16.03.2014 Views

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Junos 10.4 <strong>Policy</strong> <strong>Framework</strong> <strong>Configuration</strong> <strong>Guide</strong><br />

example filter definitions.......................238, 244, 310<br />

flow, packets .....................................................................4<br />

in traffic sampling.......................................................346<br />

input lists........................................................................239<br />

log output file................................................................232<br />

match conditions.......................................184, 197, 220<br />

circuit cross-connects (CCC)........................206<br />

class-based...........................................................219<br />

IPv6..........................................................................202<br />

MPLS.......................................................................208<br />

protocol-independent......................................206<br />

match conditions,<br />

IPv4...........................................................................197<br />

match conditions, Layer 2 bridging (MX Series<br />

routers)........................................................................214<br />

output lists.....................................................................239<br />

overview..................................................................183, 277<br />

physical interface filters............................................330<br />

policing............................................................................293<br />

protocol families..........................................................184<br />

purpose................................................................................9<br />

service filters..................................................................252<br />

show firewall filters command................................231<br />

simple filters..................................................................253<br />

standard<br />

configuring.............................................................193<br />

system logging..............................................................273<br />

testing packet protocols.............................................217<br />

firewall log output file.........................................................232<br />

firewall statement................................................................323<br />

usage guidelines............192, 277, 278, 279, 280, 281<br />

flood statement...................................................................408<br />

usage guidelines..........................................................363<br />

flooding<br />

IS-IS and OSPF...............................................................20<br />

flow aggregation....................................................................351<br />

flow control actions........................................................47, 49<br />

flow-active-timeout statement.....................................408<br />

accounting<br />

usage guidelines.................................................364<br />

sampling<br />

usage guidelines.................................................349<br />

flow-export-destination statement.............................409<br />

usage guidelines..........................................................366<br />

flow-inactive-timeout statement.................................409<br />

accounting<br />

usage guidelines.................................................364<br />

sampling<br />

usage guidelines.................................................349<br />

flow-server statement<br />

usage guidelines...........................................................351<br />

font conventions...................................................................xxix<br />

forwarding table<br />

filters........................................................................271, 363<br />

policy, routing<br />

forwarding-class<br />

applying.............................................................29, 64<br />

firewall filter action modifier...................................226<br />

forwarding-options statement.........................................411<br />

usage guidelines..........................................................359<br />

four loss priorities............................277, 278, 279, 280, 281<br />

from statement.......................................................................177<br />

firewall filters<br />

usage guidelines.........................................196, 197<br />

policy, routing<br />

omitting....................................................................59<br />

usage guidelines.....................................................41<br />

FTP traffic, sampling...........................................................357<br />

G<br />

group statement<br />

DHCP snooping..............................................................411<br />

H<br />

hash-key statement.............................................................412<br />

usage guidelines..........................................................359<br />

hash-seed statement<br />

load balancing.....................................................441, 442<br />

helpers statement................................................................414<br />

hierarchical policer...............................................................292<br />

overview..........................................................................292<br />

hierarchical-policer statement<br />

usage guidelines..........................................................292<br />

I<br />

icmp-code (firewall filter match condition)...............197<br />

icmp-type (firewall filter match condition).................217<br />

icons defined, notice.........................................................xxviii<br />

if-exceeding statement............................................284, 324<br />

if-route-exists statement...................................................170<br />

import routing policies<br />

applying.......................................................27, 57, 60, 175<br />

overview..............................................................................17<br />

import statement..................................................................175<br />

policy, routing<br />

usage guidelines..............................................27, 57<br />

indexed-next-hop statement...........................................416<br />

464<br />

Copyright © 2010, <strong>Juniper</strong> <strong>Networks</strong>, Inc.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!