ike local-identity............................................................174
ike peer-identity.............................................................174
ip profile............................................................................174
ipsec tunnel profile.......................................................173
lifetime..............................................................................174
local ip address..............................................................174
local ip identity...............................................................174
local ip network.............................................................174
max-interfaces...............................................................174
peer ip identity...............................................................174
pfs group..........................................................................174
transform.........................................................................174
tunnel mtu.......................................................................174
IPSec tunnel profiles.............................................................173
IPv6
license................................................................................68
monitoring................................................................85, 114
J
J-Flow commands
clear ip flow stats..........................................................101
ip flow statistics.............................................................94
ip flow-cache entries....................................................95
ip flow-cache timeout active....................................95
ip flow-cache timeout inactive.................................95
ip flow-export..................................................................95
ip flow-sampling-mode packet-interval..............95
ip route-cache flow sampled....................................94
J-Flow statistics, clearing....................................................101
K
keepalive messages, NAT-T.............................................282
key-string command...........................................................227
keys, public
displaying on router....................................................228
format of..........................................................................212
obtaining without digital certificates...........212, 224
L
L2C (Layer 2 Control)
See
ANCP (Access Node
Control Protocol)
L2F, reassembly of tunnel packets................................270
L2TP (Layer 2 Tunneling Protocol)
reassembly of tunnel packets................................270
l2tp commands
l2tp destination profile..............................................285
l2tp ignore-receive-data-sequencing...................271
L2TP with IPSec...........................................................169, 275
client software supported........................................279
compatibility..................................................................279
configuring
client PC.................................................................284
E Series router...........................................284, 288
IPSec transport profiles...................................289
L2TP destination profiles......................285, 288
single-shot tunnels............................................287
control and data frames...........................................278
group preshared key...................................................279
how it works...................................................................277
LNS change of port.....................................................279
monitoring......................................................................294
NAT interactions...........................................................279
overview.................................................................169, 275
references.......................................................................276
requirements.................................................................279
setting up secure connection..................................278
troubleshooting...........................................................294
tunnel creation..............................................................275
with PPP..........................................................................279
license commands
license firewall maximum-virtual-routers ..........110
license ipsec-tunnels .................................................138
license mobile-ip home-agent..............................308
license nat........................................................................68
lifetime, IPSec.................................................................127, 137
limiting translation entries..................................................69
local-as community, BGP.....................................................37
loopback interfaces...................................................238, 254
M
manual IPSec interfaces.....................................................125
manuals
comments on.................................................................xxv
map tag, route map..................................................................4
match commands....................................................................9
and route maps.................................................................4
match as-paths.................................................................9
match community..........................................................10
match distance................................................................10
match extcommunity.............................................10, 41
match ip address........................................11, 32, 35, 36
match ip next-hop...........................................32, 35, 36
match level........................................................................12
match metric.....................................................................12
match metric-type..........................................................12
match policy-list..............................................................12
325
Copyright © 2010, Juniper Networks, Inc.
Index
Содержание JUNOSE 11.2.X IP SERVICES
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 8: ...Copyright 2010 Juniper Networks Inc viii JunosE 11 2 x IP Services Configuration Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii JunosE 11 2 x IP Services Configuration Guide...
Страница 22: ...Copyright 2010 Juniper Networks Inc xxii JunosE 11 2 x IP Services Configuration Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 2 JunosE 11 2 x IP Services Configuration Guide...
Страница 116: ...Copyright 2010 Juniper Networks Inc 90 JunosE 11 2 x IP Services Configuration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 118 JunosE 11 2 x IP Services Configuration Guide...
Страница 230: ...Copyright 2010 Juniper Networks Inc 204 JunosE 11 2 x IP Services Configuration Guide...
Страница 262: ...Copyright 2010 Juniper Networks Inc 236 JunosE 11 2 x IP Services Configuration Guide...
Страница 294: ...Copyright 2010 Juniper Networks Inc 268 JunosE 11 2 x IP Services Configuration Guide...
Страница 328: ...Copyright 2010 Juniper Networks Inc 302 JunosE 11 2 x IP Services Configuration Guide...
Страница 345: ...PART 2 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 346: ...Copyright 2010 Juniper Networks Inc 320 JunosE 11 2 x IP Services Configuration Guide...
Страница 356: ...Copyright 2010 Juniper Networks Inc 330 JunosE 11 2 x IP Services Configuration Guide...