suspicious control flow detection.................................436
display options.............................................................436
logs...................................................................................436
parameters....................................................................436
traps.................................................................................436
suspicious control flow monitoring...............................437
suspicious-control-flow-detection commands
baseline suspicious-control-flow-detection
counts.........................................................................436
clear suspicious-control-flow-detection...........436
suspicious-control-flow-detection
grouping-off..............................................................436
suspicious-control-flow-detection off...............436
suspicious-control-flow-detection protocol
backoff-time............................................................436
suspicious-control-flow-detection protocol
low-threshold...........................................................436
suspicious-control-flow-detection protocol
threshold....................................................................436
switch fabric modules.
See
SFMs
switch usage, line modules..............................................360
synchronization process....................................................368
synchronization reserve file..............................................369
synchronize command.............................................369, 373
system
autoupgrade feature...................................................241
basic parameters........................................................403
booting.................................................................495, 504
rebooting...............................................................500
command-line interface.
See
CLI
configuring automatically........................................264
environment information..........................................323
exiting.................................................................................46
FTP client........................................................................287
FTP server.......................................................................287
initializing line modules...............................................45
levels of access....................................................431, 432
logging in...........................................................................45
logging/troubleshooting, commands
for........................................................................309, 335
managing........................................................................239
monitoring......................................................................322
passwords......................................................................403
patching with hotfixes...............................................378
physical slots, rebooting..........................................500
RADIUS password authentication.........................421
software reset button................................................410
system configuration files.........................................277
system name................................................................240
TFTP client.....................................................................287
timing................................................................................241
updating with hotfixes...............................................378
virtual router limitations............................................525
system clock
setting................................................................................511
system commands
privilege.............................................................................49
privilege-group alias.....................................................49
privilege-group membership.....................................49
privilege-group membership clear..........................49
write core.........................................................................312
system configuration
saving current...............................................................264
saving startup...............................................................264
system passwords.
See
passwords
system security.....................................................................403
system.log file........................................................................278
T
T1 lines, controllers for............................................................12
T3 interfaces
configuring.........................................................................13
controllers for....................................................................12
line rates.............................................................................10
Tab key................................................................................32, 60
aaa authentication login...........................................416
restricting access to commands............................431
tag-group command..........................................................258
tech-support encoded-string command.....................319
technical support
contacting JTAC...........................................................xxix
Telnet
access lists.....................................................................420
client, using....................................................................305
configuring to listen in nondefault virtual
router...........................................................................305
logins...................................................................................45
telnet commands
telnet................................................................................305
telnet listen....................................................................305
terminal
configuring display......................................................269
displaying configuration............................................274
displaying international characters......................270
sending messages to..................................................276
setting length (in lines).............................................269
setting width (in characters)..................................269
599
Copyright © 2010, Juniper Networks, Inc.
Index
Summary of Contents for JUNOSE 11.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 8: ...Copyright 2010 Juniper Networks Inc viii JunosE 11 3 x System Basics Configuration Guide...
Page 24: ...Copyright 2010 Juniper Networks Inc xxiv JunosE 11 3 x System Basics Configuration Guide...
Page 32: ...Copyright 2010 Juniper Networks Inc 2 JunosE 11 3 x System Basics Configuration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 116 JunosE 11 3 x System Basics Configuration Guide...
Page 166: ...Copyright 2010 Juniper Networks Inc 136 JunosE 11 3 x System Basics Configuration Guide...
Page 432: ...Copyright 2010 Juniper Networks Inc 402 JunosE 11 3 x System Basics Configuration Guide...
Page 488: ...Copyright 2010 Juniper Networks Inc 458 JunosE 11 3 x System Basics Configuration Guide...
Page 524: ...Copyright 2010 Juniper Networks Inc 494 JunosE 11 3 x System Basics Configuration Guide...
Page 554: ...Copyright 2010 Juniper Networks Inc 524 JunosE 11 3 x System Basics Configuration Guide...
Page 566: ...Copyright 2010 Juniper Networks Inc 536 JunosE 11 3 x System Basics Configuration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 558 JunosE 11 3 x System Basics Configuration Guide...
Page 613: ...PART 3 Index Index on page 585 583 Copyright 2010 Juniper Networks Inc...
Page 614: ...Copyright 2010 Juniper Networks Inc 584 JunosE 11 3 x System Basics Configuration Guide...
Page 632: ...Copyright 2010 Juniper Networks Inc 602 JunosE 11 3 x System Basics Configuration Guide...