beautypg.com

Juniper Networks J-Series User Manual

Page 314

background image

Alarms Summary page...............................................174
alert logging severity..................................................158
alias, CoS value..........................................................125
alternative boot media See boot devices; USB
ambient temperature, monitoring..............................112
any level statement....................................................162
any logging facility.....................................................157
archiving system logs.................................................161
arithmetic operators, for multicast traffic...................250
AS path, displaying....................................................117
AT commands, for modem initialization

description............................................................31
modifying.............................................................41

attacks

brute force, preventing.........................................26
detecting with IDS...............................................139
dictionary, preventing...........................................26

authentication

adding a RADIUS server (Quick Configuration).......8
adding a TACACS+ server (Quick

Configuration).....................................................9

local password, by default.....................................10
login classes......................................................5, 16
methods.................................................................4
order of user authentication (configuration

editor)...............................................................15

RADIUS authentication (configuration editor).......12
specifying a method (Quick Configuration)...........10
specifying access privileges (Quick

Configuration)...................................................11

TACACS+ authentication (configuration

editor)...............................................................13

user accounts....................................................4, 17

authorization logging facility......................................157
autoinstallation

automatic configuration process...........................84
CLI configuration editor........................................85
default configuration file.......................................84
establishing...........................................................81
host-specific configuration file..............................84
interfaces..............................................................82
IP address procurement process...........................83
J-Web configuration editor....................................85
overview...............................................................82
protocols for procuring an IP address...................82
requirements........................................................84
status....................................................................87
TFTP server..........................................................83
verifying...............................................................86

autoinstallation, compatibility with the DHCP

server.......................................................................65

automatic configuration See autoinstallation
Avaya VoIP, monitoring.............................................151

B

BBL (bearer bandwidth limit)

available.............................................................152
reported..............................................................152

bearer bandwidth limit See BBL
BGP (Border Gateway Protocol)

monitoring..........................................................117
peers, probes to See BGP RPM probes
RPM probes to BGP neighbors See BGP RPM

probes

statistics..............................................................117
status..................................................................118

BGP groups, displaying..............................................117
BGP neighbors

directing RPM probes to......................................285
displaying...........................................................118
monitoring with RPM probes..............................283

BGP peers See BGP neighbors
BGP routing information............................................117
BGP RPM probes

directing to select BGP neighbors (configuration

editor).............................................................285

overview.............................................................271
setting up on local and remote Services Router

(configuration editor).......................................283

BGP sessions, status...................................................118
binary operators, for multicast traffic.........................250
boot devices...............................................................186

configuring (CLI).................................................189
configuring (J-Web).............................................186
selecting (CLI).............................................196, 197
selecting (J-Web).................................................195
storing memory snapshots..................................190
See also compact flash; USB

boot operations, DHCP.................................................71
BOOTP, for autoinstallation..........................................86
braces, in configuration statements...........................xviii
brackets

angle, in syntax descriptions..............................xviii
square, in configuration statements...................xviii

brute force attacks, preventing.....................................26
buffer space, for PIM (in FPC summary).....................113
built-in Ethernet ports See Ethernet ports; management

interfaces

bytes transmitted.......................................................115

C

cables

console port, connecting.......................................21
Ethernet rollover, connecting................................21

caller ID, for dial-in over USB modems........................36

See also dialer interface, for USB modem

capturing packets See packet capture
Challenge Handshake Authentication Protocol, enabling

on dialer interfaces...................................................37

292

Index

J-series™ Services Router Administration Guide