16.03.2014 Views

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Junos 10.4 <strong>Policy</strong> <strong>Framework</strong> <strong>Configuration</strong> <strong>Guide</strong><br />

Part 3<br />

Firewall Filters<br />

Chapter 8 Introduction to Firewall Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183<br />

Table 24: Firewall Filter Application Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186<br />

Chapter 9 Firewall Filter <strong>Configuration</strong> . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191<br />

Table 25: IPv4 Firewall Filter Match Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . 197<br />

Table 26: IPv6 Firewall Filter Match Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . 202<br />

Table 27: Protocol-Independent Firewall Filter Match Conditions . . . . . . . . . . . . 206<br />

Table 28: Layer 2 Circuit Cross-Connect Firewall Filter Match Conditions . . . . . . 207<br />

Table 29: MPLS Firewall Filter Match Conditions (Hierarchy Level 1) . . . . . . . . . 208<br />

Table 30: MPLS Firewall Filter Match Conditions (Hierarchy Level 2) . . . . . . . . . 208<br />

Table 31: MPLS Firewall Filter Match Conditions (Hierarchy Level 3) . . . . . . . . . 209<br />

Table 32: VPLS Firewall Filter Match Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . 210<br />

Table 33: Layer 2 Bridging Firewall Filter Match Conditions (MX Series Ethernet<br />

Services Routers Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214<br />

Table 34: Bit-Field Logical Operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225<br />

Table 35: Firewall Filter Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228<br />

Table 36: Unsupported Firewall Statements for Logical Systems . . . . . . . . . . . . 263<br />

Table 37: Unsupported Firewall Actions and Action Modifiers for Logical<br />

Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264<br />

Chapter 10 Introduction to Traffic Policing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277<br />

Table 38: Policer Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279<br />

xxiv<br />

Copyright © 2010, <strong>Juniper</strong> <strong>Networks</strong>, Inc.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!