16.03.2014 Views

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

List of Figures<br />

Part 1<br />

<strong>Policy</strong> <strong>Framework</strong><br />

Chapter 1 Introduction to <strong>Policy</strong> <strong>Framework</strong> . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3<br />

Figure 1: Flows of Routing Information and Packets . . . . . . . . . . . . . . . . . . . . . . . . . 4<br />

Figure 2: Routing Policies to Control Routing Information Flow . . . . . . . . . . . . . . . . 5<br />

Figure 3: Firewall Filters to Control Packet Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6<br />

Figure 4: <strong>Policy</strong> Control Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7<br />

Part 2<br />

Routing Policies<br />

Chapter 2 Introduction to Routing <strong>Policy</strong> . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15<br />

Figure 5: Importing and Exporting Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17<br />

Figure 6: Importing and Exporting Routing Policies . . . . . . . . . . . . . . . . . . . . . . . . 23<br />

Figure 7: Routing <strong>Policy</strong> Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23<br />

Figure 8: Routing <strong>Policy</strong> Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30<br />

Figure 9: Routing <strong>Policy</strong> Chain Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31<br />

Figure 10: Routing <strong>Policy</strong> Subroutine Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . 33<br />

Chapter 4 Routing <strong>Policy</strong> <strong>Configuration</strong> . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39<br />

Figure 11: ISP Network Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83<br />

Chapter 6 Extended Actions <strong>Configuration</strong> . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135<br />

Figure 12: Multicast Load Balancing over Aggregated Ethernet Links . . . . . . . . . . 153<br />

Part 3<br />

Firewall Filters<br />

Chapter 10 Introduction to Traffic Policing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277<br />

Figure 13: Incoming and Outgoing Interface Policers . . . . . . . . . . . . . . . . . . . . . . 279<br />

Part 4<br />

Traffic Sampling, Forwarding and Monitoring<br />

Chapter 14 Introduction to Traffic Sampling <strong>Configuration</strong> . . . . . . . . . . . . . . . . . . . . . . 345<br />

Figure 14: Configure Sampling Rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348<br />

Copyright © 2010, <strong>Juniper</strong> <strong>Networks</strong>, Inc.<br />

xxi

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!