16.03.2014 Views

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Index<br />

input statement.....................................................................417<br />

firewall filters<br />

usage guidelines.........................................235, 271<br />

forwarding table............................................................417<br />

port mirroring..................................................................417<br />

sampling..........................................................................418<br />

traffic sampling.............................................................417<br />

usage guidelines..................................................347<br />

usage guidelines..........................................................363<br />

install-nexthop lsp (routing policy action)....................51<br />

instance (routing policy match condition)...................43<br />

instance statement<br />

port mirroring.................................................................419<br />

instance-name.inet.0 routing table..................................19<br />

interface (routing policy match condition)..................44<br />

interface policers..................................................................303<br />

interface set...........................................................................303<br />

interface statement<br />

accounting or sampling............................................420<br />

BOOTP..............................................................................421<br />

DNS or TFTP packet forwarding or relay<br />

agent............................................................................422<br />

monitoring......................................................................423<br />

next-hop group............................................................424<br />

port mirroring................................................................424<br />

snooping.........................................................................422<br />

usage guidelines..........................................................369<br />

interface-set statement.....................................................325<br />

usage guidelines..........................................................303<br />

interface-specific statement...........................................325<br />

usage guidelines..........................................................236<br />

invert-match statement<br />

usage guidelines...........................................................109<br />

IP addresses<br />

ipsec-sa<br />

IPv4<br />

IPv6<br />

sampling traffic from single IP addresses.........356<br />

firewall filter action modifier...................................226<br />

firewall filter match conditions................................197<br />

firewall filter match conditions..............................202<br />

IPv6 accounting, configuring...........................................364<br />

IS-IS<br />

policy, routing<br />

J<br />

joins, PIM<br />

applying....................................................................28<br />

rejecting............................................................................127<br />

L<br />

layer-3 statement<br />

load balancing<br />

usage guidelines....................................................151<br />

layer-3-only statement<br />

usage guidelines...........................................................150<br />

layer-4 statement<br />

LDP<br />

load balancing<br />

usage guidelines....................................................151<br />

policy, routing<br />

applying....................................................................28<br />

level (routing policy match condition)...........................44<br />

load balancing<br />

configuring.......................................................................152<br />

Ethernet pseudowires................................................148<br />

per-flow.................................................................367, 369<br />

per-packet.......................................................................142<br />

IPv4...........................................................................143<br />

MPLS........................................................................146<br />

per-prefix........................................................................368<br />

VPLS<br />

M120 and M320 routers....................................150<br />

MX Series routers..................................................151<br />

load-balance group..............................................................310<br />

load-balance statement...................................................425<br />

usage guidelines................................................368, 369<br />

load-balance-group statement......................................326<br />

usage guidelines...........................................................310<br />

local-dump statement.......................................................426<br />

usage guidelines..................................................351, 353<br />

local-preference<br />

log<br />

policy, routing<br />

action.........................................................................52<br />

match condition....................................................44<br />

firewall filter action modifier...................................226<br />

log output<br />

firewall filters.................................................................232<br />

traffic sampling....................................................351, 372<br />

logical interface<br />

policing........................................................284, 287, 290<br />

logical routers See logical systems<br />

logical systems<br />

configuring firewall filters.........................................255<br />

logical-bandwidth-policer statement.........................326<br />

usage guidelines..........................................................309<br />

Copyright © 2010, <strong>Juniper</strong> <strong>Networks</strong>, Inc.<br />

465

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!