16.03.2014 Views

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Junos 10.4 <strong>Policy</strong> <strong>Framework</strong> <strong>Configuration</strong> <strong>Guide</strong><br />

H<br />

hash-key statement.............................................................412<br />

helpers statement................................................................414<br />

I<br />

if-exceeding statement............................................284, 324<br />

if-route-exists statement...................................................170<br />

import statement..................................................................175<br />

indexed-next-hop statement...........................................416<br />

input statement.....................................................................417<br />

forwarding table............................................................417<br />

port mirroring..................................................................417<br />

sampling..........................................................................418<br />

instance statement<br />

port mirroring.................................................................419<br />

interface statement<br />

accounting or sampling............................................420<br />

BOOTP..............................................................................421<br />

DNS or TFTP packet forwarding or relay<br />

agent............................................................................422<br />

monitoring......................................................................423<br />

next-hop group............................................................424<br />

port mirroring................................................................424<br />

snooping.........................................................................422<br />

interface-set statement.....................................................325<br />

interface-specific statement...........................................325<br />

L<br />

load-balance statement...................................................425<br />

load-balance-group statement......................................326<br />

local-dump statement.......................................................426<br />

logical interface<br />

policing........................................................284, 287, 290<br />

logical-bandwidth-policer statement.........................326<br />

logical-interface-policer<br />

statement..............................................284, 287, 290, 327<br />

M<br />

max-packets-per-second statement..........................426<br />

maximum-capture-size statement...............................427<br />

maximum-hop-count statement...................................427<br />

minimum-wait-time statement.....................................428<br />

mirror-once statement......................................................429<br />

monitoring statement........................................................430<br />

N<br />

next-hop statement.............................................................431<br />

next-hop-group statement..............................................432<br />

no-filter-check statement................................................433<br />

no-stamp statement..........................................................453<br />

no-world-readable statement........................................458<br />

O<br />

output statement.................................................................435<br />

accounting.....................................................................435<br />

forwarding table..........................................................436<br />

monitoring......................................................................437<br />

port mirroring................................................................438<br />

sampling.........................................................................439<br />

P<br />

packet-capture statement..............................................440<br />

peak-burst-size statement....................................290, 328<br />

peak-information-rate statement.......................290, 329<br />

per-flow statement..............................................................441<br />

per-prefix statement..........................................................442<br />

physical-interface-filter statement...............................330<br />

physical-interface-policer statement..........................330<br />

policer statement........................................................284, 331<br />

policy-options statement...................................................176<br />

policy-statement statement.............................................177<br />

port statement......................................................................442<br />

port-mirroring statement..................................................443<br />

prefix-action statement.....................................................332<br />

prefix-list statement............................................................179<br />

prefix-list-filter statement................................................180<br />

R<br />

rate statement......................................................................444<br />

relay-agent-option statement........................................445<br />

route-accounting statement...........................................445<br />

run-length statement.........................................................446<br />

S<br />

sampling statement............................................................447<br />

server statement<br />

DHCP and BOOTP service ......................................449<br />

DNS and TFTP service .............................................450<br />

service-filter statement<br />

firewall.............................................................................333<br />

show firewall filter command...........................................231<br />

show interfaces policers command..............................303<br />

show log command.............................................................232<br />

show policers command...................................................295<br />

show policy damping command ....................................142<br />

simple-filter statement<br />

firewall.............................................................................334<br />

single-rate statement...............................................287, 335<br />

472<br />

Copyright © 2010, <strong>Juniper</strong> <strong>Networks</strong>, Inc.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!