EasyManua.ls Logo

Juniper SYSTEM BASICS - CONFIGURATION GUIDE V 11.1.X - Page 637

Juniper SYSTEM BASICS - CONFIGURATION GUIDE V 11.1.X
640 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
message authentication
configuring..................................................437
hmac-md5...................................................437
hmac-sha1...................................................437
hmac-sha1-96..............................................437
monitoring..........................................................437
performance issues.............................................437
security concerns................................................437
server public key files.........................................291
terminating.........................................................437
user authentication.............................................435
configuring..................................................437
user key management........................................435
standards
draft RFCs...........................................................584
hardware standards............................................590
non-RFC software standards...............................587
RFCs...................................................................571
startup configuration
saving.................................................................277
static host maps, adding....................................301, 316
static tunnels................................................................23
statistics
SNMP..........................................................195, 237
statistics (.sts) files.....................................................291
Statistics Profile Configuration mode...................83, 119
statistics-profile command.........................................119
status indicator (CLI)....................................................43
stratum 1 servers. See NTP servers, primary
structural errors in flash data.....................................384
Subinterface Configuration mode.........................83, 119
subinterfaces............................................................8, 88
configuring............................................................88
subscriber interfaces....................................................23
subscriber policy commands
subscriber-policy...................................................88
Subscriber Policy Configuration mode.................84, 120
summer time, specifying............................................525
support, technical See technical support
suspicious control flow detection...............................451
display options....................................................451
logs.....................................................................451
parameters.........................................................451
traps...................................................................451
suspicious control flow monitoring............................452
suspicious-control-flow-detection commands
baseline suspicious-control-flow-detection
counts.............................................................451
clear suspicious-control-flow-detection................451
suspicious-control-flow-detection
grouping-off.....................................................451
suspicious-control-flow-detection off...................451
suspicious-control-flow-detection protocol
backoff-time....................................................451
suspicious-control-flow-detection protocol
low-threshold..................................................451
suspicious-control-flow-detection protocol
threshold.........................................................451
switch fabric modules. See SFMs
switch usage, line modules.........................................373
synchronization process.............................................381
synchronization reserve file.......................................383
synchronize command.......................................382, 386
system
autoupgrade feature............................................253
basic parameters................................................417
booting.......................................................509, 517
rebooting.....................................................514
command-line interface. See CLI
configuring automatically....................................276
environment information....................................337
exiting..................................................................49
FTP client............................................................300
FTP server..........................................................300
initializing line modules........................................48
levels of access...........................................446, 447
logging in..............................................................48
logging/troubleshooting, commands
for...........................................................323, 348
managing............................................................251
monitoring..........................................................337
passwords...........................................................417
patching with hotfixes.........................................392
physical slots, rebooting......................................514
RADIUS password authentication........................435
software reset button..........................................424
system configuration files...................................290
system name......................................................252
TFTP client..........................................................300
timing.................................................................253
updating with hotfixes........................................392
virtual router limitations.....................................539
system clock
setting.................................................................525
system commands
privilege................................................................52
privilege-group alias..............................................52
privilege-group membership.................................52
privilege-group membership clear.........................52
write core...........................................................326
system configuration
saving current.....................................................277
saving startup.....................................................277
system passwords. See passwords
system security..........................................................417
system.log file............................................................290
T
T1 lines, controllers for................................................12
Index 607
Index

Table of Contents

Related product manuals