16.03.2014 Views

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Junos 10.4 <strong>Policy</strong> <strong>Framework</strong> <strong>Configuration</strong> <strong>Guide</strong><br />

NOTE: On MX Series routers only, you cannot apply as an output filter, a<br />

firewall filter configured at the [edit firewall filter family ccc] hierarchy level.<br />

Firewall filters configured for the family ccc statement can be applied only<br />

as input filters on MX Series routers.<br />

In the input-list statement, list the names of firewall filters to be evaluated when packets<br />

are received on the interface. You can specify up to 16 firewall filters for the filter input<br />

list. In the output-list statement, list the names of firewall filters to be evaluated when<br />

packets are transmitted from the interface. You can specify up to 16 firewall filters for<br />

the filter output list.<br />

Unless you use an input filter list or an output filter list, you can apply only one input and<br />

one output firewall filter to each interface. You can use the same filter one or more times.<br />

The input-list and output-list statements are not supported for simple filters or service<br />

filters.<br />

NOTE: The input-list filter-names and output-list filter-names statements for<br />

firewall filters for the ccc and mpls protocol families are supported on all<br />

interfaces except management and internal Ethernet (fxp) interfaces,<br />

loopback (lo0) interfaces, and USB modem (umd) interfaces.<br />

For more information about applying input lists and output lists, see “Overview of Firewall<br />

Filter Lists” on page 239. For more general information about configuring filters on<br />

interfaces, see the Junos OS Network Interfaces <strong>Configuration</strong> <strong>Guide</strong>.<br />

When you apply a filter to an interface, it is evaluated against all the data packets passing<br />

through that interface. The exception is the loopback interface, lo0, which is the interface<br />

to the Routing Engine and carries no data packets. If you apply a filter to the lo0 interface,<br />

the filter affects the local packets received or transmitted by the Routing Engine.<br />

Filters apply to all packets entering an interface, not just the packets destined for the<br />

Routing Engine. To filter packets destined for the Routing Engine, configure the group<br />

statement at the [edit interfaces interface-name unit logical-unit-number family family-name<br />

filter] hierarchy level. For more information, see “Defining Interface Groups” on page 237.<br />

You can configure the following additional properties when applying filters to interfaces:<br />

• Configuring Interface-Specific Counters on page 236<br />

• Defining Interface Groups on page 237<br />

Configuring Interface-Specific Counters<br />

When you configure a firewall filter that is applied to multiple interfaces, you can name<br />

individual counters specific to each interface. These counters enable you to easily maintain<br />

statistics on the traffic transiting the different interfaces. A separate instance of the<br />

interface-specific firewall filter is created for each interface to which you apply the filter.<br />

236<br />

Copyright © 2010, <strong>Juniper</strong> <strong>Networks</strong>, Inc.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!