Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United
States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other
trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.
The information in this document is current as of the date on the title page.
YEAR 2000 NOTICE
Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the
year 2038. However, the NTP application is known to have some difficulty in the year 2036.
END USER LICENSE AGREEMENT
The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks
software. Use of such software is subject to the terms and conditions of the End User License Agreement (“EULA”) posted at
http://www.juniper.net/support/eula.html. By downloading, installing or using such software, you agree to the terms and conditions of
To obtain the most current version of all Juniper Networks®technical documentation,
see the product documentation page on the Juniper Networks website at
http://www.juniper.net/techpubs/.
If the information in the latest release notes differs from the information in the
documentation, follow the product Release Notes.
Juniper Networks Books publishes books by Juniper Networks engineers and subject
matter experts. These books go beyond the technical documentation to explore the
nuances of network architecture, deployment, and administration. The current list can
be viewed at http://www.juniper.net/books.
Documentation Conventions
Table 1 on page x defines notice icons used in this guide.
ix
LN1000 Mobile Secure Router
Table 1: Notice Icons
DescriptionMeaningIcon
Indicates important features or instructions.Informational note
Indicates a situation that might result in loss of data or hardware damage.Caution
Alerts you to the risk of personal injury or death.Warning
Alerts you to the risk of personal injury from a laser.Laser warning
Indicates helpful information.Tip
Table 2 on page x defines the text and syntax conventions used in this guide.
Table 2: Text and Syntax Conventions
Represents text that you type.Bold text like this
Fixed-width text like this
Italic text like this
Italic text like this
Represents output that appears on the
terminal screen.
•
Introduces or emphasizes important
new terms.
•
Identifies guide names.
•
Identifies RFC and Internet draft titles.
Represents variables (options for which
you substitute a value) in commands or
configuration statements.
Alerts you to a recommended use or implementation.Best practice
ExamplesDescriptionConvention
To enter configuration mode, type the
configure command:
user@host> configure
user@host> show chassis alarms
No alarms currently active
•
A policy term is a named structure
that defines match conditions and
actions.
•
Junos OS CLI User Guide
•
RFC 1997, BGP Communities Attribute
Configure the machine’s domain name:
[edit]
root@# set system domain-name
domain-name
x
Table 2: Text and Syntax Conventions (continued)
Text like this
Represents names of configuration
statements, commands, files, and
directories;configurationhierarchy levels;
or labels on routing platform
components.
About the Documentation
ExamplesDescriptionConvention
•
To configure a stub area, include the
stub statement at the [edit protocols
ospf area area-id] hierarchy level.
•
The console port is labeled CONSOLE.
stub <default-metric metric>;Encloses optional keywords or variables.< > (angle brackets)
| (pipe symbol)
# (pound sign)
[ ] (square brackets)
Indention and braces ( { } )
; (semicolon)
GUI Conventions
Bold text like this
Indicates a choice between the mutually
exclusivekeywordsor variables on either
side of the symbol. The set of choices is
often enclosed in parentheses for clarity.
same line as the configuration statement
to which it applies.
Encloses a variable for which you can
substitute one or more values.
Identifies a level in the configuration
hierarchy.
Identifies a leaf statement at a
configuration hierarchy level.
Representsgraphicaluser interface(GUI)
items you click or select.
broadcast | multicast
(string1 | string2 | string3)
rsvp { # Required for dynamic MPLS onlyIndicates a comment specified on the
community name members [
community-ids ]
[edit]
routing-options {
static {
route default {
nexthop address;
retain;
}
}
}
•
In the Logical Interfaces box, select
All Interfaces.
•
To cancel the configuration, click
Cancel.
> (bold right angle bracket)
Documentation Feedback
We encourage you to provide feedback, comments, and suggestions so that we can
improve the documentation. You can provide feedback by using either of the following
methods:
•
Online feedback rating system—On any page at the Juniper Networks Technical
Documentation site at http://www.juniper.net/techpubs/index.html, simply click the
stars to ratethe content, and use the pop-up form to provide us with information about
your experience. Alternately, you can use the online feedback form at
https://www.juniper.net/cgi-bin/docbugreport/.
Separates levels in a hierarchy of menu
selections.
In the configuration editor hierarchy,
select Protocols>Ospf.
xi
LN1000 Mobile Secure Router
•
E-mail—Sendyour comments to techpubs-comments@juniper.net.Include the document
or topic name, URL or page number, and software version (if applicable).
Requesting Technical Support
Technical product support is availablethrough the Juniper Networks Technical Assistance
Center (JTAC). If you are a customer with an active J-Care or Partner Support Service
support contract, or are covered under warranty, and need post-sales technical support,
you can access our tools and resources online or open a case with JTAC.
•
JTAC policies—For a complete understanding of our JTAC procedures and policies,
review the JTAC User Guide located at
JTAC hours of operation—The JTAC centers have resources available 24 hours a day,
7 days a week, 365 days a year.
Self-Help Online Tools and Resources
For quick and easy problem resolution, Juniper Networks has designed an online
self-service portal called the Customer Support Center (CSC) that provides you with the
following features:
Find solutions and answer questions using our Knowledge Base: http://kb.juniper.net/
•
Download the latest versions of software and review release notes:
http://www.juniper.net/customers/csc/software/
•
Search technical bulletins for relevant hardware and software notifications:
http://kb.juniper.net/InfoCenter/
•
Join and participate in the Juniper Networks Community Forum:
http://www.juniper.net/company/communities/
•
Open a case online in the CSC Case Management tool: http://www.juniper.net/cm/
To verify service entitlement by product serial number,use our Serial Number Entitlement
(SNE) Tool: https://tools.juniper.net/SerialNumberEntitlementSearch/
Opening a Case with JTAC
You can open a case with JTAC on the Web or by telephone.
•
Use the Case Management tool in the CSC at http://www.juniper.net/cm/.
•
Call 1-888-314-JTAC (1-888-314-5822 toll-free in the USA, Canada, and Mexico).
xii
About the Documentation
For international or direct-dial options in countries without toll-free numbers, see
The LN1000 Mobile Secure Router is an embedded router that operates in both wire-line
and wireless environments with communication nodes that are either mobile or stationary.
The router provides reliable and secure data, voice, and video services. The LN1000
processes WAN and LAN routing functions. The router offers multiple DiffServ classes
and can interleave lower priority real-time data (voice traffic) with higher priority
non-real-time data. It is developed on 3U compact node slot interface (VITA) architecture
as defined in the VITA 46.0 IEEE 1101.2 specifications and runs Junos OS for routing,
forwarding, and security.
The LN1000 Mobile Secure Router can be used effectively in the following environments:
•
Defense communities
•
Public sector safety organizations, such as first responders
Figure 1: LN1000 Mobile Secure Router
3
Chassismidplane
LN1000-VRearTransitionModule
LN1000-VRouter
g017378
LN1000 Mobile Secure Router
You can install the LN1000 router in a standard VITA 46.0-compliant chassis. Optionally,
you can install it in a VITA 46.0–compliant chassis with a midplane and an LN1000 rear
transition module.
Figure 2: LN1000 Mobile Secure Router Installed with an LN1000 Rear
Transition Module
Related
Documentation
LN1000 Mobile Secure Router Models on page 4•
• LN1000 Mobile Secure Router Features on page 5
• Installing the LN1000 Router on page 24
• LN1000 Rear Transition Module Description on page 9
LN1000 Mobile Secure Router Models
The LN1000 routers are available in different models.
Table 3 on page 4 list the various LN1000 router models available and provide a brief
description of each base unit.
Table 3: LN1000 Router Models
DescriptionModel
Vita ECC3 compliant; -58° F to 212° F (-50° C to +100° C)LN1000-V
Vita ECC2 compliant; -40° F to 185° F (-40° C to +85° C)LN1000-CC
Related
Documentation
LN1000 Mobile Secure Router Description on page 3•
4
LN1000 Mobile Secure Router Features
The LN1000 Mobile Secure Router provides the following features:
•
Router Backplane Connector on page 5
•
Ethernet Ports on page 5
•
IPMI Interface on page 5
•
Router Console Port on page 5
•
Tamper-Evident Seals on page 6
Router Backplane Connector
An external interface, located on the back of the LN1000 router, connects the router to
the VITA 46.0–compliant chassis. The router’s P0, P1, and P2 connectors plugging into
the backplane are VITA 46.0–compatible for a 3U peripheral slot with specific key
definitions. The P0 and P2 connectors are keyed per the VITA 46.12 specification. Power
to the LN1000 router is provided through the P0 connector.
Chapter 1: LN1000 Router Overview
Ethernet Ports
IPMI Interface
Router Console Port
The LN1000 router supports up to eight ports of gigabit Ethernet traffic with up to 1024
logical interfaces. The router supports most Layer 2 and Layer 3 protocols, route
redistribution, tunneling, multicast, routine quality of service (QoS), and security.
The eight gigabit Ethernet ports on the LN1000 router are 1000Base-X interfaces with
autonegotiation on by default. The Ethernet ports on the router interface with the chassis
in which it is installed or with the LN1000 rear transition module, if installed in a chassis.
The LN1000 router supports the Intelligent Platform Management Interface (IPMI) in
accordance with the VITA 46.0 specification. The IPMI controller on the LN1000 router
is a secondary controller while the IPMI Shelf Manager operates as the primary controller.
The IPMI Shelf Manager is not supplied by default; it is available as an option.
The router’s RS-232 console port has a baud rate of 9600 8N1 and is located on the left
side of the LN1000 router’s front panel. The console port is used primarily for depot repair.
It is covered by a protective aluminum plate that prevents access to the port. When the
LN1000 router is operational and installed in a chassis, even though you can remove the
protective aluminum plate to access the console port on the router, typically you access
the console port using one of the following methods:
•
On the chassis backplane when the router is installed in VITA 46.0-compliant chassis
•
On the front panel of the rear transition module when the router is installed in a VITA
46.0-compliant chassis with a LN1000 rear transition module
5
g017399
Tamper-evidentseals
LN1000 Mobile Secure Router
Tamper-Evident Seals
Four tamper-evident seals are affixed to the router to show evidence of tampering with
the router’s internal components. Two small silver disks, which have two small holes in
them, are locatedover the top-leftand bottom-right screws that hold the router assembly
together. Two larger, bright silver seals span the processor backer plate and primary side
cover.
WARNING: If any of these seals are removed or peeled off the router, the
router’s internal components can be exposed to electrostatic discharge
(ESD), compromising the integrity of the router, which voids the router’s
warranty.
Figure 3: Tamper-Evident Seals
6
An ESD warning label is located on the back of the router.
Loading...
+ 44 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.