16.03.2014 Views

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Index<br />

Symbols<br />

!<br />

in policy expressions<br />

! (negation)<br />

logical operator.......................................................61<br />

in firewall filters<br />

bit-field logical operator...................................225<br />

#, comments in configuration statements..................xxx<br />

&&, logical operator...............................................................60<br />

&, bit-field logical operator...............................................225<br />

( ), in syntax descriptions...................................................xxx<br />

+<br />

bit-field logical operator...........................................225<br />

, (comma), bit-field logical operator.............................225<br />

< >, in syntax descriptions................................................xxix<br />

[ ], in configuration statements.......................................xxx<br />

{ }, in configuration statements.......................................xxx<br />

| (pipe)<br />

in firewall filters<br />

bit-field logical operator...................................225<br />

| (pipe), in syntax descriptions.........................................xxx<br />

|| (pipes), logical operator..................................................60<br />

A<br />

accept<br />

firewall filter action.....................................................226<br />

firewall filters<br />

action......................................................................346<br />

policy, routing<br />

control action.........................................................49<br />

access and access-internal routes<br />

importing and exporting in routing policies..........74<br />

accounting statement........................................................384<br />

usage guidelines..........................................................364<br />

accounting-profile statement..........................................315<br />

firewall<br />

usage guidelines.................................................268<br />

action modifiers, firewall filters.......................................226<br />

action statement...............................................287, 290, 316<br />

actions<br />

firewall filters.......................................................184, 226<br />

policy, routing...................................................................25<br />

characteristics, manipulating...........................50<br />

flow control......................................................47, 49<br />

tracing........................................................................47<br />

tracing................................................................................56<br />

address (filter match conditions)...................................221<br />

aggregate policer.................................................................304<br />

aggregate statement<br />

usage guidelines..........................................................292<br />

aggregated Ethernet<br />

load balancing...............................................................152<br />

aggregation statement......................................................385<br />

usage guidelines..........................................................364<br />

ampersand (&), bit-field logical operator...................225<br />

apply-path statement.........................................................165<br />

usage guidelines............................................................116<br />

area (routing policy match condition)............................42<br />

as-path (routing policy match condition).....................42<br />

as-path statement...............................................................166<br />

policy, routing<br />

usage guidelines....................................................96<br />

as-path-group statement..................................................167<br />

usage guidelines............................................................96<br />

as-path-prepend (routing policy action).............50, 135<br />

ASs<br />

paths<br />

modifying with routing policy..................50, 135<br />

regular expressions See policy, routing, AS<br />

path regular expressions<br />

autonomous-system-type statement........................386<br />

usage guidelines...........................................................351<br />

B<br />

bandwidth<br />

management of.......................................284, 287, 290<br />

bandwidth policer...............................................................309<br />

bandwidth-limit statement.............................................284<br />

bandwidth-percent statement.......................................284<br />

Copyright © 2010, <strong>Juniper</strong> <strong>Networks</strong>, Inc.<br />

461

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!