Security Swconfig Initial Device Config PDF
Security Swconfig Initial Device Config PDF
Release
12.1X46-D10
Modified: 2016-07-07
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.
®
Junos OS Administration Guide for Security Devices
12.1X46-D10
Copyright © 2016, Juniper Networks, Inc.
All rights reserved.
The information in this document is current as of the date on the title page.
Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the
year 2038. However, the NTP application is known to have some difficulty in the year 2036.
The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks
software. Use of such software is subject to the terms and conditions of the End User License Agreement (“EULA”) posted at
http://www.juniper.net/support/eula.html. By downloading, installing or using such software, you agree to the terms and conditions of
that EULA.
Part 1 Overview
Chapter 1 Secure Web Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Secure Web Access Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Chapter 2 J-Web User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Understanding the User Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
J-Web User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Starting the J-Web User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Understanding the J-Web Interface Layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
J-Web Commit Options Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Getting Help in the J-Web User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Establishing J-Web Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Chapter 3 User Authentication and Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Understanding User Authentication Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Understanding User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Understanding Login Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Permission Bits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Denying or Allowing Individual Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Understanding Template Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Chapter 4 USB Modems for Remote Management Setup . . . . . . . . . . . . . . . . . . . . . . . . 19
USB Modem Interface Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
USB Modem Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Dialer Interface Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
How the Device Initializes USB Modems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
USB Modem Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Part 2 Configuration
Chapter 11 USB Modems for Remote Management Setup . . . . . . . . . . . . . . . . . . . . . . . . 51
Example: Configuring a USB Modem Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Example: Configuring a Dialer Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Part 3 Administration
Chapter 17 Secure Web Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
Generating an SSL Certificate Using the openssl Command . . . . . . . . . . . . . . . . 255
Generating a Self-Signed SSL Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
Manually Generating Self-Signed SSL Certificates . . . . . . . . . . . . . . . . . . . . . . . 256
Configuring Device Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Enabling Access Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Example: Configuring Secure Web Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
Adding, Editing, and Deleting Certificates on the Device . . . . . . . . . . . . . . . . . . . 260
Chapter 18 User Authentication and Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
Example: Configuring a RADIUS Server for System Authentication . . . . . . . . . . 263
Example: Configuring a TACACS+ Server for System Authentication . . . . . . . . . 266
Example: Configuring Authentication Order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
Example: Configuring New Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
Example: Configuring System Retry Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
Example: Creating Template Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Handling Authorization Failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
Understanding Administrative Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Example: Configuring Administrative Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
Chapter 19 USB Modems for Remote Management Setup . . . . . . . . . . . . . . . . . . . . . . . 291
Connecting to the Device Remotely . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Modifying USB Modem Initialization Commands . . . . . . . . . . . . . . . . . . . . . . . . . 291
Resetting USB Modems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Chapter 20 Telnet and SSH Device Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
Configuring Password Retry Limits for Telnet and SSH Access . . . . . . . . . . . . . . 295
Configuring Reverse Telnet and Reverse SSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
Example: Controlling Management Access on SRX and J-Series Devices . . . . . . 297
The telnet Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
The ssh Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
Chapter 21 DHCP for IP Address Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
Verifying and Managing DHCP Local Server Configuration . . . . . . . . . . . . . . . . . 303
Verifying and Managing DHCP Client Configuration . . . . . . . . . . . . . . . . . . . . . . 304
Verifying and Managing DHCP Relay Configuration . . . . . . . . . . . . . . . . . . . . . . . 304
Chapter 22 File Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
Decrypting Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
Encrypting Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
Modifying the Encryption Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
Cleaning Up Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
Cleaning Up Files with the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
Deleting Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
Deleting the Backup Software Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
Downloading Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
Managing Accounting Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Part 4 Index
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
Part 1 Overview
Chapter 2 J-Web User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Table 3: Concurrent Web Sessions on SRX Series Devices . . . . . . . . . . . . . . . . . . . . 7
Chapter 3 User Authentication and Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Table 4: Predefined Login Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Table 5: Permission Bits for Login Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Chapter 4 USB Modems for Remote Management Setup . . . . . . . . . . . . . . . . . . . . . . . . 19
Table 6: Default Modem Initialization Commands . . . . . . . . . . . . . . . . . . . . . . . . . 21
Table 7: Configuring Branch Office and Head Office Routers for USB Modem
Backup Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Table 8: Incoming Map Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Chapter 6 DHCP for IP Address Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Table 9: Sample DHCP Configuration Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Chapter 10 Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Table 10: Summary of License Management Fields . . . . . . . . . . . . . . . . . . . . . . . . 46
Table 11: Junos OS Feature Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Part 2 Configuration
Chapter 14 DHCPv6 Local Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Table 12: DHCPv6 Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Part 3 Administration
Chapter 20 Telnet and SSH Device Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
Table 13: CLI telnet Command Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
Table 14: CLI ssh Command Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
Chapter 22 File Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
Table 15: request system set-encryption-key Commands . . . . . . . . . . . . . . . . . . 308
Chapter 24 Operational Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Table 16: Sample show Commands Called by the request information support
command on an MX Series Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
Table 17: show chassis routing-engine Output Fields . . . . . . . . . . . . . . . . . . . . . . 390
If the information in the latest release notes differs from the information in the
documentation, follow the product Release Notes.
Juniper Networks Books publishes books by Juniper Networks engineers and subject
matter experts. These books go beyond the technical documentation to explore the
nuances of network architecture, deployment, and administration. The current list can
be viewed at http://www.juniper.net/books.
Supported Platforms
For the features described in this document, the following platforms are supported:
• J Series
• SRX Series
• LN Series
If you want to use the examples in this manual, you can use the load merge or the load
merge relative command. These commands cause the software to merge the incoming
configuration into the current candidate configuration. The example does not become
active until you commit the candidate configuration.
If the example configuration contains the top level of the hierarchy (or multiple
hierarchies), the example is a full example. In this case, use the load merge command.
If the example configuration does not start at the top level of the hierarchy, the example
is a snippet. In this case, use the load merge relative command. These procedures are
described in the following sections.
1. From the HTML or PDF version of the manual, copy a configuration example into a
text file, save the file with a name, and copy the file to a directory on your routing
platform.
For example, copy the following configuration to a file and name the file ex-script.conf.
Copy the ex-script.conf file to the /var/tmp directory on your routing platform.
system {
scripts {
commit {
file ex-script.xsl;
}
}
}
interfaces {
fxp0 {
disable;
unit 0 {
family inet {
address 10.0.0.1/24;
}
}
}
}
2. Merge the contents of the file into your routing platform configuration by issuing the
load merge configuration mode command:
[edit]
user@host# load merge /var/tmp/ex-script.conf
load complete
Merging a Snippet
To merge a snippet, follow these steps:
1. From the HTML or PDF version of the manual, copy a configuration snippet into a text
file, save the file with a name, and copy the file to a directory on your routing platform.
For example, copy the following snippet to a file and name the file
ex-script-snippet.conf. Copy the ex-script-snippet.conf file to the /var/tmp directory
on your routing platform.
commit {
file ex-script-snippet.xsl; }
2. Move to the hierarchy level that is relevant for this snippet by issuing the following
configuration mode command:
[edit]
user@host# edit system scripts
[edit system scripts]
3. Merge the contents of the file into your routing platform configuration by issuing the
load merge relative configuration mode command:
For more information about the load command, see the CLI User Guide.
Documentation Conventions
Caution Indicates a situation that might result in loss of data or hardware damage.
Laser warning Alerts you to the risk of personal injury from a laser.
Table 2 on page xvi defines the text and syntax conventions used in this guide.
Bold text like this Represents text that you type. To enter configuration mode, type the
configure command:
user@host> configure
Fixed-width text like this Represents output that appears on the user@host> show chassis alarms
terminal screen.
No alarms currently active
Italic text like this • Introduces or emphasizes important • A policy term is a named structure
new terms. that defines match conditions and
• Identifies guide names. actions.
• Junos OS CLI User Guide
• Identifies RFC and Internet draft titles.
• RFC 1997, BGP Communities Attribute
Italic text like this Represents variables (options for which Configure the machine’s domain name:
you substitute a value) in commands or
configuration statements. [edit]
root@# set system domain-name
domain-name
Text like this Represents names of configuration • To configure a stub area, include the
statements, commands, files, and stub statement at the [edit protocols
directories; configuration hierarchy levels; ospf area area-id] hierarchy level.
or labels on routing platform • The console port is labeled CONSOLE.
components.
< > (angle brackets) Encloses optional keywords or variables. stub <default-metric metric>;
# (pound sign) Indicates a comment specified on the rsvp { # Required for dynamic MPLS only
same line as the configuration statement
to which it applies.
[ ] (square brackets) Encloses a variable for which you can community name members [
substitute one or more values. community-ids ]
GUI Conventions
Bold text like this Represents graphical user interface (GUI) • In the Logical Interfaces box, select
items you click or select. All Interfaces.
• To cancel the configuration, click
Cancel.
> (bold right angle bracket) Separates levels in a hierarchy of menu In the configuration editor hierarchy,
selections. select Protocols>Ospf.
Documentation Feedback
• Online feedback rating system—On any page of the Juniper Networks TechLibrary site
at http://www.juniper.net/techpubs/index.html, simply click the stars to rate the content,
and use the pop-up form to provide us with information about your experience.
Alternately, you can use the online feedback form at
http://www.juniper.net/techpubs/feedback/.
Technical product support is available through the Juniper Networks Technical Assistance
Center (JTAC). If you are a customer with an active J-Care or Partner Support Service
support contract, or are covered under warranty, and need post-sales technical support,
you can access our tools and resources online or open a case with JTAC.
• JTAC hours of operation—The JTAC centers have resources available 24 hours a day,
7 days a week, 365 days a year.
• Find solutions and answer questions using our Knowledge Base: http://kb.juniper.net/
To verify service entitlement by product serial number, use our Serial Number Entitlement
(SNE) Tool: https://tools.juniper.net/SerialNumberEntitlementSearch/
Overview
• Secure Web Access on page 3
• J-Web User Interface on page 5
• User Authentication and Access on page 13
• USB Modems for Remote Management Setup on page 19
• Telnet and SSH Device Control on page 25
• DHCP for IP Address Device on page 29
• DHCPv6 Client on page 39
• DHCPv6 Local Server on page 41
• File Management on page 43
• Licenses on page 45
You can manage a Juniper Networks device remotely through the J-Web interface. To
communicate with the device, the J-Web interface uses the Hypertext Transfer Protocol
(HTTP). HTTP allows easy Web access but no encryption. The data that is transmitted
between the Web browser and the device by means of HTTP is vulnerable to interception
and attack. To enable secure Web access, the Juniper Networks devices support HTTP
over Secure Sockets Layer (HTTPS). You can enable HTTP or HTTPS access on specific
interfaces and ports as needed.
The Juniper Networks device uses the Secure Sockets Layer (SSL) protocol to provide
secure device management through the Web interface. SSL uses public-private key
technology that requires a paired private key and an authentication certificate for providing
the SSL service. SSL encrypts communication between your device and the Web browser
with a session key negotiated by the SSL server certificate.
An SSL certificate includes identifying information such as a public key and a signature
made by a certificate authority (CA). When you access the device through HTTPS, an
SSL handshake authenticates the server and the client and begins a secure session. If
the information does not match or the certificate has expired, you cannot access the
device through HTTPS.
Without SSL encryption, communication between your device and the browser is sent
in the open and can be intercepted. We recommend that you enable HTTPS access on
your WAN interfaces.
Related • Generating an SSL Certificate Using the openssl Command on page 255
Documentation
• Generating a Self-Signed SSL Certificate on page 256
You can use two user interfaces to configure, monitor, manage, and troubleshoot your
device—the J-Web user interface and the command-line interface (CLI) for Junos OS.
NOTE: Other user interfaces facilitate the configuration of one or, in some
cases, many devices on the network through a common API. Among the
supported interfaces are the Junos Scope and Session and Resource Control
(SRC) applications.
You can operate the device either in secure or router context. With the J-Web user interface
and the CLI, you configure the routing protocols that run on the device and the device
security features, including stateful firewall policies, Network Address Translation (NAT)
attack prevention screens, Application Layer Gateways (ALGs), and IPsec VPNs. You
also set the properties of its network interfaces. After activating a software configuration,
you can use either user interface to monitor the system and the protocol traffic passing
through the device, manage operations, and diagnose protocol and network connectivity
problems.
You can perform the following tasks with the J-Web user interface:
• Dashboard (SRX Series devices only)—Views high-level details of Chassis View, system
identification, resource utilization, security resources, system alarms, file usage, login
sessions, chassis status, threats activity, and storage usage.
• Edit a graphical version of the Junos OS CLI configuration statements and hierarchy.
• Use wizards to configure basic setup, firewall, VPN, and NAT settings on SRX100,
SRX210, SRX220, SRX240, and SRX650 devices.
The J-Web user interface also allows you to manage configuration history and set a
rescue configuration.
• Managing—Manage log, temporary, and core (crash) files and schedule reboots on
your devices. You can also manage software packages and licenses, and copy a
snapshot of the system software to a backup device.
• Configuring and monitoring events—Filter and view system log messages that record
events occurring on the device. You can configure files to log system log messages
and also assign attributes, such as severity levels, to messages.
CLI
The CLI is a straightforward command-line interface in which you type commands on a
line and press Enter to execute them. The CLI provides command Help, command
completion, and Emacs-style keyboard sequences for moving around on the command
line and scrolling through a buffer of recently executed commands.
Before you start the user interface, you must perform the initial device configuration
described in the Getting Started Guide for your device. After the initial configuration, you
use your username and password, and the hostname or IP address of the device, to start
the user interface.
Table 3 on page 7 shows the maximum number of concurrent Web sessions on SRX100,
SRX210, SRX220, SRX240, and SRX650 devices.
3 3 3 5 5
To use HTTPS, you must have installed the certificate provided by the device.
NOTE: If the device is running the worldwide version of the Junos OS and
you are using the Microsoft Internet Explorer Web browser, you must
disable the Use SSL 3.0 option in the Web browser to access the device.
2. Type http:// or https:// in your Web browser followed by the hostname or IP address
of the device, and press Enter.
To correct or change the username or password you typed, click Reset, type the new
entry or entries, and click Log In.
NOTE: The default username is root with no password. You must change
this during initial configuration or the system does not accept the
configuration.
To explicitly terminate a J-Web session at any time, click Logout in the top pane.
The top pane of the J-Web user interface comprises the following elements:
• Logged in as: username—The username you used to log in to the device is displayed in
the upper-left corner.
• Commit Options—A set of global options that allow you to commit multiple changes
at the same time.
• About—Displays information about the J-Web user interface, such as the version
number.
• Logout—The Logout link, which ends your current login session and returns you to the
login page, is available in the upper-right corner.
• Taskbar— A menu of J-Web tasks is displayed as tabs across the top of the J-Web user
interface. Select a tab to access a task.
• Maintain—Manages files and licenses, upgrades software, and reboots the device.
The main pane of the J-Web user interface includes the following elements to help you
configure the device:
• Help (?) icon—Displays useful information when you move the cursor over the question
mark. This Help displays field-specific information, such as the definition, format, and
valid range of the field.
The left pane of the J-Web user interface displays subtasks related to the selected task
in the J-Web taskbar.
Using the J-Web Commit Preference, you can configure the commit options either to
commit all global configurations together or to commit each configuration change
immediately. Do one of the following to commit a configuration:
• Set Commit Preference to Validate and commit configuration changes, and then click
OK.
For example, suppose you want to delete a firewall and add a new one.
• If Commit Preference is set to Validate and commit configuration changes, then you
would need to commit your changes twice for each action.
• If Commit Preference is set to Validate configuration changes, then you work in a copy
of the current configuration to create a candidate configuration. The changes you make
to the candidate configuration are visible through the user interface immediately,
allowing other users to edit those configurations, but the changes do not take effect
on the device platform until you commit them. When you commit the configuration,
the candidate file is checked for proper syntax, activated, and marked as the current,
operational software configuration file. If multiple users are editing the configuration
when you commit the candidate configuration, changes made by all the users take
effect.
You use the single commit feature to commit all your configurations in J-Web
simultaneously. This helps to reduce the time J-Web takes to commit configurations
because when changes are committed at every step, rollback configurations pile up
quickly.
To get Help in the J-Web user interface, use the following methods:
• Field-sensitive Help—Move the cursor over the question mark (?) next to the field for
which you want more information. Typically, this Help includes one line of information
about what this field does or what you must enter in a given text box. For example,
Help for the Peer Autonomous System Number text box states, “The value should be
a number between 1 and 65535.”
• Wizard Help (SRX100, SRX210, SRX220, SRX240, and SRX650)—Use the Firewall
Policy, VPN, and NAT wizards to perform basic configurations. Click a field in a wizard
page to display information about that field in the lower left corner of the wizard page.
When you attempt to log in through the J-Web interface, the system authenticates your
username with the same methods used for Telnet and SSH.
The device can support multiple J-Web sessions for a single user who logs in to each
session. However, if a single user attempts to launch multiple J-Web windows—for
example, by right-clicking a link to launch another instance of a Web browser—the session
can have unpredictable results.
If the device does not detect any activity through the J-Web user interface for 15 minutes,
the session times out and is terminated. You must log in again to begin a new session.
To explicitly terminate a J-Web session at any time, click Logout in the top pane.
With local password authentication, you configure a password for each user allowed to
log into the device.
RADIUS and TACACS+ are authentication methods for validating users who attempt to
access the device using Telnet. Both are distributed client/server systems—the RADIUS
and TACACS+ clients run on the device, and the server runs on a remote network system.
You can configure the device to use RADIUS or TACACS+ authentication, or both, to
validate users who attempt to access the device. If you set up both authentication
methods, you also can configure which method the device will try first.
User accounts provide one way for users to access the device. Users can access the
device without accounts if you configured RADIUS or TACACS+ servers. After you have
created an account, the device creates a home directory for the user. An account for the
user root is always present in the configuration. For each user account, you can define
the following:
• Username—Name that identifies the user. It must be unique within the device. Do not
include spaces, colons, or commas in the username.
• User's full name—If the full name contains spaces, enclose it in quotation marks (“ ”).
Do not include colons or commas.
• User identifier (UID)—Numeric identifier that is associated with the user account name.
The identifier range from 100 through 64,000 and must be unique within the device.
If you do not assign a UID to a username, the software assigns one when you commit
the configuration, preferring the lowest available number.
• User's access privilege—You can create login classes with specific permission bits or
use one of the predefined classes.
• Authentication method or methods and passwords that the user can use to access
the device—You can use SSH or an MD5 password, or you can enter a plain-text
password that Junos OS encrypts using MD5-style encryption before entering it in the
password database. If you configure the plain-text-password option, you are prompted
to enter and confirm the password.
All users who log into the device must be in a login class. You can define any number of
login classes. You then apply one login class to an individual user account. With login
classes, you define the following:
• Access privileges users have when they are logged into the device.
• How long a login session can be idle before it times out and the user is logged off.
Table 4 on page 15 contains a few predefined login classes. The predefined login classes
cannot be modified.
read-only view
unauthorized None
Permission Bits
Each top-level command-line interface (CLI) command and each configuration statement
has an access privilege level associated with it. Users can execute only those commands
and configure and view only those statements for which they have access privileges. The
access privileges for each login class are defined by one or more permission bits (see
Table 5 on page 15).
Two forms for the permissions control the individual parts of the configuration:
• Form that ends in -control—Provides read and write capability for that permission type.
An example is interface-control.
admin Can view user account information in configuration mode and with the show configuration
command.
admin-control Can view user accounts and configure them (at the [edit system login] hierarchy level).
access Can view the access configuration in configuration mode and with the show configuration
operational mode command.
access-control Can view and configure access information (at the [edit access] hierarchy level).
clear Can clear (delete) information learned from the network that is stored in various network
databases (using the clear commands).
configure Can enter configuration mode (using the configure command) and commit configurations
(using the commit command).
control Can perform all control-level operations (all operations configured with the -control
permission bits).
firewall-control Can view and configure firewall filter information (at the [edit firewall] hierarchy level).
interface Can view the interface configuration in configuration mode and with the show configuration
operational mode command.
interface-control Can view chassis, class of service, groups, forwarding options, and interfaces configuration
information. Can configure chassis, class of service, groups, forwarding options, and
interfaces (at the [edit] hierarchy).
maintenance Can perform system maintenance, including starting a local shell on the device and
becoming the superuser in the shell (by issuing the su root command), and can halt and
reboot the device (using the request system commands).
network Can access the network by entering the ping, ssh, telnet, and traceroute commands.
reset Can restart software processes using the restart command and can configure whether
software processes are enabled or disabled (at the [edit system processes] hierarchy
level).
rollback Can use the rollback command to return to a previously committed configuration other
than the most recently committed one.
routing Can view general routing, routing protocol, and routing policy configuration information
in configuration and operational modes.
routing-control Can view general routing, routing protocol, and routing policy configuration information
and configure general routing (at the [edit routing-options] hierarchy level), routing
protocols (at the [edit protocols] hierarchy level), and routing policy (at the [edit
policy-options] hierarchy level).
secret Can view passwords and other authentication keys in the configuration.
secret-control Can view passwords and other authentication keys in the configuration and can modify
them in configuration mode.
security Can view security configuration in configuration mode and with the show configuration
operational mode command.
security-control Can view and configure security information (at the [edit security] hierarchy level).
shell Can start a local shell on the device by entering the start shell command.
snmp Can view SNMP configuration information in configuration and operational modes.
snmp-control Can view SNMP configuration information and configure SNMP (at the [edit snmp]
hierarchy level).
system-control Can view system-level configuration information and configure it (at the [edit system]
hierarchy level).
trace Can view trace file settings in configuration and operational modes.
trace-control Can view trace file settings and configure trace file properties.
view Can use various commands to display current system-wide, routing table, and
protocol-specific values and statistics.
You use local user template accounts when you need different types of templates. Each
template can define a different set of permissions appropriate for the group of users who
use that template. These templates are defined locally on the device and referenced by
the TACACS+ and RADIUS authentication servers.
When you configure local user templates and a user logs in, Junos OS issues a request
to the authentication server to authenticate the user's login name. If a user is
authenticated, the server returns the local username to the device, which then determines
whether a local username is specified for that login name (local-username for TACACS+,
Juniper-Local-User for RADIUS). If so, the device selects the appropriate local user
template locally configured on the device. If a local user template does not exist for the
authenticated user, the device defaults to the remote template.
Juniper Networks devices support the use of USB modems for remote management. You
can use Telnet or SSH to connect to the device from a remote location through two
modems over a telephone network. The USB modem is connected to the USB port on
the device, and a second modem is connected to a remote management device such as
a PC or laptop computer.
You can configure your device to fail over to a USB modem connection when the primary
Internet connection experiences interruption.
A USB modem connects to a device through modem interfaces that you configure. The
device applies its own modem AT commands to initialize the attached modem. Modem
setup requires that you connect and configure the USB modem at the device and the
modem at the user end of the network.
You use either the J-Web configuration editor or CLI configuration editor to configure the
USB modem and its supporting dialer interfaces.
NOTE: Low-latency traffic such as VoIP traffic is not supported over USB
modem connections.
• A physical interface which uses the naming convention umd0. The device creates this
interface when a USB modem is connected to the USB port.
• A logical interface called the dialer interface. You use the dialer interface, dln, to
configure dialing properties for USB modem connections. The dialer interface can be
configured using Point-to-Point Protocol (PPP) encapsulation. You can also configure
the dialer interface to support authentication protocols—PPP Challenge Handshake
(CHAP) or Password Authentication Protocol (PAP). You can configure multiple dialer
interfaces for different functions on the device. After configuring the dialer interface,
you must configure a backup method such as a dialer backup, a dialer filter, or a dialer
watch.
The USB modem provides a dial-in remote management interface, and supports dialer
interface features by sharing the same dial pool as a dialer interface. The dial pool allows
the logical dialer interface and the physical interface to be bound together dynamically
on a per-call basis. You can configure the USB modem to operate either as a dial-in
console for management or as a dial-in WAN backup interface. Dialer pool priority has
a range from 1 to 255, with 1 designating the lowest priority interfaces and 255 designating
the highest priority interfaces.
• The dialer interface must be configured to use PPP encapsulation. You cannot configure
Cisco High-Level Data Link Control (HDLC) or Multilink PPP (MLPPP) encapsulation
on dialer interfaces.
• The dialer interface can perform backup, dialer filter, and dialer watch functions, but
these operations are mutually exclusive. You can configure a single dialer interface to
operate in only one of the following ways:
• As a dialer filter
The backup dialer interfaces are activated only when the primary interface fails. USB
modem backup connectivity is supported on all interfaces except lsq-0/0/0.
Dialer watch is a backup method that integrates backup dialing with routing capabilities
and provides reliable connectivity without relying on a dialer filter to trigger outgoing USB
modem connections. With dialer watch, the device monitors the existence of a specified
route. If the route disappears, the dialer interface initiates the USB modem connection
as a backup connection.
S7=45 Instructs the modem to wait 45 seconds for a telecommunications service provider
(carrier) signal before terminating the call.
S0=0 Disables the auto answer feature, whereby the modem automatically answers calls.
&C1 Disables reset of the modem when it loses the carrier signal.
E0 Disables the display on the local terminal of commands issued to the modem from
the local terminal.
When the device applies the modem AT commands in the init-command-string command
or the default sequence of initialization commands to the modem, it compares them to
the initialization commands already configured on the modem and makes the following
changes:
• If the commands are the same, the device overrides existing modem values that do
not match. For example, if the initialization commands on the modem include S0=0
and the device’s init-command-string command includes S0=2, the device applies
S0=2.
• If the initialization commands on the modem do not include a command in the device’s
init-command-string command, the device adds it. For example, if the
init-command-string command includes the command L2, but the modem commands
do not include it, the device adds L2 to the initialization commands configured on the
modem.
1. Install device hardware. For more information, see the Getting Started Guide for your
device.
2. Establish basic connectivity. For more information, see the Getting Started Guide for
your device.
3. Order a US Robotics USB 56k V.92 Modem, model number USR Model 5637 from US
Robotics (http://www.usr.com/).
4. Order a public switched telephone network (PSTN) line from your telecommunications
service provider. Contact your service provider for more information.
NOTE: J Series devices have two USB ports. However, you can connect
only one USB modem to the USB ports on these devices. If you connect
USB modems to both ports, the device detects only the first modem
connected.
NOTE: When you connect the USB modem to the USB port on the device,
the USB modem is initialized with the modem initialization string
configured for the USB modem interface on the device.
Suppose you have a branch office router and a head office router each with a USB modem
interface and a dialer interface. This example shows you how to establish a backup
connection between the branch office and head office routers. See Table 7 on page 23
for a summarized description of the procedure.
Table 7: Configuring Branch Office and Head Office Routers for USB Modem Backup Connectivity
Router Location Configuration Requirement Procedure
Branch Office Configure the logical dialer interface on the To configure the logical dialer interface,
branch office router for USB modem dial see “Example: Configuring a USB Modem
backup. Interface” on page 51.
Configure the dialer interface dl0 on the Configure the dialer interface using one
branch office router using one of the following of the following backup methods:
backup methods:
• To configure dl0 as a backup for
• Configure the dialer interface dl0 as the t1-1/0/0 see Example: Configuring
backup interface on the branch office Dialer Interfaces and Backup Methods
router's primary T1 interface t1-1/0/0. for USB Modem Dial Backup.
• Configure a dialer filter on the branch office • To configure a dialer filter on dl0, see
router's dialer interface. Example: Configuring Dialer Interfaces
• Configure a dialer watch on the branch and Backup Methods for USB Modem
office router's dialer interface. Dial Backup.
• To configure a dialer watch on dl0, see
Example: Configuring Dialer Interfaces
and Backup Methods for USB Modem
Dial Backup.
Head Office Configure dial-in on the dialer interface dl0 To configure dial-in on the head office
on the head office router. router, see “Example: Configuring a Dialer
Interface for USB Modem Dial-In” on
page 57.
If the dialer interface is configured to accept only calls from a specific caller ID, the device
matches the incoming call's caller ID against the caller IDs configured on its dialer
interfaces. If an exact match is not found and the incoming call's caller ID has more digits
than the configured caller IDs, the device performs a right-to-left match of the incoming
call's caller ID with the configured caller IDs and accepts the incoming call if a match is
found. For example, if the incoming call's caller ID is 4085321091 and the caller ID
configured on a dialer interface is 5321091, the incoming call is accepted. Each dialer
interface accepts calls from only callers whose caller IDs are configured on it.
You can configure the accept-all option for only one of the dialer interfaces
associated with a USB modem physical interface. The dialer interface with the
accept-all option configured is used only if the incoming call's caller ID does not
match the caller IDs configured on other dialer interfaces.
caller Dialer interface accepts calls from a specific caller ID. You can configure a
maximum of 15 caller IDs per dialer interface.
You configure dialer interfaces to support PAP. PAP allows a simple method for a peer
to establish its identity using a two-way handshake during initial link establishment. After
the link is established, an ID and password pair are repeatedly sent by the peer to the
authenticator until authentication is acknowledged or the connection is terminated.
You can use the console port on the device to connect to the device through an RJ-45
serial cable. From the console port, you can use the CLI to configure the device. By default,
the console port is enabled. To secure the console port, you can configure the device to
take the following actions:
• Log out of the console session when you unplug the serial cable connected to the
console port.
• Disable root login connections to the console. This action prevents a non-root user
from performing password recovery operation using the console.
• Disable the console port. We recommend disabling the console port to prevent
unauthorized access to the device, especially when the device is used as customer
premises equipment (CPE) and is forwarding sensitive traffic.
NOTE: It is not always possible to disable the console port, because console
access is important during operations such as software upgrades.
• Log out of the console session when the serial cable connected to the console port
is unplugged. Enter
2. If you are done configuring the device, enter commit from configuration mode.
• Configuring Password Retry Limits for Telnet and SSH Access on page 295
Reverse telnet allows you to configure a device to listen on a specific port for Telnet and
SSH services. When you connect to that port, the device provides an interface to the
auxiliary port on the device. You use a rollover cable to connect the auxiliary port from
the device on which reverse telnet is enabled to the console port of the device you want
to manage.
• A device with an auxiliary port running the appropriate version of Junos OS.
• A device with a console port for remote management if network connectivity fails and
you want to use console access.
• Multiple connections to the serial port are not allowed. If there is an existing connection
to the serial port, any other connections are denied.
• If the auxiliary port is enabled (through the system services port auxiliary configuration
statement), you cannot use reverse telnet or reverse ssh because another service is
already using the auxiliary port.
• Configuring Password Retry Limits for Telnet and SSH Access on page 295
The Juniper Networks device acts as the DHCP server, providing IP addresses and settings
to hosts, such as PCs, that are connected to device interfaces. The DHCP server is
compatible with the DHCP servers of other vendors on the network.
The device can also operate as a DHCP client and DHCP relay agent.
DHCP is based on BOOTP, a bootstrap protocol that allows a client to discover its own
IP address, the IP address of a server host, and the name of a bootstrap file. DHCP servers
can handle requests from BOOTP clients, but provide additional capabilities beyond
BOOTP, such as the automatic allocation of reusable IP addresses and additional
configuration options.
NOTE: Although a Juniper Networks device can act as a DHCP server, a DHCP
client, or DHCP relay agent at the same time, you cannot configure more than
one DHCP role on a single interface.
A typical DHCP server configuration provides the following configuration settings for a
particular subnet on a device interface:
• Domain search suffixes. These suffixes specify the domain search list used by a client
when resolving hostnames with DNS.
• Device solicitation address option (option 32). The IP address excluded from the IP
address pool is reserved for this option.
In addition, the DHCP server might assign a static address to at least one client on the
subnet. Table 9 on page 30 provides the settings and values for the sample DHCP server
configuration.
mylab.net
• RFC 3397, Dynamic Host Configuration Protocol (DHCP) Domain Search Option
As a DHCP server, a Juniper Networks device can provide temporary IP addresses from
an IP address pool to all clients on a specified subnet, a process known as dynamic
binding. Juniper Networks devices can also perform static binding, assigning permanent
IP addresses to specific clients based on their media access control (MAC) addresses.
Static bindings take precedence over dynamic bindings.
DHCP Options
In addition to its primary DHCP server functions, you can also configure the device to
send configuration settings like the following to clients through DHCP:
• IP address of the boot server and the filename of the boot file to use
• DHCP options defined in RFC 2132, DHCP Options and BOOTP Vendor Extensions
A Juniper Networks device can act as a DHCP client, receiving its TCP/IP settings and
the IP address for any physical interface in any security zone from an external DHCP
server. The device can also act as a DHCP server, providing TCP/IP settings and IP
addresses to clients in any zone. When the device operates as a DHCP client and a DHCP
server simultaneously, it can transfer the TCP/IP settings learned through its DHCP client
module to its default DHCP server module. For the device to operate as a DHCP client,
you configure a logical interface on the device to obtain an IP address from the DHCP
server in the network. You set the vendor class ID, lease time, DHCP server address,
retransmission attempts, and retry interval. You can renew DHCP client releases.
A Juniper Networks device operating as a DHCP relay agent forwards incoming requests
from BOOTP and DHCP clients to a specified BOOTP or DHCP server. Client requests
can pass through virtual private network (VPN) tunnels.
Although a Juniper Networks device can act as a DHCP server, a DHCP client, or DHCP
relay agent at the same time, you cannot configure more than one DHCP role on a single
interface.
DHCP relay operations are supported on all SRX Series devices in chassis cluster mode.
During the DHCP protocol exchange, the device receives TCP/IP settings from the external
network on its DHCP client interface. Settings include the address of the ISP's DHCP
name server and other server addresses. These settings are propagated to the DHCP
server pools configured on the device to fulfill host requests for IP addresses on the
device's internal network.
The device maintains a log of all client-detected conflicts and removes addresses with
conflicts from the DHCP address pool. To display the conflicts list, you use the show
system services dhcp conflict command. The addresses in the conflicts list remain excluded
until you use the clear system services dhcp conflict command to manually clear the list.
DHCP is not supported on interfaces that are part of a virtual private network (VPN).
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
The Dynamic Host Configuration Protocol (DHCP) can serve as a DHCP local server, a
DHCP client, or a DHCP relay agent.
To configure the DHCP local server on the device, include the dhcp-local-server statement
at the [edit system services] hierarchy level.
NOTE: You cannot configure the DHCP local server and the DHCP relay agent
on the same interface.
In a typical branch network configuration, the DHCP client is on the subscriber’s computer,
and the DHCP local server is configured on the device. The following steps provide a
high-level description of the interaction among the DHCP client, DHCP local server, and
address-assignment pools.
1. The DHCP client sends a discover packet to one or more DHCP local servers in the
network to obtain configuration parameters and an IP address for the subscriber.
2. Each DHCP local server that receives the discover packet then searches its
address-assignment pool for the client address and configuration options. Each local
server creates an entry in its internal client table to keep track of the client state, then
sends a DHCP offer packet to the client.
3. On receipt of the offer packet, the DHCP client selects the DHCP local server from
which to obtain configuration information and sends a request packet indicating the
DHCP local server selected to grant the address and configuration information.
4. The selected DHCP local server sends an acknowledgement packet to the client that
contains the client address lease and configuration parameters. The server and client
installs the host route and ARP entry, and then monitors the lease state.
In a DHCP local server operation, the client address and configuration information reside
in centralized address-assignment pools, that are managed independently from the
DHCP local server and they can be shared by different client applications.
Configuring a DHCP environment that includes a DHCP local server requires two
independent configuration operations, which you can complete in any order. In one
operation, you configure the DHCP local server on the device and specify how the DHCP
local server determines which address-assignment pool to use. In the other operation,
you configure the address-assignment pools used by the DHCP local server. The
address-assignment pools contain the IP addresses, named address ranges, and
configuration information for DHCP clients.
NOTE: The DHCP local server and the address-assignment pools used by
the server must be configured in the same routing instance.
DHCP Client
DHCP configuration consists of configuring DHCP clients and a DHCP local server. A
client configuration determines how clients send a message requesting an IP address,
while a server configuration enables the server to send an IP address back to the client.
For the device to operate as a DHCP client, you configure a logical interface on the device
to obtain an IP address from the DHCP local server in the network. You set the vendor
class ID, lease time, DHCP server address, retransmission attempts, and retry interval.
To configure the DHCP relay agent on the router, include the dhcp-relay statement at
the [edit forwarding-options] hierarchy level.
You can also include the dhcp-relay statement at the following hierarchy level:
The following steps describe, at a high level, how the DHCP client, DHCP relay agent,
and DHCP local server interact in a configuration that includes two DHCP local servers.
1. The DHCP client sends a discover packet to find a DHCP local server in the network
from which to obtain configuration parameters for the subscriber, including an IP
address.
2. The DHCP relay agent receives the discover packet and forwards copies to each of
the two DHCP local servers. The DHCP relay agent then creates an entry in its internal
client table to keep track of the client’s state.
3. In response to receiving the discover packet, each DHCP local server sends an offer
packet to the client. The DHCP relay agent receives the offer packets and forwards
them to the DHCP client.
4. On receipt of the offer packets, the DHCP client selects the DHCP local server from
which to obtain configuration information. Typically, the client selects the server that
offers the longest lease time on the IP address.
5. The DHCP client sends a request packet that specifies the DHCP local server from
which to obtain configuration information.
6. The DHCP local server requested by the client sends an acknowledgement (ACK)
packet that contains the client’s configuration parameters.
7. The DHCP relay agent receives the ACK packet and forwards it to the client.
8. The DHCP client receives the ACK packet and stores the configuration information.
9. If configured to do so, the DHCP relay agent installs a host route and Address
Resolution Protocol (ARP) entry for this client.
10. After establishing the initial lease on the IP address, the DHCP client and the DHCP
local server use unicast transmission to negotiate lease renewal or release.
Considerations
The following considerations apply when you enable a DHCP local server, DHCP relay
agent, or DHCP client in a routing instance:
• The DHCP local server, DHCP relay agent, and DHCP client can be configured in one
routing instance, but the functionality is mutually exclusive on one interface. If the
DHCP client is enabled on one interface, the DHCP local server or the DHCP relay agent
cannot be enabled on that interface.
• The DHCP client, DHCP relay agent and DHCP local server services act independently
in their respective routing instance. The following features can function simultaneously
on a device:
• Multiple routing instances. Each instance can have a DHCP local server, DHCP relay
agent, or DHCP client, or each routing instance can have a DHCP client and DHCP
local server or a DHCP client and DHCP relay agent.
NOTE: Before you enable DHCP services in a routing instance, you must
remove all the configuration related to DHCP services that does not include
routing instance support. If you do not do this, the old default routing instance
configuration will override the new routing instance configuration.
DHCPv6 Client
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
A Juniper Networks device can act as a Dynamic Host Configuration Protocol version 6
(DHCPv6) client, receiving its TCP/IP settings and the IPv6 address for any physical
interface in any security zone from an external DHCPv6 server. When the device operates
as a DHCPv6 client and a DHCPv6 server simultaneously, it can transfer the TCP/IP
settings learned through its DHCPv6 client module to its default DHCPv6 server module.
For the device to operate as a DHCPv6 client, you configure a logical interface on the
device to obtain an IPv6 address from the DHCPv6 server in the network.
DHCPv6 client support for Juniper Networks devices includes the following features:
• Rapid commit
• TCP/IP propagation
• Auto-prefix delegation
To configure the DHCPv6 client on the device, include the dhcpv6-client statement at
the [edit interfaces] hierarchy level.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Each DHCPv6 client and server is identified by a DHCP unique identifier (DUID). The DUID
is unique across all DHCPv6 clients and servers, and it is stable for any specific client or
server. DHCPv6 clients use DUIDs to identify a server in messages where a server needs
to be identified. DHCPv6 servers use DUIDs to determine the configuration parameters
to be used for clients and in the association of addresses with clients.
The DUID is a 2-octet type code represented in network byte order, followed by a variable
number of octets that make up the actual identifier; for example,
00:02:00:01:02:03:04:05:07:a0. A DUID can be up to 128 octets in length (excluding the
type code). The following types are currently defined for the DUID parameter:
The duid-llt DUID consists of a 2-octet type field that contains the value 1, a 2-octet
hardware type code, 4 octets that signify a time value, followed by the Link Layer address
of any one network interface that is connected to the DHCP device at the time that the
DUID is generated.
The vendor DUID is assigned by the vendor to the device and contains the vendor's
registered private enterprise number as maintained by the identity association for
nontemporary addresses (IA_NA) assignment, followed by a unique identifier assigned
by the vendor.
The duid-ll DUID contains a 2-octet type field that stores the value 3, and a 2-octet
network hardware type code, followed by the Link Layer address of any one network
interface that is permanently connected to the client or server device.
NOTE: SRX Series and J Series devices do not support DHCP client
authentication. In a DHCPv6 deployment, security policies control access
through the device for any DHCP client that has received an address and
other attributes from the DHCPv6 server.
The DHCPv6 server configuration usually consists of DHCPv6 options for clients, an IPv6
prefix, an address pool that contains IPv6 address ranges and options, and a security
policy to allow DHCPv6 traffic. In a typical setup the provider Juniper Networks device is
configured as an IPv6 prefix delegation server that assigns addresses to the customer
edge device. The customer’s edge router then provides addresses to internal devices.
To configure DHCPv6 local server on a device, you include the DHCPv6 statement at the
[edit system services dhcp-local-server] hierarchy level. You then create an address
assignment pool for DHCPv6 that is configured in the [edit access address-assignment
pool] hierarchy level using the family inet6 statement.
You can also include the dhcpv6 statement at the [edit routing-instances
routing-instance-name system services dhcp-local-server] hierarchy.
• Configuring a Named Address Range for Dynamic Address Assignment on page 105
File Management
You can use the J-Web user interface and the CLI to perform routine file management
operations such as archiving log files and deleting unused log files, cleaning up temporary
files and crash files, and downloading log files from the routing platform to your computer.
You can also encrypt the configuration files with the CLI to prevent unauthorized users
from viewing sensitive configuration information.
Before you perform any file management tasks, you must perform the initial device
configuration described in the Getting Started Guide for your device.
Licenses
To enable some Junos OS features, you must purchase, install, and manage separate
software licenses. For those features that require a license, the presence on the device
of the appropriate software license keys (passwords) determines whether you can use
the feature.
For information about how to purchase software licenses for your device, contact your
Juniper Networks sales representative.
Certain Junos OS features require licenses. Each license is valid for only a single device.
To manage the licenses, you must understand license enforcement and the components
of a license key.
License Enforcement
For features that require a license, you must install and properly configure the license to
use the feature. Although the device allows you to commit a configuration that specifies
a feature requiring a license when the license is not present, you are prohibited from
actually using the feature.
Successful commitment of a configuration does not imply that the required licenses are
installed. If a required license is not present, the system provides a warning message
after it commits the configuration rather than failing to commit it because of a license
violation.
• License ID—Alphanumeric string that uniquely identifies the license key. When a license
is generated, it is given a license ID.
• License data—Block of binary data that defines and stores all license key objects.
For example, in the following typical license key, the string XXXXXXXXXX is the license
ID, and the trailing block of data is the license data:
The license data defines the device ID for which the license is valid and the version of the
license.
Feature Summary
Feature Name of the licensed feature:
Licenses Used Number of licenses currently being used on the device. Usage is determined by the
configuration on the device. If a feature license exists and that feature is configured, the
license is considered used.
Licenses Installed Number of licenses installed on the device for the particular feature.
Licenses Needed Number of licenses required for legal use of the feature. Usage is determined by the
configuration on the device: If a feature is configured and the license for that feature is not
installed, a single license is needed.
Installed Licenses
ID Unique alphanumeric ID of the license.
Group If the license defines a group license, this field displays the group definition.
If the license requires a group license, this field displays the required group definition.
NOTE: Because group licenses are currently unsupported, this field is always blank.
Enabled Features Name of the feature that is enabled with the particular license.
Expiry Verify that the expiration information for the license is correct.
For Junos OS, only permanent licenses are supported. If a license has expired, it is shown as
invalid.
Related • Junos OS Feature License Model Number for J Series Services Routers and SRX Series
Documentation Services Gateways on page 47
Junos OS Feature License Model Number for J Series Services Routers and SRX Series
Services Gateways
For information about how to purchase a software license, contact your Juniper Networks
sales representative at http://www.juniper.net/in/en/contact-us/.
Each feature license is tied to exactly one software feature, and that license is valid for
exactly one device. Table 11 on page 47 describes the Junos OS features that require
licenses.
SRX3000 SRX5000
SRX100 SRX110 SRX210 SRX220 SRX240 SRX550 SRX650 SRX1400 line line
Feature
Access Manager X X X X X X X
SRX3000 SRX5000
SRX100 SRX110 SRX210 SRX220 SRX240 SRX550 SRX650 SRX1400 line line
Feature
BGP Route X
Reflectors
Dynamic VPN X X X X X X X
IDP Signature X* X X* X* X* X X X X X
Update
Application X X X X X X X X X X
Signature Update
(Application
Identification)
Juniper-Kaspersky X X X X X X X
Antivirus
Juniper-Sophos X X X X X X X X X X
Antivirus
Juniper-Sophos X X X X X X X X X X
Antispam
Juniper-Enhanced X X X X X X X X X X
Web filtering
Juniper-Websense X X X X X X X
Web filtering
Logical Systems X X X
SRX100 Memory X
Upgrade
UTM X* X X* X X* X X X X X
Each license allows you to run the specified advanced software features on a single
device.
Configuration
• USB Modems for Remote Management Setup on page 51
• DHCP for IP Address Device on page 61
• DHCPv6 Client on page 91
• DHCPv6 Local Server on page 99
• Configuration Statements on page 109
• Configuration Statements (System) on page 199
This example shows how to configure a USB modem interface for dial backup.
• Requirements on page 51
• Overview on page 51
• Configuration on page 51
• Verification on page 52
Requirements
No special configuration beyond device initialization is required before configuring this
feature.
Overview
In this example, you create an interface called as umd0 for USB modem connectivity
and set the dialer pool priority to 25. You also configure a modem initialization string to
autoanswer after a specified number of rings. The default modem initialization string is
AT S7=45 S0=0 V1 X4 &C1 E0 Q0 &Q8 %C0. The modem command S0=0 disables the
modem from autoanswering the calls. Finally, you set the modem to act as a dial-in WAN
backup interface.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
1. Create an interface.
[edit]
user@host# edit interfaces umd0
Results From configuration mode, confirm your configuration by entering the show interface umd0
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
[edit]
user@host# show interface umd0
modem-options {
init-command-string "ATS0=2 \n";
dialin routable;
}
dialer-options {
pool usb-modem-dialer-pool priority 25;
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Action From configuration mode, enter the show interfaces umd0 extensive command. The
output shows a summary of interface information and displays the modem status.
This example shows how to configure a logical dialer interface for the device.
• Requirements on page 54
• Overview on page 54
• Configuration on page 54
• Verification on page 56
Requirements
Before you begin:
• Install device hardware and establish basic connectivity. See the Getting Started Guide
for your device.
• Order a US Robotics USB 56k V.92 Modem, model number USR Model 5637, from US
Robotics (http://www.usr.com/).
• Order a dial-up modem for the PC or laptop computer at the remote location from
where you want to connect to the device.
• Order a PSTN line from your telecommunications service provider. Contact your service
provider.
Overview
In this example, you configure a logical dialer interface called dl0 to establish USB
connectivity. You can configure multiple dialer interfaces for different functions on the
device. You add a description to differentiate among different dialer interfaces. For
example, this modem is called USB-modem-remote-management. Configure PPP
encapsulation and set the logical unit as 0. You then specify the name of the dialer pool
as usb-modem-dialer-pool and set the source and destination IP addresses as 172.20.10.2,
and 172.20.10.1, respectively.
NOTE: You cannot configure Cisco High-Level Data Link Control (HDLC) or
Multilink PPP (MLPPP) encapsulation on dialer interfaces used in USB modem
connections.
NOTE: If you configure multiple dialer interfaces, ensure that the same IP
subnet address is not configured on different dialer interfaces. Configuring
the same IP subnet address on multiple dialer interfaces can result in
inconsistency in the route and packet loss. The device might route packets
through another dialer interface with the IP subnet address instead of through
the dialer interface to which the USB modem call is mapped.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
1. Create an interface.
[edit]
user@host# set interfaces dl0
4. Configure the name of the dialer pool to use for USB modem connectivity.
Results From configuration mode, confirm your configuration by entering the show interfaces dl0
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
[edit]
user@host# show interfaces dl0
description USB-modem-remote-management;
encapsulation ppp;
unit 0 {
family inet {
address 172.20.10.2/32 {
destination 172.20.10.1;
}
}
dialer-options {
pool usb-modem-dialer-pool;
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Action From configuration mode, enter the show interfaces dl0 extensive command. The output
shows a summary of dialer interface information.
Physical interface: dl0, Enabled, Physical link is Up
Interface index: 128, SNMP ifIndex: 24, Generation: 129
Type: 27, Link-level type: PPP, MTU: 1504, Clocking: Unspecified, Speed:
Unspecified
Device flags : Present Running
Interface flags: SNMP-Traps
Link type : Full-Duplex
Link flags : Keepalives
Physical info : Unspecified
Hold-times : Up 0 ms, Down 0 ms
Current address: Unspecified, Hardware address: Unspecified
Alternate link address: Unspecified
Last flapped : Never
Statistics last cleared: Never
Traffic statistics:
Input bytes : 13859 0 bps
Output bytes : 0 0 bps
Input packets: 317 0 pps
Output packets: 0 0 pps
Input errors:
Errors: 0, Drops: 0, Framing errors: 0, Runts: 0, Giants: 0, Policed discards:
0,
Resource errors: 0
Output errors:
Carrier transitions: 0, Errors: 0, Drops: 0, MTU errors: 0, Resource errors:
0
Logical interface dl0.0 (Index 70) (SNMP ifIndex 75) (Generation 146)
Description: USB-modem-remote-management
Flags: Point-To-Point SNMP-Traps 0x4000 LinkAddress 23-0 Encapsulation: PPP
Dialer:
State: Active, Dial pool: usb-modem-dialer-pool
Dial strings: 220
Subordinate interfaces: umd0 (Index 64)
Activation delay: 0, Deactivation delay: 0
Initial route check delay: 120
Redial delay: 3
Callback wait period: 5
Load threshold: 0, Load interval: 60
Bandwidth: 115200
Traffic statistics:
This example shows how to configure a dialer interface for USB modem dial-in.
• Requirements on page 57
• Overview on page 57
• Configuration on page 58
• Verification on page 59
Requirements
No special configuration beyond device initialization is required before configuring this
feature.
Overview
To enable connections to the USB modem from a remote location, you must configure
the dialer interfaces set up for USB modem use to accept incoming calls. You can
configure a dialer interface to accept all incoming calls or accept only calls from one or
more caller IDs.
If the dialer interface is configured to accept only calls from a specific caller ID, the system
matches the incoming call's caller ID against the caller IDs configured on its dialer
interfaces. If an exact match is not found and the incoming call's caller ID has more digits
than the configured caller IDs, the system performs a right-to-left match of the incoming
call's caller ID with the configured caller IDs and accepts the incoming call if a match is
found. For example, if the incoming call's caller ID is 4085550115 and the caller ID
configured on a dialer interface is 5550115, the incoming call is accepted. Each dialer
interface accepts calls from only callers whose caller IDs are configured on it.
You can configure the following incoming map options for the dialer interface:
You can configure the accept-all option for only one of the dialer interfaces associated
with a USB modem physical interface. The device uses the dialer interface with the
accept-all option configured only if the incoming call's caller ID does not match the
caller IDs configured on other dialer interfaces.
• caller—Dialer interface accepts calls from a specific caller ID—for example, 4085550115.
You can configure a maximum of 15 caller IDs per dialer interface.
The same caller ID must not be configured on different dialer interfaces. However, you
can configure caller IDs with more or fewer digits on different dialer interfaces. For
example, you can configure the caller IDs 14085550115, 4085550115, and 5550115 on
different dialer interfaces.
In this example, you configure the incoming map option as caller 4085550115 for dialer
interface dl0.
Configuration
CLI Quick To quickly configure this example, copy the following command, paste it into a text file,
Configuration remove any line breaks, change any details necessary to match your network configuration,
and then copy and paste the command into the CLI at the [edit] hierarchy level.
[edit]
user@host# edit interfaces dl0
[edit]
user@host# edit unit 0 dialer-options incoming-map caller 4085551515
[edit]
user@host# commit
Verification
To verify the configuration is working properly, enter the show interface dl0 command.
To remotely connect to the USB modem connected to the USB port on the device, you
must configure a dial-up modem connection on the PC or laptop computer at your remote
location. Configure the dial-up modem connection properties to disable IP header
compression.
5. Click Next. The New Connection Wizard: Network Connection Type page appears.
7. Select Dial-up connection, and then click Next. The New Connection Wizard: Connection
Name page appears.
8. In the Company Name box, type the dial-up connection name, for example
USB-modem-connect. Then, click Next. The New Connection Wizard: Phone Number
to Dial page appears.
9. In the Phone number box, type the telephone number of the PSTN line connected to
the USB modem at the device end.
10. Click Next twice, and then click Finish. The Connect USB-modem-connect page
appears.
11. If CHAP is configured on the dialer interface used for the USB modem interface at the
device end, type the username and password configured in the CHAP configuration
in the User name and Password boxes.
13. In the Networking tab, select Internet Protocol (TCP/IP), and then click Properties.
The Internet Protocol (TCP/IP) Properties page appears.
• Requirements on page 62
• Overview on page 62
• Configuration on page 62
• Verification on page 65
Requirements
Before you begin:
• Determine the IP address pools and the lease durations to use for each subnet.
• Obtain the MAC addresses of the clients that require permanent IP addresses. Determine
the IP addresses to use for these clients.
• List the IP addresses that are available for the servers and devices on your network;
for example, DNS, NetBIOS servers, boot servers, and gateway devices. See the
Understanding Management Predefined Policy Applications.
• Determine the DHCP options required by the subnets and clients in your network.
Overview
In this example, you configure the device as a DHCP server. You specify the IP address
pool as 192.168.2.0/24 and from a low range of 192.168.2.2 to a high range of 192.168.2.254.
You set the default-lease-time to 1,209,600 and the maximum-lease-time to 2,419,200.
You then set the domain search suffixes as mycompany.net and mylab.net. These suffixes
specify the domain search list used by a client when resolving hostnames with DNS.
Then you specify the DNS server IP address as 192.168.10.2. You set the IP address for
the device solicitation address option (option 32) as 192.168.2.33. The IP address excluded
from the IP address pool is reserved for this option. Finally, you assign a fixed IP address
as 192.168.2.50 with the MAC address of the client, 01:03:05:07:09:0B.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
3. Next to Services, make sure the check box is selected, and click Configure.
5. Define the IP address pool. Next to Pool, click Add new entry.
11. Define the default and maximum lease times, in seconds. From the Default lease time
list, select Enter Specific Value.
13. From the Maximum lease time list, select Enter Specific Value.
15. Define the domain search suffixes to be used by the clients. Next to Domain search,
click Add new entry.
21. Define a DNS server. Next to Name server, click Add new entry.
24. Define DHCP option 32, the device solicitation address option. Next to Option, click
Add new entry.
29. Assign a static IP address to a MAC address.Next to Static binding, click Add new entry.
35. If you are done configuring the device, click Commit Options>Commit.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
[edit]
user@host# edit system services dhcp
Results From configuration mode, confirm your configuration by entering the show system services
dhcp command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
[edit]
user@host# show system services dhcp
pool 192.168.2.0/24 {
address-range low 192.168.2.2 high 192.168.2.254;
maximum-lease-time 2419200;
default-lease-time 1209600;
name-server {
192.168.10.2;
}
domain-search {
mycompany.net;
mylab.net;
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Verify that the global DHCP Information has been configured for the device.
Action From operational mode, enter the show system services dhcp global command.
Global settings:
BOOTP lease length infinite
DHCP lease times:
Default lease time 1 day
Minimum lease time 1 minute
Maximum lease time infinite
DHCP options:
Name: domain-name, Value: mylablab.example.net
Name: name-server, Value: [ 192.168.5.68, 172.17.28.101, 172.17.28.100 ]
Purpose Verify that the DHCP binding database reflects the DHCP server configuration.
• show system services dhcp binding command to display all active bindings in the
database.
• show system services dhcp binding address detail command (where address is the IP
address of the client) to display more information about a client.
• show system services dhcp conflict command to show any potential conflicts with the
bindings.
IP address 3.3.3.2
Hardware address 00:a0:12:00:13:02
Pool 3.3.3.0/24
Interface fe-0/0/0, relayed by 3.3.3.200
Lease information:
Type DHCP
Obtained at 2004-05-02 13:01:42 PDT
Expires at 2004-05-03 13:01:42 PDT
State active
DHCP options:
Name: name-server, Value: { 6.6.6.6, 6.6.6.7 }
Name: domain-name, Value: mydomain.tld
Code: 32, Type: ip-address, Value: 3.3.3.33
Purpose Verify that the DHCP server operation has been configured.
• ping command to verify that a client responds to ping packets containing the destination
IP address assigned by the device.
• ipconfig /all command to display the IP configuration on the client. For example, on a
PC running Microsoft Windows, enter ipconfig /all at the command prompt to display
the PC's IP configuration.
• Requirements on page 67
• Overview on page 67
• Configuration on page 68
• Verification on page 70
Requirements
Before you begin:
• Determine the IP address pools and the lease durations to use for each subnet.
• Obtain the MAC addresses of the clients that require permanent IP addresses. Determine
the IP addresses to use for these clients.
• List the IP addresses that are available for the servers and devices on your network;
for example, DNS, NetBIOS servers, boot servers, and gateway devices. See the
Understanding Management Predefined Policy Applications.
• Determine the DHCP options required by the subnets and clients in your network.
Overview
In this example, you configure the device as a DHCP client. You specify the interface as
ge-0/0/1, set the logical unit as 0, and create a DHCP inet family. You then specify the
Then you set the number of retransmission attempts to 6. The range is from 0 through
6, and the default is 4. You set the retransmission interval to 5 seconds. The range is from
4 through 64, and the default is 4 seconds. Finally, you set the IPv4 address of the
preferred DHCP server to 10.1.1.1 and the vendor class ID to ether.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
4. Under Family, select the Inet check box and click Edit.
6. Configure the DHCP client identifier as either an ASCII or hexadecimal value. Next to
Client identifier, click Configure.
9. Click OK.
10. Set the DHCP lease time in seconds. From the Lease time list, select Enter Specific
Value.
12. Set the retransmission number of attempts. In the Retransmission attempt box, type
6.
13. Set the retransmission interval in seconds. In the Retransmission interval box, type 5.
14. Set the IPv4 address of the preferred DHCP server. In the Server address box, type
10.1.1.1.
15. Set the vendor class ID. In the Vendor id box, type ether.
18. If you are done configuring the device, click Commit Options>Commit.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
[edit]
user@host# edit interfaces ge-0/0/1 unit 0 family inet dhcp
5. Set the interval (in seconds) allowed between retransmission attempts. The range
is 4 through 64. The default is 4 seconds.
Results From configuration mode, confirm your configuration by entering the show interfaces
ge-0/0/1 unit 0 family inet command. If the output does not display the intended
configuration, repeat the configuration instructions in this example to correct it.
[edit]
user@host# show interfaces ge-0/0/1 unit 0 family inet
dhcp {
client-identifier hexadecimal 00:0a:12:00:12:12;
lease-time 86400;
retransmission-attempt 6;
retransmission-interval 5;
server-address 10.1.1.1;
update-server;
vendor-id ether;
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Verify that the DHCP client information has been configured.
• show system services dhcp client command to display DHCP client information.
• show system services dhcp client interface-name command to display more information
about a specific interface.
• show system services dhcp client statistics command to show client statistics.
DHCP Options:
Name: name-server, Value: [ 10.209.194.131, 2.2.2.2, 3.3.3.3 ]
Name: server-identifier, Value: 10.1.1.1
Name: router, Value: [ 10.1.1.80 ]
Name: domain-name, Value: netscreen-50
DHCP Options:
Packets dropped:
Total 0
Messages Received:
DHCPOFFER 0
DHCPACK 8
DHCPNAK 0
Messages Sent:
DHCPDECLINE 0
DHCPDISCOVER 0
DHCPREQUEST 1
DHCPINFORM 0
DHCPRELEASE 0
DHCPRENEW 7
DHCPREBIND 0
This example shows how to configure the device as a BOOTP or DHCP relay agent.
• Requirements on page 71
• Overview on page 71
• Configuration on page 72
• Verification on page 75
Requirements
No special configuration beyond device initialization is required before configuring this
feature.
Overview
In this example, you enable the DHCP relay agent to relay BOOTP or DHCP messages to
a BOOTP server. You enable VPN encryption to allow client requests to pass through the
VPN tunnel. You specify the IP time-to-live value to be set in responses to the client as
20. The range is from 1 through 255. You then set the maximum number of hops allowed
per packet to 10. The range is from 4 through 16.
Then you specify the minimum number of seconds before requests are forwarded as
300. The range is from 0 through 30,000 seconds. You set the description of the server
(the value is a string), and you specify a valid server name or address to the server to
forward (the value is an IPv4 address). You define the routing instance, whose value is
a nonreserved text string of 128 or fewer characters. You then specify the incoming BOOTP
or DHCP request forwarding interface as ge-0/0/0. You enable the broadcast option if
the Layer 2 interface is unknown.
You then specify the IP time-to-live value to be set in responses to the client as 30. The
range is from 1 through 255. You set the description of the server as text and the DHCP
option as 82. You set the maximum number of hops allowed per packet to 20 and specify
the minimum number of seconds as 400 before requests are forwarded. You enable the
no listen option. Finally, you enable VPN encryption to allow client requests to pass
through the VPN tunnel.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
2. Select the DHCP relay agent check box to enable the BOOTP/DHCP relay agent.
10. Define the routing instance. Next to Routing instance, click Add new entry.
11. In the Name box, type rt-i-1 and click OK. A routing instance is optional.
12. Add a new interface. Next to Interface, click Add new entry.
13. In the Interface name box, type the interface name. For example, type ge-0/0/0.
23. If you are done configuring the device, click Commit Options>Commit.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
[edit]
user@host# edit forwarding-options helpers bootp
user@host# set relay agent-option
2. Enable VPN encryption to allow client requests to pass through VPN tunnel.
17. Enable VPN encryption to allow client requests to pass through the VPN tunnel.
Results From configuration mode, confirm your configuration by entering the show
forwarding-options command. If the output does not display the intended configuration,
repeat the configuration instructions in this example to correct it.
[edit]
user@host# show forwarding-options
helpers {
bootp {
relay-agent-option;
description text;
server 2.2.2.2 routing-instance rt-i-1;
maximum-hop-count 10;
minimum-wait-time 300;
client-response-ttl 20;
vpn;
interface {
ge-0/0/0 {
no-listen;
broadcast;
description text;
maximum-hop-count 20;
minimum-wait-time 400;
client-response-ttl 30;
vpn;
dhcp-option82;
}
}
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Verify that the DHCP Relay statistics have been configured.
Action From operational mode, enter the show system services dhcp relay-statistics command.
Supported Platforms J Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
This following sample output shows the minimum configuration you must use to configure
an SRX Series device as a DHCP local server. In this output, the server group is named
bob, and the DHCP local server is enabled on interface ge-1/0/1.0 within the group.
[edit access]
address-assignment {
pool verizon family inet {
network 192.168.1.0/24;
}
}
NOTE: You can configure the DHCP local server in a routing instance by using
the dhcp-local server, interface, and address-assignment statements in the
[edit routing-instances] hierarchy level.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
The address-assignment pool feature enables you to create address pools that can be
shared by different client applications.
1. Configure the address-assignment pool name and specify the addresses for the pool.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
When configuring an address-assignment pool, you must specify the name of the pool
and its addresses.
1. Configure the name of the pool and specify the IPv4 family.
[edit access]
user@host# edit address-assignment pool blr-pool family inet
2. Configure the network address and the prefix length of the addresses in the pool.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
You can optionally configure multiple named ranges, or subsets, of addresses within an
address-assignment pool. During a dynamic address assignment, a client can be assigned
an address from a specific named range. To create a named range, you specify a name
for the range and define the address range.
[edit access]
user@host# edit address-assignment pool blr-pool family inet
2. Configure the name of the range and the lower and upper boundaries of the addresses
in the range.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
You can optionally create a static IPv4 address binding by reserving a specific address
for a particular client. The address is removed from the address-assignment pool so that
it is not assigned to another client. When you reserve an address, you identify the client
host and create a binding between the client MAC address and the assigned IP address.
1. Specify the name of the IPv4 address-assignment pool containing the IP address you
want to reserve for the client.
[edit access]
user@host# edit address-assignment pool blr-pool family inet
2. Specify the name of the client for the static binding, the client MAC address, and the
IP address to reserve for the client. This configuration specifies that the client with
MAC address 01:03:05:07:09:0b is always assigned IP address 192.168.10.2.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
You use the dhcp-attributes statement to configure DHCP client-specific attributes for
address-assignment pools.
[edit access]
user@host# edit address-assignment pool blr-pool family inet
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Purpose View or clear information about client address bindings and statistics for the DHCP local
server.
Action • To display the address bindings in the client table on the DHCP local server:
• To clear the binding state of a DHCP client from the client table on the DHCP local
server:
Supported Platforms J Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
The following sample output shows the minimum configuration you must use to configure
an SRX Series device as a DHCP client. In this output, the interface is ge-0/0/0 and the
logical unit is 0.
[edit interfaces]
ge-0/0/0 {
unit 0 {
family inet {
dhcp-client
}
}
}
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
For the device to operate as a DHCP client, you configure a logical interface on the device
to obtain an IP address from the DHCP local server in the network. You can then set the
client-identifier, lease time, retransmission attempts, retry interval, preferred DHCP local
server address, and vendor class ID.
1. Configure the DHCP client identifier prefix as the routing instance name.
4. Set the interval (in seconds) allowed between retransmission attempts. The range
is 4 through 64. The default is 4 seconds.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Purpose View or clear information about client address bindings and statistics for the DHCP client.
Action • To display the address bindings in the client table on the DHCP client:
• To clear the binding state of a DHCP client from the client table on the DHCP client:
Supported Platforms J Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
The following sample output shows the minimum configuration you must use to configure
an SRX Series device as a DHCP relay agent. In this output, the active server group is
named server-1 and its IP address is 1.1.1.1/24. The DHCP relay agent configuration is
applied to a group named bob. Within this group, the DHCP relay agent is enabled on
interface ge-1/0/1.0.
[edit forwarding-options]
dhcp-relay {
group bob {
interface ge-1/0/1.0
}
server-group server-1 {
address 1.1.1.1/24
}
active-server-group server-1
}
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Purpose View or clear address bindings or statistics for DHCP relay agent clients.
Action • To display the address bindings for DHCP relay agent clients:
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
This following sample output shows the minimum configuration you must use to configure
an SRX Series device as a DHCP local server. In this output, the server group is named
bob, and the DHCP local server is enabled on interface ge-1/0/1.0 within the group.
[edit access]
address-assignment {
pool verizon family inet {
network 192.168.1.0/24;
}
}
}
}
NOTE: You can configure the DHCP local server in a routing instance by using
the dhcp-local server, interface, and address-assignment statements in the
[edit routing-instances] hierarchy level.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
The address-assignment pool feature enables you to create address pools that can be
shared by different client applications.
1. Configure the address-assignment pool name and specify the addresses for the pool.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
When configuring an address-assignment pool, you must specify the name of the pool
and its addresses.
1. Configure the name of the pool and specify the IPv4 family.
[edit access]
user@host# edit address-assignment pool blr-pool family inet
2. Configure the network address and the prefix length of the addresses in the pool.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
You use the dhcp-attributes statement to configure DHCP client-specific attributes for
address-assignment pools.
[edit access]
user@host# edit address-assignment pool blr-pool family inet
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
You can optionally configure multiple named ranges, or subsets, of addresses within an
address-assignment pool. During a dynamic address assignment, a client can be assigned
an address from a specific named range. To create a named range, you specify a name
for the range and define the address range.
[edit access]
user@host# edit address-assignment pool blr-pool family inet
2. Configure the name of the range and the lower and upper boundaries of the addresses
in the range.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
You can optionally create a static IPv4 address binding by reserving a specific address
for a particular client. The address is removed from the address-assignment pool so that
it is not assigned to another client. When you reserve an address, you identify the client
host and create a binding between the client MAC address and the assigned IP address.
1. Specify the name of the IPv4 address-assignment pool containing the IP address you
want to reserve for the client.
[edit access]
user@host# edit address-assignment pool blr-pool family inet
2. Specify the name of the client for the static binding, the client MAC address, and the
IP address to reserve for the client. This configuration specifies that the client with
MAC address 01:03:05:07:09:0b is always assigned IP address 192.168.10.2.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
This topic describes how to configure TCP/IP settings on a DHCP local server, which
includes a DHCP client and a DHCP local server.
2. Configure the address pool to specify the interface (where update-server is configured)
from which TCP/IP settings can be propagated.
[edit access]
address-assignment {
pool sprint family inet {
network 192.168.2.0/24;
dhcp-attributes {
propagate-settings ge-0/0/1.0;
}
}
}
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
The following sample output shows the minimum configuration you must use to configure
an SRX Series device as a DHCP client. In this output, the interface is ge-0/0/0 and the
logical unit is 0.
[edit interfaces]
ge-0/0/0 {
unit 0 {
family inet {
dhcp-client
}
}
}
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
For the device to operate as a DHCP client, you configure a logical interface on the device
to obtain an IP address from the DHCP local server in the network. You can then set the
client-identifier, lease time, retransmission attempts, retry interval, preferred DHCP local
server address, and vendor class ID.
1. Configure the DHCP client identifier prefix as the routing instance name.
4. Set the interval (in seconds) allowed between retransmission attempts. The range
is 4 through 64. The default is 4 seconds.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
The following sample output shows the minimum configuration you must use to configure
an SRX Series device as a DHCP relay agent. In this output, the active server group is
named server-1 and its IP address is 1.1.1.1/24. The DHCP relay agent configuration is
applied to a group named bob. Within this group, the DHCP relay agent is enabled on
interface ge-1/0/1.0.
[edit forwarding-options]
dhcp-relay {
group bob {
interface ge-1/0/1.0
}
server-group server-1 {
address 1.1.1.1/24
}
active-server-group server-1
}
DHCPv6 Client
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
This topic describes the minimum configuration you must use to configure an SRX Series
device as a DHCPv6 client.
[edit]
user@host# set interfaces ge-0/0/0 unit 0 family inet6 dhcpv6-client
2. Configure the DHCPv6 client type. The client type can be autoconfig or statefull.
• To enable DHCPv6 auto configuration mode, configure the client type as autoconfig.
4. Configure the DHCPv6 client identifier by specifying the DHCP unique identifier (DUID)
type. The following DUID types are supported:
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
• dns-server
• domain
• ntp-server
• sip-domain
• sip-server
2. Set the number of attempts allowed to retransmit a DHCPv6 client protocol packet.
5. Configure the two-message (rapid commit) exchange option for address assignment.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
[edit]
user@host# set interfaces ge-0/0/0 unit 0 family inet6 dhcpv6-client
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
The DHCPv6 client requests IPv6 addresses and prefixes from the DHCPv6 server. Based
on the DHCPv6 server’s response, the DHCPv6 client assigns the IPv6 addresses to
interfaces and sets a lease time for all valid responses. When the lease time expires, the
DHCPv6 client renews the lease from the DHCPv6 server.
[edit]
user@host# set interfaces ge-0/0/0 unit 0 family inet6 dhcpv6-client
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
You can use DHCPv6 client prefix delegation to automate the delegation of IPv6 prefixes
to the customer premises equipment (CPE). With prefix delegation, a delegating router
delegates IPv6 prefixes to a requesting router. The requesting router then uses the prefixes
to assign global IPv6 addresses to the devices on the subscriber LAN. The requesting
router can also assign subnet addresses to subnets on the LAN.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
The DHCPv6 client can obtain configuration parameters from a DHCPv6 server through
a rapid two-message exchange (solicit and reply). When the rapid commit option is
enabled by both the DHCPv6 client and the DHCPv6 server, the two-message exchange
is used, rather than the default four-method exchange (solicit, advertise, request, and
reply). The two-message exchange provides faster client configuration and is beneficial
in environments in which networks are under a heavy load.
To configure the DHCPv6 client to support the DHCPv6 rapid commit option:
[edit]
user@host# set interfaces ge-0/0/0 unit 0 family inet6 dhcpv6-client
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
A DHCPv6 client configured in autoconfig mode acts as a stateful client, a stateless client
(DHCPv6 server is required for TCP/IP configuration), and stateless–no DHCP client,
based on the managed (M) and other configuration (O) bits in the received router
advertisement messages.
If the managed bit is 1 and the other configuration bit is 0, the DHCPv6 client acts as a
stateful client. In stateful mode, the client receives IPv6 addresses from the DHCPv6
server, based on the identity association for nontemporary addresses (IA_NA) assignment.
If the managed bit is 0 and the other configuration bit is 1, the DHCPv6 client acts as a
stateless client. In stateless mode, the addresses are automatically configured, based
on the prefixes in the router advertisement messages received from the router. The
stateless client receives configuration parameters from the DHCPv6 server.
If the managed bit is 0 and the other configuration bit is also 0, the DHCPv6 client acts
as a stateless–no DHCP client. In the stateless–no DHCP mode, the client receives IPv6
addresses from the router advertisement messages.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
You can enable or disable the propagation of TCP/IP settings received on the device
acting as a DHCPv6 client. The settings can be propagated to the server pool running on
the device. This topic describes how to configure TCP/IP settings on a DHCPv6 client,
where both the DHCPv6 client and DHCPv6 server are on the same device.
2. Configure the address pool to specify the interface (where update-server is configured)
from which TCP/IP settings can be propagated.
[edit access]
user@host# set address-assignment pool 2 family inet6 dhcp-attributes
propagate-settings ge-0/0/0
For the DHCPv6 server to allow DHCPv6 requests, you must create a security policy to
enable DHCPv6 traffic. In this example, the zone my-zone allows DHCPv6 traffic from
the zone untrust, and the ge-0/0/3.0 interface is configured with the IPv6 address 3000:1.
3. If you are done configuring the device, enter commit from configuration mode.
Requirements
Before you begin:
• Determine the grace period, maximum lease time, or any custom options that should
be applied to clients.
• List the IP addresses that are available for the devices on your network; for example,
DNS and SIP servers.
Overview
In this example, you set a default client limit as 100 for all DHCPv6 groups. You then
create a group called my-group that contains at least one interface. In this case, the
interface is ge-0/0/3.0. You set a range of interfaces using the upto command and set
a custom client limit as 200 for group my-group that overrides the default limit. Finally,
you configure interface ge-0/0/3.0 with IPv6 address 3000::1/64 and set router
advertisement for interface ge-0/0/3.0.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
[edit]
user@host# edit system services dhcp-local-server dhcpv6
[edit interfaces]
user@host# set ge-0/0/3 unit 0 family inet6 address 3000::1/64
[edit protocols]
user@host# set router-advertisement interface ge-0/0/3.0 prefix 3000::/64
Results From configuration mode, confirm your configuration by entering the show system services
dhcp-local-server, show interfaces ge-0/0/3, and show protocols commands. If the output
does not display the intended configuration, repeat the configuration instructions in this
example to correct it.
[edit]
user@host# show system services dhcp-local-server
dhcpv6 {
overrides {
interface-client-limit 100;
}
group my-group {
overrides {
interface-client-limit 200;
}
interface ge-0/0/3.0 {
upto ge-0/0/6.0;
}
}
}
[edit]
user@host# show interfaces ge-0/0/3
unit 0 {
family inet6 {
address 3000::1/64;
}
}
[edit]
user@host# show protocols
router-advertisement {
interface ge-0/0/3.0 {
prefix 3000::1/64;
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Verify that the client address bindings and statistics for the DHCPv6 local server have
been configured
• show dhcpv6 server binding command to display the address bindings in the client
table on the DHCPv6 local server.
• show dhcpv6 server statistics command to display the DHCPv6 local server statistics.
• clear dhcpv6 server bindings all command to clear all DHCPv6 local server bindings.
You can clear all bindings or clear a specific interface, or routing instance.
• clear dhcpv6 server statistics command to clear all DHCPv6 local server statistics.
• Configuring a Named Address Range for Dynamic Address Assignment on page 105
Requirements
Before you begin:
• Specify the name of the address-assignment pool and configure addresses for the
pool.
Overview
In this example, you configure an address-pool called my-pool and specify the IPv6 family
as inet6. You configure the IPv6 prefix as 3000:0000::/10, the range name as range1,
and the IPv6 range for DHCPv6 clients from a low of 3000:0000::/32 to a high of
3000:1000::/32. You can define the range based on the lower and upper boundaries of
the prefixes in the range or based on the length of the prefixes in the range. Finally, you
specify the DHCPv6 attribute for the DNS server as 3001::1, the grace period as 3600,
and the maximum lease time as 120.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
[edit access]
user@host# edit address-assignment pool my-pool family inet6
2. Configure the IPv6 prefix, the range name, and IPv6 range for DHCPv6 clients.
3. Configure the DHCPv6 attribute for the DNS server for the address pool.
Results From configuration mode, confirm your configuration by entering the show access
address-assignment command. If the output does not display the intended configuration,
repeat the configuration instructions in this example to correct it.
[edit]
user@host# show access address-assignment
pool my-pool {
family inet6 {
prefix 3000:0000::/10;
range range1 {
low 3000:0000::/32;
high 3000:1000::/32;
}
dhcp-attributes {
maximum-lease-time 120;
grace-period 3600;
dns-server {
3001::1;
}
}
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Verifying Configuration
Action From operational mode, enter the show access address-assignment command.
• Configuring a Named Address Range for Dynamic Address Assignment on page 105
You can optionally configure multiple named ranges, or subsets of addresses, within an
address-assignment pool. During dynamic address assignment, a client can be assigned
an address from a specific named range. To create a named range, you specify a name
for the range and define the address range and DHCPv6 attributes.
1. Specify the name of the address-assignment pool and the IPv6 family.
[edit access]
user@host# edit address-assignment pool my-pool2 family inet6
2. Configure the IPv6 prefix and then define the range name and IPv6 range for DHCPv6
clients. You can define the range based on the lower and upper boundaries of the
prefixes in the range, or based on the length of the prefixes in the range.
4. If you are done configuring the device, enter commit from configuration mode.
Address-assignment pool linking enables you to specify a secondary address pool for
the device to use when the primary address-assignment pool is fully allocated. When
the primary pool has no available addresses remaining, the device automatically switches
over to the linked secondary pool and begins allocating addresses from that pool. The
device uses a secondary pool only when the primary address-assignment pool is fully
allocated.
You can create a chain of multiple linked pools. For example, you can link pool A to pool
B, and link pool B to pool C. When pool A has no available addresses, the device switches
to pool B for addresses. When pool B is exhausted, the device switches to pool C. There
is no limit to the number of linked pools in a chain. However, you cannot create multiple
links to or from the same pool—a pool can be linked to only one secondary pool, and a
secondary pool can be linked from only one primary pool.
Table 12 on page 107 describes the DHCPv6 client attributes for configuring IPv6
address-assignment pools.
You can create an address-assignment pool that is explicitly used for router advertisement
address assignment. You populate the address-assignment pool using the standard
procedure, but you additionally specify that the pool is used for router advertisement.
3. If you are done configuring the device, enter commit from configuration mode.
Configuration Statements
security {
certificates {
cache-size bytes;
cache-timeout-negative seconds;
certification-authority profile-name {
ca-name name;
crl filename;
encoding (binary | pem);
enrollment-url url;
file filename;
ldap-url url;
}
enrollment-retry number;
local name {
certificate;
load-key-file url;
}
maximum-certificates number;
path-length length;
}
}
security {
ssh-known-hosts {
fetch-from-server server-name;
host hostname {
dsa-key dsa-key;
ecdsa-sha2-nistp256-key ecdsa-sha2-nistp256-key;
ecdsa-sha2-nistp384-key ecdsa-sha2-nistp384-key;
ecdsa-sha2-nistp521-key ecdsa-sha2-nistp521-key;
rsa-key rsa-key;
rsa1-key rsa1-key;
}
load-key-file key-file;
}
}
interfaces {
interface-name {
accounting-profile name;
clocking (external | internal);
dce;
description text;
disable;
e1-options {
bert-algorithm algorithm;
bert-error-rate rate;
bert-period seconds;
fcs (16 | 32);
framing (g704 | g704-no-crc4 | unframed);
idle-cycle-flag (flags | ones);
invert-data data;
loopback (local | remote);
start-end-flag (shared | filler);
timeslots time-slot-range;
}
e3-options {
bert-algorithm algorithm;
bert-error-rate rate;
bert-period seconds;
compatibility-mode {
digital-link {
subrate value;
}
kentrox {
subrate value;
}
larscom;
}
fcs (16 | 32);
framing (g.751 | g.832);
idle-cycle-flag value;
invert-data;
loopback (local | remote);
(no-payload-scrambler | payload-scrambler);
(no-unframed | -unframed);
start-end-flag (filler | shared);
}
encapsulation (ether-vpls-ppp | ethernet-bridge | ethernet-ccc | ethernet-tcc |
ethernet-vpls | extended-frame-relay-ccc | extended-frame-relay-tcc |
extended-vlan-bridge | extended-vlan-ccc | extended-vlan-tcc | extended-vlan-vpls
| frame-relay-port-ccc | vlan-ccc | vlan-vpls);
fastether-options {
802.3ad interface-name {
(backup | primary);
lacp {
port-priority port-number;
}
}
(auto-negotiation | no-auto-negotiation);
ignore-l3-incompletes;
ingress-rate-limit rate;
(loopback | no-loopback);
mpls {
pop-all-labels {
required-depth number;
}
}
redundant-parent interface-name;
source-address-filter mac-address;
}
flexible-vlan-tagging;
gigether-options {
802.3ad interface-name {
(backup | primary);
lacp {
port-priority port-number;
}
}
(auto-negotiation <remote-fault> (local-interface-offline | local-interface-online)
| no-auto-negotiation);
(flow-control | no-flow-control);
ignore-l3-incompletes;
(loopback | no-loopback);
mpls {
pop-all-labels {
required-depth [number];
}
}
redundant-parent interface-name;
source-address-filter mac-address;
}
gratuitous-arp-reply;
hierarchical-scheduler {
maximum-hierarchy-levels 2;
}
hold-time {
down milliseconds;
up milliseconds;
}
keepalives {
down-count number;
interval number;
up-count number;
}
link-mode (full-duplex | half-duplex);
lmi {
lmi-type (ansi | c-lmi | itu);
n391dte number;
n392dce number;
n392dte number;
n393dce number;
n393dte number;
t391dte number;
t392dce number;
}
logical-tunnel-options {
per-unit-mac-disable;
}
mac mac-address;
mtu bytes;
native-vlan-idvlan-id;
no-gratuitous-arp-request;
no-keepalives;
optics-options {
alarm {
low-light-alarm (link-down | syslog);
}
warning {
low-light-warning (link-down | syslog);
}
wavelength wavelength-options;
}
otn-options {
bytes {
transmit-payload-type number];
}
fec (efec | gfec | none);
(laser-enable | no-laser-enable);
(line-loopback | no-line-loopback);
rate (fixed-stuff-bytes | no-fixed-stuff-bytes | pass-thru);
trigger {
oc-lof {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
oc-lom {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
oc-los {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
oc-wavelength-lock {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
odu-ais {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
odu-bdi {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
odu-lck {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
odu-oci {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
odu-sd {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
odu-tca-bbe {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
odu-tca-es {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
odu-tca-ses {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
odu-tca-uas {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
odu-ttim {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
opu-ptim {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
otu-ais {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
otu-bdi {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
otu-bdi {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
otu-fec-deg {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
otu-fec-deg {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
otu-fec-exe {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
otu-iae {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
otu-sd {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
otu-tca-bbe {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
otu-tca-es {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
otu-tca-ses {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
otu-tca-uas {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
otu-ttim {
hold-time {
down milliseconds;
up milliseconds;
}
ignore;
}
}
tti (odu-dapi | odu-expected-receive-dapi | odu-expected-receive-sapi | odu-sapi |
otu-dapi |otu-expected-receive-dapi | otu-expected-receive-sapi |otu-sapi);
}
passive-monitor-mode;
(per-unit-scheduler | no-per-unit-schedule);
port-mirror-instance;
ppp-options {
chap {
access-profile name;;
default-chap-secret secret;
local-name name;
no-rfc2486;
passive;
}
compression {
acfc;
pfc;
}
dynamic-profile (dynamic-profile | junos-default-profile);
lcp-max-conf-req number;
lcp-restart-timer milliseconds;
loopback-clear-timer seconds;
ncp-max-conf-req number;
ncp-restart-timer milliseconds;
no-termination-request;
pap {
access-profile name;
default-password password;
local-name name;
local-password password;
no-rfc2486;
passive;
}
}
promiscuous-mode;
receive-bucket {
overflow {
discard;
tag;
}
rate number;
threshold number;
}
redundant-pseudo-interface-options {
redundancy-group number;
}
satop-options {
excessive-packet-loss-rate {
sample-period milliseconds;
threshold percentage;
}
idle-pattern number;
(jitter-buffer-auto-adjust | jitter-buffer-latency milliseconds | jitter-buffer-packets
number;
payload-size number;
}
speed (100m |10m | 1g);
stacked-vlan-tagging;
switch-options {
switch-port port-number {
(auto-negotiation | no-auto-negotiation);
cascade-port;
link-mode (full-duplex | half-duplex);
speed (100m |10m | 1g);
vlan-id number;
}
}
t1-options {
alarm-compliance {
accunet-t1-5-service;
}
bert-algorithm algorithm;
bert-error-rate rate;
bert-period seconds;
buildout value;
byte-encoding (nx56 | nx64);
fcs (16 | 32);
framing (esf | sf);
idle-cycle-flags (flags | ones);
invert-data;
line-encoding (ami | b8zs);
loopback (local | payload | remote);
remote-loopback-respond;
start-end-flag (filler | shared);
timeslots time-slot-range;
}
t3-options {
bert-algorithm algorithm ;
bert-error-rate rate ;
bert-period seconds ;
(cbit-parity | no-cbit-parity);
compatibility-mode {
adtran {
subrate value;
}
digital-link {
subrate value;
}
kentrox {
subrate value;
}
larscom;
subrate value;
}
verilink;
subrate value;
}
}
fcs (16 | 32);
(feac-loop-respond | no-feac-loop-respond);
idle-cycle-flag (flags | ones);
(long-buildout | no-long-buildout);
(loop-timing | no-loop-timing);
loopback (local | payload | remote);
(no-payload-scrambler | payload-scrambler);
(no-unframed | unframed);
start-end-flag value (filler | shared);
}
traceoptions {
flag (all | event | ipc | media);
}
transmit-bucket {
overflow {
discard;
}
rate number;
threshold number;
}
(traps | no-traps);
unit unit-number {
accept-source-mac {
mac-address mac-address;
}
accounting-profile name;
arp-resp (restricted | unrestricted);
backup-options {
interface interface-name;
}
bandwidth bandwidth;
description text;
disable;
encapsulation (dix | ether-vpls-fr | frame-relay-ppp | ppp-over-ether | vlan-bridge |
vlan-ccc | vlan-vpls |vlan-tcc);
family {
bridge {
bridge-domain-type (svlan| bvlan);
filter {
group number;
input filter-name;
input-list [filter-name];
output filter-name;
output-list [filter-name];
}
interface-mode (access | trunk);
policer {
input input-policer-name;
output outputpolicer-name;
}
vlan-id vlan-id;
vlan-id-list [vlan-id];
vlan-rewrite {
translate {
from-vlan-id;
to-vlan-id ;
}
}
}
ccc {
filter {
group number;
input filter-name;
input-list [filter-name];
output filter-name;
output-list [filter-name];
}
policer {
input input-policer-name;
output output-policer-name;
}
}
ethernet-switching {
native-vlan-id native-vlan-id;
port-mode (access | tagged-access | trunk);
reflective-relay;
vlan {
members [member-name];
}
}
inet {
accounting {
destination-class-usage;
source-class-usage {
input;
output;
}
}
address (source–address/prefix) {
arp destination-address {
(mac mac-address | multicast-mac multicast-mac-address);
publish publish-address;
}
broadcast address;
preferred;
primary;
vrrp-group group-id {
(accept-data | no-accept-data);
advertise-interval seconds;
advertisements-threshold number;
authentication-key key-value;
authentication-type (md5 | simple);
fast-interval milliseconds;
inet6-advertise-interval milliseconds
(preempt <hold-timeseconds> | no-preempt );
priority value;
track {
interface interface-name {
bandwidth-threshold bandwidth;
priority-cost value;
}
priority-hold-time seconds;
route route-address{
routing-instance routing-instance;
priority-cost value;
}
}
virtual-address [address];
virtual-link-local-address address;
vrrp-inherit-from {
active-group value;
active-interface interface-name;
}
}
web-authentication {
http;
https;
redirect-to-https;
}
}
dhcp {
client-identifier {
(ascii string | hexadecimal string);
}
lease-time (length | infinite);
retransmission-attempt value;
retransmission-interval seconds;
server-address server-address;
update-server;
vendor-id vendor-id ;
}
dhcp-client {
client-identifier {
prefix {
host-name;
logical-system-name;
routing-instance-name;
}
use-interface-description (device | logical);
user-id (ascii string| hexadecimal string);
}
lease-time (length | infinite);
retransmission-attempt value;
retransmission-interval seconds;
server-address server-address;
update-server;
vendor-id vendor-id ;
}
filter {
group number;
input filter-name;
input-list [filter-name];
output filter-name;
output-list [filter-name];
}
mtu value;
no-neighbor-learn;
no-redirects;
policer {
arp arp-name;
input input-name;
output output-name;
}
primary;
rpf-check {
fail-filter filter-name;
mode {
loose;
}
}
sampling {
input;
output;
simple-filter;
}
targeted-broadcast {
(forward-and-send-to-re |forward-only);
}
unnumbered-address {
interface-name;
preferred-source-address preferred-source-address;
}
}
inet6 {
accounting {
destination-class-usage;
source-class-usage {
input;
ouput;
}
}
address source–address/prefix {
eui-64;
ndp address {
(mac mac-address | multicast-mac multicast-mac-address);
publish;
}
preferred;
primary;
vrrp-inet6-group group_id {
(accept-data | no-accept-data);
advertisements-threshold number;
authentication-key value;
authentication-type (md5 | simple);
fast-interval milliseconds;
inet6-advertise-interval milliseconds;
(preempt <hold-time seconds>| no-preempt );
priority value;
track {
interface interface-name {
bandwidth-threshold value;
priority-cost value;
}
priority-hold-time seconds;
route route-address{
routing-instance routing-instance;
}
}
virtual-inet6-address [address];
virtual-link-local-address address;
vrrp-inherit-from {
active-group value;
active-interface interface-name;
}
}
web-authentication {
http;
https;
redirect-to-https;
}
}
(dad-disable | no-dad-disable);
dhcpv6-client {
client-ia-type (ia-na | ia-pd);
client-identifier duid-type (duid-ll | duid-llt | vendor);
client-type (autoconfig | stateful);
rapid-commit;
req-option (dns-server | domain | fqdn | nis-domain | nis-server | ntp-server |
sip-domain | sip-server |time-zone | vendor-spec);
retransmission-attempt number;
update-router-advertisement {
interface interface-name;
}
update-server;
}
filter {
group number;
input filter-name;
input-list [filter-name];
output filter-name;
output-list [filter-name];
}
mtu value;
nd6-stale-time seconds;
no-neighbor-learn;
policer {
input input-name;
output output-name;
}
rpf-check {
fail-filter filter-name;
mode {
loose;
}
}
sampling {
input;
output;
}
unnumbered-address {
interface-name;
preferred-source-address preferred-source-address;
}
}
iso {
address source-address;
mtu value;
}
mlfr-end-to-end {
bundle bundle-name;
}
mlfr-uni-nni {
bundle bundle-name;
}
mlppp {
bundle bundle-name;
}
mpls {
filter {
group number;
input filter-name;
input-list [filter-name];
output filter-name;
output-list [filter-name];
}
mtu mtu-value;
policer {
input input-name;
output output-name;
}
}
tcc {
policer {
input input-name;
output output-name;
}
proxy {
inet-address inet-address;
}
remote {
inet-address inet-address;
mac-address mac-address;
}
}
vpls {
filter {
group number;
input filter-name;
input-list [filter-name];
output filter-name;
output-list [filter-name];
}
policer {
input input-name;
output output-name;
}
}
}
input-vlan-map {
inner-tag-protocol-id tpid;
inner-vlan-id number ;
(pop | push | swap);
tag-protocol-id tpid;
vlan-id number;
}
interface-shared-with {
psd-name;
}
native-inner-vlan-id value;
(no-traps | traps);
output-vlan-map {
inner-tag-protocol-id tpid;
inner-vlan-id number;
(pop | push | swap);
tag-protocol-id tpid;
vlan-id number;
}
ppp-options {
chap {
access-profile name;
default-chap-secret name;
local-name name;
no-rfc2486;
passive;
}
dynamic-profile profile-name;
lcp-max-conf-req number;
lcp-restart-timer milliseconds;
loopback-clear-timer seconds;
ncp-max-conf-req number;
ncp-restart-timer milliseconds;
no-termination-request;
pap {
access-profile name;
default-password password;
local-name name;
local-password password;
no-rfc2486;
passive;
}
}
proxy-arp (restricted | unrestricted);
radio-router {
bandwidth number;
credit {
interval number;
}
data-rate number;
latency number;
quality number;
resource number;
threshold number;
}
swap-by-poppush;
traps;
vlan-id vlan-id;
vlan-id-range vlan-id-range;
vlan-id-list [vlan-id];
vlan-id-range vlan-id1-vlan-id2;
vlan-tags {
(inner vlan-id | inner-range vlan-id1-vlan-id2);
inner-list [vlan-id];
outer vlan-id;
}
}
vlan-tagging;
}
}
Related • Layer 2 Bridging and Transparent Mode Feature Guide for Security Devices
Documentation
• Junos OS Interfaces Library for Security Devices
Use the statements in the groups configuration hierarchy to configure information that
can be dynamically updated in various parts of the device configuration.
groups {
group-name {
configuration-data ;
}
}
address-assignment (Access)
Syntax address-assignment {
abated-utilization percentage;
abated-utilization-v6 percentage;
high-utilization percentage;
high-utilization-v6 percentage;
neighbor-discovery-router-advertisement ndra-name;
pool pool-name {
family {
inet {
dhcp-attributes {
boot-file boot-file-name;
boot-server boot-server-name;
domain-name domain-name;
grace-period seconds;
maximum-lease-time (seconds | infinite);
name-server ipv4-address;
netbios-node-type (b-node | h-node | m-node | p-node);
next-server next-server-name;
option dhcp-option-identifier-code {
array {
byte [8-bit-value];
flag [ false| off |on |true];
integer [32-bit-numeric-values];
ip-address [ip-address];
short [signed-16-bit-numeric-value];
string [character string value];
unsigned-integer [unsigned-32-bit-numeric-value];
unsigned-short [16-bit-numeric-value];
}
byte 8-bit-value;
flag (false | off | on | true);
integer 32-bit-numeric-values;
ip-address ip-address;
short signed-16-bit-numeric-value;
string character string value;
unsigned-integer unsigned-32-bit-numeric-value;
unsigned-short 16-bit-numeric-value;
}
option-match {
option-82 {
circuit-id match-value {
range range-name;
}
remote-id match-value;
range range-name;
}
}
}
propagate-ppp-settings [interface-name];
propagate-settings interface-name;
router ipv4-address;
server-identifier ip-address;
sip-server {
ip-address ipv4-address;
name sip-server-name;
}
tftp-server server-name;
wins-server ipv4-address;
}
host hostname {
hardware-address mac-address;
ip-address reserved-address;
}
network network address;
range range-name {
high upper-limit;
low lower-limit;
}
xauth-attributes {
primary-dns ip-address;
primary-wins ip-address;
secondary-dns ip-address;
secondary-wins ip-address;
}
}
inet6 {
dhcp-attributes {
dns-server ipv6-address;
grace-period seconds;
maximum-lease-time (seconds | infinite);
option dhcp-option-identifier-code {
array {
byte [8-bit-value];
flag [ false| off |on |true];
integer [32-bit-numeric-values];
ip-address [ip-address];
short [signed-16-bit-numeric-value];
string [character string value];
unsigned-integer [unsigned-32-bit-numeric-value];
unsigned-short [16-bit-numeric-value];
}
byte 8-bit-value;
flag (false | off | on | true);
integer 32-bit-numeric-values;
ip-address ip-address;
short signed-16-bit-numeric-value;
string character string value;
unsigned-integer unsigned-32-bit-numeric-value;
unsigned-short 16-bit-numeric-value;
}
propagate-ppp-settings [interface-name];
sip-server-address ipv6-address;
sip-server-domain-name domain-name;
}
prefix ipv6-network-prefix;
range range-name {
high upper-limit;
low lower-limit;
prefix-length delegated-prefix-length;
}
}
link pool-name;
}
}
Description The address-assignment pool feature enables you to create IPv4 and IPv6 address pools
that different client applications can share. For example, multiple client applications,
such as DHCPv4 or DHCPv6, can use an address-assignment pool to provide addresses
for their particular clients.
Related • Dynamic VPN Feature Guide for SRX Series Gateway Devices
Documentation
• Administration Guide for Security Devices
address-pool (Access)
allow-configuration
Description Explicitly allow configuration access to the specified levels in the hierarchy even if the
permissions set with the permissions statement do not grant such access by default.
Default If you omit this statement and the deny-configuration statement, users can edit only
those commands for which they have access privileges through the permissions statement.
allow-configuration-regexps
Description Explicitly allow configuration access to specified hierarchies using regular expressions
even if the permissions set with the permissions statement allow that access.
Default If you do not configure this statement or the deny-configuration-regexps statement, users
can edit only those commands for which they have access privileges set with the
permissions statement.
authentication-key
Description Configure Network Time Protocol (NTP) authentication keys so that the SRX Series
device can send authenticated packets. If you configure the SRX Series device to operate
in authenticated mode, you must configure a key.
Both the keys and the authentication scheme (MD5) must be identical between a set of
peers sharing the same key number.
value password—The key itself, which can be from 1 through 8 ASCII characters. If the key
contains spaces, enclose it in quotation marks.
authentication-order
Description Configure the order in which the software tries different user authentication methods
when attempting to authenticate a user. For each login attempt, the software tries the
authentication methods in order, starting with the first one, until the password matches.
Default If you do not include the authentication-order statement, users are verified based on their
configured passwords.
• password—Use the password configured for the user with the authentication statement
at the [edit system login user] hierarchy level.
boot-server (NTP)
Description Configure the server that NTP queries when the SRX Series device boots to determine
the local date and time.
When you boot the SRX Series device, it issues an ntpdate request, which polls a network
server to determine the local date and time. You need to configure a server that the SRX
Series device uses to determine the time when the SRX Series device boots. You can
configure either an IP address or a hostname for the boot server. If you configure a
hostname instead of an IP address, the ntpdate request resolves the hostname to an IP
address when the SRX Series device boots up.
If you configure an NTP boot server, then when the SRX Series device boots, it immediately
synchronizes with the boot server even if the NTP process is explicitly disabled or if the
time difference between the client and the boot server exceeds the threshold value of
1000 seconds.
broadcast
Description Configure the SRX Series device to operate in broadcast mode with the remote system
at the specified address. In this mode, the SRX Series device sends periodic broadcast
messages to a client population at the specified broadcast or multicast address. Normally,
you include this statement only when the SRX Series device is operating as a transmitter.
Options address—The broadcast address on one of the local networks or a multicast address
assigned to NTP. You must specify an address, not a hostname. If the multicast
address is used, it must be 224.0.1.1.
key key-number—(Optional) All packets sent to the address include authentication fields
that are encrypted using the specified key number.
Range: Any unsigned 32-bit integer
version value—(Optional) Specify the version number to be used in outgoing NTP packets.
Range: 1 through 4
Default: 4
broadcast-client
Syntax broadcast-client;
Description Configure the SRX Series device to listen for broadcast messages on the local network
to discover other servers on the same subnet.
client-ia-type
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family family dhcpv6-client]
client-identifier (dhcp-client)
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Syntax client-identifier {
user-id {ascii ascii hexadecimal hexadecimal;
use-interface-description {logical |device};
prefix [host-name routing-instance-name];
}
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family family dhcp-client]
client-identifier (dhcpv6-client)
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family family dhcpv6-client]
client-list-name (SNMP)
Description Specify the name of the list of SNMP network management system (NSM) clients that
are authorized to collect information about network operations. You cannot use an SNMP
client list and individually configured SNMP clients in the same configuration.
Options client-list-name— Name of the client list. Client list is the list of IP address prefixes defined
with the prefix-list statement in the policy-options hierarchy.
client-type
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family family dhcpv6-client]
deny-configuration
Description Explicitly deny configuration access to the specified levels in the hierarchy even if the
permissions set with the permissions statement grant such access by default.
Default If you omit this statement and the allow-configuration statement, users can edit those
levels in the configuration hierarchy for which they have access privileges through the
permissions statement.
deny-configuration-regexps
Description Explicitly deny configuration access to specified hierarchies using regular expressions
even if the permissions set with the permissions statement allow that access.
Default If you do not configure this statement or the deny-configuration-regexps statement, users
can edit only those commands for which they have access privileges set with the
permissions statement.
Syntax dhcp-attributes {
boot-file boot-file-name;
boot-server boot-server-name;
domain-name domain-name;
grace-period seconds;
maximum-lease-time (seconds | infinite);
name-server ipv4-address;
netbios-node-type (b-node | h-node | m-node | p-node);
next-server next-server-name;
option dhcp-option-identifier-code {
array {
byte [8-bit-value];
flag [ false| off |on |true];
integer [32-bit-numeric-values];
ip-address [ip-address];
short [signed-16-bit-numeric-value];
string [character string value];
unsigned-integer [unsigned-32-bit-numeric-value];
unsigned-short [16-bit-numeric-value];
}
byte 8-bit-value;
flag (false | off | on | true);
integer 32-bit-numeric-values;
ip-address ip-address;
short signed-16-bit-numeric-value;
string character string value;
unsigned-integer unsigned-32-bit-numeric-value;
unsigned-short 16-bit-numeric-value;
}
option-match {
option-82 {
circuit-id match-value {
range range-name;
}
remote-id match-value;
range range-name;
}
}
}
propagate-ppp-settings [interface-name];
propagate-settings interface-name;
router ipv4-address;
server-identifier ip-address;
sip-server {
ip-address ipv4-address;
name sip-server-name;
}
tftp-server server-name;
wins-server ipv4-address;
}
Description Configure attributes for IPv4 address pools that can be used by different clients. The
DHCP attributes for this statement uses standard IPv4 DHCP options.
Syntax dhcp-attributes {
dns-server ipv6-address;
grace-period seconds;
maximum-lease-time (seconds | infinite);
option dhcp-option-identifier-code {
array {
byte [8-bit-value];
flag [ false| off |on |true];
integer [32-bit-numeric-values];
ip-address [ip-address];
short [signed-16-bit-numeric-value];
string [character string value];
unsigned-integer [unsigned-32-bit-numeric-value];
unsigned-short [16-bit-numeric-value];
}
byte 8-bit-value;
flag (false | off | on | true);
integer 32-bit-numeric-values;
ip-address ip-address;
short signed-16-bit-numeric-value;
string character string value;
unsigned-integer unsigned-32-bit-numeric-value;
unsigned-short 16-bit-numeric-value;
}
propagate-ppp-settings [interface-name];
sip-server-address ipv6-address;
sip-server-domain-name domain-name;
}
Description Configure attributes for address pools that can be used by different clients.
Options • dns-server IPv6-address—Specify a DNS server to which clients can send DNS queries.
• grace-period seconds —Specify the grace period offered with the lease.
dhcp-client
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Syntax dhcp-client {
client-identifier {
prefix {
host-name;
logical-system-name;
routing-instance-name;
}
use-interface-description (device | logical);
user-id (ascii string| hexadecimal string);
}
lease-time (length | infinite);
retransmission-attempt value;
retransmission-interval seconds;
server-address server-address;
update-server;
vendor-id vendor-id ;
}
dhcpv6-client
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Syntax dhcpv6-client {
client-ia-type (ia-na | ia-pd);
client-identifier duid-type (duid-ll | duid-llt | vendor);
client-type (autoconfig | statefull);
rapid-commit;
req-option (dns-server | domain | fqdn | nis-domain | nis-server | ntp-server | sip-domain
| sip-server |time-zone | vendor-spec);
retransmission-attempt number;
update-router-advertisement {
interface interface-name;
}
update-server;
}
Description Configure the Dynamic Host Configuration Protocol version 6 (DHCPv6) client.
Syntax dhcp-local-server {
dhcpv6 {
authentication {
password password;
username-include {
circuit-type;
client-id;
delimiter delimiter-character;
domain-name domain-name;
interface-name;
logical-system-name;
relay-agent-interface-id;
relay-agent-remote-id;
relay-agent-subscriber-id;
routing-instance-name;
user-prefix user-prefix;
}
}
dynamic-profile {
profile-name;
aggregate-clients {
merge;
replace;
}
junos-default-profile;
use-primary dynamic-profile-name;
}
group group-name {
authentication {
password password;
username-include {
circuit-type;
client-id;
delimiter delimiter-character;
domain-name domain-name;
interface-name;
logical-system-name;
relay-agent-interface-id;
relay-agent-remote-id;
relay-agent-subscriber-id;
routing-instance-name;
user-prefix user-prefix;
}
}
dynamic-profile {
profile-name;
aggregate-clients {
merge;
replace;
}
junos-default-profile;
use-primary dynamic-profile;
}
interface interface-name {
dynamic-profile {
profile-name;
aggregate-clients {
merge;
replace;
}
junos-default-profile;
use-primary dynamic-profile-name;
}
exclude;
overrides {
delegated-pool pool-name;
interface-client-limit number;
process-inform {
pool pool-name;
}
rapid-commit ;
}
service-profile service-profile-name
trace ;
upto interface-name;
}
liveness-detection {
failure-action {
clear-binding;
clear-binding-if-interface-up;
log-only;
}
method {
bfd {
detection-time {
threshold milliseconds;
}
holddown-interval interval;
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
session-mode (automatic | multihop | single-hop);
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
version (0 | 1 | automatic);
}
}
overrides {
delegated-pool pool-name;
interface-client-limit number;
process-inform {
pool pool-name;
}
rapid-commit ;
}
reconfigure {
attempts number;
clear-on-abort;
strict;
timeout number;
token token-name;
trigger {
radius-disconnect;
}
}
service-profile service-profile-name;
}
liveness-detection {
failure-action {
clear-binding;
clear-binding-if-interface-up;
log-only;
}
method {
bfd {
detection-time {
threshold milliseconds;
}
holddown-interval interval;
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
session-mode (automatic | multihop | single-hop);
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
version (0 | 1 | automatic);
}
}
overrides {
delegated-pool pool-name;
interface-client-limit number;
process-inform {
pool pool-name;
}
rapid-commit ;
}
reconfigure {
attempts number;
clear-on-abort;
strict;
timeout number;
token token-name;
trigger {
radius-disconnect;
}
}
service-profile service-profile-name;
}
group group-name {
interface interface-name {
exclude;
upto upto-interface-name;
}
}
}
Description Configure DHCP Local Server for DHCPv6, forwarding snoop (unicast) packets, and
setting traceoptions.
NOTE: SRX Series and J Series devices do not support client authentication.
Syntax dhcpv6 {
authentication {
password password;
username-include {
circuit-type;
client-id;
delimiter delimiter-character;
domain-name domain-name;
interface-name;
logical-system-name;
relay-agent-interface-id;
relay-agent-remote-id;
relay-agent-subscriber-id;
routing-instance-name;
user-prefix user-prefix;
}
}
dynamic-profile {
profile-name;
aggregate-clients {
merge;
replace;
}
junos-default-profile;
use-primary dynamic-profile-name;
}
group group-name {
authentication {
password password;
username-include {
circuit-type;
client-id;
delimiter delimiter-character;
domain-name domain-name;
interface-name;
logical-system-name;
relay-agent-interface-id;
relay-agent-remote-id;
relay-agent-subscriber-id;
routing-instance-name;
user-prefix user-prefix;
}
}
dynamic-profile {
profile-name;
aggregate-clients {
merge;
replace;
}
junos-default-profile;
use-primary dynamic-profile;
}
interface interface-name {
dynamic-profile {
profile-name;
aggregate-clients {
merge;
replace;
}
junos-default-profile;
use-primary dynamic-profile-name;
}
exclude;
overrides {
delegated-pool pool-name;
interface-client-limit number;
process-inform {
pool pool-name;
}
rapid-commit ;
}
service-profile service-profile-name
trace ;
upto interface-name;
}
liveness-detection {
failure-action {
clear-binding;
clear-binding-if-interface-up;
log-only;
}
method {
bfd {
detection-time {
threshold milliseconds;
}
holddown-interval interval;
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
session-mode (automatic | multihop | single-hop);
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
version (0 | 1 | automatic);
}
}
overrides {
delegated-pool pool-name;
interface-client-limit number;
process-inform {
pool pool-name;
}
rapid-commit ;
}
reconfigure {
attempts number;
clear-on-abort;
strict;
timeout number;
token token-name;
trigger {
radius-disconnect;
}
}
service-profile service-profile-name;
}
liveness-detection {
failure-action {
clear-binding;
clear-binding-if-interface-up;
log-only;
}
method {
bfd {
detection-time {
threshold milliseconds;
}
holddown-interval interval;
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
session-mode (automatic | multihop | single-hop);
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
version (0 | 1 | automatic);
}
}
overrides {
delegated-pool pool-name;
interface-client-limit number;
process-inform {
pool pool-name;
}
rapid-commit ;
}
reconfigure {
attempts number;
clear-on-abort;
strict;
timeout number;
token token-name;
trigger {
radius-disconnect;
}
}
service-profile service-profile-name;
}
NOTE: SRX Series and J Series devices do not support client authentication.
Syntax family {
inet6 {
mode (drop | flow-based | packet-based);
}
iso {
mode packet-based;
}
mpls {
mode packet-based;
}
}
forwarding-options (Security)
Syntax forwarding-options {
family {
inet6 {
mode (drop | flow-based | packet-based);
}
iso {
mode packet-based;
}
mpls {
mode packet-based;
}
}
}
Description Determine how the inet6, iso, and mpls protocol families manage security forwarding
options.
NOTE:
• Packet-based processing is not supported on the following SRX Series
devices: SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, and
SRX5800.
• On SRX Series devices, the default mode for processing traffic is flow mode.
To configure an SRX Series device as a border router, you must change the
mode from flow-based processing to packet-based processing. Use the
set security forwarding-options family mpls mode packet-based statement
to configure the SRX device to packet mode. You must reboot the device
for the configuration to take effect.
clear-binding;
clear-binding-if-interface-up;
log-only;
}
method {
bfd {
detection-time {
threshold milliseconds;
}
holddown-interval interval;
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
session-mode (automatic | multihop | single-hop);
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
version (0 | 1 | automatic);
}
}
overrides {
delegated-pool pool-name;
interface-client-limit number;
process-inform {
pool pool-name;
}
rapid-commit ;
}
reconfigure {
attempts number;
clear-on-abort;
strict;
timeout number;
token token-name;
trigger {
radius-disconnect;
}
}
service-profile service-profile-name;
}
Description Configure a group of interfaces that have a common configuration. The remaining
statements are explained separately.
NOTE: SRX Series and J Series devices do not support DHCP client
authentication.
• rsa-key rsa-key—RSA public key algorithm, which supports encryption and digital
signatures for SSH version 1 and SSH version 2
• rsa1-key rsa1-key—RSA public key algorithm, which supports encryption and digital
signatures for SSH version 1
hostkey-algorithm
Syntax hostkey-algorithm {
(ssh-dss | no-ssh-dss);
(ssh-ecdsa |no-ssh-ecdsa);
(ssh-rsa | no-ssh-rsa);
}
Description Allow or disallow a host-key signature algorithm for the SSH host to use to authenticate
another host.
NOTE: DSA keys are not supported in FIPS, so the ssh-dss option is not
available on systems operating in FIPS mode.
Description Specify one or more interfaces, or a range of interfaces, that are within a specified group
on which the DHCP local server is enabled. You can repeat the interface interface-name
statement to specify multiple interfaces within a group, but you cannot specify the same
interface in more than one group.
• upto upto-interface-name—The upper end of the range of interfaces; the lower end of
the range is the interface-name entry. The interface device name of the
upto-interface-name must be the same as the device name of the interface-name.
interfaces (ARP)
Syntax interfaces {
interface-name {
aging-timer minutes;
}
}
Description Specify the Address Resolution Protocol (ARP) aging timer in minutes for a logical
interface.
Default: 20
Description Specify the set of interfaces that are part of the zone.
Syntax interface-traceoptions {
file {
filename ;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
level (all | error | info | notice | verbose | warning);
no-remote-trace;
}
Description Configure extended DHCP local server tracing operations that can be enabled on a specific
interface or group of interfaces. You use the interface interface-name trace statement at
the [edit system services group group-name] hierarchy level to enable the tracing operation
on the specific interfaces.
Options file-name—Name of the file to receive the output of the tracing operation. Enclose the
name in quotation marks (“ ”). All files are placed in a file named jdhcpd in the
directory /var/log. If you include the file statement, you must specify a filename.
files number—(Optional) Maximum number of trace files. When a trace file named
trace-file reaches its maximum size, it is renamed trace-file.0, then trace-file.1, and
so on, until the maximum number of trace files is reached. Then the oldest trace file
is overwritten. If you specify a maximum number of files, you also must specify a
maximum file size with the size option.
Range: 2 through 1000
Default: 3 files
flag flag—Tracing operation to perform. To specify more than one tracing operation,
include multiple flag statements. You can include the following flags:
match regular-expression—(Optional) Refine the output to include lines that contain the
regular expression.
size size—(Optional) Maximum size of each trace file, in kilobytes (KB), megabytes (MB),
or gigabytes (GB). If you specify a maximum file size, you also must specify a
maximum number of trace files with the files option.
Syntax: xk to specify KB, xm to specify MB, or xg to specify GB
Range: 10 KB through 1 GB
Default: 128 KB
internet-options
Syntax internet-options {
icmpv4-rate-limit {
bucket size seconds;
packet-rate packet-rate;
}
icmpv6-rate-limit {
bucket size seconds;
packet-rate packet-rate;
}
ipv6-duplicate-addr-detection-transmits number;
no-path-mtu-discovery;
no-source-quench;
no-tcp-reset;
no-tcp-rfc1323;
no-tcp-rfc1323-paws;
path-mtu-discovery;
source-port {
upper-limit range;
}
source-quench;
tcp-drop-synfin-set;
}
• no-tcp-reset—Do not send RST TCP packets for packets sent to non-listening ports.
• tcp-drop-synfin-set—Drop TCP packets that have both SYN and FIN flags.
lease-time (dhcp-client)
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family family dhcp-client]
Description Specify the time to negotiate and exchange Dynamic Host Configuration Protocol (DHCP)
information.
lockout-period
Description Configure the amount of time before the user can attempt to log in to the router after
being locked out due to the number of failed login attempts specified in the
tries-before-disconnect statement.
Options minutes—Amount of time before the user can attempt to log in after being locked out.
Default: 120
Range: 1 through 43200
multicast-client
Description For NTP, configure the SRX Series device to listen for multicast messages on the local
network to discover other servers on the same subnet.
Options address—(Optional) One or more IP addresses. If you specify addresses, the SRX Series
device joins those multicast groups.
Default: 224.0.1.1.
name-server (Access)
Hierarchy Level [edit access address-assignment pool pool-name family (inet | inet6) xauth-attributes]
neighbor-discovery-router-advertisement (Access)
Description Configure the name of the address-assignment pool used to assign the router
advertisement prefix.
ntp
Syntax ntp {
authentication-key key-number type md5 value <password>;
boot-server <address>;
broadcast <address> <key key-number> <routing-instance routing-instance-name> <version
value> <ttl value>;
broadcast-client;
multicast-client <address>;
peer address <key key-number> <version value> <prefer>;
server address <key key-number> <version value> <prefer>;
source-address source-address <routing-instance routing-instance-name>;
trusted-key [key-numbers];
}
Description Configure Network Time Protocol (NTP) on the SRX Series device.
Syntax overrides {
interface-client-limit number;
}
Description Override the default configuration settings for the extended DHCP local server. Specifying
the overrides statement with no subordinate statements removes all DHCP local server
overrides at that hierarchy level.
• To override global DHCP local server configuration options, include the overrides
statement and its subordinate statements at the [edit system services dhcp-local-server]
hierarchy level.
Options interface-client-limit number—Sets the maximum number of DHCP clients per interface
allowed for a specific group or for all groups. A group specification takes precedence
over a global specification for the members of that group.
Range: 1 through 500,000
Default: No limit
peer (NTP)
Description For NTP, configure the SRX Series device to operate in symmetric active mode with the
remote system at the specified address. In this mode, the SRX Series device and the
remote system can synchronize with each other. This configuration is useful in a network
in which either the SRX Series device or the remote system might be a better source of
time.
Options address—Address of the remote system. You must specify an address, not a hostname.
key key-number—(Optional) All packets sent to the address include authentication fields
that are encrypted using the specified key number.
Range: Any unsigned 32-bit integer
prefer—(Optional) Mark the remote system as the preferred host, which means that if
all other factors are equal, this remote system is chosen for synchronization among
a set of correctly operating systems.
version value—(Optional) Specify the NTP version number to be used in outgoing NTP
packets.
Range: 1 through 4
Default: 4
Description Reverse SSH allows you to configure a device to listen on a specific port for telnet and
SSH (secure shell) services. When you connect to that port, the device provides an
interface to the auxiliary port on the device. You can control the port that is used. By
default, port 2901 is used.
Description Reverse Telnet allows you to configure a device to listen on a specific port for telnet and
SSH (secure shell) services. When you connect to that port, the device provides an
interface to the auxiliary port on the device. You can control the port that is used. By
default, port 2900 is used.
prefix
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Syntax prefix {
host-name;
logical-system-name;
routing-instance-name;
}
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family family dhcp-client
client-identifier]
profilerd
Syntax profilerd {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
• failover—Configure the device to reboot if the software process fails four times within
30 seconds, and specify the software to use during the reboot.
proxy
Syntax proxy {
password password;
port port-number;
server url;
username user-name;
}
rapid-commit
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Syntax rapid-commit;
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family family dhcpv6-client]
Description Used to signal the use of the two-message exchange for address assignment.
Syntax reconfigure {
attempts number;
clear-on-abort;
strict;
timeout number;
token token-name;
trigger {
radius-disconnect;
}
}
Description Enable dynamic reconfiguration triggered by the DHCP local server of all DHCP clients
or only the DHCP clients serviced by the specified group of interfaces. A group
configuration takes precedence over a DHCP local server configuration.
clear-on-abort —Delete all DHCP clients or only the DHCP clients serviced by the specified
group of interfaces when reconfiguration fails; that is, when the maximum number
of retry attempts have been made without success. A group configuration takes
precedence over a DHCP local server configuration.
strict —Configure the system to only allow packets that contain the reconfigure accept
option.
token token-name—Configure a plain-text token for all DHCP clients or only the clients
specified by the specified group of interfaces. The default is null (empty string).
req-option
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family family dhcpv6-client]
retransmission-attempt (dhcp-client)
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family family dhcp-client]
Description Specify the number of times the device attempts to retransmit a Dynamic Host Control
Protocol (DHCP) packet fallback.
Range: 0 through 6
retransmission-attempt (dhcpv6-client)
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family family dhcpv6-client]
Description Specify the number of times the device retransmits a DHCPv6 client packet if a DHCPv6
server fails to respond. After the specified number of attempts, no further attempts at
reaching a server are made.
retransmission-interval (dhcp-client)
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
ssh (reverse)
Description Reverse Telnet allows you to configure a device to listen on a specific port for telnet and
SSH (secure shell) services. When you connect to that port, the device provides an
interface to the auxiliary port on the device. Use reverse SSH to encrypt the reverse telnet
communication between the device and the client.
ssh-known-hosts
Syntax ssh-known-hosts {
fetch-from-server server-name;
host hostname {
dsa-key dsa-key;
ecdsa-sha2-nistp256-key ecdsa-sha2-nistp256-key;
ecdsa-sha2-nistp384-key ecdsa-sha2-nistp384-key;
ecdsa-sha2-nistp521-key ecdsa-sha2-nistp521-key;
rsa-key rsa-key;
rsa1-key rsa1-key;
}
load-key-file key-file;
}
Description Configure SSH support for known hosts and for administering SSH host key updates.
server (NTP)
Description For NTP, configure the SRX Series device to operate in client mode with the remote
system at the specified address. In this mode, the SRX Series device can be synchronized
with the remote system, but the remote system can never be synchronized with the SRX
Series device.
If the NTP client time drifts so that the difference in time from the NTP server exceeds
128 milliseconds, the client is automatically stepped back into synchronization. If the
offset between the NTP client and server exceeds the 1000-second threshold, the client
still synchronizes with the server, but it also generates a system log message noting that
the threshold was exceeded.
Options address—Address of the remote system. You must specify an address, not a hostname.
prefer—(Optional) Mark the remote system as the preferred host, which means that if
all other things are equal, this remote system is chosen for synchronization among
a set of correctly operating systems.
version value—(Optional) Specify the version number to be used in outgoing NTP packets.
Range: 1 through 4
Default: 4
server-address (dhcp-client)
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family family dhcp-client]
Description Specify the preferred DHCP server address that is sent to DHCP clients.
services
Syntax services {
apply-groups [ group-names ];
apply-groups-except [ group-names ];
dhcp {
boot-file filename;
boot-server (address | hostname);
default-lease-time (infinite | seconds);
domain-name domain-name;
domain-search dns-search-suffix;
maximum-lease-time (infinite | seconds);
name-server ip-address;
next-server ip-address;
option option-identifier-code array type-name [ type-values ] | byte 8-bit-value | flag
(false | off | on | true) | integer signed-32-bit-value | ip-address address | short
signed-16-bit-value | string text-string | unsigned-integer 32-bit-value | unsigned-short
16-bit-value);
pool subnet-ip-address/mask {
address-range {
high address;
low address;
}
boot-file filename;
boot-server (address | hostname);
default-lease-time (infinite | seconds);
domain-name domain-name;
domain-search dns-search-suffix;
exclude-address ip-address;
maximum-lease-time (infinite | seconds);
name-server ip-address;
next-server ip-address;
option option-identifier-code array type-name [ type-values ] | byte 8-bit-value | flag
(false | off | on | true) | integer signed-32-bit-value | ip-address address | short
signed-16-bit-value | string text-string | unsigned-integer 32-bit-value | unsigned-short
16-bit-value);
propagate-ppp-settings interface-name;
propagate-settings interface-name;
router ip-address;
server-identifier dhcp-server;
sip-server {
address ip-address;
name sip-server-name;
}
wins-server netbios-name-server;
}
propagate-ppp-settings interface-name;
propagate-settings interface-name;
router ip-address;
server-identifier dhcp-server;
sip-server {
address ip-address;
name sip-server-name;
}
static-binding mac-address;
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
level (all | error | info | notice | verbose | warning);
no-remote-trace;
}
wins-server netbios-name-server;
}
dns {
dns-proxy {
cache hostname inet ip-address;
default-domain domain-name {
forwarders ip-address;
}
interface interface-name;
propogate-setting (enable | disable);
view view-name {
domain domain-name {
forward-only;
forwarders ip-address;
}
match-clients subnet-address;
}
}
dnssec {
disable;
dlv {
domain-name domain-name trusted-anchor trusted-anchor;
}
secure-domains domain-name;
trusted-keys (key dns-key | load-key-file url);
forwarders {
ip-address;
}
max-cache-ttl seconds;
max-ncache-ttl seconds;
traceoptions {
category {
category-type;
}
debug-level level;
file {
filename;
files number;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
timeout seconds;
}
reconnect-strategy (in-order | sticky);
secret password;
services netconf;
}
traceoptions {
file filename <files number> <match regex> <size size> <world-readable |
no-world-readable>;
flag flag;
no-remote-trace;
}
}
service-deployment {
servers {
address IPv4 address {
security-options {
ssl3;
tls;
}
user username;
}
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(no-world-readable | world-readable);
}
flag flag ;
no-remote-trac;
}
local-certificate local-certificate;
source-address source-address;
}
}
ssh {
connection-limit number;
port port-number;
rate-limit number;
}
telnet {
connection-limit number;
rate-limit number;
}
web-management {
http {
interfaces interface-names ;
port port;
}
https {
interfaces interface-names;
system-generated-certificate name;
port port;
}
Description Configure the router or switch so that users on remote systems can access the local
router or switch through the DHCP server, finger, rlogin, SSH, telnet, Web management,
Junos XML protocol clear-text, Junos XML protocol SSL, and network utilities or enable
Junos OS to work with the Session and Resource Control (SRC) software.
Related • Configuring clear-text or SSL Service for Junos XML Protocol Client Applications
Documentation
• Configuring the Junos OS to Work with SRC Software
Description Specify a source address for each configured TACACS+ server, RADIUS server, or NTP
server, or the source address to record in system log messages that are directed to a
remote machine.
Options source-address—A valid IP address configured on one of the SRX Series devices. For
system logging, the address is recorded as the message source in messages sent to
the remote machines specified in all host hostname statements at the [edit system
syslog] hierarchy level, but not for messages directed to the other Routing Engine.
Description Reverse Telnet allows you to configure a device to listen on a specific port for telnet and
SSH (secure shell) services. When you connect to that port, the device provides an
interface to the auxiliary port on the device.
Syntax traceoptions {
file {
filename;
files number;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
}
Description Configure extended DHCP local server tracing operations for DHCP processes.
Options • file-name—Name of the file to receive the output of the tracing operation. Enclose the
name in quotation marks (“ ”). All files are placed in a file named jdhcpd in the directory
/var/log. If you include the file statement, you must specify a filename.
• files number—(Optional) Maximum number of trace files. When a trace file named
trace-file reaches its maximum size, it is renamed trace-file.0, then trace-file.1, and so
on, until the maximum number of trace files is reached. Then the oldest trace file is
overwritten. If you specify a maximum number of files, you also must specify a maximum
file size with the size option.
• flag flag—Tracing operation to perform. To specify more than one tracing operation,
include multiple flag statements. You can include the following flags:
trusted-key
Description For NTP, configure the keys you are allowed to use when you configure the SRX Series
device to synchronize its time with other systems on the network.
Options key-numbers—One or more key numbers. Each key can be any 32-bit unsigned integer
except 0.
update-router-advertisement
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family family dhcpv6-client]
update-server (dhcp-client)
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Syntax update-server;
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family family dhcp-client]
update-server (dhcpv6-client)
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Syntax update-server;
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family family dhcpv6-client]
user-id
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family family dhcp-client
client-identifier]
Description Specify an ASCII or hexadecimal user ID for the Dynamic Host Configuration Protocol
(DHCP) client.
use-interface
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family family dhcp-client
client-identifier]
Description The description configured at the physical or logical interface level is used for client
identification.
vendor-id
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Hierarchy Level [edit interfaces interface-name unit logical-unit-number family family dhcp-client]
Description Configure a vendor class ID for the Dynamic Host Configuration Protocol (DHCP) client.
Syntax vpn;
Description For Dynamic Host Configuration Protocol (DHCP) or BOOTP client request forwarding,
enable virtual private network (VPN) encryption for a client request to pass through a
VPN tunnel.
accounts, including user authentication and the root-level user account. Statement
descriptions that are exclusive to the J Series and SRX Series devices running Junos OS
are described in this section.
system {
accounting {
destination {
radius {
server server-address {
accounting-port port-number;
max-outstanding-requests number;
port number;
retry number;
secret password;
source-address address;
timeout seconds;
}
}
tacplus {
server server-address {
port port-number;
secret password;
single-connection;
source-address source-address;
timeout seconds;
}
}
}
events [change-log interactive-commands login];
traceoptions {
file {
filename;
files number;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
}
}
allow-v4mapped-packets;
archival {
configuration {
archive-sites url {
password password;
}
transfer-interval interval;
transfer-on-commit;
}
}
arp {
aging-timer minutes;
gratuitous-arp-delay seconds;
gratuitous-arp-on-ifup;
interfaces {
interface name {
aging-timer minutes;
}
}
passive-learning;
purging;
}
authentication-order [password radius tacplus];
auto-configuration {
traceoptions {
file {
filename;
files number;
match reqular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
level (all | error | info | notice | verbose | warning);
no-remote-trace;
}
}
auto-snapshot;
autoinstallation {
configuration-servers {
url {
password password;
}
}
interfaces {
interface-name {
bootp;
rarp;
}
}
usb {
disable;
}
}
auto-snapshot;
backup-router {
address;
destination [network];
}
commit {
server {
commit-interval seconds;
days-to-keep-error-logs days;
maximum-aggregate-pool number;
maximum entries number;
traceoptions {
file {
filename;
files number;
microsecond-stamp;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
}
}
synchronize;
}
compress-configuration-files;
default-address-selection;
diag-port-authentication {
encrypted-password passsword;
plain-text-password;
}
domain-name domain-name;
domain-search [domain-list];
donot-disable-ip6op-ondad;
dump-device (boot-device | compact-flash | usb);
dynamic-profile-options {
versioning;
}
encrypt-configuration-files;
extensions {
providers {
provider-id {
license-type license deployment-scope [deployments];
}
}
resource-limits {
package package-name {
resources {
cpu {
priority number;
time seconds;
}
file {
core-size bytes;
open number;
size bytes;
}
memory {
data-size mbytes;
locked-in mbytes;
resident-set-size mbytes;
socket-buffers mbytes;
stack-size mbytes;
}
}
}
process process-ui-name {
resources {
cpu {
priority number;
time seconds;
}
file {
core-size bytes;
open number;
size bytes;
}
memory {
data-size mbytes;
locked-in mbytes;
resident-set-size mbytes;
socket-buffers mbytes;
stack-size mbytes;
}
}
}
}
}
fips {
level (0 | 1 | 2 | 3 | 4);
}
host-name hostname;
inet6-backup-router {
address;
destination destination;
}
internet-options {
icmpv4-rate-limit {
bucket-size seconds;
packet-rate packets-per-second;
}
icmpv6-rate-limit {
bucket-size seconds;
packet-rate packets-per-second;
}
(ipip-path-mtu-discovery | no-ipip-path-mtu-discovery);
ipv6-duplicate-addr-detection-transmits number;
(ipv6-path-mtu-discovery | no-ipv6-path-mtu-discovery);
ipv6-path-mtu-discovery-timeout minutes;
no-tcp-reset (drop-all-tcp | drop-tcp-with-syn-only);
no-tcp-rfc1323;
no-tcp-rfc1323-paws;
(path-mtu-discovery | no-path-mtu-discovery);
source-port upper-limit upper-limit;
(source-quench | no-source-quench);
tcp-drop-synfin-set;
tcp-mss bytes;
}
kernel-replication;
license {
autoupdate {
url url;
password password;
}
renew {
before-expiration number;
interval interval-hours;
}
traceoptions {
file {
filename ;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
}
}
location {
altitude feet;
building name;
country-code code;
floor number;
hcoord horizontal-coordinate;
lata service-area;
latitude degrees;
longitude degrees;
npa-nxx number;
postal-code postal-code;
rack number;
vcoord vertical-coordinate;
}
login {
announcement text;
class class-name {
access-end hh:mm;
access-start hh:mm;
allow-commands regular-expression;
allow-configuration regular-expression;
allow-configuration-regexps [regular-expression];
allowed-days [day];
deny-commands regular-expression;
deny-configuration regular-expression;
deny-configuration-regexps [regular-expression];
idle-timeout minutes;
logical-system logical-system;
login-alarms;
login-script script;
login-tip;
permissions [permissions ];
security-role (audit-administrator | crypto-administrator | ids-administrator |
security-administrator);
}
deny-sources {
address [address-or-hostname];
}
message text;
}
password {
change-type (character-set | set-transitions);
format (des | md5 | sha1);
maximum-length length;
minimum-changes number;
minimum-length length;
}
retry-options {
backoff-factor seconds;
backoff-threshold number;
lockout-period time;
maximum-time seconds;
minimum-time seconds;
tries-before-disconnect number;
}
user username {
authentication {
encrypted-password password;
load-key-file url;
plain-text-password;
ssh-dsa public-key;
ssh-rsa public-key;
}
class class-name;
full-name complete-name;
uid uid-value;
}
}
max-configuration-rollbacks number;
max-configurations-on-flash number;
mirror-flash-on-disk;
name-server ip-address;
nd-maxmcast-solicit value;
nd-retrasmit-timer value;
no-compress-configuration-files;
no-debugger-on-alt-break;
no-multicast-echo;
no-neighbor-learn;
no-ping-record-route;
no-ping-time-stamp;
no-redirects;
no-saved-core-context;
ntp {
authentication-key key-number {
type md5;
value password;
}
boot-server address;
broadcast broadcast-address {
key key;
ttl value;
version version;
}
broadcast-client;
multicast-client {
address;
}
peer peer-address {
key key;
prefer;
version version;
}
server server-address {
key key;
prefer;
version version;
}
source-address source-address;
trusted-key [key-number];
}
pic-console-authentication {
encrypted-password password;
plain-text-password;
}
ports {
auxiliary {
disable;
insecure;
type (ansi | small-xterm | vt100 | xterm);
}
console {
disable;
insecure;
log-out-on-disconnect;
type (ansi | small-xterm | vt100 | xterm);
}
}
processes {
802.1x-protocol-daemon {
command binary-file-path;
disable;
}
adaptive-services {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
alarm-control {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
application-identification {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
application-security {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
audit-process {
command binary-file-path;
disable;
}
auto-configuration {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
bootp {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
chassis-control {
disable;
failover alternate-media;
}
class-of-service {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
craft-control {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
database-replication {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
datapath-trace-service {
disable;
traceoptions {
file {
filename ;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
level (all | error | info | notice | verbose | warning);
no-remote-trace;
}
}
dhcp {
command binary-file-path;
disable;
}
dhcp-service {
disable;
failover (alternate-media | other-routing-engine);
interface-traceoptions {
file {
filename ;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
level (all | error | info | notice | verbose | warning);
no-remote-trace;
}
traceoptions {
file {
filename ;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
level (all | error | info | notice | verbose | warning);
no-remote-trace;
}
}
dialer-services {
disable;
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
}
}
diameter-service {
disable;
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
level (all | error | info | notice | verbose | warning);
no-remote-trace;
}
}
disk-monitoring {
command binary-file-path;
disable;
}
dynamic-flow-capture {
command binary-file-path;
disable;
}
ecc-error-logging {
command binary-file-path;
disable;
}
ethernet-connectivity-fault-management {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
ethernet-link-fault-management {
command binary-file-path;
disable;
}
ethernet-switching {
command binary-file-path;
disable;
}
event-processing {
command binary-file-path;
disable;
}
fipsd {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
firewall {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
firewall-authentication-service {
disable;
}
forwarding {
command binary-file-path;
disable;
}
general-authentication-service {
disable;
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
}
}
gprs-process {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
group-key-member {
disable;
}
group-key-server {
disable;
}
idp-policy {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
ilmi {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
inet-process {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
init {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
interface-control {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
ipmi {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
ipsec-key-management {
(disable | enable);
}
jsrp-service {
disable;
}
jtasktest {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
kernel-replication {
command binary-file-path;
disable;
}
l2-learning {
command binary-file-path;
disable;
}
l2cpd-service {
command binary-file-path;
disable;
}
lacp {
command binary-file-path;
disable;
}
lldpd-service {
command binary-file-path;
disable;
}
logical-system-mux {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
logical-system-service {
disable;
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
}
}
mib-process {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
mobile-ip {
command binary-file-path;
disable;
}
mountd-service {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
mspd {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
multicast-snooping {
command binary-file-path;
disable;
}
named-service {
disable;
disable;
}
pppoe {
command binary-file-path;
disable;
}
process-monitor {
disable;
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
level (all | error |info |notice | verbose | warning);
no-remote-trace;
}
}
profilerd {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
r2cp {
command binary-file-path;
disable;
}
redundancy-interface-process {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
remote-operations {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
resource-cleanup {
disable;
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
level (all | error |info |notice | verbose | warning);
no-remote-trace;
}
}
routing {
disable;
failover (alternate-media | other-routing-engine);
}
sampling {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
sbc-configuration-process {
disable;
failover (alternate-media | other-routing-engine);
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
}
}
sdk-service {
disable;
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
level (all | error |info |notice | verbose | warning);
no-remote-trace;
}
}
secure-neighbor-discovery {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
security-log {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
send {
disable;
}
service-deployment {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
shm-rtsdbd {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
simple-mail-client-service {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
smtpd-service {
disable;
}
snmp {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
static-subscribers {
disable;
}
statistics-service {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
subscriber-management {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
subscriber-management-helper {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
system-health-management {
disable;
}
tunnel-oamd {
command binary-file-path;
disable;
}
uac-service {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
usb-control {
command binary-file-path;
disable;
}
virtualization-service {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
vrrp {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
wan-acceleration {
disable;
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
}
}
watchdog {
enable;
disable;
timeout value;
}
web-management {
disable;
failover (alternate media | other-routing-engine);
}
wireless-lan-service {
disable;
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
}
}
wireless-wan-service {
disable;
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
}
}
proxy {
password password;
port port-number;
server url;
username user-name;
}
radius-options {
attributes {
nas-ip-address nas-ip-address;
}
password-protocol mschap-v2;
}
radius-server server-address {
accounting-port number;
max-outstanding-requests number;
port number;
retry number;
secret password;
source-address source-address;
timeout seconds;
}
root-authentication {
encrypted-password password;
load-key-file url;
plain-text-password;
ssh-dsa public-key {
<from pattern-list>;
}
ssh-rsa public-key {
<from pattern-list>;
}
}
saved-core-context;
saved-core-files number;
scripts {
commit {
allow-transients;
direct-access;
file filename {
checksum (md5 | sha-256 | sha1);
optional;
refresh;
refresh-from url;
source url;
}
refresh;
refresh-from url;
traceoptions {
file {
filename;
files number;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
}
}
load-scripts-from-flash;
op {
file filename {
arguments name {
description text;
}
checksum (md5 | sha-256 | sha1);
command filename-alias;
description cli-help-text;
refresh;
refresh-from url;
source url;
}
no-allow-url;
refresh;
refresh-from url;
traceoptions {
file {
filename;
files number;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
}
}
security-profile security-profile-name {
address-book {
maximum amount;
reserved amount;
}
appfw-profile {
maximum amount;
reserved amount;
}
appfw-rule {
maximum amount;
reserved amount;
}
appfw-rule-set {
maximum amount;
reserved amount;
}
auth-entry {
maximum amount;
reserved amount;
}
cpu {
reserved percent;
}
dslite-softwire-initiator {
maximum amount;
reserved amount;
}
flow-gate {
maximum amount;
reserved amount;
}
flow-session {
maximum amount;
reserved amount;
}
idp-policy idp-policy-name;
logical-system logical-system-name;
nat-cone-binding {
maximum amount;
reserved amount;
}
nat-destination-pool {
maximum amount;
reserved amount;
}
nat-destination-rule {
maximum amount;
reserved amount;
}
nat-interface-port-ol {
maximum amount;
reserved amount;
}
nat-nopat-address {
maximum amount;
reserved amount;
}
nat-pat-address {
maximum amount;
reserved amount;
}
nat-pat-portnum {
maximum amount
reserved amount
}
nat-port-ol-ipnumber {
maximum amount;
reserved amount;
}
nat-rule-referenced-prefix {
maximum amount;
reserved amount;
}
nat-source-pool {
maximum amount;
reserved amount;
}
nat-source-rule {
maximum amount;
reserved amount;
}
nat-static-rule {
maximum amount;
reserved amount;
}
policy {
maximum amount;
reserved amount;
}
policy-with-count {
maximum amount;
reserved amount;
}
root-logical-system;
scheduler {
maximum amount;
reserved amount;
}
zone {
maximum amount;
reserved amount;
}
}
security-profile-resources {
cpu-control;
cpu-control-target percent;
}
services {
database-replication {
traceoptions {
file {
filename ;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
}
}
dhcp {
boot-file filename;
boot-server (address | hostname);
default-lease-time (infinite | seconds);
domain-name domain-name;
domain-search dns-search-suffix;
maximum-lease-time (infinite | seconds);
name-server ip-address;
next-server ip-address;
option option-identifier-code array type-name [ type-values ] | byte 8-bit-value | flag
(false | off | on | true) | integer signed-32-bit-value | ip-address address | short
signed-16-bit-value | string text-string | unsigned-integer 32-bit-value |
unsigned-short 16-bit-value);
pool subnet-ip-address/mask {
address-range {
high address;
low address;
}
boot-file filename;
boot-server (address | hostname);
default-lease-time (infinite | seconds);
domain-name domain-name;
domain-search dns-search-suffix;
exclude-address ip-address;
maximum-lease-time (infinite | seconds);
name-server ip-address;
next-server ip-address;
option option-identifier-code array type-name [ type-values ] | byte 8-bit-value |
flag (false | off | on | true) | integer signed-32-bit-value | ip-address address |
short signed-16-bit-value | string text-string | unsigned-integer 32-bit-value |
unsigned-short 16-bit-value);
propagate-ppp-settings interface-name;
propagate-settings interface-name;
router ip-address;
server-identifier dhcp-server;
sip-server {
address ip-address;
name sip-server-name;
}
wins-server ip-address;
}
propagate-ppp-settings interface-name;
propagate-settings interface-name;
router ip-address;
server-identifier dhcp-server;
sip-server {
address ip-address;
name sip-server-name;
}
static-binding mac-address;
traceoptions {
file {
filename ;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
level (all | error | info | notice | verbose | warning);
no-remote-trace;
}
wins-server ip-address;
}
dhcp-local-server {
dhcpv6 {
authentication {
password password;
username-include {
circuit-type;
client-id;
delimiter delimiter-character;
domain-name domain-name;
interface-name;
logical-system-name;
relay-agent-interface-id;
relay-agent-remote-id;
relay-agent-subscriber-id;
routing-instance-name;
user-prefix user-prefix;
}
}
dynamic-profile {
profile-name;
aggregate-clients {
merge;
replace;
}
junos-default-profile;
use-primary dynamic-profile-name;
}
group group-name {
authentication {
password password;
username-include {
circuit-type;
client-id;
delimiter delimiter-character;
domain-name domain-name;
interface-name;
logical-system-name;
relay-agent-interface-id;
relay-agent-remote-id;
relay-agent-subscriber-id;
routing-instance-name;
user-prefix user-prefix;
}
}
dynamic-profile {
profile-name;
aggregate-clients {
merge;
replace;
}
junos-default-profile;
use-primary dynamic-profile;
}
interface interface-name {
dynamic-profile {
profile-name;
aggregate-clients {
merge;
replace;
}
junos-default-profile;
use-primary dynamic-profile-name;
}
exclude;
overrides {
delegated-pool pool-name;
interface-client-limit number;
process-inform {
pool pool-name;
}
rapid-commit ;
}
service-profile service-profile-name
trace ;
upto interface-name;
}
liveness-detection {
failure-action {
clear-binding;
clear-binding-if-interface-up;
log-only;
}
method {
bfd {
detection-time {
threshold milliseconds;
}
holddown-interval interval;
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
session-mode (automatic | multihop | single-hop);
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
version (0 | 1 | automatic);
}
}
overrides {
delegated-pool pool-name;
interface-client-limit number;
process-inform {
pool pool-name;
}
rapid-commit ;
}
reconfigure {
attempts number;
clear-on-abort;
strict;
timeout number;
token token-name;
trigger {
radius-disconnect;
}
}
service-profile service-profile-name;
}
liveness-detection {
failure-action {
clear-binding;
clear-binding-if-interface-up;
log-only;
}
method {
bfd {
detection-time {
threshold milliseconds;
}
holddown-interval interval;
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
multiplier number;
no-adaptation;
session-mode (automatic | multihop | single-hop);
transmit-interval {
minimum-interval milliseconds;
threshold milliseconds;
}
version (0 | 1 | automatic);
}
}
overrides {
delegated-pool pool-name;
interface-client-limit number;
process-inform {
pool pool-name;
}
rapid-commit ;
}
reconfigure {
attempts number;
clear-on-abort;
strict;
timeout number;
token token-name;
trigger {
radius-disconnect;
}
}
service-profile service-profile-name;
}
group group-name {
interface interface-name {
exclude;
upto upto-interface-name;
}
}
}
dns {
dns-proxy {
cache hostname inet ip-address;
default-domain domain-name {
forwarders ip-address;
}
interface interface-name;
propogate-setting (enable | disable);
view view-name {
domain domain-name {
forwarders ip-address;
}
match-clients subnet-address;
}
}
}
dnssec {
disable;
dlv {
domain-name domain-name trusted-anchor trusted-anchor;
}
secure-domains domain-name;
trusted-keys (key dns-key | load-key-file url);
forwarders {
ip-address;
}
max-cache-ttl seconds;
max-ncache-ttl seconds;
traceoptions {
category {
category-type;
}
debug-level level;
file {
filename;
files number;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
level (all | error | info | notice | verbose | warning);
no-remote-trace;
}
}
dynamic-dns {
client hostname {
agent agent-name;
interface interface-name;
password server-password;
server server-name;
username user-name;
}
}
finger {
connection-limit number;
rate-limit number;
}
ftp {
connection-limit number;
rate-limit number;
}
netconf {
ssh {
connection-limit number;
port port-number;
rate-limit number;
}
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
on-demand;
}
}
outbound-ssh {
client client-id {
address {
port port-number;
retry number;
timeout value;
}
device-id device-id;
keep-alive {
retry number;
time-out value;
}
reconnect-strategy (in-order |sticky);
secret secret;
services {
netconf;
}
}
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
}
}
service-deployment {
local-certificate certificate-name;
servers server-address {
port port-number;
security-options {
ssl3;
tls;
}
user user-name;
}
source-address source-address;
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
}
}
ssh {
ciphers [cipher];
client-alive-count-max number;
client-alive-interval seconds;
connection-limit number;
hostkey-algorithm {
(ssh-dss | no-ssh-dss);
(ssh-ecdsa |no-ssh-ecdsa);
(ssh-rsa | no-ssh-rsa);
}
key-exchange [algorithm];
macs [algorithm];
max-sessions-per-connection number;
protocol-version {
v1;
v2;
}
rate-limit number;
root-login (allow | deny | deny-password);
(tcp-forwarding | no-tcp-forwarding);
}
subscriber-management {
enforce-strict-scale-limit-license;
gres-route-flush-delay;
maintain-subscriber interface-delete;
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
}
}
subscriber-management-helper {
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
}
}
telnet {
connection-limit number;
rate-limit number;
}
web-management {
control {
max-threads number;
}
http {
interface [interface-name];
port port-number;
}
https {
interface [interface-name];
local-certificate name;
pki-local-certificate name;
port port-number;
system-generated-certificate;
}
management-url url;
session {
idle-timeout minutes;
session-limit number;
}
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
level (all | error | info | notice | verbose | warning);
no-remote-trace;
}
}
xnm-clear-text {
connection-limit number;
rate-limit number;
}
xnm-ssl {
connection-limit number;
local-certificate name;
rate-limit number;
}
}
static-host-mapping hostname {
alias [host-name-alias];
inet [ip- address];
inet6 [ipv6- address];
sysid system-identifier;
}
syslog {
allow-duplicates;
archive {
binary-data;
files number;
size maximum-file-size;
(world-readable | no-world-readable);
}
console {
(any | facility) severity;
}
file filename {
allow-duplicates;
archive {
archive-sites url {
password password;
}
(binary-data| no-binary-data);
files number;
size maximum-file-size;
start-time "YYYY-MM-DD.hh:mm";
transfer-interval minutes;
(world-readable | no-world-readable);
}
structure-data {
brief;
}
(any | facility) severity;
}
host (hostname | other-routing-engine) {
(any | facility) severity;
}
log-rotate-frequency minutes;
source-address source-address;
time-format {
millisecond;
year;
}
user (username | *) {
(any | facility) severity;
}
}
tacplus-options {
(exclude-cmd-attribute | no-cmd-attribute-value);
service-name service-name;
}
tacplus-server server-address {
port port-number;
secret password;
single-connection;
source-address source-address;
timeout seconds;
}
time-zone (GMThour-offset | time-zone);
tracing {
destination-override {
syslog {
host address;
}
}
}
use-imported-time-zones;
}
Related • Master Administrator for Logical Systems Feature Guide for Security Devices
Documentation
• Firewall User Authentication Feature Guide for Security Devices
ciphers
Description Specify the set of ciphers the SSH server can use to perform encryption and decryption
functions.
Options • 3des-cbc—Triple Data Encryption Standard (DES) in Cipher Block Chaining (CBC)
mode.
connection-limit
Description Configure the maximum number of connection sessions for each type of system services
(finger, ftp, ssh, telnet, xnm-clear-text, or xnm-ssl) per protocol (either IPv6 or IPv4).
Options limit—Maximum number of established connections per protocol (either IPv6 or IPv4).
On all high-end SRX Series devices, the range and default value are as follows:
Range: 1 through 250
Default: 75
Syntax disable;
dlv
Syntax dlv {
domain-name domain-name trusted-anchor trusted-anchor;
}
kernel-replication (System)
Syntax kernel-replication;
location
Syntax location {
altitude feet;
building name;
country -code code;
floor number;
hcoord horizontal-coordinate;
lata service-area;
latitude degrees;
longitude degrees;
npa-nxx number;
postal-code postal-code;
rack number;
vcoord vertical-coordinate;
}
• npa-nxx number—First six digits of the phone number (area code and exchange).
macs
Description Specify the set of message authentication code (MAC) algorithms that the SSH server
can use to authenticate messages.
protocol-version
Default v2—SSH protocol version 2 is the default, introduced in Junos OS Release 11.4.
radius-server
Description Configure RADIUS server address for subscriber access management, Layer 2 Tunnelling
Protocol (L2TP), or (Point-to-Point Protocol (PPP).
Default: 1813
Default: 1812
• retry value—Number of times that the router is allowed to attempt to contact a RADIUS
server.
Range: 1 through 10
Default: 3
Default: 3 seconds
root-authentication
Syntax root-authentication {
encrypted-password password;
load-key-file URL;
plain-text-password;
ssh-dsa public-key {
<from pattern-list>;
}
ssh-rsa public-key {
<from pattern-list>;
}
}
• plain-text-password—The CLI prompts you for a password encrypts it, and stores the
encrypted version in its user database.
single-connection
Syntax single-connection;
Description Optimize the attempt to connect to a TACACS+ server. Junos OS maintains one open
TCP connection to the server for multiple requests rather than opening a connection for
each connection attempt.
static-subscribers
Syntax static-subscribers {
disable;
}
Description Associate subscribers with statically configured interfaces, and provide dynamic service
activation for these subscribers.
statistics-service
Syntax statistics-service {
command binary-file-path;
disable;
}
Description Specify the Packet Forwarding Engine (PFE) statistics service management process.
subscriber-management
Syntax subscriber-management {
command binary-file-path;
disable;
}
subscriber-management-helper
Syntax subscriber-management-helper {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
• failover—Configure the device to reboot if the software process fails four times within
30 seconds, and specify the software to use during the reboot.
uac-service
Syntax uac-service {
command binary-file-path;
disable;
failover (alternate-media | other-routing-engine);
}
• failover—Configure the device to reboot if the software process fails four times within
30 seconds, and specify the software to use during the reboot.
usb-control
Supported Platforms LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Syntax usb-control {
command binary-file-path;
disable;
}
watchdog
Syntax watchdog {
disable;
enable;
timeout value;
}
Description Enable or disable the watchdog timer when Junos OS encounters a problem.
web-management
Syntax web-management {
disable;
failover (alternate-media | other-routing-engine);
}
• failover—Configure the device to reboot if the software process fails four times within
30 seconds, and specify the software to use during the reboot.
Syntax web-management {
http {
interfaces interface-names ;
port port;
}
https {
interfaces interface-names;
system-generated-certificate name;
port port;
}
management url management url;
session {
idle-timout minutes;
session-limit number;
}
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(no-world-readable | world-readable);
}
flag flag;
level level;
no-remote-trace;
}
}
Description Configure settings for HTTP or HTTPS access. HTTP access allows management of the
device using the J-Web interface. HTTPS access allows secure management of the device
using the J-Web interface. With HTTPS access, communication is encrypted between
your browser and the webserver for your device.
Range: 0 through 16
http—Configure HTTP.
https—Configure HTTPS.
• filename—Name of the file to receive the output of the tracing operation. Enclose
the name within quotation marks. All files are placed in the directory /var/log.
By default, the name of the file is the name of the process being traced.
• files number— Maximum number of trace files. When a trace file named trace-file
reaches its maximum size, it is renamed trace-file.0, then trace-file.1, and so on,
until the maximum number of trace files is reached. Then the oldest trace file
is overwritten.
If you specify a maximum number of files, you also must specify a maximum
file size with the size maximum file-size option.
Default: 10 files
• match regular-expression—Refine the output to include lines that contain the regular
expression.
Range: 10 KB through 1 GB
Default: 128 KB
If you specify a maximum file size, you also must specify a maximum number of
trace files with the files number option.
• flag flag—Specify which tracing operation to perform. To specify more than one
tracing operation, include multiple flag statements. You can include the following
flags.
• configuration—Trace configuration.
Administration
• Secure Web Access on page 255
• User Authentication and Access on page 263
• USB Modems for Remote Management Setup on page 291
• Telnet and SSH Device Control on page 295
• DHCP for IP Address Device on page 303
• File Management on page 307
• Licenses on page 315
• Operational Commands on page 325
1. Enter openssl in the CLI. The openssl command generates a self-signed SSL certificate
in privacy-enhanced mail (PEM) format. It writes the certificate and an unencrypted
1024-bit RSA private key to the specified file.
Replace filename with the name of a file in which you want the SSL certificate to be
written—for example, new.pem.
2. When prompted, type the appropriate information in the identification form. For
example, type US for the country name.
cat new.pem
Copy the contents of this file for installing the SSL certificate.
[edit]
user@host# show system services web-management https
system-generated-certificate
2. If you have root login access, you can manually generate the self-signed certificate
by using the following commands:
NOTE: When generating the certificate, you must specify the subject,
e-mail address, and either domain-name or ip-address.
[edit]
You can use the Management tab to configure IPv4 and loopback addresses on the
device.
4. If you want to enable a loopback address for the device, enter an address and
corresponding subnet mask in the Loopback address section.
5. If you want to enable an IPv4 address for the device, select IPv4 address and enter a
corresponding management port, subnet mask, and default gateway.
You can use the Services tab to specify the type of connections that users can make to
the device. For instance, you can enable secure HTTPS sessions to the device or enable
access to the Junos XML protocol XML scripting API.
4. If you want to enable users to create secure Telnet or secure SSH connections to the
device, select Enable Telnet or Enable SSH.
5. If you want to enable access to the Junos XML protocol XML scripting API, select
Enable Junos XML protocol over clear text or Enable Junos XML protocol over SSL. If
you enable Junos XML protocol over SSL, select the certificate you want to use for
encryption from the Junos XML protocol certificate drop-down list.
6. Select Enable HTTP if you want users to connect to device interfaces over an HTTP
connection. Then specify the interfaces that should use the HTTP connection:
• Enable on all interfaces—Select this option if you want to enable HTTP on all device
interfaces.
• Selected interfaces—Use the arrow buttons to populate this list with individual
interfaces if you want to enable HTTP on only some of the device interfaces.
7. If you want users to connect to device interfaces over a secure HTTPS connection,
select Enable HTTPS. Then select which certificate you want to use to secure the
connection from the HTTPS certificates list and specify the interfaces that should use
the HTTPS connection:
• Enable on all interfaces—Select this option if you want to enable HTTPS on all device
interfaces.
• Selected interfaces—Use the arrow buttons to populate this list with individual
interfaces if you want to enable HTTPS on only some of the device interfaces.
To verify that Web access is enabled correctly, connect to the device using one of the
following methods:
• For HTTP access—In your Web browser, type http://URL or http://IP address.
• For HTTPS access—In your Web browser, type https://URL or https://IP address.
• For SSL Junos XML protocol access—A Junos XML protocol client such as Junos Scope
is required.
This example shows how to configure secure Web access on your device.
Requirements
No special configuration beyond device initialization is required before configuring this
feature.
NOTE: You can enable HTTPS access on specified interfaces. If you enable
HTTPS without specifying an interface, HTTPS is enabled on all interfaces.
Overview
In this example, you import the SSL certificate that you have generated as a new and
private key in PEM format. You then enable HTTPS access and specify the SSL certificate
to be used for authentication. Finally, you specify the port as 8443 on which HTTPS
access is to be enabled.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
[edit security]
user@host# set certificates local new load-key-file /var/tmp/new.pem
2. Enable HTTPS access and specify the SSL certificate and port.
[edit system]
user@host# set services web-management https local-certificate new port 8443
Results From configuration mode, confirm your configuration by entering the show security
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
[edit]
user@host# show security
certificates {
local {
new {
"-----BEGIN RSA PRIVATE KEY-----\nMIICXQIBAAKBgQC/C5UI4frNqbi
qPwbTiOkJvqoDw2YgYse0Z5zzVJyErgSg954T\nEuHM67Ck8hAOrCnb0YO+SY
Y5rCXLf4+2s8k9EypLtYRw/Ts66DZoXI4viqE7HSsK\n5sQw/UDBIw7/MJ+OpA
... KYiFf4CbBBbjlMQJ0HFudW6ISVBslONkzX+FT\ni95ddka6iIRnArEb4VFCRh+
e1QBdp1UjziYf7NuzDx4Z\n -----END RSA PRIVATE KEY-----\n-----BEGIN
CERTIFICATE----- \nMIIDjDCCAvWgAwIBAgIBADANBgkqhkiG9w0BAQQ ...
FADCBkTELMAkGA1UEBhMCdXMx\nCzAJBgNVBAgTAmNhMRIwEAYDVQQHEwlzdW5ue
HB1YnMxDTALBgNVBAMTBGpucHIxJDAiBgkqhkiG\n9w0BCQEWFW5iaGFyZ2F2YUB
fLUYAnBYmsYWOH\n -----END CERTIFICATE-----\n"; ## SECRET-DATA
}
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Action From operational mode, enter the show system services command. The following sample
output displays the sample values for secure Web access:
[edit]
user@host# show system services
web-management {
http;
https {
port 8443;
local-certificate new;
}
}
You can use the Certificates tab to upload SSL certificates to the device, edit existing
certificates on the device, or delete certificates from the device. You can use the
certificates to secure HTTPS and Junos XML protocol sessions.
• If you want to add a new certificate, click Add. The Add Certificate section is
expanded.
• If you want to edit the information for an existing certificate, select it and click Edit.
The Edit Certificate section is expanded.
• If you want to delete an existing certificate, select it and click Delete. (You can skip
the remaining steps in this section.)
6. In the Certificate content box, paste the generated certificate and RSA private key.
7. Click Save.
This example shows how to configure a RADIUS server for system authentication.
Requirements
Before you begin:
• Perform the initial device configuration. See the Getting Started Guide for your device.
• Configure at least one RADIUS server. For more details, see RADIUS Authentication and
Accounting Servers Configuration Overview.
Overview
In this example, you add a new RADIUS server with an IP address of 172.16.98.1 and specify
the shared secret password of the RADIUS server as Radiussecret1. The secret is stored
as an encrypted value in the configuration database. Finally, you specify the source
address to be included in the RADIUS server requests by the device. In most cases you
can use the loopback address of the device, which in this example is 10.0.0.1.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
4. In the RADIUS section, click Add. The Add Radius Server dialog box appears.
6. In the Password and Confirm Password boxes, type the secret password for the server
and verify your entry.
8. In the Source Address box, type the source IP address of the server.
9. In the Retry Attempts box, specify the number of times that the server should try to
verify the user’s credentials.
10. In the Time Out box, specify the amount of time (in seconds) the device should wait
for a response from the server.
12. If you are done configuring the device, click Commit Options>Commit.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
[edit system]
user@host# set radius-server address 172.16.98.1
[edit system]
user@host# set radius-server 172.16.98.1 secret Radiussecret1
[edit system]
user@host# set radius-server 172.16.98.1 source-address 10.0.0.1
Results From configuration mode, confirm your configuration by entering the show system
radius-server command. If the output does not display the intended configuration, repeat
the configuration instructions in this example to correct it.
[edit]
user@host# show system radius-server
radius-server 172.16.98.1 {
secret Radiussecret1;
source-address 10.0.0.1;
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Verify that the RADIUS server has been configured for system authentication.
Action From operational mode, enter the show system radius-server command.
This example shows how to configure a TACACS+ server for system authentication.
Requirements
Before you begin:
• Perform the initial device configuration. See the Getting Started Guide for your device.
Overview
In this example, you set the IP address to 172.16.98.24 and the shared secret password
of the TACACS+ server to Tacacssecret1. The secret password is stored as an encrypted
value in the configuration database. You then set the loopback source address as 10.0.0.1
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
4. In the TACACS section, click Add. The Add TACACS Server dialog box appears.
6. In the Password and Confirm Password boxes, type the secret password for the server
and verify your entry.
8. In the Source Address box, type the source IP address of the server.
9. In the Retry Attempts box, specify the number of times that the server should try to
verify the user’s credentials.
10. In the Time Out box, specify the amount of time (in seconds) the device should wait
for a response from the server.
12. If you are done configuring the device, click Commit Options>Commit.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
[edit system]
user@host# set tacplus-server address 172.16.98.24
[edit system]
user@host# set tacplus-server 172.16.98.24 secret Tacacssecret1
[edit system]
user@host# set tacplus-server 172.16.98.24 source-address 10.0.0.1
Results From configuration mode, confirm your configuration by entering the show system
tacplus-server command. If the output does not display the intended configuration, repeat
the configuration instructions in this example to correct it.
[edit]
user@host# show system tacplus-server
tacplus-server 172.16.98.24 {
secret Tacacssecret1;
source-address 10.0.0.1;
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Verify that the TACACS+ server has been configured for system authentication.
Action From operational mode, enter the show system tacplus-server command.
Requirements
Before you begin, perform the initial device configuration. See the Getting Started Guide
for your device.
Overview
You can configure the authentication methods that the device uses to verify that a user
can gain access. For each login attempt, the device tries the authentication methods in
order, starting with the first one, until the password matches. If you do not configure
system authentication, users are verified based on their configured local passwords.
This example configures the device to attempt user authentication with the local password
first, then with the RADIUS server, and finally with the TACACS+ server.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
4. Under Available Methods, select the authentication method the device should use to
authenticate users, and use the arrow button to move the item to the Selected Methods
list. Available methods include:
• RADIUS
• TACACS+
• Local Password
If you want to use multiple methods to authenticate users, repeat this step to add the
additional methods to the Selected Methods list.
5. Under Selected Methods, use the Up Arrow and Down Arrow to specify the order in
which the device should execute the authentication methods.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
[edit]
user@host# insert system authentication-order radius after password
[edit]
user@host# insert system authentication-order tacplus after radius
Results From configuration mode, confirm your configuration by entering the show system
authentication-order command. If the output does not display the intended configuration,
repeat the configuration instructions in this example to correct it.
[edit]
user@host# show system authentication-order
authentication-order [password, radius, tacplus];
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Action From operational mode, enter the show system authentication-order command.
Requirements
No special configuration beyond device initialization is required before configuring this
feature.
Overview
You can add new users to the device’s local database. For each account, you define a
login name and password for the user and specify a login class for access privileges. The
login password must meet the following criteria:
• You can include most character classes in a password (alphabetic, numeric, and special
characters), but not control characters.
• The password must contain at least one change of case or character class.
In this example, you create a login class named operator-and-boot and allow it to reboot
the device. You can define any number of login classes. You then allow the
operator-and-boot login class to use commands defined in the clear, network, reset,
trace, and view permission bits.
Then you create user accounts. User accounts provide enable you to access the device.
(You can access the device without accounts if you configured RADIUS or TACACS+
servers.) You set the username as cmartin and the login class as superuser. Finally, you
define the encrypted password for the user.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
4. Click Add to add a new user. The Add User dialog box appears.
5. In the User name box, type a unique name for the user.
If the full name contains spaces, enclose it in quotation marks. Do not include colons
or commas.
8. In the Password and Confirm Password boxes, enter a login password for the user
and verify your entry.
9. From the Login Class list, select the user’s access privilege:
• operator
• read-only
• unauthorized
10. Click OK in the Add User dialog box and Edit User Management dialog box.
12. If you are done configuring the device, click Commit Options>Commit.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
1. Set the name of the login class and allow the use of the reboot command.
3. Set the username, login class, and encrypted password for the user.
Results From configuration mode, confirm your configuration by entering the show system login
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
[edit]
user@host# show system login
class operator-and-boot {
permissions [ clear network reset trace view ];
allow-commands "request system reboot";
}
user cmartin {
class superuser;
authentication {
encrypted-password "$1$ABC123";
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Action From operational mode, enter the show system login command.
This example shows how to configure system retry options to protect the device from
malicious users.
Requirements
Before you begin, you should understand “Handling Authorization Failure” on page 280.
Overview
Malicious users sometimes try to log in to a secure device by guessing an authorized user
account’s password. Locking out a user account after a number of failed authentication
attempts helps protect the device from malicious users.
Device lockout allows you to configure the number of failed attempts before the user
account is locked out of the device and configure the amount of time before the user can
attempt to log in to the device again. You can configure the amount of time in-between
failed login attempts of a user account and can manually lock and unlock user accounts.
NOTE:
This example includes the following settings:
• backoff-factor — Sets the length of delay in seconds after each failed login
attempt. When a user incorrectly logs in to the device, the user must wait
the configured amount of time before attempting to log in to the device
again. The length of delay increases by this value for each subsequent login
attempt after the value specified in the backoff-threshold statement. The
default value for this statement is five seconds, with a range of five to ten
seconds.
• lockout-period — Sets the amount of time in minutes before the user can
attempt to log in to the device after being locked out due to the number of
failed login attempts specified in the tries-before-disconnect statement.
When a user fails to correctly login after the number of allowed attempts
specified by the tries-before-disconnect statement, the user must wait the
configured amount of minutes before attempting to log in to the device
again. The lockout-period must be greater than zero. The range at which
you can configure the lockout-period is one through 43,200 minutes.
Once a user is locked out of the device, if you are the security administrator,
you can manually remove the user from this state using the clear system login
lockout <username> command. You can also use the show system login lockout
command to view which users are currently locked out, when the lockout
period began for each user, and when the lockout period ends for each user.
If the security administrator is locked out of the device, he can log in to the
device from the console port, which ignores any user locks. This provides a
way for the administrator to remove the user lock on their own user account.
In this example the user waits for the backoff-threshold multiplied by the backoff-factor
interval, in seconds, to get the login prompt. In this example, the user must wait 5 seconds
after the first failed login attempt and 10 seconds after the second failed login attempt
to get the login prompt. The user gets disconnected after 15 seconds after the third failed
attempt because the tries-before-disconnect option is configured as 3.
The user cannot attempt anther login until 120 minutes has elapsed, unless a security
administrator manually clears the lock sooner.
Configuration
CLI Quick To quickly configure the lockout-period, copy the following commands, paste them in a
Configuration text file, remove any line breaks, and then copy and paste the commands into the CLI.
[edit]
set system login retry-options backoff-factor 5
set system login retry-options backoff-threshold 1
set system login retry-options lockout-period 120
set system login retry-options tries-before-disconnect 3
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
[edit ]
user@host# set system login retry-options backoff-factor 5
[edit]
user@host# set system login retry-options backoff-threshold 1
3. Configure the amount of time the device gets locked after failed attempts.
[edit]
user@host# set system login retry-options lockout-period 5
4. Configure the number of unsuccessful attempts during which, the device can remain
unlocked.
[edit]
user@host# set system login retry-options tries-before-disconnect 3
Results From configuration mode, confirm your configuration by entering the show system login
retry-options command. If the output does not display the intended configuration, repeat
the configuration instructions in this example to correct it.
[edit]
user@host# show system login retry-options
backoff-factor 5;
backoff-threshold 1;
lockout-period 5;
tries-before-disconnect 3;
If you are done configuring the device, enter commit from configuration mode.
Verification
Action Attempt 3 unsuccessful logins for a particular username. The device gets locked for the
user and then login to the device with a different user name. From operational mode,
enter the show system login lockout command.
Meaning When you perform 3 unsuccessful login attempts with a particular username, the device
is locked for that user for 5 minutes as configured in the example. You can verify that the
user is, locked by logging in to the device with a different username and entering the show
system login lockout command.
Requirements
No special configuration beyond device initialization is required before configuring this
feature.
Overview
You can create template accounts that are shared by a set of users when you are using
RADIUS or TACACS+ authentication. When a user is authenticated by a template account,
the CLI username is the login name, and the privileges, file ownership, and effective user
ID are inherited from the template account.
• The authenticated user's record in the RADIUS or TACACS+ server specifies local user,
or the specified local user does not exist locally on the device.
In this example, you create a remote template account and set the username to remote
and the login class for the user as operator. You create a remote template that is applied
to users authenticated by RADIUS or TACACS+ that do not belong to a local template
account.
You then create a local template account and set the username as admin and the login
class as superuser. You use local template accounts when you need different types of
templates. Each template can define a different set of permissions appropriate for the
group of users who use that template.
Configuration
• Creating a Remote Template Account on page 278
• Creating a Local Template Account on page 278
CLI Quick To quickly configure this section of the example, copy the following command, paste it
Configuration into a text file, remove any line breaks, change any details necessary to match your
network configuration, and then copy and paste the command into the CLI at the [edit]
hierarchy level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
1. Set the username and the login class for the user.
Results From configuration mode, confirm your configuration by entering the show system login
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
[edit]
user@host# show system login
user remote {
class operator;
}
If you are done configuring the device, enter commit from configuration mode.
CLI Quick To quickly configure this section of the example, copy the following command, paste it
Configuration into a text file, remove any line breaks, change any details necessary to match your
network configuration, and then copy and paste the command into the CLI at the [edit]
hierarchy level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
1. Set the username and the login class for the user.
Results From configuration mode, confirm your configuration by entering the show system login
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
[edit]
user@host# show system login
user admin {
class super-user;
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Action From operational mode, enter the show system login command.
The security administrator can configure the number of times a user can try to log in to
the device with invalid login credentials. The device can be locked after the specified
number of unsuccessful authentication attempts. This helps to protect the device from
malicious users attempting to access the system by guessing an account’s password.
The security administrator can unlock the user account or define a time period for the
user account to remain locked.
The system lockout-period defines the amount of time the device can be locked for a
user account after a specified number of unsuccessful login attempts.
The security administrator can configure a period of time after which an inactive session
will be locked and require re-authentication to be unlocked. This helps to protect the
device from being idle for a long period before the session times out.
The system idle-timeout defines length of time the CLI operational mode prompt remains
active before the session times out.
The security administrator can configure a banner with an advisory notice to be displayed
before the identification and authentication screen.
The system message defines the system login message. This message appears before
a user logs in.
A system user can be a member of a class that allows the user to act as a particular kind
of administrator for the system. Requiring a specific role to view or modify an item restricts
the extent of information a user can obtain from the system. It also limits how much of
the system is open to intentional or unintentional modification or observation by a user.
We recommend that you use the following guidelines when you are designing
administrative roles:
• Restrict each user to the smallest set of privileges needed to perform the user’s duties.
• Do not allow any user to belong to a login class containing the shell permission flag.
The shell permission flag allows users to run the start shell command from the CLI.
• Allow users to have rollback permissions. Rollback permissions allow users to undo
an action performed by an administrator but does not allow them to commit the
changes.
You can assign an administrative role to a user by configuring a login class to have the
privileges required for that role. You can configure each class to allow or deny access to
configuration statements and commands by name. These specific restrictions override
and take precedence over any permission flags also configured in the class. You can
assign one of the following role attributes to an administrative user.
• IDS-administrator—Allows the user to monitor and clear the intrusion detection service
(IDS) security logs.
• Cryptographic Administrator
• Audit Administrator
• Configures and deletes the audit review search and sort feature.
• Security Administrator
• Enables, disables, determines, and modifies the audit analysis and audit selection
functions and configures the device to automatically delete audit logs.
• Specifies the limits, network identifiers, and time periods for quotas on controlled
connection-oriented resources.
• Specifies the network addresses permitted to use Internet Control Message Protocol
(ICMP) or Address Resolution Protocol (ARP).
• Queries, modifies, deletes, and creates the information flow or access control rules
and attributes for the unauthenticated information flow security function policy
(SFP), the authenticated information flow SFP, the unauthenticated device services,
and the discretionary access control policy.
• Specifies initial values that override default values when object information is created
under unauthenticated information flow SFP, the authenticated information flow
SFP, the unauthenticated target of evaluation (TOE) services, and the discretionary
access control policy.
• Creates, deletes, or modifies the rules that control the address from which
management sessions can be established.
• Specifies and revokes security attributes associated with the users, subjects, and
objects.
• Specifies the percentage of audit storage capacity at which the device alerts
administrators.
You need to set the security-role attribute in the classes created for these administrative
roles. This attribute restricts which users can show and clear the security logs, actions
that cannot be performed through configuration alone.
For example, you need to set the security-role attribute in the ids-admin class created
for the IDS administrator role if you want to restrict clearing and showing IDS logs to the
IDS administrator role. Likewise, you need to set the security-role to one of the other
admin values to restrict that class from being able to clear and show non-IDS logs only.
This example shows how to configure individual administrative roles for a distinct, unique
set of privileges apart from all other administrative roles.
Requirements
No special configuration beyond device initialization is required before configuring this
feature.
Overview
This example configures four users:
When a security-admin class is configured, the privileges for creating administrators are
revoked from the user who created the security-admin class. Creation of new users and
logins is at the discretion of the security-officer.
In this example, you create audit admin, crypto admin, security admin, and ids admin
with permission flags pertaining to this role. Then you allow or deny access to configuration
statements and commands by name for each administrative role. These specific
restrictions take precedence over the permission flags also configured in the class. For
example, only the crypto-admin can run the request system set-encryption-key command,
which requires having the security permission flag to access it. Only the security-admin
can include the system time-zone statement in the configuration, which requires having
the system-control permission flag.
Configuration
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For information about navigating the CLI, see Using the CLI Editor in Configuration
Mode in the Junos OS CLI guide.
[edit]
user@host# set system login class audit-admin
[edit system login class audit-admin]
user@host# set permissions security
user@host# set permissions trace
user@host# set permissions maintenance
[edit]
user@host# set system login class crypto-admin
[edit]
user@host# set system login class security-admin
[edit]
user@host# set system login class ids-admin
[edit]
user@host# set system login
Results
From configuration mode, confirm your configuration by entering the show system
command. If the output does not display the intended configuration, repeat the
instructions in this example to correct the configuration.
[edit]
user@host# show system
system {
login {
class audit-admin {
permissions [ maintenance security trace ];
allow-commands "^clear (log|security log)";
deny-commands "^clear (security alarms|system login lockout)|^file
(copy|delete|rename)|^request (security|system
set-encryption-key)|^rollback|^set date|^show security
(alarms|dynamic-policies|match-policies|policies)|^start shell";
security-role audit-administrator;
}
class crypto-admin {
permissions [ admin-control configure maintenance security-control system-control
trace ];
allow-commands "^request (system set-encryption-key)";
deny-commands "^clear (log|security alarms|security log|system login lockout)|^file
(copy|delete|rename)|^rollback|^set date|^show security
(alarms|dynamic-policies|match-policies|policies)|^start shell";
allow-configuration-regexps "security (ike|ipsec) (policy|proposal)" "security ipsec
^vpn$ .* manual (authentication|encryption|protocol|spi)" "system fips self-test
after-key-generation" ;
security-role crypto-administrator;
}
class security-admin {
permissions [all];
deny-commands "^clear (log|security log)|^(clear|show) security alarms alarm-type
idp|^request (security|system set-encryption-key)|^rollback|^start shell";
deny-configuration-regexps "security alarms potential-violation idp" "security
(ike|ipsec) (policy|proposal)" "security ipsec ^vpn$ .* manual
(authentication|encryption|protocol|spi)" "security log exclude .* event-id IDP_.*"
"system fips self-test after-key-generation";
security-role security-administrator;
}
class ids-admin {
permissions [ configure maintenance security-control trace ];
deny-commands "^clear log|^(clear|show) security alarms
(alarm-id|all|newer-than|older-than|process|severity)|^(clear|show) security
alarms alarm-type
(authentication | cryptographic-self-test | decryption-failures | encryption-failures
| ike-phase1-failures | ike-phase2-failures|key-generation-self-test |
non-cryptographic-self-test |policy | replay-attacks) | ^file (copy|delete|rename)
|^request (security|system set-encryption-key) | ^rollback |
^set date | ^show security (dynamic-policies|match-policies|policies) |^start shell";
allow-configuration-regexps "security alarms potential-violation idp" "security log
exclude .* event-id IDP_.*";
deny-configuration-regexps "security alarms potential-violation
(authentication|cryptographic-self-test|decryption-
failures|encryption-failures|ike-phase1-failures|ike-phase2-failures|
key-generation-self-test|non-cryptographic-self-test|policy|replay-attacks)"
security-role ids-administrator;
}
user audit-officer {
class audit-admin;
authentication {
encrypted-password "$1$ABC123"; ## SECRET-DATA
}
}
user crypto-officer {
class crypto-admin;
authentication {
encrypted-password "$1$ABC123"; ## SECRET-DATA
}
}
user security-officer {
class security-admin;
authentication {
encrypted-password "$1$ABC123"; ##SECRET-DATA
}
}
user ids-officer {
class ids-admin;
authentication {
encrypted-password "$1$ABC123"; ## SECRET-DATA
}
}
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Action From operational mode, enter the show cli authorization command.
To remotely connect to the device through a USB modem connected to the USB port on
the device:
When the connection is complete, you can use Telnet or SSH to connect to the device.
You can use the CLI configuration editor to override the value of an initialization command
configured on the USB modem or configure additional commands for initializing USB
modems.
You can configure the following modem AT commands to initialize the USB modem:
• The command S0=2 configures the modem to automatically answer calls on the
second ring.
When you configure modem commands in the CLI configuration editor, you must follow
these conventions:
You can override the value of the S0=0 command in the initialization sequence configured
on the modem and add the L2 command.
2. If you are done configuring the device, enter commit from configuration mode.
If the USB modem does not respond, you can reset the modem.
CAUTION: If you reset the modem when a call is in progress, the call is
terminated.
To reset the USB modem, in operational mode, enter the following command:
• Configuring Password Retry Limits for Telnet and SSH Access on page 295
• Configuring Reverse Telnet and Reverse SSH on page 296
• Example: Controlling Management Access on SRX and J-Series Devices on page 297
• The telnet Command on page 300
• The ssh Command on page 301
To prevent brute force and dictionary attacks, the device performs the following actions
for Telnet or SSH sessions by default:
• After the second password retry, introduces a delay in multiples of 5 seconds between
subsequent password retries.
For example, the device introduces a delay of 5 seconds between the third and fourth
password retry, a delay of 10 seconds between the fourth and fifth password retry, and
so on.
You can configure the password retry limits for Telnet and SSH access. In this example,
you configure the device to take the following actions for Telnet and SSH sessions:
• Introduce a delay in multiples of 5 seconds between password retries that occur after
the second password retry.
1. Set the maximum number of consecutive password retries before a Telnet or SSH or
telnet session is disconnected. The default number is 10, but you can set a number
from 1 through 10.
2. Set the threshold number of password retries after which a delay is introduced between
two consecutive password retries. The default number is 2, but you can specify a value
from 1 through 3.
3. Set the delay (in seconds) between consecutive password retries after the threshold
number of password retries. The default delay is in multiples of 5 seconds, but you
can specify a value from 5 through 10 seconds.
4. Set the minimum length of time (in seconds) during which a Telnet or SSH session
cannot be disconnected. The default is 20 seconds, but you can specify an interval
from 20 through 60 seconds.
5. If you are done configuring the device, enter commit from configuration mode.
Supported Platforms J Series, LN Series, SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800, SRX650
[edit]
user@host# set system services reverse telnet
2. Specify the port to be used for reverse telnet. If you do not specify a port, 2900 is the
default port that is used.
[edit]
user@host# set system services reverse telnet port 5000
3. Enable reverse ssh to encrypt the connection between the device and the client.
[edit]
user@host# set system services reverse ssh
4. Specify the port for reverse ssh. If you do not specify a port, 2901 is the default port
that is used.
[edit]
user@host# set system services reverse ssh port 6000
5. If you are done configuring the device, enter commit from configuration mode.
• Configuring Password Retry Limits for Telnet and SSH Access on page 295
This example shows how to control management access on SRX Series devices.
Requirements
No special configuration beyond device initialization is required before configuring this
feature.
Overview
By default, any host on the trusted interface can manage a security device. To limit the
IP addresses that can manage a device, you can configure a firewall filter to deny all,
with the exception of the IP address or addresses to which you want to grant management
access. This example shows how to limit management access to a specific IP addresses
to allow it to manage SRX Series and J Series devices.
Configuration
• Configuring an IP Address List to Restrict Management Access to a Device on page 298
CLI Quick To quickly configure this example, copy the following commands, paste them into a text
Configuration file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
Step-by-Step The following example requires you to navigate various levels in the configuration
Procedure hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode.
[edit policy-options]
user@host# set prefix-list manager-ip 192.168.4.254/32
user@host# set prefix-list manager-ip 10.0.0.0/8
NOTE: The configured list is referenced in the actual filter, where you
can change your defined set of addresses.
2. Configure a firewall filter to deny traffic from all IP addresses except the IP addresses
defined in the "manager-ip" list. Management traffic that uses any of the listed
destination ports is rejected when the traffic comes from an address in the list.
3. Apply stateless firewall filters to the loopback interface to filter the packets
originating from the hosts to which you are granting management access.
Results From configuration mode, confirm your configuration by entering show configuration
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Verifying Interfaces
• show policy-options
• show firewall
• show interfaces
You can use the CLI telnet command to open a Telnet session to a remote device:
3 3 3 5 5
To exit the Telnet session and return to the Telnet command prompt, press Ctrl-].
To exit the Telnet session and return to the CLI command prompt, enter quit.
bypass-routing Bypass the routing tables and open a Telnet session only to hosts on directly attached
interfaces. If the host is not on a directly attached interface, an error message is returned.
interface source-interface Open a Telnet session to a host on the specified interface. If you do not include this
option, all interfaces are used.
port port Specify the port number or service name on the host.
routing-instance Use the specified routing instance for the Telnet session.
routing-instance-name
source address Use the specified source address for the Telnet session.
You can use the CLI ssh command to use the secure shell (SSH) program to open a
connection to a remote device:
3 3 3 5 5
bypass-routing Bypass the routing tables and open an SSH connection only to hosts on directly attached
interfaces. If the host is not on a directly attached interface, an error message is returned.
interface source-interface Open an SSH connection to a host on the specified interface. If you do not include this
option, all interfaces are used.
routing-instance Use the specified routing instance for the SSH connection.
routing-instance-name
source address Use the specified source address for the SSH connection.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Purpose View or clear information about client address bindings and statistics for the DHCP local
server.
Action • To display the address bindings in the client table on the DHCP local server:
• To clear the binding state of a DHCP client from the client table on the DHCP local
server:
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Purpose View or clear information about client address bindings and statistics for the DHCP client.
Action • To display the address bindings in the client table on the DHCP client:
• To clear the binding state of a DHCP client from the client table on the DHCP client:
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Purpose View or clear address bindings or statistics for DHCP relay agent clients.
Action • To display the address bindings for DHCP relay agent clients:
File Management
To disable the encryption of configuration files on a device and make them readable to
all:
2. Verify your permission to decrypt configuration files on this device by entering the
encryption key for the device.
[edit]
user@host# edit system
user@host# set no-encrypt-configuration-files
[edit]
user@host# commit
commit complete
To configure an encryption key in EEPROM and determine the encryption process, enter
one of the request system set-encryption-key commands in operational mode described
in Table 15 on page 308.
request system set-encryption-key Sets the encryption key and enables default configuration file
encryption:
request system set-encryption-key algorithm des Sets the encryption key and specifies configuration file
encryption by DES.
request system set-encryption-key unique Sets the encryption key and enables default configuration file
encryption with a unique encryption key that includes the
chassis serial number of the device.
request system set-encryption-key des unique Sets the encryption key and specifies configuration file
encryption by DES with a unique encryption key.
2. Configure an encryption key in EEPROM and determine the encryption process; for
example, enter the request system set-encryption-key command.
3. At the prompt, enter the encryption key. The encryption key must have at least six
characters.
[edit]
user@host# edit system
user@host# set encrypt-configuration-files
[edit]
user@host# commit
commit complete
When you modify the encryption key, the configuration files are decrypted and then
reencrypted with the new encryption key.
2. Configure a new encryption key in EEPROM and determine the encryption process;
for example, enter the request system set-encryption-key command.
3. At the prompt, enter the new encryption key. The encryption key must have at least
six characters.
Cleaning Up Files
You can use the J-Web user interface to rotate log files and delete unnecessary files on
the device. If you are running low on storage space, the file cleanup procedure quickly
identifies files that can be deleted.
• Rotates log files—Archives all information in the current log files and creates fresh log
files.
• Deletes log files in /var/log—Deletes any files that are not currently being written to.
• Deletes temporary files in /var/tmp—Deletes any files that have not been accessed
within two days.
• Deletes all crash files in /var/crash—Deletes any core files that the device has written
during an error.
• Deletes all software images (*.tgz files) in /var/sw/pkg—Deletes any software images
copied to this directory during software upgrades.
To rotate log files and delete unnecessary files with the J-Web user interface:
2. In the Clean Up Files section, click Clean Up Files. The device rotates log files and
identifies the files that can be safely deleted.
The J-Web user interface displays the files that you can delete and the amount of
space that will be freed on the file system.
• To delete the files and return to the Files page, click OK.
• To cancel your entries and return to the list of files in the directory, click Cancel.
You can use the CLI request system storage cleanup command to rotate log files and
delete unnecessary files on the device. If you are running low on storage space, the file
cleanup procedure quickly identifies files that can be deleted.
• Rotates log files—Archives all information in the current log files, deletes old archives,
and creates fresh log files.
• Deletes log files in /var/log—Deletes any files that are not currently being written to.
• Deletes temporary files in /var/tmp—Deletes any files that have not been accessed
within two days.
• Deletes all crash files in /var/crash—Deletes any core files that the device has written
during an error.
• Deletes all software images (*.tgz files) in /var/sw/pkg—Deletes any software images
copied to this directory during software upgrades.
To rotate log files and delete unnecessary files with the CLI:
2. Rotate log files and identify the files that can be safely deleted.
The device rotates log files and displays the files that you can delete.
NOTE: You can issue the request system storage cleanup dry-run command
to review the list of files that can be deleted with the request system storage
cleanup command, without actually deleting the files.
NOTE:
On SRX Series devices, the /var hierarchy is hosted in a separate partition
(instead of the root partition). If Junos OS installation fails as a result of
insufficient space:
• Use the request system storage cleanup command to delete temporary files.
• Delete any user-created files in both the root partition and under the /var
hierarchy.
Deleting Files
You can use the J-Web user interface to delete an individual file from the device. When
you delete the file, it is permanently removed from the file system.
CAUTION: If you are unsure whether to delete a file from the device, we
recommend using the Cleanup Files tool. This tool determines which files can
be safely deleted from the file system.
2. In the Download and Delete Files section, click one of the following file types:
• Log Files—Lists the log files located in the /var/log directory on the device.
• Temporary Files—Lists the temporary files located in the /var/tmp directory on the
device.
• Old Junos OS—Lists the software images in the (*.tgz files) in the /var/sw/pkg
directory on the device.
• Crash (Core) Files—Lists the core files located in the /var/crash directory on the
device.
The J-Web user interface displays the files located in the directory.
4. Click Delete.
The J-Web user interface displays the files you can delete and the amount of space
that will be freed on the file system.
• To delete the files and return to the Files page, click OK.
• To cancel your entries and return to the list of files in the directory, click Cancel.
Junos OS keeps a backup image of the software that was previously installed so that
you can downgrade to that version of the software if necessary. You can use the J-Web
user interface to delete this backup image. If you delete this image, you cannot downgrade
to this particular version of the software.
2. Review the backup image information listed in the Delete Backup Junos Package
section.
3. Click the Delete backup Junos package link to delete the backup image.
• To delete the backup image and return to the Files page, click OK.
• To cancel the deletion of the backup image and return to the Files page, click Cancel.
Downloading Files
You can use the J-Web user interface to download a copy of an individual file from the
device. When you download a file, it is not deleted from the file system.
2. In the Download and Delete Files section, click one of the following file types:
• Log Files—Lists the log files located in the /var/log directory on the device.
• Temporary Files—Lists the temporary files located in the /var/tmp directory on the
device.
• Old Junos OS—Lists the software images located in the (*.tgz files) in the /var/sw/pkg
directory on the device.
• Crash (Core) Files—Lists the core files located in the /var/crash directory on the
device.
The J-Web user interface displays the files located in the directory.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX650
If you configure your system to capture accounting data in log files, set the location for
your accounting files to the DRAM.
The default location for accounting files is the cfs/var/log directory on the CompactFlash
(CF) card. The nonpersistent option minimizes the read/write traffic to your CF card. We
recommend that you use the nonpersistent option for all accounting files configured on
your system.
2. Create an accounting data log file in DRAM and replace filename with the name of
the file.
[edit]
user@host# edit accounting-options file filename
[edit]
user@host# set file filename nonpersistent
CAUTION: If log files for accounting data are stored on DRAM, these files are
lost when the device reboots. Therefore, we recommend that you back up
these files periodically.
Licenses
2. Under Installed Licenses, click Display Keys to display all the license keys installed on
the device.
A screen displaying the license keys in text format appears. Multiple licenses are
separated by a blank line.
Related • Junos OS Feature License Model Number for J Series Services Routers and SRX Series
Documentation Services Gateways on page 47
2. Under Installed Licenses, click Download Keys to download all the license keys installed
on the device to a single file.
3. Select Save it to disk and specify the file to which the license keys are to be written.
Related • Junos OS Feature License Model Number for J Series Services Routers and SRX Series
Documentation Services Gateways on page 47
1. Gather the authorization code that you received when you purchased your license as
well as your device serial number.
https://www.juniper.net/lcrs/generateLicense.do
3. Enter the device serial number and authorization code in the webpage and click
Generate. Depending on the type of license you purchased, you will receive one of the
following responses:
• License key—If you purchased a perpetual license, you will receive a license key
from the licensing management system. You can enter this key directly into the
system to activate the feature on your device.
Related • Junos OS Feature License Model Number for J Series Services Routers and SRX Series
Documentation Services Gateways on page 47
1. From operational mode, save the installed license keys to a file or URL.
For example, the following command saves the installed license keys to a file named
license.config:
Related • Junos OS Feature License Model Number for J Series Services Routers and SRX Series
Documentation Services Gateways on page 47
NOTE: The request system license update command will always use the
default Juniper license server https://ae1.juniper.net
You can only use this command to update subscription-based licenses (such as
UTM).
Related • Junos OS Feature License Model Number for J Series Services Routers and SRX Series
Documentation Services Gateways on page 47
Requirements
Before you begin, confirm that your Junos OS feature requires you to purchase, install,
and manage a separate software license.
Overview
You can add a license key from a file or URL, from a terminal, or from the J-Web user
interface. Use the filename option to activate a perpetual license directly on the device.
(Most feature licenses are perpetual.) Use the url to send a subscription-based license
key entitlement (such as UTM) to the Juniper Networks licensing server for authorization.
If authorized, the server downloads the license to the device and activates it.
Configuration
CLI Quick To quickly add a new license key, copy the following commands, paste them in a text
Configuration file, remove any line breaks, and then copy and paste the commands into the CLI.
From operational mode, you can add a license key in either way:
3. Do one of the following, using a blank line to separate multiple license keys:
• In the License File URL box, type the full URL to the destination file containing the
license key to be added.
• In the License Key Text box, paste the license key text, in plain-text format, for the
license to be added.
NOTE: If you added the SRX100 Memory Upgrade license, the device
reboots immediately and comes back up as a high-memory device.
2. When prompted, enter the license key, separating multiple license keys with a blank
line. If the license key you enter is invalid, an error is generated when you press Ctrl-D
to exit license entry mode.
NOTE: If you added the SRX100 Memory Upgrade license, the device
reboots immediately and comes back up as a high-memory device.
Results From operational mode, confirm your configuration by entering the show system license
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
License usage:
Licenses Licenses Licenses Expiry
Feature name used installed needed
bgp-reflection 0 1 0 permanent
Licenses installed:
License identifier: G03000002223
License version: 2
Valid for device: JN001875AB
Features:
bgp-reflection - Border Gateway Protocol route reflection
permanent
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Verify that the expected licenses have been installed and are active on the device.
Action From operational mode, enter the show system license command.
The output shows a list of the licenses used and a list of the licenses installed on the
device and when they expire.
Purpose Verify that the licenses fully cover the feature configuration on the device.
Action From operational mode, enter the show system license usage command.
The output shows a list of the licenses installed on the device and how they are used.
Purpose Verify that the license keys were installed on the device.
Action From operational mode, enter the show system license keys command.
The output shows a list of the license keys installed on the device. Verify that each
expected license key is present.
Related • Junos OS Feature License Model Number for J Series Services Routers and SRX Series
Documentation Services Gateways on page 47
Requirements
Before you delete a license key, confirm that it is no longer needed.
Overview
You can delete a license key from the CLI or J-Web user interface. In this example, the
license ID is G03000002223.
Configuration
CLI Quick To quickly delete a license key, copy the following commands, paste them in a text file,
Configuration remove any line breaks, and then copy and paste the commands into the CLI.
2. Select the check box of the license or licenses you want to delete.
3. Click Delete.
NOTE: If you deleted the SRX100 Memory Upgrade license, the device
reboots immediately and comes back up as a low-memory device.
NOTE: If you deleted the SRX100 Memory Upgrade license, the device
reboots immediately and comes back up as a low-memory device.
Results From configuration mode, confirm your deletion by entering the show system license
command. The license key you deleted will be removed. If the output does not display
the intended configuration, repeat the configuration instructions in this example to correct
it.
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Purpose Verify that the expected licenses have been removed from the device.
Action From operational mode, enter the show system license command.
Related • Junos OS Feature License Model Number for J Series Services Routers and SRX Series
Documentation Services Gateways on page 47
Operational Commands
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Description Clear the binding state of a Dynamic Host Configuration Protocol (DHCP) client from
the DHCP client table.
Options all—(Optional) Clear the binding state for all DHCP clients.
interface <interface-name>—(Optional) Clear the binding state for DHCP clients on the
specified interface.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Description Clear the binding state of a Dynamic Host Configuration Protocol (DHCPv6) client from
the DHCPv6 client table.
Options all—(Optional) Clear the binding state for all DHCPv6 clients.
interface interface-name—(Optional) Clear the binding state for DHCPv6 clients on the
specified interface.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Description Clear all Dynamic Host Configuration Protocol (DHCP) client statistics.
interface—(Optional) Clear the statistics for DHCP clients on the specified interface.
routing-instance —(Optional) Clear the statistics for DHCP clients on the specified routing
instance. If you do not specify a routing instance, statistics are cleared for the default
routing instance.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Description Clear the binding state of a Dynamic Host Configuration Protocol (DHCP) client from
the client table.
Options all—(Optional) Clear the binding state for all DHCP clients.
ip-address— (Optional) Clear the binding state for the DHCP client, using the specified
IP address.
mac-address—(Optional) Clear the binding state for the DHCP client, using the specified
MAC address.
interface interface-name—(Optional) Clear the binding state for DHCP clients on the
specified interface
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Description Clear all Dynamic Host Configuration Protocol (DHCP) relay statistics.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Description Clear the binding state of a Dynamic Host Configuration Protocol (DHCP) client from
the client table on the DHCP local server.
Options all—(Optional) Clear the binding state for all DHCP clients.
ip-address— (Optional) Clear the binding state for the DHCP client, using the specified
IP address.
mac-address—(Optional) Clear the binding state for the DHCP client, using the specified
MAC address.
interface interface-name—(Optional) Clear the binding state for DHCP clients on the
specified interface.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Description Clear all Dynamic Host Configuration Protocol (DHCP) local server statistics.
Description Clear the binding state of a DHCPv6 client from the client table on the DHCPv6 local
server.
Options • all—(Optional) Clear the binding state for all DHCPv6 clients.
• client-id—(Optional) Clear the binding state for the DHCPv6 client with the specified
client ID (option 1).
• ip-address—(Optional) Clear the binding state for the DHCPv6 client with the specified
address.
• session-id—(Optional) Clear the binding state for the DHCPv6 client with the specified
session ID.
Description Unlock the user account locked as a result of invalid login attempts.
file archive
Description Archive, and optionally compress, one or multiple local system files as a single file, locally
or at a remote location.
Options destination destination—Name of the created archive. Specify the destination as a URL
or filename.
compress—(Optional) Compress the archived file with the GNU zip (gzip) compression
utility. The compressed files have the suffix .tgz.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
file archive (Multiple Files)
The following sample command archives all message files in the local directory
/var/log/messages as the single file messages-archive.tar.
The following sample command archives one message file in the local directory
/var/log/messages as the single file messages-archive.tar.
The following sample command archives and compresses all message files in the local
directory /var/log/messages as the single file messages-archive.tar.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
file checksum md5
user@host> file checksum md5 jbundle-5.3R2.4-export-signed.tgz
MD5 (jbundle-5.3R2.4-export-signed.tgz) = 2a3b69e43f9bd4893729cc16f505a0f5
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
file checksum sha1
user@host> file checksum sha1 /var/db/scripts/opscript.slax
Description Calculate the Secure Hash Algorithm 2 family (SHA-256) checksum of a file.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
file checksum sha-256
user@host> file checksum sha-256 /var/db/scripts/commitscript.slax
SHA256 (/var/db/scripts/commitscript.slax) =
94c2b061fb55399e15babd2529453815601a602b5c98e5c12ed929c9d343dd71
file compare
Description Compare two local files and describe the differences between them in default, context,
or unified output styles:
• default—In the first line of output, c means lines were changed between the two files,
d means lines were deleted between the two files, and a means lines were added
between the two files. The numbers preceding this alphabetical marker represent the
first file, and the lines after the alphabetical marker represent the second file. A left
angle bracket (<) in front of output lines refers to the first file. A right angle bracket (>)
in front of output lines refers to the second file.
• context—The display is divided into two parts. The first part is the first file; the second
part is the second file. Output lines preceded by an exclamation point (!) have changed.
Additions are marked with a plus sign (+), and deletions are marked with a
minus sign (-).
• unified—The display is preceded by the line number from the first and the second file
(xx,xxx,x). Before the line number, additions to the file are marked with a plus sign (+),
and deletions to the file are marked with a minus sign (-). The body of the output
contains the affected lines. Changes are viewed as additions plus deletions.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
file compare files
user@host> file compare files /tmp/one /tmp/two
100c100
< full-name "File 1";
---
> full-name "File 2";
102c102
< class foo; # 'foo' is not defined
---
> class super-user;
file copy
Description Copy files from one location to another location on the local device or to a location on a
remote device that is reachable by the local device.
You can use the set system services xnm-ssl sslv3-support command to enable
SSLv3 for a Junos XML protocol client application to use as the protocol to
connect to the Junos XML protocol server on a device, and you can use the
file copy source destination sslv3-support command to enable the copying of
files from an SSLv3 URL.
List of Sample Output Copy a File from the Local Device to a Personal Computer on page 346
Copy a Configuration File Between Routing Engines on page 347
Copy a Log File Between Routing Engines on page 347
Copy a File Using FTP on page 347
Copy a File Using FTP and Requiring a Password on page 347
Copy a File Using Secure Copy on page 347
Sample Output
The following are examples of a variety of file copy scenarios.
The following sample command copies a configuration file from Routing Engine 0 to
Routing Engine 1:
The following sample command copies a log file from Routing Engine 0 to Routing Engine
1:
To use FTP where you require more privacy and are prompted for a password:
file delete
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
file delete
user@host> file list /var/tmp
dcd.core
rpd.core
snmpd.core
file list
Additional Information The default directory is the home directory of the user logged in to the device. To view
available directories, enter a space and then a slash (/) after the file list command. To
view files within a specific directory, include a slash followed by the directory and,
optionally, subdirectory name after the file list command.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
file list
user@host> file list /var/tmp
dcd.core
rpd.core
snmpd.core
file rename
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
file rename
The following example lists the files in /var/tmp, renames one of the files, and then
displays the list of files again to reveal the newly named file.
file show
encoding (base64 | raw)—(Optional) Encode file contents with base64 encoding or show
raw text.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
file show
user@host> file show /var/log/messages
Apr 13 21:00:08 romney /kernel: so-1/1/2: loopback suspected; going to standby.
Apr 13 21:00:40 romney /kernel: so-1/1/2: loopback suspected; going to standby.
Apr 13 21:02:48 romney last message repeated 4 times
Apr 13 21:07:04 romney last message repeated 8 times
Apr 13 21:07:13 romney /kernel: so-1/1/0: Clearing SONET alarm(s) RDI-P
Apr 13 21:07:29 romney /kernel: so-1/1/0: Asserting SONET alarm(s) RDI-P
...
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Description Initiates a renew request for the specified clients if they are in the bound state.
Options all—Initiate renew requests for all DHCP clients. If you specify a routing instance, renew
requests are initiated for all DHCP clients within that routing instance.
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Description Initiate a renew request for the specified DHCPv6 clients if they are in the bound state.
Options all—Initiate renew requests for all DHCPv6 clients. If you specify a routing instance, renew
requests are initiated for all DHCPv6 clients within that routing instance.
Supported Platforms LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Description Prepares the system for autorecovery of configuration, licenses, and disk information.
Options save—Save the current state of the disk partitioning, configuration, and licenses for
autorecovery.
The active Junos OS configuration is saved as the Junos rescue configuration, after
which the rescue configuration, licenses, and disk partitioning information is saved
for autorecovery. Autorecovery information must be initially saved using this
command for the autorecovery feature to verify integrity of data on every bootup.
NOTE:
• Any recovery performed at a later stage will restore the data to the
same state as it was when the save command was executed.
List of Sample Output request system autorecovery state save on page 355
request system autorecovery state recover on page 355
request system autorecovery state clear on page 355
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
request system autorecovery state save
user@host> request system autorecovery state save
Saving config recovery information
Saving license recovery information
Saving bsdlabel recovery information
Sample Output
request system autorecovery state recover
user@host> request system autorecovery state recover
Configuration:
File Recovery Information Integrity Check Action / Status
rescue.conf.gz Saved Passed None
Licenses:
File Recovery Information Integrity Check Action / Status
JUNOS282736.lic Saved Passed None
JUNOS282737.lic Saved Failed Recovered
BSD Labels:
Slice Recovery Information Integrity Check Action / Status
s1 Saved Passed None
s2 Saved Passed None
s3 Saved Passed None
s4 Saved Passed None
Sample Output
request system autorecovery state clear
user@host> request system autorecovery state clear
Clearing config recovery information
Clearing license recovery information
Clearing bsdlabel recovery information
Supported Platforms LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Description Abort a download. The download instance is stopped and cannot be resumed. Any
partially downloaded file is automatically deleted to free disk space. Information regarding
the download is retained and can be displayed with the show command until a Clear
operation is performed.
NOTE: Only downloads in the active, paused, and error states can be aborted.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
request system download abort
user@host> request system download abort 1
Aborted download #1
Supported Platforms LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
request system download clear
user@host> request system download clear
Cleared information on completed and aborted downloads
Supported Platforms LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
request system download pause
user@host> request system download pause 1
Paused download #1
Supported Platforms LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Description Resume a download that has been paused. Download instances that are not in progress
because of an error or that have been explicitly paused by the user can be resumed by
the user. The file will continue downloading from the point where it paused. By default,
the download resumes with the same bandwidth specified with the request system
download start command. The user can optionally specify a new (maximum) bandwidth
with the request system download resume command.
NOTE: Only downloads in the paused and error states can be resumed.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
request system download resume
user@host> request system download resume 1
Resumed download #1
Supported Platforms LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Syntax request system download start (url | max-rate | save as | login | delay)
Description Creates a new download instance and identifies it with a unique integer called the
download ID.
Options url—(Required) The FTP or HTTP URL location of the file to be downloaded.
save-as—(Optional) The filename to be used for saving the file in the /var/tmp location.
login—(Optional) The username and password for the server in the format
username:password.
delay—(Optional) The number of hours after which the download should start.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
request system download start
user@host> request system download start login user:passwd ftp://ftp-server//tftpboot/1m_file
max-rate 1k
Starting download #1
re—Upgrade baseboard BIOS/FPGA. There is an active BIOS image and a backup BIOS
image.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
request system firmware upgrade
user@host> request system firmware upgrade re bios
Part Type Tag Current Available Status
version version
Routing Engine 0 RE BIOS 0 1.5 1.9 OK
Routing Engine 0 RE BIOS Backup 1 1.7 1.9 OK
Perform indicated firmware upgrade ? [yes,no] (no) yes
Options trial—Starts autoupdating trial license keys from the LMS server.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
request system license update
user@host> request system license update
Description Reboots the device and repartitions the compact flash. The compact flash is repartitioned
only if it is possible to restore all the data on the compact flash. Otherwise, the operation
is aborted, and a message is displayed indicating that the current disk usage needs to
be reduced.
Related • Example: Installing Junos OS on SRX Series Devices Using the Partition Option
Documentation
• Installation and Upgrade Guide for Security Devices
List of Sample Output request system partition compact-flash (If Yes) on page 363
request system partition compact-flash (If No) on page 363
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
request system partition compact-flash (If Yes)
user@host> request system partition compact-flash
Are you sure you want to reboot
and partition the compact-flash ? [yes,no] yes
Initiating repartition operation.
The operation may take several minutes to complete.
System will reboot now...
<System reboots>
<Repartition operation is performed>
<System reboots and starts up normally>
Sample Output
request system partition compact-flash (If No)
user@host> request system partition compact-flash
Are you sure you want to reboot
and partition the compact-flash ? [yes,no] no
Description Bring Flexible PIC Concentrators (FPCs) offline before Routing Engines are shut down.
List of Sample Output request system halt power-off fpc on page 364
request system power-off power-off fpc on page 364
request system reboot power-off fpc on page 364
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
request system halt power-off fpc
user@host> request system halt power-off fpc
Halt the system ? [yes,no] (no) yes
To view the status of the Dynamic Host Configuration Protocol (DHCP) clients on the
specified interfaces, enter the show system services dhcp client interface-name command.
Options • release interface-name —Clears other resources received earlier from the server, and
reinitializes the client state to INIT for the particular interface.
• renew interface-name —Reacquires an IP address from the server for the interface.
When you use this option, the command sends a discover message if the client state
is INIT and a renew request message if the client state is BOUND. For all other states
it performs no action.
Related • dhcp
Documentation
• show system services dhcp client on page 429
List of Sample Output request system services dhcp client release ge-1/0/1 on page 365
request system services dhcp client renew ge-1/0/1 on page 365
Sample Output
request system services dhcp client release ge-1/0/1
user@host> request system services dhcp client release ge-1/0/1
Sample Output
request system services dhcp client renew ge-1/0/1
user@host> request system services dhcp client renew ge-1/0/1
Description Back up the currently running and active file system partitions on the device.
Options • factory— (Optional) Specifies that only the files shipped from the factory are included
in the snapshot.
NOTE: USB option is available on all SRX series devices; hard disk and
compact-flash options are available only on high-end SRX series devices;
media internal option is available only on branch SRX series devices.
• node— (Optional) Specifies to archive the data and executable areas of a specific
node.
• partition - (Default) Specifies that the target media should be repartitioned before the
backup is saved to it.
NOTE:
• The target media is partitioned whether or not it is specified in the
• slice— (Optional) Takes a snapshot of the root partition the system has currently
booted from to another slice in the same media.
• alternate— (Optional) Stores the snapshot on the other root partition in the system.
NOTE:
• The slice option cannot be used along with the other request system
snapshot options, because the options are mutually exclusive. If you use
the factory, media, or partition option, you cannot use the slice option;
if you use the slice option, you cannot use any of the other options.
Related • Example: Installing Junos OS on SRX Series Devices Using the Partition Option
Documentation
• Installation and Upgrade Guide for Security Devices
List of Sample Output request system snapshot media hard-disk on page 367
request system snapshot media usb (when usb device is missing on page 367
request system snapshot media compact-flash on page 368
request system snapshot media internal on page 368
request system snapshot partition on page 368
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
request system snapshot media hard-disk
user@host> request system snapshot media hard-disk
Verifying compatibility of destination media partitions...
Running newfs (880MB) on hard-disk media / partition (ad2s1a)...
Running newfs (98MB) on hard-disk media /config partition (ad2s1e)...
Copying '/dev/ad0s1a' to '/dev/ad2s1a' .. (this may take a few minutes)
...
Supported Platforms LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Description Abort an in-band cluster upgrade (ICU). This command must be issued from a router
session other than the one on which you issued the request system in-service-upgrade
command that launched the ICU. If an ICU is in progress, this command aborts it. If the
node is being upgraded, this command will cancel the upgrade. The command is also
helpful in recovering the node in case of a failed ICU.
List of Sample Output request system software abort in-service-upgrade on page 369
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
request system software abort in-service-upgrade
user@host> request system software abort in-service-upgrade
In-Service-Upgrade aborted
Release Information Partition option introduced in the command in Release 10.1. of Junos OS.
Description Installs the new software package on the device. For example: request system software
add junos-srxsme-10.0R2-domestic.tgz no-copy no-validate partition reboot.
Options • delay–restart — Installs the software package but does not restart the software process
• best-effort-load— Activate a partial load and treat parsing errors as warnings instead
of errors
• no-copy — Installs the software package but does not saves the copies of package
files
• no-validate— Does not check the compatibility with current configuration before
installation starts
Options • at time— Specifies the time at which to reboot the device . You can specify time in one
of the following ways:
• +minutes— Reboots the device in the number of minutes from now that you specify.
• yymmddhhmm— Reboots the device at the absolute time on the date you specify.
Enter the year, month, day, hour (in 24-hour format), and minute.
• hh:mm— Reboots the device at the absolute time you specify, on the current day.
Enter the time in 24-hour format, using a colon (:) to separate hours from minutes.
• in minutes— Specifies the number of minutes from now to reboot the device. This
option is a synonym for the at +minutes option
• media type— Specifies the boot device to boot the device from:
• compact flash— Reboots from the external compact flash. This option is available
on the SRX650 Services Gateway.
• message text— Provides a message to display to all system users before the device
reboots.
Description Revert to the software that was loaded at the last successful request system software
add command. Example: request system software rollback.
Options • node node-id—(High-end SRX Series devices only) Roll back the software to the previous
set of packages on a specific node.
Description Display information about the system. Issue this command before contacting customer
support, and then include the command output in your support request. Output from
this command varies somewhat, depending on which platform you issue the command
from. However, the command always executes a series of show commands, with the
appropriate information for your device automatically included.
Options node node-id—(SRX Series) (Optional) Display system information for the specified node.
On SRX Series, replace node-id with a value of 0 or 1. This option is applicable only
the device with HA environment.
all-chassis—(TX Matrix and TX Matrix Plus routers) (Optional) Display system information
for all chassis.
all-lcc—(TX Matrix and TX Matrix Plus routers) (Optional) On a TX Matrix router, display
system information for all T640 routers (or line-card chassis) connected to the TX
Matrix router. On a TX Matrix Plus router, display system information for all chassis
for all T1600 routers (or line-card chassis) connected to the TX Matrix Plus router.
lcc number—(TX Matrix and TX Matrix Plus routers) (Optional) On a TX Matrix router,
display system information for a specific T640 router that is connected to the TX
Matrix router. On a TX Matrix Plus router, display system storage information for a
specific T1600 router that is connected to the TX Matrix Plus router. Replace number
with a value from 0 through 3.
local—(EX Series switches and MX Series routers) (Optional) Display system information
for the local Virtual Chassis member.
scc—(TX Matrix routers) (Optional) Display system information for the TX Matrix router
(or switch-card chassis).
sfc number—(TX Matrix Plus routers) (Optional) Display system information for the TX
Matrix Plus router (or switch-fabric chassis). Replace number with 0.
Additional Information The show commands issued as a result of this command vary depending on which
platform you issue the command from. Output is always appropriate for the device. For
example, Table 16 on page 374 lists the show commands that are called when you issue
request support information on an MX Series router.
Table 16: Sample show Commands Called by the request information support command on
an MX Series Router
show chassis alarms no-forwarding show pfe statistics traffic
show chassis hardware extensive no-forwarding show system processes extensive no-forwarding
Table 16: Sample show Commands Called by the request information support command on
an MX Series Router (continued)
show krt state show system virtual-memory no-forwarding
The no-forwarding option ensures that all mgd processes associated with the show
command are properly halted if you break into the output (Ctrl+C) while the command
is still running.
Output Fields For information about output fields, see the description for the specific command-–listed
in the output– in which you are interested.
Sample Output
request support information | save
user@host> request support information | save goose
Wrote 1143 lines of output to 'goose'
scc-re0:
--------------------------------------------------------------------------
Current time: 2004-09-15 00:49:06 PDT
System booted: 2004-09-14 12:53:26 PDT (11:55:40 ago)
Protocols started: 2004-09-14 12:54:19 PDT (11:54:47 ago)
Last configured: 2004-09-14 13:07:47 PDT (11:41:19 ago) by
12:49AM PDT up 11:56, 3 users, load averages: 0.00, 0.02, 0.03
lcc0-re0:
--------------------------------------------------------------------------
Current time: 2004-09-15 00:49:06 PDT
System booted: 2004-09-14 15:36:41 PDT (09:12:25 ago)
Last configured: 2004-09-14 15:38:06 PDT (09:11:00 ago) by root
12:49AM PDT up 9:12, 0 users, load averages: 0.13, 0.05, 0.02
lcc2-re0:
--------------------------------------------------------------------------
scc-re0:
--------------------------------------------------------------------------
Hostname: hostA
Model: TX Matrix
JUNOS Base OS boot [7.0I20040914_1707_mapte]
JUNOS Base OS Software Suite [7.0I20040907_1922_rtuplur]
JUNOS Kernel Software Suite [7.0I20040914_1707_mapte]
JUNOS Packet Forwarding Engine Support (T Series) [7.0I20040914_1707_mapte]
JUNOS Routing Software Suite [7.0I20040914_1707_mapte]
JUNOS Online Documentation [7.0I20040914_1707_mapte]
JUNOS Crypto Software Suite [7.0I20040914_1707_mapte]
JUNOS Support Tools Package [7.0-20040908.0]
lcc0-re0:
--------------------------------------------------------------------------
Hostname: hostB
Model: t640
JUNOS Base OS boot [7.0I20040914_1707_mapte]
JUNOS Base OS Software Suite [7.0I20040907_1922_rtuplur]
JUNOS Kernel Software Suite [7.0I20040914_1707_mapte]
JUNOS Packet Forwarding Engine Support (T-Series) [7.0I20040914_1707_mapte]
JUNOS Routing Software Suite [7.0I20040914_1707_mapte]
JUNOS Online Documentation [7.0I20040914_1707_mapte]
JUNOS Crypto Software Suite [7.0I20040914_1707_mapte]
lcc2-re0:
--------------------------------------------------------------------------
Hostname: dewey
Model: t640
JUNOS Base OS boot [7.0I20040914_1707_mapte]
JUNOS Base OS Software Suite [7.0I20040907_1922_rtuplur]
JUNOS Kernel Software Suite [7.0I20040914_1707_mapte]
JUNOS Packet Forwarding Engine Support (T-Series) [7.0I20040914_1707_mapte]
JUNOS Routing Software Suite [7.0I20040914_1707_mapte]
JUNOS Online Documentation [7.0I20040914_1707_mapte]
JUNOS Crypto Software Suite [7.0I20040914_1707_mapte]
...
Hostname: aj
Model: txp
JUNOS Base OS boot [9.6-20090519.0]
JUNOS Base OS Software Suite [9.6-20090519.0]
JUNOS Kernel Software Suite [9.6-20090519.0]
...
user@host> show system core-dumps no-forwarding
Hardware inventory:
Item Version Part number Serial number Description
Chassis JN112F007AHB TXP
Midplane REV 05 710-022574 TS4027 SFC Midplane
FPM Display REV 03 710-024027 DX0282 TXP FPM Display
...
user@host> show system processes extensive no-forwarding
last pid: 6639; load averages: 0.00, 0.00, 0.00 up 0+02:28:54 03:43:28
161 processes: 5 running, 138 sleeping, 18 waiting
Mem: 236M Active, 227M Inact, 104M Wired, 392M Cache, 69M Buf, 2296M Free
Swap: 2048M Total, 2048M Free
PID USERNAME THR PRI NICE SIZE RES STATE TIME WCPU COMMAND
11 root 1 171 52 0K 12K RUN 143:00 96.78% idle
1530 root 1 96 0 38160K 24812K select 2:54 1.12% chassisd
1343 root 1 76 0 0K 12K 0:18 0.00% bcmLINK.0
1345 root 1 76 0 0K 12K 0:15 0.00% brq17: uhci1
uhci*
...
user@host> show pfe statistics error
Slot 4
SLCHIP 0 1
-------------------------------------------------------
Lin XIF : 0 0
Lin SRCTL : 0 0
...
user@host>show pfe statistics traffic
Global FPC 4
Global FPC 6
Global FPC 7
...
user@host> show system boot-messages no-forwarding
...
node0:
--------------------------------------------------------------------------
Current time: 2015-06-11 20:55:12 UTC
System booted: 2015-06-11 17:45:22 UTC (03:09:50 ago)
Protocols started: 2015-06-11 17:47:59 UTC (03:07:13 ago)
Last configured: 2015-04-27 17:41:45 UTC (6w3d 03:13 ago) by root
8:55PM up 3:10, 2 users, load averages: 0.09, 0.06, 0.01
Hostname: tpsrx02
Model: srx1400
JUNOS Software Release [12.1-20150403_dev_x_121_x46.2]
JUNOS wmi Daemon [12.1I20140304_0803_tjzhang]
KERNEL 12.1-20150403_dev_x_121_x46.2 #0 built by builder on 2015-04-04 00:06:53
UTC
MGD release 12.1D0.2 built by builder on 2015-04-04 01:59:04 UTC
CLI release 12.1-20150403_dev_x_121_x46.2 built by builder on 2015-04-04 00:18:42
UTC
RPD release 12.1D0.2 built by builder on 2015-04-04 01:48:23 UTC
...
node0:
--------------------------------------------------------------------------
Current time: 2015-06-11 20:57:06 UTC
System booted: 2015-06-11 17:45:22 UTC (03:11:44 ago)
Protocols started: 2015-06-11 17:47:59 UTC (03:09:07 ago)
Last configured: 2015-04-27 17:41:45 UTC (6w3d 03:15 ago) by root
8:57PM up 3:12, 2 users, load averages: 0.04, 0.05, 0.01
Hostname: tpsrx02
Model: srx1400
JUNOS Software Release [12.1-20150403_dev_x_121_x46.2]
JUNOS wmi Daemon [12.1I20140304_0803_tjzhang]
node0:
--------------------------------------------------------------------------
Current time: 2015-06-11 20:57:55 UTC
System booted: 2015-06-11 17:45:22 UTC (03:12:33 ago)
Protocols started: 2015-06-11 17:47:59 UTC (03:09:56 ago)
Last configured: 2015-04-27 17:41:45 UTC (6w3d 03:16 ago) by root
8:57PM up 3:13, 2 users, load averages: 0.02, 0.04, 0.00
Hostname: tpsrx02
Model: srx1400
JUNOS Software Release [12.1-20150403_dev_x_121_x46.2]
JUNOS wmi Daemon [12.1I20140304_0803_tjzhang]
KERNEL 12.1-20150403_dev_x_121_x46.2 #0 built by builder on 2015-04-04 00:06:53
UTC
MGD release 12.1D0.2 built by builder on 2015-04-04 01:59:04 UTC
CLI release 12.1-20150403_dev_x_121_x46.2 built by builder on 2015-04-04 00:18:42
UTC
RPD release 12.1D0.2 built by builder on 2015-04-04 01:48:23 UTC
...
node0:
--------------------------------------------------------------------------
Current time: 2015-06-11 20:58:35 UTC
System booted: 2015-06-11 17:45:22 UTC (03:13:13 ago)
Protocols started: 2015-06-11 17:47:59 UTC (03:10:36 ago)
Last configured: 2015-04-27 17:41:45 UTC (6w3d 03:16 ago) by root
8:58PM up 3:13, 2 users, load averages: 0.28, 0.11, 0.03
Hostname: tpsrx02
Model: srx1400
JUNOS Software Release [12.1-20150403_dev_x_121_x46.2]
JUNOS wmi Daemon [12.1I20140304_0803_tjzhang]
KERNEL 12.1-20150403_dev_x_121_x46.2 #0 built by builder on 2015-04-04 00:06:53
UTC
MGD release 12.1D0.2 built by builder on 2015-04-04 01:59:04 UTC
Description Erases all configuration information and resets all key values. The command removes
all data files, including customized configuration and log files, by unlinking the files from
their directories.
The command removes all user-created files from the system including all plain-text
passwords, secrets, and private keys for SSH, local encryption, local authentication,
IPsec, RADIUS, TACACS+, and SNMP.
This command reboots the device and sets it to the factory default configuration. After
the reboot, you cannot access the device through the management Ethernet interface.
Log in through the console as root and start the Junos OS command-line interface (CLI)
by typing cli at the prompt.
Options media—(Optional) In addition to removing all configuration and log files, the media option
causes memory and the media to be scrubbed, removing all traces of any user-created
files. Every storage device attached to the system is scrubbed, including disks, flash
drives, removable USBs, and the like. The duration of the scrubbing process is
dependent on the size of the media being erased. As a result, the request system
zeroize media operation can take considerably more time than the request system
zeroize operation. However, the critical security parameters are all removed at the
beginning of the process.
Sample Output
request system zeroize
user@host> request system zeroize
warning: System will be rebooted and may not boot without configuration
Erase all data, including configuration and log files? [yes,no] (no) yes
restart (Reset)
• dialer-services—(Branch SRX Series only) (Optional) Restart the ISDN dial-out process.
• group-key-server—(Branch SRX Series only) (Optional) Restart the group VPN server
process. The group VPN server loses all its data, including TEK and KEK keys, when it
restarts. New keys are generated, but the keys are not available to group members
until they reregister.
• lacp—(Optional) Restart the Link Aggregation Control Protocol (LACP) process. LACP
provides a standardized means for exchanging information between partner systems
on a link. The LACP process allows link aggregation control instances to reach
agreement on the identity of the LAG to which a link belongs, moves the link to that
LAG, and enables the transmission and reception processes for the link to function in
an orderly manner.
• l2-learning—(Optional) Restart the Layer 2 (L2) address flooding and learning process.
• lldpd-service—(Branch SRX Series only) (Optional) Restart the Link Layer Discovery
Protocol (LLDP) process.
• mib-process—(Optional) Restart the MIB version II process, which provides the router's
MIB II agent.
• mountd-service—(Optional) Restart the service for Network File System (NFS) mount
requests.
• nfsd-service—(Optional) Restart the remote NFS server process, which provides remote
file access for applications that need NFS-based transport.
• ntpd-service—(High-end SRX Series only) (Optional) Restart the Network Time Protocol
(NTP) process.
• pgm—(Optional) Restart the process that implements the Pragmatic General Multicast
(PGM) protocol for assisting in the reliable delivery of multicast packets.
• ppp—(Branch SRX Series only) (Optional) Restart the Point-to-Point Protocol (PPP)
process, which is the encapsulation protocol process for transporting IP traffic across
point-to-point links.
• pppoe—(Branch SRX Series only) (Optional) Restart the Point-to-Point Protocol over
Ethernet (PPPoE) process, which combines PPP that typically runs over broadband
connections with the Ethernet link-layer protocol that allows users to connect to a
network of hosts over a bridge or access concentrator.
• r2cp—(Branch SRX Series only) (Optional) Restart the Radio-to-Router Control Protocol
process.
• snmp—(Optional) Restart the SNMP process, which enables the monitoring of network
devices from a central location and provides the router's or switch’s SNMP master
agent.
• tunnel-oamd—(High-end SRX Series only) (Optional) Restart the tunnel OAM process
for L2 tunneled networks.
• usb-control—(Branch SRX Series only) (Optional) Restart the USB control process.
LAN without requiring more than the static configuration of a single default route on
the hosts.
Output Fields When you enter this command, you are provided feedback on the status of your request.
Sample Output
restart interfaces
user@host> restart interfaces
interfaces process terminated
interfaces process restarted
Use the restart operational commands to restart software processes on the device.
Operational commands are organized alphabetically.
Output Fields Table 17 on page 390 lists the output fields for the show chassis routing-engine command.
Output fields are listed in the approximate order in which they appear.
CPU utilization Current CPU utilization statistics on the control plane core.
User Current CPU utilization in user mode on the control plane core.
Background Current CPU utilization in nice mode on the control plane core.
Kernel Current CPU utilization in kernel mode on the control plane core.
Interrupt Current CPU utilization in interrupt mode on the control plane core.
Idle Current CPU utilization in idle mode on the control plane core.
Uptime Length of time the Routing Engine has been up (running) since the last start.
Last reboot reason Reason for the last reboot of the Routing Engine.
Load averages The average number of threads waiting in the run queue or currently executing over 1-,
5-, and 15-minute periods.
Sample Output
show chassis routing-engine
user@host> show chassis routing-engine (Sample 1)
Routing Engine status:
Temperature 38 degrees C / 100 degrees F
CPU temperature 36 degrees C / 96 degrees F
Total memory 512 MB Max 435 MB used ( 85 percent)
Control plane memory 344 MB Max 296 MB used ( 86 percent)
Data plane memory 168 MB Max 138 MB used ( 82 percent)
CPU utilization:
User 8 percent
Background 0 percent
Kernel 4 percent
Interrupt 0 percent
Idle 88 percent
Model RE-SRX240-LOWMEM
Serial ID AAAP8652
Start time 2009-09-21 00:04:54 PDT
Uptime 52 minutes, 47 seconds
Last reboot reason 0x200:chassis control reset
Load averages: 1 minute 5 minute 15 minute
0.12 0.15 0.10
Sample Output
show chassis routing-engine
user@host> show chassis routing-engine (Sample 2)
Routing Engine status:
Temperature 46 degrees C / 114 degrees F
CPU temperature 46 degrees C / 114 degrees F
Total memory 1024 MB Max 737 MB used ( 72 percent)
Control plane memory 600 MB Max 426 MB used ( 71 percent)
Data plane memory 424 MB Max 314 MB used ( 74 percent)
CPU utilization:
User 40 percent
Background 0 percent
Kernel 11 percent
Interrupt 0 percent
Idle 49 percent
Model RE-SRXSME-SRE6
Start time 2009-09-19 20:04:18 PDT
Uptime 1 day, 4 hours, 51 minutes, 11 seconds
Last reboot reason 0x200:chassis control reset
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Description Display the address bindings in the Dynamic Host Configuration Protocol (DHCP) client
table.
Options address—(Optional) Display DHCP binding information for a specific client identified by
one of the following entries:
• ip-address—The specified IP address.
Output Fields Table 18 on page 393 lists the output fields for the show dhcp client binding command.
Output fields are listed in the approximate order in which they appear.
State State of the address binding table on the DHCP local server.
Lease Expires Date and time at which the client’s IP address lease expires.
Lease Start Date and time at which the client’s IP address lease started.
Sample Output
show dhcp client binding
user@host> show dhcp client binding
2 clients, (2 bound, 0 init, 0 discover, 0 renew, 0 rebind)
DHCP Options :
Name: name-server, Value: [ 10.209.194.131, 2.2.2.2, 3.3.3.3 ]
Name: server-identifier, Value: 10.1.1.1
Name: router, Value: [ 10.1.1.80 ]
Name: domain-name, Value: netscreen-50
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Description Display the address bindings in the Dynamic Host Configuration Protocol version 6
(DHCPv6) client table.
Output Fields Table 19 on page 396 lists the output fields for the show dhcpv6 client binding command.
Output fields are listed in the approximate order in which they appear.
Lease Expires Date and time at which the client’s IP address lease expires.
Lease Start Date and time at which the client’s IP address lease started.
Client Type The type of DHCPv6 client. The client type can be autoconfig or statefull.
Sample Output
show dhcpv6 client binding
user@host> show dhcpv6 client binding
IP prefix Expires ClientType State Interface Client
DUID
2000::b2b7:8631:d968:8d5e/128 96 STATEFULL BOUND ge-0/0/1.0
LL_TIME0x3-0x0-2c:6b:f5:62:39:c1
DHCP options:
Name: server-identifier, Value: LL_TIME0x1-0x17acddab-00:30:48:5d:5b:f7
Name: vendor-opts, Value: 000005830002aaaa
Name: sip-server-list, Value: 2000::300 2000::302 2000::303 2000::304
Name: dns-recursive-server, Value: 2000::ff2000::fe
Name: domain-search-list, Value: 076578616d706c6503636f6d00
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Output Fields Table 20 on page 398 lists the output fields for the show dhcp client statistics command.
Output fields are listed in the approximate order in which they appear.
Packets dropped Number of packets discarded by the DHCP local server because
of errors. Only nonzero statistics appear in the Packets dropped
output. When all of the Packets dropped statistics are 0 (zero),
only the Total field appears.
Sample Output
show dhcp client statistics
user@host> show dhcp client statistics
Packets dropped:
Total 0
Messages received:
BOOTREPLY 0
DHCPOFFER 0
DHCPACK 0
DHCPNAK 0
DHCPFORCERENEW 0
Messages sent:
BOOTREQUEST 0
DHCPDECLINE 0
DHCPDISCOVER 0
DHCPREQUEST 0
DHCPINFORM 0
DHCPRELEASE 0
DHCPRENEW 0
DHCPREBIND 0
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Output Fields Table 21 on page 400 lists the output fields for the show dhcpv6 client statistics command.
Output fields are listed in the approximate order in which they appear.
Dhcpv6 Packets dropped Number of packets discarded by the DHCPv6 local server
because of errors. Only nonzero statistics appear in the DHCPv6
Packets dropped output. When all of the Packets dropped
statistics are 0 (zero), only the Total field appears.
Sample Output
show dhcpv6 client statistics
user@host> show dhcpv6 client statistics
Dhcpv6 Packets dropped:
Total 0
Messages sent:
DHCPV6_DECLINE 0
DHCPV6_SOLICIT 3
DHCPV6_INFORMATION_REQUEST 6
DHCPV6_RELEASE 1
DHCPV6_REQUEST 2
DHCPV6_CONFIRM 0
DHCPV6_RENEW 0
DHCPV6_REBIND 0
Messages received:
DHCPV6_ADVERTISE 3
DHCPV6_REPLY 3
DHCPV6_RECONFIGURE 0
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Description Display the address bindings in the Dynamic Host Configuration Protocol (DHCP) relay
client table.
Options address—(Optional) Display DHCP binding information for a specific client identified by
one of the following entries:
• ip-address—The specified IP address.
Output Fields Table 22 on page 402 lists the output fields for the show dhcp relay binding command.
Output fields are listed in the approximate order in which they appear.
Obtained at Date and time at which the client’s IP address lease started.
Expires at Date and time at which the client’s IP address lease expires.
State State of the address binding table on the DHCP local server.
Sample Output
show dhcp relay binding
user@host> show dhcp relay binding detail
IP address Hardware address Type Lease expires State
100.20.32.1 90:00:00:01:00:01 active 2007-01-17 11:38:47 PST
rebind
100.20.32.3 90:00:00:02:00:01 active 2007-01-17 11:38:41 PST
rebind
100.20.32.4 90:00:00:03:00:01 active 2007-01-17 11:38:01 PST
rebind
100.20.32.5 90:00:00:04:00:01 active 2007-01-17 11:38:07 PST
rebind
100.20.32.6 90:00:00:05:00:01 active 2007-01-17 11:38:47 PST
rebind
Lease information:
Type DHCP
Obtained at 2007-01-17 11:28:47 PST
Expires at 2007-01-17 11:38:47 PST
Lease information:
Type DHCP
Obtained at 2007-01-17 11:28:47 PST
Expires at 2007-01-17 11:38:47 PST
State rebind
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Options routing-instance—(Optional) Display the DHCP relay statistics on the specified routing
instance.
Output Fields Table 23 on page 404 lists the output fields for the show dhcp relay statistics command.
Output fields are listed in the approximate order in which they appear.
Sample Output
show dhcp relay statistics
user@host> show dhcp relay statistics
Messages received:
BOOTREQUEST 0
DHCPDECLINE 0
DHCPDISCOVER 0
DHCPINFORM 0
DHCPRELEASE 0
DHCPREQUEST 0
Messages sent:
BOOTREPLY 0
DHCPOFFER 0
DHCPACK 0
DHCPNAK 0
DHCPFORCERENEW 0
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Description Display the address bindings in the client table on the Dynamic Host Configuration
Protocol (DHCP) local server.
Options interface <interface name>—(Optional) Display information about active client bindings
on the specified interface.
brief | detail | summary—(Optional) Display the specified level of output about active
client bindings. The default is brief, which produces the same output as show dhcp
server binding.
MAC address—Display DHCP binding information for a specific client identified by the
specified MAC address.
Output Fields Table 24 on page 406 lists the output fields for the show dhcp server binding command.
Output fields are listed in the approximate order in which they appear.
Obtained at Date and time at which the client’s IP address lease started.
Expires at Date and time at which the client’s IP address lease expires.
State State of the address binding table on the DHCP local server.
Sample Output
show dhcp server binding
user@host> show dhcp server binding 100.20.32.1 detail
Active binding information:
IP address 100.20.32.1
Hardware address 90:00:00:01:00:01
Request received on fe-0/0/2.0, relayed by 100.20.32.2
Lease information:
Type DHCP
Obtained at 2007-01-17 11:28:47 PST
Expires at 2007-01-17 11:38:47 PST
State rebind
Supported Platforms J Series, LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Description Display d Dynamic Host Configuration Protocol (DHCP) local server statistics.
Output Fields Table 25 on page 408 lists the output fields for the show dhcp server statistics command.
Output fields are listed in the approximate order in which they appear.
Packets dropped Number of packets discarded by the DHCP local server because of errors. Only nonzero statistics
appear in the Packets dropped output. When all of the Packets dropped statistics are 0 (zero), only
the Total field appears.
Sample Output
show dhcp server statistics
user@host> show dhcp server statistics
Packets dropped:
Total 0
Messages received:
BOOTREQUEST 0
DHCPDECLINE 0
DHCPDISCOVER 0
DHCPINFORM 0
DHCPRELEASE 0
DHCPREQUEST 0
Messages sent:
BOOTREPLY 0
DHCPOFFER 0
DHCPACK 0
DHCPNAK 0
DHCPFORCERENEW 0
Description Display the address bindings in the client table for DCHPv6 local server.
Options • brief | detail | summary—(Optional) Display the specified level of output about active
client bindings. The default is brief, which produces the same output as show dhcpv6
server binding.
Output Fields Table 26 on page 410 lists the output fields for the show dhcpv6 server binding command.
Output fields are listed in the approximate order in which they appear.
number clients, Summary counts of the total number of DHCPv6 clients and the number of summary
(number init, DHCPv6 clients in each state.
number bound,
number selecting,
number requesting,
number renewing,
number releasing)
State State of the address binding table on the DHCPv6 local server: brief
detail
• BOUND—Client has active IP address lease.
• INIT—Initial state.
• RELEASE—Client is releasing IP address lease.
• RECONFIGURE—Client has received reconfigure message from server.
• RENEWING—Client sending request to renew IP address lease.
• REQUESTING—Client requesting a DHCPv6 server.
• SELECTING—Client receiving offers from DHCPv6 servers.
Lease expires Date and time at which the client’s IP address lease expires. detail
Lease Start Date and time at which the client’s address lease was obtained. detail
Sample Output
show dhcpv6 server binding
user@host> show dhcpv6 server binding
State: BOUND(bound)
Lease Expires: 2009-07-21 10:41:15 PDT
Lease Expires in: 86308 seconds
Lease Start: 2009-07-20 10:41:15 PDT
Incoming Client Interface: ge-1/0/0.0
Server Ip Address: 0.0.0.0
Server Interface: none
Client Id Length: 14
Client Id:
/0x00010001/0x02e159c0/0x00109400/0x0001
Session Id: 7
Client IPv6 Prefix: 2001:bd8:1111:2222::/64
Client DUID: LL_TIME0x1-0x2e159c0-00:10:94:00:00:02
State: BOUND(bound)
Lease Expires: 2009-07-21 10:41:15 PDT
Lease Expires in: 86308 seconds
Lease Start: 2009-07-20 10:41:15 PDT
Incoming Client Interface: ge-1/0/0.0
Server Ip Address: 0.0.0.0
Server Interface: none
Client Id Length: 14
Client Id:
/0x00010001/0x02e159c0/0x00109400/0x0002
State: BOUND(bound)
Lease Expires: 2009-07-21 10:41:15 PDT
State: BOUND(bound)
Lease Expires: 2009-07-21 10:41:15 PDT
Lease Expires in: 86136 seconds
Lease Start: 2009-07-20 10:41:15 PDT
Incoming Client Interface: ge-1/0/0.0
Server Ip Address: 0.0.0.0
Server Interface: none
Client Id Length: 14
Client Id:
/0x00010001/0x02e159c0/0x00109400/0x0002
Output Fields Table 27 on page 415 lists the output fields for the show dhcpv6 server statistics command.
Output fields are listed in the approximate order in which they appear.
Dhcpv6 Packets Number of packets discarded by the DHCPv6 local server because of errors. Only nonzero statistics
dropped appear in the Packets dropped output. When all of the Packets dropped statistics are 0 (zero), only
the Total field appears.
Sample Output
show dhcpv6 server statistics
user@host> show dhcpv6 server statistics
Dhcpv6 Packets dropped:
Total 0
Messages received:
DHCPV6_DECLINE 0
DHCPV6_SOLICIT 9
DHCPV6_INFORMATION_REQUEST 0
DHCPV6_RELEASE 0
DHCPV6_REQUEST 5
DHCPV6_CONFIRM 0
DHCPV6_RENEW 0
DHCPV6_REBIND 0
DHCPV6_RELAY_FORW 0
Messages sent:
DHCPV6_ADVERTISE 9
DHCPV6_REPLY 5
DHCPV6_RECONFIGURE 0
DHCPV6_RELAY_REPL 0
Output Fields Table 28 on page 417 lists the output fields for the show firewall command. Output fields
are listed in the approximate order in which they appear.
Filter Name of a filter that has been configured with the filter statement at the [edit firewall] hierarchy level.
When an interface-specific filter is displayed, the name of the filter is followed by the full interface
name and by either -i for an input filter or -o for an output filter.
When dynamic filters are displayed, the name of the filter is followed by the full interface name and
by either -in for an input filter or -out for an output filter. When a logical system–specific filter is
displayed, the name of the filter is prefixed with two underscore (__) characters and the name of the
logical system (for example, __ls1/filter1).
• Name—Name of a filter counter that has been configured with the counter firewall filter action.
• Bytes—Number of bytes that match the filter term under which the counter action is specified.
• Packets—Number of packets that matched the filter term under which the counter action is specified.
• Name—Name of policer.
• Bytes—Number of bytes that match the filter term under which the policer action is specified. This
is only the number out-of-specification (out-of-spec) byte counts, not all the bytes in all packets
policed by the policer.
• Packets—Number of packets that matched the filter term under which the policer action is specified.
This is only the number of out-of-specification (out-of-spec) packet counts, not all packets policed
by the policer.
Sample Output
show firewall
user@host> show firewall
Filter: ef_path
Counters:
Name Bytes Packets
def-count 0 0
video-count 0 0
voice-count 0 0
Filter: __default_bpdu_filter__
Filter: deep
Counters:
Name Bytes Packets
deep2 302076 5031
Filter: deep-flood
Counters:
Name Bytes Packets
deep_flood_def 302136 5032
deep1 0 0
Policers:
Name Packets
deep-pol-op-first 0
Supported Platforms LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Output Fields Table 29 on page 419 lists the output fields for the show system autorecovery state
command. Output fields are listed in the approximate order in which they appear.
File The name of the file on which autorecovery checks are performed.
Recovery Information Indicates whether autorecovery information for the file or slice has been saved.
Integrity Check Displays the status of the file's integrity check (passed or failed).
Action / Status Displays the status of the item, or the action required to be taken for that item.
Sample Output
show system autorecovery state
user@host> show system autorecovery state
Configuration:
File Recovery Information Integrity Check Action / Status
rescue.conf.gz Saved Passed None
Licenses:
File Recovery Information Integrity Check Action / Status
JUNOS282736.lic Saved Passed None
JUNOS282737.lic Not Saved Not checked Requires save
BSD Labels:
Slice Recovery Information Integrity Check Action / Status
s1 Saved Passed None
• depth number—(Optional) Specify the depth of the directory to traverse. This option
is useful when you want to limit the output shown for a large file system.
NOTE: The node option is supported only on high-end SRX Series devices.
Output Fields Table 30 on page 421 describes the output fields for the show system directory-usage
command. Output fields are listed in the approximate order in which they appear.
Sample Output
show system directory-usage
user@host> show system directory-usage
node0:
--------------------------------------------------------------------------
/var/tmp
2.0K /var/tmp/.ssh
Supported Platforms LN Series, SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650
Description Display a brief summary of all the download instances along with their current state and
extent of progress. If a download-id is provided, the command displays a detailed report
of the particular download instance.
Output Fields Table 31 on page 423 lists the output fields for the show system download command.
Output fields are listed in the approximate order in which they appear.
Sample Output
show system download
user@host> show system download
Download Status Information:
ID Status Start Time Progress URL
1 Active May 4 06:28:36 5% ftp://ftp-server//tftpboot/1m_file
2 Active May 4 06:29:07 3% ftp://ftp-server//tftpboot/5m_file
Download ID : 1
Status : Active
Progress : 6%
URL : ftp://ftp-server//tftpboot/1m_file
Local Path : /var/tmp/1m_file
Maximum Rate : 1k
Creation Time : May 4 06:28:36
Scheduled Time : May 4 06:28:36
Start Time : May 4 06:28:37
Error Count : 0
Release Information Command introduced in Junos OS Release 9.5. Logical system status option added in
Junos OS Release 11.2.
Description Display licenses and information about how licenses are used.
keys—(Optional) Display a list of license keys. Use this information to verify that each
expected license key is present.
status—(Optional) Display license status for a specified logical system or for all logical
systems.
Output Fields Table 32 on page 425 lists the output fields for the show system license command. Output
fields are listed in the approximate order in which they appear.
Feature name Name assigned to the configured feature. You use this information to verify that all the features for
which you installed licenses are present.
Licenses used Number of licenses used by the device. You use this information to verify that the number of licenses
used matches the number configured. If a licensed feature is configured, the feature is considered
used.
Licenses needed Number of licenses required for features being used but not yet properly licensed.
Expiry Time remaining in the grace period before a license is required for a feature being used.
Logical system license Displays whether a license is enabled for a logical system.
status
Sample Output
show system license
user@host> show system license
License usage:
Licenses Licenses Licenses Expiry
Feature name used installed needed
av_key_kaspersky_engine 1 1 0 2012-03-30
01:00:00 IST
wf_key_surfcontrol_cpa 0 1 0 2012-03-30
01:00:00 IST
dynamic-vpn 0 1 0 permanent
ax411-wlan-ap 0 2 0 permanent
Licenses installed:
License identifier: JUNOS301998
License version: 2
Valid for device: AG4909AA0080
Features:
av_key_kaspersky_engine - Kaspersky AV
date-based, 2011-03-30 01:00:00 IST - 2012-03-30 01:00:00 IST
av_key_kaspersky_engine - Kaspersky AV
date-based, 2011-03-30 01:00:00 IST - 2012-03-30 01:00:00 IST
Description Display the user names locked after unsuccessful login attempts.
Output Fields Table 33 on page 428 lists the output fields for the show system login lockout command.
Output fields are listed in the approximate order in which they appear. Field names might
be abbreviated (as shown in parentheses) when no level of output is specified or when
the detail keyword is used.
Lockout start Date and time the username was locked All levels
Lockout end Date and time the username was unlocked All levels
Sample Output
show system login lockout
user@host>show system login lockout
List of Sample Output show system services dhcp client on page 430
show system services dhcp client ge-0/0/1.0 on page 431
show system services dhcp client statistics on page 431
Output Fields Table 34 on page 429 lists the output fields for the show system services dhcp client
command. Output fields are listed in the approximate order in which they appear.
Table 34: show system services dhcp client Output Fields (continued)
Field Name Field Description
Sample Output
show system services dhcp client
user@host> show system services dhcp client
Logical Interface Name ge-0/0/1.0
Hardware address 00:0a:12:00:12:12
Client Status bound
Vendor Identifier ether
Server Address 10.1.1.1
Address obtained 10.1.1.89
update server enabled
Lease Obtained at 2006-08-24 18:13:04 PST
Lease Expires at 2006-08-25 18:13:04 PST
DHCP Options :
Name: name-server, Value: [ 10.209.194.131, 2.2.2.2, 3.3.3.3 ]
Name: server-identifier, Value: 10.1.1.1
Name: router, Value: [ 10.1.1.80 ]
Name: domain-name, Value: netscreen-50
Sample Output
show system services dhcp client ge-0/0/1.0
user@host> show system services dhcp client ge-0/0/1.0
Logical Interface name ge-0/0/1.0
Hardware address 00:12:1e:a9:7b:81
Client status bound
Address obtained 30.1.1.20
Update server disabled
Lease obtained at 2007-05-10 18:16:18 UTC
Lease expires at 2007-05-11 18:16:18 UTC
DHCP options:
Name: server-identifier, Value: 30.1.1.2
Code: 1, Type: ip-address, Value: 255.255.255.0
Name: name-server, Value: [ 77.77.77.77, 55.55.55.55 ]
Name: domain-name, Value: mylab.example.net
Sample Output
show system services dhcp client statistics
user@host> show system services dhcp client statistics
Packets dropped:
Total 0
Messages received:
DHCPOFFER 0
DHCPACK 8
DHCPNAK 0
Messages sent:
DHCPDECLINE 0
DHCPDISCOVER 0
DHCPREQUEST 1
DHCPINFORM 0
DHCPRELEASE 0
DHCPRENEW 7
DHCPREBIND 0
Related • dhcp
Documentation
• Administration Guide for Security Devices
List of Sample Output show system services dhcp relay-statistics on page 433
Output Fields Table 35 on page 432 lists the output fields for the show system services dhcp
relay-statistics command. Output fields are listed in the approximate order in which they
appear.
Dropped packets Total DHCP packets dropped for the following reasons:
Sample Output
show system services dhcp relay-statistics
user@host> show system services dhcp relay-statistics
Received packets: 4
Forwarded packets: 4
Dropped packets: 4
Due to missing interface in relay database: 4
Due to missing matching routing instance: 0
Due to an error during packet read: 0
Due to an error during packet send: 0
Due to invalid server address: 0
Due to missing valid local address: 0
Due to missing route to server/client: 0
Description Display the snapshot information for both root partitions on SRX Series devices
• external— Show snapshot information from the external compact flash. This option
is available on the SRX650 Services Gateway.
Description Display the local storage data currently available on the SRX Series devices.
Options • none—Display standard information about the amount of free disk space in the device
file system.
• detail—(Optional) Display detailed output about the amount of free disk space in the
device file system.
NOTE: The node option is supported only on high-end SRX Series devices.
• local—(Optional) Display the local storage data for the local node.
• primary—(Optional) Display the local storage data for the primary node.
NOTE: The partitions option is supported only on branch SRX Series devices.
Output Fields Table 36 on page 435 describes the output fields for the show system storage command.
Output fields are listed in the approximate order in which they appear.
Partitions Information:
Partition Size Mountpoint
s1a 293M altroot
s2a 293M /
s3e 24M /config
s3f 342M /var
s4a 30M recovery
Partitions Information:
Partition Size Mountpoint
s1a 293M /
s2a 293M altroot
s3e 24M /config
s3f 342M /var
s4a 30M recovery
Index
• Index on page 441
serial cable, disconnection for console logout............25 show system storage partitions............................435, 437
Series source-address statement
user interfaces See user interfaces NTP....................................................................................192
server address statement..................................................186 RADIUS and TACACS+...............................................192
server statement system logging...............................................................192
NTP....................................................................................185 SRC application.........................................................................5
Services Gateway SRX Series.................................................................................43
licenses..............................................................................45 licenses..............................................................................45
user interfaces See user interfaces managing user authentication...................................13
Services Router SSH
as a DHCP server............................................................29 accessing remote accounts (CLI)..........................301
licenses..............................................................................45 setting login retry limits.............................................295
user interfaces See user interfaces ssh command.........................................................................301
services statement options.............................................................................301
remote router access..................................................187 ssh-known-hosts statement............................................184
sessions SSL (Secure Sockets Layer)
Telnet...............................................................................300 enabling secure access .............................................257
sessions, J-Web........................................................................12 management access.......................................................3
set no-encrypt-configuration-files command..........307 verifying SSL configuration.....................................260
sha-256 checksum, calculating......................................342 SSL 3.0 option, disabling on Internet Explorer for
SHA–1 checksum, calculating..........................................341 worldwide version of Junos OS........................................7
show chassis routing-engine command....................390 SSL access, establishing........................................................3
show dhcpv6 server binding.............................................410 SSL certificates
show dhcpv6 server statistics command....................414 adding...............................................................................261
show firewall command.....................................................417 adding (configuration editor).................................258
show interfaces dl0 extensive command.....................56 generating.......................................................................255
show system autorecovery state command..............419 sample configuration................................................260
show system download command...............................423 verifying SSL configuration.....................................260
show system license command.................320, 323, 425 startup
explanation..........................................................320, 323 J-Web interface..................................................................7
show system license keys command............................321 status
show system license usage command.........................321 license key........................................................................46
explanation.....................................................................321 super-user login class permissions...................................15
show system login lockout command.........................428 superuser login class permissions.....................................15
show system services dhcp binding command..........65 support, technical See technical support
show system services dhcp binding detail system information, displaying...............................373
command..............................................................................65 syntax conventions.................................................................xv
show system services dhcp client system.......................................................................................273
command....................................................................70, 429 login lockout.........................................................337, 428
show system services dhcp client interface retry options...................................................................273
command..............................................................................70 System Configuration Statement Hierarchy..............199
show system services dhcp client statistics system logs
command...............................................................................71 file cleanup (CLI)..........................................................310
show system services dhcp conflict command..........34 file cleanup (J-Web)..................................................309
show system services dhcp global command............65 system management
show system services dhcp relay-statistics login classes............................................................14, 270
command.....................................................................75, 432 template accounts.................................................17, 277
explanation.......................................................................75 user accounts..........................................................13, 270
show system snapshot media........................................434 user authentication........................................................13
W
Web access, secure See secure access
Web browser, modifying Internet Explorer for
worldwide version of Junos OS........................................7
web-management statement........................................248
windows, J-Web, unpredictable results with
multiple....................................................................................12