16.03.2014 Views

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Junos 10.4 <strong>Policy</strong> <strong>Framework</strong> <strong>Configuration</strong> <strong>Guide</strong><br />

NOTE: On MX Series routers only, you cannot apply as an output filter, a<br />

firewall filter configured at the [edit firewall filter family ccc] hierarchy level.<br />

Firewall filters configured for the family ccc statement can be applied only<br />

as input filters on MX Series routers.<br />

In the input-list statement, list the names of firewall filters to be evaluated when packets<br />

are received on the interface. You can specify up to 16 firewall filters for the filter input<br />

list. In the output-list statement, list the names of firewall filters to be evaluated when<br />

packets are transmitted from the interface. You can specify up to 16 firewall filters for<br />

the filter output list.<br />

Unless you use an input filter list or an output filter list, you can apply only one input and<br />

one output firewall filter to each interface. You can use the same filter one or more times.<br />

The input-list and output-list statements are not supported for simple filters or service<br />

filters.<br />

NOTE: The input-list filter-names and output-list filter-names statements for<br />

firewall filters for the ccc and mpls protocol families are supported on all<br />

interfaces except management and internal Ethernet (fxp) interfaces,<br />

loopback (lo0) interfaces, and USB modem (umd) interfaces.<br />

For more information about applying input lists and output lists, see “Overview of Firewall<br />

Filter Lists” on page 239. For more general information about configuring filters on<br />

interfaces, see the Junos OS Network Interfaces <strong>Configuration</strong> <strong>Guide</strong>.<br />

When you apply a filter to an interface, it is evaluated against all the data packets passing<br />

through that interface. The exception is the loopback interface, lo0, which is the interface<br />

to the Routing Engine and carries no data packets. If you apply a filter to the lo0 interface,<br />

the filter affects the local packets received or transmitted by the Routing Engine.<br />

Filters apply to all packets entering an interface, not just the packets destined for the<br />

Routing Engine. To filter packets destined for the Routing Engine, configure the group<br />

statement at the [edit interfaces interface-name unit logical-unit-number family family-name<br />

filter] hierarchy level. For more information, see “Defining Interface Groups” on page 237.<br />

You can configure the following additional properties when applying filters to interfaces:<br />

• Configuring Interface-Specific Counters on page 236<br />

• Defining Interface Groups on page 237<br />

Configuring Interface-Specific Counters<br />

When you configure a firewall filter that is applied to multiple interfaces, you can name<br />

individual counters specific to each interface. These counters enable you to easily maintain<br />

statistics on the traffic transiting the different interfaces. A separate instance of the<br />

interface-specific firewall filter is created for each interface to which you apply the filter.<br />

236<br />

Copyright © 2010, <strong>Juniper</strong> <strong>Networks</strong>, Inc.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!