Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United
States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other
trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.
Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are
owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312,
6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785.
READ THIS END USER LICENSE AGREEMENT (“AGREEMENT”) BEFORE DOWNLOADING, INSTALLING, OR USING THE SOFTWARE.
BY DOWNLOADING, INSTALLING, OR USING THE SOFTWARE OR OTHERWISE EXPRESSING YOUR AGREEMENT TO THE TERMS
CONTAINED HEREIN, YOU (AS CUSTOMER OR IF YOU ARE NOT THE CUSTOMER, AS A REPRESENTATIVE/AGENT AUTHORIZED TO
BIND THE CUSTOMER) CONSENT TO BE BOUND BY THIS AGREEMENT. IF YOU DO NOT OR CANNOT AGREE TO THE TERMS CONTAINED
HEREIN, THEN (A) DO NOT DOWNLOAD, INSTALL, OR USE THE SOFTWARE, AND (B) YOU MAY CONTACT JUNIPER NETWORKS
REGARDING LICENSE TERMS.
1. The Parties. The parties to this Agreement are (i) Juniper Networks, Inc. (if the Customer’s principal office is located in the Americas) or
Juniper Networks (Cayman) Limited (if the Customer’s principal office is located outside the Americas)(such applicable entity being referred
to herein as “Juniper”), and (ii) the person or organization that originally purchased from Juniper or an authorized Juniper reseller the applicable
license(s) for use of the Software (“Customer”) (collectively, the “Parties”).
2. The Software. In this Agreement, “Software” means the program modules and features of the Juniper or Juniper-supplied software, for
which Customer has paid the applicable license or support fees to Juniper or an authorized Juniper reseller, or which was embedded by
Juniper in equipment which Customer purchased from Juniper or an authorized Juniper reseller. “Software” also includes updates, upgrades
and new releases of such software. “Embedded Software” means Software which Juniper has embedded in or loaded onto the Juniper
equipment and any updates, upgrades, additions or replacements which are subsequently embedded in or loaded onto the equipment.
3. License Grant. Subject to payment of the applicable fees and the limitations and restrictions set forth herein, Juniper grants to Customer
a non-exclusive and non-transferable license, without right to sublicense, to use the Software, in executable form only, subject to the
following use restrictions:
a. Customer shall use Embedded Software solely as embedded in, and for execution on, Juniper equipment originally purchased by
Customer from Juniper or an authorized Juniper reseller.
b. Customer shall use the Software on a single hardware chassis having a single processing unit, or as many chassis or processing units
for which Customer has paid the applicable license fees; provided, however, with respect to the Steel-Belted Radius or Odyssey Access
Client software only, Customer shall use such Software on a single computer containing a single physical random access memory space
and containing any number of processors. Use of the Steel-Belted Radius or IMS AAA software on multiple computers or virtual machines
(e.g., Solaris zones) requires multiple licenses, regardless of whether such computers or virtualizations are physically contained on a single
chassis.
c. Product purchase documents, paper or electronic user documentation, and/or the particular licenses purchased by Customer may
specify limits to Customer’s use of the Software. Such limits may restrict use to a maximum number of seats, registered endpoints, concurrent
users, sessions, calls, connections, subscribers, clusters, nodes, realms, devices, links, ports or transactions, or require the purchase of
separate licenses to use particular features, functionalities, services, applications, operations, or capabilities, or provide throughput,
performance, configuration, bandwidth, interface, processing, temporal, or geographical limits. In addition, such limits may restrict the use
of the Software to managing certain kinds of networks or require the Software to be used only in conjunction with other specific Software.
Customer’s use of the Software shall be subject to all such limitations and purchase of all applicable licenses.
d. For any trial copy of the Software, Customer’s right to use the Software expires 30 days after download, installation or use of the
Software. Customer may operate the Software after the 30-day trial period only if Customer pays for a license to do so. Customer may not
extend or create an additional trial period by re-installing the Software after the 30-day trial period.
e. The Global Enterprise Edition of the Steel-Belted Radius software may be used by Customer only to manage access to Customer’s
enterprise network. Specifically, service provider customers are expressly prohibited from using the Global Enterprise Edition of the
Steel-Belted Radius software to support any commercial network access services.
The foregoing license is not transferable or assignable by Customer. No license is granted herein to any user who did not originally purchase
the applicable license(s) for the Software from Juniper or an authorized Juniper reseller.
4. Use Prohibitions. Notwithstanding the foregoing, the license provided herein does not permit the Customer to, and Customer agrees
not to and shall not: (a) modify, unbundle, reverse engineer, or create derivative works based on the Software; (b) make unauthorized
copies of the Software (except as necessary for backup purposes); (c) rent, sell, transfer, or grant any rights in and to any copy of the
Software,in any form, to any third party; (d) remove any proprietary notices, labels, or marks on or in any copy of the Software or any product
in which the Software is embedded; (e) distribute any copy of the Software to any third party, including as may be embedded in Juniper
equipment sold in the secondhand market; (f) use any ‘locked’ or key-restrictedfeature, function, service, application, operation, or capability
without first purchasing the applicable license(s) and obtaining a valid key from Juniper, even if such feature, function, service, application,
operation, or capability is enabled without a key; (g) distribute any key for the Software provided by Juniper to any third party; (h) use the
Software in any manner that extends or is broader than the uses purchased by Customer from Juniper or an authorized Juniper reseller; (i)
use Embedded Software on non-Juniper equipment; (j) use Embedded Software (or make it available for use) on Juniper equipment that
the Customer did not originally purchase from Juniper or an authorized Juniper reseller; (k) disclose the results of testing or benchmarking
of the Software to any third party without the prior written consent of Juniper; or (l) use the Software in any manner other than as expressly
provided herein.
5. Audit. Customer shall maintain accurate records as necessary to verify compliance with this Agreement. Upon request by Juniper,
Customer shall furnish such records to Juniper and certify its compliance with this Agreement.
6. Confidentiality. The Parties agree that aspects of the Software and associated documentation are the confidential property of Juniper.
As such, Customer shall exercise all reasonable commercial efforts to maintain the Software and associated documentation in confidence,
which at a minimum includes restricting access to the Software to Customer employees and contractors having a need to use the Software
for Customer’s internal business purposes.
7. Ownership. Juniper and Juniper’s licensors, respectively, retain ownership of all right, title, and interest (including copyright) in and to
the Software, associated documentation, and all copies of the Software. Nothing in this Agreement constitutes a transfer or conveyance
of any right, title, or interest in the Software or associated documentation, or a sale of the Software, associated documentation, or copies
of the Software.
8. Warranty, Limitation of Liability, Disclaimer of Warranty. The warranty applicable to the Software shall be as set forth in the warranty
statementthat accompanies the Software (the “WarrantyStatement”).Nothing in this Agreement shall give rise to any obligation to support
the Software. Support services may be purchased separately. Any such support shall be governed by a separate, written support services
agreement. TO THE MAXIMUM EXTENT PERMITTED BY LAW, JUNIPER SHALL NOT BE LIABLE FOR ANY LOST PROFITS, LOSS OF DATA,
OR COSTSOR PROCUREMENTOF SUBSTITUTE GOODS OR SERVICES, OR FOR ANY SPECIAL, INDIRECT,OR CONSEQUENTIAL DAMAGES
ARISING OUT OF THIS AGREEMENT, THE SOFTWARE, OR ANY JUNIPER OR JUNIPER-SUPPLIED SOFTWARE. IN NO EVENT SHALL JUNIPER
BE LIABLE FOR DAMAGES ARISING FROM UNAUTHORIZED OR IMPROPER USE OF ANY JUNIPER OR JUNIPER-SUPPLIED SOFTWARE.
EXCEPT AS EXPRESSLY PROVIDED IN THE WARRANTY STATEMENT TO THE EXTENT PERMITTED BY LAW, JUNIPER DISCLAIMS ANY
AND ALL WARRANTIES IN AND TO THE SOFTWARE (WHETHER EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE), INCLUDING ANY
IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT DOES
JUNIPER WARRANT THAT THE SOFTWARE, OR ANY EQUIPMENT OR NETWORK RUNNING THE SOFTWARE, WILL OPERATE WITHOUT
ERROR OR INTERRUPTION, OR WILL BE FREE OF VULNERABILITY TO INTRUSION OR ATTACK. In no event shall Juniper’s or its suppliers’
or licensors’ liability to Customer, whether in contract, tort (including negligence), breach of warranty, or otherwise, exceed the price paid
by Customer for the Software that gave rise to the claim, or if the Software is embedded in another Juniper product, the price paid by
Customer for such other product. Customer acknowledges and agrees that Juniper has set its prices and entered into this Agreement in
reliance upon the disclaimers of warranty and the limitations of liability set forth herein, that the same reflect an allocation of risk between
the Parties (including the risk that a contract remedy may fail of its essential purpose and cause consequential loss), and that the same
form an essential basis of the bargain between the Parties.
9. Termination. Any breach of this Agreement or failure by Customer to pay any applicable fees due shall result in automatic termination
of the license granted herein. Upon such termination, Customer shall destroy or return to Juniper all copies of the Software and related
documentation in Customer’s possession or control.
10. Taxes. All license fees payable under this agreement are exclusive of tax. Customer shall be responsible for paying Taxes arising from
the purchase of the license, or importation or use of the Software. If applicable, valid exemption documentation for each taxing jurisdiction
shall be provided to Juniper prior to invoicing, and Customer shall promptly notify Juniper if their exemption is revoked or modified. All
payments made by Customer shall be net of any applicable withholding tax. Customer will provide reasonable assistance to Juniper in
connection with such withholding taxes by promptly: providing Juniper with valid tax receipts and other required documentation showing
Customer’s payment of any withholding taxes; completing appropriate applications that would reduce the amount of withholding tax to
be paid; and notifying and assisting Juniper in any audit or tax proceeding related to transactions hereunder. Customer shall comply with
all applicable tax laws and regulations, and Customer will promptly pay or reimburse Juniper for all costs and damages related to any
liability incurred by Juniper as a result of Customer’s non-compliance or delay with its responsibilities herein. Customer’s obligations under
this Section shall survive termination or expiration of this Agreement.
11. Export. Customer agrees to comply with all applicable export laws and restrictions and regulations of any United States and any
applicable foreign agency or authority, and not to export or re-export the Software or any direct product thereof in violation of any such
restrictions, laws or regulations, or without all necessary approvals. Customer shall be liable for any such violations. The version of the
Software supplied to Customer may contain encryption or other capabilities restricting Customer’s ability to export the Software without
an export license.
12. Commercial Computer Software. The Software is “commercial computer software” and is provided with restricted rights. Use,
duplication, or disclosure by the United States government is subject to restrictions set forth in this Agreement and as provided in DFARS
227.7201 through 227.7202-4, FAR 12.212, FAR 27.405(b)(2), FAR 52.227-19, or FAR 52.227-14(ALT III) as applicable.
13. Interface Information. To the extent required by applicable law, and at Customer's written request, Juniper shall provide Customer
with the interface information needed to achieve interoperability between the Software and another independently created program, on
payment of applicable fee, if any. Customer shall observe strict obligations of confidentiality with respect to such information and shall use
such information in compliance with any applicable terms and conditions upon which Juniper makes such information available.
14. Third Party Software. Any licensor of Juniper whose software is embedded in the Software and any supplier of Juniper whose products
or technology are embedded in (or services are accessed by) the Software shall be a third party beneficiary with respect to this Agreement,
and such licensor or vendor shall have the right to enforce this Agreement in its own name as if it were Juniper. In addition, certain third party
software may be provided with the Software and is subject to the accompanying license(s), if any, of its respective owner(s). To the extent
portions of the Software are distributed under and subject to open source licenses obligating Juniper to make the source code for such
portions publicly available (such as the GNU General Public License (“GPL”) or the GNU Library General Public License (“LGPL”)), Juniper
will make such source code portions (including Juniper modifications, as appropriate) available upon request for a period of up to three
years from the date of distribution. Such request can be made in writing to Juniper Networks, Inc., 1194 N. Mathilda Ave., Sunnyvale, CA
94089, ATTN: General Counsel. You may obtain a copy of the GPL at http://www.gnu.org/licenses/gpl.html, and a copy of the LGPL
at http://www.gnu.org/licenses/lgpl.html .
15. Miscellaneous. This Agreement shall be governed by the laws of the State of California without reference to its conflicts of laws
principles. The provisions of the U.N. Convention for the International Sale of Goods shall not apply to this Agreement. For any disputes
arising under this Agreement, the Parties hereby consent to the personal and exclusive jurisdiction of, and venue in, the state and federal
courts within Santa Clara County, California. This Agreement constitutes the entire and sole agreement between Juniper and the Customer
with respect to the Software, and supersedes all prior and contemporaneous agreements relating to the Software, whether oral or written
(including any inconsistent terms contained in a purchase order), except that the terms of a separate written agreement executed by an
authorized Juniper representative and Customer shall govern to the extent such terms are inconsistent or conflict with terms contained
herein. No modification to this Agreement nor any waiver of any rights hereunder shall be effective unless expressly assented to in writing
by the party to be charged. If any portion of this Agreement is held invalid, the Parties agree that such invalidity shall not affect the validity
of the remainder of this Agreement. This Agreement and associated documentation has been written in the English language, and the
Parties agree that the English version will govern. (For Canada: Les parties aux présentés confirment leur volonté que cette convention de
même que tous les documents y compris tout avis qui s'y rattaché, soient redigés en langue anglaise. (Translation: The parties confirm that
this Agreement and all related documentation is and will be in the English language)).
Juniper Networks Network and Security Manager (NSM) is a software application that
centralizescontrol and management of your Juniper Networks devices. With NSM, Juniper
Networks delivers integrated, policy-based security and network management for all
devices.
NSM uses the technology developed for Juniper Networks ScreenOS to enable and
simplify management support for previous and future versions of ScreenOS. By integrating
management of all Juniper Networks security devices, NSM enhances the overall security
of the Internet gateway.
This guide explains how to configure EX-series devices. Use this guide in conjunction with
the NSM Online Help, which provides step-by-step instructions for many of the processes
described in this document.
Audience
This guide is intended for systemadministratorsresponsible for the security infrastructure
of their organization. Specifically, this book discusses concepts of interest to firewall and
VPN administrators, network/security operations center administrators; and system
administrators responsible for user permissions on the network.
Conventions
The sample screens used throughout this guide are representations of the screens that
appear when you install and configure the NSM software. The actual screens may differ.
NOTE: If the information in the latest NSM Release Notes differs from the
information in this guide, follow the NSM Release Notes.
Table 3 on page xiii defines syntax conventions used in this guide.
Table 3: Syntax Conventions
About This Guide
ExamplesDescriptionConvention
terminal lengthRepresent keywordsWords in plain text
mask, accessListNameRepresent variablesWords in italics
Words separated by the pipe ( | )
symbol
Words enclosed in brackets followed
by and asterisk ( [ ]*)
Documentation
Table 4 on page xiii describes documentation for the NSM.
Table 4: Network and Security Manager Publications
Network and Security
Manager Installation Guide
variable to the left or right of this symbol. The
keywordor variable can be optional or required.
can be entered more than once.
Represent required keywords or variables.Words enclosed in braces ( { } )
DescriptionBook
Describes the steps to install the NSM management system on a
single server or on separate servers. It also includes information on
how to install and run the NSM user interface. This guide is intended
for IT administrators responsible for the installation or upgrade of
NSM.
diagnostic | lineRepresent a choice to select one keyword or
[ internal | external ]Represent optional keywords or variables.Words enclosed in brackets ( [ ] )
[ level1 | level2 | 11 ]*Represent optional keywords or variables that
{ permit | deny } { in | out } { clusterId
| ipAddress }
Network and Security
Manager Administration
Guide
Network and Security
Manager Configuring
ScreenOS and IDP Devices
Guide
Describes how to use and configure key management features in
the NSM. It provides conceptual information, suggested workflows,
and examples. This guide is best used in conjunction with the NSM
Online Help, which provides step-by-stepinstructions for performing
management tasks in the NSM UI.
This guide is intended for application administrators or those
individuals responsible for owning the server and security
infrastructure and configuring the product for multi-user systems.
It is also intended for device configuration administrators, firewall
and VPN administrators, and network security operation center
administrators.
Provides details about configuring the device features for all
supported ScreenOS and IDP platforms.
Table 4: Network and Security Manager Publications (continued)
DescriptionBook
Network and Security
Manager Online Help
Network and Security
Manager API Guide
Network and Security
Manager Release Notes
Configuring Infranet
Controllers Guide
Configuring Secure Access
Devices Guide
Configuring EX-series
Switches Guide
Configuring J-series Services
Routers and SRX-series
Services Gateways Guide
Provides procedures for basic tasks in the NSM user interface. It
also includes a brief overview of the NSM system and a description
of the GUI elements.
Provides complete syntax and description of the SOAP messaging
interface to NSM.
Provides the latest information about features, changes, known
problems, resolved problems, and system maximum values. If the
information in the Release Notes differs from the information found
in the documentation set, follow the Release Notes.
Release notes are included on the corresponding software CD and
are available on the Juniper Networks Website.
Provides details about configuring the device features for all
supported Infranet Controllers.
Provides details about configuring the device features for all
supported Secure Access Devices.
Provides details about configuring the device features for all
supported EX-series platforms .
Provides details about configuring the device features for all
supported J-series Services Routers and SRX-series Services
Gateways.
M-series and MX-series
Devices Guide
Requesting Technical Support
Technical product support is availablethrough the Juniper Networks Technical Assistance
Center (JTAC). If you are a customer with an active J-Care or JNASC support contract,
or are covered under warranty, and need postsales technical support, you can access
our tools and resources online or open a case with JTAC.
•
JTAC policies—For a complete understanding of our JTAC procedures and policies,
review the JTAC User Guide located at
For quick and easy problem resolution, Juniper Networks has designed an online
self-service portal called the Customer Support Center (CSC) that provides you with the
following features:
Find solutions and answer questions using our Knowledge Base: http://kb.juniper.net/
•
Download the latest versions of software and review release notes:
http://www.juniper.net/customers/csc/software/
•
Search technical bulletins for relevant hardware and software notifications:
https://www.juniper.net/alerts/
•
Join and participate in the Juniper Networks Community Forum:
http://www.juniper.net/company/communities/
•
Open a case online in the CSC Case Management tool: http://www.juniper.net/cm/
About This Guide
To verify service entitlement by product serial number, use our Serial Number Entitlement
(SNE) Tool: https://tools.juniper.net/SerialNumberEntitlementSearch/
Opening a Case with JTAC
You can open a case with JTAC on the Web or by telephone.
•
Use the Case Management tool in the CSC at http://www.juniper.net/cm/ .
•
Call 1-888-314-JTAC (1-888-314-5822 toll-free in the USA, Canada, and Mexico).
For international or direct-dial options in countries without toll-free numbers, visit us at
The chapters in Part 1 of the Release 2009.1 version of the NSM Configuration Guide for
EX Series Devices provide an overview of the management system and describe how to
configure features for EX Series devices.
NOTE: Because the NSM device-side configuration guides are not updated
on the same release schedule as the JUNOS releases, consult the JUNOS
Software Documentation for information about configuration settings that
might occur in NSM and not in the device-side configuration guides or vice
versa.
Part 1 contains the following chapters:
•
Configuring User Access and Authentication on page 3
Configuring RADIUS Authentication (NSM Procedure) on page 3
•
Configuring TACACS+ Authentication (NSM Procedure) on page 4
•
Configuring Authentication Order (NSM Procedure) on page 5
•
Configuring User Access (NSM Procedure) on page 6
•
Configuring Template Accounts (NSM Procedure) on page 7
Configuring RADIUS Authentication (NSM Procedure)
To use RADIUS authentication, you must configure at least one RADIUS server. Configuring
RADIUS authentication involves identifying the RADIUS server, specifying the secret
(password)of the RADIUS server, and setting the source address of the device's RADIUS
requests to the loopback address of the device.
To configure RADIUS authentication:
1. In the NSM navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab, and then double-click the device for which you want to
configure RADIUS authentication.
3. Click the Configuration tab. In the configuration tree, select System > Radius Server.
4. Add or modify Radius settings as specified in Table 5 on page 4.
Specifies the IP address of the RADIUS server.Name
Specifies the shared secret (password) of the
RADIUS server. The secret is stored as an
encrypted value in the configuration database.
Specifies the source address to be included in
the RADIUS server requests by the device. In
most cases, you can use the loopback address
of the device.
Related
Documentation
Secret
Source
Address
Configuring TACACS+ Authentication (NSM Procedure) on page 4•
• Configuring Authentication Order (NSM Procedure) on page 5
• Configuring User Access (NSM Procedure) on page 6
To use TACACS+ authentication, you must configure at least one TACACS+ server.
Configuring TACACS+ authentication involvesidentifying the TACACS+server, specifying
the secret (password) of the TACACS+ server, and setting the source address of the
device's TACACS+ requests to the loopback address of the device.
Enter the IP address of the
RADIUS server.
Enter the shared secret of the
RADIUS server.
Enter the loopback addressof
the device.
To configure TACACS+ authentication:
1. In the NSM navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab and then double-click the device for which you want to
configure TACACS+ authentication.
3. Click the Configuration tab. In the configuration tree, select System > TACACS+
Server.
4. Add or modify TACACS+ settings as specified in Table 6 on page 4.
Specifies the shared secret (password) of the
TACACS+ server. The secret is stored as an
encrypted value in the configuration database.
Specifies the source address to be included in
the TACACS+ server requests by the device. In
most cases, you can use the loopback address
of the device.
Related
Documentation
Secret
Source
Address
Configuring RADIUS Authentication (NSM Procedure) on page 3•
• Configuring Authentication Order (NSM Procedure) on page 5
• Configuring User Access (NSM Procedure) on page 6
Configuring Authentication Order (NSM Procedure)
You can configure the device so that user authentication occurs with the local password
first, then with the RADIUS server, and finally with the TACACS+ server.
To configure authentication order:
1. In the NSM navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab and then double-click the device for which you want to
configure authentication order.
Enter the shared secret of the
TACACS+ server.
Enter the loopback address of
the device.
Related
Documentation
3. Click the Configuration tab. In the configurationtree, select System > Authentication
Order.
4. In the Authentication Order workspace, click the New button. The New
authentication-order list appears.
5. To add RADIUS authentication to the authentication order, select radius from the
New authentication-order list.
6. To add TACACS+ authentication to the authentication order, select tacplus from the
New authentication-order list.
7. To add Password authentication to the authentication order, select password from
the New authentication-order list.
•
OK—Saves the changes.
•
Cancel—Cancels the modifications.
Configuring RADIUS Authentication (NSM Procedure) on page 3•
• Configuring TACACS+ Authentication (NSM Procedure) on page 4
• Configuring User Access (NSM Procedure) on page 6
You can define any number of login classesand then apply one login class to an individual
user account. All users who can log in to the router must be in a login class. With login
classes, you define the following:
•
Access privileges users have when they are logged in to the router
•
Commands and statements that users can and cannot specify
•
How long a login session can be idle before it times out and the user is logged out
To configure login classes:
1. In the NSM navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab and then double-click the device for which you want to
configure a login class.
3. Click the Configuration tab. In the configuration tree, select System > Login > Class.
4. Add or modify login class settings as specified in Table 7 on page 6.
5. Click one:
•
New—Adds a new login class.
•
OK—Saves the changes.
•
Cancel—Cancels the modifications.
Table 7: Login Class Authentication Configuration Details
Your ActionFunctionOption
Enter a name for the login class.Specifies a name for the login class.Name
Allow Commands
Specifies the operational mode
commands that members of a login
class can use.
Login > Class > Permissions
Permissions
to be provided on the device.
Enter the command name enclosed
in quotation marks. For example,
“request system reboot”.
Enter a new permission.Configures the login access privileges
User accounts provide one way for users to access the device. (Users can access the
router without accounts if you configured RADIUS or TACACS+servers.) For each account,
define the login name for the user and, optionally, information that identifies the user.
After you have created an account, a home directory is created for the user.
To configure user accounts:
1. In the NSM navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab and then double-click the device for which you want to
configure login class.
3. Click the Configuration tab. In the configuration tree, select System > Login > User.
4. Add or modify login class settings as specified in Table 8 on page 7.
5. Click one:
•
Chapter 1: Configuring User Access and Authentication
New—Adds a new user account.
•
OK—Saves the changes.
•
Cancel—Cancels the modifications.
Table 8: User Authentication Configuration Details
Name
name.
Login > User > Authentication
Specifies the user’s password.Plain Text Password
Value
Related
Documentation
Configuring RADIUS Authentication (NSM Procedure) on page 3•
• Configuring TACACS+ Authentication (NSM Procedure) on page 4
• Configuring Authentication Order (NSM Procedure) on page 5
Configuring Template Accounts (NSM Procedure)
Your ActionFunctionOption
Enter a unique name for the user.Identifies the user with a unique
Select the class name.Specifies the user's login class.Class
Enter the plain text password for
the user.
You can create template accounts that are shared by a set of users when you are using
RADIUS or TACACS+ authentication. When a user is authenticatedby a template account,
the CLI username is the login name, and the privileges, file ownership, and effective user
ID are inherited from the template account.
To configure template accounts, follow these procedures:
•
Creating a Remote Template Account on page 8
•
Creating a Local Template Account on page 9
Creating a Remote Template Account
You can create a remote template that is applied to users authenticated by RADIUS or
TACACS+ that do not belong to a local template account.
By default, JUNOS software with enhanced services uses the remote template account
when:
•
The authenticated user does not exist locally on the Services Router.
•
The authenticated user's record in the RADIUS or TACACS+ server specifies local user,
or the specified local user does not exist locally on the device.
The following procedure creates a sample user named remote that belongs to the operator
login class.
To create a remote template account:
1. In the NSM navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab and then double-click the device for which you want to
create a remote template account.
3. Click the Configuration tab. In the configuration tree, select System > Login > User.
4. Add or modify login class settings as specified in Table 9 on page 8.
5. Click one:
•
New—Creates a new remote template account.
•
OK—Saves the changes.
•
Cancel—Cancels the modifications.
Table 9: Remote Template Account Details
Your ActionFunctionOption
Enter the user name. For example, type
remote.
Enter the number associated with the
login account.
Selectthe login class. For example, select
operator.
Uid
Specifies a name for the user name.Name
Specifies the user identifier for a
login account.
You can create a local template that is applied to users authenticated by RADIUS or
TACACS+ that are assigned to the local template account. You use local template
accounts when you need different types of templates. Each template can define a
different set of permissions appropriate for the group of users who use that template.
The following procedure creates a sample user named admin that belongs to the
superuser login class.
To create a local template account:
1. In the NSM navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab and then double-click the device for which you want to
create a local template account.
3. Click the Configuration tab. In the configuration tree, select System > Login > User.
4. Add or modify login class settings as specified in Table 10 on page 9.
Chapter 1: Configuring User Access and Authentication
Related
Documentation
5. Click one:
•
New—Creates a new local template account.
•
OK—Saves the changes.
•
Cancel—Cancels the modifications.
Table 10: Local Template Account Details
Your ActionFunctionOption
Specifies a name for the user name.Name
Uid
• Configuring RADIUS Authentication (NSM Procedure) on page 3
• Configuring TACACS+ Authentication (NSM Procedure) on page 4
• Configuring Authentication Order (NSM Procedure) on page 5
Specifies the user identifier for a
login account.
Specifies the login class for the user.Class
Enter the user name. For example, type
admin.
Enter the number associated with the
login account.
Selectthe login class. For example, select
superuser.
Configuring Aggregated Devices (NSM Procedure) on page 11
•
Configuring Chassis Alarms (NSM Procedure) on page 12
•
Configuring Routing Engine Redundancy (NSM Procedure) on page 13
Configuring Aggregated Devices (NSM Procedure)
The JUNOS Software supports the aggregation of physical devices into the defined virtual
links, such as the link aggregation of Ethernet interfaces defined by the IEEE 802.3ad
standard. You can configure the properties for Ethernet and sonet aggregated devices
on the router.
To configure the aggregated devices on the router:
1. In the NSM navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab, and then double-click the device to select it.
3. Click the Configuration tab. In the configuration tree, expand Chassis > Aggregated
Devices.
4. Add or modify the settings as specified in Table 11 on page 12.
Configure properties for
Ethernet aggregated
devices.
Configure properties for
sonet aggregated devices.
1. Click Ethernet next to Aggregated Devices.
2. Enter the number of aggregated logical devices available to
the router.
Range: 1 through 256 devices
3. Click Lacp next to Ethernet.
4. In the System Priority box, enter the priority for the aggregated
Ethernet system.
5. Click Link Protection next to Lacp.
6. Select the Non Revertive check box if you want to disable the
ability to switch to a better priority link (if one is available) once
a link is established as active and a collection or distribution is
enabled.
1. Click Sonet next to Aggregated Devices.
2. From the Device Count list, select the number of aggregated
logical devices available to the router.
Range: 1 through 16 Devices
Configuring Chassis Alarms (NSM Procedure) on page 12•
• Configuring a T640 Router on a Routing Matrix (NSM Procedure)
• Configuring Routing Engine Redundancy (NSM Procedure) on page 13
• Configuring a Routing Engine to Reboot or Halt on Hard Disk Errors (NSM Procedure)
Configuring Chassis Alarms (NSM Procedure)
You can configure the chassis alarms for an interface type to trigger a red or yellow alarm
or to ignore an alarm. Various conditions relatedto the chassis components trigger yellow
and red alarms.
To configure chassis alarm on the router:
1. In the NSM navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab, and then double-click the device to select it.
3. Click the Configuration tab. In the configuration tree, expand Chassis > Alarm.
4. Add or modify the alarm settings as specified in Table 12 on page 13.
You can configure redundancy properties for routers that have multiple Routing Engines
or these multiple switching control boards: Switching and Forwarding Modules (SFMs),
System and Switch Boards (SSBs), Forwarding Engine Boards (FEBs), or Compact
Forwarding Engine Boards (CFEBs).
To configure routing engine redundancy in NSM:
1. In the NSM navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab, and then double-click the device to select it.
3. Click the Configuration tab. In the configuration tree, select Chassis > Redundancy.
4. Add or modify settings as specified in Table 13 on page 13.
For routing platforms with
two Routing Engines,
configure a master Routing
1. Click Graceful Switchover next to Redundancy.
2. In the Comment box, enter the comment.
Engine to switch over
gracefully to a backup
Routing Engine without
interruption to packet
forwarding.
Sets the function of the
Routing Engine for the
specified slot. By default, the
Routing Engine in slot 0 is the
master Routing Engine and
the Routing Engine in slot 1 is
the backup Routing Engine.
• Configuring Aggregated Devices (NSM Procedure) on page 11
• Configuring a T640 Router on a Routing Matrix (NSM Procedure)
• Configuring a Routing Engine to Reboot or Halt on Hard Disk Errors (NSM Procedure)
1. Click Routing Engine next to Redundancy.
2. From the Name list, select the slot number.
3. In the Comment box, enter the comment.
4. Select the function of the Routing Engine for the specified slot.
5. Select one of the following:
•
master—To configure the routing engine to be the master.
•
backup—To configure the routing engine to be the backup.
Configuring CoS Classifiers (NSM Procedure) on page 15
•
Configuring CoS Code Point Aliases (NSM Procedure) on page 17
•
Configuring CoS Drop Profile (NSM Procedure) on page 19
•
Configuring CoS Forwarding Classes (NSM Procedure) on page 21
•
Configuring CoS Interfaces (NSM Procedure) on page 22
•
Configuring CoS Rewrite Rules (NSM Procedure) on page 28
•
Configuring CoS Schedulers (NSM Procedure) on page 31
•
Configuring CoS and Applying Scheduler Maps (NSM Procedure) on page 32
Configuring CoS Classifiers (NSM Procedure)
Packet classification associates incoming packets with a particular class-of-service
(Cos) servicing level. Classifiers associatepackets with a forwarding class and loss priority
and, based on the associated forwarding class, assign packets to output queues. JUNOS
software supports two general types of classifiers:
•
Behavior aggregate or CoS value traffic classifiers—Examines the CoS value in the
packet header. The value in this single field determines the CoS settings applied to the
packet. BA classifiers allow you to set the forwarding class and loss priority of a packet
based on the Differentiated Services code point (DSCP) value, IP precedence value,
and IEEE 802.1p value. The default classifier is based on the DSCP value.
•
Multifield traffic classifiers—Examines multiple fields in the packet such as source and
destination addresses and source and destination port numbers of the packet. With
multifield classifiers, you set the forwarding class and loss priority of a packet based
on firewall filter rules.
To configure and apply behavior aggregate classifiers for the switch:
1. In the navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab, and then double-click the device for which you want to
configure and apply behavior aggregate classifiers.
3. Click the Configuration tab. In the configuration tree expand Class of Service.
5. Add or modify settings as specified in Table 14 on page 16.
6. Click one:
•
OK—Saves the changes.
•
Cancel—Cancels the modifications.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the Networkand Security Manager Administration Guide for more information.
Table 14: Configuring and Applying Behavior Aggregate Classifiers
ActionTask
Configure behavior aggregate
classifiers for DiffServ CoS.
Configure a best-effort
forwarding class classifier.
Configure an expedited
forwarding class classifier.
1. Click Add new entry next to Dscp.
2. In the Name box, type the name of the behavior aggregate classifier—for example,
ba-classifier.
3. In the Import box, type the name of the default DSCP map.
1. Click Add new entry next to Forwarding class.
2. In the Class name box, type the name of the previously configured best-effort forwarding
class—for example, be-class.
3. Click Add new entry next to Loss priority.
4. From the Loss val list, select high.
5. Click Add new entry next to Code points.
6. In the Value box, type the value of the high-priority code point for best-effort traffic—for
example, 00001.
7. Click OK three times.
1. Click Add new entry next to Forwarding class.
2. In the Class name box, type the name of the previously configured expedited
forwarding—for example, class-ef-class.
3. Click Add new entry next to Loss priority.
4. From the Loss val list, select high.
5. Click Add new entry next to Code points.
6. In the Value box, type the value of the high-priority code point for expedited forwarding
Table 14: Configuring and Applying Behavior Aggregate Classifiers (continued)
ActionTask
Configurean assuredforwarding
class classifier.
Apply the behavior aggregate
classifier to an interface.
Related
Documentation
• Configuring CoS Drop Profile (NSM Procedure) on page 19
1. Click Add new entry next to Forwarding class.
2. In the Class name box, type the name of the previously configured assured forwarding—for
example, class-af-class.
3. Click Add new entry next to Loss priority.
4. From the Loss val list, select high.
5. Click Add new entry next to Code points.
6. In the Value box, type the value of the high-priority code point for assured forwarding
traffic—for example, 001100.
7. Click OK three times.
1. Click Add new entry next to Interfaces.
2. In the Interface name box, type the name of the interface—for example, ge-0/0/0.
3. Click Add new entry next to Unit.
4. In the Unit number box, type the logical interface unit number—for example, 0.
5. Click Configure next to Classifiers.
6. In the Classifiers box, under Dscp, type the name of the previously configured behavior
aggregate classifier—for example, ba-classifier.
7. Click OK.
Configuring CoS Code Point Aliases (NSM Procedure) on page 17•
• Configuring CoS Forwarding Classes (NSM Procedure) on page 21
• Configuring CoS Interfaces (NSM Procedure) on page 22
• Configuring CoS Rewrite Rules (NSM Procedure) on page 28
• Configuring CoS Schedulers (NSM Procedure) on page 31
• Configuring CoS and Applying Scheduler Maps (NSM Procedure) on page 32
Configuring CoS Code Point Aliases (NSM Procedure)
You can use code-point aliases to streamline the process of configuring CoS features on
your device. A code-point alias assigns a name to a pattern of code-point bits. You can
use this name instead of the bit pattern when you configure other CoS components such
as classifiers, drop-profile maps, and rewrite rules.
1. In the navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab, and then double-click the device for which you want to
configure CoS code point aliases.
3. Click the Configuration tab. In the configuration tree, expand Class of Service.
4. Select Code Point Aliases.
5. Add or modify the settings as specified in Table 15 on page 18
6. Click one:
•
OK—Saves the changes.
•
Cancel—Cancels the modifications.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the Networkand Security Manager Administration Guide for more information.
Table 15: Configuring Code Point Aliases
ActionTask
Assign an alias to the dscp code
point.
Related
Documentation
• Configuring CoS Drop Profile (NSM Procedure) on page 19
• Configuring CoS Forwarding Classes (NSM Procedure) on page 21
• Configuring CoS Interfaces (NSM Procedure) on page 22
• Configuring CoS Rewrite Rules (NSM Procedure) on page 28
• Configuring CoS Schedulers (NSM Procedure) on page 31
• Configuring CoS and Applying Scheduler Maps (NSM Procedure) on page 32
1. In the Configuration tree, expand Code Point Aliases.
2. Select Dscp.
3. Click the Add New icon.
4. In the Name box, type the alias that you want to assign to the code point—for example,
my1.
5. In the Bits box, type the code point—for example, 110001.
6. Click OK.
Configuring CoS Classifiers (NSM Procedure) on page 15•
Drop profiles provide a congestion management mechanism that enables a switch or
routing platform to drop the arriving packets when queue buffers become full or begin
to overflow. Drop profiles define the meanings of loss priorities. When you configure drop
profiles you are essentially setting the value for queue fullness. The queue fullness
represents the percentage of the memory used to store packets in relation to the total
amount of memory that has been allocated for that specific queue. The queue fullness
defines the delay-buffer bandwidth, which provides packet buffer space to absorb burst
traffic up to the specified duration of delay. Once the specified delay buffer becomes
full, packets with 100 percent drop probability are dropped from the tail of the buffer.
You specify drop probabilities in the drop profile section of the CoS configurationhierarchy
and reference them in each scheduler configuration. By default, if you do not configure
any drop profile then the drop profile that is in effect functions as the primary mechanism
for managing congestion. In the default tail drop profile, when the fill level is 0 percent,
the drop probability is 0 percent. When the fill level is 100 percent, the drop probability
is 100 percent.
Chapter 3: Configuring Class of Service
To configure drop profiles in NSM:
1. In the navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab, and then double-click the device for which you want to
configure drop profiles.
3. Click the Configuration tab. In the configuration tree expand Class of Service.
4. Select Drop Profiles.
5. Add or modify the drop profiles as specified in Table 16 on page 19.
6. Click one:
•
OK—Saves the changes.
•
Cancel—Cancels the modifications.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Configuring CoS Forwarding Classes (NSM Procedure)
Forwarding classes allow you to group packets for transmission. Based on forwarding
classes, you assign packets to output queues.
By default, four categories of forwarding classes are defined: best effort, assured
forwarding, expedited forwarding, and network control.
NOTE: EX-series switches support up to 16 forwarding classes.
To configure CoS forwarding classes:
1. In the navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab, and then double-click the device for which you want to
configure CoS forwarding classes.
3. Click the Configuration tab. In the configuration tree, expand Class of Service.
Chapter 3: Configuring Class of Service
4. Select Forwarding Classes.
5. Add or modify settings as specified in Table 17 on page 21.
6. Click one:
•
OK—Saves the changes.
•
Cancel—Cancels the modifications.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the Networkand Security Manager Administration Guide for more information.
Table 17: Assigning Forwarding Classes to Output Queues
ActionTask
Assign best-effort traffic to queue 0.
1. Select Queue and click Add new entry.
2. In the Queue num box, type 0.
3. In the Class name box, type the previously configured name of the best-effort
Table 17: Assigning Forwarding Classes to Output Queues (continued)
ActionTask
Assign expedited forwarding traffic to
queue 1.
Configure an assured forwarding class
classifier.
Related
Documentation
Configuring CoS Classifiers (NSM Procedure) on page 15•
• Configuring CoS Code Point Aliases (NSM Procedure) on page 17
• Configuring CoS Drop Profile (NSM Procedure) on page 19
• Configuring CoS Interfaces (NSM Procedure) on page 22
• Configuring CoS Rewrite Rules (NSM Procedure) on page 28
• Configuring CoS Schedulers (NSM Procedure) on page 31
• Configuring CoS and Applying Scheduler Maps (NSM Procedure) on page 32
1. Select Queue and click Add new entry.
2. In the Queue num box, type 1.
3. In the Class name box, type the previously configured name of the expedited
forwarding class—for example, ef-class.
4. Click OK.
1. Select Queue and click Add new entry.
2. In the Queue num box, type 3.
3. In the Class name box, type the previously configured name of the assured
forwarding class—for example, af-class.
4. Click OK.
Configuring CoS Interfaces (NSM Procedure)
An interface is configured for optimal performance in a high-traffic network. This feature
enables you to configure interface-specific CoS properties for incoming packets.
To configure CoS interfaces in NSM:
1. In the navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab, and then double-click the device for which you want to
configure CoS interfaces.
3. Click the Configuration tab. In the configuration tree, expand Class of Service.
4. Select Interfaces.
5. Add or modify the interfaces as specified in Table 18 on page 23.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the Networkand Security Manager Administration Guide for more information.
Table 18: Interfaces Configuration Fields
Interface
Chapter 3: Configuring Class of Service
Your ActionFunctionOption
Comment
Scheduler Map
Specifies the interface name.Name
Specifies the comment for the
interface.
Specifies the scheduler
configuration mapped to the
forwarding class.
1. Expand the Interfaces tree
and select Interface.
2. Click the New button or
select an interface and
click the Edit button in
Interface.
3. Enter the interface name
in the Name box.
1. Expand the Interfaces tree
and select Interface.
2. Click the New button or
select an interface and
click the Edit button in
Interface.
3. Enter the comment for the
interface in the Comment
box.
1. Expand the Interfaces tree
and select Interface.
2. Click the New button or
select an interface and
click the Edit button in
Interface.
3. Select the scheduler map
from the list.
Scheduler Map Chassis
Specifies the scheduler
configuration mapped to the
forwarding class for the
particular chassis in the
chassis queue.
1. Expand the Interfaces tree
and select Interface.
2. Click the New button or
select an interface and
click the Edit button in
Interface.
3. Select the scheduler map
chassis from the list.
Shapes the output of the
physical interface, so that the
interface transmits less traffic
than it is physically capable of
carrying.
Sets the units that need to be
allocated to the specific
forwarding class and
scheduling map.
1. Click the New button or
select an interface and
click the Edit button in
Interface.
2. Expand Interface tree and
select Shaping Rate.
3. Specify the comment and
the rate
4. Click Ok.
1. Click the New button or
select an interface and
click the Edit button in
Interface.
2. Expand Interface tree and
select Unit.
3. Specify the Unit,
Classifiers, Output Traffic
Control Profile and
Shaping Rate.
4. Click Ok.
Name
Comment
Internal Node
Specifies the interface set
name.
Specifies the comment for the
interface.
Sets the scheduler node as
internal, allowing resource
scheduling to be applied
equally to interface sets that
include child nodes and those
that do not include child
nodes.
1. Expand the Interfaces tree
and select Interface Set.
2. Click the New button or
select an interface set and
click the Edit button.
3. Select the name from the
list.
1. Expand the Interfaces tree
and select Interface Set.
2. Click the New button or
select an interface set and
click the Edit button.
3. Enter the comment.
1. Expand the Interfaces tree
and select Interface Set.
2. Click the New button or
select an interface set and
click the Edit button.
• Configuring CoS and Applying Scheduler Maps (NSM Procedure) on page 32
Configuring CoS Rewrite Rules (NSM Procedure)
You configure rewrite rules to alter CoS values in outgoing packets on the outbound
interfaces of a device to match the policies of a targeted peer. Policy matching allows
the downstream router in a neighboring network to classify each packet into the
appropriate service group.
In addition, you often need to rewrite a given marker such as IP precedence, DSCP, or
IEEE 802.1p at the switch's inbound interfaces to accommodate behavior aggregate (BA)
classification by core devices.
You do not need to explicitly apply rewrite rules to interfaces. By default, rewrite rules
are applied to routed packets.
To configure CoS rewrite rules:
1. In the navigation tree, select Device Manager > Devices
2. Click the Device Tree tab, and then double-click the device for which you want to
configure CoS rewrite rules.
3. Click the Configuration tab. In the configuration tree, expand Class of Service
4. Select Rewrite Rules.
5. Add or modify settings as specified in Table 19 on page 28.
6. Click one:
•
OK—Saves the changes.
•
Cancel—Cancels the modifications.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the Networkand Security Manager Administration Guide for more information.
Table 19: Configuring and Applying Rewrite Rules
ActionTask
Configure rewrite
rules for DiffServ CoS.
1. Click Configure next to Rewrite Rules.
2. Click Add new entry next to Dscp.
3. In the Name box, type the name of the rewrite rules—for example,
Using schedulers, you can assign attributes to queues and thereby provide congestion
control for a particular class of traffic. These attributes include the amount of interface
bandwidth, memory buffer size, transmit rate, and schedule priority.
To configure CoS schedulers:
1. In the navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab, and then double-click the device for which you want to
configure CoS schedulers.
3. Click the Configuration tab. In the configuration tree expand Class of Service.
4. Select Schedulers.
5. Add or modify the settings as specified in Table 20 on page 31.
6. Click one:
Chapter 3: Configuring Class of Service
•
OK—Saves the changes.
•
Cancel—Cancels the modifications.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the Networkand Security Manager Administration Guide for more information.
Table 20: Configuring Schedulers
ActionTask
Specify the buffer size.
1. Click the Add New icon.
2. Expand Buffer Size.
3. Select Percent.
4. Under Percent, select the appropriate option:
•
To specify no buffer size, select None.
•
To specify buffer size as a percentage of the total buffer, select percent and type an integer
from 1 through 100.
•
To specify buffer size as the remaining available buffer, select remainder.
3. In the Loss Priority box, select the required loss priority—for example, high.
4. In the Protocol box, select the type of protocol—for example, any.
5. In the Drop Profile box, select the previously configured drop profile.
6. Click OK.
1. Click the Add New icon.
2. Expand Transmit Rate.
3. Select Rate.
4. Under Rate, select the appropriate option:
•
To not specify transmit rate, select None.
•
To enforce a specific transmission rate, select rate and type the transmission rate that you
want to enforce.
•
To specify a percentage of transmission capacity, select percent and type an integer from 1
through 100.
•
To specify the remaining transmission capacity, select remainder.
5. Click OK.
Configuring CoS Classifiers (NSM Procedure) on page 15•
• Configuring CoS Code Point Aliases (NSM Procedure) on page 17
• Configuring CoS Drop Profile (NSM Procedure) on page 19
• Configuring CoS Forwarding Classes (NSM Procedure) on page 21
• Configuring CoS Interfaces (NSM Procedure) on page 22
• Configuring CoS Rewrite Rules (NSM Procedure) on page 28
• Configuring CoS and Applying Scheduler Maps (NSM Procedure) on page 32
Configuring CoS and Applying Scheduler Maps (NSM Procedure)
You associate the schedulers with forwarding classes by means of scheduler maps. You
can then associate each scheduler map with an interface, thereby configuring the queues
and packet schedulers that operate according to this mapping.
To configure CoS and apply scheduler maps:
1. In the navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab, and then double-click the device for which you want to
3. Click the Configuration tab. In the configuration tree expand Class of Service.
4. Select Scheduler Maps.
5. Add or modify settings as specified in Table 21 on page 33.
6. Click one:
•
OK—Saves the changes.
•
Cancel—Cancels the modifications.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the Networkand Security Manager Administration Guide for more information.
Table 21: Assigning Forwarding Classes to Output Queues
ActionTask
Chapter 3: Configuring Class of Service
Configure a scheduler map for
DiffServ CoS.
Configure a best-effort forwarding
class and scheduler.
Configure an expedited forwarding
class and scheduler.
Configure an assured forwarding
class and scheduler.
1. Click Add new entry.
2. In the Name box, type the name of the scheduler map—for example,
diffserv-cos-map.
1. Select Forwarding Class and click Add new entry.
2. In the Name box, type the name of the previously configured best-effort forwarding
class—for example, be-class.
3. Select the previously configured best-effort scheduler—for example, be-scheduler.
4. Click OK.
1. Select Forwarding Class and click Add new entry.
2. In the Name box, type the name of the previously configured expedited forwarding
class—for example, ef-class.
3. Select the previously configured expedited forwarding scheduler—for example,
ef-scheduler.
4. Click OK.
1. Select Forwarding Class and click Add new entry.
2. In the Name box, type the name of the previously configured assured forwarding
class—for example, af-class.
3. Select the previously configured assured forwarding scheduler—for example,
Configuring Port Mirroring to Analyze Traffic on EX-series Switches (NSM
Procedure) on page 35
•
Configuring Redundant Trunk Links (NSM Procedure) on page 36
•
Configuring Port Security (NSM Procedure) on page 37
•
Configuring Static IP (NSM Procedure) on page 39
•
Configuring VoIP (NSM Procedure) on page 40
Configuring Port Mirroring to Analyze Traffic on EX-series Switches (NSM Procedure)
You configure port mirroring in order to copy packets so that you can analyze traffic using
a protocol analyzer application. You can mirror traffic entering or exiting an interface, or
entering a VLAN. You can send the mirrored packets to a local interface to monitor traffic
locally or to a VLAN to monitor traffic remotely.
Mirroring a high volume of traffic can be performance intensive for the switch. Therefore,
you should disable port mirroring when you are not using it and select specific input
interfaces in preference to using the all keyword. Youcan also limit the amount of mirrored
traffic by using a firewall filter or the ratio keyword to mirror only a selection of packets.
NOTE: Only one analyzer can be enabled on an EX-series switch. To create
additional analyzers, first disable any existing analyzers.
NOTE: Interfaces used as input or output for a port mirror analyzer must be
configured as family ethernet-switching.
To mirror interface traffic or VLAN traffic on the switch to an interface on the switch:
1. In the navigation tree, select Device Manager > Devices. In Device Manager, select
the device for which you want to configure a port mirror analyzer.
2. In the Configuration tree, expand Ethernet Switching Options.
6. Add/modify member settings for the interface as specified in Table 22 on page 36.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See Updating
Devices for more information.
Table 22: Analyzer Configuration Fields
Input
Ingress
Specifies interfaces or VLANs for which entering traffic is
mirrored.
Your ActionFunctionField
Click Add and select Port or VLAN. Next,
select the interfaces or VLANs.
Egress
is mirrored.
Output
Configuring Redundant Trunk Links (NSM Procedure)
Simplify the convergence configuration in a typical enterprise network by configuring a
primary link and a secondary link on trunk ports. If the primary link fails, the secondary
link automatically takes over without waiting for normal STP convergence.
To configure redundant trunk links:
1. In the navigation tree, select Device Manager > Devices. In Device Manager, select
the device for which you want to configure redundant trunk links.
2. In the Configuration tree, expand Ethernet Switching Options.
4. Select Redundant Trunk Group > Group.
5. Click the Add icon.
6. Add/modify settings as specified in Table 25 on page 38.
Click Add to add egress interfaces.Specifies interfaces for which traffic exiting the interfaces
Select the interface.Specifies the interface on which traffic exiting is mirrored.Interface
Select the interface.Specifies the VLAN on which traffic exiting is mirrored.Vlan
Add/modify settings for the VLAN as specified in Table 23 on page 37.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See Updating
Devices for more information.
Table 23: Redundant Trunk Group Settings
Chapter 4: Configuring Ethernet Switching Options
Your ActionFunctionOption
Enter the name.Specifies the name for the redundant trunk group.Name
Interface
Specifies the interface that must be part of the
redundant trunk group.
Configuring Port Security (NSM Procedure)
Ethernet LANs are vulnerable to attacks such as address spoofing and Layer 2 denial of
service (DoS) on network devices. Port security features such as DHCP snooping, DAI
(dynamic ARP inspection), MAC limiting, and MAC move limiting, as well as trusted DHCP
server, help protect the access ports on your switch against the losses of information
and productivity that can result from such attacks.
To configure port security:
1. In the navigation tree, select Device Manager > Devices. In Device Manager, select
the device for which you want to configure port security.
2. In the Configuration tree, expand Ethernet Switching Options.
4. Select Secure Access Port > Interface or VLAN.
1. Select Interface.
2. Click Add.
3. Specify the interface.
4. Select Primary if the interface must be the primary
link.
5. Click OK.
5. Click the Add icon.
6. Add/modify settings for the interface as specified in Table 25 on page 38.
Add/modify settings for the VLAN as specified in Table 24 on page 38.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See Updating
Devices for more information.
Allows the switch to monitor and control DHCP
messages received from untrusted devices connected
to the switch. Builds and maintains a database of valid
IP addresses/MAC address bindings. (By default,
accessports are untrusted and trunk ports are trusted.)
Uses information in the DHCP snooping database to
validate ARP packets on the LAN and protect against
ARP cache poisoning.
Prevents hosts whose MAC addresses have not been
learned by the switch from accessing the network.
Specifies the number of times per second that a MAC
address can move to a new interface.
Specifies the action to be taken if the MAC move limit
is exceeded.
Table 25: Port Security on Interfaces
Select to enable DHCP snooping on a specified
VLAN or all VLANs.
Select to enable ARP inspection on a specified
VLAN or all VLANs. (Configure any port on which
you do not want ARP inspection to occur as a
trusted DHCP server port.)
Select the MAC Move Limit Option. Select the
required number.
Select one:
•
Log—Generate a system log entry, an SNMP
trap, or an alarm.
•
Drop—Drop the packets and generate a system
log entry, an SNMP trap, or an alarm.
•
Shutdown—Block data traffic on the interface
and generate an alarm.
•
None— No action to be taken.
Interface
Allowed MAC List
MAC Limit
interface. By default trunk ports are dhcp-trusted.
Specifies the MAC addresses that are allowed for
the interface.
learned on a single Layer 2 access port. This option
is not valid for trunk ports.
Your ActionFunctionOption
Select to enable DHCP trust.Specifies trusting DHCP packets on the selected
To add a MAC address:
1. Click Add.
2. Enter the MAC address.
3. Click OK.
Enter the required number.Specifies the number of MAC addresses that can be
Specifies the action to be taken if the MAC limit is
exceeded. This option is not valid for trunk ports.
Specifies the static ip address for the interface.static ip
Configuring Static IP (NSM Procedure)
The static IP feature enables you to associatea fixed IP address and a static media access
control (MAC) address or hardware address with a VLAN associated with an interface.
The VLAN and the MAC addresses are configured for the associated interface, which in
turn is associated with a device.
To configure static IP in NSM:
Select one:
•
Log—Generate a system log entry,an SNMP trap,
or an alarm.
•
Drop—Drop the packets and generate a system
log entry, an SNMP trap, or an alarm.
•
Shutdown—Block data traffic on the interface
and generate an alarm.
•
None— No action to be taken.
Enter the following:
•
Name
•
Vlan
•
Mac
1. In the navigation tree select Device Manager > Devices .
2. In the Devices list, double click the device to select it.
3. Click the Configuration tab.
4. In the configuration tree expand Static and select VLAN.
5. Add/Modify as specified in Table 26 on page 40.
6. Click one:
•
OK—To save the changes.
•
Cancel—To cancel the modifications.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See Updating
Devices for more information.
Specifies the VLAN to be configured for
static IP.
Media access control (MAC) address, or
hardware address, for the device
connected to the specified interface.
Configuring VoIP (NSM Procedure)
Voice over IP (VoIP) refers to voice communications over the internet or other packet
switched networks. The VoIPfeature enables you to configure voice over IP for interfaces.
1. Expand Static tree and select VLAN.
2. Click the New button or select a
VLAN and click Edit button in VLAN
interface.
3. Enter the name of the VLAN and the
comment.
4. Click OK.
1. Expand Static tree and select VLAN.
2. Click the New button or select a
VLAN and click Edit button in VLAN
interface.
3. Expand VLAN tree and select Mac.
4. Click the New button or select a Mac
and click Edit button in Mac interface.
5. Specify the name, comment and the
next hop.
6. Click OK.
To configure VoIP in NSM:
1. In the navigation tree, select Device Manager > Devices.
2. In the Devices list, double-click the device to select it.
3. Click the Configuration tab.
4. In the configuration tree, expand Ethernet Switching Options and select VoIP.
5. Expand VoIP tree and select Interfaces
6. Add or modify as specified in Table 27 on page 41.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See Updating
Devices for more information.
Table 27: VoIP Configuration Fields
Chapter 4: Configuring Ethernet Switching Options
Your ActionFunctionOption
Comment
VLAN
Forwarding Class
Specifies the interface name.Name
Specifies the comment for the interface
to which the VoIP is assigned.
Specifies the VLAN to be assigned to the
interface.
Specifies the forwarding class to which
the interface is assigned.
1. Click the New button or select an
interface and click on Edit button in
Interface.
2. Enter the interface name in the Name
box or select from the list.
1. Click the New button or select an
interface and click on Edit button in
Interface.
2. Enter the comment in the Comment
box.
1. Click the New button or select an
interface and click on Edit button in
Interface.
2. Enter the VLAN address in the VLAN
box.
1. Click the New button or select an
interface and click on Edit button in
Configuring a Policer for a Firewall Filter on page 46
Configuring a Firewall Filter
You configure firewall filters on EX-series switches to control traffic that enters ports on
the switch or enters and exits VLANs on the network and Layer 3 (routed) interfaces. To
configure a firewall filter you must configure the filter and then apply it to a port, VLAN,
or Layer 3 interface.
To configure a firewall filter and apply it to an interface:
1. In the navigation tree, select Device Manager > Devices. In Device Manager, select the
device for which you want to configure firewall filters.
2. In the configuration tree, expand Firewall.
3. Expand Ethernet Switching and click Filter.
4. Click Add New Entry to add a firewall filter.
5. Perform the configuration tasks described in Table 28 on page 43.
Table 28: Create a New Term
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See Updating
Devices for more information.
Your ActionFunctionOption
Enter a name.Specifies the name of the term.Term Name
Typically, you specify this match in
conjunction with the protocol match to
determine which protocol is being used
on the port.
Specifies more specific information than
icmp-type. Because the value’smeaning
depends upon the associated icmp-type,
you must specify icmp-type along with
icmp-code. The keywords are grouped
by the ICMP type with which they are
associated.
Specifies the IP fragmentation flags.
NOTE: Fragment flags is supported on
ingress ports, VLANs, and router
interfaces.
Specifies one or more TCP flags.
NOTE: TCP flags is supported on ingress
ports, VLANs, and router interfaces.
Specifies the user-priority field of the
tagged Ethernet packet. User-priority
values can be 0–7.
In place of the numeric value, you can
specify one of the following text
synonyms (the field values are also
listed)
•
background (1)—Background
•
best-effort (0)—Best effort
•
controlled-load (4)—Controlled load
•
excellent-load (3)—Excellent load
•
network-control(7)—Network control
reserved traffic
•
standard (2)—Standard or Spare
•
video (5)—Video
•
voice (6)—Voice
NOTE: This option is not applicable for
a Routing filter.
code point (DSCP). The DiffServ protocol
uses the type-of-service (ToS) byte in
the IP header. The most significant six
bits of this byte form the DSCP.
Enter a number or the corresponding text
synonym.
Select the DSCP number from the list.Specifies the Differentiated Services
VLAN
TTL Value
Packet Length
Action
Counter Name
Enter the VLAN nameSpecifies the VLAN to be associated.
NOTE: This option is not applicable for
a Routing filter.
Enter a value.Specifies the time-to-live value.
NOTE: This option is applicable for a
Routing filter.
Enter a value.Specifies the length of the packet.
NOTE: This option is applicable for a
Routing filter.
Enter a value.Specifies the count of the number of
packets that pass this filter, term, or
policer.
NOTE: Forwarding Class and Loss
Priority should be specified together for
the same term.
Analyzer
port-mirroring on packets. Port-mirroring
copies all packets seen on one switch
port to a network monitoring connection
on another switch port.
Configuring a Policer for a Firewall Filter
You can configure policers to rate limit traffic on a device. After you configure a policer,
you can include it in an ingress firewall filter configuration.
Select the option from the list.Classifies the packet into one of the
Enter the value.Specifies the Packet Loss Priority.
Select the analyzer from the list.Specifies whether to perform
When you configure a firewall filter, you can specify a policer action for any term or terms
within the filter. All traffic that matches a term that contains a policer action goes through
the policer that the term references. Each policer that you configure includes an implicit
counter. To get term-specific packet counts, you must configure a new policer for each
filter term that requires policing.
The following policer limits apply on the switch:
•
A maximum of 512 policers can be configured for port firewall filters.
•
A maximum of 512 policers can be configured for VLAN and Layer 3 firewall filters.
1. In the navigation tree, select Device Manager > Devices. In Device Manager, select
the device for which you want to configure a policer.
2. In the configuration tree, expand Firewall.
3. Perform the configuration tasks as described in Table 29 on page 47.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See Updating
Devices for more information.
Configuring an AS Path in a BGP Routing Policy (NSM Procedure) on page 49
•
Configuring an AS Path Group in a BGP Routing Policy (NSM Procedure) on page 50
•
Configuring a Community for use in BGP Routing Policy Conditions(NSM
Procedure) on page 51
•
Configuring a BGP Export Policy Condition (NSM Procedure) on page 52
•
Configuring Flap Damping to Reduce the Number of BGP Update Messages(NSM
Procedure) on page 53
•
Configuring a Routing Policy Statement (NSM Procedure) on page 55
•
Configuring Prefix List (NSM Procedure) on page 56
Configuring an AS Path in a BGP Routing Policy (NSM Procedure)
An autonomous system (AS) path is a path to a destination. An AS path consists of the
AS numbers of all the network devices that a packet traverses if it takes the associated
route to a destination. The AS numbers are assembled in a sequence, or path, that is
read from right to left. For example, for a packet to reach a destination using a route with
an AS path 5 4 3 2 1, the packet first traverses AS 1 and so on until it reaches AS 5, which
is the last AS before its destination.
You can define a match condition based on all of or portions of the AS path. You can
create a named AS path and then include it in a BGP routing policy.
To configure an AS path for a BGP routing policy in NSM:
1. In the navigation tree, select Device Manager > Devices.
2. In the Devices list, double-click the device to select it.
3. Click the Configuration tab.
4. In the configuration tree, expand Policy Options.
5. Select As Path.
6. Add or modify the parameters as specified in Table 30 on page 50.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Table 30: AS Path Configuration Details
Your ActionFunctionOption
Enter a name.Specifies the name of the AS path.Name
Enters a comment.Specifies the comment for the AS path.Comment
Path
to be included in the routing policy.
Enter an AS path.Specifies the AS path (as an AS number)
Configuring an AS Path Group in a BGP Routing Policy (NSM Procedure)
Autonomous System (AS) path group consists of multiple AS paths. You can define
match conditions based on the AS path groups. You can create named AS paths under
an AS path group and then include the AS path group in a routing policy.
To configure an AS path group for a BGP routing policy in NSM:
1. In the navigation tree, select Device Manager > Devices.
2. In the Devices list, double-click the device to select it.
3. Click the Configuration tab.
4. In the configuration tree, expand Policy Options.
5. Select As Path Group.
6. Add or modify the parameters as specified in Table 31 on page 51.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Table 31: AS Path Group Configuration Details
Chapter 6: Configuring Policy Options
Your ActionFunctionOption
Enter a name.Specifies the name of the AS path group.Name
Comment
As Path
group.
Specifies an AS path to be included in
the AS path group. Specifies the name
and comment for the AS path and
specifies the path as an AS path number.
Enter a comment.Specifies the comment for the AS path
1. Select As Path.
2. Click the New button or select an AS
path and click the Edit button.
3. Specify the name, comment and
path.
4. Click OK, then click OK again.
Configuring a Community for use in BGP Routing Policy Conditions(NSM Procedure)
A community is a group of destinations that share a common property. You can define
a community for use in a BGP routing policy match condition.
To configure a community for a BGP routing policy in NSM:
1. In the navigation tree, select Device Manager > Devices.
2. In the Devices list, double-click the device to select it.
3. Click the Configuration tab.
4. In the configuration tree, expand Policy Options.
5. Select Community.
6. Add or modify the parameters as specified in Table 32 on page 52.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Table 32: Community Configuration Details
Your ActionFunctionOption
Enter the name.Specifies the name of the community.Name
Comment
Invert Match
Members
community.
Enables you to invert the results for the
community expression.
Specifies one or more community
members.
Enter the comment.Specifies the comment for the
Select the check-box if you want to
invert the results. Clear the check-box if
you do not want to invert the results.
1. Select Members.
2. Click the New button or select a
3. Enter the member community.
4. Click OK, then click OK again.
Configuring a BGP Export Policy Condition (NSM Procedure)
You can define a routing policy condition based on the existence of routes in specific
tables for use in a BGP export policy.
To configure condition in NSM:
1. In the navigation tree, select Device Manager > Devices.
2. In the Devices list, double-click the device to select it.
3. Click the Configuration tab.
member and click the Edit button.
4. In the configuration tree, expand Policy Options.
5. Select Condition.
6. Add or modify the parameters as specified in Table 33 on page 53.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Table 33: Condition Configuration Details
Chapter 6: Configuring Policy Options
Your ActionFunctionOption
Enter a name.Specifies the name of the condition.Name
Enter a comment.Specifies the comment for the condition.Comment
Route Active On
Enables you to specify the policy
condition based on the existing routes
and the corresponding route tables.
1. Select Route Active On.
2. Select one:
•
None—No policy condition based
on routes need to be specified.
•
if-route-exists—Specifythe policy
condition based on the routes.
Enter the comment, route and the
corresponding routing table.
3. Click OK.
Configuring Flap Damping to Reduce the Number of BGP Update Messages(NSM
Procedure)
To advertise network reachability information, BGP systems send an excessive number
of update messages. Youcan use flap damping to reducethe number of updatemessages
sent between BGP peers, thereby reducing the load on these peers without adversely
affectingthe route convergence time. Damping reduces the number of update messages
by marking these routes as ineligible, so that they cannot be selected as active or
preferable routes. Applying damping leads to some delay, or suppression, in the
propagation of route information, but the result is increased network stability. You can
define actions by creating a named set of damping parameters and including the set in
a routing policy.
To configure damping for a BGP routing policy in NSM:
1. In the navigation tree, select Device Manager > Devices.
2. In the Devices list, double-click the device to select it.
3. Click the Configuration tab.
4. In the configuration tree, expand Policy Options.
6. Add or modify the parameters as specified in Table 34 on page 54.
7. Click one:
•
OK—To save the changes.
•
Cancel—To cancel the modifications.
•
Apply—To apply the protocol settings.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Table 34: Damping Configuration Details
Your ActionFunctionOption
Name
Comment
Disable
Half Life
Reuse
Suppress
parameter setting.
parameter setting.
Enables you to disable damping on a
per-prefix basis. Any damping state that
is present in the routing table for a prefix
is deleted if damping is disabled.
Indicates the time in minutes interval
after which the accumulated
figure-of-merit value is reduced by half
if the route remains stable.
Figure-of-merit values correlate to the
probability of future instability of a
device. Routes with higher
figure-of-merit values are suppressed
for longer periods of time.
which a suppressed route can be used
again.
which a route is suppressed for use or
inclusion in advertisements.
Enter a name.Specifies the name of the damping
Enter a comment.Specifies the comment for the damping
Select the check-box to disable
damping. Clear the check-box to enable
damping.
Enter the time limit in minutes or select
it from the list.
Enter the value or select it from the list.Indicatesthe figure-of-merit value below
Enter the value or select it from the list.Indicatesthe figure-of-merit value above
Max Suppress
Indicates the maximum time in minutes
that a route can be suppressed no
matter how unstable it has been.
1. Enter the time limit or select it from
the list.
Configuring a Routing Policy Statement (NSM Procedure)
You can configure policy statements for routing policies. Each policy statement is
composed of from criteria, to criteria and then criteria. The from and to criteria comprise
a set of match conditions for the routing policy. The then criteria specify the action to be
taken when the from and to criteria are matched and when they are not matched.
To configure a routing policy statement in NSM :
1. In the navigation tree, select Device Manager > Devices.
2. In the Devices list, double-click the device to select it.
3. Click the Configuration tab.
4. In the configuration tree, expand Policy Options.
5. Select Policy statement.
6. Add/Modify the parameters as specified in Table 35 on page 55.
Chapter 6: Configuring Policy Options
7. Click one:
•
OK—To save the changes.
•
Cancel—To cancel the modifications.
•
Apply — To apply the protocol settings.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Table 35: Configuring Policy Statement Fields
Name
Specifies the name of the policy
statement.
Your ActionFunctionOption
1. Click the New button or select a
policy statement and click Edit
button.
2. Select policy-statement .
3. Specify the name.
Comment
Specifies the comment for the policy
statement.
1. Click the New button or select a
policy statement and click Edit
button.
Enables you to define the criteria that an
incoming route must match. You can
specify one or more match conditions. If
you specify more than one, all conditions
must match the route for a match to
occur.
Indicates the term to be configured for
the routing policy. You can create one or
more terms for a routing policy. Each
term comprises of match conditions and
the corresponding actions.
Enables you to define the action to be
taken in the case of a match or
mismatch between the packets and
From and To conditions.
1. Click the New button or select a
policy statement and click Edit
button.
2. Expand policy-statement tree and
select From.
3. Enter the From criteria.
4. Expand From tree and specify the
match conditions.
1. Click the New button or select a
policy statement and click Edit
button.
2. Expand policy-statement tree and
select Term.
3. Click the New button or select a term
and click Edit button.
4. Enter the term name, comment and
the match conditions and actions.
1. Click the New button or select a
policy statement and click Edit
button.
2. Expand policy-statement tree and
select Then.
3. Specify the parameters for Then
criteria.
4. Expand Then tree and specify the
actions for each match condition.
To
Configuring Prefix List (NSM Procedure)
A prefix list is a named list of IP addresses. Youcan specify an exact match with incoming
routesand apply a common action to all matchingprefixes in the list. This featureenables
you to create a named prefix list and include it in a routing policy.
To configure prefix list in NSM:
Enables you to define the criteria that an
outgoing route must match. You can
specify one or more match conditions. If
you specify more than one, all conditions
must match the route for a match to
occur.
1. Click the New button or select a
policy statement and click Edit
button.
2. Expand policy-statement tree and
select To.
3. Enter the To criteria.
4. Expand To tree and specify the
match conditions.
1. In the navigation tree select Device Manager > Devices and select the device from
the list.
2. In the configuration tree, expand Policy Options.
3. Select Prefix List.
4. Add/Modify the parameters as specified in Table 36 on page 57.
5. Click one:
•
OK—To save the changes.
•
Cancel—To cancel the modifications.
•
Apply — To apply the protocol settings.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Table 36: Configuring Prefix List Fields
Specifies the name of the prefix list.Name
Specifies the comment for the prefix list.Comment
Apply Path
Indicates that the prefix list should
include all IP prefixes pointed to by a
defined path.
Specifies the prefix list item.Prefix List Item
Your ActionFunctionField
1. Click the New button or select a
prefix list and click Edit button.
2. Select prefix-list.
3. Specify the name.
1. Click the New button or select a
prefix list and click Edit button.
2. Select prefix-list.
3. Specify the comment.
1. Click the New button or select a
prefix list and click Edit button.
2. Select prefix-list.
3. Specify the path.
1. Click the New button or select a
prefix list and click Edit button.
2. Expand prefix-list tree and select
Prefix List Item.
1. In the navigation tree, select Device Manager > Devices.
2. In the Devices list, double-click the device to select it.
3. Click the Configuration tab.
4. In the configuration tree, expand Routing Options.
5. Select Maximum Prefixes.
6. Enter the parameters as specified in Table 37 on page 60.
7. Click one:
•
OK—To save the changes.
•
Cancel—To cancel the modifications.
•
Apply—To apply the routing option settings.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Table 37: Configuring Maximum Prefixes Fields
Comment
prefix limit.
Limit
prefixes.If this limit is reached, a warning
is triggered and additional routes are
rejected.
Log Interval
Threshold
Indicates the minimum time interval (in
seconds) between log messages.
Specifies what is to be done when the
routing table reaches the maximum
prefix value. The options are:
•
None—No action is to be taken.
•
threshold—You can configure a
percentagefor the maximum number
of prefixes, which when installed,
triggers the warning.
•
log-only—Sets the prefix limit as an
advisory limit. An advisory limit
triggers only a warning, and additional
routes are not rejected.
Your ActionFunctionOption
Enter the comment.Specifies the comment for the maximum
Enter limit value or select from the list.Indicatesthe maximum number of route
Enter the log interval value or select from
the list.
1. Expand the Maximum Prefixes tree
and select Threshold.
You can configure generic multicast properties for routing instances. A routing instance
is a collection of routing tables, interfaces, and routing protocol parameters. The routing
protocol parameters control the information in the routing tables.
To configure generic multicast properties for routing instance in NSM:
1. In the navigation tree, select Device Manager > Devices.
2. In the Devices list, double-click the device to select it.
3. Click the Configuration tab.
4. In the configuration tree, expand Routing Options.
5. Select Multicast.
6. Add or modify the parameters as specified in Table 38 on page 61.
7. Click one:
Chapter 7: Configuring Routing Options
•
OK—To save the changes.
•
Cancel—To cancel the modifications.
•
Apply—To apply the routing option settings.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Table 38: Configuring Multicast Fields
Comment
configuration.
Backup Pe Group
Enables you to configure a backup
provider edge (PE) group for ingress PE
device redundancy when
point-to-multipoint (P2MP)
label-switched paths (LSPs) are used
for multicast distribution.
Your ActionFunctionOption
Enter the comment.Specifies the comment for the multicast
1. Expand the Multicast tree and select
Backup Pe Group.
2. Click the New button or select a
group and click the Edit button.
3. Configure the PE group name, local
address, and backup address.
Enables you to set up multicast flow
maps to manage a subset of multicast
forwarding table entries. For example,
you can specify that certain forwarding
cache entries be permanent or have a
different timeout value than those of
other multicast flows that are not
associated with this flow map .
1. Expand the Multicast tree and select
Flow Map.
2. Click the New button or select a flow
map and click the Edit button.
3. Configure the following to create and
define a flow map:
•
Enter the flow map name and
comment.
•
Bandwidth—Specify the
bandwidth property of the
multicast flow map.
•
Forwarding Cache—Specify the
forwarding cache properties of
entries defined by a flow map. You
can specify a timeout of never to
make the forwarding entries
permanent, or you can specify a
timeout from 1 through 720
minutes.
•
Policy—Specify the flow map
policies.
•
Redundant Sources—Specify the
addresses for use as backup
sources for multicast flows
defined by a flow map.
Forwarding Cache
Enables you to configure multicast
forwarding cache properties. These
properties include threshold suppression
and reuse limits, and timeout values.
You can specify a value for the threshold
to suppress new multicast forwarding
cache entries and an optional reuse
value for the threshold at which the
device begins to create new multicast
forwardingcache entries. If you configure
both reuse and suppression values,
configure a reuse value that is less than
the suppression value. The suppression
value is mandatory. If you do not specify
the optional reuse value, then the
number of multicast forwarding cache
entries is limited to the suppression
value. A new entry is created as soon as
the number of multicast forwarding
cache entries fallsbelow the suppression
value. You can also specify a timeout
value for all multicast forwarding cache
entries.
Enables you to configure the interfaces
for multicast properties on which you
plan to manage the maximum
bandwidth.
Multicastreversepath forwarding (RPF)
checks are used to prevent multicast
routing loops. Routing loops are
particularly debilitating in multicast
applications because packets are
replicated with each pass around the
routing loop.
You can apply policies for disabling
reverse-path forwarding (RPF) checks
on arriving multicast packets.
Enables you to configure multicast
scoping to limit multicast traffic by
configuring it to an administratively
defined topological region. Multicast
scoping controls the propagation of
multicast messages—both multicast
group joins upstream toward a source
and data forwarding downstream.
Scoping can relieve stress on scarce
resources, such as bandwidth, and
improve privacy or scaling properties.
1. Expand the Multicast tree and select
Interface.
2. Configure the interface and the
bandwidth.
1. Expand the Multicast tree and select
Rpf Check Policy.
2. Click the New button or select a
policy and click the Edit button.
3. Enter the RPF check policy name.
1. Expand the Multicast tree and select
Scope.
2. Configure the scope and the interface
for the multicast.
Scope Policy
Ssm Groups
Enables you to configure multicast
scoping policy. A multicast scope policy
contains a set of device interfaces on
which you are configuring scoping and
the scope's address range configured as
a series of device filters.
Enables you to configure source- specific
multicast(SSM) groups. SSM is a service
model that identifies session traffic by
both source and group address. Using
SSM, a client can receive multicast
traffic directly from the source. To
deploy SSM successfully, you need an
end-to-end multicast-enabled network
and applications that use an Internet
Group Management Protocol version 3
(IGMPv3).
1. Expand the Multicast tree and select
Scope Policy.
2. Specify the scope policy for the
multicast group.
1. Expand the Multicast tree and select
Ssm Groups.
2. Click the New button or select a
group and click the Edit button.
SSM mapping translate IGMPv1 or
IGMPv2 membership reports to an
IGMPv3 report allowing you to support
an SSM network without requiring all
hosts to support IGMPv3.
Defines tracing options for the multicast
group. You can also set up the file
management and access control
parameters .
Configuring Multipath (NSM Procedure)
You can configure protocol-independent load balancing for Layer 3 virtual private
networks (VPNs) with load sharing among multiple external BGP paths and multiple
internal BGP paths. You can use forwarding next hops for both the active route and
alternative paths for load balancing.
To configure multipath load balancing in NSM:
1. In the navigation tree, select Device Manager > Devices.
2. In the Devices list, double-click the device to select it.
1. Expand the Multicast tree and select
Ssm Map.
2. Click the New button or select an
SSM map and click the Edit button.
3. Specify the SSM policy for the SSM
map and the source address.
1. Expand the Multicast tree and select
the Traceoptions tab.
2. Set up the file and flag parameters.
3. Click the Configuration tab.
4. In the configuration tree, expand Routing Options.
5. Select Multipath.
6. Enter the parameters as specified in Table 39 on page 65.
7. Click one:
•
OK—To save the changes.
•
Cancel—To cancel the modifications.
•
Apply—To apply the routing option settings.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Applies protocol-independent load
balancing to VPN routes.
Configuring Options (NSM Procedure)
You can configure the types of system logging messages sent about the routing protocols
processto the system log message file.These messages are also displayed on the system
console. You can log messages at a particular level or up to and including a particular
level.
To configure options in NSM:
1. In the navigation tree, select Device Manager > Devices.
2. In the Devices list, double-click the device to select it.
Enter the comment.Specifies the comment for the multipath
1. Expand the Multipath tree and select
Vpn Unequal Cost.
2. Enter the comment for the vpn
unequal cost configuration and
specify whether both external and
internal BGP paths should be
selected for the multipath
configuration by selecting the Equal
External Internal check box.
3. Click the Configuration tab.
4. In the configuration tree, expand Routing Options.
5. Select Options.
6. Enter the parameters as specified in Table 40 on page 66.
7. Click one:
•
OK—To save the changes.
•
Cancel—To cancel the modifications.
•
Apply—To apply the routing option settings.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Enables you to configure the generation
of system log messages for a particular
severity level and all higher levels.
Configuring Route Resolution (NSM Procedure)
You can configure a routing table to accept routes from specific routing tables to enable
the device to manage and route the traffic effectively between a source host and
destination host. You can configure a routing table to use specific import policies to
produce a route resolution table to resolve routes.
To configure a route resolution table in NSM:
1. In the navigation tree, select Device Manager > Devices.
2. In the Devices list, double-click the device to select it.
3. Click the Configuration tab.
Enter the comment.Specifies the comment for the message
Enter the mark value or select from the
list.
1. Expand the Options tree and select
Syslog.
2. Select the severity levels for system
log messages.
4. In the configuration tree, expand Routing Options.
5. Select Resolution.
6. Add or modify the parameters as specified in Table 41 on page 67.
7. Click one:
•
OK—To save the changes.
•
Cancel—To cancel the modifications.
•
Apply—To apply the routing option settings.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Specifies the name of the routing table
for which the import policies and the
resolution routes are configured.
Specifies the filter policy for the
resolution routes.
Defines tracing options for route
resolution.
Configuring Routing Table Groups (NSM Procedure)
Enter a comment.Specifies the comment for the route
1. Expand the Resolution tree and
select Rib.
2. Click the New button or select a
routing table and click the Edit
button.
3. Enter the name and comment for the
routing table and specify the route
import policies and the resolution
routes.
1. Expand the Resolution tree and
select Tracefilter.
2. Specify the filter policies for the
routing table.
1. Expand the Resolution tree and
select Traceoptions.
2. Expand the Traceoptions tree and set
up the file and flag parameters.
You can group together one or more routing tables to form a routing table (RIB) group.
Within a group, a routing protocol can import routes into all the routing tables in the group
and can export routes from a single routing table. Each routing table group contains one
or more routing tables that the JUNOS software uses when importing routes. In the same
way, each routing table group optionally contains one routing table that the JUNOS
software uses when exporting routes to the routing protocols. You can also specify the
import and the export route tables and the import policies for the routing table group.
To configure routing table groups in NSM:
1. In the navigation tree, select Device Manager > Devices.
2. In the Devices list, double-click the device to select it.
3. Click the Configuration tab.
4. In the configuration tree, expand Routing Options.
5. Select Rib Groups.
6. Add or modify the parameters as specified in Table 42 on page 68.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Your ActionFunctionOption
Name
Comment
Export Rib
Import Policy
Specifies the unique name for the routing
table group.
Specifies the comment for the rorouting
table group.
Specifies the routing table from which
the JUNOS software exports routing
information.
Enables you to apply one or more
policies to routes imported into the
routing table group.
1. Expand the Routing Options tree and
select Rib Group.
2. Click the New button or select a
routing table group and click the Edit
button.
3. Enter the name for the routing table
group.
1. Expand the Routing Options tree and
select Rib Group.
2. Click the New button or select a
routing table group and click the Edit
button.
3. Enter the comment for the routing
table group.
1. Expand the Routing Options tree and
select Rib Group.
2. Click the New button or select a
routing table group and click the Edit
button.
3. Enter the name of the routing table.
1. Expand the rib-group tree and select
Import Policy.
2. Set up the import policies for the
routing table group.
Specifies the name of the routing table
into which the JUNOS software is to
import routing information. The first
routing table name you enter is the
primary routing table. Any additional
names you enter identify secondary
routing tables. When a protocol imports
routes, it imports them into the primary
and any secondary routing tables.
Configuring Routing Tables (NSM Procedure)
This feature enables you to configure routing tables. You can also configure the static,
martians, aggregate, maximum paths, maximum prefixes, multipath, or generatedroutes
to the routing table. If you are not adding any of those routes, then the creation of the
routing table is optional. The JUNOS software uses its default routing tables, which are
inet.0 for IPv4 unicast routes, inet6.0 for IPv6 unicast routes, inet.1 for the IPv4 multicast
forwarding cache, and inet.3 for IPv4 MPLS.
To configure a routing table in NSM:
1. In the navigation tree, select Device Manager > Devices.
2. In the Devices list, double-click the device to select it.
3. Click the Configuration tab.
1. Expand the rib-group tree and select
Import Policy.
2. Enter the name of the routing table.
4. In the configuration tree, expand Routing Options.
5. Select Rib.
6. Add or modify the parameters as specified in Table 43 on page 70.
7. Click one:
•
OK—To save the changes.
•
Cancel—To cancel the modifications.
•
Apply—To apply the routing option settings.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Enables you to configure the aggregate
routes for the routing table. Aggregation
allows you to combine groups of routes
with common addresses into a single
entry in the routing table. This decreases
the size of the routing table as well as
the number of route advertisements sent
by the router.
Enables you to configure generated
routes, which are used as routes of last
resort in the routing table.
1. Expand the Routing Options tree and
select Rib.
2. Click the New button or select a
routing table and click the Edit
button.
3. Enter the name for the routing table.
1. Expand the Routing Options tree and
select Rib.
2. Click the New button or select a
routing table and click the Edit
button.
3. Enter the comment for the routing
table.
1. Expand the Rib tree and select
Aggregate.
2. Select the global aggregate route
options in Defaults and individual
aggregate route options in Route.
1. Expand the Rib tree and select
Generate.
2. Select the default route to the
destination address in Defaults and
individually generated route options
in Route.
Martians
Maximum Paths
Maximum Prefixes
Enables you to configure martian
addresses in the routing table.
Enables you to configure a limit for the
number of routes installed in a routing
table.
Enables you to configure a limit for the
number of routes installed in a routing
table.
Enables you to configure the multipath
option in the routing table for load
sharing between external BGP and
internal BGP.
Enables you to configure static routes to
be installed in the routing table.
Configuring Source Routing (NSM Procedure)
You can configure source routing to specify IP addresses of the devices along the path,
that you want an IP packet to take on its way to its destination.
To configure source routing in NSM:
1. In the navigation tree, select Device Manager > Devices.
2. In the Devices list, double-click the device to select it.
3. Click the Configuration tab.
4. In the configuration tree, expand Routing Options.
5. Select Source Routing.
1. Expand the Rib tree and select
Multipath.
2. Enter the multipath options.
1. Expand the Rib tree and select Static.
2. Enter the global static route in
Defaults and destination address of
the static route in Route.
6. Enter the parameters as specified in Table 44 on page 71.
7. Click one:
•
OK—To save the changes.
•
Cancel—To cancel the modifications.
•
Apply—To apply the routing option settings.
Table 44: Source Routing Fields
Comment
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Your ActionFunctionOption
Enter the comment.Specifies the comment for the source
You can configure static routes for a routing table group. A router uses static routes in
the following scenarios:
•
When it does not have a route to a destination that has a better (lower) preference
value.
•
When it cannot determine the route to a destination.
•
When it is forwarding unroutable packets.
A static route is installed in the routing table only when the route is active; that is, the list
of next-hop routers configured for that route contains at least one next hop on an
operational interface.
To configure static routes for a routing table group in NSM:
1. In the navigation tree, select Device Manager > Devices.
2. In the Devices list, double-click the device to select it.
3. Click the Configuration tab.
Select the check box.Specifies the IPv4/IPv6 addressing
4. In the configuration tree, expand Routing Options.
5. Select Static.
6. Add or modify the parameters as specified in Table 45 on page 73.
7. Click one:
•
OK—To save the changes.
•
Cancel—To cancel the modifications.
•
Apply—To apply the routing option settings.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Enables you to configure the global
static route options. These options only
set the global defaults and apply to all
the configured static routes.
Enables you to configure the individual
static routes options. These options
apply to the individual destination only
and override any options configured in
the Defaults section.
Configuring Generated Routes (NSM Procedure)
Generated routes are used as routes of last resort. A packet is forwarded to the route of
last resort when the routing tables have no information about how to reach that packet’s
destination. One use of route generation is to create a default route to use if the routing
table contains a route from a peer on a neighboring backbone network. A generatedroute
becomes active when it has one or more contributing routes. A contributing route is an
active route that is a specific match for the generated destination.
Enter the comment.Specifies the comment for the static
Enter the name.Specifies the routing table group name
1. Expand the Static tree and select
Defaults.
2. Enter the default route to the
destination address.
1. Expand the Static tree and select
Route.
2. Enter the individual route.
For example, for the destination 128.100.0.0/16, routes to 128.100.192.0/19 and
128.100.67.0/24 are contributing routes, but routes to 128.0.0.0./8, 128.0.0.0/16, and
128.100.0.0/16 are not. A route can contribute only to a single generated route. However,
an active generatedroute can recursively contribute to a less specific matching generated
route. For example, a generated route to the destination 128.100.0.0/16 can contribute
to a generated route to 128.96.0.0/13. By default, when generated routes are installed in
the routing table, the next hop device selects from the primary contributing route.
To configure generated routes in NSM:
1. In the navigation tree, select Device Manager > Devices .
2. In the Devices list, double click the device to select it.
3. Click the Configuration tab.
4. In the configuration tree, expand Routing Options.
5. Select Generate.
6. Add or modify the parameters as specified in Table 46 on page 74.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Table 46: Generated Routes Fields
Your ActionFunctionOption
Comment
route.
Defaults
Route
Enables you to specify globally
generated route options. These are
treated as global defaults and apply to
all the generated routes you configure.
Enables you to configure individually
generated routes. Youcan also configure
globally generated route options. These
options apply to the individual
destination only and override any options
you configured in Defaults.
Configuring Graceful Restart (NSM Procedure)
Graceful restart allows a device undergoing a restart to inform its adjacent neighbors
and peers of its condition. The restarting device requests a grace period from the neighbor
or peer, which can then cooperate with the restarting device. With a graceful restart, the
restarting device can still forward traffic during the restart period, and convergence in
the network is not disrupted. The restart is not visible to the rest of the network, and the
restarting device is not removed from the network topology.
The graceful restart request occurs only if the following conditions are met:
Enter a comment.Specifies the comment for the generated
1. Expand the Generate tree and select
Defaults.
2. Configure the default route options.
1. Expand the Generate tree and select
Route.
2. Configure the individual route
options.
•
The network topology is stable.
•
The neighbor or peer cooperates.
•
The restarting device is not already cooperating with another restart already in progress.
1. In the navigation tree, select Device Manager > Devices .
2. In the Devices list, double click the device to select it.
3. Click the Configuration tab.
4. In the configuration tree, expand Routing Options.
5. Select Graceful Restart.
6. Enter the parameters as specified in Table 47 on page 75.
7. Click one:
•
OK—To save the changes.
•
Cancel—To cancel the modifications.
•
Apply—To apply the routing option settings.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Table 47: Graceful Restart Fields
Comment
restart.
Disable
Restart Duration
Specifies whether graceful restart is
enabled for the device.
Specifies the duration of the grace period
for the device to restart.
Configuring Forwarding Table (NSM Procedure)
A forwarding table contains the routes actually used to forward packets through the
device to their next-hop destination. This feature enables you to configure forwarding
table in NSM.
To configure forwarding table in NSM:
1. In the navigation tree, select Device Manager > Devices .
2. In the Devices list, double click the device to select it.
Your ActionFunctionOption
Enter a comment.Specifies the comment for the graceful
•
Select the check box to disable
graceful restart.
•
Clear the check box to enable graceful
restart.
Enter a value for the duration or select a
value from the list.
4. In the configuration tree, expand Routing Options.
5. Select Forwarding Table.
6. Add or modify the parameters as specified in Table 48 on page 76.
7. Click one:
•
OK—To save the changes.
•
Cancel—To cancel the modifications.
•
Apply—To apply the routing option settings.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Table 48: Forwarding Table Fields
Your ActionFunctionOption
Comment
None
indirect-next-hop
no-indirect-next-hop
Unicast Reverse Path
forwarding table.
is to be added to the forwarding table.
Specifies that the forwarding table
supports indirectly connected next hops.
Specifies that the forwarding table does
not support indirectly connected next
hops.
protect the network from IP spoofing. A
unicast reverse-path-forwarding (RPF)
check performs a routing table lookup
on an IP packet’s source address and
checks the incoming interface. The
device determines whether the packet
is arriving from a path that the sender
would use to reach the destination. If the
packet is from a valid path, the device
forwards the packet to the destination
address. If it is not from a valid path, the
device discards the packet.
Enter a comment.Specifies the comment for the
Select the option button.Specifies that no next- hop parameter
Select the option button to enable
indirect-next- hop.
Select the option button to enable
no-indirect-next- hop.
Selectthe path from the drop-down list.Enables you to check path validity to
Export
Enables you to apply one or more
policies to routes being exported from
the routing table into the forwarding
table.
1. Expand the Forwarding Table tree
and select Export.
Flow routes provide traffic filtering and rate-limiting capabilities much like firewall filters.
You can propagate flow routes across different autonomous systems. A flow route is an
aggregation of match conditions for IP packets. Flow routes are propagated through the
network using flow-specific network-layer reachability information (NLRI) messages
and are maintained in the flow routing table. Packets can travel through flow routes only
if specific match conditions are met. Flow routes and firewall filters are similar in that
they filter packets based on packet components and perform an action on the packets
that match.
To configure a flow route in NSM:
1. In the navigation tree, select Device Manager > Devices .
2. In the Devices list, double click the device to select it.
3. Click the Configuration tab.
4. In the configuration tree, expand Routing Options.
Chapter 7: Configuring Routing Options
5. Select Flow.
6. Add or modify the parameters as specified in Table 49 on page 77.
7. Click one:
•
OK—To save the changes.
•
Cancel—To cancel the modifications.
•
Apply—To apply the routing option settings.
Table 49: Flow Route Fields
Comment
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Your ActionFunctionOption
Enter a comment.Specifies the comment for the flow
Specifies the conditions that the packet
must match for the packet to be
included in flow route. Match conditions
are:
•
Destination Port
•
DSCP
•
Fragment
•
Icmp Code
•
Icmp Type
•
Packet Length
•
Port
•
Protocol
•
Source Port
•
Tcp Flag
1. Expand the Flow tree and select
Route.
2. Click the New button or select a flow
route and click the Edit button.
3. Enter the flow route name.
1. Expand the Flow tree and select
Route.
2. Click the New button or select a flow
route and click the Edit button.
3. Enter the comment for the flow
route.
1. Expand the Route tree and select
Match.
2. Enter a comment for Comment, a
destination address for Destination,
and a source address for Source.
3. Configure the match conditions.
Then
Validation
Comment
Traceoptions
Enables you to specify the action to take
if the packet matches the conditions you
have configured in the flow route.
Specifies a comment for the validation
procedure. Flow routes are installed into
the flow routing table only if they have
been validated using the validation
procedure.
Enables you to define tracing operations
that track all routing protocol
functionality in the device and specify
that tracing results be saved in a log file.
You can configure the tracing flag, filter,
and the tracing policy.
1. Expand the Route tree and select
Then.
2. Configure the then conditions for the
packet.
1. Expand the Flow tree and select
Validation.
2. Enter the comment for the validation
procedure.
1. Expand the Validationtree and select
Traceoptions.
2. Expand the Traceoptions tree and
configure the file and flag
parameters, and the tracing policy.
Fatesharing allows you to create a database of information that the constrained shortest
path first (CSPF) algorithm uses to compute one or more backup routing paths to use
in case the primary path becomes unstable. The database describes the relationships
between elements of the network. Through fate sharing, you can configure backup paths
that minimize the number of shared links and fiber optic cables, to ensure that in the
event of damage to a fiber optic cable, only the minimum amount of data is lost and that
a path still exists to the destination. For a backup path to work optimally, it must not
share links or physical fiber optic cables with the primary path. This ensures that a single
point of failure will not affect the primary and backup paths at the same time.
This feature enables you to specify groups of objects that share characteristics resulting
in backup paths to be used if primary paths fail. All objects are treated as /32 host
addresses. You can specify one or more objects within a group. The objects can be LAN
interfaces, device IDs, or point-to-point links.
To configure fate sharing in NSM:
Chapter 7: Configuring Routing Options
1. In the navigation tree, select Device Manager > Devices .
2. In the Devices list, double click the device to select it.
3. Click the Configuration tab.
4. In the configuration tree, expand Routing Options.
5. Select Fate Sharing.
6. Add or modify the parameters as specified in Table 50 on page 79.
7. Click one:
•
OK—To save the changes.
•
Cancel—To cancel the modifications.
•
Apply—To apply the routing option settings.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Table 50: Fate Sharing Fields
Comment
Your ActionFunctionOption
Enter a comment.Specifies the comment for the fate
Specifies the configurable cost
attributed to each group, which
represents the level of impact this group
has on CSPF computations. The higher
the cost, the less likely a backup path
will share any objects in the group with
the primary path.
Specifies the from address and to
address for point-to-point link objects.
1. Expand the Fate Sharing tree and
select Group.
2. Click the New button or select a
group and click the Edit button.
3. Enter the group name.
1. Expand the Fate Sharing tree and
select Group.
2. Click the New button or select a
group and click the Edit button.
3. Enter the comment.
1. Expand the Fate Sharing tree and
select Group.
2. Click the New button or select a
group and click the Edit button.
3. Enter the cost or select a value from
the list.
1. Expand the Group tree and select
From.
2. Click the New button or select a
group and click the Edit button.
3. Specify the From address.
Configuring Martian Addresses (NSM Procedure)
Martian addresses are host or network addresses about which all routing information is
ignored. They commonly are sent by improperly configured systems on the network and
have destination addresses that are obviously invalid. You can configure a particular
martian address or a range of martian addresses as allowed or disallowed. You can use
the match criteria to configure a range of martian addresses.
To configure a martian address in NSM:
1. In the navigation tree, select Device Manager > Devices .
2. In the Devices list, double click the device to select it.
3. Click the Configuration tab.
4. In the configuration tree, expand Routing Options.
6. Add or modify the parameters as specified in Table 51 on page 81.
7. Click one:
•
OK—To save the changes.
•
Cancel—To cancel the modifications.
•
Apply—To apply the routing option settings.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Table 51: Configuring Martian Address Fields
Chapter 7: Configuring Routing Options
Your ActionFunctionOption
Address
Comment
Allow
Specifies the martian address or the
destination prefix of a series of martian
addresses that are to be allowed or
disallowed.
Specifies the comment for the martian
address.
Enables you to explicitly allow a subset
of a range of addresses that are to be
disallowed.
1. Click the New button or select a
martian address and click the Edit
button.
2. Enter the address.
1. Click the New button or select a
martian address and click the Edit
button.
2. Enter the comment for the martian
address.
1. Click the New button or select a
martian address and click the Edit
button.
2. Select the check box to allow the
disallowed address. Selecting the
allow option deletes a particular
martian address from the range of
martian addresses.
3. Clear the check box to disallow the
addresses and mark them as a
martian address.
Specifies match criteria for the route’s
mask length with the martian address.
The criteria are:
•
Exact
•
Longer
•
Orlonger
•
Upto
•
Through
•
Prefix Length Range
Configuring Interface Routes (NSM Procedure)
You can associate a routing table group with the device’s interfaces and specify routing
tables into which interface routes are imported. To define the routing tables into which
interface routes are imported, you create a routing table group and associate it with the
device’s interfaces.
To configure interface routes in NSM:
1. In the navigation tree, select Device Manager > Devices .
2. In the Devices list, double click the device to select it.
3. Click the Configuration tab.
1. Click the New button or select a
martian address and click the Edit
button.
2. Expand the Martian tree and select
Exact.
3. Enter the match criteria.
4. In the configuration tree, expand Routing Options.
5. Select Interface Routes.
6. Add or modify the parameters as specified in Table 52 on page 83.
7. Click one:
•
OK—To save the changes.
•
Cancel—To cancel the modifications.
•
Apply—To apply the routing option settings.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Specifies the routing table groups to
which interface routes are imported.
Configuring Instance Export (NSM Procedure)
Current configurations that use routing table groups define a policy to select routes in
an IGP export policy. However, no policy controls the export process itself. You can
configure the instance export policy to control the export process. The policy model
supports both interinstance route export and IGP export.
Enter a comment.Specifies the comment for the interface
1. Expand the Interface Routes tree and
select Family.
2. Click the New button or select a
family name and click the Edit
button.
3. Enter the family name and comment.
4. Set up the export policy and import
policy.
1. Expand the Interface Routes tree and
select Rib Group.
2. Enter the comment and Inet.
To configure an instance export policy in NSM:
1. In the navigation tree, select Device Manager > Devices .
2. In the Devices list, double click the device to select it.
3. Click the Configuration tab.
4. In the configuration tree, expand Routing Options.
5. Select Instance Export and specify the export policies for routes being exported from
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Configuring Instance Import (NSM Procedure)
You can apply one or more policies to routes being imported into a routing instance.
To configure instance import in NSM:
1. In the navigation tree, select Device Manager > Devices .
2. In the Devices list, double click the device to select it.
3. Click the Configuration tab.
4. In the configuration tree, expand Routing Options.
5. Select Instance Import and specify the import policies to be applied to the routes that
are imported to a routing instance.
6. Click one:
•
OK—To save the changes.
•
Cancel—To cancel the modifications.
•
Apply—To apply the routing option settings.
NOTE: After you make changes to a device configuration,you must push that
updateddevice configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the UpdatingDevices section in the Network and Security Manager Administration Guide for
more information.
Configuring Confederation (NSM Procedure)
Grouping autonomous systems (ASs) into confederations reduces the number of BGP
connections required to interconnect ASs. If you administer multiple ASs that contain
many BGP systems, you can group them into one or more confederations. Each
confederation is identified by its own AS number, which is called a confederation AS
number. To external ASs, a confederation appears to be a single AS. Thus, the internal
topology of the ASs (members) making up the confederation is hidden. Because each
confederation is treated as if it were a single AS, you can apply the same routing policy
to all the ASs that make up the confederation.