16.03.2014 Views

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Index<br />

Layer 2 bridging traffic (MX Series<br />

routers)................................................................214<br />

VPLS traffic..........................................................209<br />

DSCP code point (IPv4 or IPv6)<br />

DVMRP<br />

firewall filter action modifier...................................226<br />

policy, routing<br />

applying....................................................................28<br />

dynamic database<br />

active nonstop routing.................................................68<br />

routing policies...............................................................66<br />

dynamic routing policies<br />

active nonstop routing.................................................68<br />

BGP.....................................................................................68<br />

configuring.......................................................................66<br />

dynamic-db statement...............................................172<br />

overview............................................................................65<br />

dynamic-db statement.......................................................172<br />

usage guidelines............................................................66<br />

E<br />

ether-pseudowire statement..........................................398<br />

usage guidelines...........................................................148<br />

evaluation<br />

firewall filters.................................................................196<br />

policy, routing .................................................................29<br />

exact route list match type.........................................118, 121<br />

excess-burst-size statement.................................287, 320<br />

exclamation point ( ! ), bit-field logical<br />

operator...............................................................................225<br />

export routing policies<br />

applying...............................................................27, 57, 173<br />

from statement..............................................................59<br />

export statement...................................................................173<br />

policy, routing<br />

usage guidelines......................................27, 57, 64<br />

export-format statement..................................................392<br />

usage guidelines..........................................................366<br />

F<br />

family inet statement (firewall filter)<br />

usage guidelines...........................................................192<br />

family inet statement (load balancing).......................397<br />

usage guidelines..........................................................359<br />

family mpls statement......................................................398<br />

usage guidelines..................................................146, 148<br />

family multiservice statement.......................................400<br />

MX Series routers<br />

usage guidelines....................................................151<br />

usage guidelines...........................................................149<br />

VPLS load balancing<br />

usage guidelines..................................................150<br />

family statement<br />

firewall filter....................................................................321<br />

forwarding table filters..............................................393<br />

port mirroring................................................................395<br />

sampling.........................................................................396<br />

file statement<br />

helpers trace options.................................................402<br />

packet capture.............................................................402<br />

sampling.........................................................................403<br />

traceoptions..................................................................403<br />

traffic sampling output<br />

usage guidelines...............................349, 351, 372<br />

filename statement............................................................404<br />

files<br />

firewall log output file................................................232<br />

logging information output file......................351, 372<br />

traffic sampling output files....................................349<br />

var/log/sampled file...........................................351, 372<br />

var/tmp/sampled.pkts file.......................................349<br />

files statement<br />

packet capture.............................................................405<br />

sampling........................................................................406<br />

usage guidelines..........................................................349<br />

filter statement<br />

firewall.............................................................................322<br />

forwarding table..........................................................407<br />

VPLS.................................................................................407<br />

filter-specific statement....................................................323<br />

usage guidelines...........................................................297<br />

filters<br />

interface-specific counters......................................236<br />

firewall filter<br />

match conditions<br />

VPLS.......................................................................209<br />

firewall filter lists<br />

overview..........................................................................239<br />

firewall filters<br />

actions....................................................................184, 226<br />

applying...................................................................235, 271<br />

architecture ...................................................................6, 8<br />

comparison with routing policies ........................9, 12<br />

configuration statements.................................192, 315<br />

evaluation.......................................................................196<br />

Copyright © 2010, <strong>Juniper</strong> <strong>Networks</strong>, Inc.<br />

463

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!