beautypg.com

Juniper Networks J-Series User Manual

Page 319

background image

overriding for SNMP (Quick Configuration)...........51
pinging (CLI).......................................................230
pinging (J-Web)...................................................216
resolving...............................................................72
SNMP trap target (Quick Configuration)................52
telnetting to..........................................................25
tracing a route to (CLI)................................237, 239
tracing a route to (J-Web)....................................224

hostname.conf file, for autoinstallation........................84
how to use this guide...................................................xvi
HTTP (Hypertext Transfer Protocol), RPM probes......268
Hypertext Transfer Protocol, RPM probes..................268

I

ICMP (Internet Control Message Protocol)

RPM probes, description.....................................268
RPM probes, inbound and outbound times.........270
RPM probes, setting............................................276

idle time, displaying...................................................108
IDS (intrusion detection service)

information, displaying.......................................140
monitoring..........................................................139
search-narrowing characteristics.........................139

IKE security associations, monitoring.........................141
inbound time See RPM probes
info logging severity...................................................158
ingress See RPM probes, inbound times
init-command-string command....................................31
initial pacing window, DLSw......................................122
Install Remote page...................................................182

field summary............................................183, 187

installation

software upgrades (CLI)......................................184
software upgrades, from a remote server...........182
software upgrades, uploading.............................183

Instance to which this connection belongs

description..........................................................214
using...................................................................221

interactive-commands logging facility........................158
interfaces See management interfaces; network

interfaces; ports

internal compact flash See compact flash
Internet Key Exchange (IKE) security associations,

monitoring.............................................................141

intervals, probe and test See RPM probes
intrusion detection service See IDS
ipconfig command.......................................................77

explanation...........................................................78

IPSec (IP Security)

monitoring..........................................................140
statistics..............................................................141
tunnels, displaying..............................................140

J

J-series.......................................................................199

alarms.................................................................165
autoinstallation.....................................................81
automating operations with scripts.......................89
automating troubleshooting with scripts and event

policies..............................................................89

DHCP server.........................................................63
diagnosis.............................................................209
managing access.....................................................3
managing user authentication.................................3
monitoring .........................................................101
network management...........................................47
packet capture....................................................253
performance monitoring.....................................267
release notes, URL.................................................xv
software upgrades...............................................179
system log messages..........................................155
USB modems for remote management.................29

J-Web configuration editor

autoinstallation.....................................................85
CHAP on dialer interfaces.....................................37
controlling user access..........................................16
DHCP server.........................................................72
enabling commit scripts........................................90
enabling operation scripts.....................................93
event policies........................................................95
interface alarms..................................................172
RADIUS authentication.........................................12
RPM....................................................................276
SNMP....................................................................54
system log messages, sending to a file................160
system log messages, sending to a terminal.......161
TACACS+ authentication......................................13
USB modem connections......................................33

J-Web interface

Diagnose options................................................210
event viewer.......................................................162
managing files....................................................199
Monitor options..................................................102

jitter

description..........................................................270

See also RPM probes

in RPM probes, improving with timestamps.......269
monitoring..........................................................147
threshold, setting................................................274

JTAC (Juniper Networks Technical Assistance Center)

hardware information for...................................112

JUNOS CLI

access privilege levels.............................................5
automatic command execution with event

policies..............................................................95

denying and allowing commands...........................7
diagnostic command summary...........................212
filtering command output...................................105
monitoring (show) commands summary............102

Index

297

Index