community lists, BGP............................................................37
conventions
notice icons....................................................................xxiii
text and syntax.............................................................xxiv
CRL (certificate revocation list).....................................206
checking.........................................................................208
viewing.............................................................................228
customer support..................................................................xxv
contacting JTAC............................................................xxv
D
dead peer detection.
See
DPD
default-information originate command......................26
destination profiles
configuring.....................................................................255
monitoring......................................................................259
destruct timeout period for single-shot
tunnels.................................................................................284
digital certificates
authenticating the peer............................................208
base64............................................................................205
CA hierarchy..................................................................208
certificate chains.........................................................208
checking CRLs..............................................................208
configuring.......................................................................213
file extensions..............................................................208
generating private/public key pairs......................208
monitoring......................................................................228
obtaining a public key certificate..........................208
obtaining a root CA certificate...............................208
obtaining public keys without........................212, 224
offline configuration....................................................213
offline enrollment.......................................................208
online configuration.....................................................219
online enrollment........................................................208
overview..........................................................................205
signature authentication..........................................207
standards.......................................................................208
viewing........................................................208, 209, 228
X.509v3...........................................................................207
documentation set
comments on.................................................................xxv
DPD (dead peer detection)...............................................133
DVMRP (Distance Vector Multicast Routing
Protocol)
reassembly of tunnel packets................................270
tunnels.............................................................................238
dvmrp destination profile command............................257
DVMRP with IPSec
how it works..................................................................288
setting up secure connection.................................288
dynamic IP tunnels
configuring.....................................................................255
monitoring......................................................................259
overview...........................................................................251
dynamic tunnels....................................................................251
E
enable commands
enable ipsec-transport.............................................285
enable ipsec-transport command.................................257
endpoints, tunnel..................................................................237
F
filter lists, BGP..........................................................................22
filtering
AS paths.............................................................................22
network prefixes.............................................................20
undesirable traffic..........................................................32
firewall
configuring......................................................................107
monitoring........................................................................114
firewall commands
license firewall maximum-virtual-router.............110
flow statistics commands
cache entries...................................................................95
cache timeout.................................................................95
enabled..............................................................................95
export destination ........................................................95
export source...................................................................95
ip flow-aggregation cache ........................................95
mask destination ..........................................................95
FQDN (fully qualified domain name)..........127, 143, 148
aggressive mode...........................................................134
user@fqdn format........................................................127
with digital certificates................................................127
with preshared keys.....................................................127
fully qualified domain name.
See
FQDN
G
GRE (Generic Routing Encapsulation)
reassembly of tunnel packets................................270
tunnels.............................................................................237
gre destination profile command..................................258
GRE with IPSec
how it works..................................................................288
setting up secure connection.................................288
Copyright © 2010, Juniper Networks, Inc.
322
JunosE 11.2.x IP Services Configuration Guide
Summary of Contents for JUNOSE 11.2.X IP SERVICES
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 8: ...Copyright 2010 Juniper Networks Inc viii JunosE 11 2 x IP Services Configuration Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii JunosE 11 2 x IP Services Configuration Guide...
Page 22: ...Copyright 2010 Juniper Networks Inc xxii JunosE 11 2 x IP Services Configuration Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 2 JunosE 11 2 x IP Services Configuration Guide...
Page 116: ...Copyright 2010 Juniper Networks Inc 90 JunosE 11 2 x IP Services Configuration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 118 JunosE 11 2 x IP Services Configuration Guide...
Page 230: ...Copyright 2010 Juniper Networks Inc 204 JunosE 11 2 x IP Services Configuration Guide...
Page 262: ...Copyright 2010 Juniper Networks Inc 236 JunosE 11 2 x IP Services Configuration Guide...
Page 294: ...Copyright 2010 Juniper Networks Inc 268 JunosE 11 2 x IP Services Configuration Guide...
Page 328: ...Copyright 2010 Juniper Networks Inc 302 JunosE 11 2 x IP Services Configuration Guide...
Page 345: ...PART 2 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 346: ...Copyright 2010 Juniper Networks Inc 320 JunosE 11 2 x IP Services Configuration Guide...
Page 356: ...Copyright 2010 Juniper Networks Inc 330 JunosE 11 2 x IP Services Configuration Guide...