16.03.2014 Views

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Index<br />

P<br />

P2MP..........................................................................................152<br />

packet capture.......................................................................379<br />

packet counter<br />

firewall filters..................................................................231<br />

packet-capture statement..............................................440<br />

packets<br />

testing packet protocols.............................................217<br />

parentheses, in syntax descriptions...............................xxx<br />

payload statement<br />

usage guidelines...........................................................150<br />

peak-burst-size statement....................................290, 328<br />

peak-information-rate statement.......................290, 329<br />

per-flow load balancing....................................................369<br />

per-flow statement..............................................................441<br />

per-prefix load balancing.................................................368<br />

per-prefix statement..........................................................442<br />

physical-interface-filter statement...............................330<br />

usage guidelines..........................................................306<br />

physical-interface-policer statement..........................330<br />

PIM<br />

pipe ( | )<br />

usage guidelines..........................................................306<br />

multicast traffic joins, rejecting................................127<br />

policy, routing<br />

applying....................................................................28<br />

bit-field logical operator...........................................225<br />

plus sign (+), bit-field logical operator.........................225<br />

policer<br />

firewall filter action modifier...................................226<br />

overview.....................................277, 278, 279, 280, 281<br />

policer statement........................................................284, 331<br />

policer, single-rate three-color<br />

overview..........................................................................286<br />

policer, single-rate two-color<br />

overview..........................................................................283<br />

policer, two-rate three-color<br />

policers<br />

overview..........................................................................289<br />

example configurations.............................................310<br />

interface..........................................................................303<br />

physical interface........................................................330<br />

configuring............................................................306<br />

policy (routing policy match condition).........................45<br />

policy framework<br />

architecture ........................................................................6<br />

comparison of policies ..................................................9<br />

firewall filters......................................................................3<br />

overview...............................................................................3<br />

policy, routing.....................................................................3<br />

policy, routing<br />

access and access-internal routes..........................74<br />

actions.....................................................25, 47, 51, 52, 57<br />

applying.............................................................57, 174, 176<br />

overview....................................................................26<br />

architecture ........................................................................6<br />

AS path regular<br />

expressions..............................95, 102, 165, 166, 167<br />

BGP damping parameters..........................................171<br />

chains<br />

applying.....................................................................57<br />

evaluation................................................................30<br />

communities.........................................................102, 168<br />

comparison with firewall filters .................................9<br />

configuring...................................................36, 37, 39, 72<br />

overview ............................................................23, 29<br />

default policies and actions......................................20<br />

evaluation ........................................................................29<br />

export policies.........................................................27, 173<br />

flow, routing information ..............................................4<br />

framework.........................................................................16<br />

import policies...........................................17, 27, 64, 175<br />

match conditions..............................................24, 41, 47<br />

multiple policies<br />

applying.....................................................................57<br />

evaluation................................................................30<br />

overview.......................................................................15, 16<br />

policy expressions .................................................59, 64<br />

preferences, modifying................................................53<br />

prefix list ..................................................................116, 179<br />

prefix list filter........................................................118, 180<br />

purpose................................................................................9<br />

rejecting PIM multicast traffic joins........................127<br />

route lists..................................................................119, 127<br />

source prefixes, group..................................................80<br />

subroutines .....................................................31, 128, 132<br />

terms...........................................................................26, 40<br />

testing.................................................................................33<br />

uses for........................................................................22, 23<br />

policy-options statement...................................................176<br />

usage guidelines.............................................................35<br />

policy-statement statement.............................................177<br />

from statement...............................................................41<br />

then statement...............................................................47<br />

to statement.....................................................................41<br />

usage guidelines............................................................40<br />

port (firewall filter match condition).............................217<br />

Copyright © 2010, <strong>Juniper</strong> <strong>Networks</strong>, Inc.<br />

467

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!