List of Figures
Part 1
Chapters
Chapter 1
Configuring Routing Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Figure 1: Applying Route Maps to Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Figure 2: Filtering with Access Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Figure 3: Filtering with AS-Path Access Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Figure 4: Route Map Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Figure 5: Community Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Chapter 2
Configuring NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Figure 6: NAPT Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Figure 7: Bidirectional NAT Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Figure 8: Twice NAT Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Figure 9: Cross-VRF Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Figure 10: PPTP Tunnels on an Inside Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Figure 11: PPTP Tunnels on an Outside Network . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Chapter 5
Configuring IPSec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Figure 12: IPSec Tunneling Stack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Figure 13: IPSec Tunneling Packet Encapsulation . . . . . . . . . . . . . . . . . . . . . . . . . 124
Figure 14: IPSec Security Parameters in Relation to the Secure IP Interface . . . . 125
Figure 15: Customer A's Corporate Frame Relay Network . . . . . . . . . . . . . . . . . . . 153
Figure 16: ISP-X Uses ERX Routers to Connect Corporate Offices over the
Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Figure 17: Connecting Customers Who Use Similar Address Schemes . . . . . . . . 156
Chapter 7
Configuring ANCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Figure 18: Using ANCP with an Access Node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Chapter 9
Configuring IP Tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
Figure 19: IP Tunneling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
Figure 20: Transport and Tunnel Networks Using Different Routing Protocols . . 244
Chapter 11
IP Reassembly for Tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
Figure 21: Tunneling Through an IP Network That Fragments Packets . . . . . . . . 270
Chapter 12
Securing L2TP and IP Tunnels with IPSec . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Figure 22: L2TP with IPSec Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
Figure 23: L2TP/IPSec Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
Figure 24: L2TP Control Frame Encapsulated by IPSec . . . . . . . . . . . . . . . . . . . . 279
Figure 25: L2TP Data Frame Encapsulated by IPSec . . . . . . . . . . . . . . . . . . . . . . 279
Figure 26: L2TP Control Frame with NAT-T UDP Encapsulation . . . . . . . . . . . . . 281
Figure 27: L2TP Data Frame with NAT-T UDP Encapsulation . . . . . . . . . . . . . . . 282
xix
Copyright © 2010, Juniper Networks, Inc.
Summary of Contents for JUNOSE 11.2.X IP SERVICES
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 8: ...Copyright 2010 Juniper Networks Inc viii JunosE 11 2 x IP Services Configuration Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii JunosE 11 2 x IP Services Configuration Guide...
Page 22: ...Copyright 2010 Juniper Networks Inc xxii JunosE 11 2 x IP Services Configuration Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 2 JunosE 11 2 x IP Services Configuration Guide...
Page 116: ...Copyright 2010 Juniper Networks Inc 90 JunosE 11 2 x IP Services Configuration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 118 JunosE 11 2 x IP Services Configuration Guide...
Page 230: ...Copyright 2010 Juniper Networks Inc 204 JunosE 11 2 x IP Services Configuration Guide...
Page 262: ...Copyright 2010 Juniper Networks Inc 236 JunosE 11 2 x IP Services Configuration Guide...
Page 294: ...Copyright 2010 Juniper Networks Inc 268 JunosE 11 2 x IP Services Configuration Guide...
Page 328: ...Copyright 2010 Juniper Networks Inc 302 JunosE 11 2 x IP Services Configuration Guide...
Page 345: ...PART 2 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 346: ...Copyright 2010 Juniper Networks Inc 320 JunosE 11 2 x IP Services Configuration Guide...
Page 356: ...Copyright 2010 Juniper Networks Inc 330 JunosE 11 2 x IP Services Configuration Guide...