14.12.2012 Views

Junos OS MPLS Applications Configuration Guide - Juniper Networks

Junos OS MPLS Applications Configuration Guide - Juniper Networks

Junos OS MPLS Applications Configuration Guide - Juniper Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Junos</strong> 11.1 <strong>MPLS</strong> <strong>Applications</strong> <strong>Configuration</strong> <strong>Guide</strong><br />

authentication-key statement<br />

LDP...................................................................................406<br />

usage guidelines................................................400<br />

RSVP................................................................................329<br />

usage guidelines.................................................302<br />

auto-bandwidth statement..............................................196<br />

usage guidelines.............................................................93<br />

auto-policing statement.....................................................197<br />

usage guidelines............................................................173<br />

automatic bandwidth allocation............................50, 196<br />

bandwidth monitoring.................................................97<br />

LSPs....................................................................................92<br />

manually trigger.............................................................98<br />

threshold...........................................................................95<br />

automatic mesh, RSVP.......................................................318<br />

automatic policers<br />

LSP bandwidth, changing.........................................174<br />

LSPs...................................................................................174<br />

overview............................................................................173<br />

point-to-multipoint LSPs..........................................175<br />

automatic reoptimization, bypass LSPs.......................314<br />

B<br />

backup paths............................................................................35<br />

backup-pe-group statement...........................................198<br />

bandwidth<br />

automatic allocation, LSPs........................................92<br />

LSP paths.........................................................................113<br />

RSVP reservations......................................................358<br />

bandwidth model..................................................................124<br />

bandwidth oversubscription<br />

overview............................................................................127<br />

bandwidth statement<br />

fast reroute.....................................................................199<br />

usage guidelines....................................................82<br />

link protection...............................................................330<br />

LSPs<br />

<strong>MPLS</strong><br />

usage guidelines....................................................311<br />

usage guidelines..................................................134<br />

usage guidelines..................................................144<br />

multiclass LSPs............................................................199<br />

usage guidelines...................................................137<br />

RSVP................................................................................330<br />

signaled LSPs................................................................199<br />

usage guidelines....................................................113<br />

static LSPs.....................................................................200<br />

usage guidelines (ingress router)..................142<br />

bandwidth update threshold..........................................303<br />

530<br />

bandwidth-model statement..........................................201<br />

usage guidelines...........................................................124<br />

bandwidth-percent statement.......................................202<br />

BFD<br />

usage guidelines..................................................135, 138<br />

ECMP paths..................................................................390<br />

fast reroute......................................................................178<br />

LDP LSPs.............................................................388, 390<br />

revert timer....................................................................258<br />

RSVP LSPs..............................................................178, 179<br />

bfd-liveness-detection statement<br />

BGP<br />

LDP LSPs........................................................................407<br />

usage guidelines.................................................388<br />

RSVP LSPs.....................................................................203<br />

usage guidelines...................................................178<br />

destinations......................................................................41<br />

binding (tracing flag)..........................................................434<br />

braces, in configuration statements...........................xxxvi<br />

brackets<br />

angle, in syntax descriptions..................................xxxv<br />

square, in configuration statements..................xxxvi<br />

branch LSPs.............................................................................152<br />

bypass LSPs...........................................................................309<br />

administrative groups.................................................310<br />

bandwidth........................................................................311<br />

bandwidth subscription.............................................315<br />

class-of-service..............................................................311<br />

CSPF, disabling..............................................................313<br />

explicit paths..................................................................314<br />

hop limit...........................................................................312<br />

maximum number........................................................312<br />

multiple............................................................................291<br />

node protection, disabling........................................313<br />

optimization interval...................................................313<br />

priority and preemption.............................................315<br />

switching away from a network node..................307<br />

types..................................................................................291<br />

bypass statement<br />

C<br />

CCC<br />

RSVP..................................................................................331<br />

static LSP.............................................................204, 332<br />

usage guidelines..........................................................309<br />

aggregated Ethernet..................................................448<br />

BPDUs, nonstandard.................................................442<br />

encapsulation<br />

Ethernet CCC........................................................447<br />

Copyright © 2011, <strong>Juniper</strong> <strong>Networks</strong>, Inc.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!