16.03.2014 Views

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Junos 10.4 <strong>Policy</strong> <strong>Framework</strong> <strong>Configuration</strong> <strong>Guide</strong><br />

Part 3<br />

Firewall Filters<br />

Chapter 8 Introduction to Firewall Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183<br />

Table 24: Firewall Filter Application Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186<br />

Chapter 9 Firewall Filter <strong>Configuration</strong> . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191<br />

Table 25: IPv4 Firewall Filter Match Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . 197<br />

Table 26: IPv6 Firewall Filter Match Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . 202<br />

Table 27: Protocol-Independent Firewall Filter Match Conditions . . . . . . . . . . . . 206<br />

Table 28: Layer 2 Circuit Cross-Connect Firewall Filter Match Conditions . . . . . . 207<br />

Table 29: MPLS Firewall Filter Match Conditions (Hierarchy Level 1) . . . . . . . . . 208<br />

Table 30: MPLS Firewall Filter Match Conditions (Hierarchy Level 2) . . . . . . . . . 208<br />

Table 31: MPLS Firewall Filter Match Conditions (Hierarchy Level 3) . . . . . . . . . 209<br />

Table 32: VPLS Firewall Filter Match Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . 210<br />

Table 33: Layer 2 Bridging Firewall Filter Match Conditions (MX Series Ethernet<br />

Services Routers Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214<br />

Table 34: Bit-Field Logical Operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225<br />

Table 35: Firewall Filter Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228<br />

Table 36: Unsupported Firewall Statements for Logical Systems . . . . . . . . . . . . 263<br />

Table 37: Unsupported Firewall Actions and Action Modifiers for Logical<br />

Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264<br />

Chapter 10 Introduction to Traffic Policing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277<br />

Table 38: Policer Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279<br />

xxiv<br />

Copyright © 2010, <strong>Juniper</strong> <strong>Networks</strong>, Inc.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!