16.03.2014 Views

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Junos 10.4 <strong>Policy</strong> <strong>Framework</strong> <strong>Configuration</strong> <strong>Guide</strong><br />

logical-interface-policer<br />

statement..............................................284, 287, 290, 327<br />

usage guidelines..........................................................304<br />

longer route list match type.......................................118, 121<br />

loss-priority<br />

firewall filter action modifier...................................226<br />

M<br />

manuals<br />

comments on.................................................................xxx<br />

match conditions<br />

firewall filters<br />

address filter..........................................................221<br />

bit-field...................................................................224<br />

from statement....................................................197<br />

overview.........................................................184, 197<br />

VPLS.......................................................................209<br />

policy, routing............................................................24, 41<br />

max-packets-per-second statement..........................426<br />

maximum-capture-size statement...............................427<br />

maximum-hop-count statement...................................427<br />

usage guidelines..........................................................369<br />

maximum-packet-length statement...........................428<br />

metric<br />

policy, routing<br />

action.........................................................................52<br />

match condition....................................................44<br />

minimum-wait-time statement.....................................428<br />

mirror-once statement......................................................429<br />

monitoring statement........................................................430<br />

MPLS<br />

usage guidelines..........................................................366<br />

firewall filters<br />

match conditions...............................................208<br />

policy, routing<br />

applying....................................................................28<br />

multicast-scoping<br />

N<br />

names<br />

policy, routing<br />

match condition....................................................44<br />

policy, routing..................................................................40<br />

neighbor (routing policy match condition)...................45<br />

next policy (routing policy control action)...................49<br />

next term<br />

firewall filter action.....................................................226<br />

next term (routing policy control action)......................49<br />

next-hop<br />

policy, routing<br />

action.........................................................................53<br />

match condition....................................................45<br />

next-hop groups....................................................................367<br />

next-hop statement.............................................................431<br />

next-hop groups<br />

usage guidelines..................................................367<br />

next-hop-group statement..............................................432<br />

usage guidelines...........................................................367<br />

no-filter-check statement................................................433<br />

no-label-1-exp statement<br />

usage guidelines...........................................................146<br />

no-listen statement<br />

usage guidelines..........................................................369<br />

no-local-dump statement...............................................426<br />

usage guidelines...........................................................351<br />

no-stamp statement..........................................................453<br />

usage guidelines..........................................................349<br />

no-world-readable statement........................................458<br />

usage guidelines...........................................................351<br />

noncontiguous address filter...........................................223<br />

notice icons defined..........................................................xxviii<br />

O<br />

one-rate four-color<br />

marking..........................................277, 278, 279, 280, 281<br />

origin<br />

policy, routing<br />

action.........................................................................53<br />

match condition....................................................45<br />

orlonger route list match type...................................119, 121<br />

OSPF<br />

policy, routing<br />

output files<br />

applying....................................................................28<br />

firewall log output file................................................232<br />

logging information output file......................351, 372<br />

traffic sampling output files....................................349<br />

output statement.................................................................435<br />

accounting.....................................................................435<br />

firewall filters<br />

usage guidelines.........................................235, 271<br />

forwarding table..........................................................436<br />

monitoring......................................................................437<br />

port mirroring................................................................438<br />

sampling.........................................................................439<br />

usage guidelines..........................................................363<br />

466<br />

Copyright © 2010, <strong>Juniper</strong> <strong>Networks</strong>, Inc.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!