 Hz

250 VAC, 10 A, 50 Hz

Plug Standards

CEI 23–16/VII

JIS 8303

NEMA 5-15

BS 1363A

Australia China Europe Italy Japan North America UK

NOTE: Power cords and cables must not block access to router components or drape where people might trip on them.

For information about the AC power supply, see “J2300 Power System” on page 15,

“J4300 Power System” on page 26, or “J6300 Power System” on page 26.

To connect the power cord during initial installation, see “Connecting

Power to the Services Router” on page 43.

To replace the AC power cord, see “Replacing a Power Supply Cord in

a J2300 or J4300 Router” on page 532 or “Replacing a Power Supply

Cord in a J6300 Router” on page 536.

Network Cable Specifications

The Services Router supports interfaces that use various kinds of network cable.

For information about the type of cable used by each interface, see “Network

Cable Specifications and Connector Pinouts” on page 551.

Site Preparation Checklist

The checklist in Table 205 summarizes the tasks you need to perform when

preparing a site for Services Router installation.

548

Site Preparation Checklist

Preparing for Router Installation

Table 205: Site Preparation Checklist

Item or Task

Verify that environmental factors such as temperature and humidity do not exceed router tolerances.

Measure the distances between external power sources and the router installation site.

Select the type of rack.

Plan the rack location, including required space clearances.

Secure the rack to the floor and the building structure.

Acquire appropriate cables and connectors.

Performed By Date Notes

Site Preparation Checklist

549

J-series™ Services Router User Guide

550

Site Preparation Checklist

Chapter 27

Network Cable Specifications and

Connector Pinouts

The network interfaces supported on the router accept different kinds of network cable.

Serial PIM Cable Specifications on page 551

RJ-45 Connector Pinouts for the Routing Engine (Ethernet) Port on page 559

DB-9 Connector Pinouts for the Console Port on page 559

E1 and T1 RJ-48 Cable Pinouts on page 560

Serial PIM Cable Specifications

The 2-port serial PIM uses the cables and connectors summarized in Table 206.

Pinouts are detailed in Table 207 through Table 216.

Table 206: 2-Port Serial PIM Cables and Connectors

Name

RS-232 DTE

RS-232 DCE

RS-422/449 (EIA-449)

DTE

RS-422/449 (EIA-449)

DCE

EIA-530A DTE

EIA-530A DCE

V.35 DTE

Connector

DB-25 male

DB-25 female

DC-37 (DB-37) male

DC-37 (DB-37) female

DB-25 male

DB-25 female

M/34 male

Connector Hardware

End-to-End

Conductors

4-40 threaded jackscrews

13

4-40 threaded jacknuts

13

4-40 threaded jackscrews

25

4-40 threaded jacknuts 25

4-40 threaded jackscrews

23

4-40 threaded jacknuts

22

Standard (Normally included with M/34 connector shell)

18

Pinouts

Table 207

Table 208

Table 209

Table 210

Table 211

Table 212

Table 213

Serial PIM Cable Specifications

551

J-series™ Services Router User Guide

Name

V.35 DCE

X.21 DTE

X.21 DCE

Connector

M/34 female

DB-15 male

DB-15 female

RS-232 DTE Cable Pinout

Table 207: RS-232 DTE Cable Pinout

LFH-60 Pin

9

57

13

56

15

60

1

48

37

5

41

33

52

22 to 21

18 to 17

DB-25 Pin

6

7

8

15

3

4

1

2

5

17

18

20

24

RS-232 DCE Cable Pinout

Table 208: RS-232 DCE Cable Pinout

LFH-60 Pin

15

1

60

37

DB-25 Pin

1

2

3

4

Connector Hardware

End-to-End

Conductors

Standard (Normally included with M/34 connector shell)

18

M3 threaded jackscrews

13

M3 threaded jacknuts 13

Pinouts

Table 214

Table 215

Table 216

LFH-60 Pairing

LFH-60 Pairing

Description

Frame Ground

Transmit Data

Receive Data

Request to Send

Description

Frame Ground

Transmit Data

Receive Data

Request to Send

Clear to Send

Data Set Ready

Signal Ground

Data Carrier Detect

Transmit Clock

Receive Clock

Local Loopback

Data Terminal Ready

Terminal Clock

552

Serial PIM Cable Specifications

Network Cable Specifications and Connector Pinouts

LFH-60 Pin

13

56

52

45

48

33

57

9

5

22 to 21

DB-25 Pin

8

15

17

18

5

6

7

20

24

LFH-60 Pairing

RS-422/449 (EIA-449) DTE Cable Pinout

Table 209: RS-422/449 (EIA-449) DTE Cable Pinout

LFH-60 Pin

4

59

55

33

13

52

36

2

47

6

38

1

48

5

37

15

60

56

41

9

DC-37 (DB-37) Pin

20

22

23

12

13

17

19

24

25

26

27

8

9

6

7

1

4

5

10

11

60

56

1

48

5

37

10

34

14

51

LFH-60 Pairing

59

55

2

47

6

38

Description

Clear to Send

Data Set Ready

Signal Ground

Data Carrier Detect

Transmit Clock

Receive Clock

Local Loopback

Data Terminal Ready

Terminal Clock

Description

Shield Ground

Send Data (A)

Send Timing (A)

Receive Data (A)

Request to Send (A)

Receive Timing (A)

Clear to Send (A)

Local Loopback

Data Mode (A)

Terminal Ready (A)

Receive Ready (A)

Terminal Timing (A)

Signal Ground

Receive Common

Send Data (B)

Send Timing (B)

Receive Data (B)

Request to Send (B)

Receive Timing (B)

Clear to Send (B)

Serial PIM Cable Specifications

553

J-series™ Services Router User Guide

LFH-60 Pin

10

34

14

51

57

26 to 25

18 to 17

DC-37 (DB-37) Pin

29

30

31

35

37

LFH-60 Pairing

52

9

33

13

RS-422/449 (EIA-449) DCE Cable Pinout

Table 210: RS-422/449 (EIA-449) DCE Cable Pinout

LFH-60 Pin

33

9

13

5

52

48

45

15

1

56

60

37

55

59

38

51

47

36

4

2

34

10

14

DC-37 (DB-37) Pin

11

12

13

17

8

9

10

5

6

7

1

4

23

24

25

26

27

19

20

22

29

30

31

LFH-60 Pairing

1

6

34

10

14

56

60

37

52

48

33

9

13

2

55

59

38

51

47

Description

Data Mode (B)

Terminal Ready (B)

Receiver Ready (B)

Terminal Timing (B)

Send Common

Description

Shield Ground

Send Data (A)

Send Timing (A)

Receive Data (A)

Request to Send (A)

Receive Timing (A)

Clear to Send (A)

Local Loopback

Data Mode (A)

Terminal Ready (A)

Receive Ready (A)

Terminal Timing (A)

Signal Ground

Receive Common

Send Data (B)

Send Timing (B)

Receive Data (B)

Request to Send (B)

Receive Timing (B)

Clear to Send (B)

Data Mode (B)

Terminal Ready (B)

Receiver Ready (B)

554

Serial PIM Cable Specifications

Network Cable Specifications and Connector Pinouts

LFH-60 Pin

6

57

26 to 25

DC-37 (DB-37) Pin

35

37

LFH-60 Pairing

5

EIA-530A DTE Cable Pinout

6

14

51

55

38

59

56

2

5

41

47

33

4

52

26 to 25

30 to 29

18 to 17

Table 211: EIA-530A DTE Cable Pinout

LFH-60 Pin

37

9

57

13

15

60

1

48

DB-25 Pin

7

8

5

6

3

4

1

2

9

10

16

17

18

19

20

23

24

11

12

13

14

15

5

13

51

48

37

60

55

1

6

52

56

LFH-60 Pairing

59

2

47

38

14

Description

Terminal Timing (B)

Send Common

Description

Shield Ground

Transmit Data (A)

Receive Data (A)

Request to Send (A)

Clear to Send (A)

Data Set Ready (A)

Signal Ground

Received Line Signal Detector

(A)

Receive Clock (B)

Received Line Signal Detector

(B)

Terminal Timing (B)

Transmit Clock (B)

Clear to Send (B)

Transmit Data (B)

Transmit Clock (A)

Receive Data (B)

Receive Clock (A)

Local Loopback

Request to Send (B)

Data Terminal Ready (A)

Signal Ground

Terminal Timing (A)

Serial PIM Cable Specifications

555

J-series™ Services Router User Guide

EIA-530A DCE Cable Pinout

51

14

2

56

59

52

6

55

47

45

38

9

4

5

26 to 25

30 to 29

Table 212: EIA-530A DCE Cable Pinout

LFH-60 Pin

48

33

57

13

15

1

60

37

DB-25 Pin

5

6

7

8

1

2

3

4

9

10

14

15

16

17

11

12

13

18

19

20

23

24

V.35 DTE Cable Pinout

Table 213: V.35 DTE Cable Pinout

LFH-60 Pin

15

57

M/34 Pin

A

B

556

Serial PIM Cable Specifications

52

13

1

55

60

51

5

56

48

6

37

LFH-60 Pairing

2

59

38

47

14

Description

Shield Ground

Transmit Data (A)

Receive Data (A)

Request to Send (A)

Clear to Send (A)

Data Set Ready (A)

Signal Ground

Received Line Signal Detector

(A)

Receive Clock (B)

Received Line Signal Detector

(B)

Terminal Timing (B)

Transmit Clock (B)

Clear to Send (B)

Transmit Data (B)

Transmit Clock (A)

Receive Data (B)

Receive Clock (A)

Local Loopback

Request to Send (B)

Data Terminal Ready (A)

Signal Ground

Terminal Timing (A)

LFH-60 Pairing

Description

Frame Ground

Signal Ground

LFH-60 Pin

48

37

9

13

33

52

5

51

6

56

41

60

1

59

2

55

22 to 21

26 to 25

18 to 17

V.35 DCE Cable Pinout

LFH-60 Pin

1

60

2

33

13

9

45

15

57

37

48

Table 214: V.35 DCE Cable Pinout

M/34 Pin

P

R

S

E

F

H

K

C

D

A

B

M/34 Pin

X

Y

V

W

S

T

U

AA

E

F

C

D

H

K

P

R

Network Cable Specifications and Connector Pinouts

51

6

52

59

2

60

1

5

55

56

LFH-60 Pairing

Description

Request to Send

Clear to Send

Data Set Ready

Received Line Signal Detector

Data Terminal Ready

Test Mode

Transmit Data (A)

Receive Data (A)

Transmit Data (B)

Receive Data (B)

Terminal Timing (A)

Receive Timing (A)

Terminal Timing (B)

Receive Timing (B)

Transmit Timing (A)

Transmit Timing (B)

LFH-60 Pairing

2

59

1

Description

Frame Ground

Signal Ground

Request to Send

Clear to Send

Data Set Ready

Received Line Signal Detector

Data Terminal Ready

Test Mode

Transmit Data (A)

Receive Data (A)

Transmit Data (B)

Serial PIM Cable Specifications

557

J-series™ Services Router User Guide

LFH-60 Pin

59

5

52

6

51

56

55

22 to 21

26 to 25

X.21 DTE Cable Pinout

LFH-60 Pin

1

37

5

15

60

48

57

59

47

2

38

6

30 to 29

18 to 17

Table 215: X.21 DTE Cable Pinout

DB-15 Pin

12

13

8

9

10

11

4

5

6

1

2

3

M/34 Pin

T

U

V

W

X

Y

AA

LFH-60 Pairing

60

6

51

5

52

55

56

Description

Receive Data (B)

Terminal Timing (A)

Receive Timing (A)

Terminal Timing (B)

Receive Timing (B)

Transmit Timing (A)

Transmit Timing (B)

LFH-60 Pairing

48

1

37

5

6

60

59

47

2

38

Description

Shield Ground

Transmit Data (A)

Control (A)

Receive (A)

Indicate (A)

Signal Element Timing (A)

Signal Ground

Transmit Data (B)

Control (B)

Receive (B)

Indicate (B)

Signal Element Timing (B)

558

Serial PIM Cable Specifications

Network Cable Specifications and Connector Pinouts

X.21 DCE Cable Pinout

Table 216: X.21 DCE Cable Pinout

LFH-60 Pin

60

48

52

15

1

37

57

2

38

59

47

51

30 to 29

DB-15 Pin

12

13

8

9

10

11

4

5

6

1

2

3

LFH-60 Pairing

51

1

2

38

59

47

37

60

48

52

RJ-45 Connector Pinouts for the Routing Engine (Ethernet) Port

Table 217 describes the RJ-45 connector pinout information.

Table 217: RJ-45 Connector Pinout

Pin

5

6

7

8

3

4

1

2

Signal

TX+

TX-

RX+

Termination network

Termination network

RX-

Termination network

Termination network

DB-9 Connector Pinouts for the Console Port

Table 218 describes the DB-9 connector pinouts.

Description

Shield Ground

Transmit Data (A)

Control (A)

Receive (A)

Indicate (A)

Signal Element Timing (A)

Signal Ground

Transmit Data (B)

Control (B)

Receive (B)

Indicate (B)

Signal Element Timing (B)

DB-9 Connector Pinouts for the Console Port

559

J-series™ Services Router User Guide

Table 218: DB-9 Connector Pinout

Pin

5

6

3

4

1

2

7

8

9

Signal

DCD

RxD

TxD

DTR

Ground

DSR

RTS

CTS

RING

Direction

<–

–>

<–

<–

<–

<–

–>

–>

Description

Carrier Detect

Receive Data

Transmit Data

Data Terminal Ready

Signal Ground

Data Set Ready

Request To Send

Clear To Send

Ring Indicator

E1 and T1 RJ-48 Cable Pinouts

The E1 and T1 PIMs use an RJ-48 cable, which is not supplied with the PIM.

CAUTION: To maintain agency approvals, use only a properly constructed, shielded cable.

Table 219, Table 220, Table 221, and Table 222 describe the RJ-48 connector pinouts.

Table 219: RJ-48 Connector to RJ-48 Connector (Straight) Pinout

6

7

5

3

8

1

2

4

RJ-48 Pin (on T1/E1

PIM) (Data Numbering

Form)

RJ-48 Pin

(Data Numbering

Form)

1

2

4

5

3

6

No connect

No connect

Signal

RX, Ring, –

RX, Tip, +

TX, Ring, –

TX, Tip, +

Shield/Return/Ground

Shield/Return/Ground

No connect

No connect

560

E1 and T1 RJ-48 Cable Pinouts

Network Cable Specifications and Connector Pinouts

Table 220: RJ-48 Connector to RJ-48 Connector (Crossover) Pinout

1

2

4

5

3

6

7

8

RJ-48 Pin (on T1/E1

PIM)

(Data numbering form)

RJ-48 Pin

(Data numbering form)

4

2

3

5

1

6

No connect

No connect

Signal

RX/Ring/– <––>TX/Ring/–

RX/Tip/+ <––>TX/Tip/+

TX/Ring/– <––>RX/Ring/–

TX/Tip/+ <––>RX/Tip/+

Shield/Return/Ground

Shield/Return/Ground

No connect

No connect

Table 221: RJ-48 Connector to DB-15 Connector (Straight) Pinout

RJ-48 Pin (on T1/E1

PIM)

(Data numbering form)

13

14

15

8

9

10

11

12

3

6

7

4

5

1

2

DB-15 Pin

(Data numbering form)

1

4

11

3

9

2

No connect

No connect

No connect

No connect

No connect

No connect

No connect

No connect

No connect

Signal

RX/Ring/– <––>RX/Ring/–

RX/Tip/+ <––>RX/Tip/+

TX/Ring/– <––>TX/Ring/–

TX/Tip/+ <––>TX/Tip/+

Shield/Return/Ground

Shield/Return/Ground

No connect

No connect

No connect

No connect

No connect

No connect

No connect

No connect

No connect

E1 and T1 RJ-48 Cable Pinouts

561

J-series™ Services Router User Guide

Table 222: RJ-48 Connector to DB-15 Connector (Crossover) Pinout

RJ-48 Pin (on T1/E1

PIM)

(Data numbering form)

6

7

8

9

10

11

12

13

14

15

1

2

4

5

3

DB-15 Pin

(Data numbering form)

3

4

9

1

11

2

No connect

No connect

No connect

No connect

No connect

No connect

No connect

No connect

No connect

Signal

RX/Ring/– <––>TX/Ring/–

RX/Tip/+ <––>TX/Tip/+

TX/Ring/– <––>RX/Ring/–

TX/Tip/+ <––>RX/Tip/+

Shield/Return/Ground

Shield/Return/Ground

No connect

No connect

No connect

No connect

No connect

No connect

No connect

No connect

No connect

562

E1 and T1 RJ-48 Cable Pinouts

Chapter 28

Safety and Regulatory Compliance

Information

To install and use the Services Router safely, follow proper safety procedures. This chapter discusses the following safety and regulatory compliance information:

Definition of Safety Warning Levels on page 563

Safety Guidelines and Warnings on page 565

Agency Approvals on page 597

Compliance Statements for EMC Requirements on page 598

Definition of Safety Warning Levels

This manual uses the following three levels of safety warnings:

NOTE: You might find this information helpful in a particular situation, or might otherwise overlook it.

CAUTION: You need to observe the specified guidelines to avoid minor injury or discomfort to you, or severe damage to the Services Router.

WARNING: This symbol means danger. You are in a situation that could cause bodily injury. Before you work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard practices for preventing accidents.

Definition of Safety Warning Levels

563

J-series™ Services Router User Guide

WARNING: Waarschuwing Dit waarschuwingssymbool betekent gevaar. U verkeert in een situatie die lichamelijk letsel kan veroorzaken. Voordat u aan enige apparatuur gaat werken, dient u zich bewust te zijn van de bij elektrische schakelingen betrokken risico’s en dient u op de hoogte te zijn van standaard maatregelen om ongelukken te voorkomen.

WARNING: Varoitus Tämä varoitusmerkki merkitsee vaaraa. Olet tilanteessa, joka voi johtaa ruumiinvammaan. Ennen kuin työskentelet minkään laitteiston parissa, ota selvää sähkökytkentöihin liittyvistä vaaroista ja tavanomaisista onnettomuuksien ehkäisykeinoista.

WARNING: Attention Ce symbole d’avertissement indique un danger. Vous vous trouvez dans une situation pouvant causer des blessures ou des dommages corporels. Avant de travailler sur un équipement, soyez conscient des dangers posés par les circuits électriques et familiarisez-vous avec les procédures couramment utilisées pour éviter les accidents.

WARNING: Warnung Dieses Warnsymbol bedeutet Gefahr. Sie befinden sich in einer Situation, die zu einer Körperverletzung führen könnte. Bevor Sie mit der Arbeit an irgendeinem Gerät beginnen, seien Sie sich der mit elektrischen

Stromkreisen verbundenen Gefahren und der Standardpraktiken zur Vermeidung von Unfällen bewußt.

WARNING: Avvertenza Questo simbolo di avvertenza indica un pericolo. La situazione potrebbe causare infortuni alle persone. Prima di lavorare su qualsiasi apparecchiatura, occorre conoscere i pericoli relativi ai circuiti elettrici ed essere al corrente delle pratiche standard per la prevenzione di incidenti.

WARNING: Advarsel Dette varselsymbolet betyr fare. Du befinner deg i en situasjon som kan føre til personskade. Før du utfører arbeid på utstyr, må du vare oppmerksom på de faremomentene som elektriske kretser innebærer, samt gjøre deg kjent med vanlig praksis når det gjelder å unngå ulykker.

564

Definition of Safety Warning Levels

Safety and Regulatory Compliance Information

WARNING: Aviso Este símbolo de aviso indica perigo. Encontra-se numa situação que lhe poderá causar danos físicos. Antes de começar a trabalhar com qualquer equipamento, familiarize-se com os perigos relacionados com circuitos eléctricos, e com quaisquer práticas comuns que possam prevenir possíveis acidentes.

WARNING: ¡Atención! Este símbolo de aviso significa peligro. Existe riesgo para su integridad física. Antes de manipular cualquier equipo, considerar los riesgos que entraña la corriente eléctrica y familiarizarse con los procedimientos estándar de prevención de accidentes.

WARNING: Varning! Denna varningssymbol signalerar fara. Du befinner dig i en situation som kan leda till personskada. Innan du utför arbete på någon utrustning måste du vara medveten om farorna med elkretsar och känna till vanligt förfarande för att förebygga skador.

Safety Guidelines and Warnings

This section lists safety guidelines and warnings for installing, operating, and maintaining the Services Router.

General Safety Guidelines and Warnings

The following guidelines help ensure your safety and protect the Services

Router from damage. The list of guidelines might not address all

Safety Guidelines and Warnings

565

J-series™ Services Router User Guide potentially hazardous situations in your working environment, so be alert and exercise good judgment at all times.

Perform only the procedures explicitly described in this manual. Make sure that only authorized service personnel perform other system services.

Keep the area around the chassis clear and free from dust before, during, and after installation.

Keep tools away from areas where people could trip over them while walking.

Do not wear loose clothing or jewelry, such as rings, bracelets, or chains, which could become caught in the chassis.

Wear safety glasses if you are working under any conditions that could be hazardous to your eyes.

Do not perform any actions that create a potential hazard to people or make the equipment unsafe.

Never attempt to lift an object that is too heavy for one person to handle.

Never install or manipulate wiring during electrical storms.

Never install electrical jacks in wet locations unless the jacks are specifically designed for wet environments.

Operate the Services Router only when it is properly grounded.

The separate protective earthing terminal provided on this product shall be permanently connected to earth.

Replace fuses only with fuses of the same type and rating.

Do not open or remove chassis covers or sheet metal parts unless instructions are provided in this manual. Such an action could cause severe electrical shock.

Do not push or force any objects through any opening in the chassis frame.

Such an action could result in electrical shock or fire.

Avoid spilling liquid onto the Services Router chassis or onto any Services

Router component. Such an action could cause electrical shock or damage the Services Router.

Avoid touching uninsulated electrical wires or terminals that have not been disconnected from their power source. Such an action could cause electrical shock.

In addition, observe the warnings and guidelines in the following sections.

566

Safety Guidelines and Warnings

Safety and Regulatory Compliance Information

Qualified Personnel Warning

WARNING: Only trained and qualified personnel should install or replace the

Services Router.

Waarschuwing Installatie en reparaties mogen uitsluitend door getraind en bevoegd personeel uitgevoerd worden.

Varoitus Ainoastaan koulutettu ja pätevä henkilökunta saa asentaa tai vaihtaa tämän laitteen.

Attention Tout installation ou remplacement de l’appareil doit être réalisé par du personnel qualifié et compétent.

Warnung Gerät nur von geschultem, qualifiziertem Personal installieren oder auswechseln lassen.

WARNING: Avvertenza Solo personale addestrato e qualificato deve essere autorizzato ad installare o sostituire questo apparecchio.

Advarsel Kun kvalifisert personell med riktig opplæring bør montere eller bytte ut dette utstyret.

Aviso Este equipamento deverá ser instalado ou substituído apenas por pessoal devidamente treinado e qualificado.

¡Atención! Estos equipos deben ser instalados y reemplazados exclusivamente por personal técnico adecuadamente preparado y capacitado.

Varning! Denna utrustning ska endast installeras och bytas ut av utbildad och kvalificerad personal.

Preventing Electrostatic Discharge Damage

Many Services Router hardware components are sensitive to damage from static electricity. Some components can be impaired by voltages as low as 30 V. You can easily generate potentially damaging static voltages whenever you handle plastic or foam packing material or if you move components across plastic or carpets.

Observe the following guidelines to minimize the potential for electrostatic discharge

(ESD) damage, which can cause intermittent or complete component failures:

Always use an ESD wrist strap or ankle strap, and make sure that it is in direct contact with your skin.

Safety Guidelines and Warnings

567

J-series™ Services Router User Guide

CAUTION: For safety, periodically check the resistance value of the ESD strap. The measurement should be in the range of 1 to 10 Mohms.

When handling any component that is removed from the chassis, make sure the equipment end of your ESD strap is attached to one of the electrostatic

discharge points on the chassis, which are shown in Figure 1 and Figure 2

for the J2300 chassis and in Figure 6 and Figure 7 for the J4300 chassis

and J6300 chassis.

Avoid contact between the component and your clothing. ESD voltages emitted from clothing can still damage components.

When removing or installing a component, always place it component-side up on an antistatic surface, in an antistatic card rack, or in an electrostatic bag

(see Figure 111). If you are returning a component, place it in an electrostatic

bag before packing it.

Figure 111: Place a Component into an Electrostatic Bag

CAUTION

ELECTROSTATIC

SENSITIVE

DEVICES

DO NOT OPEN OR HANDLE

EXCEPT AT A

STATIC-FREE WORKSTATION

Electrical Safety Guidelines and Warnings

When working on equipment powered by electricity, follow the guidelines described in the following sections.

568

Safety Guidelines and Warnings

Safety and Regulatory Compliance Information

General Electrical Safety Guidelines

Install the Services Router in compliance with the following local, national, or international electrical codes:

United States—National Fire Protection Association (NFPA 70), United

States National Electrical Code.

Canada—Canadian Electrical Code, Part 1, CSA C22.1.

Other countries—International Electromechanical Commission (IEC)

60364, Part 1 through Part 7.

Evaluated to the TN power system.

Locate the emergency power-off switch for the room in which you are working so that if an electrical accident occurs, you can quickly turn off the power.

Do not work alone if potentially hazardous conditions exist anywhere in your workspace.

Never assume that power is disconnected from a circuit. Always check the circuit before starting to work.

Carefully look for possible hazards in your work area, such as moist floors, ungrounded power extension cords, and missing safety grounds.

Operate the Services Router within marked electrical ratings and product usage instructions.

For the Services Router and peripheral equipment to function safely and correctly, use the cables and connectors specified for the attached peripheral equipment, and make certain they are in good condition.

Many Services Router components can be removed and replaced without powering down or disconnecting power to the Services Router, as detailed in elsewhere in this manual. Never install equipment if it appears damaged.

AC Power Electrical Safety Guidelines

The following electrical safety guidelines apply to AC-powered routers:

AC-powered routers are shipped with a three-wire electrical cord with a grounding-type plug that fits only a grounding-type power outlet. Do not

Safety Guidelines and Warnings

569

J-series™ Services Router User Guide circumvent this safety feature. Equipment grounding should comply with local and national electrical codes.

You must provide an external circuit breaker rated minimum 15 A in the building installation.

The power cord serves as the main disconnecting device. The socket outlet must be near the router and be easily accessible.

The cores in the mains lead are colored in accordance with the following code:

Green and yellow—Earth

Blue—Neutral

Brown—Live

When a router is equipped with two AC power supplies, both power cords

(one for each power supply) must be unplugged to completely disconnect power to the router.

Note the following warnings printed on the AC power supply faceplate:

To completely de-energize the system disconnect maximum of 2 power cordsets.

Apparaten skall anslutas till jordat uttag när den ansluts till ett nätverk.

[Swedish]

Grounded Equipment Warning

WARNING: The router is intended to be grounded. Ensure that the router is connected to earth ground during normal use.

Waarschuwing Deze apparatuur hoort geaard te worden Zorg dat de host-computer tijdens normaal gebruik met aarde is verbonden.

Varoitus Tämä laitteisto on tarkoitettu maadoitettavaksi. Varmista, että isäntälaite on yhdistetty maahan normaalikäytön aikana.

Attention Cet équipement doit être relié à la terre. S’assurer que l’appareil hôte est relié à la terre lors de l’utilisation normale.

Warnung Dieses Gerät muß geerdet werden. Stellen Sie sicher, daß das Host-Gerät während des normalen Betriebs an Erde gelegt ist.

570

Safety Guidelines and Warnings

Safety and Regulatory Compliance Information

WARNING: Avvertenza Questa apparecchiatura deve essere collegata a massa.

Accertarsi che il dispositivo host sia collegato alla massa di terra durante il normale utilizzo.

Advarsel Dette utstyret skal jordes. Forviss deg om vertsterminalen er jordet ved normalt bruk.

Aviso Este equipamento deverá estar ligado à terra. Certifique-se que o host se encontra ligado à terra durante a sua utilização normal.

¡Atención! Este equipo debe conectarse a tierra. Asegurarse de que el equipo principal esté conectado a tierra durante el uso normal.

Varning! Denna utrustning är avsedd att jordas. Se till att värdenheten är jordad vid normal användning.

Warning Statement for Norway and Sweden

WARNING: The equipment must be connected to an earthed mains socket-outlet.

Advarsel Apparatet skal kobles til en jordet stikkontakt.

Varning! Apparaten skall anslutas till jordat nätuttag.

In Case of Electrical Accident

If an electrical accident results in an injury, take the following actions in this order:

2.

3.

1.

Use caution. Be aware of potentially hazardous conditions that could cause further injury.

Disconnect power from the Services Router.

If possible, send another person to get medical aid. Otherwise, assess the condition of the victim, then call for help.

Safety Guidelines and Warnings

571

J-series™ Services Router User Guide

Multiple Power Supplies Disconnection Warning

WARNING: The J6300 Services Router has more than one power supply connection.

All connections must be removed completely to remove power from the unit completely.

WARNING: Waarschuwing Deze J6300 eenheid heeft meer dan één stroomtoevoerverbinding; alle verbindingen moeten volledig worden verwijderd om de stroom van deze eenheid volledig te verwijderen.

WARNING: Varoitus Tässä laitteessa on useampia virtalähdekytkentöjä. Kaikki kytkennät on irrotettava kokonaan, jotta virta poistettaisiin täysin laitteesta.

WARNING: Attention Cette J6300 unité est équipée de plusieurs raccordements d’alimentation. Pour supprimer tout courant électrique de l’unité, tous les cordons d’alimentation doivent être débranchés.

WARNING: Warnung Diese J6300 Einheit verfügt über mehr als einen

Stromanschluß; um Strom gänzlich von der Einheit fernzuhalten, müssen alle

Stromzufuhren abgetrennt sein.

WARNING: Avvertenza Questa J6300 unità ha più di una connessione per alimentatore elettrico; tutte le connessioni devono essere completamente rimosse per togliere l’elettricità dall’unità.

WARNING: Advarsel Denne J6300 enheten har mer enn én strømtilkobling. Alle tilkoblinger må kobles helt fra for å eliminere strøm fra enheten.

572

Safety Guidelines and Warnings

Safety and Regulatory Compliance Information

WARNING: Aviso Este J6300 dispositivo possui mais do que uma conexão de fonte de alimentação de energia; para poder remover a fonte de alimentação de energia, deverão ser desconectadas todas as conexões existentes.

WARNING: ¡Atención! Esta J6300 unidad tiene más de una conexión de suministros de alimentación; para eliminar la alimentación por completo, deben desconectarse completamente todas las conexiones.

WARNING: Varning! Denna J6300 enhet har mer än en strömförsörjningsanslutning; alla anslutningar måste vara helt avlägsnade innan strömtillförseln till enheten

är fullständigt bruten.

Power Disconnection Warning

WARNING: Before working on the router or near power supplies, unplug the power cord from an AC router.

WARNING: Waarschuwing Voordat u aan een frame of in de nabijheid van voedingen werkt, dient u bij wisselstroom toestellen de stekker van het netsnoer uit het stopcontact te halen.

WARNING: Varoitus Kytke irti vaihtovirtalaitteiden virtajohto, ennen kuin teet mitään asennuspohjalle tai työskentelet virtalähteiden läheisyydessä.

WARNING: Attention Avant de travailler sur un châssis ou à proximité d’une alimentation électrique, débrancher le cordon d’alimentation des unités en courant alternatif.

Safety Guidelines and Warnings

573

J-series™ Services Router User Guide

WARNING: Warnung Bevor Sie an einem Chassis oder in der Nähe von Netzgeräten arbeiten, ziehen Sie bei Wechselstromeinheiten das Netzkabel ab bzw.

WARNING: Avvertenza Prima di lavorare su un telaio o intorno ad alimentatori, scollegare il cavo di alimentazione sulle unità CA.

WARNING: Advarsel Før det utføres arbeid på kabinettet eller det arbeides i nærheten av strømforsyningsenheter, skal strømledningen trekkes ut på vekselstrømsenheter.

WARNING: Aviso Antes de trabalhar num chassis, ou antes de trabalhar perto de unidades de fornecimento de energia, desligue o cabo de alimentação nas unidades de corrente alternada.

WARNING: ¡Atención! Antes de manipular el chasis de un equipo o trabajar cerca de una fuente de alimentación, desenchufar el cable de alimentación en los equipos de corriente alterna (CA).

WARNING: Varning! Innan du arbetar med ett chassi eller nära strömförsörjningsenheter skall du för växelströmsenheter dra ur nätsladden.

TN Power Warning

WARNING: The router is designed to work with a TN power system.

574

Safety Guidelines and Warnings

Safety and Regulatory Compliance Information

WARNING: Waarschuwing Het apparaat is ontworpen om te functioneren met

TN energiesystemen.

WARNING: Varoitus Koje on suunniteltu toimimaan TN-sähkövoimajärjestelmien yhteydessä.

WARNING: Attention Ce dispositif a été conçu pour fonctionner avec des systèmes d’alimentation TN.

WARNING: Warnung Das Gerät ist für die Verwendung mit TN-Stromsystemen ausgelegt.

WARNING: Avvertenza Il dispositivo è stato progettato per l’uso con sistemi di alimentazione TN.

WARNING: Advarsel Utstyret er utfomet til bruk med TN-strømsystemer.

WARNING: Aviso O dispositivo foi criado para operar com sistemas de corrente TN.

WARNING: ¡Atención! El equipo está diseñado para trabajar con sistemas de alimentación tipo TN.

Safety Guidelines and Warnings

575

J-series™ Services Router User Guide

WARNING: Varning! Enheten är konstruerad för användning tillsammans med elkraftssystem av TN-typ.

Telecommunication Line Cord Warning

WARNING: To reduce the risk of fire, use only No. 26 AWG or larger UL-listed or

CSA-certified telecommunication line cord.

WARNING: Waarschuwing Om brandgevaar te reduceren, dient slechts telecommunicatielijnsnoer nr. 26 AWG of groter gebruikt te worden.

WARNING: Varoitus Tulipalovaaran vähentämiseksi käytä ainoastaan nro 26 AWGtai paksumpaa tietoliikennejohdinta.

WARNING: Attention Pour réduire les risques d’incendie, n’utiliser que des cordons de lignes de télécommunications de type AWG nº 26 ou plus larges.

WARNING: Warnung Zur Reduzierung der Feuergefahr eine

Fernmeldeleitungsschnur der Größe 26 AWG oder größer verwenden.

WARNING: Avvertenza Per ridurre il rischio di incendio, usare solo un cavo per linea di telecomunicazioni di sezione 0,12 mm2 (26 AWG) o maggiore.

576

Safety Guidelines and Warnings

Safety and Regulatory Compliance Information

WARNING: Advarsel Bruk kun AWG nr. 26 eller telekommunikasjonsledninger med større dimensjon for å redusere faren for brann.

WARNING: Aviso Para reduzir o risco de incêndio, utilize apenas terminais de fio de telecomunicações Nº. 26 AWG ou superiores.

WARNING: ¡Atención! Para reducir el riesgo de incendios, usar sólo líneas de telecomunicaciones de calibre No. 26 AWG o más gruesas.

WARNING: Varning! För att minska brandrisken skall endast Nr. 26 AWG eller större telekommunikationsledning användas.

Installation Safety Guidelines and Warnings

Observe the following guidelines and warnings before and during

Services Router installation.

Chassis Lifting Guidelines

The weight of a fully configured chassis is approximately 12 lbs (5.4 kg) for a J2300 Services Router, 21 lbs (9.5 kg) for a J4300 Services Router, and 24 lb (10.9 kg) for a J6300 Services Router. Observe the following guidelines for lifting and moving a Services Router:

Before moving the Services Router, read the guidelines in “Preparing for Router

Installation” on page 541 to verify that the intended site meets the specified

power, environmental, and clearance requirements.

Before lifting or moving the Services Router, disconnect all external cables.

As when lifting any heavy object, lift most of the weight with your legs rather than your back. Keep your knees bent and your back relatively straight and avoid twisting your body as you lift. Balance the load evenly and be sure that your footing is solid.

Safety Guidelines and Warnings

577

J-series™ Services Router User Guide

Installation Instructions Warning

WARNING: Read the installation instructions before you connect the router to a power source.

Waarschuwing Raadpleeg de installatie-aanwijzingen voordat u het systeem met de voeding verbindt.

Varoitus Lue asennusohjeet ennen järjestelmän yhdistämistä virtalähteeseen.

Attention Avant de brancher le système sur la source d’alimentation, consulter les directives d’installation.

Warnung Lesen Sie die Installationsanweisungen, bevor Sie das System an die

Stromquelle anschließen.

WARNING: Avvertenza Consultare le istruzioni di installazione prima di collegare il sistema all’alimentatore.

Advarsel Les installasjonsinstruksjonene før systemet kobles til strømkilden.

Aviso Leia as instruções de instalação antes de ligar o sistema à sua fonte de energia.

¡Atención! Ver las instrucciones de instalación antes de conectar el sistema a la red de alimentación.

Varning! Läs installationsanvisningarna innan du kopplar systemet till dess strömförsörjningsenhet.

Rack-Mounting Requirements and Warnings

Ensure that the equipment rack into which the Services Router is installed is evenly and securely supported, to avoid the hazardous condition that could result from uneven mechanical loading.

578

Safety Guidelines and Warnings

Safety and Regulatory Compliance Information

WARNING: To prevent bodily injury when mounting or servicing the router in a rack, take the following precautions to ensure that the system remains stable. The following directives help maintain your safety:

The router must be installed into a rack that is secured to the building structure.

The router should be mounted at the bottom of the rack if it is the only unit in the rack.

When mounting the router in a partially filled rack, load the rack from the bottom to the top with the heaviest component at the bottom of the rack.

If the rack is provided with stabilizing devices, install the stabilizers before mounting or servicing the router in the rack.

WARNING: Waarschuwing Om lichamelijk letsel te voorkomen wanneer u dit toestel in een rek monteert of het daar een servicebeurt geeft, moet u speciale voorzorgsmaatregelen nemen om ervoor te zorgen dat het toestel stabiel blijft. De onderstaande richtlijnen worden verstrekt om uw veiligheid te verzekeren:

De Juniper Networks router moet in een stellage worden geïnstalleerd die aan een bouwsel is verankerd.

Dit toestel dient onderaan in het rek gemonteerd te worden als het toestel het enige in het rek is.

Wanneer u dit toestel in een gedeeltelijk gevuld rek monteert, dient u het rek van onderen naar boven te laden met het zwaarste onderdeel onderaan in het rek.

Als het rek voorzien is van stabiliseringshulpmiddelen, dient u de stabilisatoren te monteren voordat u het toestel in het rek monteert of het daar een servicebeurt geeft.

WARNING: Varoitus Kun laite asetetaan telineeseen tai huolletaan sen ollessa telineessä, on noudatettava erityisiä varotoimia järjestelmän vakavuuden

Safety Guidelines and Warnings

579

J-series™ Services Router User Guide säilyttämiseksi, jotta vältytään loukkaantumiselta. Noudata seuraavia turvallisuusohjeita:

Juniper Networks router on asennettava telineeseen, joka on kiinnitetty rakennukseen.

Jos telineessä ei ole muita laitteita, aseta laite telineen alaosaan.

Jos laite asetetaan osaksi täytettyyn telineeseen, aloita kuormittaminen sen alaosasta kaikkein raskaimmalla esineellä ja siirry sitten sen yläosaan.

Jos telinettä varten on vakaimet, asenna ne ennen laitteen asettamista telineeseen tai sen huoltamista siinä.

WARNING: Attention Pour éviter toute blessure corporelle pendant les opérations de montage ou de réparation de cette unité en casier, il convient de prendre des précautions spéciales afin de maintenir la stabilité du système. Les directives ci-dessous sont destinées à assurer la protection du personnel:

Le rack sur lequel est monté le Juniper Networks router doit être fixé à la structure du bâtiment.

Si cette unité constitue la seule unité montée en casier, elle doit être placée dans le bas.

Si cette unité est montée dans un casier partiellement rempli, charger le casier de bas en haut en plaçant l’élément le plus lourd dans le bas.

Si le casier est équipé de dispositifs stabilisateurs, installer les stabilisateurs avant de monter ou de réparer l’unité en casier.

WARNING: Warnung Zur Vermeidung von Körperverletzung beim Anbringen oder

Warten dieser Einheit in einem Gestell müssen Sie besondere Vorkehrungen treffen,

580

Safety Guidelines and Warnings

Safety and Regulatory Compliance Information um sicherzustellen, daß das System stabil bleibt. Die folgenden Richtlinien sollen zur Gewährleistung Ihrer Sicherheit dienen:

Der Juniper Networks router muß in einem Gestell installiert werden, das in der Gebäudestruktur verankert ist.

Wenn diese Einheit die einzige im Gestell ist, sollte sie unten im Gestell angebracht werden.

Bei Anbringung dieser Einheit in einem zum Teil gefüllten Gestell ist das

Gestell von unten nach oben zu laden, wobei das schwerste Bauteil unten im Gestell anzubringen ist.

Wird das Gestell mit Stabilisierungszubehör geliefert, sind zuerst die

Stabilisatoren zu installieren, bevor Sie die Einheit im Gestell anbringen oder sie warten.

WARNING: Avvertenza Per evitare infortuni fisici durante il montaggio o la manutenzione di questa unità in un supporto, occorre osservare speciali precauzioni per garantire che il sistema rimanga stabile. Le seguenti direttive vengono fornite per garantire la sicurezza personale:

Il Juniper Networks router deve essere installato in un telaio, il quale deve essere fissato alla struttura dell’edificio.

Questa unità deve venire montata sul fondo del supporto, se si tratta dell’unica unità da montare nel supporto.

Quando questa unità viene montata in un supporto parzialmente pieno, caricare il supporto dal basso all’alto, con il componente più pesante sistemato sul fondo del supporto.

Se il supporto è dotato di dispositivi stabilizzanti, installare tali dispositivi prima di montare o di procedere alla manutenzione dell’unità nel supporto.

Safety Guidelines and Warnings

581

J-series™ Services Router User Guide

WARNING: Advarsel Unngå fysiske skader under montering eller reparasjonsarbeid på denne enheten når den befinner seg i et kabinett. Vær nøye med at systemet er stabilt. Følgende retningslinjer er gitt for å verne om sikkerheten:

Juniper Networks router må installeres i et stativ som er forankret til bygningsstrukturen.

Denne enheten bør monteres nederst i kabinettet hvis dette er den eneste enheten i kabinettet.

Ved montering av denne enheten i et kabinett som er delvis fylt, skal kabinettet lastes fra bunnen og opp med den tyngste komponenten nederst i kabinettet.

Hvis kabinettet er utstyrt med stabiliseringsutstyr, skal stabilisatorene installeres før montering eller utføring av reparasjonsarbeid på enheten i kabinettet.

WARNING: Aviso Para se prevenir contra danos corporais ao montar ou reparar esta unidade numa estante, deverá tomar precauções especiais para se certificar de que o sistema possui um suporte estável. As seguintes directrizes ajudá-lo-ão a efectuar o seu trabalho com segurança:

O Juniper Networks router deverá ser instalado numa prateleira fixa à estrutura do edificio.

Esta unidade deverá ser montada na parte inferior da estante, caso seja esta a única unidade a ser montada.

Ao montar esta unidade numa estante parcialmente ocupada, coloque os itens mais pesados na parte inferior da estante, arrumando-os de baixo para cima.

Se a estante possuir um dispositivo de estabilização, instale-o antes de montar ou reparar a unidade.

WARNING: ¡Atención! Para evitar lesiones durante el montaje de este equipo sobre un bastidor, o posteriormente durante su mantenimiento, se debe poner

582

Safety Guidelines and Warnings

Safety and Regulatory Compliance Information mucho cuidado en que el sistema quede bien estable. Para garantizar su seguridad, proceda según las siguientes instrucciones:

El Juniper Networks router debe instalarse en un bastidor fijado a la estructura del edificio.

Colocar el equipo en la parte inferior del bastidor, cuando sea la única unidad en el mismo.

Cuando este equipo se vaya a instalar en un bastidor parcialmente ocupado, comenzar la instalación desde la parte inferior hacia la superior colocando el equipo más pesado en la parte inferior.

Si el bastidor dispone de dispositivos estabilizadores, instalar éstos antes de montar o proceder al mantenimiento del equipo instalado en el bastidor.

WARNING: Varning! För att undvika kroppsskada när du installerar eller utför underhållsarbete på denna enhet på en ställning måste du vidta särskilda försiktighetsåtgärder för att försäkra dig om att systemet står stadigt. Följande riktlinjer ges för att trygga din säkerhet:

Juniper Networks router måste installeras i en ställning som är förankrad i byggnadens struktur.

Om denna enhet är den enda enheten på ställningen skall den installeras längst ned på ställningen.

Om denna enhet installeras på en delvis fylld ställning skall ställningen fyllas nedifrån och upp, med de tyngsta enheterna längst ned på ställningen.

Om ställningen är försedd med stabiliseringsdon skall dessa monteras fast innan enheten installeras eller underhålls på ställningen.

Ramp Warning

WARNING: When installing the router, do not use a ramp inclined at more than

10 degrees.

Waarschuwing Gebruik een oprijplaat niet onder een hoek van meer dan 10 graden.

Varoitus Älä käytä sellaista kaltevaa pintaa, jonka kaltevuus ylittää 10 astetta.

Attention Ne pas utiliser une rampe dont l’inclinaison est supérieure à 10 degrés.

Safety Guidelines and Warnings

583

J-series™ Services Router User Guide

Warnung Keine Rampen mit einer Neigung von mehr als 10 Grad verwenden.

WARNING: Avvertenza Non usare una rampa con pendenza superiore a 10 gradi.

Advarsel Bruk aldri en rampe som heller mer enn 10 grader.

Aviso Não utilize uma rampa com uma inclinação superior a 10 graus.

¡Atención! No usar una rampa inclinada más de 10 grados

Varning! Använd inte ramp med en lutning på mer än 10 grader.

Laser and LED Safety Guidelines and Warnings

Single-mode Physical Interface Modules (PIMs) are equipped with laser transmitters, which are considered a Class 1 Laser Product by the U.S. Food and Drug Administration, and are evaluated as a Class 1 Laser Product per EN 60825–1 +A11 +A2 requirements.

Observe the following guidelines and warnings.

General Laser Safety Guidelines

When working around PIMs, observe the following safety guidelines to prevent eye injury:

Do not look into unterminated ports or at fibers that connect to unknown sources.

Do not examine unterminated optical ports with optical instruments.

Avoid direct exposure to the beam.

WARNING: Unterminated optical connectors can emit invisible laser radiation.

The lens in the human eye focuses all the laser power on the retina, so focusing the eye directly on a laser source—even a low-power laser—could permanently damage the eye.

584

Safety Guidelines and Warnings

Safety and Regulatory Compliance Information

Class 1 Laser Product Warning

WARNING: Class 1 laser product.

Waarschuwing Klasse-1 laser produkt.

Varoitus Luokan 1 lasertuote.

Attention Produit laser de classe I.

Warnung Laserprodukt der Klasse 1.

WARNING: Avvertenza Prodotto laser di Classe 1.

Advarsel Laserprodukt av klasse 1.

Aviso Produto laser de classe 1.

¡Atención! Producto láser Clase I.

Varning! Laserprodukt av klass 1.

Class 1 LED Product Warning

WARNING: Class 1 LED product.

Waarschuwing Klasse 1 LED-product.

Varoitus Luokan 1 valodiodituote.

Attention Alarme de produit LED Class I.

Warnung Class 1 LED-Produktwarnung.

WARNING: Avvertenza Avvertenza prodotto LED di Classe 1.

Advarsel LED-produkt i klasse 1.

Aviso Produto de classe 1 com LED.

Safety Guidelines and Warnings

585

J-series™ Services Router User Guide

¡Atención! Aviso sobre producto LED de Clase 1.

Varning! Lysdiodprodukt av klass 1.

Laser Beam Warning

WARNING: Do not stare into the laser beam or view it directly with optical instruments.

WARNING: Waarschuwing Niet in de straal staren of hem rechtstreeks bekijken met optische instrumenten.

WARNING: Varoitus Älä katso säteeseen äläkä tarkastele sitä suoraan optisen laitteen avulla.

WARNING: Attention Ne pas fixer le faisceau des yeux, ni l’observer directement à l’aide d’instruments optiques.

WARNING: Warnung Nicht direkt in den Strahl blicken und ihn nicht direkt mit optischen Geräten prüfen.

WARNING: Avvertenza Non fissare il raggio con gli occhi né usare strumenti ottici per osservarlo direttamente.

WARNING: Advarsel Stirr eller se ikke direkte p strlen med optiske instrumenter.

586

Safety Guidelines and Warnings

Safety and Regulatory Compliance Information

WARNING: Aviso Não olhe fixamente para o raio, nem olhe para ele directamente com instrumentos ópticos.

WARNING: ¡Atención! No mirar fijamente el haz ni observarlo directamente con instrumentos ópticos.

WARNING: Varning! Rikta inte blicken in mot strålen och titta inte direkt på den genom optiska instrument.

Radiation from Open Port Apertures Warning

WARNING: Because invisible radiation may be emitted from the aperture of the port when no fiber cable is connected, avoid exposure to radiation and do not stare into open apertures.

WARNING: Waarschuwing Aangezien onzichtbare straling vanuit de opening van de poort kan komen als er geen fiberkabel aangesloten is, dient blootstelling aan straling en het kijken in open openingen vermeden te worden.

WARNING: Varoitus Koska portin aukosta voi emittoitua näkymätöntä säteilyä, kun kuitukaapelia ei ole kytkettynä, vältä säteilylle altistumista äläkä katso avoimiin aukkoihin.

WARNING: Attention Des radiations invisibles à l’il nu pouvant traverser l’ouverture du port lorsqu’aucun câble en fibre optique n’y est connecté, il est recommandé de ne pas regarder fixement l’intérieur de ces ouvertures.

Safety Guidelines and Warnings

587

J-series™ Services Router User Guide

WARNING: Warnung Aus der Port-Öffnung können unsichtbare Strahlen emittieren, wenn kein Glasfaserkabel angeschlossen ist. Vermeiden Sie es, sich den Strahlungen auszusetzen, und starren Sie nicht in die Öffnungen!

WARNING: Avvertenza Quando i cavi in fibra non sono inseriti, radiazioni invisibili possono essere emesse attraverso l’apertura della porta. Evitate di esporvi alle radiazioni e non guardate direttamente nelle aperture.

WARNING: Advarsel Unngå utsettelse for stråling, og stirr ikke inn i åpninger som er åpne, fordi usynlig stråling kan emiteres fra portens åpning når det ikke er tilkoblet en fiberkabel.

WARNING: Aviso Dada a possibilidade de emissão de radiação invisível através do orifício da via de acesso, quando esta não tiver nenhum cabo de fibra conectado, deverá evitar a exposição à radiação e não deverá olhar fixamente para orifícios que se encontrarem a descoberto.

WARNING: ¡Atención! Debido a que la apertura del puerto puede emitir radiación invisible cuando no existe un cable de fibra conectado, evite mirar directamente a las aperturas para no exponerse a la radiación.

WARNING: Varning! Osynlig strålning kan avges från en portöppning utan ansluten fiberkabel och du bör därför undvika att bli utsatt för strålning genom att inte stirra in i oskyddade öppningar.

Maintenance and Operational Safety Guidelines and Warnings

As you maintain the Services Router, observe the following guidelines and warnings.

588

Safety Guidelines and Warnings

Safety and Regulatory Compliance Information

Battery Handling Warning

WARNING: Replacing the battery incorrectly might result in an explosion.

Replace the battery only with the same or equivalent type recommended by the manufacturer. Dispose of used batteries according to the manufacturer’s instructions.

WARNING: Waarschuwing Er is ontploffingsgevaar als de batterij verkeerd vervangen wordt. Vervang de batterij slechts met hetzelfde of een equivalent type dat door de fabrikant aanbevolen is. Gebruikte batterijen dienen overeenkomstig fabrieksvoorschriften weggeworpen te worden.

WARNING: Varoitus Räjähdyksen vaara, jos akku on vaihdettu väärään akkuun.

Käytä vaihtamiseen ainoastaan saman- tai vastaavantyyppistä akkua, joka on valmistajan suosittelema. Hävitä käytetyt akut valmistajan ohjeiden mukaan.

WARNING: Attention Danger d’explosion si la pile n’est pas remplacée correctement. Ne la remplacer que par une pile de type semblable ou équivalent, recommandée par le fabricant. Jeter les piles usagées conformément aux instructions du fabricant.

WARNING: Warnung Bei Einsetzen einer falschen Batterie besteht Explosionsgefahr.

Ersetzen Sie die Batterie nur durch den gleichen oder vom Hersteller empfohlenen

Batterietyp. Entsorgen Sie die benutzten Batterien nach den Anweisungen des

Herstellers.

WARNING: Advarsel Det kan være fare for eksplosjon hvis batteriet skiftes på feil måte. Skift kun med samme eller tilsvarende type som er anbefalt av produsenten.

Kasser brukte batterier i henhold til produsentens instruksjoner.

Safety Guidelines and Warnings

589

J-series™ Services Router User Guide

WARNING: Avvertenza Pericolo di esplosione se la batteria non è installata correttamente. Sostituire solo con una di tipo uguale o equivalente, consigliata dal produttore. Eliminare le batterie usate secondo le istruzioni del produttore.

WARNING: Aviso Existe perigo de explosão se a bateria for substituída incorrectamente. Substitua a bateria por uma bateria igual ou de um tipo equivalente recomendado pelo fabricante. Destrua as baterias usadas conforme as instruções do fabricante.

WARNING: ¡Atención! Existe peligro de explosión si la batería se reemplaza de manera incorrecta. Reemplazar la batería exclusivamente con el mismo tipo o el equivalente recomendado por el fabricante. Desechar las baterías gastadas según las instrucciones del fabricante.

WARNING: Varning! Explosionsfara vid felaktigt batteribyte. Ersätt endast batteriet med samma batterityp som rekommenderas av tillverkaren eller motsvarande. Följ tillverkarens anvisningar vid kassering av använda batterier.

Jewelry Removal Warning

WARNING: Before working on equipment that is connected to power lines, remove jewelry, including rings, necklaces, and watches. Metal objects heat up when connected to power and ground and can cause serious burns or weld the metal object to the terminals.

WARNING: Waarschuwing Alvorens aan apparatuur te werken die met elektrische leidingen is verbonden, sieraden (inclusief ringen, kettingen en horloges) verwijderen. Metalen voorwerpen worden warm wanneer ze met stroom en aarde zijn verbonden, en kunnen ernstige brandwonden veroorzaken of het metalen voorwerp aan de aansluitklemmen lassen.

590

Safety Guidelines and Warnings

Safety and Regulatory Compliance Information

WARNING: Varoitus Ennen kuin työskentelet voimavirtajohtoihin kytkettyjen laitteiden parissa, ota pois kaikki korut (sormukset, kaulakorut ja kellot mukaan lukien). Metalliesineet kuumenevat, kun ne ovat yhteydessä sähkövirran ja maan kanssa, ja ne voivat aiheuttaa vakavia palovammoja tai hitsata metalliesineet kiinni liitäntänapoihin.

WARNING: Attention Avant d’accéder à cet équipement connecté aux lignes

électriques, ôter tout bijou (anneaux, colliers et montres compris). Lorsqu’ils sont branchés à l’alimentation et reliés à la terre, les objets métalliques chauffent, ce qui peut provoquer des blessures graves ou souder l’objet métallique aux bornes.

WARNING: Warnung Vor der Arbeit an Geräten, die an das Netz angeschlossen sind, jeglichen Schmuck (einschließlich Ringe, Ketten und Uhren) abnehmen.

Metallgegenstände erhitzen sich, wenn sie an das Netz und die Erde angeschlossen werden, und können schwere Verbrennungen verursachen oder an die

Anschlußklemmen angeschweißt werden.

WARNING: Avvertenza Prima di intervenire su apparecchiature collegate alle linee di alimentazione, togliersi qualsiasi monile (inclusi anelli, collane, braccialetti ed orologi). Gli oggetti metallici si riscaldano quando sono collegati tra punti di alimentazione e massa: possono causare ustioni gravi oppure il metallo può saldarsi ai terminali.

WARNING: Advarsel Fjern alle smykker (inkludert ringer, halskjeder og klokker) før du skal arbeide på utstyr som er koblet til kraftledninger. Metallgjenstander som er koblet til kraftledninger og jord blir svært varme og kan forårsake alvorlige brannskader eller smelte fast til polene.

WARNING: Aviso Antes de trabalhar em equipamento que esteja ligado a linhas de corrente, retire todas as jóias que estiver a usar (incluindo anéis, fios e relógios).

Os objectos metálicos aquecerão em contacto com a corrente e em contacto com

Safety Guidelines and Warnings

591

J-series™ Services Router User Guide a ligação à terra, podendo causar queimaduras graves ou ficarem soldados aos terminais.

WARNING: ¡Atención! Antes de operar sobre equipos conectados a líneas de alimentación, quitarse las joyas (incluidos anillos, collares y relojes). Los objetos de metal se calientan cuando se conectan a la alimentación y a tierra, lo que puede ocasionar quemaduras graves o que los objetos metálicos queden soldados a los bornes.

WARNING: Varning! Tag av alla smycken (inklusive ringar, halsband och armbandsur) innan du arbetar på utrustning som är kopplad till kraftledningar.

Metallobjekt hettas upp när de kopplas ihop med ström och jord och kan förorsaka allvarliga brännskador; metallobjekt kan också sammansvetsas med kontakterna.

Lightning Activity Warning

WARNING: Do not work on the system or connect or disconnect cables during periods of lightning activity.

WARNING: Waarschuwing Tijdens onweer dat gepaard gaat met bliksem, dient u niet aan het systeem te werken of kabels aan te sluiten of te ontkoppelen.

WARNING: Varoitus Älä työskentele järjestelmän parissa äläkä yhdistä tai irrota kaapeleita ukkosilmalla.

WARNING: Attention Ne pas travailler sur le système ni brancher ou débrancher les câbles pendant un orage.

592

Safety Guidelines and Warnings

Safety and Regulatory Compliance Information

WARNING: Warnung Arbeiten Sie nicht am System und schließen Sie keine Kabel an bzw. trennen Sie keine ab, wenn es gewittert.

WARNING: Avvertenza Non lavorare sul sistema o collegare oppure scollegare i cavi durante un temporale con fulmini.

WARNING: Advarsel Utfør aldri arbeid på systemet, eller koble kabler til eller fra systemet når det tordner eller lyner.

WARNING: Aviso Não trabalhe no sistema ou ligue e desligue cabos durante períodos de mau tempo (trovoada).

WARNING: ¡Atención! No operar el sistema ni conectar o desconectar cables durante el transcurso de descargas eléctricas en la atmósfera.

WARNING: Varning! Vid åska skall du aldrig utföra arbete på systemet eller ansluta eller koppla loss kablar.

Operating Temperature Warning

exceeds the maximum recommended ambient temperature of 104 F (40 C). To prevent airflow restriction, allow at least 6 inches (15.2 cm) of clearance around the ventilation openings.

Safety Guidelines and Warnings

593

J-series™ Services Router User Guide

WARNING: Waarschuwing Om te voorkomen dat welke router van de Juniper plaats waar de maximale aanbevolen omgevingstemperatuur van 40

ο

C wordt overschreden. Om te voorkomen dat de luchtstroom wordt beperkt, dient er minstens 15,2 cm speling rond de ventilatie-openingen te zijn.

WARNING: Varoitus Ettei Juniper Networks router-sarjan reititin ylikuumentuisi, ympäristölämpötilan 40 C. Ettei ilmanvaihto estyisi, tuuletusaukkojen ympärille on jätettävä ainakin 15,2 cm tilaa.

WARNING: Attention Pour éviter toute surchauffe des routeurs de la gamme est supérieure à 40

ο

C. Pour permettre un flot d’air constant, dégagez un espace d’au moins 15,2 cm autour des ouvertures de ventilations.

WARNING: Warnung Um einen Router der router vor Überhitzung zu schützen, darf das empfohlene Maximum von 40 C überschreitet. Um Lüftungsverschluß zu verhindern, achten Sie darauf, daß mindestens 15,2 cm lichter Raum um die

Lüftungsöffnungen herum frei bleibt.

in un locale che ecceda la temperatura ambientale massima di 40

ο

C. Per evitare che la circolazione dell’aria sia impedita, lasciate uno spazio di almeno 15.2 cm di fronte alle aperture delle ventole.

WARNING: Advarsel Unngå overoppheting av eventuelle rutere i Juniper omgivelsestemperaturen overstiger 40

ο

C (104

ο

F). Sørg for at klaringen rundt lufteåpningene er minst 15,2 cm (6 tommer) for å forhindre nedsatt luftsirkulasjon.

594

Safety Guidelines and Warnings

Safety and Regulatory Compliance Information

WARNING: Aviso Para evitar o sobreaquecimento do encaminhador Juniper máxima recomendada de 40

ο

C. Para evitar a restrição à circulação de ar, deixe pelo menos um espaço de 15,2 cm à volta das aberturas de ventilação.

WARNING: ¡Atención! Para impedir que un encaminador de la serie Juniper supere la temperatura ambiente máxima recomendada de 40

ο

C. Para impedir la restricción de la entrada de aire, deje un espacio mínimo de 15,2 cm alrededor de las aperturas para ventilación.

WARNING: Varning! Förhindra att en Juniper Networks router överhettas omgivningstemperaturen på 40

ο

C överskrids. Förhindra att luftcirkulationen inskränks genom att se till att det finns fritt utrymme på minst 15,2 cm omkring ventilationsöppningarna.

Product Disposal Warning

WARNING: Disposal of this product must be handled according to all national laws and regulations.

WARNING: Waarschuwing Dit produkt dient volgens alle landelijke wetten en voorschriften te worden afgedankt.

WARNING: Varoitus Tämän tuotteen lopullisesta hävittämisestä tulee huolehtia kaikkia valtakunnallisia lakeja ja säännöksiä noudattaen.

Safety Guidelines and Warnings

595

J-series™ Services Router User Guide

WARNING: Attention La mise au rebut définitive de ce produit doit être effectuée conformément à toutes les lois et réglementations en vigueur.

WARNING: Warnung Dieses Produkt muß den geltenden Gesetzen und Vorschriften entsprechend entsorgt werden.

WARNING: Avvertenza L’eliminazione finale di questo prodotto deve essere eseguita osservando le normative italiane vigenti in materia

WARNING: Advarsel Endelig disponering av dette produktet må skje i henhold til nasjonale lover og forskrifter.

WARNING: Aviso A descartagem final deste produto deverá ser efectuada de acordo com os regulamentos e a legislação nacional.

WARNING: ¡Atención! El desecho final de este producto debe realizarse según todas las leyes y regulaciones nacionales

WARNING: Varning! Slutlig kassering av denna produkt bör skötas i enlighet med landets alla lagar och föreskrifter.

596

Safety Guidelines and Warnings

Safety and Regulatory Compliance Information

Agency Approvals

The Services Router complies with the following standards:

Safety

CAN/CSA-22.2 No. 60950–1–03–UL 60950–1 Safety of Information

Technology Equipment

EN 60950–1 Safety of Information Technology Equipment

EN 60825-1 Safety of Laser Products - Part 1: Equipment Classification,

Requirements and User’s Guide

EMC

AS/NZS 3548 Class B (Australia/New Zealand)

EN 55022 Class B Emissions (Europe)

FCC Part 15 Class B (USA)

VCCI Class B (Japan)

FCC Part 68

Industry Canada CS-03

Immunity

EN 61000-3-2 Power Line Harmonics

EN 61000-3-3 Voltage Fluctuations and Flicker

EN 61000-4-2 ESD

EN 61000-4-3 Radiated Immunity

EN 61000-4-4 EFT

EN 61000-4-5 Surge

EN 61000-4-6 Low Frequency Common Immunity

EN 61000-4-11 Voltage Dips and Sags

ETSI

ETSI EN-300386-2 Telecommunication Network Equipment.

Electromagnetic Compatibility Requirements

Agency Approvals

597

J-series™ Services Router User Guide

Compliance Statements for EMC Requirements

Canada

This Class B digital apparatus complies with Canadian ICES-003.

Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.

The Industry Canada label identifies certified equipment. This certification means that the equipment meets certain telecommunications network protective, operational, and safety requirements. Industry Canada does not guarantee the equipment will operate to the users’ satisfaction.

Before installing this equipment, users should ensure that it is permissible to be connected to the facilities of the local telecommunications company. The equipment must also be installed using an acceptable method of connection.

In some cases, the inside wiring associated with a single line individual service may be extended by means of a certified connector assembly. The customer should be aware that compliance with the above conditions may not prevent degradation of service in some situations.

Repairs to certified equipment should be made by an authorized

Canadian maintenance facility designated by the supplier. Any repairs or alterations made by the user to this equipment, or equipment malfunctions, may give the telecommunications company cause to request the user to disconnect the equipment.

CAUTION: Users should not attempt to make electrical ground connections by themselves, but should contact the appropriate inspection authority or an electrician, as appropriate.

Users should ensure for their own protection that the electrical ground connections of the power utility, telephone lines, and internal metallic water pipe system, if present, are connected together. This precaution may be particularly important in rural areas.

Japan

598

Compliance Statements for EMC Requirements

Taiwan

Safety and Regulatory Compliance Information

The preceding translates as follows:

This is a Class B product based on the standard of the Voluntary Control Council for

Interference by Information Technology Equipment (VCCI). If this product is used near a radio or television receiver in a domestic environment, it may cause radio interference. Install and use the equipment according to the instruction manual.

United States

The Services Router has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense.

FCC Part 15 Statement

This equipment has been tested and found to comply with the limits for a Class

B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation.

If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is

Compliance Statements for EMC Requirements

599

J-series™ Services Router User Guide encouraged to try and correct the interference by one or more of the following measures:

Reorient or relocate the receiving antenna.

Increase the separation between the equipment and the receiver.

Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.

Consult the dealer or an experienced radio or TV technician for help.

FCC Part 68 Statement

This equipment complies with Part 68 of the Federal Communications

Commission (FCC) rules. On the product is a label that contains the

FCC registration number for this device. If requested, this information must be provided to the telephone company.

This equipment is designed to be connected to the telephone network or premises wiring using a compatible modular jack which is Part 68 compliant. See installation instructions for details.

If this device causes harm to the telephone network, the telephone company will notify you in advance that temporary discontinuance of service may be required.

The telephone company may request that you disconnect the equipment until the problem is resolved. The telephone company may make changes in its facilities, equipment, operations or procedures that could affect the operation of this equipment. If this happens, the telephone company will provide advance notice in order for you to make necessary modifications to maintain uninterrupted service.

If trouble is experienced with this equipment or for repair or warranty information, please follow the applicable procedures explained in the “Technical Support” section of this manual.

FCC Registration Number—See label on product.

Required Connector (USOC)—RJ-48C

Service Order Code (SOC)—6.ON

600

Compliance Statements for EMC Requirements

Part 11

Customer Support and Product Return

Contacting Customer Support and Returning Hardware on page 603

Customer Support and Product Return 601

602

Customer Support and Product Return

Chapter 29

Contacting Customer Support and

Returning Hardware

This chapter describes how to return the Services Router or individual components to Juniper Networks for repair or replacement. It contains the following topics:

Locating Component Serial Numbers on page 603

Contacting Customer Support on page 605

Return Procedure on page 606

Packing a Router or Component for Shipment on page 607

Locating Component Serial Numbers

Before contacting Juniper Networks to request a Return Materials Authorization

(RMA), you must find the serial number on the router or component. To list the router components and their serial numbers, enter the following command-line interface (CLI) command: user@host> show chassis hardware

Hardware inventory:

Item Version Part number Serial number

Chassis

Midplane REV 02.04 710-010001

JN000192AB

CORE99563

System IO

Routing Engine

FPC 0

PIC 0

REV 02.03 710-010003 CORE100885

RevX2.6

750-010005 IWGS40735451

Description

J4300

P12/P45 System IO board

RE-J.2

FPC

2x FE

NOTE: In the show chassis hardware output, PIMs are identified as PICs.

Most components also have a small rectangular serial number ID label (see

Figure 112 through Figure 114) attached to the component body.

Locating Component Serial Numbers

603

J-series™ Services Router User Guide

Figure 112: J2300 Serial Number ID Label

Serial number ID label

Figure 113: J4300 Serial Number ID Label

Serial number ID label

604

Locating Component Serial Numbers

Contacting Customer Support and Returning Hardware

Figure 114: J6300 Serial Number ID Label

Serial number ID label

The following sections describe the label location on each type of component:

PIM Serial Number Label on page 605

J6300 Power Supply Serial Number Labels on page 605

PIM Serial Number Label

The PIMs installed in the J4300 and J6300 Services Routers are field-replaceable.

Each PIM has a unique serial number. The serial number label is located on the right side of the PIM, when the PIM is horizontally oriented (as it would be installed in the router). The exact location may be slightly different on different PIMs, depending on the placement of components on the PIM board.

J6300 Power Supply Serial Number Labels

The power supplies installed in the J6300 Services Router are field-replaceable.

Each power supply has a unique serial number. The serial number label is located on the top of the AC power supply.

Contacting Customer Support

After you have located the serial numbers of the components you need to return, contact Juniper Networks Technical Assistance Center

(JTAC) in one of the following ways.

Contacting Customer Support

605

J-series™ Services Router User Guide

You can contact JTAC 24 hours a day, seven days a week.

On the Web, using the Case Manager link at http://www.juniper.net/support/

By telephone:

From the US and Canada: 1-888-314-JTAC

From all other locations: 1-408-745-9500

If contacting JTAC by telephone, enter your 11–digit case number followed by the pound (#) key if this is an existing case, or press the star (*) key to be routed to the next available support engineer.

Information You Might Need to Supply to JTAC

When requesting support from JTAC by telephone, be prepared to provide the following information:

Your existing case number, if you have one

Details of the failure or problem

Type of activity being performed on the router when the problem occurred

Configuration data displayed by one or more show commands

Return Procedure

If the problem cannot be resolved by the JTAC technician, an RMA number is issued. This number is used to track the returned material at the factory and to return repaired or new components to the customer as needed.

NOTE: Do not return any component to Juniper Networks unless you have first obtained an RMA number. Juniper Networks reserves the right to refuse shipments that do not have an RMA. Refused shipments will be returned to the customer via collect freight.

For more information about return and repair policies, see the customer support

Web page at http:/www./juniper.net/support/guidelines.html

.

For product problems or technical support issues, open a support case using the

Case Manager link at http://www.juniper.net/support/

, or call 1–888–314–JTAC

(within the United States) or 1–408–745–9500 (outside the United States).

When you need to return a component, follow this procedure:

1.

Determine the part number and serial number of the component. For

instructions, see “Locating Component Serial Numbers” on page 603.

606

Return Procedure

Contacting Customer Support and Returning Hardware

2.

3.

Obtain a Return Materials Authorization (RMA) number from the Juniper

Networks Technical Assistance Center (JTAC). You can send e-mail or telephone as described above.

Provide the following information in your e-mail message or during the telephone call:

Part number and serial number of component

Your name, organization name, telephone number, and fax number

Description of the failure

4.

5.

The support representative validates your request and issues an RMA number for return of the component.

Pack the router or component for shipment, as described in “Packing a Router or Component for Shipment” on page 607.

Packing a Router or Component for Shipment

This section contains the following topics:

Tools and Parts Required on page 607

Packing the Services Router for Shipment on page 607

Packing Components for Shipment on page 609

Tools and Parts Required

To remove components from the router or the router from a rack, you need the following tools and parts:

Blank panels to cover empty slots

Electrostatic bag or antistatic mat, for each component

Electrostatic discharge (ESD) grounding wrist strap

Phillips (+) screwdrivers, numbers 1 and 2

Packing the Services Router for Shipment

To pack the router for shipment, follow this procedure:

1.

Retrieve the shipping carton and packing materials in which the router was originally shipped. If you do not have these materials, contact your Juniper

Networks representative about approved packaging materials.

Packing a Router or Component for Shipment

607

J-series™ Services Router User Guide

2.

3.

Attach an electrostatic discharge (ESD) grounding strap to your bare wrist and connect the strap to the ESD point on the chassis, or to an outside ESD point if the router is disconnected from earth ground. For more information about

ESD, see “Preventing Electrostatic Discharge Damage” on page 567.

On the console or other management device connected to the master Routing

Engine, enter CLI operational mode and issue the following command to shut down the router software.

user@host> request system halt

4.

5.

6.

Wait until a message appears on the console confirming that the operating

system has halted. For more information about the command, see “Halting the

Services Router with the CLI” on page 514.

Shut down power to the router by pressing the power button on the front panel of the router.

Disconnect power from the router. For instructions, see “Replacing a Power

Supply Cord in a J2300 or J4300 Router” on page 532 or “Replacing a Power

Supply Cord in a J6300 Router” on page 536.

Remove the cables that connect to all external devices. For instructions, see

“Removing a PIM Cable” on page 522.

7.

8.

9.

Remove all field-replaceable units (FRUs) from the router.

If the router is installed on a wall or rack, have one person support the weight of the router, while another person unscrews and removes the mounting screws.

Place the router in the shipping carton.

10.

Cover the router with an ESD bag, and place the packing foam on top of and around the router.

11.

Replace the accessory box on top of the packing foam.

12.

Securely tape the box closed.

13.

Write the RMA number on the exterior of the box to ensure proper tracking.

608

Packing a Router or Component for Shipment

Contacting Customer Support and Returning Hardware

Packing Components for Shipment

To pack and ship individual components, follow these guidelines:

When you return components, make sure they are adequately protected with packing materials and packed so that the pieces are prevented from moving around inside the carton.

Use the original shipping materials if they are available.

Place individual boards in electrostatic bags.

Write the RMA number on the exterior of the box to ensure proper tracking.

CAUTION: Do not stack any of the router components.

Packing a Router or Component for Shipment

609

J-series™ Services Router User Guide

610

Packing a Router or Component for Shipment

Part 12

Indexes

Indexes 611

612

Indexes

Index

Symbols

[ ], in configuration statements . . . . . . . . . . . . . . . . . . . . . . xxviii

{ }, in configuration statements . . . . . . . . . . . . . . . . . . . . . xxviii

( ), in syntax descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxviii

< >, in syntax descriptions . . . . . . . . . . . . . . . . . . . . . . . . . xxviii

| (pipe) command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202

| (pipe), in syntax descriptions . . . . . . . . . . . . . . . . . . . . . . . xxviii

* (red asterisk) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .116

? command for CLI online help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123

in configuration mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120

in operational mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .119

? icon (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .116

#, configuration mode command prompt . . . . . . . . . . . . . 120

#, in configuration statements . . . . . . . . . . . . . . . . . . . . . . . xxviii

>, operational mode command prompt . . . . . . . . . . . . . . .119

10/100Base-TX ports See Fast Ethernet ports

A

ABRs See area border routers

AC plug types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548

AC power . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546

dedicated AC power feed requirement . . . . . . . . . . . 535

requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546

safety guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 569

See also power

AC power cords electrical specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . 547 physical requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547

plug types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548

replacing (J2300 or J4300) . . . . . . . . . . . . . . . . . . . . . . . . 532

replacing (J6300). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536

access privileges denying and allowing commands . . . . . . . . . . . . . . . . 167

permission bits for. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165

predefined . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167

specifying (Quick Configuration). . . . . . . . . . . . . . . . . . 176

accident, steps to take . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 571

accounts See template accounts; user accounts

action modifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366

actions default, routing policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358 final, routing policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358

NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361

route list match types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378

routing policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356

routing policy, summary of. . . . . . . . . . . . . . . . . . . . . . . . 357

stateful firewall filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361

stateless firewall filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366

active routes displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .211

versus passive routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287

ad0 See compact flash, primary ad2 See compact flash, removable

Add a RADIUS Server page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170

field summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171

Add a TACACS+ Server page . . . . . . . . . . . . . . . . . . . . . . . . . . . 172

field summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173

Add a User Quick Configuration page . . . . . . . . . . . . . . . . . 175

field summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176

Add button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132

Add new entry link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134

address match conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364

address translation See NAT

addresses

192.168.1.1/24 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51

attacking, displaying with IDS . . . . . . . . . . . . . . . . . . . . 215

BGP external peer address (configuration editor). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337

BGP internal peer address (configuration editor). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339

BGP local address (Quick Configuration) . . . . . . . . . 334

BGP peer address (Quick Configuration) . . . . . . . . . 334

destination, displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . .211

fe-0/0/0 for autoinstallation . . . . . . . . . . . . . . . . . . . . . . . . .51

loopback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50

management interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50

multicast ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465

translating See NAT

under attack, displaying with IDS. . . . . . . . . . . . . . . . . 215

administrative scoping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467

advertisements See LSAs; route advertisements

AF See DiffServ, assured forwarding

agency approvals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597

agents, SNMP See SNMP agents

aggregation, route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263

airflow

J2300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16

Index

613

J-series™ Services Router User Guide

J4300 and J6300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28

space requirement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541

ALARM LED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11–12

indications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536

alarms active, displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209

ALARM LED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

conditions, chassis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537

displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207

red, PIMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537

red, Routing Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538

severity, displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207

yellow, primary compact flash . . . . . . . . . . . . . . . . . . . . 537

yellow, Routing Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538

alert logging severity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

alternate mark inversion See AMI alternative boot media See boot devices; compact flash, removable; USB

altitude requirement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544

ambient temperature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207

AMI (alternate mark inversion)

E1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88

T1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .94

antistatic mat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567

any level statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194

any logging facility. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

Apply button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132

approvals, agency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597

archiving system logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194

area border routers adding interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319 area ID (configuration editor) . . . . . . . . . . . . . . . . . . . . . 319

backbone area See backbone area

backbone area interface. . . . . . . . . . . . . . . . . . . . . . . . . . . 318

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271

areas See area border routers; backbone area; stub areas; NSSAs

arithmetic operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234

AS path description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279

displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .211

forcing by MED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280

prepending. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383

role in route selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277

ASs (autonomous systems) area border routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271

AS number (configuration editor) . . . . . . . . . . . . . . . . . 337

AS number (Quick Configuration) . . . . . . . . . . . . . . . . 334

breaking into confederations. . . . . . . . . . . . . . . . . . . . . . 283

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260

group AS number (configuration editor). . . . . . . . . . 337 individual AS number (configuration editor) . . . . . 337

sample BGP confederation . . . . . . . . . . . . . . . . . . . . . . . . 343

stub areas See stub areas

sub-AS number . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343

assured forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444

attacks, detecting with IDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215

authentication adding a RADIUS server (Quick Configuration) . . 169

adding a TACACS+ server (Quick

Configuration) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171

local password, by default. . . . . . . . . . . . . . . . . . . . . . . . . 173

login classes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165, 186

methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164–165

order of user authentication (configuration editor). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185

OSPF, MD5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324

OSPF, plain-text passwords . . . . . . . . . . . . . . . . . . . . . . . 324

RADIUS authentication (configuration editor). . . . 182

RIPv2, MD5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306

RIPv2, plain-text passwords. . . . . . . . . . . . . . . . . . . . . . . 306

specifying a method (Quick Configuration) . . . . . . 174

specifying access privileges (Quick

Configuration) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176

TACACS+ authentication (configuration editor) . . 183

user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164, 188

authorization logging facility . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

Auto-RP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469

autoinstallation description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51

enabling (CLI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66

for service providers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66

overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65

requirements for end users . . . . . . . . . . . . . . . . . . . . . . . . .66

B

BA classifiers See classifiers

backbone area area ID (configuration editor) . . . . . . . . . . . . . . . . . . . . . 316

area ID (Quick Configuration) . . . . . . . . . . . . . . . . . . . . . 312

area type (Quick Configuration). . . . . . . . . . . . . . . . . . . 313

configuring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272

interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318

backup compact flash, removing . . . . . . . . . . . . . . . . . . . . . . 525

backup router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50

defining (configuration editor) . . . . . . . . . . . . . . . . . . . . . .63

basic connectivity

CLI configuration editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58

establishing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47

J-Web configuration editor . . . . . . . . . . . . . . . . . . . . . . . . . .58

Quick Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53

requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53

sample configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67

verifying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67

battery handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 589

behavior aggregate classifiers See classifiers

best-effort service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367

BGP (Border Gateway Protocol)

AS number (Quick Configuration) . . . . . . . . . . . . . . . . 334

614

Index

Index

See also ASs (autonomous systems), AS number

AS path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279

confederations See BGP confederations

enabling (Quick Configuration) . . . . . . . . . . . . . . . . . . . 334

external (EBGP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276

external group type (configuration editor). . . . . . . . 337 external neighbor (peer) address (configuration editor). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337

full mesh requirement. . . . . . . . . . . . . . . . . . . . . . . 277, 332

injecting OSPF routes into BGP . . . . . . . . . . . . . . . . . . . 380

internal (IBGP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276

internal group type (configuration editor) . . . . . . . . 339 internal neighbor (peer) address (configuration editor). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339

license, route reflectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70

local address (Quick Configuration). . . . . . . . . . . . . . . 334

local preference. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278

MED metric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280

monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210

origin value . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279

overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .274, 331

peer address (Quick Configuration). . . . . . . . . . . . . . . 334 peer AS number (Quick Configuration). . . . . . . . . . . 334

peering sessions See BGP peers; BGP sessions

point-to-point internal peer session (configuration editor). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338

point-to-point peer session (configuration editor). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335

policy to make routes less preferable. . . . . . . . . . . . . 383

Quick Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333

requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332

route reflectors See BGP route reflectors

route selection process . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277

See also route selection

route-flap damping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385

router ID (Quick Configuration) . . . . . . . . . . . . . . . . . . . 334

routing policy (configuration editor) . . . . . . . . . . . . . . 339

See also routing policies

sample BGP peer network. . . . . . . . . . . . . . . . . . . . . . . . . 336

sample confederation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343

sample full mesh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338

sample route reflector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340

scaling techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280

session establishment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276 session maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276

statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .211

status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212

verifying BGP configuration . . . . . . . . . . . . . . . . . . . . . . . 346

verifying BGP groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345

verifying BGP peers (neighbors) . . . . . . . . . . . . . . . . . . 344

verifying peer reachability . . . . . . . . . . . . . . . . . . . . . . . . 347

BGP confederations confederation members. . . . . . . . . . . . . . . . . . . . . . . . . . . 344

confederation number . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343

creating (configuration editor) . . . . . . . . . . . . . . . . . . . . 342

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283, 332

route-flap damping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385

sample network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 sub-AS number . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343

BGP groups cluster identifier (configuration editor) . . . . . . . . . . . 341

confederations (configuration editor) . . . . . . . . . . . . . 342

displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .211

external group type (configuration editor). . . . . . . . 337 external, creating (configuration editor) . . . . . . . . . . 337 group AS number (configuration editor). . . . . . . . . . 337

internal group type (configuration editor) . . . . . . . . 339 internal, creating (configuration editor) . . . . . . . . . . 339

internal, creating for a route reflector

(configuration editor) . . . . . . . . . . . . . . . . . . . . . . . . . . . 341

verifying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345

BGP messages to establish sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276 update, to maintain sessions . . . . . . . . . . . . . . . . . . . . . . 276

BGP neighbors See BGP peers

BGP page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333

BGP peers directing traffic by local preference. . . . . . . . . . . . . . . 278

displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212

external (configuration editor) . . . . . . . . . . . . . . . . . . . . 335

internal (configuration editor). . . . . . . . . . . . . . . . . . . . . 338 internal, sample full mesh . . . . . . . . . . . . . . . . . . . . . . . . 338

internal, sample route reflector . . . . . . . . . . . . . . . . . . . 340

peer address (Quick Configuration). . . . . . . . . . . . . . . 334 peer AS number (Quick Configuration). . . . . . . . . . . 334

point-to-point connections . . . . . . . . . . . . . . . . . . . . . . . . 275

routing policy (configuration editor) . . . . . . . . . . . . . . 339

See also routing policies

sample peer network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336

sessions between . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331

verifying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344, 346

verifying reachability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347

BGP route reflectors cluster (configuration editor) . . . . . . . . . . . . . . . . . . . . . . 341 cluster identifier (configuration editor) . . . . . . . . . . . 341

cluster of clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282

creating (configuration editor) . . . . . . . . . . . . . . . . . . . . 339

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .281, 332

group type (configuration editor) . . . . . . . . . . . . . . . . . 341

license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70

multiple clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281

sample IBGP network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340

BGP sessions configured at both ends . . . . . . . . . . . . . . . . . . . . . . . . . . . 331

establishment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276 maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276

point-to-point external (configuration editor) . . . . 335

point-to-point internal (configuration editor) . . . . . 338

sample peering session . . . . . . . . . . . . . . . . . . . . . . . . . . . 275

Index

615

J-series™ Services Router User Guide

status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212

types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332

binary operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234

bit-field logical operators stateless firewall filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 bit-field match conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 bit-field synonym match conditions . . . . . . . . . . . . . . . . . . . 365

blank panel for empty PIM slot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26

for power supply (J6300) . . . . . . . . . . . . . . . . . . . . . . . . . . 534

blinking configuration LED state . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13

LAN port LED state . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14

POWER ON LED state . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

boot devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508 configuring (CLI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508

creating with Cygwin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510

creating with UNIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509

J2300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10

J4300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22

J6300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22

removable compact flash . . . . . . . . . . . . . . . . . . . . . . . . . . .25

selecting (CLI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .514–515

selecting (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513

storing memory snapshots. . . . . . . . . . . . . . . . . . . . . . . . .511

See also compact flash; USB

boot process, backup router for . . . . . . . . . . . . . . . . . . . . . . . . . .50

boot sequence

J2300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

J2400 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22

J6300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22

Bootstrap Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469

Border Gateway Protocol See BGP

bottom pane . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .113

braces, in configuration statements. . . . . . . . . . . . . . . . . . xxviii brackets angle, in syntax descriptions . . . . . . . . . . . . . . . . . . . . xxviii square, in configuration statements . . . . . . . . . . . . xxviii

branches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464

See also multicast browser interface See J-Web interface

BSR (Bootstrap Router) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469

BTUs per hour. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544

buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135

Add (Quick Configuration). . . . . . . . . . . . . . . . . . . . . . . . . 132

Apply (Quick Configuration) . . . . . . . . . . . . . . . . . . . . . . 132

Cancel (J-Web configuration editor). . . . . . . . . . . . . . . 135

Cancel (Quick Configuration) . . . . . . . . . . . . . . . . . . . . . 132

Commit (J-Web configuration editor) . . . . . . . . . . . . . 135

CONFIG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

Delete (Quick Configuration) . . . . . . . . . . . . . . . . . . . . . . 132

Discard (J-Web configuration editor) . . . . . . . . . . . . . . 135

OK (J-Web configuration editor). . . . . . . . . . . . . . . . . . . 135

OK (Quick Configuration) . . . . . . . . . . . . . . . . . . . . . . . . . 132

power . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

Refresh (J-Web configuration editor) . . . . . . . . . . . . . . 135

See also radio buttons

bytes transmitted . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209

C

C-bit parity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98

cables arranging for safety. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 520

connecting to network media . . . . . . . . . . . . . . . . . . . . . . .42

console port, connecting . . . . . . . . . . . . . . . . . . . . . . . . . . . .59

console port, DB–9 connector pinouts . . . . . . . . . . . 559

console port, replacing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518

disconnecting PIM cables . . . . . . . . . . . . . . . . . . . . . . . . . 522

disconnecting the power cord (J2300 or J4300) . . 532

E1 RJ-48 pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560

Ethernet rollover, connecting . . . . . . . . . . . . . . . . . . . . . . .59

Ethernet rollover, replacing. . . . . . . . . . . . . . . . . . . . . . . . 518

Ethernet, connecting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54

Ethernet, RJ-45 connector pinouts. . . . . . . . . . . . . . . . 559

grounding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42

PIM, installing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522

PIM, removing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522

power cord specifications . . . . . . . . . . . . . . . . . . . . . . . . . 547

power cord, replacing (J2300 or J4300) . . . . . . . . . . 532

power cord, replacing (J6300). . . . . . . . . . . . . . . . . . . . . 536

reducing radio frequency interference (RFI) . . . . . 546

serial EIA-530A DCE pinouts . . . . . . . . . . . . . . . . . . . . . . 556

serial EIA-530A DTE pinouts . . . . . . . . . . . . . . . . . . . . . . 555

serial PIM specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . 551

serial RS-232 DCE pinouts . . . . . . . . . . . . . . . . . . . . . . . . 552 serial RS-232 DTE pinouts. . . . . . . . . . . . . . . . . . . . . . . . . 552

serial RS-422/449 (EIA-449) DCE pinouts . . . . . . . . 554

serial RS-422/449 (EIA-449) DTE pinouts. . . . . . . . . 553

serial V.35 DCE pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . 557

serial V.35 DTE pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556

serial X.21 DCE pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . 559

serial X.21 DTE pinouts. . . . . . . . . . . . . . . . . . . . . . . . . . . . 558

T1 cable length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95

T1 RJ-48 pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560

T3 cable length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98

Cancel button

J-Web configuration editor . . . . . . . . . . . . . . . . . . . . . . . . 135

Quick Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132

canceling a commit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155–156

case number, for JTAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606

/cf/var/crash See crash files

/cf/var/log See system logs

/cf/var/tmp See temporary files

Challenge Handshake Authentication Protocol

See CHAP

change-log logging facility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

channel number, in interface name . . . . . . . . . . . . . . . . . . . . .84

CHAP (Challenge Handshake Authentication Protocol)

E1 local identity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88

enabling on E1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88

616

Index

Index

enabling on serial interfaces . . . . . . . . . . . . . . . . . . . . . . 100

enabling on T1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93

enabling on T3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97

serial interface local identity . . . . . . . . . . . . . . . . . . . . . . 100

T1 local identity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93

T3 local identity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97

CHAP secret See CHAP, local identity

chassid process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30

chassis alarm conditions and remedies . . . . . . . . . . . . . . . . . . . 537

alarms, displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207

component part numbers . . . . . . . . . . . . . . . . . . . . . . . . . 208

component serial number labels . . . . . . . . . . . . . . . . . 603

component serial numbers . . . . . . . . . . . . . . . . . . . . . . . 208

environment, displaying . . . . . . . . . . . . . . . . . . . . . . . . . . 207

grounding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42

identifiers, displaying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207

J2300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

J4300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17

J6300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17

lifting guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577

monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206

temperature, displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . 207

chassis software process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30

checklist for site preparation . . . . . . . . . . . . . . . . . . . . . . . . . . . 548

checksum

E1 frame . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .89

T1 frame . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95

T3 frame . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98

class of service See CoS (class of service) classifiers

applying BA classifiers. . . . . . . . . . . . . . . . . . . . . . . .440–441

default BA classifiers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369

sample BA classification. . . . . . . . . . . . . . . . . . . . . . . . . . . 373

sample BA classifier assignments. . . . . . . . . . . . . . . . . 441

sample, for firewall filter . . . . . . . . . . . . . . . . . . . . . . . . . . 431

Clean Up Files page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178

cleaning up files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177

clear system commit command . . . . . . . . . . . . . . . . . . . . . . . 156

clear-text access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52

CLI configuration editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .110

activating a configuration . . . . . . . . . . . . . . . . . . . . . . . . . 155

basic settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60

BGP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335

capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .110

command summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129

committing files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154

confirming a configuration. . . . . . . . . . . . . . . . . . . . . . . . 155

controlling user access . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186

exiting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146

initial configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58

IPSec tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486

managing files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158

modifying a configuration. . . . . . . . . . . . . . . . . . . . . . . . . 149

network interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

OSPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314

RADIUS authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182

RIP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301

saving files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160

SNMP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247

starting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146

statement types. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121

static routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290

TACACS+ authentication . . . . . . . . . . . . . . . . . . . . . . . . . . 183

using show commands with . . . . . . . . . . . . . . . . . . . . . . 157

verifying a configuration . . . . . . . . . . . . . . . . . . . . . . . . . . 154

See also configuration

clickable configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132

committing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136

discarding changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135

viewing and editing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132

See also J-Web configuration editor

clock rate, serial interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

clocking

E1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88

serial interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

T1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .94

T3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98

clusters See BGP route reflectors

command completion description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122

setting on and off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

command hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .117

command prompts changing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

configuration mode (#) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120

operational mode (>) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .119

command-line interface See CLI configuration editor;

JUNOS CLI

comments, in configuration statements . . . . . . . . . . . . . xxviii

commit and-quit command . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 commit at command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155

Commit button. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135

commit check command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 commit command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154

commit confirmed command. . . . . . . . . . . . . . . . . . . . . . . . . . 155 committed configuration activating (CLI configuration editor) . . . . . . . . . . . . . . 155

canceling a commit (CLI configuration editor) . . . 156

comparing two configurations . . . . . . . . . . . . . . . . . . . . 142

confirming (CLI configuration editor). . . . . . . . . . . . . 155

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128

J-Web configuration editor display . . . . . . . . . . . . . . . . .116

methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141

replacing (CLI configuration editor). . . . . . . . . . . . . . . 156 rescue configuration (CLI configuration editor) . . 156

rescue configuration (J-Web) . . . . . . . . . . . . . . . . . . . . . . 145

scheduling (CLI configuration editor) . . . . . . . . . . . . . 155

storage location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129

Index

617

J-series™ Services Router User Guide

summaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141

verifying (CLI configuration editor) . . . . . . . . . . . . . . . 154

viewing previous (CLI configuration editor) . . . . . . 157

communities, SNMP See SNMP communities

compact flash backup , removing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525

configuring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508

configuring for failure snapshot storage . . . . . . . . . . .511

copying a boot image with Cygwin . . . . . . . . . . . . . . . 510

copying a boot image with UNIX . . . . . . . . . . . . . . . . . 509

displaying size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 displaying usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206

primary, description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25

primary, installing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524

primary, removing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 523

primary, yellow alarm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537

removable, description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25

removable, installing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527

removable, J4300 and J6300 . . . . . . . . . . . . . . . . . . . . . . . .25

removable, LED states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25

removable, removing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525

compliance

EMC requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598

general standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597

components packing for shipment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609

part numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208

replacing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517

serial number label . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603

serial numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208

shipped. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37

troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536

confederations See BGP confederations

CONFIG button

15–second caution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145

for factory configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

for rescue configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

configuration activating (CLI configuration editor) . . . . . . . . . . . . . . 155

adding a statement (CLI configuration editor). . . . 150

basic. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131

changing part of a file (CLI configuration editor). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158

CLI commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129

CLI configuration mode . . . . . . . . . . . . . . . . . . . . . . . . . . . 146

committed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128

committing (CLI configuration editor) . . . . . . . . . . . . 154

committing (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136

committing as a text file, with caution (J-Web). . . 137

confirming (CLI configuration editor). . . . . . . . . . . . . 155

copying a statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151

deactivating a statement . . . . . . . . . . . . . . . . . . . . . . . . . . 153

deleting a statement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150

discarding changes (J-Web). . . . . . . . . . . . . . . . . . . . . . . . 135

downgrading (CLI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507 downgrading (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507

downloading (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144

editing (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132

editing as a text file, with caution (J-Web) . . . . . . . . 137

factory, committing with the CONFIG button . . . . . .12

history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140

See also configuration history

inserting an identifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152

interfaces, displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209

J-Web options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129

loading new (CLI configuration editor) . . . . . . . . . . . 158

loading previous (CLI configuration editor). . . . . . . 156

loading previous (J-Web). . . . . . . . . . . . . . . . . . . . . . . . . . . 145

locked, with the configure exclusive command . . 147

managing files (CLI configuration editor). . . . . . . . . 158

managing files (J-Web). . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139

merging (CLI configuration editor). . . . . . . . . . . . . . . . 158

modifying (CLI configuration editor). . . . . . . . . . . . . . 149

modifying a statement (CLI configuration editor). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150

overriding (CLI configuration editor). . . . . . . . . . . . . . 158

renaming an identifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151

replacing configuration statements (CLI configuration editor) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159

requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130

rescuing (CLI configuration editor). . . . . . . . . . . . . . . . 156

rescuing (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145

rollback (CLI configuration editor) . . . . . . . . . . . . . . . . 156

rollback (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145

saving (CLI configuration editor) . . . . . . . . . . . . . . . . . . 160

upgrading (CLI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506

upgrading (J-Web). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503

uploading (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138

users-editors, viewing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142

verifying (CLI configuration editor) . . . . . . . . . . . . . . . 154

viewing as a text file (J-Web) . . . . . . . . . . . . . . . . . . . . . . 136

configuration database displaying size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206

summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141

configuration editor See CLI configuration editor;

J-Web configuration editor

configuration hierarchy

J-Web display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .116

navigating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148

configuration history comparing files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142

database summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141

displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140

downloading files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144

summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141

users-editors, viewing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142

Configuration History page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140

configuration LED states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13

configuration mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121

commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120

618

Index

Index

entering and exiting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146

prompt (#) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120

using show commands in . . . . . . . . . . . . . . . . . . . . . . . . . 157

See also CLI configuration editor

configuration text editing and committing, with caution . . . . . . . . . . . . 137

viewing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136

configuration tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127

See also CLI configuration editor; configuration; configuration history; J-Web configuration editor; Quick Configuration

configure command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 configure exclusive command . . . . . . . . . . . . . . . . . . . . . . . . . 147

Configure link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134

configure private command. . . . . . . . . . . . . . . . . . . . . . . . . . . . 147

Confirm File Delete page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181

confirming a configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155

congestion control, with DiffServ assured forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443

connection network cables. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42

power . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43

connectivity bidirectional (BGP). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274

bidirectional (OSPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269

hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35

through J-Web. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54

through the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58

unidirectional (RIP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268

console port adapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58

connecting through the CLI . . . . . . . . . . . . . . . . . . . . . . . . .58

DB–9 connector pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . 559

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13

replacing the cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518

settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59

container statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121

controlling user access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186

conventions for interface names. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .82

how to use this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xxvi

notice icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvii text and syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvii

cooling system airflow requirement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541

J2300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15

J4300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

J6300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

copy command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151

cords See AC power cords

CoS (class of service) assigning forwarding classes to output queues. . . 434

BA classifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440

configuration tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428

default BA classifiers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372

default forwarding class queue assignments . . . . . 370

default scheduler settings . . . . . . . . . . . . . . . . . . . . . . . . . 371

DiffServ benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367

See also DiffServ

DSCP rewrites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373

DSCPs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367

See also DSCPs

firewall filter for a multifield classifier . . . . . . . . . . . . 430

JUNOS components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369

JUNOS implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . 369

policer for firewall filter . . . . . . . . . . . . . . . . . . . . . . . . . . . 429

preparation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428

RED drop profiles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443

rewrite rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435

sample BA classification. . . . . . . . . . . . . . . . . . . . . . . . . . . 373

scheduler maps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450

schedulers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446

uses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427

verifying multicast session announcements . . . . . 457

virtual channels for rules . . . . . . . . . . . . . . . . . . . . . . . . . . 453

cost, of a network path See path cost metrics

CPU usage, displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206

crash files cleaning up (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177

displaying size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206

downloading (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179

critical logging severity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

cron logging facility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

curly braces, in configuration statements . . . . . . . . . . . xxviii

customer support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxx contacting JTAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxx

contacting JTAC for hardware return . . . . . . . . . . . . . . 605

hardware information for . . . . . . . . . . . . . . . . . . . . . . . . . 207

information required for hardware return . . . . . . . . 606

Cygwin environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510

D

daemon logging facility. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

daemons See processes, software

data inversion

E1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88

T1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .94

Database Information page . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140

DB–9 connector pinouts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559

deactivate command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 deactivating configuration statements or identifiers . . 153

debug logging severity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

default gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50

defining (Quick Configuration). . . . . . . . . . . . . . . . . . . . . .57

static routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289

defaults

BA classifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372

CoS forwarding class assignments . . . . . . . . . . . . . . . . 371

junos-algs-outbound group, stateful firewall filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360

Index

619

J-series™ Services Router User Guide

routing policy actions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358

setting for static routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294

Delete button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132

delete command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150

Delete Configuration Below This Point radio button . . 135

deleting crash files (J-Web). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178

files, with caution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180

licenses (CLI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75

licenses (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74

log files (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178

network interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

temporary files (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178

denial-of-service attacks, preventing. . . . . . . . . . . . . . . . . . . 404

dense routing mode, caution for use . . . . . . . . . . . . . . . . . . 466

See also multicast routing modes

designated router (OSPF) controlling election . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270

desk installation (J2300 only) . . . . . . . . . . . . . . . . . . . . . . . . . . . .37

clearance requirement . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542

destination address, displaying . . . . . . . . . . . . . . . . . . . . . . . . .211

DHCP (Dynamic Host Configuration Protocol) . . . . . . . . . .51

DHCP server after initial configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . .51

before initial configuration . . . . . . . . . . . . . . . . . . . . . . . . . .51

maintaining after initial setup. . . . . . . . . . . . . . . . . . . . . . .56

diagnosis

CLI command summary . . . . . . . . . . . . . . . . . . . . . . . . . . 201

displaying firewall filter configurations . . . . . . . . . . . 415

displaying firewall filter statistics . . . . . . . . . . . . . . . . . 422

displaying static routes in the routing table . . . . . . 295

hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537

interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229

J-Web tools overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200

multicast paths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235

network traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231

ping command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226

ping host (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218

preparation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203

system operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235

traceroute (J-Web). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222

traceroute command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228

verifying BGP configuration . . . . . . . . . . . . . . . . . . . . . . . 346

verifying BGP groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345

verifying BGP peer reachability . . . . . . . . . . . . . . . . . . . 347

verifying BGP peers (neighbors) . . . . . . . . . . . . 344, 457

verifying firewall filter actions . . . . . . . . . . . . . . . . . . . . 423

verifying firewall filter DoS protection . . . . . . . . . . . . 424 verifying firewall filter flood protection. . . . . . . . . . . 424

verifying firewall filter handles fragments . . . . . . . . 425

verifying firewall filters with packet logs . . . . . . . . . 421

verifying IPSec tunnel operation . . . . . . . . . . . . . . . . . . 497

verifying multicast IGMP versions . . . . . . . . . . . . . . . . 478 verifying multicast SAP and SDP configuration . . 478

verifying OSPF host reachability . . . . . . . . . . . . . . . . . . 328

verifying OSPF neighbors . . . . . . . . . . . . . . . . . . . . . . . . . 326

verifying OSPF routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327

verifying OSPF-enabled interfaces . . . . . . . . . . . . . . . . 325

verifying PIM mode and interface configuration . . 479

verifying PIM RPF routing table. . . . . . . . . . . . . . . . . . . 480

verifying PIM RPs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479

verifying RIP host reachability . . . . . . . . . . . . . . . . . . . . 308

verifying RIP-enabled interfaces . . . . . . . . . . . . . . . . . . 307

verifying stateful firewall filters . . . . . . . . . . . . . . . . . . . 420

diagnostic commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201

Differentiated Services See DiffServ

DiffServ (Differentiated Services) assigning forwarding classes to output queues. . . 434

assured forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443

BA classifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440

benefits for CoS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367 code points. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367

See also DSCPs

configuration tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428

default BA classifiers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372

default forwarding class queue assignments . . . . . 370

default scheduler settings . . . . . . . . . . . . . . . . . . . . . . . . . 371

DSCP rewrites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373

firewall filter for a multifield classifier . . . . . . . . . . . . 430

forwarding service classes . . . . . . . . . . . . . . . . . . . . . . . . 368

interoperability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367

JUNOS implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . 369

policer for firewall filter . . . . . . . . . . . . . . . . . . . . . . . . . . . 429

preparation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428

RED drop profiles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443

rewrite rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435

sample BA classification. . . . . . . . . . . . . . . . . . . . . . . . . . . 373

scheduler maps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450

schedulers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446

uses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427

virtual channels for rules . . . . . . . . . . . . . . . . . . . . . . . . . . 453

digital certificate, for encrypted access . . . . . . . . . . . . . . . . . .52

disabling system logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194

Discard All Changes radio button . . . . . . . . . . . . . . . . . . . . . . 135

Discard button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135

Discard Changes Below This Point radio button. . . . . . . 135

discard rule stateful firewall filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359

stateless firewall filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362

discarded packets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209

discarding configuration changes . . . . . . . . . . . . . . . . . . . . . . 135

Distance Vector Multicast Routing Protocol. . . . . . . . . . . . 468

distance-vector routing protocols . . . . . . . . . . . . . . . . . . . . . . 265

See also RIP

DNS (Domain Name System) . . . . . . . . . . . . . . . . . . . . . . . . . . . .49

DNS server address, displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204

defining (configuration editor) . . . . . . . . . . . . . . . . . . . . . .63

defining (Quick Configuration). . . . . . . . . . . . . . . . . . . . . .57

620

Index

Index

function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49

documentation set comments on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxx

domain name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49

defining (configuration editor) . . . . . . . . . . . . . . . . . . . . . .62

defining (Quick Configuration) . . . . . . . . . . . . . . . . . . . . . .56

See also DNS server

Domain Name System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49

domain search defining (configuration editor) . . . . . . . . . . . . . . . . . . . . . .63

defining (Quick Configuration) . . . . . . . . . . . . . . . . . . . . . .57

DoS (denial-of-service) attacks, preventing . . . . . . . . . . . . 404

downgrading with J-Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507 with the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507

download URL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502

downloading configuration files (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . 144

crash files (J-Web). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179

licenses (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74

log files (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179

software upgrades . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502

temporary files (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179

downstream interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464

See also multicast

DRAM modules installing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531

removing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529

dropped packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209

dry chemical fire extinguishers, prohibited. . . . . . . . . . . . 545

DS3 ports See T3 ports

DSCPs (DiffServ code points) corresponding forwarding service classes . . . . . . . . 368

default forwarding class queue assignments . . . . . 370

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367

replacing with rewrite rules . . . . . . . . . . . . . . . . . . . . . . . 436

rewrites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373 sample BA classification. . . . . . . . . . . . . . . . . . . . . . . . . . . 373

DVMRP (Distance Vector Multicast Routing

Protocol) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468

Dynamic Host Configuration Protocol . . . . . . . . . . . . . . . . . . .51

dynamic routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262

E

E1 ports

CHAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88

clocking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88

configuring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86

data inversion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88

encapsulation type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .87

fractional, channel number . . . . . . . . . . . . . . . . . . . . . . . . .84

frame checksum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .89

framing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88

license. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70

logical interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .87

MTU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88

RJ-48 cable pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560

time slots. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .89

earth ground See grounding

earthquakes rack-mount requirements . . . . . . . . . . . . . . . . . . . . . . . . . 543

seismic requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544

EBGP (external BGP) description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276

route-flap damping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385

sample network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338

edit command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148

Edit Configuration page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133

Edit Configuration Text page . . . . . . . . . . . . . . . . . . . . . . . . . . . 138

Edit link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134

EGPs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260

EIA-530A DCE cable pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . 556

EIA-530A DTE cable pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . 555

electricity safety warnings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 568

wiring guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545

electromagnetic compatibility (EMC) compliance with requirements . . . . . . . . . . . . . . . . . . . 598

preventing problems with . . . . . . . . . . . . . . . . . . . . . . . . . 546

standards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597

electromagnetic interference (EMI) compliance with requirements . . . . . . . . . . . . . . . . . . . 598

electrostatic bag, for storing components . . . . . . . . . . . . . 567 electrostatic discharge, preventing . . . . . . . . . . . . . . . . . . . . . 567

EMC

standards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597

suppressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546

standards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597

emergency logging severity . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

EMI compliance with requirements . . . . . . . . . . . . . . . . . . . 598

preventing problems with . . . . . . . . . . . . . . . . . . . . . . . . . 546

compliance with requirements . . . . . . . . . . . . . . . . . . . 598

standards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597

suppressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546

encapsulation type

E1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .87

serial interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

T1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93

T3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97

encrypted access through SSH . . . . . . . . . . . . . . . . . . . . . . . . . . .52

end-user requirements, for autoinstallation . . . . . . . . . . . . .66

environment, CLI displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

environmental requirements for operation. . . . . . . . . . . . 543

EPROM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10, 22

error logging severity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

ESD (electrostatic discharge), preventing . . . . . . . . . . . . . . 567

Index

621

J-series™ Services Router User Guide

ESD wrist strap verifying resistance, for safety . . . . . . . . . . . . . . . . . . . . 568

wearing during installation. . . . . . . . . . . . . . . . . . . . . . . 8, 17

Ethernet cable connecting the Services Router to a management device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54

RJ-45 connector pinouts. . . . . . . . . . . . . . . . . . . . . . . . . . . 559

Ethernet rollover cable connecting the Services Router to a management device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59

DB–9 connector pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . 559

replacing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518

exact route list match type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378

exit command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147

to navigate the configuration hierarchy . . . . . . . . . . 148

exit configuration-mode command . . . . . . . . . . . . . . . . . . . . 147

export statement, for routing policies . . . . . . . . . . . . . . . . . 358

exterior gateway protocols (EGPs) . . . . . . . . . . . . . . . . . . . . . 260

external BGP See EBGP

F

facility none statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194

factory configuration, committing with the CONFIG button. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

failures

PIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537

Routing Engine fan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538

fans

J2300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15

J4300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

J6300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

Fast Ethernet ports configuring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .89

J2300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14

J4300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24

J6300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24

LED states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14

license, for PIM ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71

logical interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .91

no license required for LAN ports. . . . . . . . . . . . . . . . . . .71

PORT 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50

PORT 0, connecting through J-Web . . . . . . . . . . . . . . . . .54

fe-0/0/0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14, 24

connecting through J-Web. . . . . . . . . . . . . . . . . . . . . . . . . . .54

defining address (configuration editor) . . . . . . . . . . . . .64

defining address (Quick Configuration). . . . . . . . . . . . .58

disabling PIM on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475

for autoinstallation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51

management interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50

no license required . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71

See also Fast Ethernet ports fe-0/0/1 See Fast Ethernet ports feature licenses See licenses

feature overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

features, licensed, displaying. . . . . . . . . . . . . . . . . . . . . . . . . . . . .73

field-replaceable units, replacing . . . . . . . . . . . . . . . . . . . . . . . 517

file management configuration files (CLI configuration editor) . . . . . 158

configuration files (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . 139

crash files (J-Web). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 log files (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 temporary files (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177

filtering command output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202

fire extinguishers prohibited . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545

required . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544 fire safety requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544 fire suppression equipment required . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544 shutdown requirement . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544

firewall filters applying CoS rules to logical interfaces. . . . . . . . . . . 453

displaying configurations. . . . . . . . . . . . . . . . . . . . . . . . . . 415

displaying statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422

multifield classifier filter terms . . . . . . . . . . . . . . . . . . . 430

overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358

policer for . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429

sample classifier terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431

stateful firewall filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359

See also stateful firewall filters

stateless firewall filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359

See also stateless firewall filters

term number caution. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359

verifying configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415

verifying flood protection . . . . . . . . . . . . . . . . . . . . . . . . . 424

verifying fragment handling . . . . . . . . . . . . . . . . . . . . . . 425

verifying packet logging . . . . . . . . . . . . . . . . . . . . . . . . . . . 421

Firewall/NAT application page. . . . . . . . . . . . . . . . . . . . . . . . . . 391

Firewall/NAT page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390

field summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392

flap damping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385

flapping. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209

Flexible PIM Concentrator See FPC

flooding, preventing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404

flow control actions, routing policies . . . . . . . . . . . . . . . . . . 357

font conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvii

forwarding classes assigning to output queues. . . . . . . . . . . . . . . . . . . . . . . . 434

default queue assignments . . . . . . . . . . . . . . . . . . . . . . . . 370

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369

mapping to schedulers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451

policy to group source and destination prefixes . . 382

sample BA classification. . . . . . . . . . . . . . . . . . . . . . . . . . . 373

sample mappings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451

forwarding policy options description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370

forwarding software process . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31

forwarding states, multicast notation . . . . . . . . . . . . . . . . . . 465

forwarding table controlling OSPF routes in . . . . . . . . . . . . . . . . . . . . . . . . 321

622

Index

Index

controlling static routes in. . . . . . . . . . . . . . . . . . . 286, 293

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261

MED to determine routes in. . . . . . . . . . . . . . . . . . . . . . . 280

FPC (Flexible PIM Concentrator) number in interface name . . . . . . . . . . . . . . . . . . . . . . . . . .83

temperature. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207

framing

E1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88

T1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .94

T3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98

framing errors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209

from statement, routing policy match conditions . . . . . 354

front panel

J2300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

J4300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23

J6300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23

FRUs (field-replaceable units)

PIMs, installing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 520

PIMs, removing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519

replacing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517

full mesh requirement description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277

fulfilling with confederations. . . . . . . . . . . . . . . . . . . . . . 283

fulfilling with route reflectors . . . . . . . . . . . . . . . . . . . . . 281

sample network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338

fwdd process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31

G

*,G notation, for multicast forwarding states. . . . . . . . . . 465

gateway default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50

local and remote, for IPSec service sets . . . . . . . . . . 489

get requests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242

glossary basic connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47

configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127

CoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351

diagnostic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197

firewall filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351

monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197

multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461

network interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .79

routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255

routing policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351

system management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163

graceful shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45

graphical user interface See J-Web interface

grounding cable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42

chassis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42

connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44

equipment warning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 570

grounding lug connecting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44

specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42

groups

BGP See BGP groups

default junos-algs-outbound group, for stateful firewall filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360

for SNMP traps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249

OSPF areas. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316

RIP routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301

GUI See J-Web interface

H

halt immediately with J-Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513

with the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515

halting with J-Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512

with the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514

handling packet fragments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .411

hardware installation and connection . . . . . . . . . . . . . . . . . . . . . . . . .35

maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517 replacing components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517

returning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603

troubleshooting components. . . . . . . . . . . . . . . . . . . . . . 536

version, displaying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207

hardware features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

J2300 components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

J2300 front panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

J4300 components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20

J4300 front panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23

J6300 components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20

J6300 front panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23

help

J-Web interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .116

JUNOS CLI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123

help icon (?) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .116

help reference command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 help topic command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123

hierarchy See command hierarchy; configuration hierarchy

History See configuration history

hold time, to maintain a session . . . . . . . . . . . . . . . . . . . . . . . 276

hop count . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 maximizing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266

See also RIP

See also TTL

host reachability ping command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226

ping host (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218

verifying for a RIP network . . . . . . . . . . . . . . . . . . . . . . . 308

verifying for an OSPF network. . . . . . . . . . . . . . . . . . . . 328

hostname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49

defining (configuration editor) . . . . . . . . . . . . . . . . . . . . . .62

defining (Quick Configuration). . . . . . . . . . . . . . . . . . . . . .56

displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204

See also DNS server

Index

623

J-series™ Services Router User Guide

how to use this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xxvi

humidity requirement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544

Hyperterminal, for terminal emulation . . . . . . . . . . . . . . . . . .59

I

IBGP (internal BGP) description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276

full mesh (configuration editor) . . . . . . . . . . . . . . . . . . . 338

full mesh requirement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332

sample network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338

sample route reflector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340

ICMP (Internet Control Message Protocol) policers . . . 406

ICMP policers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406

identifier link. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134

identifiers, configuration adding or modifying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150

deactivating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153

deleting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150

inserting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152

renaming. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151

idle time displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205

setting for a CLI session . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

IDS (intrusion detection service) information, displaying. . . . . . . . . . . . . . . . . . . . . . . . . . . . 216

monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 search-narrowing characteristics. . . . . . . . . . . . . . . . . . 215

ifd process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31

IGMP (Internet Group Management Protocol)

IGMPv1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468

IGMPv2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468

IGMPv3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469

setting the version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473

IGMP (Internet Group Membership Protocol) verifying the version. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478

IGPs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260

IKE (Internet Key Exchange) description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483

preshared key (configuration editor). . . . . . . . . . . . . . 491

preshared key (Quick Configuration) . . . . . . . . . . . . . 486

immunity standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597

import statement, for routing policies . . . . . . . . . . . . . . . . . 358

IN USE LED states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25

incoming metric (RIP), modifying . . . . . . . . . . . . . . . . . . . . . 304

inet routing table. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476

info logging severity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

initial configuration requirements . . . . . . . . . . . . . . . . . . . . . . .53

injecting routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381

injury, steps to take . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 571

insert command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 inserting configuration identifiers. . . . . . . . . . . . . . . . . . . . . . 152

Install Remote page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504

field summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505

installation desk (J2300 only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37

DRAM modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531

initial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35

licenses (CLI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75

licenses (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73

PIM cables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522

PIMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 520

power supplies (J6300) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535

preparation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541

primary compact flash . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524

rack See rack installation

removable compact flash . . . . . . . . . . . . . . . . . . . . . . . . . 527

requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35

safety guidelines and warnings . . . . . . . . . . . . . . . . . . . 577

site checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548

site guidelines. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541

software upgrades (CLI) . . . . . . . . . . . . . . . . . . . . . . . . . . . 506

software upgrades, from a remote server (Quick

Configuration) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503

software upgrades, uploading (Quick

Configuration) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505

tools and equipment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36

USB drive. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529

wall (J2300 only). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38

interactive-commands logging facility . . . . . . . . . . . . . . . . . 191

interface naming conventions . . . . . . . . . . . . . . . . . . . . . . . . . . .82

interface software process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31

interfaces See loopback interfaces; management interfaces; network interfaces; services interfaces; user interfaces; ports

Interfaces page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85

for E1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86

for Fast Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90

for serial interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .99

for T1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .92

for T3 (DS3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96

interior gateway protocols (IGPs) . . . . . . . . . . . . . . . . . . . . . . 260

internal BGP See IBGP

Internet Group Management Protocol See IGMP

Internet Key Exchange See IKE

Internet routing, with BGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331

intrusion detection service See IDS

invalid configuration, replacing with J-Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145

with the CLI configuration editor . . . . . . . . . . . . . . . . . 156

invalid routes, rejecting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380

IP Security See IPSec

IPSec (IP Security)

IKE See IKE

monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216

security associations See IPSec security associations

statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217

tunnels See IPSec tunnels

verifying tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497

VPN license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70

624

Index

Index

IPSec security associations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483

See also IKE

IPSec tunnels displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217

IKE key (configuration editor) . . . . . . . . . . . . . . . . . . . . . 491

IKE key (Quick Configuration) . . . . . . . . . . . . . . . . . . . . 486

incoming traffic filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 484

IPSec rule (configuration editor) . . . . . . . . . . . . . . . . . . 492

local endpoint (Quick Configuration) . . . . . . . . . . . . . 486

NAT pools (configuration editor) . . . . . . . . . . . . . . . . . . 494

outgoing traffic filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 484

overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483

private addresses (Quick Configuration). . . . . . . . . . 486

Quick Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 484

remote endpoint (Quick Configuration) . . . . . . . . . . 486

requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 484

services interfaces (configuration editor) . . . . . . . . . 487

services sets (configuration editor) . . . . . . . . . . . . . . . 488

stateful firewall filter (configuration editor). . . . . . . 492

verifying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497

IPSec Tunnels page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 485

field summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486

J

J-Flow license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70

J-series

BGP routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331

configuration tools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127

CoS overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366

CoS with DiffServ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427

establishing software connectivity . . . . . . . . . . . . . . . . . .47

feature summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

firewall filter overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358

firewall filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389

hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

hardware replacement . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517

hardware return . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603

installation and connection . . . . . . . . . . . . . . . . . . . . . . . . .35

IPSec tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483

JUNOS Internet software overview . . . . . . . . . . . . . . . . .28

licenses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69

managing users and operations. . . . . . . . . . . . . . . . . . . 163

models available . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

monitoring and diagnosis . . . . . . . . . . . . . . . . . . . . . . . . . 197

multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471

multicast overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461

NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389

network cables and connectors . . . . . . . . . . . . . . . . . . . 551

network interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .79

network management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241

OSPF routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309

release notes, URL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv

RIP routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297

routing policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375

routing policy overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . 353

routing protocols overview . . . . . . . . . . . . . . . . . . . . . . . . 255

safety and compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563

site preparation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541

software upgrades . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501

static routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285

user interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

J-Web configuration editor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .110

basic settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60

BGP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335

capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .110

clickable configuration, committing . . . . . . . . . . . . . . 136

clickable configuration, discarding changes . . . . . . 135

clickable configuration, editing . . . . . . . . . . . . . . . . . . . 132

committing a text file, with caution . . . . . . . . . . . . . . 137

configuration hierarchy display . . . . . . . . . . . . . . . . . . . .116

configuration text, viewing. . . . . . . . . . . . . . . . . . . . . . . . 136

controlling user access . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186

editing a text file, with caution. . . . . . . . . . . . . . . . . . . . 137

initial configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58

IPSec tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486

managing files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139

network interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

OSPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314

RADIUS authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182

RIP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301

SNMP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247

static routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290

TACACS+ authentication . . . . . . . . . . . . . . . . . . . . . . . . . . 183

uploading a file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138

See also configuration

J-Web interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54

comparing configuration differences . . . . . . . . . . . . . 142

configuration history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140

See also configuration history

configuration options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129

connecting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54

context-sensitive help . . . . . . . . . . . . . . . . . . . . . . . . 116, 123

Diagnose options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200

help (?) icon. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .116

managing files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177

managing licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71

Monitor options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199

overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

page layout. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .113

sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .117

starting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .112

See also J-Web configuration editor; Quick

Configuration

J-Web Quick Configuration See Quick Configuration

J2300 boot devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10

boot sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

chassis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

components shipped . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37

cooling system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15

Index

625

J-series™ Services Router User Guide

electrical specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . 546

fans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15

feature overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

front panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

hardware components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37

physical specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

PIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13

power cord, replacing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532

power system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15

Routing Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10

USB port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13

J4300 boot devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22

boot sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22

chassis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17

components shipped . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37

cooling system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

electrical specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . 547

fans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

feature overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

front panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23

hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16

hardware components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20

installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40

physical specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

PIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25

power cord, replacing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532

power system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26

removable compact flash . . . . . . . . . . . . . . . . . . . . . . . . . . .25

Routing Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

USB port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24

J6300 boot devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22

boot sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22

chassis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17

components shipped . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37

cooling system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

electrical specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . 547

fans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

feature overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

front panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23

hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16

hardware components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20

installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40

physical specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

PIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25

power cord, replacing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536

power supplies See power supplies, J6300

removable compact flash . . . . . . . . . . . . . . . . . . . . . . . . . . .25

Routing Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

USB port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24

JTAC (Juniper Networks Technical Assistance Center) contacting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538

contacting for hardware return . . . . . . . . . . . . . . . . . . . 605

hardware information for . . . . . . . . . . . . . . . . . . . . . . . . . 207

information required for hardware return . . . . . . . . 606

Juniper Networks Technical Assistance Center See JTAC

JUNOS CLI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58

access privilege levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165

command completion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122

command hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .117

command modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .110

command prompts See command prompts

connecting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58

context-sensitive help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123

denying and allowing commands . . . . . . . . . . . . . . . . 167

diagnostic command summary. . . . . . . . . . . . . . . . . . . 201

editing keystrokes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121

environment, changing. . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

filtering command output . . . . . . . . . . . . . . . . . . . . . . . . . 202

idle time. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

managing licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75

monitoring (show) commands summary. . . . . . . . . 199

overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .110

screen length. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 screen width . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

starting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .118

terminal type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

working directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

See also CLI configuration editor

JUNOS Internet software

CoS components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369

CoS functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369

DiffServ implementation . . . . . . . . . . . . . . . . . . . . . . . . . . 369

establishing connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . .47

licenses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70

overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28

Packet Forwarding Engine. . . . . . . . . . . . . . . . . . . . . . . . . . .29

processes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29

release notes, URL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv

Routing Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29

upgrading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501

version, displaying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204

junos-algs-outbound group, for stateful firewall filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360

junos-jseries package See upgrades

JUNOScope application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31

JUNOScript API defining access (Quick Configuration) . . . . . . . . . . . . . .58

management access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52

K

keepalive messages, for session hold time . . . . . . . . . . . . 276

kernel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29

kernel logging facility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

key sequences, editing, in CLI. . . . . . . . . . . . . . . . . . . . . . . . . . 121

626

Index

Index

L

labels, serial number . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603

LAN ports See Fast Ethernet ports laptop See management device

lasers beam warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 586

Class 1 product warning. . . . . . . . . . . . . . . . . . . . . . . . . . . 585

open aperture warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587

safety guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 584

leaf statements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121

leaves . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464

See also multicast

LEDs

ALARM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Class 1 product warning. . . . . . . . . . . . . . . . . . . . . . . . . . . 585

configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13

Fast Ethernet port status . . . . . . . . . . . . . . . . . . . . . . . . . . . .14

IN USE, for removable compact flash . . . . . . . . . . . . . .25

J6300 power supply . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

LAN port status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14

PIM status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14

POWER ON . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

safety warnings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 584

license keys components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71

displaying (CLI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78

displaying (J-Web). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74

status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73

version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73

licenses adding (CLI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75

adding (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73

BGP route reflectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70

deleting (CLI). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75

deleting (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74

displaying (CLI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76

displaying (J-Web). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73

displaying usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .77

downloading (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74

E1 ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70

Fast Ethernet LAN ports (no license required). . . . . .71

Fast Ethernet PIM ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71

features requiring a license . . . . . . . . . . . . . . . . . . . . . . . . . . 4

installed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73

IPSec VPNs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70

J-Flow traffic analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70

JUNOS Internet software . . . . . . . . . . . . . . . . . . . . . . . . . . . .70

key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71

See also license keys

managing (CLI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75

managing (J-Web). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71

NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70

overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69

preparation for. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71

saving (CLI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76

serial ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71

stateful firewall filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70

T1 ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70

traffic analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70

verifying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76

Licenses page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72

lifting guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577

lightening activity warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592

lights See LEDs

line buildout

T1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95

T3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98

line speed, serial interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

link states displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208

verifying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

link-state advertisements See LSAs

lo0.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50

load command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 load merge command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 load override command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 load patch command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158

load replace command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159

loading a configuration file

CLI configuration editor . . . . . . . . . . . . . . . . . . . . . . . . . . . 158

downloading (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144

rollback (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145

rollback command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156

uploading (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138

without specifying full hierarchy . . . . . . . . . . . . . . . . . . 158

local password default authentication method . . . . . . . . . . . . . . . . . . . . 173

order of user authentication (configuration editor). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185

specifying for authentication (Quick

Configuration) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174

local preference description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278

high value preferred . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279

role in route selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277

local template accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190

local tunnel endpoint, IPSec. . . . . . . . . . . . . . . . . . . . . . . . . . . . 486

locked configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147

Log Files page (Download) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179

log messages See system log messages

logging facilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

logging severity levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

logical interfaces adding (configuration editor). . . . . . . . . . . . . . . . . . . . . . 103

CoS rules for . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453

E1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .87

Fast Ethernet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .91

inside services interface, IPSec . . . . . . . . . . . . . . . . . . . 487 outside services interface, IPSec . . . . . . . . . . . . . . . . . . 487

serial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

Index

627

J-series™ Services Router User Guide

T1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93

T3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97

virtual channels for . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453

logical operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234

logical units adding (configuration editor). . . . . . . . . . . . . . . . . . . . . . 103

E1 interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .87

Fast Ethernet interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .91

number in interface name . . . . . . . . . . . . . . . . . . . . . . . . . .84

serial interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

T1 interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93

T3 interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97

login classes defining (configuration editor) . . . . . . . . . . . . . . . . . . . . 186

permission bits for. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166

predefined permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . 167

specifying (Quick Configuration). . . . . . . . . . . . . . . . . . 176

login time, displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205

logs See system logs long buildout See line buildout

longer route list match type . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378

loopback address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50

defining (configuration editor) . . . . . . . . . . . . . . . . . . . . . .64

defining (Quick Configuration) . . . . . . . . . . . . . . . . . . . . . .57

displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204

loopback interfaces, applying stateless firewall filters to (configuration editor). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414

loss priority description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369

LSAs (link-state advertisements) description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270 three-way handshake. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270

lug See grounding lug

M

MAC (media access control) address configured, displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 hardware, displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209

maintenance

DRAM modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529

PIMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518

power cord, replacing (J2300 or J4300) . . . . . . . . . . 532

power system (J6300) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533

primary compact flash . . . . . . . . . . . . . . . . . . . . . . . . . . . . 523

removable compact flash . . . . . . . . . . . . . . . . . . . . . . . . . 525

tools and parts required . . . . . . . . . . . . . . . . . . . . . . . . . . . 518

USB drive. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527

warnings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 588

management access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51

management device connecting through J-Web. . . . . . . . . . . . . . . . . . . . . . . . . . .54

connecting through the CLI . . . . . . . . . . . . . . . . . . . . . . . . .60

connecting to J-Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55

Management Information Bases See MIBs

management interface address after initial configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . .51

before initial configuration . . . . . . . . . . . . . . . . . . . . . . . . . .51

defining (configuration editor) . . . . . . . . . . . . . . . . . . . . . .64

defining (Quick Configuration). . . . . . . . . . . . . . . . . . . . . .58

displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204

during initial configuration . . . . . . . . . . . . . . . . . . . . . . . . . .51

management interfaces administrative states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208

configuration, displaying . . . . . . . . . . . . . . . . . . . . . . . . . . 209

disabling PIM on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475

Fast Etherrnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50

fe-0/0/0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50

loopback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50

monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208, 229

PORT 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50

statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229

management software process . . . . . . . . . . . . . . . . . . . . . . . . . .30

managing users and operations. . . . . . . . . . . . . . . . . . . . . . . . 163

manuals comments on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxx

mapping, CoS forwarding classes to schedulers. . . . . . . 451

match conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233

routing policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354 routing policy, summary of. . . . . . . . . . . . . . . . . . . . . . . . 354

stateful firewall filter and NAT. . . . . . . . . . . . . . . . . . . . . 360

stateless firewall filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363 stateless firewall filters, summary of. . . . . . . . . . . . . . 363

match types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378

maximum configuration weight

J4300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

J6300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

maximum hop count, RIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266

maximum transmission unit See MTU

MED (multiple exit discriminator) description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280

role in route selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277

memory See compact flash; DRAM modules; USB

memory usage, displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205

merging a configuration file . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158

example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160

messages See BGP messages; keepalive messages; system log messages metrics See path cost metrics

MF classifier. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430

mgd process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30

MIBs (Management Information Bases) controlling access (configuration editor). . . . . . . . . . 250

enterprise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 standard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242

system identification (configuration editor) . . . . . . 247

views (configuration editor) . . . . . . . . . . . . . . . . . . . . . . . 250

microkernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29

middle pane. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .116

628

Index

Index

midplane, J4300 and J6300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

fan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

minimum configuration weight

J4300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

J6300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

monitor file command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235

monitor interface command . . . . . . . . . . . . . . . . . . . . . . . . . . . 229

controlling output. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230

monitor interface traffic command . . . . . . . . . . . . . . . . . . . . 229

controlling output. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230

monitor traffic command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 performance impact. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231

monitor traffic matching command . . . . . . . . . . . . . . . . . . . 232

arithmetic, binary, and relational operators . . . . . . 234 logical operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234

match conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233

monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197

chassis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206

CLI commands and corresponding J-Web options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198

IDS information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215

interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208, 229

IPSec tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216

J-Web options and corresponding CLI commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198

multicast paths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235

NAT pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217

network interface traffic. . . . . . . . . . . . . . . . . . . . . . . . . . . 231

ports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208

preparation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203

routing information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210

stateful firewall filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214

system logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235

system properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204

trace files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235

See also diagnosis; statistics; status

monoammonium phospate . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545

mounting brackets

J2300 rack installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40

J4300 and J6300 rack installation. . . . . . . . . . . . . . . . . . .41

wall installation (J2300 only) . . . . . . . . . . . . . . . . . . . . . . . .39

mounting holes, spacing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543

MSDP (Multicast Source Discovery Protocol) . . . . . . . . . . 469

mtrace monitor command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238

mtrace-from-source command. . . . . . . . . . . . . . . . . . . . . . . . . 236 options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236

results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237

MTU (maximum transmission unit) displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209

E1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88

T1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .94

T3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98, 101

multiarea network, OSPF. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316

multicast administrative scoping . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467

architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463

Auto-RP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469

BSR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469

downstream interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464

DVMRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468

forwarding state notation . . . . . . . . . . . . . . . . . . . . . . . . . 465

*,G notation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465

IGMP See IGMP

IP address ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465

MSDP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469

network elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465

overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461

PGM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469

PIM dense mode See PIM

PIM source-specific multicast (SSM) . . . . . . . . . . . . . . 468

PIM sparse mode See PIM

preparation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472

preventing routing loops . . . . . . . . . . . . . . . . . . . . . . . . . . 466

protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467

reverse-path forwarding (RPF) . . . . . . . . . . . . . . . . . . . . 466

routing modes See multicast routing modes

S,G notation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465

SAP and SDP See SAP; SDP

session announcements. . . . . . . . . . . . . . . . . . . . . . . . . . . 472

shortest-path tree (SPT) . . . . . . . . . . . . . . . . . . . . . . . . . . . 467

static RP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474

See also RP

subnetwork leaves and branches . . . . . . . . . . . . . . . . . 464

trace operations, displaying . . . . . . . . . . . . . . . . . . . . . . . 238

tracing paths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236

upstream interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464

verifying IGMP versions . . . . . . . . . . . . . . . . . . . . . . . . . . . 478

verifying PIM mode and interface configuration . . 479

verifying PIM RPF routing table. . . . . . . . . . . . . . . . . . . 480

verifying PIM RPs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479

verifying SAP and SDP configuration . . . . . . . . . . . . . 478

multicast routing modes dense mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466 dense mode, caution for use . . . . . . . . . . . . . . . . . . . . . . 466 sparse mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466

Multicast Source Discovery Protocol . . . . . . . . . . . . . . . . . . . 469

multifield classifier. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430

multiple exit discriminator See MED

multiple routers rack order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40

using snapshots to replicate configurations . . . . . . 508

N

names, of network interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . .82

displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208

NAPT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358

NAT (Network Address Translation) actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361

Index

629

J-series™ Services Router User Guide

applying to an interface (configuration editor) . . . 398

configuration editor . . . . . . . . . . . . . . . . . . . . . . . . . 393, 395

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358

displaying pools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217

enabling (Quick Configuration) . . . . . . . . . . . . . . . . . . . 392

license. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70

match conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360

monitoring pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217

pools for IPSec tunnels (configuration editor) . . . . 494

preparation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389

Quick Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390

sample rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394

verifying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420

neighbors See BGP peers; OSPF neighbors; RIP neighbors

Network Address Port Translation. . . . . . . . . . . . . . . . . . . . . . 358

Network Address Translation See NAT

network cable pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551

network interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

adding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

administrative states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208

configuration, displaying . . . . . . . . . . . . . . . . . . . . . . . . . . 209

deleting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

DS3 configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95

E1 configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86

enabling PIM on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475

enabling RIP on. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300

Fast Ethernet configuration . . . . . . . . . . . . . . . . . . . . . . . . .89

monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208, 229

monitoring traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231

multicast, upstream and downstream . . . . . . . . . . . . 464

naming conventions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .82

overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .82

preparation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84

serial configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98

statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229

supported . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .82

T1 configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .91

T3 configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95

verifying PIM on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479

verifying properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

verifying RIP on. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307

network management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241

See also SNMP

Network Time Protocol (NTP) server See NTP server

networks description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259

designated router See designated router, OSPF path cost metrics See path cost metrics

sample BGP AS path. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279

sample BGP confederation . . . . . . . . . . . . . . . . . . . . . . . . 343

sample BGP confederations . . . . . . . . . . . . . . . . . . . . . . . 284

sample BGP external and internal links . . . . . . . . . . 338

sample BGP local preference use . . . . . . . . . . . . . . . . . 278

sample BGP MED use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280

sample BGP peer network. . . . . . . . . . . . . . . . . . . . . . . . . 336

sample BGP peer session. . . . . . . . . . . . . . . . . . . . . . . . . . 275

sample BGP route reflector (one cluster) . . . .281, 340

sample BGP route reflectors (cluster of clusters) . . 283

sample BGP route reflectors (multiple clusters) . . 282

sample distance-vector routing . . . . . . . . . . . . . . . . . . . 266

sample multiarea OSPF routing. . . . . . . . . . . . . . . . . . . 272

sample OSPF backbone area. . . . . . . . . . . . . . . . . . . . . . 273

sample OSPF multiarea network . . . . . . . . . . . . . . . . . 316

sample OSPF network with stubs and NSSAs . . . . 274

sample OSPF single-area network . . . . . . . . . . . . . . . . 315

sample OSPF stub areas and NSSAs . . . . . . . . . . . . . . 319

sample OSPF topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327

sample poison reverse routing . . . . . . . . . . . . . . . . . . . . 268

sample RIP network with incoming metric . . . . . . 303

sample RIP network with outgoing metric . . . . . . . 304

sample RIP topology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301

sample route advertisement . . . . . . . . . . . . . . . . . . . . . . 263

sample route aggregation . . . . . . . . . . . . . . . . . . . . . . . . . 264

sample split horizon routing . . . . . . . . . . . . . . . . . . . . . . 267

sample static route, preferred path . . . . . . . . . . . . . . . 292

sample stub network for static routes . . . . . . . . . . . . 290

sample topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261

sample unidirectional routing . . . . . . . . . . . . . . . . . . . . . 269

static routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262

trusted See trusted networks untrusted See untrusted networks

next hop address for static routes . . . . . . . . . . . . . . . . . . . . . . . . . . . 289

defining for static routes . . . . . . . . . . . . . . . . . . . . . . . . . . 291

displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .211

qualified, defining for static routes . . . . . . . . . . . . . . . 293

qualified, for static routes . . . . . . . . . . . . . . . . . . . . . . . . . 286

service set, for IPSec tunnels. . . . . . . . . . . . . . . . . . . . . . 488

no-world-readable statement. . . . . . . . . . . . . . . . . . . . . . . . . . . 194

not-so-stubby areas See NSSAs

notice icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvii

notice logging severity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

notifications See SNMP traps

NSSAs (not-so-stubby areas) area ID (configuration editor) . . . . . . . . . . . . . . . . . . . . . 317

area ID (Quick Configuration) . . . . . . . . . . . . . . . . . . . . . 312

area type (Quick Configuration). . . . . . . . . . . . . . . . . . . 313

creating (configuration editor) . . . . . . . . . . . . . . . . . . . . 319

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273

example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274

sample topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319

NTP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49

defining (configuration editor) . . . . . . . . . . . . . . . . . . . . . .63

defining (Quick Configuration). . . . . . . . . . . . . . . . . . . . . .57

numeric range match conditions . . . . . . . . . . . . . . . . . . . . . . 363

O

object identifiers (OIDs) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242

OIDs (object identifiers) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242

630

Index

Index

OK button

J-Web configuration editor . . . . . . . . . . . . . . . . . . . . . . . . 135

Quick Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132

ON button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

Open Shortest Path First protocol See OSPF operating system See JUNOS Internet software

operational mode commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .119

entering during configuration . . . . . . . . . . . . . . . 157–158

filtering command output . . . . . . . . . . . . . . . . . . . . . . . . . 202

prompt (>) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .119

operator login class permissions . . . . . . . . . . . . . . . . . . . . . . . 167

operators arithmetic, binary, and relational operators . . . . . . 234 logical . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234

origin, of BGP route. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279

orlonger route list match type. . . . . . . . . . . . . . . . . . . . . . . . . . 379

OSPF (Open Shortest Path First) area border routers See area border routers

area type (Quick Configuration). . . . . . . . . . . . . . . . . . . 313

areas. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271, 310

See also area border routers; backbone area;

NSSAs; stub areas

authenticating exchanges (OSPFv2 only). . . . . . . . . 323

backbone area See backbone area

controlling designated router election . . . . . . . . . . . . 324

controlling route cost . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322

designated router See designated router, OSPF designating OSPF interfaces (configuration

editor). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .316–317

designating OSPF interfaces (Quick

Configuration) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313

enabling (Quick Configuration) . . . . . . . . . . . . . . . . . . . 312

enabling, description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309

ensuring efficient operation. . . . . . . . . . . . . . . . . . . . . . . 321

injecting OSPF routes into BGP . . . . . . . . . . . . . . . . . . . 380

LSAs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270

monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210

multiarea network (configuration editor) . . . . . . . . . 316

NSSAs See NSSAs

overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269, 309

path cost metrics See path cost metrics

Quick Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310 requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310

route preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321

router ID (configuration editor) . . . . . . . . . . . . . . . . . . . 314

router ID (Quick Configuration) . . . . . . . . . . . . . . . . . . . 312

sample multiarea network . . . . . . . . . . . . . . . . . . . . . . . . 316

sample network topology . . . . . . . . . . . . . . . . . . . . . . . . . 327

sample NSSAs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319

sample single-area network . . . . . . . . . . . . . . . . . . . . . . . 315

sample stub areas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319

single-area network (configuration editor) . . . . . . . 315

statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213

stub areas See stub areas

supported versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270 three-way handshake . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270

tuning an OSPF network . . . . . . . . . . . . . . . . . . . . . . . . . . 321

verifying host reachability. . . . . . . . . . . . . . . . . . . . . . . . . 328

verifying neighbors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326

verifying RIP-enabled interfaces . . . . . . . . . . . . . . . . . . 325

verifying routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327

OSPF interfaces displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213

enabling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313

enabling (configuration editor). . . . . . . . . . . . . . .316–317

enabling, for area border routers . . . . . . . . . . . . . . . . . 319

status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213

verifying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325

OSPF neighbors displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213

verifying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326

OSPF page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .311

field summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312

outgoing metric (RIP), modifying . . . . . . . . . . . . . . . . . . . . . . 305

output queues assigning forwarding classes . . . . . . . . . . . . . . . . . . . . . . 434 sample assignments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434

overriding a configuration file. . . . . . . . . . . . . . . . . . . . . . . . . . 158

example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159

P

packet encapsulation

E1 interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .87

serial interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

T1 interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93

T3 interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97

Packet Forwarding Engine. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29

microkernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29

packets applying CoS scheduling rules . . . . . . . . . . . . . . . . . . . . 453

discarded. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 dropped . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209

handling packet fragments . . . . . . . . . . . . . . . . . . . . . . . . 400

handling packet fragments (configuration editor). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .411

multicast, tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236

RIP, description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267

tracking with J-Web traceroute . . . . . . . . . . . . . . . . . . . . 222

tracking with the traceroute command. . . . . . . . . . . 228

packing materials packing a Services Router for shipment . . . . . . . . . . 607

packing components for shipment . . . . . . . . . . . . . . . 609

saving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37

pages, layout in J-Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .113

parentheses, in syntax descriptions . . . . . . . . . . . . . . . . . xxviii

part numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208

partitioning a boot medium . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508

passive routes, rejection, in static routing . . . . . . . . . . . . . 287

Index

631

J-series™ Services Router User Guide

password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171

for OSPFv2 authentication . . . . . . . . . . . . . . . . . . . . . . . . 324

for RIPv2 authentication . . . . . . . . . . . . . . . . . . . . . . . . . . 306

specifying for authentication. . . . . . . . . . . . . . . . . . . . . . 174

See also IKE; secret

patching a configuration file . . . . . . . . . . . . . . . . . . . . . . . . . . . 158

path cost metrics

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271, 310

for OSPF routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322

path-vector protocol See BGP

paths, multicast, tracing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235

PC See management device

PCI bus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10, 22

peering sessions See BGP peers; BGP sessions

permanent routes, adding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285

permission bits, for login classes. . . . . . . . . . . . . . . . . . . . . . . 166

permissions denying and allowing commands . . . . . . . . . . . . . . . . 167 predefined . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167

personnel warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567

PGM (Pragmatic General Multicast) . . . . . . . . . . . . . . . . . . . . 469

Physical Interface Modules See PIMs

PIC See PIMs

PIM (Protocol Independent Multicast) dense mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468

disabling on the network management interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474

RPF routing table group . . . . . . . . . . . . . . . . . . . . . . . . . . . 476

source-specific multicast (SSM) . . . . . . . . . . . . . . . . . . . 468 sparse mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468

static RP router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474

supported versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471

verifying the mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479 verifying the RP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479

PIM LED states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14

PIMs (Physical Interface Modules) blank panel for empty slot . . . . . . . . . . . . . . . . . . . . . . . . . .26

cables and connectors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551

failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537

installing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 520

installing cables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522

J2300 PIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13

J4300 PIMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25

J6300 PIMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25

LED states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14

midplane to Routing Engine . . . . . . . . . . . . . . . . . . . . . . . .21

number in interface name . . . . . . . . . . . . . . . . . . . . . . . . . .83

red alarm. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537

removing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519

replacing cables. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522

serial number label . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605

temperature. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207

ping host reachability (CLI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226

host reachability (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . 218

indications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222

results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221

verifying link states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

ping command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227, 425 explanation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425

options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227

Ping Host page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 field summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219

output for BGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347

results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221

ping trusted-nw-trusted-host . . . . . . . . . . . . . . . . . . . . . . . . . . . 420

explanation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421

ping untrusted-nw-untrusted-host command . . . . . . . . . 420

explanation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421

pinouts

DB–9 connector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559

EIA-530A DCE serial cable . . . . . . . . . . . . . . . . . . . . . . . . 556

EIA-530A DTE serial cable. . . . . . . . . . . . . . . . . . . . . . . . . 555

RJ-45 connector. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559

RJ-48 connector to DB–15 connector

(crossover) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562

RJ-48 connector to DB–15 connector (straight) . . 561

RJ-48 connector to RJ-48 connector (crossover). . 561

RJ-48 connector to RJ-48 connector (straight). . . . 560

RS-232 DCE serial cable. . . . . . . . . . . . . . . . . . . . . . . . . . . 552

RS-232 DTE serial cable . . . . . . . . . . . . . . . . . . . . . . . . . . . 552

RS-422/449 (EIA-449) DCE serial cable. . . . . . . . . . . 554

RS-422/449 (EIA-449) DTE serial cable . . . . . . . . . . . 553

V.35 DCE serial cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557

V.35 DTE serial cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556

X.21 DCE serial cable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559

X.21 DTE serial cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558

pipe (|) command, to filter output . . . . . . . . . . . . . . . . . . . . . 202

plug types, AC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548

poison reverse technique. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267

policers description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370

for firewall filter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429

for stateless firewall filters. . . . . . . . . . . . . . . . . . . . . . . . . 406

ports cables, PIM, installing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522 cables, WAN, removing. . . . . . . . . . . . . . . . . . . . . . . . . . . . 522

configuration, displaying . . . . . . . . . . . . . . . . . . . . . . . . . . 209

console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13

See also console port

DS3 See T3 ports

E1 See E1 ports

Fast Ethernet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14, 24

See also Fast Ethernet ports

J2300 LAN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14

J2300 USB. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13

J4300 LAN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24

J4300 USB. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24

J6300 LAN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24

J6300 USB. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24

632

Index

Index

licenses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70

lo0.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50

monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208

number in interface name . . . . . . . . . . . . . . . . . . . . . . . . . .83

PORT 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50

T1 See T1 ports

T3 See T3 ports

power. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

applying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44

button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

connecting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43

grounding requirement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42

LED states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

power cord See AC power cords

removing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45

requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546

See also power supplies; power system power cords See AC power cords

POWER ON LED states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

power supplies, J6300 blank panel required in empty slot . . . . . . . . . . . . . . . 534

dedicated AC power feed requirement . . . . . . . . . . . 535

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26

installing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535

LED states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26

removing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534

serial number label . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605

power system connecting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43

fan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

J2300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15

J4300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26

J6300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26

Pragmatic General Multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . 469

preferences for OSPF routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321

for static routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285

setting for static routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293

prefix-length-range match type . . . . . . . . . . . . . . . . . . . . . . . . 379

preparing for installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541

primary compact flash See compact flash

processes, software chassis process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30

forwarding process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31

interface process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31

management process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30

routing protocols process. . . . . . . . . . . . . . . . . . . . . . . . . . . .30

product disposal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595

product overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

prompt See command prompts; restart after upgrade prompt

propagation, suppressing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385

properties system, monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204

verifying for network interfaces . . . . . . . . . . . . . . . . . . 105

Protocol Independent Multicast See PIM

protocols

Auto-RP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469

BGP See BGP

BSR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469

distance vector See RIP

DVMRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468

EGPs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260

IGMP See IGMP

IGPs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260

MSDP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469

originating, displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .211

OSPF See OSPF

overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255

path vector See BGP

PGM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469

PIM dense mode See PIM

PIM source-specific multicast (SSM) . . . . . . . . . . . . . . 468

PIM sparse mode See PIM

RIP See RIP

SAP and SDP See SAP; SDP

Q

queuing rules, CoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453

Quick Configuration

Add a RADIUS Server page. . . . . . . . . . . . . . . . . . . . . . . . 170

Add a TACACS+ Server page. . . . . . . . . . . . . . . . . . . . . . 172

Add a User page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 adding users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175

authentication method . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173

basic settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55

BGP page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333

buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132

capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .110

E1 Interfaces page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86

Fast Ethernet Interfaces page . . . . . . . . . . . . . . . . . . . . . . .90

initial configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53

Install Remote page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504

Interfaces page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85

IPSec Tunnels page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 485

network interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84

OSPF page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .311

overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131

RADIUS server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169

RIP page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299

serial Interfaces page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .99

Set Up page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56

SNMP page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244

Static Routes page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288

Summary page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131

T1 Interfaces page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .92

T3 (DS3) Interfaces page . . . . . . . . . . . . . . . . . . . . . . . . . . . .96

TACACS+ server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171

Upload Package page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505

Index

633

J-series™ Services Router User Guide

user management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169

Users page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174

R

rack ears See mounting brackets

rack installation general requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542

J2300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39

J2300 mounting brackets . . . . . . . . . . . . . . . . . . . . . . . . . . .40

J4300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40

J4300 and J6300 mounting brackets . . . . . . . . . . . . . . .41

J6300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40

mounting holes, spacing . . . . . . . . . . . . . . . . . . . . . . . . . . 543

order of multiple routers . . . . . . . . . . . . . . . . . . . . . . . . . . . .40

safety guidelines and warnings . . . . . . . . . . . . . . . . . . . 578

securing rack to building . . . . . . . . . . . . . . . . . . . . . . . . . . 543

size requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542

support for front-mount rack. . . . . . . . . . . . . . . . . . . . . . 543 ventilation requirement . . . . . . . . . . . . . . . . . . . . . . . . . . . 543

radio buttons

Delete Configuration Below This Point . . . . . . . . . . . 135

Discard All Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135

Discard Changes Below This Point. . . . . . . . . . . . . . . . 135

radio frequency interference (RFI), reducing . . . . . . . . . . 546

RADIUS adding a server (Quick Configuration) . . . . . . . . . . . . 169

authentication (configuration editor) . . . . . . . . . . . . . 182

order of user authentication (configuration editor). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185

secret (configuration editor). . . . . . . . . . . . . . . . . . . . . . . 183

secret (Quick Configuration) . . . . . . . . . . . . . . . . . . . . . . 171

specifying for authentication (Quick

Configuration) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174

ramp angle requirement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583

random early detection See RED

reactivate command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153

read or write error, Routing Engine . . . . . . . . . . . . . . . . . . . . 538

read-only login class permissions . . . . . . . . . . . . . . . . . . . . . . 167

reboot immediately with J-Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512

with the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514

rebooting with J-Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512

with the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514

RED (random early detection) drop profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444

red alarm

PIMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537

Routing Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538

red asterisk (*) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .116

RED drop profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444 samples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444

redistributing routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381

redundant J6300 power supplies. . . . . . . . . . . . . . . . . . . . . . . . .26

Refresh button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135

registration form, for software upgrades . . . . . . . . . . . . . . 502

regulatory compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563

rejecting invalid routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380

relational operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234

relative option. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158

release notes, URL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv

remote accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189

accessing with SSH (CLI) . . . . . . . . . . . . . . . . . . . . . . . . . . 195 accessing with telnet (CLI) . . . . . . . . . . . . . . . . . . . . . . . . 195

See also remote template accounts

remote server, upgrading from. . . . . . . . . . . . . . . . . . . . . . . . . 503

remote template accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189

remote tunnel endpoint, IPSec. . . . . . . . . . . . . . . . . . . . . . . . . 486

removable compact flash See compact flash

rename command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 renaming configuration identifiers. . . . . . . . . . . . . . . . . . . . . 151

replacement

DRAM modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529

PIMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518

power cord, replacing (J2300 or J4300) . . . . . . . . . . 532

power system (J6300) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533

primary compact flash . . . . . . . . . . . . . . . . . . . . . . . . . . . . 523

removable compact flash . . . . . . . . . . . . . . . . . . . . . . . . . 525

tools and parts required . . . . . . . . . . . . . . . . . . . . . . . . . . . 518

USB drive. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527

replacing a configuration file . . . . . . . . . . . . . . . . . . . . . . . . . . . 159

example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160

request chassis pic fpc-slot command . . . . . . . . . . . . . . . . . 522

request system configuration rescue save command . . 156

request system halt command . . . . . . . . . . . . . . . . . . . . . . . . . 514

options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515

request system license add command. . . . . . . . . . . . . . . . . . .75

request system license delete command . . . . . . . . . . . . . . . .75

request system license save command . . . . . . . . . . . . . . . . . .76

request system reboot command . . . . . . . . . . . . . . . . .506, 514 options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514

request system snapshot command . . . . . . . . . . . . . . . . . . . 508 options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508

request system snapshot media removable-compact-flash command . . . . . . . . . . . . . . . . 502 request system snapshot media usb command. . . . . . . 502

request system software add validate command . . . . . 506

request system software delete-backup command . . . 507 request system software rollback . . . . . . . . . . . . . . . . . . . . . . 507 request system software rollback command . . . . . . . . . . 507

required entry (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .116

rescue configuration

CONFIG button on front panel . . . . . . . . . . . . . . . . . . . . . .12

deleting (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146

setting (CLI configuration editor) . . . . . . . . . . . . . . . . . 156

setting (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145

viewing (CLI configuration editor) . . . . . . . . . . . . . . . . 157

viewing (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146

restart after upgrade prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

Return Materials Authorization See RMA

634

Index

Index

returning hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603

packing a Services Router for shipment . . . . . . . . . . 607

packing components for shipment . . . . . . . . . . . . . . . 609

procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606

tools and parts required . . . . . . . . . . . . . . . . . . . . . . . . . . . 607

reverse-path forwarding See RPF

reverting to a previous configuration file (J-Web). . . . . . 507

rewrite rules description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370

replacing DSCPs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436

sample rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435

when applied . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373

RIB See routing table

RIP (Routing Information Protocol) authentication (RIPv2 only) . . . . . . . . . . . . . . . . . . . . . . . 298

authentication (RIPv2 only), configuring . . . . . . . . . 305

basic network (configuration editor). . . . . . . . . . . . . . 301

designating RIP interfaces. . . . . . . . . . . . . . . . . . . . . . . . . 300

distance vector protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . 265

efficiency techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267

enabling (Quick Configuration) . . . . . . . . . . . . . . . . . . . 300

maximum hop count . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266

monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210

overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265, 297

packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267 poison reverse technique. . . . . . . . . . . . . . . . . . . . . . . . . . 267

Quick Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298 requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298

sample network with incoming metric . . . . . . . . . . . 303

sample network with outgoing metric. . . . . . . . . . . . 304

sample topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301

split horizon technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267

statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213

supported versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265

traffic control with metrics . . . . . . . . . . . . . . . . . . . . . . . . 297

traffic control with metrics, configuring . . . . . . . . . . 302

unidirectional limitations. . . . . . . . . . . . . . . . . . . . . . . . . . 268

verifying host reachability. . . . . . . . . . . . . . . . . . . . . . . . . 308

verifying RIP-enabled interfaces . . . . . . . . . . . . . . . . . . 307

RIP neighbors displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214 status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214

verifying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307

RIP page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299

field summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300

RJ-45 connector pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559

RJ-45 to DB-9 serial port adapter . . . . . . . . . . . . . . . . . . . . . . . .58

RJ-48 connector to DB–15 connector (crossover) pinouts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562

RJ-48 connector to DB–15 connector (straight) pinouts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561

RJ-48 connector to RJ-48 connector (crossover) pinouts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561

RJ-48 connector to RJ-48 connector (straight) pinouts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560

RMA (Return Materials Authorization) . . . . . . . . . . . . . . . . . 603

number. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606

packing a Services Router for shipment . . . . . . . . . . 607

packing components for shipment . . . . . . . . . . . . . . . 609

procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606

tools and parts required . . . . . . . . . . . . . . . . . . . . . . . . . . . 607

rollback ? command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157

rollback command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 rollback rescue command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 rolling back a configuration file during configuration (CLI configuration editor) . . 156

during configuration (J-Web) . . . . . . . . . . . . . . . . . . . . . . 145

to downgrade software (CLI) . . . . . . . . . . . . . . . . . . . . . . 507

root password characteristics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49

defining (configuration editor) . . . . . . . . . . . . . . . . . . . . . .62

defining (Quick Configuration). . . . . . . . . . . . . . . . . . . . . .56

rotating files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178

route advertisements

AS path in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279

BGP, update messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263

external, EBGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276

internal, IBGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277

LSAs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270

stub areas and NSSAs, to control . . . . . . . . . . . . . . . . . 273

route aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263

route injection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380

route list match types. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378

route manipulation actions, routing policies . . . . . . . . . . 357

route redistribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380

route reflectors See BGP route reflectors

route selection

BGP process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277

BGP, determining by AS path . . . . . . . . . . . . . . . . . . . . . 279

BGP, determining by local preference . . . . . . . . . . . . 278

BGP, determining by MED metric. . . . . . . . . . . . . . . . . 280

BGP, lowest origin value preferred . . . . . . . . . . . . . . . . 279

static routes, defining. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291

route-flap damping See BGP, damping parameters router See Services Router

routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255

advertisements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263 aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263

BGP See BGP

dynamic. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262

filtering and classifying routes . . . . . . . . . . . . . . . . . . . . 351

filtering routes with policies. . . . . . . . . . . . . . . . . . . . . . . 375

filtering traffic through a firewall. . . . . . . . . . . . . . . . . . 389

forwarding tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261

from one source to many destinations . . . . . . . . . . . 471

in multiple ASs with BGP. . . . . . . . . . . . . . . . . . . . . . . . . . 331

in one AS with OSPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309

in one AS with RIP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297

monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210

Index

635

J-series™ Services Router User Guide multicast See multicast neighbors See BGP peers; OSPF neighbors; RIP neighbors

OSPF See OSPF

overriding default packet forwarding with CoS . . 427

protecting local IP addresses with NAT . . . . . . . . . . . 389

protocol overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255

RIP See RIP

routing tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260

static See static routing

through IPSec tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483

traceroute (J-Web). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222

traceroute command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228

See also protocols; routing solutions

Routing Engine fan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

fan failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538

handling packet fragments for (configuration editor). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409

J2300 functions and components . . . . . . . . . . . . . . . . . .10

J4300 functions and components . . . . . . . . . . . . . . . . . .21

J6300 functions and components . . . . . . . . . . . . . . . . . .21

kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29

midplane to PIMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

protecting against DoS attacks (configuration editor). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404

protecting against untrusted services and protocols (configuration editor). . . . . . . . . . . . . . . . . 400

read or write error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538 red alarm. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538

software component . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29

temperature. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207

too hot. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538 too warm. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538 yellow alarm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538

routing information base See routing table

Routing Information Protocol See RIP

routing policies actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356

applying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358

BGP routing policy (configuration editor). . . . . . . . . 339

components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353

configuration tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376

default actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358 export statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358

export, displaying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213

final actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358

forwarding class with source and destination . . . . 382 grouping source and destination prefixes . . . . . . . . 382

import statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358

import, displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213

injecting routes from one protocol into another . . 380

making BGP routes less preferable . . . . . . . . . . . . . . . 383

match conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354

overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353

policy name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377

preparation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376

prepending AS paths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383

reducing update messages with flap damping . . . 385

rejecting invalid routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378

route redistribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380

route-flap damping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385

terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354

terms, creating. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377

routing protocols See protocols

routing protocols software process . . . . . . . . . . . . . . . . . . . . . .30

routing solutions

BGP confederations, for scaling problems. . . . . . . . 342

BGP route reflectors, for scaling problems . . . . . . . 339

BGP scaling techniques. . . . . . . . . . . . . . . . . . . . . . . . . . . . 280

controlling designated router election . . . . . . . . . . . . 324

controlling OSPF route cost . . . . . . . . . . . . . . . . . . . . . . . 322

controlling OSPF route selection . . . . . . . . . . . . . . . . . . 321

controlling RIP traffic with the incoming metric . . 303

controlling RIP traffic with the outgoing metric . . 304

CoS with DiffServ . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366, 427

designated router, to reduce flooding. . . . . . . . . . . . . 270

directing BGP traffic by local preference . . . . . . . . . 278

filtering unwanted services and protocols . . . . . . . . 400

firewall filters and NAT . . . . . . . . . . . . . . . . . . . . . . 358, 389

handling packet fragments . . . . . . . . . . . . . . . . . . . . . . . . 400

handling packet fragments (configuration editor). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409

making BGP routes less preferable . . . . . . . . . . . . . . . 383

multicast administrative scoping . . . . . . . . . . . . . . . . . 467

multicast reverse-path forwarding (RPF) . . . . . . . . . 466

multicast shortest-path tree (SPT). . . . . . . . . . . . . . . . . 467

NSSAs, to control route advertisement . . . . . . . . . . . 273

path cost metrics, for packet flow control See path cost metrics

poison reverse, for traffic reduction . . . . . . . . . . . . . . 267

preventing multicast routing loops . . . . . . . . . . . . . . . 466

protecting against DoS attacks . . . . . . . . . . . . . . . . . . . . 404

reducing update messages with flap damping . . . 385

rejecting invalid routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378

routing policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353, 375

securing OSPF routing (OSPFv2 only) . . . . . . . . . . . . 323

split horizon, for traffic reduction. . . . . . . . . . . . . . . . . 267

static route control techniques . . . . . . . . . . . . . . . . . . . . 286

stub areas, to control route advertisement . . . . . . . 273

routing table

controlling static routes in. . . . . . . . . . . . . . . . . . . 286, 293

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260

displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .211

displaying static routes in . . . . . . . . . . . . . . . . . . . . . . . . . 295

monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210

RPF group, for multicast . . . . . . . . . . . . . . . . . . . . . . . . . . 476

sample distance-vector routing . . . . . . . . . . . . . . . . . . . 266

updates, limitations in RIP . . . . . . . . . . . . . . . . . . . . . . . . 268

verifying for RPF. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480

636

Index

Index

verifying OSPF routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327

RP (rendezvous point) static. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474

verifying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479

rpd process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30

RPF (reverse-path forwarding) description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466

routing table group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476

verifying the routing table. . . . . . . . . . . . . . . . . . . . . . . . . 480

RS-232 DCE cable pinouts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552

RS-232 DTE cable pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552

RS-422/449 (EIA-449) DCE cable pinouts . . . . . . . . . . . . . 554

RS-422/449 (EIA-449) DTE cable pinouts . . . . . . . . . . . . . . 553

rubber feet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38

run command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157

S

S,G notation, for multicast forwarding states. . . . . . . . . . 465

safety guidelines and warnings

AC power. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 569

battery handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 589

electrical . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 569

general . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565

grounded equipment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 570

in case of electrical accident . . . . . . . . . . . . . . . . . . . . . . 571

installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577

jewelry removal. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 590

lasers and LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 584

levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563

lightening activity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592

maintenance and operation. . . . . . . . . . . . . . . . . . . . . . . 588

multiple power supplies (J6300 only). . . . . . . . . . . . . 572

operating temperature . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593

power disconnection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573

product disposal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595

rack-mounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 578

ramps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583

read installation instructions . . . . . . . . . . . . . . . . . . . . . . 578

telecommunications cord . . . . . . . . . . . . . . . . . . . . . . . . . 576

TN power system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574

safety standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597

fire safety . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544

samples configuration, for basic connectivity . . . . . . . . . . . . . . .67

firewall filter configurations . . . . . . . . . . . . . . . . . . . . . . . 416

network topologies See topologies

SAP (Session Announcement Protocol) description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469

session announcements. . . . . . . . . . . . . . . . . . . . . . . . . . . 472

verifying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478

saving configuration files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160

licenses (CLI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76

scaling BGP See BGP confederations; BGP route reflectors

schedulers assigning resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447

default settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370

mapping to forwarding classes. . . . . . . . . . . . . . . . . . . . 451 sample mappings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451

sample schedulers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446

scheduling a commit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155

scheduling a reboot with J-Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513

with the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514

scoping, administrative. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467

screen length, CLI, setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 screen width, CLI, setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

screw and anchor capacity, for wall installation. . . . . . . . .39

SDP (Session Discovery Protocol) description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469

session announcements. . . . . . . . . . . . . . . . . . . . . . . . . . . 472

verifying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478

SDX application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31

search, IDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215

secret . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171

RADIUS (configuration editor) . . . . . . . . . . . . . . . . . . . . 183

RADIUS (Quick Configuration) . . . . . . . . . . . . . . . . . . . . 171

TACACS+ (configuration editor) . . . . . . . . . . . . . . . . . . 184

TACACS+ (Quick Configuration) . . . . . . . . . . . . . . . . . . 173

See also IKE; password security

access privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165, 186

IDS intrusion detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215

IPSec tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483

MD5 authentication for OSPF. . . . . . . . . . . . . . . . . . . . . 324

MD5 authentication for RIPv2 . . . . . . . . . . . . . . . . . . . . 306

password authentication for OSPFv2 . . . . . . . . . . . . . 324

password authentication for RIPv2 . . . . . . . . . . . . . . . 306

user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164, 188

user authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164

security association See IPSec security associations

serial number chassis components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208

chassis components, label . . . . . . . . . . . . . . . . . . . . . . . . 603

PIMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605 power supply . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605

Services Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204

serial ports cables and connectors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551

CHAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

clock rate. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 clocking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

configuring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98

EIA-530A DCE pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556

EIA-530A DTE pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555

encapsulation type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71

line speed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

Index

637

J-series™ Services Router User Guide

logical interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

RS-232 DCE pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552

RS-232 DTE pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552

RS-422/449 (EIA-449) DCE pinouts . . . . . . . . . . . . . . . 554

RS-422/449 (EIA-449) DTE pinouts . . . . . . . . . . . . . . . 553

V.35 DCE pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557

V.35 DTE pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556

X.21 DCE pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559

X.21 DTE pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558

service classes corresponding DSCPs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368

service provider requirements, for autoinstallation . . . . .66

service sets, for IPSec tunnels. . . . . . . . . . . . . . . . . . . . . . . . . . 488

services interfaces applying a NAT rule to (configuration editor). . . . . 398 applying a stateful firewall filter to (configuration editor). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 398

for IPSec tunnels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487

Services Router backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50

BGP routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331

configuration tools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127

CoS overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366

CoS with DiffServ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427

dimensions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542

establishing software connectivity . . . . . . . . . . . . . . . . . .47

firewall filter overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358

firewall filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389

grounding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43

halting (CLI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514

halting (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512

hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

hardware replacement . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517

hardware return . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603

installation and connection . . . . . . . . . . . . . . . . . . . . . . . . .35

IPSec tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483

licenses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69

managing users and operations. . . . . . . . . . . . . . . . . . . 163

monitoring and diagnosis . . . . . . . . . . . . . . . . . . . . . . . . . 197

multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471

multicast overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461

NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389

network cables and connectors . . . . . . . . . . . . . . . . . . . 551

network interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .79

network management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241

operating environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543

OSPF routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309

overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–4

packing for shipment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607

powering on and off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44

preparation checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548

rebooting (CLI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514

rebooting (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512

RIP routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297

routing policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375

routing policy overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . 353

routing protocols overview . . . . . . . . . . . . . . . . . . . . . . . . 255

safety and compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563

serial number, displaying. . . . . . . . . . . . . . . . . . . . . . . . . . 204

site preparation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541

software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28

software upgrades . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501

static routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285

unpacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36

user interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

Session Announcement Protocol See SAP, SDP

sessions announcements, multicast . . . . . . . . . . . . . . . . . . . . . . . . 472

BGP session establishment. . . . . . . . . . . . . . . . . . . . . . . . 276

BGP session maintenance. . . . . . . . . . . . . . . . . . . . . . . . . 276

J-Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .117

telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195

set cli commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

set requests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242

set system dump device command. . . . . . . . . . . . . . . . . . . . .511

options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .511

Set Up Quick Configuration page . . . . . . . . . . . . . . . . . . . . . . . .56

setup configuration editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58

Quick Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53

requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53

severity levels for alarms, displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207

for system logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

shipping carton contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37

packing a Services Router for shipment . . . . . . . . . . 607

packing components for shipment . . . . . . . . . . . . . . . 609

saving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37

shortest path first algorithm. . . . . . . . . . . . . . . . . . . . . . . . . . . . 269

shortest-path tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467

show bgp group command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345

explanation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346

show bgp neighbor command . . . . . . . . . . . . . . . . . . . .210, 344

explanation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345

show bgp summary command . . . . . . . . . . . . . . . . . . .210, 346

explanation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347

show chassis alarms command . . . . . . . . . . . . . . . . . . .207, 536

show chassis environment command . . . . . . . . . . . . . . . . . 207

show chassis hardware command . . . . . . . . . . . . . . . .207, 603

show cli command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

show cli history command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157

show command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149

show firewall command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415

show firewall filter protect-RE command. . . . . . . . . . . . . . 422

show firewall log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421

explanation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422

show igmp interface command . . . . . . . . . . . . . . . . . . . . . . . . 478

explanation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479

show interfaces detail command . . . . . . . . . . . . . . . . .105, 208

638

Index

Index

show interfaces interface-name command. . . . . . . . . . . . 208

show interfaces lo0 command . . . . . . . . . . . . . . . . . . . . . . . . . 415

show interfaces terse command . . . . . . . . . . . . . . . . . . . . . . . 208

show log command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168

show multicast rpf command . . . . . . . . . . . . . . . . . . . . . . . . . . 480 explanation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480

show ospf interface command . . . . . . . . . . . . . . . . . . . . . . . . . 325

explanation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326

show ospf interfaces command. . . . . . . . . . . . . . . . . . . . . . . . 210

show ospf neighbor command. . . . . . . . . . . . . . . . . . . . . . . . . 326

explanation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327

show ospf neighbors command. . . . . . . . . . . . . . . . . . . . . . . . 210

show ospf route command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328 results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328

show ospf statistics command . . . . . . . . . . . . . . . . . . . . . . . . . 210

show pim interface command . . . . . . . . . . . . . . . . . . . . . . . . . 479 explanation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479 show pim rps command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479

explanation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480

show rip neighbor command . . . . . . . . . . . . . . . . . . . . . . . . . . 307 explanation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307

show rip neighbors command . . . . . . . . . . . . . . . . . . . . . . . . . 210 show rip statistics command. . . . . . . . . . . . . . . . . . . . . . . . . . . 210 show route detail command . . . . . . . . . . . . . . . . . . . . . . . . . . . 210

show route summary command . . . . . . . . . . . . . . . . . 424–425

explanation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424, 426

show route terse command . . . . . . . . . . . . . . . . . . . . . . .210, 295

explanation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296

show sap listen command . . . . . . . . . . . . . . . . . . . . . . . 457, 478 explanation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457, 478

show services command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415

show services ids destination-table command . . . . . . . . 215 show services ids pair-table command . . . . . . . . . . . . . . . . 215 show services ids source-table command . . . . . . . . . . . . . 215

show services ipsec-vpn ike command . . . . . . . . . . . . . . . . 216 show services ipsec-vpn ipsec command . . . . . . . . . . . . . 216

show services ipsec-vpn ipsec statistics command . . . 497 explanation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497

show services nat pool command . . . . . . . . . . . . . . . . . . . . . 217

show services stateful-firewall conversations command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 show services stateful-firewall flows command . . . . . . . 215

show snmp statistics command . . . . . . . . . . . . . . . . . . . . . . . 252

show system license command . . . . . . . . . . . . . . . . . . . . . 76–77

show system license keys command . . . . . . . . . . . . . . . . . . . .78

show system processes command. . . . . . . . . . . . . . . 168, 204

show system reboot command . . . . . . . . . . . . . . . . . . . . . . . . 157

show system storage command . . . . . . . . . . . . . . . . . 204, 528

show system uptime command. . . . . . . . . . . . . . . . . . . . . . . . 204 show system users command. . . . . . . . . . . . . . . . . . . . . . . . . . 204

shutdown. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45

during fires. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544

See also halt; reboot

side pane . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .116

signaling limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545

Simple Network Management Protocol See SNMP

single-area network, OSPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315

site preparation checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548

electrical wiring guidelines . . . . . . . . . . . . . . . . . . . . . . . . 545

fire safety . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544

for desktop and wall installation . . . . . . . . . . . . . . . . . . 542 for rack installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542

guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541

operating environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543

power requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546

size

J2300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

J4300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

J6300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

requirements for rack installation . . . . . . . . . . . . . . . . 542

SMI (Structure of Management Information) . . . . . . . . . . 242

snapshots configuring for failure snapshot storage . . . . . . . . . . .511

to replace primary compact flash, for multiple routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508

SNMP (Simple Network Management Protocol) agents See SNMP agents communities See SNMP communities

controlling access (configuration editor). . . . .250–251

get requests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242

managers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241

MIBs See MIBs

overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241

preparation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243

Quick Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243

set requests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242

system identification (configuration editor) . . . . . . 247

traps See SNMP traps

views (configuration editor) . . . . . . . . . . . . . . . . . . . . . . . 250

SNMP agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241

configuring (configuration editor). . . . . . . . . . . . . . . . . 248

verifying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252

SNMP communities creating (configuration editor) . . . . . . . . . . . . . . . . . . . . 248

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242

Quick Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245

SNMP managers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241

SNMP page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244

SNMP traps creating groups for (configuration editor) . . . . . . . . 249

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243

Quick Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245

software features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28

halting immediately (CLI) . . . . . . . . . . . . . . . . . . . . . . . . . 515

halting immediately (J-Web). . . . . . . . . . . . . . . . . . . . . . . 513

licenses See licenses upgrades See upgrades

version, displaying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204

Index

639

J-series™ Services Router User Guide

source-specific multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468

sp-0/0/0 for IPSec tunnels (configuration editor). . . . . . . . . . . 487

no stateful firewall filters . . . . . . . . . . . . . . . . . . . . . . . . . . 360

sparse mode See multicast routing modes

specifications electrical . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546

electrical connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547

environmental . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543

grounding cable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42

grounding lug . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42

J2300 hardware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

J4300 hardware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

J6300 hardware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

power cords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547

serial PIM cables and connectors . . . . . . . . . . . . . . . . . 551

SPF (shortest path first) algorithm . . . . . . . . . . . . . . . . . . . . . 269

split horizon technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267

SPT (shortest-path tree). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467

SSH accessing remote accounts (CLI) . . . . . . . . . . . . . . . . . . 195

defining (configuration editor) . . . . . . . . . . . . . . . . . . . . . .62

defining access (Quick Configuration) . . . . . . . . . . . . . .58

management access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52

ssh command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195, 423

explanation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424

options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196

standards compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597

startup

J-Web interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .112

JUNOS CLI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .118

Services Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44

stateful firewall filters actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361

applying to an interface (configuration editor) . . . 398

automatic discard rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360

configuration editor . . . . . . . . . . . . . . . . . . . . . . . . . 393, 395

configuration overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359 description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359

displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216

do not apply to sp-0/0/0 . . . . . . . . . . . . . . . . . . . . . . . . . . . 360

enabling (Quick Configuration) . . . . . . . . . . . . . . . . . . . 392

flow status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216

for IPSec tunnels (configuration editor). . . . . . . . . . . 492

junos-algs-outbound default group. . . . . . . . . . . . . . . . 360

license. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70

match conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360

monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214

preparation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389

Quick Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390

sample rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394

untrusted network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359

verifying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420

verifying actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423

stateless firewall filters actions and action modifiers . . . . . . . . . . . . . . . . . . . . . . 366

applying to an interface (configuration editor) . . . 414

automatic discard rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362

bit-field logical operators . . . . . . . . . . . . . . . . . . . . . . . . . . 365

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359

handling packet fragments . . . . . . . . . . . . . . . . . . . . . . . . 400

handling packet fragments (configuration editor). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409

match conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363

planning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362, 400

policers for . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406

preparation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390

protecting the Routing Engine against ICMP floods (configuration editor) . . . . . . . . . . . . . . . . . . . . 404 protecting the Routing Engine against TCP floods

(configuration editor) . . . . . . . . . . . . . . . . . . . . . . . . . . . 404

protecting the Routing Engine against untrusted protocols (configuration editor). . . . . . . . . . . . . . . . . 400 protecting the Routing Engine against untrusted services (configuration editor) . . . . . . . . . . . . . . . . . . 400

sample terms, to filter fragments . . . . . . . . . . . . . . . . . 410

sample terms, to filter services and protocols. . . . 401

sample terms, to protect against DoS attacks . . . . 405

typical, planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400

statements adding or modifying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150

copying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151

deactivating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153

deleting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150

replacing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159

types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121

static routes configuring basic routes (configuration editor). . . 290

controlling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286

controlling in routing and forwarding tables . . . . . 293

default properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287

default properties, setting . . . . . . . . . . . . . . . . . . . . . . . . . 294

defining route selection . . . . . . . . . . . . . . . . . . . . . . . . . . . 291

preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285

preventing readvertisement . . . . . . . . . . . . . . . . . . . . . . . 287

qualified next hops . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286

Quick Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288

rejecting passive traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287

route retention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286

sample preferred path. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292

sample stub network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290

verifying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295

Static Routes page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288

field summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289

static routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262

overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285

See also static routes

640

Index

Index

static RP router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474

See also RP

statistics

BGP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .211

firewall filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422

interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229

IPSec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217

IPSec tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497

OSPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213

RIP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213

status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

administrative link state. . . . . . . . . . . . . . . . . . . . . . . . . . . 208

BGP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212

license key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73

link states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208

link states, verifying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

OSPF interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213

OSPF neighbors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213

RIP neighbors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214

stateful firewall filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216

See also LEDs

status command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146

Structure of Management Information (SMI) . . . . . . . . . . 242

stub areas area ID (configuration editor) . . . . . . . . . . . . . . . . . . . . . 317

area ID (Quick Configuration) . . . . . . . . . . . . . . . . . . . . . 312

area type (Quick Configuration). . . . . . . . . . . . . . . . . . . 313

controlling OSPF route cost . . . . . . . . . . . . . . . . . . . . . . . 323

creating (configuration editor) . . . . . . . . . . . . . . . . . . . . 319

description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273

example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274

sample topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319

sub-ASs, BGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283 subautonomous systems, BGP . . . . . . . . . . . . . . . . . . . . . . . . . 283

subnetworks description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259

multicast leaves and branches . . . . . . . . . . . . . . . . . . . . 464

route aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264

Summary Quick Configuration page. . . . . . . . . . . . . . . . . . . 131

super-user login class permissions. . . . . . . . . . . . . . . . . . . . . 167 superuser login class permissions . . . . . . . . . . . . . . . . . . . . . 167

support, technical See technical support

syntax conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvii

syslog See system logs

system identification, displaying. . . . . . . . . . . . . . . . . . . . . . . 204

system log messages displaying at a terminal (configuration editor) . . . 194

sending to a file (configuration editor). . . . . . . . . . . . 193

system logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

archiving (CLI configuration editor). . . . . . . . . . . . . . . 194

capturing in a file (configuration editor) . . . . . . . . . . 192

destinations for log files . . . . . . . . . . . . . . . . . . . . . . . . . . . 168

disabling (configuration editor) . . . . . . . . . . . . . . . . . . . 194

displaying at a terminal (configuration editor) . . . 193

displaying size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206

file cleanup (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177

functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168

logging facilities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

logging severity levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235

sending messages to a file (configuration editor). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

sending messages to a terminal (configuration editor). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193

using . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

See also system log messages

system management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163

displaying log and trace file contents. . . . . . . . . . . . . 235

login classes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165, 186

preparation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168

Quick Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169

system logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168

system logs, using . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

template accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . 167, 189

user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164, 188

user authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164

system overview hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28

system storage, displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206

system time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49

defining (Quick Configuration). . . . . . . . . . . . . . . . . . . . . .57

displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204

synchronizing (configuration editor). . . . . . . . . . . . . . . .63

synchronizing (Quick Configuration) . . . . . . . . . . . . . . .57

T

T1 ports cable length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95

CHAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93

clocking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .94

configuring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .91

data inversion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .94

encapsulation type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93

fractional, channel number . . . . . . . . . . . . . . . . . . . . . . . . .84

frame checksum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95

framing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .94

license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70

logical interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93

MTU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .94

RJ-48 cable pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560

time slots. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .94

T3 ports

C-bit parity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98

cable length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98

CHAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97

clocking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98

configuring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95

encapsulation type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97

frame checksum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98

Index

641

J-series™ Services Router User Guide

framing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98

logical interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97

MTU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98, 101

TACACS+ adding a server (Quick Configuration) . . . . . . . . . . . . 171

authentication (configuration editor) . . . . . . . . . . . . . 183

order of user authentication (configuration editor). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185

secret (configuration editor). . . . . . . . . . . . . . . . . . . . . . . 184

secret (Quick Configuration) . . . . . . . . . . . . . . . . . . . . . . 173

specifying for authentication (Quick

Configuration) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174

task bar. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .116

TCP, policers for. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406

technical support contacting JTAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxx

contacting JTAC for hardware return. . . . . . . . . . . . . . 605

hardware information for . . . . . . . . . . . . . . . . . . . . . . . . . 207

information required for hardware return. . . . . . . . 606

telecommunications line wire gauge . . . . . . . . . . . . . . . . . . 576

telnet accessing remote accounts (CLI) . . . . . . . . . . . . . . . . . . 195

defining access (Quick Configuration) . . . . . . . . . . . . . .58

management access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51

telnet command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195, 424

explanation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425

options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 telnet session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195

temperature chassis, displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207

required for operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544

Routing Engine, too hot . . . . . . . . . . . . . . . . . . . . . . . . . . . 538

Routing Engine, too warm . . . . . . . . . . . . . . . . . . . . . . . . 538

warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593

templates accounts description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167

local accounts (configuration editor). . . . . . . . . . . . . . 191

remote accounts (configuration editor) . . . . . . . . . . . 190

temporary files cleaning up (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177

displaying size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206

downloading (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179

terminal type, setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

terminology basic connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47

configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127

CoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351

diagnostic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197

firewall filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351

monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197

multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461

network interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .79

routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255

routing policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351

system management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163

terms firewall filter, for multifield classifier. . . . . . . . . . . . . . 430

in a routing policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354

in a routing policy, creating . . . . . . . . . . . . . . . . . . . . . . . 377

thermal output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544

three-way handshake . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270

through route list match type . . . . . . . . . . . . . . . . . . . . . . . . . . 379

time See system time

time slots

E1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .89

number in interface name . . . . . . . . . . . . . . . . . . . . . . . . . .84

T1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .94

time to live See TTL

time zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49

defining (configuration editor) . . . . . . . . . . . . . . . . . . . . . .62

defining (Quick Configuration). . . . . . . . . . . . . . . . . . . . . .56

displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204

TN power system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574

to statement, routing policy match conditions . . . . . . . . 354

tolerances, environmental. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544

tools and equipment for component replacement . . . . . . . . . . . . . . . . . . . . . . 518

for hardware return. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607

for installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36

top command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149

top pane. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .115

topology sample BGP AS path. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279

sample BGP confederation . . . . . . . . . . . . . . . . . . . . . . . . 343

sample BGP confederations . . . . . . . . . . . . . . . . . . . . . . . 284

sample BGP external and internal links . . . . . . . . . . 338

sample BGP local preference use . . . . . . . . . . . . . . . . . 278

sample BGP MED use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280

sample BGP peer network. . . . . . . . . . . . . . . . . . . . . . . . . 336

sample BGP peer session. . . . . . . . . . . . . . . . . . . . . . . . . . 275

sample BGP route reflector (one cluster) . . . .281, 340

sample BGP route reflectors (cluster of clusters) . . 283

sample BGP route reflectors (multiple clusters) . . 282

sample distance-vector routing . . . . . . . . . . . . . . . . . . . 266

sample multiarea OSPF routing. . . . . . . . . . . . . . . . . . . 272

sample network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261

sample OSPF backbone area. . . . . . . . . . . . . . . . . . . . . . 273

sample OSPF multiarea network . . . . . . . . . . . . . . . . . 316

sample OSPF network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327

sample OSPF network with stubs and NSSAs . . . . 274

sample OSPF single-area network . . . . . . . . . . . . . . . . 315

sample OSPF stub areas and NSSAs . . . . . . . . . . . . . . 319

sample poison reverse routing . . . . . . . . . . . . . . . . . . . . 268

sample RIP network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301

sample RIP network with incoming metric . . . . . . 303

sample RIP network with outgoing metric . . . . . . . 304

sample route advertisement . . . . . . . . . . . . . . . . . . . . . . 263

sample route aggregation . . . . . . . . . . . . . . . . . . . . . . . . . 264

sample split horizon routing . . . . . . . . . . . . . . . . . . . . . . 267

sample static route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262

642

Index

Index

sample static route, preferred path . . . . . . . . . . . . . . . 292

sample stub network for static routes . . . . . . . . . . . . 290

sample unidirectional routing . . . . . . . . . . . . . . . . . . . . . 269

topology database, OSPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309

trace files monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235

multicast, monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238

traceroute

CLI command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228

indications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226

J-Web tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222

results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225

TTL increments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222

traceroute command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228

options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229

Traceroute page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 field summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224

results for OSPF. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329

results for RIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308

traffic controlling with incoming RIP metric . . . . . . . . . . . . 303

controlling with outgoing RIP metric . . . . . . . . . . . . . 304

incoming, securing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 484

multicast, tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236

outgoing, securing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 484

tracking with J-Web traceroute . . . . . . . . . . . . . . . . . . . . 222

tracking with the traceroute command. . . . . . . . . . . 228

traffic analysis license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70

transmission speed, displaying . . . . . . . . . . . . . . . . . . . . . . . . 209

transmit clock source See clocking

troubleshooting a Services Router . . . . . . . . . . . . . . . . . 67, 197

hardware components . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536

See also diagnosis; monitoring, verification

trusted networks, firewall filter protection. . . . . . . . . . . . . 358

TTL (time to live) default, in multicast path-tracking queries . . . . . . . 236

in ping requests. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221

increments, in traceroute packets . . . . . . . . . . . . . . . . 222

threshold, in multicast trace results . . . . . . . . . . . . . . 237 total, in multicast trace results . . . . . . . . . . . . . . . . . . . . 237

TTY, displaying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205

tunneling through a public network . . . . . . . . . . . . . . . . . . . 483

tunnels See IPSec tunnels

turning on a Services Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44

Type C fire extinguishers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544

types of configuration statements . . . . . . . . . . . . . . . . . . . . . . . 121

of network interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83

U

unauthorized login class permissions. . . . . . . . . . . . . . . . . . 167

universal serial bus See USB

unpacking the router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36

untrusted networks, firewall filter actions on. . . . . . . . . . 358

up command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148

upgrades downloading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502

installing (CLI). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506

installing by uploading (Quick Configuration) . . . . 505

installing from remote server (Quick

Configuration) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503

overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502 requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502

Upload package page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505

field summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506

uploading a configuration file . . . . . . . . . . . . . . . . . . . . . . . . . . 138

upstream interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464

See also multicast

upto route list match type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379

URLs release notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv

return and repair policies . . . . . . . . . . . . . . . . . . . . . . . . . 606

software downloads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502

support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538

USB (universal serial bus) configuring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508

configuring for failure snapshot storage . . . . . . . . . . .511

copying a boot image with Cygwin . . . . . . . . . . . . . . . 510

copying a boot image with UNIX . . . . . . . . . . . . . . . . . 509

drive, installing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529

drive, removing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528

J2300 USB port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13

J4300 USB port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24

J6300 USB port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24

usb0 See USB

user accounts authentication order (configuration editor). . . . . . . 185

contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164

creating (configuration editor) . . . . . . . . . . . . . . . . . . . . 188

for local users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190

for remote users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189

predefined login classes . . . . . . . . . . . . . . . . . . . . . . . . . . . 167

templates for. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167, 189

See also template accounts

user interfaces feature comparison. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .110

J-Web graphical user interface (GUI) . . . . . . . . . . . . . . . .31

See also J-Web interface

JUNOS command-line interface (CLI) . . . . . . . . . . . . . . .31

See also JUNOS CLI

JUNOScope application. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31

overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

preparation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .112

SDX application. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31

user logging facility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

username description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164

displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205

specifying (Quick Configuration). . . . . . . . . . . . . . . . . . 176

Index

643

J-series™ Services Router User Guide users

access privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165, 186

accounts See user accounts

adding (Quick Configuration) . . . . . . . . . . . . . . . . . . . . . 176

displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205

login classes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165, 186

predefined login classes . . . . . . . . . . . . . . . . . . . . . . . . . . . 167

template accounts See template accounts

usernames . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164

Users Quick Configuration page . . . . . . . . . . . . . . . . . . . . . . . 174

V

V.35 DCE cable pinouts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557

V.35 DTE cable pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556

ventilation requirement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541

verification active licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76

basic connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67

BGP configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346

BGP groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345

BGP peer reachability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347

BGP peers (neighbors) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344

configuration syntax. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154

destination path (J-Web). . . . . . . . . . . . . . . . . . . . . . . . . . . 222

firewall filter actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423

firewall filter flood protection . . . . . . . . . . . . . . . . . . . . . 424

firewall filter handles fragments . . . . . . . . . . . . . . . . . . 425

firewall filter operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421

firewall filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415

firewall statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422

host reachability (CLI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226

host reachability (J-Web) . . . . . . . . . . . . . . . . . . . . . . . . . . 218

IGMP version. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478

IPSec tunnel operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497

license usage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .77

licenses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76

multicast SAP and SDP . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478

multicast session announcements . . . . . . . . . . . . . . . . 457

network interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

OSPF host reachability . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328

OSPF neighbors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326

OSPF routes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327

OSPF-enabled interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . 325

PIM mode and interface configuration . . . . . . . . . . . 479

PIM RP address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479

PIM RPF routing table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480

RIP host reachability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308

RIP-enabled interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307

SNMP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251

stateful firewall filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420

static routes in the routing table . . . . . . . . . . . . . . . . . . 295

traceroute command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228

tracing multicast paths . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236

version hardware, displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207

license key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73

OSPF, supported . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270

RIP, supported . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265

software, displaying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204

View Configuration Text page . . . . . . . . . . . . . . . . . . . . . . . . . . 137

views, SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251

virtual channels applying CoS rules to logical interfaces. . . . . . . . . . . 453

virtual link, through the backbone area . . . . . . . . . . . . . . . 272

virtual private network license . . . . . . . . . . . . . . . . . . . . . . . . . . .70

VPN license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70

W

wall installation (J2300 only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38

mounting brackets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39

mounting requirement . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542

screw and anchor capacity . . . . . . . . . . . . . . . . . . . . . . . . . .39

warning logging severity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

warnings battery handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 589

earthed mains socket (Norway and Sweden only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 571

electrical . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 568

ESD strap to prevent router damage. . . . . . . . . . . . .8, 17

general . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565

grounded equipment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 570

installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577

jewelry removal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 590

laser and LED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 584

levels defined . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563

lightening activity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592

maintenance and operational. . . . . . . . . . . . . . . . . . . . . 588

multiple power supply disconnection . . . . . . . . . . . . 572

operating temperature . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593

personnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567

power disconnection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573

product disposal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595

rack-mounting requirements. . . . . . . . . . . . . . . . . . . . . . 578

ramp angle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583

read installation instructions . . . . . . . . . . . . . . . . . . . . . . 578

telecommunications lines . . . . . . . . . . . . . . . . . . . . . . . . . 576

TN power system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574

weight

J2300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

J2300 two-person installation requirement. . . . . . . . .39

J4300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

J4300 and J6300 two-person installation requirement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40

J6300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

rack-mount requirements . . . . . . . . . . . . . . . . . . . . . . . . . 542

wire gauge for grounding cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42

for telecommunications lines . . . . . . . . . . . . . . . . . . . . . 576

wiring guidelines radio frequency interference (RFI) . . . . . . . . . . . . . . . . 546

644

Index

Index

signaling limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545

suppressing electromagnetic interference

(EMI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546

working directory, setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

world-readable statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194

X

X.21 DCE cable pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559

X.21 DTE cable pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558

Y

yellow alarm alternative boot device . . . . . . . . . . . . . . . . . . . . . . . . . . . . 537

Routing Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 538

Index

645

advertisement

Related manuals

advertisement

Table of contents