Junos Security Admin Guide
Junos Security Admin Guide
Junos Security Admin Guide
Administration Guide
Release 10.0
This product includes memory allocation software developed by Mark Moraes, copyright © 1988, 1989, 1993, University of Toronto.
This product includes FreeBSD software developed by the University of California, Berkeley, and its contributors. All of the documentation and software
included in the 4.4BSD and 4.4BSD-Lite Releases is copyrighted by the Regents of the University of California. Copyright © 1979, 1980, 1983, 1986, 1988,
1989, 1991, 1992, 1993, 1994. The Regents of the University of California. All rights reserved.
GateD software copyright © 1995, the Regents of the University. All rights reserved. Gate Daemon was originated and developed through release 3.0 by
Cornell University and its collaborators. Gated is based on Kirton’s EGP, UC Berkeley’s routing daemon (routed), and DCN’s HELLO routing protocol.
Development of Gated has been supported in part by the National Science Foundation. Portions of the GateD software copyright © 1988, Regents of the
University of California. All rights reserved. Portions of the GateD software copyright © 1991, D. L. S. Associates.
This product includes software developed by Maker Communications, Inc., copyright © 1996, 1997, Maker Communications, Inc.
Juniper Networks, the Juniper Networks logo, JUNOS, NetScreen, ScreenOS, and Steel-Belted Radius are registered trademarks of Juniper Networks, Inc. in
the United States and other countries. JUNOSe is a trademark of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or
registered service marks are the property of their respective owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or
otherwise revise this publication without notice.
Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed
to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347,
6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785.
Revision History
October 2009—Revision 01
The information in this document is current as of the date listed in the revision history.
Juniper Networks hardware and software products are Year 2000 compliant. The JUNOS Software has no known time-related limitations through the year
2038. However, the NTP application is known to have some difficulty in the year 2036.
SOFTWARE LICENSE
The terms and conditions for using this software are described in the software license contained in the acknowledgment to your purchase order or, to the
extent applicable, to any reseller agreement or end-user purchase agreement executed between you and Juniper Networks. By using this software, you
indicate that you understand and agree to be bound by those terms and conditions. Generally speaking, the software license restricts the manner in which
you are permitted to use the software and may contain prohibitions against certain uses. The software license may state conditions under which the license
is automatically terminated. You should consult the license for further details. For complete product documentation, please see the Juniper Networks website
at www.juniper.net/techpubs.
ii ■
END USER LICENSE AGREEMENT
READ THIS END USER LICENSE AGREEMENT (“AGREEMENT”) BEFORE DOWNLOADING, INSTALLING, OR USING THE SOFTWARE. BY DOWNLOADING,
INSTALLING, OR USING THE SOFTWARE OR OTHERWISE EXPRESSING YOUR AGREEMENT TO THE TERMS CONTAINED HEREIN, YOU (AS CUSTOMER
OR IF YOU ARE NOT THE CUSTOMER, AS A REPRESENTATIVE/AGENT AUTHORIZED TO BIND THE CUSTOMER) CONSENT TO BE BOUND BY THIS
AGREEMENT. IF YOU DO NOT OR CANNOT AGREE TO THE TERMS CONTAINED HEREIN, THEN (A) DO NOT DOWNLOAD, INSTALL, OR USE THE SOFTWARE,
AND (B) YOU MAY CONTACT JUNIPER NETWORKS REGARDING LICENSE TERMS.
1. The Parties. The parties to this Agreement are (i) Juniper Networks, Inc. (if the Customer’s principal office is located in the Americas) or Juniper Networks
(Cayman) Limited (if the Customer’s principal office is located outside the Americas) (such applicable entity being referred to herein as “Juniper”), and (ii)
the person or organization that originally purchased from Juniper or an authorized Juniper reseller the applicable license(s) for use of the Software (“Customer”)
(collectively, the “Parties”).
2. The Software. In this Agreement, “Software” means the program modules and features of the Juniper or Juniper-supplied software, for which Customer
has paid the applicable license or support fees to Juniper or an authorized Juniper reseller, or which was embedded by Juniper in equipment which Customer
purchased from Juniper or an authorized Juniper reseller. “Software” also includes updates, upgrades and new releases of such software. “Embedded
Software” means Software which Juniper has embedded in or loaded onto the Juniper equipment and any updates, upgrades, additions or replacements
which are subsequently embedded in or loaded onto the equipment.
3. License Grant. Subject to payment of the applicable fees and the limitations and restrictions set forth herein, Juniper grants to Customer a non-exclusive
and non-transferable license, without right to sublicense, to use the Software, in executable form only, subject to the following use restrictions:
a. Customer shall use Embedded Software solely as embedded in, and for execution on, Juniper equipment originally purchased by Customer from Juniper
or an authorized Juniper reseller.
b. Customer shall use the Software on a single hardware chassis having a single processing unit, or as many chassis or processing units for which Customer
has paid the applicable license fees; provided, however, with respect to the Steel-Belted Radius or Odyssey Access Client software only, Customer shall use
such Software on a single computer containing a single physical random access memory space and containing any number of processors. Use of the
Steel-Belted Radius or IMS AAA software on multiple computers or virtual machines (e.g., Solaris zones) requires multiple licenses, regardless of whether
such computers or virtualizations are physically contained on a single chassis.
c. Product purchase documents, paper or electronic user documentation, and/or the particular licenses purchased by Customer may specify limits to
Customer’s use of the Software. Such limits may restrict use to a maximum number of seats, registered endpoints, concurrent users, sessions, calls,
connections, subscribers, clusters, nodes, realms, devices, links, ports or transactions, or require the purchase of separate licenses to use particular features,
functionalities, services, applications, operations, or capabilities, or provide throughput, performance, configuration, bandwidth, interface, processing,
temporal, or geographical limits. In addition, such limits may restrict the use of the Software to managing certain kinds of networks or require the Software
to be used only in conjunction with other specific Software. Customer’s use of the Software shall be subject to all such limitations and purchase of all applicable
licenses.
d. For any trial copy of the Software, Customer’s right to use the Software expires 30 days after download, installation or use of the Software. Customer
may operate the Software after the 30-day trial period only if Customer pays for a license to do so. Customer may not extend or create an additional trial
period by re-installing the Software after the 30-day trial period.
e. The Global Enterprise Edition of the Steel-Belted Radius software may be used by Customer only to manage access to Customer’s enterprise network.
Specifically, service provider customers are expressly prohibited from using the Global Enterprise Edition of the Steel-Belted Radius software to support any
commercial network access services.
The foregoing license is not transferable or assignable by Customer. No license is granted herein to any user who did not originally purchase the applicable
license(s) for the Software from Juniper or an authorized Juniper reseller.
4. Use Prohibitions. Notwithstanding the foregoing, the license provided herein does not permit the Customer to, and Customer agrees not to and shall
not: (a) modify, unbundle, reverse engineer, or create derivative works based on the Software; (b) make unauthorized copies of the Software (except as
necessary for backup purposes); (c) rent, sell, transfer, or grant any rights in and to any copy of the Software, in any form, to any third party; (d) remove
any proprietary notices, labels, or marks on or in any copy of the Software or any product in which the Software is embedded; (e) distribute any copy of
the Software to any third party, including as may be embedded in Juniper equipment sold in the secondhand market; (f) use any ‘locked’ or key-restricted
feature, function, service, application, operation, or capability without first purchasing the applicable license(s) and obtaining a valid key from Juniper, even
if such feature, function, service, application, operation, or capability is enabled without a key; (g) distribute any key for the Software provided by Juniper
to any third party; (h) use the Software in any manner that extends or is broader than the uses purchased by Customer from Juniper or an authorized Juniper
reseller; (i) use Embedded Software on non-Juniper equipment; (j) use Embedded Software (or make it available for use) on Juniper equipment that the
Customer did not originally purchase from Juniper or an authorized Juniper reseller; (k) disclose the results of testing or benchmarking of the Software to
any third party without the prior written consent of Juniper; or (l) use the Software in any manner other than as expressly provided herein.
5. Audit. Customer shall maintain accurate records as necessary to verify compliance with this Agreement. Upon request by Juniper, Customer shall furnish
such records to Juniper and certify its compliance with this Agreement.
■ iii
6. Confidentiality. The Parties agree that aspects of the Software and associated documentation are the confidential property of Juniper. As such, Customer
shall exercise all reasonable commercial efforts to maintain the Software and associated documentation in confidence, which at a minimum includes
restricting access to the Software to Customer employees and contractors having a need to use the Software for Customer’s internal business purposes.
7. Ownership. Juniper and Juniper’s licensors, respectively, retain ownership of all right, title, and interest (including copyright) in and to the Software,
associated documentation, and all copies of the Software. Nothing in this Agreement constitutes a transfer or conveyance of any right, title, or interest in
the Software or associated documentation, or a sale of the Software, associated documentation, or copies of the Software.
8. Warranty, Limitation of Liability, Disclaimer of Warranty. The warranty applicable to the Software shall be as set forth in the warranty statement that
accompanies the Software (the “Warranty Statement”). Nothing in this Agreement shall give rise to any obligation to support the Software. Support services
may be purchased separately. Any such support shall be governed by a separate, written support services agreement. TO THE MAXIMUM EXTENT PERMITTED
BY LAW, JUNIPER SHALL NOT BE LIABLE FOR ANY LOST PROFITS, LOSS OF DATA, OR COSTS OR PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES,
OR FOR ANY SPECIAL, INDIRECT, OR CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, THE SOFTWARE, OR ANY JUNIPER OR
JUNIPER-SUPPLIED SOFTWARE. IN NO EVENT SHALL JUNIPER BE LIABLE FOR DAMAGES ARISING FROM UNAUTHORIZED OR IMPROPER USE OF ANY
JUNIPER OR JUNIPER-SUPPLIED SOFTWARE. EXCEPT AS EXPRESSLY PROVIDED IN THE WARRANTY STATEMENT TO THE EXTENT PERMITTED BY LAW,
JUNIPER DISCLAIMS ANY AND ALL WARRANTIES IN AND TO THE SOFTWARE (WHETHER EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE), INCLUDING
ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT DOES JUNIPER
WARRANT THAT THE SOFTWARE, OR ANY EQUIPMENT OR NETWORK RUNNING THE SOFTWARE, WILL OPERATE WITHOUT ERROR OR INTERRUPTION,
OR WILL BE FREE OF VULNERABILITY TO INTRUSION OR ATTACK. In no event shall Juniper’s or its suppliers’ or licensors’ liability to Customer, whether
in contract, tort (including negligence), breach of warranty, or otherwise, exceed the price paid by Customer for the Software that gave rise to the claim, or
if the Software is embedded in another Juniper product, the price paid by Customer for such other product. Customer acknowledges and agrees that Juniper
has set its prices and entered into this Agreement in reliance upon the disclaimers of warranty and the limitations of liability set forth herein, that the same
reflect an allocation of risk between the Parties (including the risk that a contract remedy may fail of its essential purpose and cause consequential loss),
and that the same form an essential basis of the bargain between the Parties.
9. Termination. Any breach of this Agreement or failure by Customer to pay any applicable fees due shall result in automatic termination of the license
granted herein. Upon such termination, Customer shall destroy or return to Juniper all copies of the Software and related documentation in Customer’s
possession or control.
10. Taxes. All license fees payable under this agreement are exclusive of tax. Customer shall be responsible for paying Taxes arising from the purchase of
the license, or importation or use of the Software. If applicable, valid exemption documentation for each taxing jurisdiction shall be provided to Juniper prior
to invoicing, and Customer shall promptly notify Juniper if their exemption is revoked or modified. All payments made by Customer shall be net of any
applicable withholding tax. Customer will provide reasonable assistance to Juniper in connection with such withholding taxes by promptly: providing Juniper
with valid tax receipts and other required documentation showing Customer’s payment of any withholding taxes; completing appropriate applications that
would reduce the amount of withholding tax to be paid; and notifying and assisting Juniper in any audit or tax proceeding related to transactions hereunder.
Customer shall comply with all applicable tax laws and regulations, and Customer will promptly pay or reimburse Juniper for all costs and damages related
to any liability incurred by Juniper as a result of Customer’s non-compliance or delay with its responsibilities herein. Customer’s obligations under this
Section shall survive termination or expiration of this Agreement.
11. Export. Customer agrees to comply with all applicable export laws and restrictions and regulations of any United States and any applicable foreign
agency or authority, and not to export or re-export the Software or any direct product thereof in violation of any such restrictions, laws or regulations, or
without all necessary approvals. Customer shall be liable for any such violations. The version of the Software supplied to Customer may contain encryption
or other capabilities restricting Customer’s ability to export the Software without an export license.
12. Commercial Computer Software. The Software is “commercial computer software” and is provided with restricted rights. Use, duplication, or disclosure
by the United States government is subject to restrictions set forth in this Agreement and as provided in DFARS 227.7201 through 227.7202-4, FAR 12.212,
FAR 27.405(b)(2), FAR 52.227-19, or FAR 52.227-14(ALT III) as applicable.
13. Interface Information. To the extent required by applicable law, and at Customer's written request, Juniper shall provide Customer with the interface
information needed to achieve interoperability between the Software and another independently created program, on payment of applicable fee, if any.
Customer shall observe strict obligations of confidentiality with respect to such information and shall use such information in compliance with any applicable
terms and conditions upon which Juniper makes such information available.
14. Third Party Software. Any licensor of Juniper whose software is embedded in the Software and any supplier of Juniper whose products or technology
are embedded in (or services are accessed by) the Software shall be a third party beneficiary with respect to this Agreement, and such licensor or vendor
shall have the right to enforce this Agreement in its own name as if it were Juniper. In addition, certain third party software may be provided with the
Software and is subject to the accompanying license(s), if any, of its respective owner(s). To the extent portions of the Software are distributed under and
subject to open source licenses obligating Juniper to make the source code for such portions publicly available (such as the GNU General Public License
(“GPL”) or the GNU Library General Public License (“LGPL”)), Juniper will make such source code portions (including Juniper modifications, as appropriate)
available upon request for a period of up to three years from the date of distribution. Such request can be made in writing to Juniper Networks, Inc., 1194
N. Mathilda Ave., Sunnyvale, CA 94089, ATTN: General Counsel. You may obtain a copy of the GPL at http://www.gnu.org/licenses/gpl.html, and
a copy of the LGPL at http://www.gnu.org/licenses/lgpl.html.
15. Miscellaneous. This Agreement shall be governed by the laws of the State of California without reference to its conflicts of laws principles. The provisions
of the U.N. Convention for the International Sale of Goods shall not apply to this Agreement. For any disputes arising under this Agreement, the Parties
hereby consent to the personal and exclusive jurisdiction of, and venue in, the state and federal courts within Santa Clara County, California. This Agreement
constitutes the entire and sole agreement between Juniper and the Customer with respect to the Software, and supersedes all prior and contemporaneous
iv ■
agreements relating to the Software, whether oral or written (including any inconsistent terms contained in a purchase order), except that the terms of a
separate written agreement executed by an authorized Juniper representative and Customer shall govern to the extent such terms are inconsistent or conflict
with terms contained herein. No modification to this Agreement nor any waiver of any rights hereunder shall be effective unless expressly assented to in
writing by the party to be charged. If any portion of this Agreement is held invalid, the Parties agree that such invalidity shall not affect the validity of the
remainder of this Agreement. This Agreement and associated documentation has been written in the English language, and the Parties agree that the English
version will govern. (For Canada: Les parties aux présentés confirment leur volonté que cette convention de même que tous les documents y compris tout
avis qui s'y rattaché, soient redigés en langue anglaise. (Translation: The parties confirm that this Agreement and all related documentation is and will be
in the English language)).
■ v
vi ■
Abbreviated Table of Contents
About This Guide xxi
Part 5 Index
Index 405
viii ■
Table of Contents
About This Guide xxi
Table of Contents ■ ix
JUNOS Software Administration Guide
x ■ Table of Contents
Table of Contents
Configuring Password Retry Limits for Telnet and SSH Access ......................44
Reverse Telnet ...............................................................................................45
Reverse Telnet Overview ........................................................................45
Reverse Telnet Options ....................................................................46
Reverse Telnet Restrictions ..............................................................46
Configuring Reverse Telnet and Reverse SSH .........................................46
CLI Configuration .............................................................................46
Table of Contents ■ xi
JUNOS Software Administration Guide
Table of Contents ■ xv
JUNOS Software Administration Guide
Part 5 Index
Index ...........................................................................................................405
xx ■ Table of Contents
About This Guide
This preface provides the following guidelines for using the JUNOS Software
Administration Guide:
■ J Series and SRX Series Documentation and Release Notes on page xxi
■ Objectives on page xxii
■ Audience on page xxii
■ Supported Routing Platforms on page xxii
■ How to Use This Manual on page xxii
■ Document Conventions on page xxiv
■ Documentation Feedback on page xxvi
■ Requesting Technical Support on page xxvi
If the information in the latest release notes differs from the information in the
documentation, follow the JUNOS Software Release Notes.
To obtain the most current version of all Juniper Networks® technical documentation,
see the product documentation page on the Juniper Networks website at
http://www.juniper.net/techpubs/.
Objectives
This guide contains instructions for managing users and operations, monitoring
network performance, upgrading software, and diagnosing common problems on J
Series Services Routers and SRX Series Services Gateways running JUNOS Software.
Audience
This manual is designed for anyone who installs, sets up, configures, monitors, or
administers a J Series Services Router or an SRX Series Services Gateway running
JUNOS Software. The manual is intended for the following audiences:
■ Customers with technical knowledge of and experience with networks and
network security, the Internet, and Internet routing protocols
■ Network administrators who install, configure, and manage Internet routers
Table 1 on page xxii identifies the tasks required to configure and manage these
devices and shows where to find task information and instructions.
Migration from ScreenOS or JUNOS Software (Legacy Services) to JUNOS Software (if necessary)
xxii ■ Objectives
About This Guide
■ Migrating from JUNOS Software (legacy services) JUNOS Software Migration Guide (J Series Services Routers only)
Release 8.3 or later to JUNOS Software
■ Migrating from ScreenOS Release 5.4 or later to JUNOS
Software.
Interface Configuration
Configuring device interfaces ■ JUNOS Software Interfaces and Routing Configuration Guide
■ JUNOS Software CLI Reference
Security Configuration
Configuring and managing the following security services: ■ JUNOS Software Security Configuration Guide
■ Stateful firewall policies ■ JUNOS Software CLI Reference
■ Zones and their interfaces and address books
■ IPsec VPNs
■ Firewall screens
■ Interface modes: Network Address Translation (NAT)
mode and Router mode
■ Public Key Cryptography (PKI)
■ Application Layer Gateways (ALGs)
■ Chassis clusters
■ Intrusion Detection and Prevention (IDP)
User Interfaces
■ Understanding and using the J-Web interface ■ J Series Services Routers Quick Start (J Series Services
■ Understanding and using the CLI configuration editor Routers only)
■ JUNOS Software Administration Guide
Document Conventions
Table 2 on page xxiv defines the notice icons used in this guide.
Caution Indicates a situation that might result in loss of data or hardware damage.
Laser warning Alerts you to the risk of personal injury from a laser.
Table 3 on page xxv defines the text and syntax conventions used in this guide.
Bold text like this Represents text that you type. To enter configuration mode, type the
configure command:
user@host> configure
Fixed-width text like this Represents output that appears on the user@host> show chassis alarms
terminal screen. No alarms currently active
Italic text like this ■ Introduces important new terms. ■ A policy term is a named structure
■ Identifies book names. that defines match conditions and
actions.
■ Identifies RFC and Internet draft
titles. ■ JUNOS System Basics Configuration
Guide
■ RFC 1997, BGP Communities
Attribute
Italic text like this Represents variables (options for which Configure the machine’s domain name:
you substitute a value) in commands or
configuration statements. [edit]
root@# set system domain-name
domain-name
Plain text like this Represents names of configuration ■ To configure a stub area, include
statements, commands, files, and the stub statement at the [edit
directories; IP addresses; configuration protocols ospf area area-id]
hierarchy levels; or labels on routing hierarchy level.
platform components. ■ The console port is labeled
CONSOLE.
< > (angle brackets) Enclose optional keywords or variables. stub <default-metric metric>;
# (pound sign) Indicates a comment specified on the rsvp { # Required for dynamic MPLS only
same line as the configuration statement
to which it applies.
[ ] (square brackets) Enclose a variable for which you can community name members [
substitute one or more values. community-ids ]
> (bold right angle bracket) Separates levels in a hierarchy of J-Web In the configuration editor hierarchy,
selections. select Protocols>Ospf.
Documentation Feedback
We encourage you to provide feedback, comments, and suggestions so that we can
improve the documentation. You can send your comments to
techpubs-comments@juniper.net, or fill out the documentation feedback form at
https://www.juniper.net/cgi-bin/docbugreport/. If you are using e-mail, be sure to include
the following information with your comments:
■ Document or topic name
■ URL or page number
■ Software release version (if applicable)
■ JTAC Hours of Operation —The JTAC centers have resources available 24 hours
a day, 7 days a week, 365 days a year.
To verify service entitlement by product serial number, use our Serial Number
Entitlement (SNE) Tool: https://tools.juniper.net/SerialNumberEntitlementSearch/
You can use two user interfaces to monitor, configure, troubleshoot, and manage
your device—the J-Web interface and the command-line interface (CLI) for JUNOS
Software.
NOTE: Other user interfaces facilitate the configuration of one or, in some cases,
many devices on the network through a common API. Among the supported interfaces
are the JUNOScope and Session and Resource Control (SRC) applications. For more
information about these products, see the JUNOScope Software User Guide and the
SRC-PE Getting Started Guide.
For information about which devices support the features documented in this chapter,
see the JUNOS Software Feature Support Reference for SRX Series and J Series Devices.
You can operate the device either in secure or router context. With the J-Web interface
and the command-line interface (CLI), you configure the routing protocols that run
on the device, and the device security features, including stateful firewall policies,
Network Address Translation (NAT) attack prevention screens, Application Layer
Gateways (ALGs), and IPSec VPNs. You also set the properties of its network interfaces.
After activating a software configuration, you can use either user interface to monitor
the system and the protocol traffic passing through the device, manage operations,
and diagnose protocol and network connectivity problems.
For information about secure and router contexts, see “Understanding Secure and
Router Contexts” on page 255.
J-Web Overview
The J-Web interface allows you to monitor, configure, troubleshoot, and manage
your device by means of a Web browser enabled with Hypertext Transfer Protocol
(HTTP) or HTTP over Secure Sockets Layer (HTTPS). J-Web provides access to all the
configuration statements supported by the device, so you can fully configure it without
using the CLI editor.
You can perform the following tasks with the J-Web interface:
■ Dashboard (SRX Series devices only) — Displays a high-level details of Chassis
View, system identification, resource utilization, security resources, system
alarms, file usage, login sessions, chassis status, and storage usage.
■ Monitoring — Displays the current configuration and information about the
system, interfaces, chassis, routing protocols, routing tables, routing policy filters,
and other features.
■ Configuring — View the current configurations at a glance, configure the device,
and manage configuration files. The J-Web interface provides the following
different configuration methods:
■ Configure the device quickly and easily without configuring each statement
individually.
■ Edit a graphical version of the JUNOS Software CLI configuration statements
and hierarchy.
The J-Web interface also allows you to manage configuration history and set a
rescue configuration.
■ Diagnosing—Diagnose routing problems by running the ping or traceroute
diagnostic tool. The diagnostic tools also allow you to capture and analyze control
traffic on the devices.
■ Managing — Manage log, temporary, and core (crash) files and schedule reboots
on your devices. You can also manage software packages and licenses and copy
a snapshot of the system software to a backup device.
■ Configuring and monitoring events — Filter and view system log messages that
record events occurring on the device. You can configure files to log system log
messages and also assign attributes, such as severity levels, to messages.
■ Configuring and monitoring alarms —Monitor and diagnose the device by
monitoring active alarms that alert you to the conditions on a network interface.
You can also set the conditions that trigger alarms on an interface.
For more information about the J-Web interface, see “Using the J-Web Interface” on
page 5.
CLI Overview
The CLI is a straightforward command interface in which you type commands on a
line and press Enter to execute them. The CLI provides command Help, command
completion, and Emacs-style keyboard sequences for moving around on the command
line and scrolling through a buffer of recently executed commands.
For more information about the CLI, see “Using the Command-Line Interface” on
page 8.
For more information about using the J-Web interface, see the J-Web Interface User
Guide.
To use HTTPS, you must have installed the certificate provided by the device.
NOTE: If the device is running the worldwide version of the JUNOS Software and
you are using the Microsoft Internet Explorer Web browser, you must disable the
Use SSL 3.0 option in the Web browser to access the device.
2. After typing http:// or https:// in your Web browser, type the hostname or IP
address of the device and press Enter.
To correct or change the username or password you typed, click Reset, type the
new entry or entries, and click Log In.
NOTE: The default username is root with no password. You must change this during
initial configuration or the system does not accept the configuration.
To explicitly terminate a J-Web session at any time, click Logout in the top pane.
J-Web Layout
The top pane of the J-Web user interface comprises the following elements:
■ hostname–model—The hostname and model of the device are displayed in the
upper-left corner.
■ Logged in as: username—The username you used to log in to the device is
displayed in the upper-left corner.
■ Help—A link to context-sensitive Help information is available in the upper-right
corner.
■ About—A link to information about the J-Web interface, such as the version
number, is available in the upper-right corner.
■ Logout—The Logout link, which ends your current login session and returns you
to the login page, is available in the upper-right corner.
■ Taskbar—A menu of J-Web tasks is displayed as tabs across the tob of the J-Web
user interface. Select a J-Web task to access it.
■ Dashboard— Displays the information of the system.
■ Configure—Configure the device and view configuration history.
The main pane of the J-Web user interface includes the following elements to help
you configure the device:
■ Red asterisk (*)—A red asterisk is displayed next to all required fields.
■ Help (?) icon—The Help icon displays useful information when you move the
cursor over the question mark. This Help displays field-specific information, such
as the definition, format, and valid range of the field.
The left pane of the J-Web user interface displays subtasks related to the selected
task in the J-Web taskbar.
J-Web Sessions
This section explains how J-Web sessions are established.
When you attempt to log in through the J-Web interface, the system authenticates
your username with the same methods used for Telnet and SSH.
The device can support multiple J-Web sessions for a single user who logs in to each
session. However, if a single user attempts to launch multiple J-Web windows—for
example, by right-clicking a link to launch another instance of a Web browser—the
session can have unpredictable results.
If the device does not detect any activity through the J-Web interface for 15 minutes,
the session times out and is terminated. You must log in again to begin a new session.
To explicitly terminate a J-Web session at any time, click Logout in the top pane.
J-Web Sessions ■ 7
JUNOS Software Administration Guide
For more information about the CLI, see the JUNOS CLI User Guide.
To execute a command, you enter the full command name, starting at the top level
of the hierarchy. For example, to display a brief view of the routes in the routing
table, use the command show route brief.
The hierarchical organization results in commands that have a regular syntax and
provides the following features that simplify CLI use:
■ Consistent command names—Commands that provide the same type of function
have the same name, regardless of the portion of the software they are operating
on. For example, all show commands display software information and statistics,
and all clear commands erase various types of system information.
■ Lists and short descriptions of available commands—Information about available
commands is provided at each level of the CLI command hierarchy. If you type
a question mark (?) at any level, you see a list of the available commands along
with a short description of each command.
■ Command completion—Command completion for command names (keywords)
and command options is also available at each level of the hierarchy. If you type
% cli
user@host>
The presence of the angle bracket (>) prompt indicates the CLI has started. By
default, the prompt is preceded by a string that contains your username and the
hostname of the router.
To exit the CLI and return to the UNIX shell, enter the quit command.
To view a list of top-level operational mode commands, type a question mark (?) at
the command-line prompt.
user@host> ?
Possible completions:
clear Clear information in the system
configure Manipulate software configuration information
file Perform file operations
help Provide help information
monitor Show real-time debugging information
mtrace Trace multicast path from source to receiver
ping Ping remote target
quit Exit the management session
request Make system-level requests
At the top level of operational mode are a number of broad groups of CLI commands
that are used to perform the following functions:
■ Control the CLI environment.
■ Monitor and troubleshoot the device.
■ Connect to other systems.
■ Manage files and software images.
■ Control software processes.
■ Stop and reboot the device.
■ Enter configuration mode.
To control the CLI environment, see “Configuring the CLI Environment” on page 14.
To enter configuration mode, see “CLI Configuration Mode” on page 10. For
information about the other CLI operational mode functions, see the JUNOS Software
Administration Guide.
You enter configuration mode by entering the configure operational mode command.
The CLI prompt changes from user@host> to user@host#.
To view a list of configuration mode commands, type a question mark (?) at the
command-line prompt. (You do not need to press Enter after typing the question
mark.)
user@host# ?
Possible completions:
Enter Execute this command
activate Remove the inactive tag from a statement
annotate Annotate the statement with a comment
commit Commit current set of changes
copy Copy a statement
deactivate Add the inactive tag to a statement
delete Delete a data element
edit Edit a sub-element
exit Exit from this level
Each statement consists of a fixed keyword and, optionally, an identifier that you
define, such as the name of an interface or a username.
CLI Basics
This section contains the following topics:
■ Editing Keystrokes on page 11
■ Command Completion on page 12
■ Online Help on page 13
■ Configuring the CLI Environment on page 14
Editing Keystrokes
In the CLI, you use keystrokes to move around on and edit the command line, and
to scroll through a list of recently executed commands. Table 4 on page 12 lists some
typical CLI editing tasks and the keystrokes that perform them.
Move the cursor. Move the cursor back one character. Ctrl-b
Delete characters. Delete the character before the cursor. Ctrl-h, Delete, or Backspace
Insert recently deleted text. Insert the most recently deleted text at the cursor. Ctrl-y
Display previous command lines. Scroll backward through the list of recently executed Ctrl-p
commands.
Repeat keyboard sequences. Specify the number of times to execute a keyboard Esc number sequence
sequence. Replace number with a number from 1
through 9, and replace sequence with a keyboard
sequence in this table.
Command Completion
You do not always have to remember or type the full command or option name for
the CLI to recognize it. To display all possible command or option completions, type
the partial command followed immediately by a question mark (?).
To complete a command or option that you have partially typed, press Tab or
Spacebar. If the partially typed letters uniquely identify a command, the complete
command name appears. Otherwise, a message indicates that your entry is ambiguous
or invalid. Possible command completions are displayed if your entry is ambiguous.
You can also use command completion on filenames and usernames. To display all
possible values, type one or more characters followed immediately by a question
mark. To complete these partial entries, press Tab only. Pressing Spacebar does not
work.
Online Help
The CLI provides context-sensitive Help at every level of the command hierarchy.
The Help information tells you which commands are available at the current level in
the hierarchy and provides a brief description of each.
To get Help while in the CLI, type a question mark (?) in one of the following ways:
■ Type a question mark at the command-line prompt. The CLI lists the available
commands and options. For examples, see “CLI Operational Mode” on page 9
and “CLI Configuration Mode” on page 10.
■ Type a question mark after entering the complete name of a command or
command option. The CLI lists the available commands and options, then
redisplays the command names and options that you typed:
■ Type a question mark in the middle of a command name. The CLI lists possible
command completions that match the letters you have entered so far, then
redisplays the letters that you typed. For example, to list all operational mode
commands that start with the letter s, type the following:
user@host> s?
Possible completions:
set Set CLI properties, date/time, craft interface message
show Show system information
ssh Start secure shell on another host
start Start shell
When you enter the help commands described in Table 5 on page 14, the CLI displays
usage guidelines and summary information for configuration statements and
operational mode commands. You can enter help commands in operational or
configuration mode.
help apropos string Displays Help based on a text string contained in a statement or command name.
If the string contains spaces, enclose it in quotation marks. You also can specify
a regular expression for the string, using standard UNIX-style regular expression
syntax.
In configuration mode, this command displays statement names and Help text
that match the string specified.
For example, to get a list of statements that contain the string traps, enter the
help apropos traps command in configuration mode.
For example, to display summary information for the OSPF hello interval, enter
the command help reference ospf hello-interval.
NOTE: In some cases, multiple Help topics are available for the same configuration
statement. When an existing JUNOS statement has been modified for JUNOS
Software, two help commands are available—one describing the original JUNOS
statement and another describing the updates to that statement for JUNOS
Software. To view the Help topic that describes the modifications made for JUNOS
Software, enter the help command that contains the string junos-es. For example,
to view Help for the access profile profile-name authentication-order statement,
enter help reference access authentication-order-junos-es.
For example, to display usage guidelines for the OSPF hello interval, enter the
command help topic ospf hello-interval.
You can configure the CLI environment for your current login session. Your settings
are not retained when you exit the CLI.
To display the current CLI settings, enter the show cli command:
To change the CLI environment, use the set cli operational mode command:
Table 6 on page 15 shows how you can change the CLI environment features.
Command set cli on—Pressing Tab or Spacebar ■ Set off to allow only Tab for
completion complete-on-space completes a command. command completion.
(on | off) ■ Set on to re-enable Tab and
Spacebar for command
completion.
Your working set cli directory path8 /cf/var/home/remote Replace path with the directory you want
directory to enter when you log in to the device.
Minutes of idle time set cli idle-time Your session never times out unless ■ To enable the timeout feature,
minutes your login class specifies a timeout. replace timeout with a value
between 1 and 100,000.
■ To disable the timeout feature,
replace timeout with 0.
Your session prompt set cli prompt string user@host> Replace string with the prompt you
want. If the prompt contains spaces or
special characters, enclose string in
quotation marks (“ “).
Restart-after-upgrade set cli CLI prompts you to restart the device ■ Set off to disable the prompt for the
prompt restart-on-upgrade after a software upgrade. session.
(on | off) ■ Set on to reenable the prompt.
Number of CLI set cli screen-length Variable (depends on terminal type). ■ To change the number of lines
output line displayed length displayed on the screen, replace
at once length with a value between 1 and
100,000.
■ To disable the display of a set
number of lines, replace length
with 0. (This feature can be useful
when you are issuing CLI
commands from scripts.)
Number of CLI set cli screen-width Variable (depends on terminal type). To change the number of characters
characters displayed width displayed on a line, replace width with
on a line a value between 0 and 100,000.
Your terminal type. set cli terminal unknown, or set by console. Replace terminal-type with one of the
terminal-type following values:
■ ansi
■ vt100
■ small-xterm
■ xterm
You can manage a Juniper Networks device remotely through the J-Web interface.
To communicate with the device, the J-Web interface uses Hypertext Transfer Protocol
(HTTP). HTTP allows easy Web access but no encryption. The data that is transmitted
between the Web browser and the device by means of HTTP is vulnerable to
interception and attack. To enable secure Web access, the Juniper Networks devices
support Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS). You can
enable HTTP or HTTPS access on specific interfaces and ports as needed.
You can use J-Web Quick Configuration, the J-Web configuration editor, or the CLI
configuration editor to configure secure Web access.
For more information about the J-Web interface, see the J-Web Interface User Guide.
For information about which devices support the features documented in this chapter,
see the JUNOS Software Feature Support Reference for SRX Series and J Series Devices.
Term Definition
certificate authority (CA) Third-party organization or company that issues digital certificates used to create
digital signatures and public-private key pairs. The CA guarantees the identity of the
individual or device that presents the digital certificate.
Term Definition
Hypertext Transfer Protocol used to publish and receive information on the Web, such as text and graphics
Protocol (HTTP) files.
Hypertext Transfer Protocol similar to HTTP with an added encryption layer that encrypts and decrypts
Protocol over Secure user page requests and pages that are returned by a Web server. HTTPS is used for
Sockets Layer (HTTPS) secure communication, such as payment transactions.
Privacy-Enhanced Mail Technique for securely exchanging electronic mail over a public medium. PEM is based
(PEM) upon public key infrastructure (PKI) standards like X.509 certificates. SSL certificates
are partly based on PEM and end in the suffix .pem.
RSA Public key cipher that can be used for encrypting messages and making digital
signatures. RSA uses a well-known encryption and authentication algorithm that is a
part of popular Web browsers.
Secure Sockets Layer (SSL) Protocol that encrypts security information before transmitting data across a network.
SSL requires two keys to encrypt data—a public key known to everyone and a private
or secret key known only to the recipient of the message—and an authentication
certificate. Most popular Web browsers support SSL.
SSL certificate Secure electronic identifier conforming to the X.509 standard, definitively identifying
an individual, system, company, or organization. In addition to identification data,
the digital certificate contains a serial number, a copy of the certificate holder’s public
key, the identity and digital signature of the issuing certificate authority (CA), and an
expiration date.
An SSL certificate includes identifying information such as a public key and a signature
made by a certificate authority (CA). When you access the device through HTTPS,
an SSL handshake authenticates the server and the client and begins a secure session.
If the information does not match or the certificate has expired, you are not able to
access the device through HTTPS.
Without SSL encryption, communication between your device and the browser is
sent in the open and can be intercepted. We recommend that you enable HTTPS
access on your WAN interfaces.
■ Establish basic connectivity. See the Getting Started Guide for your device.
■ Obtain an SSL certificate from a trusted signing authority. See “Generating SSL
Certificates” on page 19.
Replace filename with the name of a file in which you want the SSL certificate
to be written—for example, new.pem.
2. When prompted, type the appropriate information in the identification form.
For example, type US for the country name.
3. Display the contents of the file new.pem.
cat new.pem
Copy the contents of this file for installing the SSL certificate.
You can use either J-Web Quick Configuration or a configuration editor to install the
SSL certificate and enable HTTPS.
7. If you want users to connect to device interfaces over a secure HTTPS connection,
select Enable HTTPS. Then select which certificate you want to use to secure
the connection from the HTTPS certificates list and specify the interfaces that
should use the HTTPS connection:
■ Enable on all interfaces—Select this option if you want to enable HTTPS
on all device interfaces.
■ Selected interfaces—Use the arrow buttons to populate this list with
individual interfaces if you want to enable HTTPS on only some of the device
interfaces.
To verify that Web access is enabled correctly, connect to the device using one of
the following methods:
■ For HTTP access—In your Web browser, type http://URL or http://IP address.
■ For HTTPS access—In your Web browser, type https://URL or https://IP address.
■ For SSL JUNOScript access—A JUNOScript client such as JUNOScope is required.
For information about how to log in to JUNOScope, see the JUNOScope Software
User Guide.
You can use the Certificates tab to upload SSL certificates to the device, edit existing
certificates on the device, or delete certificates from the device. You can use the
certificates to secure HTTPS and JUNOScript sessions. (For information about how
to generate an SSL certificate to upload to the device, see “Generating SSL Certificates”
on page 19.)
■ If you want to delete an existing certificate, select it and click Delete. (You
can skip the remaining steps in this section.)
7. Click Save.
8. Click OK to save the configuration or Cancel to clear it.
Navigate to the Security 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
level in the configuration Tools>Point and Click CLI.
hierarchy. edit security
2. Next to Security, click Configure or Edit.
Enable HTTPS access and 1. On the main Configuration page next to From the [edit system] hierarchy level, enter
specify the SSL certificate System, click Configure or Edit.
to be used for set services web-management https
authentication. 2. Select the Services check box and click
local-certificate new port 8443
Edit next to it.
Specify the port on which 3. Next to Web management, click Edit.
HTTPS access is to be
enabled—for example, TCP 4. Select the Https check box and click Edit
port 8443. next to it.
5. In the Local certificate box, type the name
NOTE: You can enable
of the certificate—for example, new.
HTTPS access on specified
interfaces also. If you 6. In the Port box, type 8443.
enable HTTPS without
specifying an interface, 7. Click OK.
HTTPS is enabled on all
interfaces.
Action From the J-Web interface, select CLI Tools>CLI Viewer. Alternatively, from
configuration mode in the CLI, enter the show security command.
The following sample output displays an SSL certificate generated with instructions
in “Generating SSL Certificates” on page 19:
[edit]
user@R0# show security
certificates {
local {
new {
"-----BEGIN RSA PRIVATE KEY-----\nMIICXQIBAAKBgQC/C5UI4frNqbi
qPwbTiOkJvqoDw2YgYse0Z5zzVJyErgSg954T\nEuHM67Ck8hAOrCnb0YO+SY
Y5rCXLf4+2s8k9EypLtYRw/Ts66DZoXI4viqE7HSsK\n5sQw/UDBIw7/MJ+OpA
... KYiFf4CbBBbjlMQJ0HFudW6ISVBslONkzX+FT\ni95ddka6iIRnArEb4VFCRh+
e1QBdp1UjziYf7NuzDx4Z\n -----END RSA PRIVATE KEY-----\n-----BEGIN
CERTIFICATE----- \nMIIDjDCCAvWgAwIBAgIBADANBgkqhkiG9w0BAQQ ...
FADCBkTELMAkGA1UEBhMCdXMx\nCzAJBgNVBAgTAmNhMRIwEAYDVQQHEwlzdW5ue
HB1YnMxDTALBgNVBAMTBGpucHIxJDAiBgkqhkiG\n9w0BCQEWFW5iaGFyZ2F2YUB
fLUYAnBYmsYWOH\n -----END CERTIFICATE-----\n"; ## SECRET-DATA
}
}
}
Related Topics For more information about the format of a configuration file, see the JUNOS Software
Interfaces and Routing Configuration Guide.
Action From the J-Web interface, select CLI Tools>CLI Viewer. Alternatively, from
configuration mode in the CLI, enter the show system services command.
The following sample output displays the sample values for secure Web access as
configured in Table 8 on page 22:
[edit]
Related Topics For more information about the format of a configuration file, see the JUNOS Software
Interfaces and Routing Configuration Guide.
You can use either J-Web Quick Configuration or a configuration editor to manage
system functions, including RADIUS and TACACS+ servers, and user login accounts.
For more information about system management, see the JUNOS System Basics
Configuration Guide.
For information about which devices support the features documented in this chapter,
see the JUNOS Software Feature Support Reference for SRX Series and J Series Devices.
Term Definition
Remote Authentication Dial-In User Authentication method for validating users who attempt to access one or more
Service (RADIUS) services routers by means of Telnet. RADIUS is a multivendor IETF standard
whose features are more widely accepted than those of TACACS+ or other
proprietary systems. All one-time-password system vendors support RADIUS.
Terminal Access Controller Access Authentication method for validating users who attempt to access one or more
Control System Plus (TACACS+) services routers by means of Telnet.
User Authentication
JUNOS Software supports three methods of user authentication: local password
authentication, Remote Authentication Dial-In User Service (RADIUS), and Terminal
Access Controller Access Control System Plus (TACACS+).
With local password authentication, you configure a password for each user allowed
to log into the
RADIUS and TACACS+ are authentication methods for validating users who attempt
to access the device using Telnet. Both are distributed client/server systems—the
RADIUS and TACACS+ clients run on the device, and the server runs on a remote
network system.
You can configure the device to use RADIUS or TACACS+ authentication, or both,
to validate users who attempt to access the device. If you set up both authentication
methods, you also can configure which the device will try first.
User Accounts
User accounts provide one way for users to access the services router. Users can
access the device without accounts if you configured RADIUS or TACACS+ servers,
as described in “Managing User Authentication” on page 30 and “Managing User
Authentication with a Configuration Editor” on page 32. After you have created an
account, the device creates a home directory for the user. An account for the user
root is always present in the configuration. For information about configuring the
password for the user root, see the JUNOS Software Administration Guide. For each
user account, you can define the following:
■ Username—Name that identifies the user. It must be unique within the device.
Do not include spaces, colons, or commas in the username.
■ User's full name—If the full name contains spaces, enclose it in quotation marks
(“ ”). Do not include colons or commas.
■ User identifier (UID)—Numeric identifier that is associated with the user account
name. The identifier must be in the range 100 through 64000 and must be unique
within the device. If you do not assign a UID to a username, the software assigns
one when you commit the configuration, preferring the lowest available number.
■ User's access privilege—You can create login classes with specific permission
bits or use one of the default classes listed in Table 10 on page 27.
■ Authentication method or methods and passwords that the user can use to access
the device—You can use SSH or an MD5 password, or you can enter a plain-text
password that JUNOS Software encrypts using MD5-style encryption before
entering it in the password database. If you configure the plain-text-password
option, you are prompted to enter and confirm the password.
Login Classes
All users who log into the services router must be in a login class. You can define
any number of login classes. You then apply one login class to an individual user
account. With login classes, you define the following:
■ Access privileges users have when they are logged into the device. For more
information, see “Permission Bits” on page 27.
■ Commands and statements that users can and cannot specify. For more
information, see “Denying or Allowing Individual Commands” on page 29.
■ How long a login session can be idle before it times out and the user is logged
off.
The software contains a few predefined login classes, which are listed in Table 10
on page 27. The predefined login classes cannot be modified.
read-only view
unauthorized None
Permission Bits
those commands and configure and view only those statements for which they have
access privileges. The access privileges for each login class are defined by one or
more permission bits (see Table 11 on page 28).
Two forms for the permissions control the individual parts of the configuration:
■ "Plain" form—Provides read-only capability for that permission type. An example
is interface.
■ Form that ends in -control—Provides read and write capability for that permission
type. An example is interface-control.
admin Can view user account information in configuration mode and with the show configuration
command.
admin-control Can view user accounts and configure them (at the [edit system login] hierarchy level).
access Can view the access configuration in configuration mode and with the show configuration
operational mode command.
access-control Can view and configure access information (at the [edit access] hierarchy level).
clear Can clear (delete) information learned from the network that is stored in various network
databases (using the clear commands).
configure Can enter configuration mode (using the configure command) and commit configurations
(using the commit command).
control Can perform all control-level operations (all operations configured with the -control
permission bits).
firewall-control Can view and configure firewall filter information (at the [edit firewall] hierarchy level).
interface Can view the interface configuration in configuration mode and with the show
configuration operational mode command.
interface-control Can view chassis, class of service, groups, forwarding options, and interfaces
configuration information. Can configure chassis, class of service, groups, forwarding
options, and interfaces (at the [edit] hierarchy).
maintenance Can perform system maintenance, including starting a local shell on the device and
becoming the superuser in the shell (by issuing the su root command), and can halt and
reboot the device (using the request system commands).
network Can access the network by entering the ping, ssh, telnet, and traceroute commands.
reset Can restart software processes using the restart command and can configure whether
software processes are enabled or disabled (at the [edit system processes] hierarchy
level).
rollback Can use the rollback command to return to a previously committed configuration other
than the most recently committed one.
routing Can view general routing, routing protocol, and routing policy configuration information
in configuration and operational modes.
routing-control Can view general routing, routing protocol, and routing policy configuration information
and configure general routing (at the [edit routing-options] hierarchy level), routing
protocols (at the [edit protocols] hierarchy level), and routing policy (at the [edit
policy-options] hierarchy level).
secret Can view passwords and other authentication keys in the configuration.
secret-control Can view passwords and other authentication keys in the configuration and can modify
them in configuration mode.
security Can view security configuration in configuration mode and with the show configuration
operational mode command.
security-control Can view and configure security information (at the [edit security] hierarchy level).
shell Can start a local shell on the device by entering the start shell command.
snmp Can view SNMP configuration information in configuration and operational modes.
snmp-control Can view SNMP configuration information and configure SNMP (at the [edit snmp]
hierarchy level).
system-control Can view system-level configuration information and configure it (at the [edit system]
hierarchy level).
trace Can view trace file settings in configuration and operational modes.
trace-control Can view trace file settings and configure trace file properties.
view Can use various commands to display current systemwide, routing table, and
protocol-specific values and statistics.
By default, all top-level CLI commands have associated access privilege levels. Users
can execute only those commands and view only those statements for which they
have access privileges. For each login class, you can explicitly deny or allow the use
of operational and configuration mode commands that are otherwise permitted or
not allowed by a permission bit.
Template Accounts
You use local user template accounts when you need different types of templates.
Each template can define a different set of permissions appropriate for the group of
users who use that template. These templates are defined locally on the services
router and referenced by the TACACS+ and RADIUS authentication servers.
When you configure local user templates and a user logs in, JUNOS Software issues
a request to the authentication server to authenticate the user's login name. If a user
is authenticated, the server returns the local username to the device, which then
determines whether a local username is specified for that login name (local-username
for TACACS+, Juniper-Local-User for RADIUS). If so, the device selects the appropriate
local user template locally configured on the device. If a local user template does not
exist for the authenticated user, the device defaults to the remote template.
8. In the Source Address field, enter the source IP address of the server.
9. In the Retry Attempts field, specify the number of times that the server should
try to verify the user’s credentials.
10. In the Time Out field, specify the amount of time (in seconds) the device should
wait for a response from the server.
11. Click OK.
If you do not configure system authentication, users are verified based on their
configured local passwords.
■ Local Password
If you want to use multiple methods to authenticate users, repeat this step to
add the additional methods to the Selected Methods list.
5. Under Selected Methods, use the up and down arrows to specify the order in
which the device should execute the authentication methods.
6. Click OK.
To configure users:
1. In the J-Web interface, select Configure>System Properties>User Management.
2. Click Edit. The Edit User Management dialog box appears.
If the full name contains spaces, enclose it in quotation marks. Do not include
colons or commas.
8. In the Password and Confirm Password fields, enter a login password for the
user and verify your entry. The login password must meet the following criteria:
■ The password must be at least 6 characters long.
■ You can include most character classes in a password (alphabetic, numeric,
and special characters), except control characters.
■ The password must contain at least one change of case or character class.
9. From the Login Class list, select the user’s access privilege:
■ operator
■ read-only
■ unauthorized
This list also includes any user-defined login classes. For more information, see
“Login Classes” on page 27.
10. Click OK in the Add User dialog box and Edit User Management dialog box.
The procedure provided in this section identifies the RADIUS server, specifies the
secret (password) of the RADIUS server, and sets the source address of the services
router's RADIUS requests to the loopback address of the device. The procedure uses
the following sample values:
■ The RADIUS server's IP address is 172.16.98.1.
■ The RADIUS server's secret is Radiussecret1.
■ The loopback address of the device is 10.0.0.1.
Navigate to the System level in the 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
configuration hierarchy. Tools>Point and Click CLI.
edit system
2. Next to System, click Configure or
Edit.
Add a new RADIUS server 1. In the Radius server box, click Add Set the IP address of the RADIUS
new entry. server:
2. In the Address box, type the IP
set radius-server address 172.16.98.1
address of the RADIUS server:
172.16.98.1
Specify the shared secret (password) of In the Secret box, type the shared secret Set the shared secret of the RADIUS
the RADIUS server. The secret is stored of the RADIUS server: server:
as an encrypted value in the
configuration database. Radiussecret1 set radius-server 172.16.98.1 secret
Radiussecret1
Specify the source address to be included In the Source address box, type the Set the device's loopback address as
in the RADIUS server requests by the loopback address of the device: the source address:
device. In most cases, you can use the
loopback address of the device. 10.0.0.1 set radius-server 172.16.98.1
source-address 10.0.0.1
The procedure provided in this section identifies the TACACS+ server, specifies the
secret (password) of the TACACS+ server, and sets the source address of the services
router's TACACS+ requests to the loopback address of the device. This procedure
uses the following sample values:
■ The TACACS+ server's IP address is 172.16.98.24.
■ The TACACS+ server's secret is Tacacssecret1.
■ The loopback address of the device is 10.0.0.1.
Navigate to the System level in the 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
configuration hierarchy. Tools>Point and Click CLI.
edit system
2. Next to System, click Configure or
Edit.
Add a new TACACS+ server 1. In the Tacplus server box, click Add Set the IP address of the TACACS+
new entry. server:
2. In the Address box, type the IP
set tacplus-server address
address of the TACACS+ server:
172.16.98.24
172.16.98.24
Specify the shared secret (password) of In the Secret box, type the shared secret Set the shared secret of the TACACS+
the TACACS+ server. The secret is of the TACACS+ server: server:
stored as an encrypted value in the
configuration database. Tacacssecret1 set tacplus-server 172.16.98.24 secret
Tacacssecret1
Specify the source address to be included In the Source address box, type the Set the device's loopback address as
in the TACACS+ server requests by the loopback address of the device: the source address:
device. In most cases, you can use the
loopback address of the device. 10.0.0.1 set tacplus-server 172.16.98.24
source-address 10.0.0.1
Navigate to the System level in 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
the configuration hierarchy. Tools>Point and Click CLI.
edit system
2. Next to System, click Configure or Edit.
Add RADIUS authentication to the 1. In the Authentication order box, click Insert the radius statement in the
authentication order. Add new entry. authentication order:
2. In the list, select radius.
insert system authentication-order radius
3. Click OK. after password
Add TACACS+ authentication to 1. In the Authentication Order box, click Insert the tacplus statement in the
the authentication order. Add new entry. authentication order:
2. In the list, select tacplus.
insert system authentication-order tacplus
3. Click OK. after radius
You can define any number of login classes. You then apply one login class to an
individual user account, as described in “Creating User Accounts” on page 38 and
“Setting Up Template Accounts” on page 39.
The procedure provided in this section creates a sample login class named
operator-and-boot with the following privileges:
■ The operator-and-boot login class can reboot the services router using the request
system reboot command.
■ The operator-and-boot login class can also use commands defined in the clear,
network, reset, trace, and view permission bits. For more information, see
“Permission Bits” on page 27.
Navigate to the System 1. In the J-Web interface, select CLI Tools>Point and From the [edit] hierarchy level,
Login level in the Click CLI. enter
configuration hierarchy.
2. Next to System, click Configure or Edit.
edit system login
3. Next to Login, click Configure or Edit.
Create a login class named 1. Next to Class, click Add new entry. Set the name of the login class and
operator-and-boot with the the ability to use the request system
ability to reboot the device. 2. Type the name of the login class:
reboot command:
operator-and-boot
set class operator-and-boot
3. In the Allow commands box, type the request system allow-commands “request system
reboot command enclosed in quotation marks: reboot”
4. Click OK.
Give the operator-and-boot 1. Next to Permissions, click Add new entry. Set the permission bits for the
login class operator operator-and-boot login class:
privileges. 2. In the Value list, select clear.
3. Click OK. set class operator-and-boot
permissions [clear network reset
4. Next to Permissions, click Add new entry. trace view]
5. In the Value list, select network.
6. Click OK.
7. Next to Permissions, click Add new entry.
8. In the Value list, select reset.
9. Click OK.
10. Next to Permissions, click Add new entry.
11. In the Value list, select trace.
12. Click OK.
13. Next to Permissions, click Add new entry.
14. In the Value list, select view.
15. Click OK.
User accounts provide one way for users to access the services router. (Users can
access the router without accounts if you configured RADIUS or TACACS+ servers,
as described in “Setting Up RADIUS Authentication” on page 32 and “Setting Up
TACACS+ Authentication” on page 34.)
The procedure provided in this section creates a sample user named cmartin with
the following characteristics:
■ The user cmartin belongs to the superuser login class.
■ The user cmartin uses an encrypted password, $1$14c5.$sBopasdFFdssdfFFdsdfs0.
Navigate to the System Login level in 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
the configuration hierarchy. Tools>Point and Click CLI.
edit system login
2. Next to System, click Configure or
Edit.
3. Next to Login, click Configure or
Edit.
Create a user named cmartin who 1. Next to User, click Add new entry. Set the username and the login class for
belongs to the superuser login class. the user:
2. In the User name box, type cmartin.
3. In the Class box, type superuser. set user cmartin class superuser
4. Click OK.
Define the encrypted password for 1. Next to Authentication, click Set the encrypted password for cmartin.
cmartin. Configure.
set user cmartin authentication
2. In the Encrypted password box,
encrypted-password
type
$1$14c5.$sBopasdFFdssdfFFdsdfs0
$1$14c5.$sBopasdFFdssdfFFdsdfs0
3. Click OK.
You can create a remote template that is applied to users authenticated by RADIUS
or TACACS+ that do not belong to a local template account.
The procedure provided in this section creates a sample user named remote that
belongs to the operator login class.
Navigate to the System Login level 1. In the J-Web interface, select CLI Tools>Point From the [edit] hierarchy level, enter
in the configuration hierarchy. and Click CLI.
edit system login
2. Next to System, click Configure or Edit.
3. Next to Login, click Configure or Edit.
Create a user named remote who 1. Next to User, click Add new entry. Set the username and the login
belongs to the operator login class. class for the user:
2. In the User name box, type remote.
3. In the Class box, type operator. set user remote class operator
4. Click OK.
You can create a local template that is applied to users authenticated by RADIUS or
TACACS+ that are assigned to the local template account. You use local template
accounts when you need different types of templates. Each template can define a
different set of permissions appropriate for the group of users who use that template.
The procedure provided in this section creates a sample user named admin that
belongs to the superuser login class.
Navigate to the System Login level 1. In the J-Web interface, select CLI Tools>Point From the [edit] hierarchy level, enter
in the configuration hierarchy. and Click CLI.
edit system login
2. Next to System, click Configure or Edit.
3. Next to Login, click Configure or Edit.
Create a user named admin who 1. Next to User, click Add new entry. Set the username and the login
belongs to the superuser login class for the user:
class. 2. In the User name box, type admin.
3. In the Class box, type superuser. set user admin class superuser
4. Click OK.
■ Disable the console port. We recommend disabling the console port to prevent
unauthorized access to the device, especially when the device is used as customer
premises equipment (CPE).
Navigate to the 1. In the J-Web interface, select CLI Tools>Point From the [edit] hierarchy level, enter
Console level in the and Click CLI.
configuration edit system ports console
hierarchy. 2. Next to System, click Configure or Edit.
3. Next to Ports, click Configure or Edit.
4. Next to Console, click Configure or Edit.
Secure the console 1. Select one of the following check boxes: Do one of the following:
port.
■ Disable—Console port is disabled. ■ To disable the console port, enter
■ Insecure—Root login connections to the set disable
console are disabled. ■ To disable root login connections to the
■ Log out on disconnect—Logs out the console, enter
console session when the serial cable set insecure
connected to the console port is unplugged. ■ To log out the console session when the
2. Click OK. serial cable connected to the console
port is unplugged, enter
set log-out-on-disconnect
To escape from the Telnet session to the Telnet command prompt, press Ctrl-]. To
exit from the Telnet session and return to the CLI command prompt, enter quit.
Table 20 on page 43 describes the telnet command options. For more information,
see the JUNOS System Basics and Services Command Reference.
Option Description
bypass-routing Bypass the routing tables and open a Telnet session only to hosts on directly attached
interfaces. If the host is not on a directly attached interface, an error message is
returned.
interface source-interface Open a Telnet session to a host on the specified interface. If you do not include this
option, all interfaces are used.
port port Specify the port number or service name on the host.
routing-instance routing-instance-name Use the specified routing instance for the Telnet session.
source address Use the specified source address for the Telnet session.
Table 21 on page 43 describes the ssh command options. For more information,
see the JUNOS System Basics and Services Command Reference.
Option Description
bypass-routing Bypass the routing tables and open an SSH connection only to hosts on directly attached
interfaces. If the host is not on a directly attached interface, an error message is
returned.
Option Description
interface source-interface Open an SSH connection to a host on the specified interface. If you do not include this
option, all interfaces are used.
routing-instance routing-instance-name Use the specified routing instance for the SSH connection.
source address Use the specified source address for the SSH connection.
For example, the services router introduces a delay of 5 seconds between the
third and fourth password retry, a delay of 10 seconds between the fourth and
fifth password retry, and so on.
■ Enforces a minimum session time of 20 seconds during which a session cannot
be disconnected. Configuring the minimum session time prevents malicious
users from disconnecting sessions before the password retry delay goes into
effect, and attempting brute force and dictionary attacks with multiple logins.
You can configure the password retry limits for Telnet and SSH access. In this
example, you configure the services router to take the following actions for Telnet
and SSH sessions:
■ Allow a maximum of 4 consecutive password retries before disconnecting a
session.
■ Introduce a delay in multiples of 5 seconds between password retries that occur
after the second password retry.
■ Enforce a minimum session time of 40 seconds during which a session cannot
be disconnected.
Table 22: Configuring Password Retry Limits for Telnet and SSH Access
Navigate to the Retry options level in the configuration 1. In the J-Web interface, select From the [edit] hierarchy
hierarchy. CLI Tools>Point and Click level, enter
CLI.
edit system login
2. Next to System, click Edit.
retry-options
3. Next to Login, click Configure
or Edit.
4. Next to Retry options, click
Configure or Edit.
Configure password retry limits for Telnet and SSH access. 1. In the Tries before disconnect 1. Enter
box, type 4.
■ Tries—Maximum number of consecutive password
set
retries before a SSH or Telnet sessions is disconnected. 2. In the Backoff threshold box,
tries-before-disconnect
The default number is 10, but you can set a number type 2.
4
between 1 and 10.
3. In the Backoff factor box, type
■ Backoff threshold—Threshold number of password 2. Enter
5.
retries after which a delay is introduced between two
consecutive password retries. The default number is 4. In the Minimum time box, type set backoff-threshold
2, but you can set a number between 1 and 3. 40. 2
■ Backoff factor—Delay (in seconds) between 5. Click OK. 3. Enter
consecutive password retries after the threshold
number of password retries. The default delay is in set backoff-factor 5
multiples of 5 seconds, but you can set a delay
between 5 and 10 seconds. 4. Enter
■ Minimum time—Minimum length of time (in seconds)
during which a Telnet or SSH session cannot be set minimum-time 40
disconnected. The default is 20 seconds, but you can
set a time between 20 and 60 seconds.
Reverse Telnet
Reverse Telnet allows you to configure a device to listen on a specific port for telnet
and SSH (secure shell) services. When you connect to that port, the device provides
an interface to the auxiliary port on the device. You use a rollover cable to connect
the auxiliary port from the device on which reverse Telnet is enabled to the console
port of the device you want to manage.
■ Reverse Telnet Overview on page 45
■ Configuring Reverse Telnet and Reverse SSH on page 46
Reverse Telnet ■ 45
JUNOS Software Administration Guide
When you enable reverse Telnet, you can control the port that is used, and you can
optionally turn on reverse SSH to encrypt the reverse Telnet communication between
the device and the client. By default, reverse telnet uses port 2900 and reverse SSH
uses port 2901.
NOTE: If you want to enable reverse SSH, you must explicitly enter the command
to do so. By default, when you enable reverse Telnet, the connection is not encrypted.
The following restrictions exist when you are attempting to use reverse Telnet or
reverse SSH.
■ Multiple connections to the serial port are not allowed. If there is an existing
connection to the serial port, any other connections are denied.
■ If the auxiliary port is enabled (through the system services port auxiliary
configuration statement), you cannot use reverse Telnet or reverse SSH because
another service is already using the auxiliary port.
CLI Configuration
2. You can specify the port for reverse Telnet. If you do not specify a port, 2900 is
the default port that is used.
3. You can enable reverse SSH to encrypt the connection between the device and
the client.
4. You can specify the port for reverse SSH. If you do not specify a port, 2901 is
the default port that is used.
46 ■ Reverse Telnet
Chapter 4
Setting Up USB Modems for Remote
Management
J Series Services Routers support the use of USB modems for remote management.
You can use Telnet or SSH to connect to the device from a remote location through
two modems over a telephone network. The USB modem is connected to the USB
port on the device, and a second modem is connected to a remote management
device such as a PC or laptop computer.
You use either the J-Web configuration editor or CLI configuration editor to configure
the USB modem and its supporting dialer interfaces.
For information about which devices support the features documented in this chapter,
see the JUNOS Software Feature Support Reference for SRX Series and J Series Devices.
Term Definition
caller ID Telephone number of the caller on the remote end of a USB modem
connection, used to dial in and also to identify the caller. Multiple caller
IDs can be configured on a dialer interface. During dial-in, the device
matches the incoming call's caller ID against the caller IDs configured
on its dialer interfaces. Each dialer interface accepts calls from only
callers whose caller IDs are configured on it.
dialer interface (dl) Logical interface for configuring dialing properties for a USB modem
connection.
dial-in Feature that enables the device to receive calls from the remote end of
a USB modem connection. The remote end of the USB modem call
might be a service provider, a corporate central location, or a customer
premises equipment (CPE) branch office. All incoming calls can be
verified against caller IDs configured on the device's dialer interface.
Microcom Networking Protocol (MNP) Protocol that provides error correction and data compression for
asynchronous modem transmission.
See the interface naming conventions in the JUNOS Software Interfaces and Routing
Configuration Guide.
The following rules apply when you configure dialer interfaces for USB modem
connections:
■ The dialer interface must be configured to use PPP encapsulation. You cannot
configure Cisco High-Level Data Link Control (HDLC) or Multilink PPP (MLPPP)
encapsulation on dialer interfaces.
■ The dialer interface cannot be configured as a constituent link in a multilink
bundle.
■ If you are using the same dialer interface for ISDN connections and USB modem
connections, the dialer interface cannot be configured simultaneously in the
following modes:
■ As a backup interface and a dialer filter
■ As a backup interface and dialer watch interface
S7=45 Instructs the modem to wait 45 seconds for a telecommunications service provider
(carrier) signal before terminating the call.
S0=0 Disables the auto answer feature, whereby the modem automatically answers calls.
&C1 Disables reset of the modem when it loses the carrier signal.
E0 Disables the display on the local terminal of commands issued to the modem from
the local terminal.
When the services router applies the modem AT commands in the init-command-string
command or the default sequence of initialization commands to the modem, it
compares them to the initialization commands already configured on the modem
and makes the following changes:
■ If the commands are the same, the device overrides existing modem values that
do not match. For example, if the initialization commands on the modem include
S0=0 and the device’s init-command-string command includes S0=2, the services
router applies S0=2.
■ If the initialization commands on the modem do not include a command in the
device’s init-command-string command, the device adds it. For example, if the
init-command-string command includes the command L2, but the modem
commands do not include it, the device adds L2 to the initialization commands
configured on the modem.
Task Instructions
2. Configure the modem interfaces on the device. “Configuring USB Modem Interfaces with a Configuration Editor” on
page 51
3. Verify the modem configuration on the device. “Verifying the USB Modem Configuration” on page 60
4. Perform administrative tasks as necessary. ■ Modifying USB Modem Initialization Commands on page 59
■ Resetting USB Modems on page 60
2. Dial in to the device. “Connecting to the Device from the User End” on page 58
NOTE: J4350 and J6350 devices have two USB ports. However, you can connect only
one USB modem to the USB ports on these devices. If you connect USB modems to
both ports, the device detects only the first modem connected.
1. Navigate to the top of the interfaces configuration hierarchy in either the J-Web
or CLI configuration editor.
2. Perform the configuration tasks described in Table 26 on page 52.
3. Go on to “Configuring a Dialer Interface (Required)” on page 53.
Navigate to the Interfaces level in the 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
configuration hierarchy. Tools>Point and Click CLI.
edit interfaces umd0
2. Next to Interfaces, click Configure
or Edit.
Create the new interface umd0. 1. Next to Interface, click Add new
entry.
2. In the Interface name box, type the
name of the new interface, umd0.
3. Click OK.
The S0=0 command in the default 1. Next to Modem options, click Enter
modem initialization sequence AT S7=45 Configure.
S0=0 V1 X4 &C1 E0 Q0 &Q8 %C0, set modem-options init-command-string
disables the modem from automatically
2. In the Init command string box,
"ATS0=2 \n"
type ATS0=2 to configure the
answering calls.
modem to automatically answer
after two rings.
Configure the modem to automatically
answer calls after a specified number of 3. Click OK.
rings. For more information about
modem initialization commands, see
“How the Device Initializes USB
Modems” on page 49 and “Modifying
USB Modem Initialization Commands”
on page 59.
Navigate to the Interfaces level in the 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
configuration hierarchy. Tools>Point and Click CLI.
edit interfaces
2. Next to Interfaces, click Configure
or Edit.
Create the new interface—for example, 1. Next to Interface, click Add new Create and name the interface:
dl0. entry.
1. edit dl0
2. In the Interface name box, type dl0.
Adding a description can differentiate 2. set description
between different dialer interfaces—for 3. In the Description box, type USB-modem-remote-management
example, USB-modem-remote-management.
USB-modem-remote-management.
4. Click OK.
Create the logical unit 0. 1. Next to Unit, click Add new entry. Enter
NOTE: The logical unit number must 2. In the Interface unit number box,
set unit 0
be 0. type 0.
3. Next to Dialer options, select Yes,
and then click Configure.
Configure the name of the dialer pool 1. In the Pool box, type 1. Enter
to use for USB modem usb-modem-dialer-pool.
connectivity—for example, edit unit 0
usb-modem-dialer-pool. 2. Click OK.
2. Enter
Configure source and destination IP 1. Select Inet under Family, and click Enter
addresses for the dialer interface—for Configure.
example, 172.20.10.2 and set family inet address 172.20.10.2
172.20.10.1.
2. Next to Address, click Add new
destination 172.20.10.1
entry.
NOTE: If you configure multiple dialer 3. In the Source box, type
interfaces, ensure that the same IP 172.20.10.2.
subnet address is not configured on
different dialer interfaces. Configuring 4. In the Destination box, type
the same IP subnet address on multiple 172.20.10.1.
dialer interfaces can result in
5. Click OK.
inconsistency in the route and packet
loss. The device might route packets
through another dialer interface with
the IP subnet address instead of
through the dialer interface to which
the USB modem call is mapped.
If the dialer interface is configured to accept only calls from a specific caller ID, the
system matches the incoming call's caller ID against the caller IDs configured on its
dialer interfaces. If an exact match is not found and the incoming call's caller ID has
more digits than the configured caller IDs, the system performs a right-to-left match
of the incoming call's caller ID with the configured caller IDs and accepts the incoming
call if a match is found. For example, if the incoming call's caller ID is 4085550115
and the caller ID configured on a dialer interface is 5550115, the incoming call is
accepted. Each dialer interface accepts calls from only callers whose caller IDs are
configured on it.
Navigate to the Interfaces level in the 1. In the J-Web interface, select From the [edit] hierarchy level, enter
configuration hierarchy, and select a dialer CLI Tools>Point and Click CLI.
interface—for example, dl0. edit interfaces dl0
2. Next to Interfaces, click Edit.
3. Next to dl0, click Edit.
On logical interface 0 configure the incoming 1. In the Unit section, for logical 1. Enter
map options for the dialer interface. unit number 0, click Dialer
options under Nested edit unit 0
■ accept-all—Dialer interface accepts all Configuration.
incoming calls. 2. Enter
You can configure the accept-all option for 2. Next to Incoming map, click
only one of the dialer interfaces associated Configure. edit dialer-options
with a USB modem physical interface. The 3. From the Caller type menu, 3. Enter
device uses the dialer interface with the select Caller.
accept-all option configured only if the
4. Next to Caller, click Add new set incoming-map caller
incoming call's caller ID does not match
the caller IDs configured on other dialer entry. 4085550115
interfaces. 4. Repeat Step 3 for each caller ID
5. In the Caller id box, type
■ caller—Dialer interface accepts calls from 4085550115. to be accepted on the dialer
a specific caller ID—for example, interface.
4085550115. You can configure a 6. Click OK.
maximum of 15 caller IDs per dialer 7. Repeat Steps 4 through 6 for
interface. each caller ID to be accepted on
The same caller ID must not be configured the dialer interface.
on different dialer interfaces. However,
you can configure caller IDs with more or
fewer digits on different dialer interfaces.
For example, you can configure the caller
IDs 14085550115, 4085550115, and
5550115 on different dialer interfaces.
For more information about CHAP, see the JUNOS Software Interfaces and Routing
Configuration Guide and the JUNOS Network Interfaces Configuration Guide.
1. Navigate to the top of the configuration hierarchy in either the J-Web or CLI
configuration editor.
2. Perform the configuration tasks described in Table 29 on page 56.
3. If you are finished configuring the device, commit the configuration.
4. To verify the CHAP configuration, see “Verifying the USB Modem Configuration”
on page 60.
Define a CHAP access profile—for 1. In the J-Web interface, select CLI 1. From the [edit] hierarchy level,
example, usb-modem-access-profile with Tools>Point and Click CLI. enter
a client (username) named
usb-modem-user and the secret
2. Next to Access, click Configure or
edit access
Edit.
(password) my-secret.
3. Next to Profile, click Add new 2. Enter
entry.
set profile usb-modem-access-profile
4. In the Profile name box, type client usb-modem-user chap-secret
usb-modem-access-profile. my-secret
5. Next to Client, click Add new 3. Repeat Step 2 for each client to be
entry. included in the CHAP profile.
6. In the Name box, type
usb-modem-user.
8. Click OK.
9. Repeat Steps 5 through 8 for each
client to be included in the CHAP
profile.
10. Click OK until you return to the
Configuration page.
Navigate to the appropriate dialer 1. On the Configuration page next to From the [edit] hierarchy level, enter
interface level in the configuration Interfaces, click Edit.
hierarchy—for example, dl0 unit 0. edit interfaces dl0 unit 0
2. In the Interface name column, click
dl0.
3. Under Unit, in the Interface unit
number column, click 0.
Configure CHAP on the dialer interface 1. Next to Ppp options, click Enter
and specify a unique profile name Configure.
containing a client list and access set ppp-options chap access-profile
parameters—for example, 2. Next to Chap, click Configure.
usb-modem-access-profile
usb-modem-access-profile. 3. In the Access profile box, type
usb-modem-access-profile.
NOTE: Do not configure the passive
option from the [edit interfaces dl0 unit 4. Click OK.
0 ppp-options chap] hierarchy level.
When the connection is complete, you can use Telnet or SSH to connect to the
device.
You can use the J-Web or CLI configuration editor to override the value of an
initialization command configured on the USB modem or configure additional
commands for initializing USB modems.
NOTE: If you modify modem initialization commands when a call is in progress, the
new initialization sequence is applied on the modem only when the call ends.
In this example, you override the value of the S0=0 command in the initialization
sequence configured on the modem and add the L2 command.
Navigate to the Interfaces level in the 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
configuration hierarchy. Tools>Point and Click CLI.
edit interfaces umd0
2. Next to Interfaces, click Configure
or Edit.
Configure the modem AT commands to 1. Next to Modem options, click From the [edit interfaces umd0] hierarchy,
initialize the USB modem. For example: Configure. enter
■ The command S0=2 configures the 2. In the Init command string box,
set modem-options init-command-string
modem to automatically answer type AT S0=2 L2.
"AT S0=2 L2 \n"
calls on the second ring.
3. Click OK.
■ The command L2 configures
medium speaker volume on the
modem.
CAUTION: If you reset the modem when a call is in progress, the call is terminated.
Action From the CLI, enter the show interfaces extensive command.
Sample Output user@host> show interfaces umd0 extensive
Meaning The output shows a summary of interface information and displays the modem
status.
■ In the J-Web configuration editor, clear the Disable check box on the
Interfaces>interface-name page.
■ The physical link is Up. A link state of Down indicates a problem with the interface
module, interface port, or physical connection (link-layer errors).
■ The Last Flapped time is an expected value. The Last Flapped time indicates the
last time the physical interface became unavailable and then available again.
Unexpected flapping indicates likely link-layer errors.
■ The traffic statistics reflect expected input and output rates. Verify that the
number of inbound and outbound bytes and packets matches expected
throughput for the physical interface. To clear the statistics and see only new
changes, use the clear interfaces statistics interface-name command.
■ The modem initialization command string has a nonzero value for the S0=n
modem command. A nonzero value is required to configure the modem to
automatically answer calls. For example, the command S0=2 configures the
modem to automatically answer calls on the second ring.
2. If the modem initialization commands are valid, reset the modem. For more
information, see “Resetting USB Modems” on page 60.
Related Topics For a complete description of show interfaces extensive output, see the JUNOS
Interfaces Command Reference.
Action From the CLI, enter the show interfaces extensive command.
Sample Output user@host> show interfaces dl0 extensive
Physical interface: dl0, Enabled, Physical link is Up
Interface index: 128, SNMP ifIndex: 24, Generation: 129
Type: 27, Link-level type: PPP, MTU: 1504, Clocking: Unspecified, Speed:
Unspecified
Device flags : Present Running
Interface flags: SNMP-Traps
Link type : Full-Duplex
Link flags : Keepalives
Logical interface dl0.0 (Index 70) (SNMP ifIndex 75) (Generation 146)
Description: USB-modem-remote-management
Flags: Point-To-Point SNMP-Traps 0x4000 LinkAddress 23-0 Encapsulation: PPP
Dialer:
State: Active, Dial pool: usb-modem-dialer-pool
Dial strings: 220
Subordinate interfaces: umd0 (Index 64)
Activation delay: 0, Deactivation delay: 0
Initial route check delay: 120
Redial delay: 3
Callback wait period: 5
Load threshold: 0, Load interval: 60
Bandwidth: 115200
Traffic statistics:
Input bytes : 24839
Output bytes : 17792
Input packets: 489
Output packets: 340
Local statistics:
Input bytes : 10980
Output bytes : 17792
Input packets: 172
Output packets: 340
Transit statistics:
Input bytes : 13859 0 bps
Output bytes : 0 0 bps
Input packets: 317 0 pps
Output packets: 0 0 pps
LCP state: Opened
NCP state: inet: Opened, inet6: Not-configured, iso: Not-configured,
mpls: Not-configured
CHAP state: Success
Protocol inet, MTU: 1500, Generation: 136, Route table: 0
Flags: None
Addresses, Flags: Is-Preferred Is-Primary
Destination: 172.20.10.1, Local: 172.20.10.2, Broadcast: Unspecified,
Generation: 134
Meaning The output shows a summary of dialer interface information. Verify the following
information:
■ The physical link is Up. A link state of Down indicates a problem with the interface
module, interface port, or physical connection (link-layer errors).
■ The Last Flapped time is an expected value. The Last Flapped time indicates the
last time the physical interface became unavailable and then available again.
Unexpected flapping indicates possible link-layer errors.
■ The traffic statistics reflect expected input and output rates. Verify that the
number of inbound and outbound bytes and packets matches expected
throughput for the physical interface. To clear the statistics and see only new
changes, use the clear interfaces statistics interface-name command.
■ The dialer state is Active when a USB modem call is in progress.
■ The LCP state is Opened when a USB modem call is in progress. An LCP state of
Closed or Not Configured indicates a problem with the dialer configuration that
needs to be debugged with the monitor traffic interface interface-name command.
For information about the monitor traffic command, see “Using the monitor traffic
Command” on page 355.
Related Topics For a complete description of show interfaces dl0 extensive output, see the JUNOS
Interfaces Command Reference.
The Simple Network Management Protocol (SNMP) enables the monitoring of network
devices from a central location.
You can use either J-Web Quick Configuration or a configuration editor to configure
SNMP.
For more information about SNMP, see the JUNOS Network Management Configuration
Guide.
For information about which devices support the features documented in this chapter,
see the JUNOS Software Feature Support Reference for SRX Series and J Series Devices.
SNMP Architecture
Use SNMP to determine where and when a network failure is occurring, and to gather
statistics about network performance in order to evaluate the overall health of the
network and identify bottlenecks.
SNMP Architecture ■ 65
JUNOS Software Administration Guide
processed. The agent also controls access to the agent’s Management Information
Base (MIB), the collection of objects that can be viewed or changed by the SNMP
manager. Because SNMP agents are individual SNMP processes running on a host,
multiple agents can be active on a single network node at any given time.
Communication between the agent and the manager occurs in one of the following
forms:
■ Get, GetBulk, and GetNext requests—The manager requests information from
the agent, and the agent returns the information in a Get response message.
■ Set requests—The manager changes the value of a MIB object controlled by the
agent, and the agent indicates status in a Set response message.
■ Traps notification—The agent sends traps to notify the manager of significant
events that occur on the network device.
MIBs are either standard or enterprise-specific. Standard MIBs are created by the
Internet Engineering Task Force (IETF) and documented in various RFCs. Depending
on the vendor, many standard MIBs are delivered with the NMS software. You can
also download the standard MIBs from the IETF website, http://www.ietf.org, and
compile them into your NMS, if necessary.
For a list of standard and enterprise-specific supported MIBS, see the JUNOS Network
Management Configuration Guide.
SNMP Communities
You can grant access to only specific SNMP managers for particular SNMP agents by
creating SNMP communities. The community is assigned a name that is unique on
the host. All SNMP requests that are sent to the agent must be configured with the
same community name. When multiple agents are configured on a particular host,
66 ■ SNMP Architecture
Chapter 5: Configuring SNMP for Network Management
the community name process ensures that SNMP requests are sorted to only those
agents configured to handle the requests.
SNMP Traps
The get and set commands that SNMP uses are useful for querying hosts within a
network. However, the commands do not provide a means by which events can
trigger a notification. For instance, if a link fails, the health of the link is unknown
until an SNMP manager next queries that agent.
SNMP traps are unsolicited notifications that are triggered by events on the host.
When you configure a trap, you specify the types of events that can trigger trap
messages, and you configure a set of targets to receive the generated messages.
A threshold is a test of some SNMP variable against some value, with a report when
the threshold value is exceeded. The rising threshold is the upper threshold for a
monitored variable. When the current sampled value is greater than or equal to this
threshold, and the value at the last sampling interval is less than this threshold, the
SNMP health monitor generates an alarm. After the rising alarm, the health monitor
SNMP Architecture ■ 67
JUNOS Software Administration Guide
cannot generate another alarm until the sampled value falls below the rising threshold
and reaches the falling threshold.
The falling threshold is the lower threshold for the monitored variable. When the
current sampled value is less than or equal to this threshold, and the value at the last
sampling interval is greater than this threshold, the SNMP health monitor generates
an alarm. After the falling alarm, the health monitor cannot generate another alarm
until the sampled value rises above the falling threshold and reaches the rising
threshold.
The interval represents the period of time, in seconds, over which the object instance
is sampled and compared with the rising and falling thresholds.
At present, you do not have to configure a separate trap for the SNMP health monitor,
because it uses the already existing RMON traps. For more information about RMON
events and alarms, see the JUNOS Network Management Configuration Guide.
To display the information collected by the SNMP health monitor, use the following
CLI show snmp health-monitor commands:
■ show snmp health-monitor
■ show snmp health-monitor alarms
■ show snmp health-monitor alarms detail
■ show snmp health-monitor logs
For more information, see the JUNOS System Basics and Services Command Reference.
■ To cancel your entries and return to the Quick Configuration for SNMP page,
click Cancel.
4. To check the configuration, see “Verifying the SNMP Configuration” on page 77.
Identification
Contact Information Free-form text string that specifies an Type any contact information for the
administrative contact for the system. administrator of the system (such as
name and phone number).
System Description Free-form text string that specifies a Type any system information that
description for the system. describes the system (J4350 with 4 PIMs,
for example).
Local Engine ID Provides an administratively unique Type the MAC address of Ethernet
identifier of an SNMPv3 engine for management port 0.
system identification.
System Location Free-form text string that specifies the Type any location information for the
location of the system. system (lab name or rack name, for
example).
System Name Override Free-form text string that overrides the Type the name of the system.
system hostname.
Community Name Specifies the name of the SNMP Type the name of the community being
community. added.
Authorization Specifies the type of authorization (either Select the desired authorization (either
read-only or read-write) for the SNMP read-only or read-write) from the list.
community being configured.
Trap Group Name Specifies the name of the SNMP trap Type the name of the SNMP trap group
group being configured. being configured.
Categories Specifies which trap categories are ■ To generate traps for authentication
added to the trap group being failures, select Authentication.
configured. ■ To generate traps for chassis and
environment notifications, select
Chassis.
■ To generate traps for configuration
changes, select Configuration.
■ To generate traps for link-related
notifications (up-down transitions),
select Link.
■ To generate traps for remote
operation notifications, select
Remote operations.
■ To generate traps for remote
network monitoring (RMON), select
RMON alarm.
■ To generate traps for routing
protocol notifications, select
Routing.
■ To generate traps on system warm
and cold starts, select Startup.
■ To generate traps on Virtual Router
Redundancy Protocol (VRRP) events
(such as new-master or
authentication failures), select
VRRP events.
Health Monitoring
Enable Health Monitoring Enables the SNMP health monitor on the Select the check box to enable the health
device. The health monitor periodically monitor and configure options. If you
(the time you specify in the interval field) do not select the check box, the health
checks the following key indicators of monitor is disabled.
device health:
NOTE: If you select only the Enable
■ Percentage of file storage used Health Monitoring check box and do not
■ Percentage of Routing Engine CPU specify the options, then SNMP health
used monitoring is enabled with the default
■ Percentage of Routing Engine values for the options.
memory used
■ Percentage of memory used for
each system process
■ Percentage of CPU used by the
forwarding process
■ Percentage of memory used for
temporary storage by the
forwarding process
Rising Threshold Value at which you want SNMP to Enter a value between 0 and 100.
generate an event (trap and system log
message) when the value of a sampled The default value is 90.
indicator is increasing.
Falling Threshold Value at which you want SNMP to Enter a value between 0 and 100.
generate an event (trap and system log
message) when the value of a sampled The default value is 80.
indicator is decreasing.
NOTE: The falling threshold value must
For example, if the falling threshold is be less than the rising threshold value.
80 (the default), SNMP generates an
event when the value of any key
indicator falls back to 80 percent or less.
Contact sysContact
Navigate to the SNMP level in the 1. In the J-Web interface, select CLI From the [edit] hierarchy level,
configuration hierarchy. Tools>Point and Click CLI. enter
2. Next to Snmp, click Configure or Edit.
edit snmp
Configure the system contact information In the Contact box, type the contact Set the contact information:
(such as a name and phone number). information as a free-form text string.
set contact “contact-information”
Configure the system location information In the Location box, type the location Set the location information:
(such as a lab name and a rack name). information as a free-form text string.
set location “location-information”
Configure the system description (J4350 In the Description box, type the description Set the description information:
with 4 PIMs, for example). information as a free-form text string.
set description
“description-information”
Configure a system name to override the In the System Name box, type the system Set the system name:
system hostname defined in the Getting name as a free-form text string.
Started Guide for your device. set name name
Configure the local engine ID to use the 1. Select Engine id. Set the engine ID to use the MAC
MAC address of Ethernet management port address:
0 as the engine ID suffix. 2. In the Engine id choice box, select Use
mac address from the list.
set engine-id use-mac-address
3. Click OK.
Navigate to the SNMP level in the 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
configuration hierarchy. Tools>Point and Click CLI.
edit snmp
2. Next to Snmp, click Configure or Edit.
Create and name a community. 1. Next to Community, click Add new entry. Create a community:
2. In the Community box, type the name of
set community community-name
the community as a free-form text string.
Grant read-write access to the In the Authorization box, select read-write Set the authorization to read-write:
community. from the list.
set community community-name
authorization read-write
Allow community access to a 1. Next to Clients, click Add new entry. Configure client access for the IP
client at a particular IP address 10.10.10.10:
address—for example, at IP 2. In the Prefix box, type the IP address, in
dotted decimal notation.
address 10.10.10.10. set community community-name clients
3. Click OK. 10.10.10.10
Allow community access to a 1. Next to Clients, click Add new entry. 1. Configure client access for the IP
group of clients—for example, all address 10.10.10.0/24:
addresses within the 2. In the Prefix box, type the IP address
10.10.10.0/24 prefix, except prefix 10.10.10.0/24, and click OK.
set community community-name
those within the 10.10.10.10/29 3. Next to Clients, click Add new entry. clients 10.10.10.0/24
prefix.
4. In the Prefix box, type the IP address 2. Configure client access to restrict
prefix 10.10.10.10/29. the IP addresses 10.10.10.10/29:
5. Select the Restrict check box.
set community community-name
6. Click OK. clients 10.10.10.10/29 restrict
Navigate to the SNMP level in the 1. In the J-Web interface, select CLI From the [edit] hierarchy level,
configuration hierarchy. Tools>Point and Click CLI. enter
2. Next to Snmp, click Configure or Edit.
edit snmp
Create a trap group. 1. Next to Trap group, click Add new Create a community:
entry.
set trap-group trap-group-name
2. In the Group name box, type the name
of the group as a free-form text string.
Configure the trap group to send all trap 1. Next to Targets, click Add new entry. Set the trap-group target to
notifications to a target IP address—for 192.174.6.6:
example, to the IP address 192.174.6.6. 2. In the Target box, type the IP address
192.174.6.6, and click OK.
set trap-group trap-group-name targets
192.174.6.6
Configure the trap group to generate 1. Click Categories. Configure the trap group categories:
SNMP notifications on authentication
failures, environment alarms, and 2. Select the Authentication, Chassis, and
set trap-group trap-group-name
changes in link state for any of the Link check boxes.
categories authentication chassis link
interfaces. 3. Click OK.
Navigate to the SNMP level 1. In the J-Web interface, select CLI Tools>Point and From the [edit] hierarchy level,
in the configuration Click CLI. enter
hierarchy.
2. Next to Snmp, click Configure or Edit.
edit snmp
Create a view. 1. Next to View, click Add new entry. Create a view:
2. In the Name box, type the name of the view as a
set view view-name
free-form text string.
Configure the view to include 1. Next to Oid, click Add new entry. Set the pingMIB OID value and mark
a MIB—for example, pingMIB. it for inclusion:
2. In the Name box, type the OID of the pingMIB, in
either dotted integer or subtree name format.
set view view-name oid
3. In the View action box, select include from the list, 1.3.6.1.2.1.80 include
and click OK.
Configure the view to exclude 1. Next to Oid, click Add new entry. Set the jnxPingMIB OID value and
a MIB—for example, mark it for exclusion:
jnxPingMIB. 2. In the Name box, type the OID of the jnxPingMIB,
in either dotted integer or subtree name format.
set view view-name oid jnxPingMIB
3. In the View action box, select exclude from the list, exclude
and click OK twice.
Associate the view with a 1. On the Snmp page, under Community, click the Set the community view:
community. name of the community to which you want to apply
the view. set community community-name view
view-name
2. In the View box, type the view name.
3. Click OK.
Action From the CLI, enter the show snmp statistics command.
Sample Output user@host> show snmp statistics
SNMP statistics:
Input:
Packets: 246213, Bad versions: 12 , Bad community names: 12,
Bad community uses: 0, ASN parse errors: 96,
Too bigs: 0, No such names: 0, Bad values: 0,
Read onlys: 0, General errors: 0,
Total request varbinds: 227084, Total set varbinds: 67,
Get requests: 44942, Get nexts: 190371, Set requests: 10712,
Get responses: 0, Traps: 0,
Silent drops: 0, Proxy drops: 0, Commit pending drops: 0,
Throttle drops: 0,
V3 Input:
Unknown security models: 0, Invalid messages: 0
Meaning The output shows a list of the SNMP statistics, including details about the number
and types of packets transmitted. Verify the following information:
■ The number of requests and traps is increasing as expected with the SNMP client
configuration.
■ Under Bad community names, the number of bad (invalid) communities is not
increasing. A sharp increase in the number of invalid community names generally
means that one or more community strings are configured incorrectly.
Related Topics For a complete description of show snmp statistics output, see the JUNOS System
Basics and Services Command Reference.
Action From the CLI, enter the show snmp health-monitor command.
Sample Output user@host> show snmp health-monitor
Alarm
Index Variable description Value State
---(more)---
Meaning The output shows a summary of SNMP health monitor alarms and corresponding
log entries:
■ Alarm Index—Alarm identifier.
■ Variable description—Object instance being monitored.
■ Value—Current value of the monitored variable in the most recent sample interval.
■ State—Status of the alarm. For example:
■ active—Entry is fully configured and activated.
■ falling threshold crossed—Variable value has crossed the lower threshold
limit.
Verify that any rising threshold values are greater than the configured rising threshold,
and that any falling threshold values are less than the configured falling threshold.
Related Topics For a complete description of show snmp health-monitor output, see the JUNOS System
Basics and Services Command Reference.
The J Series or SRX Series device acts as the DHCP server, providing IP addresses
and settings to hosts, such as PCs, that are connected to device interfaces. The DHCP
server is compatible with the DHCP servers of other vendors on the network.
The device can also operate as a DHCP client and DHCP relay agent.
You can use J-Web Quick Configuration or a configuration editor to configure DHCP
on the device.
For information about which devices support the features documented in this chapter,
see the JUNOS Software Feature Support Reference for SRX Series and J Series Devices.
DHCP Terms
Before configuring the DHCP server on J Series or SRX Series device, become familiar
with the terms defined in Table 37 on page 82.
DHCP Terms ■ 81
JUNOS Software Administration Guide
Term Definition
conflict Problem that occurs when an address within the IP address pool is being used by a host that
does not have an associated binding in the DHCP server's database. Addresses with conflicts
are removed from the pool and logged in a conflicts list until you clear the list.
DHCP client Host that uses DHCP to obtain an IP address and configuration settings.
DHCP options Configuration settings sent within a DHCP message from a DHCP server to a DHCP client. For
a list of DHCP options, see RFC 2132, DHCP Options and BOOTP Vendor Extensions.
DHCP server Host that provides an IP address and configuration settings to a DHCP client. The J Series or SRX
Series device is a DHCP server.
Dynamic Host Configuration management protocol you can use to supervise and automatically distribute IP
Configuration Protocol addresses and deliver configuration settings to client hosts from a central DHCP server. An
(DHCP) extension of BOOTP, DHCP is defined in RFC 2131, Dynamic Host Configuration Protocol (DHCP).
gateway router Device that passes DHCP messages between DHCP clients and DHCP servers. A gateway router
is sometimes referred to as a relay agent.
IP address pool Collection of IP addresses maintained by the DHCP server for assignment to DHCP clients. The
address pool is associated with a subnet on either a logical or physical interface.
lease Period of time during which an IP address is allocated, or bound, to a DHCP client. A lease can
be temporary (dynamic binding) or permanent (static binding).
router solicitation address IP address to which a DHCP client can transmit router solicitation requests.
Windows Name Service Server running the Microsoft Windows name resolution service for network basic input/output
(WINS) server system (NetBIOS) names. WINS is used by hosts running NetBIOS over TCP/IP (NetBT) to register
NetBIOS names and to resolve NetBIOS names to IP addresses.
DHCP Overview
DHCP is based on BOOTP, a bootstrap protocol that allows a client to discover its
own IP address, the IP address of a server host, and the name of a bootstrap file.
DHCP servers can handle requests from BOOTP clients, but provide additional
capabilities beyond BOOTP, such as the automatic allocation of reusable IP addresses
and additional configuration options.
NOTE: Although a J Series or SRX Series device can act as a DHCP Server, a DHCP
relay agent, or DHCP client at the same time, you cannot configure more than one
DHCP role on a single interface.
82 ■ DHCP Overview
Chapter 6: Configuring the Device for DHCP
DHCP Options
In addition to its primary DHCP server functions, you can also configure the device
to send configuration settings like the following to clients through DHCP:
■ IP address of the DHCP server (J Series or SRX Series device).
■ List of Domain Name System (DNS) and NetBIOS servers
■ List of gateway routers
■ IP address of the boot server and the filename of the boot file to use
■ DHCP options defined in RFC 2132, DHCP Options and BOOTP Vendor Extensions
J Series and SRX Series device DHCP server functions are compatible with the
autoinstallation feature. The DHCP server automatically checks any autoinstallation
settings for conflicts and gives the autoinstallation settings priority over corresponding
DHCP settings. For example, an IP address set by autoinstallation takes precedence
over an IP address set by the DHCP server.
DHCP Overview ■ 83
JUNOS Software Administration Guide
zone operates as the DHCP client, receiving IP addresses dynamically from an Internet
service provider (ISP) on the external network.
During the DHCP protocol exchange, the device receives TCP/IP settings from the
external network on its DHCP client interface. Settings include the address of the
ISP's DHCP name server and other server addresses. These settings are propagated
to the DHCP server pools configured on the device to fulfill host requests for IP
addresses on the device's internal network.
You cannot configure a single device interface to operate as both a DHCP client and
a DHCP relay.
For more information, see the JUNOS Policy Framework Configuration Guide
The device maintains a log of all client-detected conflicts and removes addresses
with conflicts from the DHCP address pool. To display the conflicts list, you use the
show system services dhcp conflict command. The addresses in the conflicts list
remain excluded until you use the clear system services dhcp conflict command to
manually clear the list.
Interface Restrictions
The device supports DHCP client requests received on any Ethernet interface. DHCP
requests received from a relay agent are supported on all interface types.
DHCP is not supported on interfaces that are part of a virtual private network (VPN).
■ List the IP addresses that are available for the servers and routers on your
network—DNS, NetBIOS servers, boot servers, and gateway routers, for example.
■ Determine the DHCP options required by the subnets and clients in your network.
Figure 3 on page 86 through Figure 5 on page 88 show the DHCP Quick Configuration
pages.
■ To cancel your entries and return to the DHCP Quick Configuration main
page, click Cancel.
Domain Name Specifies the domain name that the Type the domain name.
clients must use to resolve hostnames.
Next Server Specifies the IP address of the next Type the IP address of the next DHCP
DHCP server that the clients need to server.
contact.
Propagate Interface Specifies the name of the interface on Type the name of the interface.
the device through which the resolved
DHCP queries are propagated to the
DHCP pool.
Name Servers Defines a list of DNS servers the client Do one of the following:
can use, in order of preference—from
top to bottom. ■ To add a DNS server, type an IP
address next to the Add button, and
click Add.
■ To remove a DNS server, select the
IP address in the Name Servers
box, and click Delete.
Gateway Routers Defines a list of devices on the subnet Do one of the following:
that are configured as DHCP relay
agents, in order of preference—from top ■ To add a relay agent, type an IP
to bottom. address next to the Add button, and
click Add.
■ To remove a relay agent, select the
IP address in the Gateway Routers
box, and click Delete.
WINS Servers Specifies the name of the SNMP trap Do one of the following:
group being configured.
■ To add a NetBIOS name server,
type an IP address next to the Add
button, and click Add.
■ To remove a NetBIOS name server,
select the IP address in the WINS
Servers box, and click Delete.
Lease Time
Maximum Lease Time (seconds) Specifies the maximum length of time Type a number between 60 and
a client can hold a lease. (Dynamic 1,209,600 (seconds).
BOOTP lease lengths can exceed this
maximum time.)
Default Lease Time (seconds) Specifies the length of time a client can Type a number between 60 and 2,419,
hold a lease, for clients that do not 200 (seconds).
request a specific lease length.
Boot Options
Boot File Specifies the path and filename of the Type the path and a file name.
initial boot file to be used by the client.
Boot Server Specifies the TFTP server that provides Type the IP address or hostname of the
the initial boot file to the client. TFTP server.
Option Table
Code/Type/Value Defines a list of option codes, types, and Do the following:
values, in order of preference—from top
to bottom. It is mandatory to define all ■ Option Code—Type a number.
the options. ■ Option Type—Select a type from
the list corresponding to the code.
■ Option Value—Type a valid option
value based on the type.
Address Pool Subnet (required) Specifies the pool subnet on which Type an IP address prefix.
DHCP is configured.
Address Range Low (required) Specifies the lowest address in the IP Type an IP address that is part of the
address pool range. subnet specified in Address Pool Subnet.
Address Range High (required) Specifies the highest address in the IP Type an IP address that is part of the
address pool range. subnet specified in Address Pool Subnet.
This address must be greater than the
address specified in Address Range Low.
Exclude Addresses Specifies addresses to exclude from the Do one of the following:
IP address pool.
■ To add an excluded address, type
the address next to the Add button,
and click Add.
■ To delete an excluded address,
select the address in the Exclude
Addresses box, and click Delete.
DHCP MAC Address (required) Specifies the MAC address of the client Type the hexadecimal MAC address of
to be permanently assigned a static IP the client.
address.
Host Name Specifies the client hostname associated Type a client hostname.
with its IP address used by the DHCP
messages exchanged between the server
and the client. The name must be unique
to the client within the subnet on which
the client resides.
Client Identifier Specifies the name of the client used by Do either of the following:
the DHCP server to index its database
of address bindings. The client identifier ■ Select the client identifier type from
can be an ASCII or hexadecimal string. the list. If you select Hexadecimal,
you must type the client identifier
using numbers 0 through 9, and
letters A through F.
■ Type the client identifier.
■ To cancel your entries and return to the DHCP Client Quick Configuration
main page, click Cancel.
4. To check the configuration, see “Verifying the DHCP Client” on page 104.
DHCP Client
DHCP Client Enables you to configure the device to From the DHCP Quick Configuration
operate as a DHCP client. page, click Add under DHCP Client.
Interface (required) Specifies the interface on which to Type the name of the interface.
configure the DHCP client.
Client Identifier Specifies the name of the client used by Do either of the following:
the DHCP server to index its database
of address bindings. ■ Select the client identifier type from
the list. If you select Hexadecimal,
you must type the client identifier
The client identifier can be an ASCII or
using numbers 0 through 9, and
hexadecimal string.
letters A through F.
■ Type the client identifier.
Lease Time (seconds) Specifies the time to negotiate and Type a number between 60 and
exchange DHCP messages. 2,147,483,647 (seconds).
Retransmission Attempt Specifies the number of attempts the Type a number between 0 and 6.
device is allowed to retransmit a DHCP
packet fallback. The default is 4.
Retransmission Interval (seconds) Specifies the time interval allowed Type a number between 4 and 64.
between successive retransmission
attempts. The default is 4.
DHCP Server Address Specifies the preferred DHCP server the Type the IPv4 address of the DHCP
DHCP clients contact with DHCP queries. server.
Vendor Class ID Specifies the vendor class identity Type the vendor class ID.
number for the DHCP client.
Update Server Specifies whether the propagation of To enable the propagation of TCP/IP
TCP/IP settings is enabled on the settings to the DHCP server configured
specified interface (if it is acting as a on the device, select Update Server
DHCP client) to the DHCP server check box.
configured on the device.
■ To cancel your entries and return to the previous page, click Cancel.
4. To check the configuration, see “Displaying DHCP Relay Statistics” on page 106.
DHCP Relay Agent Specifies if the DHCP relay agent is To enable the relay agent, select DHCP
enabled to relay BOOTP or DHCP Relay Agent check box.
messages to a BOOTP server.
VPN Encryption Specifies if VPN encryption is enabled To enable VPN encryption, select VPN
to allow client requests to pass through Encryption check box.
a VPN tunnel.
Client Response TTL Specifies the IP time-to-live value, in Type a number between 1 and 225.
seconds, to set in responses to clients.
Maximum Hop Count Specifies the maximum number of hops Type a number between 4 and 16.
allowed per packet.
Minimum Wait Time Specifies the minimum number of Type a number between 0 and 30,000.
seconds before requests are forwarded
to the BOOTP server.
Description of Server Specifies the description for the BOOTP Type the description in the Description
server. of the Server text box.
In addition, the DHCP server might assign a static address to at least one client on
the subnet. Table 41 on page 96 provides the settings and values for the sample
DHCP server configuration used in this section.
mylab.net
To configure the device as a DHCP server for a subnet and a single client:
1. Navigate to the top of the configuration hierarchy in either the J-Web or CLI
configuration editor.
2. Perform the configuration tasks described in Table 42 on page 97.
3. If you are finished configuring the device, commit the configuration.
4. To verify DHCP server configuration and operation, see “Verifying a DHCP
Configuration” on page 102.
Navigate to the Dhcp 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
server level in the Tools>Point and Click CLI.
configuration hierarchy. edit system services dhcp
2. Next to System, click Configure.
3. Next to Services, make sure the check box
is selected, and click Configure.
4. Next to Dhcp, click Configure.
Define the IP address pool. 1. Next to Pool, click Add new entry. Set the IP address pool range:
2. In the Subnet address box, type
set pool 192.168.2.0/24 address-range
192.168.2.0/24.
low 192.168.2.2 high 192.168.2.254
3. Next to Address range, select the check
box.
4. Next to Address range, click Configure.
5. In the High box, type 192.168.2.254.
6. In the Low box, type 192.168.2.2.
7. Click OK.
Define the default and 1. From the Default lease time list, select Set the default and maximum lease times:
maximum lease times, in Enter Specific Value.
seconds. set pool 192.168.2.0/24
2. In the Length box, type 1209600.
default-lease-time 1209600
3. From the Maximum lease time list, select maximum-lease-time 2419200
Enter Specific Value.
4. Next to Maximum lease time, type
2419200.
Define the domain search 1. Next to Domain search, click Add new Set the domain search suffixes:
suffixes to be used by the entry.
clients. set pool 192.168.2.0/24
2. In the Suffix box, type mycompany.net.
domain-search mycompany.net
3. Click OK.
set pool 192.168.2.0/24
4. Next to Domain search, click Add new
domain-search mylab.net
entry.
5. In the Suffix box, type mylab.net.
6. Click OK.
Define a DNS server. 1. Next to Name server, click Add new Set the DNS server IP address:
entry.
set pool 192.168.2.0/24
2. In the Address box, type 192.168.10.2.
name-server 192.168.10.2
3. Click OK.
Define DHCP 1. Next to Option, click Add new entry. Set the router solicitation IP address:
option 32—the router
solicitation address option. 2. In the Option identifier code box, type 32.
set pool 192.168.2.0/24 option 32
3. From the Option type choice list, select ip-address 192.168.2.33
Ip address.
4. In the Ip address box, type 192.168.2.33.
5. Click OK twice.
Assign a static IP address 1. Next to Static binding, click Add new Associate a fixed IP address with the MAC
of 192.168.2.50 to MAC entry. address of the client:
address
01:03:05:07:09:0B.
2. In the Mac address box, type
set static-binding 01:03:05:07:09:0B
01:03:05:07:09:0B.
fixed-address 192.168.2.50
3. Next to Fixed address, click Add new
entry.
4. In the Address box, type 192.168.2.50.
5. Click OK until you return to the
Configuration page.
Navigate to the Interfaces 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
level in the configuration Tools>Point and Click CLI.
hierarchy, and select the set interfaces ge-0/0/1 unit 0 family inet dhcp
interface on which to 2. Under Interfaces, click ge-0/0/1.
configure DHCP client 3. Under Unit, next to the unit number, click
information—for example, Edit.
ge-0/0/1.0.
4. Under Family, select the Inet check box
and click Edit.
5. Next to Dhcp, click Yes and click
Configure.
Configure the DHCP client 1. Next to Client identifier, click Configure. Set the DHCP client identifier as a hexadecimal
identifier as either an value:
ASCII or hexadecimal 2. From the Client identifier choice list,
value. select hexadecimal.
set interfaces ge-0/0/1 unit 0 family inet dhcp
3. In the Hexadecimal box, type the client client-identifier 00:0a:12:00:12:12
Use hexadecimal if the identifier—00:0a:12:00:12:12.
client identifier is a MAC
address—for example, 4. Click OK.
00:0a:12:00:12:12.
Set the DHCP lease time in 1. From the Lease time list, select Enter Set the DHCP lease time to 86400 seconds:
seconds—for example, Specific Value.
86400 (24 hours). set interfaces ge-0/0/1 unit 0 family inet dhcp
2. In the Length box, type 86400.
lease-time 86400
The range is 60 through
2147483647 seconds.
Define the number of In the Retransmission attempt box, type 6. Set the number of attempts allowed to
attempts allowed to retransmit a DHCP packet to 6:
retransmit a DHCP
packet—for example, 6. set interfaces ge-0/0/1 unit 0 family inet dhcp
retransmission-attempt 6
The range is 0 through 6.
The default is 4 times.
Define the interval, in In the Retransmission interval box, type 5. Set the interval allowed between retransmission
seconds, allowed between attempts to 5 seconds:
retransmission
attempts—for example, 5. set interfaces ge-0/0/1 unit 0 family inet dhcp
retransmission-interval 5
The range is 4 through 64.
The default is 4 seconds.
Set the IPv4 address of the In the Server address box, type 10.1.1.1. Set the IPv4 address of the preferred DHCP
preferred DHCP server to 10.1.1.1:
server—for example,
10.1.1.1. set interfaces ge-0/0/1 unit 0 family inet dhcp
server-address 10.1.1.1
Set the vendor class ID for 1. In the Vendor id box, type ether. Set the vendor class ID to ether:
the DHCP client—for
example, ether. 2. Click OK.
set interfaces ge-0/0/1 unit 0 family inet dhcp
vendor-id ether
You can configure the device or an interface to act as a DHCP relay agent. Doing so
enables the device to respond to DHCP or BOOTP requests broadcast by request as
a broadcast message. If the device or an interface detects a broadcast message, it
relays the message to a specified DHCP or BOOTP server.
Navigate to the In the J-Web interface, select From the [edit] hierarchy level, enter
Forwarding-options level Configure>Services>DHCP>Boot DHCP
in the configuration Relay. set forwarding-options helpers bootp
hierarchy, and select the
interface on which to
configure the BootP/DHCP
relay agent information.
Enable the DHCP relay Select the DHCP relay agent check box to Enable the DHCP relay agent:
agent to relay bootp/DHCP enable the BootP/DHCP relay agent.
messages to BootP server. set forwarding-options helpers bootp relay
agent-option
Enable VPN encryption to Select the VPN encryption check box. Enable VPN encryption to allow client requests
allow client requests to to pass through VPN tunnel:
pass through the VPN
tunnel. set forwarding-options helpers bootp vpn
Define the IP time-to-live In the Client response TTL box, type20. Set the IP time-to-live value to be set in
value to be set in responses to client to 20:
responses to client—for
example, 20. set forwarding-options helpers bootp
client-response-ttl 20
The range is 1—255.
Define the maximum In the Maximum hop count box, type 10. Set the maximum number of hops allowed per
number of hops allowed packet to 10:
per packet—for example,
10. set forwarding-options helpers bootp
maximum-hop-count number 10
The range is 4—16.
Define the minimum In the Minimum wait time box, type 300. Set the minimum number of seconds before
number of seconds before requests are forwarded to 300:
requests are
forwarded—for example, set forwarding-options helpers bootp
300. minimum-wait-time seconds 300
Define the text description In the Description box, type the description of Set the description of the server:
of the server. the server.
set forwarding-options helpers bootp description
The value is a string. text
Define a valid server name 1. Next to Sever, click Add new Entry. Set the server name:
or address to the server to
forward. 2. Next to the Name box, type 2.2.2.2.
set forwarding-options helpers bootp server
Define the routing 1. Next to Routing instance, click Add new Set the routing instance:
instance. The value is a entry.
nonreserved text string of set forwarding-options helpers bootp server routing
128 characters or less. 2. In the Name box, type rt-i-1 and click OK.
instance
A routing instance is optional.
Define the incoming 1. Next to Routing instance, click Add new Set the incoming BootP/DHCP request
BootP/DHCP request entry. forwarding interface to ge-0/0/0:
forwarding interface—for
example, ge-0/0/0. 2. In the Interface name box, type ge-0/0/0.
set forwarding-options helpers bootp interface
3. Click OK until you return to the ge-0/0/0
Configuration page.
Action From the CLI, enter the show system services dhcp global command.
DHCP options:
Name: domain-name, Value: englab.juniper.net
Name: name-server, Value: [ 192.168.5.68, 172.17.28.101, 172.17.28.100 ]
Meaning Verify that the output shows the intended global information of the DHCP server.
Related Topics For complete descriptions of the show system services dhcp command and output,
see the JUNOS System Basics and Services Command Reference.
Action From operational mode in the CLI, to display all active bindings in the database,
enter the show system services dhcp binding command. To display more information
about a client, including its DHCP options, enter the show system services dhcp binding
address detail command, replacing address with the IP address of the client. Finally,
enter the show system services dhcp conflict command.
The DHCP binding database resulting from the configuration defined in Table 42 on
page 97 is displayed in the following sample output.
Sample Output user@host> show system services dhcp binding
IP Address Hardware Address Type Lease expires at
30.1.1.20 00:12:1e:a9:7b:81 dynamic 2007-05-11 11:14:43 PDT
Lease information:
Type DHCP
Obtained at 2004-05-02 13:01:42 PDT
Expires at 2004-05-03 13:01:42 PDT
State active
DHCP options:
Name: name-server, Value: { 6.6.6.6, 6.6.6.7 }
Name: domain-name, Value: mydomain.tld
Code: 32, Type: ip-address, Value: 3.3.3.33
Related Topics For complete descriptions of the show system services dhcp command and output,
see the JUNOS System Basics and Services Command Reference.
Action From operational mode in the CLI, to display DHCP client information, enter the
show system services dhcp client command. To display more information about a
specified interface, enter the show system services dhcp client interface-name
command. Finally, enter the show system services dhcp client statistics command.
The DHCP client configuration resulting from the CLI configuration is displayed in
the following sample output.
Sample Output user@host> show system services dhcp client
Logical Interface Name ge-0/0/1.0
Hardware address 00:0a:12:00:12:12
Client Status bound
Vendor Identifier ether
Server Address 10.1.1.1
Address obtained 10.1.1.89
update server enables
Lease Obtained at 2006-08-24 18:13:04 PST
Lease Expires at 2006-08-25 18:13:04 PST
DHCP Options:
Name: name-server, Value: [ 10.209.194.131, 2.2.2.2, 3.3.3.3 ]
Name: server-identifier, Value: 10.1.1.1
Name: router, Value: [ 10.1.1.80 ]
Name: domain-name, Value: netscreen-50
DHCP Options:
Name: name-server, Value: [ 30.1.1.2 ]
Code: 1, Type: ip-address, Value: 255.255.255.0
Name: name-server, Value: [ 77.77.77.77, 55.55.55.55 ]
Name: domain-name, Value: englab.juniper.net
Messages Sent:
DHCPDECLINE 0
DHCPDISCOVER 0
DHCPREQUEST 1
DHCPINFORM 0
DHCPRELEASE 0
DHCPRENEW 7
DHCPREBIND 0
Meaning Verify whether the DHCP client information reflects your DHCP client configuration.
Related Topics For complete descriptions of the show system services dhcp client command and
output, see the JUNOS Software CLI Reference.
■ The client IP configuration displayed contains the configured values. For example,
for the DHCP configuration in “Configuring the Device as a DHCP Server” on
page 96, you can verify the following settings:
■ DNS Suffix Search List is correct.
■ IP address is within the IP address pool you configured.
■ DHCP Server is the primary IP address of the device interface on which the
DHCP message exchange occurs. If you include the server-identifier statement
in your configuration, the DHCP server IP address specified in this statement
is displayed.
The ipconfig command also displays other DHCP client settings that can be
configured on the device, including the client's hostname, default gateways, and
WINS servers.
Related Topics For complete descriptions of the ping command and output, see the JUNOS System
Basics and Services Command Reference.
Action Enter the show system services dhcp relay-statistics command to display the DHCP
relay statistics.
Sample Output user@host> show system services dhcp relay—statistics
Received Packets: 4 Forwarded Packets 4 Dropped Packets
4 Due to missing interface in relay database: 4 Due to missing
matching routing instance: 0 Due to an error during packet read: 0 Due
to an error during packet send: 0 Due to invalid server address: 0 Due
to missing valid local address: 0 Due to missing route to server/client: 0
Related Topics For complete descriptions of the show system services dhcp relay-statistics command
and output, see the JUNOS Software CLI Reference.
If you are setting up many devices, autoinstallation can help automate the
configuration process by loading configuration files onto new or existing devices
automatically over the network. You can use either the J-Web configuration editor
or CLI configuration editor to configure a device for autoinstallation. The J-Web
interface does not include Quick Configuration pages for autoinstallation.
For information about which devices support the features documented in this chapter,
see the JUNOS Software Feature Support Reference for SRX Series and J Series Devices.
Autoinstallation Terms
Before configuring autoinstallation, become familiar with the terms defined in Table
45 on page 107.
Term Definition
autoinstallation Automatic configuration of a device over the network from a preexisting configuration
file that you create and store on a configuration server—typically a Trivial File Transfer
Protocol (TFTP) server. Autoinstallation takes place on a device that is powered on
without a valid configuration (boot) file or is configured specifically for autoinstallation.
Autoinstallation is useful for deploying multiple devices in a network.
default configuration Configuration that takes place on a device unable to locate a configuration (boot) file.
You can set up two default configuration files for autoinstallation on the device:
network.conf to specify IP address-to-hostname mappings for devices on the network,
or router.conf to provide just enough configuration for your subsequent Telnet access.
hostname.conf Host-specific configuration file for autoinstallation on a device that contains all the
configuration information necessary for the device. In the filename, hostname is
replaced with the hostname you are assigning to the device.
Term Definition
host-specific configuration Configuration that takes place on a device for which you have created a host-specific
configuration file for autoinstallation called hostname.conf. The hostname.conf file
contains all the information necessary to configure the device. For the device to use
hostname.conf, it must be able to determine its own hostname from the network.
network.conf Default configuration file for autoinstallation, in which you specify IP addresses and
associated hostnames for devices on the network.
router.conf Default configuration file for autoinstallation with a minimum configuration sufficient
for you to telnet to the device and configure it manually.
Autoinstallation Overview
Autoinstallation provides automatic configuration for a new device that you connect
to the network and turn on, or for a device configured for autoinstallation. The
autoinstallation process begins anytime a device is powered on and cannot locate a
valid configuration file in the CompactFlash card. Typically, a configuration file is
unavailable when a device is powered on for the first time, or if the configuration
file is deleted from the CompactFlash card. The autoinstallation feature enables you
to deploy multiple devices from a central location in the network.
For the autoinstallation process to work, you must store one or more host-specific
or default configuration files on a configuration server in the network and have a
service available—typically Dynamic Host Configuration Protocol (DHCP)—to assign
an IP address to the device.
Table 46: Interfaces and Protocols for IP Address Acqusition During Autoinstallation
Ethernet LAN interface with High-level Data Link Control (HDLC) DHCP, BOOTP, or Reverse Address Resolution Protocol
(RARP)
Serial WAN interface with HDLC Serial Line Address Resolution Protocol (SLARP)
If the server with the autoinstallation configuration file is not on the same LAN
segment as the new device, or if a specific device is required by the network, you
must configure an intermediate device directly attached to the new device, through
which the new device can send Trivial File Transfer Protocol (TFTP), BOOTP, and
Domain Name System (DNS) requests. In this case, you specify the IP address of the
intermediate device as the location to receive TFTP requests for autoinstallation.
If a DHCP server responds, it provides the device with some or all of the following
information:
■ An IP address and subnet mask for the autoinstallation interface.
■ The location of the TFTP (typically), Hypertext Transfer Protocol (HTTP), or
FTP server on which the configuration file is stored.
■ The name of the configuration file to be requested from the TFTP server.
If the DHCP server provides only the hostname, a DNS server must be
available on the network to resolve the name to an IP address.
2. After the new device acquires an IP address, the autoinstallation process on the
device attempts to download a configuration file in the following ways:
a. If the DHCP server specifies the host-specific configuration file (boot file)
hostname.conf, the device uses that filename in the TFTP server request. (In
the filename, hostname is the hostname of the new device.) The
autoinstallation process on the new device makes three unicast TFTP requests
for hostname.conf. If these attempts fail, the device broadcasts three requests
to any available TFTP server for the file.
d. If the new device can determine its hostname, it sends a TFTP request for
the hostname.conf file.
3. After the new device locates a configuration file on a TFTP server, autoinstallation
downloads the file, installs the file on the device, and commits the configuration.
You can configure a device to operate as a DHCP server. For more information,
see “Configuring the Device for DHCP” on page 81.
■ Create one of the following configuration files, and store it on a TFTP server in
the network:
■ A host-specific file with the name hostname.conf for each device undergoing
autoinstallation. Replace hostname with the name of a device. The
hostname.conf file typically contains all the configuration information
necessary for the device with this hostname.
■ A default configuration file named router.conf with the minimum configuration
necessary to enable you to telnet into the new device for further
configuration.
■ Physically attach the device to the network using one or more of the following
interface types:
■ Fast Ethernet
■ Gigabit Ethernet
■ If you configure the DHCP server to provide only the TFTP server hostname, add
an IP address-to-hostname mapping entry for the TFTP server to the DNS database
file on the DNS server in the network.
■ If the new device is not on the same network segment as the DHCP server (or
other device providing IP address resolution), configure an existing device as an
intermediate to receive TFTP and DNS requests and forward them to the TFTP
server and the DNS server. You must configure the LAN or serial interface on
the intermediate device with the IP addresses of the hosts providing TFTP and
DNS service. Connect this interface to the new device.
■ If you are using hostname.conf files for autoinstallation of host-specific
configuration files, you must also complete the following tasks:
■ Configure the DHCP server to provide a hostname.conf filename to each new
device. Each device uses its hostname.conf filename to request a configuration
file from the TFTP server. Copy the necessary hostname.conf configuration
files to the TFTP server.
■ Create a default configuration file named network.conf, and copy it to the
TFTP server. This file contains IP address-to-hostname mapping entries. If
the DHCP server does not send a hostname.conf filename to a new device,
the device uses network.conf to resolve its hostname based on its IP address.
The device uses the hostname to request a hostname.conf file from the TFTP
server.
To configure autoinstallation:
1. Navigate to the top of the configuration hierarchy in either the J-Web or CLI
configuration editor.
2. Perform the configuration tasks described in Table 47 on page 112.
3. If you are using the J-Web interface, click Commit to view a summary of your
changes, then click OK to commit the configuration. If you are using the CLI,
commit the configuration by entering the commit command.
4. To check the configuration, see “Verifying Autoinstallation” on page 113.
Navigate to the System level in the 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
configuration hierarchy. Tools>Point and Click CLI.
edit system
2. Next to System, click Configure or
Edit.
Enable autoinstallation. Select Autoinstallation, and then click Enter set autoinstallation
Configure. configuration-servers url
Specify the URL address of one or more 1. Next to Configuration servers, click
servers from which to obtain Add new entry.
configuration files. For example:
2. Type the location of the
■ tftp://tftpconfig.sp.com configuration server in the Url box.
■ ftp://user:password 3. If a password is required for server
@sftpconfig.sp.com access, type it into the Password
box.
4. Click OK to return to the
Autoinstallation page.
Configure one or more Ethernet or serial 1. Next to Interfaces, click Add new To set BOOTP and RARP on an Ethernet
interfaces to perform autoinstallation. entry. interface, enter
2. Type the name of the interface into
set autoinstallation interfaces ge-0/0/0
the Interface name box—for
bootp rarp
example, ge-0/0/0.
3. Click OK.
Verifying Autoinstallation
To verify that a device is configured for autoinstallation, perform the following task.
Action From the CLI, enter the show system autoinstallation status command.
Sample Output user@host> show system autoinstallation status
Autoinstallation status:
Master state: Active
Last committed file: None
Configuration server of last committed file: 10.25.100.1
Interface:
Name: ge-0/0/0
State: Configuration Acquisition
Acquired:
Address: 192.168.124.75
Hostname: host-ge-000
Hostname source: DNS
Configuration filename: router-ge-000.conf
Configuration filename server: 10.25.100.3
Address acquisition:
Protocol: DHCP Client
Acquired address: None
Protocol: RARP Client
Acquired address: None
Interface:
Name: ge-0/0/1
State: None
Address acquisition:
Protocol: DHCP Client
Acquired address: None
Protocol: RARP Client
Acquired address: None
Meaning The output shows the settings configured for autoinstallation. Verify that the values
displayed are correct for the device when it is deployed on the network.
You can use commit scripts, operation scripts, and event policies to automate of
network operations and troubleshooting tasks. You can use commit scripts to enforce
custom configuration rules. Operation scripts allow you to automate network
management and troubleshooting tasks. You can configure event policies that initiate
self-diagnostic actions on the occurrence of specific events.
For more information about using commit scripts and operation scripts and
configuring event policies, see the JUNOS Configuration and Diagnostic Automation
Guide.
For information about which devices support the features documented in this chapter,
see the JUNOS Software Feature Support Reference for SRX Series and J Series Devices.
a commit script can instruct the services router to perform various actions, including
the following:
■ Generate custom warning messages, system log messages, or error messages.
If error messages are generated, the commit operation fails and the candidate
configuration remains unchanged.
■ Change the configuration in accordance with your rules and then proceed with
the commit operation.
Consider the following examples of actions you can perform with commit scripts:
■ Run a basic sanity test. Ensure that the [edit interfaces] and [edit protocols]
hierarchies have not been accidentally deleted.
■ Check configuration consistency. Ensure that every T1 interface configured at
the [edit interfaces] hierarchy level is also configured at the [edit protocols rip]
hierarchy level.
■ Enforce network design rules. For example, suppose your network design requires
every interface on which the International Organization for Standardization (ISO)
family of protocols is enabled to also have Multiprotocol Label Switching (MPLS)
enabled. At commit time, a commit script inspects the configuration and issues
an error if this requirement is not met. This error causes the commit operation
to fail and forces the user to update the configuration to comply.
Instead of an error, the commit script can issue a warning about the configuration
problem and then automatically correct it, by changing the configuration to
enable MPLS on all interfaces. A system log message can also be generated
indicating that corrective action was taken.
The scripting language you use for writing commit scripts is Extensible Stylesheet
Language Transformations (XSLT). XSLT commit scripts are based on JUNOScript
Extensible Markup Language (XML).
For information about writing commit scripts, see the JUNOS Configuration and
Diagnostic Automation Guide.
2. Copy the script to the /var/db/scripts/commit directory.
Only users with superuser privileges can access and edit files in the
/var/db/scripts/commit directory.
3. Navigate to the top of the configuration hierarchy in either the J-Web or CLI
configuration editor.
4. Perform the configuration tasks described in Table 48 on page 117.
5. If you are finished configuring the network, commit the configuration.
Navigate to the Commit level in the 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
configuration hierarchy. Tools>Point and Click CLI.
edit system scripts commit
2. Next to System, click Configure or
Edit.
3. Next to Scripts, click Configure or
Edit.
4. Next to Commit, click Configure or
Edit.
Enable the commit script file—for 1. Next to File, click Add new entry. Set the script file name:
example, commit-script.xsl.
2. In the File name box, type
set file commit-script.xsl
commit-script.xsl.
3. Click OK.
user@host# commit
commit complete
user@host# commit
commit complete
NOTE: You can later reactivate the commit script using the activate system scripts
commit filename.xsl command.
Operation scripts allow you to perform various actions, including the following:
■ Automatically diagnose and fix problems in your network by building and running
an operational mode command, receiving the command output, inspecting the
output, and determining the next appropriate action. This process can be repeated
until the source of the problem is determined and reported to the CLI.
■ Monitor the overall status of the device by creating a general operation script
that periodically checks network warning parameters, such as high CPU usage.
The general operation script can be overridden by user-defined scripts.
■ Customize the output of CLI operational mode commands using printf statements.
■ If there is a known problem in JUNOS Software, an operation script can ensure
your device is configured to avoid or work around the problem.
■ Change your device's configuration in response to a problem.
The scripting language you use for writing operation scripts is Extensible Stylesheet
Language Transformations (XSLT). XSLT operation scripts are based on JUNOScript
Extensible Markup Language (XML).
For information about writing operation scripts, see the JUNOS Configuration and
Diagnostic Automation Guide.
2. Copy the script to the /var/db/scripts/op directory.
Only users with superuser privileges can access and edit files in the
/var/db/scripts/op directory.
3. Navigate to the top of the configuration hierarchy in either the J-Web or CLI
configuration editor.
4. Perform the configuration tasks described in Table 49 on page 119.
5. If you are finished configuring the network, commit the configuration.
Navigate to the Op level in the 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
configuration hierarchy. Tools>Point and Click CLI.
edit system scripts op
2. Next to System, click Configure or
Edit.
3. Next to Scripts, click Configure or
Edit.
4. Next to Op, click Configure or Edit.
Enable the operation script file—for 1. Next to File, click Add new entry. Set the script file name:
example, op-script.xsl.
2. In the Name box, type op-script.xsl.
set file op-script.xsl
3. Click OK.
This section describes how you can execute operation scripts from the command
line.
user@host# op filename.xsl
user@host# commit
commit complete
user@host# commit
commit complete
NOTE: You can later reactivate the operation script using the activate system scripts
op filename.xsl command.
Timely diagnosis and intervention can correct error conditions and keep the routing
platform in operation. Event policies allow you to automatically initiate self-diagnostic
actions when specific events occur. These actions can either help you diagnose a
fault or take corrective action.
To view a list of the events that can be referenced in an event policy, issue the help
syslog ? command:
...
For information about these events, see the JUNOS System Log Messages Reference.
Enter the destination name—for In the Destination name box, type bsd2. Set the destination name, the archive site
example, bsd2. location, and the password for accessing
the archive site:
You can reference the destination in
an event policy. set bsd2 archive-sites
ftp://ftp.robot.net/event_analyze password
Configure the archive site—for 1. Next to Archive sites, click Add new eventadmin
example, entry.
ftp://ftp.robot.net/event_analyze—where
you want the output of commands 2. In the Url box, type
executed by the event policy to be ftp://ftp.robot.net/event_analyze.
uploaded in a file for analysis, and 3. In the Password box, type
the password—for example, eventadmin.
eventadmin—for accessing the archive
site. 4. Click OK.
Configure the event name—for 1. Next to Events, click Add new entry. Set the event name:
example, SNMP_TRAP_LINK_DOWN.
2. In the Event box, type
set events SNMP_TRAP_LINK_DOWN
SNMP_TRAP_LINK_DOWN.
The SNMP_TRAP_LINK_DOWN event
occurs when an interface that is 3. Click OK.
monitored by SNMP becomes
unavailable.
Flag the event to initiate an SNMP 1. Next to Then, click Configure. Enter
trap when it generates a system log
message. 2. Select the Raise trap checkbox.
set then
3. Click OK.
set raise-trap
Define the action to be taken when 1. Next to Attributes match, click Add 1. Set the condition to execute the event
the configured event occurs. new entry. policy only when the
SNMP_TRAP_LINK_DOWN event occurs
2. In the Condition list, select matches.
for the t1–3/0/0 interface:
For example, configure the services
router to do the following when the 3. In the From event attribute box, type
SNMP_TRAP_LINK_DOWN event occurs SNMP_TRAP_LINK_DOWN.interface-name. set attributes-match
for the t1–3/0/0 interface: SNMP_TRAP_LINK_DOWN.interface-name
4. In the To event attribute value box, equals t1–3/0/0
1. Execute the show interfaces type t1–3/0/0.
t1–3/0/0 and show configuration 2. Enter
interfaces t1–3/0/0 commands. 5. Click OK.
6. Next to Then, click Configure. edit then execute-commands
2. Upload the output of the show
commands in a text file named 7. Next to Execute commands, click 3. Set the commands to be executed
config.txt to a server named Configure. when the configured event occurs:
bsd2.
8. In the Destination box, type bsd2. set commands show interfaces
NOTE: Do not include spaces, the 9. In the Output filename box, type t1–3/0/0
slash, or the percent sign (%) in the config.txt.
filename. set commands show configuration
10. From the Output format list, select interfaces t1–3/0/0
text.
4. Set the name and format of the file
11. Next to Commands, click Add new in which the output of the executed
entry. commands is to be uploaded to a
12. In the Command box, type show destination server:
interfaces t1–3/0/0.
set output-filename config.txt
13. Click OK. output-format text
14. Next to Commands, click Add new 5. Set the name of the server to which
entry. the file containing the command
15. In the Command box, type show output is to be uploaded:
configuration interfaces t1–3/0/0.
set destination bsd2
16. Click OK.
For information about monitoring your device, see the JUNOS Software Interfaces and
Routing Configuration Guide and the JUNOS Software Security Configuration Guide.
For information about which devices support the features documented in this chapter,
see the JUNOS Software Feature Support Reference for SRX Series and J Series Devices.
Monitoring Overview
JUNOS Software supports a suite of J-Web tools and CLI operational mode commands
for monitoring the system health and performance of your device. Monitoring tools
and commands display the current state of the device. (To use the J-Web interface
and CLI operational tools, you must have the appropriate access privileges. For more
information about configuring access privilege levels, see “Adding New Users” on
page 31 and the JUNOS System Basics Configuration Guide.)
You can use the J-Web Monitor and Manage options to monitor a device. J-Web
results are displayed in the browser.
You can also monitor the device with CLI operational mode commands. CLI command
output appears on the screen of your console or management device, or you can
filter the output to a file. (For complete descriptions of CLI operational mode
commands, see the JUNOS Software CLI Reference, the JUNOS System Basics and
Services Command Reference, the JUNOS Interfaces Command Reference, and the JUNOS
Routing Protocols and Policies Command Reference.)
Monitoring Terms
Before monitoring your device, become familiar with the terms defined in Table 51
on page 128.
Term Definition
autonomous system (AS) Network of nodes that route packets based on a shared map of the network topology stored in
their local databases.
Internet Control Message TCP/IP protocol used to send error and information messages.
Protocol (ICMP)
For example, if you enter the show configuration command, the complete device
configuration is displayed on the screen. To limit the display to only those lines of
the configuration that contain address, issue the show configuration command using
a pipe into the match filter:
For a complete list of the filters, type a command, followed by the pipe, followed by
a question mark (?):
You can specify complex expressions as an option for the match and except filters.
For more information about command output filtering and creating match
expressions, see the JUNOS CLI User Guide.
NOTE: To filter the output of configuration mode commands, use the filter commands
provided for the operational mode commands. In configuration mode, an additional
filter is supported. See the JUNOS CLI User Guide.
Monitoring Interfaces
To view general information about all device physicall and logical interfaces, select
Monitor>Interfaces in the J-Web user interface.
Alternatively, you can enter the following show commands in the CLI editor to view
interface status and traffic statistics:
■ show interfaces terse
■ show interfaces detail
■ show interfaces extensive
■ show interfaces interface-name
The J-Web Interfaces page displays the following details about each device interface:
■ Port—Indicates the interface name. (For information about interface naming
conventions, see the JUNOS Software Interfaces and Routing Configuration Guide.)
■ Admin Status—Indicates whether the interface is enabled (Up) or disabled (Down).
■ Link Status—Indicates whether the interface is linked (Up) or not linked (Down).
■ Input Rate graph—Displays interface bandwidth utilization. Input rates are shown
in bytes per second.
■ Output Rate graph—Displays interface bandwidth utilization. Output rates are
shown in bytes per second.
■ Error Counters chart—Displays input and output error counters in the form of a
bar chart.
■ Packet Counters chart—Displays the number of broadcast, unicast, and multicast
packet counters in the form of a pie chart. (Packet counter charts are supported
only for interfaces that support MAC statistics.)
For information about viewing system events, see “Monitoring System Log Messages
with the J-Web Event Viewer” on page 217.
Alternatively, you can view system properties by entering the following show
commands in the CLI configuration editor:
■ show system uptime
■ show system users
■ show system storage
■ show version
■ show chassis hardware
■ show interface terse
NOTE: The hostname that is displayed on this page is defined using the set system
hostname command in the CLI editor. The time zone is defined using the set system
time-zone time-zone command.
■ Time—The Time tab of the System Information page displays the current time
for the device, the last time the device was booted, the last time protocol settings
were configured on the device, and the last time the device configuration was
updated. Additionally, this tab displays the CPU load averages for the last 1, 5,
and 15 minutes.
■ Storage Media—The Storage Media tab of the System Information page displays
information about the memory components installed on the device (such as flash
memory or USB) and the amount of memory used compared to total memory
available. For more information about monitoring memory usage, see “Monitoring
Process Details” on page 136.
■ Logged-In User Details—The Logged-in User Details section of the System
Information page displays information about the users who are currently logged
into the device, including their usernames, the terminals and systems from which
they logged in, the length of their user sessions, and how long their sessions
have remained idle.
■ Active User Count—The Active User Count field displays the number of users
currently signed into the device.
Alternatively, you can view system properties by entering the following show
commands in the CLI configuration editor:
You can use the Chassis View to link to corresponding configuration and
monitoring pages for the device. To link to interface configuration pages for a
selected port from the Chassis View, right-click on the port in the device image
and choose one of the following options:
■ Chassis Information—Links to the Chassis page.
■ Configure Port: Port-name—Links to the Configure>Interfaces page for the
selected port.
NOTE: The hostname that is displayed on this page is defined using the set system
hostname command in the CLI editor. The time zone is defined using the set system
time-zone time-zone command.
■ File Usage (Hidden by default)–Displays the file usage of log files, temporary
files, crash (core) files, and database files.
■ Message Logs (Always displayed)—Displays log messages and errors. You can
clear old logs from the Message Logs pane by clicking the Clear button.
To control the information that is displayed in the Chassis View, use the following
options:
■ To view an image of the front of the device, right-click the image and choose
View Front.
■ To view an image of the back of the device, right-click the image and choose
View Rear.
■ To enlarge or shrink the device view, use the Zoom bar.
■ To return the device image to its original position and size, click Reset.
NOTE: To use the Chassis View, a recent version of Adobe Flash that supports
ActionScript and AJAX (Version 9) must be installed. Also note that the Chassis View
is displayed by default on the Dashboard page. You can enable or disable it using
options in the Dashboard Preference dialog box, but clearing cookies in Internet
Explorer also causes the Chassis View to be displayed.
Alternatively, you can view chassis details by entering the following show commands
in the CLI configuration editor:
■ show chassis hardware
■ show chassis routing-engine
■ show chassis environment
CAUTION: Do not install a combination of PIMs in a single chassis that exceeds the
maximum power and heat capacity of the chassis. If J Series power management is
enabled, PIMs that exceed the maximum power and heat limits remain offline when
the chassis is powered on. To check PIM power and heat status, use the show chassis
fpc and show chassis power-ratings commands. For more information, see the J Series
Services Routers Hardware Guide.
NOTE: If you need to contact customer support about the device chassis, supply
them with the version and serial number displayed in the Routing Engine Details
section of the page.
■ Power and Fan Tray Details—This Details section of the page includes the
following tabs:
■ Power—The Power tab displays the names of the device’s power supply
units and their statuses.
■ Fan—The Fan tab displays the names of the device’s fans and their speeds
(normal or high). (The fan speeds are adjusted automatically according to
the current temperature.)
■ Chassis Component Details—This section of the page includes the following tabs:
■ General—The General tab displays the version number, part number, serial
number, and description of the selected device component.
■ Temperature—The Temperature tab displays the temperature of the selected
device component (if applicable).
■ Resource—The Resource tab displays the state, total CPU DRAM, and start
time of the selected device component (if applicable).
NOTE: On some devices, you can have an FPC state as “offline.” You may want to
put an FPC offline because of an error or if the FPC is not responding. You can put
the FPC offline by using the CLI command request chassis fpc slot number offline.
An Input/Output card (IOC) to Network Processing Card (NPC) mapping requires you
to map one IOC to one NPC. However, you can map multiple IOCs to a single NPC.
To balance the processing power in the NPC on the SRX3400 and SRX3600 Services
Gateways, the chassis process (daemon) runs an algorithm that performs the mapping.
It maps an IOC to an NPC that has the least amount of IOCs mapped to it. You can
also use the command-line interface (CLI) to assign a specific IOC to a specific NPC.
When you configure the mapping, the chassis process will first use your configuration,
then apply the least-number NPC algorithm for the rest of the IOCs.
You can configure the IOC to NPC mapping using the following example:
The set chassis ioc-npc-connectivity options are described in Table 52 on page 135:
Option Description
ioc slot-number Specify the IOC slot number. Range is 0 through 7 for SRX3400 devices
and 0 through 12 for SRX3600 devices.
npc slot-number Specify the NPC slot number. Range is 0 through 7 for SRX3400 devices
and 0 through 12 for SRX3600 devices.
none The chassis process maps the connection for the particular IOC.
NOTE: You must restart the chassis control after you commit the set chassis
ioc-npc-connectivity CLI command.
Alternatively, you can view chassis details by entering the following show commands
in the CLI configuration editor:
■ show chassis routing-engine
■ show system process
The Process Details page displays the following types of information for the entire
device:
■ CPU Load—Displays the average CPU usage of the device over the last minute
in the form of a graph.
■ Total Memory Utilization—Displays the current total memory usage of the device
in the form of a graph.
The Process Details page also displays the following types of information for each
individual process running on the device::
■ PID—Displays the unique number identifying the process.
■ Value—Displays the name of the process.
■ State—Displays the current state of the process (runnable, sleeping, or unknown).
■ CPU Load—Displays the current CPU usage of the process.
■ Memory Utilization—Displays the current memory usage of the process.
■ Start Time—Displays the time that the process started running.
Monitoring NAT
The J-Web interface provides information about Network Address Translation (NAT).
Table 53 on page 137 summarizes key output fields in the incoming table display.
Table 54 on page 137 summarizes key output fields in the source NAT display.
Monitoring Policies
Use the monitoring policies feature to view summary information such as names of
the source and destination addresses of the policy, name of a preconfigured or custom
application defined for the policy, or actions taken on packets matching the policies.
To access policies using the CLI, enter the following CLI commands:
■ show security policies
■ show security policies policy-name policy-name
■ Move —Moves the position of the policy. You have the option to move the
policy up, down, top or bottom.
Table 55 on page 139 summarizes key output fields in the security policies information
display.
Combo Options
Default policy Actions the device takes on a packet that does not
match any user-defined policy:
■ permit-all—Permit all traffic that does not
match a policy.
■ deny-all—Displays the configured
default-policy.
Log Indicates the log options for log session. The options
are:
■ Session initialization
■ Session close
■ Both
Graph Pane
The graph pane appears blank if the counters pane indicates "No data." If the counters
pane contains has data, after the refresh interval, the graph pane begins to draw the
graph automatically during the refresh interval" for the selected counter
Policy Counter
If the selected policy has count enabled, the counters pane displays counters for that
policy.
Table 56 on page 142 summarizes key output fields in the screen counters display.
Zones
ICMP Flood Internet Control Message Protocol (ICMP) flood An ICMP flood typically occurs when ICMP echo
counter. requests use all resources in responding, such
that valid network traffic can no longer be
processed.
UDP Flood User Datagram Protocol (UDP) flood counter. UDP flooding occurs when an attacker sends IP
packets containing UDP datagrams with the
purpose of slowing down the resources, such
that valid connections can no longer be handled.
TCP Winnuke Number of Transport Control Protocol (TCP) WinNuke is a denial-of-service (DoS) attack
WinNuke attacks. targeting any computer on the Internet running
Windows.
TCP Port Scan Number of TCP port scans. The purpose of this attack is to scan the available
services in the hopes that at least one port will
respond, thus identifying a service to target.
ICMP Address Sweep Number of ICMP address sweeps. An IP address sweep can occur with the intent
of triggering responses from active hosts.
IP Tear Drop Number of teardrop attacks. Teardrop attacks exploit the reassembly of
fragmented IP packets.
ICMP Ping of Death ICMP ping of death counter. Ping of death occurs when IP packets are sent
that exceed the maximum legal length (65,535
bytes).
TCP Land Attack Number of land attacks. Land attacks occur when attacker sends spoofed
SYN packets containing the IP address of the
victim as both the destination and source IP
address.
TCP No Flag Number of TCP headers without flags set. A normal TCP segment header has at least one
control flag set.
IP Record Route Option Number of packets with the IP record route This option records the IP addresses of the
option enabled. network devices along the path that the IP
packet travels.
IP Timestamp Option Number of IP timestamp option attacks. This option records the time (in Universal Time)
when each network device receives the packet
during its trip from the point of origin to its
destination.
IP Loose route Option Number of IP loose route option attacks. This option specifies a partial route list for a
packet to take on its journey from source to
destination.
IP Strict Source Route Number of IP strict source route option attacks. This option specifies the complete route list for
Option a packet to take on its journey from source to
destination.
IP Stream Option Number of stream option attacks. This option provides a way for the 16-bit
SATNET stream identifier to be carried through
networks that do not support streams.
ICMP Fragment Number of ICMP fragments. Because ICMP packets contain very short
messages, there is no legitimate reason for ICMP
packets to be fragmented. If an ICMP packet is
so large that it must be fragmented, something
is amiss.
TCP FIN without ACK Number of TCP FIN flags without the
acknowledge (ACK) flag.
TCP SYN-ACK-ACK Proxy Number of TCP flags enabled with To prevent flooding with SYN-ACK-ACK sessions,
SYN-ACK-ACK. you can enable the SYN-ACK-ACK proxy
protection screen option. After the number of
connections from the same IP address reaches
the SYN-ACK-ACK proxy threshold, JUNOS
Software rejects further connection requests
from that IP address.
Monitoring IDP
IDP monitoring pages allow you to display detailed information about the IDP Status,
Memory, Counters, Policy rulebase statistics and Attack table statistics
Table 57 on page 144 summarizes key output fields in the IDP display.
IDP Status
Status of IDP Displays the status of the current IDP policy.
Up Since Displays the time from when the IDP policy first
began running on the system.
IDP Memory Statistics Displays the status of all IDP data plane
memory.
Total IDP Data Plane Displays the total memory space, in megabytes,
Memory (MB) allocated for the IDP data plane.
Table 58 on page 145 summarizes key output fields in the flow session statistics
display.
To view information about all currently active security sessions on the device, select
Monitor>Security>Flow Session Statistics in the J-Web interface. Then select all
from the Session Filter list and click Show. To view information about the incoming
and outgoing source and destination addresses and the protocol and interface for a
specific session, select the session ID on the Flow Session Statistics page.
Table 59 on page 146 summarizes key output fields in the flow all session display.
Table 59: Summary of Key Flow All Session Information Output Fields
To view information about each session of the specified application type, select
Monitor>Security>Flow Session Statistics in the J-Web interface. Then select
application from the Session Filter list and click Show. Alternatively, enter the
following CLI command:
Table 60 on page 147 summarizes key output fields in the flow session application
display.
Table 60: Summary of Key Flow Application Session Information Output Fields
To view information about each session that uses the specified destination port,
select Monitor>Security>Flow Session Statistics in the J-Web interface. Then select
destination port from the Session Filter list and click Show. Alternatively, enter the
following CLI command:
Table 61 on page 147 summarizes key output fields in the flow session destination
port display.
Table 61: Summary of Key Flow Destination Port Session Information Output Fields
To view information about each session that uses the specified destination prefix,
select Monitor>Security>Flow Session Statistics in the J-Web interface. Then select
destination prefix from the Session Filter list and click Show. Alternatively, enter
the following CLI command:
Table 62 on page 148 summarizes key output fields in the flow session destination
prefix display.
Table 62: Summary of Key Flow Destination Prefix Session Information Output Fields
To view information about each session that uses the specified incoming or outgoing
interface, select Monitor>Security>Flow Session Statistics in the J-Web interface.
Then select interface from the Session Filter list and click Show. Alternatively, enter
the following CLI command:
Table 63 on page 148 summarizes key output fields in the flow session interface
display.
Table 63: Summary of Key Flow Interface Session Information Output Fields
Table 63: Summary of Key Flow Interface Session Information Output Fields (continued)
To view information about each session that uses the specified protocol, select
Monitor>Security>Flow Session Statistics in the J-Web interface. Then select
protocol from the Session Filter list and click Show. Alternatively, enter the following
CLI command:
Table 64 on page 149 summarizes key output fields in the flow session protocol
display.
Table 64: Summary of Key Flow Protocol Session Information Output Fields
Table 65 on page 150 summarizes key output fields in the flow session resource
manager display.
Table 65: Summary of Key Flow Resource Manager Session Output Fields
Table 66 on page 150 summarizes key output fields in the flow session identifier
session display.
Flag Internal flag depicting the state of the session, used for
debugging purposes.
Table 66: Summary of Key Flow Session Identifier Output Fields (continued)
Policy Name and ID of the policy that the first packet of the
name session matched.
Start time Time when the session was created, offset from the
system start time.
To view information about each session that uses the specified source port, select
Monitor>Security>Flow Session Statistics in the J-Web interface. Then select
source port from the Session Filter list and click Show. Alternatively, enter the
following CLI command:
Table 67 on page 152 summarizes key output fields in the flow session source port
display.
Table 67: Summary of Key Flow Source Port Session Output Fields
To view information about each session that uses the specified source prefix, select
Monitor>Security>Flow Session Statistics in the J-Web interface. Then select
source prefix from the Session Filter list and click Show. Alternatively, enter the
following CLI command:
Table 68 on page 152 summarizes key output fields in the flow session source prefix
display.
Table 68: Summary of Key Flow Source Prefix Session Output Fields
Table 68: Summary of Key Flow Source Prefix Session Output Fields (continued)
Table 69 on page 153 summarizes key output fields in the flow session tunnel display.
Monitoring IDP
For information about monitoring Intrusion Detection and Prevention features, see
the JUNOS Software Security Configuration Guide.
Table 70 on page 154 summarizes key output fields in the flow gate display.
The firewall authentication user information is divided into multiple parts. To view
information about authentication table, select Monitor>Security>Firewall
Authentication>Authentication Table in the J-Web interface. To view detailed
information about the user with a particular identifier, select the ID on the
Authentication Table page. To view detailed information about the user at a particular
source IP address, select the Source IP on the Authentication Table page.
Table 71 on page 155 summarizes key output fields in firewall authentication table
display.
Authentication table
ID Authentication identification number.
Bytes sent by this user Number of packets in bytes sent by this user.
Table 71: Summary of Key Firewall Authentication Table Output Fields (continued)
Bytes sent by this user Number of packets in bytes sent by this user.
The firewall authentication history information is divided into multiple parts. To view
information about the authentication history, select Monitor>Security>Firewall
Authentication>Authentication History in the J-Web interface. To view the detailed
history of the authentication with this identifier, select the ID on the Firewall
Authentication History page. To view a detailed authentication history of this source
IP address, select the Source IP on the Firewall Authentication History page.
Table 72 on page 156 summarizes key output fields in firewall authentication history
display.
History Table
ID Identification number.
Table 72: Summary of Key Firewall Authentication History Output Fields (continued)
Bytes sent by this user Number of packets in bytes sent by this user.
Bytes sent by this user Number of packets in bytes sent by this user.
Table 72: Summary of Key Firewall Authentication History Output Fields (continued)
Monitoring 802.1x
To view information about 802.1X properties, select Monitor>Security>802.1x in
the J-Web interface or enter the following CLI commands:
■ show dot1x interfaces interface-name
■ show dot1x authentication-failed-users
Monitoring ALGs
The J-Web interface provides detailed information about the SIP, H.323, MGCP, and
SCCP ALGs.
Table 74 on page 159 summarizes key output fields in the SIP calls display.
Local Tag Local tag for the SIP ALG User Agent server.
Remote Remote tag for the SIP ALG User Agent server.
Tag
Table 75 on page 160 summarizes key output fields in the SIP counters display.
CANCEL Number of CANCEL requests sent. A user can send a CANCEL request to cancel a pending
INVITE request. A CANCEL request has no effect if the
SIP server processing the INVITE had sent a final
response for the INVITE before it received the CANCEL.
ACK Number of ACK requests sent. The user from whom the INVITE originated sends an
ACK request to confirm reception of the final response
to the INVITE request.
BYE Number of BYE requests sent. A user sends a BYE request to abandon a session. A
BYE request from either user automatically terminates
the session.
REGISTER Number of REGISTER requests sent. A user sends a REGISTER request to a SIP registrar
server to inform it of the current location of the user.
A SIP registrar server records all the information it
receives in REGISTER requests and makes this
information available to any SIP server attempting to
locate a user.
OPTIONS Number of OPTIONS requests sent. An OPTION message is used by the User Agent (UA)
to obtain information about the capabilities of the SIP
proxy. A server responds with information about what
methods, session description protocols, and message
encoding it supports.
INFO Number of INFO requests sent. An INFO message is used to communicate mid-session
signaling information along the signaling path for the
call.
MESSAGE Number of MESSAGE requests sent. SIP messages consist of requests from a client to a
server and responses to the requests from a server to
a client with the purpose of establishing a session (or
a call).
NOTIFY Number of NOTIFY requests sent. A NOTIFY message is sent to inform subscribers of
changes in state to which the subscriber has a
subscription.
REFER Number of REFER requests sent. A REFER request is used to refer the recipient
(identified by the Request-URI) to a third party by the
contact information provided in the requst.
SUBSCRIBE Number of SUBSCRIBE requests sent. A SUBSCRIBE request is used to request current state
and state updates from a remote node.
UPDATE Number of UPDATE requests sent. An UPDATE request is used to create a temporary
opening in the firewall (pinhole) for new or updated
Session Description Protocol (SDP) information. The
following header fields are modified: Via, From, To,
Call-ID, Contact, Route, and Record-Route.
Table 76 on page 162 summarizes key output fields in the SIP rate display.
Time taken Time, in microseconds, that the last SIP ALG message
for the last needed to transit the network.
message in
microseconds
is
Table 77 on page 163 summarizes key output fields in the SIP transactions display.
Table 78 on page 163 summarizes key output fields in the H.323 counters display.
Number of Number of active H.323 ALG calls. This counter displays the number of call legs and may
active calls not display the exact number of voice calls that are
active. For instance, for a single active voice call
between two endpoints, this counter might display a
value of 2.
Table 79 on page 165 summarizes key output fields in the MGCP calls display.
Table 80 on page 165 summarizes key output fields in the MGCP counters display.
Error Counters
Unknown-method MGCP ALG unknown method errors.
Table 81 on page 166 summarizes key output fields in the MGCP endpoints display.
MGCP Endpoints
Gateway IP address of the gateway.
IP IP address.
Table 82 on page 167 summarizes key output fields in the SCCP calls display.
Table 83 on page 168 summarizes key output fields in the SCCP counters display.
Error counters
Packets Number of packets dropped by the SCCP ALG.
dropped
Monitoring VPNs
The J-Web interface provides information about IKE and IPsec security associations
(SAs).
Table 84 on page 170 summarizes key output fields in the IKE gateway display.
Responder cookie Random number generated by the remote node A cookie is aimed at protecting the computing
and sent back to the initiator as a verification resources from attack without spending
that the packets were received. excessive CPU resources to determine the
cookie’s authenticity.
IKE SA Index Index number of an SA. This number is an internally generated number
you can use to display information about a single
SA.
Responder cookie Random number generated by the remote node A cookie is aimed at protecting the computing
and sent back to the initiator as a verification resources from attack without spending
that the packets were received. excessive CPU resources to determine the
cookie’s authenticity.
Local identity Specifies the identity of the local peer so that its
partner destination gateway can communicate
with it. The value is specified as any of the
following: IPv4 address, fully qualified domain
name, e-mail address, or distinguished name.
Table 85 on page 173 summarizes key output fields in the IPsec VPN display.
Table 85: Summary of Key IPsec VPN Information Output Fields (continued)
State State has two options, Installed and Not Installed. For transport mode, the value of State is always
Installed.
■ Installed—The security association is
installed in the security association
database.
■ Not Installed—The security association is
not installed in the security association
database.
Table 85: Summary of Key IPsec VPN Information Output Fields (continued)
Local identity Specifies the identity of the local peer so that its
partner destination gateway can communicate
with it. The value is specified as any of the
following: IPv4 address, fully qualified domain
name, e-mail address, or distinguished name.
Table 85: Summary of Key IPsec VPN Information Output Fields (continued)
State State has two options, Installed, and Not For transport mode, the value of State is always
Installed. Installed.
Table 85: Summary of Key IPsec VPN Information Output Fields (continued)
Soft Lifetime The soft lifetime informs the IPsec key Each lifetime of a security association has two
management system that the SA is about to display options, hard and soft, one of which must
expire. be present for a dynamic security association.
This allows the key management system to
■ Expires in seconds—Number of seconds left negotiate a new SA before the hard lifetime
until the SA expires. expires.
■ Expires in kilobytes—Number of kilobytes
left until the SA expires.
Anti Replay Service State of the service that prevents packets from
being replayed. It can be Enabled or Disabled.
Replay Window Size Configured size of the antireplay service The antireplay window size protects the receiver
window. It can be 32 or 64 packets. If the replay against replay attacks by rejecting old or
window size is 0, the antireplay service is duplicate packets.
disabled.
Age The time remaining before the entry ages out and
is removed from the Ethernet switching table.
Root ID Bridge ID of the elected spanning tree root bridge. The bridge ID consists of a configurable bridge priority
and the MAC address of the bridge.
Interface List
Interface Interface configured to participate in the STP instance.
Name
Monitoring GVRP
To view information about global GVRP configuration, select
Monitor>Switching>GVRP in the J-Web interface or enter the following CLI
command:
show gvrp
GVRP
Table 90 on page 182 describes the different filters, their functions, and the associated
actions.
Table 91 on page 182 summarizes key output fields in the routing information display.
Destination Address Specifies the destination address of the route. Enter the destination address.
Protocol Specifies the protocol from which the route was Enter the protocol name.
learned.
Next hop address Specifies the network layer address of the directly Enter the next hop address.
reachable neighboring system (if applicable) and the
interface used to reach it.
Receive protocol Specifies the dynamic routing protocol using which Enter the routing protocol.
the routing information was received through a
particular neighbor.
Best route Specifies only the best route available. Select the view details of the best route.
Inactive routes Specifies the inactive routes. Select the view details of inactive routes.
Exact route Specifies the exact route. Select the view details of the exact route.
Hidden routes Specifies the hidden routes. Select the view details of hidden routes.
Search Applies the specified filter and displays the matching To apply the filter and display messages,
messages. click Search.
Preference The preference is the individual preference value for The route preference is used as one of the route
the route. selection criteria.
Next-Hop Network layer address of the directly reachable If a next hop is listed as Discard, all traffic with that
neighboring system (if applicable) and the interface destination address is discarded rather than routed.
used to reach it. This value generally means that the route is a static
route for which the discard attribute has been set.
State Flags for this route. There are many possible flags.
Table 92 on page 183 summarizes key output fields in the RIP routing display in the
J-Web interface.
RIP Statistics
Protocol Name The RIP protocol name.
Hold down time The interval during which routes are neither
advertised nor updated.
Global routes held Number of RIP routes that are not advertised or
down updated during the hold-down interval.
RIP Neighbors
Details Tab used to view the details of the interface on
which RIP is enabled.
Neighbor Name of the RIP neighbor. This value is the name of the interface on which
RIP is enabled. Click the name to see the details
for this neighbor.
Source Address Local source address. This value is the configured address of the interface
on which RIP is enabled.
Destination Address Destination address. This value is the configured address of the
immediate RIP adjacency.
Table 93 on page 185 summarizes key output fields in the OSPF routing display in
the J-Web interface.
OSPF Interfaces
Details Tab used to view the details of the selected
OSPF.
State State of the interface: BDR, Down, DR, DRother, The Down state, indicating that the interface is
Loop, PtToPt, or Waiting. not functioning, and PtToPt state, indicating that
a point-to-point connection has been
established, are the most common states.
Stub Type The areas into which OSPF does not flood AS
external advertisements
Interface Cost The path cost used to calculate the root path
cost from any given LAN segment is determined
by the total cost of each link in the path.
Retransmit Interval The interval for which the routing device waits
to receive a link-state acknowledgment packet
before retransmitting link-state advertisements
to an interface’s neighbors.
OSPF Statistics
Packets tab
Sent Displays the total number of packets sent.
Details tab
Flood Queue Depth Number of entries in the extended queue.
OSPF Neighbors
Address Address of the neighbor.
State State of the neighbor: Attempt, Down, Exchange, Generally, only the Down state, indicating a
ExStart, Full, Init, Loading, or 2way. failed OSPF adjacency, and the Full state,
indicating a functional adjacency, are
maintained for more than a few seconds. The
other states are transitional states that a
neighbor is in only briefly while an OSPF
adjacency is being established.
ID ID of the neighbor.
To view BGP routing information, including a summary of BGP routing and neighbor
information, select Monitor>Routing>BGP Information, or enter the following CLI
commands:
■ show bgp summary
■ show bgp neighbor
Table 94 on page 187 summarizes key output fields in the BGP routing display in the
J-Web interface.
BGP Neighbors
Details Click this button to view the selected BGP
neighbor details.
Peer State Current state of the BGP session: Generally, the most common states are Active,
which indicates a problem establishing the BGP
■ Active—BGP is initiating a TCP connection
connection, and Established, which indicates a
in an attempt to connect to a peer. If the
successful session setup. The other states are
connection is successful, BGP sends an
transition states, and BGP sessions normally do
open message.
not stay in those states for extended periods of
■ Connect—BGP is waiting for the TCP time.
connection to become complete.
■ Established—The BGP session has been
established, and the peers are exchanging
BGP update messages.
■ Idle—This is the first stage of a connection.
BGP is waiting for a Start event.
■ OpenConfirm—BGP has acknowledged
receipt of an open message from the peer
and is waiting to receive a keepalive or
notification message.
■ OpenSent—BGP has sent an open message
and is waiting to receive an open message
from the peer.
Elapsed Time Elapsed time since the peering session was last
reset.
In addition, you can display the entire CoS configuration, including system-chosen
defaults, by entering the following CLI command:
show class-of-service
Table 95 on page 189 summarizes key output fields for CoS interfaces.
Interface Name of a physical interface to which CoS To display names of logical interfaces
components are assigned. configured on this physical interface, click
the plus sign (+).
Table 96 on page 190 summarizes key output fields for CoS classifiers.
Assign to Loss Priority Loss priority value that the classifier assigns
to the incoming packet based on its CoS
value.
Table 97 on page 191 summarizes key output fields for CoS value aliases.
CoS Value Type Type of the CoS value: To display aliases and bit patterns, click the
plus sign (+).
■ dscp—Examines Layer 3 packet
headers for IP packet classification.
■ dscp ipv6—Examines Layer 3 packet
headers for IPv6 packet classification.
■ exp—Examines Layer 2 packet headers
for MPLS packet classification.
■ ieee-802.1—Examines Layer 2 packet
header for packet classification.
■ inet-precedence—Examines Layer 3
packet headers for IP packet
classification.
Table 98 on page 191 summarizes key output fields for CoS RED drop profiles.
Table 98: Summary of Key CoS RED Drop Profile Output Fields
RED Drop Profile Name Name of the RED drop profile. To display profile values, click the plus sign
(+).
A drop profile consists of pairs of values
between 0 and 100, one for queue buffer
fill level and one for drop probability, that
determine the relationship between a
buffer's fullness and the likelihood it will
drop packets.
Graph RED Profile Link to a graph of a RED curve that the The x axis represents the queue buffer fill
system uses to determine the drop level, and the y axis represents the drop
probability based on queue buffer fullness. probability.
Table 98: Summary of Key CoS RED Drop Profile Output Fields (continued)
Table 99 on page 193 summarizes key output fields for CoS forwarding classes.
Queue Queue number corresponding to the By default, four queues, 0 through 3, are
forwarding class name. assigned to forwarding classes.
Table 100 on page 193 summarizes key output fields for CoS rewrite rules.
CoS Value Type Rewrite rule type: To display forwarding classes, loss priorities,
and rewritten CoS values, click the plus sign
■ dscp—For IPv4 DiffServ traffic. (+).
■ dscp-ipv6—For IPv6 DiffServ traffic.
■ exp—For MPLS traffic.
■ ieee-802.1—For Layer 2 traffic.
■ inet-precedence—For IPv4 traffic.
Table 100: Summary of Key CoS Rewrite Rules Output Fields (continued)
Forwarding Class Forwarding class that in combination with Rewrite rules are applied to CoS values in
loss priority is used to determine CoS values outgoing packets based on forwarding class
for rewriting. and loss priority setting.
Rewrite CoS Value To Value that the CoS value is rewritten to.
Table 101 on page 194 summarizes key output fields for CoS scheduler maps.
Scheduler Map Name of a scheduler map. For details, click the plus sign (+).
Table 101: Summary of Key CoS Scheduler Maps Output Fields (continued)
Table 102 on page 196 summarizes key output fields in the MPLS interface information
display.
Table 103 on page 196 summarizes key output fields in the MPLS LSP information
display.
Egress LSP Information about the LSPs on the outbound MPLS learns this information by querying RSVP,
device. Each session has one line of output. which holds all the transit and outbound session
information.
Transit LSP Number of LSPs on the transit routers and the MPLS learns this information by querying RSVP,
state of these paths. which holds all the transit and outbound session
information.
Table 103: Summary of Key MPLS LSP Information Output Fields (continued)
State State of the path. It can be Up, Down, or AdminDn. AdminDn indicates that the LSP is being taken
down gracefully.
Rt Number of active routes (prefixes) installed in the For inbound RSVP sessions, the routing table is
routing table. the primary IPv4 table (inet.0). For transit and
outbound RSVP sessions, the routing table is the
primary MPLS table (mpls.0).
Active Path Name of the active path: Primary or Secondary. This field is used for inbound LSPs only.
P An asterisk (*) in this column indicates that the This field is used for inbound LSPs only.
LSP is a primary path.
Style RSVP reservation style. This field consists of two This field is used for outbound and transit LSPs
parts. The first is the number of active only.
reservations. The second is the reservation style,
which can be FF (fixed filter), SE (shared explicit),
or WF (wildcard filter).
NOTE: Statistics are not available for LSPs on the outbound device, because the
penultimate device in the LSP sets the label to 0. Also, as the packet arrives at the
outbound device, the hardware removes its MPLS header and the packet reverts to
being an IPv4 packet. Therefore, it is counted as an IPv4 packet, not an MPLS packet.
Table 104 on page 198 summarizes key output fields in the MPLS LSP statistics display.
Egress LSP Information about the LSPs on the outbound MPLS learns this information by querying RSVP,
device. Each session has one line of output. which holds all the transit and outbound session
information.
Transit LSP Number of LSPs on the transit routers and the MPLS learns this information by querying RSVP,
state of these paths. which holds all the transit and outbound session
information.
State State of the path: Up, Down, or AdminDn. AdminDn indicates that the LSP is being taken
down gracefully.
Table 105 on page 198 summarizes key output fields in the RSVP session information
display.
Egress LSP Information about outbound RSVP sessions. Each MPLS learns this information by querying RSVP,
session has one line of output. which holds all the transit and outbound session
information.
Table 105: Summary of Key RSVP Session Information Output Fields (continued)
Transit LSP Information about transit RSVP sessions. MPLS learns this information by querying RSVP,
which holds all the transit and outbound session
information.
State State of the path: Up, Down, or AdminDn. AdminDn indicates that the LSP is being taken
down gracefully.
Rt Number of active routes (prefixes) installed in the For inbound RSVP sessions, the routing table is
routing table. the primary IPv4 table (inet.0). For transit and
outbound RSVP sessions, the routing table is the
primary MPLS table (mpls.0).
Style RSVP reservation style. This field consists of two This field is used for outbound and transit LSPs
parts. The first is the number of active only.
reservations. The second is the reservation style,
which can be FF (fixed filter), SE (shared explicit),
or WF (wildcard filter).
Table 106 on page 199 summarizes key output fields in the RSVP interfaces information
display.
Table 106: Summary of Key RSVP Interfaces Information Output Fields (continued)
Monitoring PPPoE
The PPPoE monitoring information is displayed in multiple parts. To display the
session status for PPPoE interfaces, cumulative statistics for all PPPoE interfaces on
the device, and the PPPoE version configured on the device, select Monitor>PPoE
in the J-Web interface.
To view interface-specific properties in the J-Web interface, select the interface name
on the PPPoE page.
Table 107 on page 201 summarizes key output fields in PPPoE displays.
You can also view status information about the PPPoE interface by entering the show
interfaces pp0 command in the CLI editor. For more information about key output
fields, see “Monitoring Interfaces” on page 129.
PPPoE Interfaces
Interface Name of the PPPoE interface. Click the interface name to display PPPoE
information for the interface.
(See the interface naming conventions in the
JUNOS Software Interfaces and Routing
Configuration Guide.)
Session ID Unique session identifier for the PPPoE session. To establish a PPPoE session, first the device acting
as a PPPoE client obtains the Ethernet address of
the PPPoE server or access concentrator, and then
the client and the server negotiate a unique session
ID. This process is referred to as PPPoE active
discovery and is made up of four steps: initiation,
offer, request, and session confirmation. The access
concentrator generates the session ID for session
confirmation and sends it to the PPPoE client in a
PPPoE Active Discovery Session-Confirmation (PADS)
packet.
Service Name Type of service required from the access Service Name identifies the type of service provided
concentrator. by the access concentrator, such as the name of the
Internet service provider (ISP), class, or quality of
service.
PPPoE Statistics
PPPoE Version
PADI Resend Initial time, (in seconds) the device waits to The PPPoE Active Discovery Initiation (PADI) packet
Timeout receive a PADO packet for the PADI packet is sent to the access concentrator to initiate a PPPoE
sent—for example, 2 seconds. This timeout session. Typically, the access concentrator responds
doubles for each successive PADI packet sent. to a PADI packet with a PPPoE Active Discovery
Offer (PADO) packet. If the access concentrator does
not send a PADO packet, the device sends the PADI
packet again after timeout period is elapsed. The
PADI Resend Timeout doubles for each successive
PADI packet sent. For example, if the PADI Resend
Timeout is 2 seconds, the second PADI packet is
sent after 2 seconds, the third after 4 seconds, the
fourth after 8 seconds, and so on.
PADR Resend Initial time (in seconds) the device waits to receive The PPPoE Active Discovery Request (PADR) packet
Timeout a PADS packet for the PADR packet sent. This is sent to the access concentrator in response to a
timeout doubles for each successive PADR packet PADO packet, and to obtain the PPPoE session ID.
sent. Typically, the access concentrator responds to a
PADR packet with a PPPoE Active Discovery
Session-Confirmation (PADS) packet, which contains
the session ID. If the access concentrator does not
send a PADS packet, the device sends the PADR
packet again after the PADR Resend Timeout period
is elapsed. The PADR Resend Timeout doubles for
each successive PADR packet sent.
Monitoring PPP
PPP monitoring information includes PPP address pool information, session status
for PPP interfaces, cumulative statistics for all PPP interfaces, and a summary of PPP
sessions.
NOTE: PPP monitoring information is available only in the CLI. The J-Web interface
does not include pages for displaying PPP monitoring information.
For information about these CLI commands, see the JUNOS Interfaces Command
Reference.
For a description of the interface properties and statistics, see the JUNOS Software
Interfaces and Routing Configuration Guide.
Monitoring Services
Monitoring DHCP
This section contains the following topics:
■ Monitoring DHCP Service Statistics on page 204
■ Monitoring DHCP Client Bindings on page 207
A J Series or SRX Series device can operate as a Dynamic Host Configuration Protocol
(DHCP) server. To view information about global scope and DHCP service statistics,
select Monitor>Services>DHCP>Statistics in the J-Web interface, or enter the
following CLI commands:
■ show system services dhcp global
■ show system services dhcp statistics
Table 108 on page 204 summarizes the output fields in DHCP displays in the J-Web
interface.
Global tab
Bindings tab
Allocated List of IP addresses the DHCP server has assigned to
Address clients.
Binding Type of binding assigned to the client: dynamic or DHCP servers can assign a dynamic binding from a pool
Type static. of IP addresses or a static binding to one or more
specific IP addresses.
Lease Date and time the lease expires, or never for leases
Expires that do not expire.
Pools tab
Pool Name Subnet on which the IP address pool is defined.
Clients tab
Interface Name of the logical interface.
Name
Conflicts tab
Detection Date and time the client detected the conflict.
Time
Detection How the conflict was detected. Only client-detected conflicts are displayed.
Method
Address IP address where the conflict occurs. The addresses in the conflicts list remain excluded until
you use the clear system services dhcp conflict command
to manually clear the list.
DHCP Statistics
Relay Statistics tab
Packet Displays the number of packet counters.
Counters
Statistics tab
Packets Total number of packets dropped and the number of
dropped packets dropped due to a particular condition.
Table 109 on page 207 summarizes the key output fields in the DHCP client binding
displays.
Lease Date and time the lease expires, or never for leases
Expires at that do not expire.
JUNOS Software supports configuring and monitoring of system log messages (also
called syslog messages). You can configure files to log system messages and also
assign attributes, such as severity levels, to messages. The View Events page on the
J-Web interface enables you to filter and view system log messages.
For more information about system log messages, see the JUNOS System Log Messages
Reference.
For information about which devices support the features documented in this chapter,
see the JUNOS Software Feature Support Reference for SRX Series and J Series Devices.
Term Definition
event Condition that occurs on a device at a particular time. An event can include routine, failure, error,
emergency or critical conditions.
event ID System log message code that uniquely identifies a system log message. The code begins with
a prefix indicating the software process or library that generates the event.
facility Group of messages that either are generated by the same software process (such as accounting
statistics) or concern a similar condition or activity (such as authentication attempts). For a list
of system logging facilities, see Table 111 on page 212.
Term Definition
priority Combination of the facility and severity level of a system log message. By default, priority
information is not included in system log messages, but you can configure JUNOS Software to
include it. For more information, see the JUNOS System Log Messages Reference. See also facility;
severity level.
process Software program, also known as a daemon, that controls device functionality. The following
are the primary JUNOS Software processes:
■ Routing protocol process (rpd)—Defines how routing protocols such as RIP, OSPF, and BGP
operate on the device. It starts the configured routing protocols, handles all routing messages,
maintains routing tables and implements the routing policy.
■ Interface process (also called device control process) (dcd)—Allows you to configure and
control the physical and logical interfaces present in a device. It also enables JUNOS Software
to track the status and condition of the device's interfaces.
■ Chassis process (chassisd)—Controls the physical properties of a device chassis, including
conditions that trigger alarms.
■ SNMP—Simple Network Management Protocol, which helps administrators monitor the
state of a device.
■ Management process (mgd)—Controls processes that start and monitor all the other software
processes. The management process starts the command-line interface (CLI), which is the
primary tool used to control and monitor JUNOS Software. It also starts all the software
processes and the CLI when the device starts up. If a software process terminates, the
management process attempts to restart it.
■ Forwarding process (flowd)—Forwards packets through the device. The flow-based forwarding
process applies filters and policers associated with the ingress interface to packets entering
the device. It establishes the state of the packet's session and manages the packet as it
transits the security flow and its applicable features. It applies output filtering and traffic
shaping to the flow before transmitting the packet out the egress interface.
■ Network security process (nsd)—Interprets, executes, and manages the configuration of
extended interface attributes, policies, zones, address books, firewall screens, Network
Address Translation (NAT), and other network security treatments.
■ Internet Key Exchange process (iked)—Implements tunnel management for IPSec VPNs,
provides authentication of endpoint entities, and generates keys for packet authentication
and encryption.
■ Firewall authentication process (fwauthd)—Implements and manages user authentication
configuration, and authenticates users who access the firewall.
■ Dynamic Host Configuration Protocol process (dhcpd)—Implements the DHCP client,
allowing the device to obtain IP addresses from the network DHCP server, set other
configuration parameters, manage TCP/IP settings propagation, and display client-related
information.
For more information about processes, see the JUNOS Software Installation and Upgrade Guide.
process ID Identifier uniquely identifying a process. The process ID is displayed in a system log message
along with the name of the process that generates the event.
severity level Measure of how seriously a triggering event affects device functions. For a list of severity levels
that you can specify, see Table 112 on page 212.
The JUNOS system logging utility is similar to the UNIX syslogd utility. Each system
log message identifies the software process that generated the message and briefly
describes the operation or error that occurred.
Reboot requests are recorded to the system log files, which you can view with the
show log command. Also, you can view the names of any processes running on your
system with the show system processes command.
Each system log message belongs to a facility, which is a group of messages that are
either generated by the same software process or concern a similar condition or
activity.
Table 111 on page 212 lists the system logging facilities, and Table 112 on page 212
lists the system logging severity levels. For more information about system log
messages, see the JUNOS System Log Messages Reference.
Facility Description
emergency System panic or other conditions that cause the routing platform to stop functioning.
alert Conditions that must be corrected immediately, such as a corrupted system database.
error Standard error conditions that generally have less serious consequences than errors in
the emergency, alert, and critical levels.
notice Conditions that are not error conditions but are of interest or might warrant special
handling.
■ For SRX100, SRX210, SRX240, and SRX650 devices, by default, the system
sends data plane events to the eventd process on the Routing Engine to be
processed, formatted, and written to system log files in a similar manner to
control plane events.
You can change these settings. See “Setting the System to Send All Log Messages
Through eventd” on page 214 and “Setting the System to Stream Security Logs
Through Revenue Ports” on page 215.
■ Configure network interfaces. See the JUNOS Software Interfaces and Routing
Configuration Guide.
{primary:node0}
user@host> set security log mode event
Then configure the server that will receive the system log messages:
{primary:node0}
user@host> set system syslog host hostname
where hostname is the fully qualified hostname or IP address of the server that will
receive the logs.
The type of logging configuration is the one that has been used most commonly for
JUNOS. In this configuration, control plane logs and data plane, or security, logs are
forwarded from the data plane to the Routing Engine control plane rtlogd process.
The rtlogd process then either forwards syslog/sd-syslog-formatted logs to the eventd
process or the WELF-formatted logs to the external/remote WELF log collector.
NOTE: If you want to send duplicate logs to a second remote server, repeat the
command with a new fully qualified hostname or IP address of a second server.
If your deployment is an active/active chassis cluster, you can also configure security
logging on the active node to be sent to separate remote servers in order to achieve
logging redundancy.
If you need to rename or redirect one of the logging configurations, you will need to
delete and recreate it. To delete a configuration:
{primary:node0}
NOTE: WELF logs must be streamed through a revenue port because the eventd
process does not recognize the WELF format.
You can increase the number of data plane, or security, logs that are sent by modifying
the manner in which they are sent.
When the logging mode is set to stream, security logs generated in the data plane
are streamed out a revenue traffic port directly to a remote server. Other system
logs are still handled as described in “Setting the System to Send All Log Messages
Through eventd” on page 214.
{primary:node0}
user@host> set security log mode source-address
{primary:node0}
user@host> set security log mode stream
{primary:node0}
user@host set security log stream streamname format [syslog|sd-syslog|welf]
category [all|content-security] host ipaddr
Note that for the WELF format, the category must be set to content-security. For
example:
NOTE: If you want to send duplicate logs to a second remote server, repeat the
command with a new ipaddr.
If your deployment is an active/active chassis cluster, you can also configure security
logging on the active node to be sent to separate remote servers in order to achieve
logging redundancy.
card, include the complete pathname. For the list of logging facilities and severity
levels, see Table 111 on page 212 and Table 112 on page 212.
For information about archiving log files, see “Archiving System Logs” on page 217.
The procedure provided in this section sends all security-related information to the
sample file named security.
Navigate to the Syslog level in the 1. In the J-Web interface, select CLI Tools>Point From the [edit] hierarchy level,
configuration hierarchy. and Click CLI. enter
2. Next to System, click Configure or Edit.
edit system syslog
3. Next to Syslog, click Configure or Edit.
Create a file named security, and 1. Next to File, click Add new entry. Set the filename and the facility
send log messages of the and severity level:
authorization class at the severity
2. In the File name box, type security.
level info to the file. 3. Next to Contents, click Add new entry. set file security authorization info
The procedure provided in this section sends any critical messages to the terminal
of the sample user frank, if he is logged in.
Navigate to the Syslog level 1. In the J-Web interface, select CLI Tools>Point and From the [edit] hierarchy level,
in the configuration Click CLI. enter
hierarchy.
2. Next to System, click Configure or Edit.
edit system syslog
3. Next to Syslog, click Configure or Edit.
Send all critical messages to 1. Next to User, click Add new entry. Set the filename and the facility
the user frank. and severity level:
2. In the User name box, type frank.
3. Next to Contents, click Add new entry. set user frank any critical
To enable all users to read log files, include the world-readable statement at the [edit
system syslog archive] hierarchy level. To restore the default permissions, include
the no-world-readable statement. You can include the archive statement at the [edit
system syslog file filename] hierarchy level to configure the number of files, file size,
and permissions for the specified log file. For configuration details, see the information
about archiving log files in the JUNOS System Basics Configuration Guide.
Monitoring System Log Messages with the J-Web Event Viewer ■ 217
JUNOS Software Administration Guide
The J-Web View Events page displays the following information about each event:
■ Process—System process that generated the error or event.
■ Severity— A severity level indicates how seriously the triggering event affects
routing platform functions. Only messages from the facility that are rated at that
level or higher are logged. Possible severities and their corresponding color code
are:
■ Debug/Info/Notice (Green)—Indicates conditions that are not errors but are
of interest or might warrant special handling.
■ Warning (Yellow)—Indicates conditions that warrant monitoring.
■ Event ID—Unique ID of the error or event. The prefix on each code identifies
the generating software process. The rest of the code indicates the specific event
or error.
■ Event Description—Displays a more detailed explanation of the message.
■ Time—Time that the error or event occurred.
To control which errors and events are displayed in the list, use the following options:
■ System Log File—Specify the name of the system log file that records the errors
and events.
■ Process—Specify the system processes that generate the events you want to
display. For an overview of some of the primary system processes, see Table
110 on page 209. To view all the processes running on your system, enter the
show system processes CLI command.
■ Date From—Specify the beginning of the date range that you want to monitor.
Set the date using the calendar pick tool.
■ To—Specify the end of the date range that you want to monitor. Set the date
using the calendar pick tool.
■ Event ID—Specify the specific ID of the error or event that you want to monitor.
For a complete list of system error and event IDs, see the JUNOS Software System
Log Messages Reference.
■ Description—Enter a description for the errors or events.
■ Search—Fetches the errors and events specified in the search criteria.
■ Reset—Clears the cache of errors and events that were previously selected.
■ Generate Report—Creates an HTML report based on the specified parameters.
218 ■ Monitoring System Log Messages with the J-Web Event Viewer
Chapter 11
Configuring and Monitoring Alarms
An active alarm lights the ALARM LED on the front panel of the device. You can
monitor active alarms from the J-Web interface or the CLI.
For more information about alarms, see the JUNOS System Basics Configuration Guide.
For information about which devices support the features documented in this chapter,
see the JUNOS Software Feature Support Reference for SRX Series and J Series Devices.
Alarm Terms
Before configuring and monitoring alarms, become familiar with the terms defined
in Table 115 on page 219.
Term Definition
alarm Signal alerting you to conditions that might prevent normal operation. The alarm signal is the
yellow ALARM LED lit on the front of the chassis.
alarm severity Seriousness of the alarm. The level of severity can be either major (red) or minor (yellow).
Term Definition
chassis alarm Predefined alarm triggered by a physical condition on the device such as a power supply failure,
excessive component temperature, or media failure.
interface alarm Alarm triggered by the state of a physical link on a fixed or installed Physical Interface Module
(PIM), such as a link failure or a missing signal.
Interface alarms are triggered by conditions on a T1 (DS1), Fast Ethernet, serial, or T3 (DS3)
physical interface or by conditions on the sp-0/0/0 adaptive services interface for stateful firewall
filter, Network Address Translation (NAT), Intrusion Detection and Prevention (IDP), or IP Security
(IPsec) services.
system alarm Predefined alarm triggered by a missing rescue configuration or failure to install a license for a
licensed software feature.
Alarm Overview
Alarms warn you about conditions that can prevent the device from operating
normally.
When an alarm condition triggers an alarm, the device lights the yellow (amber)
ALARM LED on the front panel. When the condition is corrected, the light turns off.
NOTE: The ALARM LED on J Series devices light yellow whether the alarm condition
is major (red) or minor (yellow).
Alarm Types
The device supports three types of alarms:
■ Interface alarms indicate a problem in the state of the physical links on fixed or
installed PIMs. To enable interface alarms, you must configure them.
■ Chassis alarms indicate a failure on the device or one of its components. Chassis
alarms are preset and cannot be modified.
■ System alarms indicate a missing rescue configuration or software license, where
valid. System alarms are preset and cannot be modified, although you can
configure them to appear automatically in the J-Web or CLI display.
Alarm Severity
Alarms have two severity levels:
■ Major (red)—Indicates a critical situation on the device that has resulted from
one of the following conditions. A red alarm condition requires immediate action.
■ One or more hardware components have failed.
■ One or more hardware components have exceeded temperature thresholds.
Alarm Conditions
To enable alarms on a device interface, you must select an alarm condition and an
alarm severity. In contrast, alarm conditions and severity are preconfigured for
chassis alarms and system alarms.
NOTE: For information about chassis alarms for your device, see the Hardware Guide
for your device.
Table 116 on page 222 lists the interface conditions, sorted by interface type, that
you can configure for an alarm. Each alarm condition can be configured to trigger
either a major (red) alarm or minor a (yellow) alarm. The corresponding configuration
option is included.
For the services stateful firewall filters (NAT, IDP, and IPsec), which operate on an
internal adaptive services module within a device, you can configure alarm conditions
on the integrated services and services interfaces.
DS1 (T1) Alarm indication signal (AIS) The normal T1 traffic signal contained a defect ais
condition and has been replaced by the AIS. A
transmission interruption occurred at the remote
endpoint or upstream of the remote endpoint. This
all-ones signal is transmitted to prevent
consequential downstream failures or alarms.
Yellow alarm The remote endpoint is in yellow alarm failure. This ylw
condition is also known as a far-end alarm failure.
Integrated Hardware or software failure On the adaptive services module, either the failure
services hardware associated with the module or the software
that drives the module has failed.
Serial Clear-to-send (CTS) signal The remote endpoint of the serial link is not cts-absent
absent transmitting a CTS signal. The CTS signal must be
present before data can be transmitted across a
serial link.
Data carrier detect (DCD) signal The remote endpoint of the serial link is not dcd-absent
absent transmitting a DCD signal. Because the DCD signal
transmits the state of the device, no signal probably
indicates that the remote endpoint of the serial link
is unavailable.
Data set ready (DSR) signal The remote endpoint of the serial link is not dsr-absent
absent transmitting a DSR signal. The DSR signal indicates
that the remote endpoint is ready to receive and
transmit data across the serial link.
Loss of receive clock The clock signal from the remote endpoint is not loss-of-rx-clock
present. Serial connections require clock signals to
be transmitted from one endpoint and received by
the other endpoint of the link.
Loss of transmit clock The local clock signal is not present. Serial loss-of-tx-clock
connections require clock signals to be transmitted
from one endpoint and received by the other
endpoint of the link.
Services Services module hardware A hardware problem has occurred on the device's hw-down
down services module. This error typically means that one
or more of the CPUs on the module has failed.
Services link down The link between the device and its services module linkdown
is unavailable.
Services module held in reset The device's services module is stuck in reset mode. pic-hold-reset
If the services module fails to start up five or more
times in a row, the services module is held in reset
mode. Startup fails when the amount of time from
CPU release to CPU halt is less than 300 seconds.
Services module reset The device's services module is resetting. The pic-reset
module resets after it crashes or is reset from the
CLI, or when it takes longer than 60 seconds to start
up.
Services module software down A software problem has occurred on the device's sw-down
services module.
E3 Alarm indication signal (AIS) The normal E3 traffic signal contained a defect ais
condition and has been replaced by the AIS. A
transmission interruption occurred at the remote
endpoint or upstream of the remote endpoint. This
all-ones signal is transmitted to prevent
consequential downstream failures or alarms.
Out of frame (OOF) An OOF condition has existed for 10 seconds. This oof
alarm applies only to E3 interfaces configured in
frame mode. The OOF failure is cleared when no
OOF or LOS defects have occurred for 20 seconds.
Remote defect indication An AIS, LOS, or OOF condition exists. This alarm rdi
applies only to E3 interfaces configured in frame
mode.
T3 (DS3) Alarm indication signal The normal T3 traffic signal contained a defect ais
condition and has been replaced by the AIS. A
transmission interruption occurred at the remote
endpoint or upstream of the remote endpoint. This
all-ones signal is transmitted to prevent
consequential downstream failures or alarms.
Excessive number of zeros The bit stream received from the upstream host has exz
more consecutive zeros than are allowed in a T3
frame.
Far-end receive failure (FERF) The remote endpoint of the connection has failed. ferf
A FERF differs from a yellow alarm, because the
failure can be any failure, not just an OOF or LOS
failure.
Idle alarm The Idle signal is being received from the remote idle
endpoint.
Line code violation Either the line encoding along the T3 link is lcv
corrupted or a mismatch between the encoding at
the local and remote endpoints of a T3 connection
occurred.
Loss of frame (LOF) An OOF or loss-of-signal LOS condition has existed lof
for 10 seconds. The LOF failure is cleared when no
OOF or LOS defects have occurred for 20 seconds.
A LOF failure is also called a red failure.
Phase-locked loop out of lock The clocking signals for the local and remote pll
endpoints no longer operate in lock-step.
Yellow alarm The remote endpoint is in yellow alarm failure. This ylw
condition is also known as a far-end alarm failure.
Table 117 on page 224 lists the two preset system alarms, the condition that triggers
each alarm, and the action you take to correct the condition.
Configuration The rescue configuration is not set. Set the rescue configuration. For instructions,
see the JUNOS CLI User Guide.
License You have configured at least one software Install a valid license key. For instructions,
feature that requires a feature license, but see the JUNOS Software Administration Guide.
no valid license for the feature is currently
installed.
Navigate to the Alarm level in the 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
configuration hierarchy. Tools>Point and Click CLI.
edit chassis alarm
2. Next to Chassis, click Configure or
Edit.
3. Next to Alarm, click Configure or
Edit.
Configure the system to generate a red 1. In the Ds1 field, click Configure. Enter
interface alarm when a yellow alarm is
detected on a T1 (DS1) link. 2. From the Ylw list, select red.
set ds1 ylw red
3. Click OK.
Configure the system to generate a red 1. In the Ethernet field, click Enter
interface alarm when a link down failure Configure.
is detected on an Ethernet link. set ethernet link–down red
2. From the Link down list, select red.
3. Click OK.
Configure the system to generate the 1. In the Serial field, click Configure. 1. Enter
following interface alarms on a serial
link: 2. From the Cts absent list, select
set serial cts–absent yellow
yellow.
■ Yellow alarm when no CTS signal 2. Enter
is detected 3. From the Dcd absent list, select
yellow.
■ Yellow alarm when no DCD signal set serial dcd–absent yellow
is detected 4. From the Loss of rx clock list, select
red. 3. Enter
■ Red alarm when the receiver clock
is not detected 5. From the Loss of tx clock list, select set serial loss–of–rx–clock red
■ Red alarm when the transmission red.
clock is not detected 4. Enter
6. Click OK.
set serial loss–of–tx–clock red
Configure the system to generate the 1. In the T3 field, click Configure. 1. Enter
following interface alarms on a T3 link:
2. From the Ylw list, select red.
set t3 ylw red
■ Red alarm when the remote
endpoint is experiencing a Red 3. From the Exz list, select yellow.
2. Enter
failure 4. From the Los list, select red.
■ Yellow alarm when the upstream set t3 exz yellow
5. Click OK.
bit stream has more consecutive
zeros than are permitted 3. Enter
Configure the system to display active 1. On the main Configuration page 1. Enter
system alarms whenever a user with the next to System, click Configure or
login class admin logs in to the device. Edit. edit system login
2. Next to Login, click Configure or 2. Enter
To define login classes, see the JUNOS
Edit.
System Basics Configuration Guide.
3. In the Class field, click Add new set class admin login-alarms
entry.
4. In the Class name field, type admin.
5. Select the Login alarms check box.
6. Click OK.
Alternatively, you can enter the following show commands in the CLI editor:
■ show chassis alarms
■ show system alarms
The J-Web View Alarms page displays the following information about each alarm:
■ Type—Type of alarm: System, Chassis, or All.
■ Severity—Severity class of the alarm: Minor or Major.
■ Description—Description of the alarm.
■ Time—Time that the alarm was registered.
Action From the J-Web interface, select CLI Tools > CLI Viewer. Alternatively, from
configuration mode in the CLI, enter the show chassis alarms command.
[edit]
user@host# show chassis alarms
t3 {
exz yellow;
los red;
ylw red;
}
ds1 {
ylw red;
}
ethernet {
link-down red;
}
serial {
loss-of-rx-clock red;
loss-of-tx-clock red;
dcd-absent yellow;
cts-absent yellow;
}
Meaning The sample output in this section displays the following alarm settings (in order).
Verify that the output shows the intended configuration of the alarms.
■ T3 alarms
■ DS1 alarms
■ Ethernet alarms
■ Serial alarms
Related Topics For more information about the format of a configuration file, see the J-Web Interface
User Guide or the JUNOS CLI User Guide.
J Series Services Routers and SRX Series Services Gateways are delivered with JUNOS
Software preinstalled. When you power on the device, it starts (boots) up using its
primary boot device. These devices also support secondary boot devices allowing
you to back up your primary boot device and configuration.
As new features and software fixes become available, you must upgrade your software
to use them. Before an upgrade, we recommend that you back up your primary boot
device.
On a services router, you can configure the primary or secondary boot device with
a “snapshot” of the current configuration, default factory configuration, or rescue
configuration. You can also replicate the configuration for use on another device, or
configure a boot device to receive core dumps for troubleshooting.
If the J Series or SRX Series device does not have a secondary boot device configured
and the primary boot device becomes corrupted, you can reload the JUNOS recovery
software package onto the corrupted CompactFlash card with either a UNIX or
Microsoft Windows computer.
NOTE: The terms JUNOS Software (legacy services) and JUNOS Software are used
frequently in this chapter. JUNOS Software (legacy services) denotes the packet-based
software for the J Series Services Router, whereas JUNOS Software denotes the
flow-based software for the J Series Services Router.
For information about which devices support the features documented in this chapter,
see the JUNOS Software Feature Support Reference for SRX Series and J Series Devices.
■ 231
JUNOS Software Administration Guide
■ Installing Software Using the TFTPBoot Method on the SRX100, SRX210, and
SRX650 Services Gateways on page 239
■ Downgrading the Software on page 242
■ Configuring Boot Devices on page 243
■ Rebooting or Halting the Device on page 249
■ Bringing Chassis Components Online and Offline on page 252
■ Chassis Control Restart Options on page 253
■ 1024 MB
Before an upgrade, back up your primary boot device onto a secondary storage
device. If you have a power failure during an upgrade, the primary boot device can
fail or become corrupted. In either case, if a backup device is not available, the device
might be unable to boot and come back online. Creating a backup also stores your
active configuration files and log files and ensures that you recover to a known, stable
environment in case of an unsuccessful upgrade.
During a successful upgrade, the upgrade package completely reinstalls the existing
software. It retains configuration files, log files, and similar information from the
previous version.
Use either the J-Web interface or the CLI to back up the primary boot device on the
secondary storage device listed in Table 119 on page 234.
For instructions about how to backup your system using the J-Web Interface, see
“Configuring a Boot Device for Backup with the J-Web Interface” on page 244. For
instructions about how to backup your system using the CLI, see “Configuring a Boot
Device for Backup with the CLI” on page 246.
■ https://www.juniper.net/support/csc/swdist-ww/
2. Log in to the Juniper Networks website using the username (generally your e-mail
address) and password supplied by Juniper Networks representatives.
3. Select the appropriate software image for your platform. For information about
JUNOS Software packages, see “Upgrade and Downgrade Overview” on page
232.
4. Download the software to a local host or to an internal software distribution site.
NOTE: For more information on migrating a J Series Services Router to a later version
of JUNOS Software, see the JUNOS Software Migration Guide.
You can use the J-Web interface to install software packages that are retrieved with
FTP or HTTP from the specified location.
NOTE: This procedure applies only to upgrading one JUNOS Software release to
another or one JUNOS Software services release to another. To upgrade from the
JUNOS Software to JUNOS Software services, see the JUNOS Software Migration Guide.
Figure 8 on page 235 shows the Install Remote page for the device.
1. Before installing the software upgrade, verify the available space on the
CompactFlash card. For information about verifying available CompactFlash
card space, see the JUNOS Software Release Notes.
2. Download the software package as described in “Downloading Software Upgrades
from Juniper Networks” on page 234.
3. In the J-Web interface, select Maintain>Software>Install Package.
4. On the Install Remote page, enter the required information into the fields
described in Table 120 on page 236.
5. Click Fetch and Install Package. The software is activated after the device
reboots.
Package Location Specifies the FTP or HTTP server, file path, and Type the full address of the software package
(required) software package name. location on the FTP or HTTP server—one of the
following:
ftp://hostname/pathname/package-name
http://hostname/pathname/package-name
User Specifies the username, if the server requires Type the username.
one.
Password Specifies the password, if the server requires Type the password.
one.
Reboot If Required If this box is checked, the device is Check the box if you want the device to reboot
automatically rebooted when the upgrade is automatically when the upgrade is complete.
complete.
You can use the J-Web interface to install software packages uploaded from your
computer. Before installing the software upgrade, you need to verify that there is
enough available space on the CompactFlash card.
NOTE: This procedure applies only to upgrading one JUNOS Software release to
another or one JUNOS Software services release to another. To upgrade from JUNOS
Software to JUNOS Software services, see the JUNOS Software Migration Guide.
Figure 9 on page 237 shows the Upload Package page for the device.
File to Upload Specifies the location of the software package Type the location of the software package, or click
(required) on the local system. Browse to navigate to the location.
Reboot If Required If this box is checked the device is Select the check box if you want the device to
automatically rebooted when the upgrade is reboot automatically when the upgrade is complete.
complete.
NOTE: This procedure applies only to upgrading one JUNOS Software (legacy services)
release to another or upgrading one JUNOS Software release to another. To upgrade
JUNOS Software (legacy services) to JUNOS Software, see the JUNOS Software Migration
Guide.
1. Before installing the software upgrade, verify the available space on the
CompactFlash card. For information about verifying available CompactFlash
card space, see the JUNOS Software Release Notes.
2. Download the software package as described in “Downloading Software Upgrades
from Juniper Networks” on page 234.
3. If you are installing the software package from a local directory on the device,
copy the software package to the device. We recommend that you copy it to the
/var/tmp directory.
4. To install the new package on the device, enter the following command in
operational mode in the CLI:
or
■ http://hostname/pathname/package-name
or
■ tftp://hostname/package-name
By default, the request system software add command uses the validate option
to validate the software package against the current configuration as a prerequisite
to adding the software package. This validation ensures that the device can reboot
successfully after the software package is installed. This is the default behavior
when you are adding a software package.
The unlink option removes the package at the earliest opportunity so that the
device has enough storage capacity to complete the installation.
(Optional) The no-copy option specifies that a software package is installed, but
a copy of the package is not saved. Include this option if you do not have enough
space on the CompactFlash card to perform an upgrade that keeps a copy of the
package on the device.
5. After the software package is installed, reboot the device:
When the reboot is complete, the device displays the login prompt.
Installing Software Using the TFTPBoot Method on the SRX100, SRX210, and
SRX650 Services Gateways
You can install the JUNOS Software using the Trivial File Transfer Protocol BOOT
(TFTPBOOT) method. The device is shipped with the JUNOS Software loaded on the
primary boot device. During install or upgrade of the JUNOS Software, the secondary
boot device in the services gateway retrieves the JUNOS Software package from a
TFTP server. The software image is then installed on the internal flash.
Prerequisites
Before you begin the installation, ensure the following prerequisites are met:
■ The device with or without JUNOS Software image.
■ The device with U-boot and Loader up and running.
■ TFTP server available and loaded with the JUNOS package to be installed on the
device.
■ TFTP server with Bootstrap Protocol (BOOTP) or DHCP support.
If BOOTP or DHCP support is not available, then you need to configure the
gateway IP address, device IP address, and the netmask manually by setting
environment variables. For more information, see the “Setting Environment
Variables for BOOTP or DHCP Support” on page 240 section.
■ Functional network connectivity between the device and the TFTP server.
■ Ethernet interface support for the kernel of the device.
This support is required to stream the ISO image from the TFTP server to the
device.
Installing Software Using the TFTPBoot Method on the SRX100, SRX210, and SRX650 Services Gateways ■ 239
JUNOS Software Administration Guide
To set these environment variables, you need to access the U-boot prompt. For more
information on accessing this prompt, see “Accessing the U-Boot Prompt” on page
240section.
Loading /boot/defaults/loader.conf
240 ■ Installing Software Using the TFTPBoot Method on the SRX100, SRX210, and SRX650 Services Gateways
Chapter 12: Performing Software Upgrades and Reboots
Example for Setting Up This example shows you how to proceed with setting up of environment variables.
Environment Variable When you reboot a device, the following messages are displayed.
Follow the instructions to access the U-boot prompt and set environment variables
at that prompt.
Root Hub 0: 3 USB Device(s) found Root Hub 1: 1 USB Device(s) found
scanning bus for storage devices... 1 Storage Device(s) found
Hit any key to stop autoboot: 0
=>
=> setenv ipaddr 10.157.70.170
=> setenv netmask 255.255.255.0
=> setenv gatewayip 10.157.64.1
=> setenv serverip 10.157.60.1
=> save
Loader>install URL
Example:
Loader>install tftp://10.77.25.12/junos-srxsme-9.4-200811.0-domestic.tgz
The Loader gets the IP address of the device, the IP address of the TFTP server,
the IP address of the gateway, and the netmask.
Using this information, the Loader accesses the JUNOS package on the TFTP
server and streams the installation files to the kernel using TFTP. The Loader
loads and boots the kernel.
3. The install script available in the installation file executes. This script does the
following:
■ Enables the Ethernet interface.
■ Downloads the JUNOS package from the server using TFTP.
Installing Software Using the TFTPBoot Method on the SRX100, SRX210, and SRX650 Services Gateways ■ 241
JUNOS Software Administration Guide
After the installation of the software image, the device boots from the internal flash.
CAUTION: When you install the JUNOS image using the TFTP method, the existing
configurations, if any, in the device will be erased completely. Therefore we
recommend you to backup the configuration files before you plan to install or upgrade
the software image on the device.
To downgrade the software, you can use the backup image of the software that was
previously installed, which is saved on the device. If you revert to the previous image,
this backup image is used, and the image of the running software is deleted. You
can downgrade to only the software release that was installed on the device before
the current release with this method.
Use the procedures as described in “Installing Software Upgrades with the J-Web
Interface” on page 235 and “Installing Software Upgrades Using the CLI” on page 237
and specify an older software image as the source image to be upgraded.
Downgrade your software with either the J-Web interface or the CLI.
NOTE: To downgrade JUNOS Software to JUNOS Software (legacy services), see the
JUNOS Software Migration Guide.
NOTE: This procedure applies only to downgrading one JUNOS Software release to
another or one JUNOS Software services release to another. To downgrade JUNOS
Software services to the JUNOS Software, see the JUNOS Software Migration Guide.
NOTE: After you perform this operation, you cannot undo it.
After you downgrade the software, the previous release is loaded, and you cannot
reload the running version of software again. To downgrade to an earlier version of
software, follow the procedure for upgrading, using the software image labeled with
the appropriate release.
NOTE: This procedure applies only to downgrading one JUNOS Software release to
another or one JUNO Software services release to another. To downgrade JUNOS
Software services to the JUNOS Software, see the JUNOS Software Migration Guide.
The previous software version is now ready to become active when you next
reboot the device.
2. Reboot the device:
The device is now running the previous version of the software. To downgrade to
an earlier version of software, follow the procedure for upgrading, using the software
image labeled with the appropriate release.
NOTE: For media redundancy, we recommend that you keep a secondary storage
medium attached to the J Series or SRX Series device and updated at all times.
For information about installing boot devices, see the J Series Services Routers
Hardware Guide.
Target Media Specifies the boot device to copy the snapshot In the list, select a boot device that is not the
to. active boot device:
NOTE: You cannot copy software to the active ■ compact-flash—Copies software to the
boot device. internal compact flash.
■ removable-compact-flash—Copies
software to the external compact flash. This
option is available on J2320 and J2350
Services Routers only.
■ usb—Copies software to the device
connected to the USB port.
Factory Copies only default files that were loaded on the To copy only the default factory configuration,
internal compact flash when it was shipped from plus a rescue configuration if one exists, select
the factory, plus the rescue configuration, if one the check box.
has been set.
Partition Partitions the medium. This process is usually To partition the medium that you are copying
necessary for boot devices that do not already the snapshot to, select the check box.
have software installed on them.
As Primary Media On an external compact flash or USB storage To create a boot medium to use in the internal
device only, creates a snapshot for use as the compact flash only, select the check box.
primary boot medium.
Data Size Specifies the size of the data partition, in Type a numeric value, in kilobytes. The default
kilobytes. value is 0 KB.
Swap Size Specifies the size of the swap partition, in Type a numeric value, in kilobytes. The default
kilobytes. value is one-third of the physical memory on a
boot medium larger than 128,000 KB, or 0 KB
The swap partition is used for swap files and on a smaller boot device.
software failure memory snapshots. Software
failure memory snapshots are saved to the boot
medium only if it is specified as the dump
device.
Config Size Specifies the size of the config partition, in Type a numeric value, in kilobytes. The default
kilobytes. value is 10 percent of physical memory on the
boot medium.
The config partition is mounted on /config. The
configuration files are stored in this partition.
Root Size Specifies the size of the root partition, in Type a numeric value, in kilobytes. The default
kilobytes. value is the boot device's physical memory
minus the config, data, and swap partitions.
The root partition is mounted on / and does not
include configuration files.
Table 123 on page 247 describes the request system snapshot command options.
Default values are in megabytes, but you can alternatively enter values in kilobytes
Option Description
as-primary On an external CompactFlash card or USB storage device only, creates a snapshot for use as the
primary boot medium.
Use the as-primary option to replace the medium in the internal CompactFlash card slot or to
replicate it for use in another device. This process also partitions the boot medium.
NOTE: After the boot device is created as an internal CompactFlash, it can operate only in an
internal CompactFlash slot.
config-size size Specifies the size of the config partition, in megabytes. The default value is 10 percent of physical
memory on the boot medium.
The config partition is mounted on /config. The configuration files are stored in this partition.
data-size size Specifies the size of the data partition, in megabytes. The default value is 0 MB.
The data partition is mounted on /data. This space is not used by the device, and can be used
for extra storage.
factory Copies only default files that were loaded on the internal CompactFlash card when it was shipped
from the factory, plus the rescue configuration if one has been set.
NOTE: After the boot medium is created with the factory option, it can operate in only the internal
CompactFlash slot.
media type Specifies the boot device the software snapshot is copied to:
■ compact-flash—Copies software to the internal CompactFlash.
■ removable-compact-flash—Copies software to the external CompactFlash. This option is
available on J2320 and J2350 Services Routers only.
■ usb—Copies software to the device connected to the USB port.
partition Partitions the medium. This option is usually necessary for boot devices that do not have software
already installed on them.
root-size size Specifies the size of the root partition, in megabytes. The default value is the boot device's physical
memory minus the config, data, and swap partitions.
The root partition is mounted on / and does not include configuration files.
Option Description
swap-size size Specifies the size of the swap partition, in megabytes. The default value is one-third of the physical
memory on a boot medium larger than 128 MB, or 0 MB on a smaller boot device.
The swap partition is used for swap files and software failure memory snapshots. Software failure
memory snapshots are saved to the boot medium only if it is specified as the dump device. For
information about the setting the dump device, see “Configuring a Boot Device to Receive
Software Failure Memory Snapshots” on page 248.
After you reboot the system, the dump device is checked for a snapshot as part of
the operating system boot process. If a snapshot is found, it is written to the crash
dump directory on the device (/var/crash). The customer support team can examine
this memory snapshot to help determine the cause of the system software failure.
NOTE: If the swap partition on the dump device medium is not large enough for a
system memory snapshot, either a partial snapshot or no snapshot is written into
the crash dump directory.
Enter the set system dump-device CLI command with the following syntax:
Table 124 on page 248 describes the set system dump-device command options.
Option Description
boot-device Uses whatever device was booted from as the system software failure memory snapshot
device.
compact-flash Uses the internal CompactFlash card as the system software failure memory snapshot
device.
removable-compact-flash Uses the CompactFlash card on the rear of the device (J2320 and J2350 only) as the
system software failure memory snapshot device.
Option Description
usb Uses the device attached to the USB port as the system software failure memory
snapshot device.
Figure 11 on page 249 shows the Reboot page for the device.
3. Choose the boot device from the Reboot from media list:
■ compact-flash—Reboots from the internal CompactFlash card. This selection
is the default choice.
■ removable-compact-flash—Reboots from the optional external compact
CompactFlash card. This selection is available on J2320 and J2350 Services
Routers only.
■ If the device is halted, all software processes stop and you can access the
device through the console port only. Reboot the device by pressing any key
on the keyboard.
NOTE: If you cannot connect to the device through the console port, shut down the
device by pressing and holding the power button on the front panel until the POWER
LED turns off. After the device has shut down, you can power on the device by
pressing the power button again. The POWER LED lights during startup and remains
steadily green when the device is operating normally.
user@host> request system reboot <at time> <in minutes> <media type> <message
“text”>
Table 125 on page 251 describes the request system reboot command options.
Option Description
at time Specifies the time at which to reboot the device. You can specify time in one of the
following ways:
■ now—Reboots the device immediately. This is the default.
■ +minutes—Reboots the device in the number of minutes from now that you specify.
■ yymmddhhmm—Reboots the device at the absolute time on the date you specify.
Enter the year, month, day, hour (in 24-hour format), and minute.
■ hh:mm—Reboots the device at the absolute time you specify, on the current day.
Enter the time in 24-hour format, using a colon (:) to separate hours from minutes.
in minutes Specifies the number of minutes from now to reboot the device. This option is a
synonym for the at +minutes option.
media type Specifies the boot device to boot the router from:
■ compact-flash—Reboots from the internal CompactFlash card. This is the default.
■ removable-compact-flash—Reboots from the optional external CompactFlash card.
This option is available on J2320 and J2350 Services Routers only.
■ usb—Reboots from the USB storage device.
message "text" Provides a message to display to all system users before the device reboots.
user@host> request system halt <at time> <in minutes> <media type> <message “text”>
When the device is halted, all software processes stop and you can access the device
through the console port only. Reboot the device by pressing any key on the keyboard.
NOTE: If you cannot connect to the device through the console port, shut down the
device by pressing and holding the power button on the front panel until the POWER
LED turns off. After the device has shut down, you can power on the device by
pressing the power button again. The POWER LED lights during startup and remains
steadily green when the device is operating normally.
Table 126 on page 252 describes the request system halt command options.
Option Description
at time Time at which to stop the software processes on the device. You can specify time in
one of the following ways:
■ now—Stops the software processes immediately. This is the default.
■ +minutes—Stops the software processes in the number of minutes from now that
you specify.
■ yymmddhhmm—Stops the software processes at the absolute time you specify.
Enter the year, month, day, hour (in 24-hour format), and minute.
■ hh:mm—Stops the software processes at the absolute time that you specify, on
the current day. Enter the time in 24-hour format, using a colon (:) to separate
hours from minutes.
in minutes Specifies the number of minutes from now to stop the software processes on the device.
This option is a synonym for the at +minutes option.
media type Specifies the boot device to boot the router from after the halt:
■ compact-flash—Reboots from the internal CompactFlash card. This is the default.
■ removable-compact-flash—Reboots from the optional external CompactFlash card.
This option is available on J2320 and J2350 Services Routers only.
■ usb—Reboots from the USB storage device.
message "text" Provides a message to display to all system users before the software processes on the
device are stopped.
To bring chassis components online and offline, enter the following from the request
chassis CLI command.
For example, to bring specific pic and corresponding fpc slot online, the CLI request
might appear as follows:
A J Series Services Router running JUNOS Software includes two configurations that
allow the router to operate as either a stateful firewall or a router. When a services
router is initially configured as a firewall, it operates in secure context. When a
services router is initially configured as a router, it operates in router context. Use
either of the configurations as a starting point from which you can customize the
configuration for your network requirements.
For information about which devices support the features documented in this chapter,
see the JUNOS Software Feature Support Reference for SRX Series and J Series Devices.
CAUTION: If you plan to change contexts, do so before you configure anything else
on the services router. If you change contexts after you have configured the services
router, your configuration is overwritten by the default configuration for the new
context.
Secure Context
Secure context allows a services router to act as a stateful firewall with only
management access. To allow traffic to pass through a services router, you must
explicitly configure a security policy for that purpose. In secure context, a services
router forwards packets only if a security policy permits it. Certain services are also
configured (in the host-inbound-traffic statement at the [edit security zones] hierarchy
level) to allow host-inbound traffic for management of a services router. A services
router running in secure context is a secure routing device with predefined
configuration values.
For secure context configuration details, see “Secure Context Configuration Settings”
on page 256. For information about how to change from router context to secure
context, see “Changing from Router Context to Secure Context” on page 265.
Router Context
Router context allows a services router to act as a router, in which all management
and transit traffic is allowed. All interfaces are bound to the trust zone, and host
inbound traffic from all predefined services is allowed. In router context, the services
router forwards all packets unless you configure a security policy that denies specific
traffic.
JUNOS Software is a hardened operating system. You can use JUNOS Software with
more relaxed checks for host-inbound traffic and configure the dataplane with default
transit policies to permit all traffic. In this scenario, the services router operates in a
router context.
For router context configuration details, see “Router Context Configuration Settings”
on page 259. For information about how to change from secure context to router
context, see “Changing from Secure Context to Router Context” on page 261.
The ge-0/0/0 interface is configured to allow management access with SSH and
HTTP services enabled. The following host-inbound services are configured for
the ge-0/0/0 interface in the trust zone:
■ HTTP
■ HTTPS
■ SSH
■ DHCP
■ For the trust zone, TCP reset is enabled. The default policy for the trust zone
allows transmission of traffic from the trust zone to the untrust zone. All traffic
within the trust zone is allowed.
■ A screen is applied to a zone to protect against attacks launched from within the
zone. The following screens are enabled for the untrust zone:
■ ICMP ping-of-death
■ IP source route options
■ IP teardrop
■ Source threshold of 1024 SYN segments the router can receive per
second
■ Timeout of 20 seconds
■ The default policy for the untrust zone is to deny all traffic.
system {
autoinstallation {
delete-upon-commit;
traceoptions {
level verbose;
flag {
all;
}
}
}
services {
ssh;
web-management {
http {
interface [ ge-0/0/0.0 ];
}
}
}
syslog {
user * {
any emergency;
}
file messages {
any any;
authorization info;
}
file interactive-commands {
interactive-commands any;
}
}
}
interfaces {
ge-0/0/0 {
unit 0;
}
}
security {
screen {
ids-option untrust-screen {
icmp {
ping-death;
}
ip {
source-route-option;
tear-drop;
}
tcp {
syn-flood {
alarm-threshold 1024;
attack-threshold 200;
source-threshold 1024;
destination-threshold 2048;
queue-size 2000;
timeout 20;
}
land;
}
}
}
zones {
security-zone trust {
tcp-rst;
interfaces {
ge-0/0/0.0 {
host-inbound-traffic {
system-services {
http;
https;
ssh;
dhcp;
}
}
}
}
}
security-zone untrust {
screen untrust-screen;
}
}
policies {
from-zone trust to-zone trust {
policy default-permit {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}
}
}
from-zone trust to-zone untrust {
policy default-permit {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}
}
}
from-zone untrust to-zone trust {
policy default-deny {
match {
source-address any;
destination-address any;
application any;
}
then {
deny;
}
}
}
}
system {
syslog {
file messages {
any any;
}
}
services {
telnet;
ssh;
web-management {
http {
interface [ ge-0/0/0.0 ];
}
}
}
}
interfaces {
ge-0/0/0 {
unit 0 {
family inet {
address 192.168.1.1/24;
}
}
}
}
security {
flow {
allow-dns-reply;
tcp-session {
no-syn-check;
no-syn-check-in-tunnel;
no-sequence-check;
}
}
forwarding-options {
family {
iso {
mode flow-based;
}
inet6 {
mode packet-based;
}
}
}
policies {
default-policy {
permit-all;
}
}
zones {
security-zone trust {
tcp-rst;
host-inbound-traffic {
system-services {
any-service;
}
protocols {
all;
}
}
interfaces {
all;
}
}
}
alg {
dns disable;
ftp disable;
h323 disable;
mgcp disable;
real disable;
rsh disable;
rtsp disable;
sccp disable;
sip disable;
sql disable;
talk disable;
tftp disable;
pptp disable;
msrpc disable;
sunrpc disable;
}
}
■ If you have a static IP address assigned to the ge-0/0/0 interface and do not
want to run autoinstallation, you must remove the [system autoinstallation]
hierarchy from the configuration. Doing so ensures that the router is not
automatically assigned an IP address of 192.168.2.1 if it cannot acquire an
IP address using DHCP. You must also configure the static IP address that
was previously assigned to the ge-0/0/0 interface.
■ Commit the configuration changes, and make the candidate configuration the
running configuration.
CAUTION: If you do not assign an IP address for the ge-0/0/0 interface, create a
local user account, and enter routing information, either from CLI configuration or
using DHCP, before you commit the changes, the router is no longer remotely
accessible. To manage the router, you must connect a PC or laptop to the physical
console, or attach the PC or laptop to a subnet that is directly connected to the
ge-0/0/0 interface, which is assigned an IP address of 192.168.2.1.
Any configuration changes that you made before you issued the load override
command are no longer part of the current running configuration.
If you have created a chassis cluster and the fabric interfaces have been configured
for that cluster, removing the fabric configuration on either node will cause the
redundancy group 0 (RG0) secondary node to move to a disabled state. (Resetting a
device to the default router mode configuration removes the fabric configuration
settings and thereby causes the RG0 secondary node to move to a disabled state.)
When the RG0 secondary is in a disabled state, the cluster is effectively not
functioning.
If necessary, to return the services router to the factory default (secure context)
configuration, you can press the RESET CONFIG button. Keep in mind that pressing
the RESET CONFIG button for 15 seconds or more deletes all configuration files on
the services router, including backup configuration and rescue configuration files.
The factory configuration is loaded and committed. For more information about the
RESET CONFIG button, see the JUNOS Software Administration Guide.
2. Make sure that you are currently at the top level of the configuration mode
hierarchy. If you are below the top level, enter exit to return to the top level.
3. From the top of the configuration hierarchy, enter the load override command.
[edit]
user@host#
6. If you have an IP address assigned to the ge-0/0/0 interface, follow these steps:
a. Delete the [system autoinstallation] hierarchy:
7. If you do not have console access, create a local user account. For example, the
following command creates a local user account with a password that is entered
as plain text in the CLI and encrypted by JUNOS Software.
user@host# commit
commit complete
[edit]
user@host#
■ If you do not have console access, use the commit confirmed command,
which, by default, activates the configuration for 10 minutes. This command
allows you to verify if the configuration is working correctly. You must
confirm the commit by entering commit or commit-check within 10 minutes;
otherwise, the router loads the previous configuration.
10. Use the following methods to access the router, depending on the steps you
performed:
■ If you performed Steps 1 through 9, the configuration mode prompt returns
in the Telnet or SSH session you used to change contexts. Use the CLI or
J-Web interface to continue configuring the router. If you cannot remotely
access the router with the session that you were using, connect to the console
remotely or directly to the physical console port.
■ If you performed Steps 1 through 4 and Step 9 and autoinstallation
successfully assigned an IP address, you can connect to the router using
Telnet, SSH, or the J-Web interface. If you cannot access the router remotely,
connect a PC or laptop to the physical console port.
■ Commit the configuration changes, and make the candidate configuration the
running configuration.
CAUTION: If you do not assign an IP address for the ge-0/0/0 interface, create a
local user account, and enter routing information, either from CLI configuration or
using DHCP, before you commit the changes, the router is no longer remotely
accessible. To manage the router, you must connect a PC or laptop to the physical
console, or attach the PC or laptop to a subnet that is directly connected to the
ge-0/0/0 interface, which is assigned an IP address of 192.168.2.1.
Any configuration changes that you made before you issued the load override
command are no longer part of the current running configuration.
If you have created a chassis cluster and the fabric interfaces have been configured
for that cluster, removing the fabric configuration on either node will cause the
redundancy group 0 (RG0) secondary node to move to a disabled state. (Resetting a
device to the factory default configuration removes the fabric configuration settings
and thereby causes the RG0 secondary node toorkin move to a disabled state.) When
the RG0 secondary is in a disabled state, the cluster is effectively not functioning.
Alternatively, to return the services router to the factory default (secure context)
configuration, you can press the RESET CONFIG button. Keep in mind that pressing
the RESET CONFIG button for 15 seconds or more deletes all configuration files on
the services router, including backup configuration and rescue configuration files.
The factory configuration is loaded and committed. Using the load factory-default
command does not delete all configuration files. For more information about the
RESET CONFIG button, see the JUNOS Software Administration Guide.
[edit]
user@host#
[edit]
user@host#
5. If you have an IP address assigned to the ge-0/0/0 interface, follow these steps:
a. Delete the [system autoinstallation] hierarchy:
6. If you do not have console access, create a local user account. For example, the
following command creates a local user account with a password that is entered
as plain text in the CLI and is encrypted by JUNOS Software.
user@host# commit
commit complete
[edit]
user@host#
■ If you do not have console access, use the commit confirmed command,
which, by default, activates the configuration for 10 minutes. This command
allows you to verify if the configuration is working correctly. You must
confirm the commit by entering commit or commit-check within 10 minutes;
otherwise, the router loads the previous configuration.
9. Use the following methods to access the router, depending on the steps you
performed:
■ If you performed Steps 1 through 8, the configuration mode prompt returns
in the SSH session you used to change contexts. Use the CLI or J-Web
interface to continue configuring the router. If you cannot remotely access
the router with the session that you were using, connect to the console
remotely or directly to the physical console port.
■ If you performed Steps 1 through 3 and Step 8, and autoinstallation
successfully assigned an IP address, you can connect to the router using SSH
or the J-Web interface. If you cannot access the router remotely, connect a
PC or laptop to the physical console port.
Selective stateless packet-based services allow you to use both flow-based and
packet-based forwarding simultaneously on a system. You can selectively direct
traffic that requires packet-based, stateless forwarding to avoid stateful flow-based
forwarding by using stateless firewall filters (ACLs). The traffic not so directed follows
the default flow-based forwarding path. Bypassing flow-based forwarding can be
useful for traffic for which you explicitly want to avoid flow session-scaling constraints.
For information about which devices support the features documented in this chapter,
see the JUNOS Software Feature Support Reference for SRX Series and J Series Devices.
This chapter contains the following topics. For more information about configuring
the stateless firewall filters, see the JUNOS Software Interfaces and Routing Configuration
Guide.
■ Understanding Packet-Based and Flow-Based Forwarding on page 269
■ Understanding Selective Stateless Packet-Based Services on page 271
■ Configuring Selective Stateless Packet-Based Services on page 272
■ Example: Configuring Selective Stateless Packet-Based Services—End-to-End
Packet-Based on page 274
■ Verifying the Selective Stateless Packet-Based Services Configuration—End-to-End
Packet-Based on page 278
■ Example: Configuring Selective Stateless Packet-Based Services—Packet-Based
to Flow-Based on page 283
■ Verifying the Selective Stateless Packet-Based Services
Configuration—Packet-Based to Flow-Based on page 287
Packet-Based Forwarding
Packet-based (stateless) forwarding is performed on a packet-by-packet basis without
regard to flow or state information. Each packet is assessed individually for treatment.
Figure 12 on page 270 shows the traffic flow for packet-based forwarding.
As packets enter the device, classifiers, filters and policers are applied to it. Next,
the egress interface for the packet is determined via a route lookup. Once the egress
interface for the packet is found, filters are applied and the packet is sent to the
egress interface where it is queued and scheduled for transmission.
Packet-based forwarding does not require any information about either previous or
subsequent packets that belong to a given connection, and any decision to allow or
deny traffic is packet specific. This architecture has the benefit of massive scaling
because it forwards packets without keeping track of individual flows or state.
Flow-Based Forwarding
Flow-based (stateful) packet processing requires the creation of sessions. A session
is created to store the security measures to be applied to the packets of the flow, to
cache information about the state of the flow (for example, logging and counting
information), to allocate required resources for the flow for features such as Network
Address Translation NAT, and to provide a framework for features such as Application
Layer Gateways (ALGs) and firewall features. Figure 13 on page 270 shows traffic flow
for flow-based processing.
For an overview of stateless and stateful data processing, see the JUNOS Software
Security Configuration Guide.
Selective stateless packet-based services allow you to have both flow-based and
packet-based services simultaneously on a system. This is achieved by configuring
stateless firewall filters (ACLs) that allow you to bypass flow-based (stateful)
forwarding. Bypassing flow-based forwarding is useful for deployments where you
explicitly want to avoid flow session-scaling constraints.
Figure 14 on page 271 shows traffic flow with selective stateless packet-based services
bypassing flow-based processing.
When the packet comes in on an interface, the input packet filters configured on the
interface are applied.
■ If the packet matches the conditions specified in the firewall filter, a packet-mode
action modifier is set to the packet. The packet-mode action modifier updates a
bit field in the packet key buffer—this bit field is used to determine if the
flow-based forwarding needs to be bypassed. As a result, the packet with the
packet-mode action modifier bypasses the flow-based forwarding completely.
The egress interface for the packet is determined via a route lookup. Once the
egress interface for the packet is found, filters are applied and the packet is sent
to the egress interface where it is queued and scheduled for transmission.
■ If the packet does not match the conditions specified in this filter term, it is
evaluated against other terms configured in the filter. If, after all terms are
evaluated, a packet matches no terms in a filter, the packet is silently discarded.
To prevent packets from being discarded, you configure a term in the filter
specifying an action to accept all packets.
Packets arriving on interfaces where you have not applied the firewall filter will follow
the default flow-based forwarding option.
The following security features are not supported with selective stateless packet-based
services—stateful firewall NAT, IPsec VPN, DOS screens, J-flow traffic analysis, WXC
integrated security module, security policies, zones, attack detection and prevention,
PKI, ALGs, and chassis cluster.
Related Topics
■ Understanding Secure and Router Contexts on page 255
■ Understanding Packet-Based and Flow-Based Forwarding on page 269
the action. Once match conditions and actions are defined, firewall filters are applied
to relevant interfaces.
You can specify only one action statement (or omit it) in a term, but you can
specify any combination of action modifiers with it. Action modifiers include
a default accept action. For example, if you specify an action modifier and
do not specify an action, the specified action modifier is implemented and
the packet is accepted.
3. Apply firewall filters to interfaces—To have the firewall filter take effect, apply
it to an interface.
When the packet comes in on an interface, the input packet filters configured on the
interface are applied. If the packet matches the specified conditions and packet-mode
action is configured, the packet bypasses the flow-based forwarding completely.
When configuring filters, be mindful of the order of the terms within the firewall
filter. Packets are tested against each term in the order in which it is listed in the
configuration. When the first matching conditions are found, the action associated
with that term is applied to the packet and the evaluation of the firewall filter ends,
unless the next term action modifier is included. If the next term action is included,
the matching packet is then evaluated against the next term in the firewall filter;
otherwise, the matching packet is not evaluated against subsequent terms in the
firewall filter.
NOTE: Nested firewall filters (configuring a filter within the term of another filter)
are not supported with selective stateless packet-based services.
Some typical deployment scenarios where you can configure selective stateless
packet-based services are:
■ Traffic flow between private LAN and WAN interfaces, such as for Intranet traffic,
where end-to-end forwarding is packet-based
■ Traffic flow between private LAN and not-so-secure WAN interfaces, where traffic
uses packet-based and flow-based forwarding for secure and not so secure traffic
respectively
■ Traffic flow between the private LAN and WAN interface with failover to
flow-based IPsec WAN when the private WAN link is down
■ Traffic flow from flow-based LAN to packet-based MPLS WAN
This chapter covers the deployment scenarios for end-to-end packet-based forwarding
and traffic flow with packet-based to flow-based forwarding. For information about
configuring other deployment scenarios, contact your Juniper
channel-partner/value-added-reseller, sales account team or customer support
representative, or refer to the Selective Packet Services App. Note.
1. For background information about configuring stateless firewall filters, see the JUNOS
Software Interfaces and Routing Configuration Guide.
2. Establish basic connectivity. (See the Getting Started Guide for your device.)
Figure 15 on page 275 shows a network topology that is used in this example.
Your company’s branch offices are connected with each other via private WAN. For
this internal traffic, packet forwarding is required because security is not an issue.
Hence for this traffic, you decide to configure selective stateless packet-based services
to bypass flow-based forwarding. The remaining traffic, to and from the Internet,
uses flow-based forwarding.
In this example, you configure the filter bypass-flow-filter with terms bypass-flow-term-1
and bypass-flow-term-2 that match the traffic between internal interfaces ge-0/0/1
and ge-0/0/2 and contain the packet-mode action modifier. You configure the next
term accept-rest to match the remaining traffic and not contain the packet-mode
action modifier. Next, you apply this filter on internal interfaces (not on the external
interface). As a result, all internal traffic bypasses flow-based forwarding and the
traffic to and from the Internet does not bypass flow-based forwarding.
CLI Configuration
To configure selective stateless packet-based services for end-to-end packet-based
forwarding:
1. Configure the IP addresses for the interfaces in your network. In the following
statements you configure interfaces on devices R0, R1, R2, and R3:
On device R0:
On device R1:
On device R2:
user@R2# set interfaces description “Internet” ge-0/0/3 unit 0 family inet address
1.1.1.2/30
On device R3:
2. Create static routes and associate appropriate next-hop addresses. The following
statements create static routes and associate next-hop addresses for devices R0,
R1, R2, and R3:
On device R0:
On device R1:
On device R2:
On device R3:
4. Configure application services for zones. In the following statement you configure
trust and untrust zones to allow all supported application services as inbound
services:
5. Configure a security policy to allow transit traffic to pass between zones. in the
following statements you allow traffic from any source address, destination
address, and application to pass between zones:
user@R1# set security policies from-zone trust to-zone untrust policy Internet-traffic
match source-address any destination-address any application any
user@R1# set security policies from-zone trust to-zone untrust policy Internet-traffic
then permit
user@R1# set security policies from-zone untrust to-zone trust policy
Incoming-traffic match source-address any destination-address any application
any
user@R1# set security policies from-zone untrust to-zone trust policy
Incoming-traffic then permit
user@R1# set security policies from-zone trust to-zone trust policy Intrazone-traffic
match source-address any destination-address any application any
user@R1# set security policies from-zone trust to-zone trust policy Intrazone-traffic
then permit
6. Create a firewall filter and define terms for all the packet-based forwarding traffic.
In the following statements you create the firewall filter bypass-flow-filter, define
the terms bypass-flow-term-1 and bypass-flow-term-2, and specify match conditions
and actions for the terms:
7. Define another term for the remaining traffic. In the following statements you
define the term accept-rest to accept all remaining traffic:
user@R1# set firewall family inet filter bypass-flow-filter term accept-rest then
accept
8. Apply the firewall filter to relevant interfaces. In the following statements you
apply the firewall filter bypass-flow-filter to internal interfaces ge-0/0/1 and
ge-0/0/2:
user@R1# set interfaces description “Internal 1” ge-0/0/1 unit 0 family inet filter
bypass-flow-filter
user@R1# set interfaces description “Internal 2” ge-0/0/2 unit 0 family inet filter
bypass-flow-filter
For more information about the configuration statements used in this example, see
the JUNOS Policy Framework Configuration Guide.
Related Topics
■ Verifying the Selective Stateless Packet-Based Services Configuration—End-to-End
Packet-Based on page 278
■ Configuring Selective Stateless Packet-Based Services on page 272
Action From the configuration mode in the CLI, enter the following commands:
■ show interfaces—Display status information and statistics about interfaces on
devices R0, R1, R2, and R3.
■ show routing-options—Display route information on devices R0, R1, R2, and R3.
■ show security zones—Display information about security zones on device R1.
The sample output in this section displays the complete configuration in the example.
On R0:
[edit]
user@R0# show interfaces
ge-0/0/1 {
description “Internal 1”
unit 0 {
family inet {
address 10.1.1.2/24
}
}
}
On R2:
[edit]
user@R2# show interfaces
ge-0/0/3 {
description “Internet”
unit 0 {
family inet {
address 1.1.1.2/30;
}
}
}
user@R2# show routing-options
static {
route 0.0.0.0/0 next-hop 1.1.1.1;
}
On R3:
[edit]
user@R3# show interfaces
ge-0/0/2 {
description “Internal 2”
unit 0 {
family inet {
address 10.2.1.2/24;
}
}
}
user@R3# show routing-options
static {
route 0.0.0.0/0 next-hop 10.2.1.1;
}
On R1:
[edit]
user@R1# show interfaces
ge-0/0/1 {
description “internal 1”
unit 0 {
family inet {
filter {
input bypass-flow-filter;
}
address 10.1.1.1/24;
}
}
}
ge-0/0/2 {
description “Internal 2”
unit 0 {
family inet {
filter {
input bypass-flow-filter;
}
address 10.2.1.1/24;
}
}
}
ge-0/0/3 {
description “Internet”
unit 0 {
family inet {
address 1.1.1.1/30;
}
}
}
user@R1# show routing-options
static {
route 0.0.0.0/0 next-hop 1.1.1.2;
}
user@R1# show firewall
family inet {
filter bypass-flow-filter {
term bypass-flow-term-1 {
from {
source-address {
10.1.1.0/24;
}
destination-address {
10.2.1.0/24;
}
}
then packet-mode;
}
term bypass-flow-term-2 {
from {
source-address {
10.2.1.0/24;
}
destination-address {
10.1.1.0/24;
}
}
then packet-mode;
}
term accept-rest {
then accept;
}
}
}
Meaning Verify that the output shows the intended configuration of the firewall filter, interfaces,
and policies.
Verify that the terms are listed in the order in which you want the packets to be
tested. You can move terms within a firewall filter by using the insert CLI command.
Related Topics For a complete description of show interfaces command output, see the JUNOS
Interfaces Command Reference.
For a complete description of show security zones and show security policies command
outputs, see the JUNOS Software CLI Reference.
For a complete description of show firewall command output, see the JUNOS Routing
Protocols and Policies Command Reference.
Action To verify if selective stateless packet-based services are working, you check if Intranet
traffic bypasses flow-based forwarding and no sessions are established. To verify if
sessions are established, you perform the following tasks:
1. On device R1, enter the operational mode command clear security flow session
all in the CLI to clear all existing security flow sessions.
2. On device R0, enter the operational mode command ping in the CLI to transmit
traffic to device R3.
3. On device R1, with traffic transmitting from devices R0 to R3 through R1, enter
the operational mode command show security flow session in the CLI.
NOTE: To verify established sessions, make sure to enter the show security flow
session command while the ping command is sending and receiving packets.
Meaning The output shows traffic transmitting from R0 to R3 and no sessions are established.
In this example, you applied the bypass-flow-filter with the packet-mode action modifier
on interfaces Internal 1 and Internal 2 for your company’s Intranet traffic. This output
verifies that the traffic between the two interfaces is correctly bypassing flow-based
forwarding and hence no sessions are established.
Related Topics For more information about the show security flow session command, see the JUNOS
Software CLI Reference.
For information about the ping command, see the JUNOS Software Administration
Guide or the JUNOS System Basics Configuration Guide.
Action To verify if traffic to the Internet is using flow-based forwarding and sessions are
established, perform the following tasks:
1. On device R1, enter the operational mode command clear security flow session
all in the CLI to clear all existing security flow sessions.
2. On device R0, enter the operational mode command ping in the CLI to transmit
traffic to device R2.
3. On device R1, with traffic transmitting from R0 to R2 through R1, enter the
operational mode command show security flow session in the CLI.
NOTE: To verify established sessions, make sure to enter the show security flow
session command while the ping command is sending and receiving packets.
2 sessions displayed
Meaning The output shows traffic transmitting from devices R0 to R1 and established sessions.
In this example, you did not apply the bypass-flow-filter with the packet-mode action
modifier on interface Internet for your company’s Internet traffic. This output verifies
that the traffic to the Internet is correctly using flow-based forwarding and hence
sessions are established.
Transmit traffic from device R3 to R2 and use the commands in this section to verify
established sessions.
Related Topics For more information about the show security flow session command, see the JUNOS
Software CLI Reference.
For information about the ping command, see the JUNOS Software Administration
Guide or the JUNOS System Basics Configuration Guide.
1. For background information about configuring stateless firewall filters, see the JUNOS
Software Interfaces and Routing Configuration Guide.
2. Establish basic connectivity. (See the Getting Started Guide for your device.)
Figure 16 on page 284 shows a network topology that is used in this example.
In this example, the interface facing the private LAN does not need any security
services, but the interface facing the WAN needs security. In this case, you decide
to configure both packet-based and flow-based forwarding for secure and not so
secure traffic by configuring two routing instances—one handling the packet-based
forwarding and the other handling the flow-based forwarding.
In this example, you configure the filter bypass-flow-filter with the term bypass-flow-term
that contains the packet-mode action modifier. Because you have not specified any
match conditions, this filter applies to all traffic that traverses the interfaces on which
it is applied. Next, you apply this filter on interfaces associated with the master
routing instance. You do not apply the filter to the interfaces associated with the
Internet-VR routing instance. As a result, all traffic when traversing the LAN interfaces
associated with the master routing instance uses packet-based forwarding and when
traversing the Internet-VR routing instance uses flow-based forwarding.
CLI Configuration
To configure selective stateless packet-based services for end-to-end packet-based
forwarding:
1. Configure the IP addresses for the interfaces in your network. In the following
statements you configure interfaces on devices R0, R1, and R2:
On device R0:
On device R1:
user@R1# set interfaces description “Connect to R0” ge-0/0/2 unit 0 family inet
address 9.9.9.10/24
user@R1# set interfaces description “Connect to R2” ge-0/0/3 unit 0 family inet
address 5.5.5.5/24
On device R2:
2. Set an internal service interface lt-0/0/0 between routing instances. The following
statements configure the lt service interface and configure a peer relationship
between the two virtual routers:
3. Configure security zones, assign interfaces to zones and configure zones to allow
application services and protocols. In the following statements you create a zone
HOST, assign interfaces to it and configure it, to allow all supported applications
and protocols:
4. Configure policies. In the following statement you set the default policy and
specify that all packets are permitted:
6. Enable OSPF on all interfaces in the network. The following statements enable
OSPF on devices R0, R1, and R2:
On device R0:
On device R2:
7. Create a firewall filter and define a term for packet-based forwarding traffic. In
the following statements you create a firewall filter bypass-flow-filter, define a
term bypass-flow-term, and specify actions for the term:
8. Apply the firewall filter to relevant interfaces. In the following statements you
apply the firewall filter bypass-flow-filter to internal interfaces ge-0/0/2 and
lt-0/0/0.0:
For more information about the configuration statements used in this example, see
the JUNOS Software CLI Reference.
Related Topics
■ Verifying the Selective Stateless Packet-Based Services Configuration—End-to-End
Packet-Based on page 278
■ Configuring Selective Stateless Packet-Based Services on page 272
Action From the configuration mode in the CLI, enter the following commands:
■ show interfaces—Display status information and statistics about interfaces on
devices R0, R1, and R2.
■ show protocols—Display protocol information on devices R0, R1, and R2.
■ show security—Display information about security zones and policies on device
R1.
■ show routing-instances—Display virtual routing instances configured on device
R1.
■ show firewall—Display firewall filters applied on different interfaces on device
R1.
The sample output in this section displays the complete configuration in the example.
On R0:
[edit]
user@R0# show interfaces
ge-0/0/2 {
description “Connect to Master-VR”
unit 0 {
family inet {
address 9.9.9.9/24
}
}
}
On R2:
[edit]
user@R2# show interfaces
ge-0/0/3 {
description “Connect to Internet-VR”
unit 0 {
family inet {
address 5.5.5.9/24;
}
}
}
On R1:
[edit]
user@R1# show interfaces
ge-0/0/2 {
description “Connect to R0”
unit 0 {
family inet {
filter {
input bypass-flow-filter;
}
address 9.9.9.10/24;
}
}
}
lt-0/0/0 {
unit 0 {
encapsulation frame-relay;
dlci 100;
peer-unit 1;
family inet {
filter {
input bypass-flow-filter
}
address 1.1.1.1/16;
}
}
unit 1{
encapsulation frame-relay;
dlci 100;
peer-unit 0;
family inet {
address 1.1.1.2/16;
}
}
}
user@R1# show protocols
ospf {
area 0.0.0.0/0 {
interface ge-0/0/2.0;
interface lt-0/0/0.0;
}
}
user@R1# show firewall
filter bypass-flow-filter {
term bypass-flow-term {
then {
packet-mode;
accept;
}
}
}
host-inbound-traffic {
system-services {
any-service;
}
protocols {
all;
}
}
interfaces {
all;
}
}
}
policies {
default-policy {
permit-all;
}
}
Meaning Verify that the output shows the intended configuration of the firewall filter, routing
instances, interfaces, and policies.
Verify that the terms are listed in the order in which you want the packets to be
tested. You can move terms within a firewall filter by using the insert CLI command.
Related Topics For a complete description of show interfaces command output, see the JUNOS
Interfaces Command Reference.
For a complete description of show security zones and show security policies command
outputs, see the JUNOS Software CLI Reference.
For a complete description of show firewall command output, see the JUNOS Routing
Protocols and Policies Command Reference.
Action To verify if selective stateless packet-based services are working, you check if internal
traffic bypasses flow-based forwarding and no sessions are established. To verify if
sessions are established, you perform the following tasks:
1. On device R1, enter the operational mode command clear security flow session
all in the CLI to clear all existing security flow sessions.
2. On device R0, enter the operational mode command ping in the CLI to transmit
traffic to device Master-VR.
3. On device R1, with traffic transmitting from devices R0 through R1, enter the
operational mode command show security flow session in the CLI.
NOTE: To verify established sessions, make sure to enter the show security flow
session command while the ping command is sending and receiving packets.
Meaning The output shows traffic transmitting from R0 to Master-VR and no sessions are
established. In this example, you applied the bypass-flow-filter with the packet-mode
action modifier on interfaces ge-0/0/0 and lt-0/0/0.0 for your company’s LAN traffic.
This output verifies that the traffic between the two interfaces is correctly bypassing
flow-based forwarding and hence no sessions are established.
Related Topics For more information about the show security flow session command, see the JUNOS
Software CLI Reference.
For information about the ping command, see the JUNOS Software Administration
Guide or the JUNOS System Basics Configuration Guide.
Action To verify if traffic to the Internet is using flow-based forwarding and sessions are
established, perform the following tasks:
1. On device R1, enter the operational mode command clear security flow session
all in the CLI to clear all existing security flow sessions.
2. On device R0, enter the operational mode command ping in the CLI to transmit
traffic to device R2.
3. On device R1, with traffic transmitting from R0 to R2 through R1, enter the
operational mode command show security flow session in the CLI.
NOTE: To verify established sessions, make sure to enter the show security flow
session command while the ping command is sending and receiving packets.
...
3 sessions displayed
Meaning The output shows traffic transmitting from devices R0 to R2 and established sessions.
In this example, you did not apply the bypass-flow-filter with the packet-mode action
modifier on routing instance Internet-VR for your company’s Internet traffic. This
output verifies that the traffic to the Internet is correctly using flow-based forwarding
and hence sessions are established.
Note that sessions are established only when traffic is flowing between lt-0/0/0.1
and ge-0/0/3 and not when traffic is flowing between ge-0/0/2 and lt-0/0/0.0.
Related Topics For more information about the show security flow session command, see the JUNOS
Software CLI Reference.
For information about the ping command, see the JUNOS Software Administration
Guide or the JUNOS System Basics Configuration Guide.
To enable some JUNOS Software features, you must purchase, install, and manage
separate software licenses. For those features that require a license, the presence on
the device of the appropriate software license keys (passwords) determines whether
you can use the feature.
For information about how to purchase software licenses for your device, contact
your Juniper Networks sales representative.
For information about which devices support the features documented in this chapter,
see the JUNOS Software Feature Support Reference for SRX Series and J Series Devices.
License Enforcement
For features that require a license, you must install and properly configure the license
to use the feature. Although the device allows you to commit a configuration that
specifies a feature requiring a license when the license is not present, you are
prohibited from actually using the feature.
Successful commitment of a configuration does not imply that the required licenses
are installed. If a required license is not present, the system provides a warning
message after it commits the configuration rather than failing to commit it because
of a license violation.
SRX3000 SRX5000
Feature J Series SRX100 SRX210 SRX240 SRX650 line line
X X
Access Manager
X X X X
BGP Route Reflectors
X X* X* X* X X X
IDP Signature Update
X X X X X
Juniper-Kaspersky Anti-Virus
X X X X X
Juniper-Symantec Anti-Spam
Juniper-Websense Integrated Web X X X X X
Filtering
X
SRX100 Memory Upgrade
X X* X* X
UTM
For example, in the following typical license key, the string li29183743 is the license
ID, and the trailing block of data is the license data:
The license data defines the device ID for which the license is valid and the version
of the license.
https://www.juniper.net/lcrs/generateLicense.do
3. Enter the device serial number and authorization code in the Web page and click
Generate. Depending on the type of license you purchased, you will receive one
of the following:
■ License key—If you purchased a perpetual license, you will receive a license
key from the licensing management system. You can enter this key directly
into the system in order to activate the feature on your device.
■ License key entitlement—If you purchased a subscription-based license, you
will receive a license key entitlement from the licensing management system.
You can use this entitlement to validate your license on the Juniper Networks
licensing server and download the feature license from the server to your
device.
Use the filename option to activate a perpetual license directly on the device.
(Most feature licenses are perpetual.)
Use the url option to send a subscription-based license key entitlement (such
as UTM) to the Juniper Networks licensing server for authorization. If
authorized, the server downloads the license to the device and activates it.
■ To add a license key from the terminal, enter the following command:
3. When prompted, enter the license key, separating multiple license keys with a
blank line.
If the license key you enter is invalid, an error is generated when you press Ctrl-D
to exit license entry mode.
If you added the SRX100 Memory Upgrade license, the device reboots
immediately and comes back up as a high-memory device.
4. Go on to “Verifying JUNOS Software Services License Management” on page 299.
If you deleted the SRX100 Memory Upgrade license, the device reboots
immediately and comes back up as a low-memory device.
3. Go on to “Verifying JUNOS Software Services License Management” on page 299.
NOTE: The request system license update command will always use the default
Juniper license server https://ae1.juniper.net
You can only use this command to update subscription-based licenses (such
as UTM).
■ To automatically update the trial license keys, enter the following command:
For example, the following command saves the installed license keys to a file
named license.config:
The Licenses page displays a summary of licensed features that are configured on
the device and a list of licenses that are installed on the device. The information on
the license management page is summarized in Table 128 on page 297.
Feature Summary
Feature Name of the licensed feature:
■ Features—Software feature licenses listed in “Software Feature Licenses” on page 294
■ All features—All-inclusive licenses
Licenses Used Number of licenses currently being used on the device. Usage is determined by the
configuration on the device. If a feature license exists and that feature is configured, the license
is considered used.
Licenses Installed Number of licenses installed on the device for the particular feature.
Managing JUNOS Software Services Licenses with the J-Web Interface ■ 297
JUNOS Software Administration Guide
Licenses Needed Number of licenses required for legal use of the feature. Usage is determined by the
configuration on the device: If a feature is configured and the license for that feature is not
installed, a single license is needed.
Installed Licenses
ID Unique alphanumeric ID of the license.
Group If the license defines a group license, this field displays the group definition.
If the license requires a group license, this field displays the required group definition.
NOTE: Because group licenses are currently unsupported, this field is always blank.
Enabled Features Name of the feature that is enabled with the particular license.
Expiry Verify tha the expiration information for the license is correct.
For JUNOS Software, only permanent licenses are supported. If a license has expired, it is
shown as invalid.
If you added the SRX100 Memory Upgrade license, the device reboots
immediately and comes back up as a high-memory device.
5. Go on to “Verifying JUNOS Software Services License Management” on page 299.
298 ■ Managing JUNOS Software Services Licenses with the J-Web Interface
Chapter 15: Installing and Managing Licenses
If you deleted the SRX100 Memory Upgrade license, the device reboots
immediately and comes back up as a low-memory device.
4. Go on to “Verifying JUNOS Software Services License Management” on page 299.
A screen displaying the license keys in text format appears. Multiple licenses are
separated by a blank line.
3. Go on to “Verifying JUNOS Software Services License Management” on page 299.
Action From the CLI, enter the show system license command.
Sample Output user@hostname> show system license
License usage:
Licenses Licenses Licenses Expiry
Feature name used installed needed
bgp-reflection 0 1 0 permanent
Licenses installed:
License identifier: G03000002223
License version: 2
Valid for device: JN001875AB
Features:
bgp-reflection - Border Gateway Protocol route reflection
permanent
Meaning The output shows a list of the license usage and a list of the licenses installed on the
device and when they expire. Verify the following information:
■ Each license is present. Licenses are listed in ascending alphanumeric order by
license ID.
■ The feature for each license is the expected feature. The features enabled are
listed by license. An all-inclusive license has All features listed.
■ All configured features have the required licenses installed. The Licenses needed
column must show that no licenses are required.
■ The expiration information for the license is correct. For JUNOS Software, licenses
can be either permanent or valid until a specified date.
Action From the CLI, enter the show system license usage command.
Sample Output user@hostname> show system license usage
Licenses Licenses Licenses Expiry
Feature name used installed needed
bgp-reflection 1 1 0 permanent
Meaning The output shows a list of the licenses installed on the device and how they are used.
Verify the following information:
Action From the CLI, enter the show system license keys command.
Sample Output user@hostname> show system license keys
Meaning The output shows a list of the license keys installed on the device. Verify that each
expected license key is present.
You can use the J-Web interface to perform routine file management operations such
as archiving log files and deleting unused log files, cleaning up temporary files and
crash files, and downloading log files from the routing platform to your computer.
You can also encrypt the configuration files with the CLI configuration editor to
prevent unauthorized users from viewing sensitive configuration information.
For more information about system management, see the JUNOS System Basics
Configuration Guide.
For information about which devices support the features documented in this chapter,
see the JUNOS Software Feature Support Reference for SRX Series and J Series Devices.
Cleaning Up Files
You can use the J-Web interface to rotate log files and delete unnecessary files on
the services router. If you are running low on storage space, the file cleanup procedure
quickly identifies files that can be deleted.
To rotate log files and delete unnecessary files with the J-Web interface:
1. In the J-Web interface, select Maintain>Files.
2. In the Clean Up Files section, click Clean Up Files. The device rotates log files
and identifies the files that can be safely deleted.
The J-Web interface displays the files that you can delete and the amount of
space that will be freed on the file system.
3. Click one of the following buttons on the confirmation page:
■ To delete the files and return to the Files page, click OK.
■ To cancel your entries and return to the list of files in the directory, click
Cancel.
Downloading Files
You can use the J-Web interface to download a copy of an individual file from the
services router. When you download a file, it is not deleted from the file system.
Figure 18 on page 305 shows the J-Web page from which you can download log files.
■ Log Files—Lists the log files located in the /var/log directory on the device.
■ Temporary Files—Lists the temporary files located in the /var/tmp directory
on the device.
■ Old JUNOS Software—Lists the software images located in the (*.tgz files)
in the /var/sw/pkg directory on the device.
■ Crash (Core) Files—Lists the core files located in the /var/crash directory
on the device.
Deleting Files
You can use the J-Web interface to delete an individual file from the services router.
When you delete the file, it is permanently removed from the file system.
CAUTION: If you are unsure whether to delete a file from the device, we recommend
using the Cleanup Files tool described in “Cleaning Up Files” on page 304. This tool
determines which files can be safely deleted from the file system.
Figure 19 on page 306 shows the J-Web page on which you confirm the deletion of
files.
■ Old JUNOS Software—Lists the software images in the (*.tgz files) in the
/var/sw/pkg directory on the device.
■ Crash (Core) Files—Lists the core files located in the /var/crash directory
on the device.
The J-Web interface displays the files you can delete and the amount of space
that will be freed on the file system.
5. Click one of the following buttons on the confirmation page:
■ To delete the files and return to the Files page, click OK.
■ To cancel your entries and return to the list of files in the directory, click
Cancel.
You can use the CLI request system storage cleanup command to rotate log files and
delete unnecessary files on the services router. If you are running low on storage
space, the file cleanup procedure quickly identifies files that can be deleted.
To rotate log files and delete unnecessary files with the CLI:
1. Enter operational mode in the CLI.
2. To rotate log files and identify the files that can be safely deleted, enter the
following command:
The device rotates log files and displays the files that you can delete.
3. Enter yes at the prompt to delete the files.
NOTE: You can issue the request system storage cleanup dry-run command to review
the list of files that can be deleted with the request system storage cleanup command,
without actually deleting the files.
The default location for accounting files is the cfs/var/log directory on the
CompactFlash card. The nonpersistent option minimizes the read/write traffic to
your CompactFlash card. We recommend that you use the nonpersistent option for
all accounting files configured on your system.
3. To store accounting log files in the DRAM file, enter the following command:
For more information about the nonpersistent option, see the JUNOS Network
Management Configuration Guide.
CAUTION: If log files for accounting data are stored on DRAM, these files are lost
when the device reboots. Therefore, we recommend that you back up these files
periodically.
If your device runs the Canada and U.S. version of JUNOS Software, the configuration
files can be encrypted with the Advanced Encryption Standard (AES) or Data
Encryption Standard (DES) encryption algorithms. If your device runs the international
version of JUNOS Software, the files can be encrypted only with DES.
To prevent unauthorized access, the encryption key is stored in the device's EEPROM.
You can copy the encrypted configuration files to another device and decrypt them
if that device has the same encryption key. To prevent encrypted configuration files
from being copied to another device and decrypted, you can set a unique encryption
key that contains the chassis serial number of your device. Configuration files that
are encrypted with a unique encryption key cannot be decrypted on any other device.
The encryption process encrypts only the configuration files in the /config and
/var/db/config directories. Files in subdirectories under these directories are not
encrypted. The filenames of encrypted configuration files have the extension
.gz.jc—for example, juniper.conf.gz.jc.
NOTE: You must have superuser privileges to encrypt or decrypt configuration files.
request system set-encryption-key Sets the encryption key and enables default configuration file encryption as follows:
■ AES encryption for the Canada and U.S. version of JUNOS Software
■ DES encryption for the international version of JUNOS Software
request system set-encryption-key Sets the encryption key and specifies configuration file encryption by DES.
algorithm des
request system set-encryption-key Sets the encryption key and enables default configuration file encryption with a unique
unique encryption key that includes the chassis serial number of the device.
Configuration files encrypted with the unique key can be decrypted only on the current
device. You cannot copy such configuration files to another device and decrypt them.
request system set-encryption-key des Sets the encryption key and specifies configuration file encryption by DES with a
unique unique encryption key.
For example:
3. At the prompt, enter the encryption key. The encryption key must have at least
6 characters.
user@host# commit
commit complete
user@host# commit
commit complete
3. At the prompt, enter the new encryption key. The encryption key must have at
least 6 characters.
J Series Services Routers and SRX Series Services Gateways support a suite of J-Web
tools and CLI operational mode commands for evaluating system health and
performance. Diagnostic tools and commands test the connectivity and reachability
of hosts in the network.
For complete descriptions of CLI operational mode commands, see the JUNOS System
Basics and Services Command Reference, the JUNOS Interfaces Command Reference,
and the JUNOS Routing Protocols and Policies Command Reference.
For information about which devices support the features documented in this chapter,
see the JUNOS Software Feature Support Reference for SRX Series and J Series Devices.
Diagnostic Terms
Before diagnosing your device, become familiar with the terms defined in Table 130
on page 315.
Term Definition
Don't Fragment (DF) bit Bit in the IP header that instructs routers not to fragment a packet. You might set this bit if the
destination host cannot reassemble the packet or if you want to test the path maximum
transmission unit (MTU) for a destination host.
Term Definition
routing instance Collection of routing tables, interfaces, and routing protocol interfaces. The set of interfaces
belongs to the routing tables, and the routing protocol parameters control the information in the
routing tables.
loose source routing Option in the IP header used to route a packet based on information supplied by the source. A
gateway or host must route the packet using the routers specified by this information, but the
packet can use other routers along the way.
strict source routing Option in the IP header used to route a packet based on information supplied by the source. A
gateway or host must route the packet exactly as specified by this information.
time to live (TTL) Value (octet) in the IP header that is (usually) decremented by 1 for each hop the packet passes
through. If the field reaches zero, the packet is discarded and a corresponding error message is
sent to the source of the packet.
type of service (TOS) Value (octet) in the IP header that defines the service the source host requests, such as the
packet's priority and the preferred delay, throughput, and reliability.
You can also diagnose the device with CLI operational mode commands. CLI
command output appears on the screen of your console or management device, or
you can filter the output to a file.
This section contains the following topics. To filter output to a file, see “Filtering
Command Output” on page 128.
■ J-Web Diagnostic Tools Overview on page 316
■ CLI Diagnostic Commands Overview on page 317
■ MPLS Connection Checking on page 319
Option Function
Troubleshoot Options
Ping Host Allows you to ping a remote host. You can configure advanced options for the ping operation.
For details, see “Using the J-Web Ping Host Tool” on page 322.
Option Function
Ping MPLS Allows you to ping an MPLS endpoint using various options.
Traceroute Allows you to trace a route between the device and a remote host. You can configure advanced options
for the traceroute operation.
For details, see “Tracing Unicast Routes from the J-Web Interface” on page 330.
Packet Capture Allows you to capture and analyze router control traffic.
For details, see “Capturing and Viewing Packets with the J-Web Interface” on page 334.
Maintain Options
Files Allows you manage log, temporary, and core files on the device.
For details, see “Managing Files with the J-Web Interface” on page 303.
For details, see “Performing Software Upgrades and Reboots” on page 231.
Licenses Displays a summary of the licenses needed and used for each feature that requires a license. Allows you
to add licenses.
For details, see “Rebooting or Halting the Device with the J-Web Interface” on page 249.
Because the CLI is a superset of the J-Web interface, you can perform certain tasks
only through the CLI. For example, you can use the mtrace command to display trace
information about a multicast path from a source to a receiver, which is a feature
available only through the CLI.
To view a list of top-level operational mode commands, type a question mark (?) at
the command-line prompt.
At the top level of operational mode are the broad groups of CLI diagnostic commands
listed in Table 132 on page 318.
Command Function
For details, see “Tracing Multicast Routes from the CLI” on page 349.
For details, see “Pinging Hosts from the CLI” on page 339.
ping mpls Determines the reachability of an MPLS endpoint using various options.
test Tests the configuration and application of policy filters and AS path regular
expressions.
For details, see “Tracing Unicast Routes from the CLI” on page 345.
Management
copy Copies files from one location on the device to another, from the device to a
remote system, or from a remote system to the device.
restart option Restarts the various system processes, including the routing protocol, interface,
and SNMP processes.
request Performs system-level operations, including stopping and rebooting the device
and loading software images.
Command Function
When you use the ping MPLS feature from a J Series device operating as the inbound
(ingress) node at the entry point of an LSP or VPN, the router sends probe packets
into the LSP or VPN. Based on how the LSP or VPN outbound (egress) node at the
remote endpoint of the connection replies to the probes, you can determine the
connectivity of the LSP or VPN.
Each probe is an echo request sent to the LSP or VPN exit point as an MPLS packet
with a UDP payload. If the outbound node receives the echo request, it checks the
contents of the probe and returns a value in the UDP payload of the response packet.
If the J Series device receives the response packet, it reports a successful ping
response.
Responses that take longer than 2 seconds are identified as failed probes.
Table 133 on page 319 summarizes the options for using either the J-Web ping MPLS
diagnostic tool or the CLI ping mpls command to display information about MPLS
connections in VPNs and LSPs.
Ping RSVP-signaled LSP ping mpls rsvp Checks the operability of an LSP that When an RSVP-signaled LSP has
has been set up by the Resource several paths, the J Series device
Reservation Protocol (RSVP). The J sends the ping requests on the path
Series device pings a particular LSP that is currently active.
using the configured LSP name.
Ping LDP-signaled LSP ping mpls ldp Checks the operability of an LSP that When an LDP-signaled LSP has
has been set up by the Label several gateways, the J Series device
Distribution Protocol (LDP). The J sends the ping requests through the
Series device pings a particular LSP first gateway.
using the forwarding equivalence
class (FEC) prefix and length. Ping requests sent to LDP-signaled
LSPs use only the master routing
instance.
Ping LSP to Layer 3 ping mpls l3vpn Checks the operability of the The J Series device does not test the
VPN prefix connections related to a Layer 3 VPN. connection between a PE router and
The J Series device tests whether a a customer edge (CE) router.
prefix is present in a provider edge
(PE) router's VPN routing and
forwarding (VRF) table, by means of
a Layer 3 VPN destination prefix.
Locate LSP using ping mpls l2vpn Checks the operability of the For information about interface
interface name interface connections related to a Layer 2 VPN. names, See the interface naming
The J Series device directs outgoing conventions in the JUNOS Software
request probes out the specified Interfaces and Routing Configuration
interface. Guide.
Instance to which this ping mpls l2vpn Checks the operability of the
connection belongs instance connections related to a Layer 2 VPN.
The J series device pings on a
combination of the Layer 2 VPN
routing instance name, the local site
identifier, and the remote site
identifier, to test the integrity of the
Layer 2 VPN circuit (specified by the
identifiers) between the inbound and
outbound PE routers.
Locate LSP from ping mpls l2circuit Checks the operability of the Layer 2
interface name interface circuit connections. The J Series
device directs outgoing request
probes out the specified interface.
Locate LSP from virtual ping mpls l2circuit Checks the operability of the Layer 2
circuit information virtual-circuit circuit connections. The J Series
device pings on a combination of the
IPv4 prefix and the virtual circuit
identifier on the outbound PE router,
testing the integrity of the Layer 2
circuit between the inbound and
outbound PE routers.
Ping end point of LSP ping mpls lsp-end-point Checks the operability of an LSP
endpoint. The J Series device pings
an LSP endpoint using either an LDP
FEC prefix or an RSVP LSP endpoint
address.
General Preparation
To use the J-Web interface and CLI operational tools, you must have the appropriate
access privileges. For more information about configuring access privilege levels,
see “Adding New Users” on page 31 and the JUNOS System Basics Configuration
Guide.
MPLS Enabled
To process ping MPLS requests, the remote endpoint of the VPN or LSP must be
configured appropriately. You must enable MPLS on the receiving interface of the
outbound node for the VPN or LSP. If MPLS is not enabled, the remote endpoint
drops the incoming request packets and returns an “ICMP host unreachable” message
to the J Series device.
Loopback Address
The loopback address (lo0) on the outbound node must be configured as 127.0.0.1.
If this interface address is not configured correctly, the outbound node does not have
this forwarding entry. It drops the incoming request packets and returns a “host
unreachable” message to the J Series device.
The source IP address you specify for a set of probes must be an address configured
on one of the J Series device interfaces. If it is not a valid J Series device address, the
ping request fails with the error message “Can't assign requested address.”
Alternatively, you can use the CLI ping command. (See “Pinging Hosts from the CLI”
on page 339.)
The results of the ping operation are displayed in the main pane (see Figure 21
on page 324). If no options are specified, each ping response is in the following
format:
Table 135 on page 325 summarizes the output fields of the display.
5. To stop the ping operation before it is complete, click OK.
Remote Host Identifies the host to ping. Type the hostname or IP address of the host to ping.
Advanced Options
Don't Resolve Determines whether to display hostnames of the ■ To suppress the display of the hop hostnames,
Addresses hops along the path. select the check box.
■ To display the hop hostnames, clear the check
box.
Interface Specifies the interface on which the ping requests From the list, select the interface on which ping
are sent. requests are sent. If you select any, the ping requests
are sent on all interfaces.
Count Specifies the number of ping requests to send. From the list, select the number of ping requests to
send.
Don't Fragment Specifies the Don't Fragment (DF) bit in the IP ■ To set the DF bit, select the check box.
header of the ping request packet. ■ To clear the DF bit, clear the check box.
Record Route Sets the record route option in the IP header of the ■ To record and display the path of the packet,
ping request packet. The path of the ping request select the check box.
packet is recorded within the packet and displayed ■ To suppress the recording and display of the
in the main pane. path of the packet, clear the check box.
Type-of-Service Specifies the type-of-service (TOS) value in the IP From the list, select the decimal value of the TOS
header of the ping request packet. field.
Routing Instance Name of the routing instance for the ping attempt. From the list, select the routing instance name.
Interval Specifies the interval, in seconds, between the From the list, select the interval.
transmission of each ping request.
Packet Size Specifies the size of the ping request packet. Type the size, in bytes, of the packet. The size can
be from 0 through 65468. The device adds 8 bytes
of ICMP header to the size.
Source Address Specifies the source address of the ping request Type the source IP address.
packet.
Time-to-Live Specifies the time-to-live (TTL) hop count for the From the list, select the TTL.
ping request packet.
Bypass Routing Determines whether ping requests are routed by ■ To bypass the routing table and send the ping
means of the routing table. requests to hosts on the specified interface
only, select the check box.
If the routing table is not used, ping requests are ■ To route the ping requests using the routing
sent only to hosts on the interface specified in the table, clear the check box.
Interface box. If the host is not on that interface,
ping responses are not sent.
bytes bytes from ip-address ■ bytes—Size of ping response packet, which is equal to the value you entered in
the Packet Size box, plus 8.
■ ip-address—IP address of destination host that sent the ping response packet.
icmp_seq=0 number—Sequence Number field of the ping response packet. You can use this value
to match the ping response to the corresponding ping request.
icmp_seq=number
time=time time—Total time between the sending of the ping request packet and the receiving of
the ping response packet, in milliseconds. This value is also called round-trip time.
percentage packet loss percentage—Number of ping responses divided by the number of ping requests,
specified as a percentage.
round-trip min/avg/max/stddev = ■ min-time—Minimum round-trip time (see time=time field in this table).
min-time/avg-time/max-time/std-dev ■ avg-time—Average round-trip time.
ms
■ max-time—Maximum round-trip time.
■ std-dev—Standard deviation of the round-trip times.
If the device does not receive ping responses from the destination host (the output
shows a packet loss of 100 percent), one of the following explanations might apply:
■ The host is not operational.
■ There are network connectivity problems between the device and the host.
■ The host might be configured to ignore ICMP echo requests.
■ The host might be configured with a firewall filter that blocks ICMP echo requests
or ICMP echo responses.
■ The size of the ICMP echo request packet exceeds the MTU of a host along the
path.
■ The value you selected in the Time-to-Live box was less than the number of hops
in the path to the host, in which case the host might reply with an ICMP error
message.
For more information about ICMP, see RFC 792, Internet Control Message Protocol.
Alternatively, you can use the CLI commands ping mpls, ping mpls l2circuit, ping mpls
l2vpn, and ping mpls l3vpn. For more information, see “Pinging Hosts from the CLI”
on page 339.
Before using the J-Web ping MPLS tool in your network, read “Ping MPLS Preparation”
on page 321.
Table 137 on page 330 summarizes the output fields of the display.
5. To stop the ping operation before it is complete, click OK.
Source Address Specifies the source address of the ping request Type the source IP address—a valid address
packet. configured on a J Series device interface.
Count Specifies the number of ping requests to send. From the list, select the number of ping requests to
send. The default is 5 requests.
Detailed Output Requests the display of extensive rather than brief Select the check box to display detailed output.
ping output.
Source Address Specifies the source address of the ping request Type the source IP address—a valid address
packet. configured on a J Series device interface.
Count Specifies the number of ping requests to send. From the list, select the number of ping requests to
send. The default is 5 requests.
Detailed Output Requests the display of extensive rather than brief Select the check box to display detailed output.
ping output.
Count Specifies the number of ping requests to send. From the list, select the number of ping requests to
send. The default is 5 requests.
Detailed Output Requests the display of extensive rather than brief Select the check box to display detailed output.
ping output.
VPN Prefix Identifies the IP address prefix and length of the Type the IP address prefix and length of the VPN to
Layer 3 VPN to ping. ping.
Source Address Specifies the source address of the ping request Type the source IP address—a valid address
packet. configured on a J Series device interface.
Source Address Specifies the source address of the ping request Type the source IP address—a valid address
packet. configured on a J series device interface.
Count Specifies the number of ping requests to send. From the list, select the number of ping requests to
send. The default is 5 requests.
Detailed Output Requests the display of extensive rather than brief Select the check box to display detailed output.
ping output.
Remote Site Specifies the remote site identifier of the Layer 2 Type the remote site identifier for the VPN.
Identifier VPN to ping.
Source Address Specifies the source address of the ping request Type the source IP address—a valid address
packet. configured on a J Series device interface.
Local Site Specifies the local site identifier of the Layer 2 VPN Type the local site identifier for the VPN.
Identifier to ping.
Count Specifies the number of ping requests to send. From the list, select the number of ping requests to
send. The default is 5 requests.
Detailed Output Requests the display of extensive rather than brief Select the check box to display detailed output.
ping output.
Interface Specifies the interface on which the ping requests From the list, select the J Series device interface on
are sent. which ping requests are sent. If you select any, the
ping requests are sent on all interfaces.
Source Address Specifies the source address of the ping request Type the source IP address—a valid address
packet. configured on a J Series device interface.
Count Specifies the number of ping requests to send. From the list, select the number of ping requests to
send. The default is 5 requests.
Detailed Output Requests the display of extensive rather than brief Select the check box to display detailed output.
ping output.
Circuit Identifier Specifies the virtual circuit identifier for the Layer 2 Type the virtual circuit identifier for the Layer 2
circuit to ping. circuit.
Source Address Specifies the source address of the ping request Type the source IP address—a valid address
packet. configured on a J Series device interface.
Count Specifies the number of ping requests to send. From the list, select the number of ping requests to
send.
Detailed Output Requests the display of extensive rather than brief Select the check box to display detailed output.
ping output.
Source Address Specifies the source address of the ping request Type the source IP address—a valid address
packet. configured on a J Series device interface.
Count Specifies the number of ping requests to send. From the list, select the number of ping requests to
send.
Detailed Output Requests the display of extensive rather than brief Select the check box to display detailed output.
ping output.
Field Description
Period (.) Echo reply was not received within the timeout period.
x Echo reply was received with an error code. Errored packets are not counted in the
received packets count and are accounted for separately.
percentage packet loss percentage—Number of ping responses divided by the number of ping requests,
specified as a percentage.
time For Layer 2 circuits only, the number of milliseconds required for the ping packet to
reach the destination. This value is approximate, because the packet has to reach the
Routing Engine.
If the device does not receive ping responses from the destination host (the output
shows a packet loss of 100 percent), one of the following explanations might apply:
■ The host is not operational.
■ There are network connectivity problems between the device and the host.
■ The host might be configured to ignore echo requests.
■ The host might be configured with a firewall filter that blocks echo requests or
echo responses.
■ The size of the echo request packet exceeds the MTU of a host along the path.
■ The outbound node at the remote endpoint is not configured to handle MPLS
packets.
■ The remote endpoint's loopback address is not configured to 127.0.0.1.
The device generates the list of routers by sending a series of ICMP traceroute packets
in which the time-to-live (TTL) value in the messages sent to each successive router
is incremented by 1. (The TTL value of the first traceroute packet is set to 1.) In this
manner, each router along the path to the destination host replies with a Time
Exceeded packet from which the source IP address can be obtained.
Alternatively, you can use the CLI traceroute command to generate the list.
The results of the traceroute operation are displayed in the main pane. If no
options are specified, each line of the traceroute display is in the following format:
The device sends a total of three traceroute packets to each router along the path
and displays the round-trip time for each traceroute operation. If the device times
out before receiving a Time Exceeded message, an asterisk (*) is displayed for
that round-trip time.
Table 139 on page 333 summarizes the output fields of the display.
5. To stop the traceroute operation before it is complete, click OK while the results
of the traceroute operation are being displayed.
Remote Host Identifies the destination host of the traceroute. Type the hostname or IP address of the destination
host.
Advanced Options
Don't Resolve Determines whether hostnames of the hops along ■ To suppress the display of the hop hostnames,
Addresses the path are displayed, in addition to IP addresses. select the check box.
■ To display the hop hostnames, clear the check
box.
Gateway Specifies the IP address of the gateway to route Type the gateway IP address.
through.
Source Address Specifies the source address of the outgoing Type the source IP address.
traceroute packets.
Bypass Routing Determines whether traceroute packets are routed ■ To bypass the routing table and send the
by means of the routing table. traceroute packets to hosts on the specified
interface only, select the check box.
If the routing table is not used, traceroute packets ■ To route the traceroute packets by means of
are sent only to hosts on the interface specified in the routing table, clear the check box.
the Interface box. If the host is not on that interface,
traceroute responses are not sent.
Interface Specifies the interface on which the traceroute From the list, select the interface on which
packets are sent. traceroute packets are sent. If you select any, the
traceroute requests are sent on all interfaces.
Time-to-Live Specifies the maximum time-to-live (TTL) hop count From the list, select the TTL.
for the traceroute request packet.
Type-of-Service Specifies the type-of-service (TOS) value to include From the list, select the decimal value of the TOS
in the IP header of the traceroute request packet. field.
Resolve AS Determines whether the autonomous system (AS) ■ To display the AS numbers, select the check
Numbers number of each intermediate hop between the box.
device and the destination host is displayed. ■ To suppress the display of the AS numbers,
clear the check box.
Field Description
host Hostname, if available, or IP address of the router. If the Don't Resolve Addresses check box is selected,
the hostname is not displayed.
time1 Round-trip time between the sending of the first traceroute packet and the receiving of the corresponding
Time Exceeded packet from that particular router.
time2 Round-trip time between the sending of the second traceroute packet and the receiving of the corresponding
Time Exceeded packet from that particular router.
time3 Round-trip time between the sending of the third traceroute packet and the receiving of the corresponding
Time Exceeded packet from that particular router.
If the device does not display the complete path to the destination host, one of the
following explanations might apply:
■ The host is not operational.
■ There are network connectivity problems between the device and the host.
■ The host, or a router along the path, might be configured to ignore ICMP
traceroute messages.
■ The host, or a router along the path, might be configured with a firewall filter
that blocks ICMP traceroute requests or ICMP time exceeded responses.
■ The value you selected in the Time Exceeded box was less than the number of
hops in the path to the host. In this case, the host might reply with an ICMP error
message.
For more information about ICMP, see RFC 792, Internet Control Message Protocol.
Alternatively you can use the CLI monitor traffic command to capture and display
packets matching a specific criteria. For details, see “Using the monitor traffic
Command” on page 355.
To capture transient traffic and entire IPv4 data packets for offline analysis, you must
configure packet capture with the J-Web or CLI configuration editor. For details, see
“Configuring Packet Capture” on page 361.
The sample configuration in Table 140 on page 335 captures the next 10 TCP
packets originating from the IP address 10.1.40.48 on port 23 and passing
through the Gigabit Ethernet interface ge-0/0/0.
3. To save the captured packets to a file, or specify other advanced options, click
the expand icon next to Advanced options, and enter information as described
in Table 140 on page 335.
4. Click Start.
The captured packet headers are decoded and displayed in the Packet Capture
display (see Figure 25 on page 338).
Table 141 on page 338 summarizes the output fields of the display.
5. Do one of the following:
■ To stop capturing the packets and stay on the same page while the decoded
packet headers are being displayed, click Stop Capturing.
■ To stop capturing packets and return to the Packet Capture page, click OK.
Interface Specifies the interface on which the packets are From the list, select an interface—for example,
captured. ge-0/0/0.
Detail level Specifies the extent of details to be displayed for the From the list, select Detail.
packet headers.
■ Brief—Displays the minimum packet header
information. This is the default.
■ Detail—Displays packet header information in
moderate detail.
■ Extensive—Displays the maximum packet
header information.
Packets Specifies the number of packets to be captured. From the list, select the number of packets to be
Values range from 1 to 1000. Default is 10. Packet captured—for example, 10.
capture stops capturing packets after this number
is reached.
Addresses Specifies the addresses to be matched for capturing Select address-matching criteria. For example:
the packets using a combination of the following
parameters: 1. From the Direction list, select source.
■ Direction—Matches the packet headers for IP 2. From the Type list, select host.
address, hostname, or network address of the 3. In the Address box, type 10.1.40.48.
source, destination or both.
Type—Specifies if packet headers are matched
4. Click Add.
■
for host address or network address.
Protocols Matches the protocol for which packets are captured. From the list, select a protocol—for example, tcp.
You can choose to capture TCP, UDP, or ICMP
packets or a combination of TCP, UDP, and ICMP
packets.
Ports Matches packet headers containing the specified Select a direction and a port. For example:
source or destination TCP or UDP port number or
port name. 1. From the Type list, select src.
2. In the Port box, type 23.
Advanced Options
Absolute TCP Specifies that absolute TCP sequence numbers are ■ To display absolute TCP sequence numbers in
Sequence to be displayed for the packet headers. the packet headers, select this check box.
■ To stop displaying absolute TCP sequence
numbers in the packet headers, clear this check
box.
Layer 2 Headers Specifies that link-layer packet headers are to be ■ To include link-layer packet headers while
displayed. capturing packets, select this check box.
■ To exclude link-layer packet headers while
capturing packets, clear this check box.
Non-Promiscuous Specifies not to place the interface in promiscuous ■ To read all packets that reach the interface,
mode, so that the interface reads only packets select this check box.
addressed to it. ■ To read only packets addressed to the interface,
clear this check box.
In promiscuous mode, the interface reads every
packet that reaches it.
Display Hex Specifies that packet headers, except link-layer ■ To display the packet headers in hexadecimal
headers, are to be displayed in hexadecimal format. format, select this check box.
■ To stop displaying the packet headers in
hexadecimal format, clear this check box.
Display ASCII Specifies that packet headers are to be displayed in ■ To display the packet headers in ASCII and
and Hex hexadecimal and ASCII format. hexadecimal formats, select this check box.
■ To stop displaying the packet headers in ASCII
and hexadecimal formats, clear this check box.
Header Specifies the match condition for the packets to be You can enter match conditions directly in this field
Expression captured. in expression format or modify the expression
composed from the match conditions you specified
The match conditions you specify for Addresses, for Addresses, Protocols, and Ports. If you change
Protocols, and Ports are displayed in expression the match conditions specified for Addresses,
format in this field. Protocols, and Ports again, packet capture overwrites
your changes with the new match conditions.
Packet Size Specifies the number of bytes to be displayed for Type the number of bytes you want to capture for
each packet. If a packet header exceeds this size, each packet header—for example, 256.
the display is truncated for the packet header. The
default value is 96 bytes.
Don't Resolve Specifies that IP addresses are not to be resolved ■ To prevent packet capture from resolving IP
Addresses into hostnames in the packet headers displayed. addresses to hostnames, select this check box.
■ To resolve IP addresses into hostnames, clear
this check box.
No Timestamp Suppresses the display of packet header timestamps. ■ To stop displaying timestamps in the captured
packet headers, select this check box.
■ To display the timestamp in the captured
packet headers, clear this check box.
Write Packet Writes the captured packets to a file in PCAP format ■ To save the captured packet headers to a file,
Capture File in /var/tmp. The files are named with the prefix select this check box.
jweb-pcap and the extension .pcap. ■ To decode and display the packet headers on
the J-Web page, clear this check box.
If you select this option, the decoded packet headers
are not displayed on the packet capture page.
Field Description
timestamp Time when the packet was captured. The timestamp 00:45:40.823971 means 00 hours (12.00 a.m.), 45
minutes, and 40.823971 seconds.
direction Direction of the packet. Specifies whether the packet originated from the Routing Engine (Out), or was
destined for the Routing Engine (In).
source address Hostname, if available, or IP address and the port number of the packet's origin. If the Don't Resolve
Addresses check box is selected, only the IP address of the source is displayed.
NOTE: When a string is defined for the port, the packet capture output displays the string instead of the
port number.
destination address Hostname, if available, or IP address of the packet's destination with the port number. If the Don't Resolve
Addresses check box is selected, only the IP address of the destination and the port are displayed.
NOTE: When a string is defined for the port, the packet capture output displays the string instead of the
port number.
Alternatively, you can use the J-Web interface. (See “Using the J-Web Ping Host Tool”
on page 322.)
Enter the ping command with the following syntax. Table 142 on page 339 describes
the ping command options.
Option Description
interface source-interface (Optional) Sends the ping requests on the interface you specify. If you do not include this option,
ping requests are sent on all interfaces.
Option Description
bypass-routing (Optional) Bypasses the routing tables and sends the ping requests only to hosts on directly
attached interfaces. If the host is not on a directly attached interface, an error message is returned.
Use this option to ping a local system through an interface that has no route through it.
countnumber (Optional) Limits the number of ping requests to send. Specify a count from 1 through
2,000,000,000. If you do not specify a count, ping requests are continuously sent until you press
Ctrl-C.
do-not-fragment (Optional) Sets the Don't Fragment (DF) bit in the IP header of the ping request packet.
interval seconds (Optional) Sets the interval between ping requests, in seconds. Specify an interval from 0.1
through 10,000. The default value is 1 second.
loose-source [hosts] (Optional) For IPv4, sets the loose source routing option in the IP header of the ping request
packet.
no-resolve (Optional) Suppresses the display of the hostnames of the hops along the path.
pattern string (Optional) Includes the hexadecimal string you specify, in the ping request packet.
rapid (Optional) Sends ping requests rapidly. The results are reported in a single message, not in
individual messages for each ping request. By default, five ping requests are sent before the
results are reported. To change the number of requests, include the count option.
record-route (Optional) For IPv4, sets the record route option in the IP header of the ping request packet. The
path of the ping request packet is recorded within the packet and displayed on the screen.
routing-instance (Optional) Uses the routing instance you specify for the ping request.
routing-instance-name
size bytes (Optional) Sets the size of the ping request packet. Specify a size from 0 through 65,468. The
default value is 56 bytes, which is effectively 64 bytes because 8 bytes of ICMP header data are
added to the packet.
source source-address (Optional) Uses the source address that you specify, in the ping request packet.
strict (Optional) For IPv4, sets the strict source routing option in the IP header of the ping request
packet.
strict-source [hosts] (Optional) For IPv4, sets the strict source routing option in the IP header of the ping request
packet, and uses the list of hosts you specify for routing the packet.
tos number (Optional) Sets the type-of-service (TOS) value in the IP header of the ping request packet. Specify
a value from 0 through 255.
ttl number (Optional) Sets the time-to-live (TTL) value for the ping request packet. Specify a value from 0
through 255.
Option Description
wait seconds (Optional) Sets the maximum time to wait after sending the last ping request packet. If you do
not specify this option, the default delay is 10 seconds. If you use this option without the count
option, the J Series device uses a default count of 5 packets.
detail (Optional) Displays the interface on which the ping response was received.
The fields in the display are the same as those displayed by the J-Web ping host
diagnostic tool. For information, see “Ping Host Results and Output Summary” on
page 324.
Each probe is an echo request sent to the LSP or VPN exit point as an MPLS packet
with a UDP payload. If the outbound node receives the echo request, it checks the
contents of the probe and returns a value in the UDP payload of the response packet.
If the J Series device receives the response packet, it reports a successful ping
response. Responses that take longer than 2 seconds are identified as failed probes.
Alternatively, you can use the J-Web ping MPLS tool. For more information, see
“Checking MPLS Connections from the J-Web Interface” on page 325.
Before using ping mpls commands in your network, read “Ping MPLS Preparation”
on page 321.
The ping mpls commands diagnose the connectivity of MPLS and VPN networks in
the following ways:
■ Pinging RSVP-Signaled LSPs and LDP-Signaled LSPs on page 342
■ Pinging Layer 3 VPNs on page 343
Enter the ping mpls command with the following syntax. Table 143 on page 342
describes the ping mpls command options.
Alternatively, you can use the J-Web interface. (See “Checking MPLS Connections
from the J-Web Interface” on page 325.)
Table 143: CLI ping mpls ldp and ping mpls lsp-end-point Command Options
Option Description
ldp fec Pings an LDP-signaled LSP identified by the forwarding equivalence class (FEC) prefix and length.
lsp-end-point prefix-name Pings an LSP endpoint using either an LDP FEC or a RSVP LSP endpoint address.
rsvp lsp-name Pings an RSVP-signaled LSP identified by the specified LSP name.
exp forwarding-class (Optional) Specifies the value of the forwarding class to be used in the MPLS ping packets.
countnumber (Optional) Limits the number of ping requests to send. Specify a count from 0 through 1,000,000.
The default value is 5. If you do not specify a count, ping requests are continuously sent until
you press Ctrl-C.
source source-address (Optional) Uses the source address that you specify, in the ping request packet.
detail (Optional) Displays detailed output about the echo requests sent and received. Detailed output
includes the MPLS labels used for each request and the return codes for each request.
The fields in the display are the same as those displayed by the J-Web ping MPLS
diagnostic tool. For information, see “Ping MPLS Results and Output” on page 329.
Enter the ping mpls l3vpn command with the following syntax. Table 144 on page
343 describes the ping mpls l3vpn command options.
Alternatively, you can use the J-Web interface. (See “Checking MPLS Connections
from the J-Web Interface” on page 325.)
Option Description
l3vpn prefix prefix-name Pings the remote host specified by the prefix to verify that the prefix is present in the PE router's
VPN routing and forwarding (VRF) table. This option does not test the connectivity between a
PE router and a CE router.
bottom-label-ttl (Optional) Displays the time-to-live (TTL) value for the bottom label in the MPLS label stack.
exp forwarding-class (Optional) Specifies the value of the forwarding class to be used in the MPLS ping packets.
countnumber (Optional) Limits the number of ping requests to send. Specify a count from 0 through 1,000,000.
The default value is 5. If you do not specify a count, ping requests are continuously sent until
you press Ctrl-C.
source source-address (Optional) Uses the source address that you specify, in the ping request packet.
detail (Optional) Displays detailed output about the echo requests sent and received. Detailed output
includes the MPLS labels used for each request and the return codes for each request.
The fields in the display are the same as those displayed by the J-Web ping MPLS
diagnostic tool. For information, see “Ping MPLS Results and Output” on page 329.
Enter the ping mpls l2vpn command with the following syntax. Table 145 on page
344 describes the ping mpls l2vpn command options.
Alternatively, you can use the J-Web interface. (See “Checking MPLS Connections
from the J-Web Interface” on page 325.)
Option Description
l2vpn interface Sends ping requests out the specified interface configured for the Layer 2 VPN on the outbound
interface-name (egress) PE router.
l2vpn instance Pings on a combination of the Layer 2 VPN routing instance name, the local site identifier, and
l2vpn-instance-name the remote site identifier, testing the integrity of the Layer 2 VPN circuit (specified by the
local-site-id identifiers) between the inbound (ingress) and outbound PE routers.
local-site-id-number
remote-site-id
remote-site-id-number
bottom-label-ttl (Optional) Displays the time-to-live (TTL) value for the bottom label in the MPLS label stack.
exp forwarding-class (Optional) Specifies the value of the forwarding class to be used in the MPLS ping packets.
countnumber (Optional) Limits the number of ping requests to send. Specify a count from 0 through 1,000,000.
The default value is 5. If you do not specify a count, ping requests are continuously sent until
you press Ctrl-C.
source source-address (Optional) Uses the source address that you specify, in the ping request packet.
detail (Optional) Displays detailed output about the echo requests sent and received. Detailed output
includes the MPLS labels used for each request and the return codes for each request.
The fields in the display are the same as those displayed by the J-Web ping MPLS
diagnostic tool. For information, see “Ping MPLS Results and Output” on page 329.
Enter the ping mpls l2circuit command with the following syntax. Table 146 on page
345 describes the ping mpls l2circuit command options.
Alternatively, you can use the J-Web interface. (See “Checking MPLS Connections
from the J-Web Interface” on page 325.)
Option Description
l2circuit interface Sends ping requests out the specified interface configured for the Layer 2 circuit on the outbound
interface-name PE router.
l2circuit virtual-circuit Pings on a combination of the IPv4 prefix and the virtual circuit identifier on the outbound PE
neighbor prefix-name router, testing the integrity of the Layer 2 circuit between the inbound and outbound PE routers.
virtual-circuit-id
exp forwarding-class (Optional) Specifies the value of the forwarding class to be used in the MPLS ping packets.
countnumber (Optional) Limits the number of ping requests to send. Specify a count from 0 through 1,000,000.
The default value is 5. If you do not specify a count, ping requests are continuously sent until
you press Ctrl-C.
source source-address (Optional) Uses the source address that you specify, in the ping request packet.
detail (Optional) Displays detailed output about the echo requests sent and received. Detailed output
includes the MPLS labels used for each request and the return codes for each request.
The fields in the display are the same as those displayed by the J-Web ping MPLS
diagnostic tool. For information, see “Ping MPLS Results and Output” on page 329.
in the path from the device to the destination host, and addressing network traffic
latency and throughput problems.
The device generates the list of routers by sending a series of ICMP traceroute packets
in which the time-to-live (TTL) value in the messages sent to each successive router
is incremented by 1. (The TTL value of the first traceroute packet is set to 1.) In this
manner, each router along the path to the destination host replies with a Time
Exceeded packet from which the source IP address can be obtained.
Alternatively, you can use the J-Web interface. (See “Tracing Unicast Routes from
the J-Web Interface” on page 330.)
This section contains the following topics. For more information about traceroute
commands, see the JUNOS System Basics and Services Command Reference.
■ Using the traceroute Command on page 346
■ Using the traceroute monitor Command on page 347
To display a list of routers between the device and a specified destination host, enter
the traceroute command with the following syntax. Table 147 on page 346 describes
the traceroute command options.
Option Description
interface interface-name (Optional) Sends the traceroute packets on the interface you specify. If you do not include this
option, traceroute packets are sent on all interfaces.
as-number-lookup (Optional) Displays the autonomous system (AS) number of each intermediate hop between the
device and the destination host.
bypass-routing (Optional) Bypasses the routing tables and sends the traceroute packets only to hosts on directly
attached interfaces. If the host is not on a directly attached interface, an error message is returned.
Use this option to display a route to a local system through an interface that has no route through
it.
gateway address (Optional) Uses the gateway you specify to route through.
Option Description
no-resolve (Optional) Suppresses the display of the hostnames of the hops along the path.
routing-instance (Optional) Uses the routing instance you specify for the traceroute.
routing-instance-name
source address (Optional) Uses the source address that you specify, in the traceroute packet.
tos number (Optional) Sets the type-of-service (TOS) value in the IP header of the traceroute packet. Specify
a value from 0 through 255.
ttl number (Optional) Sets the time-to-live (TTL) value for the traceroute packet. Specify a hop count from
0 through 128.
wait seconds (Optional) Sets the maximum time to wait for a response.
The fields in the display are the same as those displayed by the J-Web traceroute
diagnostic tool. For information, see “Traceroute Results and Output Summary” on
page 333.
To display real-time monitoring information about each router between the J Series
device and a specified destination host, enter the traceroute monitor command with
the following syntax. Table 148 on page 347 describes the traceroute monitor command
options.
user@host> traceroute monitor host <count number> <inet | inet6> <interval seconds>
<no-resolve> <size bytes><source source-address> <summary>
Option Description
Option Description
count number (Optional) Limits the number of ping requests, in packets, to send in summary mode. If you do
not specify a count, ping requests are continuously sent until you press Q.
interval seconds (Optional) Sets the interval between ping requests, in seconds. The default value is 1 second.
no-resolve (Optional) Suppresses the display of the hostnames of the hops along the path.
size bytes (Optional) Sets the size of the ping request packet. The size can be from 0 through 65468 bytes.
The default packet size is 64 bytes.
source address (Optional) Uses the source address that you specify, in the traceroute packet.
My traceroute [v0.69]
host (0.0.0.0)(tos=0x0 psize=64 bitpattern=0x00)
Wed Mar 14 23:14:11 2007
Keys: Help Display mode Restart statistics Order of fields quit
Packets
Pings
Host Loss% Snt
Last Avg Best Wrst StDev
1. 173.24.232.66 0.0% 5
9.4 8.6 4.8 9.9 2.1
2. 173.24.232.66 0.0% 5
7.9 17.2 7.9 29.4 11.0
3. 173.24.232.66 0.0% 5
9.9 9.3 8.7 9.9 0.5
4. 173.24.232.66 0.0% 5
9.9 9.8 9.5 10.0 0.2
Table 149 on page 348 summarizes the output fields of the display.
Field Description
host Hostname or IP address of the J Series device issuing the traceroute monitor command.
Keys
Field Description
Packets
number Number of the hop (router) along the route to the final destination host.
Loss% Percent of packet loss. The number of ping responses divided by the number of ping
requests, specified as a percentage.
Pings
Snt Number of ping requests sent to the router at this hop.
Last Most recent round-trip time, in milliseconds, to the router at this hop.
StDev Standard deviation of round-trip times, in milliseconds, to the router at this hop.
This section contains the following topics. For more information about mtrace
commands, see the JUNOS System Basics and Services Command Reference.
■ Using the mtrace from-source Command on page 350
■ Using the mtrace monitor Command on page 352
To display information about a multicast path from a source to the J Series device,
enter the mtrace from-source command with the following syntax. Table 150 on page
350 describes the mtrace from-source command options.
Option Description
extra-hops number (Optional) Sets the number of extra hops to trace past nonresponsive routers. Specify
a value from 0 through 255.
group address (Optional) Traces the path for the specified group address. The default value is 0.0.0.0.
interval seconds (Optional) Sets the interval between statistics gathering. The default value is 10.
max-hops number (Optional) Sets the maximum number of hops to trace toward the source. Specify a
value from 0 through 255. The default value is 32.
max-queries number (Optional) Sets the maximum number of query attempts for any hop. Specify a value
from 1 through 32. The default value is 3.
response host (Optional) Sends the response packets to the specified hostname or IP address. By
default, the response packets are sent to the J Series device.
ttl number (Optional) Sets the time-to-live (TTL) value in the IP header of the query packets. Specify
a hop count from 0 through 255. The default value for local queries to the all routers
multicast group is 1. Otherwise, the default value is 127.
wait-time seconds (Optional) Sets the time to wait for a response packet. The default value is 3 seconds.
loop (Optional) Loops indefinitely, displaying rate and loss statistics. To quit the mtrace
command, press Ctrl-C.
Option Description
no-router-alert (Optional) Does not use the router alert IP option in the IP header.
detail (Optional) Displays packet rates and losses if a group address is specified.
Each line of the trace display is usually in the following format (depending on the
options selected and the responses from the routers along the path):
Table 151 on page 351 summarizes the output fields of the display.
NOTE: The packet statistics gathered from Juniper Networks routers and routing
nodes are always displayed as 0.
Field Description
host Hostname, if available, or IP address of the router. If the no-resolve option was entered
in the command, the hostname is not displayed.
Field Description
Round trip time milliseconds ms Total time between the sending of the query packet and the receiving of the response
packet.
total ttl of number required Total number of hops required to reach the source.
Packet Statistics For Traffic From Number of packets lost, number of packets sent, percentage of packets lost, and average
packet rate at each hop.
To monitor and display multicast trace operations, enter the mtrace monitor command:
This example displays only mtrace queries. When the device captures an mtrace
response, the display is similar, but the complete mtrace response is also
displayed—exactly as it is displayed in mtrace from-source command output.
Table 152 on page 352 summarizes the output fields of the display.
Field Description
Field Description
packet from source to destination ■ source—IP address of the source of the query or response.
■ destination—IP address of the destination of the query or response.
When the device adds a record to the file specified by filename, the record is displayed
on the screen. For example, if you have configured a system log file named system-log
(by including the syslog statement at the [edit system] hierarchy level), you can enter
the monitor start system-log command to display the records added to the system
log.
To display a list of files that are being monitored, enter the monitor list command.
To stop the display of records for a specified file, enter the monitor stop filename
command.
Use the CLI monitor interface command to display real-time traffic, error, alarm, and
filter statistics about a physical or logical interface. Enter the command with the
following syntax:
Replace interface-name with the name of a physical or logical interface. If you specify
the traffic option, statistics for all active interfaces are displayed.
The real-time statistics are updated every second. The Current delta and Delta columns
display the amount the statistics counters have changed since the monitor interface
command was entered or since you cleared the delta counters. Table 153 on page
354 and Table 154 on page 354 list the keys you use to control the display using the
interface-name and traffic options. (The keys are not case sensitive.)
Key Action
c Clears (returns to 0) the delta counters in the Current delta column. The
statistics counters are not cleared.
f Freezes the display, halting the update of the statistics and delta counters.
i Displays information about a different interface. You are prompted for the
name of a specific interface.
n Displays information about the next interface. The device scrolls through the
physical and logical interfaces in the same order in which they are displayed
by the show interfaces terse command.
t Thaws the display, resuming the update of the statistics and delta counters.
Key Action
b Displays the statistics in units of bytes and bytes per second (bps).
c Clears (returns to 0) the delta counters in the Delta column. The statistics
counters are not cleared.
d Displays the Delta column instead of the rate column—in bps or packets per
second (pps).
p Displays the statistics in units of packets and packets per second (pps).
r Displays the rate column—in bps and pps—instead of the Delta column.
NOTE: The output fields displayed when you enter the monitor interface interface-name
command are determined by the interface you specify.
Use the CLI monitor traffic command to display packet headers transmitted through
network interfaces.
NOTE: Using the monitor traffic command can degrade system performance. We
recommend that you use filtering options—such as count and matching—to minimize
the impact to packet throughput on the system.
Enter the monitor traffic command with the following syntax. Table 155 on page 355
describes the monitor traffic command options.
To quit the monitor traffic command and return to the command prompt, press Ctrl-C.
If you want to capture and view packet headers using the J-Web interface, see
“Capturing and Viewing Packets with the J-Web Interface” on page 334.
Option Description
count number (Optional) Displays the specified number of packet headers. Specify
a value from 0 through 100,000. The command quits and exits to
the command prompt after this number is reached.
Option Description
interface interface-name (Optional) Displays packet headers for traffic on the specified
interface. If an interface is not specified, the lowest numbered
interface is monitored.
size bytes (Optional) Displays the number of bytes for each packet that you
specify. If a packet header exceeds this size, the displayed packet
header is truncated. The default value is 96.
To limit the packet header information displayed by the monitor traffic command,
include the matching "expression" option. An expression consists of one or more
match conditions listed in Table 156 on page 357, enclosed in quotation marks (" ").
You can combine match conditions by using the logical operators listed in Table 157
on page 358 (shown in order of highest to lowest precedence).
For example, to display TCP or UDP packet headers, enter the following command:
To compare the following types of expressions, use the relational operators listed in
Table 158 on page 359 (listed from highest to lowest precedence):
■ Arithmetic—Expressions that use the arithmetic operators listed in Table 158
on page 359.
■ Binary—Expressions that use the binary operators listed in Table 158 on page
359.
■ Packet data accessor—Expressions that use the following syntax:
Replace protocol with any protocol in Table 156 on page 357. Replace byte-offset
with the byte offset, from the beginning of the packet header, to use for the
comparison. The optional size parameter represents the number of bytes
examined in the packet header—1, 2, or 4 bytes.
Entity Type
host [address | hostname] Matches packet headers that contain the specified address or hostname. You can
preprend any of the following protocol match conditions, followed by a space, to host:
arp, ip, rarp, or any of the Directional match conditions.
network address Matches packet headers with source or destination addresses containing the specified
network address.
network address mask mask Matches packet headers containing the specified network address and subnet mask.
port [port-number | port-name] Matches packet headers containing the specified source or destination TCP or UDP
port number or port name.
Directional Directional match conditions can be prepended to any Entity Type match conditions,
followed by a space.
source and destination Matches packet headers containing the specified source and destination.
source or destination Matches packet headers containing the specified source or destination.
Packet Length
less bytes Matches packets with lengths less than or equal to the specified value, in bytes.
greater bytes Matches packets with lengths greater than or equal to the specified value, in bytes.
Protocol
arp Matches all ARP packets.
ether [broadcast | multicast] Matches broadcast or multicast Ethernet frames. This match condition can be prepended
with source or destination.
ether protocol [address | (\arp | \ip | Matches Ethernet frames with the specified address or protocol type. The arguments
\rarp) arp, ip, and rarp are also independent match conditions, so they must be preceded with
a backslash (\) when used in the ether protocol match condition.
ip protocol [address | (\icmp | igrp | Matches IP packets with the specified address or protocol type. The arguments icmp,
\tcp | \udp)] tcp, and udp are also independent match conditions, so they must be preceded with
a backslash (\) when used in the ip protocol match condition.
! Logical NOT. If the first condition does not match, the next condition is
evaluated.
&& Logical AND. If the first condition matches, the next condition is evaluated.
If the first condition does not match, the next condition is skipped.
|| Logical OR. If the first condition matches, the next condition is skipped. If
the first condition does not match, the next condition is evaluated.
Table 158: CLI monitor traffic Arithmetic, Binary, and Relational Operators
Operator Description
Arithmetic Operator
+ Addition operator.
– Subtraction operator.
/ Division operator.
Binary Operator
& Bitwise AND.
Relational Operator
<= A match occurs if the first expression is less than or equal to the second.
>= A match occurs if the first expression is greater than or equal to the second.
< A match occurs if the first expression is less than the second.
> A match occurs if the first expression is greater than the second.
Packet capture is a tool that helps you to analyze network traffic and troubleshoot
network problems. The packet capture tool captures real-time data packets traveling
over the network, for monitoring and logging.
Packets are captured as binary data, without modification. You can read the packet
information offline with a packet analyzer such as Ethereal or tcpdump.
If you need to quickly capture packets destined for or originating from the Routing
Engine and analyze them online, you can use the J-Web packet capture diagnostic
tool. For more information, see “Capturing and Viewing Packets with the J-Web
Interface” on page 334.
NOTE: The packet capture tool does not support IPv6 packet capture.
You can use either the J-Web configuration editor or CLI configuration editor to
configure packet capture. For more information about packet capture, see the JUNOS
Policy Framework Configuration Guide.
For information about which devices support the features documented in this chapter,
see the JUNOS Software Feature Support Reference for SRX Series and J Series Devices.
Term Definition
interface sampling Packet sampling method used by packet capture, in which entire IPv4 packets flowing in the
input or output direction, or both directions, are captured for analysis.
libpcap An implementation of the pcap application programming interface. libpcap may be used by a
program to capture packets traveling over a network.
packet capture 1. Packet sampling method in which entire IPv4 packets flowing through a router are captured
for analysis. Packets are captured in the Routing Engine and stored as libpcap-formatted
files in the /var/tmp directory on the router. Packet capture files can be opened and analyzed
offline with packet analyzers such as tcpdump or Ethereal. To avoid performance degradation
on the router, implement packet capture with firewall filters that capture only selected
packets. See also traffic sampling.
2. Packet sampling method available from the J-Web interface, for capturing the headers of
packets destined for or originating from the Routing Engine. (See “Capturing and Viewing
Packets with the J-Web Interface” on page 334).
packet loss priority (PLP) Bit used to identify packets that have experienced congestion or are from a transmission that
bit exceeded a service provider's customer service license agreement. This bit can be used as part
of a router's congestion control mechanism and can be set by the interface or by a filter.
port mirroring The process of sending a copy of a packet from the router to an external host address.
For more information about port mirroring, see the JUNOS Policy Framework Configuration Guide.
tcpdump A command line utility for debugging computer network problems. tcpdump allows the user to
display the contents of TCP/IP and other packets captured on a network interface. On UNIX and
most other operating systems, a user must have superuser privileges to use tcpdump due to its
use of promiscuous mode.
traffic sampling Packet sampling method in which the sampling key based on the IPv4 header is sent to the
Routing Engine. There, the key is placed in a file, or cflowd packets based on the key and are
sent to a cflowd server for analysis. See also packet capture.
Packet capture operates like traffic sampling on the device, except that it captures
entire packets including the Layer 2 header rather than packet headers and saves
the contents to a file in the libpcap format. Packet capture also captures IP fragments.
You cannot enable packet capture and traffic sampling on the device at the same
time. Unlike traffic sampling, there are no tracing operations for packet capture.
NOTE: You can enable packet capture and port mirroring simultaneously on a device.
For more information about traffic sampling, see the JUNOS Policy Framework
Configuration Guide.
Packet capture supports PPP, Cisco HDLC, Frame Relay, and other ATM
encapsulations. Packet capture also supports Multilink PPP (MLPPP), Multilink Frame
Relay end-to-end (MLFR), and Multilink Frame Relay UNI/NNI (MFR) encapsulations.
You can capture all IPv4 packets flowing on an interface in the inbound or outbound
direction. However, on traffic that bypasses the flow software module (protocol
packets such as ARP, OSPF, and PIM), packets generated by the routing engine are
not captured unless you have configured and applied a firewall filter on the interface
in the output direction.
Tunnel interfaces can support packet capture in the outbound direction only.
Use the J-Web configuration editor or CLI configuration editor to specify maximum
packet size, the filename to be used for storing the captured packets, maximum file
size, maximum number of packet capture files, and the file permissions. See
“Configuring Packet Capture on an Interface (Required)” on page 367.
NOTE: For packets captured on T1, T3, E1, E3, serial, and ISDN interfaces in the
outbound (egress) direction, the size of the packet captured might be 1 byte less than
the maximum packet size configured because of the packet loss priority (PLP) bit.
You must also configure and apply appropriate firewall filters on the interface if you
need to capture packets generated by the host router, because interface sampling
does not capture packets originating from the host router.
To configure firewall filters for packet capture, see “Configuring a Firewall Filter for
Packet Capture (Optional)” on page 368.
For more information about firewall filters, see the JUNOS Software Interfaces and
Routing Configuration Guide.
File creation and storage take place in the following way. Suppose you name the
packet capture file pcap-file. Packet capture creates multiple files (one per physical
interface), suffixing each file with the name of the physical interface—for example,
pcap-file.fe–0.0.1 for the Fast Ethernet interface fe–0.0.1. When the file named
pcap-file.fe-0.0.1 reaches the maximum size, the file is renamed pcap-file.fe-0.0.1.0.
When the file named pcap-file.fe-0.0.1 reaches the maximum size again, the file
named pcap-file.fe-0.0.1.0 is renamed pcap-file.fe-0.0.1.1 and pcap-file.fe-0.0.1 is
renamed pcap-file.fe-0.0.1.0. This process continues until the maximum number of
files is exceeded and the oldest file is overwritten. The pcap-file.fe-0.0.1 file is always
the latest file.
Packet capture files are not removed even after you disable packet capture on an
interface.
Packet capture files can be opened and analyzed offline with tcpdump or any packet
analyzer that recognizes the libpcap format. You can also use FTP or the Session
Control Protocol (SCP) to transfer the packet capture files to an external device.
NOTE: Disable packet capture before opening the file for analysis or transferring the
file to an external device with FTP or SCP. Disabling packet capture ensures that the
internal file buffer is flushed and all the captured packets are written to the file. To
disable packet capture on an interface, see “Disabling Packet Capture” on page 369.
For more details about analyzing packet capture files, see “Verifying Captured Packets”
on page 372.
■ If you do not already have an understanding of the packet capture feature, see
“Packet Capture Overview” on page 362.
Navigate to the Forwarding options 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
level in the configuration hierarchy. Tools>Point and Click CLI.
edit forwarding-options
2. Next to Forwarding options, click
Configure or Edit.
3. Next to Scripts, click Configure or
Edit.
4. Next to Commits, click Configure or
Edit.
Specify in bytes the maximum size 1. From the Sampling or packet capture Enter
of each packet to capture in each list, select Packet capture.
file—for example, 500. The range is set packet-capture maximum-capture-size
between 68 and 1500, and the 2. Next to Packet capture, click
500
Configure.
default is 68 bytes.
3. In the Maximum capture size box,
type 500.
Specify the target filename for the In the Filename box, type pcap-file. Enter
packet capture file—for example,
pcap-file. For each physical interface, set packet-capture file filename pcap-file
the interface name is automatically
suffixed to the filename—for
example, pcap-file.fe-0.0.1.
Specify the maximum number of files In the Files box, type 100. Enter
to capture—for example, 100. The
range is between 2 and 10,000, and set packet-capture file files 100
the default is 10 files.
Specify the maximum size of each In the Size box, type 1024. Enter
file in bytes—for example, 1024. The
range is between 1,024 and set packet-capture file size 1024
104,857,600, and the default is
512,000 bytes.
Specify if all users have permission 1. Next to World readable, select Yes. Enter
to read the packet capture files.
2. Click OK.
set packet-capture file world-readable
Navigate to the Interfaces level in the 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
configuration hierarchy, and select Tools>Point and Click CLI.
an interface for packet capture—for edit interfaces fe-0/0/1
example, fe-0/0/1. 2. Next to Interfaces, click Configure or
Edit.
(See the interface naming 3. In the Interface name box, click
conventions in the JUNOS Software fe-0/0/1.
Interfaces and Routing Configuration
Guide.)
Configure the direction of the traffic 1. In the Interface unit number box, Enter
for which you are enabling packet click 0.
capture on the logical interface—for set unit 0 family inet sampling input output
example, inbound and outbound. 2. Next to Inet, select Yes, and click
Edit.
3. Next to Sampling, click Configure.
4. Next to Input, select Yes.
5. Next to Output, select Yes.
6. Click OK until you return to the
Interface page.
NOTE: On traffic that bypasses the flow software module (protocol packets such as
ARP, OSPF, and PIM), packets generated by the routing engine are not captured
unless you have configured and applied a firewall filter on the interface in the output
direction.
Navigate to the Firewall level in the 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
configuration hierarchy. Tools>Point and Click CLI.
edit firewall
2. Next to Firewall, click Configure or
Edit.
Define a firewall filter dest-all and a 1. Next to Filter, click Add new entry. Set the filter and term name, and define
filter term—for example, the match condition and its action.
dest-term—to capture packets with a
2. In the filter name box, type dest-all.
particular destination address—for 3. Next to Term, click Add new entry. set firewall filter dest-all term dest-term from
example, 192.168.1.1/32. destination-address 192.168.1.1/32
4. In the Rule name box, type dest-term.
5. Next to From, click Configure. set firewall filter dest-all term dest-term then
sample accept
6. Next to Destination address, click
Add new entry.
7. In the Address box, type
192.168.1.1/32.
NOTE: If you apply a firewall filter on the loopback interface, it affects all traffic to
and from the Routing Engine. If the firewall filter has a sample action, packets to and
from the Routing Engine are sampled. If packet capture is enabled, then packets to
and from the Routing Engine are captured in the files created for the input and output
interfaces.
Navigate to the Forwarding options 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
level in the configuration hierarchy. Tools>Point and Click CLI.
edit forwarding-options
2. Next to Forwarding options, click
Configure or Edit.
Disable packet capture. 1. Next to Packet capture, click Edit. Enter set packet-capture disable.
2. Next to Disable, select Yes.
3. Click OK until you return to the
Configuration page.
% cd /var/tmp
%
c. Delete the packet capture file for the interface—for example, pcap-file.fe.0.0.0:
% rm pcap-file.fe.0.0.0
%
% exit
user@host>
After modifying the encapsulation, you can safely reenable packet capture on the
router.
% cd /var/tmp
%
c. Rename the latest packet capture file for the interface on which you are
changing the encapsulation—for example, fe.0.0.0:
% mv pcap-file.fe.0.0.0 pcap-file.fe.0.0.0.chdsl
%
% exit
user@host>
4. Change the encapsulation on the interface using the J-Web or CLI configuration
editor.
See instructions for configuring interfaces in the JUNOS Software Interfaces and
Routing Configuration Guide
5. Commit the configuration.
6. Reenable packet capture following the steps in “Enabling Packet Capture
(Required)” on page 365.
7. Commit the configuration.
Action From the J-Web interface, select CLI Tools>CLI Viewer. Alternatively, from
configuration mode in the CLI, enter the show forwarding-options command.
[edit]
user@host# show forwarding-options
packet-capture {
file filename pcap-file files 100 size 1024;
maximum-capture-size 500;
}
Meaning Verify that the output shows the intended file configuration for capturing packets.
Related Topics For more information about the format of a configuration file, see the information
about viewing configuration text in the J-Web Interface User Guide or the JUNOS CLI
User Guide.
Action From the J-Web interface, select CLI Tools>CLI Viewer. Alternatively, from
configuration mode in the CLI, enter the show firewall filter dest-all command.
[edit]
user@host# show firewall filter dest-all
term dest-term {
from {
destination-address 192.168.1.1/32;
}
then {
sample;
accept;
}
}
Meaning Verify that the output shows the intended configuration of the firewall filter for
capturing packets sent to the destination address 192.168.1.1/32.
Related Topics For more information about the format of a configuration file, see the information
about viewing configuration text in the JUNOS CLI User Guide.
2. Navigate to the directory where packet capture files are stored on the device:
3. Copy the packet capture file that you want to analyze—for example,
126b.fe-0.0.1, to the server:
ftp> bye
221 Goodbye.
[edit]
user@host#
■ Open the packet capture file on the server with tcpdump or any packet analyzer
that supports libpcap format.
The real-time performance monitoring (RPM) feature allows network operators and
their customers to accurately measure the performance between two network
endpoints. With the RPM tool, you configure and send probes to a specified target
and monitor the analyzed results to determine packet loss, round-trip time, and jitter.
For more information about RPM, see the JUNOS Services Interfaces Configuration
Guide.
For information about which devices support the features documented in this chapter,
see the JUNOS Software Feature Support Reference for SRX Series and J Series Devices.
RPM Terms
Before configuring and monitoring RPM, become familiar with the terms defined in
Table 164 on page 375.
Term Definition
jitter Difference in relative transmit time between two consecutive packets in a stream, which can
cause quality degradation in some real-time applications such as voice over IP (VoIP) and video.
Term Definition
probe An action taken or an object used to learn something about the state of the network. Real-time
performance monitoring (RPM) uses several types of requests to probe a network.
real-time performance Monitoring tool that measures the performance of a network between two endpoints by collecting
monitoring (RPM) statistics on packet loss, round-trip time, and jitter.
RPM target Remote network endpoint, identified by an IP address or URL, to which the device sends a
real-time performance monitoring (RPM) probe.
RPM test A collection of real-time performance monitoring (RPM) probes sent out at regular intervals.
RPM Overview
Real-time performance monitoring (RPM) allows you to perform service-level
monitoring. When RPM is configured on a device, the device calculates network
performance based on packet response time, jitter, and packet loss. These values
are gathered by Hypertext Transfer Protocol (HTTP) GET requests, Internet Control
Message Protocol (ICMP) requests, and TCP and UDP requests, depending on the
configuration.
RPM Probes
You gather RPM statistics by sending out probes to a specified probe target, identified
by an IP address or URL. When the target receives the probe, it generates responses,
which are received by the device. By analyzing the transit times to and from the
remote server, the device can determine network performance statistics.
UDP and TCP probe types require that the remote server be configured as an RPM
receiver so that it generates responses to the probes.
The RPM probe results are also available in the form of MIB objects through the SNMP
protocol. To configure SNMP, see “Configuring SNMP for Network Management” on
page 65.
RPM Tests
Each probed target is monitored over the course of a test. A test represents a collection
of probes, sent out at regular intervals, as defined in the configuration. Statistics are
then returned for each test. Because a test is a collection of probes that have been
monitored over some amount of time, test statistics such as standard deviation and
jitter can be calculated and included with the average probe statistics.
After all the probes for a particular test have been sent, the test begins again. The
time between tests is the test interval. You can manually set the test interval to tune
RPM performance.
You can timestamp the following RPM probes to improve the measurement of latency
or jitter:
■ ICMP ping
■ ICMP ping timestamp
■ UDP ping
■ UDP ping timestamp
NOTE: The device supports hardware timestamping of UDP ping and UDP ping
timestamp RPM probes only if the destination port is UDP-ECHO (port 7).
Timestamping takes place during the forwarding process of the device originating
the probe (the RPM client), but not on the remote device that is the target of the
probe (the RPM server).
RPM probe generation with hardware timestamp can be retrieved through the SNMP
protocol. To configure SNMP, see “Configuring SNMP for Network Management” on
page 65.
RPM Statistics
At the end of each test, the device collects the statistics for packet round-trip time,
packet inbound and outbound times (for ICMP timestamp probes only), and probe
loss shown in Table 165 on page 378.
Round-Trip Times
Minimum round-trip time Shortest round-trip time from the J Series or SRX Series device to the remote server,
as measured over the course of the test
Maximum round-trip time Longest round-trip time from the J Series or SRX Series device to the remote server,
as measured over the course of the test
Average round-trip time Average round-trip time from the J Series or SRX Series device to the remote server,
as measured over the course of the test
Standard deviation round-trip time Standard deviation of the round-trip times from the J Series or SRX Series device
to the remote server, as measured over the course of the test
Jitter Difference between the maximum and minimum round-trip times, as measured
over the course of the test
Maximum ingress time Shortest one-way time from the remote server to the J Series or SRX Series device,
as measured over the course of the test
Average egress time Average one-way time from the J Series or SRX Series device to the remote server,
as measured over the course of the test
Average ingress time Average one-way time from the remote server to the J Series or SRX Series device,
as measured over the course of the test
Standard deviation egress time Standard deviation of the one-way times from the J Series or SRX Series device to
the remote server, as measured over the course of the test
Standard deviation ingress time Standard deviation of the one-way times from the remote server to the J Series or
SRX Series device, as measured over the course of the test
Egress jitter Difference between the maximum and minimum outbound times, as measured
over the course of the test
Ingress jitter Difference between the maximum and minimum inbound times, as measured
over the course of the test
Probe Counts
Probes sent Total number of probes sent over the course of the test
Probe responses received Total number of probe responses received over the course of the test
Loss percentage Percentage of probes sent for which a response was not received
If the result of a probe or test exceeds any threshold, the device generates a system
log message and sends any Simple Network Management Protocol (SNMP)
notifications (traps) that you have configured.
In the device, you can configure RPM probes to monitor the BGP neighbors and
determine if they are active.
For BGP configuration information, see the JUNOS Software Interfaces and Routing
Configuration Guide.
■ Configure network interfaces. See the JUNOS Software Interfaces and Routing
Configuration Guide.
■ Configure SNMP. See “Configuring SNMP for Network Management” on page
65.
■ To cancel your entries and return to the Quick Configuration RPM page, click
Cancel.
Identification
Test name (required) Uniquely identifies the RPM test Type the name of the RPM test.
Target (Address or IP address or URL of probe target Type the IP address, in dotted decimal
URL) (required) notation, or the URL of the probe target. If the
target is a URL, type a fully formed URL that
includes http://.
Source Address Explicitly configured IP address to be used as the Type the source address to be used for the
probe source address probe. If the source IP address is not one of
the device's assigned addresses, the packet
uses the outgoing interface's address as its
source.
Routing Instance Particular routing instance over which the probe is Type the routing instance name. The routing
sent instance applies only to probes of type icmp
and icmp-timestamp. The default routing
instance is inet.0.
History Size Number of probe results saved in the probe history Type a number between 0 and 255. The
default history size is 50 probes.
Request Information
Probe Type Specifies the type of probe to send as part of the test. Select the desired probe type from the list:
(required)
■ http-get
■ http-get-metadata
■ icmp-ping
■ icmp-ping-timestamp
■ tcp-ping
■ udp-ping
Interval Sets the wait time (in seconds) between each probe Type a number between 1 and 255 (seconds).
transmission
Test Interval Sets the wait time (in seconds) between tests. Type a number between 0 and 86400
(required) (seconds).
Probe Count Sets the total number of probes to be sent for each Type a number between 1 and 15.
test.
Destination Port Specifies the TCP or UDP port to which probes are Type the number 7—a standard TCP or UDP
sent. port number—or a port number from 49152
through 65535.
To use TCP or UDP probes, you must configure the
remote server as a probe receiver. Both the probe
server and the remote server must be Juniper
Networks devices configured to receive and transmit
RPM probes on the same TCP or UDP port.
DSCP Bits Specifies the Differentiated Services code point (DSCP) Type a valid 6–bit pattern.
bits. This value must be a valid 6–bit pattern. The
default is 000000.
Data Size Specifies the size of the data portion of the ICMP Type a size (in bytes) between 0 and 65507.
probes.
Data Fill Specifies the contents of the data portion of the ICMP Type a hexadecimal value between 1 and
probes. 800h to use as the contents of the ICMP probe
data.
Hardware Timestamp Enables timestamping of RPM probe messages. You To enable timestamping, select the check box.
can timestamp the following RPM probes to improve
the measurement of latency or jitter:
■ ICMP ping
■ ICMP ping timestamp
■ UDP ping—destination port UDP-ECHO (port 7)
only
■ UDP ping timestamp—destination port
UDP-ECHO (port 7) only
Lost Probes Sets the total number of probes that must be lost to Type a number between 0 and 15.
trigger a probe failure and generate a system log
message.
Round Trip Time Sets the total round-trip time (in microseconds), from Type a number between 0 and 60,000,000
the device to the remote server, that triggers a probe (microseconds).
failure and generates a system log message.
Jitter Sets the total jitter (in microseconds), for a test, that Type a number between 0 and 60,000,000
triggers a probe failure and generates a system log (microseconds).
message.
Standard Deviation Sets the maximum allowable standard deviation (in Type a number between 0 and 60,000,000
microseconds) for a test, which, if exceeded, triggers (microseconds).
a probe failure and generates a system log message.
Egress Time Sets the total one-way time (in microseconds), from Type a number between 0 and 60,000,000
the device to the remote server, that triggers a probe (microseconds).
failure and generates a system log message.
Ingress Time Sets the total one-way time (in microseconds), from Type a number between 0 and 60,000,000
the remote server to the device, that triggers a probe (microseconds)
failure and generates a system log message.
Jitter Egress Time Sets the total outbound-time jitter (in microseconds), Type a number between 0 and 60,000,000
for a test, that triggers a probe failure and generates (microseconds)
a system log message.
Jitter Ingress Time Sets the total inbound-time jitter (in microseconds), Type a number between 0 and 60,000,000
for a test, that triggers a probe failure and generates (microseconds).
a system log message.
Egress Standard Sets the maximum allowable standard deviation of Type a number between 0 and 60,000,000
Deviation outbound times (in microseconds) for a test, which, (microseconds).
if exceeded, triggers a probe failure and generates a
system log message.
Ingress Standard Sets the maximum allowable standard deviation of Type a number between 0 and 60,000,000
Deviation inbound times (in microseconds) for a test, which, if (microseconds).
exceeded, triggers a probe failure and generates a
system log message.
Traps
Egress Jitter Generates SNMP traps when the threshold for jitter ■ To enable SNMP traps for this condition,
Exceeded in outbound time is exceeded. select the check box.
■ To disable SNMP traps, clear the check
box.
Egress Standard Generates SNMP traps when the threshold for ■ To enable SNMP traps for this condition,
Deviation Exceeded standard deviation in outbound times is exceeded. select the check box.
■ To disable SNMP traps, clear the check
box.
Egress Time Generates SNMP traps when the threshold for ■ To enable SNMP traps for this condition,
Exceeded maximum outbound time is exceeded. select the check box.
■ To disable SNMP traps, clear the check
box.
Ingress Jitter Generates SNMP traps when the threshold for jitter ■ To enable SNMP traps for this condition,
Exceeded in inbound time is exceeded. select the check box.
■ To disable SNMP traps, clear the check
box.
Ingress Standard Generates SNMP traps when the threshold for ■ To enable SNMP traps for this condition,
Deviation Exceeded standard deviation in inbound times is exceeded. select the check box.
■ To disable SNMP traps, clear the check
box.
Ingress Time Generates traps when the threshold for maximum ■ To enable SNMP traps for this condition,
Exceeded inbound time is exceeded. select the check box.
■ To disable SNMP traps, clear the check
box.
Jitter Exceeded Generates traps when the threshold for jitter in ■ To enable SNMP traps for this condition,
round-trip time is exceeded. select the check box.
■ To disable SNMP traps, clear the check
box.
Probe Failure Generates traps when the threshold for the number ■ To enable SNMP traps for this condition,
of successive lost probes is reached. select the check box.
■ To disable SNMP traps, clear the check
box.
RTT Exceeded Generates traps when the threshold for maximum ■ To enable SNMP traps for this condition,
round-trip time is exceeded. select the check box.
■ To disable SNMP traps, clear the check
box.
Standard Deviation Generates traps when the threshold for standard ■ To enable SNMP traps for this condition,
Exceeded deviation in round-trip times is exceeded. select the check box.
■ To disable SNMP traps, clear the check
box.
Test Completion Generates traps when a test is completed. ■ To enable SNMP traps for this condition,
select the check box.
■ To disable SNMP traps, clear the check
box.
Test Failure Generates traps when the threshold for the total ■ To enable SNMP traps for this condition,
number of lost probes is reached. select the check box.
■ To disable SNMP traps, clear the check
box.
UDP Probe Server Specifies the port on which the device is to receive Type the number 7—a standard TCP or UDP
and transmit UDP probes. port number—or a port number from 49160
through 65535.
For ICMP ping, ICMP ping timestamp, UDP ping, and UDP ping timestamp probes,
you can also set a timestamp to improve the measurement of latency or jitter. The
probe is timestamped by the device originating the probe (the RPM client).
In this sample use of RPM, basic probes are configured for two customers: Customer A
and Customer B. The probe for Customer A uses ICMP timestamp packets and sets
RPM thresholds and corresponding SNMP traps to catch lengthy inbound times. The
probe for Customer B uses HTTP packets and sets thresholds and corresponding
SNMP traps to catch excessive lost probes. To configure these RPM probes:
1. Navigate to the top of the configuration hierarchy in either the J-Web or CLI
configuration editor.
2. Perform the configuration tasks described in Table 167 on page 387.
3. If you are finished configuring the network, commit the configuration.
4. Go on to one of the following procedures:
■ To configure a TCP or UDP probe, see “Configuring TCP and UDP Probes”
on page 389.
■ To tune a probe, see “Tuning RPM Probes” on page 391.
Navigate to the Services>RPM level in 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
the configuration hierarchy. Tools>Point and Click CLI.
edit services rpm
2. Next to Services, click Configure
or Edit.
3. Next to Rpm, select the Yes check
box.
4. Click Configure.
Configure the RPM owners customerA 1. In the Probe box, click Add new 1. Enter
and customerB. entry.
set probe customerA
2. In the Owner box, type customerA.
2. Enter
3. Click OK.
4. Repeat the previous steps and add set probe customerB
an RPM probe owner for
customerB.
Configure the RPM test icmp-test for the 1. On the Rpm page, select 1. From the [edit] hierarchy level, enter
RPM owner customerA. customerA.
edit services rpm probe customerA
2. In the Test box, click Add new
The sample RPM test is an ICMP probe
entry 2. Enter
with a test interval (probe frequency) of
15 seconds, a probe type of 3. In the Name box, type icmp-test.
icmp-ping-timestamp, a probe timestamp, set test icmp-test probe-frequency 15
and a target address of 192.178.16.5. 4. In the Test interval box, type 15.
3. Enter
5. In the Probe type box, select
icmp-ping-timestamp. set test icmp-test probe-type
icmp-ping-timestamp
6. Select the Hardware timestamp
check box. 4. Enter
7. In the Target box, select the Yes
check box, and click Configure. set test icmp-test
hardware-timestamp
8. In the Target type box, select
Address. 5. Enter
Configure the RPM test http-test for the 1. On the Rpm page, select 1. From the [edit] hierarchy level, enter
RPM owner customerB. customerB.
edit services rpm probe customerB
2. In the Test box, click Add new
The sample RPM test is an HTTP probe
entry. 2. Enter
with a test interval (probe frequency) of
30 seconds, a probe type of http-get, and 3. In the Name box, type http-test.
a target URL of http://customerB.net. set test http-test probe-frequency 30
4. In the Test interval box, type 30.
3. Enter
5. In the Probe type box, select
http-get. set test http-test probe-type http-get
6. In the Target box, select the Yes 4. Enter
check box, and click Configure.
7. In the Target type box, select Url. set test http-test target url
http://customerB.net
8. In the Url box, type
http://customerB.net.
9. Click OK.
Configure RPM thresholds and 1. On the Probe page, select http-test. 1. Enter
corresponding SNMP traps to catch 3 or
more successive lost probes and total 2. In the Thresholds box, select the
set probe customerB test icmp-test
lost probes of 10 or more. Yes check box, and click
thresholds successive-loss 3
Configure.
3. In the Successive loss box, type 3.
2. Enter
4. In the Total loss box, type 10. set probe customerB test icmp-test
thresholds total-loss 10
5. Click OK.
3. Enter
6. In the Traps box, click Add new
entry.
set probe customerB test icmp-test
7. In the Value box, select traps probe-failure
probe-failure.
4. Enter
8. Click OK.
set probe customerB test icmp-test
9. In the Traps box, click Add new
traps test-failure
entry.
10. In the Value box, select test-failure.
11. Click OK.
If you are using class of service (CoS) and want to classify probes, you must also set
a destination interface. The destination interface is the output interface for sending
packets to the forwarding plane. Classified packets are sent to the output queue on
the output interface specified by the CoS scheduler map configured on the interface.
For information about CoS, see the JUNOS Software Interfaces and Routing Configuration
Guide.
The destination interface must support looping of probe packets to an input interface
without adding any encapsulation. The device's destination interface must be an lt
services interface.
In this sample use of RPM, a probe is configured for one customer: Customer C. The
probe for Customer C uses TCP packets. The remote device is configured as an RPM
server for both TCP and UDP packets, using an lt services interface as the destination
interface, and ports 50000 and 50037, respectively. Router A is the host device in
this example, and Router B is the remote device. To configure this RPM probe:
1. Navigate to the top of the configuration hierarchy in either the J-Web or CLI
configuration editor.
2. Perform the configuration tasks described in Table 168 on page 390.
3. If you are finished configuring the network, commit the configuration.
4. Go on to one of the following procedures:
■ To tune a probe, see “Tuning RPM Probes” on page 391.
■ To check the configuration, see “Verifying an RPM Configuration” on page
396.
Router A Configuration
Navigate to the Services>RPM level in 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
the configuration hierarchy. Tools>Point and Click CLI.
edit services rpm
2. Next to Services, click Configure
or Edit.
3. Next to Rpm, select the Yes check
box.
4. Click Configure.
Configure the RPM owner customerC. 1. In the Probe box, click Add new Enter
entry.
set probe customerC
2. In the Owner box, type customerC.
3. Click OK.
Configure the RPM test tcp-test for the 1. On the Rpm page, select 1. From the [edit] hierarchy level, enter
RPM owner customerC. customerC.
edit services rpm probe customerC
2. In the Test box, click Add new
The sample RPM test is a TCP probe
entry. 2. Enter
with a test interval (probe frequency) of
5, a probe type of tcp-ping, and a target 3. In the Name box, type tcp-test.
address of 192.162.45.6. set test tcp-test probe-frequency 5
4. In the Test interval box, type 5.
3. Enter
5. In the Probe type box, select
tcp-ping. set test tcp-test probe-type tcp-ping
6. In the Target box, select the Yes 4. Enter
check box, and click Configure.
7. In the Target type box, select set test tcp-test target address
Address. 192.162.45.6
9. Click OK.
Configure the destination interface. In the Destination interface box, type Enter
lt-0/0/0
NOTE: On J Series devices, the set test tcp-test destination-interface
destination interface must be an lt lt-0/0/0
services interface.
Configure port 50000 as the TCP port to In the Destination port box, type 50000. Enter
which the RPM probes are sent.
set test tcp-test destination-port 50000
Router B Configuration
Navigate to the Services>RPM level in 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
the configuration hierarchy. Tools>Point and Click CLI.
edit services rpm
2. Next to Services, click Configure
or Edit.
3. Next to Rpm, select the Yes check
box.
4. Click Configure.
Configure Router B to act as a UDP 1. Next to Probe server, click Edit. Enter
server, using port 50037 to send and
receive UDP probes. 2. In the Udp box, click Configure.
set probe-server udp port 50037
3. In the Port box, type 50037.
4. Click OK.
Navigate to the Services>RPM level in 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
the configuration hierarchy. Tools>Point and Click CLI.
edit services rpm
2. Next to Services, click Configure
or Edit.
3. Next to Rpm, select the Yes check
box.
4. Click Edit.
Set the maximum number of concurrent 1. In the Probe limit box, type 10. Enter
probes allowed on the system to 10.
2. Click OK.
set probe-limit 10
Access the ICMP probe of customer A. 1. In the Owner box, click From the [edit] hierarchy level, enter
CustomerA.
edit services rpm probe customerA test
2. In the Name box, click icmp-test.
icmp-test
Set the time between probe In the Probe interval box, type 15. Enter
transmissions to 15 seconds.
set probe-interval 15
Set the number of probes within a test In the Probe count box, type 10. Enter
to 10.
set probe-count 10
Set the source address for each probe 1. In the Source address box, type Enter
packet to 192.168.2.9. 192.168.2.9.
set source-address 192.168.2.9
2. Click OK.
If you do not explicitly configure a
source address, the address on the
outgoing interface through which the
probe is sent is used as the source
address.
You can also direct the probes to a particular group of BGP neighbors.
This sample use of RPM for BGP monitoring uses a TCP probe. To use TCP or UDP
probes, you must configure both the probe server (J Series or SRX Series device) and
the probe receiver (the remote device) to transmit and receive RPM probes on the
same TCP or UDP port. The sample probe uses TCP port 50000.
Navigate to the Services>RPM>BGP 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
level in the configuration hierarchy. Tools>Point and Click CLI.
edit services rpm bgp
2. Next to Services, click Configure
or Edit.
3. Next to Rpm, select the Yes check
box and click Configure or Edit.
4. Next to Bgp, click Configure.
Specify a hexadecimal value (the range In the Data fill box, type ABCD123. Enter
is between 1 and 2048 characters) that
you want to use for the data portion of set data-fill ABCD123
the RPM probe—for example, ABCD123.
Specify the data size of the RPM probe In the Data size box, type 1024. Enter
in bytes, a value from 0 through
65507—for example, 1024. set data-size 1024
Configure port 50000 as the TCP port to In the Destination port box, type 50000. Enter
which the RPM probes are sent.
set destination-port 50000
Specify the number of probe results to In the History size box, type 25. Enter
be saved in the probe history—for
example, 25. The range is between 0 set history-size 25
and 255, and the default is 50.
Configure the probe count—for example, 1. In the Probe count box, type 5. Enter
5—and probe interval—for example, 1.
2. In the Probe interval box, type 1.
set probe-count 5 probe-interval 1
■ Probe count—Total number of RPM
probes to be sent for each test. The
range is between 1 and 15 and the
default is 1.
■ Probe interval—Wait time (in
seconds) between RPM probes. The
range is between 1 and 255, and
the default is 3.
Specify the type of probe to be sent as In the Probe type box, select tcp-ping. Enter
part of the test—tcp-ping.
set probe-type tcp-ping
NOTE: If you do not specify the probe
type the default ICMP probes are sent.
Configure a value between 0 and 86400 1. In the Test interval box, type 60. Enter
seconds for the interval between
tests—for example, 60. 2. Click OK.
set test-interval 60
If a device has a large number of BGP neighbors configured, you can direct (filter)
the RPM probes to a selected group of BGP neighbors rather than to all the neighbors.
To identify the BGP routers to receive RPM probes, you can configure routing
instances.
The sample RPM configuration in Table 171 on page 395 sends RPM probes to the
BGP neighbors in routing instance R1.
Navigate to the Services>RPM>BGP 1. In the J-Web interface, select CLI From the [edit] hierarchy level, enter
level in the configuration hierarchy. Tools>Point and Click CLI.
edit services rpm bgp
2. Next to Services, click Configure
or Edit.
3. Next to Rpm, select the Yes check
box and click Configure or Edit.
4. Next to Bgp, click Configure or
Edit.
Configure routing instance RI1 to send 1. Next to Routing instances, click Enter
RPM probes to BGP neighbors within the Add new entry.
routing instance. set routing-instances RI1
2. In the Routing instance name box,
type RI1.
3. Click OK.
The following example shows how to enable timestamping for customerA. The test
for customerA is identified as customerA-test.
To configure timestamping:
1. Specify the RPM probe owner for which you want to enable timestamping:
3. Enable timestamping:
RPM ICMP and UDP probe with VPN routing and forwarding (VRF) has been improved.
In previous releases, the RPM probes specified to a VRF table were not handled by
the real-time forwarding process (FWDD-RT). In JUNOS Release 10.0, RPM probes
specified to a VRF table are handled by the FWDD-RT, thereby providing more
accurate results.
This feature supports RPM ICMP and UDP probes configured with routing instances
of type VRF.
Action From configuration mode in the CLI, enter the show services rpm command.
Sample Output user@host# show services rpm
probe test {
test customerA {
probe-type icmp-ping;
target address 192.178.16.5;
probe-count 15;
probe-interval 1;
hardware-timestamp;
}
test customerB {
probe-type icmp-ping-timestamp;
target address 192.178.16.5;
probe-count 15;
probe-interval 1;
hardware-timestamp;
}
test customerC {
probe-type udp-ping;
target address 192.178.16.5;
probe-count 15;
probe-interval 1;
destination-port 50000;
hardware-timestamp;
}
}
Meaning The output shows the values that are configured for RPM on the device.
Action From the J-Web interface, select Troubleshoot>RPM>View RPM. From the CLI,
enter the show services rpm probe-results command.
Sample Output user@host> show services rpm probe-results
Owner: customerA, Test: icmp-test
Probe type: icmp-ping-timestamp
Minimum Rtt: 312 usec, Maximum Rtt: 385 usec, Average Rtt: 331 usec,
Jitter Rtt: 73 usec, Stddev Rtt: 27 usec
Minimum egress time: 0 usec, Maximum egress time: 0 usec,
Average egress time: 0 usec, Jitter egress time: 0 usec,
Stddev egress time: 0 usec
Minimum ingress time: 0 usec, Maximum ingress time: 0 usec,
Average ingress time: 0 usec, Jitter ingress time: 0 usec,
Stddev ingress time: 0 usec
Probes sent: 5, Probes received: 5, Loss percentage: 0
Meaning The output shows the probe results for the RPM tests configured on the device. Verify
the following information:
■ Each configured test is displayed. Results are displayed in alphabetical order,
sorted first by owner name and then by test name.
■ The round-trip times fall within the expected values for the particular test. The
minimum round-trip time is displayed as Minimum Rtt, the maximum round-trip
time is displayed as Maximum Rtt, and the average round-trip time is displayed
as Average Rtt.
A high average round-trip time might mean that performances problems exist
within the network. A high maximum round-trip time might result in high jitter
values.
■ The egress (outbound) trip times fall within the expected values for the particular
test. The minimum outbound time is displayed as Minimum egress time, the
maximum outbound time is displayed as Maximum egress time, and the average
outbound time is displayed as Average egress time.
■ The ingress (inbound) trip times fall within the expected values for the particular
test. The minimum inbound time is displayed as Minimum ingress time, the
maximum inbound time is displayed as Maximum ingress time, and the average
inbound time is displayed as Average ingress time.
■ The number of probes sent and received is expected.
Lost probes might indicate packet loss through the network. Packet losses can
occur if the remote server is flapping. If the RPM probe type is TCP or UDP,
complete probe loss might indicate a mismatch in TCP or UDP RPM port number.
■ For Type, each peer is configured as the correct type (either internal or external).
Related Topics For a complete description of show services rpm probe-results output, see the JUNOS
System Basics and Services Command Reference.
Action From the CLI, enter the show services rpm active-servers command.
Sample Output user@host> show services rpm active-servers
Protocol: TCP, Port: 50000
Meaning The output shows a list of the protocols and corresponding ports for which the device
is configured as an RPM server.
Related Topics For a complete description of show services rpm active-servers output, see the JUNOS
System Basics and Services Command Reference.
In addition to the RPM statistics for each RPM test, the J-Web interface displays the
round-trip times and cumulative jitter graphically. Figure 28 on page 399 shows sample
graphs for an RPM test.
In Figure 28 on page 399, the round-trip time and jitter values are plotted as a function
of the system time. Large spikes in round-trip time or jitter indicate a slower outbound
(egress) or inbound (ingress) time for the probe sent at that particular time.
Table 172 on page 400 summarizes key output fields in RPM displays.
Probe Type Type of RPM probe configured for the specified test.
Following are valid probe types:
■ http-get
■ http-get-metadata
■ icmp-ping
■ icmp-ping-timestamp
■ tcp-ping
■ udp-ping
Source Explicitly configured source address that is included If no source address is configured, the RPM probe
Address in the probe packet headers. packets use the outgoing interface as the source address,
and the Source Address field is empty.
Probes Sent Total number of probes sent over the course of the
test.
Earliest System time when the first probe in the sample was
Sample received.
Latest System time when the last probe in the sample was
Sample received.
Earliest System time when the first probe in the sample was
Sample received.
Latest System time when the last probe in the sample was
Sample received.
Index ■ 403
JUNOS Software Administration Guide
404 ■ Index
Index
AES encryption
for Canada and U.S JUNOS.................................309
Symbols setting.................................................................310
#, comments in configuration statements..................xxv agents, SNMP See SNMP agents
#, configuration mode command prompt....................10 alarm class See alarm severity
( ), in syntax descriptions...........................................xxv ALARM LED, color......................................................220
.gz.jc file extension See file encryption alarm severity
/cf/var/crash directory See crash files configuring for an interface.................................225
/cf/var/log directory See system logs major (red) .........................................................221
/cf/var/tmp directory See temporary files See also major alarms
/config directory minor (yellow)....................................................221
file encryption See file encryption See also minor alarms
snapshots for boot directories (CLI).....................247 alarms
snapshots for boot directories (J-Web)................246 active, displaying at login....................................226
/var/db/config directory See file encryption conditions, on an interface.................................222
/var/db/scripts/commit directory See commit scripts configurable........................................................222
/var/db/scripts/op directory See operation scripts configuration requirements for interface
/var/log directory See system log messages alarms.............................................................225
< >, in syntax descriptions.......................................xxv licenses...............................................................224
>, operational mode command prompt........................9 major See major alarms
? command minor See minor alarms
for CLI online Help................................................13 overview.............................................................220
in configuration mode...........................................10 red See major alarms
in operational mode................................................9 rescue configuration...........................................224
[ ], in configuration statements..................................xxv severity See alarm severity
{ }, in configuration statements.................................xxv types...................................................................220
| (pipe) command......................................................128 verifying.............................................................227
| (pipe), in syntax descriptions...................................xxv yellow See minor alarms
alert logging severity..................................................212
alias, CoS value..........................................................190
A any level statement....................................................217
Access Manager license..............................................294 any logging facility.....................................................212
access privileges archiving system logs.................................................217
denying and allowing commands.........................29 arithmetic operators, for multicast traffic...................359
permission bits for................................................27 AS path, displaying....................................................183
predefined............................................................27 AT commands, for modem initialization
specifying (Quick Configuration)...........................31 description............................................................49
accounts See template accounts; user accounts modifying.............................................................59
action modifier attacks
packet-mode.......................................................272 brute force, preventing.........................................44
activate system scripts commit command.................118 dictionary, preventing...........................................44
activate system scripts op command.........................120 authentication
adaptive services interfaces adding a RADIUS server (Quick
alarm conditions and configuration options........222 Configuration)...................................................30
Advanced Encryption Standard (AES) See AES adding a TACACS+ server (Quick
encryption Configuration)...................................................30
Index ■ 405
JUNOS Software Administration Guide
406 ■ Index
Index
SNMP....................................................................73 conventions
statement types....................................................11 notice icons........................................................xxiv
system log messages, sending to a file................215 text and syntax..................................................xxiv
system log messages, sending to a terminal.......216 CoS (class of service)
TACACS+ authentication......................................34 classifiers............................................................190
USB modem connections......................................51 CoS value aliases.................................................190
CLI terminal See JUNOS CLI forwarding classes..............................................192
code point aliases, CoS...............................................190 interfaces............................................................189
command completion loss priority.........................................................195
description............................................................12 packet loss priority..............................................195
setting on and off..................................................15 RED drop profiles...............................................191
command hierarchy.......................................................8 rewrite rules........................................................193
command prompts RPM probe classification.....................................389
changing...............................................................15 See also TCP RPM probes; UDP RPM probes
configuration mode (#).........................................10 scheduler maps...................................................194
operational mode (>).............................................9 crash files
comments, in configuration statements.....................xxv cleaning up (CLI).................................................308
commit scripts cleaning up (J-Web).............................................304
/var/db/scripts/commit directory.........................116 downloading (J-Web)...........................................305
disabling.............................................................117 critical logging severity...............................................212
enabling..............................................................116 cron logging facility....................................................212
overview.............................................................115 curly braces, in configuration statements...................xxv
superuser privileges required for.........................116 customer support......................................................xxvi
communities, SNMP See SNMP communities contacting JTAC..................................................xxvi
CompactFlash card
configuring..........................................................247
configuring for failure snapshot storage..............248 D
corrupted............................................................231 daemon logging facility..............................................212
configuration daemons See processes, software
autoinstallation of...............................................107 Data Encryption Standard (DES) See DES encryption
consistency checking, with commit scripts.........115 data plane logs...........................................................213
downgrading software (CLI)................................243 deactivate system scripts commit command.............117
downgrading software (J-Web)............................242 deactivate system scripts op command.....................120
installation on multiple services routers..............107 debug logging severity...............................................213
modification and checking with operation decryption, configuration files See file encryption
scripts.............................................................118 default configuration file, for autoinstallation.............110
rule enforcement, with commit scripts...............115 delete system scripts commit command....................117
upgrading (CLI)...................................................237 delete system scripts op command............................120
upgrading (J-Web)...............................................235 deleting
configuration files crash files (J-Web)...............................................305
decrypting..........................................................303 files, with caution................................................306
encrypting..........................................................303 licenses (CLI).......................................................296
configuration management, automating....................115 licenses (J-Web)...................................................299
See also commit scripts; operation scripts log files (J-Web)...................................................305
configuration mode temporary files (J-Web).......................................305
commands............................................................10 DES encryption
prompt (#)............................................................10 for international JUNOS......................................309
Confirm File Delete page............................................306 setting.................................................................310
console port device
disabling...............................................................42 automating operations and troubleshooting........115
securing................................................................41 halting (CLI)........................................................251
container statements...................................................11 halting (J-Web)....................................................249
control plane logs.......................................................213 packet capture....................................................361
controlling user access.................................................36 rebooting (J-Web)................................................249
Index ■ 407
JUNOS Software Administration Guide
408 ■ Index
Index
Index ■ 409
JUNOS Software Administration Guide
410 ■ Index
Index
Internet Explorer, modifying for worldwide version USB modems for remote management.................47
of JUNOS Software..............................................5 worldwide version, modifying Internet Explorer
managing files....................................................303 for.......................................................................5
managing licenses..............................................297 junos-jseries package See upgrades
overview.................................................................4 JUNOScope application..................................................3
page layout.............................................................6 JUNOScript API
sessions..................................................................7 enabling secure access..........................................19
starting...................................................................5 verifying secure access configuration....................23
windows, multiple, unpredictable results with........7 JUNOScript Extensible Markup Language (XML) See
jitter commit scripts; operation scripts
description..........................................................378 JUNOScript over SSL....................................................19
See also RPM probes
in RPM probes, improving with timestamps.......377
monitoring..........................................................401 K
threshold, setting................................................383 kernel logging facility.................................................212
Juniper-Kaspersky Anti-Virus license..........................294 key sequences, editing, in CLI......................................11
Juniper-Symantec Anti-Spam license..........................294
Juniper-Websense Integrated Web Filtering
license....................................................................294 L
JUNOS CLI label-switched paths See LSPs
access privilege levels...........................................28 latency, in RPM probes, improving with
automatic command execution with event timestamps............................................................377
policies............................................................121 Layer 2 circuits, monitoring.......................................325
CLI terminal............................................................9 Layer 2 VPNs, monitoring..........................................325
command completion...........................................12 Layer 3 VPNs, monitoring..........................................325
command hierarchy................................................8 leaf statements.............................................................11
command modes....................................................5 libpcap format, for packet capture files......................373
command prompts See command prompts license infringement
console...................................................................9 identifying any licenses needed..........................298
context-sensitive Help...........................................13 verifying license usage........................................300
denying and allowing commands.........................29 verifying licenses installed..................................300
diagnostic command summary...........................318 license keys
editing keystrokes.................................................11 components........................................................294
environment, changing.........................................14 displaying (CLI)...................................................301
filtering command output...................................128 displaying (J-Web)...............................................299
idle time...............................................................15 status..................................................................298
managing licenses..............................................295 version................................................................298
overview.................................................................5 licenses
screen length........................................................15 Access Manager..................................................294
screen width.........................................................15 adding (CLI)........................................................295
ssh..........................................................................9 adding (J-Web)....................................................298
starting...................................................................9 BGP route reflectors............................................294
telnet......................................................................9 deleting (CLI).......................................................296
terminal type........................................................16 deleting (J-Web)..................................................299
working directory.................................................15 displaying (CLI)...................................................300
JUNOS Software displaying (J-Web)...............................................297
autoinstallation...................................................107 displaying usage.................................................300
encryption See file encryption downloading (J-Web)...........................................299
Internet Explorer, modifying for worldwide group..................................................................298
version................................................................5 IDP signature update..........................................294
known problems, operation scripts as infringement, preventing....................................297
workarounds...................................................118 See also license infringement
processes............................................................209 J Series Services Router ......................................294
upgrading...........................................................231 Juniper-Kaspersky Anti-Virus...............................294
Juniper-Symantec Anti-Spam..............................294
Index ■ 411
JUNOS Software Administration Guide
412 ■ Index
Index
Index ■ 413
JUNOS Software Administration Guide
414 ■ Index
Index
Index ■ 415
JUNOS Software Administration Guide
416 ■ Index
Index
Index ■ 417
JUNOS Software Administration Guide
418 ■ Index
Index
Index ■ 419
JUNOS Software Administration Guide
interfaces............................................................353 overview.............................................................211
LSP.....................................................................198 redundant syslog server......................................212
OSPF...................................................................185 remote system log server....................................214
performance monitoring.....................................378 sending through eventd......................................214
PPPoE.................................................................201 system management
RIP......................................................................183 automating.........................................................115
RPM, description.................................................378 See also commit scripts; event policies;
RPM, monitoring.................................................400 operation scripts
RPM, verifying....................................................397 displaying log and trace file contents..................353
status login classes....................................................27, 36
autoinstallation...................................................113 preparation...........................................................30
BGP.....................................................................188 Quick Configuration..............................................30
license key..........................................................298 system logs.........................................................209
OSPF interfaces..................................................185 template accounts...........................................30, 39
OSPF neighbors..................................................186 user accounts..................................................26, 38
RIP neighbors.....................................................184 user authentication...............................................26
storage media
configuring boot devices.....................................243
streaming security logs through revenue ports...........215 T
Structure of Management Information (SMI)................66 T1 ports
super-user login class permissions...............................27 alarm conditions and configuration options........222
superuser login class permissions................................27 configuring alarms on.........................................225
support, technical See technical support T3 ports
syntax conventions...................................................xxiv alarm conditions and configuration options........224
syslog See system logs configuring alarms on.........................................225
system log messages TACACS+
/var/log directory.................................................215 adding a server (Quick Configuration)...................30
capturing in a file (configuration editor)..............215 authentication (configuration editor).....................34
destinations........................................211, 212, 214 order of user authentication (configuration
displaying at a terminal (configuration editor)...............................................................36
editor).............................................................216 secret (configuration editor)..................................35
event viewer.......................................................217 specifying for authentication (Quick
facilities..............................................................212 Configuration)...................................................31
monitoring (Quick Configuration).......................217 taskbar...........................................................................6
overview.............................................................211 TCP RPM probes
preparation.........................................................213 CoS classification, destination interface
sending messages to a file (configuration requirement....................................................389
editor).............................................................216 CoS classification, use with caution.....................389
sending messages to a terminal (configuration description..........................................................377
editor).............................................................216 server port..........................................................385
severity levels.....................................................212 setting.................................................................389
system logs verifying servers.................................................398
archiving.............................................................217 technical support
control plane logs................................................213 contacting JTAC..................................................xxvi
data plane logs....................................................213 Telnet
destinations for log files......................................211 accessing remote accounts (CLI)...........................42
disabling.............................................................217 setting login retry limits........................................44
event triggers for SNMP traps, setting in event telnet
policies............................................................123 reverse..................................................................45
file cleanup (CLI).................................................308 reverse SSH..........................................................46
file cleanup (J-Web).............................................304 telnet command...........................................................43
functions.............................................................211 options..................................................................43
logging facilities..................................................212 Telnet session..............................................................43
logging severity levels.........................................212
messages See system log messages
monitoring..........................................................353
420 ■ Index
Index
Index ■ 421
JUNOS Software Administration Guide
422 ■ Index
Index
X
XML See commit scripts; operation scripts
XSLT See commit scripts; operation scripts
Y
yellow alarms See minor alarms
Index ■ 423
JUNOS Software Administration Guide
424 ■ Index