0% found this document useful (0 votes)
90 views1,369 pages

Next Gen Service

SPC 3

Uploaded by

Jomar Valera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views1,369 pages

Next Gen Service

SPC 3

Uploaded by

Jomar Valera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1369

Next Gen Services Interfaces User Guide for

Routing Devices

Next Gen Services Interfaces User Guide


for Routing Devices

Published

2021-04-18
ii

Juniper Networks, Inc.


1133 Innovation Way
Sunnyvale, California 94089
USA
408-745-2000
www.juniper.net

Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc.
in the United States and other countries. All other trademarks, service marks, registered marks, or registered service
marks are the property of their respective owners.

Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right
to change, modify, transfer, or otherwise revise this publication without notice.

Next Gen Services Interfaces User Guide for Routing Devices Next Gen Services Interfaces User Guide for Routing
Devices
Copyright © 2021 Juniper Networks, Inc. All rights reserved.

The information in this document is current as of the date on the title page.

YEAR 2000 NOTICE

Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related
limitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036.

END USER LICENSE AGREEMENT

The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use
with) Juniper Networks software. Use of such software is subject to the terms and conditions of the End User License
Agreement ("EULA") posted at https://support.juniper.net/support/eula/. By downloading, installing or using such
software, you agree to the terms and conditions of that EULA.
iii

Table of Contents
About This Guide | xxv

1 Overview
Next Gen Services Overview | 2

Next Gen Services Overview | 2

Configuration Overview | 16

Configuration Differences Between Adaptive Services and Next Gen Services on the MX-SPC3 | 16

Overview | 17

Interfaces | 18

Service Set | 23

Stateful Firewall | 26

Carrier Grade Network Address Translation (CGNAT) | 34

Intrusion Detection System (IDS) | 82

Migrate from the MS Card to the MX-SPC3 | 93

Next Gen Services Feature Configuration Overview | 95

How to Configure Services Interfaces for Next Gen Services | 96

How to Configure Interface-Style Service Sets for Next Gen Services | 98

How to Configure Next-Hop Style Service Sets for Next Gen Services | 100

How to Configure Service Set Limits for Next Gen Services | 101

Example: Next Gen Services Inter-Chassis Stateful High Availability for NAT and Stateful Firewall
(MX-SPC3) | 104

Requirements | 104

Overview | 104

Configuration | 104

Example: Configuring AutoVPN with Pre-Shared Key | 116

Enabling and Disabling Next Gen Services | 121

Loading the Software Images on RE-S-X6-64G-UB | 121

Enabling Next Gen Services on an MX Series Router | 122


iv

Disabling Next Gen Services on an MX Series Router | 123

Determining Whether Next Gen Services is Enabled on an MX Series Router | 123

Global System Logging Overview and Configuration | 125

Understanding Next Gen Services CGNAT Global System Logging | 125

Enabling Global System Logging for Next Gen Services | 127

Configuring Local System Logging for Next Gen Services | 128

Configuring System Logging to One or More Remote Servers for Next Gen Services | 130

System Log Error Messages for Next Gen Services | 133

Configuring Syslog Events for NAT Rule Conditions with Next Gen Services | 142

Next Gen Services SNMP MIBS and Traps | 144

Next Gen Services SNMP MIBs and Traps | 144

2 Carrier Grade NAT (CGNAT)


Deterministic NAT Overview and Configuration | 172

Deterministic NAPT Overview for Next Gen Services | 172

Configuring Deterministic NAPT for Next Gen Services | 177

Configuring the NAT Pool for Deterministic NAPT for Next Gen Services | 178

Configuring the NAT Rule for Deterministic NAPT44 for Next Gen Services | 179

Configuring the NAT Rule for Deterministic NAPT64 for Next Gen Services | 181

Configuring the Service Set for Deterministic NAT for Next Gen Services | 181

Clearing the Don’t Fragment Bit | 182

Dynamic Address-Only Source NAT Overview and Configuration | 183

Dynamic Address-Only Source Translation Overview | 183

Configuring Dynamic Address-Only Source NAT for Next Gen Services | 184

Configuring the Source Pool for Dynamic Address-Only Source NAT | 184

Configuring the NAT Source Rule for Dynamic Address-Only Source NAT | 185

Configuring the Service Set for Dynamic Address-Only Source NAT | 187

Network Address Port Translation Overview and Configuration | 188

Network Address Port Translation (NAPT) Overview | 188

Configuring Network Address Port Translation for Next Gen Services | 189
v

Configuring the Source Pool for NAPT | 189

Configuring the NAT Source Rule for NAPT | 193

Configuring the Service Set for NAPT | 195

Configuring Syslog Events for NAT Rule Conditions with Next Gen Services | 196

NAT46 | 198

NAT46 Next Gen Services Configuration Examples | 198

Stateful NAT64 Overview and Configuration | 202

Stateful NAT64 Overview | 202

IPv4 Addresses Embedded in IPv6 Addresses | 203

Configuring Next Gen Services Stateful NAT64 | 204

Configuring the Source Pool for Stateful NAT64 | 204

Configuring the NAT Rules for Stateful NAT64 | 208

Configuring the Service Set for Stateful NAT64 | 211

Clearing the Don’t Fragment Bit | 212

IPv4 Connectivity Across IPv6-Only Network Using 464XLAT Overview and


Configuration | 213

464XLAT Overview | 213

IPv4 Addresses Embedded in IPv6 Addresses | 215

Configuring 464XLAT Provider-Side Translator for IPv4 Connectivity Across IPv6-Only Network for
Next Gen Services | 217

Configuring the Source Pool for 464XLAT | 217

Configuring the NAT Rules for 464XLAT | 219

Configuring the Service Set for 464XLAT | 222

Clearing the Don’t Fragment Bit | 223

IPv6 NAT Protocol Translation (NAT PT) | 224

IPv6 NAT PT Overview | 224

IPv6 NAT-PT Communication Overview | 225

Stateless Source Network Prefix Translation for IPv6 Overview and Configuration | 227

Stateless Source Network Prefix Translation for IPv6 | 227

Stateless Source Network Prefix Translation for IPv6 for IPv6 | 227

Configuring NPTv6 for Next Gen Services | 228


vi

Configuring the Source Pool | 228

Configuring the NAT Rule | 229

Configuring the Service Set | 230

Transitioning to IPv6 Using Softwires | 232

6rd Softwires in Next Gen Services | 232

6rd Softwires in Next Gen Services Overview | 232


Configuring Inline 6rd for Next Gen Services | 233

Configuring a 6rd Softwire Concentrator | 234

Configuring a 6rd Softwire Rule | 234

Configuring Inline Services and an Inline Services Interface | 235

Configuring the IPv4-Facing and IPv6-Facing Interfaces for 6rd | 236

Configuring the Service Set | 237

Transitioning to IPv6 Using DS-Lite Softwires | 239

DS-Lite Softwires—IPv4 over IPv6 for Next Gen Services | 239

Configuring Next Gen Services DS-Lite Softwires | 242

Configuring Next Gen Services Softwire Rules | 242

Configuring Service Sets for Next Gen Services Softwires | 244

Configuring the DS-Lite Softwire | 246

DS-Lite Subnet Limitation | 248

DS-Lite Per Subnet Limitation Overview | 248

Configuring DS-Lite Per Subnet Session Limitation to Prevent Denial of Service Attacks | 251

Protecting CGN Devices Against Denial of Service (DOS) Attacks | 253

Reducing Traffic and Bandwidth Requirements Using Port Control Protocol | 254

Port Control Protocol Overview | 254

Configuring Port Control Protocol | 258

Configuring PCP Server Options | 258

Configuring a PCP Rule | 260

Configuring a NAT Rule | 262

Configuring a Service Set to Apply PCP | 262

SYSLOG Message Configuration | 263

Transitioning to IPv6 Using Mapping of Address and Port with Encapsulation (MAP-E) | 264
vii

Mapping of Address and Port with Encapsulation (MAP-E) for Next Gen Services | 264

Understanding Mapping of Address and Port with Encapsulation (MAP-E) | 264

Configuring Mapping of Address and Port with Encapsulation (MAP-E) for Next Gen Services | 268

Equal Cost Multiple Path (ECMP) support for Mapping of Address and Port with Encapsulation
(MAP-E) | 271

Equal Cost Multiple Path (ECMP) support for Mapping of Address and Port with Encapsulation
(MAP-E) | 272
Disabling auto-routes to support ECMP with Mapping of Address and Port with Encapsulation
(MAP-E) | 272

Monitoring and Troubleshooting Softwires | 276

Ping and Traceroute for DS-Lite | 276

Monitoring Softwire Statistics | 277

Monitoring CGN, Stateful Firewall, and Softwire Flows | 279

Port Forwarding Overview and Configuration | 281

Port Forwarding for Next Gen Services | 281

Port Forwarding Overview | 281

Configuring Port Forwarding with Static Destination Address Translation for Next Gen Services | 282

Configuring the Destination Pool for Destination Address Translation | 282

Configuring the Mappings for Port Forwarding | 283

Configuring the NAT Rule for Port Forwarding with Destination Address Translation | 283

Configuring the Service Set for Port Forwarding with Destination Address Translation | 285

Configuring Port Forwarding without Static Destination Address Translation for Next Gen
Services | 286

Configuring the Mappings for Port Forwarding | 286

Configuring the NAT Rule for Port Forwarding without Destination Address Translation | 287

Configuring the Service Set for Port Forwarding without Destination Address Translation | 288

Port Translation Features Overview and Configuration | 290

Address Pooling and Endpoint Independent Mapping for Port Translation | 290

Round-Robin Port Allocation | 292

Secured Port Block Allocation for Port Translation | 293

Static Source NAT Overview and Configuration | 294

Static Source NAT Overview | 294


viii

Configuring Static Source NAT44 or NAT66 for Next Gen Services | 295

Configuring the Source Pool for Static Source NAT44 or NAT66 | 295

Configuring the NAT Rule for Static Source NAT44 or NAT66 | 296

Configuring the Service Set for Static Source NAT44 or NAT66 | 297

Static Destination NAT Overview and Configuration | 299

Static Destination NAT Overview | 299

Configuring Static Destination NAT for Next Gen Services | 300

Configuring the Destination Pool for Static Destination NAT | 300

Configuring the NAT Rule for Static Destination NAT | 300

Configuring the Service Set for Static Destination NAT | 302

Twice NAPT Overview and Configuration | 304

Twice NAPT Overview | 304

Configuring Twice NAPT for Next Gen Services | 305

Configuring the Source and Destination Pools for Twice NAPT | 305

Configuring the NAT Rules for Twice NAPT | 309

Configuring the Service Set for Twice NAPT | 312

Twice NAT Overview and Configuration | 314

Twice Static NAT Overview | 314

Configuring Twice Static NAT44 for Next Gen Services | 315

Configuring the Source and Destination Pools for Twice Static NAT44 | 315

Configuring the NAT Rules for Twice Static NAT44 | 316

Configuring the Service Set for Twice Static NAT44 | 319

Twice Dynamic NAT Overview | 320

Configuring Twice Dynamic NAT for Next Gen Services | 320

Configuring the Source and Destination Pools for Twice Dynamic NAT | 321

Configuring the NAT Rules for Twice Dynamic NAT | 322

Configuring the Service Set for Twice Dynamic NAT | 325

Class of Service Overview and Configuration | 327

Class of Service for Services PICs (Next Gen Services) | 327

Class of Service Overview for Services PICs (Next Gen Services) | 327

Configuring CoS for Traffic Processed by a Services PIC (Next Gen Services) | 328
ix

Configuring CoS Rules | 328

Configuring Application Profiles for CoS Rules | 331

Configuring CoS Rule Sets | 333

Configuring the Service Set for CoS | 333

3 Stateful Firewall Services


Stateful Firewall Services Overview and Configuration | 336

Stateful Firewall Overview for Next Gen Services | 336

Configuring Stateful Firewalls for Next Gen Services | 339

Configuring Stateful Firewall Rules for Next Gen Services | 339

Configuring Stateful Firewall Rule Sets for Next Gen Services | 342

Configuring the Service Set for Stateful Firewalls for Next Gen Services | 342

4 Intrusion Detection Services


IDS Screens for Network Attack Protection Overview and Configuration | 345

Understanding IDS Screens for Network Attack Protection | 345

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

Configuring the IDS Screen Name, Direction, and Alarm Option | 349

Configuring Session Limits in the IDS Screen | 350

Configuring Suspicious Packet Pattern Detection in the IDS Screen | 355

Configuring the Service Set for IDS | 359

5 Traffic Load Balancing


Traffic Load Balancing Overview and Configuration | 362

Traffic Load Balancer Overview | 362

Configuring TLB | 372

Loading the TLB Service Package | 373

Configuring a TLB Instance Name | 373

Configuring Interface and Routing Information | 374

Configuring Servers | 376

Configuring Network Monitoring Profiles | 377

Configuring Server Groups | 379

Configuring Virtual Services | 380

Configuring Tracing for the Health Check Monitoring Function | 384


x

6 DNS Request Filtering


DNS Request Filtering Overview and Configuration | 389

DNS Request Filtering for Disallowed Website Domains | 389

Overview of DNS Request Filtering | 389

How to Configure DNS Request Filtering | 392

How to Configure a Domain Filter Database | 392


How to Configure a DNS Filter Profile | 393

How to Configure a Service Set for DNS Filtering | 399

Multitenant Support for DNS Filtering | 400

Configuring Multi-tenant Support for DNS Filtering | 401

Example: Configuring Multitenant Support for DNS Filtering | 406

Configuration | 406

DNS Request Filtering System Logging Error Messages | 412

7 URL Filtering
URL Filtering | 427

URL Filtering Overview | 427

Configuring URL Filtering | 431

8 Integration of Juniper Sky ATP and Web filtering on MX Routers


Integration of Juniper Sky ATP and Web filtering on MX Routers | 438

Integration of Juniper ATP Cloud and Web filtering on MX Routers | 438


Overview | 438

Configuring the Web Filter Profile for Sampling | 443

9 Aggregated Multiservices Interfaces


Enabling Load Balancing and High Availability Using Multiservices Interfaces | 450

Understanding Aggregated Multiservices Interfaces for Next Gen Services | 450

Configuring Aggregated Multiservices Interfaces | 456

Configuring Load Balancing on AMS Infrastructure | 459

Configuring Warm Standby for Services Interfaces | 463

10 Inter-Chassis Services PIC High Availability


Inter-Chassis Services PIC High Availability Overview and Configuration | 466
xi

Next Gen Services Inter-chassis High Availability Overview for NAT, Stateful Firewall, and IDS
Flows | 466

Inter-chassis High Availability Overview for NAT, Stateful Firewall, and IDS Flows for Next Gen
Services | 467

Example: Next Gen Services Inter-Chassis Stateful High Availability for NAT and Stateful
Firewall (MX-SPC3) | 467

Requirements | 468

Overview | 468
Configuration | 468

Inter-Chassis Stateful Synchronization for Long Lived NAT, Stateful Firewall, and IDS Flows for Next
Gen Services | 480

Inter-Chassis Stateful Synchronization Overview | 481

Configuring Inter-Chassis Stateful Synchronization for Long- Lived NAT, Stateful Firewall, and
IDS Flows for Next Gen Services | 483

Configuring Inter-Chassis Stateful Synchronization for Next Gen Services with non-AMS
Interface | 483

Configuring Inter-Chassis Stateful Synchronization for Next Gen Services with AMS
Interface | 486

Inter-Chassis Services Redundancy Overview for Next Gen Services | 489

Configuring Inter-Chassis Services Redundancy for Next Gen Services | 492

Configuring Non-Stop Services Redundancy for Next Gen Services Service Set | 493

Configuring One-Way Services Redundancy for Next Gen Services Service Set | 499

11 Application Layer Gateways


Enabling Traffic to Pass Securely Using Application Layer Gateways | 513

Next Gen Services Application Layer Gateways | 513

Configuring Application Sets | 523

Configuring Application Properties for Next Gen Services | 524

Examples: Configuring Application Protocols | 541

Verifying the Output of ALG Sessions | 542

12 NAT, Stateful Firewall, and IDS Flows


Inline NAT Services Overview and Configuration | 555

Inline Static Source NAT Overview | 555


xii

Configuring Inline Static Source NAT44 for Next Gen Services | 556

Configuring the Source Pool for Inline Static Source NAT44 | 556

Configuring the NAT Rule for Inline Static Source NAT44 | 557

Configuring the Service Set for Inline Static Source NAT44 | 558

Configuring Inline Services and an Inline Services Interface | 559

Inline Static Destination NAT Overview | 560

Configuring Inline Static Destination NAT for Next Gen Services | 560

Configuring the Destination Pool for Inline Static Destination NAT | 561

Configuring the NAT Rule for Inline Static Destination NAT | 561

Configuring the Service Set for Inline Static Destination NAT | 563

Configuring Inline Services and an Inline Services Interface | 563

Inline Twice Static NAT Overview | 564

Configuring Inline Twice Static NAT44 for Next Gen Services | 565

Configuring the Source and Destination Pools for Inline Twice Static NAT44 | 565

Configuring the NAT Rules for Inline Twice Static NAT44 | 566

Configuring the Service Set for Inline Twice Static NAT44 | 569

Configuring Inline Services and an Inline Services Interface | 569

13 Configuration Statements
Configuration Statements | 572

address (Address Book Next Gen Services) | 579

address (NAT Pool Next Gen Services) | 580

address-pooling (Source NAT Next Gen Services) | 582

aggregations (IDS Screen Next Gen Services) | 583

alarm-without-drop (IDS Screen Next Gen Services) | 585

white-list | 586

allow-overlapping-pools (NAT Next Gen Services) | 588

application (NAT Next Gen Services) | 589

application-profile (Services CoS Next Gen Services) | 590

application-protocol | 592
xiii

application-set | 594

applications (Services ALGs) | 596

automatic (Source NAT Next Gen Services) | 597

bad-option (IDS Screen Next Gen Services) | 598

block-allocation (Source NAT Next Gen Services) | 599

block-frag (IDS Screen Next Gen Services) | 601

by-destination (IDS Screen Next Gen Services) | 602

bypass-traffic-on-exceeding-flow-limits | 605

by-protocol (IDS Screen Next Gen Services) | 606

by-source (IDS Screen Next Gen Services) | 609

category (System Logging) | 611

child-inactivity-timeout | 613

clat-ipv6-prefix-length | 614

clat-prefix (Source NAT Next Gen Services) | 616

clear-dont-fragment-bit (NAT Next Gen Services) | 617

close-timeout | 618

cos-rule-sets (Service Set Next Gen Services) | 619

cos-rules (Service Set Next Gen Services) | 621

cpu-load-threshold | 622

cpu-throttle (Next Gen Services) | 623

data (FTP) | 625

description (Security Policies Next Gen Services) | 627

destination-address (NAT Next Gen Services) | 628

destination-address-name (NAT Next Gen Services) | 629

destination-prefix (Destination NAT Next Gen Services) | 630

deterministic (Source NAT Next Gen Services) | 631


xiv

deterministic-nat-configuration-log-interval (Source NAT Next Gen Services) | 633

disable-global-timeout-override | 635

dns-filter | 636

dns-filter-template | 639

drop-member-traffic (Aggregated Multiservices) | 642

dscp (Services CoS) | 643

ds-lite | 645

ei-mapping-timeout (Source NAT Next Gen Services) | 647

enable-asymmetric-traffic-processing (Service Set Next Gen Services) | 648

enable-rejoin (Aggregated Multiservices) | 649

enable-subscriber-analysis (Services Options VMS Interfaces) | 651

event-rate (Next Gen Services Service-Set Local System Logging) | 652

file (Next Gen Services Global System Logging) | 653

files (Next Gen Services Global System Logging) | 655

filename (Next Gen Services Global System Logging) | 656

filtering-type (Source NAT Next Gen Services) | 658

fin-no-ack (IDS Screen Next Gen Services) | 659

flag (Next Gen Services Global System Logging) | 660

format (Next Gen Services Service-Set Remote System Logging) | 662

forwarding-class (Services PIC Classifiers) | 663

forwarding-class (Services PIC Classifiers) | 665

forwarding-class (Services PIC Classifiers) | 666

fragment (IDS Screen Next Gen Services) | 667

fragment-limit | 668

ftp (Services CoS Next Gen Services) | 670

gate-timeout | 672
xv

general-ikeid | 673

global-dns-stats-log-timer | 674

group (Traffic Load Balancer) | 676

hash-keys (Interfaces) | 678

header-integrity-check (Next Gen Services) | 680

high-availability-options (Aggregated Multiservices) | 682

host (Next Gen Services Service-Set Remote System Logging) | 684

host-address-base (Source NAT Next Gen Services) | 685

inactivity-timeout | 686

inactivity-asymm-tcp-timeout (Service Set Next Gen Services) | 688

icmp (IDS Screen Next Gen Services) | 689

icmp-type | 690

icmpv6-malformed (IDS Screen Next Gen Services) | 691

ip (IDS Screen Next Gen Services) | 692

ipv6-extension-header (IDS Screen Next Gen Services) | 694

limit-session (IDS Screen Next Gen Services) | 697

inline-services (PIC level) | 699

ipv6-extension-header (IDS Screen Next Gen Services) | 701

instance (Traffic Load Balancer) | 703

interface-service (Services Interfaces) | 706

land (IDS Screen Next Gen Services) | 707

large (IDS Screen Next Gen Services) | 708

limit-session (IDS Screen Next Gen Services) | 709

load-balancing-options (Aggregated Multiservices) | 712

local-category (Next Gen Services Service-Set Local System Logging) | 714

local-log-tag (Next Gen Services Service-Set System Logging) | 717


xvi

loose-source-route-option (IDS Screen Next Gen Services) | 718

many-to-one (Aggregated Multiservices) | 719

map-e | 721

mapping-timeout (Source NAT Next Gen Services) | 724

mapping-type (Source NAT Next Gen Services) | 725

match (Next Gen Services Global System Logging) | 727

match (Services CoS Next Gen Services) | 728

match (Stateful Firewall Rule Next Gen Services) | 730

match-direction (NAT Next Gen Services) | 732

match-rules-on-reverse-flow (Next Gen Services) | 733

max-session-setup-rate (Service Set) | 734

max-sessions-per-subscriber (Service Set Next Gen Services) | 736

maximum | 737

member-failure-options (Aggregated Multiservices) | 738

member-interface (Aggregated Multiservices) | 741

mode (Next Gen Services Service-Set System Logging) | 743

name (Next Gen Services Global System Logging) | 745

nat-options (Next Gen Services) | 746

nat-rule-sets (Service Set Next Gen Services) | 747

next-hop-service | 748

no-bundle-flap | 750

no-remote-trace (Next Gen Services Global System Logging) | 751

no-translation (Source NAT Next Gen Services) | 752

no-world-readable (Next Gen Services Global System Logging) | 753

off (Destination NAT Next Gen Services) | 755

open-timeout | 756
xvii

pcp-rules | 757

ping-death (IDS Screen Next Gen Services) | 758

policy (Services CoS Next Gen Services) | 760

policy (Stateful Firewall Rules Next Gen Services) | 762

pool (Destination NAT Next Gen Services) | 763

pool (Source NAT Next Gen Services) | 765

pool (NAT Rule Next Gen Services) | 767

pool-default-port-range (Source NAT Next Gen Services) | 768

pool-utilization-alarm (Source NAT Next Gen Services) | 769

port (Source NAT Next Gen Services) | 770

port-forwarding (Destination NAT Next Gen Services) | 772

port-forwarding-mappings (Destination NAT Rule Next Gen Services) | 773

port-round-robin (Source NAT Next Gen Services) | 774

ports-per-session | 775

preserve-parity (Source NAT Next Gen Services) | 777

preserve-range (Source NAT Next Gen Services) | 778

profile (Traffic Load Balancer) | 779

profile (Web Filter) | 782

protocol (Applications) | 786

range (Source NAT Next Gen Services) | 788

rate (Interface Services) | 789

real-service (Traffic Load Balancer) | 791

reassembly-timeout | 792

record-route-option (IDS Screen Next Gen Services) | 794

redistribute-all-traffic (Aggregated Multiservices) | 795

redundancy-event (Services Redundancy Daemon) | 796


xviii

redundancy-options (Aggregated Multiservices) | 798

redundancy-options (Stateful Synchronization) | 800

redundancy-policy (Interchassis Services Redundancy) | 802

redundancy-set | 804

redundancy-set-id (Service Set) | 806

rejoin-timeout (Aggregated Multiservices) | 808

rpc-program-number | 809

rtlog (Next Gen Services Global System Logging) | 811

rule (Destination NAT Next Gen Services) | 812

rule (Services CoS Next Gen Services) | 814

rule (PCP) | 816

rule (Source NAT Next Gen Services) | 818

rule-set (Services CoS Next Gen Services) | 820

rule-set (Softwires Next Gen Services) | 821

secure-nat-mapping (Source NAT Next Gen Services) | 823

security-intelligence | 824

security-intelligence-policy | 827

security-option (IDS Screen Next Gen Services) | 829

server (pcp) | 830

service-domain | 833

service-interface (Services Interfaces) | 834

services-options (Next Gen Services Interfaces) | 836

service-set (Interfaces) | 840

service-set (Services) | 841

service-set-options (Next Gen Services Services) | 846

session-limit | 847
xix

session-limit (Service Set Next Gen Services) | 849

session-timeout (Service Set Next Gen Services) | 850

severity (Next Gen Services Service-Set Remote System Logging) | 851

sip (Services CoS Next Gen Services) | 853

size (Next Gen Services Global System Logging) | 854

snmp-command | 856

snmp-trap-thresholds (Next Gen Services) | 857

softwire-name (Next Gen Services) | 858

softwires (Next Gen Services) | 860

softwire-name (Next Gen Services) | 862

softwire-options | 864

softwire-types (Next Gen Services) | 865

softwires-rule-set (Service Set Next Gen Services) | 869

source-address (Next Gen Services Service-Set Remote System Logging) | 870

source-address (NAT Next Gen Services) | 871

source-address-name (NAT Next Gen Services) | 872

source-port | 874

source-route-option (IDS Screen Next Gen Services) | 875

stateful-firewall-rules (Service Set Next Gen Services) | 876

stateful-firewall-rule-set (Next Gen Services) | 877

stateful-firewall-rule-sets (Service Set Next Gen Services) | 879

stream (Next Gen Services Service-Set Remote System Logging) | 880

stream-option (IDS Screen Next Gen Services) | 881

strict-source-route-option (IDS Screen Next Gen Services) | 882

syn-ack-ack-proxy (IDS Screen Next Gen Services) | 884

syn-fin (IDS Screen Next Gen Services) | 885


xx

syn-frag (IDS Screen Next Gen Services) | 886

syslog (Services CoS) | 887

syslog (Next Gen Services Service-Set System Logging) | 889

tcp-no-flag (IDS Screen Next Gen Services) | 890

tcp-session (Service Set Next Gen Services) | 891

tcp-tickles (Service Set Next Gen Services) | 893

tear-drop (IDS Screen Next Gen Services) | 894

then (Services CoS Next Gen Services) | 895

then (Stateful Firewall Rule Next Gen Services) | 897

timestamp-option (IDS Screen Next Gen Services) | 899

traceoptions (Next Gen Services Service-Set Flow) | 900

traceoptions (Traffic Load Balancer) | 904

traceoptions (Next Gen Services Global System Logging) | 908

traceoptions (Next Gen Services Softwires) | 909

traffic-load-balance (Traffic Load Balancer) | 911

transport (Next Gen Services Syslog Message Security) | 913

ttl-threshold | 915

unknown-protocol (IDS Screen Next Gen Services) | 916

url-filter | 917

url-filter-profile | 920

url-filter-template | 921

uuid | 924

v6rd | 926

video (Application Profile) | 927

video (Application Profile) | 929

virtual-service (Traffic Load Balancer) | 930


xxi

voice | 933

voice (Application Profile) | 934

web-filter | 935

web-filter-profile | 938

winnuke (IDS Screen Next Gen Services) | 940

world-readable (Next Gen Services Global System Logging) | 941

xlat-source-rule | 942

14 Operational Commands
Operational Commands | 945

clear log (Next Gen Services) | 948

clear services alg statistics | 949

clear services nat source mappings | 950

clear services sessions | 953

clear services sessions analysis | 958

clear services stateful-firewall flows | 959

clear services stateful-firewall sip-call | 962

clear services stateful-firewall sip-register | 966

clear services stateful-firewall statistics | 970

clear services subscriber analysis | 971

clear services web-filter statistics profile | 972

request services web-filter update dns-filter-database | 974

request services web-filter validate dns-filter-file-name | 975

request system disable unified-services | 976

request system enable unified-services | 978

show interfaces load-balancing (Aggregated Multiservices) | 979

show log | 985


xxii

show services alg conversations | 992

show services alg statistics | 1001

show services cos statistics (Next Gen Services) | 1021

show services inline softwire statistics | 1026

show services inline ip-reassembly statistics | 1032

show services nat destination pool | 1040

show services nat destination rule | 1042

show services nat destination summary | 1046

show services nat ipv6-multicast-interfaces | 1049

show services nat resource-usage source-pool | 1052

show services nat source deterministic | 1054

show services nat source mappings address-pooling-paired | 1057

show services nat source mappings endpoint-independent | 1061

show services nat source mappings pcp | 1065

show services nat source mappings summary | 1067

show services nat source pool | 1069

show services nat source port-block | 1075

show services nat source rule | 1079

show services nat source rule-application | 1083

show services nat source summary | 1085

show services pcp statistics | 1088

show services policies | 1092

show services policies detail | 1095

show services policies hit-count | 1099

show services policies interface | 1100

show services policies service-set | 1102


xxiii

show services redundancy-group | 1103

show services screen ids-option (Next Gen Services) | 1116

show services screen-statistics service-set (Next Gen Services) | 1119

show services security-intelligence category summary | 1125

show services security-intelligence update status | 1128

show services service-sets cpu-usage | 1129

show services service-sets memory-usage | 1132

show services service-sets plug-ins | 1134

show services service-sets statistic screen-drops (Next Gen Services) | 1136

show services service-sets statistic screen-session-limit-counters (Next Gen Services) | 1146

show services service-sets statistics integrity-drops | 1156

show services service-sets statistics packet-drops | 1162

show services service-sets statistics syslog | 1165

show services service-sets statistics tcp | 1175

show services service-sets summary | 1177

show services sessions (Next Gen Services) | 1179

show services sessions (Aggregated Multiservices) | 1194

show services sessions analysis | 1204

show services sessions analysis (USF) | 1210

show services sessions count | 1215

show services sessions service-set | 1216

show services sessions service-set | 1218

show services sessions softwire | 1220

show services sessions utilization | 1225

show services softwire | 1226

show services softwire flows | 1229


xxiv

show services softwire statistics | 1234

show services stateful-firewall conversations | 1246

show services stateful-firewall flow-analysis | 1252

show services stateful-firewall flows | 1259

show services stateful-firewall sip-call | 1267

show services stateful-firewall sip-register | 1273

show services stateful-firewall statistics | 1278

show services stateful-firewall statistics application-protocol sip | 1291

show services subscriber analysis | 1296

show services tcp-log | 1300

show services traffic-load-balance statistics | 1301

show services web-filter dns-resolution profile | 1319

show services web-filter dns-resolution-statistics profile template | 1323

show services web-filter secintel-policy status | 1329

show services web-filter statistics dns-filter-template | 1333

show services web-filter statistics profile | 1336

show system unified-services status | 1343


xxv

About This Guide

Use this guide to understand and configure Next Gen Services on MX240, MX480, and MX960 routers.
1 PART

Overview

Next Gen Services Overview | 2

Configuration Overview | 16

Global System Logging Overview and Configuration | 125

Next Gen Services SNMP MIBS and Traps | 144


2

CHAPTER 1

Next Gen Services Overview

IN THIS CHAPTER

Next Gen Services Overview | 2

Next Gen Services Overview

IN THIS SECTION

MX Series 5G Universal Router Services Overview | 2

Adaptive Services Overview | 3

Next Gen Services | 4

Summary of Services Supported on MX Series 5G Universal Routers | 4

Next Gen Services Documentation | 7

Enabling Next Gen Services | 8

Compatibility with Other Services Cards | 8

Configuring the MX-SPC3 Services Card | 11

Methods for Applying Services to Traffic | 12

Configuring IPsec VPN on MX-SPC3 Services Card | 12

This topic provides an overview of Next Gen Services and includes the following topics

MX Series 5G Universal Router Services Overview

MX Series 5G Universal routers support several types of Services interfaces, which provide specific
capabilities for inspecting, monitoring and manipulating traffic as it transits an MX Series router. Services
can be categorized into Adaptive Services and Next Gen Services, with each category providing Inline
3

services interfaces and Multiservices interfaces options. Table 1 on page 3 lists the cards that provide
these services.

NOTE: The MX-SPC3 replaces MS- type cards providing a significant overall performance
improvement together with high-end scale and capacity.

Table 1: MX Series 5G Universal Router Services

MX Series 5G Universal Routing Platform

Adaptive Services Next Gen Services

MPC MS-DPC MS-MPC MS-MIC MPC MX-SPC3

si-1/0/0 ms-1/0/0 ms-1/0/0 ms-1/0/0 si-1/0/0 vms-1/0/0

Inline services Inline services

• Adaptive Services can run on MS-DPC, MS-MPC, and MS-MIC cards using Multiservices (MS) PICs
or Adaptive Services (AS) PICs.

• Next Gen Services can run on MPC cards and the MX-SPC3 security services card.

Inline services are configured on MX Series Modular Port Concentrators (MPC)s. Inline services
interfaces, are virtual physical interfaces that reside on the Packet Forwarding Engine. They provide high
performance processing on traffic transiting the MPC, and allow you to maximize your chassis slot
capacity and utilization.

Multiservices Security cards (MS-DPC, MS-MPC, MS-MIC or MX-SPC3), provide services that can be
applied to any traffic transiting the MX chassis beyond just an individual MPC. They also provide
dedicated processing to support a variety of security features at scale and high performance.

Adaptive Services Overview

Adaptive Services run inline on MPCs and on MS-DPC, MS-MPC, and MS-MIC Multiservice security
cards. Adaptive Services (AS) PICs and Multiservices PICs enable you to perform multiple services on
the same PIC by configuring a set of services and applications. The AS and Multiservices PICs offer a
range of services that you can configure in one or more service sets.
4

NOTE: On Juniper Networks MX Series 5G Universal Routing Platforms, the MS-DPC provides
essentially the same capabilities as the MS-MPC. The interfaces on both platforms are
configured in the same way.

For more information about Adaptive Services including inline services, see Adaptive Services Overview.

Inline Services

Adaptive Services also use inline services interfaces to provide inline services. Inline services interfaces
are virtual interfaces that reside on the Packet Forwarding Engine.

You configure inline services only on MPCs using the naming convention si-fpc/pic/port rather than the
ms-fpc/pic/port naming convention.

Next Gen Services

Next Gen Services provide the combined capabilities of MX and SRX security services enabling you to
inspect, monitor and manipulate traffic as it transits the MX Series router. Next Gen Services are
supported both inline on Modular Port Concentrators (MPCs) and the MX-SPC3 security services card in
MX240, MX480 and MX960 routers. Please refer to Table 2 on page 5, which provides a summary of
Next Gen Services that are supported both inline and on the MX-SPC3 card. Both Inline and MX-SPC3
based services can be used at the same time.

You configure Next Gen Services on the MX-SPC3 security services card using the virtual multiservices
naming convention: vms-fpc/pic/port.

Summary of Services Supported on MX Series 5G Universal Routers

Table 2 on page 5 provides a summary of the services supported under Next Gen Services.
5

Table 2: Summary of Services Supported on MX Series 5G Universal Routing Platform

Next Gen Services: Inline (si-) Interface and MX-SPC3

Service Feature Inline Services MX-SPC3

Junos OS Junos OS
Sub-Service Sub-Service
Release Release

CGNAT 19.3R2 Basic-NAT44 and 19.3R2 Basic-NAT44


NAT66
Basic-NAT66
Static Destination
Dynamic-NAT44
NAT
Static Destination NAT
Twice-NAT44 Basic
Basic-NAT-PT
6rd Softwires
NAPT-PT
NPTv6
NAPT44

NAPT66

Port Block Allocation

Deterministic-nat44 and
nat64

End Point Independent


Mapping (EIM)/End Point
Independent Filtering
(EIF)

Persistent NAT –
Application Pool Pairing
(APP)

Twice-NAT44 – Basic,
Dynamic and NAPT

NAT64

XLAT-464
6

Table 2: Summary of Services Supported on MX Series 5G Universal Routing Platform (Continued)

Next Gen Services: Inline (si-) Interface and MX-SPC3

Service Feature Inline Services MX-SPC3

Junos OS Junos OS
Sub-Service Sub-Service
Release Release

NPTv6

20.1R1 Port Control Protocol


(PCP) – v1 and v2

DS-Lite
20.2R1 MAP-E
NAT46

Traffic Load 19.3R2


19.3R2
Balancer

SecIntel (SkyATP IP N/A


19.3R2
Threat Feeds)

Stateful Firewall 19.3R2


N/A
Services

Intrusion Detection 19.3R2


N/A
Services (IDS)

DNS Request 19.3R2


N/A
Filtering

Aggregated 19.3R2
Multiservices N/A
Interfaces
7

Table 2: Summary of Services Supported on MX Series 5G Universal Routing Platform (Continued)

Next Gen Services: Inline (si-) Interface and MX-SPC3

Service Feature Inline Services MX-SPC3

Junos OS Junos OS
Sub-Service Sub-Service
Release Release

Inter-chassis High 19.3R2 CGNAT, Stateful Firewall,


N/A
Availability IDS

URL Filtering N/A 20.1R1

JFlow 20.1R1 N/A

RPM and TWAMP 20.1R1 N/A

Video Monitoring 20.1R1 N/A

21.1R1 Route based Site 2 Site


VPN

Traffic selector based


VPNs
IPsec VPN N/A
AutoVPN

Routing protocols (BGP/


OSPF) over IPsec

Next Gen Services Documentation

You can run Next Gen Services on the MX240, MX480, and MX960 if you have the MX-SPC3 services
card installed in the router. Refer to our TechLibrary for all MX router documentation. For Next Gen
Services, refer to the following documentation:
8

• To learn about and configure Next Gen Services, see Next Gen Services Interfaces User Guide for
Routing Devices (this guide).

• For details on installing or replacing the MX-SPC3 card, see MX Series 5G Universal Routing Platform
Interface Module Reference.

• To monitor flows and sample traffic — See the Monitoring, Sampling, and Collection Services
Interfaces Feature Guide, which describes how to configure traffic flow monitoring, packet flow
capture, traffic sampling for accounting or discard, port mirroring to an external device, and real-time
performance monitoring.

• Broadband Subscriber Services User Guide

Enabling Next Gen Services

To run Next Gen Services, you must enable it on the MX Series router. This enables the operating
system to run it’s own operating system (OS) for Next Gen Services.

There are specific steps you’ll need to take if you’re migrating your services from legacy services cards to
the MX-SPC3. The Next Gen Services CLI differs from these legacy services. For more information, see
"Configuration Differences Between Adaptive Services and Next Gen Services on the MX-SPC3" on
page 16.

Compatibility with Other Services Cards

The MX-SPC3 services card is compatible end-to-end with the MX Series Switch Fabrics, Routing
Engines and MS-MPC line cards as described in Table 3 on page 9.
9

Table 3: MX-SPC3 Services Card Compatibility with MX Series Switch Fabrics, Routing Engines and
MPC Line Cards

Switch Fabric Route Engine MPC Line Cards

SCBE RE-S-1800X4-16G-BB MPC2E-3D

RE-S-1800X4-16G-UPG-BB MPC2-3D-NG

RE-S-1800X4-16G-S MPC3E and MPC3E-3D-NG

RE-S-1800X4-16G-R MPC4E-3D

RE-S-1800X4-32G-BB MPC-3D-16XGE

RE-S-1800X4-32G-UB

RE-S-1800X4-32G-S

RE-S-1800X4-32G-R
10

Table 3: MX-SPC3 Services Card Compatibility with MX Series Switch Fabrics, Routing Engines and
MPC Line Cards (Continued)

Switch Fabric Route Engine MPC Line Cards

SCBE2 RE-S-1800X4-16G-BB MPC2E-3D

RE-S-1800X4-16G-UPG-BB MPC2-3D-NG

RE-S-1800X4-16G-S MPC3E and MPC3E-3D-NG

RE-S-1800X4-16G-R MPC4E-3D

RE-S-1800X4-32G-BB MPC5E and MPC5EQ

RE-S-1800X4-32G-UB MPC7E and MPC7EQ

RE-S-1800X4-32G-S MPC-3D-16XGE

RE-S-1800X4-32G-R

RE-S-X6-64G-BB

RE-S-X6-64G-UB

RE-S-X6-64G-S

RE-S-X6-64G-R

RE-S-X6-128G-S-BB

RE-S-X6-128G-S-S

RE-S-X6-128G-S-R
11

Table 3: MX-SPC3 Services Card Compatibility with MX Series Switch Fabrics, Routing Engines and
MPC Line Cards (Continued)

Switch Fabric Route Engine MPC Line Cards

SCBE3 RE-S-1800X4-16G-BB MPC2-3D-NG


MPC3E-3D-NG
RE-S-1800X4-16G-UPG-BB
MPC4E-3D
RE-S-1800X4-16G-S
MPC5E and MPC5EQ
RE-S-1800X4-16G-R
MPC7E and MPC7EQ
RE-S-1800X4-32G-BB
MPC-3D-16XGE
RE-S-1800X4-32G-UB
MPC10E-10C
RE-S-1800X4-32G-S
MPC10E-15C
RE-S-1800X4-32G-R

RE-S-X6-64G-BB

RE-S-X6-64G-UB

RE-S-X6-64G-S

RE-S-X6-64G-R

RE-S-X6-128G-S-BB

RE-S-X6-128G-S-S

RE-S-X6-128G-S-R

Configuring the MX-SPC3 Services Card

The interfaces on the MX-SPC3 services card are referred to as a virtual multi service (vms) PIC. When
you configure an MX-SPC3 interface, you specify the interface as a vms- interface as follows:

user@host# set services service-set service-set-name interface-service service-interface vms-slot-number/


pic-number/0.logical-unit-number

Aside from the CLI differences, you need to be aware of the basic hardware differences between
multiservices (MS) type (MS-DPC, MS-MPC, and MS-MIC) cards and the MX-SPC3 services card. MS
12

type cards contain four CPU complexes whereas the MX-SPC3 card, while more powerful, contains two
CPU complexes. Each CPU complex services a single PIC, meaning that MS type cards support four PICs
whereas the MX-SPC3 supports two PICs. MS type cards use special multiservices (MS) and adaptive
services (AS) PICs, whereas the PICs on the MX-SPC3 card are integrated.

Because the number of PICs directly affects the number of interfaces, you might need to add logical
units to each interface on the MX-SPC3 to increase the number of interfaces to four. For example, if you
currently use all four interfaces on the MS type card and you have a service set per interface, you can
create two logical units per interface on the MX-SPC3 to bring the total number of interfaces to four,
and then reassociate the four service sets to these four logical interfaces.

Methods for Applying Services to Traffic

When you configure Next Gen Services, you can apply those services with either of the following
methods:

• Apply the configured services to traffic that flows through a particular interface on the MX router.

• Apply the configured services to traffic that is destined for a particular next hop.

Configuring IPsec VPN on MX-SPC3 Services Card

To configuring IPsec on MX-SPC3 service card, use the CLI configuration statements at the [edit
security] hierarchy level as the IPsec CLI configuration at the [edit services] is replaced with the CLI
configuration at the [edit security] hierarchy level as shown in Table 4 on page 12

Table 4: Comparison on configuring IPsec VPN for MX and MX-SPC3

Current MX Configuration Equivalent MX-SPC3 Configuration

set services ipsec-vpn traceoptions set security ike traceoptions

set services ipsec-vpn ike proposal set security ike proposal

set services ipsec-vpn ike policy set security ike policy

set services ipsec-vpn ike policy policy-name set security ike respond-bad-spi
respond-bad-spi

set services ipsec-vpn ipsec proposal set security ipsec proposal

set services ipsec-vpn ipsec policy set security ipsec policy


13

Table 4: Comparison on configuring IPsec VPN for MX and MX-SPC3 (Continued)

Current MX Configuration Equivalent MX-SPC3 Configuration

set services ipsec-vpn rule rule-name term term- set security ipsec vpn vpn-name traffic-selector
name from [source-address| destination-address] selector-name [local-ip | remote-ip]

set services ipsec-vpn rule rule-name term term- set security ipsec vpn vpn-name bind-interface
name from ipsec-inside-interface

set services ipsec-vpn rule rule-name term term- set security ike gateway gw-name address
name then remote-gateway

set services ipsec-vpn rule rule-name term term- set security ike gateway gw-name address
name then backup-remote-gateway

set services ipsec-vpn rule rule-name term term- set security ike gateway gw-name dead-peer-
name then dead-peer-detection detection

set services ipsec-vpn rule rule-name term term- set security ike gateway gw-nameike-policy
name then dynamic ike-policy

set services ipsec-vpn rule rule-name term term- set security ipsec vpn vpn-name ike ipsec-policy
name then dynamic ipsec-policy

set services ipsec-vpn rule rule-name term term- set security ipsec vpn vpn-name manual
name then manual

set services ipsec-vpn rule rule-name term term- set security ipsec vpn vpn-name df-bit clear
name then clear-dont-fragment-bit

set services ipsec-vpn rule rule-name term term- set security ipsec vpn vpn-name df-bit copy
name then copy-dont-fragment-bit

set services ipsec-vpn rule rule-name term term- set security ipsec vpn vpn-name df-bit copy
name then set-dont-fragment-bit

set services ipsec-vpn rule rule-name term term- set security ipsec vpn vpn-name tunnel-mtu
name then tunnel-mtu
14

Table 4: Comparison on configuring IPsec VPN for MX and MX-SPC3 (Continued)

Current MX Configuration Equivalent MX-SPC3 Configuration

set services ipsec-vpn rule rule-name term term- set security ipsec vpn vpn-name ike no-anti-
name then no-anti-replay replay

set services ipsec-vpn rule rule-name match- set security ipsec vpn vpn-namematch-direction
direction

set services ipsec-vpn establish-tunnels set security ipsec vpn vpn-nameestablish-tunnels

set services service-set svc-set-name ipsec-vpn- set security ipsec vpn vpn-nameike gateway
options local-gateway address gateway-name

set services service-set svc-set-name ipsec-vpn- No global service-set setting. Must be configured
options clear-dont-fragment-bit on a per vpn object basis.

set services service-set svc-set-name ipsec-vpn- No global service-set setting. Must be configured
options copy-dont-fragment-bit on a per vpn object basis.

set services service-set svc-set-name ipsec-vpn- No global service-set setting. Must be configured
options set-dont-fragment-bit on a per vpn object basis.

set services service-set svc-set-name ipsec-vpn- set security ipsec vpn vpn-nameudp-encapsulate
options udp-encapsulate

set services service-set svc-set-name ipsec-vpn- No global service-set setting. Must be configured
options no-anti-replay on a per vpn object basis.

set services service-set svc-set-name ipsec-vpn- set security ipsec vpn vpn-namepassive-mode-
options passive-mode-tunneling tunneling

set services service-set svc-set-name ipsec-vpn- No global service-set setting. Must be configured
options tunnel-mtu on a per vpn object basis.

set services service-set svc-set-name ipsec-vpn- set services service-set svc-set-name ipsec-vpn-
rules rules
15

RELATED DOCUMENTATION

Enabling and Disabling Next Gen Services | 121


Configuration Differences Between Adaptive Services and Next Gen Services on the MX-SPC3 |
16
Adaptive Services Overview
16

CHAPTER 2

Configuration Overview

IN THIS CHAPTER

Configuration Differences Between Adaptive Services and Next Gen Services on the MX-SPC3 | 16

Next Gen Services Feature Configuration Overview | 95

How to Configure Services Interfaces for Next Gen Services | 96

How to Configure Interface-Style Service Sets for Next Gen Services | 98

How to Configure Next-Hop Style Service Sets for Next Gen Services | 100

How to Configure Service Set Limits for Next Gen Services | 101

Example: Next Gen Services Inter-Chassis Stateful High Availability for NAT and Stateful Firewall (MX-
SPC3) | 104

Example: Configuring AutoVPN with Pre-Shared Key | 116

Enabling and Disabling Next Gen Services | 121

Configuration Differences Between Adaptive Services and Next Gen


Services on the MX-SPC3

IN THIS SECTION

Overview | 17

Interfaces | 18

Service Set | 23

Stateful Firewall | 26

Carrier Grade Network Address Translation (CGNAT) | 34

Intrusion Detection System (IDS) | 82

Migrate from the MS Card to the MX-SPC3 | 93


17

Overview
Next Gen Services on the MX-SPC3 require you to configure services differently from what you are
accustomed to with Adaptive Services, which run on MS type cards (MS-MPC, MS-MIC and MS-DPC).
Configuring the MX-SPC3 services card more closely aligns with the way you configure the SRX Series
services gateway. Once you are familiar with this more unified approach, you should be able to configure
services on these two platforms in a more seamless fashion, ultimately resulting in less training overhead
and lower risk of configuration error.

Aside from the CLI differences, you need to be aware of the basic hardware differences between
multiservices (MS) type (MS-DPC, MS-MPC, and MS-MIC) cards and the MX-SPC3 services card. MS
type cards contain four CPU complexes whereas the MX-SPC3 card, while more powerful, contains two
CPU complexes. Each CPU complex services a single PIC, meaning that MS type cards support four PICs
whereas the MX-SPC3 supports two PICs. MS type cards use special multiservices (MS) and adaptive
services (AS) PICs, whereas the PICs on the MX-SPC3 card are integrated.

Because the number of PICs directly affects the number of interfaces (Table 5 on page 17), you might
need to add logical units to each interface on the MX-SPC3 to increase the number of interfaces to four.
For example, if you currently use all four interfaces on the MS type card and you have a service set per
interface, you can create two logical units per interface on the MX-SPC3 to bring the total number of
interfaces to four, and then reassociate the four service sets to these four logical interfaces.

Table 5: Hardware Differences: MS Type Cards versus MX-SPC3 Card

MS-Cards MX-SPC3

Number of CPU complexes 4 2

Number of PICs per CPU complex 1 1

Number of interfaces per PIC 1 1

Total number of interfaces on card 4 2

NOTE: See the MX Series 5G Universal Routing Platform Interface Module Reference for more
information on the MX-SPC3 hardware.

The following sections provide an overview of the basic configuration differences between services on
the MS type cards and services on the MX-SPC3 card. The intent of these sections is to help you get
started by using basic examples to illustrate the major changes. These examples show a subset of the
CLI configuration options and do not replace the more formal treatment of the subject matter found in
18

the Next Gen Services Interfaces User Guide for Routing Devices and the Junos OS CLI Reference
Guide.

The configuration examples in these sections are presented side-by-side so you can easily see the
differences between the two. The examples are intended to show you how to configure existing MS
type card features on the MX-SPC3. The examples are not intended to show you how to configure new
features only found on the MX-SPC3. For legibility and ease of comparison, the order of statements
presented might differ slightly from the actual order of statements displayed in the CLI.

If you have a large set of existing adaptive services, we recognize that these changes might be an
inconvenience to you. To help you migrate from MS type cards to the MX-SPC3, we suggest that you
proceed as follows:

• Look through the examples in this guide to get an overall view of the changes required.

• Look through the set of configuration examples in knowledge base article KB35348.

• Look through this guide and the Junos OS CLI Reference Guide to understand all the features,
configuration options, and syntax.

• Contact JTAC for help with your migration.

You do not need to make these configuration changes if you continue to run adaptive services on the
MS type cards. However, once you deploy the MX-SPC3 on a router, you must replace all MS type cards
on that router and reconfigure your services to align with the Next Gen Services configuration paradigm.

Interfaces
MS type cards use the interface naming convention ms-1/0/0, whereas you specify MX-SPC3 interfaces
using the virtual multiservices or vms-1/0/0 interface naming convention. There are no changes to the
names of ams and mams interfaces.

In addition, a number of parameters that are configured under services-options on an ms interface are
configured under service-set-options in a service set.

Table 6 on page 19 shows examples of these changes.


19

Table 6: Interfaces and Service Options

MS Type Cards MX-SPC3

[edit interfaces] [edit interfaces]


ms-5/1/0 { # Change interface name to vms.
<...> vms-5/1/0 {
} <...>
}

[edit interfaces] [edit services]


ms-5/1/0 { service-set sset1 {
services-options { service-set-options {
open-timeout 40; # Set tcp parameters under tcp-
close-timeout 40; session.
inactivity-tcp-timeout tcp-session {
10; open-timeout 40;
inactivity-asymm-tcp- close-timeout 40;
timeout 10; inactivity-tcp-timeout 10;
tcp-tickles 8; inactivity-asymm-tcp-
ignore-errors tcp; timeout 10;
} tcp-tickles 8;
} ignore-errors tcp;
}
}
}

[edit interfaces] [edit services]


ms-5/1/0 { service-set sset1 {
services-options { # Set non-tcp parameters directly
inactivity-non-tcp- under
timeout 40; # service-set-options.
session-timeout 10; service-set-options {
} inactivity-non-tcp-timeout 40;
} session-timeout 10;
}
}
20

Table 6: Interfaces and Service Options (Continued)

MS Type Cards MX-SPC3

These parameters are hardcoded as follows:


[edit interfaces]
ms-5/1/0 { • fragment-limit 62
services-options {
• reassembly-timeout 2
fragment-limit 32;
reassembly-timeout 3;
}
}
21

Table 6: Interfaces and Service Options (Continued)

MS Type Cards MX-SPC3

[edit interfaces] [edit services]


ms-5/1/0 { # Maximum number of sessions can be
services-options { # specified per service-set.
session-limit { service-set sset1 {
maximum 100; service-set-options {
cpu-load-threshold session-limit {
12; maximum 100;
rate 10; }
} }
} }
}

[edit interfaces]
# All session-limit parameters continue
to be
# configurable per interface. If the
maximum
# number of sessions is different from
the associated
# service-set, the smaller number takes
effect.
vms-5/1/0 {
services-options {
session-limit {
maximum 100;
cpu-load-threshold 12;
rate 10;
}
}
}
22

Table 6: Interfaces and Service Options (Continued)

MS Type Cards MX-SPC3

[edit interfaces] [edit interfaces]


ms-5/1/0 { # Set interim-logging-interval under
services-options { the nat branch.
pba-interim-logging- nat {
interval 10; source {
} pool src-pool {
} port {
block-allocation {
interim-logging-
interval 10;
}
}
}

See service-set syslog stream host.


[edit interfaces]
ms-5/1/0 {
services-options {
syslog {
host {
<...>
}
}
}
}
23

Table 6: Interfaces and Service Options (Continued)

MS Type Cards MX-SPC3

[edit interfaces] [edit services]


ms-5/1/0 { service-set sset1 {
services-options { syslog {
syslog { event-rate 10;
message-rate-limit }
10; }
}
}
}

Not supported
[edit interfaces]
ms-5/1/0 {
services-options {
ignore-errors alg;
disable-global-timeout-
override;
trio-flow-offload {
minimum-bytes 1000;
}
}
}

Service Set
Table 7 on page 24 shows minor changes in the way some service-set parameters are configured.
24

Table 7: Service Set

MS Type Cards MX-SPC3

[edit services] [edit services]


service-set sset1 { service-set sset1 {
tcp-mss 1460; service-set-options {
service-set-options { # Set tcp parameters under tcp-
tcp-non-syn drop-flow- session.
send-rst; tcp-session {
tcp-fast-open drop; tcp-mss 1460;
} tcp-non-syn drop-flow-send-
} rst;
tcp-fast-open drop;
}
}
}

[edit services] [edit interfaces]


service-set sset1 { # Set replication-threshold on the
replicate-services { interface.
replication-threshold vms-5/1/0 {
180; redundancy-options {
} replication-threshold 180;
} }
}
25

Table 7: Service Set (Continued)

MS Type Cards MX-SPC3

[edit services] [edit services]


service-set sset1 { service-set sset1 {
syslog { syslog
host 10.1.1.1 { # Process security logs in the
port 514; dataplane.
} mode stream;
} stream s1 {
} # Specify host to send
security logs to.
host {
10.1.1.1;
port 514;
}
}
}
}

[edit services] [edit services]


service-set sset1 { service-set sset1 {
syslog { syslog
host local; # Process security logs in the
} control plane,
} # saving logs to local file
specified by rtlog.
mode event;
}
}
rtlog {
traceoptions {
# Specify filename for logs.
file rtlog size 1g;
flag all;
}
}
26

Table 7: Service Set (Continued)

MS Type Cards MX-SPC3

Service order is fixed.


[edit services]
service-set sset1 {
service-order <...>
}

J-Flow logging is supported inline.


[edit services]
service-set sset1 {
sampling-service <...>
}

Currently unsupported
[edit services]
service-set sset1 {
tag-rule-sets <...>
tag-rules <...>
hcm-profile <...>
hcm-url-rule-sets <...>
hcm-url-rules <...>
service-set-options {
bypass-traffic-on-pic-
failure;
}
}

Stateful Firewall

IN THIS SECTION

Rules and Policies | 27

Address Lists and Ranges | 31

Applications | 33
27

Traceoptions and Counters | 33

Rules and Policies

Stateful firewall rules on the MX-SPC3 are structured slightly differently from stateful firewall rules for
services on the MS type cards. On the MX-SPC3, you enclose the rules within a policies wrapper, and
you define the match terms and actions for the rule in a policy contained within the rule.

Just like a stateful firewall service on the MS type card, you create a service set to associate an interface
with a rule set. A rule set contains references to one or more rules. Rules are applied sequentially in the
order that you list them until a match occurs and an action taken.

Each rule contains one or more pairs of match terms and actions. On the MX-SPC3, each pair of match
terms and actions is called a policy. Policies are applied sequentially in the order that you specify them
until a match occurs and an action taken.

Table 8 on page 27 shows the configuration differences between stateful firewall rules on the MS card
and the MX-SPC3. In particular, note the different definitions for the permit/deny/reject actions.

Table 8: Stateful Firewall Rules and Policies

MS Card MX-SPC3

[edit services] [edit services]

service-set s1 { service-set s1 {
stateful-firewall-rule-sets stateful-firewall-rule-sets rule-
rule-set-basic-sfw; set-basic-sfw;
interface-service { interface-service {
service-interface service-interface vms-1/1/0;
ms-1/1/0; }
} }
}
28

Table 8: Stateful Firewall Rules and Policies (Continued)

MS Card MX-SPC3

stateful-firewall { # Enclose stateful firewall rules


within the policies wrapper.
policies {
29

Table 8: Stateful Firewall Rules and Policies (Continued)

MS Card MX-SPC3

rule Rule1 { stateful-firewall-rule Rule1 {


match-direction input; match-direction input;
term ping-https-apps { # Define match terms and
from { actions in a policy.
source-address { policy ping-https-apps {
any # Unlike the from
} statement, the match statement (and
destination- # source-address,
address { destination-address, and application)
any # are mandatory.
} match {
applications source-address any;
[junos-icmp-ping junos-https]; destination-address any;
} application [ junos-
then { icmp-ping junos-https ];
accept/reject/ }
discard then {
skip-ids; # permit = allow
syslog; # deny = silently drop
} # reject = drop and
} send ICMP unreachable or TCP RST
term accept { permit/deny/reject
then { # skip-ids is not
accept; supported. One possible way of
} # achieving this same
} goal is to create two
} # end Rule1 # service-sets, one
with IDS and one without IDS,
# and route your next-
hop-service
# traffic to the
desired service set via the associated
# inside or outside
interface.
log;
}
30

Table 8: Stateful Firewall Rules and Policies (Continued)

MS Card MX-SPC3

}
policy accept {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}
}
} # end Rule1

rule Rule2 { stateful-firewall-rule Rule2 {


match-direction output; match-direction output;
term local { policy local {
from { match {
source-address { source-address
10.1.3.2/32; 10.1.3.2/32;
} destination-address any;
application- # application can refer
sets APPL-SET1; to an application set.
} application APPL-SET1;
then { }
accept; then {
} permit;
} }
} # end Rule2 }

} # end Rule2
31

Table 8: Stateful Firewall Rules and Policies (Continued)

MS Card MX-SPC3

rule-set rule-set-basic-sfw # Use the stateful-firewall-rule-


{ set element to list the
rule Rule1; # firewall rules in the order that
rule Rule2; you want them applied.
} stateful-firewall-rule-set rule-set-
} # end stateful-firewall basic-sfw {
stateful-firewall-rule Rule1;
stateful-firewall-rule Rule2;
}
} # end policies

Address Lists and Ranges

Stateful firewall rules can contain match terms that refer to address ranges and lists.

On the MS card, you use source-address-range and destination-address-range elements to specify


address ranges and prefix-list elements under policy-options to specify address lists. The prefix-list
element is not for use solely for stateful firewall rules. You also use the prefix-list element to specify
address lists for use within routing policies.

On the MX-SPC3, the prefix-list element is not used for stateful firewall rules. You use an address-book
under services to define address lists and ranges for use within stateful firewall rules. The prefix-list
element still exists, but is used exclusively for routing policies. You therefore need to configure both
address-book and prefix-list elements if you are specifying address lists for stateful firewall rules and
address lists for routing policies.

Table 9 on page 32 shows the differences between how you specify addresses for stateful firewall rules
on the MS card versus the MX-SPC3.
32

Table 9: Addresses

MS Card MX-SPC3

[edit] [edit services]


policy-options { # Define address lists and address
prefix-list p1 { ranges in an address book.
10.1.22.45/32; address-book {
192.168.0.11/32; global {
} address-set p1 {
} address p1-a;
address p1-b;
}
[edit services]
address p1-a 10.1.22.45/32;
stateful-firewall {
address p1-b 192.168.0.11/32;
rule sfw-rule {
address p2 {
match-direction input;
address-range
term banned-addresses
10.1.22.100/32 {
{
to {
from {
10.1.22.109/32;
source-prefix-
}
list {
}
p1;
}
}
}
source-
} # end address-book
address-range {
policies {
low
stateful-firewall-rule sfw-rule {
10.1.22.100 high 10.1.22.109;
match-direction input;
}
policy banned-addresses {
}
match {
then {
# Refer to the
reject;
addresses defined in the address
syslog;
book.
}
source-address [ p1
}
p2 ];
<...>
destination-address
any;
application any;
}
then {
deny;
33

Table 9: Addresses (Continued)

MS Card MX-SPC3

log;
}
<...>

Applications

The MX-SPC3 supports more built-in Junos applications than the MS card. You can match on these
built-in applications when you create a stateful firewall rule.

To see the complete list of built-in applications, use the show groups junos-defaults applications
configuration mode command. For example:

[edit]
# show groups junos-defaults applications | match junos
application junos-ftp {
application junos-ftp-data {
application junos-tftp {
application junos-twamp {
application junos-rtsp {
application junos-netbios-session {

<...>

Traceoptions and Counters

Stateful firewalls for Next Gen Services on the MX-SPC3 support additional capabilities to help debug
and count traffic:

• traceoptions - Use to trace policy-related events such as policy lookups and rules-based events. The
events are captured in the specified file for viewing.

• count - Use to count traffic-related events such as incoming/outgoing bytes and packets. View the
counters using show commands:

• show services policies detail - the output includes traffic-related counters when you specify the
count option in your policy
34

• show services policies hit-count - the hit count is always available regardless of whether you use
the count option in your policy or not

Table 10 on page 34 shows how to use the traceoptions and count elements:

Table 10: Traceoptions and Count

MS Card MX-SPC3

Not supported
[edit services]
policies {
# Enable traceoptions to trace policy-related events.
traceoptions {
file policylogs size 10m files 5;
flag all;
}
stateful-firewall-rule Rule1 {
match-direction input;
policy my-policy {
match {
source-address any;
destination-address any;
application [ junos-dns-udp junos-dns-tcp ];
}
then {
permit
# Enable counting of traffic events.
count;
}
} # end my-policy
...

Carrier Grade Network Address Translation (CGNAT)


Configuring NAT for Next Gen Services on the MX-SPC3 is different from configuring NAT on legacy
services on the MS card in a number of ways:

• On the MX-SPC3, you configure source NAT separately from destination NAT. You configure source
NAT in the source branch of the configuration tree and you configure destination NAT in the
destination branch of the configuration tree. Source NAT and destination NAT each has its own sets
of address pools and rules in its respective branch of the configuration tree.
35

• On the MX-SPC3, if you configure both source NAT and destination NAT, destination NAT applies
first, and then source NAT applies to the destination NAT translated result. In other words, you write
the source NAT rule not based on the original packet, but based on the destination NAT translated
result.

• On the MX-SPC3, you do not explicitly configure a translation-type. The type of translation is
determined implicitly by your configuration.

• On the MX-SPC3, port translation is the default behavior for dynamic mappings (where different pre-
NAT addresses might map to the same post-NAT address over time). If you do not explicitly include
the port statement in a pool definition, port translation takes place with a port range [1024, 65535],
and the port is selected in a round robin fashion. If you do not want port translation to take place,
you must add a port statement with the no-translation option. This default does not apply to static
mappings where a pre-NAT address always maps to the same post-NAT address.

Table 11 on page 35 through Table 23 on page 74 show examples of how the different translation
types are configured on the MX-SPC3.

Table 11: Example: Basic-NAT44

MS Card MX-SPC3

[edit services] [edit services]

service-set sset1 { service-set sset1 {


nat-rules rule-basic- nat-rule-sets rule-basic-nat44;
nat44; interface-service {
interface-service { service-interface vms-2/0/0;
service-interface }
ms-1/2/0; }
}
}

nat { nat {
source {
36

Table 11: Example: Basic-NAT44 (Continued)

MS Card MX-SPC3

pool src-pool {
address 10.10.10.0/24; pool src-pool {
} address {
10.10.10.0/24;
}
# host-address-base indicates
a type of static mapping
# where the base address
10.45.1.0/32 maps to the
# lowest address in the pool,
namely 10.10.10.0/32,
# and the other addresses map
sequentially from there
# e.g. 10.45.1.1 maps to
10.10.10.1, and so on.
# Since this is a static
mapping, there is no port translation
# by default.
# Note that host-address-base
does not have to be the
# lowest address allowed by
the subsequent source rule.
# Any packet with a source
address allowed by the source rule
# but is lower than the host-
address-base is discarded.
host-address-base
10.45.1.0/32;
}
37

Table 11: Example: Basic-NAT44 (Continued)

MS Card MX-SPC3

rule rule-basic-nat44 { rule-set rule-basic-nat44 {


match-direction input; match-direction input;
term t1 { rule r1 {
from { match {
source- source-address
address { 10.45.1.0/24;
}
10.45.1.0/24 then {
} source-nat {
} pool {
then { src-pool;
translated { }
source- }
pool src-pool; }
}
translation-type { }
basic-
nat44;
}
}
}
}
}

} # end nat
} # end source
} # end nat
38

Table 12: Example: Basic-NAT66

MS Card MX-SPC3

[edit services] [edit services]

service-set sset1 { service-set sset1 {


nat-rules rule-basic-nat66; nat-rule-sets rule-basic-nat66;
interface-service { interface-service {
service-interface service-interface vms-2/0/0;
ms-1/2/0; }
} }
}

nat { nat {
source {

pool src-pool {
address pool src-pool {
2001:DB8:2222::0/128; address {
} 2001:DB8:2222::0/128;
}
}
39

Table 12: Example: Basic-NAT66 (Continued)

MS Card MX-SPC3

rule rule-basic-nat66 { rule-set rule-basic-nat66 {


match-direction input; match-direction input;
term t1 { rule r1 {
from { match {
source-address { source-address
2001:DB8:1111::0/128;
2001:DB8:1111::0/128; }
} then {
} source-nat {
then { pool {
translated { src-pool;
source-pool }
src-pool; }
translation- }
type { }
basic- }
nat66;
}
}
}
}
}

} # end nat
} # end source
} # end nat
40

Table 13: Example: Dynamic-NAT44

MS Card MX-SPC3

[edit services] [edit services]

service-set sset1 { service-set sset1 {


nat-rules rule-dynamic- nat-rule-sets rule-dynamic-nat44;
nat44; interface-service {
interface-service { service-interface vms-2/0/0;
service-interface }
ms-1/2/0; }
}
}

nat { nat {
source {
41

Table 13: Example: Dynamic-NAT44 (Continued)

MS Card MX-SPC3

pool src-pool {
address-range low pool src-pool {
10.10.10.2 high 10.10.10.10; address {
} 10.10.10.2/32 to
10.10.10.10/32;
}
# Since this is implicitly
a dynamic mapping,
# there is port translation
by default , so we need to
# explictly specify that we
don’t want port translation.
port {
no-translation;
}
}
42

Table 13: Example: Dynamic-NAT44 (Continued)

MS Card MX-SPC3

rule rule-dynamic-nat44 { rule-set rule-dynamic-nat44 {


match-direction input; match-direction input;
term t0 { rule r0 {
from { match {
applications source-address
junos-icmp-all; 0.0.0.0/32;
} application junos-
then { icmp-all;
no-translation; }
} then {
} source-nat {
term t1 { off;
from { }
destination- }
address { }
rule r1 {
10.99.0.2/32; match {
} source-address-name
source-address- addr1;
range { destination-address
low 10.99.0.2/32;
10.45.0.2 high 10.45.0.10; }
} then {
} source-nat {
then { pool {
translated { src-pool;
source-pool }
src-pool; }
translation- }
type { }
dynamic- }
nat44;
}
}
}
43

Table 13: Example: Dynamic-NAT44 (Continued)

MS Card MX-SPC3

}
}

} # end nat
} # end source
} # end nat

address-book {
global {
address addr1 {
address-range 10.45.0.2/32 {
to {
10.45.0.10/32;
}
}
}
}
}

Table 14: Example: NAPT-44

MS Card MX-SPC3

[edit services] [edit services]


44

Table 14: Example: NAPT-44 (Continued)

MS Card MX-SPC3

service-set sset1 { service-set sset1 {


nat-rules rule-napt44; nat-rule-sets rule-napt44;
interface-service { interface-service {
service-interface service-interface vms-2/0/0;
ms-1/2/0; }
} }
}

nat { nat {
source {

pool src-pool {
address 10.10.10.0/24; pool src-pool {
port { address {
automatic; 10.10.10.0/24;
} }
} # Since this is implicitly
a dynamic mapping,
# and there is no explicit
port statement
# to indicate otherwise,
the default port
# mapping behavior takes
effect.
}
45

Table 14: Example: NAPT-44 (Continued)

MS Card MX-SPC3

rule rule-napt44 {
match-direction input; rule-set rule-napt44 {
term t1 { match-direction input;
from { rule r1 {
source-address { match {
10.45.1.0/24 source-address
} 10.45.1.0/24;
application- application accept-
sets accept-algs; algs;
} }
then { then {
translated { source-nat {
source-pool pool {
src-pool; src-pool;
translation- }
type { }
napt44; }
} }
} }
}
}
}

} # end nat
} # end source
} # end nat
46

Table 15: Example: napt-66

MS Card MX-SPC3

[edit services] [edit services]

service-set sset1 { service-set sset1 {


nat-rules rule-napt66; nat-rule-sets rule-napt66;
interface-service { interface-service {
service-interface service-interface vms-2/0/0;
ms-1/2/0; }
} }
}

nat { nat {
source {

pool src-pool {
address pool src-pool {
2001:DB8:2222::0/112; address {
port { 2001:DB8:2222::0/112;
range low 20000 high }
30000; port {
} range {
} 20000;
to {
30000;
}
}
}
}
47

Table 15: Example: napt-66 (Continued)

MS Card MX-SPC3

rule rule-napt66 {
match-direction input; rule-set rule-napt66 {
term t1 { match-direction input;
from { rule r1 {
source-address { match {
source-address
2001:DB8:1111::0/96; 2001:DB8:1111::0/96;
} }
} then {
then { source-nat {
translated { pool {
source-pool src-pool;
src-pool; }
translation- }
type { }
napt66; }
} }
}
}
}
}

} # end nat
} # end source
} # end nat
48

Table 16: Example: Deterministic NAT-44

MS Card MX-SPC3

[edit services] [edit services]

service-set sset1 { service-set sset1 {


nat-rules rule-dnat-44; nat-rule-sets rule-dnat-44;
interface-service { interface-service {
service-interface service-interface vms-2/0/0;
ms-1/2/0; }
} }
}

nat { nat {
destination {

pool dest-pool {
address 10.10.10.2/32; pool dest-pool {
} address {
10.10.10.2/32;
}
}
49

Table 16: Example: Deterministic NAT-44 (Continued)

MS Card MX-SPC3

rule rule-dnat-44 { rule-set rule-dnat-44 {


match-direction input; match-direction input;
term t1 { rule r1 {
from { match {
destination- destination-
address { address 10.45.0.2/32;
10.45.0.2/32 }
} then {
} destination-nat {
then { pool {
translated { dest-pool;
destination- }
pool dest-pool; }
translation- }
type { }
dnat-44; }
}
}
}
}
}

} # end nat
} # end destination
} # end nat
50

Table 17: Example: Stateful-NAT464

MS Card MX-SPC3

[edit services] [edit services]

service-set sset1 { service-set sset1 {


nat-rules rule-stateful- nat-rule-sets rule-stateful-nat464-
nat464; src;
interface-service { nat-rule-sets rule-stateful-nat464-
service-interface dest;
ms-1/2/0; interface-service {
} service-interface vms-2/0/0;
} }
}

nat { nat {
source {

pool src-pool {
address 10.10.10.0/24; pool src-pool {
port { address {
automatic; 10.10.10.0/24;
} }
} port {
automatic {
round-robin;
}
}
}
51

Table 17: Example: Stateful-NAT464 (Continued)

MS Card MX-SPC3

rule rule-stateful-nat464 # This source rule applies after the


{ destination rule.
match-direction input; rule-set rule-stateful-nat464-
term t1 { src {
from { match-direction input;
source- rule r1 {
address { match {
source-address
2001:DB8:1111::0/96; 2001:DB8:1111::0/96;
} # Since destination
destination- NAT happens first, the
address { # destination IPv6
prefix has been stripped off,
2001:DB8:2222::0/96; # resulting in an
} IPv4 destination address.
applications destination-address
[junos-icmp-all junos-icmp- 0.0.0.0/32;
ping junos-traceroute junos- application [junos-
traceroute-ttl 1]; icmp-all junos-icmp-ping junos-
} traceroute junos-traceroute-ttl 1];
then { }
translated { then {
source- source-nat {
pool src-pool; pool {
clat- src-pool;
prefix 2001:DB8:1111::0/96; }
clat-prefix
destination-prefix 2001:DB8:1111::0/96;
2001:DB8:2222::0/96; }
}
translation-type { }
}
stateful-nat464;
}
}
}
52

Table 17: Example: Stateful-NAT464 (Continued)

MS Card MX-SPC3

}
}

} # end nat
} # end source

destination {

# This destination rule applies


before the source rule.
rule-set rule-stateful-nat464-
dest {
match-direction input;
rule r1 {
match {
destination-address
2001:DB8:2222::0/96;
}
then {
destination-nat {
destination-
prefix 2001:DB8:2222::0/96;
}
}
}
}
53

Table 17: Example: Stateful-NAT464 (Continued)

MS Card MX-SPC3

} # end destination
} # end nat

Table 18: Example: Stateful-NAT64

MS Card MX-SPC3

[edit services] [edit services]

service-set sset1 { service-set sset1 {


nat-rules rule-stateful- nat-rule-sets rule-stateful-nat64-
nat64; src;
interface-service { nat-rule-sets rule-stateful-nat64-
service-interface dest;
ms-1/2/0; interface-service {
} service-interface vms-2/0/0;
} }
}

nat { nat {
source {
54

Table 18: Example: Stateful-NAT64 (Continued)

MS Card MX-SPC3

pool src-pool {
address 10.10.10.0/24; pool src-pool {
port { address {
automatic; 10.10.10.0/24;
random- }
allocation; port {
} automatic {
} random-allocation;
mapping-timeout 500; }
} }
mapping-timeout 500;
}
55

Table 18: Example: Stateful-NAT64 (Continued)

MS Card MX-SPC3

rule rule-stateful-nat64 { # This source rule applies after


match-direction input; the destination rule.
term t1 { rule-set rule-stateful-nat64-
from { src {
destination- match-direction input;
address { rule r1 {
match {
2001:DB8:2222::0/64; source-address
} 0::0/128;
} # Since destination
then { NAT applies first, the
translated { # destination
source-pool address is now IPv4.
src-pool; destination-address
destination- 0.0.0.0/32;
prefix 2001:DB8:2222::0/64; }
translation- then {
type { source-nat {
pool {
stateful-nat64; src-pool;
} }
} }
} }
} }
term t2 { }
from {
destination-
address {

2001:DB8:3333::0/64;
}
}
then {
translated {
source-pool
src-pool;
56

Table 18: Example: Stateful-NAT64 (Continued)

MS Card MX-SPC3

destination-
prefix 2001:DB8:3333::0/64;
translation-
type {

stateful-nat64;
}
}
}
}
}

} # end nat
} # end source

destination {
57

Table 18: Example: Stateful-NAT64 (Continued)

MS Card MX-SPC3

# This destination rule applies


before the source rule.
rule-set rule-stateful-nat64-
dest {
match-direction input;
rule r1 {
match {
destination-address
2001:DB8:2222::0/64;
}
then {
destination-nat {
destination-
prefix 2001:DB8:2222::0/64;
}
}
}
rule r2 {
match {
destination-address
2001:DB8:3333::0/64;
}
then {
destination-nat {
destination-
prefix 2001:DB8:3333::0/64;
}
}
}
}
58

Table 18: Example: Stateful-NAT64 (Continued)

MS Card MX-SPC3

} # end destination
} # end nat

Table 19: Example: Twice-Basic-NAT-44

MS Card MX-SPC3

[edit services] [edit services]

service-set sset1 { service-set sset1 {


nat-rules rule-twice- nat-rule-sets rule-twice-basic-nat-44-
basic-nat-44; src;
interface-service { nat-rule-sets rule-twice-basic-nat-44-
service-interface dest;
ms-1/2/0; interface-service {
} service-interface vms-2/0/0;
} }
}

nat { nat {
source {
59

Table 19: Example: Twice-Basic-NAT-44 (Continued)

MS Card MX-SPC3

pool src-pool {
address pool src-pool {
10.98.10.0/24; address {
} 10.98.10.0/24;
pool dest-pool { }
address # host-address-base indicates
10.99.10.0/24; a type of static mapping where
} # the base address
10.10.10.0/32 maps to the lowest
# address in the pool, namely
10.98.10.0/32,
# and the other addresses map
sequentially from there
# e.g. 10.10.10.1 maps to
10.98.10.1, and so on.
# Since this is a static
mapping, there is no port translation
# by default.
# Note that host-address-base
does not have to be the
# lowest address allowed by
the subsequent source rule.
# Any packet with a source
address allowed by the source rule
# but is lower than the host-
address-base is discarded.
host-address-base
10.10.10.0/32;
}
60

Table 19: Example: Twice-Basic-NAT-44 (Continued)

MS Card MX-SPC3

rule rule-twice-basic- # This source rule applies after the


nat-44 { destination rule.
match-direction rule-set rule-twice-basic-nat-44-
input; src {
term t1 { match-direction input;
from { rule r1 {
source- match {
address { source-address
10.10.10.0/24;
10.10.10.0/24; # Since destination
} NAT happens first, the destination
destination- # address refers to
address { the NAT’d address.
destination-address
10.20.10.0/24; 10.99.10.0/24;
} }
} then {
then { source-nat {
translated { pool {
source- src-pool;
pool src-pool; }
}
destination-pool dest-pool; }
}
translation-type { }

twice-basic-nat-44;
}
}
}
}
}
61

Table 19: Example: Twice-Basic-NAT-44 (Continued)

MS Card MX-SPC3

} # end nat
} # end source

destination {

pool dest-pool {
address {
10.99.10.0/24;
}
}
62

Table 19: Example: Twice-Basic-NAT-44 (Continued)

MS Card MX-SPC3

# This destination rule applies before


the source rule.
rule-set rule-twice-basic-nat-44-
dest {
match-direction input;
rule r1 {
match {
destination-address
10.20.10.0/24;
}
then {
destination-nat {
pool {
dest-pool;
}
}
}
}
}

} # end destination
} # end nat

Table 20: Example: Twice-Dynamic-NAT-44

MS Card MX-SPC3

[edit services] [edit services]


63

Table 20: Example: Twice-Dynamic-NAT-44 (Continued)

MS Card MX-SPC3

service-set sset1 { service-set sset1 {


nat-rules rule-twice- nat-rule-sets rule-twice-dynamic-
dynamic-nat-44; nat-44-src;
interface-service { nat-rule-sets rule-twice-dynamic-
service-interface nat-44-dest;
ms-1/2/0; interface-service {
} service-interface vms-2/0/0;
} }
}

nat { nat {
source {

pool src-pool {
address 10.98.10.0/24; pool src-pool {
} address {
pool dest-pool { 10.98.10.0/24;
address 10.99.10.0/24; }
} port {
no-translation;
}
}
64

Table 20: Example: Twice-Dynamic-NAT-44 (Continued)

MS Card MX-SPC3

rule rule-twice-dynamic- # This source rule applies after the


nat-44 { destination rule.
match-direction input; rule-set rule-twice-dynamic-
term t1 { nat-44-src {
from { match-direction input;
source- rule r1 {
address { match {
source-address
10.10.10.0/24; 10.10.10.0/24;
} # Since destination
destination- NAT happens first, the destination
address { # address refers to
the NAT’d address.
10.20.10.0/24; destination-address
} 10.99.10.0/24;
} }
then { then {
translated { source-nat {
source- pool {
pool src-pool; src-pool;
}
destination-pool dest-pool; }
}
translation-type { }
twice- }
dynamic-nat-44;
}
}
}
}
}
65

Table 20: Example: Twice-Dynamic-NAT-44 (Continued)

MS Card MX-SPC3

} # end nat
} # end source

destination {

pool dest-pool {
# By default, address
mapping in destination pools is static.
address {
10.99.10.0/24;
}
}
66

Table 20: Example: Twice-Dynamic-NAT-44 (Continued)

MS Card MX-SPC3

# This destination rule applies


before the source rule.
rule-set rule-twice-dynamic-
nat-44-dest {
match-direction input;
rule r1 {
match {
destination-address
10.20.10.0/24;
}
then {
destination-nat {
pool {
dest-pool;
}
}
}
}
}

} # end destination
} # end nat

Table 21: Example: Twice-NAPT-44

MS Card MX-SPC3

[edit services] [edit services]


67

Table 21: Example: Twice-NAPT-44 (Continued)

MS Card MX-SPC3

service-set sset1 { service-set sset1 {


nat-rules rule-twice- nat-rule-sets rule-twice-napt-44-src;
napt-44; nat-rule-sets rule-twice-napt-44-
interface-service { dest;
service-interface interface-service {
ms-1/2/0; service-interface vms-2/0/0;
} }
} }

nat { nat {
source {

pool src-pool {
address 10.98.10.0/24; pool src-pool {
port { address {
automatic; 10.98.10.0/24;
secured-port-block- }
allocation block-size 256 max- port {
blocks-per-address 1 active- automatic {
block-timeout 300; round-robin;
} }
} block-allocation {
pool dest-pool { block-size 256;
address 10.99.10.2/32; maximum-blocks-per-
} host 1;
active-block-timeout
300;
}
}
}
68

Table 21: Example: Twice-NAPT-44 (Continued)

MS Card MX-SPC3

rule rule-twice-napt-44 { # This source rule applies after the


match-direction input; destination rule.
term t1 { rule-set rule-twice-napt-44-src {
from { match-direction input;
source-address rule r1 {
{ match {
source-address
10.10.10.0/24; 10.10.10.0/24;
} # Since destination
destination- NAT happens first, the
address { # destination
address refers to the NAT’d address.
10.20.10.2/32; destination-address
} 10.99.10.2/32;
} }
then { then {
translated { source-nat {
source- pool {
pool src-pool; src-pool;
}
destination-pool dest-pool; }
}
translation-type { }
twice- }
napt-44;
}
}
}
}
}
69

Table 21: Example: Twice-NAPT-44 (Continued)

MS Card MX-SPC3

} # end nat
} # end source

destination {

pool dest-pool {
address {
10.99.10.2/32;
}
}
70

Table 21: Example: Twice-NAPT-44 (Continued)

MS Card MX-SPC3

# This destination rule applies


before the source rule.
rule-set rule-twice-napt-44-dest
{
match-direction input;
rule r1 {
match {
source-address
10.10.10.0/24;
destination-address
10.20.10.2/32;
}
then {
destination-nat {
pool {
dest-pool;
}
}
}
}
}

} # end destination
} # end nat
71

Table 22: Example: Deterministic-NAPT44

MS Card MX-SPC3

[edit services] [edit services]

service-set sset1 { service-set sset1 {


nat-rules rule-deterministic- nat-rule-sets rule-deterministic-
napt44; napt44;
interface-service { interface-service {
service-interface service-interface vms-2/0/0;
ms-1/2/0; }
} }
}

nat { nat {
source {
72

Table 22: Example: Deterministic-NAPT44 (Continued)

MS Card MX-SPC3

pool src-pool {
address 10.10.10.0/24; pool src-pool {
port { address {
range low 1024 high 10.10.10.0/24;
19999; }
deterministic-port- port {
block-allocation block-size 256; range {
} 1024;
mapping-timeout 120; to {
} 19999;
}
}
deterministic {
block-size 256;
# host address
specifies the subnet that you
# want to apply to
this pool.
host address
10.2.0.0/20;
}
}
mapping-timeout 120;
}
73

Table 22: Example: Deterministic-NAPT44 (Continued)

MS Card MX-SPC3

rule rule-deterministic- rule-set rule-deterministic-


napt44 { napt44 {
match-direction input; match-direction input;
term t1 { rule r1 {
from { match {
source-address { source-address
10.2.0.0/18; 10.2.0.0/18;
} }
} then {
then { source-nat {
translated { pool {
source-pool src-pool;
src-pool; }
translation- mapping-type
type { endpoint-independent;
}
deterministic-napt44; }
} }
mapping-type }
endpoint-independent;
}
}
}
}

} # end nat
} # end source
} # end nat
74

Table 23: Example: Deterministic-NAPT64

MS Card MX-SPC3

[edit services] [edit services]

service-set sset1 { service-set sset1 {


nat-rules rule- nat-rule-sets rule-deterministic-
deterministic-napt64; napt64-src;
interface-service { nat-rule-sets rule-deterministic-
service-interface napt64-dest;
ms-1/2/0; interface-service {
} service-interface vms-2/0/0;
} }
}

nat { nat {
source {
75

Table 23: Example: Deterministic-NAPT64 (Continued)

MS Card MX-SPC3

pool src-pool {
address 10.98.10.0/24; pool src-pool {
port { address {
automatic; 10.98.10.0/24;
random-allocation; }
} port {
deterministic- automatic {
port-block-allocation block- random-allocation;
size 256; }
} deterministic {
} block-size 256;
host address
2001:DB8:1111::1/120;
}
}
}
76

Table 23: Example: Deterministic-NAPT64 (Continued)

MS Card MX-SPC3

rule rule-deterministic- # This source rule applies after the


napt64 { destination rule.
match-direction input; rule-set rule-deterministic-
term t1 { napt64-src {
from { match-direction input;
source- rule r1 {
address { match {
source-address
2001:DB8:1111::1/120; 2001:DB8:1111::1/120;
} # Since destination
} NAT happens first, the destination
then { # address refers to
translated { the NAT’d address.
destination-address
destination-prefix 0.0.0.0/32;
2001:DB8:2222::/96; }
source- then {
pool src-pool; source-nat {
pool {
translation-type { src-pool;
}
deterministic-napt64; }
} }
} }
} }
}
}

} # end nat
} # end source
77

Table 23: Example: Deterministic-NAPT64 (Continued)

MS Card MX-SPC3

destination {

pool dest-pool {
address {
10.99.10.2/32;
}
}

# This destination rule applies


before the source rule.
rule-set rule-destination-napt64-
dest {
match-direction input;
rule r1 {
match {
destination-address
2001:DB8:2222::/96;
}
then {
destination-nat {
destination-
prefix 2001:DB8:2222::/96;
}
}
}
}
78

Table 23: Example: Deterministic-NAPT64 (Continued)

MS Card MX-SPC3

} # end destination
} # end nat

Table 24: Example: napt-pt

MS Card MX-SPC3

[edit services] [edit services]

service-set sset1 { service-set sset1 {


nat-rules rule-napt-pt; nat-rule-sets rule-napt-pt-src;
interface-service { nat-rule-sets rule-napt-pt-dest;
service-interface interface-service {
ms-1/2/0; service-interface vms-2/0/0;
} }
} }

nat { nat {
source {
79

Table 24: Example: napt-pt (Continued)

MS Card MX-SPC3

pool src-pool {
address 10.10.10.2/32; pool src-pool {
} address {
pool dest-pool { 10.10.10.2/32;
address 10.99.10.2/32; }
} }
80

Table 24: Example: napt-pt (Continued)

MS Card MX-SPC3

rule rule-napt-pt { rule-set rule-napt-pt-src {


match-direction input; match-direction input;
term t1 { rule r1 {
from { match {
source-address { source-address
2001:DB8:1111::2/128;
2001:DB8:1111::2/128; destination-address
} 10.99.10.0/24;
destination- }
address { then {
source-nat {
2001:DB8:2222::2/128; pool {
} src-pool;
} }
then { }
translated { }
source-pool }
src-pool; }
destination-
pool dest-pool;
translation-
type {
napt-pt;
}
}
}
}
}

} # end nat
} # end source
81

Table 24: Example: napt-pt (Continued)

MS Card MX-SPC3

destination {

pool dest-pool {
address {
10.99.10.2/32;
}
}

rule-set rule-napt-pt-dest {
match-direction input;
rule r1 {
match {
destination-address
2001:DB8:2222::2/128;
}
then {
destination-nat {
pool {
dest-pool;
}
}
}
}
}
82

Table 24: Example: napt-pt (Continued)

MS Card MX-SPC3

} # end destination
} # end nat

Intrusion Detection System (IDS)


IDS rules for Next Gen Services on the MX-SPC3 are defined under the screen branch. There are minor
differences in the naming of the various elements, but the main change is in the behavior for detecting
packets with IPv4 options and IPv6 extensions:

• For the IDS service on the MS Card, the default behavior is to detect and drop packets with IPv4
options and IPv6 extensions. If you want to allow these packets, you have to allow them explicitly
through configuration.

• For the IDS Next Gen Service on the MX-SPC3, the default behavior is to allow packets with IPv4
options and IPv6 extensions. If you want to detect and drop these packets, you have to disallow
them explicitly through configuration.

Table 25 on page 82 shows examples of the configuration differences.

Table 25: IDS Rules

MS Card MX-SPC3

[edit services] [edit services]


service-set sset1 { service-set sset1 {
ids-rules r1; # Replace ids-rules with
ids-rules r2; ids-option.
} ids-option ids1;
ids-option ids2;
}
83

Table 25: IDS Rules (Continued)

MS Card MX-SPC3

[edit services] [edit services]


ids { # Define ids rules under the
rule r1 { screen branch.
match-direction input; screen {
term t1 { # Replace rule with ids-
<...> option.
} ids-option ids1 {
} match-direction input;
} # Flatten hierarchy by
removing term and placing
# contents directly
under ids-option.
<...>
}
}

[edit services] [edit services]


ids { screen {
rule r1 { ids-option ids1 {
match-direction input; match-direction input;
term t1 { # By default, all ip
then { options are allowed.
allow-ip-options }
[ loose-source-route route-record }
router-alert security stream-id strict-
source-route timestamp ];
}
}
}
}
84

Table 25: IDS Rules (Continued)

MS Card MX-SPC3

[edit services] [edit services]


ids { screen {
rule r1 { ids-option ids1 {
match-direction input; match-direction input;
term t1 { # Explicitly specify
then { the disallowed options.
<no allow-ip-options ip {
configured> loose-source-route-
} option;
} record-route-option;
} security-option;
} stream-option;
strict-source-route-
option;
timestamp-option;
# router-alert
option for IPv4 is not
supported.
}
}
}
85

Table 25: IDS Rules (Continued)

MS Card MX-SPC3

[edit services] [edit services]


ids { screen {
rule r1 { ids-option ids1 {
match-direction input; match-direction input;
term t1 { # By default, all ipv6
then { extensions are allowed.
allow-ipv6-extension- }
header [ ah dstopts esp fragment hop- }
by-hop mobility routing ];
}
}
}
}
86

Table 25: IDS Rules (Continued)

MS Card MX-SPC3

[edit services] [edit services]


ids { screen {
rule r1 { ids-option ids1 {
match-direction input; match-direction input;
term t1 { ip {
then { # Explicitly
<no allow-ipv6- specify the disallowed
extension-header configured> extensions.
} ipv6-extension-
} header {
} AH-header;
} ESP-header;
fragment-header;
hop-by-hop-
header;
mobility-header;
routing-header;
# dstoptions is
not supported.
}
}
}
}
87

Table 25: IDS Rules (Continued)

MS Card MX-SPC3

[edit services] [edit services]


ids { screen {
rule r1 { ids-option ids1 {
match-direction input; match-direction input;
term t1 { aggregation {
then { source-prefix-mask
aggregation { 24;
source-prefix 24; destination-prefix-
destination-prefix mask 24;
24; source-prefix-v6-
source-prefix-ipv6 mask 64;
64; destination-prefix-
destination-prefix- v6-mask 64;
ipv6 64; }
} }
} }
}
}
}

[edit services] [edit services]


ids { screen {
rule r1 { ids-option ids1 {
match-direction input; match-direction input;
term t1 { # Group icmp checks
then { under icmp.
icmp-fragment-check; icmp {
icmp-large-packet- fragment;
check; large;
} }
} }
} }
}
88

Table 25: IDS Rules (Continued)

MS Card MX-SPC3

[edit services] [edit services]


ids { screen {
rule r1 { ids-option ids1 {
match-direction input; match-direction input;
term t1 { # Group tcp checks
then { under tcp.
land-attack-check; tcp {
tcp-winnuke-check; land;
tcp-syn-fragment-check; winnuke;
tcp-syn-defense; syn-frag;
} # tcp-syn-defense
} is not supported.
} }
} }
}
89

Table 25: IDS Rules (Continued)

MS Card MX-SPC3

[edit services] [edit services]


ids { screen {
rule r1 { ids-option ids1 {
match-direction input; match-direction input;
term t1 { limit-session {
then { by-source {
session-limit { maximum-
by-source { sessions 100;
maximum 100; session-rate 10;
rate 10; packet-rate 1k;
packets 1k; }
} by-destination {
by-destination { maximum-
maximum 100; sessions 100;
rate 10; session-rate 10;
packets 1k; packet-rate 1k;
} }
} }
} }
} }
}
}
90

Table 25: IDS Rules (Continued)

MS Card MX-SPC3

[edit services] [edit services]


ids { screen {
rule r1 { ids-option ids1 {
match-direction input; match-direction input;
term t1 { limit-session {
then { by-source {
session-limit { by-protocol {
by-source { tcp {
by-protocol { maximum-
tcp { sessions 100;
session-
maximum 100; rate 10;
rate packet-
10; rate 1k;
}
packets 1k; udp {
} maximum-
udp { sessions 100;
session-
maximum 100; rate 10;
rate packet-
10; rate 1k;
}
packets 1k; icmp {
} maximum-
icmp { sessions 100;
session-
maximum 100; rate 10;
rate packet-
10; rate 1k;
}
packets 1k; }
} }
} }
} }
} }
}
91

Table 25: IDS Rules (Continued)

MS Card MX-SPC3

}
}
92

Table 25: IDS Rules (Continued)

MS Card MX-SPC3

[edit services] [edit services]


ids { screen {
rule r1 { ids-option ids1 {
match-direction input; match-direction input;
term t1 { limit-session {
then { by-destination {
session-limit { by-protocol {
by-destination { tcp {
by-protocol { maximum-
tcp { sessions 100;
session-
maximum 100; rate 10;
rate packet-
10; rate 1k;
}
packets 1k; udp {
} maximum-
udp { sessions 100;
session-
maximum 100; rate 10;
rate packet-
10; rate 1k;
}
packets 1k; icmp {
} maximum-
icmp { sessions 100;
session-
maximum 100; rate 10;
rate packet-
10; rate 1k;
}
packets 1k; }
} }
} }
} }
} }
}
93

Table 25: IDS Rules (Continued)

MS Card MX-SPC3

}
}

Migrate from the MS Card to the MX-SPC3


Use this procedure to configure a router to support Next Gen Services.

You typically use this procedure to migrate a router supporting legacy services on the MS card to a
router supporting Next Gen Services on the MX-SPC3, but this procedure applies even if the router that
you are migrating from does not contain MS card cards.

Because Next Gen Services configuration is not compatible with legacy service provisioning, migrating a
router to support Next Gen Services on the MX-SPC3 requires you to completely deprovision and
reprovision your router . Furthermore:

• You cannot install an MX-SPC3 card in a router that has MS cards.

• You cannot configure Next Gen Services on a router equipped with MS cards.

• You cannot configure legacy services on a router equipped with MX-SPC3 cards.

In other words, a router can run with either MS cards or MX-SPC3 cards but not both at the same time.

NOTE: This procedure is service affecting. You are setting the router to factory default
configuration.

1. Upgrade the router to release 19.3R2.


2. Back up the current router configuration to a remote host.
3. Set the router to factory default configuration.

a. Load the router with the factory default configuration:

root# load factory-default


94

b. Configure the management interface with the same IP address as you had before you loaded the
factory default configuration:

root# set interfaces fxp0 unit 0 family inet address <mgt-ip-address>

c. Configure SSH so that you can continue to access the router. For example:

root# set system services ssh root-login allow


root# set system services ssh max-sessions-per-connection 32
root# set system root-authentication plain-text-password
New password:
Retype new password:

d. Commit the changes.


4. Enable Next Gen Services on the router.
Junos OS provides a system-wide operational parameter that you enable if you want to configure
Next Gen Services on a router. By default, this parameter is not enabled.

From operational mode:

root> request system enable unified-services


Before enabling unified services, please move to baseline configuration.
Are above conditions satisfied ? [yes,no]

NOTE: This setting is persistent and survives a reboot.

5. Reboot the router.

root> request system reboot

6. Replace the MS card cards with MX-SPC3 cards.


7. Reprovision your router.
As a starting point, you can restore the backup from step "2" on page 93 but you might need to
change this configuration to be compatible with Next Gen Services before you can commit.
95

SEE ALSO

Next Gen Services Overview | 2


Enabling and Disabling Next Gen Services | 121

Next Gen Services Feature Configuration Overview

IN THIS SECTION

Service Rules and Rule Sets | 95

Service Sets | 95

Services Interfaces | 96

To configure services with Next Gen Services, you need to configure the following objects:

• Service rules

• Service sets

• Services interfaces

Service Rules and Rule Sets

Service rules specify a set of matching conditions and a set of actions to apply to traffic when it matches
the conditions. For example, a stateful firewall rule can specify a destination address that must be
matched, and take the action of dropping packets that have that destination address.

Service rule sets consist of a group of services rules that belong to the same category. For example, a
stateful firewall rule set consists of stateful firewall rules.

Service Sets

A service set specifies one or more service rules or rule sets to apply to traffic. The service set also
specifies a services interface, which indicates where the services processing is performed.

A service set is either an interface-style service set or a next-hop-style service set.


96

Interface-Style Service Set

The service set applies the service rules to all traffic that flows through a particular interface.

Next-Hop-Style Service Set

The service set applies the service rules to traffic that is destined for a particular next hop. You must
redirect the next-hop traffic to the services interface that the service set uses.

Services Interfaces

A services interface indicates where a service is applied to traffic. Services interfaces are not physical
links to external devices.

If a service is performed on an MX-SPC3 services card, the service interface has the format:

vms-slot-number/pic-number/port-number

If a service is performed on a line card’s PFE (inline services), the service interface has the format si-slot-
number/pic-number/0.

RELATED DOCUMENTATION

Next Gen Services Overview | 2


How to Configure Services Interfaces for Next Gen Services | 96
Configuration Differences Between Adaptive Services and Next Gen Services on the MX-SPC3 | 16

How to Configure Services Interfaces for Next Gen Services

To configure services interfaces:

1. Configure the services interface name.

[edit]
user@host# set interfaces interface-name

Where the interface-name one of the following:


97

• vms-slot-number/pic-number/port-number for an MX-SPC3 services card

• si-slot-number/pic-number/0 for a line card PFE (inline services interface)


2. Configure the unit and family for the interface.

a. If you are using the services interface in an interface service set:

[edit]
user@host# set interfaces interface-name unit logical-unit-number family (inet | inet6)

b. If you are using the services interface in a next-hop service set, configure inside and outside
interface units:

[edit]
user@host# set interfaces interface-name unit logical-unit-number family (inet | inet6)
user@host# set interfaces interface-name unit logical-unit-number service-domain inside
user@host# set interfaces interface-name unit logical-unit-number family (inet | inet6)
user@host# set interfaces interface-name unit logical-unit-number service-domain outside

For example:

[edit]
user@host# set interfaces vms-1/0/0 unit 100 family inet
user@host# set interfaces vms-1/0/0 unit 100 service-domain inside
user@host# set interfaces vms-1/0/0 unit 1000 family inet
user@host# set interfaces vms-1/0/0 unit 1000 service-domain outside

3. When neither NAT nor the max-sessions-per-subscriber statement at the [edit service-set service-
set-name service-set-options] hierarchy level are configured, enable the creation of subscribers if
you want to track subscribers.

[edit interfaces interface-name services-options]


user@host# set enable-subscriber-analysis

4. Configure CPU resource restrictions for the services interface.

[edit interfaces interface-name services-options session-limit]


user@host# set cpu-load-threshold percentage
98

When the CPU usage exceeds the value (percentage of the total available CPU resources), the system
reduces the rate of new sessions so that the existing sessions are not affected by low CPU
availability. The CPU utilization is constantly monitored, and if the CPU usage remains above the
configured cpu-load-threshold value for a continuous period of 5 seconds, Junos OS reduces the
session rate value configured at edit interfaces interface-name services-options session-limit
rate by 10%. This is repeated until the CPU utilization comes down to the configured limit.

5. Configure the maximum number of sessions allowed simultaneously on a services card.

[edit interfaces interface-name services-options session-limit]


user@host# set maximum number

If you specify the maximum number of sessions to be zero, it indicates that the configuration is not
effective. You must specify a value higher than zero for the maximum number of sessions.
6. Configure the maximum number of new sessions allowed per second on a services card.

[edit interfaces interface-name services-options session-limit]


user@host# set rate rate

RELATED DOCUMENTATION

Next Gen Services Overview | 2


How to Configure Next-Hop Style Service Sets for Next Gen Services | 100
How to Configure Service Set Limits for Next Gen Services | 101
Configuration Differences Between Adaptive Services and Next Gen Services on the MX-SPC3 | 16

How to Configure Interface-Style Service Sets for Next Gen Services

To configure an interface service set:

1. Configure the service set name.

[edit services]
user@host# edit service-set service-set-name
99

2. Specify the service interface that the service set uses to apply services.

[edit services service-set service-set-name]


user@host# set interface-service service-interface interface-name

3. Specify the service rules that the service set applies to traffic.
For example:

[edit services service-set ss1]


user@host# set nat-rule-sets internal-nat

4. (Optional) Enable the service set to process unidirectional traffic.

[edit services service-set service-set-name service-set-options]


user@host# set enable-asymmetric-traffic-processing

5. Enable service-processing at routing engine (RE).

[edit services service-set service-set-name service-set-options]


user@host# set routing-engine-services

6. Apply the service set to an interface that is passing traffic. You can apply a service filter to apply the
service set to only certain traffic on the interface.

[edit interfaces interface-name unit logical-unit-number family (inet |


inet6) service]
user@host# set (input | output) service-set service-set-name <service-filter filter-name>

For details about configuring the service-filter, see Guidelines for Configuring Service Filters.

The input option applies the service set to the input side of the interface, and the output option
applies the service set to the output side of the interface. If you are using a bidirectional service rule
in the service set, then the same service set must be used for input and output.

RELATED DOCUMENTATION

Next Gen Services Overview | 2


How to Configure Interface-Style Service Sets for Next Gen Services | 98
100

How to Configure Service Set Limits for Next Gen Services | 101
Configuration Differences Between Adaptive Services and Next Gen Services on the MX-SPC3 | 16

How to Configure Next-Hop Style Service Sets for Next Gen Services

To configure a next-hop service set:

1. Configure the service set name.

[edit services]
user@host# edit service-set service-set-name

2. Specify the services interface inside unit and outside unit for the service set.

[edit services service-set service-set-name]


user@host# set next-hop-service inside-service-interface interface-name.unit-number outside-service-
interface interface-name.unit-number

The inside-service-interface must be a service interface logical unit that is configured with service-
domain inside The outside-service-interface must be a service interface logical unit that is configured
with service-domain outside.

3. Specify the service rules that the service set applies to traffic.
For example:

[edit services service-set SS1]


user@host# set nat-rule-sets internal-nat

4. (Optional) Enable the service set to process unidirectional traffic.

[edit services service-set service-set-name service-set-options]


user@host# set enable-asymmetric-traffic-processing

5. Configure a static route to force traffic to the inside or outside interface of the next-hop service set.
101

For example, if you want traffic with the destination 198.51.100.33 to be processed by the service
set with the inside interface vms-1/0/0.100:

[edit routing-options]
user@host# set static route 198.51.100.33 next-hop vms-1/0/0.100

RELATED DOCUMENTATION

Next Gen Services Overview | 2


How to Configure Interface-Style Service Sets for Next Gen Services | 98
How to Configure Service Set Limits for Next Gen Services | 101
Configuration Differences Between Adaptive Services and Next Gen Services on the MX-SPC3 | 16

How to Configure Service Set Limits for Next Gen Services

To configure service set limits:

1. Set the maximum number of session setups allowed per second for the service set. After this setup
rate is reached, any additional session setup attempts are dropped. If you do not include the max-
session-creation-rate statement, the session setup rate is not limited.

[edit services service-set service-set-name ]


user@host# set max-session-setup-rate (number | numberk)

If you use the numberk format, 1k=1000.


2. Enable packets to bypass without creating a new session when the flow in the service set exceeds
the limit that is set by the max-flows statement at the [edit services service-set service-set-name]
hierarchy level.

[edit services service-set service-set-name service-set-options]


user@host# bypass-traffic-on-exceeding-flow-limits
102

3. To limit the session open information in you system logs, you can disable it from being collected.

[edit services service-set service-set-name service-set-options]


user@host# set disable-session-open-syslog

4. Configure the maximum number of sessions allowed from a single subscriber.

[edit services service-set service-set-name service-set-options]


user@host# set max-sessions-per-subscriber session-number

5. Specify the maximum number of sessions allowed simultaneously on the service set. If you specify
the maximum number of sessions to be zero, it indicates that the configuration is not effective. You
must specify a value higher than zero for the maximum number of sessions.

[edit services service-set service-set-name service-set-options]


user@host# set session-limit maximum number

6. Configure the session lifetime for the service set in seconds. The session is closed after this amount
of time, even if traffic is running on the session.

[edit services service-set service-set-name service-set-options]


user@host# set session-timeout seconds

7. Specify the inactivity timeout period for non-TCP established sessions.

user@host# set inactivity-non-tcp-timeout seconds

8. Configure the TCP session parameters for the service-set.

a. Set the timeout period for the Transmission Control Protocol (TCP) session tear-down.

[edit services service-set-name services-options]


user@host# set close-timout seconds

The default value is 1 second. The range is 2 through 300 seconds.


103

b. Configure the inactivity timeout period for asymmetric TCP established sessions

[edit services service-set service-set-name service-set-options tcp-


session]
user@host# set inactivity-asymm-tcp-timeout seconds

c. Configure the number of seconds that a unidirectional TCP session can be inactive before it is
closed.

[edit services service-set service-set-name service-set-options tcp-


session]
user@host# set inactivity-tcp-timeout seconds

The default value is 30 seconds. The range is 4 through 86,400 seconds. Any value you configure
in the application protocol definition overrides the value specified here; for more information, see
"Configuring Application Properties for Next Gen Services" on page 524.

d. Set the timeout period for Transmission Control Protocol (TCP) session establishment, for use
with SYN-cookie defenses against network intrusion.

[edit services service-set-name service-set-options ]


user@host# set open-timeout seconds

The default value is 5 seconds. The range of possible values is from 4 through 224 seconds. Any
value you configure in the intrusion detection service (IDS) definition overrides the value specified
here; for more information, see "Configuring Network Attack Protection With IDS Screens for
Next Gen Services" on page 349.

RELATED DOCUMENTATION

Next Gen Services Overview | 2


How to Configure Interface-Style Service Sets for Next Gen Services | 98
Next Gen Services Feature Configuration Overview | 95
Configuration Differences Between Adaptive Services and Next Gen Services on the MX-SPC3 | 16
104

Example: Next Gen Services Inter-Chassis Stateful High Availability for


NAT and Stateful Firewall (MX-SPC3)

IN THIS SECTION

Requirements | 104

Overview | 104

Configuration | 104

This example shows how to configure Next Gen Services inter-chassis high availability for stateful
firewall and NAT services.

Requirements
This example uses the following hardware and software components:

• Two MX480 routers with MX-SPC3 services cards

• Junos OS Release 19.3R2, 19.4R1 or later

Overview
Two MX 3D routers are identically configured to facilitate stateful failover for firewall and NAT services
in case of a chassis failure.

Configuration

IN THIS SECTION

CLI Quick Configuration | 105

Configuring Interfaces for Chassis 1. | 107

Configure Routing Information for Chassis 1 | 109

Configuring NAT and Stateful Firewall for Chassis 1 | 110

Configuring the Service Set | 112

Configuring Interfaces for Chassis 2 | 113

Configure Routing Information for Chassis 2 | 115


105

To configure inter-chassis high availability for this example, perform these tasks:

CLI Quick Configuration

To quickly configure this example on the routers, copy the following commands and paste them into the
router terminal window after removing line breaks and substituting interface information specific to
your site.

NOTE: The following configuration is for chassis 1.

[edit]
set interfaces vms-4/0/0 redundancy-options redundancy-peer ipaddress 5.5.5.2
set interfaces vms-4/0/0 redundancy-options routing-instance HA
set interfaces vms-4/0/0 unit 10 ip-address-owner service-plane
set interfaces vms-4/0/0 unit 10 family inet address 5.5.5.1/32
set interfaces vms-4/0/0 unit 20 family inet
set interfaces vms-4/0/0 unit 20 service-domain inside
set interfaces vms-4/0/0 unit 30 family inet
set interfaces vms-4/0/0 unit 30 service-domain outside
set interfaces ge-2/0/0 vlan-tagging
set interfaces ge-2/0/0 unit 0 vlan-id 100 family inet address 20.1.1.1/24
set routing-instances HA instance-type vrf
set routing-instances HA interface ge-2/0/0.0
set routing-instances HA interface vms-4/0/0.10
set routing-instances HA route-distinguisher 1:1
set policy-options policy-statement dummy term 1 then reject
set routing-instances HA vrf-import dummy
set routing-instances HA vrf-export dummy
set routing-instances HA routing-options static route route 5.5.5.1/32 next-hop vms-4/0/0.10
set routing-instances HA routing-options static route route 5.5.5.2/32 next-hop 20.1.1.2
set services nat pool p2 address 32.0.0.0/24
set services nat pool p2 port automatic random-allocation
set services nat pool p2 address-allocation round-robin
set services nat rule r2 match-direction input
set services nat rule r2 term t1 from source-address 129.0.0.0/8
set services nat rule r2 term t1 from source-address 128.0.0.0/8
set services nat rule r2 term t1 then translated source-pool p2
set services nat rule r2 term t1 then translated translation-type napt-44
set services nat rule r2 term t1 then translated address-pooling paired
106

set services nat rule r2 term t1 then syslog


set services stateful-firewall rule r2 match-direction input
set services stateful-firewall rule r2 term t1 from source-address any-unicast
set services stateful-firewall rule r2 term t1 then accept
set services stateful-firewall rule r2 term t1 then syslog
set services service-set ss2 replicate-services replication-threshold 180
set services service-set ss2 replicate-services stateful-firewall
set services service-set ss2 replicate-services nat
set services service-set ss2 stateful-firewall-rules r2
set services service-set ss2 nat-rules r2
set services service-set ss2 next-hop-service inside-service-interface vms-4/0/0.20
set services service-set ss2 next-hop-service outside-service-interface vms-4/0/0.30
set services service-set ss2 syslog host local class session-logs
set services service-set ss2 syslog host local class stateful-firewall-logs
set services service-set ss2 syslog host local class nat-logs

NOTE: The following configuration is for chassis 2. The NAT, stateful firewall, and service-set
information must be identical for chassis 1 and 2.

set interfaces vms-4/0/0 redundancy-options routing-instance HA


set interfaces vms-4/0/0 unit 10 ip-address-owner service-plane
set interfaces vms-4/0/0 unit 10 family inet address 5.5.5.2/32
set interfaces vms-4/0/0 unit 20 family inet
set interfaces vms-4/0/0 unit 20 service-domain inside
set interfaces vms-4/0/0 unit 30 family inet
set interfaces vms-4/0/0 unit 30 service-domain outside
set interfaces ge-2/0/0 vlan-tagging
set interfaces ge-2/0/0 unit 0 vlan-id 100 family inet address 20.1.1.2/24
set routing-instances HA instance-type vrf
set routing-instances HA interface ge-2/0/0.0
set routing-instances HA interface vms-4/0/0.10
set routing-instances HA route-distinguisher 1:1
set routing-instances HA vrf-import dummy
set routing-instances HA vrf-export dummy
set routing-instances HA routing-options static route 5.5.5.2/32 next-hop vms-4/0/0.10
set routing-instances HA routing-options static route 5.5.5.1/32 next-hop 20.1.1.1
set services nat pool p2 address 32.0.0.0/24
set services nat pool p2 port automatic random-allocation
107

set services nat pool p2 address-allocation round-robin


set services nat rule r2 match-direction input
set services nat rule r2 term t1 from source-address 129.0.0.0/8
set services nat rule r2 term t1 from source-address 128.0.0.0/8
set services nat rule r2 term t1 then translated source-pool p2
set services nat rule r2 term t1 then translated translation-type napt-44
set services nat rule r2 term t1 then translated address-pooling paired
set services nat rule r2 term t1 then syslog
set services stateful-firewall rule r2 match-direction input
set services stateful-firewall rule r2 term t1 from source-address any-unicast
set services stateful-firewall rule r2 term t1 then accept
set services stateful-firewall rule r2 term t1 then syslog
set services service-set ss2 replicate-services replication-threshold 180
set services service-set ss2 replicate-services stateful-firewall
set services service-set ss2 replicate-services nat
set services service-set ss2 stateful-firewall-rules r2
set services service-set ss2 nat-rules r2
set services service-set ss2 next-hop-service inside-service-interface vms-4/0/0.20
set services service-set ss2 next-hop-service outside-service-interface vms-4/0/0.30
set services service-set ss2 syslog host local class session-logs
set services service-set ss2 syslog host local class stateful-firewall-logs
set services service-set ss2 syslog host local class nat-logs

Configuring Interfaces for Chassis 1.

Step-by-Step Procedure

The interfaces for each of the HA pair of routers are configured identically with the exception of the
following service PIC options:

• redundancy-options redundancy-peer ipaddress address

• unit unit-number family inet address address of a unit, other than 0, that contains the ip-address-
owner service-plane option

To configure interfaces:

1. Configure the redundant service PIC on chassis 1.

[edit interfaces}
user@host# set interfaces vms-4/0/0 redundancy-options redundancy-peer ipaddress 5.5.5.2
108

user@host# set interfaces vms-4/0/0 redundancy-options routing-instance HA


user@host# set interfaces vms-4/0/0 unit 10 ip-address-owner service-plane
user@host# set interfaces vms-4/0/0 unit 10 family inet address 5.5.5.1/32
user@host# set interfaces vms-4/0/0 unit 20 family inet
user@host# set interfaces vms-4/0/0 unit 20 service-domain inside
user@host# set interfaces vms-4/0/0 unit 30 family inet
user@host# set interfaces vms-4/0/0 unit 30 service-domain outside

2. Configure the interfaces for chassis 1 that are used as interchassis links for synchronization traffic.

user@host# set interfaces ge-2/0/0 vlan-tagging


user@host# set interfaces ge-2/0/0 unit 0 vlan-id 100 family inet address 20.1.1.1/24

3. Configure remaining interfaces as needed.

Results

user@host# show interfaces


ge-2/0/0 {
vlan-tagging;
unit 0 {
vlan-id 100;
family inet {
address 20.1.1.1/24;
}
}
}
vms-4/0/0 {
redundancy-options {
redundancy-peer {
ipaddress 5.5.5.2;
}
routing-instance HA;
}
unit 10 {
ip-address-owner service-plane;
family inet {
address 5.5.5.1/32;
}
}
109

unit 20 {
family inet;
family inet6;
service-domain inside;
}
unit 30 {
family inet;
family inet6;
service-domain outside;
}
}
}

Configure Routing Information for Chassis 1

Step-by-Step Procedure

Detailed routing configuration is not included for this example. A routing instance is required for the HA
synchronization traffic between the chassis as follows:

• Configure routing instances for Chassis 1.

user@host# set routing-instances HA instance-type vrf


user@host# set routing-instances HA interface ge-2/0/0.0
user@host# set routing-instances HA interface vms-4/0/0.10
user@host# set routing-instances HA route-distinguisher 1:1
user@host# set policy-options policy-statement dummy term 1 then reject
user@host# set routing-instances HA vrf-import dummy
user@host# set routing-instances HA vrf-export dummy
user@host# set routing-instances HA routing-options static route route 5.5.5.1/32 next-hop
vms-4/0/0.10
user@host# set routing-instances HA routing-options static route route 5.5.5.2/32 next-hop 20.1.1.2

Results

user@host# show routing-instances


HA {
instance-type vrf;
interface ge-2/0/0.0;
110

interface vms-4/0/0.10;
route-distinguisher 1:1;
vrf-import dummy;
vrf-export dummy;
routing-options {
static {
route 5.5.5.1/32 next-hop vms-4/0/0.10;
route 5.5.5.2/32 next-hop 20.1.1.2;
}
}
}

Configuring NAT and Stateful Firewall for Chassis 1

Step-by-Step Procedure

Configure NAT and stateful firewall identically on both routers. To configure NAT and stateful firewall:

1. Configure NAT as needed.

user@host# set services nat pool p2 address 32.0.0.0/24


user@host# set services nat pool p2 port automatic random-allocation
user@host# set services nat pool p2 address-allocation round-robin
user@host# set services nat rule r2 match-direction input
user@host# set services nat rule r2 term t1 from source-address 129.0.0.0/8
user@host# set services nat rule r2 term t1 from source-address 128.0.0.0/8
user@host# set services nat rule r2 term t1 then translated source-pool p2
user@host# set services nat rule r2 term t1 then translated translation-type napt-44
user@host# set services nat rule r2 term t1 then translated address-pooling paired
user@host# set services nat rule r2 term t1 then syslog

2. Configure stateful firewall as needed.

user@host# set services stateful-firewall rule r2 match-direction input


user@host# set services stateful-firewall rule r2 term t1 from source-address any-unicast
user@host# set services stateful-firewall rule r2 term t1 then accept
user@host# set services stateful-firewall rule r2 term t1 then syslog
111

Results

user@host# show services nat


nat {
pool p2 {
address 32.0.0.0/24;
port {
automatic {
random-allocation;
}
}
address-allocation round-robin;
}
rule r2 {
match-direction input;
term t1 {
from {
source-address {
129.0.0.0/8;
128.0.0.0/8;
}
}
then {
translated {
source-pool p2;
translation-type {
napt-44;
}
address-pooling paired;
}
syslog;
}
}
}
}
}

user@host show services stateful-firewell


rule r2 {
match-direction input;
112

term t1 {
from {
source-address {
any-unicast;
}
}
then {
accept;
syslog;
}
}
}

Configuring the Service Set

Step-by-Step Procedure

Configure the the service set identically on both routers. To configure the service set:

1. Configure the service set replication options.

user@host# set services service-set ss2 replicate-services replication-threshold 180


user@host# set services service-set ss2 replicate-services stateful-firewall
user@host# set services service-set ss2 replicate-services nat

2. Configure references to NAT and stateful firewall rules for the service set.

user@host# set services service-set ss2 stateful-firewall-rules r2


user@host# set services service-set ss2 nat-rules r2

3. Configure next-hop service interface on the vms-PIC.

user@host# set services service-set ss2 next-hop-service inside-service-interface vms-4/0/0.20


user@host# set services service-set ss2 next-hop-service outside-service-interface vms-4/0/0.30
113

4. Configure desired logging options.

user@host# set services service-set ss2 syslog host local class session-logs
user@host# set services service-set ss2 syslog host local class stateful-firewall-logs
user@host# set services service-set ss2 syslog host local class nat-logs

Results

user@host# show services service-set ss2


syslog {
host local {
class {
session-logs;
inactive: stateful-firewall-logs;
nat-logs;
}
}
}
replicate-services {
replication-threshold 180;
stateful-firewall;
nat;
}
stateful-firewall-rules r2;
inactive: nat-rules r2;
next-hop-service {
inside-service-interface vms-3/0/0.20;
outside-service-interface vms-3/0/0.30;
}
}

Configuring Interfaces for Chassis 2

Step-by-Step Procedure

The interfaces for each of the HA pair of routers are configured identically with the exception of the
following service PIC options:

• redundancy-options redundancy-peer ipaddress address


114

• unit unit-number family inet address address of a unit, other than 0, that contains the ip-address-
owner service-plane option

1. Configure the redundant service PIC on chassis 2.

The redundancy-peer ipaddress points to the address of the unit (unit 10) on vms-4/0/0 on chassis
on chassis 1 that contains the ip-address-owner service-plane statement.

[edit interfaces}
set interfaces vms-4/0/0 redundancy-options redundancy-peer ipaddress 5.5.5.1
user@host# set interfaces vms-4/0/0 redundancy-options routing-instance HA
user@host# set interfaces vms-4/0/0 unit 10 ip-address-owner service-plane
user@host# set interfaces vms-4/0/0 unit 10 family inet address 5.5.5.2/32
user@host# set interfaces vms-4/0/0 unit 20 family inet
user@host# set interfaces vms-4/0/0 unit 20 service-domain inside
user@host# set interfaces vms-4/0/0 unit 30 family inet
user@host# set interfaces vms-4/0/0 unit 30 service-domain outside

2. Configure the interfaces for chassis 2 that are used as interchassis links for synchronization traffic

user@host# set interfaces ge-2/0/0 vlan-tagging


user@host# set interfaces ge-2/0/0 unit 0 vlan-id 100 family inet address 20.1.1.2/24

3. Configure remaining interfaces for chassis 2 as needed.

Results

user@host# show interfaces


vms-4/0/0 {
redundancy-options {
redundancy-peer {
ipaddress 5.5.5.1;
}
routing-instance HA;
}
unit 0 {
family inet;
}
unit 10 {
ip-address-owner service-plane;
115

family inet {
address 5.5.5.2/32;
}
}
ge-2/0/0 {
vlan-tagging;
unit 0 {
vlan-id 100;
family inet {
address 20.1.1.2/24;
}
}
unit 10 {
vlan-id 10;
family inet {
address 2.10.1.2/24;
}

Configure Routing Information for Chassis 2

Step-by-Step Procedure

Detailed routing configuration is not included for this example. A routing instance is required for the HA
synchronization traffic between the two chassis and is included here.

• Configure routing instances for chassis 2.

user@host# set routing-instances HA instance-type vrf


user@host# set routing-instances HA interface ge-2/0/0.0
user@host# set routing-instances HA interface vms-4/0/0.10
user@host# set routing-instances HA route-distinguisher 1:1
user@host# set policy-options policy-statement dummy term 1 then reject
user@host# set routing-instances HA vrf-import dummy
user@host# set routing-instances HA vrf-export dummy
user@host# set routing-instances HA routing-options static route 5.5.5.2/32 next-hop vms-4/0/0.10
user@host# set routing-instances HA routing-options static route 5.5.5.1/32 next-hop 20.1.1.1

NOTE: The following configuration steps are identical to the steps shown for chassis 1.
116

• Configuring NAT and Stateful Firewall

• Configuring the Service Set

Results

user@host# show services routing-instances


HA {
instance-type vrf;
interface xe-2/2/0.0;
interface vms-4/0/0.10;
route-distinguisher 1:1;
vrf-import dummy;
vrf-export dummy;
routing-options {
static {
route 5.5.5.2/32 next-hop vms-4/0/0.10;
route 5.5.5.1/32 next-hop 20.1.1.1;
}
}

Example: Configuring AutoVPN with Pre-Shared Key

SUMMARY IN THIS SECTION

Requirements | 117

Configuration | 117

Configuration | 119

This example shows how to configure different IKE preshared key used by the VPN gateway to
authenticate the remote peer. Similarly, to configure same IKE preshared key used by the VPN gateway
to authenticate the remote peer.
117

Requirements

This example uses the following hardware and software components:

• MX240, MX480, and MX960 with MX-SPC3

• Junos OS Release 21.1R1 that support AutoVPN

Configuration

To configure different IKE preshared key that the VPN gateway uses to authenticate the remote peer,
perform these tasks.

1. Configure the seeded-psk for ike policy in the device with autovpn hub.

[edit]
user@host# set security ike policy IKE_POL seeded-pre-shared-key ascii-text ascii-text

or

user@host# set security ike policy IKE_POL seeded-pre-shared-key hexadecimal hexadecimal

For example:

user@host# set security ike policy IKE_POL seeded-pre-shared-key ascii-text juniper

or

user@host# set security ike policy IKE_POL seeded-pre-shared-key ascii-text 4E4F

2. Generate the pre-shared-key for remote peer using gateway name and user-id.

[edit]
user@host# show security ike pre-shared-key gateway-name gw-name|master key user-id user-id

For example:

user@host# show security ike pre-shared-key gateway-name HUB_GW user-id [email protected]


118

Pre-shared key: "$ABC1223"; ## SECRET-DATA

3. Configure the generated PSK on the ike policy for remote peer device.

[edit]
user@host# set security ike policy IKE_POL pre-shared-key ascii-text generated-psk

For example:

user@host# set security ike policy IKE_POL pre-shared-key ascii-text $ABC1223"; ## SECRET-DATA

Result

From the configuration mode, confirm your configuration by entering the show security command. If the
output does not display the intended configuration, repeat the instructions in this example to correct
the configuration.

[edit]
user@host# show security security {
ike {
traceoptions {
file iked size 10m;
flag all;
level 15;
trace-buffer;
}
proposal IKE_PROP {
authentication-method pre-shared-keys;
dh-group group14;
authentication-algorithm sha-256;
encryption-algorithm aes-256-cbc;
lifetime-seconds 180;
}
policy IKE_POL {
mode aggressive;
proposals IKE_PROP;
pre-shared-key ascii-text "$9$wo2oGk.569pDi9p0BSys24"; ## SECRET-DATA
}
gateway r0r1_GW {
ike-policy IKE_POL;
dynamic {
119

hostname .juniper.net;
ike-user-type group-ike-id;
}
local-identity hostname hub.juniper.net;
external-interface lo0;
local-address 11.0.0.1;
version v1-only;
}
}
}

Configuration

To configure same IKE preshared key that the VPN gateway uses to authenticate the remote peer,
perform these tasks.

1. Configure the common pre-shared-key for ike policy in the device with autovpn hub.

[edit]
user@host# set security ike policy IKE_POL pre-shared-key ascii-text ascii text

For example:

user@host# # set security ike policy IKE_POL pre-shared-key ascii-text juniper

2. onfigure the common pre-shared-key on the ike policy for remote peer device.

[edit]
user@host# set security ike policy IKE_POL pre-shared-key ascii-text ascii text

For example:

user@host# # set security ike policy IKE_POL pre-shared-key ascii-text juniper

Result
120

From the configuration mode, confirm your configuration by entering the show security command. If the
output does not display the intended configuration, repeat the instructions in this example to correct
the configuration.

[edit]
user@host# show security security {
ike {
traceoptions {
file iked size 10m;
flag all;
level 15;
trace-buffer;
}
proposal IKE_PROP {
authentication-method pre-shared-keys;
dh-group group14;
authentication-algorithm sha-256;
encryption-algorithm aes-256-cbc;
lifetime-seconds 180;
}
policy IKE_POL {
mode aggressive;
proposals IKE_PROP;
seeded-pre-shared-key ascii-text "$9$zoDln9pIEyWLN0BLNdboaFn/
C0BRhSeM8"; ## SECRET-DATA
}
gateway r0r1_GW {
ike-policy IKE_POL;
dynamic {
hostname .juniper.net;
ike-user-type group-ike-id;
}
local-identity hostname hub.juniper.net;
external-interface lo0.0;
local-address 11.0.0.1;
version v1-only;
}
}
121

Enabling and Disabling Next Gen Services

IN THIS SECTION

Loading the Software Images on RE-S-X6-64G-UB | 121

Enabling Next Gen Services on an MX Series Router | 122

Disabling Next Gen Services on an MX Series Router | 123

Determining Whether Next Gen Services is Enabled on an MX Series Router | 123

To use Next Gen Services, you must first enable it on the MX Series router. This topic describes how to
enable Next Gen Services, how to disable Next Gen Services, and how to determine whether Next Gen
Services is enabled or disabled on your system.

Loading the Software Images on RE-S-X6-64G-UB


The Next-Gen Services MX-SPC3 services card can exhibit inconsistent behavior when the vmhost
image is installed on the Next-Generation Routing Engine: RE-S-X6-64G-UB (NG-RE).

This behavior can result in you encountering one of the following:

• The MX-SPC3 card remains in Present state and does not come online

• The MX-SPC3 comes online successfully with different a software image (either a previously installed
image or the pre-loaded image from manufacturing)

To work around this problem, you must install the jpfe-spc3* package manually on the NG-RE. To install
this package manually, follow one of these procedures, depending on whether or not you have enabled
Next Gen Services (unified-services) mode:

If unified-services are enabled:

1. Download the jpfe-spc3* package from: Downloads


2. Load vmhost* image on the RE
3. After the RE comes up, copy package jpfe-spc3-mx-x86-32-19.4R1.9.tgz to the /var/tmp directory
4. Load jpfe-spc3* package:

user@host> request system software add /var/tmp/jpfe-spc3-mx-x86-32-19.4R1.9.tgz reboot

If unified-services are disabled:


122

1. Download the jpfe-spc3* package from: Downloads

2. Load vmhost* image on the RE

3. After it comes up, enable unified-servicesmode.

user@host> request system enable unified-services and restart

4. After the RE comes up, copy package jpfe-spc3-mx-x86-32-19.4R1.9.tgz to the /var/tmp directory.

5. Load jpfe-spc3*.

user@host> request system software add /var/tmp/jpfe-spc3-mx-x86-32-19.4R1.9.tgz reboot

Enabling Next Gen Services on an MX Series Router


There are specific steps you’ll need to take if you’re migrating your services from MS-MPC cards to the
MX-SPC3 services cards. The Next Gen Services CLI differs from these legacy services.

The following procedure is a general procedure for enabling and disabling Next Gen Services.

Before you do anything, you’ll need to back up your configuration.

For more details on the differences between the configuration of the MX-SPC3 services card and legacy
services cards, see "Configuration Differences Between Adaptive Services and Next Gen Services on the
MX-SPC3" on page 16 and plan your migration appropriately.

You can run Next Gen Services on the MX240, MX480 and MX960 using the MX-SPC3 services card. To
use Next Gen Services on the MX Series, you must first enable Next Gen Services:

1. Delete any router configuration that is for services. This includes configuration under the [edit
services] hierarchy, configuration for services interfaces, and any configuration that refers to services
interfaces.
2. Enable Next Gen Services.

user@host> request system enable unified-services

3. When the following message appears, enter yes.

Before enabling unified services, please move to baseline configuration.


Are above conditions satisfied ? [yes,no]
123

4. Reboot the MX Series chassis.

user@host> request system reboot

You can also enable the Next Gen Services on a Guest network function (GNF), by using the CLI
request system enable unified-services at the GNF level. For more information, see Next Gen
Services on Junos node slicing.

Disabling Next Gen Services on an MX Series Router


To disable Next Gen Services on the MX Series:

1. Delete any router configuration that is for services. This includes configuration under the [edit
services] hierarchy, configuration for services interfaces, and any configuration that refers to services
interfaces.
2. Disable Next Gen Services.

user@host> request system disable unified-services

3. When the following message appears, enter yes.

Before disabling unified services, please move to baseline configuration.


Are above conditions satisfied ? [yes,no]

Unified-Services downgrade staged. Please reboot with 'request system reboot'


command to complete the downgrade

WARNING: cli has been replaced by an updated version:


CLI release 20190829.221548_builder.r1052644 built by builder on 2019-08-29
22:27:13 UTC
Restart cli using the new version ? [yes,no] (yes)

4. Reboot the MX Series chassis.

user@host> request system reboot

Determining Whether Next Gen Services is Enabled on an MX Series Router


To determine whether Next Gen Services is enabled:
124

• Enter the following command:

user@host> show system unified-services status

One of the following messages appears:

• Enabled—Next Gen Services is enabled and ready to use.

• Unified Services : Upgrade staged , please reboot with 'request system reboot' to enable unified
services.—You must perform a system reboot before Next Gen Services is enabled.

• Disabled—Next Gen Services is disabled.

• Unified Services : Upgrade staged , please reboot with 'request system reboot' to disable unified
services.—You must perform a system reboot before Next Gen Services is disabled.

RELATED DOCUMENTATION

Next Gen Services Overview | 2


Next Gen Services Feature Configuration Overview | 95
Configuration Differences Between Adaptive Services and Next Gen Services on the MX-SPC3 | 16
125

CHAPTER 3

Global System Logging Overview and Configuration

IN THIS CHAPTER

Understanding Next Gen Services CGNAT Global System Logging | 125

Enabling Global System Logging for Next Gen Services | 127

Configuring Local System Logging for Next Gen Services | 128

Configuring System Logging to One or More Remote Servers for Next Gen Services | 130

System Log Error Messages for Next Gen Services | 133

Configuring Syslog Events for NAT Rule Conditions with Next Gen Services | 142

Understanding Next Gen Services CGNAT Global System Logging

IN THIS SECTION

Next Gen Services CGNAT Global System Logging | 125

Modes of Operation for Next Gen Services System Logging | 126

Understanding Stream Mode | 126

System Logging Configuration Overview | 126

Disabling Session Open Information in Syslogs | 127

All CGNAT services supported under Next Gen Services use global system logging. This topic describes
global system logging for Next Gen Services CGNAT services and how to configure it.

Next Gen Services CGNAT Global System Logging

The CGNAT services supported under Next Gen Services support global system logging for syslog
messages. You configure syslog messaging for these services under the service-set hierarchy. You can
126

send logs to either the local routing engine (RE) or one or more remote servers (each of these is
identified as a stream). You can configure files to log system messages and also assign attributes, such as
severity levels, to messages. Reboot requests are recorded to the system log files, which you can view
with the show log command.

In the case of an AMS bundle, each PIC establishes a TCP connection with the log server and the
external collector receives log messages from all the AMS members.

Modes of Operation for Next Gen Services System Logging

You can save logs for Next Gen Services locally, which is called: event mode, or send the log messages to
one or more external servers, called: stream mode.

In event mode, after the log message is recorded, the log is stored within a log file which is then stored
in the database table of the local routing engine (RE) for further analysis.

When configured in stream mode, log messages are streamed to one or more remote log servers. Each
remote log server is assigned a stream from which it receives logs.

Understanding Stream Mode

When configured in stream mode, Next Gen Services log messages are streamed to a remote device.

For stream mode log forwarding, you can configure which transport protocol is used between MX-SPC3
services card and the log server. You can use either UDP, TCP, or TLS as the transport protocol.

When the device is configured in stream mode, you can configure a maximum of eight system log hosts
to stream to.

System Logging Configuration Overview

Configuring system logging for Next Gen Services involves several main steps and considerations:

• Global system logging — Next Gen Services system logging uses a global logging option that you
need to enable in order to collect system log messages.

To enable global system logging for Next Gen Services, set the traceoptions option under the edit
services rtlog hierarchy.

• For Next Gen Services, syslogs are always set at the service-set level regardless of whether you are
running event mode or stream mode.

You must configure system logging for each service-set for which you want to collect logs. Each
service-set uses a separate TCP connection in stream mode.
127

As a log client, Next Gen Services initiates TCP/TLS connections to the remote log server. By default,
we connect to port 514 for TCP logging [RFC 6587], and port 6514 for TLS logging [RFC 5425]. You
can also specify port numbers for TCP and TLS logging using CLI.

• If you are using AMS bundles, syslogs are generated from each member interface of AMS group

Disabling Session Open Information in Syslogs

You can stop open session information from cluttering up your syslogs by disabling session open
information from being collected:

user@host# set services service-set ss1 service-set-options disable-session-open-


syslog

RELATED DOCUMENTATION

Enabling Global System Logging for Next Gen Services | 127


Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128

Enabling Global System Logging for Next Gen Services

To configure either event mode or stream mode system logging for Next Gen Services, you must first
globally enable logging:

1. Enable system logging for Next Gen Services.

[edit]
user@host# edit services rtlogtraceoptions

2. Specify the groups from which to inherit configuration data.

[edit services rtlog traceoptions]


user@host# set apply-groups group-names
128

3. Specify which groups not to inherit configuration data from.

[edit services rtlog traceoptions]


user@host# set apply-groups-except group-names

4. Configure information about the files that contain trace logging information.

[edit services rtlog traceoptions]


user@host# set file filename

5. Define tracing operations for individual service-sets. To specify more than one tracing operation,
include multiple flag statements.

[edit services rtlog traceoptions]


user@host# set flag flag, flag...

6. (Optional) If you prefer not to perform any system logging, you can disable it.

[edit services rtlog traceoptions]


user@host# set no-remote-trace

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128

Configuring Local System Logging for Next Gen Services

You must enable global system logging for Next Gen Services in order to perform event mode system
logging. See, "Enabling Global System Logging for Next Gen Services" on page 127.

To send Next Gen Services log messages to a file on the local router, you’ll need to configure system
logging for event mode. This procedure describes this configuration process.
129

NOTE: For Next Gen Services, syslogs are always set at the service-set level. You must perform
this procedure for each service-set for which you want to collect logs.

To configure event mode logging for Next Gen Services:

1. Specify the filename to send log messages to.

user@host# set system syslog file filename

2. Specify the name of the service-set for which you want to log messages.

user@host# edit services service-set service-set-name syslog

For example specify the service-set name to ss1.

user@host# edit services service-set ss1 syslog

3. Specify the security transport protocol for syslog messages.

[edit services service-set ss1 syslog]


user@host# set transport protocol tls | tcp | udp

4. Enable event mode system logging for the service-set.

[edit services service-set ss1 syslog]


user@host# set mode event

5. Specify the rate at which log messages are sent per second.

[edit services service-set ss1 syslog]


user@host# set event-rate 100

6. Specify a local tag name for the log messages.

[edit services service-set ss1 syslog]


user@host# set local-log-tag SYSLOG
130

7. Specify the categories for which you want to collect events.

[edit services service-set ss1 syslog]


user@host# set local-category category, category

For example, to collect logs for stateful firewall, sessions and NAT:

[edit services service-set ss1 syslog]


user@host# set local-category sfw, session, nat

RELATED DOCUMENTATION

Enabling Global System Logging for Next Gen Services | 127


Understanding Next Gen Services CGNAT Global System Logging | 125
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130

Configuring System Logging to One or More Remote Servers for Next


Gen Services

You must enable global system logging for Next Gen Services in order to perform stream logging. See,
"Enabling Global System Logging for Next Gen Services" on page 127.

To send system log messages about Next Gen Services to one or more remote servers, you can configure
system logging for stream mode. This procedure describes the configuration process.

NOTE: Next Gen Services system log messages are configured and collected at the service-set
level.
In this procedure, you’ll configure a stream for the log messages between each service set and
each remote server that you want to send log messages.

Complete this procedure for each service-set and each remote server for which you want to
collect logs and send logs.

To configure stream mode system logging for Next Gen Services:


131

1. Specify the names of the service-set for which you want to collect log messages.

user@host# edit services service-set service-set-name syslog

For example specify the service-set name to ss1.

user@host# edit services service-set ss1 syslog

2. Specify the security transport protocol for syslog messages.

[edit services service-set ss1 syslog]


user@host# set transport protocol tls |tcp | udp

3. (Optional) Specify the syslog source address.

[edit services service-set ss1 syslog]


user@host# set source-address 50.0.0.10

BEST PRACTICE: The syslog source address can be any arbitrary IP address. It does not
have to be an IP address that is assigned to the device. Rather, this IP address is used on the
syslog collector to identify the syslog source. The best practice is to configure the source
address as the IP address of the interface that the traffic is sent out on.

4. Specify a local tag name for the log messages.

[edit services service-set ss1 syslog]


user@host# set local-log-tag SYSLOG

5. Enable stream mode system logging for the service-set.

[edit services service-set ss1 syslog]


user@host# set modestream
132

6. Specify a name for the stream.

[edit services service-set ss1 syslog]


user@host# set stream stream-name

For example, let’s call the stream: stream-aa

[edit services service-set ss1 syslog]


user@host# edit stream stream-aa

7. Specify the categories for which you want to collect events.

[edit services service-set ss1 syslog stream stream-aa]


user@host# set category

For example, to collect logs for stateful firewall, sessions and NAT:

[edit services service-set ss1 syslog stream stream-aa]


user@host# set category sfw, session, nat

8. Specify the file format for the log.

[edit services service-set ss1 syslog stream stream-aa]


user@host# set format sd-syslog

9. Specify the IP address of syslog server to receive log messages,

[edit services service-set ss1 syslog stream stream-aa]


user@host# set host address

10. Specify the level of severity for the stream.

[edit services service-set ss1 syslog stream stream-aa]


user@host# set severity severity-level
133

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
Configuring Local System Logging for Next Gen Services | 128

System Log Error Messages for Next Gen Services

IN THIS SECTION

Session Open Logs | 133

Session Close Logs | 135

NAT Out of Address Logs | 136

NAT Out of Ports Logs | 137

NAT Rule Match Logs | 137

NAT Pool Release Logs | 137

NAT Port Block Allocation Logs | 138

NAT Port Block Allocation Interim Logs | 138

NAT Port Block Release Logs | 139

Deterministic NAT Logs | 139

Stateful Firewall Rule Accept Logs | 139

Stateful Firewall Rule Reject Logs | 140

Stateful Firewall Rule Discard Logs | 141

Stateful Firewall Rule No Rule Drop Logs | 141

Stateful Firewall No Policy Drop Logs | 142

This topic describes Next Gen Services MX-SPC3 services card system log error messages and provides
a comparison of these messages with the MS-MPC services card.

Session Open Logs

Following are example session open logs for MS-MPC services cards versus MX-SPC3 services
processing card:
134

MS-MPC Services Card

JSERVICES_SESSION_OPEN application source-interface-name source-address source-port source-


nat-information destination-address destination-port destination-nat-information protocol-name
softwire-information;

MX-SPC3 Services Card

RT_FLOW_SESSION_CREATE_USF Prefix service-set-name source-interface-name source-address


source-port destination-address destination-port service-name nat-source-address nat-source-port
nat-destination-address nat-destination-port src-nat-rule-type src-nat-rule-name dst-nat-rule-type
dst-nat-rule-name protocol-name policy-name application softwire-information;

Sample MX-SPC3 Output

A sample output is as follows:

<14>1 2018-06-26T17:23:06.269-07:00 booklet RT_FLOW - RT_FLOW_SESSION_CREATE_USF


[[email protected] prefix="SYSLOG-PREFIX" service-set-name="JNPR-NH-SSET3" source-
address="50.0.0.10" source-port="1" destination-address="60.0.0.10" destination-port="21219"
connection-tag="0" service-name="icmp" nat-source-address="100.0.0.1" nat-source-port="1024"
nat-destination-address="60.0.0.10" nat-destination-port="21219" nat-connection-tag="0" src-nat-
rule-type="source rule" src-nat-rule-name="SRC-NAT-RULE1" dst-nat-rule-type="N/A" dst-nat-rule-
name="N/A" protocol-id="1" policy-name="p1" source-zone-name="JNPR-NH-SSET3-ZoneIn"
destination-zone-name="JNPR-NH-SSET3-ZoneOut" session-id-32="160000001" username="N/A"
roles="N/A" packet-incoming-interface="vms-2/0/0.100" application="UNKNOWN"
nestedapplication="UNKNOWN" encrypted="UNKNOWN" application-category="N/A" application-
sub-category="N/A" application-risk="-1"] Prefix PADDY3 svc-set-name JNPR-NH-SSET3: session
created 50.0.0.10/1->60.0.0.10/21219 0x0 icmp 100.0.0.1/1024->60.0.0.10/21219 0x0 source rule
SRC-NAT-RULE1 N/A N/A 1 p1 JNPR-NH-SSET3-ZoneIn JNPR-NH-SSET3-ZoneOut 160000001
N/A(N/A) vms-2/0/0.100 UNKNOWN UNKNOWN UNKNOWN N/A N/A -1

Session Open Logs With NAT

MS-MPC Services Card

SYSLOG_MSMPC{SS_TEST}JSERVICES_SESSION_OPEN: application:ike-esp-nat, xe-2/2/1.0


24.0.0.2:1234 [85.0.0.1:1024] -> 25.0.0.2:1234 (UDP)
135

MX-SPC3 Services Card

Aug 3 02:04:28 mobst480i RT_FLOW: RT_FLOW_SESSION_CREATE_USF: Tag svc-set-name sset1:


session created 90.0.0.2/1->30.0.0.2/4323 0x0 icmp 50.0.0.3/1024->30.0.0.2/4323 0x0 source rule
rule1 N/A N/A 1 p1 sset1-ZoneIn sset1-ZoneOut 160000015 N/A(N/A) vms-2/0/0.1 UNKNOWN
UNKNOWN UNKNOWN N/A N/A -1 N/A

Session Open Logs Without NAT

MS-MPC Services Card

SYSLOG_MSMPC{SS_TEST}JSERVICES_SESSION_OPEN: application:ike-esp-nat, xe-2/2/1.0


24.0.0.2:1234 -> 25.0.0.2:1234 (UDP)

MX-SPC3 Services Card

RT_FLOW - RT_FLOW_SESSION_CREATE_USF [[email protected] tag="SYSLOG_SFW" service-


set-name="ss1" source-address="20.1.1.2" source-port="12000" destination-address="30.1.1.2"
destination-port="22000" connection-tag="0" service-name="None" nat-source-address="20.1.1.2"
nat-source-port="12000" nat-destination-address="30.1.1.2" nat-destination-port="22000" nat-
connection-tag="0" src-nat-rule-type="N/A" src-nat-rule-name="N/A" dst-nat-rule-type="N/A" dst-
nat-rule-name="N/A" protocol-id="6" policy-name="policy1" source-zone-name="ss1-ZoneIn"
destination-zone-name="ss1-ZoneOut" session-id-32="190000004" username="N/A" roles="N/A"
packet-incoming-interface="xe-5/3/2.0" application="UNKNOWN" nested-application="UNKNOWN"
encrypted="UNKNOWN" application-category="N/A" application-sub-category="N/A" application-
risk="-1" application-characteristics="N/A"] Tag SYSLOG_SFW svc-set-name ss1: session created
20.1.1.2/12000->30.1.1.2/22000 0x0 None 20.1.1.2/12000->30.1.1.2/22000 0x0 N/A N/A N/A N/A
6 policy1 ss1-ZoneIn ss1-ZoneOut 190000004 N/A(N/A) xe-5/3/2.0 UNKNOWN UNKNOWN
UNKNOWN N/A N/A -1 N/A

Session Close Logs

Following are example session close logs for MS-MPC services cards versus MX-SPC3 services
processing card:

MS-MPC Services Card

JSERVICES_SESSION_CLOSE application source-interface-name source-address source-port source-


nat-information destination-address destination-port destination-nat-information protocol-name
softwire-information;
136

MX-SPC3 Services Card

RT_FLOW_SESSION_CLOSE_USF Prefix service-set-name source-interface-name source-address


source-port destination-address destination-port service-name nat-source-address nat-source-port
nat-destination-address nat-destination-port src-nat-rule-type src-nat-rule-name dst-nat-rule-type
dst-nat-rule-name protocol-name policy-name; softwire-information;

Sample MX-SPC3 Output

A sample output follows:

<14>1 2018-06-27T09:24:00.058-07:00 booklet RT_FLOW - RT_FLOW_SESSION_CLOSE_USF


[[email protected] prefix="SYSLOG-PREFIX" service-set-name="JNPR-NH-SSET3" reason="idle
Timeout" source-address="50.0.0.10" source-port="1" destination-address="60.0.0.10" destination-
port="30170" connection-tag="0" service-name="icmp" nat-source-address="100.0.0.1" nat-source-
port="1024" nat-destination-address="60.0.0.10" nat-destination-port="30170" nat-connection-
tag="0" src-nat-rule-type="source rule" src-nat-rule-name="SRC-NAT-RULE1" dst-nat-rule-
type="N/A" dst-nat-rule-name="N/A" protocol-id="1" policy-name="p1" source-zone-name="JNPR-
NH-SSET3-ZoneIn" destination-zone-name="JNPR-NH-SSET3-ZoneOut" session-id-32="160000001"
packets-from-client="1" bytes-from-client="84" packets-from-server="0" bytes-from-server="0"
elapsed-time="4" application="UNKNOWN" nested-application="UNKNOWN" username="N/A"
roles="N/A" packet-incoming-interface="vms-2/0/0.100" encrypted="UNKNOWN" application-
category="N/A" application-sub-category="N/A" application-risk="-1"] Prefix PADDY-DEF svc-set-
name JNPR-NH-SSET3: session closed idle Timeout: 50.0.0.10/1->60.0.0.10/30170 0x0 icmp
100.0.0.1/1024->60.0.0.10/30170 0x0 source rule SRC-NAT-RULE1 N/A N/A 1 p1 JNPR-NH-SSET3-
ZoneIn JNPR-NH-SSET3-ZoneOut 160000001 1(84) 0(0) 4 UNKNOWN UNKNOWN N/A(N/A)
vms-2/0/0.100 UNKNOWN N/A N/A -1

NAT Out of Address Logs

Following are example NAT Out of Address logs for MS-MPC services cards versus MX-SPC3 services
processing card:

MS-MPC Services Card

JSERVICES_NAT_OUTOF_ADDRESSES: nat-pool-name

MX-SPC3 Services Card:

Aug 10 10:06:13 champ RT_NAT: RT_SRC_NAT_OUTOF_ADDRESSES: nat-pool-name src_pool1 is out


of addresses
137

NAT Out of Ports Logs

Following are example NAT Out of Ports logs for MS-MPC services cards versus MX-SPC3 services
processing card:

MS-MPC Services Card

{NPU-1-PFX1}[jservices-nat]: JSERVICES_NAT_OUTOF_PORTS: natpool NAT-POOL-NPU1-PFX3 is


out of ports

MX-SPC3 Services Card

jul 31 03:08:30 esst480h RT_NAT: RT_SRC_NAT_OUTOF_PORTS: nat-pool-name nat_pool1 is out of


ports

NAT Rule Match Logs

Following are example NAT rule match logs for MS-MPC services cards versus MX-SPC3 services
processing card:

MS-MPC Services Card

SYSLOG_MSMPC{SS_TEST}[jservices-nat]: JSERVICES_NAT_RULE_MATCH: proto 17 (UDP)


application: any, xe-2/2/1.0:24.0.0.2:1234 -> 25.0.0.2:1234, Match NAT rule-set: (null), rule:
NAT_RULE_TEST, term: t

MX-SPC3 Services Card

RT_NAT: RT_NAT_RULE_MATCH: protocol-id 17 protocol-name udp application Unknown interface-


name ge-2/0/9.0 source-address 11.1.1.2 source-port 2000 destination-address 12.1.1.2 destination-
port 5000 rule-set-name rule-set rule-name nat-rule

NAT Pool Release Logs

Following are example NAT Rule Match logs for MS-MPC services cards versus MX-SPC3 services
processing card:

MS-MPC Services Card

SYSLOG_MSMPC{SS_TEST}[jservices-nat]: JSERVICES_NAT_POOL_RELEASE: natpool release


85.0.0.1:1024[1]
138

MX-SPC3 Services Card

RT_NAT: RT_SRC_NAT_POOL_RELEASE: nat-pool-name nat-pool address 112.1.1.4 port 1024 count 1

NAT Port Block Allocation Logs

Following are example NAT port block allocation logs for MS-MPC services cards versus MX-SPC3
services processing card:

MS-MPC Services Card-Example 1

SYSLOG_MSMPC{ss1}[jservices-nat]: JSERVICES_NAT_PORT_BLOCK_ALLOC: 11.1.1.2 ->


112.1.1.4:42494-42503 0x59412760

MX-SPC3 Services Card-Example 1

Aug 9 23:01:59 esst480r RT_NAT: RT_SRC_NAT_PBA_ALLOC: Subscriber 20.1.1.5 used/maximum


[1/1] blocks, allocates port block [49774-49923] from 100.0.0.1 in source pool p1 lsys_id: 0

MS-MPC Services Card-Example 2

SYSLOG_MSMPC{ss1}[jservices-nat]: JSERVICES_NAT_PORT_BLOCK_RELEASE:
2001:2010:0:0:0:0:0:2 -> 161.161.16.1:56804-56813 0x597ef2c3

MX-SPC3 Services Card-Example 2

RT_NAT: RT_SRC_NAT_PBA_ALLOC: Subscriber 11.1.1.2 used/maximum [1/2] blocks, allocates port


block [13934-13943] from 112.1.1.1 in source pool nat-pool lsys_id: 0

NAT Port Block Allocation Interim Logs

Following are example interim logs for MS-MPC services cards versus MX-SPC3 services processing
card:

MS-MPC Services Card

SYSLOG_MSMPC{ss1}[jservices-nat]: JSERVICES_NAT_PORT_BLOCK_ACTIVE: 11.1.1.2 ->


112.1.1.4:42494-42503 0x59412760
139

MX-SPC3 Services Card

RT_NAT: RT_SRC_NAT_PBA_INTERIM: Subscriber 50.0.0.3 used/maximum [1/1] blocks, allocates port


block [5888-6015] from 202.0.0.1 in source pool JNPR-CGNAT-PUB-POOL lsys_id: 0

NAT Port Block Release Logs

Following are example NAT port block release logs for MS-MPC services cards versus MX-SPC3 services
processing card:

MS-MPC Services Card

JSERVICES_NAT_PORT_BLOCK_RELEASE source-address nat-source-address nat-source-port-range-


start nat-source-port-range-end object-create-time;

MX-SPC3 Services Card

RT_NAT: RT_SRC_NAT_PBA_RELEASE: Subscriber 11.1.1.2 used/maximum [2/3] blocks, releases port


block [3839-3843] from 112.1.2.1 in source pool nat-pool lsys_id: 0

Deterministic NAT Logs

MS-MPC Services Card

{ss1}[jservices-nat]: JSERVICES_DET_NAT_CONFIG: Deterministc NAT Config


[2001:2010::-2001:2010::ff]:[161.161.16.1-161.161.16.254]:0:200:0:1024-65535

Stateful Firewall Rule Accept Logs

Following are example stateful firewall rule accept logs for MS-MPC services cards versus MX-SPC3
services processing card:

MS-MPC Services Card

Sep 20 01:36:51 mobst480b (FPC Slot 5, PIC Slot 0) 2017-09-20 08:36:19: SYSLOG_MSMPC{SS_TEST}
[jservices-sfw]: JSERVICES_SFW_RULE_ACCEPT: proto 17 (UDP) application: any, interface:
xe-2/2/1.0, 24.0.0.2:1234 -> 25.0.0.2:1234, Match SFW allow rule-set: (null), rule: SFW_RULE_TEST,
term: t
140

MX-SPC3 Services Card

expo RT_FLOW: RT_FLOW_SESSION_POLICY_ACCEPT_USF: Tag SYSLOGMSG svc-set-name


ss1:session created with policy accept 20.1.1.2/5->30.1.1.2/15100 0x0 icmp R11 1 sfw_policy1 ss1-
ZoneIn ss1-ZoneOut 160000010 N/A(N/A) xe-5/3/2.0 UNKNOWN UNKNOWN UNKNOWN N/A
N/A -1 N/A

Sample MX-SPC3 Output

Here’s a sample output for MX-SPC3 card:

<14>1 2018-06-27T09:23:56.808-07:00 booklet RT_FLOW -


RT_FLOW_SESSION_POLICY_ACCEPT_USF [[email protected] prefix="PADDY-DEF" service-
set-name="JNPR-NH-SSET3" source-address="50.0.0.10" source-port="1" destination-
address="60.0.0.10" destination-port="30170" connection-tag="0" service-name="icmp" rule-
name="Tobe implemented" rule-set-name="To be implemented" protocol-id="1" policy-name="p1"
source-zone-name="JNPR-NH-SSET3-ZoneIn" destination-zone-name="JNPR-NH-SSET3-ZoneOut"
session-id-32="160000001" username="N/A"roles="N/A" packet-incoming-
interface="vms-2/0/0.100" application="UNKNOWN" nested-
application="UNKNOWN"encrypted="UNKNOWN" application-category="N/A" application-sub-
category="N/A" application-risk="-1"] Prefix PADDY-DEF svc-set-name JNPR-NH-SSET3: session
created 50.0.0.10/1->60.0.0.10/30170 0x0 icmp To be implemented To be implemented 1 p1 JNPR-
NH-SSET3-ZoneIn JNPR-NH-SSET3-ZoneOut 160000001 N/A(N/A) vms-2/0/0.100 UNKNOWN
UNKNOWN UNKNOWN N/A N/A -1

Stateful Firewall Rule Reject Logs

Following are example stateful firewall rule reject logs for MS-MPC services cards versus MX-SPC3
services processing card:

MS-MPC Services Card

Sep 20 01:42:02 mobst480b (FPC Slot 5, PIC Slot 0) 2017-09-20 08:41:31: SYSLOG_MSMPC{SS_TEST}
[jservices-sfw]: JSERVICES_SFW_RULE_REJECT: proto 17 (UDP) application: any, 24.0.0.2:1234 ->
25.0.0.2:1234, Match SFW reject rule-set: (null), rule: SFW_RULE_TEST, term: t

MX-SPC3 Services Card

expo RT_FLOW: RT_FLOW_SESSION_RULE_REJECT_USF: Tag SYSLOGMSG svc-set-name ss1:


session denied 20.1.1.2/5->30.1.1.2/15183 0x0 icmp R11 1(8) sfw_policy1 ss1-ZoneIn ss1-ZoneOut
UNKNOWN UNKNOWN N/A(N/A) xe-5/3/2.0 No Rejected by policy 160000030 N/A N/A -1 N/A
141

Stateful Firewall Rule Discard Logs

Following are example stateful firewall rule discard logs for MS-MPC services cards versus MX-SPC3
services processing card:

MS-MPC Services Card

Sep 20 01:43:57 mobst480b (FPC Slot 5, PIC Slot 0) 2017-09-20 08:43:26: SYSLOG_MSMPC{SS_TEST}
[jservices-sfw]: JSERVICES_SFW_RULE_DISCARD: proto 17 (UDP) application: any, 24.0.0.2:1234 ->
25.0.0.2:1234, Match SFW drop rule-set: (null), rule: SFW_RULE_TEST, term: t

MX-SPC3 Services Card

RT_FLOW - RT_FLOW_SESSION_RULE_DISCARD_USF [[email protected] tag="SYSLOG_SFW"


service-set-name="ss1" source-address="20.1.1.2" source-port="10000" destination-
address="30.1.1.2" destination-port="20000" connection-tag="0" service-name="None" rule-
name="R1" rule-set-name="" protocol-id="17" icmp-type="0" policy-name="policy1" source-zone-
name="ss1-ZoneIn" destination-zone-name="ss1-ZoneOut" application="UNKNOWN" nested-
application="UNKNOWN" username="N/A" roles="N/A" packet-incoming-interface="xe-5/3/2.0"
encrypted="No" reason="Denied by policy" session-id-32="190000014" application-category="N/A"
application-sub-category="N/A" application-risk="-1" application-characteristics="N/A"] Tag
SYSLOG_SFW svc-set-name ss1: session denied 20.1.1.2/10000->30.1.1.2/20000 0x0 None R1 17(0)
policy1 ss1-ZoneIn ss1-ZoneOut UNKNOWN UNKNOWN N/A(N/A) xe-5/3/2.0 No Denied by policy
190000014 N/A N/A -1 N/A

Stateful Firewall Rule No Rule Drop Logs

Following are example stateful firewall rule no rule drop logs for MS-MPC services cards versus MX-
SPC3 services processing card:

MS-MPC Services Card

Sep 20 01:43:57 mobst480b (FPC Slot 5, PIC Slot 0) 2017-09-20 08:43:26: SYSLOG_MSMPC{SS_TEST}
[jservices-sfw]: JSERVICES_SFW_NO_RULE_DROP: proto 17 (UDP) application: any, 24.0.0.2:1234 ->
25.0.0.2:1234

MX-SPC3 Services Card

RT_FLOW_SESSION_NO_RULE_DROP_USF Prefix service-set-name protocol-id protocol-name


source-interface-name separator source-address source-port destination-address destination-port
event-type;
142

Stateful Firewall No Policy Drop Logs

Following are example stateful firewall logs for MS-MPC services cards versus MX-SPC3 services
processing card:

MS-MPC Services Card

JSERVICES_SFW_NO_POLICY source-address destination-address;

MX-SPC3 Services Card

RT_FLOW_SESSION_NO_POLICY_USF Prefix service-set-name source-address destination-address;

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
Configuring Local System Logging for Next Gen Services | 128

Configuring Syslog Events for NAT Rule Conditions with Next Gen
Services

To configure syslog events to be generated when traffic matches NAT rule conditions for Next Gen
Services NAT:

Configure the generation of a syslog when traffic matches the NAT rule conditions.

[edit services nat source rule-set rule-set-name rule rule-name then]


user@host# set syslog

The following are logs collected:

Out of addresses logs — If the allocation request fails to be handled as the public IP addresses in the No-
PAT pool are used up, the out of addresses syslog is generated.

Out of ports logs — If the allocation request fails to be handled as the public IPs and ports in the NAPT
pool are used up, the out of ports syslog is generated.
143

NAT Rule Match Logs — If the packet matches the NAT rule, the NAT rule match syslog is generated.

Pool resource release logs — If the public IP and port succeeds to be released to the NAPT pool, the pool
release syslog is generated.

RELATED DOCUMENTATION

Network Address Port Translation (NAPT) Overview | 188


Configuring Network Address Port Translation for Next Gen Services | 189
144

CHAPTER 4

Next Gen Services SNMP MIBS and Traps

IN THIS CHAPTER

Next Gen Services SNMP MIBs and Traps | 144

Next Gen Services SNMP MIBs and Traps

IN THIS SECTION

Service-Set Related SNMP MIBs | 144

Summary Mapping of MX-SPC3 CLI Services Operational Commands to SNMP MIBs | 153

NAT SNMP MIBs | 158

SNMP Traps | 162

This topic describes the SNMP MIBS and traps for Next Gen Services with the MX-SPC3 services. As a
reference, it also compares MX-SPC3 services card MIBS and traps with the MPC services card.

Service-Set Related SNMP MIBs

Table 26 on page 145, Table 27 on page 147, and Table 28 on page 148 describe the MIB objects in the
service-set related SNMP MIB tables supported in jnxSPMIB. This MIB is supported for both MS-MPC
services cards and MX-SPC3 services cards with the exception of the following:

• The MX-SPC3 services card supports counters, such as memory usage and cpu usage, at the per
service-set and per pic level, whereas MS-MPC services cards support these counters at the service
level, for example, stateful firewall (SFW) and NAT).

The MX-SPC3 card uses the jnxSpSvcSetTable MIB for these counters and the MS-MPC services card
uses the jnxSpSvcSetSvcTypeTable MIB for these counters.
145

• InTable 26 on page 145 the jnxSpSvcSetTable, the object jnxSpSvcSetSvcType field will show a value
of “ALL” since no per service-type specific counters are supported.

Table 26: Service-Set SNMP MIB Table (jnxSpSvcSetTable)

MIB Object jnxSpSvcSet Entry Description


Number

jnxSpSvcSetIfName jnxSpSvcSetEntry 4 The name of the interface identifying the


AS PIC. If more than one interface is
associated with the AS PIC, the name
associated with the lower layer interface
is used.

jnxSpSvcSetIfIndex jnxSpSvcSetEntry 5 An index number associated with the


interface name.

jnxSpSvcSetMemoryUsage jnxSpSvcSetEntry 6 Amount of memory used by the service


set, in bytes.

jnxSpSvcSetCpuUtil jnxSpSvcSetEntry 7 Amount of CPU processing used by the


service set, expressed as a percentage of
total CPU usage.

J Series Services Routers do not have a


dedicated CPU for services. CPU usage on
these routers appears as 0.

jnxSpSvcSetSvcStyle jnxSpSvcSetEntry 8 Type of service for the service set. Service


types include:

• Unknown—The service type is not


known.

• Interface-service—The service is
interface based.

• Next-hop-service—The service is next-


hop based.
146

Table 26: Service-Set SNMP MIB Table (jnxSpSvcSetTable) (Continued)

MIB Object jnxSpSvcSet Entry Description


Number

jnxSpSvcSetMemLimitPktDrops jnxSpSvcSetEntry 9 Number of packets dropped because the


service set exceeded its memory limits
(operating in the Red zone).

jnxSpSvcSetCpuLimitPktDrops jnxSpSvcSetEntry Number of packets dropped because the


10 service set exceeded the average CPU
limits (when total CPU usage exceeds 85
percent).

jnxSpSvcSetFlowLimitPktDrops jnxSpSvcSetEntry Number of packets dropped because the


11 service set exceeded the flow limit.

jnxSpSvcSetMemoryUsage64 Amount of memory used by the service


set, in bytes.

jnxSpSvcSetMemLimitPktDrops64 Number of packets dropped because the


service set exceeded its memory limits
(operating in the Red zone).

jnxSpSvcSetCpuLimitPktDrops64 Number of packets dropped because the


service set exceeded the average CPU
limits (when total CPU usage exceeds 85
percent).

jnxSpSvcSetFlowLimitPktDrops64 Number of packets dropped because the


service set exceeded the flow limit.

jnxSpSvcSetSessCount Number of valid sessions in the service-


set.
147

Table 27: Service-Set Service Type SNMP MIB Table (jnxSpSvcSetSvcTypeTable)

MIB Object (jnxSpSvcSetSvcType Entry Description


Number

jnxSpSvcSetSvcTypeIndex jnxSpSvcSetSvcTypeEntry 1 An integer used to


identify the service type.

jnxSpSvcSetSvcTypeIfName jnxSpSvcSetSvcTypeEntry 2 The name of the interface


identifying the AS PIC. If
more than one interface
is associated with the AS
PIC, the name associated
with the lower layer
interface is used.

jnxSpSvcSetSvcTypeName jnxSpSvcSetSvcTypeEntry 3 The name of the service


type.

jnxSpSvcSetSvcTypeSvcSets jnxSpSvcSetSvcTypeEntry 4 Number of service sets


configured on the AS PIC
that use this service type.

jnxSpSvcSetSvcTypeMemoryUsage jnxSpSvcSetSvcTypeEntry 5 Amount of memory used


by this service type,
expressed in bytes.

jnxSpSvcSetSvcTypePctMemoryUsage jnxSpSvcSetSvcTypeEntry 6 Amount of memory used


by this service type,
expressed as a
percentage of total
memory.
148

Table 27: Service-Set Service Type SNMP MIB Table (jnxSpSvcSetSvcTypeTable) (Continued)

MIB Object (jnxSpSvcSetSvcType Entry Description


Number

jnxSpSvcSetSvcTypeCpuUtil jnxSpSvcSetSvcTypeEntry 7 Amount of CPU


processing used by the
service set, expressed as
a percentage of total CPU
usage.

J Series Services Routers


do not have a dedicated
CPU for services. CPU
usage on these routers
appears as 0.

Table 28: Service-Set Interface SNMP MIB Table (jnxSpSvcSetIfTable)

MIB Object jnxSpSvcSetIf Entry Description


Number

jnxSpSvcSetIfTableName jnxSpSvcSetIfEntry 1 The name of the interface used to


identify the AS PIC. If more than
one interface is associated with
the AS PIC, the name associated
with the lower layer interface is
used.

jnxSpSvcSetIfsvcSets jnxSpSvcSetIfEntry 2 The number of service sets


configured on the AS PIC.

jnxSpSvcSetIfMemoryUsage jnxSpSvcSetIfEntry 3 Amount of memory used by the


AS PIC, expressed in bytes.

jnxSpSvcSetIfPctMemoryUsage jnxSpSvcSetIfEntry 4 Amount of memory used by the


AS PIC, expressed as a percentage
of total memory.
149

Table 28: Service-Set Interface SNMP MIB Table (jnxSpSvcSetIfTable) (Continued)

MIB Object jnxSpSvcSetIf Entry Description


Number

jnxSpSvcSetIfPolMemoryUsage jnxSpSvcSetIfEntry 5 Amount of policy memory used by


the AS PIC, expressed in bytes.

jnxSpSvcSetIfPctPolMemoryUsage jnxSpSvcSetIfEntry 6 Amount of policy memory used by


the AS PIC, expressed as a
percentage of the total.

jnxSpSvcSetIfMemoryZone jnxSpSvcSetIfEntry 7 The memory usage zone currently


occupied by the AS PIC. The
definitions of each zone are:

• Green—All new flows are


allowed.

• Yellow—Unused memory is
reclaimed. All new flows are
allowed.

• Orange—New flows are


allowed only for service sets
that use less than their equal
share of memory.

• Red—No new flows are


allowed.

jnxSpSvcSetIfCpuUtil jnxSpSvcSetIfEntry 8 Amount of CPU processing used


by the AS PIC, expressed as a
percentage of total CPU usage.

J Series Services Routers do not


have a dedicated CPU for services.
CPU usage on these routers
appears as 0.
150

Table 28: Service-Set Interface SNMP MIB Table (jnxSpSvcSetIfTable) (Continued)

MIB Object jnxSpSvcSetIf Entry Description


Number

jnxSpSvcSetIfMemoryUsage64 Amount of policy memory used by


the AS PIC, expressed in bytes.

jnxSpSvcSetIfPolMemoryUsage64 Amount of policy memory used by


the AS PIC, expressed as a
percentage of the total.

jnxSpSvcSetIfNumTotalSessActive Total number of active sessions in


the PIC.

jnxSpSvcSetIfPeakTotalSessActive Number of active sessions in the


PIC at any time.

jnxSpSvcSetIfNumCreatedSessPer Number of created sessions per


Sec second in the PIC

jnxSpSvcSetIfNumDeletedSessPer Number of deleted sessions per


Sec second in the PIC

jnxSpSvcSetIfNumTotalTcpSessActi Number of active sessions (TCP,


ve UDP and other )in the PIC

jnxSpSvcSetIfNumTotalUdpSessAct
ive

jnxSpSvcSetIfNumTotalOtherSessA
ctive
151

Table 28: Service-Set Interface SNMP MIB Table (jnxSpSvcSetIfTable) (Continued)

MIB Object jnxSpSvcSetIf Entry Description


Number

jnxSpSvcSetIfPeakTotalTcpSessActi Number of active sessions (TCP,


ve UDP, and others) in the PIC

jnxSpSvcSetIfPeakTotalUdpSessAct
ive

jnxSpSvcSetIfPeakTotalOtherSessA
ctive

jnxSpSvcSetIfPeakCreatedSessPer Number of created sessions per


Sec sec in the PIC

jnxSpSvcSetIfPeakDeletedSessPer Number of deleted sessions per


Sec sec in the PIC

jnxSpSvcSetIfNumTotalTcpIpv4Ses Total number of active sessions


sActive (TCP, UDP and other) for IPv4 and
IPv6 in the PIC
jnxSpSvcSetIfNumTotalTcpIpv6Ses
sActive

jnxSpSvcSetIfNumTotalUdpIpv4Ses
sActive

jnxSpSvcSetIfNumTotalUdpIpv6Ses
sActive

jnxSpSvcSetIfNumTotalOtherIpv4S
essActive

jnxSpSvcSetIfNumTotalOtherIpv6S
essActive
152

Table 28: Service-Set Interface SNMP MIB Table (jnxSpSvcSetIfTable) (Continued)

MIB Object jnxSpSvcSetIf Entry Description


Number

jnxSpSvcSetIfNumTotalTcpGatedSe Number of TCP and UDP gated


ssActive sessions in the PIC

jnxSpSvcSetIfNumTotalUdpGatedS
essActive

jnxSpSvcSetIfNumTotalTcpRegSess Number of TCP and UDP regular


Active sessions in the PIC

jnxSpSvcSetIfNumTotalUdpRegSes
sActive

jnxSpSvcSetIfNumTotalTcpTunSess Number of TCP and UDP


Active tunneled sessions in the PIC

jnxSpSvcSetIfNumTotalUdpTunSess
Active

jnxSpSvcSetIfSessPktRecv Number of packets received in


session handling

jnxSpSvcSetIfSessPktXmit Number of packets transmitted as


a part of session handling

jnxSpSvcSetIfSessSlowPathDiscard Number of packets discarded in


slow path

jnxSpSvcSetIfSessSlowPathForwar Number of packets forwarded in


d slow path

jnxSpSvcSetIfMspNumCreatedSub Number of subscribers created


sPerSec per sec
153

Table 28: Service-Set Interface SNMP MIB Table (jnxSpSvcSetIfTable) (Continued)

MIB Object jnxSpSvcSetIf Entry Description


Number

jnxSpSvcSetIfMspNumDeletedSub Number of Subscribers deleted


sPerSec per sec

jnxSpSvcSetIfMspNumTotalSubsAct Number of active subscribers


ive

jnxSpSvcSetIfMspPeakCreatedSub Peak number of created


sPerSec subscribers per sec in the PIC

jnxSpSvcSetIfMspPeakDeletedSub Peak number of deleted


sPerSec subscribers per sec in the PIC

jnxSpSvcSetIfMspPeakTotalSubsAct Peak number of total active


ive subscribers in the PIC

Summary Mapping of MX-SPC3 CLI Services Operational Commands to SNMP MIBs

Table 29 on page 153 summarizes the mapping of the MX-SPC3 services card operations commands to
the respective SNMP MIB.

Table 29: Summary Mapping of MX-SPC3 CLI Services Set Command to SNMP MIBs

CLI Command Variable Name MIB Tables MIB Object

show services service- cpu-utilization- jnxSpSvcSetTable jnxSpSvcSetCpuUtil


sets cpu-usage percent

show services service- bytes-used jnxSpSvcSetMemoryUsage6


sets memory-usage 4
154

Table 29: Summary Mapping of MX-SPC3 CLI Services Set Command to SNMP MIBs (Continued)

CLI Command Variable Name MIB Tables MIB Object

show services service- mem-zone jnxSpSvcSetIfMemoryZone


sets memory-usage
zone

show services service- cpulimit-drops jnxSpSvcSetCpuLimitPktDro


sets statistics packet- ps64
drops

flowlimit-drops jnxSpSvcSetFlowLimitPktDr
ops64

memlimit-drops jnxSpSvcSetMemLimitPktDr
ops64

show services service- service-set-bytes- jnxSpSvcSetIfTable jnxSpSvcSetIfMemoryUsage


sets summary used 64

service-set-cpu- jnxSpSvcSetIfCpuUtil
utilization

service-set- jnxSpSvcSetIfPctMemoryUs
percent-bytes- age
used

service-set- jnxSpSvcSetIfPctPolMemor
percent-policy- yUsage
bytes-used

service-set-policy- jnxSpSvcSetIfPolMemoryUs
bytes-used age64

service-sets- jnxSpSvcSetIfSvcSets
configured
155

Table 29: Summary Mapping of MX-SPC3 CLI Services Set Command to SNMP MIBs (Continued)

CLI Command Variable Name MIB Tables MIB Object

show services sessions sess-count jnxSpSvcSetTable jnxSpSvcSetSessCount


count

show services sessions num-total-session- jnxSpSvcSetIfTable jnxSpSvcSetIfNumTotalSess


analysis active Active

peak-total-session- jnxSpSvcSetIfPeakTotalSess
active Active

num-created- jnxSpSvcSetIfNumCreatedS
session-per-sec essPerSec

num-deleted- jnxSpSvcSetIfNumDeletedS
session-per-sec essPerSec

num-total-tcp- jnxSpSvcSetIfNumTotalTcpS
session-active essActive

num-total-udp- jnxSpSvcSetIfNumTotalUdp
session-active SessActive

peak-total-tcp- jnxSpSvcSetIfPeakTotalTcpS
session-active essActive

peak-total-udp- jnxSpSvcSetIfPeakTotalUdp
session-active SessActive

num-total-other- jnxSpSvcSetIfNumTotalOthe
session-active rSessActive
156

Table 29: Summary Mapping of MX-SPC3 CLI Services Set Command to SNMP MIBs (Continued)

CLI Command Variable Name MIB Tables MIB Object

peak-created- jnxSpSvcSetIfPeakCreatedS
session-per- essPerSec
second

peak-deleted- jnxSpSvcSetIfPeakDeletedS
session-per- essPerSec
second

peak-total-other- jnxSpSvcSetIfPeakTotalOthe
session-active rSessActive

num-total-tcp- jnxSpSvcSetIfNumTotalTcpIp
ipv4-session-active v4SessActive

num-total-tcp- jnxSpSvcSetIfNumTotalTcpIp
ipv6-session-active v6SessActive

num-total-udp- jnxSpSvcSetIfNumTotalUdpI
ipv4-session-active pv4SessActive

num-total-udp- jnxSpSvcSetIfNumTotalUdpI
ipv6-session-active pv6SessActive

num-total-tcp- jnxSpSvcSetIfNumTotalTcpG
gated-session- atedSessActive
active

num-total-udp- jnxSpSvcSetIfNumTotalUdp
gated-session- GatedSessActive
active
157

Table 29: Summary Mapping of MX-SPC3 CLI Services Set Command to SNMP MIBs (Continued)

CLI Command Variable Name MIB Tables MIB Object

num-total-other- jnxSpSvcSetIfNumTotalOthe
ipv4-session-active rIpv4SessActive

num-total-other- jnxSpSvcSetIfNumTotalOthe
ipv6-session-active rIpv6SessActive

num-total-tcp- jnxSpSvcSetIfNumTotalTcpR
regular-session- egSessActive
active

num-total-udp- jnxSpSvcSetIfTable jnxSpSvcSetIfNumTotalUdp


regular-session- RegSessActive
active

num-total-tcp- jnxSpSvcSetIfNumTotalTcpT
tunneled-session- unSessActive
active

num-total-udp- jnxSpSvcSetIfNumTotalUdpT
tunneled-session- unSessActive
active

session-pkts- jnxSpSvcSetIfSessPktRecv
received

session-pkts- jnxSpSvcSetIfSessPktXmit
transmitted

session-slow-path- jnxSpSvcSetIfSessSlowPath
discard Discard
158

Table 29: Summary Mapping of MX-SPC3 CLI Services Set Command to SNMP MIBs (Continued)

CLI Command Variable Name MIB Tables MIB Object

session-slow-path- jnxSpSvcSetIfSessSlowPath
forward Forward

show services msp-num-created- jnxSpSvcSetIfMspNumCreat


subscriber analysis subs-per-sec edSubsPerSec

msp-num-deleted- jnxSpSvcSetIfMspNumDelet
subs-per-sec edSubsPerSec

msp-num-total- jnxSpSvcSetIfMspNumTotal
subs-active SubsActive

msp-peak-created- jnxSpSvcSetIfMspPeakCreat
subs-per-second edSubsPerSec

msp-peak-deleted- jnxSpSvcSetIfMspPeakDelet
subs-per-second edSubsPerSec

msp-peak-total- jnxSpSvcSetIfMspPeakTotal
subs-active SubsActive

NAT SNMP MIBs

This section describes the jnxSrcNatStatsTable MIB objects.

Table 30 on page 159 describes the source NAT SNMP MIB objects for the MS-MPC services card. This
table exposes the source NAT translation attributes of the translated addresses.

Table 31 on page 160 describes the source NAT SNMP MIB objects for the MX-SPC3 services card. This
table contains information on source IP address translation only.
159

Table 30: MS-MPC Services Card Source NAT SNMP MIB Table (jnxSrcNatStatsTable)

jnxSrcNatStatsTable MIB Object Description

jnxNatSrcPoolName The name of dynamic source IP


address pool

jnxNatSrcXlatedAddrType V4 or V6. The type of dynamic


source IP address allocated from
the address pool used in the NAT
translation

jnxNatSrcPoolType The source port pool type indicates


whether the address translation is
done with port or without the port,
or if it is a static translation. Ex
napt-44, nat64 etc

jnxNatSrcNumPortAvail The number of ports available with


this pool

jnxNatSrcNumPortInuse The number of ports in use for this


NAT address entry

jnxNatSrcNumAddressAvail The total number of addresses


available in this pool

jnxNatSrcNumAddressInUse The number of addresses in use


from this pool

jnxNatSrcNumSessions The number of sessions are in use


based on this NAT address entry

jnxNatRuleTable This table monitors NAT rule hits

jnxNatRuleName NAT rule name


160

Table 30: MS-MPC Services Card Source NAT SNMP MIB Table (jnxSrcNatStatsTable) (Continued)

jnxSrcNatStatsTable MIB Object Description

jnxNatRuleType NAT types: Static Source, Static


Destination, Dynamic Source and
NAPT. Ex: napt44 etc

jnxNatRuleTransHits The number of hits on this NAT rule

jnxNatPoolTable This table monitors NAT pool hits

jnxNatPoolName NAT Pool name

jnxNatPoolType NAT types: Static Source, Static


Destination, Dynamic Source and
NAPT. Ex: napt44 etc

jnxNatPoolTransHits The number of hits on this NAT


Pool

Table 31: MX-SPC3 Source NAT SNMP MIB Table (jnxNatObjects)

jnxJsSrcNatStatsTable MIB Object Description

jnxJsNatSrcPoolName The name of dynamic source IP address


pool

jnxJsNatSrcXlatedAddrType New MIB. The type of dynamic source


IP address allocated from the address
pool used in the NAT translation. Value
is v4 or v6

jnxJsNatSrcPoolType withPAT or withoutPAT or static


161

Table 31: MX-SPC3 Source NAT SNMP MIB Table (jnxNatObjects) (Continued)

jnxJsSrcNatStatsTable MIB Object Description

jnxJsNatSrcNumPortAvail New MIB. The number of ports


available with this pool

jnxJsNatSrcNumPortInuse The number of ports in use for this


NAT address entry

jnxJsNatSrcNumSessions The number of sessions are in use


based on this NAT address entry

jnxJsNatSrcNumAddressAvail New MIB. The total number of


addresses available in this pool

jnxJsNatSrcNumAddressInuse New MIB. The number of addresses in


use from this pool

jnxJsNatRuleTable This table monitors NAT rule hits

jnxJsNatRuleName NAT rule name

jnxJsNatRuleType NAT types: Source, Destination and


Static

jnxJsNatRuleTransHits The number of hits on this NAT rule.


Status is deprecated. New -
jnxJsNatRuleHits

jnxJsNatRuleHits The number of hits on this NAT rule,

jnxJsNatRuleNumOfSessions The number of sessions on this NAT


rule
162

Table 31: MX-SPC3 Source NAT SNMP MIB Table (jnxNatObjects) (Continued)

jnxJsSrcNatStatsTable MIB Object Description

jnxJsNatTransType New MIB. Details below

jnxJsNatPoolTable This table monitors NAT pool hits

jnxJsNatPoolName NAT Pool name

jnxJsNatPoolType NAT types: Source, Destination and


Static

jnxJsNatPoolTransHits The number of hits on this NAT pool.


Status is deprecated. New -
jnxJsNatPoolHits

jnxJsNatPoolHits The number of hits on this NAT pool to


deprecate jnxJsNatRuleTransHits.

SNMP Traps

Table 32 on page 162 describes the SNMP traps supported by both the MS-MPC services card and the
MX-SPC3 services card.

Table 32: SNMP Traps

Trap Description

SPD_TRAP_OIDS(jnxSpSvcSetZoneEntered) jnxSpSvcSetZoneEntered — Indicates


that an AS PIC has entered a more
severe memory usage zone from a
less severe memory usage zone. The
zone entered is identified by
JnxSpSvcSetIfMemoryZone
163

Table 32: SNMP Traps (Continued)

Trap Description

SPD_TRAP_OIDS(jnxSpSvcSetZoneExited) jnxSpSvcSetZoneExited — Indicates


that an AS PIC has exited a more
severe memory usage zone to a less
severe memory usage zone. The zone
entered is identified by
JnxSpSvcSetIfMemoryZone.

SPD_TRAP_OIDS(jnxSpSvcSetCpuExceeded) jnxSpSvcSetCpuExceeded — Indicates


that an AS PIC has over 85% CPU
usage.

SPD_TRAP_OIDS(jnxSpSvcSetCpuOk) jnxSpSvcSetCpuOk — Indicates that


an AS PIC has returned to less than
85%CPU usage.

SPD_TRAP_OIDS(jnxSpSvcSetFlowLimitUtilized) jnxSpSvcSetFlowLimitUtilized —
Indicates a service-set has reached its
upper limit of flows threshold of a
maximun flows allowed for a service
set.

Configuring SNMP Trap Generation

This sections describes how to configure the MS-MPC service card versus the MX-SPC3 services card to
generate SNMP traps.

Configuring SNMP Trap for NAT Ports in a Source NAT Pool

If the current usage is above the raise threshold or below the clear threshold, we will generate a SNMP
trap.
164

Configuring SNMP Traps for NAT Ports in a Source NAT Pool on an MS-MPC

user@host# set services nat pool NAT_POOL_TEST snmp-trap-thresholds address-port low 50


user@host# set services nat pool NAT_POOL_TEST snmp-trap-thresholds address-port high 75

Configuring SNMP Traps for NAT Ports in a Source NAT Pool on an MX-SPC3

user@host# set services nat source pool NAT_POOL_TEST pool-utilization-alarm raise-threshold 50


user@host# set services nat source pool NAT_POOL_TEST pool-utilization-alarm clear-threshold 40

Configuring SNMP Trap for Sessions

This is infra trap which configures SNMP flow thresholds for all flows for a service set or flows for all
NAT pools configured for a service set.

Configuring a Sessions SNMP Trap on an MS-MPC

user@host# set services service-set SS_TEST max-flows 2m


user@host# set services service-set SS_TEST snmp-trap-thresholds flow low 50
user@host# set services service-set SS_TEST snmp-trap-thresholds flow high 75

Configuring a Sessions SNMP Trap on an MX-SPC3

user@host# set services service-set ss1 service-set-options session-limit maximum 2000


user@host# set services service-set ss1 snmp-trap-thresholds session low 50
user@host# set services service-set ss1 snmp-trap-thresholds session high 60

Example-Configuration for MX-SPC3 NAT for Three SNMP MIB Tables

Example Configuration

user@host> show services | display set


Configuration
=============
show services | display set
165

set services service-set ss1_nh_style1 nat-rule-sets rset1


set services service-set ss1_nh_style1 nat-rule-sets rset2
set services service-set ss1_nh_style1 nat-rule-sets rset5
set services service-set ss1_nh_style1 next-hop-service inside-service-interface
vms-0/0/0.1
set services service-set ss1_nh_style1 next-hop-service outside-service-
interface vms-0/0/0.2
set services nat source pool src_pool2_v6 address 300::0/128
set services nat source pool src_pool1 address 50.0.0.0/29
set services nat source rule-set rset1 rule nr1 match source-address 10.0.0.0/32
set services nat source rule-set rset1 rule nr1 match destination-address
20.0.0.0/32
set services nat source rule-set rset1 rule nr1 match application any
set services nat source rule-set rset1 rule nr1 then source-nat pool src_pool1
set services nat source rule-set rset1 match-direction input
set services nat source rule-set rset2 rule nr2_v6 match source-address 200::0/34
set services nat source rule-set rset2 rule nr2_v6 match destination-address
400::0/34
set services nat source rule-set rset2 rule nr2_v6 match application any
set services nat source rule-set rset2 rule nr2_v6 then source-nat pool
src_pool2_v6
set services nat source rule-set rset2 match-direction input
set services nat destination pool src_pool5_dnat address 20.0.0.0/30
set services nat destination rule-set rset5 rule nr5_dnat match destination-
address 21.0.0.0/30
set services nat destination rule-set rset5 rule nr5_dnat match application any
set services nat destination rule-set rset5 rule nr5_dnat then destination-nat
pool src_pool5_dnat
set services nat destination rule-set rset5 match-direction input
set services nat traceoptions file nat-trace.txt
set services nat traceoptions flag all

show snmp mib walk jnxJsSrcNatStatsTable

user@host>show snmp mib walk jnxJsSrcNatStatsTable


jnxJsNatSrcPoolName.2.112.49.0.0.0.0.0 = p1
jnxJsNatSrcXlatedAddrType.2.112.49.0.0.0.0.0 = 1
jnxJsNatSrcPoolType.2.112.49.0.0.0.0.0 = 1
jnxJsNatSrcNumPortInuse.2.112.49.0.0.0.0.0 = 0
jnxJsNatSrcNumSessions.2.112.49.0.0.0.0.0 = 0
jnxJsNatSrcNumPortAvail.2.112.49.0.0.0.0.0 = 10
166

jnxJsNatSrcNumAddressAvail.2.112.49.0.0.0.0.0 = 1
jnxJsNatSrcNumAddressInuse.2.112.49.0.0.0.0.0 = 0

show snmp mib walk jnxJsNatPoolTable

user@host>show snmp mib walk jnxJsNatPoolTable


jnxJsNatPoolName.9.115.114.99.95.112.111.111.108.49.1 = src_pool1
jnxJsNatPoolName.14.115.114.99.95.112.111.111.108.53.95.100.110.97.116.2 =
src_pool5_dnat
jnxJsNatPoolType.9.115.114.99.95.112.111.111.108.49.1 = 1
jnxJsNatPoolType.14.115.114.99.95.112.111.111.108.53.95.100.110.97.116.2 = 2
jnxJsNatPoolTransHits.9.115.114.99.95.112.111.111.108.49.1 = 0
jnxJsNatPoolTransHits.14.115.114.99.95.112.111.111.108.53.95.100.110.97.116.2 = 0
jnxJsNatPoolHits.9.115.114.99.95.112.111.111.108.49.1 = 0
jnxJsNatPoolHits.14.115.114.99.95.112.111.111.108.53.95.100.110.97.116.2 = 0
jnxJsNatPoolUtil.9.115.114.99.95.112.111.111.108.49.1 = 0
jnxJsNatPoolUtil.14.115.114.99.95.112.111.111.108.53.95.100.110.97.116.2 = 0

show snmp mib walk jnxJsNatRuleTable

user@host>show snmp mib walk jnxJsNatRuleTable


jnxJsNatRuleName.3.110.114.49.1 = nr1
jnxJsNatRuleName.6.110.114.50.95.118.54.1 = nr2_v6
jnxJsNatRuleName.8.110.114.53.95.100.110.97.116.2 = nr5_dnat
jnxJsNatRuleType.3.110.114.49.1 = 1
jnxJsNatRuleType.6.110.114.50.95.118.54.1 = 1
jnxJsNatRuleType.8.110.114.53.95.100.110.97.116.2 = 2
jnxJsNatRuleTransHits.3.110.114.49.1 = 0
jnxJsNatRuleTransHits.6.110.114.50.95.118.54.1 = 0
jnxJsNatRuleTransHits.8.110.114.53.95.100.110.97.116.2 = 0
jnxJsNatRuleHits.3.110.114.49.1 = 0
jnxJsNatRuleHits.6.110.114.50.95.118.54.1 = 0
jnxJsNatRuleHits.8.110.114.53.95.100.110.97.116.2 = 0
jnxJsNatRuleNumOfSessions.3.110.114.49.1 = 0
jnxJsNatRuleNumOfSessions.6.110.114.50.95.118.54.1 = 0
jnxJsNatRuleNumOfSessions.8.110.114.53.95.100.110.97.116.2 = 0
jnxJsNatTransType.3.110.114.49.1 = 13
jnxJsNatTransType.6.110.114.50.95.118.54.1 = 22
jnxJsNatTransType.8.110.114.53.95.100.110.97.116.2 = 13
167

SNMP Trace Logs for Traps

This section provides some example trace logs for these SNMP traps.

CPU-Utilization Trap

Mar 20 15:07:52.575680 snmpd[0] <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<


Mar 20 15:07:52.575697 snmpd[0] <<< V2 Trap
Mar 20 15:07:52.575714 snmpd[0] <<< Source: 10.48.12.170
Mar 20 15:07:52.575730 snmpd[0] <<< Destination: 190.1.1.1
Mar 20 15:07:52.575745 snmpd[0] <<< Version: SNMPv2
Mar 20 15:07:52.575761 snmpd[0] <<< Community: rtlogd_trap
Mar 20 15:07:52.575777 snmpd[0] <<<
Mar 20 15:07:52.575807 snmpd[0] <<< OID : sysUpTime.0
Mar 20 15:07:52.575824 snmpd[0] <<< type : TimeTicks
Mar 20 15:07:52.575841 snmpd[0] <<< value: (7605999) 21:07:39.99
Mar 20 15:07:52.575856 snmpd[0] <<<
Mar 20 15:07:52.575878 snmpd[0] <<< OID : snmpTrapOID.0
Mar 20 15:07:52.575894 snmpd[0] <<< type : Object
Mar 20 15:07:52.575915 snmpd[0] <<< value: jnxSpSvcSetCpuExceeded
Mar 20 15:07:52.575945 snmpd[0] <<<
Mar 20 15:07:52.575968 snmpd[0] <<< OID : jnxSpSvcSetIfCpuUtil.4294967295
Mar 20 15:07:52.575984 snmpd[0] <<< type : Gauge
Mar 20 15:07:52.576000 snmpd[0] <<< value: 45
Mar 20 15:07:52.576015 snmpd[0] <<<
Mar 20 15:07:52.576033 snmpd[0] <<< OID : jnxSpSvcSetIfTableName.4294967295
Mar 20 15:07:52.576049 snmpd[0] <<< type : OctetString
Mar 20 15:07:52.576066 snmpd[0] <<< value: "ms-2/0/0"
Mar 20 15:07:52.576085 snmpd[0] <<< HEX : 6d 73 2d 32 2f 30 2f 30
Mar 20 15:07:52.576100 snmpd[0] <<<
Mar 20 15:07:52.576118 snmpd[0] <<< OID : snmpTrapEnterprise.0
Mar 20 15:07:52.576134 snmpd[0] <<< type : Object
Mar 20 15:07:52.576155 snmpd[0] <<< value: jnxProductNameMX480
Mar 20 15:07:52.576169 snmpd[0] <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Memoryzone Trap

Mar 21 10:53:31.550471 snmpd[0] <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<


Mar 21 10:53:31.550491 snmpd[0] <<< V2 Trap
168

Mar 21 10:53:31.550507 snmpd[0] <<< Source: 10.48.12.170


Mar 21 10:53:31.550522 snmpd[0] <<< Destination: 190.1.1.1
Mar 21 10:53:31.550536 snmpd[0] <<< Version: SNMPv2
Mar 21 10:53:31.550551 snmpd[0] <<< Community: rtlogd_trap
Mar 21 10:53:31.550566 snmpd[0] <<<
Mar 21 10:53:31.550585 snmpd[0] <<< OID : sysUpTime.0
Mar 21 10:53:31.550600 snmpd[0] <<< type : TimeTicks
Mar 21 10:53:31.550616 snmpd[0] <<< value: (6076788) 16:52:47.88
Mar 21 10:53:31.550631 snmpd[0] <<<
Mar 21 10:53:31.550649 snmpd[0] <<< OID : snmpTrapOID.0
Mar 21 10:53:31.550664 snmpd[0] <<< type : Object
Mar 21 10:53:31.550681 snmpd[0] <<< value: jnxSpSvcSetZoneEntered
Mar 21 10:53:31.550695 snmpd[0] <<<
Mar 21 10:53:31.550714 snmpd[0] <<< OID : jnxSpSvcSetIfMemoryZone.4294967295
Mar 21 10:53:31.550729 snmpd[0] <<< type : Number
Mar 21 10:53:31.550744 snmpd[0] <<< value: 2
Mar 21 10:53:31.550758 snmpd[0] <<<
Mar 21 10:53:31.550776 snmpd[0] <<< OID : jnxSpSvcSetIfTableName.4294967295
Mar 21 10:53:31.550791 snmpd[0] <<< type : OctetString
Mar 21 10:53:31.550806 snmpd[0] <<< value: "ms-2/0/0"
Mar 21 10:53:31.550824 snmpd[0] <<< HEX : 6d 73 2d 32 2f 30 2f 30
Mar 21 10:53:31.550838 snmpd[0] <<<
Mar 21 10:53:31.550856 snmpd[0] <<< OID : snmpTrapEnterprise.0
Mar 21 10:53:31.550871 snmpd[0] <<< type : Object
Mar 21 10:53:31.550888 snmpd[0] <<< value: jnxProductNameMX480
Mar 21 10:53:31.550901 snmpd[0] <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

Session Limit Trap

Mar 21 10:53:31.551133 snmpd[0] <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<


Mar 21 10:53:31.551152 snmpd[0] <<< V2 Trap
Mar 21 10:53:31.551168 snmpd[0] <<< Source: 10.48.12.170
Mar 21 10:53:31.551184 snmpd[0] <<< Destination: 190.1.1.1
Mar 21 10:53:31.551197 snmpd[0] <<< Version: SNMPv2
Mar 21 10:53:31.551212 snmpd[0] <<< Community: rtlogd_trap
Mar 21 10:53:31.551228 snmpd[0] <<<
Mar 21 10:53:31.551246 snmpd[0] <<< OID : sysUpTime.0
Mar 21 10:53:31.551262 snmpd[0] <<< type : TimeTicks
Mar 21 10:53:31.551278 snmpd[0] <<< value: (6076788) 16:52:47.88
Mar 21 10:53:31.551292 snmpd[0] <<<
169

Mar 21 10:53:31.551311 snmpd[0] <<< OID : snmpTrapOID.0


Mar 21 10:53:31.551326 snmpd[0] <<< type : Object
Mar 21 10:53:31.551343 snmpd[0] <<< value: jnxSpSvcSetFlowLimitUtilised
Mar 21 10:53:31.551358 snmpd[0] <<<
Mar 21 10:53:31.551376 snmpd[0] <<< OID : jnxSpSvcSetFlowLimitUtil.0
Mar 21 10:53:31.551391 snmpd[0] <<< type : Number
Mar 21 10:53:31.551406 snmpd[0] <<< value: 45
Mar 21 10:53:31.551421 snmpd[0] <<<
Mar 21 10:53:31.551439 snmpd[0] <<< OID : jnxSpSvcSetNameUtil.0
Mar 21 10:53:31.551454 snmpd[0] <<< type : OctetString
Mar 21 10:53:31.551471 snmpd[0] <<< HEX : 20 bc 55 88 01
Mar 21 10:53:31.551486 snmpd[0] <<<
Mar 21 10:53:31.551503 snmpd[0] <<< OID : snmpTrapEnterprise.0
Mar 21 10:53:31.551518 snmpd[0] <<< type : Object
Mar 21 10:53:31.551535 snmpd[0] <<< value: jnxProductNameMX480
Mar 21 10:53:31.551549 snmpd[0] <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

RELATED DOCUMENTATION

SNMP MIB Explorer


Explore System Log Messages
2 PART

Carrier Grade NAT (CGNAT)

Deterministic NAT Overview and Configuration | 172

Dynamic Address-Only Source NAT Overview and Configuration | 183

Network Address Port Translation Overview and Configuration | 188

NAT46 | 198

Stateful NAT64 Overview and Configuration | 202

IPv4 Connectivity Across IPv6-Only Network Using 464XLAT Overview and


Configuration | 213

IPv6 NAT Protocol Translation (NAT PT) | 224

Stateless Source Network Prefix Translation for IPv6 Overview and


Configuration | 227

Transitioning to IPv6 Using Softwires | 232

Transitioning to IPv6 Using DS-Lite Softwires | 239

Reducing Traffic and Bandwidth Requirements Using Port Control Protocol | 254

Transitioning to IPv6 Using Mapping of Address and Port with Encapsulation


(MAP-E) | 264

Monitoring and Troubleshooting Softwires | 276

Port Forwarding Overview and Configuration | 281

Port Translation Features Overview and Configuration | 290

Static Source NAT Overview and Configuration | 294

Static Destination NAT Overview and Configuration | 299

Twice NAPT Overview and Configuration | 304


Twice NAT Overview and Configuration | 314

Class of Service Overview and Configuration | 327


172

CHAPTER 5

Deterministic NAT Overview and Configuration

IN THIS CHAPTER

Deterministic NAPT Overview for Next Gen Services | 172

Configuring Deterministic NAPT for Next Gen Services | 177

Deterministic NAPT Overview for Next Gen Services

IN THIS SECTION

Benefits of Deterministic NAPT | 173

Understanding Deterministic NAPT Algorithms | 173

Deterministic NAPT Restrictions | 176

Under Next Gen Services with the MX-SPC3, you can configure both Deterministic NAPT44 and
NAPT64 services. Next Gen Services deterministic NAPT services use an algorithm to allocate blocks of
destination ports.

Next Gen Services deterministic NAPT44 service ensures that the original source IPv4 address and port
always map to the same post-NAT IPv4 address and port range, and that the reverse mapping of a given
translated external IPv4 address and port are always mapped to the same internal IPv4 address.

Next Gen Services deterministic NAPT64 service ensures that the original source IPv6 address and port
always map to the same post-NAT IPv4 address and port range, and that the reverse mapping of a given
translated external IPv4 address and port are always mapped to the same internal IPv6 address.

For detailed information on how to configure deterministic NAPT, see "Configuring Deterministic NAPT
for Next Gen Services" on page 177.
173

Benefits of Deterministic NAPT

• Eliminates the need for address translation logging because an IP address is always mapped to the
same external IP address and port range, and the reverse mapping of a given translated external IP
address and port are always mapped to the same internal IP address.

Understanding Deterministic NAPT Algorithms

The effectiveness of your implementation of deterministic NAPT depends on your analysis of your
subscriber requirements. The block size you provide indicates how many ports will be made available for
each incoming subscriber address from the range in the from clause specified in the applicable NAT rule.
The allocation algorithm computes an offset value to determine the outgoing IP address and port. A
reverse algorithm is used to derive the originating subscriber address.

NOTE: In order to track subscribers without using logs, an ISP must use a reverse algorithm to
derive a subscriber (source) addresses from a translated address.

The following variables are used in forward calculation (private subscriber IP address to public IP
address) and reverse calculation (public IP address to private subscriber IP address):

• Pr_Prefix—Any pre-NAT IPv4 subscriber address.

• Pr_Port—Any pre-NAT protocol port.

• Block_Size—Number of ports configured to be available for each Pr_Prefix.

If block-size is configured as zero, the method for computing the block size is computed as follows:

block-size = int(64512/ceil[(Nr_Addr_PR_Prefix/Nr_Addr_PU_Prefix)])

where 64512 is the maximum available port range per public IP address.

• Base_PR_Prefix—First usable pre-NAT IPv4 subscriber address in a from clause of the NAT rule.

• Base_PU_Prefix—First usable post-NAT IPv4 subscriber address configured in the NAT pool.

• Pu_Port_Range_Start—First usable post-NAT port. This is 1024.

• Pr_Offset—The offset of the pre-NAT IP address that is being translated from the first usable pre-
NAT IPv4 subscriber address in a from clause of the NAT rule. PR_Offset = Pr_Prefix –
Base_Pr_Prefix.

• PR_Port_Offset—Offset of the pre-NAT IP address multiplied by the block size. PR_Port_Offset =


Pr_Offset * Block_Size.
174

• Pu_Prefix—Post-NAT address for a given Pr_Prefix.

• Pu_Start_Port—Post-NAT start port for a flow from a given Pr_Prefix

• Pu_Actual_Port—Post-NAT port seen on a reverse flow.

• Nr_Addr_PR_Prefix — Number of usable pre-NAT IPv4 subscriber addresses in a from clause of the
NAT rule.

• Nr_Addr_PU_Prefix — Number of usable post-NAT IPv4 addresses configured in the NAT pool.

• Rounded_Port_Range_Per_IP — Number of ports available for each post-NAT IP address.


Rounded_Port_Range_Per_IP = ceil[(Nr_Addr_PR_Prefix/Nr_Addr_PU_Prefix)] * Block_Size.

• Pu_Offset—Offset of the post-NAT IP address from the first usable post-NAT address. Pu_Offset =
Pu_Prefix – Base_Pu_Prefix.

• Pu_Port_Offset— Offset of the post-NAT port from 1024 added to the product of the offset of the
post-NAT IP address and the number of ports available for each post-NAT IP address.
Pu_Port_Offset = (Pu_Offset * Rounded_Port_Range_Per_IP) + (Pu_Actual_Port –
Pu_Port_Range_Start).

Algorithm Usage–Assume the following configurations:

services {
nat {
source {
pool src-pool {
address 203.0.113.0/16;
port {
automatic {
random-allocation;
}
deterministic {
block-size 249;
host address 10.1.0.1/16;
}
}
}
rule-set set1 {
rule det-nat {
match-direction-input;
match {
source-address 10.1.0.0/16;
}
175

then {
source-nat {
pool src-pool;
}
}
}
}
}
}
}

Forward Translation

1. Pr_Offset = Pr_Prefix – Base_Pr_Prefix

2. Pr_Port_Offset = Pr_Offset * Block_Size

3. Rounded_Port_Range_Per_IP = ceil[(Nr_Addr_PR_Prefix/Nr_Addr_PU_Prefix)] * Block_Size

4. Pu_Prefix = Base_Public_Prefix + floor(Pr_Port_Offset / Rounded_Port_Range_Per_IP)

5. Pu_Start_Port = Pu_Port_Range_Start + (Pr_Port_Offset % Rounded_Port_Range_Per_IP)

Using the sample configuration and assuming a subscriber flow sourced from 10.1.1.250:5000:

1. Pr_Offset = 10.1.1.250 – 10.1.0.1 = 505

2. Pr_Port_Offset = 505 * 249 = 125,745

3. Rounded_Port_Range_Per_IP = ceil[(65, 533/254)] * 249 = 259 * 249 = 64,491

4. Pu_Prefix = 203.0.113.1 + floor(125,745 /64,491) = 203.0.113.1 +1 = 203.0.113.2

5. Pu_Start_Port = 1,024 + (125,745 % 64,491) = 62278

• 10.1.1.250 is translated to 203.0.113.2.

• The starting port is 62278. There are 249 ports available to the subscriber based on the
configured block size. The available port range spans ports 62278 through 62526 (inclusive).

• The specific flow 10.1.1.250:5000 randomly assigns any of the ports in its range because random
allocation was specified.

Reverse Translation

1. Pu_Offset = Pu_Prefix – Base_Pu_Prefix


176

2. Pu_Port_Offset = (Pu_Offset * Rounded_Port_Range_Per_IP) + (Pu_Actual_Port –


Pu_Port_Range_Start)

3. Subscriber_IP = Base_Pr_Prefix + floor(Pu_Port_Offset / Block_Size)

The reverse translation is determined as follows. Assume a flow returning to 203.0.113.2:62278.

1. Pu_Offset = 203.0.113.2 – 203.0.113.1 = 1

2. Pu_Port_Offset = (1 * 64,491) + (62,280 - 1024) = 125,747

3. Subscriber_IP = 10.1.0.1 + floor(125,747 / 249) = 10.1.0.1 + 505 = 10.1.1.250

NOTE: In reverse translation, only the original private IP address can be derived, and not the
original port in use. This is sufficiently granular for law enforcement requirements.

When you have configured deterministic NAPT, you can use the show services nat deterministic-
nat internal-host and show services nat deterministic-nat nat-port-block commands to
show forward and reverse mapping. However, mappings will change if you reconfigure your
deterministic port block allocation block size or the from clause for your NAT rule. In order to provide
historical information on mappings, we recommend that you write scripts that can show specific
mappings for prior configurations.

Deterministic NAPT Restrictions

When you configure deterministic NAPT, be aware of the following:

• For IPv6 deterministic NAT64 host address configuration, we support the last 32-bit (4 byte) change
of the IPv6 host prefix. This means we only can configure /96 prefix masks for IPv6 address, which
supports a maximum address number of 232 for one IPv6 prefix. The host address is specified at the
[services nat source pool p1 port deterministic host] configuration hierarchy.

• Usually, the number of address in host-range should be more than the number of address in pool.


BEST PRACTICE: We don’t recommend the host address number be configured to exceed the
total port block resource number because some hosts may not receive a port block resource
successfully.

• The minimum block size for deterministic NAT is 1. If you configure a smaller block size, the commit
fails. If the block size is configured to 0, the block size will be automatically calculated based on host
number and translated address number. If the calculated block size is less than 1, the commit fails.
177

• For Next Gen Services deterministic NAPT, you can configure a mix of IPv4 and IPv6 host addresses
together in a NAT pool in either a host address or an address name list, However. the total host
prefix number cannot exceed 1000.

• You cannot configure an address range or DNS name in a host address book name.

• The configured host address prefix and host address book name are merged together if its prefixes
are overlapped. You can use the show services nat source deterministic operational command to
show the merged prefixes.


BEST PRACTICE: We recommend, you keep subscriber host addresses consistent with
multiple rule’s matching the source address prefix, if the same deterministic NAT pool is used
across multiple rules; otherwise, traffic from hosts which are not configured in the NAT pool,
even it matches the NAT rule, may not allocate the port successfully.

• For Next Gen Services NAPT services, the total number of host addresses configured must be greater
than or equal to the deterministic NAT port blocks available.

RELATED DOCUMENTATION

Configuring Deterministic NAPT for Next Gen Services | 177

Configuring Deterministic NAPT for Next Gen Services

IN THIS SECTION

Configuring the NAT Pool for Deterministic NAPT for Next Gen Services | 178

Configuring the NAT Rule for Deterministic NAPT44 for Next Gen Services | 179

Configuring the NAT Rule for Deterministic NAPT64 for Next Gen Services | 181

Configuring the Service Set for Deterministic NAT for Next Gen Services | 181

Clearing the Don’t Fragment Bit | 182

To configure deterministic NAPT on Next Gen Services, perform the following:


178

Configuring the NAT Pool for Deterministic NAPT for Next Gen Services
To configure the NAT pool for deterministic NAPT:

1. Create a pool.

user@host# edit services nat source pool nat-pool-name

2. Define the addresses or subnets to which source addresses are translated.

[edit services nat source pool nat-pool-name]


user@host# set address address-prefix

or

[edit services nat source pool nat-pool-name]


user@host# set address address-prefix to address address-prefix

3. Configure deterministic port block allocation for the pool.

[edit services nat source pool nat-pool-name port]


user@host# set deterministic

4. If you want the lowest and highest IPv4 addresses (the network and broadcast addresses) in the
source address range of a NAT rule to be translated when the NAT pool is used, configure include-
boundary-address.

[edit services nat source pool nat-pool-name port deterministic]


user@host# set include-boundary-addresses

5. Configure the port block size. The range is 1 to 64,512. The default block size is 256.

[edit services nat source pool nat-pool-name port deterministic]


user@host# set block-size block-size
179

6. Configure the first usable pre-NAT subscriber address, which is used in calculating the offset value
for a pre-NAT address that is being translated. This offset is used to perform the deterministic NAT
mapping.

[edit services nat source pool nat-pool-name port deterministic]


user@host# set host address host-addr

7. Configure the interval at which the syslog is generated for the deterministic NAT configuration.

[edit services nat source pool nat-pool-name port deterministic]


user@host# set deterministic-nat-configuration-log-interval seconds

8. To configure automatic port assignment for the pool, specify either random allocation or round-robin
allocation.

[edit services nat source pool nat-pool-name port]


user@host# set automatic (random-allocation | round-robin)

Random allocation randomly assigns a port from the range 1024 through 65535 for each port
translation. Round robin allocation first assigns port 1024, and uses the next higher port for each
successive port assignment. Round robin allocation is the default.
9. To disable round-robin port allocation for all NAT pools that do not specify an automatic (random-
allocation | round-robin) setting, configure the global setting.

[edit services nat source]


user@host# set port-round-robin disable

SEE ALSO

Network Address Translation Configuration Overview

Configuring the NAT Rule for Deterministic NAPT44 for Next Gen Services
To configure the NAT rule for deterministic NAPT44:
180

1. Configure the NAT rule name.

[edit services nat source]


user@host# set rule-set rule-set-name rule rule-name

2. Specify the traffic direction to which the NAT rule set applies.

[edit services nat source rule-set rule-set-name]


user@host# set match-direction (in | out | in-out)

3. Specify the addresses that are translated by the source NAT rule.
To specify one address or prefix value:

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match source-address address

To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:

[edit services address-book global]


user@host# set address address-name range-address lower-limit to upper-limit
[edit services nat source rule-set rule-set-name rule rule-name]
user@host# set match source-address-name address-name

To specify any unicast address:

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match source-address any-unicast

4. Specify one or more application protocols to which the NAT rule applies. The number of applications
listed in the rule must not exceed 3072.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match application [application-name]
181

5. Specify the NAT pool that contains the addresses for translated traffic.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set then source-nat pool nat-pool-name

Configuring the NAT Rule for Deterministic NAPT64 for Next Gen Services
To configure the NAT rule for deterministic NAPT64:

1. Configure the source NAT rule name.

[edit services nat source]


user@host# set rule-set rule-set-name rule rule-name

2. Specify the traffic direction to which the NAT rule set applies.

[edit services nat source rule-set rule-set-name]


user@host# set match-direction (in | out | in-out)

3. Specify the IPv6 prefix for the source addresses that are translated by the NAT rule.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match source-address address

4. Specify one or more application protocols to which the NAT rule applies. The number of application
terms must not exceed 3072.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match application [application-name]

5. Specify the NAT source pool that contains the addresses for translated source addresses.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set then source-nat pool nat-pool-name

Configuring the Service Set for Deterministic NAT for Next Gen Services
To configure the service set for deterministic NAPT:
182

1. Define the service set.

[edit services]
user@host# edit service-set service-set-name

2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.

[edit services service-set service-set-name]


user@host# set interface-service service-interface interface-name

or

[edit services service-set service-set-name]


user@host# set next-hop-service inside-service-interface interface-name outside-service-interface
interface-name

3. Specify the NAT rule sets to be used with the service set.

[edit services service-set service-set-name]


user@host# set nat-rule-sets rule-set-name

Clearing the Don’t Fragment Bit


If you configured deterministic NAPT64, specify that the don’t fragment (DF) bit for IPv4 packet headers
is cleared when the packet length is less than 1280 bytes.

[edit services nat natv6v4]


user@host# set clear-dont-fragment-bit

This prevents unnecessary creation of an IPv6 fragmentation header when translating IPv4 packets that
are less than 1280 bytes.

RELATED DOCUMENTATION

Deterministic NAPT Overview for Next Gen Services | 172


183

CHAPTER 6

Dynamic Address-Only Source NAT Overview and


Configuration

IN THIS CHAPTER

Dynamic Address-Only Source Translation Overview | 183

Configuring Dynamic Address-Only Source NAT for Next Gen Services | 184

Dynamic Address-Only Source Translation Overview

IN THIS SECTION

Benefits of Dynamic Address-Only Source Translation | 183

With dynamic address-only translation, you can map a private IP source address to a public IP address. A
public address is picked up dynamically from a source NAT pool, and the mapping from the original
source address to the translated source address is maintained as long as there is at least one active flow
that uses this mapping. The port is not mapped.

Benefits of Dynamic Address-Only Source Translation

• Allows hosts in the private network to connect with the external domain, while hiding the private
network.

• Allows a few public IP addresses to be used by several private hosts

RELATED DOCUMENTATION

Configuring Dynamic Address-Only Source NAT for Next Gen Services | 184
184

Configuring Dynamic Address-Only Source NAT for Next Gen Services

IN THIS SECTION

Configuring the Source Pool for Dynamic Address-Only Source NAT | 184

Configuring the NAT Source Rule for Dynamic Address-Only Source NAT | 185

Configuring the Service Set for Dynamic Address-Only Source NAT | 187

Configuring the Source Pool for Dynamic Address-Only Source NAT


To configure the source pool for dynamic address-only source NAT:

1. Create a source pool.

user@host# edit services nat source pool nat-pool-name

2. Define the addresses or subnets to which source addresses are translated.

[edit services nat source pool nat-pool-name]


user@host# set address address-prefix

or

[edit services nat source pool nat-pool-name]


user@host# set address address-prefix to address address-prefix

3. Disable port translation.

[edit services nat source pool nat-pool-name]


user@host# set port no-translation

4. Define the NAT pool utilization levels that trigger SNMP traps. The raise-threshold is the pool
utilization percentage that triggers the trap, and the range is 50 through 100. The clear-threshold is
185

the pool utilization percentage that clears the trap, and the range is 40 through 100. The utilization is
based on the number of addresses that are used.

[edit services nat source pool nat-pool-name]


user@host# set pool-utilization-alarm raise-threshold value
user@host# set pool-utilization-alarm clear-threshold value

If you do not configure pool-utilization-alarm, traps are not created.


5. To allow the IP addresses of a NAT source pool or destination pool to overlap with IP addresses in
pools used in other service sets, configure allow-overlapping-pools.

[edit services nat]


user@host# set allow-overlapping-pools

Configuring the NAT Source Rule for Dynamic Address-Only Source NAT
To configure the NAT source rule for dynamic address-only source NAT:

1. Configure the NAT rule name.

[edit services nat source]


user@host# set rule-set rule-set-name rule rule-name

2. Specify the traffic direction to which the NAT rule set applies.

[edit services nat source rule-set rule-set-name]


user@host# set match-direction (in | out | in-out)

3. Specify the addresses that are translated by the source NAT rule.
To specify one address or prefix value:

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match source-address address
186

To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:

[edit services address-book global]


user@host# set address address-name range-address lower-limit to upper-limit
[edit services nat source rule-set rule-set-name rule rule-name]
user@host# set match source-address-name address-name

To specify any unicast address:

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match source-address any-unicast

4. Specify one or more application protocols to which the NAT rule applies. The number of applications
listed in the rule must not exceed 3072.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match application [application-name]

5. Specify the NAT pool that contains the addresses for translated traffic.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set then source-nat pool nat-pool-name

6. Configure the address-pooling paired feature if you want to ensure assignment of the same external
IP address for all sessions originating from the same internal host.

[edit services nat source rule-set rule-set-name rule rule-name then source-
nat mapping-type]
user@host# set address-pooling-paired

7. Specify the timeout period for address-pooling-paired mappings that use the NAT pool. The range is
120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this amount of
time are dropped.

[edit services nat source pool nat-pool-name]


user@host# set mapping-timeout mapping-timeout
187

If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.
8. Configure the generation of a syslog when traffic matches the NAT rule conditions.

[edit services nat source rule-set rule-set-name rule rule-name then]


user@host# set syslog

Configuring the Service Set for Dynamic Address-Only Source NAT


To configure the service set for dynamic address-only source NAT:

1. Define the service set.

[edit services]
user@host# edit service-set service-set-name

2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.

[edit services service-set service-set-name]


user@host# set interface-service service-interface interface-name

or

[edit services service-set service-set-name]


user@host# set next-hop-service inside-service-interface interface-name outside-service-interface
interface-name

3. Specify the NAT rule sets to be used with the service set.

[edit services service-set service-set-name]


user@host# set nat-rule-sets rule-set-name

RELATED DOCUMENTATION

Dynamic Address-Only Source Translation Overview | 183


188

CHAPTER 7

Network Address Port Translation Overview and


Configuration

IN THIS CHAPTER

Network Address Port Translation (NAPT) Overview | 188

Configuring Network Address Port Translation for Next Gen Services | 189

Configuring Syslog Events for NAT Rule Conditions with Next Gen Services | 196

Network Address Port Translation (NAPT) Overview

IN THIS SECTION

Benefits of NAPT | 189

NAPT translates a private source IP address to an external source address and port. Multiple private IP
addresses can be mapped to the same external address because each private address is mapped to a
different port of the external address.

With NAPT, you can configure up to 32 external address ranges, and map up to 65,536 private
addresses to each external address.

NAPT supports the following:

• Round-robin port and address allocation (see "Round-Robin Port Allocation" on page 292).

• Address pooling and endpoint independent mapping (see "Address Pooling and Endpoint
Independent Mapping for Port Translation" on page 290).

• Secured port block allocation (see "Secured Port Block Allocation for Port Translation" on page 293
189

Benefits of NAPT

• Allows hosts in the private network to connect with the external domain, while hiding the private
network.

• Minimizes the number of public IP addresses that are allocated for NAT.

Configuring Network Address Port Translation for Next Gen Services

IN THIS SECTION

Configuring the Source Pool for NAPT | 189

Configuring the NAT Source Rule for NAPT | 193

Configuring the Service Set for NAPT | 195

Configuring the Source Pool for NAPT


To configure the source pool for NAPT:

1. Create a source pool.

user@host# edit services nat source pool nat-pool-name

2. Define the addresses or subnets to which source addresses are translated.

[edit services nat source pool nat-pool-name]


user@host# set address address-prefix

or

[edit services nat source pool nat-pool-name]


user@host# set address address-prefix to address address-prefix
190

3. To configure automatic port assignment for the pool, specify either random allocation or round-
robin allocation. Round-robin allocation is the default.

[edit services nat source pool nat-pool-name port]


user@host# set automatic (random-allocation | round-robin)

Random allocation randomly assigns a port from the range 1024 through 65535 for each port
translation. Round-robin allocation first assigns port 1024, and uses the next higher port for each
successive port assignment.
4. To disable round-robin port allocation for all NAT pools that do not specify an automatic (random-
allocation | round-robin) setting, configure the global setting.

[edit services nat source]


user@host# set port-round-robin disable

5. To configure a range of ports to assign to a pool, perform the following:

NOTE: If you specify a range of ports to assign, the automatic statement is ignored.

a. Specify the low and high values for the port. If you do not configure automatic port assignment,
you must configure a range of ports.

[edit services nat source pool nat-pool-name port]


user@host# set range port-low to port-high

b. Specify either random allocation or round-robin allocation. Round-robin allocation is the default.

[edit services nat source pool nat-pool-name port range]


user@host# set (random-allocation | round-robin)

6. Assign a port within the same range as the incoming port—either 0 through 1023 or 1024 through
65,535. This feature is not available if you configure port-block allocation.

[edit services nat source pool nat-pool-name port]


user@host# set preserve-range
191

7. Assign a port with the same parity (even or odd) as the incoming source port. This feature is not
available if you configure port-block allocation.

[edit services nat source pool nat-pool-name port]


user@host# set preserve-parity

8. Configure a global default port range for NAT pools that use port translation. This port range is
used when a NAT pool does not specify a port range and does not specify automatic port
assignment. The global port range can be from 1024 through 65,535.

[edit services nat source]


user@host# set pool-default-port-range port-low to port-high

9. If you want to allocate a block of ports for each subscriber to use for NAPT, configure port-block
allocation:
a. Configure the number of ports in a block. The range is 1 through 64,512 and the default is 128.

[edit services nat source pool nat-pool-name port]


user@host# set block-allocation block-size block-size

b. Configure the interval, in seconds, for which the block is active. After the timeout, a new block is
allocated, even if ports are available in the active block. If you set the timeout to 0, port blocks
are filled completely before a new port block is allocated, and the last port block remains active
indefinitely. The range is 0 through 86,400, and the default is 0.

[edit services nat source pool nat-pool-name port block-allocation]


user@host# set active-block-timeout timeout-interval

c. Specify the timeout period for address-pooling paired mappings that use the NAT pool. The
range is 120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this
amount of time are dropped.

[edit services nat source pool nat-pool-name]


user@host# set mapping-timeout mapping-timeout

If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.
192

d. Configure the maximum number of blocks that can be allocated to a user address. The range is 1
through 512, and the default is 8.

[edit services nat source pool nat-pool-name port block-allocation]


user@host# set maximum-blocks-per-host maximum-block-number

e. Specify how often to send interim system logs for active port blocks and for inactive port blocks
with live sessions. This increases the reliability of system logs, which are UDP-based and can get
lost in the network. The range is 1800 through 86,400 seconds, and the default is 0 (interim logs
are disabled).

[edit services nat source pool nat-pool-name port block-allocation]


user@host# set interim-logging-interval timeout-interval

10. Specify the timeout period for endpoint independent translations that use the specified NAT pool.
Mappings that are inactive for this amount of time are dropped. The range is 120 through 86,400
seconds. If you do not configure ei-mapping-timeout, then the mapping-timeout value is used for
endpoint independent translations.

[edit services nat source pool nat-pool-name]


user@host# set ei-mapping-timeout ei-mapping-timeout

11. Specify the timeout period for address-pooling paired mappings that use the NAT pool. The range
is 120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this amount
of time are dropped.

[edit services nat source pool nat-pool-name]


user@host# set mapping-timeout mapping-timeout

If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.
12. Define the NAT pool utilization levels that trigger SNMP traps. The raise-threshold is the pool
utilization percentage that triggers the trap, and the range is 50 through 100. The clear-threshold is
the pool utilization percentage that clears the trap, and the range is 40 through 100. For pools that
use port-block allocation, the utilization is based on the number of ports that are used; for pools
193

that do not use port-block allocation, the utilization is based on the number of addresses that are
used.

[edit services nat source pool nat-pool-name]


user@host# set pool-utilization-alarm raise-threshold value
user@host# set pool-utilization-alarm clear-threshold value

If you do not configure pool-utilization-alarm, traps are not created.


13. To allow the IP addresses of a NAT pool to overlap with IP addresses in pools used in other service
sets, configure allow-overlapping-pools. However, pools that configure port-block allocation must
not overlap with other pools.

[edit services nat]


user@host# set allow-overlapping-pools

Configuring the NAT Source Rule for NAPT


To configure the NAT source rule for NAPT:

1. Configure the NAT rule name.

[edit services nat source]


user@host# edit rule-set rule-set-name rule rule-name

2. Specify the traffic direction to which the NAT rule set applies.

[edit services nat source rule-set rule-set-name]


user@host# set match-direction (in | out | in-out)

3. Specify the source addresses that are translated by the source NAT rule.
To specify one address or prefix value:

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match source-address address
194

To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:

[edit services address-book global]


user@host# set address address-name range-address lower-limit to upper-limit
[edit services nat source rule-set rule-set-name rule rule-name]
user@host# set match source-address-name address-name

To specify any unicast address:

[edit services nat source rule-set rule-set-name rule rule-name rule rule-
name]
user@host# set match source-address any-unicast

4. Specify one or more application protocols to which the NAT rule applies. The number of applications
listed in the rule must not exceed 3072.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match application [application-name]

5. Specify the NAT pool that contains the addresses for translated traffic.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set then source-nat pool nat-pool-name

6. Configure the address-pooling paired feature if you want to ensure assignment of the same external
IP address for all sessions originating from the same internal host.

[edit services nat source rule-set rule-set-name rule rule-name then source-
nat mapping-type]
user@host# set address-pooling

7. If you want to ensure that the same external address and port are assigned to all connections from a
given host, configure endpoint-independent mapping:
195

a. Configure the mapping type as endpoint independent.

[edit services nat source rule-set rule-set-name rule rule-name then


source-nat]
user@host# set mapping-type endpoint-independent

b. Specify prefix lists that contain the hosts that are allowed to establish inbound connections using
the endpoint-independent mapping. (Prefix lists are configured at the [edit policy-options]
hierarchy level.)

[edit services nat source rule-set rule-set-name rule rule-name then


source-nat]
user@host# set filtering-type endpoint-independent prefix-list [allowed-host] except [denied-host]

c. Specify the maximum number of inbound flows allowed simultaneously on an endpoint-


independent mapping.

[edit services nat source rule-set rule-set-name rule rule-name filtering-


type then source-nat]
user@host# set secure-nat-mapping eif-flow-limit number-of-flows

d. Specify the direction in which active endpoint-independent mapping is refreshed. By default,


mapping is refreshed for both inbound and outbound active flows.

[edit services nat source rule-set rule-set-name rule rule-name then


source-nat]
user@host# set secure-nat-mapping mapping-refresh (inbound | inbound-outbound | outbound)

8. Configure the generation of a syslog when traffic matches the NAT rule conditions.

[edit services nat source rule-set rule-set-name rule rule-name then]


user@host# set syslog

Configuring the Service Set for NAPT


To configure the service set for NAPT:
196

1. Define the service set.

[edit services]
user@host# edit service-set service-set-name

2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.

[edit services service-set service-set-name]


user@host# set interface-service service-interface interface-name

or

[edit services service-set service-set-name]


user@host# set next-hop-service inside-service-interface interface-name outside-service-interface
interface-name

3. Specify the NAT rule sets to be used with the service set.

[edit services service-set service-set-name]


user@host# set nat-rule-sets rule-set-name

RELATED DOCUMENTATION

Network Address Port Translation (NAPT) Overview | 188

Configuring Syslog Events for NAT Rule Conditions with Next Gen
Services

To configure syslog events to be generated when traffic matches NAT rule conditions for Next Gen
Services NAT:
197

Configure the generation of a syslog when traffic matches the NAT rule conditions.

[edit services nat source rule-set rule-set-name rule rule-name then]


user@host# set syslog

The following are logs collected:

Out of addresses logs — If the allocation request fails to be handled as the public IP addresses in the No-
PAT pool are used up, the out of addresses syslog is generated.

Out of ports logs — If the allocation request fails to be handled as the public IPs and ports in the NAPT
pool are used up, the out of ports syslog is generated.

NAT Rule Match Logs — If the packet matches the NAT rule, the NAT rule match syslog is generated.

Pool resource release logs — If the public IP and port succeeds to be released to the NAPT pool, the pool
release syslog is generated.

RELATED DOCUMENTATION

Network Address Port Translation (NAPT) Overview | 188


Configuring Network Address Port Translation for Next Gen Services | 189
198

CHAPTER 8

NAT46

IN THIS CHAPTER

NAT46 Next Gen Services Configuration Examples | 198

NAT46 Next Gen Services Configuration Examples

IN THIS SECTION

NAT46 Support Summary | 199

NAT46 Sample Configuration | 200

Staring in Junos OS Release 20.2R1 you can run NAT46 Next Gen Services.

Starting in Junos OS Release 20.2R1, Network Address Translation and Protocol Translation (NAT-PT)
[RFC2766] are supported for CGNAT Next Gen Services. NAT46 is a IPv4-to-IPv6 transition mechanism
that provides a way for end-nodes in IPv6 realm to communicate with end-nodes in IPv4 realm and vice
versa. This is achieved using a combination of Network Address Translation and Protocol Translation.

NAT46 is supported on both the SRX and on MX240, MX480, and MX960 for CGNAT Next Gen
Services. This topic provides example configurations to help you understand how to configure NAT46
CGNAT Next Gen Services on these MX Series routers.

NOTE: These examples are for SRX devices, however, you can use these same examples to
configure NAT46 Next Gen Services on MX Series devices by substituting [edit security.....]
configuration statements with [edit services....] configuration statements on the MX Series
devices.

You can find these examples here: IPv6 NAT


199

There are four examples available:

• Configuring an IPv4-Initiated Connection to an IPv6 Node Using Default Destination Address Prefix
Static Mapping — This example shows how to configure an IPv4-initiated connection to an IPv6 node
using default destination address prefix static mapping.

• Configuring an IPv4-Initiated Connection to an IPv6 Node Using Static Destination Address One-to-
One Mapping — This example shows how to configure an IPv4-initiated connection to an IPv6 node
using static destination address one-to-one mapping.

• Configuring an IPv6-Initiated Connection to an IPv4 Node Using Default Destination Address Prefix
Static Mapping — This example shows how to configure an IPv6-initiated connection to an IPv4 node
using default destination address prefix static mapping. This example does not show how to
configure the NAT translation for the reverse direction.

• Configuring an IPv6-Initiated Connection to an IPv4 Node Using Static Destination Address One-to-
One Mapping — This example shows how to configure an IPv6-initiated connection to an IPv4 node
using static destination address one-to-one mapping.

NAT46 Support Summary

NAT46 for Next Gen Services supports the following:

• ICMP, TCP, and UDP protocol packets.

• Static mapping is used to communicate between the IPv4 to IPv6 side of the subscriber connection.

• Bi-directional traffic flow is supported if you have other ways to convey the mapping between the
IPv6 address and the dynamically allocated IPv4 address.

• NAT46 supports DNS, ICMP , nd FTP ALGs.

Keep these things in mind when configuring NAT46 for Next Gen Services:

• No support of NAT64 feature described in NAT-PT (RFC 2765).

• Static NAT is not used for the source translation in any NAT scenario.

• Except DNS, FTP and ICMP, other ALGs are not supported for NAT46.

• AMS functionality is not supported for NAT46.

• Port translation is not tested with Source Address NAT (when source pool is a IPv6 prefix) for the
NAT46 feature.
200

NAT46 Sample Configuration

services {
nat {
source {
pool ipv6_prefix {
address 27a6::/96;
}
rule-set myipv6_rs {
rule ipv6_rule {
match {
source-address 10.1.1.1/30 ;
destination-address 27a6::a0a:a2d/126;
}
then {
source-nat {
pool {
ipv6_prefix;
}
}
}
}
match-direction input;
}
}
static {
rule-set test_rs {
rule test_rule {
match {
destination-address ip-address;
}
then {
static-nat {
prefix ip-address;
}
}
}
.....match-direction input;
}
}
}
service-set sset1 {
201

...
nat-rule-sets test_rs;
nat-rule-sets myipv6_rs;
...
}
}

Release History Table

Release Description

20.2R1 Staring in Junos OS Release 20.2R1 you can run NAT46 Next Gen Services.

20.2R1 Starting in Junos OS Release 20.2R1, Network Address Translation and Protocol Translation (NAT-PT)
[RFC2766] are supported for CGNAT Next Gen Services.

RELATED DOCUMENTATION

service-set (Services) | 841


Configuring Service Sets for Network Address Translation
202

CHAPTER 9

Stateful NAT64 Overview and Configuration

IN THIS CHAPTER

Stateful NAT64 Overview | 202

IPv4 Addresses Embedded in IPv6 Addresses | 203

Configuring Next Gen Services Stateful NAT64 | 204

Stateful NAT64 Overview

IN THIS SECTION

Benefits of Stateful NAT64 | 202

Stateful NAT64 translates IPv6 addresses to public IPv4 addresses, allowing IPv6-only clients to contact
IPv4 servers using unicast UDP, TCP, or ICMP. Stateful NAT64 translates the destination IPv6 address to
the embedded IPv4 address, and translates the source IPv6 address to a public IPv4 address and port
from a block of IPv4 addresses that you set aside.

Stateful NAT64 supports the following:

• Round-robin port and address allocation (see "Round-Robin Port Allocation" on page 292).

• Address pooling and endpoint independent mapping (see "Address Pooling and Endpoint
Independent Mapping for Port Translation" on page 290).

• Secured port block allocation (see "Secured Port Block Allocation for Port Translation" on page 293

Benefits of Stateful NAT64

Stateful NAT64 provides a way to:


203

• Let IPv6-only clients contact IPv4 servers using unicast UDP, TCP, or ICMP

• Move to an IPv6 network

• Deal with IPv4 address depletion

RELATED DOCUMENTATION

Configuring Next Gen Services Stateful NAT64 | 204

IPv4 Addresses Embedded in IPv6 Addresses

Stateful NAT64 and XLAT464 embed IPv4 addresses in IPv6 addresses by using an IPv6 prefix that you
specify. The prefix length you use determines how the IPv4 address is embedded.

IPv6 addresses with embedded IPv4 addresses are composed of a variable-length prefix, the embedded
IPv4 address, and a variable-length suffix. Bits 64 to 71 are reserved and must be set to 0. The suffix
follows the last bit of the embedded IPv4 address, and the suffix bits are ignored and should be set to 0.

The format for the IPv4-embedded IPv6 address depends on the prefix length, as shown in Table 33 on
page 203.

Table 33: IPv6 Address With Embedded IPv4 Address

Prefix length Prefix bits IPv4 address bits Reserved bits (must be set to 0) Suffix bits

32 0-31 32 to 63 64 to 71 72 to 127

40 0 to 39 40 to 63 and 72 to 79 64 to 71 80 to 127

48 0 to 47 48 to 63 and 72 to 87 64 to 71 88 to 127

56 0 to 55 56 to 63 and 72 to 95 64 to 71 96 to 127

64 0 to 63 72 to 103 64 to 71 104 to 127

96 0 to 95 96 to 127 64 to 71 No suffix bits


204

The following table shows an example of an IPv4 address embedded in an IPv6 address for various
prefix lengths.

IPv6 Prefix IPv4 Address IPv4 Address Embedded in IPv6 Address

2001:db8::/32 192.0.2.33 2001:db8:c000:221::

2001:db8:100::/40 192.0.2.33 2001:db8:1c0:2:21::

2001:db8:122::/48 192.0.2.33 2001:db8:122:c000:2:2100::

2001:db8:122:300::/56 192.0.2.33 2001:db8:122:3c0:0:221::

2001:db8:122:344::/64 192.0.2.33 2001:db8:122:344:c0:2:2100::

2001:db8:122:344::/96 192.0.2.33 2001:db8:122:344::192.0.2.33

Configuring Next Gen Services Stateful NAT64

IN THIS SECTION

Configuring the Source Pool for Stateful NAT64 | 204

Configuring the NAT Rules for Stateful NAT64 | 208

Configuring the Service Set for Stateful NAT64 | 211

Clearing the Don’t Fragment Bit | 212

Perform the following steps to configure Next Gen Services Stateful NAT64

Configuring the Source Pool for Stateful NAT64


To configure the source pool for Stateful NAT64:
205

1. Create a source pool.

user@host# edit services nat source pool nat-pool-name

2. Define the addresses or subnets to which source addresses are translated.

[edit services nat source pool nat-pool-name]


user@host# set address address-prefix

or

[edit services nat source pool nat-pool-name]


user@host# set address address-prefix to address address-prefix

To disable round-robin port allocation for all NAT pools that do not specify an automatic (random-
allocation | round-robin) setting, configure the global setting.

[edit services nat source]


user@host# set port-round-robin disable

3. To configure a range of ports to assign to a pool, perform the following:

NOTE: If you specify a range of ports to assign, the automatic statement is ignored.

a. Specify the low and high values for the port. If you do not configure automatic port assignment,
you must configure a range of ports.

[edit services nat source pool nat-pool-name port]


user@host# set range port-low to port-high

b. Specify either random allocation or round-robin allocation. Round-robin allocation is the default.

[edit services nat source pool nat-pool-name port range]


user@host# set (random-allocation | round-robin)
206

4. Assign a port within the same range as the incoming port—either 0 through 1023 or 1024 through
65,535. This feature is not available if you configure port-block allocation.

[edit services nat source pool nat-pool-name port]


user@host# set preserve-range

5. Assign a port with the same parity (even or odd) as the incoming port. This feature is not available if
you configure port-block allocation.

[edit services nat source pool nat-pool-name port]


user@host# set preserve-parity

6. Configure a global default port range for NAT pools that use port translation. This port range is
used when a NAT pool does not specify a port range and does not specify automatic port
assignment. The global port range can be from 1024 through 65,535.

[edit services nat source]


user@host# set pool-default-port-range port-low to port-high

7. Configure the source pool without port translation.

[edit services nat source pool nat-pool-name]


user@host# set address-pooling no-paired

8. Configure the maximum number of ports that can be allocated for each host. The range is 2 through
65,535.

[edit services nat source pool nat-pool-name]


user@host# set limit-ports-per-host number

9. If you want to allocate a block of ports for each subscriber to use, configure port-block allocation:

a. Configure the number of ports in a block. The range is 1 through 64,512 and the default is 128.

[edit services nat source pool nat-pool-name port]


user@host# set block-allocation block-size block-size

b. Configure the interval, in seconds, for which the block is active. After the timeout, a new block is
allocated, even if ports are available in the active block. If you set the timeout to 0, port blocks
207

are filled completely before a new port block is allocated, and the last port block remains active
indefinitely. The range is 0 through 86,400, and the default is 0.

[edit services nat source pool nat-pool-name port block-allocation]


user@host# set active-block-timeout timeout-interval

c. Specify the timeout period for address-pooling paired mappings that use the NAT pool. The
range is 120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this
amount of time are dropped.

[edit services nat source pool nat-pool-name]


user@host# set mapping-timeout mapping-timeout

If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.

d. Configure the maximum number of blocks that can be allocated to a user address. The range is 1
through 512, and the default is 8.

[edit services nat source pool nat-pool-name port block-allocation]


user@host# set maximum-blocks-per-host maximum-block-number

e. Specify how often to send interim system logs for active port blocks and for inactive port blocks
with live sessions. This increases the reliability of system logs, which are UDP-based and can get
lost in the network. The range is 1800 through 86,400 seconds, and the default is 0 (interim logs
are disabled).

[edit services nat source pool nat-pool-name port block-allocation]


user@host# set interim-logging-interval timeout-interval

10. Specify the timeout period for endpoint independent translations that use the specified NAT pool.
Mappings that are inactive for this amount of time are dropped. The range is 120 through 86,400
seconds. If you do not configure ei-mapping-timeout, then the mapping-timeout value is used for
endpoint independent translations.

[edit services nat source pool nat-pool-name]


user@host# set ei-mapping-timeout ei-mapping-timeout
208

11. Specify the timeout period for address-pooling paired mappings that use the NAT pool. The range
is 120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this amount
of time are dropped.

[edit services nat source pool nat-pool-name]


user@host# set mapping-timeout mapping-timeout

If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.
12. To allow the IP addresses of a NAT source pool to overlap with IP addresses in pools used in other
service sets, configure allow-overlapping-pools.

[edit services nat]


user@host# set allow-overlapping-pools

Configuring the NAT Rules for Stateful NAT64


For Stateful NAT64, you must configure a source rule and a destination rule. To configure the NAT rules
for Stateful NAT64:

1. Configure the source NAT rule name.

[edit services nat source]


user@host# set rule-set rule-set-name rule rule-name

2. Specify the traffic direction to which the NAT rule set applies.

[edit services nat source rule-set rule-set-name]


user@host# set match-direction (in | out | in-out)

3. Specify the IPv6 source addresses that are translated by the NAT rule.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match source-address address
209

4. Configure the matching destination address as 0.0.0.0/0.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match destination-address 0.0.0.0/0

5. Specify one or more application protocols to which the NAT rule applies. The number of
applications listed in the rule must not exceed 3072.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match application [application-name]

6. Specify the NAT source pool that contains the addresses for translated source addresses.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set then source-nat pool nat-pool-name

7. Configure endpoint-independent mapping, which ensures that the same external address and port
are assigned to all connections from a given host.

a. Configure the mapping type as endpoint independent.

[edit services nat source rule-set rule-set-name rule rule-name then


source-nat]
user@host# set mapping-type endpoint-independent

b. Specify prefix lists that contain the hosts that are allowed to establish inbound connections
using the endpoint-independent mapping. (Prefix lists are configured at the [edit policy-options]
hierarchy level.)

[edit services nat source rule-set rule-set-name rule rule-name then


source-nat]
user@host# set filtering-type endpoint-independent prefix-list [allowed-host] except [denied-
host]
210

c. Specify the maximum number of inbound flows allowed simultaneously on an endpoint-


independent mapping.

[edit services nat source rule-set rule-set-name rule rule-name then


source-nat]
user@host# set secure-nat-mapping eif-flow-limit number-of-flows

d. Specify the direction in which active endpoint-independent mapping is refreshed. By default,


mapping is refreshed for both inbound and outbound active flows.

[edit services nat source rule-set rule-set-name rule rule-name then


source-nat]
user@host# set secure-nat-mapping mapping-refresh (inbound | inbound-outbound | outbound)

8. Configure the destination NAT rule name.

[edit services nat destination]


user@host# set rule-set rule-set-name rule rule-name

9. Specify the traffic direction to which the destination NAT rule set applies.

[edit services nat destination rule-set rule-set-name]


user@host# set match-direction (in | out | in-out)

10. Specify the IPv6 prefix source addresses that are translated by the destination NAT rule. Use the
same value that you used for the NAT source rule.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match source-address address

11. Specify the prefix that is used to embed the IPv4 destination address in the IPv6 destination
address.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set then destination-nat destination-prefix destination-prefix
211

12. Configure the IPv6 destination address to match. This is the IPv4 destination address embedded in
IPv6 by using the destination-prefix.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match destination-address address

13. Configure the generation of a syslog when traffic matches the NAT rule conditions.

[edit services nat (source | destination) rule-set rule-set-name rule rule-


name then]
user@host# set syslog

Configuring the Service Set for Stateful NAT64


To configure the service set for stateful NAT64:

1. Define the service set.

[edit services]
user@host# edit service-set service-set-name

2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.

[edit services service-set service-set-name]


user@host# set interface-service service-interface interface-name

or

[edit services service-set service-set-name]


user@host# set next-hop-service inside-service-interface interface-name outside-service-interface
interface-name

3. Specify the NAT rule sets to be used with the service set.

[edit services service-set service-set-name]


user@host# set nat-rule-sets rule-set-name
212

Clearing the Don’t Fragment Bit


To prevent unnecessary creation of IPv6 fragmentation headers when translating IPv4 packets that are
less than 1280 bytes, you can specify that the don’t fragment (DF) bit for IPv4 packet headers is cleared
when the packet length is less than 1280 bytes.

[edit services nat natv6v4]


user@host# set clear-dont-fragment-bit

RELATED DOCUMENTATION

Stateful NAT64 Overview | 202


213

CHAPTER 10

IPv4 Connectivity Across IPv6-Only Network Using


464XLAT Overview and Configuration

IN THIS CHAPTER

464XLAT Overview | 213

IPv4 Addresses Embedded in IPv6 Addresses | 215

Configuring 464XLAT Provider-Side Translator for IPv4 Connectivity Across IPv6-Only Network for Next
Gen Services | 217

464XLAT Overview

IN THIS SECTION

Benefits of 464XLAT | 215

You can configure the MX Series router as an 464XLAT Provider-Side Translator (PLAT). 464XLAT
provides a simple and scalable technique for an IPv4 client with a private address to connect to an IPv4
host over an IPv6 network. 464XLAT only supports IPv4 in the client-server model, so it does not
support IPv4 peer-to-peer communication or inbound IPv4 connections.

XLAT464 provides the advantages of not having to maintain an IPv4 network for this IPv4 traffic and
not having to assign additional public IPv4 addresses.

A customer-side translator (CLAT), which is not a Juniper Networks product, translates the IPv4 packet
to IPv6 by embedding the IPv4 source and destination addresses in IPv6 prefixes, and sends the packet
214

over an IPv6 network to the PLAT. The PLAT translates the packet to IPv4, and sends the packet to the
IPv4 host over an IPv4 network (see Figure 1 on page 214).

Figure 1: 464XLAT Wireline Flow

The CLAT uses a unique source IPv6 prefix for each end user, and translates the IPv4 source address to
an IPv6 address by embedding it in the IPv6 /96prefix. In Figure 1 on page 214, the CLAT source IPv6
prefix is 2001:db8:aaaa::/96, and the IPv4 source address 192.168.1.2 is translated to
2001:db8:aaaa::192.168.1.2. The CLAT translates the IPv4 destination address to IPv6 by embedding it
in the IPv6 prefix of the PLAT (MX Series router). In Figure 1 on page 214, the PLAT destination IPv6
prefix is 2001:db8:bbbb::/96, so the CLAT translates the IPv4 destination address 198.51.100.1 to
2001:db8:bbbb::198.51.100.

The PLAT translates the IPv6 source address to a public IPv4 address, and translates the IPv6
destination address to a public IPv4 address by removing the PLAT prefix.
215

The CLAT can reside on the end user mobile device in an IPv6-only mobile network, allowing mobile
network providers to roll out IPv6 for their users and support IPv4-only applications on mobile devices
(see Figure 2 on page 215).

Figure 2: 464XLAT Wireless Flow

464XLAT supports the following:

• Address pooling and endpoint independent mapping (see "Address Pooling and Endpoint
Independent Mapping for Port Translation" on page 290).

• Secured port block allocation (see "Secured Port Block Allocation for Port Translation" on page 293

Benefits of 464XLAT

• No need to maintain an IPv4 transit network

• No need to assign additional public IPv4 addresses

IPv4 Addresses Embedded in IPv6 Addresses

Stateful NAT64 and XLAT464 embed IPv4 addresses in IPv6 addresses by using an IPv6 prefix that you
specify. The prefix length you use determines how the IPv4 address is embedded.

IPv6 addresses with embedded IPv4 addresses are composed of a variable-length prefix, the embedded
IPv4 address, and a variable-length suffix. Bits 64 to 71 are reserved and must be set to 0. The suffix
follows the last bit of the embedded IPv4 address, and the suffix bits are ignored and should be set to 0.

The format for the IPv4-embedded IPv6 address depends on the prefix length, as shown in Table 34 on
page 216.
216

Table 34: IPv6 Address With Embedded IPv4 Address

Prefix length Prefix bits IPv4 address bits Reserved bits (must be set to 0) Suffix bits

32 0-31 32 to 63 64 to 71 72 to 127

40 0 to 39 40 to 63 and 72 to 79 64 to 71 80 to 127

48 0 to 47 48 to 63 and 72 to 87 64 to 71 88 to 127

56 0 to 55 56 to 63 and 72 to 95 64 to 71 96 to 127

64 0 to 63 72 to 103 64 to 71 104 to 127

96 0 to 95 96 to 127 64 to 71 No suffix bits

The following table shows an example of an IPv4 address embedded in an IPv6 address for various
prefix lengths.

IPv6 Prefix IPv4 Address IPv4 Address Embedded in IPv6 Address

2001:db8::/32 192.0.2.33 2001:db8:c000:221::

2001:db8:100::/40 192.0.2.33 2001:db8:1c0:2:21::

2001:db8:122::/48 192.0.2.33 2001:db8:122:c000:2:2100::

2001:db8:122:300::/56 192.0.2.33 2001:db8:122:3c0:0:221::

2001:db8:122:344::/64 192.0.2.33 2001:db8:122:344:c0:2:2100::

2001:db8:122:344::/96 192.0.2.33 2001:db8:122:344::192.0.2.33


217

Configuring 464XLAT Provider-Side Translator for IPv4 Connectivity


Across IPv6-Only Network for Next Gen Services

IN THIS SECTION

Configuring the Source Pool for 464XLAT | 217

Configuring the NAT Rules for 464XLAT | 219

Configuring the Service Set for 464XLAT | 222

Clearing the Don’t Fragment Bit | 223

Configuring the Source Pool for 464XLAT


To configure the source pool for 464XLAT:

1. Create a source NAT pool that is used to translate source IPv6 addresses to source public IPv4
addresses on PLAT.

user@host# edit services nat source pool nat-pool-name

2. Define the addresses or subnets to which source addresses are translated.

[edit services nat source pool nat-pool-name]


user@host# set address address-prefix

3. If you want to allocate a block of ports for each subscriber to use, configure port-block allocation:

a. Configure the number of ports in a block. The range is 1 through 64,512 and the default is 128.

[edit services nat source pool nat-pool-name port]


user@host# set block-allocation block-size block-size

b. Configure the interval, in seconds, for which the block is active. After the timeout, a new block is
allocated, even if ports are available in the active block. If you set the timeout to 0, port blocks are
218

filled completely before a new port block is allocated, and the last port block remains active
indefinitely. The range is 0 through 86,400, and the default is 0.

[edit services nat source pool nat-pool-name port block-allocation]


user@host# set active-block-timeout timeout-interval

c. Specify the timeout period for address-pooling paired mappings that use the NAT pool. The range
is 120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this amount
of time are dropped.

[edit services nat source pool nat-pool-name]


user@host# set mapping-timeout mapping-timeout

If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.

d. Configure the maximum number of blocks that can be allocated to a user address. The range is 1
through 512, and the default is 8.

[edit services nat source pool nat-pool-name port block-allocation]


user@host# set maximum-blocks-per-host maximum-block-number

e. Specify how often to send interim system logs for active port blocks and for inactive port blocks
with live sessions. This increases the reliability of system logs, which are UDP-based and can get
lost in the network. The range is 1800 through 86,400 seconds, and the default is 0 (interim logs
are disabled).

[edit services nat source pool nat-pool-name port block-allocation]


user@host# set interim-logging-interval timeout-interval

4. Specify the timeout period for endpoint independent translations that use the specified NAT pool.
Mappings that are inactive for this amount of time are dropped. The range is 120 through 86,400
seconds. If you do not configure ei-mapping-timeout, then the mapping-timeout value is used for
endpoint independent translations.

[edit services nat source pool nat-pool-name]


user@host# set ei-mapping-timeout ei-mapping-timeout
219

5. Specify the timeout period for address-pooling paired mappings that use the NAT pool. The range is
120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this amount of
time are dropped.

[edit services nat source pool nat-pool-name]


user@host# set mapping-timeout mapping-timeout

If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.

Configuring the NAT Rules for 464XLAT

For 464XLAT, you must configure a source rule and a destination rule. To configure the NAT rules for
464XLAT:

1. Configure the source NAT rule name.

[edit services nat source]


user@host# set rule-set rule-set-name rule rule-name

2. Specify the traffic direction to which the NAT rule set applies.

[edit services nat source rule-set rule-set-name]


user@host# set match-direction (in | out | in-out)

3. Specify the CLAT IPv6 source prefix.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set then source-nat clat-prefix clat-prefix

4. Configure the IPv6 source address prefix to match. This is the IPv4 source address embedded in
IPv6 by using the CLAT prefix.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match source-address address
220

5. Specify the NAT source pool that the PLAT uses for converting the IPv6 source address to a public
IPv4 address.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set then source-nat pool nat-pool-name

6. If you want to ensure that the same external address and port are assigned to all connections from
a given host, configure endpoint-independent mapping:
a. Configure the mapping type as endpoint independent.

[edit services nat source rule-set rule-set-name rule rule-name then


source-nat]
user@host# set mapping-type endpoint-independent

b. Specify prefix lists that contain the hosts that are allowed to establish inbound connections
using the endpoint-independent mapping. (Prefix lists are configured at the [edit policy-options]
hierarchy level.)

[edit services nat source rule-set rule-set-name rule rule-name then


source-nat]
user@host# set filtering-type endpoint-independent prefix-list [allowed-host] except [denied-
host]

c. Specify the maximum number of inbound flows allowed simultaneously on an endpoint-


independent mapping.

[edit services nat source rule-set rule-set-name rule rule-name then


source-nat]
user@host# set secure-nat-mapping eif-flow-limit number-of-flows

d. Specify the direction in which active endpoint-independent mapping is refreshed. By default,


mapping is refreshed for both inbound and outbound active flows.

[edit services nat source rule-set rule-set-name rule rule-name then


source-nat]
user@host# set secure-nat-mapping mapping-refresh (inbound | inbound-outbound | outbound)
221

e. Configure the address-pooling paired feature if you want to ensure assignment of the same
external IP address for all sessions originating from the same internal host.

[edit services nat source rule-set rule-set-name rule rule-name then


source-nat mapping-type]
user@host# set address-pooling-paired

f. Specify the timeout period for address-pooling-paired mappings that use the NAT pool. The
range is 120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this
amount of time are dropped.

[edit services nat source pool nat-pool-name]


user@host# set mapping-timeout mapping-timeout

If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.

g. Configure the generation of a syslog when traffic matches the NAT rule conditions.

[edit services nat source rule-set rule-set-name rule rule-name then]


user@host# set syslog

7. Configure the destination NAT rule name.

[edit services nat destination]


user@host# set rule-set rule-set-name rule rule-name

8. Specify the traffic direction to which the destination NAT rule set applies.

[edit services nat destination rule-set rule-set-name]


user@host# set match-direction (in | out | in-out)

9. Configure the IPv6 source address prefix to match. Use the same value that you used for the NAT
source rule.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match source-address address
222

10. Configure the PLAT destination IPv6 prefix.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set then destination-nat destination-prefix address

11. Configure the IPv6 destination address to match. This is the IPv4 destination address embedded in
IPv6 by using the PLAT destination prefix.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match destination-address address

Configuring the Service Set for 464XLAT


To configure the service set for 464XLAT:

1. Define the service set.

[edit services]
user@host# edit service-set service-set-name

2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.

[edit services service-set service-set-name]


user@host# set interface-service service-interface interface-name

or

[edit services service-set service-set-name]


user@host# set next-hop-service inside-service-interface interface-name outside-service-interface
interface-name

3. Specify the NAT rule sets to be used with the service set.

[edit services service-set service-set-name]


user@host# set nat-rule-sets rule-set-name
223

Clearing the Don’t Fragment Bit


Specify that the don’t fragment (DF) bit for IPv4 packet headers is cleared when the packet length is less
than 1280 bytes.

[edit services nat natv6v4]


user@host# set clear-dont-fragment-bit

This prevents unnecessary creation of an IPv6 fragmentation header when translating IPv4 packets that
are less than 1280 bytes.
224

CHAPTER 11

IPv6 NAT Protocol Translation (NAT PT)

IN THIS CHAPTER

IPv6 NAT PT Overview | 224

IPv6 NAT-PT Communication Overview | 225

IPv6 NAT PT Overview

Starting in Junos OS Release 20.2R1 you can run IPv6 NAT-PT Next Gen Services on MX240, MX480,
and MX960 routers.

IPv6 Network Address Translation-Protocol Translation (NAT-PT) provides address allocation and
protocol translation between IPv4 and IPv6 addressed network devices. The translation process is based
on the Stateless IP/ICMP Translation (SIIT) method; however, the state and the context of each
communication are retained during the session lifetime. IPv6 NAT-PT supports Internet Control
Message Protocol (ICMP), TCP, and UDP packets.

IPv6 NAT-PT supports the following types of NAT-PT:

• Traditional NAT-PT—In traditional NAT-PT, the sessions are unidirectional and outbound from the
IPv6 network . Traditional NAT-PT allows hosts within an IPv6 network to access hosts in an IPv4
network. There are two variations to traditional NAT-PT: basic NAT-PT and NAPT-PT.

In basic NAT-PT, a block of IPv4 addresses at an IPv4 interface is set aside for translating addresses
as IPv6 hosts as they initiate sessions to the IPv4 hosts. The basic NAT-PT translates the source IP
address and related fields such as IP, TCP, UDP, and ICMP header checksums for packets outbound
from the IPv6 domain . For inbound packets, it translates the the destination IP address and the
checksums.

Network Address Port Translation-Protocol Translation (NAPT-PT) can be combined with basic NAT-
PT so that a pool of external addresses is used in conjunction with port translation. NAPT-PT allows
a set of IPv6 hosts to share a single IPv4 address. NAPT-PT translates the source IP address, source
transport identifier, and related fields such as IP, TCP, UDP, and ICMP header checksums, for packets
outbound from the IPv6 network. The transport identifier can be a TCP/UDP port or an ICMP query
225

ID. For inbound packets, it translates the destination IP address, destination transport identifier, and
the IP and the transport header checksums.

• Bidirectional NAT-PT—In bidirectional NAT-PT, sessions can be initiated from hosts in the IPv4
network as well as the IPv6 network. IPv6 network addresses are bound to IPv4 addresses, either
statically or dynamically as connections are established in either direction. The static configuration is
similar to static NAT translation. Hosts in IPv4 realm access hosts in the IPv6 realm using DNS for
address resolution. A DNS ALG must be employed in conjunction with bidirectional NAT-PT to
facilitate name-to-address mapping. Specifically, the DNS ALG must be capable of translating IPv6
addresses in DNS queries and responses into their IPv4 address bindings, and vice versa, as DNS
packets traverse between IPv6 and IPv4 realms.

NOTE: The devices partially support the bidirectional NAT-PT specification. It supports flow
of bidirectional traffic assuming that there are other ways to convey the mapping between
the IPv6 address and the dynamically allocated IPv4 address. For example, a local DNS can be
configured with the mapped entries for IPv4 nodes to identify the addresses.

NAT- PT Operation—The devices support the traditional NAT-PT and allow static mapping for the user
to communicate from IPv4 to IPv6 . The user needs to statically configure the DNS server with an IPv4
address for the hostname and then create a static NAT on the device for the IPv6-only node to
communicate from an IPv4-only node to an IPv6-only node based on the DNS.

Release History Table


Release Description

20.2R1 Starting in Junos OS Release 20.2R1 you can run IPv6 NAT-PT Next Gen Services on MX240, MX480,
and MX960 routers.

RELATED DOCUMENTATION

NAT46 Next Gen Services Configuration Examples

IPv6 NAT-PT Communication Overview

NAT-PT communication with static mapping— Network Address Translation-Protocol Translation (NAT-
PT) can be done in two directions, from IPv6 to IPv4 and vice versa. For each direction, static NAT is
used to map the destination host to a local address and a source address NAT is used to translate the
226

source address. There are two types of static NAT and source NAT mapping: one-to-one mapping and
prefix-based mapping.

NAT- PT communication with DNS ALG—A DNS-based mechanism dynamically maps IPv6 addresses to
IPv4-only servers. NAT-PT uses the DNS ALG to transparently do the translations. For example, a
company using an internal IPv6 network needs to be able to communicate with external IPv4 servers
that do not yet have IPv6 addresses.

To support the dynamic address binding, a DNS should be used for name resolution. The IPv4 host looks
up the name of the IPv6 node in its local configured IPv4 DNS server, which then passes the query to
the IPv6 DNS server through a device using NAT-PT.

The DNS ALG in NAT device :

• Translates the IPv6 address resolution back to IPv4 address resolution.

• Allocates an IPv6 address for the mapping.

• Stores a mapping of the allocated IPv4 address to the IPv6 address returned in the IPv6 address
resolution so that the session can be established from any-IPv4 hosts to the IPv6 host.

RELATED DOCUMENTATION

IPv6 NAT PT Overview


227

CHAPTER 12

Stateless Source Network Prefix Translation for IPv6


Overview and Configuration

IN THIS CHAPTER

Stateless Source Network Prefix Translation for IPv6 | 227

Stateless Source Network Prefix Translation for IPv6

IN THIS SECTION

Stateless Source Network Prefix Translation for IPv6 for IPv6 | 227

Configuring NPTv6 for Next Gen Services | 228

Stateless Source Network Prefix Translation for IPv6 for IPv6

IN THIS SECTION

Benefits of Stateless Source Network Prefix Translation | 228

When an IPv6 packet is going from an internal network to the external network, Stateless Source
Network Prefix Translation for IPv6 (NPTv6) maps the IPv6 prefix of the source address to an IPv6 prefix
of an external network. When an IPv6 packet is coming from the external network to the internal
network, NPTv6 maps the IPv6 prefix of the destination address to the IPv6 prefix of the internal
network.
228

NPTv6 uses an algorithm to translate the addresses, and does not need to maintain the state for each
node or each flow in the translator. NPTv6 also removes the need to recompute the transport layer
checksum.

Benefits of Stateless Source Network Prefix Translation

• For edge networks, you do not need to renumber the IPv6 addresses used inside the local network
for interfaces, access lists, and system logging messages if:

• The global prefixes used by the edge network are changed.

• The IPv6 addresses are used inside the edge network or within other upstream networks (such as
multihomed devices) when a site adds, drops, or changes upstream networks.

• IPv6 addresses used by the edge network do not need ingress filtering in upstream networks and do
not need their customer-specific prefixes advertised to upstream networks.

• Connections that traverse the translation function are not disrupted by a reset or brief outage of an
NPTv6 translator.

Configuring NPTv6 for Next Gen Services

IN THIS SECTION

Configuring the Source Pool | 228

Configuring the NAT Rule | 229

Configuring the Service Set | 230

Configuring the Source Pool

To configure the source pool for NPTv6:

1. Create a source pool.

user@host# edit services nat source pool nat-pool-name


229

2. Define the IPv6 prefix to which the IPv6 source address prefix is translated.

[edit services nat source pool nat-pool-name]


user@host# set address address-prefix

Configuring the NAT Rule

To configure the NAT source rule for NPTv6:

1. Configure the NAT rule name.

[edit]
user@host# edit services nat source rule-set rule-set-name rule rule-name

2. Specify the traffic direction to which the NAT rule set applies.

[edit services nat source rule-set rule-set-name]


user@host# set match-direction (in | out | in-out)

3. Specify the IPv6 prefix of source addresses that are translated by the source NAT rule.
To specify one address or prefix value:

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match source-address address

4. Configure the address-pooling paired feature if you want to ensure assignment of the same external
IP address for all sessions originating from the same internal host.

[edit services nat source rule-set rule-set-name rule rule-name then source-
nat mapping-type]
user@host# set address-pooling-paired

5. Specify the timeout period for address-pooling-paired mappings that use the NAT pool. The range is
120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this amount of
time are dropped.

[edit services nat source pool nat-pool-name]


user@host# set mapping-timeout mapping-timeout
230

If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.
6. Specify the NAT pool that contains the IPv6 prefix for translated traffic.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set then source-nat pool nat-pool-name

7. Configure the generation of a syslog when traffic matches the NAT rule conditions.

[edit services nat source rule-set rule-set-name rule rule-name then]


user@host# set syslog

Configuring the Service Set

To configure the service set for NPTv6:

1. Define the service set.

[edit services]
user@host# edit service-set service-set-name

2. Configure either an interface service set, which requires a single service interface, or a next-hop
service set, which requires an inside and outside service interface.

• To configure an interface service set:

[edit services service-set service-set-name]


user@host# set interface-service service-interface vms-slot-number/pic-number/0.logical-unit-
number

• To configure a next-hop service set:

[edit services service-set service-set-name]


[edit services service-set service-set-name]
user@host# set next-hop-service inside-service-interface vms-slot-number/pic-number/0.logical-
unit-number outside-service-interface vms-slot-number/pic-number/0.logical-unit-number
231

3. Specify the NAT rule sets to be used with the service set.

[edit services service-set service-set-name]


user@host# set nat-rule-sets rule-set-name

4. Specify that ICMP error messages are sent if NPTv6 address translation fails.

[edit services service-set service-set-name nat-options nptv6]


user@host# set icmpv6-error-messages
232

CHAPTER 13

Transitioning to IPv6 Using Softwires

IN THIS CHAPTER

6rd Softwires in Next Gen Services | 232

6rd Softwires in Next Gen Services

IN THIS SECTION

6rd Softwires in Next Gen Services Overview | 232

Configuring Inline 6rd for Next Gen Services | 233

6rd Softwires in Next Gen Services Overview

IN THIS SECTION

Benefits | 233

Next Gen Services supports a 6rd softwire concentrator on the MX-SPC3 services card. 6rd softwires
allow IPv6 end users to send traffic over an IPv4 network to reach an IPv6 network. IPv6 packets are
encapsulated in IPv4 packets by a softwire initiator at the customer edge WAN, and tunneled to a 6rd
softwire concentrator. A softwire is created when IPv4 packets containing IPv6 destination information
are received at the softwire concentrator, which decapsulates IPv6 packets and forwards them for IPv6
routing.
233

6rd softwire flow is shown in Figure 3 on page 233.

Figure 3: 6rd Softwire Flow

In the reverse path, IPv6 packets are sent to the 6rd softwire concentrator, which encapsulates them in
IPv4 packets corresponding to the proper softwire and sends them to the customer edge WAN.

IPv6 flows are also created for the encapsulated IPv6 payload, and are associated with the specific
softwire that carried them in the first place. When the last IPv6 flow associated with a softwire ends, the
softwire is deleted. This simplifies configuration and there is no need to create or manage tunnel
interfaces.

For more information on 6rd softwires, see RFC 5969, IPv6 Rapid Deployment on IPv4 Infrastructures
(6rd) -- Protocol Specification.

Benefits

• Rapid deployment of IPv6 service to subscribers on native IPv4 customer edge WANs.

• No need to create or manage tunnel interfaces.

Configuring Inline 6rd for Next Gen Services

IN THIS SECTION

Configuring a 6rd Softwire Concentrator | 234

Configuring a 6rd Softwire Rule | 234

Configuring Inline Services and an Inline Services Interface | 235

Configuring the IPv4-Facing and IPv6-Facing Interfaces for 6rd | 236

Configuring the Service Set | 237


234

Configuring a 6rd Softwire Concentrator

To configure a 6rd softwire concentrator:

1. Configure a 6rd softwire concentrator name and IP address.

user@host# edit services softwires softwire-name softwire-name

For example:

user@host# edit services softwires softwire-name sw1

2. Configure the softwire type as v6rd and specify a name for it.

[edit services softwires softwire-name sw1]


user@host# set softwire-type v6rd name

For example:

[edit services softwires softwire-name sw1]


user@host# edit softwire-type v6rd 6rd-sw1

3. Configure the 6rd domain’s IPv6 prefix.

[edit services softwires softwire-name sw1 softwire-type v6rd 6rd-sw1]


user@host# set v6rd-prefix v6rd-prefix

Configuring a 6rd Softwire Rule

To configure a 6rd softwire rule:

1. Specify the name of the rule set that the rule belongs to.

[edit services softwires]


user@host# set rule-set rule-set-name
235

2. Specify the direction of traffic to be tunneled.

[edit services softwires rule-set rule-set-name]


user@host# set match-direction (input | output)

3. Specify the name of the rule.

[edit services softwires rule-set rule-set-name]


user@host# set rule rule-name

4. Specify the softwire to apply if the condition is met.

[edit services softwires rule-set rule-set-name rule rule-name]


user@host# set then v6rd 6rd-softwire-name

Configuring Inline Services and an Inline Services Interface

Inline services run on MX line cards that can operate under Next Gen Services, for example MPC3 and
MPC4 cards. This topic describes how to enable an inline service.

To enable inline services and an inline services interface:

1. Enable inline services for the FPC and PIC slot, and define the amount of bandwidth to dedicate to
inline services.

[edit chassis fpc slot-number pic number]


user@host# set inline-services bandwidth (1g | 10g | 20g | 30g | 40g | 100g)

2. Configure the inline services logical interfaces. Inline interfaces use the following interface naming
convention:

si-slot/pic/port

• If you are using an interface service set, configure one logical unit, and include units for IPv4 and
IPv6:

user@host# set interfaces si-slot-number/pic-number/0 unit unit-number family inet


user@host# set interfaces si-slot-number/pic-number/0 unit unit-number family inet6
236

For example:

user@host# set interfaces si-0/0/0 unit 0 family inet


user@host# set interfaces si-0/0/0 unit 0 family inet6

• If you are using a next-hop service set, configure two logical units and define the inside and
outside interfaces for IPv4 and IPv6:

[edit interfaces si-slot-number/pic-number/0


user@host# set unit inside-unit-number family inet
user@host# set unit inside-unit-number family inet6
user@host# set unit inside-unit-number service-domain inside
user@host# set unit outside-unit-number family inet
user@host# set unit outside-unit-number family inet6
user@host# set unit outside-unit-number service-domain outside

For example:

user@host# set interfaces si-0/0/0 unit 1 family inet


user@host# set interfaces si-0/0/0 unit 1 family inet6
user@host# set interfaces si-0/0/0 unit 1 service-domain inside
user@host# set interfaces si-0/0/0 unit 2 family inet
user@host# set interfaces si-0/0/0 unit 2 family inet family inet6
user@host# set interfaces si-0/0/0 unit 2 service-domain outside

Configuring the IPv4-Facing and IPv6-Facing Interfaces for 6rd

To configure the IPv4-facing and IPv6-facing interfaces:

1. Configure the IPv4-facing interface:

• To configure an interface to use with an interface-style service set, configure input and output
service and specify the service set.

user@host# set interfaces interface-name unit unit-number family inet service input service-set
service-set-name
user@host# set interfaces interface-name unit unit-number family inet service output service-set
237

service-set-name
user@host# set interfaces interface-name unit unit-number family inet address ip-address

• To configure an interface to use with a next-hop style service set, omit the service input and
service output references.

user@host# set interfaces interface-name unit unit-number family inet


user@host# set interfaces interface-name unit unit-number family inet address ip-address

2. Configure the IPv6-facing interface.

user@host# set interface-name unit unit-number family inet6 address ipv6-address

Configuring the Service Set

To configure the service set for 6rd processing:

1. Specify a name for the service set.

[edit services]
user@host# edit service-set service-set-name

2. Configure either an interface service set, which requires a single service interface, or a next-hop
service set, which requires an inside and outside service interface.

• To configure an interface service set:

[edit services service-set service-set-name]


user@host# set interface-service service-interface vms-slot-number/pic-number/0.unit-number

• To configure a next-hop service set:

[edit services service-set service-set-name]


user@host# set next-hop-service inside-service-interface vms-slot-number/pic-number/0.inside-
unit-number outside-service-interface vms-slot-number/pic-number/0.outside-unit-number
238

3. Specify the 6rd rule-set that contains the 6rd rule to be used with the service set.

[edit services service-set service-set-name]


user@host# set softwires-rule-set softwire-rule-set-name
239

CHAPTER 14

Transitioning to IPv6 Using DS-Lite Softwires

IN THIS CHAPTER

DS-Lite Softwires—IPv4 over IPv6 for Next Gen Services | 239

Configuring Next Gen Services DS-Lite Softwires | 242

DS-Lite Subnet Limitation | 248

Protecting CGN Devices Against Denial of Service (DOS) Attacks | 253

DS-Lite Softwires—IPv4 over IPv6 for Next Gen Services

IN THIS SECTION

DS-Lite Softwires—IPv4 over IPv6 | 240

Junos OS enables service providers to transition to IPv6 by using softwire encapsulation and
decapsulation techniques. A softwire is a tunnel that is created between softwire customer premises
equipment (CPE). A softwire CPE can share a unique common internal state for multiple softwires,
making it a very light and scalable solution. When you use softwires, you need not maintain an interface
infrastructure for each softwire, unlike a typical mesh of generic routing encapsulation (GRE) tunnels
that requires you to do so. A softwire initiator at the customer end encapsulates native packets and
tunnels them to a softwire concentrator at the service provider. The softwire concentrator decapsulates
the packets and sends them to their destination. A softwire is created when a softwire concentrator
receives the first tunneled packet of a flow and prepares the packet for flow processing. The softwire
exists as long as the softwire concentrator is providing flows for routing. A flow counter is maintained;
when the number of active flows is 0, the softwire is deleted. Statistics are kept for both flows and
softwires.

This topic contains the following sections:


240

DS-Lite Softwires—IPv4 over IPv6

When an ISP begins to allocate new subscriber home IPv6 addresses and IPv6-capable equipment, dual-
stack lite (DS-Lite) provides a method for the private IPv4 addresses behind the IPv6 customer edge
WAN equipment to reach the IPv4 network. DS-Lite enables IPv4 customers to continue to access the
Internet using their current hardware by using a softwire initiator, referred to as a Basic Bridging
Broadband (B4), at the customer edge to encapsulate IPv4 packets into IPv6 packets and tunnel them
over an IPv6 network to a softwire concentrator, referred to as an Address Family Transition Router
(AFTR), for decapsulation. DS-Lite creates the IPv6 softwires that terminate on the services PIC. Packets
coming out of the softwire can then have other services such as NAT applied on them.

Starting in Junos OS release 20.2R1, DS-Lite is supported Next Gen Services on MX240, MX480 and
MX960 routers with the MX-SPC3.

For more information on DS-Lite softwires, see the IETF draft Dual Stack Lite Broadband Deployments
Following IPv4 Exhaustion.

NOTE: The most recent IETF draft documentation for DS-Lite uses new terminology:

• The term softwire initiator has been replaced by B4.

• The term softwire concentrator has been replaced by AFTR.

The Junos OS documentation generally uses the original terms when discussing configuration in
order to be consistent with the command-line interface (CLI) statements used to configure DS-
Lite.

DS-Lite and NAT in Next Gen Services

In Next Gen Services, DS-Lite changes the way NAT works with respect to the address-pooling-paired
statement for the endpoint independent mapping (EIM), endpoint independent filtering (EIF), and port
block allocation (PBA) features. In the earlier Adaptive Services implementation, all of these NAT
features are subscriber-based and the subscriber is either a B4 IP address or an IPv6 prefix. In addition,
for Adaptive Services, the address-pooling-paired association is between internal IPv4 address and NAT
pool address. However in Next Gen Services DS-Lite, the address-pooling-paired pairing is between
either the subscriber (B4 IPv6 address or IPv6 prefix) and a NAT pool address. Otherwise, the address-
pooling-paired functionality remains the same for Next Gen Services.

NOTE: For CGNAT Next Gen Services on the MX-SPC3 security services card, when you
configure DS-Lite use the following rules:
241

• For non-prefix based DS-Lite subscriber softwires, specify the B4 IPv6 address as the softwire
concentrator.

• For prefix-based DS-Lite subscriber softwires, specify the IPv6 prefix address as the softwire
concentrator. In addition for prefix-based subscriber DS-Lite softwires, you must specify the
subscriber prefix length per service-set under the [edit softwire-options dslite-ipv6-prefix-
length dslite-ipv6-prefix-length configuration hierarchy.

You create EIM mappings on a per-softwire basis and they are bound to B4 address; which means the
rule matching criteria includes B4 address. For Next Gen Services DS-Lite softwires, there is no special
mapping timeout for softwire sessions, instead, they take the value of inactivity-non-tcp-timeout as
their timeout value.

When a subscriber requires a port to be assigned for the first time, Port Block Allocation (PBA) ensures a
block of ports is allocated to that particular subscriber. All subsequent requests from this subscriber use
ports from the assigned block. A new port block is allocated when the current active block is exhausted,
or after the active port block timeout interval has expired.

DS-Lite and AMS

AMS groups several PICs together and load balances traffic across all PICs that are part of the same
group. In a standalone PIC configuration, all softwire sessions originated from any B4, which are
destined to a softwire concentrator, are serviced on the same PIC where the softwire concentrator is
configured. In the case of a DS-Lite in an AMS configuration, the softwire concentrator is hosted on all
PICs in AMS group, however, softwire sessions from various B4 devices are distributed across member
PICs. Thus, a softwire session originated from one B4 to the softwire concentrator, is assigned to one
member PIC and all packets (IPv4-in-IPv6 and inner IPv4) in both directions (originated from B4 and
destined to B4) related to that softwire session are serviced in the same PIC.

For prefix-based DS-Lite subscribers you need to configure the IPv6-prefix for DS-Lite traffic. When a
prefix-based subscriber is active, the configured prefix length is taken from the B4 address and is
completed with trailing zeros to form a 128-bit IPv6 NAT subscriber. This means that all B4 entities with
a matching prefix and all IPv4 networks behind those matching B4 entities, are all identified as a single
subscriber. An option is provided to configure the subscriber prefix length per service-set under the [edit
softwire-options dslite-ipv6-prefix-length dslite-ipv6-prefix-length. hierarchy.

NOTE: For CGNAT Next Gen Services on the MX-SPC3 security services card, when you
configure prefix-based DS-Lite subscribers always specify the IPv6 prefix address for the softwire
concentrator.
242

With the prefix-based subscriber feature enabled, only one subscriber context is maintained per-prefix.
Hence, the Port Block Allocation (NAT PBA) function would account for port blocks per each subscriber,
instead of every single B4 address. Session limits configured under the softwire concentrator, limit the
number of IPv4 sessions per subscriber, instead of per softwire/B4 address. Enabling the address-
pooling-paired option in prefix-based subscriber configurations results in one public IP address for the
subscriber instead of per B4 address.

Release History Table

Release Description

20.2R1 Starting in Junos OS release 20.2R1, DS-Lite is supported Next Gen Services on MX240, MX480 and
MX960 routers with the MX-SPC3.

RELATED DOCUMENTATION

Junos Address Aware Network Addressing Overview


Configuring Next Gen Services DS-Lite Softwires | 242
DS-Lite Subnet Limitation
DS-Lite Per Subnet Limitation Overview

Configuring Next Gen Services DS-Lite Softwires

IN THIS SECTION

Configuring Next Gen Services Softwire Rules | 242

Configuring Service Sets for Next Gen Services Softwires | 244

Configuring the DS-Lite Softwire | 246

Configuring Next Gen Services Softwire Rules


You configure softwire rules to instruct the router how to direct traffic to the addresses specified for 6rd,
DS-Lite, or MAP-E softwire concentrators. Softwire rules do not perform any filtration of the traffic.
They do not include a from statement, and the only option in the then statement is to specify the
address of the softwire concentrator.
243

Starting in Junos OS release 19.3R2 6rd softwires are supported. Starting in Junos OS release 20.2, DS-
Lite and Mapping of Address and Port with Encapsulation (MAP-E).

You can create a softwire rule consisting of one or more terms and associate a particular 6rd, DS-Lite, or
MAP-E softwire concentrator with each term. You can include the softwire rule in service sets along
with other services rules.

To configure a softwire rule set:

1. Assign a name to the rule set.

[edit services softwires]


user@host# edit rule-set rule-set-name

For example:

[edit services softwires]


user@host# edit rule-set swrs1

2. Configure the input and output match directions for the rule set.

[edit services softwires rule-set swrs1]


user@host# set match-direction input

3. Specify the name of the rule to apply if the match in this direction is met.

[edit services softwires rule-set swrs1]


user@host# edit rule rule-name

For example:

[edit services softwires rule-set swrs1]


user@host# edit rule swr1

4. Associate a 6rd, DS-Lite or MAP-E softwire concentrator with this term.

[edit services softwires rule-set swrs1 rule swr1]


user@host# set then ds-lite | map- | v6rd
244

For example, to associate a DS-Lite softwire specify the name of the DS-Lite softwire.

[edit services softwires rule-set swrs1 rule swr1]


user@host# set then ds-lite dslsw1

5. Repeat steps "2" on page 243 and "3" on page 243, and "4" on page 243for the output direction.

SEE ALSO

DS-Lite Softwires—IPv4 over IPv6 for Next Gen Services | 239


DS-Lite Subnet Limitation
DS-Lite Per Subnet Limitation Overview

Configuring Service Sets for Next Gen Services Softwires


You must include previously defined NAT or stateful firewall softwire rules or a softwire rule set in a
service set to enable softwire processing.

Starting in Junos OS release 20.2R1, DS-Lite, MAP-E and 6rd softwires are supported in MX240,
MX480, and MX960 routers. MAP-E and 6rd softwires are supported inline on an MPC by specifying
the si-1/0/0 interface naming convention. DS-Lite is softwires run on the MX-SPC3 security services
card.

To configure service sets for softwires:

1. Specify a name for the service set.

[edit services]
user@host# edit service-set service-set-name

For example:

[edit services]
user@host# edit service-set vms-sw-ss

2. Specify the IPv6 prefix length for the subscriber addresses.

[edit services service-set vms-sw-ss]


user@host# set softwire-options dslite-ipv6-prefix-length dslite-ipv6-prefix-
length
245

We support four prefix lengths: 56, 64,96 and 128, which is the default.
3. For NAT, you can include a NAT rule for flows originated by DS-Lite softwires.

NOTE:
Currently a NAT rule configuration is required with a DS-Lite softwire configuration when you
use interface service set configurations; NAT is not required when using next-hop service set
configurations. NAT processing from IPv4 to IPv6 address pools and vice versa is not
currently supported. FTP, HTTP, and RSTP are supported.

NOTE: With a DS-Lite softwire, if you configure stateful firewall rules without configuring
NAT rules, using an interface service set causes the ICMP echo reply messages to not be sent
correctly to DS-Lite. This behavior occurs if you apply a service set to both inet and inet6
families. In such a scenario, the traffic that is not destined to the DS-Lite softwire
concentrator is also processed by the service set and the packets might be dropped, although
the service set must not process such packets.
To prevent the problem to incorrect processing of traffic applicable for DS-Lite, you must
configure a next-hop style service set and not an interface style service set. This problem
does not occur when you configure NAT rules with interface service sets for DS-Lite.

Specify the name of the NAT rule set.

[edit services service-set vms-sw-ss]


user@host# edit nat-rule-sets nat-rule-set-name

4. Specify the service interface to be used.

[edit services service-set vms-sw-ss]


user@host# set interface-service service-interface vms-interface-name

5. Specify the name of the previously defined softwires rule set that you want to apply to this service
set.

[edit services service-set vms-sw-ss]


user@host# set softwires-rule-set rule-set-name
246

Configuring the DS-Lite Softwire


Starting in Junos OS release 20.2R1, you can configure DS-Lite softwires for Next Gen Services on the
MX-SPC3 services card.

1. Specify a name for the DS-Lite softwire.

[edit]
user@host# edit services softwires softwire-types ds-lite name

2. Specify a name for the DS-Lite softwire.

[edit}
user@host# edit services softwires softwire-types ds-lite name

For example:

user@host# edit services softwires softwire-types ds-lite dslsw1

3. Specify the IPv6 address of the softwire concentrator.

NOTE: For CGNAT Next Gen Services on the MX-SPC3 security services card, when you
configure DS-Lite concentrator, use the following rules:

• For non-prefix based DS-Lite subscribers, specify the B4 IPv6 address

• For prefix-based DS-Lite subscribers, specify the IPv6 prefix address

For example:

[edit services softwires softwire-types ds-lite dslsw1]


user@host# set softwire-concentrator B4-IPv6-address or IPv6-prefix-address

4. You can specify the maximum transmission unit (MTU) for the softwire tunnel automatically or
manually.
247

a. To manually specify the MTUs for the softwire tunnel:

[edit services softwires softwire-types ds-lite dslsw1]


user@host# set mtu-v4 bytes
user@host# set mtu-v6 bytes

NOTE: This MTU-v6 option sets the maximum transmission unit when encapsulating IPv4
packets into IPv6. If the final length is greater than the MTU-v4 value, the IPv6 packet is
fragmented. This option is mandatory because it depends on other network parameters
under administrator control.

5. Specify the maximum number of flows for the softwire.

[edit services softwires softwire-types ds-lite dslsw1]


user@host# set flow-limit 1000

6. (Optional) For prefix-based DS-Lite subscriber softwires, configure the maximum number of
subscriber sessions allowed per prefix. You can configure from 0 through 16,384 sessions.

[edit services softwires softwire-types ds-lite dslsw1]


user@host# set session-limit-per-prefix 12

NOTE: You cannot use flow-limit and session-limit-per-prefix in the same DS-Lite
configuration.

7. Configure the size of the IPv4 subnet prefix to which limiting is applied. ipv4prefix=6rd customer
edge ipv4

[edit services softwires softwire-types ds-lite dslsw1]


user@host# set ipv4-prefix
248

8. Configure the size of the IPv6 subnet prefix to which limiting is applied. Specify a prefix length of 56,
64, 96, or 128.

[edit services softwires softwire-types ds-lite dslsw1]


user@host# set v6rd-prefix

NOTE: Ensure that all mappings are cleared before changing the prefix length.

Release History Table


Release Description

20.2R1 Starting in Junos OS release 20.2R1, you can configure DS-Lite softwires for Next Gen Services on the
MX-SPC3 services card.

20.2R1 Starting in Junos OS release 20.2, DS-Lite and Mapping of Address and Port with Encapsulation (MAP-
E).

20.2R1 Starting in Junos OS release 20.2R1, DS-Lite, MAP-E and 6rd softwires are supported in MX240,
MX480, and MX960 routers.

19.3R2 Starting in Junos OS release 19.3R2 6rd softwires are supported.

DS-Lite Subnet Limitation

IN THIS SECTION

DS-Lite Per Subnet Limitation Overview | 248

Configuring DS-Lite Per Subnet Session Limitation to Prevent Denial of Service Attacks | 251

DS-Lite Per Subnet Limitation Overview


Junos OS enables you to limit the number of softwire flows from a subscriber’s basic bridging broadband
(B4) device at a given point in time, preventing subscribers from excessive use of addresses within the
subnet. This limitation reduces the risk of denial-of-service (DoS) attacks. This limitation is supported on
249

MX Series routers equipped with MS-DPCs. Starting in Junos OS Release 18.2R1, MS-MPCs and MS-
MICs also support the subnet limitation feature.Starting in Junos OS Release 19.2R1, MX Virtual Chassis
and MX Broadband Network Gateway (BNG) routers also support the subnet limitation feature.Starting
in Junos OS release 20.2R1, DS-Lite is supported for CGNAT Next Gen Services on MX240, MX480 and
MX960 routers.

A household using IPv6 with DS-Lite is a subnet, not just an individual IP address. The subnet limitation
feature associates a subscriber and mapping with an IPv6 prefix instead of an IPv6 address. A subscriber
can use any IPv6 addresses in that prefix as a DS-Lite B4 address and potentially exhaust carrier-grade
NAT resources. The subnet limitation feature enables greater control of resource utilization by
identifying a subscriber with a prefix instead of a specific address.

The subnet limit provides the following features:

• Flows utilize the complete B4 address.

• Prefix length can be configured per service set under softwire-options for the individual service-set.

• Port blocks are allocated per prefix of the subscriber B4 device, and not on each B4 address (if the
prefix length is less than 128). If the prefix length is 128, then each IPv6 address is treated as a B4.
Port blocks are allocated per 128-bit IPv6 address.

• Session limit, defined under the DS-Lite softwire concentrator configuration, limits the number of
IPv4 sessions for the prefix.

• EIM, EIF, and PCP mappings are created per softwire tunnel (full 128 bit IPv6 address). Stale
mappings time out based on timeout values.

• If prefix length is configured , then PCP max-mappings-per-subscriber (configurable under pcp-


server) is based on the prefix only, and not the full B4 address.

• SYSLOGS for PBA allocation and release contain the prefix portion of the address completed with all
zeros. SYSLOGS for PCP allocate and release, flow creation and deletion will still contain the
complete IPv6 address.

The show services nat mappings address-pooling-paired operational command output now shows the
mapping for the prefix. The mapping shows the address of the active B4.

The show services softwire statistics ds-lite output includes a new field that displays the number of
times the session limit was exceeded for the MPC.

For Next Gen Services on MX240, MX480, and MX960 routers, the subnet limit statistic is displayed in
the Softwire session limit exceeded field.
250

show services softwire statistics (MX-SPC3)

user@host> show services softwire statistics


vms-2/0/0
Total Session Interest events :3
Total Session Destroy events :2
Total Session Public Request events :0
Total Session Accepts :1
Total Session Discards :0
Total Session Ignores :0
Total Session extension alloc failures :0
Total Session extension set failures :0
Softwire statistics
Total Softwire sessions created :1
Total Softwire sessions deleted :2
Total Softwire sessions created for reverse packets :1
Total Softwire session create failed for reverse pkts :0
Total Softwire rule match success :1
Total Softwire rule match failed :0
Softwire session limit exceeded :0
Softwire packet statistics
Total Packets processed :1
Total packets encapsulated :1
Total packets decapsulated :1
Encapsulation errors :0
Decapsulation errors :0
Encapsulated pkts re-inject failures :0
Decapsulated pkts re-inject failures :0
DS-Lite ICMPv4 Echo replies sent :0
DS-Lite ICMPv4 TTL exceeded messages sent :0
ICMPv6 ECHO request messages received destined to AFTR :0
ICMPv6 ECHO reply messages sent from AFTR :0
ICMPv6 ECHO requests to AFTR process failures :0
V6 untunnelled packets destined to AFTR dropped :1
Softwire policy add errors :0
Softwire policy delete errors :0
Softwire policy memory alloc failures :0
Softwire Untunnelled packets ignored :0
Softwire Misc errors
DS-Lite ICMPv4 TTL exceed message process errors :0
251

SEE ALSO

show services nat source mappings address-pooling-paired | 1057


show services softwire statistics | 1234

Configuring DS-Lite Per Subnet Session Limitation to Prevent Denial of Service


Attacks
You can configure the DS-Lite per subnet limitation on MX Series routers equipped with MS-DPCs.
Starting in Junos OS Release 18.2R1, MS-MPCs and MS-MICs also support the subnet limitation
feature. Starting in Junos OS Release 20.2R1, the Next Gen Services MX-SPC3 security services card
supports the subnet limitation feature.

Starting in Junos OS Release 19.2R1, MX Virtual Chassis and MX Broadband Network Gateway (BNG)
routers also support the subnet limitation feature.

To configure DS-Lite per subnet session limitation:

1. Configure the size of the subnet prefix to which limiting is applied. Specify a prefix length of 56, 64,
96, or 128.

[edit}
user@host# set services service-set service-set-name softwire-options dslite-ipv6-prefix-length dslite-
ipv6-prefix-length

NOTE: Ensure that all mappings are cleared before changing the prefix length.

2. If you are using a next-hop service set on an AMS interface for DS-Lite, set the AMS inside
interface’s IPv6 source prefix length to the same value you use for the subnet prefix in Step "1" on
page 251.

[edit interfaces interface-name unit interface-unit-number load-balancing-


options hash-keys]
user@host# set ipv6-source-prefix-length ipv6-source-prefix-length
252

3. Configure the maximum number of subscriber sessions allowed per prefix. You can configure from 0
through 16,384 sessions.

[edit}
user@host# set services softwire softwire-concentrator dslite dslite-concentrator-name session-limit-
per-prefix 12

For Next Gen Services DS-Lite, MAP-E and V6rd softwires, configure the maximum number of
subscriber sessions allowed per prefix:

[edit}
user@host# set services softwires softwire-types ds-lite | map-e | v6rd session-limit-per-prefix limit

NOTE: You cannot use flow-limit and session-limit-per-prefix in the same dslite
configuration.

SEE ALSO

clear services nat mappings | 0


softwire-options | 864
ds-lite | 645

Release History Table

Release Description

20.2R1 Starting in Junos OS release 20.2R1, DS-Lite is supported for CGNAT Next Gen Services on MX240,
MX480 and MX960 routers.

20.2R1 Starting in Junos OS Release 20.2R1, the Next Gen Services MX-SPC3 security services card supports
the subnet limitation feature.

19.2R1 Starting in Junos OS Release 19.2R1, MX Virtual Chassis and MX Broadband Network Gateway (BNG)
routers also support the subnet limitation feature.

18.2R1 Starting in Junos OS Release 18.2R1, MS-MPCs and MS-MICs also support the subnet limitation
feature.
253

Protecting CGN Devices Against Denial of Service (DOS) Attacks

IN THIS SECTION

Mapping Refresh Behavior | 253

EIF Inbound Flow Limit | 253

You can now choose configuration options that help prevent or minimize the effect of attempted denial
of service (DOS) attacks.

Mapping Refresh Behavior

Prior to the implementation of the new options for configuring NAT mapping refresh behavior,
described in this topic, a conversation was kept alive when either inbound or outbound flows were
active. This remains the default behavior. You can now also specify mapping refresh for only inbound
flows or only outbound flows. To configure mapping refresh behavior, include the mapping-refresh
(inbound | outbound | inbound-outbound) statement at the [edit services nat rule rule-name term term-
name then translated secure-nat-mapping] hierarchy level.

EIF Inbound Flow Limit

Previously. the number of inbound connections on an EIF mapping was limited only by the maximum
flows allowed on the system. You can now configure the number of inbound flows allowed for an EIF. To
limit the number of inbound connections on an EIF mapping, include the eif-flow-limit number-of-flows
statement at the [edit services nat rule rule-name term term-name then translated secure-nat-
mapping] hierarchy level.
254

CHAPTER 15

Reducing Traffic and Bandwidth Requirements Using


Port Control Protocol

IN THIS CHAPTER

Port Control Protocol Overview | 254

Configuring Port Control Protocol | 258

Port Control Protocol Overview

IN THIS SECTION

Benefits of Port Control Protocol | 256

Port Control Protocol Version 2 | 256

Port Control Protocol (PCP) provides a way to control the forwarding of incoming packets by upstream
devices, such as NAT44 and firewall devices, and a way to reduce application keepalive traffic. PCP is
supported on the MS-DPC, MS-100, MS-400, and MS-500 MultiServices PICs. Starting in Junos OS
Release 17.4R1, PCP for NAPT44 is also supported on the MS-MPC and MS-MIC. Starting in Junos
20.2R1, PCP for CGNAT DS-Lite services are supported for Next Gen Services.Starting in Junos OS
Release 18.2R1, PCP on the MS-MPC and MS-MIC supports DS-Lite. In Junos OS Release 18.1 and
earlier releases, PCP on the MS-MPC and MS-MIC does not support DS-Lite.

PCP is designed to be implemented in the context of both Carrier-Grade NATs (CGNs) and small NATs
(for example, residential NATs). PCP enables hosts to operate servers for a long time (as in the case of a
webcam) or a short time (for example, while playing a game or on a phone call) when behind a NAT
device, including when behind a CGN operated by their ISP. PCP enables applications to create
mappings from an external IP address and port to an internal IP address and port. These mappings are
required for successful inbound communications destined to machines located behind a NAT or a
firewall. After a mapping for incoming connections is created, remote computers must be informed
255

about the IP address and port for the incoming connection. This is usually done in an application-specific
manner.

Junos OS supports PCP version 2 and version 1.

PCP consists of the following components:

• PCP client—A host or gateway that issues PCP requests to a PCP server in order to obtain and
control resources.

• PCP server—Typically a CGN gateway or co-located server that receives and processes PCP requests

Junos OS enables configuring PCP servers for mapping flows using NAPT44 capabilities such as port
forwarding and port block allocation. Flows can be processed from these sources:

• Traffic containing PCP requests received directly from user equipment, as shown in Figure 4 on page
255.

Figure 4: Basic PCP NAPT44 Topology


256

• Mapping of traffic containing PCP requests added by a router functioning as a DS-Lite softwire
initiator (B4). This mode, known as DS-Lite plain mode, is shown in Figure 5 on page 256.

Figure 5: PCP with DS-Lite Plain Mode

NOTE: Junos OS does not support deterministic port block allocation for PCP-originated traffic.

Benefits of Port Control Protocol

Many NAT-friendly applications send frequent application-level messages to ensure their sessions are
not being timed out by a NAT device. PCP is used to:

• Reduce the frequency of these NAT keepalive messages

• Reduce bandwidth on the subscriber's access network

• Reduce traffic to the server

• Reduce battery consumption on mobile devices

Port Control Protocol Version 2

Starting with Junos OS Release 15.1, Port Control Protocol (PCP) version 2 is supported, which is in
compliance with RFC 6887. PCP provides a way to control the forwarding of incoming packets by
upstream devices, such as NAT44, and firewall devices, and a way to reduce application keep-alive
traffic. PCP version 2 supports nonce authentication. PCP allows applications to create mappings from
an external IP address and port to an internal IP address and port. A nonce payload prevents a replay
attack and it is sent by default unless it is explicitly disabled.
257

Client nonce verification for version 2 map requests (for refresh or delete) requires that the nonce
received in the original map request that causes the PCP mapping to be created is preserved. The
version of the initial request that enables the mapping to be created is also preserved. This behavior of
saving the nonce and version parameters denotes that 13 bytes per PCP mapping are used. This slight
increase in storage space is not significant when matched with the current memory usage of a system
for a single requested mapping (taking into account the endpoint-independent mapping (EIM) and
endpoint-independent filtering (EIF) that are created along with it). In a customer deployment, PCP
causes EIM and EIF mappings to represent a fraction of all such mappings.

Until Junos Release 15.1, services PICs support PCP servers on Juniper Networks routers in accordance
with PCP draft version 22 with version 1 message encoding. With PCP being refined from the draft
version as defined in Port Control Protocol (PCP) draft-ietf-pcp-base-22 (July 2012 expiration) to a
finalized, standard version as defined in RFC 6887 -- Port Control Protocol (PCP), the message encoding
changed to version 2 with the addition of a random nonce payload to authenticate peer and map
requests as necessary. Version 1 does not decode messages compliant with version 2 format and nonce
authentication is not supported. In a real-word network environment, with customer premises
equipment (CPE) devices increasingly supporting version 2 only, it is required to parse and send version
2 messages. Backward compatibility with version 1-supporting CPE devices is maintained (version
negotiation is part of the standard) and authenticates request nonce payload packets when v2 messages
are in use.

The output of the show services pcp statistics command contains the PCP unsupported version field,
which is incremented to indicate whenever the version is not 1 or 2. A new field, PCP request nonce
does not match existing mapping, is introduced to indicate the number of PCP version 2 requests that
were ignored because the nonce payload did not match the one recorded in the mapping (authentication
failed). If version 2 is in use, the client nonce is used for authentication.

Release History Table

Release Description

20.2R1 Starting in Junos 20.2R1, PCP for CGNAT DS-Lite services are supported for Next Gen Services.

18.2R1 Starting in Junos OS Release 18.2R1, PCP on the MS-MPC and MS-MIC supports DS-Lite.

17.4R1 Starting in Junos OS Release 17.4R1, PCP for NAPT44 is also supported on the MS-MPC and MS-MIC.

15.1 Starting with Junos OS Release 15.1, Port Control Protocol (PCP) version 2 is supported, which is in
compliance with RFC 6887.
258

Configuring Port Control Protocol

IN THIS SECTION

Configuring PCP Server Options | 258

Configuring a PCP Rule | 260

Configuring a NAT Rule | 262

Configuring a Service Set to Apply PCP | 262

SYSLOG Message Configuration | 263

This topic describes how to configure port control protocol (PCP). PCP is supported on the MS-DPC,
MS-100, MS-400, and MS-500 MultiServices PICs. Starting in Junos OS Release 17.4R1, PCP for
NAPT44 is also supported on the MS-MPC and MS-MIC. Starting in Junos OS Release 18.2R1, PCP on
the MS-MPC and MS-MIC supports DS-Lite. In Junos OS Release 18.1 and earlier releases, PCP on the
MS-MPC and MS-MIC does not support DS-Lite. Starting in Junos OS release 20.2R1 PCP is supported
on the MX-SPC3 security services card for CGNAT services.

Perform the following configuration tasks:

Configuring PCP Server Options

1. Specify a PCP server name.

user @host# edit services pcp server server-name

2. Set the IPv4 or IPv6 addresses of the server. For PCP DS-Lite, the ipv6-address must match the
address of the AFTR (Address Family Transition Router or softwire concentrator).

NOTE: Starting in Junos OS Release 18.2R1, PCP on the MS-MPC and MS-MIC supports DS-
Lite. In Junos OS Release 18.1 and earlier releases, PCP on the MS-MPC and MS-MIC does
not support DS-Lite.

[edit services pcp server server-name]


user @host# set ipv6-address ipv6-address
259

or

[edit services pcp server server-name]


user @host# set ipv4-address ipv4-address

3. For PCP DS-Lite, provide the name of the DS-Lite softwire concentrator configuration.

[edit services pcp server server-name]


user @host# set softwire-concentrator softwire-concentrator-name

4. Specify the minimum and maximum mapping lifetimes for the server.

[edit services pcp server server-name]


user @host# set mapping-lifetime-minimum mapping-lifetime-min
user @host# set mapping-lifetime-maximum mapping-lifetime-max

5. Specify the time limits for generating short lifetime or long lifetime errors.

[edit services pcp server server-name]


user @host# set short-lifetime-error short-lifetime-error
user @host# set long-lifetime-error long-lifetime-error

6. (Optional)—Enable PCP options on the specified PCP server. The following options are available—
third-party and prefer-failure. The third-party option is required to enable third-party requests by
the PCP client. DS-Lite requires the third-party option. The prefer-failure option requests generation
of an error message when the PCP client requests a specific IP address/port that is not available,
rather than assigning another available address from the NAT pool. If prefer-failure is not specified
NAPT44 assigns an available address/port from the NAT pool based on the configured NAT options.

[edit services pcp server server-name]


user @host# set pcp-options third-party
user @host# set pcp-options prefer-failure

7. (Optional)—Specify which NAT pool to use for mapping.

[edit services pcp server server-name]


user @host# set nat-options pool-name1 <poolname2...>
260

NOTE: When you do not explicitly specify a NAT pool for mapping, the Junos OS performs a
partial rule match based on source IP, source port, and protocol, and the Junos OS uses the
NAT pool configured for the first matching rule to allocate mappings for PCP.
You must use explicit configuration in order to use multiple NAT pools.

For the MX-SPC3 security services card and Next Gen Services, the nat-options statement
supports only one pool name to attach to a PCP server.

8. (Optional)—Configure the maximum number of mappings per client. The default is 32 and maximum
is 128.

[edit services pcp server server-name]


user @host# set max-mappings-per-client max-mappings-per-client

Configuring a PCP Rule


A PCP rule has the same basic options as all service set rules:

• A term option that allows a single rule to have multiple applications.

A term is not required when running the MX-SPC3 security services card for Next Gen Services.

• A from option that identifies the traffic that is subject to the rule.

• A then option that identifies what action is to be taken. In the case of a PCP rule, this option
Identifies the pcp server that handles selected traffic

1. Go to the [edit services pcp rule rule-name] hierarchy level and specify match-direction input.

user @host# edit services pcp rule rule-name


user @host# set match-direction input

2. Go to the [edit services pcp rule rule-name term term-name] hierarchy level and provide a term
name.

user @host# edit term term-name

This step is not required when running the MX-SPC3 security services card for Next Gen Services.
3. (Optional)—Provide a from option to filter the traffic to be selected for processing by the rule. When
you omit the from option, all traffic handled by the service set’s service interface is subject to the
261

rule. The following options are available at the [edit services pcp rule rule-name term term-name
from] hierarchy level:

application-sets set-name Traffic for the application set is processed by the PCP rule.

This step is not required when running the MX-SPC3 security


services card for Next Gen Services.

applications [ application- Traffic for the application is processed by the PCP rule.
name ]
This option is not required when running the MX-SPC3 security
services card for Next Gen Services.

destination-address Traffic for the destination address or prefix is processed by the PCP
address <except> rule. If you include the except option, traffic for the destination
address or prefix is not processed by the PCP rule.

destination-address- Traffic for the destination address range is processed by the PCP
range high maximum-value rule. If you include the except option, traffic for the destination
low minimum-value <except> address range is not processed by the PCP rule.

destination-port high Traffic for the destination port range is processed by the PCP rule.
maximum-value low
minimum-value
destination-prefix-list Traffic for a destination address in the prefix list is processed by the
list-name <except> PCP rule. If you include the except option, traffic for a destination
address in the prefix list is not processed by the PCP rule.

source-address address Traffic from the source address or prefix is processed by the PCP
<except> rule. If you include the except option, traffic from the source
address or prefix is not processed by the PCP rule.

source-address-range high Traffic from the source address range is processed by the PCP rule.
maximum-value low If you include the except option, traffic from the source address
minimum-value <except> range is not processed by the PCP rule.

source-prefix-list list- Traffic from a source address in the prefix list is processed by the
name <except> PCP rule. If you include the except option, traffic from a source
address in the prefix list is not processed by the PCP rule.

4. Set the then option to identify the target PCP server.

[edit services pcp rule rule-name term term-name]


user @host# set then pcp-server server-name
262

Configuring a NAT Rule


To configure a NAT rule:

1. Configure the NAT rule name and the match direction.

[edit services nat]


user@host# set rule rule-name match-direction match-direction

2. Specify the NAT pool to use:

[edit services nat rule-name term term-name then translated]


user@host# set source-pool nat-pool-name

3. Configure the translation type.

[edit services nat rule-name term term-name then translated]


user@host# set translation-type translation-type

4. If you are using PCP with IPv4-to-IPv4 NAT or with DS-Lite, configure endpoint-independent
mapping (EIM) and endpoint-independent filtering (EIF).

[edit services nat rule-name term term-name then translated]


user@host# set mapping-type endpoint-independent
user@host# set filtering-type endpoint-independent

NOTE: The PCP mappings are not created if you do not configure EIM and EIF with PCP for
IPv4-to-IPv4 NAT or for DS-Lite.

Configuring a Service Set to Apply PCP


To use PCP, you must provide the rule name (or name of a list of rule names) in the pcp-rule rule-name
option.

1. Go to the [edit services service-set service-set-name hierarchy level.

user @host# edit services service-set service-set-name


263

2. If this is a new service set, provide basic service set information, including interface information and
any other rules that may apply.
3. Specify the name of the PCP rule or rule list used to send traffic to the specified PCP server.

[edit services service-set service-set-name ]


user @host# set pcp-rule rule-name | rule-listname

NOTE: Your service set must also identify any required nat-rule and softwire-rule.

SYSLOG Message Configuration


A new syslog class, configuration option, pcp-logs, has been provided to control PCP log generation. It
provides the following levels of logging:

• protocol—All logs related to mapping creation, deletion are included at this level of logging.

• protocol-error—–All protocol error related logs (such as mapping refresh failed, PCP look up failed,
mapping creation failed). are included in this level of logging.

• system-error—Memory and infrastructure errors are included in this level of logging.

Release History Table

Release Description

20.2R1 Starting in Junos OS release 20.2R1 PCP is supported on the MX-SPC3 security services card for
CGNAT services.

18.2R1

17.4R1 Starting in Junos OS Release 17.4R1, PCP for NAPT44 is also supported on the MS-MPC and MS-MIC.
264

CHAPTER 16

Transitioning to IPv6 Using Mapping of Address and


Port with Encapsulation (MAP-E)

IN THIS CHAPTER

Mapping of Address and Port with Encapsulation (MAP-E) for Next Gen Services | 264

Equal Cost Multiple Path (ECMP) support for Mapping of Address and Port with Encapsulation (MAP-
E) | 271

Mapping of Address and Port with Encapsulation (MAP-E) for Next Gen
Services

IN THIS SECTION

Understanding Mapping of Address and Port with Encapsulation (MAP-E) | 264

Configuring Mapping of Address and Port with Encapsulation (MAP-E) for Next Gen Services | 268

Understanding Mapping of Address and Port with Encapsulation (MAP-E)

IN THIS SECTION

Benefits of Mapping of Address and Port with Encapsulation (MAP-E) | 265

Mapping of Address and Port with Encapsulation (MAP-E) Terminology | 265

Mapping of Address and Port with Encapsulation (MAP-E) Functionality | 266

Mapping of Address and Port with Encapsulation (MAP-E) Supported and Unsupported Features | 266
265

This topic provides an overview of Mapping of Address and Port with Encapsulation (MAP-E) feature
and its benefit to service providers when used as an inline service on MX Series routers with MPC and
MIC interfaces. Starting in Junos OS release 20.2R1, MAP-E softwires are supported under Next Gen
Services on either an MPC or MIC by specifying the inline services si-1/1/0 naming convention. Starting
in Junos OS release 20.3R1, MPC10E and MX2K-MPC11E support MAP-E.

Benefits of Mapping of Address and Port with Encapsulation (MAP-E)

Reduces administrative overhead and creates a scalable network infrastructure that easily supports
connectivity to a large number of IPv4 subscribers over the ISP's IPv6 access network.

Mapping of Address and Port with Encapsulation (MAP-E) Terminology

1. Border Relay (BR)—MAP-E-enabled provider edge device in a MAP domain. A BR device has at least
an IPv6-enabled interface and an IPv4 interface connected to the native IPv4 network.

2. MAP-E Customer Edge (CE)—MAP-E-enabled customer edge device in a MAP deployment.

3. MAP domain—One or more MAP-E CE devices and BR devices connected to the same virtual link.

4. Port Set ID (PSID)—Separate part of the transport layer port space that is denoted as port set ID.

5. Embedded Address (EA) Bits—EA-bits in the IPv6 address identify an IPv4 prefix or address or a
shared IPv4 address and a port-set identifier.

6. Softwire—Tunnel between two IPv6 end-points to carry IPv4 packets or two IPv4 end-points to carry
IPv6 packets.

7. Softwire Initiator (SI)—Softwire at the customer end that encapsulates native packets and tunnels
them to a softwire concentrator at the service provider.

8. Softwire Concentrator (SC)—Softwire that decapsulates the packets received from a softwire initiator
and sends them to their destination.
266

Mapping of Address and Port with Encapsulation (MAP-E) Functionality

Figure 6 on page 266 illustrates a simple MAP-E deployment scenario.

Figure 6: Sample MAP-E Deployment

In the MAP-E network topology, there are two MAP-E customer edge (CE) devices, each connected to a
private IPv4 host. The MAP-E CE devices are dual stack and are capable of Network Address Port
Translation (NAPT). The MAP-E CE devices connect to a MAP-E Border Relay (BR) device through an
IPv6-only MAP-E network domain. The MAP-E BR device is dual stack and is connected to both a public
IPv4 network and an IPv6 MAP-E network.

The MAP-E functionality is as follows:

1. The MAP-E CE devices are capable of NAPT. On receiving an IPv4 packet from the host, the MAP-E
CE device performs NAT translation on the incoming IPv4 packets.

2. The NAT translated IPv4 packets are then encapsulated into IPv6 packets by the MAP-E CE device,
and sent to the MAP-E BR device.

3. The IPv6 packet gets transported through the IPv6-only service provider network and reaches the
MAP-E BR device.

4. On receiving the IPv6 packets, the incoming IPv6 packets are decapsulated by the MAP-E CE device
and routed to the IPv4 public network.

In the reverse path, the incoming IPv4 packet is encapsulated into an IPv6 packet by the MAP-E BR
device, and routed to the MAP-E CE devices.

Mapping of Address and Port with Encapsulation (MAP-E) Supported and Unsupported Features

Junos OS supports the following MAP-E features and functionality:

• MAP-E implementation supports line card throughput of 100 Gigabits.


267

• support for Inline MAP-E Border Relay (BR) solution that adheres to draft version 03 of RFC 7597

Fully compliant with draft version 03 of RFC 7597, Mapping of Address and Port with Encapsulation
(MAP), when the version-3 option is disabled at the services softwires softwire-types map-e map-e-
concentrator-name

• Support chassis-wide scale of 250 shared MAP-E rules.

• Support the feature on all MPCs using service interfaces with 100 Gigabits.

• Ability to ping MAP-E BR IPv6 address.

• Support only next-hop style of configuration for MAP-E.

• Support reassembly of fragmented IPv4 traffic arriving from IPv4 network before encapsulating it
into an IPv6 packet.

• Support fragmentation of inner IPv4 packet if the packet size after encapsulation exceeds the MAP-E
maximum transmission unit (MTU).

• Packets having Internet Control Message Protocol (ICMP) payload with the following message types
are accepted for MAP-E encapsulation and decapsulation:

• Echo or Echo Reply Message of type 0 and 8

• Timestamp or Timestamp Reply Message of type 13 and 14

• Information Request or Information Reply Message of type 15 and 16

• Source quench, destination_unreachable, time_exceeded, Icmp_redirect,


Icmp_address_mask_reply and parameter_problem errors

• Border Relay (BR) anycast is supported.

The following features and functionality are not supported with the MAP-E feature:

• Anti-spoof check is not supported for fragmented IPv4 packets coming from a customer edge (CE)
device.

• Section 8.2 of the Internet draft draft-ietf-softwire-map-03 (expires on July 28, 2013), Mapping of
Address and Port with Encapsulation (MAP) is not supported. Instead of responding with an ICMPv6
Destination Unreachable, Source address failed ingress/egress policy (Type 1, Code 5) message,
spoof packets are silently dropped and the counter is incremented.

• IPv6 reassembly is not supported.

• ICMP v6-to-v4 translation at the BR is not supported.

• Inline MAP-E with virtual routing and forwarding (VRF) is not supported.
268

• Inline MAP-E with inline Network Address Translation (NAT) or dual stack (DS)-Lite is not supported.

• Interface-style MAP-E configuration is not supported.

Configuring Mapping of Address and Port with Encapsulation (MAP-E) for Next Gen
Services
This example shows you how to configure the MAP-E Border Relay (BR) solution using a next hop-based
style of configuration.

To configure MAP-E:

1. Create service interface on the device with 100g bandwidth support.

[edit chassis]
user@host# set fpc 0 pic 0 inline-services bandwidth 100g

2. Configure the dual stack service interface unit 0.

[edit interfaces]
user@host# set si-0/0/0 unit 0 family inet
user@host# set si-0/0/0 unit 0 family inet6

3. Configure service interface inside the dual stack domain.

[edit interfaces]
user@host# set si-0/0/0 unit 1 family inet
user@host# set si-0/0/0 unit 1 family inet family inet6
user@host# set si-0/0/0 unit 1 service-domain inside

4. Configure service interface outside the dual stack domain.

[edit interfaces]
user@host# set si-0/0/0 unit 2 family inet
user@host# set si-0/0/0 unit 2 family inet family inet6
user@host# set si-0/0/0 unit 2 service-domain outside
269

5. Configure the IPv4-facing interface on BR.

[edit interfaces]
user@host# set ge-0/2/7 unit 0 family inet address 10.10.10.1/16

6. Configure the CPE-facing interface on BR.

[edit interfaces]
user@host# set ge-0/2/8 unit 0 family inet6 address 3abc::1/16

7. Configure the MAP-E softwire concentrator and associated parameters.

a. (Optional) Configure MAPE version 3.

NOTE: For full RFC 7597 compliance do not configure MAP-E version 3.

b. Specify a name for MAP-E concentrator.

[edit]
user@host# edit services softwires softwire-types map-e mape-tun1

c. Specify the IPv6 address of the BR.

user@host# set br-address 2001:db8:ffff::1/128

d. Specify the rules for the MAP-E concentrator.

NOTE: When configuring the MAP-E softwire concentrator, take the following into
consideration:
• Possible values for ea-bits-len is 0 through 48.

• Possible values for v4-prefix-len is 0 through 32.

• If v4-prefix-len is 0 then ea-bits-len must be non-zero, and vice versa.

• It is possible that ea-bits-len is equal to 0, but psid-len is non-zero.


270

• If the sum of v4-prefix-len and ea-bits-len is less than 32, then the psid-len must be
equal to the difference between 32 and the sum total of v4-prefix-len and ea-bits-len.

• The MAP-E IPv4 and IPv6 prefix must be unique per softwire concentrator.

• MAP-E PSID offset has a default value of 4, and MAP-E tunnel maximum transmission
unit (MTU) has a default value of 9192.

i. Specify the rule length for the IPv4 and IPv6 prefixes.

user@host# edit services softwires softwire-types map-e mape-tun1


user@host# edit rule r1
[edit services softwires softwire-types map-e mape-tun1]
user@host# set rule r1 ipv4-prefix 192.0.2.0/24
user@host# set rule r1 ipv6-prefix 2001:db8:0000::/40

ii. Configure the rule length for embedded addresses.

[edit services softwires softwire-types map-e mape-tun1]


user@host# set ea-bits-length 16

iii. Configure the rule for the PSID offset.

[edit services softwires softwire-types map-e mape-tun1]


user@host# set psid-offset 4

iv. Configure the rule for the PSID length.

[edit services softwires softwire-types map-e mape-tun1]


user@host# set psid-len 8

v. Specify the MAP-E IPv6 tunnel MTU values.

[edit services softwires softwire-types map-e mape-tun1]


user@host# set mtu-v6 9192
user@host# set v4-reassembly
user@host# set v6-reassembly
271

vi. Configure the softwire rule, which specifies the direction of the traffic to be tunneled
through the MAP-E softwire.

[edit services softwires]


user@host# set rule-set domain-1 rule r1 then map-e map-e-dom-1

8. Configure the service-set for MAP-E.

[edit]
user@host# edit services service-set sset1
[edit services service-set sset1]
user@host# set softwires-rule-set domain-1
user@host# set next-hop-service inside-service-interface si-4/2/0.1
user@host# set next-hop-service outside-service-interface si-4/2/0.2

Release History Table

Release Description

20.3R1 Starting in Junos OS release 20.3R1, MPC10E and MX2K-MPC11E support MAP-E.

20.2R1 Starting in Junos OS release 20.2R1, MAP-E softwires are supported under Next Gen Services on either
an MPC or MIC by specifying the inline services si-1/1/0 naming convention.

Equal Cost Multiple Path (ECMP) support for Mapping of Address and
Port with Encapsulation (MAP-E)

IN THIS SECTION

Equal Cost Multiple Path (ECMP) support for Mapping of Address and Port with Encapsulation (MAP-
E) | 272

Disabling auto-routes to support ECMP with Mapping of Address and Port with Encapsulation (MAP-
E) | 272
272

Equal Cost Multiple Path (ECMP) support for Mapping of Address and Port with
Encapsulation (MAP-E)

IN THIS SECTION

Benefits | 272

This topic provides an overview of Equal Cost Multiple Path (ECMP) support for Mapping of Address
and Port with Encapsulation (MAP-E) feature and its benefit to service providers when used as an inline
service on MX Series routers with MPC and MIC interfaces.

In a MAP-E network topology, in the reverse path, the border relay router receives IPv4 traffic and
encapsulates it in a IPv6 packet. Longer routes are used for faster matching. However, they do not
facilitate EMCP load balancing on the PIC, as the routes point to a single PIC. Starting in 19.3R1, you
can disable auto-routes by configuring the disable-auto-route statement at the [edit services softwire
softwire-concentrator map-e <domain-name>] hierarchy, and direct the static routes to an ECMP load
balancer. Hence, the packets can be distributed among different inline service interfaces.

Benefits

Enable load-balancing by distributing packets among different inline service interfaces.

Disabling auto-routes to support ECMP with Mapping of Address and Port with
Encapsulation (MAP-E)
This example shows you how to disable auto-routes on a MAP-E Border Relay (BR) solution to support
ECMP.

1. Create service interface on the device with 100g bandwidth support.

[edit chassis]
user@host# set fpc 0 pic 0 inline-services bandwidth 100g

2. Configure the dual stack service interface unit 0.

[edit interfaces]
user@host# set si-0/0/0 unit 0 family inet
user@host# set si-0/0/0 unit 0 family inet6
273

3. Configure service interface inside the dual stack domain.

[edit interfaces]
user@host# set si-0/0/0 unit 1 family inet
user@host# set si-0/0/0 unit 1 family inet family inet6
user@host# set si-0/0/0 unit 1 service-domain inside

4. Configure service interface outside the dual stack domain.

[edit interfaces]
user@host# set si-0/0/0 unit 2 family inet
user@host# set si-0/0/0 unit 2 family inet family inet6
user@host# set si-0/0/0 unit 2 service-domain outside

5. Configure the IPv4-facing interface on BR.

[edit interfaces]
user@host# set ge-0/2/7 unit 0 family inet address 10.10.10.1/16

6. Configure the CPE-facing interface on BR.

[edit interfaces]
user@host# set ge-0/2/8 unit 0 family inet6 address 3abc::1/16

7. Configure MAP-E domain 1 and associated parameters.

[edit services softwire softwire-concentrator]


user@host# set map-e mape-domain-1 version03
user@host# set map-e mape-domain-1 softwire-address 2001:db8:ffff::1
user@host# set map-e mape-domain-1 ipv4-prefix 192.0.2.0/24 mape-prefix 2001:db8::/32
user@host# set map-e mape-domain-1 ea-bits-len 16
user@host# set map-e mape-domain-1 psid-offset 4
user@host# set map-e mape-domain-1 psid-length 8
user@host# set map-e mape-domain-1 mtu-ipv6 9192
user@host# set map-e mape-domain-1 disable-auto-route
274

8. Configure MAP-E domain 2 and associated parameters.

[edit services softwire softwire-concentrator]


user@host# set map-e mape-domain-2 version03
user@host# set map-e mape-domain-2 softwire-address 2001:db8:ffff::1
user@host# set map-e mape-domain-2 ipv4-prefix 192.0.3.0/24 mape-prefix 2002:db8::/32
user@host# set map-e mape-domain-2 ea-bits-len 16
user@host# set map-e mape-domain-2 psid-offset 4
user@host# set map-e mape-domain-2 psid-length 8
user@host# set map-e mape-domain-2 mtu-ipv6 9192
user@host# set map-e mape-domain-2 disable-auto-route

9. Configure a softwire rule for MAP-E domain-1 to specify the direction of traffic to be tunneled.

[edit services softwire]


user@host# set rule sw-rule1 match-direction input term t1 then map-e mape-domain-1

10. Configure a softwire rule for MAP-E domain-2 to specify the direction of traffic to be tunneled.

[edit services softwire]


user@host# set rule sw-rule2 match-direction input term t1 then map-e mape-domain-2

11. Configure a single rule-set to combine both the rules.

[edit services softwire]


user@host# set rule-set ecmp-rules rule sw-rule1
user@host# set rule-set ecmp-rules rule sw-rule2

12. Configure the service set for MAP-E.

[edit services service-set]


user@host# set sset1 softwire-rule-sets ecmp-rules
user@host# set sset1 next-hop-service inside-service-interface si-0/0/0.1
user@host# set sset1 next-hop-service outside-service-interface si-0/0/0.2
user@host# set sset2 softwire-rule-sets ecmp-rules
user@host# set sset2 next-hop-service inside-service-interface si-0/1/0.1
user@host# set sset2 next-hop-service outside-service-interface si-0/1/0.2
275

13. Configure static routes for MAP-E BR IPv6 address.

[edit routing-options]
user@host# set rib inet6.0 static route 2001:db8:ffff::1/128 next-hop si-0/0/0.1
user@host# set rib inet6.0 static route 2001:db8:ffff::1/128 next-hop si-0/1/0.1
user@host# set rib inet.0 static route 192.0.2.0/24 next-hop si-0/0/0.2
user@host# set rib inet.0 static route 192.0.2.0/24 next-hop si-0/1/0.2
user@host# set rib inet.0 static route 192.0.3.0/24 next-hop si-0/0/0.2
user@host# set rib inet.0 static route 192.0.3.0/24 next-hop si-0/1/0.2

14. Enable load balancing.

[edit ]
user@host# set policy-options policy-statement LB then load-balance per-packet
user@host# set routing-options forwarding-table export LB

15. Verify the status of the routes.

[edit ]
user@host# run show route 2001:db8:ffff::1
inet6.0: 10 destinations, 10 routes (10 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both

2001:db8:ffff::1/128
*[Static/5] 00:00:12
> via si-1/0/0.1
via si-1/1/0.1

The service sets of the PICs have ecmp-rules configured and they carry the MAP-E rules of
domain-1 and domain-2. From the output, you can understand that when the disable-auto-route is
enabled and ecmp -rules configured, instead of the longer auto routes, static routes are created.

RELATED DOCUMENTATION

map-e
276

CHAPTER 17

Monitoring and Troubleshooting Softwires

IN THIS CHAPTER

Ping and Traceroute for DS-Lite | 276

Monitoring Softwire Statistics | 277

Monitoring CGN, Stateful Firewall, and Softwire Flows | 279

Ping and Traceroute for DS-Lite

With Junos OS Release 11.4, you can use the ping and traceroute commands to determine the status of
the DS-Lite softwire tunnels:

• IPv6 ping—The softwire address endpoint on the DS-Lite softwire terminator (AFTR) is usually
configured only at the [edit services softwire] hierarchy level; it need not be hosted on any interface.
Previous releases of the Junos OS software did not provide replies to pings to the IPv6 softwire
address when the AFTR was not configured on a specific interface or loopback. An IPv6 ping enables
the softwire initiator (B4) to verify the softwire address of the AFTR before creating a tunnel.

• IPv4 ping—A special IPv4 address, 192.0.0.1, is reserved for the AFTR. Previous releases of the Junos
OS did not respond to any pings sent to this address. A B4 and other IPv4 nodes can now ping to this
address to determine whether the DS-Lite tunnel is working.

• Traceroute—The AFTR now generates and forwards traceroute packets over the DS-Lite tunnel.

NOTE: No additional CLI configuration is necessary to use the new functionality.


277

Monitoring Softwire Statistics

IN THIS SECTION

Purpose | 277

Action | 277

Purpose

You can review softwire global statistics by using the show services softwire or show services
softwire statistics command.

Action

user@host# show services softwire


Interface: sp-0/0/0, Service set: sset
Softwire Direction Flow count
2001:0:0:1::1 -> 1001::1 I 3

user@host# show services softwire statistics


DS-Lite Statistics:
Service PIC Name: :sp-0/0/0
Statistics
----------
Softwires Created :2
Softwires Deleted :1
Softwires Flows Created :2
Softwires Flows Deleted :1
Slow Path Packets Processed :2
Fast Path Packets Processed :274240
Fast Path Packets Encapsulated :583337
Rule Match Failed :0
Rule Match Succeeded :2
IPv6 Packets Fragmented :0
Transient Errors
----------------
278

Flow Creation Failed - Retry :0


Slow Path Failed - Retry :0
Errors
------
Softwire Creation Failed :0
Flow Creation Failed :0
Slow Path Failed :0
Packet not IPv4-in-IPv6 :0
IPv6 Fragmentation Error :0
Slow Path Failed - IPv6 Next Header Offset :0
Decapsulated Packet not IPv4 :0
Fast Path Failed - IPv6 Next Header Offset :0
No Softwire ID :0
No Flow Extension :0
Flow Limit Exceeded :0
6rd Statistics:
Service PIC Name :sp-0/0/0
Statistics
----------
Softwires Created :0
Softwires Deleted :0
Softwires Flows Created :0
Softwires Flows Deleted :0
Slow Path Packets Processed :0
Fast Path Packets Processed :0
Fast Path Packets Encapsulated :0
Rule Match Failed :0
Rule Match Succeeded :0
Transient Errors
----------------
Flow Creation Failed - Retry :0
Slow Path Failed - Retry :0
Errors
------
Softwire Creation Failed :0
Flow Creation Failed :0
Slow Path Failed :0
Packet not IPv6-in-IPv4 :0
Slow Path Failed - IPv6 Next Header Offset :0
Decapsulated Packet not IPv6 :0
Encapsulation Failed - No packet memory :0
No Softwire ID :0
279

No Flow Extension :0
ICMPv4 Dropped Packets :0

Monitoring CGN, Stateful Firewall, and Softwire Flows

IN THIS SECTION

Purpose | 279

Action | 279

Purpose

Use the following commands to check the creation of the softwires, pre-NAT flows, and post-NAT
flows. Output can be filtered using more specific fields such as AFTR or B4 address or both for DS-Lite,
and softwire-concentrator or softwire-initiator or both for 6rd.

• show services stateful-firewall flows

• show services softwire flows

Action

user@host# show services stateful-firewall flows


Interface: sp-0/1/0, Service set: dslite-svc-set2
Flow State Dir Frm count
TCP 200.200.200.2:80 -> 44.44.44.1:1025 Forward O 219942
NAT dest 44.44.44.1:1025 -> 20.20.1.4:1025
Softwire 2001::2 -> 1001::1
TCP 20.20.1.2:1025 -> 200.200.200.2:80 Forward I 110244
NAT source 20.20.1.2:1025 -> 44.44.44.1:1024
Softwire 2001::2 -> 1001::1
TCP 200.200.200.2:80 -> 44.44.44.1:1024 Forward O 219140
NAT dest 44.44.44.1:1024 -> 20.20.1.2:1025
Softwire 2001::2 -> 1001::1
DS-LITE 2001::2 -> 1001::1 Forward I 988729
TCP 200.200.200.2:80 -> 44.44.44.1:1026 Forward O 218906
280

NAT dest 44.44.44.1:1026 -> 20.20.1.3:1025


Softwire 2001::2 -> 1001::1
TCP 20.20.1.3:1025 -> 200.200.200.2:80 Forward I 110303
NAT source 20.20.1.3:1025 -> 44.44.44.1:1026
Softwire 2001::2 -> 1001::1
TCP 20.20.1.4:1025 -> 200.200.200.2:80 Forward I 110944
NAT source 20.20.1.4:1025 -> 44.44.44.1:1025
Softwire 2001::2 -> 1001::1

RELATED DOCUMENTATION

Tunneling Services for IPv4-to-IPv6 Transition Overview


281

CHAPTER 18

Port Forwarding Overview and Configuration

IN THIS CHAPTER

Port Forwarding for Next Gen Services | 281

Port Forwarding for Next Gen Services

IN THIS SECTION

Port Forwarding Overview | 281

Configuring Port Forwarding with Static Destination Address Translation for Next Gen Services | 282

Configuring Port Forwarding without Static Destination Address Translation for Next Gen Services | 286

Port Forwarding Overview

IN THIS SECTION

Benefits | 282

Port forwarding allows the public destination address and port of a packet to be translated to an IP
address and port in a private network. This translation is a static, one-to-one mapping.

Port forwarding allows a packet to reach a host within a masqueraded, typically private, network, based
on the port number on which the packet was received from the originating host. An example of this type
of destination is the host of a public HTTP server within a private network.
282

If you only need to change the destination port, you can also configure port forwarding without
translating the destination address.

Port forwarding is supported for destination NAT and twice NAPT 44. Port forwarding works only with
the FTP application-level gateway (ALG), and has no support for technologies that offer IPv6 services
over IPv4 infrastructure, such as IPv6 rapid deployment (6rd) and dual-stack lite (DS-Lite).

Benefits

• Allows remote computers, such as public machines on the Internet, to connect to a non-standard
port of a specific computer that is hidden within a private network.

Configuring Port Forwarding with Static Destination Address Translation for Next
Gen Services

IN THIS SECTION

Configuring the Destination Pool for Destination Address Translation | 282

Configuring the Mappings for Port Forwarding | 283

Configuring the NAT Rule for Port Forwarding with Destination Address Translation | 283

Configuring the Service Set for Port Forwarding with Destination Address Translation | 285

You can configure port forwarding with static destination address translation, which changes the
destination address and port of a packet so it can reach the correct host and port within a masqueraded,
typically private, network.

Configuring the Destination Pool for Destination Address Translation

To configure the destination pool for the static destination address translation:

1. Create a destination pool.

user@host# edit services nat destination pool nat-pool-name


283

2. Define the addresses or subnets to which destination addresses are translated.

[edit services nat destination pool nat-pool-name]


user@host# set address address-prefix

3. To allow the IP addresses of a NAT destination pool to overlap with IP addresses in pools used in
other service sets, configure allow-overlapping-pools.

[edit services nat]


user@host# set allow-overlapping-pools

Configuring the Mappings for Port Forwarding

1. Configure the port forwarding map name.

[edit services nat destination]


user@host# set port-forwarding map-name

2. Specify the original destination port number that needs to be translated and the port number to
which the original port is mapped. You can configure a maximum of 32 destination port mappings in a
port forwarding map.

[edit services nat destination port-forwarding map-name]


user@host# set destined-port port-id translated-port port-id

In the following example, the destination port number that needs to be translated is 23 and the port
to which traffic is mapped is 45.

[edit services nat destination port-forwarding map1]


user@host# set destined-port 32 translated-port 45

Configuring the NAT Rule for Port Forwarding with Destination Address Translation

To configure the NAT rule for port forwarding with destination address translation:
284

1. Configure the NAT rule name.

[edit services destination source]


user@host# set rule-set rule-set-name rule rule-name

2. Specify the traffic direction to which the NAT rule set applies.

[edit services nat destination rule-set rule-set-name]


user@host# set match-direction (in | out | in-out)

3. Specify the destination addresses that the NAT rule applies to.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match destination-address address

To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:

[edit services address-book global]


user@host# set address address-name range-address lower-limit to upper-limit
[edit services nat destination rule-set rule-set-name rule rule-name]
user@host# set match destination-address-name address-name

To specify any unicast address:

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match destination-address any-unicast

4. Specify the destination port range that the NAT rule applies to.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match destination-port low-port to high-port

5. Specify the NAT pool that contains the destination addresses for translated traffic.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set then destination-nat pool nat-pool-name
285

6. Specify the name of the mapping for port forwarding. You can only configure one mapping within a
NAT rule term.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set then port-forwarding-mappings map-name

7. Configure the generation of a syslog when traffic matches the destination NAT rule match
conditions.

[edit services nat destination rule-set rule-set-name rule rule-name then]


user@host# set syslog

Configuring the Service Set for Port Forwarding with Destination Address Translation

To configure the service set for static destination NAT:

1. Define the service set.

[edit services]
user@host# edit service-set service-set-name

2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.

[edit services service-set service-set-name]


user@host# set interface-service service-interface interface-name

or

[edit services service-set service-set-name]


user@host# set next-hop-service inside-service-interface interface-name outside-service-interface
interface-name

NOTE: You cannot use an AMS interface in a port forwarding service set.
286

3. Specify the NAT rule sets to be used with the service set.

[edit services service-set service-set-name]


user@host# set nat-rule-sets rule-set-name

Configuring Port Forwarding without Static Destination Address Translation for Next
Gen Services

IN THIS SECTION

Configuring the Mappings for Port Forwarding | 286

Configuring the NAT Rule for Port Forwarding without Destination Address Translation | 287

Configuring the Service Set for Port Forwarding without Destination Address Translation | 288

You can configure port forwarding without static destination address translation, which changes the
destination port of a packet so it can reach the correct port on the destination host.

Configuring the Mappings for Port Forwarding

1. Configure the port forwarding map name.

[edit services destination source]


user@host# set port-forwarding map-name

2. Specify the original destination port number that needs to be translated and the port number to
which the original port is mapped. You can configure a maximum of 32 destination port mappings in a
port forwarding map.

[edit services nat destination port-forwarding map-name]


user@host# set destined-port port-id translated-port port-id
287

In the following example, the destination port number that needs to be translated is 23 and the port
to which traffic is mapped is 45.

[edit services nat destination port-forwarding map1]


user@host# set destined-port 32 translated-port 45

Configuring the NAT Rule for Port Forwarding without Destination Address Translation

To configure the NAT rule for port forwarding without destination address translation:

1. Configure the NAT rule name.

[edit services destination source]


user@host# set rule-set rule-set-name rule rule-name

2. Specify the traffic direction to which the NAT rule set applies.

[edit services nat destination rule-set rule-set-name]


user@host# set match-direction (in | out | in-out)

3. Specify the destination addresses that the NAT rule applies to.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match destination-address address

To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:

[edit services address-book global]


user@host# set address address-name range-address lower-limit to upper-limit
[edit services nat destination rule-set rule-set-name rule rule-name]
user@host# set match destination-address-name address-name

To specify any unicast address:

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match destination-address any-unicast
288

4. Specify that there is no address translation for the rule.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set then destination-nat off

5. Specify the name of the mapping for port forwarding. You can only configure one mapping within a
NAT rule term.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set then port-forwarding-mappings map-name

6. Configure the generation of a syslog when traffic matches the destination NAT rule match
conditions.

[edit services nat destination rule-set rule-set-name rule rule-name then]


user@host# set syslog

Configuring the Service Set for Port Forwarding without Destination Address Translation

To configure the service set for static destination NAT:

1. Define the service set.

[edit services]
user@host# edit service-set service-set-name

2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.

[edit services service-set service-set-name]


user@host# set interface-service service-interface interface-name

or

[edit services service-set service-set-name]


user@host# set next-hop-service inside-service-interface interface-name outside-service-interface
interface-name
289

NOTE: You cannot use an AMS interface in a port forwarding service set.

3. Specify the NAT rule sets to be used with the service set.

[edit services service-set service-set-name]


user@host# set nat-rule-sets rule-set-name
290

CHAPTER 19

Port Translation Features Overview and


Configuration

IN THIS CHAPTER

Address Pooling and Endpoint Independent Mapping for Port Translation | 290

Round-Robin Port Allocation | 292

Secured Port Block Allocation for Port Translation | 293

Address Pooling and Endpoint Independent Mapping for Port Translation

IN THIS SECTION

Address Pooling | 290

Endpoint Independent Mapping and Endpoint Independent Filtering | 291

Address Pooling

Address pooling, or address pooling paired (APP) ensures assignment of the same external IP address for
all sessions originating from the same internal host. You can use this feature when assigning external IP
addresses from a pool. This option does not affect port utilization.

Address pooling solves the problems of an application opening multiple connections. For example, when
Session Initiation Protocol (SIP) client sends Real-Time Transport Protocol (RTP) and Real-Time Control
Protocol (RTCP) packets, the SIP generally server requires that they come from the same IP address,
even if they have been subject to NAT. If RTP and RTCP IP addresses are different, the receiving
endpoint might drop packets. Any point-to-point (P2P) protocol that negotiates ports (assuming address
stability) benefits from address pooling paired.

The following are use cases for address pooling:


291

• A site that offers instant messaging services requires that chat and their control sessions come from
the same public source address. When the user signs on to chat, a control session authenticates the
user. A different session begins when the user starts a chat session. If the chat session originates
from a source address that is different from the authentication session, the instant messaging server
rejects the chat session, because it originates from an unauthorized address.

• Certain websites such as online banking sites require that all connections from a given host come
from the same IP address.

NOTE: When you deactivate a service set that contains address pooling paired (APP) for that
service set, messages are displayed on the PIC console and the mappings are cleared for that
service set. These messages are triggered when the deletion of a service-set commences and
again generated when the deletion of the service set is completed. The following sample
messages are displayed when deletion starts and ends:

• Nov 15 08:33:13.974 LOG: Critical] SVC-SET ss1 (iid 5) deactivate/delete: NAT Mappings
and flows deletion initiated

• Nov 15 08:33:14.674 LOG: Critical] SVC-SET ss1 (iid 5) deactivate/delete: NAT Mappings
and flows deletion completed

In a scaled environment that contains a large number of APP in a service set, a heavy volume of
messages is generated and this process takes some amount of time. We recommend that you
wait until the console messages indicating the completion of deletion of the service set are
completed before you reactivate the service-set again.

Endpoint Independent Mapping and Endpoint Independent Filtering

Endpoint independent mapping (EIM) ensures the assignment of the same external address and port for
all connections from a given host if they use the same internal port. This means if they come from a
different source port, you are free to assign a different external address.

EIM and APP differ as follows:

• APP ensures assigning the same external IP address.

• EIM provides a stable external IP address and port (for a period of time) to which external hosts can
connect. Endpoint independent filtering (EIF) controls which external hosts can connect to an
internal host.

NOTE: When you deactivate a service set that contains endpoint independent mapping (EIM)
mapping for that service set, messages are displayed on the PIC console and the mappings are
292

cleared for that service set. These messages are triggered when the deletion of a service set
commences and again generated when the deletion of the service set is completed. The
following sample messages are displayed when deletion starts and ends:

• Nov 15 08:33:13.974 LOG: Critical] SVC-SET ss1 (iid 5) deactivate/delete: NAT Mappings
and flows deletion initiated

• Nov 15 08:33:14.674 LOG: Critical] SVC-SET ss1 (iid 5) deactivate/delete: NAT Mappings
and flows deletion completed

In a scaled environment that contains a large number of EIM mappings in a service set, a heavy
volume of messages is generated and this process takes some amount of time. We recommend
that you wait until the console messages indicating the completion of deletion of the service set
are completed before you reactivate the service-set again.

Round-Robin Port Allocation

Round-robin allocation is one method you can configure to allocate private addresses to external
addresses and ports. Round-robin allocation assigns one port from each external address in a range
before repeating the process for each address in the next range. After ports have been allocated for all
addresses in the last range, the allocation process wraps around and allocates the next unused port for
addresses in the first range. For example, if you have a NAT pool range of 100.0.0.1 through 100.0.0.12
and the first port is 3333:

• The first connection is allocated to the address:port 100.0.0.1:3333.

• The second connection is allocated to the address:port 100.0.0.2:3333.

• The third connection is allocated to the address:port 100.0.0.3:3333.

• The fourth connection is allocated to the address:port 100.0.0.4:3333.

• The fifth connection is allocated to the address:port 100.0.0.5:3333.

• The sixth connection is allocated to the address:port 100.0.0.6:3333.

• The seventh connection is allocated to the address:port 100.0.0.7:3333.

• The eighth connection is allocated to the address:port 100.0.0.8:3333.

• The ninth connection is allocated to the address:port 100.0.0.9:3333.

• The tenth connection is allocated to the address:port 100.0.0.10:3333.


293

• The eleventh connection is allocated to the address:port 100.0.0.11:3333.

• The twelfth connection is allocated to the address:port 100.0.0.12:3333.

• Wraparound occurs and the thirteenth connection is allocated to the address:port 100.0.0.1:3334.

Secured Port Block Allocation for Port Translation

You can configure secured port block allocation, which allocates blocks of ports to a subscriber for
source NAT port translation. The most recently allocated block is the current active block. New requests
for NAT ports for the subscriber are served from the active block. Ports are allocated randomly from the
current active block.

Carriers track subscribers using the IP address (RADIUS or DHCP) log. If they use port translation
without port block allocation, an IP address is shared by multiple subscribers, and the carrier must track
the IP address and port, which are part of the NAT log. Because ports are used and reused at a very high
rate, tracking subscribers using the log becomes difficult because of the large number of messages,
which are difficult to archive and correlate. By using port block allocation, you can significantly reduce
the number of logs, making it easier to track subscribers.

With port block allocation, we generate one syslog log per set of ports allocated for a subscriber. These
logs are UDP based and can be lost in the network, particularly for long-running flows. You can
configure an interim logging interval to re-send logs for active blocks that have traffic on at least one of
the ports.
294

CHAPTER 20

Static Source NAT Overview and Configuration

IN THIS CHAPTER

Static Source NAT Overview | 294

Configuring Static Source NAT44 or NAT66 for Next Gen Services | 295

Static Source NAT Overview

IN THIS SECTION

Benefits | 294

Static source NAT performs a one-to-one static mapping of the original private domain host source
address to a public source address. A block of external addresses is set aside for this mapping, and
source addresses are translated as hosts in a private domain originate sessions to the external domain.
Static source NAT does not perform port mapping. For packets outbound from the private network,
static source NAT translates source IP addresses and related fields such as IP, TCP, UDP, and ICMP
header checksums. For inbound packets, static source NAT translates the destination IP address and the
checksums.

Benefits

• Allows hosts in the private network to connect with the external domain, while hiding the private
network.
295

Configuring Static Source NAT44 or NAT66 for Next Gen Services

IN THIS SECTION

Configuring the Source Pool for Static Source NAT44 or NAT66 | 295

Configuring the NAT Rule for Static Source NAT44 or NAT66 | 296

Configuring the Service Set for Static Source NAT44 or NAT66 | 297

Configuring the Source Pool for Static Source NAT44 or NAT66


To configure the source pool for static source NAT44 or NAT66:

1. Create a source pool.

user@host# edit services nat source pool nat-pool-name

2. Define the addresses or subnets to which source addresses are translated.

[edit services nat source pool nat-pool-name]


user@host# set address address-prefix

or

[edit services nat source pool nat-pool-name]


user@host# set address address-prefix to address address-prefix

3. Configure a one-to-one static shifting of a range of original source addresses to the range of
addresses in the source pool by specifying the base address of the original source address range.

[edit services nat source pool nat-pool-name]


user@host# set host-address-base ip-address

For example, if the host address base is 198.51.100.30 and the NAT pool uses the range
203.0.113.10 to 203.0.113.20, then 198.51.100.30 translates to 203.0.113.10, 198.51.100.31
translates to 203.0.113.11, and so on.
296

4. To allow the IP addresses of a NAT source pool to overlap with IP addresses in pools used in other
service sets, configure allow-overlapping-pools.

[edit services nat]


user@host# set allow-overlapping-pools

Configuring the NAT Rule for Static Source NAT44 or NAT66


To configure the NAT source rule for static source NAT44 or NAT66 :

1. Configure the NAT rule name.

[edit services nat source]


user@host# set rule-set rule-set-name rule rule-name

2. Specify the traffic direction to which the NAT rule set applies.

[edit services nat source rule-set rule-set-name]


user@host# set match-direction (in | out | in-out)

3. Specify the addresses that are translated by the source NAT rule.
To specify one address or prefix value:

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match source-address address

To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:

[edit services address-book global]


user@host# set address address-name range-address lower-limit to upper-limit
[edit services nat source rule-set rule-set-name rule rule-name]
user@host# set match source-address-name address-name

To specify any unicast address:

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match source-address any-unicast
297

4. Specify one or more application protocols to which the NAT rule applies. The number of applications
listed in the rule must not exceed 3072.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match application [application-name]

5. Specify the NAT pool that contains the addresses for translated traffic.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set then source-nat pool nat-pool-name

6. Configure the address-pooling paired feature if you want to ensure assignment of the same external
IP address for all sessions originating from the same internal host.

[edit services nat source rule-set rule-set-name rule rule-name then source-
nat mapping-type]
user@host# set address-pooling-paired

7. Specify the timeout period for address-pooling-paired mappings that use the NAT pool. The range is
120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this amount of
time are dropped.

[edit services nat source pool nat-pool-name]


user@host# set mapping-timeout mapping-timeout

If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.
8. Configure the generation of a syslog when traffic matches the NAT rule conditions.

[edit services nat source rule-set rule-set-name rule rule-name then]


user@host# set syslog

Configuring the Service Set for Static Source NAT44 or NAT66


To configure the service set for static source NAT44 or NAT66:
298

1. Define the service set.

[edit services]
user@host# edit service-set service-set-name

2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.

[edit services service-set service-set-name]


user@host# set interface-service service-interface interface-name

or

[edit services service-set service-set-name]


user@host# set next-hop-service inside-service-interface interface-name outside-service-interface
interface-name

3. Specify the NAT rule sets to be used with the service set.

[edit services service-set service-set-name]


user@host# set nat-rule-sets rule-set-name

SEE ALSO

Static Source NAT Overview | 294


299

CHAPTER 21

Static Destination NAT Overview and Configuration

IN THIS CHAPTER

Static Destination NAT Overview | 299

Configuring Static Destination NAT for Next Gen Services | 300

Static Destination NAT Overview

IN THIS SECTION

Benefits of Static Destination NAT | 299

Static destination NAT translates the IPv4 destination address of an incoming packet to the IPv4
address of a private server. This redirects traffic destined to a virtual host (identified by the original
destination IP address) to the real host (identified by the translated destination IP address).

Static destination NAT uses a one-to-one mapping between the original address and the translated
address; the mapping is configured statically.

You can also statically translate the destination port by using port forwarding. See "Port Forwarding for
Next Gen Services" on page 281.

Benefits of Static Destination NAT

• Allows external traffic to communicate with a private host without revealing the host’s private IP
address

• Does not require port mapping


300

RELATED DOCUMENTATION

Configuring Static Destination NAT for Next Gen Services | 300

Configuring Static Destination NAT for Next Gen Services

IN THIS SECTION

Configuring the Destination Pool for Static Destination NAT | 300

Configuring the NAT Rule for Static Destination NAT | 300

Configuring the Service Set for Static Destination NAT | 302

Configuring the Destination Pool for Static Destination NAT

To configure the destination pool for static destination NAT:

1. Create a destination pool.

user@host# edit services nat destination pool nat-pool-name

2. Define the addresses or subnets to which destination addresses are translated.

[edit services nat destination pool nat-pool-name]


user@host# set address address-prefix

3. To allow the IP addresses of a NAT destination pool to overlap with IP addresses in pools used in
other service sets, configure allow-overlapping-pools.

[edit services nat]


user@host# set allow-overlapping-pools

Configuring the NAT Rule for Static Destination NAT


To configure the NAT rule for static destination NAT:
301

1. Configure the NAT rule name.

[edit services nat destination]


user@host# set rule-set rule-set-name rule rule-name

2. Specify the traffic direction to which the destination NAT rule set applies.

[edit services nat destination rule-set rule-set-name]


user@host# set match-direction (in | out | in-out)

3. Specify the source addresses of traffic that the NAT rule applies to.
To specify one address or prefix value:

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match source-address address

To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:

[edit services address-book global]


user@host# set address address-name range-address lower-limit to upper-limit
[edit services nat destination rule-set rule-set-name rule rule-name]
user@host# set match source-address-name address-name

To specify any unicast address:

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match source-address any-unicast

4. Specify the destination addresses that the NAT rule applies to.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match destination-address address
302

To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:

[edit services address-book global]


user@host# set address address-name range-address lower-limit to upper-limit
[edit services nat destination rule-set rule-set-name rule rule-name]
user@host# set match destination-address-name address-name

To specify any unicast address:

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match destination-address any-unicast

5. Specify one or more application protocols to which the destination NAT rule applies. The number of
applications listed in the rule must not exceed 3072.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match application [application-name]

6. Specify the NAT pool that contains the destination addresses for translated traffic.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set then destination-nat pool nat-pool-name

7. Configure the generation of a syslog when traffic matches the destination NAT rule match
conditions.

[edit services nat destination rule-set rule-set-name rule rule-name then]


user@host# set syslog

Configuring the Service Set for Static Destination NAT


To configure the service set for static destination NAT:

1. Define the service set.

[edit services]
user@host# edit service-set service-set-name
303

2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.

[edit services service-set service-set-name]


user@host# set interface-service service-interface interface-name

or

[edit services service-set service-set-name]


user@host# set next-hop-service inside-service-interface interface-name outside-service-interface
interface-name

3. Specify the NAT rule sets to be used with the service set.

[edit services service-set service-set-name]


user@host# set nat-rule-sets rule-set-name

RELATED DOCUMENTATION

Static Destination NAT Overview | 299


304

CHAPTER 22

Twice NAPT Overview and Configuration

IN THIS CHAPTER

Twice NAPT Overview | 304

Configuring Twice NAPT for Next Gen Services | 305

Twice NAPT Overview

IN THIS SECTION

Benefits | 304

Twice NAPT translates both the source and destination IP addresses.

The private source address is translated by dynamically assigning a public address from a pool and a port
number. Multiple private IP addresses can be mapped to the same external address because each
private address is mapped to a different port of the external address.

The destination address is translated to the IPv4 address of a private server. This redirects traffic
destined to a virtual host (identified by the original destination IP address) to the real host (identified by
the translated destination IP address). The destination addresses is translated with a one-to-one static
mapping to an address in a pool. Port mapping is not performed for the destination address.

You can also statically translate the destination port by using port forwarding. See "Port Forwarding for
Next Gen Services" on page 281.

Benefits

• Allows hosts in the private network to connect with the external domain, while hiding the private
network.
305

• Minimizes the number of public IP addresses that are allocated for NAT.

• Allows external traffic to communicate with a private host without revealing the host’s private IP
address

Configuring Twice NAPT for Next Gen Services

IN THIS SECTION

Configuring the Source and Destination Pools for Twice NAPT | 305

Configuring the NAT Rules for Twice NAPT | 309

Configuring the Service Set for Twice NAPT | 312

Configuring the Source and Destination Pools for Twice NAPT


To configure the source and destination pools for twice NAPT:

1. Create a source pool.

user@host# edit services nat source pool nat-pool-name

2. Define the addresses or subnets to which source addresses are translated.

[edit services nat source pool nat-pool-name]


user@host# set address address-prefix

or

[edit services nat source pool nat-pool-name]


user@host# set address address-prefix to address address-prefix
306

3. To configure automatic port assignment, specify either random allocation or round-robin allocation.

[edit services nat source pool nat-pool-name port]


user@host# set automatic (random-allocation | round-robin)

Random allocation randomly assigns a port from the range 1024 through 65535 for each port
translation. Round robin allocation first assigns port 1024, and uses the next higher port for each
successive port assignment. Round robin allocation is the default.
4. To disable round-robin port allocation for all NAT pools that do not specify an automatic (random-
allocation | round-robin) setting, configure the global setting.

[edit services nat source]


user@host# set port-round-robin disable

5. To configure a range of ports to assign to a pool, perform the following:

NOTE: If you specify a range of ports to assign, the automatic statement is ignored.

a. Specify the low and high values for the port. If you do not configure automatic port assignment,
you must configure a range of ports.

[edit services nat source pool nat-pool-name port]


user@host# set range port-low to port-high

b. Specify either random allocation or round-robin allocation. Round-robin allocation is the default.

[edit services nat source pool nat-pool-name port range]


user@host# set (random-allocation | round-robin)

6. Assign a port within the same range as the incoming port—either 0 through 1023 or 1024 through
65,535. This feature is not available if you configure port-block allocation.

[edit services nat source pool nat-pool-name port]


user@host# set preserve-range
307

7. Assign a port with the same parity (even or odd) as the incoming port. This feature is not available if
you configure port-block allocation.

[edit services nat source pool nat-pool-name port]


user@host# set preserve-parity

8. Configure a global default port range for NAT pools that use port translation. This port range is
used when a NAT pool does not specify a port range and does not specify automatic port
assignment. The global port range can be from 1024 through 65,535.

[edit services nat source]


user@host# set pool-default-port-range port-low to port-high

9. If you want to allocate a block of ports for each subscriber to use for NAPT, configure port-block
allocation:
a. Configure the number of ports in a block. The range is 1 through 64,512 and the default is 128.

[edit services nat source pool nat-pool-name port]


user@host# set block-allocation block-size block-size

b. Configure the interval, in seconds, for which the block is active. After the timeout, a new block is
allocated, even if ports are available in the active block. If you set the timeout to 0, port blocks
are filled completely before a new port block is allocated, and the last port block remains active
indefinitely. The range is 0 through 86,400, and the default is 0.

[edit services nat source pool nat-pool-name port block-allocation]


user@host# set active-block-timeout timeout-interval

c. Specify the timeout period for address-pooling paired mappings that use the NAT pool. The
range is 120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this
amount of time are dropped.

[edit services nat source pool nat-pool-name]


user@host# set mapping-timeout mapping-timeout

If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.
308

d. Configure the maximum number of blocks that can be allocated to a user address. The range is 1
through 512, and the default is 8.

[edit services nat source pool nat-pool-name port block-allocation]


user@host# set maximum-blocks-per-host maximum-block-number

e. Specify how often to send interim system logs for active port blocks and for inactive port blocks
with live sessions. This increases the reliability of system logs, which are UDP-based and can get
lost in the network. The range is 1800 through 86,400 seconds, and the default is 0 (interim logs
are disabled).

[edit services nat source pool nat-pool-name port block-allocation]


user@host# set interim-logging-interval timeout-interval

10. Specify the timeout period for endpoint independent translations that use the specified NAT pool.
Mappings that are inactive for this amount of time are dropped. The range is 120 through 86,400
seconds. If you do not configure ei-mapping-timeout, then the mapping-timeout value is used for
endpoint independent translations.

[edit services nat source pool nat-pool-name]


user@host# set ei-mapping-timeout ei-mapping-timeout

11. Specify the timeout period for address-pooling paired mappings that use the NAT pool. The range
is 120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this amount
of time are dropped.

[edit services nat source pool nat-pool-name]


user@host# set mapping-timeout mapping-timeout

If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.
12. Define the NAT pool utilization levels that trigger SNMP traps. The raise-threshold is the pool
utilization percentage that triggers the trap, and the range is 50 through 100. The clear-threshold is
the pool utilization percentage that clears the trap, and the range is 40 through 100. For pools that
use port-block allocation, the utilization is based on the number of ports that are used; for pools
309

that do not use port-block allocation, the utilization is based on the number of addresses that are
used.

[edit services nat source pool nat-pool-name]


user@host# set pool-utilization-alarm raise-threshold value
user@host# set pool-utilization-alarm clear-threshold value

If you do not configure pool-utilization-alarm, traps are not created.


13. Create a destination pool. Do not use the same name that you used for the source pool.

user@host# edit services nat destination pool nat-pool-name

14. Define the addresses or subnets to which destination addresses are translated.

[edit services nat destination pool nat-pool-name]


user@host# set address address-prefix

15. To allow the IP addresses of a NAT source pool or destination pool to overlap with IP addresses in
pools used in other service sets, configure allow-overlapping-pools. However, pools that configure
port-block allocation must not overlap with other pools.

[edit services nat]


user@host# set allow-overlapping-pools

Configuring the NAT Rules for Twice NAPT


To configure the source and destination NAT rules for twice NAPT:

1. Configure the source NAT rule name.

[edit services nat source]


user@host# set rule-set rule-set-name rule rule-name

2. Specify the traffic direction to which the NAT rule set applies.

[edit services nat source rule-set rule-set-name]


user@host# set match-direction (in | out | in-out)

3. Specify the addresses that are translated by the source NAT rule.
310

To specify one address or prefix value:

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match source-address address

To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:

[edit services address-book global]


user@host# set address address-name range-address lower-limit to upper-limit
[edit services nat source rule-set rule-set-name rule rule-name]
user@host# set match source-address-name address-name

To specify any unicast address:

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match source-address any-unicast

4. Specify one or more application protocols to which the NAT rule applies. The number of
applications listed in the rule must not exceed 3072.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match application [application-name]

5. Specify the NAT pool that contains the addresses for translated traffic.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set then source-nat pool nat-pool-name

6. If you want to ensure that the same external address and port are assigned to all connections from
a given host, configure endpoint-independent mapping:

a. Configure the mapping type as endpoint independent.

[edit services nat source rule-set rule-set-name rule rule-name then


source-nat]
user@host# set mapping-type endpoint-independent
311

b. Specify prefix lists that contain the hosts that are allowed to establish inbound connections
using the endpoint-independent mapping. (Prefix lists are configured at the [edit policy-options]
hierarchy level.)

[edit services nat source rule-set rule-set-name rule rule-name then


source-nat]
user@host# set filtering-type endpoint-independent prefix-list [allowed-host] except [denied-
host]

c. Specify the maximum number of inbound flows allowed simultaneously on an endpoint-


independent mapping.

[edit services nat source rule-set rule-set-name rule rule-name then


source-nat]
user@host# set secure-nat-mapping eif-flow-limit number-of-flows

d. Specify the direction in which active endpoint-independent mapping is refreshed. By default,


mapping is refreshed for both inbound and outbound active flows.

[edit services nat source rule-set rule-set-name rule rule-name then


source-nat]
user@host# set secure-nat-mapping mapping-refresh (inbound | inbound-outbound | outbound)

7. Configure the generation of a syslog when traffic matches the NAT rule conditions.

[edit services nat source rule-set rule-set-name rule rule-name then]


user@host# set syslog

8. Configure the destination NAT rule name.

[edit services nat destination]


user@host# set rule-set rule-set-name rule rule-name

9. Specify the traffic direction to which the destination NAT rule set applies.

[edit services nat destination rule-set rule-set-name]


user@host# set match-direction (in | out | in-out)
312

10. Specify the destination addresses of traffic that the destination NAT rule applies to.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match destination-address address

To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:

[edit services address-book global]


user@host# set address address-name range-address lower-limit to upper-limit
[edit services nat destination rule-set rule-set-name rule rule-name]
user@host# set match destination-address-name address-name

To specify any unicast address:

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match destination-address any-unicast

11. Specify one or more application protocols to which the destination NAT rule applies. The number
of applications listed in the rule must not exceed 3072.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match application [application-name]

12. Specify the destination NAT pool that contains the destination addresses for translated traffic.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set then destination-nat pool nat-pool-name

13. Configure the generation of a syslog when traffic matches the destination NAT rule match
conditions.

[edit services nat destination rule-set rule-set-name rule rule-name then]


user@host# set syslog

Configuring the Service Set for Twice NAPT


To configure the service set for twice NAPT:
313

1. Define the service set.

[edit services]
user@host# edit service-set service-set-name

2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.

[edit services service-set service-set-name]


user@host# set interface-service service-interface interface-name

or

[edit services service-set service-set-name]


user@host# set next-hop-service inside-service-interface interface-name outside-service-interface
interface-name

3. Specify the NAT rule sets to be used with the service set. Include the source NAT rule set and the
destination NAT rule set.

[edit services service-set service-set-name]


user@host# set nat-rule-sets rule-set-name
314

CHAPTER 23

Twice NAT Overview and Configuration

IN THIS CHAPTER

Twice Static NAT Overview | 314

Configuring Twice Static NAT44 for Next Gen Services | 315

Twice Dynamic NAT Overview | 320

Configuring Twice Dynamic NAT for Next Gen Services | 320

Twice Static NAT Overview

IN THIS SECTION

Benefits | 314

Twice static NAT translates both the source and destination IP addresses. An addresses is translated
with a one-to-one static mapping to an address in a pool. Port mapping is not performed.

The original private domain host source address is translated to a public source address.

The destination address is translated to the IPv4 address of a private server. This redirects traffic
destined to a virtual host (identified by the original destination IP address) to the real host (identified by
the translated destination IP address).

Benefits

• Allows hosts in the private network to connect with the external domain, while hiding the private
network.

• Hides a private network


315

• Allows external traffic to communicate with a private host without revealing the host’s private IP
address

• Does not require port mapping

Configuring Twice Static NAT44 for Next Gen Services

IN THIS SECTION

Configuring the Source and Destination Pools for Twice Static NAT44 | 315

Configuring the NAT Rules for Twice Static NAT44 | 316

Configuring the Service Set for Twice Static NAT44 | 319

Configuring the Source and Destination Pools for Twice Static NAT44
To configure the source and destination pools for twice static NAT44:

1. Create a source pool.

user@host# edit services nat source pool nat-pool-name

2. Define the addresses or subnets to which source addresses are translated.

[edit services nat source pool nat-pool-name]


user@host# set address address-prefix

or

[edit services nat source pool nat-pool-name]


user@host# set address address-prefix to address address-prefix
316

3. Configure a one-to-one static shifting of a range of original source addresses to the range of
addresses in the source pool by specifying the base address of the original source address range.

[edit services nat source pool nat-pool-name]


user@host# set host-address-base ip-address

For example, if the host address base is 198.51.100.30 and the NAT pool uses the range
203.0.113.10 to 203.0.113.20, then 198.51.100.30 translates to 203.0.113.10, 198.51.100.31
translates to 203.0.113.11, and so on.
4. Create a destination pool. Do not use the same name that you used for the source pool.

user@host# edit services nat destination pool nat-pool-name

5. Define the addresses or subnets to which destination addresses are translated.

[edit services nat destination pool nat-pool-name]


user@host# set address address-prefix

6. To allow the IP addresses of a NAT pool to overlap with IP addresses in pools used in other service
sets, configure allow-overlapping-pools.

[edit services nat]


user@host# set allow-overlapping-pools

Configuring the NAT Rules for Twice Static NAT44


To configure the source and destination NAT rules for twice static NAT44:

1. Configure the source NAT rule name.

[edit services nat source]


user@host# set rule-set rule-set-name rule rule-name

2. Specify the traffic direction to which the NAT rule set applies.

[edit services nat source rule-set rule-set-name]


user@host# set match-direction (in | out | in-out)

3. Specify the addresses that are translated by the source NAT rule.
317

To specify one address or prefix value:

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match source-address address

To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:

[edit services address-book global]


user@host# set address address-name range-address lower-limit to upper-limit
[edit services nat source rule-set rule-set-name rule rule-name]
user@host# set match source-address-name address-name

To specify any unicast address:

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match source-address any-unicast

4. Specify one or more application protocols to which the source NAT rule applies. The number of
applications listed in the rule must not exceed 3072.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match application [application-name]

5. Specify the source NAT pool that contains the addresses for translated traffic.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set then source-nat pool nat-pool-name

6. Configure the generation of a syslog when traffic matches the NAT rule conditions.

[edit services nat source rule-set rule-set-name rule rule-name then]


user@host# set syslog
318

7. Configure the destination NAT rule name.

[edit services nat destination]


user@host# set rule-set rule-set-name rule rule-name

8. Specify the traffic direction to which the destination NAT rule set applies.

[edit services nat destination rule-set rule-set-name]


user@host# set match-direction (in | out | in-out)

9. Specify the destination addresses of traffic that the destination NAT rule applies to.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match destination-address address

To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:

[edit services address-book global]


user@host# set address address-name range-address lower-limit to upper-limit
[edit services nat destination rule-set rule-set-name rule rule-name]
user@host# set match destination-address-name address-name

To specify any unicast address:

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match destination-address any-unicast

10. Specify one or more application protocols to which the destination NAT rule applies. The number
of applications listed in the rule must not exceed 3072.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match application [application-name]
319

11. Specify the destination NAT pool that contains the destination addresses for translated traffic.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set then destination-nat pool nat-pool-name

12. Configure the generation of a syslog when traffic matches the destination NAT rule match
conditions.

[edit services nat destination rule-set rule-set-name rule rule-name then]


user@host# set syslog

Configuring the Service Set for Twice Static NAT44


To configure the service set for twice static NAT44:

1. Define the service set.

[edit services]
user@host# edit service-set service-set-name

2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.

[edit services service-set service-set-name]


user@host# set interface-service service-interface interface-name

or

[edit services service-set service-set-name]


user@host# set next-hop-service inside-service-interface interface-name outside-service-interface
interface-name

3. Specify the NAT rule sets to be used with the service set. Include the source NAT rule set and the
destination NAT rule set.

[edit services service-set service-set-name]


user@host# set nat-rule-sets rule-set-name
320

Twice Dynamic NAT Overview

IN THIS SECTION

Benefits | 320

Twice dynamic NAT translates both the source and destination IP addresses. Port mapping is not
performed.

The private source address is translated by dynamically assigning a public address from a pool, and the
mapping from the original source address to the translated source address is maintained as long as there
is at least one active flow that uses this mapping.

The destination address is translated to the IPv4 address of a private server. This redirects traffic
destined to a virtual host (identified by the original destination IP address) to the real host (identified by
the translated destination IP address). The destination addresses is translated with a one-to-one static
mapping to an address in a pool.

Benefits

• Allows hosts in the private network to connect with the external domain, while hiding the private
network.

• Allows a few public IP addresses to be used by several private hosts

• Allows external traffic to communicate with a private host without revealing the host’s private IP
address

• Does not require port mapping

Configuring Twice Dynamic NAT for Next Gen Services

IN THIS SECTION

Configuring the Source and Destination Pools for Twice Dynamic NAT | 321

Configuring the NAT Rules for Twice Dynamic NAT | 322


321

Configuring the Service Set for Twice Dynamic NAT | 325

Configuring the Source and Destination Pools for Twice Dynamic NAT
To configure the source and destination pools for twice dynamic NAT:

1. Create a source pool.

user@host# edit services nat source pool nat-pool-name

2. Define the addresses or subnets to which source addresses are translated.

[edit services nat source pool nat-pool-name]


user@host# set address address-prefix

or

[edit services nat source pool nat-pool-name]


user@host# set address address-prefix to address address-prefix

3. Disable port translation.

[edit services nat destination pool nat-pool-name]


user@host# set port no-translation

4. Define the NAT pool utilization levels that trigger SNMP traps. The raise-threshold is the pool
utilization percentage that triggers the trap, and the range is 50 through 100. The clear-threshold is
the pool utilization percentage that clears the trap, and the range is 40 through 100. The utilization is
based on the number of addresses that are used.

[edit services nat source pool nat-pool-name]


user@host# set pool-utilization-alarm raise-threshold value
user@host# set pool-utilization-alarm clear-threshold value

If you do not configure pool-utilization-alarm, traps are not created.


322

5. Create a destination pool. Do not use the same name that you used for the source pool.

user@host# edit services nat destination pool nat-pool-name

6. Define the addresses or subnets to which destination addresses are translated.

[edit services nat destination pool nat-pool-name]


user@host# set address address-prefix

7. To allow the IP addresses of a NAT source pool or destination pool to overlap with IP addresses in
pools used in other service sets, configure allow-overlapping-pools.

[edit services nat]


user@host# set allow-overlapping-pools

Configuring the NAT Rules for Twice Dynamic NAT


To configure the source and destination NAT rules for twice dynamic NAT:

1. Configure the source NAT rule name.

[edit services nat source]


user@host# set rule-set rule-set-name rule rule-name

2. Specify the traffic direction to which the NAT rule set applies.

[edit services nat source rule-set rule-set-name]


user@host# set match-direction (in | out | in-out)

3. Specify the addresses that are translated by the source NAT rule.
To specify one address or prefix value:

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match source-address address
323

To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:

[edit services address-book global]


user@host# set address address-name range-address lower-limit to upper-limit
[edit services nat source rule-set rule-set-name rule rule-name]
user@host# set match source-address-name address-name

To specify any unicast address:

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match source-address any-unicast

4. Specify one or more application protocols to which the source NAT rule applies. The number of
applications listed in the rule must not exceed 3072.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match application [application-name]

5. Configure the address-pooling paired feature if you want to ensure assignment of the same external
IP address for all sessions originating from the same internal host.

[edit services nat source rule-set rule-set-name rule rule-name then source-
nat mapping-type]
user@host# set address-pooling-paired

6. Specify the timeout period for address-pooling-paired mappings that use the NAT pool. The range
is 120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this amount
of time are dropped.

[edit services nat source pool nat-pool-name]


user@host# set mapping-timeout mapping-timeout

If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.
324

7. Specify the source NAT pool that contains the addresses for translated traffic.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set then source-nat pool nat-pool-name

8. Configure the generation of a syslog when traffic matches the NAT rule conditions.

[edit services nat source rule-set rule-set-name rule rule-name then]


user@host# set syslog

9. Configure the destination NAT rule name.

[edit services nat destination]


user@host# set rule-set rule-set-name rule rule-name

10. Specify the traffic direction to which the destination NAT rule set applies.

[edit services nat destination rule-set rule-set-name]


user@host# set match-direction (in | out | in-out)

11. Specify the destination addresses of traffic that the destination NAT rule applies to.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match destination-address address

To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:

[edit services address-book global]


user@host# set address address-name range-address lower-limit to upper-limit
[edit services nat destination rule-set rule-set-name rule rule-name]
user@host# set match destination-address-name address-name

To specify any unicast address:

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match destination-address any-unicast
325

12. Specify one or more application protocols to which the destination NAT rule applies. The number
of applications listed in the rule must not exceed 3072.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match application [application-name]

13. Specify the destination NAT pool that contains the destination addresses for translated traffic.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set then destination-nat pool nat-pool-name

14. Configure the generation of a syslog when traffic matches the destination NAT rule match
conditions.

[edit services nat destination rule-set rule-set-name rule rule-name then]


user@host# set syslog

Configuring the Service Set for Twice Dynamic NAT


To configure the service set for twice dynamic NAT:

1. Define the service set.

[edit services]
user@host# edit service-set service-set-name

2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.

[edit services service-set service-set-name]


user@host# set interface-service service-interface interface-name

or

[edit services service-set service-set-name]


user@host# set next-hop-service inside-service-interface interface-name outside-service-interface
interface-name
326

3. Specify the NAT rule sets to be used with the service set. Include the source NAT rule set and the
destination NAT rule set.

[edit services service-set service-set-name]


user@host# set nat-rule-sets rule-set-name
327

CHAPTER 24

Class of Service Overview and Configuration

IN THIS CHAPTER

Class of Service for Services PICs (Next Gen Services) | 327

Class of Service for Services PICs (Next Gen Services)

IN THIS SECTION

Class of Service Overview for Services PICs (Next Gen Services) | 327

Configuring CoS for Traffic Processed by a Services PIC (Next Gen Services) | 328

Class of Service Overview for Services PICs (Next Gen Services)

IN THIS SECTION

Benefits | 328

You can configure CoS Differentiated Services (DiffServ) code point (DSCP) marking and forwarding-
class assignment for packets transiting a services PIC while being processed by a service set.

Configure services CoS rules, which identify the matching conditions for packet source and destination
addresses and for packet applications, and the actions to take on those packets. You must apply CoS
rules to a service set before the rules can be applied to traffic. Only stateful firewall and NAT rules can
be used with CoS rules in a service set.
328

You can also configure specific CoS actions for FTP and for SIP traffic by creating an application profile.
The application profile can then be referenced in the CoS rule actions.

The services CoS rules do not support scheduling. You must configure scheduling at the [edit class-of-
service] hierarchy level on the output interface or fabric.

NOTE: When configuring Next Gen Services with the MX-SPC3 services card, the service set
must include at least one stateful firewall (SFW) rule or NAT rule, or services CoS does not work.
Only stateful firewall and NAT rules can be used with CoS rules in a service set. CoS works
without NAT and SFW rules also.

Benefits

CoS for traffic on a services PIC lets you classify traffic flows based on stateful firewall and NAT
configurations.

SEE ALSO

Configuring CoS for Traffic Processed by a Services PIC (Next Gen Services) | 0

Configuring CoS for Traffic Processed by a Services PIC (Next Gen Services)

IN THIS SECTION

Configuring CoS Rules | 328

Configuring Application Profiles for CoS Rules | 331

Configuring CoS Rule Sets | 333

Configuring the Service Set for CoS | 333

Configuring CoS Rules

1. Configure a name for the CoS rule.

user@host# edit services cos rule rule-name


329

2. Specify the traffic flow direction for the CoS rule.

[edit services cos rule rule-name]


user@host# set match-direction (input | input-output | output)

If this CoS rule is applied to an interface-type service set, the direction is determined by whether a
packet is entering or leaving the interface on which the service set is applied. If this CoS rule is
applied to a next-hop service set, the direction is input if the inside interface is used to route the
packet, and the direction is output if the outside interface is used to route the package.

If you configure input-output, the rule is applied to sessions initiated from either direction.
3. Configure a name for a CoS rule policy.

[edit services cos rule rule-name]


user@host# set policy policy-name

You can configure multiple policies for a CoS rule. Each policy identifies the matching conditions for
packet source and destination addresses and for packet applications, and the CoS actions to take
on those packets. Once a policy in the rule matches a packet, that policy is applied and no other
policies in the rule are processed.
4. Specify one or more port-based applications that match the policy.

[edit services cos rule rule-name policy policy-name]


user@host# set match application [application-names]

5. Specify the destination address that matches the policy.

[edit services cos rule rule-name policy policy-name]


user@host# set match destination-address address

6. Specify a range of destination addresses that match the policy.

[edit services cos rule rule-name policy policy-name]


user@host# set match destination-address-range low minimum-value high maximum-value
330

7. Specify the destination port number that matches the policy.

[edit services cos rule rule-name policy policy-name]


user@host# set match destination-port port-number

8. Specify the source address that matches the policy.

[edit services cos rule rule-name policy policy-name]


user@host# set match source-address address

9. Specify a range of source addresses that match the policy.

[edit services cos rule rule-name policy policy-name]


user@host# set match source-address-range low minimum-value high maximum-value

10. Specify a prefix list of source address prefixes that match the policy.

[edit services cos rule rule-name policy policy-name]


user@host# set match source-prefix-list list-name

You configure a prefix list by using the prefix-list statement at the [edit policy-options] hierarchy
level.
11. Specify the application profile that defines the CoS policy actions for FTP and SIP traffic.

[edit services cos rule rule-name policy policy-name]


user@host# set then application-profile profile-name

12. Specify the DSCP value to apply to the packet.

[edit services cos rule rule-name policy policy-name]


user@host# set then dscp (alias | bits)

The DSCP can be either a code point alias or a DSCP bit value.
13. Specify the forwarding class name to apply to the packet.

[edit services cos rule rule-name policy policy-name]


user@host# set then forwarding-class class-name
331

The choices are:

• assured-forwarding

• best-effort

• expedited-forwarding

• network-control

• user-defined classifiers.

You can define classifiers under [edit class-of-service classifiers dscp] hierarchy.
14. Configure system logging for the CoS rule policy.
15. Specify the treatment of flows in the reverse direction of the matching direction. Perform only one
of the following:

a. Configure unique values for the reverse direction:

[edit services cos rule rule-name policy policy-name]


user@host# set then reverse application-profile profile-name
user@host# set then reverse dscp (alias | bits)
user@host# set then reverse forwarding-class class-name

b. Apply the CoS rule policy actions to flows in the reverse direction as well as to flows in the
matching direction.

[edit services cos rule rule-name policy policy-name]


user@host# set then reflexive

c. Store the DSCP and forwarding class of a packet that is received in the match direction of the
rule and then apply that DSCP and forwarding class to packets that are received in the reverse
direction of the same session.

[edit services cos rule rule-name policy policy-name]


user@host# set then revert

Configuring Application Profiles for CoS Rules

Configure CoS actions for FTP and SIP traffic. The application profile can then be used in CoS rule
actions.
332

1. Configure a name for the application profile.

user@host# edit services cos application-profile profile-name

2. Specify the DSCP value to apply to the FTP or SIP (voice or video) packets.
For FTP traffic:

[edit services cos application-profile profile-name]


user@host# set ftp data dscp (alias | bits)

For SIP voice or video traffic:

[edit services cos application-profile profile-name]


user@host# set sip video | voice dscp dscp

The DSCP can be either a code point alias or a DSCP bit value.
3. Specify the forwarding class to apply to FTP or SIP packets.
For FTP traffic:

[edit services cos application-profile profile-name]


user@host# set ftp data forwarding-class class-name

For SIP voice or video traffic:

[edit services cos application-profile profile-name]


user@host# set sip video | voice forwarding-class forwarding-class dscp

The choices are:

• assured-forwarding

• best-effort

• expedited-forwarding

• network-control
333

Configuring CoS Rule Sets

A CoS rule set lets you specify a set of services CoS rules. You can then assign the rule set to a service
set, which processes the rules in the order they appear. Once a rule matches the packet, the router
performs the corresponding action, and no further rules in the rule set are applied.

1. Configure a name for the CoS rule set.

user@host# edit services cos rule-set rule-set-name

2. Specify the CoS rules that belong to the rule set.

[edit services cos rule-set rule-set-name]


user@host# set rule [rule-name]

Configuring the Service Set for CoS

You must apply CoS rules to a service set before the rules can be applied to traffic. Only stateful firewall
and NAT rules can be used with CoS rules in a service set.

To configure a service set with CoS rules:

1. Define the service set.

[edit services]
user@host# edit service-set service-set-name

2. Configure either an interface service set, which requires a single service interface, or a next-hop
service set, which requires an inside and outside service interface.

[edit services service-set service-set-name]


user@host# set interface-service service-interface interface-name

or

[edit services service-set service-set-name]


user@host# set next-hop-service inside-service-interface interface-name outside-service-interface
interface-name
334

3. Specify the CoS rules to be used with the service set. You can either specify individual rules or rule
sets.
To apply individual CoS rules:

[edit services service-set service-set-name]


user@host# set cos-rules [cos-rule-name]

To apply CoS rule sets:

[edit services service-set service-set-name]


user@host# set cos-rule-sets [cos-rule-set-name]

The service set processes the CoS rules or rule sets in the order in which they appear in the service
set configuration.
4. (Optional) Assign at least one stateful firewall rule or NAT rule to the service set.
5. (Optional) Configure the service set to create a CoS session even if a packet is first received in the
reverse direction of the matching direction of the CoS rule. The CoS rule values are then applied as
soon as a packet in the correct match direction is received.

[edit services service-set service-set-name]


user@host# set cos-options match-rules-on-reverse-flow

SEE ALSO

Class of Service Overview for Services PICs (Next Gen Services) | 0


3 PART

Stateful Firewall Services

Stateful Firewall Services Overview and Configuration | 336


336

CHAPTER 25

Stateful Firewall Services Overview and


Configuration

IN THIS CHAPTER

Stateful Firewall Overview for Next Gen Services | 336

Configuring Stateful Firewalls for Next Gen Services | 339

Stateful Firewall Overview for Next Gen Services

IN THIS SECTION

Benefits | 337

Flows and Conversations | 337

Stateful Firewall Rules | 337

Stateful Firewall Anomaly Checking | 338

Services PICs employ a type of firewall called a stateful firewall. Contrasted with a stateless firewall,
which inspects packets in isolation, a stateful firewall provides an extra layer of security by using state
information derived from past communications and other applications to make dynamic control
decisions for new communication attempts.

Stateful firewalls group relevant flows into conversations, and decide whether the conversation is
allowed to be established. If a conversation is allowed, all flows within the conversation are permitted,
including flows that are created during the life cycle of the conversation.
337

Benefits

By Inspecting the application protocol data of a flow, the stateful firewall intelligently enforces security
policies and permits only the minimally required packet traffic.

Flows and Conversations

A typical Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) conversation consists of
two flows: the initiation flow and the responder flow. However, some conversations, such as an FTP
conversation, might consist of two control flows and many data flows.

A flow is identified by the following five properties:

• Source address

• Source port

• Destination address

• Destination port

• Protocol

Stateful Firewall Rules

Stateful firewall rules govern whether the conversation is allowed to be established. A rule consists of
matching conditions and actions to take.

Matching conditions include direction, source address, destination address, and application protocol or
service. In addition to the specific values you configure, you can assign the value any, any-ipv4, any-
ipv6, or you can use an address-book under services to define address lists and ranges for use within
stateful firewall rules. Finally, you can specify matches that result in the rule not being applied.

Actions in a stateful firewall rule include allowing the traffic or dropping the traffic.

Stateful firewall rules are directional. For each new conversation, the router software determines
whether the initiation flow direction matches the rule direction.

Stateful firewall rules are ordered. The software checks the rules in the order in which you include them
in the configuration. The first time the software finds a matching rule for a flow, the router implements
the action specified by that rule, and ignores subsequent rules.

The stateful firewall rules are configured in relation to an interface. By default, the stateful firewall
allows all sessions initiated from the hosts behind the interface to pass through the router.
338

Stateful Firewall Anomaly Checking

The stateful firewall recognizes the following events as anomalies and sends them to the IDS software
for processing:

• IP anomalies:

• IP version is not correct.

• IP header length field is too small.

• IP header length is set larger than the entire packet.

• Bad header checksum.

• IP total length field is shorter than header length.

• Packet has incorrect IP options.

• Internet Control Message Protocol (ICMP) packet length error.

• Time-to-live (TTL) equals 0.

• IP address anomalies:

• IP packet source is broadcast or multicast.

• Land attack (source IP equals destination IP).

• IP fragmentation anomalies:

• IP fragment overlap.

• IP fragment missed.

• IP fragment length error.

• IP packet length is more than 64 kilobytes (KB).

• Tiny fragment attack.

• TCP anomalies:

• TCP port 0.

• TCP sequence number 0 and flags 0.

• TCP sequence number 0 and FIN/PSH/RST flags set.

• TCP flags with wrong combination (TCP FIN/RST or SYN/(URG|FIN|RST).


339

• Bad TCP checksum.

• UDP anomalies:

• UDP source or destination port 0.

• UDP header length check failed.

• Bad UDP checksum.

• Anomalies found through stateful TCP or UDP checks:

• SYN followed by SYN-ACK packets without ACK from initiator.

• SYN followed by RST packets.

• SYN without SYN-ACK.

• Non-SYN first flow packet.

• ICMP unreachable errors for SYN packets.

• ICMP unreachable errors for UDP packets.

• Packets dropped by stateful firewall rules.

Configuring Stateful Firewalls for Next Gen Services

IN THIS SECTION

Configuring Stateful Firewall Rules for Next Gen Services | 339

Configuring Stateful Firewall Rule Sets for Next Gen Services | 342

Configuring the Service Set for Stateful Firewalls for Next Gen Services | 342

To configure stateful firewalls, you configure stateful firewall rules, and apply those rules to a service set.
You can also configure stateful firewall rule sets, which contain a set of stateful firewall rules.

Configuring Stateful Firewall Rules for Next Gen Services


A stateful firewall rule specifies which traffic is processed and what action to apply to the traffic.

To configure a stateful firewall rule:


340

1. Configure a name for the stateful firewall rule.

user@host# edit services policies stateful-firewall-rule rule-name

2. Specify the traffic flow direction to which the stateful firewall rule applies.

[edit services policies stateful-firewall-rule rule-name]


user@host# set match-direction (input | input-output | output)

If you configure input-output, the rule is applied to sessions initiated from either direction.

If this stateful firewall rule is applied to an interface-type service set, the direction is determined by
whether a packet is entering or leaving the interface on which the service set is applied. If this
stateful firewall rule is applied to a next-hop service set, the direction is input if the inside interface is
used to route the packet, and the direction is output if the outside interface is used to route the
package.
3. Configure a name for a policy.

[edit services policies stateful-firewall-rule rule-name]


user@host# set policy policy-name

You can configure multiple policies for a stateful firewall rule. Each policy identifies the matching
conditions for a flow, and whether or not to allow the flow. Once a policy in the rule matches a
packet, that policy is applied and no other policies in the rule are processed.
4. Specify the destination address of the flows to which the policy applies.

[edit services policies stateful-firewall-rule rule-name policy policy-name]


user@host# set match destination-address (address | any | any-ipv4 | any-ipv6)

Alternatively, you can specify an address-book under the services configuration hierarchy to use in
this step.

The destination address can be IPv4 or IPv6.


5. Specify the destination address of the flows to which the policy does not apply.

[edit services policies stateful-firewall-rule rule-name policy policy-name]


user@host# set match destination-address-excluded address

The destination address can be IPv4 or IPv6.


341

6. Specify the source address of the flows to which the policy applies.

[edit services policies stateful-firewall-rule rule-name policy policy-name]


user@host# set match source-address (address | any | any-ipv4 | any-ipv6)

Alternatively, you can specify an address-book under the services configuration hierarchy to use in
this step.

The source address can be IPv4 or IPv6.


7. Specify the source address of the flows to which the policy does not apply.

[edit services policies stateful-firewall-rule rule-name policy policy-name]


user@host# set match source-address-excluded address

The source address can be IPv4 or IPv6.


8. Specify one or more application protocols to which the policy applies.

[edit services policies stateful-firewall-rule rule-name policy policy-name]


user@host# set match application [application-name]

Use an application protocol definition you have configured at the [edit applications] hierarchy level.
9. Specify an action that the policy takes.

[edit services policies stateful-firewall-rule rule-name policy policy-name]


user@host# set then (count | deny | reject | permit)

where:

count Enables a count, in bytes or kilobytes, of all network traffic the policy allows to pass.

deny Drop the packets.

permit Accept the packets and send them to their destination.

reject Drop the packets. For TCP traffic, send a TCP reset (RST) segment to the source host. For
UDP traffic, send an ICMP destination unreachable, port unreachable message (type 3,
code 3) to the source host.
342

Configuring Stateful Firewall Rule Sets for Next Gen Services


A stateful firewall rule set lets you specify a set of stateful firewall rules, which are processed in the
order in which they appear in the rule set configuration. Once a stateful firewall rule in the rule set
matches a packet, that rule is applied and no other rules in the rule set are processed˙.

To configure a stateful firewall rule set:

1. Configure a name for the stateful firewall rule set.

user@host# edit services policies stateful-firewall-rule-set rule-set-name

2. Specify the stateful firewall rules that belong to the rule set.

[edit services policies stateful-firewall-rule-set rule-set-name]


user@host# set stateful-firewall-rule [rule-name]

Configuring the Service Set for Stateful Firewalls for Next Gen Services
Stateful firewall rules must be assigned to a service set before they can be applied to traffic.

To configure a service set to apply stateful firewall rules:

1. Define the service set.

[edit services]
user@host# edit service-set service-set-name

2. Configure either an interface service set, which requires a single service interface, or a next-hop
service set, which requires an inside and outside service interface.

[edit services service-set service-set-name]


user@host# set interface-service service-interface interface-name

or

[edit services service-set service-set-name]


user@host# set next-hop-service inside-service-interface interface-name outside-service-interface
interface-name
343

3. Specify the stateful firewall rules to be used with the service set. You can specify either individual
rules or rule sets but not both.
To apply individual stateful firewall rules:

[edit services service-set service-set-name]


user@host# set stateful-firewall-rules [rule-name]

To apply stateful firewall rule sets:

[edit services service-set service-set-name]


user@host# set stateful-firewall-rule-sets [rule-set-name]

The service set processes the stateful firewall rules or rule sets in the order in which they appear in
the service set configuration.
4 PART

Intrusion Detection Services

IDS Screens for Network Attack Protection Overview and Configuration | 345
345

CHAPTER 26

IDS Screens for Network Attack Protection


Overview and Configuration

IN THIS CHAPTER

Understanding IDS Screens for Network Attack Protection | 345

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

Understanding IDS Screens for Network Attack Protection

IN THIS SECTION

Intrusion Detection Services | 345

Benefits | 346

Session Limits | 346

Suspicious Packet Patterns | 347

Intrusion Detection Services

Intrusion detection services (IDS) screens give you a way to identify and drop traffic that is part of a
network attack.

In an IDS screen, you can specify:

• The limits on the number of sessions that originate from individual sources or that terminate at
individual destinations

• The types of suspicious packets

You can also choose to log an alarm when an IDS screen identifies a packet, rather than drop the packet.
346

In addition to IDS screens, you can use firewall filters and policers to stop illegal TCP flags and other bad
flag combinations, and to specify general rate limiting (see the Routing Policies, Firewall Filters, and
Traffic Policers User Guide). IDS screens add a more granular level of filtering.

Use firewall filters and stateful firewall filters to filter out traffic that does not need to be processed by
an IDS screen.

Benefits

Provides protection against several types of network attacks.

Session Limits

You can use IDS screens to set session limits for traffic from an individual source or to an individual
destination. This protects against network probing and flooding attacks. Traffic that exceeds the session
limits is dropped. You can specify session limits either for traffic with a particular IP protocol, such as
ICMP, or for traffic in general.

You decide whether the limits apply to individual addresses or to an aggregation of traffic from
individual subnets of a particular prefix length. For example, if you aggregate limits for IPv4 subnets with
a prefix length of 24, traffic from 192.0.2.2 and 192.0.2.3 is counted against the limits for the
192.0.2.0/24 subnet.

Some common network probing and flooding attacks that session limits protect against include:

ICMP The attacker sends ICMP request probes (pings) to multiple targets. If a target machine
Address replies, the attacker receives the IP address of the target.
Sweep
ICMP Flood The attacker floods a target machine by sending a large number of ICMP packets from one
or more source IP addresses. The target machine uses up its resources as it attempts to
process those ICMP packets, and then it can no longer process valid traffic.

TCP Port The attacker sends TCP SYN packets from one source to multiple destination ports of the
Scan target machine. If the target replies with a SYN-ACK from one or more destination ports,
the attacker learns which ports are open on the target.

TCP SYN The attacker floods a target machine by sending a large number of TCP SYN packets from
Flood one or more source IP addresses. The attacker might use real source IP addresses, which
results in a completed TCP connection, or might use fake source IP addresses, resulting in
the TCP connection not being completed. The target creates states for all the completed
and incomplete TCP connections. The target uses up its resources as it attempts to
manage the connection states, and then it can no longer process valid traffic.
347

UDP Flood The attacker floods a target machine by sending a large number of UDP packets from one
or more source IP addresses. The target machine uses up its resources as it attempts to
process those UDP packets, and then it can no longer process valid traffic.

Session limits for traffic from a source or to a destination include:

• maximum number of concurrent sessions

• maximum number of packets per second

• maximum number of connections per second

IDS screens also install a dynamic filter on the PFEs of line cards for suspicious activity when the
following conditions occur:

• Either the packets per second or the number of connections per second for an individual source or
destination address exceeds four times the session limit in the IDS screen. (Dynamic filters are not
created from IDS screens that use subnet aggregation.)

• The services card CPU utilization percentage exceeds a configured value (default value is 90 percent).

The dynamic filter drops the suspicious traffic at the PFE, without the traffic being processed by the IDS
screen. When the packet or connection rate no longer exceeds four times the limit in the IDS screen, the
dynamic filter is removed.

Suspicious Packet Patterns

You can use IDS screens to identify and drop traffic with a suspicious packet pattern. This protects
against attackers that craft unusual packets to launch denial-of-service attacks.

Suspicious packet patterns and attacks that you can specify in an IDS screen are:

ICMP The attacker sends the target ICMP packets that are IP fragments. These are
fragmentation considered suspicious packets because ICMP packets are usually short. When the
attack
target receives these packets, the results can range from processing packets
incorrectly to crashing the entire system.

Malformed ICMPv6 Malformed ICMPv6 packets can cause damage to the device and network.
packets Examples of malformed IPv6 packets are packets that are too big (message type
2), that have the next header set to routing (43), or that have a routing header set
to hop-by hop.

ICMP large packet The attacker sends the target ICMP frames with an IP length greater than 1024
attack bytes. These are considered suspicious packets because most ICMP messages are
small.
348

Ping of death attack The attacker sends the target ICMP ping packets whose IP datagram length
(ip_len) exceeds the maximum legal length (65,535 bytes) for IP packets, and the
packet is fragmented. When the target attempts to reassemble the IP packets, a
buffer overflow might occur, resulting in a system crashing, freezing, and
restarting.

Bad option attack The attacker sends the target packets with incorrectly formatted IPv4 options or
IPv6 extension headers. This can cause unpredictable issues, depending on the IP
stack implementation of routers and the target.

Fragmented IP IP fragments might contain an attacker's attempt to exploit the vulnerabilities in


packets the packet reassembly code of specific IP stack implementations. When the target
receives these packets, the results can range from processing the packets
incorrectly to crashing the entire system.

IPv6 extension Attackers can maliciously use extension headers for denial-of-service attacks or to
headers bypass filters.

IPv4 options Attackers can maliciously use IPv4 options for denial-of-service attacks.

IP teardrop attack The attacker sends the target fragmented IP packets that overlap. The target
machine uses up its resources as it attempts to reassemble the packets, and then
it can no longer process valid traffic.

IP unknown The attacker sends the target packets with protocol numbers greater than 137 for
protocol attack IPv4 and 139 for IPv6. An unknown protocol might be malicious.

TCP FIN No ACK The attacker sends the target TCP packets that have the FIN bit set but have the
attack ACK bit unset. This can allow the attacker to identify the operating system of the
target or to identify open ports on the target.

Land attack The attacker sends the target spoofed SYN packets that contain the target’s IP
address as both the destination and the source IP address. The target uses up its
resources as it repeatedly replies to itself. In another variation of the land attack,
the SYN packets also contain the same source and destination ports.

TCP SYN ACK ACK The attacker initiates Telnet or FTP connections with the target without
attack completing the connections. The target’s session table can fill up, resulting in the
device rejecting legitimate connection requests.

TCP SYN FIN attack The attacker sends the target TCP packets that have both the SYN and the FIN
bits set. This can cause unpredictable behavior on the target, depending on its
TCP stack implementation.
349

SYN fragment The attacker sends the target SYN packet fragments. The target caches SYN
attack fragments, waiting for the remaining fragments to arrive so it can reassemble
them and complete the connection. A flood of SYN fragments eventually fills the
host’s memory buffer, preventing valid traffic connections.

TCP no flag attack The attacker sends the target TCP packets containing no flags. This can cause
unpredictable behavior on the target, depending on its TCP stack implementation.

TCP WinNuke The attacker sends a TCP segment with the urgent (URG) flag set and destined for
attack port 139 of a target running Windows. This might cause the target machine to
crash.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

Configuring Network Attack Protection With IDS Screens for Next Gen
Services

IN THIS SECTION

Configuring the IDS Screen Name, Direction, and Alarm Option | 349

Configuring Session Limits in the IDS Screen | 350

Configuring Suspicious Packet Pattern Detection in the IDS Screen | 355

Configuring the Service Set for IDS | 359

Configuring the IDS Screen Name, Direction, and Alarm Option


Configure the IDS screen name, traffic direction, and optional alarm.

1. Specify a name for the IDS screen.

[edit services screen]


user@host# set ids-option screen-name
350

2. Specify whether the IDS screen is applied to input traffic, output traffic, or both.

[edit services screen ids-option screen-name]


user@host# set match-direction (input | input-output |output)

3. If you want the IDS screen to log an alarm when packets exceed the session limit, rather than drop
packets, configure alarm-without-drop.

[edit services screen ids-option screen-name]


user@host# set alarm-without-drop

Configuring Session Limits in the IDS Screen


You can use IDS screens to set session limits for traffic from individual addresses or subnets and to
individual addresses or subnets. This protects against network probing and flooding attacks. Table 35 on
page 350 shows the session limit options that protect against some common network probing and
flooding attacks.

Table 35: IDS Screen Options for Network Attacks Type

Network Attack Type [edit services screen ids-options screen-name limit-sessions]


Options to Set

ICMP Address Sweep


by-source by-protocol icmp {
maximum-sessions number;
packet-rate number;
session-rate number;
}

ICMP Flood
by-destination by-protocol icmp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
351

Table 35: IDS Screen Options for Network Attacks Type (Continued)

Network Attack Type [edit services screen ids-options screen-name limit-sessions]


Options to Set

TCP Port Scan


(by-destination | by-source) by-protocol tcp {
maximum-sessions number;
packet-rate number;
}

TCP SYN Flood


(by-destination | by-source) by-protocol tcp {
maximum-sessions number;
packet-rate number;
session-rate number;
}

UDP Flood
by-destination by-protocol udp {
maximum-sessions number;
packet-rate number;
session-rate number;
}

To configure the session limits in an IDS screen:

1. If you want to apply session limits to an aggregation of all sessions to individual destination subnets
or from individual source subnets rather than individual addresses, configure aggregation.

a. To apply session limits to an aggregation of all sessions from within an individual IPv4 subnet,
specify the subnet prefix length. The range is from 1 through 32.

[edit services screen ids-option screen-name aggregations]


user@host# set source-prefix-mask prefix-value
352

For example, the following statement configures an IPv4 prefix length of 24, and sessions from
192.0.2.2 and 192.0.2.3 are counted as sessions from the 192.0.2.0/24/24 subnet.

[edit services screen ids-option screen1 aggregations]


user@host# set source-prefix-mask 24

b. To apply session limits to an aggregation of all sessions from within an individual IPv6 subnet,
specify the subnet prefix length. The range is from 1 through 128.

[edit services screen ids-option screen-name aggregations]


user@host# set source-prefix-ipv6-mask prefix-value

For example, the following statement configures an IPv6 prefix length of 64, and sessions from
2001:db8:1234:72a2::2 and 2001:db8:1234:72a2::3 are counted as sessions from the
2001:db8:1234:72a2::/64 subnet.

[edit services screen ids-option screen1 aggregations]


user@host# set source-prefix-ipv6-mask 64

c. To apply session limits to an aggregation of all sessions to an individual IPv4 subnet, specify the
subnet prefix length. The range is from 1 through 32.

[edit services screen ids-option screen-name aggregations]


user@host# set destination-prefix-mask prefix-value

d. To apply session limits to an aggregation of all sessions to an individual IPv6 subnet, specify the
subnet prefix length. The range is from 1 through 128.

[edit services screen ids-option screen-name aggregations]


user@host# set destination-prefix-ipv6-mask prefix-value

2. If you want to apply session limits from a source for a particular IP protocol:
353

a. Configure the maximum number of concurrent sessions allowed from an individual source IP
address or subnet for a particular IP protocol.

[edit services screen ids-option screen-name limit-session by-source ]


user@host# set by-protocol (icmp | tcp | udp) maximum-sessions number

b. Configure the maximum number of packets per second allowed from an individual source IP
address or subnet for a particular protocol.

[edit services screen ids-option screen-name limit-session by-source ]


user@host# set by-protocol (icmp | tcp | udp) packet-rate number

c. Configure the maximum number of connections per second allowed from an individual source IP
address or subnet for a particular protocol.

[edit services screen ids-option screen-name limit-session by-source ]


user@host# set by-protocol (icmp | tcp | udp) session-rate number

3. If you want to apply session limits to a destination for a particular IP protocol:

a. Configure the maximum number of concurrent sessions allowed to an individual destination IP


address or subnet for a particular IP protocol.

[edit services screen ids-option screen-name limit-session by-destination]


user@host# set by-protocol (icmp | tcp | udp) maximum-sessions number

b. Configure the maximum number of packets per second allowed to an individual destination IP
address or subnet for a particular protocol.

[edit services screen ids-option screen-name limit-session by-destination ]


user@host# set by-protocol (icmp | tcp | udp) packet-rate number

c. Configure the maximum number of connections per second allowed to an individual destination
IP address or subnet for a particular protocol.

[edit services screen ids-option screen-name limit-session by-destination ]


user@host# set by-protocol (icmp | tcp | udp) session-rate number
354

4. If you want to apply session limits from a source regardless of the IP protocol:

a. Configure the maximum number of concurrent sessions allowed from an individual source IP
address or subnet.

[edit services screen ids-option screen-name limit-session by-source ]


user@host# set maximum-sessions number

b. Configure the maximum number of packets per second allowed from an individual source IP
address or subnet

[edit services screen ids-option screen-name limit-session by-source ]


user@host# set packets-rate number

c. Configure the maximum number of connections per second allowed from an individual source IP
address or subnet.

[edit services screen ids-option screen-name limit-session by-source ]


user@host# set session-rate number

5. If you want to apply session limits to a destination regardless of the IP protocol:

a. Configure the maximum number of concurrent sessions allowed to an individual destination IP


address or subnet.

[edit services screen ids-option screen-name limit-session by-destination ]


user@host# set maximum-sessions number

b. Configure the maximum number of packets per second allowed to an individual destination IP
address or subnet

[edit services screen ids-option screen-name limit-session by-destination ]


user@host# set packets-rate number
355

c. Configure the maximum number of connections per second allowed to an individual destination
IP address or subnet.

[edit services screen ids-option screen-name limit-session by-destination]


user@host# set session-rate number

6. Specify the services card CPU utilization percentage that triggers the installation of a dynamic filter
on the PFEs of the line cards for suspicious traffic. The default value is 90.

[edit services screen]


user@host# set cpu-throttle percentage percent

In addition to the CPU utilization percentage threshold, the packet rate or connection rate for an
individual source or destination address must exceed four times the session limit in the IDS screen
before the dynamic filter is installed. Dynamic filters are not created from IDS screens that use
subnet aggregation.

The dynamic filter drops the suspicious traffic at the PFE, without the traffic being processed by the
IDS screen. When the packet or connection rate no longer exceeds four times the limit in the IDS
screen, the dynamic filter is removed.

Configuring Suspicious Packet Pattern Detection in the IDS Screen


You can use IDS screens to identify and drop suspicious packets. This protects against attackers that
craft unusual packets to launch denial-of-service attacks.

To configure suspicious pattern detection:

1. To protect against ICMP fragmentation attacks, identify and drop ICMP packets that are IP
fragments.

[edit services screen ids-option screen-name icmp]


user@host# set fragment

2. To identify and drop malformed ICMPv6 packets, configure icmpv6-malformed.

[edit services screen ids-option screen-name icmp]


user@host# set icmpv6-malformed
356

3. To protect against ICMP large packet attacks, identify and drop ICMP packets that are larger than
1024 bytes.

[edit services screen ids-option screen-name icmp]


user@host# set large

4. To protect against ping of death attacks, identify and drop oversized and irregular ICMP packets.

[edit services screen ids-option screen-name icmp]


user@host# set ping-death

5. To protect against bad option attacks, identify and drop packets with incorrectly formatted IPv4
options or IPv6 extension headers.

[edit services screen ids-option screen-name ip]


user@host# set bad-option

6. To identify and drop fragmented IP packets, configure block-frag.

[edit services screen ids-option screen-name ip]


user@host# set block-frag

7. To drop IPv6 packets with particular extension header values, specify the values.

[edit services screen ids-option screen-name ip]


user@host# set ipv6-extension-header header

The following header values can be configured:

ah-header Authentication Header extension header

esp-header Encapsulating Security Payload extension header

fragment-header Fragment Header extension header

hop-by-hop-header Hop-by-Hop option with the specified option:

CALIPSO-option Common Architecture Label IPv6 Security


Option
357

jumbo-payload-option IPv6 jumbo payload option

quick-start-option IPv6 quick start option

router-alert-option IPv6 router alert option

RPL-option Routing Protocol for Low-Power and Lossy


Networks option

SFM-DPD-option Simplified Muliticast Forwarding IPv6


Duplicate Packet Detection option

user-defined-option-type A range of header types


type-low to type-high
• Range: 1 through 255.

mobility-header Mobility Header extension header.

routing-header Routing Header extension header.

8. To drop IPv4 packets with particular IPv4 option values, specify the values.

[edit services screen ids-option screen-name ip]


user@host# set option

The following IPv4 option values can be configured:

loose-source-route-option IP option of 3 (Loose Source Routing)

record-route-option IP option of 7 (Record Route)

security-option IP option of 2 (Security)

source-route-option IP option of 3 (Loose Source Routing) or the IP option of 9 (Strict


Source Routing)

stream-option IP option of 8 (Stream ID)

strict-source-route-option IP option of 9 (Strict Source Routing)

timestamp-option IP option of 4 (Internet timestamp)


358

9. To protect against IP teardrop attacks, identify and drop fragmented IP packets that overlap.

[edit services screen ids-option screen-name ip]


user@host# set tear-drop

10. To protect against IP unknown protocol attacks, identify and drop IP frames with protocol numbers
greater than 137 for IPv4 and 139 for IPv6.

[edit services screen ids-option screen-name ip]


user@host# set unknown-protocol

11. To protect against TCP FIN No ACK Attacks, identify and drop any packet with the FIN flag set and
without the ACK flag set.

[edit services screen ids-option screen-name tcp]


user@host# set fin-no-ack

12. To protect against land attacks, identify and drop SYN packets that have the same source and
destination address or port.

[edit services screen ids-option screen-name tcp]


user@host# set land

13. To protect against TCP SYN ACK ACK attacks, configure the maximum number of connections from
an IP address that can be opened without being completed.

[edit services screen ids-option screen-name tcp]


user@host# set syn-ack-ack-proxy number

14. To protect against TCP SYN FIN attacks, identify and drop packets that have both the SYN and FIN
flags set.

[edit services screen ids-option screen-name tcp]


user@host# set syn-fin
359

15. To protect against SYN fragment attacks, identify and drop SYN packet fragments.

[edit services screen ids-option screen-name tcp]


user@host# set syn-frag

16. To protect against TCP no flag attacks, identify and drop TCP packets that have no flag fields set.

[edit services screen ids-option screen-name tcp]


user@host# set tcp-no-flag

17. To protect against TCP WinNuke attacks, identify and drop TCP segments that are destined for port
139 and have the urgent (URG) flag set.

[edit services screen ids-option screen-name tcp]


user@host# set winnuke

Configuring the Service Set for IDS


Configure a service set to apply the IDS screen.

1. Assign the IDS screen to a service set.

[edit services]
user@host# set service-set service-set-name ids-option screen-name

If the service set is associated with an AMS interface, then the session limits you configure are
applicable to each member interface.
2. Limit the packets that the IDS screen processes by configuring a stateful firewall rule . The stateful
firewall rule can identify either the traffic that should undergo IDS processing or the traffic that
should skip IDS processing:

• To allow IDS processing on the traffic that matches the stateful firewall rule, include accept at the
[edit services stateful-firewall rule rule-name term term-name then] hierarchy level.

• To skip IDS processing on the traffic that matches the stateful firewall rule, include accept skip-ids
at the [edit services stateful-firewall rule rule-name term term-name then] hierarchy level.
360

3. Assign the stateful firewall rule to the service set.

[edit services]
user@host# set service-set service-set-name stateful-firewall-rules rule-name

4. To protect against header anomaly attacks, configure a header integrity check for the service set.

[edit services]
user@host# set service-set service-set-name service-set-options header-integrity-check enable-all

RELATED DOCUMENTATION

Understanding IDS Screens for Network Attack Protection | 345


5 PART

Traffic Load Balancing

Traffic Load Balancing Overview and Configuration | 362


362

CHAPTER 27

Traffic Load Balancing Overview and Configuration

IN THIS CHAPTER

Traffic Load Balancer Overview | 362

Configuring TLB | 372

Traffic Load Balancer Overview

IN THIS SECTION

Traffic Load Balancing Support Summary | 362

Traffic Load Balancer Application Description | 364

Traffic Load Balancer Modes of Operation | 365

Traffic Load Balancer Functions | 367

Traffic Load Balancer Application Components | 368

Traffic Load Balancer Configuration Limits | 370

Traffic Load Balancing Support Summary

Table 36 on page 363 provides a summary of the traffic load balancing support on the MS-MPC and MS-
MIC cards for Adaptive Services versus support on the MX-SPC3 security services card for Next Gen
Services.
363

Table 36: Traffic Load Balancing Support Summary

MS-MPC MX-SPC3

Junos Release < 16.1R6 & 18.2.R1 ≥ 16.1R6 & 19.3R2


18.2R1

Max # of Instances per Chassis 32 2,000 / 32 2,000


in L2 DSR
mode

Max # of Virtual Services per 32 32 32


Instance

Max # of virtual IP address per 1 1


virtual service

Max # of Groups per Instances 32 32 32

Max # of Real-Services (Servers) 255 255 255


per Group

Max # of groups per virtual 1 1


service

Max # of Network Monitor 2 2


Profiles per Group

Max # of HC’s per security 4,000 1,250 – 19.3R2


services per PIC/NPU in 5-sec’s
10,000 – 20.1R1

Supported Health Check ICMP, TCP, UDP, HTTP, SSL, Custom ICMP, TCP, UDP, HTTP,
Protocols SSL, Custom
364

Traffic Load Balancer Application Description

Traffic Load Balancer (TLB) is supported on MX Series routers with either of the Multiservices Modular
Port Concentrator (MS-MPC), Multiservices Modular Interface Card (MS-MIC), or the MX Security
Services Processing Card (MX-SPC3) and in conjunction with the Modular Port Concentrator (MPC) line
cards supported on the MX Series routers as described in Table 37 on page 364.

NOTE: You cannot run Deterministic NAT and TLB simultaneously.

Table 37: TLB MX Series Router Platform Support Summary

TLB Mode MX Platform Coverage

Multiservices Modular Port


Concentrator (MS-MPC) MX240, MX2480, MX960, MX2008, MX2010, MX2020

Multiservices Modular Interface Card MX5, MX10, MX40, MX80, MX104, MX240, MX2480,
(MS-MIC) MX960, MX2008, MX2010, MX2020

MX Security Services Processing Card


(MX-SPC3) MX240, MX480, MX960

• TLB enables you to distribute traffic among multiple servers.

• TLB employs an MS-MPC-based control plane and a data plane using the MX Series router
forwarding engine.

• TLB uses an enhanced version of equal-cost multipath (ECMP). Enhanced ECMP facilitates the
distribution of flows across groups of servers. Enhancements to native ECMP ensure that when
servers fail, only flows associated with those servers are impacted, minimizing the overall network
churn on services and sessions.

• TLB provides application-based health monitoring for up to 255 servers per group, providing
Intelligent traffic steering based on health checking of server availability information. You can
configure an aggregated multiservices (AMS) interface to provide one-to-one redundancy for MS-
MPCs or Next Gen Services MX-SPC3 card used for server health monitoring.

• TLB applies its flow distribution processing to ingress traffic.


365

• TLB supports multiple virtual routing instances to provide improved support for large scale load
balancing requirements.

• TLB supports static virtual-IP-address-to-real-IP-address translation, and static destination port


translation during load balancing.

Traffic Load Balancer Modes of Operation

Traffic Load Balancer provides three modes of operation for the distribution of outgoing traffic and for
handling the processing of return traffic.

Table 38 on page 365 summarizes the TLB support and which cards it’s supported on.

Table 38: TLB Versus Security Service Cards Summary

Security Service Card MS-MPC/MS-MIC MX-SPC3

Translate Yes Yes

Transparent Layer 3 Direct Server Return Yes Yes

Transparent Layer 2 Direct Server Return Yes Not Supported

Transparent Mode Layer 2 Direct Server Return

When you use transparent mode Layer 2 direct server return (DSR):

• The PFE processes data.

• Load balancing works by changing the Layer 2 MAC of packets.

• An MS-MPC performs the network-monitoring probes.

• Real servers must be directly (Layer 2) reachable from the MX Series router.

• TLB installs a route and all the traffic over that route is load-balanced.

• TLB never modifies Layer 3 and higher level headers.


366

Figure 7 on page 366 shows the TLB topology for transparent mode Layer 2 DSR.

Figure 7: TLB Topology for Transparent Mode

Translated Mode

Translated mode provides greater flexibility than transparent mode Layer 2 DSR. When you choose
translated mode:

• An MS-MPC performs the network-monitoring probes.

• The PFE performs stateless load balancing:

• Data traffic directed to a virtual IP address undergoes translation of the virtual IP address to a real
server IP address and translates the virtual port to a server listening port. Return traffic undergoes
the reverse translation.

• Client to virtual IP traffic is translated; the traffic is routed to reach its destination.

• Server-to-client traffic is captured using implicit filters and directed to an appropriate load-
balancing next hop for reverse processing. After translation, traffic is routed back to the client.

• Two load balancing methods are available: random and hash. The random method is only for UDP
traffic and provides quavms-random distribution. While not literally random, this mode provides
fair distribution of traffic to an available set of servers. The hash method provides a hash key
based on any combination of the source IP address, destination IP address, and protocol.
367

NOTE: Translated mode processing is only available for IPv4-to-IPv4 and IPv6-to-IPv6
traffic.

Figure 8 on page 367 shows the TLB topology for translated mode.

Figure 8: TLB Topology for Translated Mode

Transparent Mode Layer 3 Direct Server Return

Transparent mode Layer 3 DSR load balancing distributes sessions to servers that can be a Layer 3 hop
away. Traffic is returned directly to the client from the real-server.

Traffic Load Balancer Functions

TLB provides the following functions:

• TLB always distributes the requests for any flow. When you specify DSR mode, the response returns
directly to the source. When you specify translated mode, reverse traffic is steered through implicit
filters on server-facing interfaces.

• TLB supports hash-based load balancing or random load balancing.

• TLB enables you to configure servers offline to prevent a performance impact that might be caused
by a rehashing for all existing flows. You can add a server in the administrative down state and use it
368

later for traffic distribution by disabling the administrative down state. Configuring servers offline
helps prevent traffic impact to other servers.

• When health checking determines a server to be down, only the affected flows are rehashed.

• When a previously down server is returned to service, all flows belonging to that server based on
hashing return to it, impacting performance for the returned flows. For this reason, you can disable
the automatic rejoining of a server to an active group. You can return servers to service by issuing the
request services traffic-load-balance real-service rejoin operational command.

NOTE: NAT is not applied to the distributed flows.

• Health check monitoring application runs on an MS-MPC/NPU. This network processor unit (NPU) is
not used for handling data traffic.

• TLB supports static virtual-IP-adddress-to-real-IP-address translation, and static destination port


translation during load balancing.

• TLB provides multiple VRF support.

Traffic Load Balancer Application Components

Servers and Server Groups

TLB enables configuration of groups of up to 255 servers (referred to in configuration statements as real
services) for use as alternate destinations for stateless session distribution. All servers used in server
groups must be individually configured before assignment to groups. Load balancing uses hashing or
randomization for session distribution. Users can add and delete servers to and from the TLB server
distribution table and can also change the administrative status of a server.

NOTE: TLB uses the session distribution next-hop API to update the server distribution table and
retrieve statistics. Applications do not have direct control on the server distribution table
management. They can only influence changes indirectly through the add and delete services of
the TLB API.

Server Health Monitoring — Single Health Check and Dual Health Check

TLB supports TCP, HTTP, SSL Hello, and custom health check probes to monitor the health of servers in
a group. You can use a single probe type for a server group, or a dual health check configuration that
includes two probe types. The configurable health monitoring function resides on either an MX-SPC3 or
369

an MS-MPC. By default, probe requests are sent every 5 seconds. Also by default, a real server is
declared down only after five consecutive probe failures and declared up only after five consecutive
probe successes.

Use a custom health check probe to specify the following:

• Expected string in the probe response

• String that is sent with the probe

• Server status to assign when the probe times out (up or down)

• Server status to assign when the expected response to the probe is received (up or down)

• Protocol — UDP or TCP

TLB provides application stickiness, meaning that server failures or changes do not affect traffic flows to
other active servers. Changing a server’s administrative state from up to down does not impact any
active flows to remaining servers in the server distribution table. Adding a server or deleting a server
from a group has some traffic impact for a length of time that depends on your configuration of the
interval and retry parameters in the monitoring profile.

TLB provides two levels of server health monitoring:

• Single Health Check—One probe type is attached to a server group by means of the network-
monitoring-profile configuration statement.

• TLB Dual Health Check (TLB-DHC)—Two probe types are associated with a server group by means of
the network-monitoring-profile configuration statement. A server’s status is declared based on the
result of two health check probes. Users can configure up to two health check profiles per server
group. If a server group is configured for dual health check, a real-service is declared to be UP only
when both health-check probes are simultaneously UP; otherwise, a real-service is declared to be
DOWN.

NOTE: The following restrictions apply to AMS interfaces used for server health monitoring:

• An AMS interface configured under a TLB instance uses its configured member interfaces
exclusively for health checking of configured multiple real servers.

• The member interfaces use unit 0 for single VRF cases, but can use units other than 1 for
multiple VRF cases.

• TLB uses the IP address that is configured for AMS member interfaces as the source IP
address for health checks.
370

• The member interfaces must be in the same routing instance as the interface used to reach
real servers. This is mandatory for TLB server health-check procedures.

Virtual Services

The virtual service provides a virtual IP address (VIP) that is associated with the group of servers to
which traffic is directed as determined by hash-based or random session distribution and server health
monitoring. In the case of Layer2 DSR and Layer3 DSR, the special address 0.0.0.0 causes all traffic
flowing to the forwarding instance to be load balanced.

The virtual service configuration includes:

• Mode—indicating how traffic is handled (translated or transparent).

• The group of servers to which sessions are distributed.

• The load balancing method.

• Routing instance and route metric.

BEST PRACTICE: Although you can assign a virtual address of 0.0.0.0 in order to use default
routing, we recommend using a virtual address that can be assigned to a routing instance set up
specifically for TLB.

Traffic Load Balancer Configuration Limits

Traffic Load Balancer configuration limits are described in Table 39 on page 371.
371

Table 39: TLB Configuration Limits

Configuration Component Configuration Limit

Maximum number of instances. Starting in Junos OS Release 16.1R6 and Junos


OS Release 18.2R1, the TLB application supports
2000 TLB instances for virtual services that use
the direct-server-return or the translated mode.
In earlier releases, the maximum number of
instances is 32.

If multiple virtual services are using the same


server group, then all of those virtual services
must use the same load balancing method to
support 2000 TLB instances.

For virtual services that use the layer2-direct-


server-return mode, TLB supports only 32 TLB
instances. To perform the same function as the
layer2-direct-server-return mode and have
support for 2000 TLB instances, you can use the
direct-server-return mode and use a service filter
with the skip action.

Maximum number of servers per group 255

Maximum number of virtual services per services 32


PIC

Maximum number of health checks per services For MS-MPC services cards: 2000
PIC in a 5-second interval
For Next Gen Services mode and the MX-SPC3
services cards: 1250

Maximum number of groups per virtual service 1

Maximum number of virtual IP addresses per 1


virtual service
372

Table 39: TLB Configuration Limits (Continued)

Configuration Component Configuration Limit

Supported health checking protocols ICMP, TCP, HTTP, SSL, Custom

NOTE: ICMP health checking is supported only


on MS-MPC services cards.

Release History Table

Release Description

16.1R6 Starting in Junos OS Release 16.1R6 and Junos OS Release 18.2R1, the TLB application supports 2000
TLB instances for virtual services that use the direct-server-return or the translated mode.

RELATED DOCUMENTATION

Interchassis High-Availability
Understanding AMS Interfaces

Configuring TLB

IN THIS SECTION

Loading the TLB Service Package | 373

Configuring a TLB Instance Name | 373

Configuring Interface and Routing Information | 374

Configuring Servers | 376

Configuring Network Monitoring Profiles | 377

Configuring Server Groups | 379

Configuring Virtual Services | 380

Configuring Tracing for the Health Check Monitoring Function | 384


373

The following topics describe how to configure TLB. To create a complete application, you must also
define interfaces and routing information. You can optionally define firewall filters and policy options in
order to differentiate TLB traffic.

Loading the TLB Service Package


Load the TLB service package on each service PIC on which you want to run TLB.

NOTE: For Next Gen Services and the MX-SPC3 services card, you do not need to load this
package.

To load the TLB service package on a service PIC:

• Load the jservices-traffic-dird package.

[edit chassis fpc slot-number pic pic-number adaptive-services service-


package extension-provider]
user@host# set package jservices-traffic-dird

For example:

[edit chassis fpc 3 pic 0 adaptive-services service-package extension-


provider]
user@host# set package jservices-traffic-dird

Configuring a TLB Instance Name


To configure a name for the TLB instance:

• At the [edit services traffic-load-balance] hierarchy level, identify the TLB instance name.

[edit services traffic-load-balance]


user@host# set instance instance-name

For example:

[edit services traffic-load-balance]


user@host# set instance tlb-instance1
374

Configuring Interface and Routing Information


To configure interface and routing information:

1. At the [edit services traffic-load-balance instance instance-name] hierarchy level, identify the service
interface associated with this instance.

user@host# [edit services traffic-load-balance instance instance-name]


user@host# set interface interface-name

For example, on an MS-MPC:

[edit services traffic-load-balance instance tlb-instance1]


user@host# set interface ms-1/0/0

For example, for Next Gen Services on an MX-SPC3:

[edit services traffic-load-balance instance tlb-instance1]


user@host# set interface vms-1/0/0

2. Enable the routing of health-check packet responses from real servers to the service interface that
you identified in Step "1" on page 374.

[edit interfaces]
user@host# set interface-name unit 0 ip-address-owner service-plane

For example, on an MS-MPC:

[edit interfaces]
user@host# set ms-1/0/0 unit 0 ip-address-owner service-plane

For example, on an MX-SPC3:

[edit interfaces]
user@host# set vms-1/0/0 unit 0 ip-address-owner service-plane
375

3. Specify the client interface for which an implicit filter is defined to direct traffic in the forward
direction. This is required only for translated mode.

user@host# [edit services traffic-load-balance instance instance-name]


user@host# set client-interface interface-name

For example:

[edit services traffic-load-balance instance tlb-instance1]


user@host# set client-interface ge-5/2/0.0

4. Specify the virtual routing instance used to route data traffic in the forward direction to servers. This
is required for SLT and Layer 3 DSR; it is optional for Layer 2 DSR.

user@host# [edit services traffic-load-balance instance instance-name]


user@host# set server-vrf server-vrf

For example:

[edit services traffic-load-balance instance tlb-instance1]


user@host# set server-vrf server-vrf

5. Specify the server interface for which implicit filters are defined to direct return traffic to the client.

NOTE: Implicit filters for return traffic are not used for DSR.

user@host# [edit services traffic-load-balance instance instance-name]


user@host# set server-interface server-interface

For example:

[edit services traffic-load-balance instance tlb-instance1]


user@host# set server-interface ge-5/2/1.0
376

6. (Optional) Specify the filter used to bypass health checking for return traffic.

user@host# [edit services traffic-load-balance instance instance-name]


user@host# set server-inet-bypass-filter server-inet-bypass-filter

For example:

[edit services traffic-load-balance instance tlb-instance1]


user@host# set server-inet-bypass-filter tlb-ipv4-bypass

7. Specify the virtual routing instance in which you want the data in the reverse direction to be routed
to the clients.

user@host# [edit services traffic-load-balance instance instance-name]


user@host# set client-vrf client-vrf

For example:

[edit services traffic-load-balance instance tlb-instance1]


user@host# set client-vrf client-vrf

NOTE: Virtual routing instances for routing data in the reverse direction are not used with
DSR.

Configuring Servers
To configure servers for the TLB instance:

• Configure a logical name and IP address for each server to be made available for next-hop
distribution.

[edit services traffic-load-balance instance instance-name]


user@host# set real-service real-service-name address server-ip-address
377

For example:

[edit services traffic-load-balance instance tlb-instance1]


user@host# set real-service rs138 address 172.26.99.138
user@host# set real-service rs139 address 172.26.99.139
user@host# set real-service rs140 address 172.26.99.140

Configuring Network Monitoring Profiles


A network monitoring profile configures a health check probe, which you assign to a server group to
which session traffic is distributed.

To configure a network monitoring profile:

1. Configure the type of probe to use for health monitoring — icmp, tcp, http, ssl-hello, or custom.

NOTE: icmp probes are supported only on MS-MPC cards.


Next Gen Services and the MX-SPC3 do not support ICMP probes in this release.

• For an ICMP probe:

[edit services network-monitoring profile profile-name]


[email protected]# set icmp

• For a TCP probe:

[edit services network-monitoring profile profile-name]


[email protected]# set tcp port tcp-port-number

• For an HTTP probe:

[edit services network-monitoring profile profile-name]


[email protected]# set http host hostname url url port http-port-number method (get | option)
378

• For an SSL probe:

[edit services network-monitoring profile profile-name]


[email protected]# set ssl-hello port port ssl-version

• For a custom probe:

[edit services network-monitoring profile profile-name]


[email protected]# set custom cmd priority default-real-service-status (down | up) expect (ascii |
binary) receive-string port port real-service-action (down | up) send (ascii | binary) send-string

2. Configure the interval for probe attempts, in seconds (1 through 180).

[edit services network-monitoring profile profile-name]


[email protected]# set probe-interval interval

For example:

[edit services network-monitoring profile profile1-icmp]


[email protected]# set probe-interval 2

3. Configure the number of failure retries, after which the real server is tagged as down.

[edit services network-monitoring profile profile-name]


[email protected]# set failure-retries number-of-retries

For example:

[edit services network-monitoring profile profile1-icmp]


[email protected]# set failure-retries 3

4. Configure the number of recovery retries, which is the number of successful probe attempts after
which the server is declared up.

[edit services network-monitoring profile profile-name]


[email protected]# set recovery-retries number-of-retries
379

For example:

[edit services network-monitoring profile profile1-icmp]


[email protected]# set recovery-retries 1

Configuring Server Groups


Server groups consist of servers to which traffic is distributed by means of stateless, hash-based session
distribution and server health monitoring.

To configure a server group:

1. Specify the names of one or more configured real servers.

[edit services traffic-load-balance instance instance-name groups group-name]


[email protected]# set real-services real-service-name, ...

For example:

[edit services traffic-load-balance instance tlb-instance1 groups tlb-group1]


[email protected]# set real-services [ rs138 rs139 rs140 ]

2. Configure the routing instance for the group when you do not want to use the default instance,
inet.0.

[edit services traffic-load-balance instance instance-name groups group-name]


[email protected]# set routing-instance routing-instance-name

For example:

[edit services traffic-load-balance instance tlb-instance1 groups tlb-group1]


[email protected]# set routing-instance tlb-routing-instance1

3. (Optional) Disable the default option that allows a server to rejoin the group automatically when it
comes up.

[edit services traffic-load-balance instance instance-name group group-name]


[email protected]# set real-service-rejoin-options no-auto-rejoin
380

4. (Optional) Configure the logical unit of the instance’s service interface to use for health checking.

a. Specify the logical unit.

[edit services traffic-load-balance instance instance-name group group-


name]
[email protected]# set health-check-interface-subunit health-check-interface-subunit

b. Enable the routing of health-check packet responses from real servers to the interface.

[edit interfaces]
[email protected]# set interface-name unit subunit ip-address-owner service-plane

For example:

[edit services traffic-load-balance instance tlb-instance1 group tlb-group1]


[email protected]# set health-check-interface-subunit 30
[edit interfaces]
[email protected]# set ms-1/0/0 unit 30 ip-address-owner service-plane

5. Configure one or two network monitoring profiles to be used to monitor the health of servers in this
group.

[edit services traffic-load-balance instance instance-name groups group-name]


[email protected]# set network-monitoring-profile profile-name1 profile-name2

For example:

[edit services traffic-load-balance instance tlb-instance1 groups tlb-group1]


[email protected]# set network-monitoring-profile profile1-icmp profile2-http

Configuring Virtual Services


A virtual service provides an address that is associated with a the group of servers to which traffic is
directed as determined by hash-based or random session distribution and server health monitoring. You
may optionally specify filters and routing instances to steer traffic for TLB.

To configure a virtual service:


381

1. At the [edit services traffic-load-balance instance instance-name] hierarchy level, specify a non-zero
address for the virtual service.

[edit services traffic-load-balance instance instance-name virtual-service


virtual-service-name]
user@host# set address virtual-ip–address

For example:

[edit services traffic-load-balance instance tlb-instance1 virtual-service


virtual-service1]
user@host# set address 192.0.2.11

2. Specify the server group used for this virtual service.

[edit services traffic-load-balance instance instance-name virtual-service


virtual-service-name]
user@host# set group group-name

For example:

[edit services traffic-load-balance instance tlb-instance1 virtual-service


virtual-service1]
user@host# set group tlb-group1

3. (Optional) Specify a routing instance for the virtual service. If you do not specify a routing instance,
the default routing instance is used.

[edit services traffic-load-balance instance instance-name virtual-service


virtual-service-name]
user@host# set routing-instance routing-instance

For example:

[edit services traffic-load-balance instance tlb-instance1 virtual-service


virtual-service1]
user@host# set routing-instance msp-tproxy-server-vrf31
382

4. Specify the processing mode for the virtual service.

[edit services traffic-load-balance instance instance-name virtual-service


virtual-service-name]
user@host# set mode (layer2-direct-server-return | direct-server-return | translated)

For example:

[edit services traffic-load-balance instance tlb-instance1 virtual-service


virtual-service1]
user@host# set mode translated

5. (Optional) For a translated mode virtual service, enable the addition of the IP addresses for all the
real servers in the group under the virtual service to the server-side filters. Doing this allows you to
configure two virtual services with the same listening port and protocol on the same interface and
VRF.

[edit services traffic-load-balance instance instance-name virtual-service


virtual-service-name]
user@host# set include-real-server-ips-in-server-filter

6. (Optional) Specify a routing metric for the virtual service.

[edit services traffic-load-balance instance instance-name virtual-service


virtual-service-name]
user@host# set routing-metric routing-metric

For example:

[edit services traffic-load-balance instance tlb-instance1 virtual-service


virtual-service1]
user@host# set routing-metric 128
383

7. Specify the method used for load balancing. You can specify a hash method that provides a hash key
based on any combination of the source IP address, destination IP address, and protocol, or you can
specify random.

[edit services traffic-load-balance instance tlb-instance1 virtual-service


virtual-service1]
user@host# set load-balancing-method (hash hash-key (source-ip | destination-ip | proto) | random)

For example:

[edit services traffic-load-balance instance tlb-instance1 virtual-service


virtual-service1]
user@host# set load-balancing-method hash hash-key source-ip

or

[edit services traffic-load-balance instance tlb-instance1 virtual-service


virtual-service1]
user@host# set load-balancing-method random

NOTE: If you switch between the hash method and the random method for a virtual service,
the statistics for the virtual service are lost.

8. For a translated mode virtual service, specify a service for translation, including a virtual-port, server-
listening-port, and protocol.

[edit services traffic-load-balance instance instance-name virtual-service


virtual-service-name]
user@host# set service service-name virtual-port virtual-port server-listening-port server-listening-
port protocol (udp | tcp)

For example:

[edit services traffic-load-balance instance tlb-instance1 virtual-service


virtual-service1]
user@host# set service fast-track-service virtual-port 1111 server-listening-port 22 protocol tcp
384

9. Commit the configuration.

[edit services traffic-load-balance instance instance-name virtual-service


virtual-service-name]
user@host# commit

NOTE: In the absence of a client-interface configuration under the TLB instance, the implicit
client filter (for VIP) is attached to the client-vrf configured under the TLB instance. In this
case, the routing-instance under a translate mode virtual service cannot be the same as the
client-vrf configured under the TLB instance. if it is, the commit fails.

Configuring Tracing for the Health Check Monitoring Function


To configure tracing options for the health check monitoring function:

1. Specify that you want to configure tracing options for the health check monitoring function.

[edit services network-monitoring]


user@host# edit traceoptions

2. (Optional) Configure the name of the file used for the trace output.

[edit services network-monitoring traceoptions]


user@host# set file file-name

3. (Optional) Disable remote tracing capabilities.

[edit services network-monitoring traceoptions]


user@host# set no-remote-trace

4. (Optional) Configure flags to filter the operations to be logged.

[edit services network-monitoring traceoptions]


user@host# set flag flag

Table 40 on page 385 describes the flags that you can include.
385

Table 40: Trace Flags

Flag Support on MS-MPC Description


and MX-SPC3 Cards

all MS-MPC and MX-SPC3 Trace all operations.

all-real-services MX-SPC3 Trace all real services.

config MS-MPC and MX-SPC3 Trace traffic load balancer configuration


events.

connect MS-MPC and MX-SPC3 Trace traffic load balancer ipc events.

database MS-MPC and MX-SPC3 Trace database events.

file-descriptor-queue MS-MPC Trace file descriptor queue events.

inter-thread MS-MPC Trace inter-thread communication events.

filter MS-MPC and MX-SPC3 Trace traffic load balancer filter


programming events.

health MS-MPC and MX-SPC3 Trace traffic load balancer health events.

messages MS-MPC and MX-SPC3 Trace normal events.

normal MS-MPC and MX-SPC3 Trace normal events.

operational-commands MS-MPC and MX-SPC3 Trace traffic load balancer show events.

parse MS-MPC and MX-SPC3 Trace traffic load balancer parse events.
386

Table 40: Trace Flags (Continued)

Flag Support on MS-MPC Description


and MX-SPC3 Cards

probe MS-MPC and MX-SPC3 Trace probe events.

probe-infra MS-MPC and MX-SPC3 Trace probe infra events.

route MS-MPC and MX-SPC3 Trace traffic load balancer route events.

snmp MS-MPC and MX-SPC3 Trace traffic load balancer SNMP events.

statistics MS-MPC and MX-SPC3 Trace traffic load balancer statistics events.

system MS-MPC and MX-SPC3 Trace traffic load balancer system events.

5. (Optional) Configure the level of tracing.

[edit services network-monitoring traceoptions]


user@host# set level (all |error | info | notice | verbose | warning)

6. (Optional) Configure tracing for a particular real server within a particular server group.

[edit services network-monitoring traceoptions]


user@host# set monitor monitor-object-name group-name group-name real-services-name real-
service-name

7. (Optional) Starting in Junos OS Release 16.1R6 and 18.2R1, configure tracing for a particular virtual
service and instance.

[edit services traffic-load-balance traceoptions]


user@host# set monitor monitor-object-name instance-name instance-name virtual-svc-name virtual-
service-name
387

Release History Table

Release Description

16.1R6 Starting in Junos OS Release 16.1R6 and 18.2R1, configure tracing for a particular virtual service and
instance.
6 PART

DNS Request Filtering

DNS Request Filtering Overview and Configuration | 389


389

CHAPTER 28

DNS Request Filtering Overview and Configuration

IN THIS CHAPTER

DNS Request Filtering for Disallowed Website Domains | 389

DNS Request Filtering System Logging Error Messages | 412

DNS Request Filtering for Disallowed Website Domains

IN THIS SECTION

Overview of DNS Request Filtering | 389

How to Configure DNS Request Filtering | 392

Multitenant Support for DNS Filtering | 400

Configuring Multi-tenant Support for DNS Filtering | 401

Example: Configuring Multitenant Support for DNS Filtering | 406

Overview of DNS Request Filtering

IN THIS SECTION

Benefits | 391

Disallowed Domain Filter Database File | 391

DNS Filter Profile | 392


390

Starting in Junos OS Release 18.3R1, you can configure DNS filtering to identify DNS requests for
disallowed website domains. Starting in Junos OS Release 19.3R2, you can configure DNS filtering if you
are running Next Gen Services with the MX-SPC3 services card. Next Gen Services are supported on
MX240, MX480 and MX960 routers. For DNS request types A, AAAA, MX, CNAME, TXT, SRV, and
ANY, you configure the action to take for a DNS request for a disallowed domain. You can either:

• Block access to the website by sending a DNS response that contains the IP address or fully qualified
domain name (FQDN) of a DNS sinkhole server. This ensures that when the client attempts to send
traffic to the disallowed domain, the traffic instead goes to the sinkhole server (see Figure 9 on page
391).

• Log the request and allow access.

Starting in Junos OS release 21.1R1, you can also configure the following actions for a DNS request for
a disallowed domain:

• Alert

• Accept

• Drop

• Drop-no-log

For other DNS request types for a disallowed domain, the request is logged and access is allowed.
391

The actions that the sinkhole server takes are not controlled by the DNS request filtering feature; you
are responsible for configuring the sinkhole server actions. For example, the sinkhole server could send a
message to the requestor that the domain is not reachable and prevent access to the disallowed domain.

Figure 9: DNS Request for Disallowed Domain

Benefits

DNS filtering redirects DNS requests for disallowed website domains to sinkhole servers, while
preventing anyone operating the system from seeing the list of disallowed domains. This is because the
disallowed domain names are in an encrypted format.

Disallowed Domain Filter Database File

DNS request filtering requires a disallowed domain filter database .txt file, which identifies each
disallowed domain name, the action to take on a DNS request for the disallowed domain, and the IP
address or fully qualified domain name (FQDN) of a DNS sinkhole server.
392

DNS Filter Profile

You configure a DNS filter profile to specify which disallowed domain filter database file to use. You can
also specify the interfaces on which DNS request filtering is performed, limit the filtering to requests for
specific DNS servers, and limit the filtering to requests from specific source IP address prefixes.

How to Configure DNS Request Filtering

IN THIS SECTION

How to Configure a Domain Filter Database | 392

How to Configure a DNS Filter Profile | 393

How to Configure a Service Set for DNS Filtering | 399

To filter DNS requests for disallowed website domains, perform the following:

How to Configure a Domain Filter Database

Create one or more domain filter database files that include an entry for each disallowed domain. Each
entry specifies what to do with a DNS request for a disallowed website domain.

To configure a domain filter database file:

1. Create the name for the file. The database file name can have a maximum length of 64 characters
and must have a .txt extension.
2. Add a file header with a format such as
20170314_01:domain,sinkhole_ip,v6_sinkhole,sinkhole_fqdn,id,action.
3. Add an entry in the file for each disallowed domain. You can include a maximum of 10,000 domain
entries. Each entry in the database file has the following items:
hashed-domain-name,IPv4 sinkhole address, IPv6 sinkhole address, sinkhole FQDN, ID, action

where:

• hashed-domain-name is a hashed value of the disallowed domain name (64 hexadecimal


characters). The hash method and hash key that you use to produce the hashed domain value are
needed when you configure DNS filtering with the Junos OS CLI.

• IPv4 sinkhole address is the address of the DNS sinkhole server for IPv4 DNS requests.

• IPv6 sinkhole address is the address of the DNS sinkhole server for IPv6 DNS requests.
393

• sinkhole FQDN is the fully qualified domain name of the DNS sinkhole server.

• ID is a 32-bit number that uniquely associates the entry with the hashed domain name.

• action is the action to apply to a DNS request that matches the disallowed domain name. If you
enter :

• replace, the MX Series router sends the client a DNS response with the IP address or FQDN of
the DNS sinkhole server. If you enter report, the DNS request is logged and then sent to the
DNS server.

• report, the DNS request is logged and then sent to the DNS server.

• alert, the DNS request is logged and the request is sent to the DNS server.

• accept, the DNS request is logged and the request is sent to the DNS server.

• drop, the DNS request is dropped and the request is logged .DNS request is not sent to the
DNS server.

• drop-no-log, the DNS request is dropped and no syslog is generated. DNS request is not sent
to the DNS server.
4. In the last line of the file, include the file hash, which you calculate by using the same key and hash
method that you used to produce the hashed domain names.
5. Save the database files on the Routing Engine in the /var/db/url-filterd directory.
6. Validate the domain filter database file.

user@host> request services web-filter validate dns-filter-file-name filename hash-key key-string hash-
method hash-method-name

7. If you make any changes to the database file, apply the changes.

user@host> request services web-filter update dns-filter-database filename

How to Configure a DNS Filter Profile

A DNS filter profile includes general settings for filtering DNS requests for disallowed website domains,
and includes up to 32 templates. The template settings apply to DNS requests on specific uplink and
downlink logical interfaces or routing instances, or to DNS requests from specific source IP address
prefixes, and override the corresponding settings at the DNS profile level. You can configure up to eight
DNS filter profiles.

To configure a DNS filter profile:


394

1. Configure the name for a DNS filter profile:

[edit]
user@host# edit services web-filter profile profile-name

The maximum number of profiles is 8.


2. Configure the interval for logging per-client statistics for DNS filtering. The range is 0 through 60
minutes and the default is 5 minutes.

[edit services web-filter profile profile-name]


user@host# set global-dns-stats-log-timer minutes

3. Configure general DNS filtering settings for the profile. These values are used if a DNS request does
not match a specific template.

a. Specify the name of the domain filter database to use when filtering DNS requests.

[edit services web-filter profile profile-name dns-filter]


user@host# set database-file filename

b. (Optional) To limit DNS filtering to DNS requests that are destined for specific DNS servers,
specify up to three IP addresses (IPv4 or IPv6).

[edit services web-filter profile profile-name dns-filter]


user@host# set dns-server [ ip-address ]

c. Specify the format for the hash key.

[edit services web-filter profile profile-name dns-filter]


user@host# set hash-key ascii-text

d. Specify the hash key that you used to create the hashed domain name in the domain filter
database file.

[edit services web-filter profile profile-name dns-filter]


user@host# set hash-key key-string
395

e. Specify the hash method that was used to create the hashed domain name in the domain filter
database file.

[edit services web-filter profile profile-name dns-filter]


user@host# set hash-method hash-method-name

The only supported hash method is hmac-sha2-256.

f. Configure the interval for logging statistics for DNS requests and for sinkhole actions performed
for each customer IP address. The range is 1 through 60 minutes and the default is 5 minutes.

[edit services web-filter profile profile-name dns-filter]


user@host# set statistics-log-timer minutes

g. Configure the time to live while sending the DNS response after taking the DNS sinkhole action.
The range is 0 through 86,400 seconds and the default is 1800.

[edit services web-filter profile profile-name dns-filter]


user@host# set dns-resp-ttl seconds

h. Configure the level of subdomains that are searched for a match. The range is 0 through 10. A
value of 0 indicates that subdomains are not searched.

[edit services web-filter profile profile-name dns-filter]


user@host# set wildcarding-level level

For example, if you set the wildcarding-level to 4 and the database file includes an entry for
example.com, the following comparisons are made for a DNS request that arrives with the
domain 198.51.100.0.example.com:

• 198.51.100.0.example.com: no match

• 51.100.0.example.com: no match for one level down

• 100.0.example.com: no match for two levels down

• 0.example.com: no match for three levels down

• example.com: match for four levels down


396

4. Configure a template. You can configure a maximum of 8 templates in a profile. Each template
identifies filter settings for DNS requests on specific uplink and downlink logical interfaces or routing
instances, or for DNS requests from specific source IP address prefixes.

a. Configure the name for the template.

[edit services web-filter profile profile-name]


user@host# set dns-filter-template template-name

b. (Optional) Specify the client-facing logical interfaces (uplink) to which the DNS filtering is applied.

[edit services web-filter profile profile-name dns-filter-template


template-name]
user@host# set client-interfaces client-interface-name

c. (Optional) Specify the server-facing logical interfaces (downlink) to which the DNS filtering is
applied.

[edit services web-filter profile profile-name dns-filter-template


template-name]
user@host# set server-interfaces server-interface-name

d. (Optional) Specify the routing instance for the client-facing logical interface to which the DNS
filtering is applied.

[edit services web-filter profile profile-name dns-filter-template


template-name]
user@host# set client-routing-instance client-routing-instance-name

e. (Optional) Specify the routing instance for the server-facing logical interface to which DNS
filtering is applied.

[edit services web-filter profile profile-name dns-filter-template


template-name]
user@host# set server-routing-instance server-routing-instance-name
397

NOTE: If you configure the client and server interfaces or the client and server routing
instances, implicit filters are installed on the interfaces or routing instances to direct DNS
traffic to the services PIC for DNS filtering. If you configure neither the client and server
interfaces nor the routing instances, you must provide a way to direct DNS traffic to the
services PIC (for example, via routes).

f. Specify the name of the domain filter database to use when filtering DNS requests.

[edit services web-filter profile profile-name dns-filter-template


template-name dns-filter]
user@host# set database-file filename

g. (Optional) To limit DNS filtering to DNS requests that are destined for specific DNS servers,
specify up to three IP addresses (IPv4 or IPv6).

[edit services web-filter profile profile-name dns-filter-template


template-name dns-filter]
user@host# set dns-server ip-address

h. Specify the hash method that was used to create the hashed domain name in the domain filter
database file.

[edit services web-filter profile profile-name dns-filter-template


template-name dns-filter]
user@host# set hash-method hash-method-name

The only supported hash method is hmac-sha2-256.

i. Specify the hash key that was used to create the hashed domain name in the domain filter
database file.

[edit services web-filter profile profile-name dns-filter-template


template-name dns-filter]
user@host# set hash-key key-string
398

j. Configure the interval for logging statistics for DNS requests and for sinkhole actions performed
for each customer IP address. The range is 1 through 60 minutes and the default is 5 minutes.

[edit services web-filter profile profile-name dns-filter-template


template-name dns-filter]
user@host# set statistics-log-timer minutes

k. Configure the time to live while sending the DNS response after taking the DNS sinkhole action.
The range is 0 through 86,400 seconds and the default is 1800.

[edit services web-filter profile profile-name dns-filter-template


template-name dns-filter]
user@host# set dns-resp-ttl seconds

l. Configure the level of subdomains that are searched for a match. The range is 0 through 10. A
value of 0 indicates that subdomains are not searched.

[edit services web-filter profile profile-name dns-filter-template


template-name dns-filter]
user@host# set wildcarding-level level

For example, if you set the wildcarding-level to 4 and the database file includes an entry for
example.com, the following comparisons are made for a DNS request that arrives with the
domain 198.51.100.0.example.com:

• 198.51.100.0.example.com: no match

• 51.100.0.example.com: no match for one level down

• 100.0.example.com: no match for two levels down

• 0.example.com: no match for three levels down

• example.com: match for four levels down

m. (Optional) Specify the response error code for SRV and TXT query types.
(Optional) Specify the response error code for SRV and TXT query types.

[edit services web-filter profile profile-name dns-filter-template


template-name dns-filter]
399

user@host# set txt-resp-err-code (Noerror | Refused)


user@host# set srv-resp-err-code (Noerror | Refused)

n. Configure a term for the template. You can configure a maximum of 64 terms in a template.

[edit services web-filter profile profile-name dns-filter-template


template-name]
user@host# set term term-name

o. (Optional) Specify the source IP address prefixes of DNS requests you want to filter. You can
configure a maximum of 64 prefixes in a term.

[edit services web-filter profile profile-name dns-filter-template


template-name term term-name]
user@host# set from src-ip-prefix source-prefix

p. Specify that the sinkhole action identified in the domain filter database is performed on
disallowed DNS requests.

[edit services web-filter profile profile-name dns-filter-template


template-name term term-name]
user@host# set then dns-sinkhole

How to Configure a Service Set for DNS Filtering

• Associate the DNS filter profile with a next-hop service set and enable logging for DNS filtering. The
service interface can be an ms- or vms- interface Next Gen Services with MX-SPC3 services card), or
it can be an aggregated multiservices (AMS) interface.

[edit services service-set service-set-name]


user@host# set web-filter-profile profile-name
user@host# set syslog host hostname class urlf-logs
user@host# set next-hop-service inside-service-interface interface-name.unit-number
user@host# set next-hop-service outside-service-interface interface-name.unit-number
400

Multitenant Support for DNS Filtering

IN THIS SECTION

Overview | 400

Overview

Starting in Junos OS Release 21.1R1, you can configure custom domain feeds per customer or IP
subgroup. You can :

• Configure domain names and actions for multiple tenants such that domain feeds can be managed on
a per tenant basis.

• Configure hierarchical domain feed management per profile, per dns-filter-template or per dns-filter-
term.

• Exempt domain feeds at the IP, subnet, or CIDR level.

To implement the mutiltenant support for DNS filtering, creating the domain filter database file under
template or profile level is disabled. You need not specify a file at the template or profile level. Starting in
Junos OS 21.1R1, by default, a global file with a fixed name, nsf_multi_tenant_dn_custom_file.txt (plain
text format) or dnsf_multi_tenant_dn_custom_file_hashed.txt (encrypted file) is available.

Each entry in the database file has the following items:

hashed-domain-name, IPv4 sinkhole address, IPv6 sinkhole address, sinkhole FQDN, ID, action, feed-
name.

The file hash is calculated and appended to the list of domain name entries in the file. The file hash is
calculated using a global key and method ,which is validated with the file hash computed using the hash
key configured at the [edit services web-filter] hierarchy. The file validation is successful only if the
calculated file-hash matches the file hash present in the file.

Each entry in nsf_multi_tenant_dn_custom_file.txt file consists of an additional field called feed-name.


This feed-name s used as an indicator to group set of domain-names and map them to a tenant (profile,
template, term, or IP address).

When the DNS packets are received from a particular SRC IP address, the corresponding feed-name is
fetched and lookup happens against the domain-names mapped with the feed-name associated with the
term. If the feed-name is not provisioned for that IP address, then it falls back to the feed-name
configured at the template-level and lookup happens against the domain-names mapped with the feed-
401

name associated with the template. If the feed-name is not configured at template, then the lookup is
against the domain-names mapped against the feed-name associated with the profile.

Configuring Multi-tenant Support for DNS Filtering


1. Configure the web filter.

[edit]
user@host# edit services web-filter

2. Enable multi-tenant support

[edit services web-filter]


user@host# set multi-tenant-support

3. Configure the global file hash key and hash method.

[edit services web-filter]


user@host# set multi-tenant-hash
user@host# set multi-tenant-hash file-hash-key (ascii-text | hexadecimal)
user@host# set multi-tenant-hash hash-method (ascii-text | hexadecimal)

NOTE: When multi-tenant-hashis configured, it indicates that the global dns feed file consists
of only encrypted feeds. When multi-tenant-hash s not configured it indicates that the global
dns feed file has feeds in plain text format.

4. Configure the name for a DNS filter profile and map the domain feed at the profile level. The feed
name indicator configured at the profile level is applied to all the templates and terms under the
profile that do not have the feed name indicator configured.

[edit]
user@host# [edit services web-filter profile profile-name]
user@host# [edit services web-filter profile profile-name feed-name feed-name]

5. Configure general DNS filtering settings for the profile. These values are used if a DNS request does
not match a specific template.
402

a. (Optional) To limit DNS filtering to DNS requests that are destined for specific DNS servers,
specify up to three IP addresses (IPv4 or IPv6).

[edit services web-filter profile profile-name dns-filter]


user@host# set dns-server [ip-address]

b. Configure the interval for logging statistics for DNS requests and for sinkhole actions performed
for each customer IP address. The range is 1 through 60 minutes and the default is 5 minutes.

[edit services web-filter profile profile-name dns-filter]


user@host# set statistics-log-timer minutes

c. Configure the time to live (TTL) to send the DNS response after taking the DNS sinkhole action.
The range is 0 through 86,400 seconds and the default is 1800.

[edit services web-filter profile profile-name dns-filter]


user@host# set dns-resp-ttlseconds

d. Configure the level of subdomains that are searched for a match. The range is 0 through 10. A
value of 0 indicates that subdomains are not searched.

[edit services web-filter profile profile-name dns-filter]


user@host# set wildcarding-levellevel

e. (Optional) Specify the response error code for the TXT query type.

[edit services web-filter profile profile-name dns-filter]


user@host# set txt-resp-err-code (Noerror | Refused) level

6. Configure a template. You can configure a maximum of 8 templates in a profile. Each template
identifies filter settings for DNS requests on specific uplink and downlink logical interfaces or routing
instances, or for DNS requests from specific source IP address prefixes.

a. Configure the name for the template.

[edit services web-filter profile profile-name]


user@host# set dns-filter-template template-name
403

b. Configure the feed name. With multitenant format, you can no longer add a file name under
profile or template. The feed name specified under profile has lesser precedence compared to the
one configured under the template.

[edit services web-filter profile profile-namedns-filter-template template-


name ]
user@host# set feed-name feed-name

c. (Optional) Specify the client-facing logical interfaces (uplink) to which the DNS filtering is applied.

[edit services web-filter profile profile-name dns-filter-template


template-name]
user@host# set client-interfaces client-interface-name

d. (Optional) Specify the server-facing logical interfaces (downlink) to which the DNS filtering is
applied.

[edit services web-filter profile profile-name dns-filter-template


template-name]
user@host# set server-interfaces server-interface-name

e. (Optional) Specify the routing instance for the client-facing logical interface to which the DNS
filtering is applied.

[edit services web-filter profile profile-name dns-filter-template


template-name]
user@host# set client-routing-instance client-routing-instance-name

f. (Optional) Specify the routing instance for the server-facing logical interface to which DNS
filtering is applied.

[edit services web-filter profile profile-name dns-filter-template


template-name]
user@host# set server-routing-instance server-routing-instance-name
404

NOTE: If you configure the client and server interfaces or the client and server routing
instances, implicit filters are installed on the interfaces or routing instances to direct DNS
traffic to the services PIC for DNS filtering. If you configure neither the client and server
interfaces nor the routing instances, you must provide a way to direct DNS traffic to the
services PIC (for example, through routes).

g. Configure the interval for logging statistics for DNS requests and for sinkhole actions performed
for each customer IP address. The range is 1 through 60 minutes and the default is 5 minutes.

[edit services web-filter profile profile-name dns-filter-template


template-name dns-filter]
user@host# set statistics-log-timer minutes

h. Configure the time to live while sending the DNS response after taking the DNS sinkhole action.
The range is 0 through 86,400 seconds and the default is 1800.

[edit services web-filter profile profile-name dns-filter-template


template-name dns-filter]
user@host# set dns-resp-ttl seconds

i. Configure the level of subdomains that are searched for a match. The range is 0 through 10. A
value of 0 indicates that subdomains are not searched.

[edit services web-filter profile profile-name dns-filter-template


template-name dns-filter]
user@host# set wildcarding-level level

j. Configure a term for the template. You can configure a maximum of 64 terms in a template.

[edit services web-filter profile profile-name dns-filter-template


template-name]
user@host# set term term-name
405

k. Configure the feed name. The feed name configured at the term takes higher precedence over the
one configured under the template. However, if the sinkhole domain is matching the only domain
mentioned in the feed name under template, the action specified for that entry is implemented.

[edit services web-filter profile profile-name dns-filter-template


template-name term term-name]
user@host# set feed-name feed-name

l. (Optional) Specify the source IP address prefixes of DNS requests you want to filter. You can
configure a maximum of 64 prefixes in a term.

[edit services web-filter profile profile-name dns-filter-template


template-name term term-name]
user@host# set from src-ip-prefix source-prefix

m. Configure that the sinkhole action identified in the domain filter database is performed on
disallowed DNS requests.

[edit services web-filter profile profile-name dns-filter-template


template-name term term-name]
user@host# set then dns-sinkhole

7. Associate the DNS filter profile with a next-hop service set and enable logging for DNS filtering. The
service interface can be a multiservices (ms) or virtual multi service (vms) interface (Next Gen
Services with MX-SPC3 services card), or it can be an aggregated multiservices (AMS) interface.

[edit services service-set service-set-name]


user@host# set syslog mode event
user@host# set syslog syslog event-rate vent-rate
user@host# set syslog local-category urlf
user@host# set web-filter-profile profile-name
user@host# set set next-hop-service inside-service-interface interface-name.unit-number
user@host# set set next-hop-service outside-service-interface interface-name.unit-number
406

8. If you are running Next Gen Services on the MX-SPC3 services card, configure the vms interface to
get the FPC and PIC information in the syslog.

[edit interfaces interface-name]


user@host# set vms 0/0/0
user@host# set services-options

[edit interfaces interface-name


user@host# fpc-pic-information

Example: Configuring Multitenant Support for DNS Filtering

IN THIS SECTION

Configuration | 406

Configuration

IN THIS SECTION

CLI Quick Configuration | 406

CLI Quick Configuration

To quickly configure this example, copy the following commands, paste them into a text file, remove any
line breaks, change any details necessary to match your network configuration, and then copy and paste
the commands into the CLI at the [edit] hierarchy level.

set services service-set Test Zone3 syslog mode stream


set services service-set Test Zone3 syslog source-address 10.1.1.1
set services service-set Test Zone3 syslog stream t1 category urlf
set services service-set Test Zone3 syslog stream t1 host 10.10.1.1
set services service-set Test Zone3 syslog stream t1 routing-instance client_vr4
407

set services service-set Test Zone3 web-filter-profile Test-Profile-3-Zone3


set services service-set Test Zone3 next-hop-service inside-service-interface ams3.24
set services service-set Test Zone3 next-hop-service outside-service-interface ams3.25
set services web-filter multi-tenant-support
set services web-filter multi-tenant-hash file-hash-key ascii-text "$9$VjsgJikP36AGD6Ap0hcbs2"
set services web-filter multi-tenant-hash hash-method hmac-sha2-256
set services web-filter profile Test-Profile-3-Zone3 feed-name abc
set services web-filter profile Test-Profile-3-Zone3 global-dns-filter-stats-log-timer 20
set services web-filter profile Test-Profile-3-Zone3 dns-filter statistics-log-timer 5
set services web-filter profile Test-Profile-3-Zone3 dns-filter dns-resp-ttl 100
set services web-filter profile Test-Profile-3-Zone3 dns-filter wildcarding-level 10
set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone3-Area1 inactive:
client-interfaces xe-7/0/2.32
set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone3-Area1 inactive:
server-interfaces xe-7/2/0.36
set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone3-Area1 inactive:
client-routing-instance client_vr4
set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone3-Area1 inactive:
server-routing-instance server_vr4
set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone3-Area1 term Test-
Profile-3-Zone3-Area1-Customer1 feed-name customer2
set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone3-Area1 term Test-
Profile-3-Zone3-Area1-Customer1 from src-ip-prefix 10.12.1.1
set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone3-Area1 term Test-
Profile-3-Zone3-Area1-Customer1 then dns-sinkhole
set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone3-Area1 term Test-
Profile-3-Zone3-Area1-Customer2 feed-name customer2
set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone3-Area1 term Test-
Profile-3-Zone3-Area1-Customer2 from src-ip-prefix 2001:db8::0/96
set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone3-Area1 term Test-
Profile-3-Zone3-Area1-Customer2 then dns-sinkhole
set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone3-Area1 term Test-
Profile-3-Zone3-Area1-Customer3 from src-ip-prefix 2001:db8:bbbb::/96
set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone3-Area1 term Test-
Profile-3-Zone3-Area1-Customer3 then dns-sinkhole
set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone3-Area2 inactive:
client-interfaces xe-7/0/2.32
set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone3-Area2 inactive:
server-interfaces xe-7/2/0.36
set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone3-Area2 inactive:
client-routing-instance client_vr4
408

set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone3-Area2 inactive:


server-routing-instance server_vr4
set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone3-Area2 term Test-
Profile-3-Zone3-Area2-Customer1 from src-ip-prefix 22.21.128.0/17
set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone3-Area2 term Test-
Profile-3-Zone3-Area2-Customer1 then dns-sinkhole
set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone4-Area2 feed-
name customer2
set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone4-Area2 inactive:
client-routing-instance client_vr4
set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone4-Area2 inactive:
server-routing-instance server_vr4
set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone4-Area2 term Test-
Profile-3-Zone4-Area2-Customer1 from src-ip-prefix 2001:0db8:0001:/48
set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone4-Area2 term Test-
Profile-3-Zone4-Area2-Customer1 then dns-sinkhole
set services web-filter profile Test-Profile-3-Zone3 dns-filter-template Test-Profile-3-Zone4-Area2 term
wildcard then dns-sinkhole
set interfaces xe-7/0/0 unit 0 family inet address 10.11.1.1/24
set interfaces xe-7/0/1 unit 0 family inet address 10.12.1.1/24
set interfaces xe-7/0/2 flexible-vlan-tagging
set interfaces xe-7/0/2 mtu 9192
set interfaces xe-7/0/2 encapsulation flexible-ethernet-services
set interfaces xe-7/0/2 unit 1 vlan-id 10
set interfaces xe-7/0/2 unit 1 family inet address 198.31.100.1/24
set interfaces xe-7/0/2 unit 31 vlan-id 31
set interfaces xe-7/0/2 unit 31 family inet address 198.51.70.1/24;
set interfaces xe-7/0/2 unit 31 family inet6 address 2001:db8:10::0/96
set interfaces xe-7/0/2 unit 32 vlan-id 32
set interfaces xe-7/0/2 unit 32 family inet address 198.51.71.1/24;
set interfaces xe-7/0/2 unit 32 family inet6 address 2001:db8:11::0/96
set interfaces xe-7/0/2 unit 33 vlan-id 33
set interfaces xe-7/0/2 unit 33 family inet address 198.51.72.1/24
set interfaces xe-7/0/2 unit 33 family inet6 address 2001:db8:12::0/96
set interfaces xe-7/0/2 unit 34 vlan-id 34
set interfaces xe-7/0/2 unit 34 family inet address 198.51.73.1/24
set interfaces xe-7/0/2 unit 34 family inet6 address 2001:db8:13::0/96
set interfaces xe-7/0/2 unit 35 vlan-id 35
set interfaces xe-7/0/2 unit 35 vlan-id 35 family inet address 198.51.74.1/24
set interfaces xe-7/0/2 unit 3135 vlan-id 35 family inet6 address 2001:db8:14::0/96
set interfaces xe-7/0/2 unit 36 vlan-id 36
409

set interfaces xe-7/0/2 unit 36 family inet address 198.51.75.1/24


set interfaces xe-7/0/2 unit 36 family inet6 address 2001:db8:15::0/96
set interfaces xe-7/0/2 unit 37 vlan-id 37
set interfaces xe-7/0/2 unit 37 family inet address 198.51.76.1/24
set interfaces xe-7/0/2 unit 37 family inet6 address 2001:db8:16::0/96
set interfaces xe-7/0/2 unit 38 vlan-id 38
set interfaces xe-7/0/2 unit 38 family inet address 198.51.77.1/24
set interfaces xe-7/0/2 unit 38 family inet6 address 2001:db8:17::0/96
set interfaces xe-7/0/2 unit 39 vlan-id 39
set interfaces xe-7/0/2 unit 39 family inet address 198.51.78.1/24
set interfaces xe-7/0/2 unit 39 family inet6 address 2001:db8:18::0/96
set interfaces xe-7/0/2 unit 40 vlan-id 40
set interfaces xe-7/0/2 unit 40 family inet address 198.51.79.1/24
set interfaces xe-7/0/2 unit 40 family inet6 address 2001:db8:19::0/96
set interfaces xe-7/0/2 unit 41 vlan-id 41
set interfaces xe-7/0/2 unit 41 family inet address 198.51.80.1/24
set interfaces xe-7/0/2 unit 41 family inet6 address 2001:db8:20::0/96
set interfaces xe-7/2/0 flexible-vlan-tagging
set interfaces xe-7/2/0 mtu 1514
set interfaces xe-7/2/0 encapsulation flexible-ethernet-services
set interfaces xe-7/2/0 inactive unit 1 vlan-id 1
set interfaces xe-7/2/0 inactive unit 1 family inet address 198.168.50.0/24
set interfaces xe-7/2/0 inactive unit 1 family inet6 address 2001:0db0:1600:0::1/112
set interfaces xe-7/2/0 unit 2 vlan-id 2
set interfaces xe-7/2/0 unit 2 vlan-id 2 family inet address 198.100.70.0/24
set interfaces xe-7/2/0 unit 31 vlan-id 31
set interfaces xe-7/2/0 unit 31 family inet address 10.1.0.1/16
set interfaces xe-7/2/0 unit 31 family inet6 address 2001:0db0:1601:0::1/112
set interfaces xe-7/2/0 unit 32 vlan-id 32
set interfaces xe-7/2/0 unit 32 family inet address 10.2.0.1/16
set interfaces xe-7/2/0 unit 32 family inet6 address 2001:0db0:1602:0::1/112
set interfaces xe-7/2/0 unit 33 vlan-id 33
set interfaces xe-7/2/0 unit 33 family inet address 10.3.0.1/16
set interfaces xe-7/2/0unit 33 vlan-id 33 family inet6 address 2001:0db0:1603:0::1/112
set interfaces xe-7/2/0 unit 34 vlan-id 34
set interfaces xe-7/2/0 unit 34 family inet address 10.0.0.1/16
set interfaces xe-7/2/0 unit 34 family inet6 address 2001:0db0:1600:0::1/112
set interfaces xe-7/2/0 unit 35 vlan-id 35
set interfaces xe-7/2/0 unit 35 family inet address 10.4.0.1/16
set interfaces xe-7/2/0 unit 35 family inet6 address 2001:0db0:1604:0::1/112
410

set interfaces xe-7/2/0 unit 36 vlan-id 36


set interfaces xe-7/2/0 unit 36 family inet address 10.5.0.1/16
set interfaces xe-7/2/0 unit 36 family inet6 address 2001:0db0:1605:0::1/112
set interfaces xe-7/2/0 unit 37 vlan-id 37
set interfaces xe-7/2/0 unit 37 family inet address 10.6.0.1/16
set interfaces xe-7/2/0unit 37 family inet6 address 2001:0db0:1606:0::1/112
set interfaces xe-7/2/0 unit 38 vlan-id 38
set interfaces xe-7/2/0 unit 38 family inet address 10.7.0.1/16
set interfaces xe-7/2/0 unit 38 vlan-id 38 family inet6 address 2001:0db0:160:0::1/112
set interfaces ams3 load-balancing-options member-interface mams-3/0/0
set interfaces ams3 load-balancing-options member-interface mams-3/1/0
set interfaces ams3 load-balancing-options member-failure-options redistribute-all-traffic enable-rejoin
set interfaces ams3 load-balancing-options high-availability-options many-to-one preferred-backup
mams-3/1/0
set interfaces ams3 unit 22 family inet
set interfaces ams3 unit 22 family inet6
set interfaces ams3 unit 22 service-domain inside
set interfaces ams3 unit 22 load-balancing-options hash-keys ingress-key (source-ip destination-ip )
set interfaces ams3 unit 24 family inet
set interfaces ams3 unit 24 family inet6
set interfaces ams3 unit 24 service-domain inside
set interfaces ams3 unit 24 family inet6 load-balancing-options hash-keys ingress-key (source-ip destination-
ip)
set interfaces ams3 unit 25 family inet
set interfaces ams3 unit 25 family inet6
set interfaces ams3 unit 25 service-domain inside
set interfaces ams3 unit 25 load-balancing-options hash-keys ingress-key (source-ip destination-ip )
set routing-instances client_vr4 instance-type virtual-router
set routing-instances client_vr4 routing-options rib client_vr4.inet6.0 static route 2001:0db0:bbbb:0::0/49
next-hop 2001:0db0:7070:71::2
set routing-instances client_vr4 routing-options rib client_vr4.inet6.0 static route
2001:0db0:aaaa:8000::0/49 next-hop 2001:0db0:7070:71::3
set routing-instances client_vr4 routing-options rib client_vr4.inet6.0 static route 60::0/64 next-hop ams3.24
set routing-instances client_vr4 routing-options static route 10.12.1.1 next-hop 192.168.1.2
set routing-instances client_vr4 routing-options static route 22.21.128.0/17 next-hop 192.168.1.3
set routing-instances client_vr4 routing-options static route 0.0.0.0/0 next-hop ams3.24
set routing-instances client_vr4 routing-options static route 10.11.10.10/16 next-hop 192.168.1.4
set routing-instances client_vr4 routing-options static route 10.10.23.10/16 next-hop 192.168.1.5
set routing-instances client_vr4 routing-options static route 10.1.0.0/16 next-hop 192.168.1.6
set routing-instances client_vr4 routing-options static route 10.20.20.0/16 next-hop 192.168.1.7
set routing-instances client_vr4 routing-options static route 10.2.0.0/16 next-hop 192.168.1.8
411

set routing-instances client_vr4 routing-options static route 10.30.20.0/16 next-hop 192.168.1.9


set routing-instances client_vr4 routing-options static route 10.3.0.0/16 next-hop 192.168.10.
set routing-instances client_vr4 routing-options static route 10.40.20.0/16 next-hop 192.168.1.11
set routing-instances client_vr4 routing-options static route 10.4.0.0/16 next-hop 192.168.1.12
set routing-instances client_vr4 routing-options static route 10.50.20.0/16 next-hop 192.168.1.13
set routing-instances client_vr4 interface xe-7/0/0.0
set routing-instances client_vr4 interface xe-7/0/2.32
set routing-instances client_vr4 interface ams3.24
set routing-instances server_vr4 instance-type virtual-router
set routing-instances server_vr4 routing-options rib server_vr4.inet6.0 static route 2001:0db0:2221:0::0/48
next-hop ams3.25
set routing-instances server_vr4 routing-options rib server_vr4.inet6.0 static route 2001:db8:ffff::1/128 next-
hop 2001:0db0:1605:0::2
set routing-instances server_vr4 routing-options rib server_vr4.inet6.0 static route 2001:db8:bbbb::1/128
next-hop 2001:0db0:1605:0::3
set routing-instances server_vr4 routing-options static route 10.10.20.1 next-hop ams3.25
set routing-instances server_vr4 routing-options static route 60.0.6.0/24 next-hop 192.0.2.2
set routing-instances server_vr4 routing-options static route 60.0.18.0/24 next-hop 192.0.2.3
set routing-instances server_vr4 routing-options static route 10.9.9.0/24 next-hop ams3.25
set routing-instances server_vr4 routing-options static route 60.0.19.0/24 next-hop 192.0.2.4
set routing-instances server_vr4 routing-options static route 60.0.20.0/24 next-hop 192.0.2.5
set routing-instances server_vr4 routing-options static route 60.0.21.0/24 next-hop 192.0.2.6
set routing-instances server_vr4 routing-options static route 60.0.22.0/24 next-hop 192.0.2.7
set routing-instances server_vr4 routing-options static route 60.0.23.0/24 next-hop 192.0.2.8
set routing-instances server_vr4 routing-options static route 60.0.24.0/24 next-hop 192.0.2.9
set routing-instances server_vr4 routing-options static route 60.0.25.0/24 next-hop 192.0.2.10
set routing-instances server_vr4 routing-options static route 60.0.26.0/24 next-hop 192.0.2.11
set routing-instances server_vr4 routing-options static route 60.0.27.0/24 next-hop 192.0.2.12
set routing-instances server_vr4 routing-options static route 60.0.28.0/24 next-hop 192.0.2.13
set routing-instances server_vr4 routing-options static route 10.1.0.0/16 next-hop ams3.25
set routing-instances server_vr4 interface xe-7/0/1.0
set routing-instances server_vr4 interface xe-7/2/0.36
set routing-instances server_vr4 interface ams3.25
set routing-options static route 0.0.0.0/0 next-hop 10.48.179.254
412

Release History Table

Release Description

19.3R2 Starting in Junos OS Release 19.3R2, you can configure DNS filtering if you are running Next Gen
Services with the MX-SPC3 services card. Next Gen Services are supported on MX240, MX480 and
MX960 routers.

DNS Request Filtering System Logging Error Messages

IN THIS SECTION

System Logging for DNS Request Filtering Overview | 412

DNS Match-Event Syslog Format | 413

Reason Mask Values & Interpretations for DNS Filtering | 416

Per-Term Statistics Syslog Format | 418

DNS Filtering Disallow-List File Add/Change Syslog Format | 420

DNS Filtering Summary Report Statistics Syslog Format | 422

DNS Filtering Per-Client-IP Statistics Syslog Format | 422

The message format for system logs related to DNS request filtering differs slightly for the Next Gen
Services MX-SPC3 services card versus early services cards. This topic describes the differences in the
DNS request filtering related system log messages and provides a description of all fields in these
messages.

System Logging for DNS Request Filtering Overview

Next Gen Services DNS request filtering system logging generates these events:

1. DNS match events (DNS_SR_MATCH_EVENT)

a. A single syslog is generated for each DNS match to the list of filtered domains.

2. Per-term statistics (DNS_SR_CUSTOMER_STATS)

a. Each term in the template represents a customer, enabling you to collect per-customer statistics.
413

b. You can configure the interval in which you want to collect statistics in each template.

3. You can report an event each time a DNS disallow-list file is added or updated
(DNS_SR_FILE_UPDATE_NOTICE)

4. You can collect per-PIC Summary report statistics (DNS_SR_REPORT_STATS)

a. Statistics are generated every 5 minutes. This interval value is not configurable.

b. These stats are generated per-PIC basis.

NOTE: To enable these logs you must configure a syslog for each service-set for which
you’ve configured dns-filtering.
All system log messages for Next Gen Services are configured at the service-set level using
the following statement:

user@host# edit services service-set service-set-name syslog

To collect DNS request filtering system log messages, include urlf in the local-category
statement:

[edit services service-set ss1 syslog]


user@host# set local-category urlf

5. You can collect per-client IP statistics (DNS_SR_CLIENT_IP_STATS)

a. This statistics are generated per-profile.

b. The interval for collecting these statistics is configurable per-profile.

DNS Match-Event Syslog Format

NOTE: System system log messages for Next Gen Services DNS request filtering doesn’t include
the FPC slot/PIC slot and UTC time.

Table 41 on page 414 describes the fields contained in DNS request filtering match events.
414

Table 41: DNS-Match-Event Syslog Format

Field Name Description Example

Time Stamp Time when log entry was Oct 27 10:04:19


generated

Router Name Host name of the router Jnpr-router-01


generating the record

Log Handle Log handle to identify the log junos-url-filter


category

Match Indicates a DNS match was JSERVICES_URLF_MATCH_EVENT:


detected. DNS_SR_MATCH_EVENT

Tag Log-prefix configured Tag=<value>

svc-set-name Service-set name svc-set-name=<value>

ID ID assigned to the domain ID=12345


name

(Size of ID is assumed to be a
32-bit number)

IP_Src Source IP IP_Src=10.1.5.72

IP_Dst Destination IP (DNS resolver) IP_Dst=10.1.1.10

Src_Prt Source Port Src_Prt=37344

Dst_Prt Destination Port Dst_Prt=53


415

Table 41: DNS-Match-Event Syslog Format (Continued)

Field Name Description Example

Sinkhole_IP IP of sinkhole server from Sinkhole_IP=10.1.50.64


Domain Name Input List

Sinkhole_IPv6 IP of IPv6 sinkhole server Sinkhole_IPv6=8001:1002:


from Domain
1003:1004:1005:1006:1007:1008
Name Input List

Sinkhole_fqdn Sinkhole FQDN Sinkhole_fqdn=NA

Count Counter for match events to Count=54


accommodate identical event
records

Replaced Designates replacement of Replaced=Y


response domain (i.e.
sinkholing)

Reason_Mask Reason for action (if Reason_Mask=0x0


Replaced=N)

[See table below for bit


position enumeration]

QType Query Type of the DNS QType=A


request (A, AAAA, MX,
CNAME, SRV, TXT)

Profile Profile Name Profile=profile_01

[The Web filter profile name


as configured]
416

Table 41: DNS-Match-Event Syslog Format (Continued)

Field Name Description Example

Template Template Name Template=template_01

[The DNS filter template


name as configured]

Term Term Name Term=term_01

[The DNS filter term name as


configured]

Time UNIX timestamp Time=Wed Dec 20 12:25:24 2017

Here’s an example of MX-SPC3 DNS filtering syslog format:

Feb 20 17:06:36 ce-bras-mx480-o junos-url-filter: JSERVICES_URLF_MATCH_EVENT:


DNS_SR_MATCH_EVENT, Tag=tag, svc-set-name= s1, ID=1235, IP_SRC=2.2.2.3,
IP_DST=101.10.10.100, SRC_PRT=34342, DST_PRT=53, Sinkhole_IP=1.1.1.1, Sinkhole_IPv6=NA,
Sinkhole_fqdn=NA, Count=9, Replaced=Y, Reason_Mask=0x0, QType=A, Profile=webf-prof-1,
Template=dnsf-temp-1, Term=dnsf-term-1, Time=Tue Jan 23 13:45:52 2018

Here’s an example of MS-MPC DNS filtering syslog format:

Jan 23 13:45:52 cliq (FPC Slot 1, PIC Slot 1) 2018-01-23 21:45:52: {s1}[jservices-urlf]:
JSERVICES_URLF_MATCH_EVENT: DNS_SR_MATCH_EVENT ID=1235, IP_SRC=2.2.2.3,
IP_DST=101.10.10.100, SRC_PRT=34342, DST_PRT=53, Sinkhole_IP=1.1.1.1, Sinkhole_IPv6=NA,
Sinkhole_fqdn=NA, Count=9, Replaced=Y, Reason_Mask=0x0, QType=A, Profile=webf-prof-1,
Template=dnsf-temp-1, Term=dnsf-term-1, Time=Tue Jan 23 13:45:52 2018

Reason Mask Values & Interpretations for DNS Filtering

Table 42 on page 417 describes the reason mask value fields and interpretations for MX Next Gen
Services DNS filtering.
417

Table 42: Reason Mask Values & Interpretations for DNS Filtering

Bit Position Hex Value Interpretation Additional


Comments

0x0 Replaced

0 0x1 Reason Other Examples:Fragmente


d packets,
malformed packets

1 0x2 Not a supported DNS Examples: SRV, TXT


request type

2 0x4 Indicator action set to This is to enable


“Report-Only” testing of new
indicators before
putting them into
Production.

3 0x8 Replace A/AAAA record


error

4 0x10 Replacement The domain name


information not entry is marked
available “replace” but the
sinkhole-ip/sinkhole-
ipv6/sinkhole-fqdn
is not provided.

Here’s an example of MX Next Gen Services syslog format for DNS filtering showing the reason mask
and interpretation:

Feb 20 17:06:36 ce-bras-mx480-o junos-url-filter: JSERVICES_URLF_MATCH_EVENT:


DNS_SR_MATCH_EVENT, Tag=tag, svc-set-name= s1, ID=1235, IP_SRC=2.2.2.3,
IP_DST=101.10.10.100, SRC_PRT=34342, DST_PRT=53, Sinkhole_IP=1.1.1.1, Sinkhole_IPv6=NA,
Sinkhole_fqdn=NA, Count=9, Replaced=Y, Reason_Mask=0x0, QType=A, Profile=webf-prof-1,
Template=dnsf-temp-1, Term=dnsf-term-1, Time=Tue Jan 23 13:45:52 2018

Here’s an example of MS-MPC DNS filtering syslog format:


418

Jan 23 13:45:52 cliq (FPC Slot 1, PIC Slot 1) 2018-01-23 21:45:52: {s1}[jservices-urlf]:
JSERVICES_URLF_MATCH_EVENT: DNS_SR_MATCH_EVENT ID=1235, IP_SRC=2.2.2.3,
IP_DST=101.10.10.100, SRC_PRT=34342, DST_PRT=53, Sinkhole_IP=1.1.1.1, Sinkhole_IPv6=NA,
Sinkhole_fqdn=NA, Count=9, Replaced=Y, Reason_Mask=0x0, QType=A, Profile=webf-prof-1,
Template=dnsf-temp-1, Term=dnsf-term-1, Time=Tue Jan 23 13:45:52 2018

Per-Term Statistics Syslog Format

Table 43 on page 418 describes the fields for MX Next Gen Services DNS filtering per-term statistics
syslog format.

Table 43: Per-Term Statistics Syslog Format

Field Name Description Example

Time Stamp Time when log entry was Oct 27 10:04:17


generated

Router Name Host name of the router Jnpr-router-01


generating the record

Log Handle Log handle to identify the junos-url-filter


log category

Match A term(customer) statistics JSERVICES_URLF_CUSTOMER_S


record TATS:
DNS_SR_CUSTOMER_STATS

Tag Log-prefix configured Tag=<value>

svc-set-name Service-set name svc-set-name=<value>

Profile Profile Name Profile=profile_01

[The Web filter profile name


as configured]
419

Table 43: Per-Term Statistics Syslog Format (Continued)

Field Name Description Example

Template Template Name Template=template_01

[The DNS filter template


name as configured]

Term Term Name Term=term_01

[The DNS filter term name as


configured]

Packets_Processed Total DNS Requests Requests_Processed=200


Processed

DNS_UDP_Packets_Processed DNS UDP Requests DNS_UDP_Requests_Processed=9


Processed 8

DNS_TCP_Packets_Processed DNS TCP Requests DNS_TCP_Requests_Processed=3


Processed 5

DNS_UDP_Requests_sinkholed DNS UDP Requests sink- DNS_UDP_Requests_Sinkholed


holed =50

DNS_TCP_Requests_sinkholed DNS TCP Requests sink- DNS_TCP_Requests_Sinkholed


holed =50

DNS_UDP_Requests_reported DNS UDP Requests reported DNS_UDP_Requests_Reported


=50

DNS_TCP_Requests_reported DNS TCP Requests reported DNS_TCP_Requests_Reported


=50

Time UNIX timestamp Time=Wed Dec 20 12:25:24 2017


420

Table 43: Per-Term Statistics Syslog Format (Continued)

Field Name Description Example

Count Counter to accommodate Count=10


identical event records

Here’s an example of MX-SPC3 DNS filtering syslog format for per-term statistics:

Feb 25 14:25:45 curve junos-url-filter: JSERVICES_URLF_CUSTOMER_STATS:


DNS_SR_CUSTOMER_STATS, Tag , svc-set-name s1, Profile=DNS_CUSTOMER-A,
Template=DNS_CUSTOMER-A, Term=DNS_CUSTOMER-A, Requests_Processed=0,
DNS_UDP_Requests_Processed=0, DNS_TCP_Requests_Processed=0,
DNS_UDP_Requests_Sinkholed=0, DNS_TCP_Requests_Sinkholed=0,
DNS_UDP_Requests_Reported=0, DNS_TCP_Requests_Reported=0, Time=Mon Feb 25 14:25:45
2019, Count=13

Here’s an example of MS-MPC DNS filtering syslog format:

Mar 8 12:16:05 iphone3gs (FPC Slot 5, PIC Slot 0) 2019-03-08 20:16:04: {ATT-Zone5}[jservices-urlf]:
JSERVICES_URLF_CUSTOMER_STATS: DNS_SR_CUSTOMER_STATS, Profile=ATT-Profile-5-Zone5,
Template=ATT-Profile-5-Zone5-Area1, Term=ATT-Profile-5-Zone5-Area1-Customer3,
Requests_Processed=0, DNS_UDP_Requests_Processed=0, DNS_TCP_Requests_Processed=0,
DNS_UDP_Requests_Sinkholed=0, DNS_TCP_Requests_Sinkholed=0,
DNS_UDP_Requests_Reported=0, DNS_TCP_Requests_Reported=0, Time=Fri Mar 08 12:16:05 2019,
Count=111

DNS Filtering Disallow-List File Add/Change Syslog Format

Table 44 on page 420 describes the fields for MX Next Gen Services DNS filtering disallow-list file
additions and updates syslog format.

Table 44: Disallow-List File Add/Change Syslog Format

Field Name Description Example

Time Stamp Time when log entry was Oct 27 10:04:17


generated
421

Table 44: Disallow-List File Add/Change Syslog Format (Continued)

Field Name Description Example

Router Name Host name of the router Jnpr-router-01


generating the record

Log Handle Log handle to identify the log junos-url-filter


category

Match The domain disallow-list file JSERVICES_URLF_FILE_UPDATE_NO


updated for the template. TICE:
DNS_SR_FILE_UPDATE_NOTICE
.

Tag Log-prefix configured Tag=<value>

svc-set-name Service-set name svc-set-name=<value>

File Name Name of the file File_Name=shdb.txt

File Version Version of the file File_Version=20170314_01

Updated File Update Time Domain_Filter_File_Updated=Fri Oct


27 10:56:42 2017

Profile Profile Name Profile=profile_01

[The Web filter profile name as


configured]

Template Template Name Template=template_01

[The DNS filter template name


as configured]

Domains Number of Domains in the file Domains=12


422

Table 44: Disallow-List File Add/Change Syslog Format (Continued)

Field Name Description Example

Report-Only-Domains Number of Report-Only Report_Only_Domains=3


domains in the file

Here’s an example of the syslog format for MX-SPC3 DNS filtering disallow-list add/change file updates:

Feb 25 14:36:47 curve junos-url-filter: JSERVICES_URLF_FILE_UPDATE_NOTICE:


DNS_SR_FILE_UPDATE_NOTICE, Tag=, svc-set-name=s1, File_Name=test_dns_sink.txt,
File_Version=20180911 01, Domain_Filter_File_Updated=Mon Feb 25 14:36:47 2019
Profile=DNS_CUSTOMER-A, Template=DNS_CUSTOMER-A, Domains=18, Report_Only_Domains=0

Here’s an example of the syslog format for DNS filtering disallow-list file changes with the MS-MPC
services card:

Jan 23 13:34:34 cliq (FPC Slot 1, PIC Slot 1) 2018-01-23 21:34:33: {s1}[jservices-urlf]:
JSERVICES_URLF_FILE_UPDATE_NOTICE: DNS_SR_FILE_UPDATE_NOTICE,
File_Name=dnsf1_hashed.txt, File_Version=20170314_01, Domain_Filter_File_Updated=Tue Jan 23
13:34:34 2018 Profile=webf-prof-1, Template=dnsf-temp-1, Domains=4, Report_Only_Domains=1

DNS Filtering Summary Report Statistics Syslog Format

Summary report statistics syslog format Stats will be reported in syslog with the following format:

Here’s an example summary report syslog message for MX-SPC3 Next Gen Services DNS filtering:

Feb 25 11:50:39 curve junos-url-filter: JSERVICES_URLF_REPORT_STATS: DNS_SR_REPORT_STATS,


Tag=, svc-set-name=s1, TCP_DNS_Packets=0, TCP_DNS_Non_Segmented=0, TCP_DNS_Segmented=0,
Count=1

Here’s an example summary report syslog message for MS-MPC services card DNS filtering:

Mar 8 12:20:41 iphone3gs (FPC Slot 5, PIC Slot 1) 2019-03-08 20:20:40: {ATT-Zone1}[jservices-urlf]:
JSERVICES_URLF_REPORT_STATS: DNS_SR_REPORT_STATS, TCP_DNS_Packets=0,
TCP_DNS_Non_Segmented=0, TCP_DNS_Segmented=0, Count=169

DNS Filtering Per-Client-IP Statistics Syslog Format

Table 45 on page 423 describes the syslog fields for MX-SPC3 DNS filtering per-client-IP statistics that
is reported per-PIC, per-profile for all known client IP addresses known to the system.
423

Table 45: Per-Client-IP Statistics Syslog Format

Field Name Description Example

Time Stamp Time when log entry was Oct 27 10:04:17


generated

Router Name Host name of the router Jnpr-router-01


generating the record

Log Handle Log handle to identify the log junos-url-filter


category

Match Log for per-Client IP stats JSERVICES_URLF_CLIENT_IP_ST


ATS: DNS_SR_CLIENT_IP_STATS

Tag Log-prefix configured Tag=<value>

svc-set-name Service-set name svc-set-name=<value>

Client-IP IP address of the client Client-IP=1.1.1.1

Profile Profile Name Profile=profile_01

[The Web filter profile name as


configured]

Template Template Name Template=template_01

[The DNS filter template name as


configured]

Term Term Name Term=term_01

[The DNS filter term name as


configured]
424

Table 45: Per-Client-IP Statistics Syslog Format (Continued)

Field Name Description Example

A_Req DNS A-Record Requests A_Req=10


Processed

AAAA_Req DNS AAAA-Record Requests AAAA_Req=10


Processed

MX_Req DNS MX-Record Requests MX_Req=4


Processed

CNAME_Req DNS CNAME-Record Requests CNAME_Req=4


Processed

SRV_Req DNS SRV-Record Requests SRV_Req=4


Processed

TXT_Req DNS TXT-Record Requests TXT_Req=4


Processed

ANY_Req DNS ANY-Record Requests ANY_Req=4


Processed

A_Req_SH DNS A-Record Requests sink- A_Req_SH =5


holed

AAAA_Req_SH DNS AAAA-Record Requests AAAA_Req_SH=5


sink-holed

MX_Req_SH DNS MX-Record Requests Sink- MX_Req_SH=4


holed
425

Table 45: Per-Client-IP Statistics Syslog Format (Continued)

Field Name Description Example

CNAME_Req_SH DNS CNAME-Record Requests CNAME_Req_SH=4


Sink-holed

SRV_Req_SH DNS SRV-Record Requests Sink- SRV_Req_SH=4


holed

TXT_Req_SH DNS TXT-Record Requests Sink- TXT_Req_SH=4


holed

ANY_Req_SH DNS ANY-Record Requests Sink- ANY_Req_SH=4


holed

Req_Rep DNS Requests reported Req_Rep=5

Here’s an example per-client-IP-statitics for MX-SPC3 DNS filtering:

Feb 25 11:50:39 curve junos-url-filter: JSERVICES_URLF_CLIENT_IP_STATS:


DNS_SR_CLIENT_IP_STATS, Tag=tag, svc-set-name=s1, Client-IP=2.2.2.3, Profile=webf-prof-1,
Template=dnsf-temp-1, Term=dnsf-term-1, A_Req=0, AAAA_Req=0, MX_Req=0, CNAME_Req=0,
SRV_Req=0, TXT_Req=0, ANY_Req=2, A_Req_SH=0, AAAA_Req_SH=0, MX_Req_SH=0,
CNAME_Req_SH=0, SRV_Req_SH=0, TXT_Req_SH=0, ANY_Req_SH=0, Req_Rep=2

Here’s an example syslog message for DNS filtering client-IP statistics on MS-MPC services cards:

Mar 7 17:58:54 iphone3gs (FPC Slot 5, PIC Slot 3) 2019-03-08 01:58:54: {dns}[jservices-urlf]:
JSERVICES_URLF_CLIENT_IP_STATS: DNS_SR_CLIENT_IP_STATS, Client-IP=2004:db0:2228:8001::1,
Profile=dns-profile1, Template=dns1, Term=3, A_Req=19, AAAA_Req=19, MX_Req=0, CNAME_Req=0,
SRV_Req=0, TXT_Req=0, ANY_Req=0, A_Req_SH=19, AAAA_Req_SH=19, MX_Req_SH=0,
CNAME_Req_SH=0, SRV_Req_SH=0, TXT_Req_SH=0, ANY_Req_SH=0, Req_Rep=0
7 PART

URL Filtering

URL Filtering | 427


427

CHAPTER 29

URL Filtering

IN THIS CHAPTER

URL Filtering Overview | 427

Configuring URL Filtering | 431

URL Filtering Overview

IN THIS SECTION

URL Filter Database File | 428

URL Filter Profile Caveats | 429

You can use URL filtering to determine which Web content is not accessible to users.

Components of this feature include the following:

• URL filter database file

• Configuration of one or more templates (up to eight per profile)

• URL Filter Plug-in (jservices-urlf)

• URL filtering daemon (url-filterd)

The URL filter database file is stored on the Routing Engine and contains all the disallowed URLs.
Configured templates define which traffic to monitor, what criteria to match, and which actions to take.
You configure the templates and the location of the URL filter database file in a profile.

Starting in Junos OS Release 17.2R2 and 17.4R1, for Adaptive Services, you can disable the filtering of
HTTP traffic that contains an embedded IP address (for example, http:/10.1.1.1) belonging to a
428

disallowed domain name in the URL filter database.Starting in Junos OS Release 19.3R2, this same
functionaly is supported for Next Gen Services on MX240, MX480, and MX960.

To enable the URL filtering feature, you must configure jservices-urlf as the package-name at the [edit
chassis fpc slot-number pic pic-number adaptive-services service-package extension-provider]
hierarchy level. Once enabled, jservices-urlf maintains the URL filtering profile and receives all traffic to
be filtered, the filtering criteria, and the action to be taken on the filtered traffic.

The URL filtering daemon (url-filterd), which also resides on the Routing Engine, resolves the domain
name of each URL in the URL filter database to a list of IPv4 and IPv6 addresses. It then downloads the
list of IP addresses to the service PIC, which runs jservices-urlf. Then url-filterd interacts with the
Dynamic Firewall process (dfwd) to install filters on the Packet Forwarding Engine to punt the selected
traffic from the Packet Forwarding Engine to the service PIC.

As new HTTP and HTTPS traffic reaches the router, a decision is made based on the information in the
URL filter database file. The filtering rules are checked and either the router accepts the traffic and
passes it on or blocks the traffic. If the traffic is blocked, one of the following configured actions is taken:

• An HTTP redirect is sent to the user.

• A custom page is sent to the user.

• An HTTP status code is sent to the user.

• A TCP reset is sent.

Accept is also an option. In this case, the traffic is not blocked.

For more details on the URL filtering feature, see the following sections:

URL Filter Database File

The URL filter database file contains entries of URLs and IP addresses. Create the URL filter database
file in the format indicated in Table 46 on page 428 and locate it on the Routing Engine in the /var/db/
url-filterd directory.

Table 46: URL Filter Database File Format

Entry Description Example

FQDN Fully qualified domain name. www.badword.com/jjj/bad.jpg

URL Full string URL without the Layer www.yahoo.com/*badword*/


7 protocol.
429

Table 46: URL Filter Database File Format (Continued)

Entry Description Example

IPv4 address HTTP request on a specific IPv4 10.1.1.199


address.

IPv6 address HTTP request on a specific IPv6 1::1


address.

You must specify a custom URL filter database in the profile. If needed, you can also assign a custom
URL filter database file with any template, and that database takes precedence over the database
configured at the profile level.

If you change the contents of the URL filter database file, use the request services (url-filter | web-filter)
update command. Other commands to help maintain the URL filter database file include the following:

• request services (url-filter | web-filter) delete

• request services (url-filter | web-filter) force

• request services (url-filter | web-filter) validate

URL Filter Profile Caveats

The URL filter profile consists of from one to eight templates. Each template consists of a set of
configured logical interfaces where traffic is monitored for URL filtering and one or more terms.

A term is a set of match criteria with actions to be taken if the match criteria is met. You must configure
at least one term to configure URL filtering. Each term consists of a from statement and a then
statement, where the from statement defines the source IP prefixes and destination ports that are
monitored. The then statement specifies the action to be taken. If you omit the from statement, any
source IP prefix and any destination port are considered to match. But you can omit only one from
statement per template or per profile.

Example configuration of multiple terms without from statements

template1 {
client-interfaces [ xe-4/0/3.35 xe-4/0/3.36 ];
server-interfaces xe-4/0/0.31;
dns-source-interface xe-4/0/0.1;
dns-routing-instance data_vr;
430

routing-instance data_vr2;
dns-server 50.0.0.3;
dns-retries 3;
url-filter-database url_database.txt;
term term1 {
then {
tcp-reset;
}
}
term term2 {
then {
redirect-url www.google.com;
}
}
}

If you omit more than one from statement per template, you will get the following error message on
commit:

URLFD_CONFIG_FAILURE: Configuration not valid:


Cannot have two wild card terms in template template1
error: configuration check-out failed

Release History Table

Release Description

19.3R2 Starting in Junos OS Release 19.3R2, this same functionaly is supported for Next Gen Services on
MX240, MX480, and MX960.

17.2R2 Starting in Junos OS Release 17.2R2 and 17.4R1, for Adaptive Services, you can disable the filtering of
HTTP traffic that contains an embedded IP address (for example, http:/10.1.1.1) belonging to a
disallowed domain name in the URL filter database.

RELATED DOCUMENTATION

request services url-filter update url-filter-database file


request services url-filter force dns-resolution
request services url-filter delete gencfg-data
request services url-filter validate
431

Configuring URL Filtering

To configure the URL filtering feature, you must first configure jservices-urlf as the package-name at the
[edit chassis fpc slot-number pic pic-number adaptive-services service-package extension-provider]
hierarchy level. For more information on configuring the extension-provider package package-name
configuration statement, see the package (Loading on PIC) statement.

URL filtering is configured on a service PIC. The interfaces you are dealing with are services interfaces
(which use the ms prefix) or aggregated multiservices (AMS) interfaces (which use the ams prefix). For
more information on AMS interfaces, see the Adaptive Services Interfaces User Guide for Routing
Devices starting with Understanding Aggregated Multiservices Interfaces.

A URL filtering profile is a collection of templates. Each template consists of a set of criteria that defines
which URLs are disallowed and how the recipient is notified.

To configure the URL profile:

1. Assign a name to the URL profile.

[edit]
user@host# edit services (web-filter | url-filter) profile profile-name

Starting in Junos OS Release 18.3R1, for Adaptive Services. configure the profile at the [edit services
web-filter] hierarchy level. Before Junos OS Release 18.3R1, configure the profile at the [edit
services url-filter] hierarchy level.Starting in Junos OS Release 19.3R2, this same functionality is
available for Next Gen Serices on MX240, MX480, and MX960.
2. Specify the name of the URL filter database to use.

[edit services (web-filter | url-filter) profile profile-name]


user@host# set url-filter-database filename

3. Configure one or more templates for the profile.


To configure each template:

a. Name the template.

[edit services (web-filter | url-filter) profile profile-name]


user@host# set (url-filter-template template-name | template template-name)
432

NOTE: Starting in Junos OS Release 18.3R1, configure the template with the url-filter-
template statement. Before Junos OS Release 18.3R1, configure the template with the
template statement.

b. Go to that new template hierarchy level.

[edit services (web-filter | url-filter) profile profile-name]


user@host# edit (url-filter-template template-name | template template-name)

c. Specify the name of the URL filter database to use.

[edit services (web-filter | url-filter) profile profile-name (url-filter-


template template-name | template template-name)]
user@host# set url-filter-database filename

d. Specify the loopback interface for which the source IP address is picked for sending DNS queries.

[edit services (web-filter | url-filter) profile profile-name (url-filter-


template template-name | template template-name)]
user@host# set dns-source-interface loopback-interface-name

e. Disable the filtering of HTTP traffic that contains an embedded IP address (for example, http:/
10.1.1.1) belonging to a disallowed domain name in the URL filter database.

[edit services (web-filter | url-filter) profile profile-name (url-filter-


template template-name | template template-name)]
user@host# set disable-url-filtering

f. Configure the DNS resolution time interval in minutes.

[edit services (web-filter | url-filter) profile profile-name (url-filter-


template template-name | template template-name)]
user@host# set dns-resolution-interval minutes
433

g. Configure the number of retries for a DNS query in case the query fails or times out.

[edit services (web-filter | url-filter) profile profile-name]


user@host# set dns-retries number

h. Specify the IP addresses (IPv4 or IPv6) of DNS servers to which the DNS queries are sent.

[edit services (web-filter | url-filter) profile profile-name (url-filter-


template template-name | template template-name)]
user@host# set dns-server [ip-address]

i. Specify the client-facing logical interfaces on which the URL filtering is configured.

[edit services (web-filter | url-filter) profile profile-name (url-filter-


template template-name | template template-name)]
user@host# set client-interfaces [ client-interface-name ]

j. Specify the server-facing logical interfaces on which the URL filtering is configured.

[edit services (web-filter | url-filter) profile profile-name (url-filter-


template template-name | template template-name)]
user@host# set server-interfaces [ server-interface-name ]

k. Specify the routing instance on which the URL filtering is configured.

[edit services (web-filter | url-filter) profile profile-name (url-filter-


template template-name | template template-name)]
user@host# set routing-instance routing-instance-name

l. Specify the routing instance on which the DNS server is reachable.

[edit services (web-filter | url-filter) profile profile-name (url-filter-


template template-name | template template-name)]
user@host# dns-routing-instance dns-routing-instance-name

4. Configure the term information.


Terms are used in filters to segment the policy or filter into small match and action pairs.
434

a. Name the term.

[edit services (web-filter | url-filter) profile profile-name (url-filter-


template template-name | template template-name)]
user@host# set term term-name

b. Go to the new term hierarchy level.

[edit services (web-filter | url-filter) profile profile-name (url-filter-


template template-name | template template-name)]
user@host# edit term term-name

c. Specify the source IP address prefixes for traffic you want to filter.

[edit services (web-filter | url-filter) profile profile-name (url-filter-


template template-name | template template-name) term term-name]
user@host# set from src-ip-prefix [prefix]

d. Specify the destination ports for traffic you want to filter.

[edit services (web-filter | url-filter) profile profile-name (url-filter-


template template-name | template template-name) term term-name]
user@host# set from dest-port [port]

e. Configure an action to take.

[edit services (web-filter | url-filter) profile profile-name (url-filter-


template template-name | template template-name) term term-name]
user@host# set then action

The action can be one of the following:

custom-page custom-page Send a custom page string to the user.

http-status-code http-status-code Send an HTTP status code to the user.

redirect-url redirect-url Send an HTTP redirect to the user.


435

tcp-reset Send a TCP reset to the user.

5. Associate the URL profile with a next-hop service set.

NOTE: For URL filtering, you must configure the service set as a next-hop service set.

[edit]
user@host# set services service-set service-set-name (web-filter-profile profile-name | url-filter-profile
profile-name)
user@host# set services service-set service-set-name next-hop-service inside-service-interface
interface-name.unit-number
user@host# set services service-set service-set-name next-hop-service outside-service-interface
interface-name.unit-number

NOTE: The service interface can also be of the ams prefix. If you are using ams interfaces at
the [edit services service-set service-set-name] hierarchy level for the URL filter, you must
also configure the load-balancing-options hash-keys statement at the [edit interfaces ams-
interface-name unit number] hierarchy level. .

NOTE: Starting in Junos OS Release 18.3R1, configure the service set with the web-filter-
profile statement. Before Junos OS Release 18.3R1, configure the service set with the url-
filter-profile statement.

Release History Table

Release Description

19.3R2 Starting in Junos OS Release 19.3R2, this same functionality is available for Next Gen Serices on
MX240, MX480, and MX960.

18.3R1 Starting in Junos OS Release 18.3R1, for Adaptive Services. configure the profile at the [edit services
web-filter] hierarchy level. Before Junos OS Release 18.3R1, configure the profile at the [edit services
url-filter] hierarchy level.
436

RELATED DOCUMENTATION

Configuring Service Sets to be Applied to Services Interfaces


8 PART

Integration of Juniper Sky ATP and


Web filtering on MX Routers

Integration of Juniper Sky ATP and Web filtering on MX Routers | 438


438

CHAPTER 30

Integration of Juniper Sky ATP and Web filtering on


MX Routers

IN THIS CHAPTER

Integration of Juniper ATP Cloud and Web filtering on MX Routers | 438

Integration of Juniper ATP Cloud and Web filtering on MX Routers

IN THIS SECTION

Overview | 438

Configuring the Web Filter Profile for Sampling | 443

Overview

IN THIS SECTION

Benefits | 439

Understanding Policy Enforcer and Juniper ATP Cloud | 439

Security Intelligence (SecIntel) - Overview | 440

Web Filtering (URL-Filterd) - Overview | 441

Juniper Sky™ Advanced Threat Prevention (Juniper ATP Cloud) is integrated with MX series routers to
protect all hosts in your network against evolving security threats by employing cloud-based threat
detection software with a next-generation firewall system.
439

This topic provides an overview of Juniper ATP Cloud, Policy Enforcer, Security Intelligence, Web
filtering, and their benefits when integrated on MX Series routers (MX240, MX480 and MX960).

Benefits

• Simplifies deployment and enhances the anti-threat capabilities when integrated with the MX
routers.

• Delivers protection against “zero-day” threats using a combination of tools to provide robust
coverage against sophisticated, evasive threats.

• Checks inbound and outbound traffic with policy enhancements that allow users to stop malware,
quarantine infected systems, prevent data exfiltration, and disrupt lateral movement.

• Supports High Availability to provide uninterrupted service.

• Provides scalability to handle increasing loads that require more computing resources, increased
network bandwidth to receive more customer submissions, and a large storage for malware.

• Provides deep inspection, actionable reporting, and inline malware blocking.

Understanding Policy Enforcer and Juniper ATP Cloud

Juniper Networks Security Director comprises a feature called the Policy Enforcer (PE) that enables it to
learn from threat conditions, automate the policy creation, and to dynamically deploy enforcement to
Juniper devices in the network.

Figure 10 on page 440 illustrates the traffic flow between the PE, the Juniper ATP Cloud, and the MX
router which functions as a firewall.

• Policy Enforcer (PE) learns from threat conditions, automates the policy creation, and deploys
enforcement to Juniper devices in the network.

• Juniper Sky™ Advanced Threat Prevention (Juniper ATP Cloud) protects all hosts in your network by
employing cloud-based threat detection software with a next-generation firewall system.

• MX router fetches the threat intelligence feeds from Policy Enforcer (PE) and implements those
policies to quarantine compromised hosts. It comprises of the following important components:

• Security Intelligence process

• Web Filtering process


440

• Firewall process

Figure 10: System Architecture

To understand the functionality of the system architecture consider the following example—if a user
downloads a file from the Internet and that file passes through an MX firewall, the file can be sent to the
Juniper ATP Cloud cloud for malware inspection (depending on your configuration settings.) If the file is
determined to be malware, PE identifies the IP address and MAC address of the host that downloaded
the file. Based on a user-defined policy, that host can be put into a quarantine VLAN or blocked from
accessing the Internet.

MX Series routers (MX240, MX480, and MX960) can be integrated with the Juniper ATP Cloud to
prevent compromised hosts (botnets) from communicating with command and control servers:

• Starting in Junos OS Release 18.4R1 with the Adaptive Services as an Inline security capability

• Starting in Junos OS Release 19.3R2 with the Next Gen Services as an Inline security capability

Security Intelligence (SecIntel) - Overview

The Security Intelligence process (IPFD), is responsible for downloading the security intelligence feeds
and parsing from the feed connector or ATP Cloud cloud feed server. The IPFD process on the MX
441

platforms fetches the command and control IPv4/IPv6 feeds from Policy Enforcer. C&C feeds are
essentially a list of servers that are known command and control servers for botnets. The list also
includes servers that are known sources for malware downloads. The information thus fetched is saved
in a file (urlf_si_cc_db.txt) created under the /var/db/url-filterd directory.

The file format of the disallowed IPs sent by IPFD to the web filtering process is as follows:

IPv4 address | IPv6 address, threat-level.

The threat-level is an integer ranging from 1 to 10 to indicate the threat level of files scanned for
malware and for infected hosts. Here, 1 represents the lowest threat level and 10 represents the highest
threat level.

For example: 178.10.19.20, 4

Here, 178.10.19.20 indicates the disallowed IP and 4 indicates the threat-level.

The C&C feed database is synced onto the backup Routing Engine. IPFD then shares the information to
the web filtering process (url-filterd). The web filtering process reads the file contents and configures the
filters accordingly.

Configuring Security Intelligence to Download the CC Feed from Policy Enforcer

To download the command and control IPv4/IPv6 feeds from Juniper ATP Cloud/Policy Enforcer,
include the security-intelligence statement at the [edit services] hierarchy as shown in the following
example:

security-intelligence {
authentication {
auth-token 7QGSBL5ZRKR5UHUZ2X2R6QLHB656D5EN;
}
url https://10.92.83.245:443/api/v1/manifest.xml;
traceoptions {
file security-inteligence.log size 1g;
level all;
flag all;
}
}

Web Filtering (URL-Filterd) - Overview

The web filtering process reads the file contents fetched from the IPFD and configures the filters on the
Packet Forwarding Engine accordingly. The web filtering process enforces the command and control
442

feeds by programming the filters in the Packet Forwarding Engine to block the packets destined to the
blocked IP addresses and to generate logs for reporting the incident.

Figure 11 on page 442 illustrates the way C&C feed is fetched by the IPFD and then processed by the
web filtering process.

Figure 11: Web Filtering

The web filter profile can have more than one templates. Each template consists of a set of configured
logical interfaces for Web filtering and one or more terms. A term is a set of match criteria with actions
to be taken if the match criteria is met. To configure the web filter profile to use dynamically fetched
C&C feed, you can configure the security-intelligence-policy command under the [edit services web-
filter profile profile-name hierarchy level. You need not configure a term for a security-intelligence-
policy based web filter profiles.

You can configure the following threat level actions for the web filter profile at the edit web-filter profile
profile-name security-intelligence-policy threat-level threat-level threat-action hierarchy level:

• drop
443

• drop-and-log

• log

You can configure only one threat-action for each threat level. If the threat-action is not configured for
a particular threat level, the default threat-action is accept.

SEE ALSO

security-intelligence-policy | 827
security-intelligence | 824

Configuring the Web Filter Profile for Sampling

IN THIS SECTION

Associate a Sampling Instance with the FPC | 444

Configure a Sampling Instance and Associate the Template With the Sampling Instance. | 445

Configure the sample instance and associate the flow-server IP address and other parameters. | 446

Example: Configuring Web-filter Profile to Define Different Threat-Levels | 447

Starting in Junos OS Release 19.3R1, web filtering process (url-filterd) supports inline sampling of
packets as a threat level action. The packets are dropped, logged, and sampled based on the threat-
action you configure. For scaled scenarios, sampling of packets is preferred over the logging option.
Along with the existing threat level actions, you can configure the following threat level actions on the
web filter profile at the edit web-filter profile profile-name security-intelligence-policy threat-level
threat-level threat-action hierarchy level:

• drop-and-sample

• drop-log-and-sample

• log-and-sample

• sample

The inline flow monitoring samples the packets and sends the flow records in IPFIX format to a flow
collector. You can derive the threat level for the sampled packets received at the external collector by
matching the received IP from the sampled packets with the corresponding IP entry in /var/db/url-
filterd/urlf_si_cc_db.txt. You can configure sampling using any of the following methods:
444

• Associate a sampling instance with the FPC on which the media interface is present at the [edit
chassis] hierarchy level. If you are configuring sampling of IPv4 flows, IPv6 flows, or VPLS flows, you
can configure the flow hash table size for each family.

• Configure the template properties for inline flow monitoring at the [edit services flow-monitoring
hierarchy level.

• Configure a sampling instance and associate the flow-server IP address, port number, flow export
rate, and specify the collectors at the [edit forwarding-options hierarchy level.

Associate a Sampling Instance with the FPC

To associate the defined instance with a particular FPC, MPC, or DPC, you include the sampling-
instance statement at the [edit chassis fpc number] hierarchy level, as shown in the following example:

chassis {
redundancy {
graceful-switchover;
}
fpc 0 {
pic0 {
inline-services {
bandwidth 10g;
}
}
}
pic 2 {
inline-services {
bandwidth 10g;
}
}
pic 3 {
inline-services {
bandwidth 10g;
}
}
sampling-instance 1to1;
inline-services{
flow-table-size {
ipv4-flow-table-size 5;
ipv6flow-table-size 5;
}
445

}
}

Configure a Sampling Instance and Associate the Template With the Sampling Instance.

To configure the template properties for inline flow monitoring, include the following statements at the
edit services flow-monitoring hierarchy level as shown in the following example:

services {
flow-monitoring {
version-ipfix {
template ipv4 {
flow-active-timeout 60;
flow-inactive-timeout 60;
template-refresh-rate {
packets 48000;
seconds 60;
}
option-refresh-rate {
packets 48000;
seconds 60;
}
ipv4-template;
template ipv6 {
flow-active-timeout 60;
flow-inactive-timeout 60;
template-refresh-rate {
packets 48000;
seconds 60;
}
ipv6-template;
}
}
}
446

Configure the sample instance and associate the flow-server IP address and other parameters.

To configure a sampling instance and associate the flow-server IP address and other parameters. include
the following statements at the [edit forwarding-options] hierarchy, as shown in the following example:

forwarding-options {
sampling {
traceoptions {
file ipfix.log size 10k;
}
instance {
1to1 {
input {
rate 1;
}
family inet {
output {
flow-server 192.168.9.194;
port 2055;;
autonomous-system-type origin;
version-ipfix {
template {
ipv4;
}
}
}
inline-jflow {
source-address 192.168.9.195;
}
}
}
family inet6 {
output {
flow-server 192.168.9.194;
port 2000;
autonomous-system-type origin;
version-ipfix {
template {
ipv6;
}
}
}
447

inline-jflow {
source-address 192.168.9.195;
}
}
}
}
}

Example: Configuring Web-filter Profile to Define Different Threat-Levels

web-filter {
profile Profile1 ;
security-intelligence-policy{
file-type txt;
threat-level 7 {
threat-action {
log-and-sample;
}
}
threat-level 8 {
threat-action {
drop-log-and-sample;
}
}
threat-level 10 {
threat-action {
drop-log-and-sample;
}
}
threat-level 5{
threat-action {
drop-log-and-sample;
}
}
threat-level 6 {
threat-action {
drop-log-and-sample;
}
}
threat-level 9{
threat-action {
448

drop-log-and-sample;
}
}
}
url-filter-template template1 {
client-interfaces ge-0/0/4.0;
client-routing-instance inet.0;
}
}
traceoptions {
file webfilter_log size 1g;
level all;
flag all;
}
}
}

SEE ALSO

security-intelligence-policy | 827
Configuring Traffic Sampling on MX, M and T Series Routers

Release History Table


Release Description

19.3R2 Starting in Junos OS Release 19.3R2 with the Next Gen Services as an Inline security capability

19.3R1 Starting in Junos OS Release 19.3R1, web filtering process (url-filterd) supports inline sampling of
packets as a threat level action

18.4R1 Starting in Junos OS Release 18.4R1 with the Adaptive Services as an Inline security capability
9 PART

Aggregated Multiservices Interfaces

Enabling Load Balancing and High Availability Using Multiservices Interfaces |


450
450

CHAPTER 31

Enabling Load Balancing and High Availability Using


Multiservices Interfaces

IN THIS CHAPTER

Understanding Aggregated Multiservices Interfaces for Next Gen Services | 450

Configuring Aggregated Multiservices Interfaces | 456

Configuring Load Balancing on AMS Infrastructure | 459

Configuring Warm Standby for Services Interfaces | 463

Understanding Aggregated Multiservices Interfaces for Next Gen


Services

IN THIS SECTION

Aggregated Multiservices Interface | 450

IPv6 Traffic on AMS Interfaces Overview | 453

Member Failure Options and High Availability Settings | 454

Warm Standby Redundancy | 455

This topic provides an overview of using the Aggregated Multiservices Interfaces feature with the MX-
SPC3 services card for Next Gen Services. It contains the following sections:

Aggregated Multiservices Interface

In Junos OS, you can combine multiple services interfaces to create a bundle of services interfaces that
can function as a single interface. Such a bundle of interfaces is known as an aggregated multiservices
interface (AMS), and is denoted as amsN in the configuration, where N is a unique number that identifies
451

an AMS interface (for example, ams0). Starting in Junos OS Release 19.3R2, AMS interfaces are
supported on the Next Gen Services MX-SPC3 services card.

AMS configuration provides higher scalability, improved performance, and better failover and load-
balancing options.

An AMS configuration enables service sets to support multiple services PICs by associating an AMS
bundle with a service set. For Next Gen Services, the MX-SPC3 services card supports up to two PICs
and you can have a maximum of eight MX-SPC3 services cards in your chassis. This enables a Next Gen
Services AMS bundle to have up to 16 services PICs as member interfaces and you can distribute
services among the member interfaces.

Member interfaces are identified as mams in the configuration. The chassisd process in routers that
support AMS configuration creates a mams entry for every multiservices interface on the router.

When you configure services options at the ams interface level, the options apply to all member
interfaces (mams) for the ams interface.

The options also apply to service sets configured on services interfaces corresponding to the ams
interface’s member interfaces. All settings are per PIC. For example, session-limit applies per member
and not at an aggregate level.

NOTE: You cannot configure services options at both the ams (aggregate) and member-interface
level. If services options are configured on vms-x/y/z, they also apply to service sets on mams-
x/y/z.
When you want services options settings to apply uniformly to all members, configure services
options at the ams interface level. If you need different settings for individual members,
configure services options at the member interface level.

NOTE: Per-member drop of traffic and per-member next-hop configuration is required for
NAT64. For NAPT44, this per-member specification allows arbitrary hash keys, providing better
load-balancing options to allow dynamic NAT operations to be performed. For NAT64, NAPT44,
and dynamic NAT44, it is not possible to determine which member allocates the dynamic NAT
address. To ensure that reverse flow packets arrive at the same member as the forward flow
packets, pool-address-based routes are used to steer reverse flow packets.

NOTE: If you modify a NAT pool that is being used by a service set assigned to an AMS interface,
you must deactivate and activate the service set before the NAT pool changes take effect.
452

Traffic distribution over the member interfaces of an AMS interface can occur in either a round-robin
fashion or hash-based. You can configure the following hash key values to regulate the traffic
distribution: source-ip, destination-ip , and protocol. For services that require traffic symmetry, you
must configure symmetrical hashing. Symmetrical hashing configuration ensures that both forward and
reverse traffic is routed through the same member interface.

If the service set is applied on the Gigabit Ethernet or 10-Gigabit Ethernet interface (interface-style
service set) that functions as the NAT inside interface, then the hash keys used for load balancing might
be configured in such a way that the ingress key is set as destination IP address and the egress key is set
as source IP address. Because the source IP address undergoes NAT processing, it is not available for
hashing the traffic in the reverse direction. Therefore, load balancing does not happen on the same IP
address and forward and reverse traffic does not map to the same PIC. With the hash keys reversed,
load balancing occurs correctly.

With next-hop services, for forward traffic, the ingress key on the inside interface load -balances traffic,
and for reverse traffic, the ingress key on the outside interface load -balances traffic or per-member next
hops steer reverse traffic. With interface-style services, the ingress key load-balances forward traffic and
the egress key load-balances forward traffic or per-member next hops steer reverse traffic. Forward
traffic is traffic entering from the inner side of a service set and reverse traffic is traffic entering from the
outer side of a service set. The forward key is the hash key used for the forward direction of traffic and
the reverse key is the hash key used for the reverse direction of traffic (depends on whether it relates to
interface services or next-hop services style.)

With stateful firewalls, you can configure the following combinations of forward and reverse keys for
load balancing. In the following combinations presented for hash keys, FOR-KEY refers to the forward
key, REV-KEY denotes the reverse key, SIP signifies source IP address, DIP signifies destination IP
address, and PROTO refers to protocol such as IP.

• FOR-KEY: SIP, REV-KEY: DIP

• FOR-KEY: SIP,PROTO REV-KEY: DIP, PROTO

• FOR-KEY: DIP, REV-KEY: SIP

• FOR-KEY: DIP,PROTO REV-KEY: SIP, PROTO

• FOR-KEY: SIP,DIP REV-KEY: SIP, DIP

• FOR-KEY: SIP,DIP,PROTO REV-KEY: SIP, DIP,PROTO

With static NAT configured as basic NAT44 or destination NAT44, and with stateful firewall configured
or not, if the forward direction of traffic must undergo NAT processing, configure the hash keys as
follows:

• FOR-KEY: DIP, REV-KEY: SIP

• FOR-KEY: DIP,PROTO REV-KEY: SIP, PROTO


453

If the reverse direction of traffic must undergo NAT processing, configure the hash keys as follows:

• FOR-KEY: SIP, REV-KEY: DIP

• FOR-KEY: SIP,PROTO REV-KEY: DIP, PROTO

With dynamic NAT configured, and with stateful firewall configured or not, only the forward direction
traffic can undergo NAT. The forward hash key can be any combination of SIP, DIP, and protocol, and the
reverse hash key is ignored.

NOTE: The Junos OS AMS configuration supports IPv4 and IPv6 traffic.

IPv6 Traffic on AMS Interfaces Overview

You can use AMS interfaces for IPv6 traffic. To configure IPv6 support for an AMS interface, include the
family inet6 statement at the [edit interfaces ams-interface-name unit 1] hierarchy level. When family
inet and family inet6 are set for an AMS interface subunit, the hash-keys is configured at service-set
level for interface style and at IFL level for next-hop style.

When a member interface of an AMS bundle fails, traffic destined to the failed member is redistributed
among the remaining active members. The traffic (flows or sessions) traversing through the existing
active members is unaffected. If M members are currently active, the expected result is that only about
1/M fraction of the traffic (flows/sessions) is impacted because that amount of traffic is shifted from the
failed member to remain active members. When the failed member interface comes back online, only a
fraction of the traffic is redistributed to the new member. If N members are currently active, the
expected result is that only about 1/(N+1) fraction of the traffic (flows/sessions) is impacted because
that amount of traffic moves to the new restored member. The 1/M and 1/(N+1) values assume that the
flows are uniformly distributed among members, because a packet-hash is used to load-balance and
because traffic usually contains a typical random combination of IP addresses (or any other fields that
are used as load-balancing keys).

Similar to IPv4 traffic, for IPv6 packets, an AMS bundle must contain members of only one services PIC
type.

The number of flows distributed, in an ideal environment, can be 1/N in a best-case scenario when the
Nth member goes up or down. However, this assumption considers that the hash keys load-balance the
real or dynamic traffic. For example, consider a real-world deployment where member A is serving only
one flow, whereas member B is serving 10 flows. If member B goes down, then the number of flows
disrupted is 10/11. The NAT pool-split behavior is designed to utilize the benefits of the rehash-
minimization feature. The splitting of a NAT pool is performed for dynamic NAT scenarios (dynamic
NAT, NAT64, and NAPT44).

If the original and redistributed flows are defined as follows:


454

• Member-original-flows—The traffic mapped to a member when all members are up.

• Member-redistributed-flows—The additional traffic mapped to a member when some other member


fails. These traffic flows might need to be rebalanced when member interfaces come up and go
down.

With the preceding definitions of the original and redistributed flows for member interfaces, the
following observations apply:

• The member-original-flows of a member stay intact as long as that member is up. Such flows are not
impacted when other members move between the up and down states.

• The member-redistributed-flows of a member can change when other members go up or down. This
change of flows occurs because these additional flows need to be rebalanced among all active
members. Therefore, the member-redistributed-flow can vary a lot based on other members going
down or up. Although it might seem that when a member goes down, the flows on active-members
are preserved, and that when a member goes up, flows on active-members are not preserved in an
effective way, this behavior is only because of static or hash-based rebalancing of traffic among
active members.

The rehash-minimization feature handles the operational changes in a member interface status only
(such as member offline or member Junos OS reset). It does not handle changes in configuration. For
example, addition or deletion, or activation and deactivation, of member interfaces at the [edit
interfaces amsN load-balancing-options member-interface mams-a/b/0] hierarchy level requires the
member PICs to be bounced. Twice NAT or hairpinning is not supported, similar to IPv4 support for
AMS interfaces.

Member Failure Options and High Availability Settings

Because multiple service interfaces are configured as part of an AMS bundle, AMS configuration also
provides for failover and high availability support. You can either configure one of the member interfaces
as a backup interface that becomes active when any one of the other member interfaces goes down, or
configure the AMS in such a way that when one of the member interfaces goes down, the traffic
assigned to that interface is shared across the active interfaces.

The member-failure-options configuration statement enables you to configure how to handle traffic
when a member interface fails. One option is to redistribute the traffic immediately among the other
member interfaces. However, redistribution of traffic involves recalculating the hash tags, and might
cause some disruption in traffic on all the member interfaces.

The other option is to configure the AMS to drop all traffic that is assigned to the failed member
interface. With this you can optionally configure an interval, rejoin-timeout, for the AMS to wait for the
failed interface to come back online after which the AMS can redistribute the traffic among other
member interfaces. If the failed member interface comes back online before the configured wait time,
455

traffic continues unaffected on all member interfaces, including the interface that has come back online
and resumed the operations.

You can also control the rejoining of the failed interface when it comes back online. If you do not include
the enable-rejoin statement in the member-failure-options configuration, the failed interface cannot
rejoin the AMS when it comes back online. In such cases, you can manually rejoin that to the AMS by
executing the request interfaces revert interface-name operational mode command.

The rejoin-timeout and enable-rejoin statements enable you to minimize traffic disruptions when
member interfaces flap.

NOTE: When member-failure-options are not configured, the default behavior is to drop
member traffic with a rejoin timeout of 120 seconds.

The high-availability-options configuration enables you to designate one of the member interfaces as a
backup interface. The backup interface does not participate in routing operations as long as it remains a
backup interface. When a member interface fails, the backup interface handles the traffic assigned to
the failed interface. When the failed interface comes back online, it becomes the new backup interface.

In a many-to-one configuration (N:1), a single backup interface supports all other member interfaces in
the group. If any of the member interfaces fails, the backup interface takes over. In this stateless
configuration, data is not synchronized between the backup interface and the other member interfaces.

When both member-failure-options and high-availability-options are configured for an AMS, the high-
availability-options configuration takes precedence over the member-failure-options configuration. If a
second failure occurs before the failed interface comes back online to be the new backup, the member-
failure-options configuration takes effect.

Warm Standby Redundancy

Starting in Junos OS Release 19.3R2, the N:1 warm standby option is supported on the MX-SPC3 if you
are running Next Gen Services. Each warm standby AMS interface contains two members; one member
is the service interface you want to protect, called the primary interface, and one member is the
secondary (backup) interface. The primary interface is the active interface and the backup interface does
not handle any traffic unless the primary interface fails.

To configure warm standby on an AMS interface, you use the redundancy-options statement. You
cannot use the load-balancing-options statement in a warm standby AMS interface.

To switch from the primary interface to the secondary interface, issue the request interface switchover
amsN command.

To revert to the primary interface from the secondary interface, issue the request interface revert amsN
command.
456

Release History Table

Release Description

19.3R2 Starting in Junos OS Release 19.3R2, AMS interfaces are supported on the Next Gen Services MX-SPC3
services card.

19.3R2 Starting in Junos OS Release 19.3R2, the N:1 warm standby option is supported on the MX-SPC3 if you
are running Next Gen Services.

Configuring Aggregated Multiservices Interfaces

The aggregated multiservices (AMS) interface configuration in Junos OS enables you to combine
services interfaces from multiple PICs to create a bundle of interfaces that can function as a single
interface. You identify the PIC that you want to act as the backup.

1. Create an aggregated multiservices interface and add member interfaces. Starting in Junos OS
Release 19.3R2, an MX-SPC3 Next Gen Services AMS interface can have up to 16 member
interfaces with a maximum of 8 MX-SPC3 services cards with up to 2 PICs on each card. Starting
with Junos OS Release 16.2, an MS-MPC AMS interface can have up to 36 member interfaces. In
Junos OS Release 16.1 and earlier, an AMS interface can have a maximum of 24 member interfaces.

NOTE: The member interface format is mams-a/b/0, where a is the Flexible PIC Concentrator
(FPC) slot number and b is the PIC slot number.

[edit interfaces]
user@host# set interface-name load-balancing-options member-interface mams-a/b/0
user@host# set interface-name load-balancing-options member-interface mams-a/b/0

For example on an MS-MPC, which can have up to four PICs:

[edit interfaces]
user@host# set ams1 load-balancing-options member-interface mams-1/1/0
user@host# set ams1 load-balancing-options member-interface mams-1/2/0
457

For example on an MX-SPC3, which can have up to two PICs:

[edit interfaces]
user@host# set ams1 load-balancing-options member-interface mams-1/0/0
user@host# set ams1 load-balancing-options member-interface mams-1/1/0

2. Configure logical units for the AMS interface.

[edit interfaces]
user@host# set interface-name unit logical-unit-number family family
user@host# set interface-name unit logical-unit-number family family

For example:

[edit interfaces]
user@host# set ams1 unit 1 family inet
user@host# set ams1 unit 2 family inet6

3. Configure member failure options.

[edit interfaces interface-name]


user@host# set load-balancing-options member-failure-options drop-member-traffic rejoin-timeout
seconds
user@host# set load-balancing-options member-failure-options drop-member-traffic enable-rejoin

For example:

[edit interfaces ams1]


user@host# set load-balancing-options member-failure-options drop-member-traffic rejoin-timeout
1000
user@host# set load-balancing-options member-failure-options drop-member-traffic enable-rejoin

4. Configure the preferred backup.

[edit interfaces interface-name]


user@host# set load-balancing-options high-availability-options many-to-one preferred-backup
preferred-backup
458

For example:

[edit interfaces ams1]


user@host# set load-balancing-options high-availability-options many-to-one preferred-backup
mams-1/2/0

5.

NOTE: This step is not applicable to the Next Gen Services MX-SPC3 services card in the
MX240, MX480 or MX960 chassis.

If the AMS interface has more than 24 member interfaces, set the service PIC boot timeout value to
240 or 300 seconds for every services PIC on the MX Series router. We recommend that you use a
value of 240.

NOTE: Starting with Junos OS Release 16.2, an AMS interface can have up to 36 member
interfaces. In Junos OS Release 16.1 and earlier, an AMS interface could have a maximum of
24 member interfaces.

[edit interfaces interface-name multiservice-options]


user@host# set pic-boot-timeout (240 | 300);

For example:

[edit interfaces sp-1/1/0 multiservice-options]


user@host# set pic-boot-timeout 240

Release History Table

Release Description

19.3R2 Starting in Junos OS Release 19.3R2, an MX-SPC3 Next Gen Services AMS interface can have up to 16
member interfaces with a maximum of 8 MX-SPC3 services cards with up to 2 PICs on each card.

16.2 Starting with Junos OS Release 16.2, an MS-MPC AMS interface can have up to 36 member interfaces.
459

RELATED DOCUMENTATION

Understanding Aggregated Multiservices Interfaces for Next Gen Services

Configuring Load Balancing on AMS Infrastructure

IN THIS SECTION

Configuring AMS Infrastructure | 459

Configuring High Availability | 461

Load Balancing Network Address Translation Flows | 462

Configuring load balancing requires an aggregated multiservices (AMS) system. AMS involves grouping
several services PICs together. An AMS configuration eliminates the need for separate routers within a
system. The primary benefit of having an AMS configuration is the ability to support load balancing of
traffic across multiple services PICs.

AMS is supported on the MS-MPC and MS-MIC. Starting in Junos OS Release 19.3R2, AMS interfaces
are also supported on the MX-SPC3 if you are running Next Gen Services.

High availability (HA) is supported on AMS infrastructure on all MX Series 5G Universal Routing
Platforms. AMS has several benefits:

• Support for configuring behavior if a services PIC that is part of the AMS configuration fails

• Support for specifying hash keys for each service set in either direction

• Support for adding routes to individual PICs within the AMS system

Configuring AMS Infrastructure

AMS supports load balancing across multiple service sets. All ingress or egress traffic for a service set
can be load balanced across different services PICs. To enable load balancing, you have to configure an
aggregate interface with existing services interfaces.

To configure failure behavior in AMS, include the member-failure-options statement:

[edit interfaces ams1]


load-balancing-options {
460

member-failure-options {
drop-member-traffic {
rejoin-timeout rejoin-timeout;
}
redistribute-all-traffic {
enable-rejoin;
}
}
}

If a PIC fails, you can configure the traffic to the failed PIC to be redistributed by using the redistribute-
all-traffic statement at the [edit interfaces interface-name load-balancing-options member-failure-
options] hierarchy level. If the drop-member-traffic statement is used, all traffic to the failed PIC is
dropped. Both options are mutually exclusive.

NOTE: If member-failure-options is not explicitly configured, the default behavior is to drop


member traffic with a rejoin timeout of 120 seconds.

Only mams- interfaces (services interfaces that are part of AMS) can be aggregated. After an AMS
interface has been configured, you cannot configure the individual constituent mams- interfaces. A
mams- interface cannot be used as an ams interface (this is not applicable to Next Gen Services MX-
SPC3). AMS supports IPv4 (family inet) and IPv6 (family inet6). You cannot configure addresses on an
AMS interface. Network Address Translation (NAT) is the only application that runs on AMS
infrastructure at this time.

NOTE: You cannot configure unit 0 on an AMS interface.

To support multiple applications and different types of translation, AMS infrastructure supports
configuring hashing for each service set. You can configure the hash keys separately for ingress and
egress. The default configuration uses source IP, destination IP, and the protocol for hashing; incoming-
interface for ingress and outgoing-interface for egress are also available.

NOTE: When using AMS in a load-balanced setup for the NAT solution, the number of NAT IP
addresses must be greater than or equal to the number of active mams-interfaces you have
added to the AMS bundle.
461

Configuring High Availability

In an AMS system configured with high availability, a designated services PIC acts as a backup for other
active PICs that are part of the AMS system in a many-to-one (N:1) backup configuration. In a N:1
backup configuration, one PIC is available as backup for all other active PICs. If any of the active PICs
fail, the backup PIC takes over for the failed PIC. In an N:1 (stateless) backup configuration, traffic states
and data structures are not synchronized between the active PICs and the backup PIC.

An AMS system also supports a one-to-one (1:1) configuration. In the case of 1:1 backup, a backup
interface is paired with a single active interface. If the active interface fails, the backup interface takes
over. In a 1:1 (stateful) configuration, traffic states and data structures are synchronized between the
active PICs and the backup PIC. Stateful synchronization is required for high availability of IPsec
connections. For IPsec connections, AMS supports 1:1 configuration only.

NOTE: IPsec connections are not supported on the MX-SPC3 in this release.

High availability for load balancing is configured by adding the high-availability-options statement at the
[edit interfaces interface-name load-balancing-options] hierarchy level.

To configure N:1 high availability, include the high-availability-options statement with the many-to-one
option:

[edit interfaces ams1]


load-balancing-options {
high-availability-options {
many-to-one {
preferred-backup preferred-backup;
}
}
}

Starting in Junos OS Release 16.1, you can configure stateful 1:1 high availability on an MS-MPC. To
configure stateful 1:1 high availability, at the [edit interfaces interface-name load-balancing-options]
hierarchy level, include the high-availability-options statement with the one-to-one option:
462

NOTE: The Next Gen Services MX-SPC3 services card does not support AMS 1:1 high
availability.

[edit interfaces ams1]


load-balancing-options {
high-availability-options {
one-to-one {
preferred-backup preferred-backup;
}
}
}

Load Balancing Network Address Translation Flows

Network Address Translation (NAT) has been programmed as a plug-in and is a function of load
balancing and high availability. The plug-in runs on AMS infrastructure. All flows for translation are
automatically distributed to different services PICs that are part of the AMS infrastructure. In case of
failure of an active services PIC, the configured backup PIC takes over the NAT pool resources of the
failed PIC. The hashing method selected depends on the type of NAT. Using NAT on AMS infrastructure
has a few limitations:

• NAT flows to failed PICs cannot be restored.

• There is no support for IPv6 flows.

IPv6 address pools are not supported with AMS, however NAT64 is supported with AMS, so that
IPv6 flows enters AMS.

NAT64 is supported for Next Gen Services on the MX-SPC3 services card, there is no support of
NAT66. IPv6 flows for different NAT services are supported except where the translation is required
to be IPv6 to IPv6 or IPv4 to IPv6.

• Twice NAT is not supported for load balancing on MS-MPC cards.

Twice NAT is supported for load balancing on the Next Gen Services MX-SPC3 services card.

• Deterministic NAT uses warm-standby AMS configuration and can distribute the load using multiple
AMS bundles in warm-standby mode.
463

Release History Table

Release Description

19.3R2 Starting in Junos OS Release 19.3R2, AMS interfaces are also supported on the MX-SPC3 if you are
running Next Gen Services.

16.1 Starting in Junos OS Release 16.1, you can configure stateful 1:1 high availability on an MS-MPC.

Configuring Warm Standby for Services Interfaces

You can configure an N:1 warm standby option for MS-MPCs, MS-MICs, and MX-SPC3s by creating
multiple aggregated multiservices (AMS) interfaces, each of which contains the service interface you
want to backup and the service interface that acts as the backup. The same backup service interface can
be used in all these AMS interfaces. Starting in Junos OS Release 19.3R2, the N:1 warm standby option
is also supported on the MX-SPC3 if you are running Next Gen Services.

To configure warm standby for services interfaces:

1. Create an AMS interface.

[edit interfaces]
user@host# set amsN

The variable N is a unique number, such as 0 or 1.


2. Specify the primary service interface that you want to backup.

[edit interfaces amsN]


user@host# set redundancy-options primary mams-a/b/0

The variable a is the FPC slot number and b is the PIC slot number for the primary service interface.
3. Specify the secondary service interface, which backs up the primary interface.

[edit interfaces amsN]


user@host# set redundancy-options secondary mams-a/b/0

The variable a is the FPC slot number and b is the PIC slot number for the secondary service
interface.
464

4. Repeat Steps "1" on page 463 through "3" on page 463 to create an AMS interface for each service
interface that you want to backup. You can use the same secondary service interface in each AMS
interface.

Release History Table

Release Description

19.3R2 Starting in Junos OS Release 19.3R2, the N:1 warm standby option is also supported on the MX-SPC3 if
you are running Next Gen Services.

RELATED DOCUMENTATION

Understanding Aggregated Multiservices Interfaces


10 PART

Inter-Chassis Services PIC High


Availability

Inter-Chassis Services PIC High Availability Overview and Configuration | 466


466

CHAPTER 32

Inter-Chassis Services PIC High Availability


Overview and Configuration

IN THIS CHAPTER

Next Gen Services Inter-chassis High Availability Overview for NAT, Stateful Firewall, and IDS Flows | 466

Inter-Chassis Stateful Synchronization for Long Lived NAT, Stateful Firewall, and IDS Flows for Next Gen
Services | 480

Inter-Chassis Services Redundancy Overview for Next Gen Services | 489

Configuring Inter-Chassis Services Redundancy for Next Gen Services | 492

Next Gen Services Inter-chassis High Availability Overview for NAT,


Stateful Firewall, and IDS Flows

IN THIS SECTION

Inter-chassis High Availability Overview for NAT, Stateful Firewall, and IDS Flows for Next Gen
Services | 467

Example: Next Gen Services Inter-Chassis Stateful High Availability for NAT and Stateful Firewall (MX-
SPC3) | 467
467

Inter-chassis High Availability Overview for NAT, Stateful Firewall, and IDS Flows for
Next Gen Services

IN THIS SECTION

Benefits | 467

Carrier-grade NAT, stateful firewall, and IDS flows can be configured with a dual-chassis, redundant data
path. Although intra-chassis high availability can be used in an MX Series device by employing the AMS
interfaces, this method only deals locally with services PIC failures. If for any reason traffic is switched to
a backup router due to some other failure in the router, the session state from the services PIC is lost
unless you configure synchronization of the services session states with a services PIC on the backup
router.

Inter-chassis high availability provides this synchronization, and controls switchovers between the
services PICs in the redundancy pair. Inter-chassis high availability is a primary-secondary model, not an
active-active cluster. Only one services PIC in a redundancy pair, the current primary, receives traffic to
be serviced.

To configure interchassis high availability for NAT, stateful firewall, and IDS, you configure:

1. Stateful synchronization, which replicates the session state from the primary services PICs on the
primary to the backup services PIC on the other chassis.

2. Inter-chassis services redundancy, which controls primary role switchovers in the services PIC
redundancy pair, based on monitored events. Most operators would not want to employ stateful
synchronization without also implementing services redundancy.

Benefits

Interchassis high availability provides automatic switchovers from a services PIC on one chassis to a
services PIC on another chassis, while providing uninterrupted services for customer traffic.

Example: Next Gen Services Inter-Chassis Stateful High Availability for NAT and
Stateful Firewall (MX-SPC3)

IN THIS SECTION

Requirements | 468
468

Overview | 468

Configuration | 468

This example shows how to configure Next Gen Services inter-chassis high availability for stateful
firewall and NAT services.

Requirements

This example uses the following hardware and software components:

• Two MX480 routers with MX-SPC3 services cards

• Junos OS Release 19.3R2, 19.4R1 or later

Overview

Two MX 3D routers are identically configured to facilitate stateful failover for firewall and NAT services
in case of a chassis failure.

Configuration

IN THIS SECTION

CLI Quick Configuration | 469

Configuring Interfaces for Chassis 1. | 471

Configure Routing Information for Chassis 1 | 473

Configuring NAT and Stateful Firewall for Chassis 1 | 474

Configuring the Service Set | 476

Configuring Interfaces for Chassis 2 | 477

Configure Routing Information for Chassis 2 | 479

To configure inter-chassis high availability for this example, perform these tasks:
469

CLI Quick Configuration

To quickly configure this example on the routers, copy the following commands and paste them into the
router terminal window after removing line breaks and substituting interface information specific to
your site.

NOTE: The following configuration is for chassis 1.

[edit]
set interfaces vms-4/0/0 redundancy-options redundancy-peer ipaddress 5.5.5.2
set interfaces vms-4/0/0 redundancy-options routing-instance HA
set interfaces vms-4/0/0 unit 10 ip-address-owner service-plane
set interfaces vms-4/0/0 unit 10 family inet address 5.5.5.1/32
set interfaces vms-4/0/0 unit 20 family inet
set interfaces vms-4/0/0 unit 20 service-domain inside
set interfaces vms-4/0/0 unit 30 family inet
set interfaces vms-4/0/0 unit 30 service-domain outside
set interfaces ge-2/0/0 vlan-tagging
set interfaces ge-2/0/0 unit 0 vlan-id 100 family inet address 20.1.1.1/24
set routing-instances HA instance-type vrf
set routing-instances HA interface ge-2/0/0.0
set routing-instances HA interface vms-4/0/0.10
set routing-instances HA route-distinguisher 1:1
set policy-options policy-statement dummy term 1 then reject
set routing-instances HA vrf-import dummy
set routing-instances HA vrf-export dummy
set routing-instances HA routing-options static route route 5.5.5.1/32 next-hop vms-4/0/0.10
set routing-instances HA routing-options static route route 5.5.5.2/32 next-hop 20.1.1.2
set services nat pool p2 address 32.0.0.0/24
set services nat pool p2 port automatic random-allocation
set services nat pool p2 address-allocation round-robin
set services nat rule r2 match-direction input
set services nat rule r2 term t1 from source-address 129.0.0.0/8
set services nat rule r2 term t1 from source-address 128.0.0.0/8
set services nat rule r2 term t1 then translated source-pool p2
set services nat rule r2 term t1 then translated translation-type napt-44
set services nat rule r2 term t1 then translated address-pooling paired
set services nat rule r2 term t1 then syslog
set services stateful-firewall rule r2 match-direction input
470

set services stateful-firewall rule r2 term t1 from source-address any-unicast


set services stateful-firewall rule r2 term t1 then accept
set services stateful-firewall rule r2 term t1 then syslog
set services service-set ss2 replicate-services replication-threshold 180
set services service-set ss2 replicate-services stateful-firewall
set services service-set ss2 replicate-services nat
set services service-set ss2 stateful-firewall-rules r2
set services service-set ss2 nat-rules r2
set services service-set ss2 next-hop-service inside-service-interface vms-4/0/0.20
set services service-set ss2 next-hop-service outside-service-interface vms-4/0/0.30
set services service-set ss2 syslog host local class session-logs
set services service-set ss2 syslog host local class stateful-firewall-logs
set services service-set ss2 syslog host local class nat-logs

NOTE: The following configuration is for chassis 2. The NAT, stateful firewall, and service-set
information must be identical for chassis 1 and 2.

set interfaces vms-4/0/0 redundancy-options routing-instance HA


set interfaces vms-4/0/0 unit 10 ip-address-owner service-plane
set interfaces vms-4/0/0 unit 10 family inet address 5.5.5.2/32
set interfaces vms-4/0/0 unit 20 family inet
set interfaces vms-4/0/0 unit 20 service-domain inside
set interfaces vms-4/0/0 unit 30 family inet
set interfaces vms-4/0/0 unit 30 service-domain outside
set interfaces ge-2/0/0 vlan-tagging
set interfaces ge-2/0/0 unit 0 vlan-id 100 family inet address 20.1.1.2/24
set routing-instances HA instance-type vrf
set routing-instances HA interface ge-2/0/0.0
set routing-instances HA interface vms-4/0/0.10
set routing-instances HA route-distinguisher 1:1
set routing-instances HA vrf-import dummy
set routing-instances HA vrf-export dummy
set routing-instances HA routing-options static route 5.5.5.2/32 next-hop vms-4/0/0.10
set routing-instances HA routing-options static route 5.5.5.1/32 next-hop 20.1.1.1
set services nat pool p2 address 32.0.0.0/24
set services nat pool p2 port automatic random-allocation
set services nat pool p2 address-allocation round-robin
set services nat rule r2 match-direction input
471

set services nat rule r2 term t1 from source-address 129.0.0.0/8


set services nat rule r2 term t1 from source-address 128.0.0.0/8
set services nat rule r2 term t1 then translated source-pool p2
set services nat rule r2 term t1 then translated translation-type napt-44
set services nat rule r2 term t1 then translated address-pooling paired
set services nat rule r2 term t1 then syslog
set services stateful-firewall rule r2 match-direction input
set services stateful-firewall rule r2 term t1 from source-address any-unicast
set services stateful-firewall rule r2 term t1 then accept
set services stateful-firewall rule r2 term t1 then syslog
set services service-set ss2 replicate-services replication-threshold 180
set services service-set ss2 replicate-services stateful-firewall
set services service-set ss2 replicate-services nat
set services service-set ss2 stateful-firewall-rules r2
set services service-set ss2 nat-rules r2
set services service-set ss2 next-hop-service inside-service-interface vms-4/0/0.20
set services service-set ss2 next-hop-service outside-service-interface vms-4/0/0.30
set services service-set ss2 syslog host local class session-logs
set services service-set ss2 syslog host local class stateful-firewall-logs
set services service-set ss2 syslog host local class nat-logs

Configuring Interfaces for Chassis 1.

Step-by-Step Procedure

The interfaces for each of the HA pair of routers are configured identically with the exception of the
following service PIC options:

• redundancy-options redundancy-peer ipaddress address

• unit unit-number family inet address address of a unit, other than 0, that contains the ip-address-
owner service-plane option

To configure interfaces:

1. Configure the redundant service PIC on chassis 1.

[edit interfaces}
user@host# set interfaces vms-4/0/0 redundancy-options redundancy-peer ipaddress 5.5.5.2
user@host# set interfaces vms-4/0/0 redundancy-options routing-instance HA
user@host# set interfaces vms-4/0/0 unit 10 ip-address-owner service-plane
472

user@host# set interfaces vms-4/0/0 unit 10 family inet address 5.5.5.1/32


user@host# set interfaces vms-4/0/0 unit 20 family inet
user@host# set interfaces vms-4/0/0 unit 20 service-domain inside
user@host# set interfaces vms-4/0/0 unit 30 family inet
user@host# set interfaces vms-4/0/0 unit 30 service-domain outside

2. Configure the interfaces for chassis 1 that are used as interchassis links for synchronization traffic.

user@host# set interfaces ge-2/0/0 vlan-tagging


user@host# set interfaces ge-2/0/0 unit 0 vlan-id 100 family inet address 20.1.1.1/24

3. Configure remaining interfaces as needed.

Results

user@host# show interfaces


ge-2/0/0 {
vlan-tagging;
unit 0 {
vlan-id 100;
family inet {
address 20.1.1.1/24;
}
}
}
vms-4/0/0 {
redundancy-options {
redundancy-peer {
ipaddress 5.5.5.2;
}
routing-instance HA;
}
unit 10 {
ip-address-owner service-plane;
family inet {
address 5.5.5.1/32;
}
}
unit 20 {
family inet;
473

family inet6;
service-domain inside;
}
unit 30 {
family inet;
family inet6;
service-domain outside;
}
}
}

Configure Routing Information for Chassis 1

Step-by-Step Procedure

Detailed routing configuration is not included for this example. A routing instance is required for the HA
synchronization traffic between the chassis as follows:

• Configure routing instances for Chassis 1.

user@host# set routing-instances HA instance-type vrf


user@host# set routing-instances HA interface ge-2/0/0.0
user@host# set routing-instances HA interface vms-4/0/0.10
user@host# set routing-instances HA route-distinguisher 1:1
user@host# set policy-options policy-statement dummy term 1 then reject
user@host# set routing-instances HA vrf-import dummy
user@host# set routing-instances HA vrf-export dummy
user@host# set routing-instances HA routing-options static route route 5.5.5.1/32 next-hop
vms-4/0/0.10
user@host# set routing-instances HA routing-options static route route 5.5.5.2/32 next-hop 20.1.1.2

Results

user@host# show routing-instances


HA {
instance-type vrf;
interface ge-2/0/0.0;
interface vms-4/0/0.10;
route-distinguisher 1:1;
474

vrf-import dummy;
vrf-export dummy;
routing-options {
static {
route 5.5.5.1/32 next-hop vms-4/0/0.10;
route 5.5.5.2/32 next-hop 20.1.1.2;
}
}
}

Configuring NAT and Stateful Firewall for Chassis 1

Step-by-Step Procedure

Configure NAT and stateful firewall identically on both routers. To configure NAT and stateful firewall:

1. Configure NAT as needed.

user@host# set services nat pool p2 address 32.0.0.0/24


user@host# set services nat pool p2 port automatic random-allocation
user@host# set services nat pool p2 address-allocation round-robin
user@host# set services nat rule r2 match-direction input
user@host# set services nat rule r2 term t1 from source-address 129.0.0.0/8
user@host# set services nat rule r2 term t1 from source-address 128.0.0.0/8
user@host# set services nat rule r2 term t1 then translated source-pool p2
user@host# set services nat rule r2 term t1 then translated translation-type napt-44
user@host# set services nat rule r2 term t1 then translated address-pooling paired
user@host# set services nat rule r2 term t1 then syslog

2. Configure stateful firewall as needed.

user@host# set services stateful-firewall rule r2 match-direction input


user@host# set services stateful-firewall rule r2 term t1 from source-address any-unicast
user@host# set services stateful-firewall rule r2 term t1 then accept
user@host# set services stateful-firewall rule r2 term t1 then syslog
475

Results

user@host# show services nat


nat {
pool p2 {
address 32.0.0.0/24;
port {
automatic {
random-allocation;
}
}
address-allocation round-robin;
}
rule r2 {
match-direction input;
term t1 {
from {
source-address {
129.0.0.0/8;
128.0.0.0/8;
}
}
then {
translated {
source-pool p2;
translation-type {
napt-44;
}
address-pooling paired;
}
syslog;
}
}
}
}
}

user@host show services stateful-firewell


rule r2 {
match-direction input;
476

term t1 {
from {
source-address {
any-unicast;
}
}
then {
accept;
syslog;
}
}
}

Configuring the Service Set

Step-by-Step Procedure

Configure the the service set identically on both routers. To configure the service set:

1. Configure the service set replication options.

user@host# set services service-set ss2 replicate-services replication-threshold 180


user@host# set services service-set ss2 replicate-services stateful-firewall
user@host# set services service-set ss2 replicate-services nat

2. Configure references to NAT and stateful firewall rules for the service set.

user@host# set services service-set ss2 stateful-firewall-rules r2


user@host# set services service-set ss2 nat-rules r2

3. Configure next-hop service interface on the vms-PIC.

user@host# set services service-set ss2 next-hop-service inside-service-interface vms-4/0/0.20


user@host# set services service-set ss2 next-hop-service outside-service-interface vms-4/0/0.30
477

4. Configure desired logging options.

user@host# set services service-set ss2 syslog host local class session-logs
user@host# set services service-set ss2 syslog host local class stateful-firewall-logs
user@host# set services service-set ss2 syslog host local class nat-logs

Results

user@host# show services service-set ss2


syslog {
host local {
class {
session-logs;
inactive: stateful-firewall-logs;
nat-logs;
}
}
}
replicate-services {
replication-threshold 180;
stateful-firewall;
nat;
}
stateful-firewall-rules r2;
inactive: nat-rules r2;
next-hop-service {
inside-service-interface vms-3/0/0.20;
outside-service-interface vms-3/0/0.30;
}
}

Configuring Interfaces for Chassis 2

Step-by-Step Procedure

The interfaces for each of the HA pair of routers are configured identically with the exception of the
following service PIC options:

• redundancy-options redundancy-peer ipaddress address


478

• unit unit-number family inet address address of a unit, other than 0, that contains the ip-address-
owner service-plane option

1. Configure the redundant service PIC on chassis 2.

The redundancy-peer ipaddress points to the address of the unit (unit 10) on vms-4/0/0 on chassis
on chassis 1 that contains the ip-address-owner service-plane statement.

[edit interfaces}
set interfaces vms-4/0/0 redundancy-options redundancy-peer ipaddress 5.5.5.1
user@host# set interfaces vms-4/0/0 redundancy-options routing-instance HA
user@host# set interfaces vms-4/0/0 unit 10 ip-address-owner service-plane
user@host# set interfaces vms-4/0/0 unit 10 family inet address 5.5.5.2/32
user@host# set interfaces vms-4/0/0 unit 20 family inet
user@host# set interfaces vms-4/0/0 unit 20 service-domain inside
user@host# set interfaces vms-4/0/0 unit 30 family inet
user@host# set interfaces vms-4/0/0 unit 30 service-domain outside

2. Configure the interfaces for chassis 2 that are used as interchassis links for synchronization traffic

user@host# set interfaces ge-2/0/0 vlan-tagging


user@host# set interfaces ge-2/0/0 unit 0 vlan-id 100 family inet address 20.1.1.2/24

3. Configure remaining interfaces for chassis 2 as needed.

Results

user@host# show interfaces


vms-4/0/0 {
redundancy-options {
redundancy-peer {
ipaddress 5.5.5.1;
}
routing-instance HA;
}
unit 0 {
family inet;
}
unit 10 {
ip-address-owner service-plane;
479

family inet {
address 5.5.5.2/32;
}
}
ge-2/0/0 {
vlan-tagging;
unit 0 {
vlan-id 100;
family inet {
address 20.1.1.2/24;
}
}
unit 10 {
vlan-id 10;
family inet {
address 2.10.1.2/24;
}

Configure Routing Information for Chassis 2

Step-by-Step Procedure

Detailed routing configuration is not included for this example. A routing instance is required for the HA
synchronization traffic between the two chassis and is included here.

• Configure routing instances for chassis 2.

user@host# set routing-instances HA instance-type vrf


user@host# set routing-instances HA interface ge-2/0/0.0
user@host# set routing-instances HA interface vms-4/0/0.10
user@host# set routing-instances HA route-distinguisher 1:1
user@host# set policy-options policy-statement dummy term 1 then reject
user@host# set routing-instances HA vrf-import dummy
user@host# set routing-instances HA vrf-export dummy
user@host# set routing-instances HA routing-options static route 5.5.5.2/32 next-hop vms-4/0/0.10
user@host# set routing-instances HA routing-options static route 5.5.5.1/32 next-hop 20.1.1.1

NOTE: The following configuration steps are identical to the steps shown for chassis 1.
480

• Configuring NAT and Stateful Firewall

• Configuring the Service Set

Results

user@host# show services routing-instances


HA {
instance-type vrf;
interface xe-2/2/0.0;
interface vms-4/0/0.10;
route-distinguisher 1:1;
vrf-import dummy;
vrf-export dummy;
routing-options {
static {
route 5.5.5.2/32 next-hop vms-4/0/0.10;
route 5.5.5.1/32 next-hop 20.1.1.1;
}
}

RELATED DOCUMENTATION

Inter-Chassis Stateful Synchronization for Long Lived NAT, Stateful Firewall, and IDS Flows for Next
Gen Services | 480
Inter-Chassis Services Redundancy Overview for Next Gen Services | 489

Inter-Chassis Stateful Synchronization for Long Lived NAT, Stateful


Firewall, and IDS Flows for Next Gen Services

IN THIS SECTION

Inter-Chassis Stateful Synchronization Overview | 481


481

Configuring Inter-Chassis Stateful Synchronization for Long- Lived NAT, Stateful Firewall, and IDS Flows for
Next Gen Services | 483

Inter-Chassis Stateful Synchronization Overview

IN THIS SECTION

Benefits | 482

Stateful synchronization replicates the state of long-lived NAT, stateful firewall, and IDS sessions on the
primary services PIC and sends it to the backup services PIC, which is on a different MX Series chassis.
By default, long lived sessions are defined as having been active on the services PIC for at least 180
seconds, though you can configure this to a higher value.

The following restrictions apply:

• NAPT44 is the only translation type supported.

Replicating state information for the port block allocation (PBA), endpoint-independent mapping (EIM),
or endpoint-independent filters (EIF) features are supported supported for Next Gen Services.

When configuring a service set for NAT, stateful firewall, or IDS that belongs to a stateful
synchronization setup, you must use a next-hop service set, and the NAT, stateful firewall, and IDS
configurations for the service set must be identical on both MX Series chassis.
482

Figure 12 on page 482 shows the stateful synchronization topology.

Figure 12: Stateful Sync Topology

Benefits

Interchassis stateful synchronization of the services session state allows uninterrupted services when a
switchover occurs from a services PIC on one chassis to a services PIC on another chassis.

SEE ALSO

Configuring Inter-Chassis Stateful Synchronization for Long- Lived NAT, Stateful Firewall, and IDS
Flows for Next Gen Services | 0
483

Configuring Inter-Chassis Stateful Synchronization for Long- Lived NAT, Stateful


Firewall, and IDS Flows for Next Gen Services

IN THIS SECTION

Configuring Inter-Chassis Stateful Synchronization for Next Gen Services with non-AMS
Interface | 483

Configuring Inter-Chassis Stateful Synchronization for Next Gen Services with AMS Interface | 486

Configuring Inter-Chassis Stateful Synchronization for Next Gen Services with non-AMS Interface

To configure stateful synchronization inter-chassis high availability for NAT, stateful firewall, and IDS
flows for Next Gen Services when the services interfaces are not AMS, perform the following
configuration steps on each chassis of the high availability pair.

1. Specify the IP address of the vms- interface. This address is used by the TCP channel between the
HA pairs.

[edit interfaces interface-name redundancy-options]


user@host# set redundancy-local data-address address

For example:

[edit interfaces vms-1/0/0 redundancy-options]


user@host# set redundancy-local data-address 192.0.2.2

When you configure the other chassis, this is the address you use for the redundancy-peer
ipaddress.
2. Specify the IP address of the remote services interface. This address is used by the TCP channel
between the HA pairs.

[edit interfaces interface-name redundancy-options]


user@host# set redundancy-peer ipaddress address
484

For example:

[edit interfaces vms-1/0/0 redundancy-options]


user@host# set redundancy-peer ipaddress 192.0.2.1

When you configure the other chassis, this is the address you use for the redundancy-local data-
address.
3. Configure the length of time that the flow remains active for replication, in seconds.

[edit interfaces interface-name redundancy-options]


user@host# set replication-threshold seconds

For example:

[edit interfaces vms-1/0/0 redundancy-options]


user@host# set replication-threshold 60

4. Configure a unit other than 0, and assign it the IP address of the local services interface that you
configured with the redundancy-local data-address option.

[edit interfaces interface-name]


user@host# set unit logical-unit-number family (inet | inet6) address address

For example:

[edit interfaces vms-1/0/0]


user@host# set unit 10 family inet address 192.0.2.2/32

5. For ease of management, we recommend you create a special routing instance with instance-type vrf
to host the HA synchronization traffic between the MX Series high availability pair. Then specify the
name of the special routing instance to apply to the HA synchronization traffic between the high
availability pair.

[edit interfaces interface-name redundancy-options]


user@host# set routing-instance instance-name
485

6. Configure the inside and outside interface units, which are used by the next-hop service set. Use
different unit numbers for the inside and outside units, and do not use 0 or the unit number used in
Step "4".

[edit]
user@host# set interfaces interface-name unit logical-unit-number family (inet | inet6)
user@host# set interfaces interface-name unit logical-unit-number service-domain inside
user@host# set interfaces interface-name unit logical-unit-number family (inet | inet6)
user@host# set interfaces interface-name unit logical-unit-number service-domain outside

For example:

[edit]
user@host# set interfaces vms-1/0/0 unit 100 family inet
user@host# set interfaces vms-1/0/0 unit 100 family inet6
user@host# set interfaces vms-1/0/0 unit 100 service-domain inside
user@host# set interfaces vms-1/0/0 unit 1000 family inet
user@host# set interfaces vms-1/0/0 unit 1000 family inet6
user@host# set interfaces vms-1/0/0 unit 1000 service-domain outside

7. Configure the next-hop service set that contains the NAT rules, stateful firewall rules, or IDS screens.
The service set must be configured identically on each chassis of the high availability pair. The NAT
rules, stateful firewall rules, and IDS screens must also be configured identically on each chassis.
For example:

user@host#set service-set internal-nat next-hop-service inside-service-interface vms-1/0/0.100


user@host#set service-set internal-nat next-hop-service outside-service-interface vms-1/0/0.1000
user@host#set service-set internal-nat next-hop-service nat-rules internal-nat1

8. Repeat these steps for the other chassis of the high availability pair.

SEE ALSO

Configuring Inter-Chassis Stateful Synchronization for Next Gen Services with AMS Interface | 0
486

Configuring Inter-Chassis Stateful Synchronization for Next Gen Services with AMS Interface

To configure stateful synchronization inter-chassis high availability for NAT, stateful firewall, and IDS
flows for Next Gen Services for an AMS services interface, perform the following configuration steps on
each chassis of the high availability pair.

1. Configure a services vms- interface for every member of the AMS interface:

a. Specify the IP address of the vms- interface. This address is used by the TCP channel between the
HA pairs.

[edit interfaces interface-name redundancy-options]


user@host# set redundancy-local data-address address

For example:

[edit interfaces vms-1/0/0 redundancy-options]


user@host# set redundancy-local data-address 192.0.2.2

When you configure the other chassis, this is the address you use for the redundancy-peer
ipaddress.

b. Specify the IP address of the remote services interface. This address is used by the TCP channel
between the HA pairs.

[edit interfaces interface-name redundancy-options]


user@host# set redundancy-peer ipaddress address

For example:

[edit interfaces vms-1/0/0 redundancy-options]


user@host# set redundancy-peer ipaddress 192.0.2.1

When you configure the other chassis, this is the address you use for the redundancy-local data-
address.

c. Configure the length of time that the flow remains active for replication, in seconds.

[edit interfaces interface-name redundancy-options]


user@host# set replication-threshold seconds
487

For example:

[edit interfaces vms-1/0/0 redundancy-options]


user@host# set replication-threshold 60

d. Configure a unit other than 0, and assign it the IP address of the local services interface that you
configured with the redundancy-local data-address option.

[edit interfaces interface-name]


user@host# set unit logical-unit-number family inet address address

For example:

[edit interfaces vms-1/0/0]


user@host# set unit 10 family inet address 192.0.2.2/32

e. For ease of management, we recommend you create a special routing instance with instance-type
vrf to host the HA synchronization traffic between the MX Series high availability pair. Then
specify the name of the special routing instance to apply to the HA synchronization traffic
between the high availability pair.

[edit interfaces interface-name redundancy-options]


user@host# set routing-instance instance-name

2. Create the AMS interface and add the member interfaces you configured in Step "1" on page 486.

[edit interfaces]
user@host# set interface-name load-balancing-options [member-interface mams-a/b/0]

where the interface-name is amsN, and a is the FPC slot number and b is the PIC slot number for
each member interface.

For example:

[edit interfaces]
user@host# set ams0 load-balancing-options member-interface mams-1/0/0
user@host# set ams0 load-balancing-options member-interface mams-1/1/0
488

3. Configure the inside interface for the AMS interface, which is used by the next-hop service set:

a. Configure the family for the inside interface. Do not use 0 for the unit number.

[edit]
user@host# set interfaces interface-name unit logical-unit-number service-domain inside
user@host# set interfaces interface-name unit logical-unit-number family (inet | inet6)

For example:

[edit]
user@host# set interfaces ams0 unit 100 service-domain inside
user@host# set interfaces ams0 unit 100 family inet
user@host# set interfaces ams0 unit 100 family inet6

b. Configure the hash key to regulate distribution for the inside interface.

[edit set interfaces interface-name unit logical-unit-number]


user@host# load-balancing-options hash-keys ingress-key [source-ip destination-ip]

4. Configure the outside interface for the AMS interface, which is used by the next-hop service set. Do
not use 0 or the same unit number that you used for the inside interface.

a. Configure the family for the outside interface.

[edit]
user@host# set interfaces interface-name unit logical-unit-number service-domain outside
user@host# set interfaces interface-name unit logical-unit-number family (inet | inet6)

For example:

[edit]
user@host# set interfaces ams0 unit 1000 service-domain outside
user@host# set interfaces ams0 unit 1000 family inet
user@host# set interfaces ams0 unit 1000 family inet6
489

b. Configure the hash key to regulate distribution for the outside interface.

[edit set interfaces interface-name unit logical-unit-number]


user@host# load-balancing-options hash-keys ingress-key [source-ip destination-ip]

5. Configure the next-hop service set that contains the NAT rules, stateful firewall rules, or IDS screens.
The service set must be configured identically on each chassis of the high availability pair. The NAT
rules, stateful firewall rule, and IDS screens must also be configured identically on each chassis.
For example:

user@host#set service-set internal-nat next-hop-service inside-service-interface ams0.100


user@host#set service-set internal-nat next-hop-service outside-service-interface ams0.1000
user@host#set service-set internal-nat next-hop-service nat-rules internal-nat1

6. Repeat these steps for the other chassis of the high availability pair.

SEE ALSO

Configuring Inter-Chassis Stateful Synchronization for Next Gen Services with non-AMS Interface |
0

Inter-Chassis Services Redundancy Overview for Next Gen Services

IN THIS SECTION

Introduction to Inter-Chassis Services Redundancy | 489

Benefits | 490

Services Redundancy Components | 490

Services Redundancy Operation | 491

Introduction to Inter-Chassis Services Redundancy

Interchassis redundancy for services is controlled by the services redundancy daemon (SRD). The SRD
lets you specify events that trigger a switchover between the primary and standby services PICs, which
490

are on two different MX Series chassis. The SRD monitors conditions, and performs a switchover when
an event occurs. Inter-chassis services redundancy is a primary-secondary model, not an active-active
cluster. Only one services PIC in a redundancy pair, the current primary, receives traffic to be serviced.

You can configure redundancy based on the following monitored events:

• Link down events.

• FPC and PIC reboots.

• Routing protocol daemon (rpd) terminates and restarts.

• Peer gateway events, including requests to acquire or release primary role, or to broadcast warnings.

Benefits

Inter-chassis services redundancy provides automatic switchovers from a services PIC on one chassis to
a services PIC on another chassis when a monitored event occurs.

Services Redundancy Components

The following configurable components control services redundancy processing:

• Redundancy Event—A monitored critical event that triggers the redundancy peers to acquire or
release primary role or to create a warning, and to add or delete signal routes.

One monitored interface can be part of only one redundancy event, but one redundancy event can
have multiple monitored interfaces.

• Redundancy Policy—A policy that defines the set of actions taken when a redundancy event occurs.
Available actions include acquisition or release of primary role, creation of a warning, and addition or
deletion of signal routes. You can configure a maximum of 256 redundancy policies. A redundancy
policy can have a maximum of 256 interface-down events.

One redundancy event can be part of only one redundancy policy, but one redundancy policy can
have multiple redundancy events. For example, redundancy policy RP1 can include redundancy
events RE1 and RE2. Redundancy events RE1 and RE2 cannot be included in redundancy policies
other than RP1.

• Redundancy Set—A collection of one or more redundancy policies that is assigned to one or more
service sets on each MX Series chassis of the redundant pair, and the redundancy group that is
associated with the redundancy set. At a given time, a particular redundancy set can be active on
only one gateway, but not all redundancy sets have to be active on the same gateway. For example,
redundancy set A can be active on gateway 1 while redundancy set B is active on gateway 2. You can
configure a maximum of 128 redundancy sets.
491

One service set can be assigned only one redundancy set, but multiple service sets can be assigned
the same redundancy set.

One redundancy policy can be part of only one redundancy set, but one redundancy set can have
multiple redundancy policies. For example, redundancy set RS1 can include redundancy policies RP1
and RP2. Redundancy policies RP1 and RP2 cannot be included in redundancy sets other than RS1. A
redundancy set can have a maximum of 16 redundancy policies.

• Redundancy Group—The redundancy group identifies the associated ICCP redundancy group. A one-
to-one relationship exists between a redundancy set and a redundancy group. One redundancy set
can be part of only one redundancy group. You can configure a maximum of 16 redundancy groups. A
maximum of 16 redundancy sets can be associated with the same redundancy group.

• Signal routes—Static routes that are added or deleted by services redundancy processing, based on
primary role state changes.

• Routing Policies—Policies that advertise routes based on the existence or non-existence of signal
routes.

• VRRP (Virtual Router Redundancy Protocol) route tracking—Tracks whether a reachable signal route
exists in the routing table of the routing instance in the configuration. Based on the reachability of
the tracked route, VRRP route tracking dynamically changes the priority of the VRRP group.

Services Redundancy Operation

Services redundancy operates as follows:

1. The services redundancy daemon runs on the Routing Engine. It continuously monitors configured
redundancy events.

2. When a redundancy event is detected, the services redundancy daemon:

a. Adds or removes signal routes specified in the redundancy policy.

b. Switches services to the standby.

c. Updates stateful synchronization roles as needed.

3. Resulting route changes cause:

a. The routing policy connected to this route to advertise routes differently.

b. VRRP to change advertised priorities.

To summarize the switchover process:

1. A critical event occurs.


492

2. The services redundancy daemon adds or removes a signal route.

3. A routing policy advertises routes differently. VRRP changes advertised priorities.

4. Services switch over to the standby.

5. Stateful synchronization is updated accordingly.

NOTE: The order of routing priorities must match the order of services primary role.

If a redundancy policy action is release-primary role and the redundancy peer’s state is wait, the
primary-role-release fails. If a redundancy policy action is release-primary role-force, the primary role
release succeeds even if the redundancy peer’s state is warned.

Similarly, if a redundancy policy action on the standby is acquire-primary role and the local state is wait,
the primary-role-release fails. If a redundancy policy action is acquire-primary role-force, the primary
role release succeeds even if the standby state is wait.

You can also use a manual command to trigger a redundancy policy that releases or acquires primary
role.

If gateway 1, the chassis that is configured with the lower IP address, is the primary chassis and you
deactivate the services redundancy daemon on it, a switchover to gateway 2 occurs . If gateway 2, the
chassis that is configured with the higher IP address, is the primary chassis and you deactivate the
services redundancy daemon on it, a switchover does not occur.

RELATED DOCUMENTATION

Configuring Inter-Chassis Services Redundancy for Next Gen Services | 492

Configuring Inter-Chassis Services Redundancy for Next Gen Services

IN THIS SECTION

Configuring Non-Stop Services Redundancy for Next Gen Services Service Set | 493

Configuring One-Way Services Redundancy for Next Gen Services Service Set | 499
493

This topic describes how to configure interchassis-services redundancy for Next Gen Services. This topic
contains a procedure for configuring non-stop services redundancy (automatic switchovers in both
directions) and a procedure for one-way redundancy (automatic switchovers only from the original
primary to the original standby).

You can also use a manual request command to release or acquire primary role:

request services redundancy-set redundancy-set trigger redundancy-event event-


name <force>

The command automatically triggers the specified redundancy event. You must create a configuration
that assigns the redundancy event to a redundancy policy that either releases or acquires primary role.
You must also assign the redundancy policy to the redundancy set used in the command.

Configuring Non-Stop Services Redundancy for Next Gen Services Service Set
Non-stop services redundancy gives you automatic services switchovers between the MX Series routers
when a critical event occurs. Automatic switchovers from gateway1 to gateway2 and from gateway2 to
gateway1 take place without manual intervention.

To configure non-stop services redundancy for a service set, perform the following steps on both
gateway1 and gateway2:

1. Configure one or more redundancy events to monitor the conditions that trigger a services
switchover to the peer gateway.

a. Configure a name for the redundancy event.

[edit services]
user@host# set event-options redundancy-event event-name

For example:

[edit services]
user@host# set event-options redundancy-event RELS_MSHIP_CRIT_EV

b. Specify any interfaces that trigger a services switchover when the interface goes down.

[edit services event-options redundancy-event event-name]


user@host# set monitor link-down [interface-name]
494

c. Specify that a process routing daemon restart request triggers a services switchover.

[edit services event-options redundancy-event event-name]


user@host# set monitor process routing restart

d. Specify that a process routing daemon terminate request triggers a services switchover.

[edit services event-options redundancy-event event-name]


user@host# set monitor process routing abort

e. Specify that a request from the peer to acquire ownership triggers a services switchover.

[edit services event-options redundancy-event event-name]


user@host# set monitor peer mastership-acquire

2. Configure a redundancy policy that releases primary role and deletes a static route when the
redundancy event conditions are met.

a. Configure a name for the policy.

user@host# edit policy-options redundancy-policy policy-name

For example:

user@host# edit policy-options redundancy-policy RLS_MSHIP_POL

b. Specify the redundancy events that release primary role.

[edit policy-options redundancy-policy policy-name]


user@host# set redundancy-events [event-list]

For example:

[edit policy-options redundancy-policy RLS_MSHIP_POL


user@host# set redundancy-events RELS_MSHIP_CRIT_EV
495

If you want to be able to run the request services redundancy-set redundancy-set trigger
redundancy-event event-name <force> to manually release primary role, include that event-name
in the redundancy policy. The redundancy event itself does not need to be configured, because it
is triggered by the request command.

For example:

[edit policy-options redundancy-policy RLS_MSHIP_POL


user@host# set redundancy-events [RELS_MSHIP_CRIT_EV RELS_MSHIP_MANUAL_EV]

c. Release primary role.

[edit policy-options redundancy-policy policy-name]


user@host# set then release-mastership

d. Delete the static route.

[edit policy-options redundancy-policy policy-name]


user@host# set then delete-static-route destination (receive | next-hop next-hop) routing-instance
routing-instance

3. Configure a redundancy event to identify when the peer gateway releases primary role.

[edit services]
user@host# set event-options redundancy-event event-name monitor peer release-mastership

For example:

[edit services]
user@host# set event-options redundancy-event PEER_RELS_MSHIP_EV monitor peer release-
mastership

4. Configure a redundancy policy that acquires primary role from the peer gateway and adds a static
route.

a. Configure a name for the policy.

user@host# edit policy-options redundancy-policy policy-name


496

For example:

user@host# edit policy-options redundancy-policy ACQU_MSHIP_POL

b. Specify the redundancy events that acquire primary role.

[edit policy-options redundancy-policy policy-name]


user@host# set redundancy-events [event-list]

For example:

[edit policy-options redundancy-policy ACQU_MSHIP_POL]


user@host# set redundancy-events PEER_RELS_MSHIP_EV

If you want to be able to run the request services redundancy-set redundancy-set trigger
redundancy-event event-name <force> to manually acquire primary role, include that event-name
in the redundancy policy. The redundancy event itself does not need to be configured, because it
is triggered by the request command.

For example:

[edit policy-options redundancy-policy ACQU_MSHIP_POL]


user@host# set redundancy-events [PEER_RELS_MSHIP_EV ACQU_MSHIP_MANUAL_EV]

c. Acquire primary role.

[edit policy-options redundancy-policy policy-name]


user@host# set then acquire-mastership

d. Add a static route.

[edit policy-options redundancy-policy policy-name]


user@host# set then add-static-route destination (receive | next-hop next-hop) routing-instance
routing-instance

5. Configure the redundancy set.


497

a. Configure a name for the redundancy set.

[edit services]
user@host# set redundancy-set redundancy-set

For example:

[edit services]
user@host# set redundancy-set 1

b. Specify the redundancy group ID for the redundancy set.

[edit services redundancy-set redundancy-set]


user@host# set redundancy-group redundancy-group

For example:

[edit services redundancy-set 1]


user@host# set redundancy-group 1

The redundancy group ID is the same redundancy group ID configured for the ICCP daemon
(iccpd) through the existing ICCP configuration hierarchy. For example,

iccp {
local-ip-addr 1.1.1.1;
peer 2.2.2.2 {
redundancy-group-id-list 1;
liveness-detection {
minimum-interval 1000;
}
}
}
498

c. Specify the redundancy policy that releases primary role and the redundancy policy that acquires
primary role.

[edit services redundancy-set redundancy-set]


user@host# set redundancy-policy [redundancy-policy-list]

For example:

[edit services redundancy-set 1]


user@host# set redundancy-policy [ACQU_MSHIP_POL RLS_MSHIP_POL]

d. Configure the frequency of health check probes of the redundancy set, in seconds.

[edit services redundancy-set redundancy-set]


user@host# set healthcheck-timer-interval healthcheck-timer-interval

The default is 30 seconds.

e. Configure the maximum wait time for a help check response, in seconds.

[edit services redundancy-set redundancy-set]


user@host# set hold-time hold-time

The range is 0 through 3600 seconds.

f. Configure the frequency of srd hello messages, in seconds.

[edit services redundancy-set redundancy-set]


user@host# set keepalive keepalive

The range is 1 through 60 seconds.


6. Configure routing policies.

a. Identify signal routes that requires redundancy-related routing changes. Specify the signal route
and the routing table that is used.

[edit policy-options condition condition-name}


user@host# set if-route-exists signal-route table routing-table
499

For example:

[edit policy-options condition switchover-route-exists]


user@host# set if-route-exists 10.45.45.0/24 table bgp1_table

b. To change the local-preference for the signal route, enter it in a policy statement.

[edit policy-options policy-statement policy-name]


user@host# set term term from protocol [protocol variables] prefix-list prefix-list condition
condition-name then local-preference preference-value accept

c. To change as-path-prepend values for the signal route, enter them in the policy statement.

[edit policy-options policy-statement policy-name]


user@host# set term term from prefix-list prefix-list condition condition-name then as-path-
prepend [as-prepend-values] next-hop self accept

7. Configure redundancy for the service set by assigning the redundancy set to the service set.

[edit]
user@host# set services service-set service-set-name redundancy-set-id redundancy-set

8. Repeat these steps on the peer gateway.

SEE ALSO

Configuring One-Way Services Redundancy for Next Gen Services Service Set

Configuring One-Way Services Redundancy for Next Gen Services Service Set
One-way services redundancy gives you automatic services switchovers from gateway1, the original
primary gateway, to gateway2, the original standby gateway. An automatic switchover from gateway 2
to gateway1 does not happen. To switchover from gateway2 to gateway1, you must perform a manual
switchover.

1. On gateway1, the initial primary, configure one or more redundancy events to monitor the
conditions that trigger a services switchover to gateway2, the standby gateway.
500

a. Configure a name for the redundancy event.

[edit services]
user@gateway1# set event-options redundancy-event event-name

For example:

[edit services]
user@gateway1# set event-options redundancy-event RELS_MSHIP_CRIT_EV

b. Specify any interfaces that trigger a services switchover when the interface goes down.

[edit services event-options redundancy-event event-name]


user@gateway1# set monitor link-down [interface-name]

c. Specify that a process routing daemon restart request triggers a services switchover.

[edit services event-options redundancy-event event-name]


user@gateway1# set monitor process routing restart

d. Specify that a process routing daemon terminate request triggers a services switchover.

[edit services event-options redundancy-event event-name]


user@gateway1# set monitor process routing abort

2. On gateway1, configure a redundancy policy that releases primary role and deletes a static route
when the redundancy event conditions are met.

a. Configure a name for the policy.

user@gateway1# edit policy-options redundancy-policy policy-name

For example:

user@gateway1# edit policy-options redundancy-policy RLS_MSHIP_POL


501

b. Specify the redundancy events that release primary role.

[edit policy-options redundancy-policy policy-name]


user@gateway1# set redundancy-events [event-list]

For example:

[edit policy-options redundancy-policy RLS_MSHIP_POL]


user@gateway1# set redundancy-events RELS_MSHIP_CRIT_EV

If you want to be able to run the request services redundancy-set redundancy-set trigger
redundancy-event event-name <force> to manually release primary role, include that event-
name in the redundancy policy. The redundancy event itself does not need to be configured,
because it is triggered by the request command.

For example:

[edit policy-options redundancy-policy RLS_MSHIP_POL]


user@gateway1# set redundancy-events [RELS_MSHIP_CRIT_EV RELS_MSHIP_MANUAL_EV]

c. Release primary role.

[edit policy-options redundancy-policy policy-name]


user@gateway1# set then release-mastership force

d. Delete the static route.

[edit policy-options redundancy-policy policy-name]


user@gateway1# set then delete-static-route destination (receive | next-hop next-hop) routing-
instance routing-instance

3. On gateway1, configure a redundancy policy that acquires primary role from gateway2 when you
perform a manual request on gateway1 (request services redundancy-set redundancy-set trigger
redundancy-event event-name <force>) .

a. Configure a name for the policy.

user@gateway1# edit policy-options redundancy-policy policy-name


502

For example:

user@gateway1# edit policy-options redundancy-policy ACQU_MSHIP_POL

b. Specify the name of the redundancy event that the manual request uses.

[edit policy-options redundancy-policy policy-name]


user@gateway1# set redundancy-events event-name

For example:

[edit policy-options redundancy-policy ACQU_MSHIP_POL]


user@gateway1# set redundancy-events ACQU_MSHIP_MANUAL_EV

The redundancy event itself does not need to be configured, because it is triggered by the
request command.

c. Acquire primary role.

[edit policy-options redundancy-policy policy-name]


user@host# set then acquire-mastership

4. On gateway1, configure the redundancy set.

a. Configure a name for the redundancy set.

[edit services]
user@gateway1# set redundancy-set redundancy-set

For example:

[edit services]
user@gateway1# set redundancy-set 1
503

b. Specify the redundancy group ID for the redundancy set.

[edit services redundancy-set redundancy-set]


user@gateway1# set redundancy-group redundancy-group

For example:

[edit services redundancy-set 1]


user@gateway1# set redundancy-group 1

The redundancy group ID is the same redundancy group ID configured for the ICCP daemon
(iccpd) through the existing ICCP configuration hierarchy. For example,

iccp {
local-ip-addr 1.1.1.1;
peer 2.2.2.2 {
redundancy-group-id-list 1;
liveness-detection {
minimum-interval 1000;
}
}
}

c. Specify the redundancy policy that releases primary role and the redundancy policy that
acquires primary role.

[edit services redundancy-set redundancy-set]


user@gateway1# set redundancy-policy [redundancy-policy-list]

For example:

[edit services redundancy-set 1]


user@gateway1# set redundancy-policy [ ACQU_MSHIP_POL RLS_MSHIP_POL]
504

d. Configure the frequency of health check probes of the redundancy set, in seconds.

[edit services redundancy-set redundancy-set]


user@gateway1# set healthcheck-timer-interval healthcheck-timer-interval

The default is 30 seconds.

e. Configure the maximum wait time for a help check response, in seconds.

[edit services redundancy-set redundancy-set]


user@gateway1# set hold-time hold-time

The range is 0 through 3600 seconds.

f. Configure the frequency of srd hello messages, in seconds.

[edit services redundancy-set redundancy-set]


user@gateway1# set keepalive keepalive

The range is 1 through 60 seconds.


5. On gateway1, configure routing policies.

a. Identify signal routes that requires redundancy-related routing changes. Specify the signal route
and the routing table that is used.

[edit policy-options condition condition-name}


user@gateway1# set if-route-exists signal-route table routing-table

For example:

[edit policy-options condition switchover-route-exists]


user@gateway1# set if-route-exists 10.45.45.0/24 table bgp1_table

b. To change the local-preference for the signal route, enter it in a policy statement.

[edit policy-options policy-statement policy-name]


user@gateway1# set term term from protocol [protocol variables] prefix-list prefix-list condition
condition-name then local-preference preference-value accept
505

c. To change as-path-prepend values for the signal route, enter them in the policy statement.

[edit policy-options policy-statement policy-name]


user@gateway1# set term term from prefix-list prefix-list condition condition-name then as-path-
prepend [as-prepend-values] next-hop self accept

6. On gateway1, configure redundancy for the service set by assigning the redundancy set to the
service set.

[edit]
user@gateway1# set services service-set service-set-name redundancy-set-id redundancy-set

7. On gateway2, the initial standby, configure a redundancy event to identify when the peer gateway
releases primary role.

[edit services]
user@gateway2# set event-options redundancy-event event-name monitor peer release-mastership

For example:

[edit services]
user@gateway2# set event-options redundancy-event PEER_RELS_MSHIP_EV monitor peer release-
mastership

8. On gateway2, configure a redundancy policy that acquires primary role from the peer gateway and
adds a static route.

a. Configure a name for the policy.

user@gateway2# edit policy-options redundancy-policy policy-name

For example:

user@gateway2# edit policy-options redundancy-policy ACQU_MSHIP_POL


506

b. Specify the configured redundancy event for the peer gateway primary role release event.

[edit policy-options redundancy-policy policy-name]


user@gateway2# set redundancy-events event-name

For example:

[edit policy-options redundancy-policy ACQU_MSHIP_POL]


user@gateway2# set redundancy-events PEER_RELS_MSHIP_EV

c. Acquire primary role.

[edit policy-options redundancy-policy policy-name]


user@gateway2# set then acquire-mastership

d. Add a static route.

[edit policy-options redundancy-policy policy-name]


user@gateway2# set then add-static-route destination (receive | next-hop next-hop) routing-
instance routing-instance

9. On gateway2, configure a redundancy event to identify when the peer gateway requests primary
role.

[edit services]
user@gateway2# set event-options redundancy-event event-name monitor peer mastership-acquire

For example:

[edit services]
user@gateway2# set event-options redundancy-event PEER_MSHIP_ACQU_EV monitor peer
mastership-acquire

10. On gateway2, configure a redundancy policy that releases primary role and deletes a static route
when gateway1 requests primary role.
507

a. Configure a name for the policy.

user@gateway2# edit policy-options redundancy-policy policy-name

For example:

user@gateway2# edit policy-options redundancy-policy RELS-MSHIP_POL

b. Specify the configured redundancy event that identifies when the peer gateway requests
primary role.

[edit policy-options redundancy-policy policy-name]


user@gateway2# set redundancy-events event-name

For example:

[edit policy-options redundancy-policy RELS-MSHIP_POL]


user@gateway2# set redundancy-events PEER_MSHIP_ACQU_EV

c. Release primary role.

[edit policy-options redundancy-policy policy-name]


user@gateway2# set then release-mastership force

d. Delete the static route.

[edit policy-options redundancy-policy policy-name]


user@gateway2# set then delete-static-route destination (receive | next-hop next-hop) routing-
instance routing-instance

11. On gateway2, configure one or more redundancy events to monitor the conditions that trigger a
warning.

a. Configure a name for the redundancy event.

[edit services]
user@gateway2# set event-options redundancy-event event-name
508

For example:

[edit services]
user@gateway2# set event-options redundancy-event WARN_EV

b. Specify any interfaces that trigger a warning when the interface goes down.

[edit services event-options redundancy-event event-name]


user@gateway2# set monitor link-down [interface-name]

c. Specify that a process routing daemon restart request triggers a warning.

[edit services event-options redundancy-event event-name]


user@gateway2# set monitor process routing restart

d. Specify that a process routing daemon terminate request triggers a warning.

[edit services event-options redundancy-event event-name]


user@gateway2# set monitor process routing abort

12. On gateway2, configure a redundancy policy that broadcasts a warning.

a. Configure a name for the policy.

user@gateway2# edit policy-options redundancy-policy policy-name

For example:

user@gateway2# edit policy-options redundancy-policy WARN_POL

b. Specify the configured redundancy events that trigger a warning.

[edit policy-options redundancy-policy policy-name]


user@gateway2# set redundancy-events [event-list]
509

For example:

[edit policy-options redundancy-policy WARN_POL]


user@gateway2# set redundancy-events WARN_EV

c. Broadcast the warning.

[edit policy-options redundancy-policy policy-name]


user@gateway2# set then broadcast-warning

13. On gateway2, configure the redundancy set.

a. Configure a name for the redundancy set.

[edit services]
user@gateway2# set redundancy-set redundancy-set

For example:

[edit services]
user@gateway2# set redundancy-set 1

b. Specify the redundancy group ID for the redundancy set.

[edit services redundancy-set redundancy-set]


user@gateway2# set redundancy-group redundancy-group

For example:

[edit services redundancy-set 1]


user@gateway2# set redundancy-group 1

The redundancy group ID is the same redundancy group ID configured for the ICCP daemon
(iccpd) through the existing ICCP configuration hierarchy. For example,

iccp {
local-ip-addr 10.1.1.1;
peer 10.2.2.2 {
510

redundancy-group-id-list 1;
liveness-detection {
minimum-interval 1000;
}
}
}

c. Specify the redundancy policy that releases primary role, the redundancy policy that acquires
primary role, and the redundancy policy that triggers a warning.

[edit services redundancy-set redundancy-set]


user@gateway2# set redundancy-policy [redundancy-policy-list]

For example:

[edit services redundancy-set 1]


user@gateway2# set redundancy-policy [ ACQU_MSHIP_POL RLS_MSHIP_POL WARN_POL]

d. Configure the frequency of health check probes of the redundancy set, in seconds.

[edit services redundancy-set redundancy-set]


user@gateway2# set healthcheck-timer-interval healthcheck-timer-interval

The default is 30 seconds.

e. Configure the maximum wait time for a help check response, in seconds.

[edit services redundancy-set redundancy-set]


user@gateway2# set hold-time hold-time

The range is 0 through 3600 seconds.

f. Configure the frequency of srd hello messages, in seconds.

[edit services redundancy-set redundancy-set]


user@gateway2# set keepalive keepalive

The range is 1 through 60 seconds.


14. On gateway2, configure routing policies.
511

a. Identify signal routes that requires redundancy-related routing changes. Specify the signal route
and the routing table that is used.

[edit policy-options condition condition-name}


user@gateway2# set if-route-exists signal-route table routing-table

For example:

[edit policy-options condition switchover-route-exists]


user@gateway2# set if-route-exists 10.45.45.0/24 table bgp1_table

b. To change the local-preference for the signal route, enter it in a policy statement.

[edit policy-options policy-statement policy-name]


user@gateway2# set term term from protocol [protocol variables] prefix-list prefix-list condition
condition-name then local-preference preference-value accept

c. To change as-path-prepend values for the signal route, enter them in the policy statement.

[edit policy-options policy-statement policy-name]


user@gateway2# set term term from prefix-list prefix-list condition condition-name then as-
path-prepend [as-prepend-values] next-hop self accept

15. On gateway2, configure redundancy for the service set by assigning the redundancy set to the
service set.

[edit]
user@gateway2# set services service-set service-set-name redundancy-set-id redundancy-set

SEE ALSO

Inter-Chassis Services Redundancy Overview for Next Gen Services | 489


11 PART

Application Layer Gateways

Enabling Traffic to Pass Securely Using Application Layer Gateways | 513


513

CHAPTER 33

Enabling Traffic to Pass Securely Using Application


Layer Gateways

IN THIS CHAPTER

Next Gen Services Application Layer Gateways | 513

Configuring Application Sets | 523

Configuring Application Properties for Next Gen Services | 524

Examples: Configuring Application Protocols | 541

Verifying the Output of ALG Sessions | 542

Next Gen Services Application Layer Gateways

IN THIS SECTION

RTSP | 513

SIP | 514

Configuring SIP | 514

This topic describes the Application Layer Gateways (ALGs) supported by Junos OS for Next Gen
Services. ALG support includes managing pinholes and parent-child relationships for the supported
ALGs.

RTSP

The Real-Time Streaming Protocol (RTSP) controls the delivery of data with real-time properties such as
audio and video. The streams controlled by RTSP can use RTP, but it is not required. Media can be
transmitted on the same RTSP control stream. This is an HTTP-like text-based protocol, but client and
514

server maintain session information. A session is established using the SETUP message and terminated
using the TEARDOWN message. The transport (the media protocol, address, and port numbers) is
negotiated in the setup and the setup-response.

Support for stateful firewall and NAT services requires that you configure the RTSP ALG for TCP
port 554.

The ALG monitors the control connection, opens flows dynamically for media (RTP/RTSP) streams, and
performs NAT address and port rewrites.

SIP

The Session Initiation Protocol (SIP) is an application layer protocol that can establish, maintain, and
terminate media sessions. It is a widely used voice over IP (VoIP) signaling protocol. The SIP ALG
monitors SIP traffic and dynamically creates and manages pinholes on the signaling and media paths.
The ALG only allows packets with the correct permissions. The SIP ALG also performs the following
functions:

• Manages parent-child session relationships.

• Enforces security policies.

• Manages pinholes for VoIP traffic.

The SIP ALG supports the following features:

• Stateful firewall

• Static source NAT

• Dynamic address only source NAT

• Network Address Port Translation (NAPT)

NOTE: SIP sessions are limited to 12 hours (720 minutes) for NAT processing on the MS-MIC
and MS-MPC interface cards. SIP sessions on the MS-DPC have no time limit.

Configuring SIP

The Session Initiation Protocol (SIP) is a generalized protocol for communication between endpoints
involved in Internet services such as telephony, fax, video conferencing, instant messaging, and file
exchange.
515

The Junos OS provides ALG services in accordance with the standard described in RFC 3261, SIP:
Session Initiation Protocol. SIP flows under the Junos OS are as described in RFC 3665, Session
Initiation Protocol (SIP) Basic Call Flow Examples.

NOTE: Before implementing the Junos OS SIP ALG, you should be familiar with certain
limitations, discussed in "Junos OS SIP ALG Limitations" on page 522
The use of NAT in conjunction with the SIP ALG results in changes in SIP header fields due to
address translation. For an explanation of these translations, refer to "SIP ALG Interaction with
Network Address Translation" on page 516.

To implement SIP on adaptive services interfaces, you configure the application-protocol statement at
the [edit applications application application-name] hierarchy level with the value sip. In addition, there
are two other statements you can configure to modify how SIP is implemented:

• You can enable the router to accept any incoming SIP calls for the endpoint devices that are behind
the NAT firewall. When a device behind the firewall registers with the proxy that is outside the
firewall, the AS or Multiservices PIC maintains the registration state. When the learn-sip-register
statement is enabled, the router can use this information to accept inbound calls. If this statement is
not configured, no inbound calls are accepted; only the devices behind the firewall can call devices
outside the firewall.

To configure SIP registration, include the learn-sip-register statement at the [edit applications
application application-name] hierarchy level:

[edit applications application application-name]


learn-sip-register;

NOTE: The learn-sip-register statement is not applicable to the Next Gen Services MX-SPC3.

You can also manually inspect the SIP register by issuing the show services stateful-firewall sip-
register command; for more information, see the Junos OS System Basics and Services Command
Reference. The show services stateful-firewall sip-register command is not supported for Next Gen
Services.

• You can specify a timeout period for the duration of SIP calls that are placed on hold. When a call is
put on hold, there is no activity and flows might time out after the configured inactivity-timeout
period expires, resulting in call state teardown. To avoid this, when a call is put on hold, the flow
timer is reset to the sip-call-hold-timeout cycle to preserve the call state and flows for longer than
the inactivity-timeout period.
516

NOTE: The sip-call-hold-timeout statement is not applicable to the Next Gen Services MX-
SPC3.

To configure a timeout period, include the sip-call-hold-timeout statement at the [edit applications
application application-name] hierarchy level:

[edit applications application application-name]


sip-call-hold-timeout seconds;

The default value is 7200 seconds and the range is from 0 through 36,000 seconds (10 hours).

SIP ALG Interaction with Network Address Translation

The Network Address Translation (NAT) protocol enables multiple hosts in a private subnet to share a
single public IP address to access the Internet. For outgoing traffic, NAT replaces the private IP address
of the host in the private subnet with the public IP address. For incoming traffic, the public IP address is
converted back into the private address, and the message is routed to the appropriate host in the private
subnet.

Using NAT with the Session Initiation Protocol (SIP) service is more complicated because SIP messages
contain IP addresses in the SIP headers as well as in the SIP body. When using NAT with the SIP service,
the SIP headers contain information about the caller and the receiver, and the device translates this
information to hide it from the outside network. The SIP body contains the Session Description Protocol
(SDP) information, which includes IP addresses and port numbers for transmission of the media. The
device translates SDP information for allocating resources to send and receive the media.

How IP addresses and port numbers in SIP messages are replaced depends on the direction of the
message. For an outgoing message, the private IP address and port number of the client are replaced
with the public IP address and port number of the Juniper Networks firewall. For an incoming message,
the public address of the firewall is replaced with the private address of the client.

When an INVITE message is sent out across the firewall, the SIP Application Layer Gateway (ALG)
collects information from the message header into a call table, which it uses to forward subsequent
messages to the correct endpoint. When a new message arrives, for example an ACK or 200 OK, the
ALG compares the “From:, To:, and Call-ID:” fields against the call table to identify the call context of the
message. If a new INVITE message arrives that matches the existing call, the ALG processes it as a
REINVITE.

When a message containing SDP information arrives, the ALG allocates ports and creates a NAT
mapping between them and the ports in the SDP. Because the SDP requires sequential ports for the
Real-Time Transport Protocol (RTP) and Real-Time Control Protocol (RTCP) channels, the ALG provides
consecutive even-odd ports. If it is unable to find a pair of ports, it discards the SIP message.
517

This topic contains the following sections:

Outgoing Calls

When a SIP call is initiated with a SIP request message from the internal to the external network, NAT
replaces the IP addresses and port numbers in the SDP and binds the IP addresses and port numbers to
the Juniper Networks firewall. Via, Contact, Route, and Record-Route SIP header fields, if present, are
also bound to the firewall IP address. The ALG stores these mappings for use in retransmissions and for
SIP response messages.

The SIP ALG then opens pinholes in the firewall to allow media through the device on the dynamically
assigned ports negotiated based on information in the SDP and the Via, Contact, and Record-Route
header fields. The pinholes also allow incoming packets to reach the Contact, Via, and Record-Route IP
addresses and ports. When processing return traffic, the ALG inserts the original Contact, Via, Route,
and Record-Route SIP fields back into packets.

Incoming Calls

Incoming calls are initiated from the public network to public static NAT addresses or to interface IP
addresses on the device. Static NATs are statically configured IP addresses that point to internal hosts;
interface IP addresses are dynamically recorded by the ALG as it monitors REGISTER messages sent by
internal hosts to the SIP registrar. When the device receives an incoming SIP packet, it sets up a session
and forwards the payload of the packet to the SIP ALG.

The ALG examines the SIP request message (initially an INVITE) and, based on information in the SDP,
opens gates for outgoing media. When a 200 OK response message arrives, the SIP ALG performs NAT
on the IP addresses and ports and opens pinholes in the outbound direction. (The opened gates have a
short time-to-live, and they time out if a 200 OK response message is not received quickly.)

When a 200 OK response arrives, the SIP proxy examines the SDP information and reads the IP
addresses and port numbers for each media session. The SIP ALG on the device performs NAT on the
addresses and port numbers, opens pinholes for outbound traffic, and refreshes the timeout for gates in
the inbound direction.

When the ACK arrives for the 200 OK, it also passes through the SIP ALG. If the message contains SDP
information, the SIP ALG ensures that the IP addresses and port numbers are not changed from the
previous INVITE—if they are, the ALG deletes old pinholes and creates new pinholes to allow media to
pass through. The ALG also monitors the Via, Contact, and Record-Route SIP fields and opens new
pinholes if it determines that these fields have changed.

Forwarded Calls

A forwarded call is when, for example, user A outside the network calls user B inside the network, and
user B forwards the call to user C outside the network. The SIP ALG processes the INVITE from user A
518

as a normal incoming call. But when the ALG examines the forwarded call from B to C outside the
network and notices that B and C are reached using the same interface, it does not open pinholes in the
firewall, because media will flow directly between user A and user C.

Call Termination

The BYE message terminates a call. When the device receives a BYE message, it translates the header
fields just as it does for any other message. But because a BYE message must be acknowledged by the
receiver with a 200 OK, the ALG delays call teardown for five seconds to allow time for transmission of
the 200 OK.

Call Re-INVITE Messages

Re-INVITE messages add new media sessions to a call and remove existing media sessions. When new
media sessions are added to a call, new pinholes are opened in the firewall and new address bindings are
created. The process is identical to the original call setup. When one or more media sessions are
removed from a call, pinholes are closed and bindings released just as with a BYE message.

Call Session Timers

The SIP ALG uses the Session-Expires value to time out a session if a Re-INVITE or UPDATE message is
not received. The ALG gets the Session-Expires value, if present, from the 200 OK response to the
INVITE and uses this value for signaling timeout. If the ALG receives another INVITE before the session
times out, it resets all timeout values to this new INVITE or to default values, and the process is
repeated.

As a precautionary measure, the SIP ALG uses hard timeout values to set the maximum amount of time
a call can exist. This ensures that the device is protected should one of the following events occur:

• End systems crash during a call and a BYE message is not received.

• Malicious users never send a BYE in an attempt to attack a SIP ALG.

• Poor implementations of SIP proxy fail to process Record-Route and never send a BYE message.

• Network failures prevent a BYE message from being received.

Call Cancellation

Either party can cancel a call by sending a CANCEL message. Upon receiving a CANCEL message, the
SIP ALG closes pinholes through the firewall—if any have been opened—and releases address bindings.
Before releasing the resources, the ALG delays the control channel age-out for approximately five
seconds to allow time for the final 200 OK to pass through. The call is terminated when the five second
timeout expires, regardless of whether a 487 or non-200 response arrives.
519

Forking

Forking enables a SIP proxy to send a single INVITE message to multiple destinations simultaneously.
When the multiple 200 OK response messages arrive for the single call, the SIP ALG parses but updates
call information with the first 200 OK messages it receives.

SIP Messages

The SIP message format consists of a SIP header section and the SIP body. In request messages, the first
line of the header section is the request line, which includes the method type, request-URI, and protocol
version. In response messages, the first line is the status line, which contains a status code. SIP headers
contain IP addresses and port numbers used for signaling. The SIP body, separated from the header
section by a blank line, is reserved for session description information, which is optional. Junos OS
currently supports the SDP only. The SIP body contains IP addresses and port numbers used to
transport the media.

SIP Headers

In the following sample SIP request message, NAT replaces the IP addresses in the header fields to hide
them from the outside network.

INVITE [email protected] SIP/2.0


Via: SIP/2.0/UDP 10.150.20.3:5434
From: [email protected]
To: [email protected]
Call-ID: [email protected]
Contact: [email protected]:5434
Route: <sip:[email protected]:5060>
Record-Route: <sip:[email protected]:5060>

How IP address translation is performed depends on the type and direction of the message. A message
can be any of the following:

• Inbound request

• Outbound response

• Outbound request

• Inbound response

Table 47 on page 520 shows how NAT is performed in each of these cases. Note that for several of the
header fields the ALG determine more than just whether the messages comes from inside or outside the
520

network. It must also determine what client initiated the call, and whether the message is a request or
response.

Table 47: Requesting Messages with NAT Table

Inbound Request To: Replace domain with local address

(from public to
private) From: None

Call-ID: None

Via: None

Request-URI: Replace ALG address with local address

Contact: None

Record-Route: None

Route: None

Outbound To: Replace ALG address with local address


Response

(from private to From: None


public)

Call-ID: None

Via: None

Request-URI: N/A

Contact: Replace local address with ALG address

Record-Route: Replace local address with ALG address


521

Route: None

Outbound To: None


Request

(from private to From: Replace local address with ALG address


public)

Call-ID: None

Via: Replace local address with ALG address

Request-URI: None

Contact: Replace local address with ALG address

Record-Route: Replace local address with ALG address

Route: Replace ALG address with local address

Outbound To: None


Response

(from public to From: Replace ALG address with local address


private)

Call-ID: None

Via: Replace ALG address with local address

Request-URI: N/A

Contact: None

Record-Route: Replace ALG address with local address


522

Route: Replace ALG address with local address

SIP Body

The SDP information in the SIP body includes IP addresses the ALG uses to create channels for the
media stream. Translation of the SDP section also allocates resources, that is, port numbers to send and
receive the media.

The following excerpt from a sample SDP section shows the fields that are translated for resource
allocation.

o=user 2344234 55234434 IN IP4 10.150.20.3


c=IN IP4 10.150.20.3
m=audio 43249 RTP/AVP 0

SIP messages can contain more than one media stream. The concept is similar to attaching multiple files
to an e-mail message. For example, an INVITE message sent from a SIP client to a SIP server might have
the following fields:

c=IN IP4 10.123.33.4


m=audio 33445 RTP/AVP 0
c=IN IP4 10.123.33.4
m=audio 33447 RTP/AVP 0
c=IN IP4 10.123.33.4
m=audio 33449 RTP/AVP 0

Junos OS supports up to 6 SDP channels negotiated for each direction, for a total of 12 channels per
call.

Junos OS SIP ALG Limitations

The following limitations apply to configuration of the SIP ALG:

• Only the methods described in RFC 3261 are supported.

• Only SIP version 2 is supported.

• TCP is not supported as a transport mechanism for signaling messages for MS-MPCs but is
supported for Next Gen Services.
523

• Do not configure the SIP ALG when using STUN. if clients use STUN/TURN to detect the firewall or
NAT devices between the caller and responder or proxy, the client attempts to best-guess the NAT
device behavior and act accordingly to place the call.

• On MS-MPCs, do not use the endpoint-independent mapping NAT pool option in conjunction with
the SIP ALG. Errors will result. This does not apply to Next Gen Services.

• IPv6 signaling data is not supported for MS-MPCs but is supported for Next Gen Services.

• Authentication is not supported.

• Encrypted messages are not supported.

• SIP fragmentation is not supported for MS-MPCs but is supported for Next Gen Services.

• The maximum UDP packet size containing a SIP message is assumed to be 9 KB. SIP messages larger
than this are not supported.

• The maximum number of media channels in a SIP message is assumed to be six.

• Fully qualified domain names (FQDNs) are not supported in critical fields.

• QoS is not supported. SIP supports DSCP rewrites.

• High availability is not supported, except for warm standby.

• A timeout setting of never is not supported on SIP or NAT.

• Multicast (forking proxy) is not supported.

RELATED DOCUMENTATION

ALG Descriptions
ALGs Available for Junos OS Address Aware NAT

Configuring Application Sets

You can group the applications you have defined into a named object by including the application-set
statement at the [edit applications] hierarchy level with an application statement for each application:

[edit applications]
application-set application-set-name {
524

application application;
}

For an example of a typical application set, see Examples: Configuring Application Protocols.

Configuring Application Properties for Next Gen Services

IN THIS SECTION

Configuring an Application Protocol | 525

Configuring the Network Protocol | 527

Configuring the ICMP Code and Type | 529

Configuring Source and Destination Ports | 530

Configuring the Inactivity Timeout Period | 531

Configuring SIP | 531

Configuring an SNMP Command for Packet Matching | 540

To configure application properties, include the application statement at the [edit applications] hierarchy
level:

[edit applications]
application application-name {
application-protocol protocol-name;
child-inactivity-timeout seconds;
destination-port port-number;
gate-timeout seconds;
icmp-code value;
icmp-type value;
inactivity-timeout value;
protocol type;
rpc-program-number number;
snmp-command command;
source-port port-number;
ttl-threshold value;
525

uuid hex-value;
}

You can group application objects by configuring the application-set statement; for more information,
see Configuring Application Sets.

This section includes the following tasks for configuring applications:

Configuring an Application Protocol

The application-protocol statement allows you to specify which of the supported application protocols
(ALGs) to configure and include in an application set for service processing. To configure application
protocols, include the application-protocol statement at the [edit applications application application-
name] hierarchy level:

[edit applications application application-name]


application-protocol protocol-name;

Table 48 on page 525 shows the list of supported protocols for Next Gen Services. For more
information about specific protocols, see ALG Descriptions.

Table 48: Application Protocols Supported by Services Interfaces

Protocol Name CLI Value Comments

Bootstrap protocol (BOOTP) bootp Supports BOOTP and dynamic host configuration
protocol (DHCP).

Distributed Computing dce-rpc Requires the protocol statement to have the value udp or
Environment (DCE) remote tcp. Requires a uuid value. You cannot specify
procedure call (RPC) destination-port or source-port values.

DCE RPC portmap dce-rpc- Requires the protocol statement to have the value udp or
portmap tcp. Requires a destination-port value.

Domain Name System (DNS) dns Requires the protocol statement to have the value udp.
This application protocol closes the DNS flow as soon as
the DNS response is received.
526

Table 48: Application Protocols Supported by Services Interfaces (Continued)

Protocol Name CLI Value Comments

Exec exec Requires the protocol statement to have the value tcp or
to be unspecified. Requires a destination-port value.

FTP ftp Requires the protocol statement to have the value tcp or
to be unspecified. Requires a destination-port value.

H.323 h323 –

Internet Control Message icmp Requires the protocol statement to have the value icmp
Protocol (ICMP) or to be unspecified.

IP ip –

Login login –

NetBIOS netbios Requires the protocol statement to have the value udp or
to be unspecified. Requires a destination-port value.

NetShow netshow Requires the protocol statement to have the value tcp or
to be unspecified. Requires a destination-port value.

RealAudio realaudio –

Real-Time Streaming Protocol rtsp Requires the protocol statement to have the value tcp or
(RTSP) to be unspecified. Requires a destination-port value.

Session Initiation Protocol sip –

SNMP snmp Requires the protocol statement to have the value udp or
to be unspecified. Requires a destination-port value.
527

Table 48: Application Protocols Supported by Services Interfaces (Continued)

Protocol Name CLI Value Comments

SQLNet sqlnet Requires the protocol statement to have the value tcp or
to be unspecified. Requires a destination-port or source-
port value.

Talk Program talk

Trace route traceroute Requires the protocol statement to have the value udp or
to be unspecified. Requires a destination-port value.

Trivial FTP (TFTP) tftp Requires the protocol statement to have the value udp or
to be unspecified. Requires a destination-port value.

WinFrame winframe –

NOTE: You can configure application-level gateways (ALGs) for ICMP and trace route under
stateful firewall, NAT, or CoS rules when twice NAT is configured in the same service set. These
ALGs cannot be applied to flows created by the Packet Gateway Controller Protocol (PGCP).
Twice NAT does not support any other ALGs. NAT applies only the IP address and TCP or UDP
headers, but not the payload.
For more information about configuring twice NAT, see Junos Address Aware Network
Addressing Overview.

Configuring the Network Protocol

The protocol statement allows you to specify which of the supported network protocols to match in an
application definition. To configure network protocols, include the protocol statement at the [edit
applications application application-name] hierarchy level:

[edit applications application application-name]


protocol type;
528

You specify the protocol type as a numeric value; for the more commonly used protocols, text names are
also supported in the command-line interface (CLI). Table 49 on page 528shows the list of the
supported protocols.

Table 49: Network Protocols Supported by Next Gen Services

Network Protocol Type CLI Value Comments

External Gateway Protocol (EGP) egp –

Generic routing encapsulation (GR) gre –

ICMP icmp Requires an application-protocol value of icmp.

ICMPv6 icmp6 Requires an application-protocol value of icmp.

Internet Group Management igmp –


Protocol (IGMP)

TCP tcp Requires a destination-port or source-port value


unless you specify application-protocol rcp or dce-
rcp.

UDP udp Requires a destination-port or source-port value


unless you specify application-protocol rcp or dce-
rcp.

For a complete list of possible numeric values, see RFC 1700, Assigned Numbers (for the Internet
Protocol Suite).

NOTE: IP version 6 (IPv6) is not supported as a network protocol in application definitions.


By default, the twice NAT feature can affect IP, TCP, and UDP headers embedded in the payload
of ICMP error messages. You can include the protocol tcp and protocol udp statements with the
application statement for twice NAT configurations. For more information about configuring
twice NAT, see Junos Address Aware Network Addressing Overview.
529

Configuring the ICMP Code and Type

The ICMP code and type provide additional specification, in conjunction with the network protocol, for
packet matching in an application definition. To configure ICMP settings, include the icmp-code and
icmp-type statements at the [edit applications application application-name] hierarchy level:

[edit applications application application-name]


icmp-code value;
icmp-type value;

You can include only one ICMP code and type value. The application-protocol statement must have the
value icmp. Table 50 on page 529 shows the list of supported ICMP values.

Table 50: ICMP Codes and Types Supported by Services Interfaces

CLI Statement Description

icmp-code This value or keyword provides more specific information than icmp-type.
Because the value’s meaning depends upon the associated icmp-type value,
you must specify icmp-type along with icmp-code. For more information,
see the Routing Policies, Firewall Filters, and Traffic Policers User Guide.

In place of the numeric value, you can specify one of the following text
synonyms (the field values are also listed). The keywords are grouped by the
ICMP type with which they are associated:

parameter-problem: ip-header-bad (0), required-option-missing (1)

redirect: redirect-for-host (1), redirect-for-network (0), redirect-for-tos-


and-host (3), redirect-for-tos-and-net (2)

time-exceeded: ttl-eq-zero-during-reassembly (1), ttl-eq-zero-during-


transit (0)

unreachable: communication-prohibited-by-filtering (13), destination-host-


prohibited (10), destination-host-unknown (7), destination-network-
prohibited (9), destination-network-unknown (6), fragmentation-
needed (4), host-precedence-violation (14), host-unreachable (1), host-
unreachable-for-TOS (12), network-unreachable (0), network-unreachable-
for-TOS (11), port-unreachable (3), precedence-cutoff-in-effect (15),
protocol-unreachable (2), source-host-isolated (8), source-route-failed (5)
530

Table 50: ICMP Codes and Types Supported by Services Interfaces (Continued)

CLI Statement Description

icmp-type Normally, you specify this match in conjunction with the protocol match
statement to determine which protocol is being used on the port. For more
information, see the Routing Policies, Firewall Filters, and Traffic Policers
User Guide.

In place of the numeric value, you can specify one of the following text
synonyms (the field values are also listed): echo-reply (0), echo-request (8),
info-reply (16), info-request (15), mask-request (17), mask-reply (18),
parameter-problem (12), redirect (5), router-advertisement (9), router-
solicit (10), source-quench (4), time-exceeded (11), timestamp (13),
timestamp-reply (14), or unreachable (3).

NOTE: If you configure an interface with an input firewall filter that includes a reject action and
with a service set that includes stateful firewall rules, the router executes the input firewall filter
before the stateful firewall rules are run on the packet. As a result, when the Packet Forwarding
Engine sends an ICMP error message out through the interface, the stateful firewall rules might
drop the packet because it was not seen in the input direction.
Possible workarounds are to include a forwarding-table filter to perform the reject action,
because this type of filter is executed after the stateful firewall in the input direction, or to
include an output service filter to prevent the locally generated ICMP packets from going to the
stateful firewall service.

Configuring Source and Destination Ports

The TCP or UDP source and destination port provide additional specification, in conjunction with the
network protocol, for packet matching in an application definition. To configure ports, include the
destination-port and source-port statements at the [edit applications application application-name]
hierarchy level:

[edit applications application application-name]


destination-port value;
source-port value;
531

You must define one source or destination port. Normally, you specify this match in conjunction with
the protocol match statement to determine which protocol is being used on the port.

You can specify either a numeric value or one of the text synonyms listed in Table 51 on page 531.

Table 51: Port Names Supported by Next Gen Services

Port Name Corresponding Port Number

snmp 161

snmptrap 162

For more information about matching criteria, see the Routing Policies, Firewall Filters, and Traffic
Policers User Guide.

Configuring the Inactivity Timeout Period

You can specify a timeout period for application inactivity. If the software has not detected any activity
during the duration, the flow becomes invalid when the timer expires. To configure a timeout period,
include the inactivity-timeout statement at the [edit applications application application-name]
hierarchy level:

[edit applications application application-name]


inactivity-timeout seconds;

The default value is 14,400 seconds. The value you configure for an application overrides any global
value configured at the [edit interfaces interface-name service-options] hierarchy level; for more
information, see Configuring Default Timeout Settings for Services Interfaces.

Configuring SIP

The Session Initiation Protocol (SIP) is a generalized protocol for communication between endpoints
involved in Internet services such as telephony, fax, video conferencing, instant messaging, and file
exchange.

The Junos OS provides ALG services in accordance with the standard described in RFC 3261, SIP:
Session Initiation Protocol. SIP flows under the Junos OS are as described in RFC 3665, Session
Initiation Protocol (SIP) Basic Call Flow Examples.
532

NOTE: Before implementing the Junos OS SIP ALG, you should be familiar with certain
limitations, discussed in "Junos OS SIP ALG Limitations" on page 539
The use of NAT in conjunction with the SIP ALG results in changes in SIP header fields due to
address translation. For an explanation of these translations, refer to "SIP ALG Interaction with
Network Address Translation" on page 533.

To implement SIP on adaptive services interfaces, you configure the application-protocol statement at
the [edit applications application application-name] hierarchy level with the value sip. In addition, there
are two other statements you can configure to modify how SIP is implemented:

• You can enable the router to accept any incoming SIP calls for the endpoint devices that are behind
the NAT firewall. When a device behind the firewall registers with the proxy that is outside the
firewall, the AS or Multiservices PIC maintains the registration state. When the learn-sip-register
statement is enabled, the router can use this information to accept inbound calls. If this statement is
not configured, no inbound calls are accepted; only the devices behind the firewall can call devices
outside the firewall.

To configure SIP registration, include the learn-sip-register statement at the [edit applications
application application-name] hierarchy level:

[edit applications application application-name]


learn-sip-register;

NOTE: The learn-sip-register statement is not applicable to the Next Gen Services MX-SPC3.

You can also manually inspect the SIP register by issuing the show services stateful-firewall sip-
register command; for more information, see the Junos OS System Basics and Services Command
Reference. The show services stateful-firewall sip-register command is not supported for Next Gen
Services.

• You can specify a timeout period for the duration of SIP calls that are placed on hold. When a call is
put on hold, there is no activity and flows might time out after the configured inactivity-timeout
period expires, resulting in call state teardown. To avoid this, when a call is put on hold, the flow
timer is reset to the sip-call-hold-timeout cycle to preserve the call state and flows for longer than
the inactivity-timeout period.
533

NOTE: The sip-call-hold-timeout statement is not applicable to the Next Gen Services MX-
SPC3.

To configure a timeout period, include the sip-call-hold-timeout statement at the [edit applications
application application-name] hierarchy level:

[edit applications application application-name]


sip-call-hold-timeout seconds;

The default value is 7200 seconds and the range is from 0 through 36,000 seconds (10 hours).

SIP ALG Interaction with Network Address Translation

The Network Address Translation (NAT) protocol enables multiple hosts in a private subnet to share a
single public IP address to access the Internet. For outgoing traffic, NAT replaces the private IP address
of the host in the private subnet with the public IP address. For incoming traffic, the public IP address is
converted back into the private address, and the message is routed to the appropriate host in the private
subnet.

Using NAT with the Session Initiation Protocol (SIP) service is more complicated because SIP messages
contain IP addresses in the SIP headers as well as in the SIP body. When using NAT with the SIP service,
the SIP headers contain information about the caller and the receiver, and the device translates this
information to hide it from the outside network. The SIP body contains the Session Description Protocol
(SDP) information, which includes IP addresses and port numbers for transmission of the media. The
device translates SDP information for allocating resources to send and receive the media.

How IP addresses and port numbers in SIP messages are replaced depends on the direction of the
message. For an outgoing message, the private IP address and port number of the client are replaced
with the public IP address and port number of the Juniper Networks firewall. For an incoming message,
the public address of the firewall is replaced with the private address of the client.

When an INVITE message is sent out across the firewall, the SIP Application Layer Gateway (ALG)
collects information from the message header into a call table, which it uses to forward subsequent
messages to the correct endpoint. When a new message arrives, for example an ACK or 200 OK, the
ALG compares the “From:, To:, and Call-ID:” fields against the call table to identify the call context of the
message. If a new INVITE message arrives that matches the existing call, the ALG processes it as a
REINVITE.

When a message containing SDP information arrives, the ALG allocates ports and creates a NAT
mapping between them and the ports in the SDP. Because the SDP requires sequential ports for the
Real-Time Transport Protocol (RTP) and Real-Time Control Protocol (RTCP) channels, the ALG provides
consecutive even-odd ports. If it is unable to find a pair of ports, it discards the SIP message.
534

This topic contains the following sections:

Outgoing Calls

When a SIP call is initiated with a SIP request message from the internal to the external network, NAT
replaces the IP addresses and port numbers in the SDP and binds the IP addresses and port numbers to
the Juniper Networks firewall. Via, Contact, Route, and Record-Route SIP header fields, if present, are
also bound to the firewall IP address. The ALG stores these mappings for use in retransmissions and for
SIP response messages.

The SIP ALG then opens pinholes in the firewall to allow media through the device on the dynamically
assigned ports negotiated based on information in the SDP and the Via, Contact, and Record-Route
header fields. The pinholes also allow incoming packets to reach the Contact, Via, and Record-Route IP
addresses and ports. When processing return traffic, the ALG inserts the original Contact, Via, Route,
and Record-Route SIP fields back into packets.

Incoming Calls

Incoming calls are initiated from the public network to public static NAT addresses or to interface IP
addresses on the device. Static NATs are statically configured IP addresses that point to internal hosts;
interface IP addresses are dynamically recorded by the ALG as it monitors REGISTER messages sent by
internal hosts to the SIP registrar. When the device receives an incoming SIP packet, it sets up a session
and forwards the payload of the packet to the SIP ALG.

The ALG examines the SIP request message (initially an INVITE) and, based on information in the SDP,
opens gates for outgoing media. When a 200 OK response message arrives, the SIP ALG performs NAT
on the IP addresses and ports and opens pinholes in the outbound direction. (The opened gates have a
short time-to-live, and they time out if a 200 OK response message is not received quickly.)

When a 200 OK response arrives, the SIP proxy examines the SDP information and reads the IP
addresses and port numbers for each media session. The SIP ALG on the device performs NAT on the
addresses and port numbers, opens pinholes for outbound traffic, and refreshes the timeout for gates in
the inbound direction.

When the ACK arrives for the 200 OK, it also passes through the SIP ALG. If the message contains SDP
information, the SIP ALG ensures that the IP addresses and port numbers are not changed from the
previous INVITE—if they are, the ALG deletes old pinholes and creates new pinholes to allow media to
pass through. The ALG also monitors the Via, Contact, and Record-Route SIP fields and opens new
pinholes if it determines that these fields have changed.

Forwarded Calls

A forwarded call is when, for example, user A outside the network calls user B inside the network, and
user B forwards the call to user C outside the network. The SIP ALG processes the INVITE from user A
535

as a normal incoming call. But when the ALG examines the forwarded call from B to C outside the
network and notices that B and C are reached using the same interface, it does not open pinholes in the
firewall, because media will flow directly between user A and user C.

Call Termination

The BYE message terminates a call. When the device receives a BYE message, it translates the header
fields just as it does for any other message. But because a BYE message must be acknowledged by the
receiver with a 200 OK, the ALG delays call teardown for five seconds to allow time for transmission of
the 200 OK.

Call Re-INVITE Messages

Re-INVITE messages add new media sessions to a call and remove existing media sessions. When new
media sessions are added to a call, new pinholes are opened in the firewall and new address bindings are
created. The process is identical to the original call setup. When one or more media sessions are
removed from a call, pinholes are closed and bindings released just as with a BYE message.

Call Session Timers

The SIP ALG uses the Session-Expires value to time out a session if a Re-INVITE or UPDATE message is
not received. The ALG gets the Session-Expires value, if present, from the 200 OK response to the
INVITE and uses this value for signaling timeout. If the ALG receives another INVITE before the session
times out, it resets all timeout values to this new INVITE or to default values, and the process is
repeated.

As a precautionary measure, the SIP ALG uses hard timeout values to set the maximum amount of time
a call can exist. This ensures that the device is protected should one of the following events occur:

• End systems crash during a call and a BYE message is not received.

• Malicious users never send a BYE in an attempt to attack a SIP ALG.

• Poor implementations of SIP proxy fail to process Record-Route and never send a BYE message.

• Network failures prevent a BYE message from being received.

Call Cancellation

Either party can cancel a call by sending a CANCEL message. Upon receiving a CANCEL message, the
SIP ALG closes pinholes through the firewall—if any have been opened—and releases address bindings.
Before releasing the resources, the ALG delays the control channel age-out for approximately five
seconds to allow time for the final 200 OK to pass through. The call is terminated when the five second
timeout expires, regardless of whether a 487 or non-200 response arrives.
536

Forking

Forking enables a SIP proxy to send a single INVITE message to multiple destinations simultaneously.
When the multiple 200 OK response messages arrive for the single call, the SIP ALG parses but updates
call information with the first 200 OK messages it receives.

SIP Messages

The SIP message format consists of a SIP header section and the SIP body. In request messages, the first
line of the header section is the request line, which includes the method type, request-URI, and protocol
version. In response messages, the first line is the status line, which contains a status code. SIP headers
contain IP addresses and port numbers used for signaling. The SIP body, separated from the header
section by a blank line, is reserved for session description information, which is optional. Junos OS
currently supports the SDP only. The SIP body contains IP addresses and port numbers used to
transport the media.

SIP Headers

In the following sample SIP request message, NAT replaces the IP addresses in the header fields to hide
them from the outside network.

INVITE [email protected] SIP/2.0


Via: SIP/2.0/UDP 10.150.20.3:5434
From: [email protected]
To: [email protected]
Call-ID: [email protected]
Contact: [email protected]:5434
Route: <sip:[email protected]:5060>
Record-Route: <sip:[email protected]:5060>

How IP address translation is performed depends on the type and direction of the message. A message
can be any of the following:

• Inbound request

• Outbound response

• Outbound request

• Inbound response

Table 52 on page 537 shows how NAT is performed in each of these cases. Note that for several of the
header fields the ALG determine more than just whether the messages comes from inside or outside the
537

network. It must also determine what client initiated the call, and whether the message is a request or
response.

Table 52: Requesting Messages with NAT Table

Inbound Request To: Replace domain with local address

(from public to
private) From: None

Call-ID: None

Via: None

Request-URI: Replace ALG address with local address

Contact: None

Record-Route: None

Route: None

Outbound To: Replace ALG address with local address


Response

(from private to From: None


public)

Call-ID: None

Via: None

Request-URI: N/A

Contact: Replace local address with ALG address

Record-Route: Replace local address with ALG address


538

Route: None

Outbound To: None


Request

(from private to From: Replace local address with ALG address


public)

Call-ID: None

Via: Replace local address with ALG address

Request-URI: None

Contact: Replace local address with ALG address

Record-Route: Replace local address with ALG address

Route: Replace ALG address with local address

Outbound To: None


Response

(from public to From: Replace ALG address with local address


private)

Call-ID: None

Via: Replace ALG address with local address

Request-URI: N/A

Contact: None

Record-Route: Replace ALG address with local address


539

Route: Replace ALG address with local address

SIP Body

The SDP information in the SIP body includes IP addresses the ALG uses to create channels for the
media stream. Translation of the SDP section also allocates resources, that is, port numbers to send and
receive the media.

The following excerpt from a sample SDP section shows the fields that are translated for resource
allocation.

o=user 2344234 55234434 IN IP4 10.150.20.3


c=IN IP4 10.150.20.3
m=audio 43249 RTP/AVP 0

SIP messages can contain more than one media stream. The concept is similar to attaching multiple files
to an e-mail message. For example, an INVITE message sent from a SIP client to a SIP server might have
the following fields:

c=IN IP4 10.123.33.4


m=audio 33445 RTP/AVP 0
c=IN IP4 10.123.33.4
m=audio 33447 RTP/AVP 0
c=IN IP4 10.123.33.4
m=audio 33449 RTP/AVP 0

Junos OS supports up to 6 SDP channels negotiated for each direction, for a total of 12 channels per
call.

Junos OS SIP ALG Limitations

The following limitations apply to configuration of the SIP ALG:

• Only the methods described in RFC 3261 are supported.

• Only SIP version 2 is supported.

• TCP is not supported as a transport mechanism for signaling messages for MS-MPCs but is
supported for Next Gen Services.
540

• Do not configure the SIP ALG when using STUN. if clients use STUN/TURN to detect the firewall or
NAT devices between the caller and responder or proxy, the client attempts to best-guess the NAT
device behavior and act accordingly to place the call.

• On MS-MPCs, do not use the endpoint-independent mapping NAT pool option in conjunction with
the SIP ALG. Errors will result. This does not apply to Next Gen Services.

• IPv6 signaling data is not supported for MS-MPCs but is supported for Next Gen Services.

• Authentication is not supported.

• Encrypted messages are not supported.

• SIP fragmentation is not supported for MS-MPCs but is supported for Next Gen Services.

• The maximum UDP packet size containing a SIP message is assumed to be 9 KB. SIP messages larger
than this are not supported.

• The maximum number of media channels in a SIP message is assumed to be six.

• Fully qualified domain names (FQDNs) are not supported in critical fields.

• QoS is not supported. SIP supports DSCP rewrites.

• High availability is not supported, except for warm standby.

• A timeout setting of never is not supported on SIP or NAT.

• Multicast (forking proxy) is not supported.

Configuring an SNMP Command for Packet Matching

You can specify an SNMP command setting for packet matching. To configure SNMP, include the snmp-
command statement at the [edit applications application application-name] hierarchy level:

[edit applications application application-name]


snmp-command value;

The supported values are get, get-next, set, and trap. You can configure only one value for matching.
The application-protocol statement at the [edit applications application application-name] hierarchy
level must have the value snmp.

RELATED DOCUMENTATION

ALGs Available for Junos OS Address Aware NAT


541

Examples: Configuring Application Protocols

The following example shows an application protocol definition describing a special FTP application
running on port 78:

[edit applications]
application my-ftp-app {
application-protocol ftp;
protocol tcp;
destination-port 78;
timeout 100; # inactivity timeout for FTP service
}

The following example shows a special ICMP protocol (application-protocol icmp) of type 8 (ICMP
echo):

[edit applications]
application icmp-app {
application-protocol icmp;
protocol icmp;
icmp-type icmp-echo;
}

The following example shows a possible application set:

[edit applications]
application-set basic {
http;
ftp;
telnet;
nfs;
icmp;
}

The software includes a predefined set of well-known application protocols. The set includes
applications for which the TCP and UDP destination ports are already recognized by stateless firewall
filters.
542

Verifying the Output of ALG Sessions

IN THIS SECTION

FTP Example | 542

RTSP ALG Example | 548

System Log Messages | 552

This section contains examples of successful output from ALG sessions and information on system log
configuration. You can compare the results of your sessions to check whether the configurations are
functioning correctly.

FTP Example

This example analyzes the output during an active FTP session. It consists of four different flows; two
are control flows and two are data flows. The example consists of the following parts:

Sample Output

MS-MPC Card

For MS-MPCs, the following is a complete sample output from the show services stateful-firewall
conversations application-protocol ftp operational mode command:

user@host>show services stateful-firewall conversations application-protocol ftp


Interface: ms-1/3/0, Service set: CLBJI1-AAF001
Conversation: ALG protocol: ftp
Number of initiators: 2, Number of responders: 2
Flow State Dir Frm count
TCP 1.1.79.2:14083 -> 2.2.2.2:21 Watch I 13
NAT source 1.1.79.2:14083 -> 194.250.1.237:50118
TCP 1.1.79.2:14104 -> 2.2.2.2:20 Forward I 3
NAT source 1.1.79.2:14104 -> 194.250.1.237:50119
TCP 2.2.2.2:21 -> 194.250.1.237:50118 Watch O 12
NAT dest 194.250.1.237:50118 -> 1.1.79.2:14083
543

TCP 2.2.2.2:20 -> 194.250.1.237:50119 Forward O 5


NAT dest 194.250.1.237:50119 -> 1.1.79.2:14104

For each flow, the first line shows flow information, including protocol (TCP), source address, source
port, destination address, destination port, flow state, direction, and frame count.

• The state of a flow can be Watch, Forward, or Drop:

• A Watch flow state indicates that the control flow is monitored by the ALG for information in the
payload. NAT processing is performed on the header and payload as needed.

• A Forward flow forwards the packets without monitoring the payload. NAT is performed on the
header as needed.

• A Drop flow drops any packet that matches the 5 tuple.

• The frame count (Frm count) shows the number of packets that were processed on that flow.

The second line shows the NAT information.

• source indicates source NAT.

• dest indicates destination NAT.

• The first address and port in the NAT line are the original address and port being translated for that
flow.

• The second address and port in the NAT line are the translated address and port for that flow.

MX-SPC3 Card

On the MX-SPC3 services card, the following is a complete sample output from the show services
sessions application-protocol ftp operational mode command:

user@host>show services sessions application-protocol ftp


Session ID: 536870917, Service-set: ss1, Policy name: p1/131085, Timeout: 1,
Valid
Logical system: root-logical-system
Resource information : FTP ALG, 1, 1
In: 12.10.10.10/35281 --> 22.20.20.3/8204;tcp, Conn Tag: 0x0, If:
vms-2/0/0.100, Pkts: 6, Bytes: 320,
Out: 22.20.20.3/8204 --> 60.1.1.2/48747;tcp, Conn Tag: 0x0, If: vms-2/0/0.200,
Pkts: 9, Bytes: 8239,

Session ID: 536870919, Service-set: ss1, Policy name: p1/131085, Timeout: 29,
544

Valid
Logical system: root-logical-system
Resource information : FTP ALG, 1, 0
In: 12.10.10.10/44194 --> 22.20.20.3/21;tcp, Conn Tag: 0x0, If: vms-2/0/0.100,
Pkts: 13, Bytes: 585,
Out: 22.20.20.3/21 --> 60.1.1.2/48660;tcp, Conn Tag: 0x0, If: vms-2/0/0.200,
Pkts: 11, Bytes: 650,
Total sessions: 2

For each session:

• The first line shows flow information, including session ID, service-set name, policy name, session
timeout, logical system name, and its state.

• The second line, Resource information, indicates the session is created by ALG, including the ALG
name (FTP ALG) and ASL group id, which is 1and the ASL resource id, which is 0 for control session
and 1 for data session.

• The third line In is forward flow and the fourth line Out is reverse flow, including the source address,
source port, destination address, destination port, protocol (TCP), session conn-tag, incoming for
Inand outgoing for Out interface, received frame count and bytes. NAT is performed on the header
as needed.

FTP System Log Messages

System log messages are generated during an FTP session. For more information about system logs, see
"System Log Messages" on page 552.

MS-MPC Card

The following system log messages are generated during creation of the FTP control flow:

• Rule Accept system log:

Oct 27 11:42:54 (FPC Slot 1, PIC Slot 1) {ss_ftp}[FWNAT]:


ASP_SFW_RULE_ACCEPT: proto 6 (TCP) application: ftp, fe-3/3/3.0:1.1.1.2:4450 -
> 2.2.2.2:21, Match SFW accept rule-set:, rule: ftp, term: 1
545

• Create Accept Flow system log:

Oct 27 11:42:54 (FPC Slot 1, PIC Slot 1) {ss_ftp}[FWNAT]:


ASP_SFW_CREATE_ACCEPT_FLOW: proto 6 (TCP) application: ftp,
fe-3/3/3.0:1.1.1.2:4450 -> 2.2.2.2:21, creating forward or watch flow

• System log for data flow creation:

Oct 27 11:43:30 (FPC Slot 1, PIC Slot 1) {ss_ftp}[FWNAT]:


ASP_SFW_FTP_ACTIVE_ACCEPT: proto 6 (TCP) application: ftp,
so-2/1/2.0:2.2.2.2:20 -> 1.1.1.2:50726, Creating FTP active mode forward flow

MX-SPC3 CardCard

The following system log messages are generated during creation of the FTP control flow:

• System log for FTP control session creation:

Mar 23 23:58:54 esst480r RT_FLOW: RT_FLOW_SESSION_CREATE_USF: Tag svc-set-


name ss1: session created 20.1.1.2/52877->30.1.1.2/21 0x0 junos-ftp
20.1.1.2/52877->30.1.1.2/21 0x0 N/A N/A N/A N/A 6 p1 ss1-ZoneIn ss1-ZoneOut
818413576 N/A(N/A) ge-1/0/2.0 UNKNOWN UNKNOWN UNKNOWN N/A N/A -1 N/A

Mar 23 23:59:00 esst480r junos-alg: RT_ALG_FTP_ACTIVE_ACCEPT:


application:ftp data, vms-3/0/0.0 30.1.1.2:20 -> 20.1.1.2:33947 (TCP)

• System log for FTP data session creation:

Mar 23 23:59:00 esst480r RT_FLOW: RT_FLOW_SESSION_CREATE_USF: Tag svc-set-


name ss1: session created 30.1.1.2/20->20.1.1.2/33947 0x0 junos-ftp-data
30.1.1.2/20->20.1.1.2/33947 0x0 N/A N/A N/A N/A 6 p1 ss1-ZoneOut ss1-ZoneIn
818413577 N/A(N/A) ge-1/1/6.0 FTP-DATA UNKNOWN UNKNOWN Infrastructure File-
Servers 2 N/A
546

• System log for FTP data session destroy:

Mar 23 23:59:02 esst480r RT_FLOW: RT_FLOW_SESSION_CLOSE_USF: Tag svc-set-


name ss1: session closed TCP FIN: 30.1.1.2/20->20.1.1.2/33947 0x0 junos-ftp-
data 30.1.1.2/20->20.1.1.2/33947 0x0 N/A N/A N/A N/A 6 p1 ss1-ZoneOut ss1-
ZoneIn 818413577 2954(4423509) 281(14620) 2 FTP-DATA UNKNOWN N/A(N/A)
ge-1/1/6.0 No Infrastructure File-Servers 2 N/A

• System log for FTP control session destroy:

Mar 23 23:59:39 esst480r RT_FLOW: RT_FLOW_SESSION_CLOSE_USF: Tag svc-set-


name ss1: session closed Closed by junos-tcp-clt-emul: 20.1.1.2/52877-
>30.1.1.2/21 0x0 junos-ftp 20.1.1.2/52877->30.1.1.2/21 0x0 N/A N/A N/A N/A 6
p1 ss1-ZoneIn ss1-ZoneOut 818413576 23(1082) 18(1176) 45 UNKNOWN UNKNOWN
N/A(N/A) ge-1/0/2.0 No N/A N/A -1 N/A

Analysis

Control Flows

MS-MPC Card

The control flows are established after the three-way handshake is complete.

• Control flow from FTP client to FTP server. TCP destination port is 21.

TCP 1.1.79.2:14083 -> 2.2.2.2:21 Watch I


13
NAT source 1.1.79.2:14083 -> 194.250.1.237:50118

• Control flow from FTP server to FTP client. TCP source port is 21.

TCP 2.2.2.2:21 -> 194.250.1.237:50118 Watch O


12
NAT dest 194.250.1.237:50118 -> 1.1.79.2:14083
547

MX-SPC3 Card

The control flows are established after the three-way handshake is complete.

• Control session from FTP client to FTP server, TCP destination port is 21.

Session ID: 536870919, Service-set: ss1, Policy name: p1/131085, Timeout: 29,
Valid
Logical system: root-logical-system
Resource information : FTP ALG, 1, 0
In: 12.10.10.10/44194 --> 22.20.20.3/21;tcp, Conn Tag: 0x0, If:
vms-2/0/0.100, Pkts: 13, Bytes: 585,
Out: 22.20.20.3/21 --> 60.1.1.2/48660;tcp, Conn Tag: 0x0, If:
vms-2/0/0.200, Pkts: 11, Bytes: 650,

• Data session from FTP client to FTP server, it’s for FTP passive mode.

Session ID: 536870917, Service-set: ss1, Policy name: p1/131085, Timeout: 1,


Valid
Logical system: root-logical-system
Resource information : FTP ALG, 1, 1
In: 12.10.10.10/35281 --> 22.20.20.3/8204;tcp, Conn Tag: 0x0, If:
vms-2/0/0.100, Pkts: 6, Bytes: 320,
Out: 22.20.20.3/8204 --> 60.1.1.2/48747;tcp, Conn Tag: 0x0, If:
vms-2/0/0.200, Pkts: 9, Bytes: 8239,

• Data session from FTP server to FTP client, it’s for FTP active mode:

Session ID: 549978117, Service-set: ss1, Policy name: p1/131085, Timeout: 1,


Valid
Logical system: root-logical-system
Resource information : FTP ALG, 1, 1
In: 22.20.20.3/20 --> 60.1.1.3/6049;tcp, Conn Tag: 0x0, If: vms-2/0/0.200,
Pkts: 10, Bytes: 8291,
Out: 12.10.10.10/33203 --> 22.20.20.3/20;tcp, Conn Tag: 0x0, If:
vms-2/0/0.100, Pkts: 5, Bytes: 268,
548

Data Flows

A data port of 20 is negotiated for data transfer during the course of the FTP control protocol. These
two flows are data flows between the FTP client and the FTP server:

TCP 1.1.79.2:14104 -> 2.2.2.2:20 Forward I 3


NAT source 1.1.79.2:14104 -> 194.250.1.237:50119
TCP 2.2.2.2:20 -> 194.250.1.237:50119 Forward O 5
NAT dest 194.250.1.237:50119 -> 1.1.79.2:14104

Troubleshooting Questions

1. How do I know if the FTP ALG is active?

• The ALG protocol field in the conversation should display ftp.

• There should be a valid frame count (Frm count) in the control flows.

• A valid frame count in the data flows indicates that data transfer has taken place.

2. What do I need to check if the FTP connection is established but data transfer does not take place?

• Most probably, the control connection is up, but the data connection is down.

• Check the conversations output to determine whether both the control and data flows are
present.

3. How do I interpret each flow? What does each flow mean?

• FTP control flow initiator flow—Flow with destination port 21

• FTP control flow responder flow—Flow with source port ;21

• FTP data flow initiator flow—Flow with destination port 20

• FTP data flow responder flow—Flow with source port 20

RTSP ALG Example

The following is an example of an RTSP conversation. The application uses the RTSP protocol for control
connection. Once the connection is set up, the media is sent using UDP protocol (RTP).

This example consists of the following:


549

Sample Output for MS-MPCs

Here is the output from the show services stateful-firewall conversations operational mode command:

user@host# show services stateful-firewall conversations


Interface: ms-3/2/0, Service set: svc_set
Conversation: ALG protocol: rtsp
Number of initiators: 5, Number of responders: 5
Flow State Dir Frm count
TCP 1.1.1.3:58795 -> 2.2.2.2:554 Watch I 7
UDP 1.1.1.3:1028 -> 2.2.2.2:1028 Forward I 0
UDP 1.1.1.3:1029 -> 2.2.2.2:1029 Forward I 0
UDP 1.1.1.3:1030 -> 2.2.2.2:1030 Forward I 0
UDP 1.1.1.3:1031 -> 2.2.2.2:1031 Forward I 0
TCP 2.2.2.2:554 -> 1.1.1.3:58795 Watch O 5
UDP 2.2.2.2:1028 -> 1.1.1.3:1028 Forward O 6
UDP 2.2.2.2:1029 -> 1.1.1.3:1029 Forward O 0
UDP 2.2.2.2:1030 -> 1.1.1.3:1030 Forward O 3
UDP 2.2.2.2:1031 -> 1.1.1.3:1031 Forward O 0

Sample Output for MX-SPC3 Services Card

Here is the output from the show services sessions application-protocol rtsp operational mode
command:

user@host# run show services sessions application-protocol rtsp


Session ID: 1073741828, Service-set: sset1, Policy name: p1/131081, Timeout:
116, Valid
Logical system: root-logical-system
Resource information : RTSP ALG, 1, 0
In: 31.0.0.2/33575 --> 41.0.0.2/554;tcp, Conn Tag: 0x0, If: vms-4/0/0.1, Pkts:
8, Bytes: 948,
Out: 41.0.0.2/554 --> 131.10.0.1/7777;tcp, Conn Tag: 0x0, If: vms-4/0/0.2,
Pkts: 6, Bytes: 1117,

Session ID: 1073741829, Service-set: sset1, Policy name: p1/131081, Timeout:


120, Valid
Logical system: root-logical-system
Resource information : RTSP ALG, 1, 1
In: 41.0.0.2/35004 --> 131.10.0.1/7780;udp, Conn Tag: 0x0, If: vms-4/0/0.2,
550

Pkts: 220, Bytes: 79200,


Out: 31.0.0.2/30004 --> 41.0.0.2/35004;udp, Conn Tag: 0x0, If: vms-4/0/0.1,
Pkts: 0, Bytes: 0,

Session ID: 1073741830, Service-set: sset1, Policy name: p1/131081, Timeout:


120, Valid
Logical system: root-logical-system
Resource information : RTSP ALG, 1, 4
In: 41.0.0.2/35006 --> 131.10.0.1/7781;udp, Conn Tag: 0x0, If: vms-4/0/0.2,
Pkts: 220, Bytes: 174240,
Out: 31.0.0.2/30006 --> 41.0.0.2/35006;udp, Conn Tag: 0x0, If: vms-4/0/0.1,
Pkts: 0, Bytes: 0,
Total sessions: 3

Analysis

An RTSP conversation should consist of TCP flows corresponding to the RTSP control connection. There
should be two flows, one in each direction, from client to server and from server to client:

TCP 1.1.1.3:58795 -> 2.2.2.2:554 Watch I 7


TCP 2.2.2.2:554 -> 1.1.1.3:58795 Watch O 5

• The RTSP control connection for the initiator flow is sent from destination port 554.

• The RTSP control connection for the responder flow is sent from source port 554.

The UDP flows correspond to RTP media sent over the RTSP connection.

Troubleshooting Questions

1. Media does not work when the RTSP ALG is configured. What do I do?

• Check RTSP conversations to see whether both TCP and UDP flows exist.

• The ALG protocol should be displayed as rtsp.

NOTE: The state of the flow is displayed as Watch, because the ALG processing is taking
place and the client is essentially “watching” or processing payload corresponding to the
application. For FTP and RTSP ALG flows, the control connections are always Watch flows.
551

2. How do I check for ALG errors?

• You can check for errors by issuing the following command. Each ALG has a separate field for ALG
packet errors.

user@host# show services stateful-firewall statistics extensive


Interface: ms-3/2/0
Service set: svc_set
New flows:
Accepts: 1347, Discards: 0, Rejects: 0
Existing flows:
Accepts: 144187, Discards: 0, Rejects: 0
Drops:
IP option: 0, TCP SYN defense: 0
NAT ports exhausted: 0
Errors:
IP: 0, TCP: 276
UDP: 0, ICMP: 0
Non-IP packets: 0, ALG: 0
IP errors:
IP packet length inconsistencies: 0
Minimum IP header length check failures: 0
Reassembled packet exceeds maximum IP length: 0
Illegal source address: 0
Illegal destination address: 0
TTL zero errors: 0, Illegal IP protocol number (0 or 255): 0
Land attack: 0
Non-IPv4 packets: 0, Bad checksum: 0
Illegal IP fragment length: 0
IP fragment overlap: 0
IP fragment reassembly timeout: 0
Unknown: 0
TCP errors:
TCP header length inconsistencies: 0
Source or destination port number is zero: 0
Illegal sequence number and flags combinations: 0
SYN attack (multiple SYN messages seen for the same flow): 276
First packet not a SYN message: 0
TCP port scan (TCP handshake, RST seen from server for SYN): 0
Bad SYN cookie response: 0
UDP errors:
IP data length less than minimum UDP header length (8 bytes): 0
552

Source or destination port number is zero: 0


UDP port scan (ICMP error seen for UDP flow): 0
ICMP errors:
IP data length less than minimum ICMP header length (8 bytes): 0
ICMP error length inconsistencies: 0
Duplicate ping sequence number: 0
Mismatched ping sequence number: 0
ALG errors:
BOOTP: 0, DCE-RPC: 0, DCE-RPC portmap: 0
DNS: 0, Exec: 0, FTP: 0
ICMP: 0
Login: 0, NetBIOS: 0, NetShow: 0
RPC: 0, RPC portmap: 0
RTSP: 0, Shell: 0
SNMP: 0, SQLNet: 0, TFTP: 0
Traceroute: 0

System Log Messages

Enabling system log generation and checking the system log are also helpful for ALG flow analysis. This
section contains the following:

System Log Configuration

You can configure the enabling of system log messages at a number of different levels in the Junos OS
CLI. As shown in the following sample configurations, the choice of level depends on how specific you
want the event logging to be and what options you want to include. For details on the configuration
options, see the Junos OS Administration Library for Routing Devices (system level) or the Junos OS
Services Interfaces Library for Routing Devices (all other levels).

1. At the topmost global level:

user@host# show system syslog


file messages {
any any;
}
553

2. At the service set level:

user@host# show services service-set svc_set


syslog {
host local {
services any;
}
}
stateful-firewall-rules allow_rtsp;
interface-service {
service-interface ms-3/2/0;
}

3. At the service rule level:

user@host# show services stateful-firewall rule allow_rtsp


match-direction input-output;
term 0 {
from {
applications junos-rtsp;
}
then {
accept;
syslog;
}
}

System Log Output

System log messages are generated during flow creation, as shown in the following examples:

The following system log message indicates that the ASP matched an accept rule:

Oct 25 16:11:37 (FPC Slot 3, PIC Slot 2) {svc_set}[FWNAT]: ASP_SFW_RULE_ACCEPT:


proto 6 (TCP) application: rtsp, ge-2/0/1.0:1.1.1.2:35595 -> 2.2.2.2:554, Match
SFW accept rule-set: , rule: allow_rtsp, term: 0

For a complete listing of system log messages, see the System Log Explorer.
12 PART

NAT, Stateful Firewall, and IDS Flows

Inline NAT Services Overview and Configuration | 555


555

CHAPTER 34

Inline NAT Services Overview and Configuration

IN THIS CHAPTER

Inline Static Source NAT Overview | 555

Configuring Inline Static Source NAT44 for Next Gen Services | 556

Inline Static Destination NAT Overview | 560

Configuring Inline Static Destination NAT for Next Gen Services | 560

Inline Twice Static NAT Overview | 564

Configuring Inline Twice Static NAT44 for Next Gen Services | 565

Inline Static Source NAT Overview

IN THIS SECTION

Benefits | 556

Inline static source NAT uses the capabilities of the MPC line card to perform address translation,
eliminating the need for a services card.

Static source NAT performs a one-to-one static mapping of the original private domain host source
address to a public source address. A block of external addresses is set aside for this mapping, and
source addresses are translated as hosts in a private domain originate sessions to the external domain.
Static source NAT does not perform port mapping. For packets outbound from the private network,
static source NAT translates source IP addresses and related fields such as IP, TCP, UDP, and ICMP
header checksums. For inbound packets, static source NAT translates the destination IP address and the
checksums.
556

Benefits

• Allows hosts in the private network to connect with the external domain, while hiding the private
network.

• Eliminates the need for a services card

• Supports more NAT flows than a services card

Configuring Inline Static Source NAT44 for Next Gen Services

IN THIS SECTION

Configuring the Source Pool for Inline Static Source NAT44 | 556

Configuring the NAT Rule for Inline Static Source NAT44 | 557

Configuring the Service Set for Inline Static Source NAT44 | 558

Configuring Inline Services and an Inline Services Interface | 559

Configuring the Source Pool for Inline Static Source NAT44

To configure the source pool for inline static source NAT44:

1. Create a source pool.

user@host# edit services nat source pool nat-pool-name

2. Define the addresses or subnets to which source addresses are translated.

[edit services nat source pool nat-pool-name]


user@host# set address address-prefix
557

or

[edit services nat source pool nat-pool-name]


user@host# set address address-prefix to address address-prefix

3. Configure a one-to-one static mapping of the original source addresses to the addresses in the
source pool by specifying the first address from the matching source-address prefix that is in the
source NAT rule.

[edit services nat source pool nat-pool-name]


user@host# set host-address-base ip-address

4. To allow the IP addresses of a NAT source pool to overlap with IP addresses in pools used in other
service sets, configure allow-overlapping-pools.

[edit services nat]


user@host# set allow-overlapping-pools

Configuring the NAT Rule for Inline Static Source NAT44


To configure the NAT source rule for inline static source NAT44:

1. Configure the NAT rule name.

[edit services nat source]


user@host# set rule-set rule-set-name rule rule-name

2. Specify the traffic direction to which the NAT rule set applies.

[edit services nat source rule-set rule-set-name]


user@host# set match-direction (in | out)

3. Specify the addresses that are translated by the source NAT rule.
To specify one address or prefix value:

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match source-address address
558

To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:

[edit services address-book global]


user@host# set address address-name range-address lower-limit to upper-limit
[edit services nat source rule-set rule-set-name rule rule-name]
user@host# set match source-address-name address-name

4. Specify the NAT pool that contains the addresses for translated traffic.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set then source-nat pool nat-pool-name

5. Configure the generation of a syslog when traffic matches the NAT rule conditions.

[edit services nat source rule-set rule-set-name rule rule-name then]


user@host# set syslog

Configuring the Service Set for Inline Static Source NAT44


To configure the service set for inline static source NAT44:

1. Define the service set.

[edit services]
user@host# edit service-set service-set-name

2. Configure either an interface service set, which requires a single service interface, or a next-hop
service set, which requires an inside and outside service interface.

• To configure an interface service set:

[edit services service-set service-set-name]


user@host# set interface-service service-interface si-slot-number/pic-number/0.logical-unit-
number
559

• To configure a next-hop service set:

[edit services service-set service-set-name]


[edit services service-set service-set-name]
user@host# set next-hop-service inside-service-interface vms-slot-number/pic-number/0.logical-
unit-number outside-service-interface si-slot-number/pic-number/0.logical-unit-number

3. Specify the NAT rule sets to be used with the service set.

[edit services service-set service-set-name]


user@host# set nat-rule-sets rule-set-name

Configuring Inline Services and an Inline Services Interface


To enable inline services and an inline services interface:

1. Enable inline services for the FPC and PIC slot, and define the amount of bandwidth to dedicate to
inline services.

[edit chassis si-fpc slot-number pic number]


user@host# set inline-services bandwidth (1g | 10g | 20g | 30g | 40g | 100g)

2. Configure the inline services logical interface or interfaces.

• If you are using an interface service set, configure one logical unit:

[edit interfaces si-slot-number/pic-number/0


user@host# set unit logical-unit-number family family

• If you are using a next-hop service set, configure two logical units and define the inside and
outside interfaces:

[edit interfaces si-slot-number/pic-number/0


user@host# set unit logical-unit-number family family
user@host# set unit logical-unit-number service-domain inside
user@host# set unit logical-unit-number family family
user@host# set unit logical-unit-number service-domain outside
560

Inline Static Destination NAT Overview

IN THIS SECTION

Benefits | 560

Inline static destination NAT uses the capabilities of the MPC line card to perform address translation,
eliminating the need for a services card.

Static destination NAT translates the IPv4 destination address of an incoming packet to the IPv4
address of a private server. This redirects traffic destined to a virtual host (identified by the original
destination IP address) to the real host (identified by the translated destination IP address).

Static destination NAT uses a one-to-one mapping between the original address and the translated
address; the mapping is configured statically.

Benefits

• Allows external traffic to communicate with a private host without revealing the host’s private IP
address

• Does not require port mapping

• Eliminates the need for a services card

• Supports more NAT flows than a services card

Configuring Inline Static Destination NAT for Next Gen Services

IN THIS SECTION

Configuring the Destination Pool for Inline Static Destination NAT | 561

Configuring the NAT Rule for Inline Static Destination NAT | 561

Configuring the Service Set for Inline Static Destination NAT | 563

Configuring Inline Services and an Inline Services Interface | 563


561

Configuring the Destination Pool for Inline Static Destination NAT


To configure the destination pool for inline static destination NAT:

1. Create a destination pool.

user@host# edit services nat destination pool nat-pool-name

2. Define the addresses or subnets to which destination addresses are translated.

[edit services nat destination pool nat-pool-name]


user@host# set address address-prefix

3. To allow the IP addresses of a NAT destination pool to overlap with IP addresses in pools used in
other service sets, configure allow-overlapping-pools.

[edit services nat]


user@host# set allow-overlapping-pools

Configuring the NAT Rule for Inline Static Destination NAT


To configure the NAT destination for static destination NAT:

1. Configure the NAT rule name.

[edit services destination source]


user@host# set rule-set rule-set-name rule rule-name

2. Specify the traffic direction to which the NAT rule set applies.

[edit services nat destination rule-set rule-set-name]


user@host# set match-direction (in | out)

3. Specify the source addresses of traffic that the NAT rule applies to.
To specify one address or prefix value:

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match source-address address
562

To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:

[edit services address-book global]


user@host# set address address-name range-address lower-limit to upper-limit
[edit services nat destination rule-set rule-set-name rule rule-name]
user@host# set match source-address-name address-name

4. Specify the destination addresses that the NAT rule applies to.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match destination-address address

To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:

[edit services address-book global]


user@host# set address address-name range-address lower-limit to upper-limit
[edit services nat destination rule-set rule-set-name rule rule-name]
user@host# set match destination-address-name address-name

To specify any unicast address:

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match destination-address any-unicast

5. Specify the NAT pool that contains the destination addresses for translated traffic.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set then destination-nat pool nat-pool-name

6. Configure the generation of a syslog when traffic matches the destination NAT rule match
conditions.

[edit services nat destination rule-set rule-set-name rule rule-name then]


user@host# set syslog
563

Configuring the Service Set for Inline Static Destination NAT


To configure the service set for inline static destination NAT:

1. Define the service set.

[edit services]
user@host# edit service-set service-set-name

2. Configure either an interface service set, which requires a single service interface, or a next-hop
service set, which requires an inside and outside service interface.

• To configure an interface service set:

[edit services service-set service-set-name]


user@host# set interface-service service-interface si-slot-number/pic-number/0.logical-unit-
number

• To configure a next-hop service set:

[edit services service-set service-set-name]


[edit services service-set service-set-name]
user@host# set next-hop-service inside-service-interface si-slot-number/pic-number/0.logical-unit-
number outside-service-interface si-slot-number/pic-number/0.logical-unit-number

3. Specify the NAT rule sets to be used with the service set.

[edit services service-set service-set-name]


user@host# set nat-rule-sets rule-set-name

Configuring Inline Services and an Inline Services Interface


To enable inline services and an inline services interface:

1. Enable inline services for the FPC and PIC slot, and define the amount of bandwidth to dedicate to
inline services.

[edit chassis si-fpc slot-number pic number port number]


user@host# set inline-services bandwidth (1g | 10g | 20g | 30g | 40g | 100g)

2. Configure the inline services logical interface or interfaces.


564

• If you are using an interface service set, configure one logical unit:

[edit interfaces si-slot-number/pic-number/0


user@host# set unit logical-unit-number family family

• If you are using a next-hop service set, configure two logical units and define the inside and
outside interfaces:

[edit interfaces si-slot-number/pic-number/0


user@host# set unit logical-unit-number family family
user@host# set unit logical-unit-number service-domain inside
user@host# set unit logical-unit-number family family
user@host# set unit logical-unit-number service-domain outside

Inline Twice Static NAT Overview

IN THIS SECTION

Benefits | 565

Inline twice static NAT uses the capabilities of the MPC line card to perform address translation,
eliminating the need for a services card.

Twice static NAT translates both the source and destination IP addresses. An addresses is translated
with a one-to-one static mapping to an address in a pool. Port mapping is not performed.

The original private domain host source address is translated to a public source address.

The destination address is translated to the IPv4 address of a private server. This redirects traffic
destined to a virtual host (identified by the original destination IP address) to the real host (identified by
the translated destination IP address).
565

Benefits

• Allows hosts in the private network to connect with the external domain, while hiding the private
network.

• Hides a private network

• Allows external traffic to communicate with a private host without revealing the host’s private IP
address

• Does not require port mapping

• Eliminates the need for a services card

• Supports more NAT flows than a services card

Configuring Inline Twice Static NAT44 for Next Gen Services

IN THIS SECTION

Configuring the Source and Destination Pools for Inline Twice Static NAT44 | 565

Configuring the NAT Rules for Inline Twice Static NAT44 | 566

Configuring the Service Set for Inline Twice Static NAT44 | 569

Configuring Inline Services and an Inline Services Interface | 569

Configuring the Source and Destination Pools for Inline Twice Static NAT44
To configure the source and destination pools for inline twice static NAT44:

1. Create a source pool.

user@host# edit services nat source pool nat-pool-name


566

2. Define the addresses or subnets to which source addresses are translated.

[edit services nat source pool nat-pool-name]


user@host# set address address-prefix

or

[edit services nat source pool nat-pool-name]


user@host# set address address-prefix to address address-prefix

3. Configure a one-to-one static mapping of the original source addresses to the addresses in the
source pool by specifying the first address from the matching source-address prefix that is in the
source NAT rule.

[edit services nat source pool nat-pool-name]


user@host# set host-address-base ip-address

4. Create a destination pool. Do not use the same name that you used for the source pool.

user@host# edit services nat destination pool nat-pool-name

5. Define the addresses or subnets to which destination addresses are translated.

[edit services nat destination pool nat-pool-name]


user@host# set address address-prefix

6. To allow the IP addresses of a NAT pool to overlap with IP addresses in pools used in other service
sets, configure allow-overlapping-pools.

[edit services nat]


user@host# set allow-overlapping-pools

Configuring the NAT Rules for Inline Twice Static NAT44


To configure the source and destination NAT rules for twice static NAT44:
567

1. Configure the source NAT rule name.

[edit services nat source]


user@host# set rule-set rule-set-name rule rule-name

2. Specify the traffic direction to which the source NAT rule set applies.

[edit services nat source rule-set rule-set-name]


user@host# set match-direction (in | out)

3. Specify the addresses that are translated by the source NAT rule.
To specify one address or prefix value:

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set match source-address address

To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:

[edit services address-book global]


user@host# set address address-name range-address lower-limit to upper-limit
[edit services nat source rule-set rule-set-name rule rule-name]
user@host# set match source-address-name address-name

4. Specify the source NAT pool that contains the addresses for translated traffic.

[edit services nat source rule-set rule-set-name rule rule-name]


user@host# set then source-nat pool nat-pool-name

5. Configure the generation of a syslog when traffic matches the source NAT rule conditions.

[edit services nat source rule-set rule-set-name rule rule-name then]


user@host# set syslog
568

6. Configure the destination NAT rule name.

[edit services nat destination]


user@host# set rule-set rule-set-name rule rule-name

7. Specify the traffic direction to which the destination NAT rule set applies.

[edit services nat destination rule-set rule-set-name]


user@host# set match-direction (in | out | in-out)

8. Specify the destination addresses of traffic that the destination NAT rule applies to.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match destination-address address

To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:

[edit services address-book global]


user@host# set address address-name range-address lower-limit to upper-limit
[edit services nat destination rule-set rule-set-name rule rule-name]
user@host# set match destination-address-name address-name

To specify any unicast address:

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set match destination-address any-unicast

9. Specify the destination NAT pool that contains the destination addresses for translated traffic.

[edit services nat destination rule-set rule-set-name rule rule-name]


user@host# set then destination-nat pool nat-pool-name
569

10. Configure the generation of a syslog when traffic matches the destination NAT rule match
conditions.

[edit services nat destination rule-set rule-set-name rule rule-name then]


user@host# set syslog

Configuring the Service Set for Inline Twice Static NAT44


To configure the service set for inline static NAT44:

1. Define the service set.

[edit services]
user@host# edit service-set service-set-name

2. Configure either an interface service set, which requires a single service interface, or a next-hop
service set, which requires an inside and outside service interface.

• To configure an interface service set:

[edit services service-set service-set-name]


user@host# set interface-service service-interface si-slot-number/pic-number/0.logical-unit-
number

• To configure a next-hop service set:

[edit services service-set service-set-name]


[edit services service-set service-set-name]
user@host# set next-hop-service inside-service-interface si-slot-number/pic-number/0.logical-unit-
number outside-service-interface vms-slot-number/pic-number/0.logical-unit-number

3. Specify the NAT rule sets to be used with the service set.

[edit services service-set service-set-name]


user@host# set nat-rule-sets rule-set-name

Configuring Inline Services and an Inline Services Interface


To enable inline services and an inline services interface:
570

1. Enable inline services for the FPC and PIC slot, and define the amount of bandwidth to dedicate to
inline services.

[edit chassis fpc slot-number pic number]


user@host# set inline-services bandwidth (1g | 10g | 20g | 30g | 40g | 100g)

2. Configure the inline services logical interface or interfaces.


• If you are using an interface service set, configure one logical unit:

[edit interfaces si-slot-number/pic-number/0


user@host# set unit logical-unit-number family family

• If you are using a next-hop service set, configure two logical units and define the inside and
outside interfaces:

[edit interfaces si-slot-number/pic-number/0


user@host# set unit logical-unit-number family family
user@host# set unit logical-unit-number service-domain inside
user@host# set unit logical-unit-number family family
user@host# set unit logical-unit-number service-domain outside
13 PART

Configuration Statements

Configuration Statements | 572


572

CHAPTER 35

Configuration Statements

IN THIS CHAPTER

address (Address Book Next Gen Services) | 579

address (NAT Pool Next Gen Services) | 580

address-pooling (Source NAT Next Gen Services) | 582

aggregations (IDS Screen Next Gen Services) | 583

alarm-without-drop (IDS Screen Next Gen Services) | 585

white-list | 586

allow-overlapping-pools (NAT Next Gen Services) | 588

application (NAT Next Gen Services) | 589

application-profile (Services CoS Next Gen Services) | 590

application-protocol | 592

application-set | 594

applications (Services ALGs) | 596

automatic (Source NAT Next Gen Services) | 597

bad-option (IDS Screen Next Gen Services) | 598

block-allocation (Source NAT Next Gen Services) | 599

block-frag (IDS Screen Next Gen Services) | 601

by-destination (IDS Screen Next Gen Services) | 602

bypass-traffic-on-exceeding-flow-limits | 605

by-protocol (IDS Screen Next Gen Services) | 606

by-source (IDS Screen Next Gen Services) | 609

category (System Logging) | 611

child-inactivity-timeout | 613

clat-ipv6-prefix-length | 614

clat-prefix (Source NAT Next Gen Services) | 616

clear-dont-fragment-bit (NAT Next Gen Services) | 617

close-timeout | 618
573

cos-rule-sets (Service Set Next Gen Services) | 619

cos-rules (Service Set Next Gen Services) | 621

cpu-load-threshold | 622

cpu-throttle (Next Gen Services) | 623

data (FTP) | 625

description (Security Policies Next Gen Services) | 627

destination-address (NAT Next Gen Services) | 628

destination-address-name (NAT Next Gen Services) | 629

destination-prefix (Destination NAT Next Gen Services) | 630

deterministic (Source NAT Next Gen Services) | 631

deterministic-nat-configuration-log-interval (Source NAT Next Gen Services) | 633

disable-global-timeout-override | 635

dns-filter | 636

dns-filter-template | 639

drop-member-traffic (Aggregated Multiservices) | 642

dscp (Services CoS) | 643

ds-lite | 645

ei-mapping-timeout (Source NAT Next Gen Services) | 647

enable-asymmetric-traffic-processing (Service Set Next Gen Services) | 648

enable-rejoin (Aggregated Multiservices) | 649

enable-subscriber-analysis (Services Options VMS Interfaces) | 651

event-rate (Next Gen Services Service-Set Local System Logging) | 652

file (Next Gen Services Global System Logging) | 653

files (Next Gen Services Global System Logging) | 655

filename (Next Gen Services Global System Logging) | 656

filtering-type (Source NAT Next Gen Services) | 658

fin-no-ack (IDS Screen Next Gen Services) | 659

flag (Next Gen Services Global System Logging) | 660

format (Next Gen Services Service-Set Remote System Logging) | 662

forwarding-class (Services PIC Classifiers) | 663

forwarding-class (Services PIC Classifiers) | 665

forwarding-class (Services PIC Classifiers) | 666


574

fragment (IDS Screen Next Gen Services) | 667

fragment-limit | 668

ftp (Services CoS Next Gen Services) | 670

gate-timeout | 672

general-ikeid | 673

global-dns-stats-log-timer | 674

group (Traffic Load Balancer) | 676

hash-keys (Interfaces) | 678

header-integrity-check (Next Gen Services) | 680

high-availability-options (Aggregated Multiservices) | 682

host (Next Gen Services Service-Set Remote System Logging) | 684

host-address-base (Source NAT Next Gen Services) | 685

inactivity-timeout | 686

inactivity-asymm-tcp-timeout (Service Set Next Gen Services) | 688

icmp (IDS Screen Next Gen Services) | 689

icmp-type | 690

icmpv6-malformed (IDS Screen Next Gen Services) | 691

ip (IDS Screen Next Gen Services) | 692

ipv6-extension-header (IDS Screen Next Gen Services) | 694

limit-session (IDS Screen Next Gen Services) | 697

inline-services (PIC level) | 699

ipv6-extension-header (IDS Screen Next Gen Services) | 701

instance (Traffic Load Balancer) | 703

interface-service (Services Interfaces) | 706

land (IDS Screen Next Gen Services) | 707

large (IDS Screen Next Gen Services) | 708

limit-session (IDS Screen Next Gen Services) | 709

load-balancing-options (Aggregated Multiservices) | 712

local-category (Next Gen Services Service-Set Local System Logging) | 714

local-log-tag (Next Gen Services Service-Set System Logging) | 717

loose-source-route-option (IDS Screen Next Gen Services) | 718

many-to-one (Aggregated Multiservices) | 719


575

map-e | 721

mapping-timeout (Source NAT Next Gen Services) | 724

mapping-type (Source NAT Next Gen Services) | 725

match (Next Gen Services Global System Logging) | 727

match (Services CoS Next Gen Services) | 728

match (Stateful Firewall Rule Next Gen Services) | 730

match-direction (NAT Next Gen Services) | 732

match-rules-on-reverse-flow (Next Gen Services) | 733

max-session-setup-rate (Service Set) | 734

max-sessions-per-subscriber (Service Set Next Gen Services) | 736

maximum | 737

member-failure-options (Aggregated Multiservices) | 738

member-interface (Aggregated Multiservices) | 741

mode (Next Gen Services Service-Set System Logging) | 743

name (Next Gen Services Global System Logging) | 745

nat-options (Next Gen Services) | 746

nat-rule-sets (Service Set Next Gen Services) | 747

next-hop-service | 748

no-bundle-flap | 750

no-remote-trace (Next Gen Services Global System Logging) | 751

no-translation (Source NAT Next Gen Services) | 752

no-world-readable (Next Gen Services Global System Logging) | 753

off (Destination NAT Next Gen Services) | 755

open-timeout | 756

pcp-rules | 757

ping-death (IDS Screen Next Gen Services) | 758

policy (Services CoS Next Gen Services) | 760

policy (Stateful Firewall Rules Next Gen Services) | 762

pool (Destination NAT Next Gen Services) | 763

pool (Source NAT Next Gen Services) | 765

pool (NAT Rule Next Gen Services) | 767

pool-default-port-range (Source NAT Next Gen Services) | 768


576

pool-utilization-alarm (Source NAT Next Gen Services) | 769

port (Source NAT Next Gen Services) | 770

port-forwarding (Destination NAT Next Gen Services) | 772

port-forwarding-mappings (Destination NAT Rule Next Gen Services) | 773

port-round-robin (Source NAT Next Gen Services) | 774

ports-per-session | 775

preserve-parity (Source NAT Next Gen Services) | 777

preserve-range (Source NAT Next Gen Services) | 778

profile (Traffic Load Balancer) | 779

profile (Web Filter) | 782

protocol (Applications) | 786

range (Source NAT Next Gen Services) | 788

rate (Interface Services) | 789

real-service (Traffic Load Balancer) | 791

reassembly-timeout | 792

record-route-option (IDS Screen Next Gen Services) | 794

redistribute-all-traffic (Aggregated Multiservices) | 795

redundancy-event (Services Redundancy Daemon) | 796

redundancy-options (Aggregated Multiservices) | 798

redundancy-options (Stateful Synchronization) | 800

redundancy-policy (Interchassis Services Redundancy) | 802

redundancy-set | 804

redundancy-set-id (Service Set) | 806

rejoin-timeout (Aggregated Multiservices) | 808

rpc-program-number | 809

rtlog (Next Gen Services Global System Logging) | 811

rule (Destination NAT Next Gen Services) | 812

rule (Services CoS Next Gen Services) | 814

rule (PCP) | 816

rule (Source NAT Next Gen Services) | 818

rule-set (Services CoS Next Gen Services) | 820

rule-set (Softwires Next Gen Services) | 821


577

secure-nat-mapping (Source NAT Next Gen Services) | 823

security-intelligence | 824

security-intelligence-policy | 827

security-option (IDS Screen Next Gen Services) | 829

server (pcp) | 830

service-domain | 833

service-interface (Services Interfaces) | 834

services-options (Next Gen Services Interfaces) | 836

service-set (Interfaces) | 840

service-set (Services) | 841

service-set-options (Next Gen Services Services) | 846

session-limit | 847

session-limit (Service Set Next Gen Services) | 849

session-timeout (Service Set Next Gen Services) | 850

severity (Next Gen Services Service-Set Remote System Logging) | 851

sip (Services CoS Next Gen Services) | 853

size (Next Gen Services Global System Logging) | 854

snmp-command | 856

snmp-trap-thresholds (Next Gen Services) | 857

softwire-name (Next Gen Services) | 858

softwires (Next Gen Services) | 860

softwire-name (Next Gen Services) | 862

softwire-options | 864

softwire-types (Next Gen Services) | 865

softwires-rule-set (Service Set Next Gen Services) | 869

source-address (Next Gen Services Service-Set Remote System Logging) | 870

source-address (NAT Next Gen Services) | 871

source-address-name (NAT Next Gen Services) | 872

source-port | 874

source-route-option (IDS Screen Next Gen Services) | 875

stateful-firewall-rules (Service Set Next Gen Services) | 876

stateful-firewall-rule-set (Next Gen Services) | 877


578

stateful-firewall-rule-sets (Service Set Next Gen Services) | 879

stream (Next Gen Services Service-Set Remote System Logging) | 880

stream-option (IDS Screen Next Gen Services) | 881

strict-source-route-option (IDS Screen Next Gen Services) | 882

syn-ack-ack-proxy (IDS Screen Next Gen Services) | 884

syn-fin (IDS Screen Next Gen Services) | 885

syn-frag (IDS Screen Next Gen Services) | 886

syslog (Services CoS) | 887

syslog (Next Gen Services Service-Set System Logging) | 889

tcp-no-flag (IDS Screen Next Gen Services) | 890

tcp-session (Service Set Next Gen Services) | 891

tcp-tickles (Service Set Next Gen Services) | 893

tear-drop (IDS Screen Next Gen Services) | 894

then (Services CoS Next Gen Services) | 895

then (Stateful Firewall Rule Next Gen Services) | 897

timestamp-option (IDS Screen Next Gen Services) | 899

traceoptions (Next Gen Services Service-Set Flow) | 900

traceoptions (Traffic Load Balancer) | 904

traceoptions (Next Gen Services Global System Logging) | 908

traceoptions (Next Gen Services Softwires) | 909

traffic-load-balance (Traffic Load Balancer) | 911

transport (Next Gen Services Syslog Message Security) | 913

ttl-threshold | 915

unknown-protocol (IDS Screen Next Gen Services) | 916

url-filter | 917

url-filter-profile | 920

url-filter-template | 921

uuid | 924

v6rd | 926

video (Application Profile) | 927

video (Application Profile) | 929

virtual-service (Traffic Load Balancer) | 930


579

voice | 933

voice (Application Profile) | 934

web-filter | 935

web-filter-profile | 938

winnuke (IDS Screen Next Gen Services) | 940

world-readable (Next Gen Services Global System Logging) | 941

xlat-source-rule | 942

address (Address Book Next Gen Services)

IN THIS SECTION

Syntax | 579

Hierarchy Level | 579

Description | 580

Options | 580

Required Privilege Level | 580

Release Information | 580

Syntax

address address-name range-address lower-limit to upper-limit

Hierarchy Level

[edit services address-book global]


580

Description

Configure a range of addresses that can be referenced in the match stanza of a NAT rule.

Options

lower-limit The lower end of the address range.

upper-limit The upper end of the address range.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

address (NAT Pool Next Gen Services)

IN THIS SECTION

Syntax | 581

Hierarchy Level | 581

Description | 581

Options | 581

Required Privilege Level | 581

Release Information | 581


581

Syntax

address address-prefix | address address-prefix to address address-prefix;

Hierarchy Level

[edit services nat destination pool nat-pool-name],


[edit services nat source pool nat-pool-name]

Description

Define the addresses or subnets to which source addresses or destination addresses are translated. You
can configure a single address, an address range, a single subnet, or a subnet range.

Options

address address-prefix A single address or subnet.

address address-prefix to address address-prefix An address range or a subnet range.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.


582

address-pooling (Source NAT Next Gen Services)

IN THIS SECTION

Syntax | 582

Hierarchy Level | 582

Description | 582

Options | 582

Required Privilege Level | 582

Release Information | 583

Syntax

address-pooling {
no-paired;
}

Hierarchy Level

[edit services nat source pool pool-name]

Description

Allow address-pooling no-paired for a source pool without port translation

Options

no-paired Allow address-pooling no-paired for a source pool without port translation.

Required Privilege Level

interface—To view this statement in the configuration.


583

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

aggregations (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 583

Hierarchy Level | 583

Description | 584

Options | 584

Required Privilege Level | 584

Release Information | 584

Syntax

aggregations {
destination-prefix-ipv6-mask prefix-length;
destination-prefix-mask prefix-length;
source-prefix-ipv6-mask prefix-length;
source-prefix-mask prefix-length;
}

Hierarchy Level

[edit services screen ids-option screen-name]


584

Description

Configure intrusion detection service session limits for individual destination subnets or source subnets
rather than individual addresses. This applies session limits to an aggregation of all sessions from or to
an individual subnet of the specified length.

For example, if you configure a value of 24 for destination-prefix-mask, then sessions to 10.1.1.2 and
10.1.1.3 are counted as sessions to the 10.1.1/24 subnet.

Options

destination-prefix-ipv6-mask prefix-length Prefix length for destination IPv6 address subnets.

• Range: 0 through 128

destination-prefix-mask prefix-length Prefix length for destination IPv4 address subnets.

• Range: 0 through 32

source-prefix-ipv6-mask prefix-length Prefix length for source IPv6 address subnets.

• Range: 0 through 128

source-prefix-mask prefix-length Prefix length for source IPv4 address subnets.

• Range: 0 through 32

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
585

alarm-without-drop (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 585

Hierarchy Level | 585

Description | 585

Required Privilege Level | 585

Release Information | 585

Syntax

alarm-without-drop;

Hierarchy Level

[edit services screen ids-option screen-name]

Description

Configure the IDS screen to log an alarm for an offending packet, but not drop the packet. The screen
skips the rest of the screen checks. The packet is not counted as a dropped packet.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.


586

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

white-list

IN THIS SECTION

Syntax | 586

Hierarchy Level | 586

Description | 587

Options | 587

Required Privilege Level | 587

Release Information | 587

Syntax

white-list name {
destination-address [address];
source-address [address];
}

Hierarchy Level

[edit security screen ids-option screen-name tcp syn-flood]


[edit security screen ids-option screen-name udp flood]
[edit tenants tenant-name security screen]
[edit services screen ids-option screen-name limit-session by-destination by-
protocol tcp]
[edit services screen ids-option screen-name limit-session by-destination by-
protocol udp]
[edit services screen ids-option screen-name limit-session by-source by-protocol
tcp]
587

[edit services screen ids-option screen-name limit-session by-source by-protocol


udp]

Description

Configure a list of IP addresses that are exempt from the SYN cookie and SYN proxy mechanisms that
occur during the SYN flood screen protection process. This list of exempt addresses is called an allowlist.

You can also use this statement to configure an allowlist of IP addresses that bypass UDP flood
detection.

NOTE: This statement is not supported to create UDP flood screen allowlists on SRX5400,
SRX5600, and SRX5800 devices

Both IPv4 and IPv6 allowlists are supported. Addresses in the list must be all IPv4 or all IPv6. Each
allowlist can have up to 32 IP address prefixes.

Options

• name—The name of the allowlist.

• destination-address address—Destination IP address or an address prefix. You can configure multiple


addresses or address prefixes separated by spaces and enclosed in square brackets.

• source-address address—Source IP address or an address prefix. You can configure multiple


addresses or address prefixes separated by spaces and enclosed in square brackets.

Required Privilege Level

security—To view this statement in the configuration.

security-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 12.1.

Support for UDP flood screen allowlist introduced in Junos OS Release 17.4.

tenant option added in Junos OS Release 18.3R1.


588

Support for UDP and TCP flood screen allowlists added in Junos OS Release 20.3R1 for Next Gen
Services on MX240, MX480 and MX960 routers.

RELATED DOCUMENTATION

Attack Detection and Prevention Overview


Example: Configuring Multiple Screening Options

allow-overlapping-pools (NAT Next Gen Services)

IN THIS SECTION

Syntax | 588

Hierarchy Level | 588

Description | 588

Required Privilege Level | 589

Release Information | 589

Syntax

allow-overlapping-pools;

Hierarchy Level

[edit services nat]

Description

Specify that NAT source or destination pools can have IP addresses that overlap with IP addresses in
pools used in other service sets. However, pools that configure port-block allocation must not overlap
with other pools.
589

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

application (NAT Next Gen Services)

IN THIS SECTION

Syntax | 589

Hierarchy Level | 589

Description | 589

Required Privilege Level | 590

Release Information | 590

Syntax

application [application-name]

Hierarchy Level

[edit services nat destination rule-set rule-set rule rule-name match],


[edit services nat source rule-set rule-set rule rule-name match]

Description

Specify one or more application protocols to which the NAT rule applies. The number of applications
must not exceed 3072.
590

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

application-profile (Services CoS Next Gen Services)

IN THIS SECTION

Syntax | 590

Hierarchy Level | 591

Description | 591

Options | 591

Required Privilege Level | 591

Release Information | 591

Syntax

application-profile name {
ftp {
data {
dscp dscp;
forwarding-class
forwarding-class;
}
}
sip {
video {
dscp dscp;
forwarding-class
591

forwarding-class;
}
voice {
dscp dscp;
forwarding-class
forwarding-class;
}
}
}

Hierarchy Level

[edit services cos]

Description

Configure CoS actions for FTP and SIP traffic. The application profile can then be used in CoS rule
actions. This enables you to apply a certain DSCP, or forwarding-class to a set of L7 flows.

Options

profile-name Name of the application profile.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Class of Service for Services PICs (Next Gen Services) | 327


592

application-protocol

IN THIS SECTION

Syntax | 592

Hierarchy Level | 592

Description | 592

Options | 592

Required Privilege Level | 594

Release Information | 594

Syntax

application-protocol protocol-name;

Hierarchy Level

[edit applications application application-name]

Description

Identify the application protocol name. Application protocols are also called application layer gateways
(ALGs).

Options

protocol-name—Name of the protocol. The following protocols are supported:

1. bootp—Bootstrap protocol

2. dce-rpc—DCE RPC

3. dce-rpc-portmap—DCE RPC portmap

4. dns—Domain Name Service


593

5. exec—Remote Execution Protocol

6. ftp—File Transfer Protocol

7. h323—H.323

8. icmp—ICMP

9. iiop—Internet Inter-ORB Protocol

10. ike-esp-nat—IKE ALG

11. ip—IP

12. login—Login

13. netbios—NetBIOS

14. netshow—NetShow

15. pptp—Point-to-Point Tunneling Protocol

16. ras—Gatekeeper RAS for H323

17. realaudio—RealAudio

18. rpc—RPC

19. rpc-portmap—RPC portmap

20. rtsp—Real Time Streaming Protocol

21. shell—Shell

22. sip—Session Initiation Protocol

23. snmp—SNMP

24. sqlnet—SQLNet

25. talk–Talk Program

26. tftp–Trivial File Transfer Protocol

27. traceroute—Traceroute

28. winframe—WinFrame
594

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced before Junos OS Release 7.4.

login options introduced in Junos OS Release 7.4.

ip option introduced in Junos OS Release 8.2.

ike-esp-nat option introduced in Junos OS Release 17.1.

ras option introduced in Junos OS Release 17.1.

RELATED DOCUMENTATION

ALG Descriptions
Configuring Application Sets
Configuring Application Properties
Examples: Configuring Application Protocols
Verifying the Output of ALG Sessions

application-set

IN THIS SECTION

Syntax | 595

Hierarchy Level | 595

Description | 595

Options | 595

Required Privilege Level | 595

Release Information | 595


595

Syntax

application-set application-set-name {
application application-name;
}

Hierarchy Level

[edit applications]

Description

Configure one or more applications to include in an application set.

Options

application-set-name—Identifier of an application set.

Required Privilege Level

system-control—To add this statement to the configuration.

Release Information

Statement introduced before Junos OS Release 7.4.

RELATED DOCUMENTATION

ALG Descriptions
Configuring Application Sets
Configuring Application Properties
Examples: Configuring Application Protocols
Verifying the Output of ALG Sessions
596

applications (Services ALGs)

IN THIS SECTION

Syntax | 596

Hierarchy Level | 596

Description | 596

Required Privilege Level | 596

Release Information | 596

Syntax

applications { ... }

Hierarchy Level

[edit]

Description

Define the applications used in services.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced before Junos OS Release 7.4.


597

RELATED DOCUMENTATION

ALG Descriptions
Configuring Application Sets
Configuring Application Properties
Examples: Configuring Application Protocols
Verifying the Output of ALG Sessions

automatic (Source NAT Next Gen Services)

IN THIS SECTION

Syntax | 597

Hierarchy Level | 597

Description | 597

Options | 598

Required Privilege Level | 598

Release Information | 598

Syntax

automatic (random-allocation | round-robin);

Hierarchy Level

[edit services nat source pool nat-pool-name port]

Description

Configure automatic port assignment for source NAT with port translation, except for deterministic
NAT. Automatic port assignment uses the port range 1024 through 65535. Specify either random
allocation or round-robin allocation. Random allocation randomly assigns a port from the range 1024
598

through 65535 for each port translation. Round robin allocation first assigns port 1024, and uses the
next higher port for each successive port assignment. Round robin allocation is the default.

Options

random- Randomly assigns a port from the range 1024 through 65535 for each port
allocation translation.

round-robin First assigns port 1024, and uses the next higher port for each successive port
assignment. Round robin allocation is the default.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

bad-option (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 598

Hierarchy Level | 599

Description | 599

Required Privilege Level | 599

Release Information | 599

Syntax

bad-option;
599

Hierarchy Level

[edit services screen ids-option screen-name ip]

Description

Identify and drop any packet with incorrectly formatted IPv4 options or IPv6 extension headers.
Incorrectly formatted IPv4 options or IPv6 extension headers can cause unpredictable issues, depending
on the IP stack implementation of routers and the target.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

block-allocation (Source NAT Next Gen Services)

IN THIS SECTION

Syntax | 600

Hierarchy Level | 600

Description | 600

Options | 600

Required Privilege Level | 601

Release Information | 601


600

Syntax

block-allocation {
active-block-timeout timeout-interval;
block-size block-size;
interim-logging-interval timeout-interval;
maximum-blocks-per-host maximum-block-number
log disable | enable
}

Hierarchy Level

[edit services nat source pool nat-pool-name port]

Description

Allocate a block of ports for each subscriber to use for source NAT with port translation, except for
deterministic NAT. New requests for NAT ports for the subscriber are served from the active block.
With port block allocation, we generate one syslog log per set of ports allocated for a subscriber. This
reduces the number of logs, making it easier to track subscribers.

Options

active-block- The interval, in seconds, for which the block is active. After the timeout, a new
timeout timeout- block is allocated, even if ports are available in the active block. If you set the
interval
timeout to 0, port blocks are filled completely before a new port block is allocated,
and the last port block remains active indefinitely.

• Range: 0 through 86,400

• Default: 0

block-size block- Number of ports in a block.


size
• Range: 1 through 64,512

• Default: 128
601

interim-logging- The interval, in seconds, at which to send interim system logs for active port
interval timeout- blocks and for inactive port blocks with live sessions. This increases the reliability
interval
of system logs, which are UDP-based and can get lost in the network.

• Range: 1800 through 86,400

• Default: 0 (interim logs are disabled)

maximum-blocks- The maximum number of blocks that can be allocated to a subscriber address.
per-host
maximum-block- • Range: 1 through 512
number
• Default: 8

log disable Disable logs for port block allocation. Logs are enbled by default.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

block-frag (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 602

Hierarchy Level | 602

Description | 602

Required Privilege Level | 602

Release Information | 602


602

Syntax

block-frag;

Hierarchy Level

[edit services screen ids-option screen-name ip]

Description

Identify and drop fragmented IP packets. IP fragments might contain an attacker's attempt to exploit the
vulnerabilities in the packet reassembly code of specific IP stack implementations. When the target
receives these packets, the results can range from processing the packets incorrectly to crashing the
entire system.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

by-destination (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 603
603

Hierarchy Level | 603

Description | 604

Options | 604

Required Privilege Level | 604

Release Information | 604

Syntax

by-destination {
by-protocol {
icmp {
maximum-sessions number;
packets-rate number;
session-rate number;
}
tcp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
udp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
}
maximum-sessions number;
packet-rate number;
session-rate number;
;
}

Hierarchy Level

[edit services screen ids-option screen-name limit-session]


604

Description

Configure session limits for individual destination addresses or for individual destination subnets. This
protects against network probing attacks and network flooding attacks. You can specify limits for
specific protocols (ICMP, TCP, and UDP), or specify limits independent of a protocol. When a session
limit is exceeded for a destination, packets to the destination are dropped until the session limit is no
longer exceeded.

To specify limits for destination subnets rather than individual addresses, include the aggregations
statement at the [edit services screen ids-option screen-name] hierarchy level.

Options

maximum-sessions Specify the maximum number of concurrent sessions allowed for an individual
number destination address or subnet.

packet-rate number Specify the maximum number of packets per second allowed for an individual
destination address or subnet.

session-rate number Specify the maximum number of connections per second allowed for an
individual destination address or subnet.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
605

bypass-traffic-on-exceeding-flow-limits

IN THIS SECTION

Syntax | 605

Hierarchy Level | 605

Description | 605

Required Privilege Level | 605

Release Information | 605

Syntax

bypass-traffic-on-exceeding-flow-limits;

Hierarchy Level

[edit services service-set service-set-name service-set-options]

Description

Bypass traffic when exceeding the maximum flow limit.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 10.1.

Statement introduced in Junos OS Release 19.3R2 on MX240, MX480 and MX960 routers using the
MX-SPC3 services card.
606

RELATED DOCUMENTATION

Configuring Service Sets to be Applied to Services Interfaces

by-protocol (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 606

Hierarchy Level | 607

Description | 607

Options | 607

Required Privilege Level | 608

Release Information | 608

Syntax

by-protocol {
icmp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
tcp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
udp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
}
607

Hierarchy Level

[edit services screen ids-option screen-name limit-session by-destination],


[edit services screen ids-option screen-name limit-session by-source]

Description

Configure session limits for individual destination or source addresses, or for individual destination or
source subnets, for the specified protocol. This protects against network probing attacks and network
flooding attacks. When a session limit is exceeded for a source or destination for the protocol, packets
from the source or to the destination are dropped until the session limit is no longer exceeded.

To specify limits for destination or source subnets rather than individual addresses, include the
aggregations statement at the [edit services screen ids-option screen-name] hierarchy level.

Options

icmp Apply session limits to ICMP packets.

maximum- Specify the maximum number of concurrent ICMP sessions allowed for
sessions number individual destination or source addresses, or for individual destination or
source subnets.

packet-rate Specify the maximum number of ICMP packets per second allowed for
number individual destination or source addresses, or for individual destination or
source subnets.

session-rate Specify the maximum number of ICMP connections per second allowed for
number individual destination or source addresses, or for individual destination or
source subnets.

tcp Apply session limits to TCP packets.

maximum- Specify the maximum number of concurrent TCP sessions allowed for
sessions number individual destination or source addresses, or for individual destination or
source subnets.

packet-rate Specify the maximum number of TCP packets per second allowed for
number individual destination or source addresses, or for individual destination or
source subnets.
608

session-rate Specify the maximum number of TCP connections per second allowed for
number individual destination or source addresses, or for individual destination or
source subnets.

udp Apply session limits to UDP packets.

maximum- Specify the maximum number of concurrent UDP sessions allowed for
sessions number individual destination or source addresses, or for individual destination or
source subnets.

packet-rate Specify the maximum number of UDP packets per second allowed for
number individual destination or source addresses, or for individual destination or
source subnets.

session-rate Specify the maximum number of UDP connections per second allowed for
number individual destination or source addresses, or for individual destination or
source subnets.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
609

by-source (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 609

Hierarchy Level | 610

Description | 610

Options | 610

Required Privilege Level | 610

Release Information | 610

Syntax

by-source {
by-protocol {
icmp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
tcp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
udp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
}
maximum-sessions number;
packet-rate number;
session-rate number;
;
}
610

Hierarchy Level

[edit services screen ids-option screen-name limit-session]

Description

Configure session limits for individual source addresses or for individual source subnets. This protects
against network probing attacks and network flooding attacks. You can specify limits for specific
protocols (ICMP, TCP, and UDP), or specify limits independent of a protocol. When a session limit is
exceeded for a source, packets from the source are dropped until the session limit is no longer exceeded.

To specify limits for source subnets rather than individual addresses, include the aggregations statement
at the [edit services screen ids-option screen-name] hierarchy level.

Options

maximum-sessions Specify the maximum number of concurrent sessions allowed for an individual
number source address or subnet.

packet-rate number Specify the maximum number of packets per second allowed for an individual
source address or subnet.

session-rate number Specify the maximum number of connections per second allowed for an
individual source address or subnet.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
611

category (System Logging)

IN THIS SECTION

Syntax | 611

Hierarchy Level | 611

Description | 611

Options | 611

Required Privilege Level | 612

Release Information | 613

Syntax

category category, category....category;

Hierarchy Level

[edit services service-set service-set-name syslog stream]

Description

Specify the categories for which you want to collect logs.

Options

all All events are logged

content-security Content security events are logged

fw-auth Fw-auth events are logged

screen Screen events are logged

alg ALG events are logged


612

nat NAT events are logged

flow Flow events are logged

sctp Sctp events are logged

gtp Gtp events are logged

ipsec Ipsec events are logged

idp Idp events are logged

rtlog Rtlog events are logged

pst-ds-lite Pst-ds-lite events are logged

appqos Appqos events are logged

secintel Secintel events are logged

aamw AAMW events are logged

sfw Stateful Firewall events are logged

session Session open and close events are logged

session-open Session open events are logged

session-close Session close events are logged

urlf DNS request filtering events are logged

ha Stateful High-Availability open and close events are logged

ha-open Stateful High-Availability open events are logged

ha-close Stateful High-Availability close events are logged

pcp PCP logs

Required Privilege Level

system—To view this statement in the configuration.


613

Release Information

Statement introduced in Junos OS Release 19.3R2.

child-inactivity-timeout

IN THIS SECTION

Syntax | 613

Hierarchy Level | 613

Description | 613

Options | 614

Required Privilege Level | 614

Release Information | 614

Syntax

child-inactivity-timeout seconds;

Hierarchy Level

[edit applications application ike-esp-nat]

Description

For an IKE ALG application, configure the ESP session (IPsec data traffic) idle timeout. If no IPsec data
traffic is passed on the ESP session in this time, the session is deleted.

The IKE ALG enables the passing of IKEv1 and IPsec packets through NAPT-44 and NAT64 rules
between IPsec peers that are not NAT-T compliant.
614

Options

seconds Number of seconds.

• Default: 800 seconds

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 17.1.

RELATED DOCUMENTATION

ALG Descriptions
Configuring Application Sets
Configuring Application Properties

clat-ipv6-prefix-length

IN THIS SECTION

Syntax | 615

Hierarchy Level | 615

Description | 615

Options | 615

Required Privilege Level | 615

Release Information | 615


615

Syntax

clat-ipv6-prefix-length (32 | 40 | 48 | 56 | 64 | 96);

Hierarchy Level

[edit services nat source rule-set name rule name then source-nat]

Description

Specify the ipv6 prefix length for CLAT source address. Once you configure this command, source-
address and clat-prefix are no more mandatory configuration. It allows the NAT rules to accept the
traffic from different CLAT prefix and apply XLAT464 based on destination-address of the traffic.

Options

IPv6 prefix length options: • 32—The IPv6 prefix length of 32

• 40—The IPv6 prefix length of 40

• 48—The IPv6 prefix length of 48

• 56—The IPv6 prefix length of 56

• 64—The IPv6 prefix length of 64

• 96—The IPv6 prefix length of 96

Required Privilege Level

system—To view this statement in the configuration.

system-control—To add this statement to the configuration

Release Information

Statement introduced in Junos OS Release 21.1R1


616

clat-prefix (Source NAT Next Gen Services)

IN THIS SECTION

Syntax | 616

Hierarchy Level | 616

Description | 616

Required Privilege Level | 616

Release Information | 617

Syntax

clat-prefix clat-prefix;

Hierarchy Level

[edit services nat source rule-set rule-set rule rule-name then source-nat]

Description

Specify the customer-side translator (CLAT) IPv6 source prefix, which is used for 464XLAT.

464XLAT lets an IPv4 client with a private IP address connect to an IPv4 host over an IPv6 network. The
CLAT translates IPv4 source addresses to IPv6 by embedding the IPv4 source address in this IPv6
source prefix. The CLAT then sends the packets over an IPv6 network to the MX Series router, which
acts as a provider-side translator (PLAT). The MX translates the embedded IPv4 private IP address to a
public IPv4 address.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.


617

Release Information

Statement introduced in Junos OS Release 19.3R2.

clear-dont-fragment-bit (NAT Next Gen Services)

IN THIS SECTION

Syntax | 617

Hierarchy Level | 617

Description | 617

Required Privilege Level | 617

Release Information | 618

Syntax

set clear-dont-fragment-bit;

Hierarchy Level

[edit services nat natv6v4]

Description

Specify that the don’t fragment (DF) bit for IPv4 packet headers is cleared when the packet length is less
than 1280 bytes. Use this statement when configuring stateful NAT64, deterministic NAPT64, and
464XLAT. This prevents unnecessary creation of an IPv6 fragmentation header when translating IPv4
packets that are less than 1280 bytes.

Required Privilege Level

interface—To view this statement in the configuration.


618

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

close-timeout

IN THIS SECTION

Syntax | 618

Hierarchy Level | 618

Description | 618

Options | 619

Required Privilege Level | 619

Release Information | 619

Syntax

close-timeout seconds;

Hierarchy Level

[edit interfaces interface-name services-options]


[edit services service-set service-set-name service-set-options tcp-session

Description

Configure the timeout period for Transmission Control Protocol (TCP) session tear-down.
619

Options

seconds Timeout period.

• Default: 1 second

• Range: 2 through 300 seconds

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 12.3.

Support for Next Gen Services added in Junos OS Release 19.3R2 on MX Series MX240, MX480 and
MX960 using MX-SPC3 services card.

RELATED DOCUMENTATION

Configuring Default Timeout Settings for Services Interfaces

cos-rule-sets (Service Set Next Gen Services)

IN THIS SECTION

Syntax | 620

Hierarchy Level | 620

Description | 620

Options | 620

Required Privilege Level | 620

Release Information | 620


620

Syntax

cos-rule-sets [cos-rule-set-name];

Hierarchy Level

[edit services service-set service-set-name]

Description

Specify the services CoS rule set to apply to the service set. The service set processes the rules in the
order they appear in the rule set.

The service set that the CoS rule set is assigned to must include at least one stateful firewall rule or NAT
rule, or CoS does not work. Only stateful firewall and NAT rules can be used with CoS rules in a service
set.

Options

cos-rule-set-name Name of the services CoS rule set.

Required Privilege Level

system—To view this statement in the configuration.

system-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Class of Service for Services PICs (Next Gen Services) | 327


621

cos-rules (Service Set Next Gen Services)

IN THIS SECTION

Syntax | 621

Hierarchy Level | 621

Description | 621

Options | 621

Required Privilege Level | 622

Release Information | 622

Syntax

cos-rules [cos-rule-name];

Hierarchy Level

[edit services service-set service-set-name]

Description

Specify the CoS rules to apply to the service set. You can configure multiple rules.

The service set that the CoS rule is assigned to must include at least one stateful firewall rule or NAT
rule, or CoS does not work. Only stateful firewall and NAT rules can be used with CoS rules in a service
set.

Options

cos-rule-name CoS rule name.


622

Required Privilege Level

system—To view this statement in the configuration.

system-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Class of Service for Services PICs (Next Gen Services) | 327

cpu-load-threshold

IN THIS SECTION

Syntax | 622

Hierarchy Level | 622

Description | 623

Options | 623

Required Privilege Level | 623

Release Information | 623

Syntax

cpu-load-threshold percentage;

Hierarchy Level

[edit interfaces interface-name services-options session-limit]


623

Description

Regulate the usage of CPU resources on services cards. When the CPU usage exceeds the configured
value (percentage of the total available CPU resources), the system reduces the rate of new sessions so
that the existing sessions are not affected by low CPU availability. The CPU utilization is constantly
monitored, and if the CPU usage remains above the configured cpu-load-threshold value for a
continuous period of 5 seconds, Junos OS reduces the session rate value configured at edit interfaces
interface-name services-options session-limit rate (Interface Services) by 10%. This is repeated
until the CPU utilization comes down to the configured limit.

Options

percentage Percentage of total available CPU resources.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Release 13.2.

Support added in Junos OS Release 19.3R2for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

cpu-throttle (Next Gen Services)

IN THIS SECTION

Syntax | 624

Hierarchy Level | 624

Description | 624

Options | 625

Required Privilege Level | 625


624

Release Information | 625

Syntax

cpu-throttle {
percentage percent;
}

Hierarchy Level

[edit services screen]

Description

Specify the services card CPU utilization percentage that triggers the installation of a dynamic filter on
the PFEs of the line cards for suspicious activity. The dynamic filter drops the suspicious traffic.

In addition to this threshold, at least one of the following conditions is required to trigger the installation
of a dynamic filter:

• The packet rate from an individual source address or to an individual destination address must
exceed four times the configured packet-rate at the [edit services screen ids-option screen-name
limit-session by-source] or [edit services screen ids-option screen-name limit-session by-
destination] hierarchy level.

• The connection rate from an individual source address or to an individual destination address must
exceed four times the configured session-rate at the [edit services screen ids-option screen-name
limit-session by-source] or [edit services screen ids-option screen-name limit-session by-
destination] hierarchy level.

Dynamic filters are not created from IDS screens that use subnet aggregation.

The dynamic filter drops the suspicious traffic at the PFE, without the traffic being processed by the IDS
screen. When the packet or connection rate no longer exceeds four times the limit in the IDS screen, the
dynamic filter is removed.
625

Options

percentage percent The CPU utilization percentage.

• Range: 1 through 100

• Default: 90

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

data (FTP)

IN THIS SECTION

Syntax | 626

Hierarchy Level | 626

Description | 626

Default | 626

Required Privilege Level | 626

Release Information | 626


626

Syntax

data {
dscp (alias | bits);
forwarding-class class-name;
}

Hierarchy Level

[edit services cos application-profile profile-name ftp]

Description

Set the appropriate dscp and forwarding-class value for FTP data.

Default

By default, the system will not alter the DSCP or forwarding class for FTP data traffic.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 9.3.

RELATED DOCUMENTATION

Configuring CoS Rules on Services PICs


video (Application Profile)
voice (Application Profile)
627

description (Security Policies Next Gen Services)

IN THIS SECTION

Syntax | 627

Hierarchy Level | 627

Description | 627

Options | 627

Required Privilege Level | 627

Release Information | 628

Syntax

description description;

Hierarchy Level

[edit security ike policy policy-name],


[edit security ike proposal proposal-name],
[edit security ipsec policy policy-name],
[edit security ipsec proposal proposal-name]

Description

Enter descriptive text for an IKE policy, an IPsec policy, an IKE proposal, or an IPsec proposal.

Options

description Descriptive text.

Required Privilege Level

system—To view this statement in the configuration.


628

system-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

destination-address (NAT Next Gen Services)

IN THIS SECTION

Syntax | 628

Hierarchy Level | 628

Description | 628

Options | 629

Required Privilege Level | 629

Release Information | 629

Syntax

destination-address (address | any | any-ipv4 | any-ipv6);

Hierarchy Level

[edit services nat destination rule-set rule-set rule rule-name match],


[edit services nat source rule-set rule-set rule rule-name match]

Description

Specify the destination address that the packet must match for the NAT rule to take effect.
629

Options

address A specific address that must be matched.

any Any unicast destination address results in a match.

any-ipv4 Any IPv4 destination address results in a match.

any-ipv6 Any IPv6 destination address results in a match.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

destination-address-name (NAT Next Gen Services)

IN THIS SECTION

Syntax | 629

Hierarchy Level | 630

Description | 630

Required Privilege Level | 630

Release Information | 630

Syntax

destination-address-name address-name;
630

Hierarchy Level

[edit services nat destination rule-set rule-set rule rule-name match],


[edit services nat source rule-set rule-set rule rule-name match]

Description

Specify the name of the range of destination addresses that the packet must match for the NAT rule to
take effect. The range of addresses is configured with the address statement at the [edit services
address-book global] hierarchy level.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

destination-prefix (Destination NAT Next Gen Services)

IN THIS SECTION

Syntax | 631

Hierarchy Level | 631

Description | 631

Required Privilege Level | 631

Release Information | 631


631

Syntax

destination-prefix destination-prefix;

Hierarchy Level

[edit services nat destination rule-set rule-set rule rule-name then destination-
nat]

Description

Specify the IPv6 prefix that is used to embed an IPv4 destination address in an IPv6 address. The
destination-prefix statement is used in Stateful NAT64 and 464XLAT translations.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

deterministic (Source NAT Next Gen Services)

IN THIS SECTION

Syntax | 632

Hierarchy Level | 632

Description | 632

Options | 632

Required Privilege Level | 633


632

Release Information | 633

Syntax

deterministic {
block-size block-size;
host {
address address;
}
include-boundary-addresses;
}

Hierarchy Level

[edit services nat source pool nat-pool-name port]

Description

Configure deterministic NAT to ensure that the original internal source IPv4 or IPv6 address and port
always map to the same post-NAT IPv4 address and block of ports. In addition, the reverse mapping of a
given translated external IPv4 address and port are always mapped to the same internal IP address.

This eliminates the need for address translation logging.

Options

block-size block- The number of ports in the port block.


size
• Range: 1 to 64,512

• Default: 256

host address The first usable pre-NAT subscriber address, which is used to perform the
address deterministic NAT mapping.
633

include-boundary- Include the translation of the lowest and highest IPv4 addresses (the network and
addresses broadcast addresses) in the source address range of a NAT rule. This does not
apply to IPv6 source addresses.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Deterministic NAPT for Next Gen Services | 177

deterministic-nat-configuration-log-interval (Source NAT Next Gen


Services)

IN THIS SECTION

Syntax | 634

Hierarchy Level | 634

Description | 634

Options | 634

Required Privilege Level | 634

Release Information | 634


634

Syntax

deterministic-nat-configuration-log-interval seconds;

Hierarchy Level

[edit services nat source pool nat-pool-name port]

Description

Configure the interval at which the syslog is generated for the deterministic NAT configuration.

Options

deterministic-nat-configuration-log-interval seconds Number of seconds in the interval.

• Range: 1800 through 86400

• Default: 1800

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Deterministic NAPT for Next Gen Services | 177


635

disable-global-timeout-override

IN THIS SECTION

Syntax | 635

Hierarchy Level | 635

Description | 635

Required Privilege Level | 635

Release Information | 635

Syntax

disable-global-timeout-override;

Hierarchy Level

[edit interfaces interface-name services-options]


[edit services service-set service-set-name service-set-options

Description

Disallow overriding a global inactivity or session timeout.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 10.0.


636

Support added in Junos OS Release 20.3R1 for Next Gen Services on MX240, MX480, and MX960
routers.

RELATED DOCUMENTATION

Defining an Application Identification

dns-filter

IN THIS SECTION

Syntax | 636

Hierarchy Level | 637

Description | 637

Options | 637

Required Privilege Level | 638

Release Information | 638

Syntax

dns-filter {
database-file filename;
dns-resp-ttl seconds;
dns-server [ ip-address ];
hash-key key-string;
hash-method hash-method-name;
statistics-log-timer minutes;
wildcarding-level level;
}
637

Hierarchy Level

[edit services web-filter profile profile-name],


[edit services web-filter profile profile-name dns-filter-template template-name]

Description

Configure the settings for filtering DNS requests for disallowed website domains. Filtering can result in
either:

• Blocking access to the site by sending the client a DNS response that includes an IP address or
domain name of a sinkhole server instead of the disallowed domain.

• Logging the DNS request and allowing access.

Settings at the [edit services web-filter profile profile-name dns-filter-template template-name]


hierarchy level override the corresponding settings at the [edit services web-filter profile profile-name]
hierarchy level.

Options

database-file Name of the domain filter database file to use when filtering DNS requests.
filename
dns-resp-ttl Number of seconds to live while sending the DNS response after taking the DNS
seconds sinkhole action.

• Default: 1800

• Range: 0 through 86,400

dns-server [ ip- (Optional) IP addresses (IPv4 or IPv6) for up to three specific DNS servers. DNS
address ] filtering examines only DNS requests that are destined for those DNS servers.

hash-key key- Hash key that you used to create the hashed domain name in the domain filter
string database file.

hash-method Hash method that you used to create the hashed domain name in the domain filter
hash-method- database file. The only supported hash method is hmac-sha2-256.
name
statistics-log- Number of minutes in the interval for logging statistics for DNS requests and for
timer minutes sinkhole actions performed for each customer IP address.
638

• Default: 5

• Range: 0 through 60

wildcarding-level Level of subdomains that are searched for a match. A value of 0 indicates that
level subdomains are not searched.

For example, if you set the wildcarding-level to 4 and the database file includes an
entry for example.com, the following comparisons are made for a DNS request that
arrives with the domain 198.51.100.0.example.com:

• 198.51.100.0.example.com: no match

• 51.100.0.example.com: no match for one level down

• 100.0.example.com: no match for two levels down

• 0.example.com: no match for three levels down

• example.com: match for four levels down

• Range: 0 through 10

Required Privilege Level

system—To view this statement in the configuration.

system-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 18.3R1 on MX Series.

Support added for Next Gen Services on MX Series routers MX240, MX480 and MX960 with MX-SPC3
services cards in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

DNS Request Filtering for Disallowed Website Domains


639

dns-filter-template

IN THIS SECTION

Syntax | 639

Hierarchy Level | 640

Description | 640

Options | 640

Required Privilege Level | 641

Release Information | 641

Syntax

dns-filter-template template-name {
client-interfaces [ client-interface-name ];
client-routing-instance client-routing-instance-name;
dns-filter {
database-file filename;
dns-resp-ttl seconds;
dns-server [ ip-address ];
hash-key key-string;
hash-method hash-method-name;
statistics-log-timer minutes;
wildcarding-level level;
}
server-interfaces [ server-interface-name ];
server-routing-instance server-routing-instance-name;
term term-name {
from {
src-ip-prefix [ source-prefix ];
}
then {
accept;
dns-sinkhole;
}
640

}
}

Hierarchy Level

[edit services web-filter profile profile-name]

Description

Configure filtering of DNS requests for disallowed website domains for requests on specific uplink and
downlink logical interfaces or routing instances, or for requests from specific source IP address prefixes.
The DNS filter template overrides the corresponding settings at the DNS profile level. You can configure
up to 32 DNS filter templates in a profile.

Filtering can result in either:

• Blocking access to the site by sending the client a DNS response that includes an IP address or
domain name of a sinkhole server instead of the disallowed domain.

• Logging the DNS request and allowing access.

Options

accept Accept DNS requests for DNS filtering.

client-interfaces (Optional) Client-facing (uplink) logical interfaces on which the DNS filter
[ client-interface- template settings are applied.
name ]
client-routing- (Optional) Client-facing (uplink) routing instance on which the DNS filter
instance client- template settings are applied.
routing-instance-
name
dns-filter-template Name of the DNS filter template.
template-name
dns-sinkhole Perform the sinkhole action identified in the domain filter database for
disallowed DNS requests.

server-interfaces (Optional) Server-facing logical interfaces (downlink) on which the DNS filter
[ server-interface- template settings are applied.
name ]
server-routing- (Optional) Server-facing (downlink) routing instance on which the DNS filter
instance server- template settings are applied.
641

routing-instance-
name
NOTE: If you configure the client and server interfaces or the client and
server routing instances, implicit filters are installed on the interfaces or
routing instances to direct DNS traffic to the MS-MPC for DNS filtering.
If you configure neither the client and server interfaces nor the routing
instances, you must provide a way to direct DNS traffic to the MS-MPC
(for example, via routes).

src-ip-prefix [ source- (Optional) Source IP address prefixes of DNS requests you want to filter. You
prefix ] can configure a maximum of 64 prefixes in a term. If you do not specify any
source prefixes, then all DNS requests are filtered.

term term-name Name for a term. You can configure a maximum of 64 terms in a template.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

system—To view this statement in the configuration.

system-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 18.3R1 on MX Series.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

DNS Request Filtering for Disallowed Website Domains


642

drop-member-traffic (Aggregated Multiservices)

IN THIS SECTION

Syntax | 642

Hierarchy Level | 642

Description | 642

Default | 642

Required Privilege Level | 643

Release Information | 643

Syntax

drop-member-traffic {
rejoin-timeout rejoin-timeout;
}

Hierarchy Level

[edit interfaces interface-name load-balancing-options member-failure-options]

Description

Specify whether the broadband gateway should drop traffic to a services PIC when it fails.

For many-to-one (N:1) high availability (HA) for service applications like Network Address Translation
(NAT), this configuration is valid only when two or more services PICs have failed.

The remaining statement is explained separately. See CLI Explorer.

Default

If this statement is not configured, then the default behavior is to drop member traffic with a rejoin
timeout of 120 seconds.
643

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 11.4.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

member-failure-options (Aggregated Multiservices)


Understanding Aggregated Multiservices Interfaces
Example: Configuring an Aggregated Multiservices Interface (AMS)

dscp (Services CoS)

IN THIS SECTION

Syntax | 643

Hierarchy Level | 644

Description | 644

Options | 644

Required Privilege Level | 644

Release Information | 644

Syntax

dscp (alias | bits);


644

Hierarchy Level

[edit services cos application-profile profile-name (ftp | sip) (data | video |


voice)],
[edit services cos rule rule-name term term-name then],
[edit services cos rule rule-name term term-name then reverse]

Description

Define the Differentiated Services code point (DSCP) mapping that is applied to the packets. Change the
DSCP (or TOS) on the packet to the specified value. Any conformant bit string can be specified, but only
the default alias can be used.

Options

alias—Name assigned to a set of CoS markers.

bits—Mapping value in the packet header.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 8.1.

RELATED DOCUMENTATION

Configuring Actions in CoS Rules


Configuring CoS Rules on Services PICs
645

ds-lite

IN THIS SECTION

Syntax | 645

Hierarchy Level | 645

Description | 645

Options | 646

Required Privilege Level | 646

Release Information | 646

Syntax

ds-lite ds-lite-softwire-concentrator {
auto-update-mtu;
flow-limit flow-limit | session-limit-per-prefix session-limit-per-
prefix;
mtu-v6 bytes;
softwire-address softwire-address;
}
}

Hierarchy Level

[edit services softwire softwire-concentrator]


[edit services softwires softwire-types]

Description

Configure settings for a DS-Lite concentrator used to process IPv4 packets encapsulated in IPv6.

The ds-lite statement is supported on MX Series routers with MS-DPCs and on M Series routers with
MS-100, MS-400, and MS-500 line Multiservices PICs. Starting in Junos OS release 17.4R1, DS-Lite is
supported on MX Series routers with MS-MPCs and MS-MICs.
646

Options

bytes—Maximum transmission unit (MTU), in bytes, for encapsulating IPv4 packets into IPv6. If the final
length is greater than the configured value, the IPv6 packet is fragmented. This option is supported on
MX Series routers equipped with MS-DPCs. Starting in Junos OS release 18.1R1, this option is also
supported on MX Series routers with MS-MPCs or MS-MICs.

ds-lite-softwire-concentrator—Name applied to a DS-Lite softwire concentrator.

auto-update-mtu—This option is not currently supported.

copy-dscp—Copy DSCP information to IPv4 headers during decapsulation.

flow-limit—Maximum number of IPv4 flows per softwire.

• Range: 0 through 16384 flows

• Range: 0 through 9192 bytes

session-limit-per-prefix—Maximum number of sessions per B4 subnet prefix. This option is supported on


MX Series routers equipped with MS-DPCs. Starting in Junos OS Release 18.2R1, this option is also
supported on MS-MPCs and MS-MICs.

• Range: 0 through 16384 sessions

softwire-address—Address of the DS-Lite softwire concentrator.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 10.4.

auto-update-mtu option introduced in Junos OS Release 10.4.

copy-dscp option introduced in Junos OS Release 11.2.

mtu-v6 option introduced in Junos OS Release 10.4.

softwire-address option introduced in Junos OS Release 10.4.

Support for DS-Lite at the [edit services softwires softwire-types] added in Junos OS release 20.2R1
for Next Gen Services on MX240, MX480 and MX960 routers.
647

RELATED DOCUMENTATION

Configuring a DS-Lite Softwire Concentrator

ei-mapping-timeout (Source NAT Next Gen Services)

IN THIS SECTION

Syntax | 647

Hierarchy Level | 647

Description | 647

Options | 648

Required Privilege Level | 648

Release Information | 648

Syntax

ei-mapping-timeout ei-mapping-timeout;

Hierarchy Level

[edit services nat source pool nat-pool-name]

Description

Specify the timeout period for endpoint independent translations that use the NAT pool. Mappings that
are inactive for this amount of time are dropped.

If you do not configure ei-mapping-timeout for endpoint independent translations, then the mapping-
timeout value is used for endpoint independent translations.
648

Options

ei-mapping- The timeout period in seconds.


timeout ei-
mapping-timeout • Range: 120 through 86,400

• Default: 300 (timeout period for endpoint independent translations is set by


mapping-timeout value at the [edit services nat source pool nat-pool-name]
hierarchy level)

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

enable-asymmetric-traffic-processing (Service Set Next Gen Services)

IN THIS SECTION

Syntax | 648

Hierarchy Level | 649

Description | 649

Required Privilege Level | 649

Release Information | 649

Syntax

enable-asymmetric-traffic-processing;
649

Hierarchy Level

[edit services service-set service-set-name service-set-options]

Description

Enable the service set to handle unidirectional traffic.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

enable-rejoin (Aggregated Multiservices)

IN THIS SECTION

Syntax | 649

Hierarchy Level | 650

Description | 650

Default | 650

Required Privilege Level | 650

Release Information | 650

Syntax

enable-rejoin;
650

Hierarchy Level

[edit interfaces interface-name load-balancing-options member-failure-options


redistribute-all-traffic]

Description

Enable the failed member to rejoin the aggregated Multiservices (AMS) interface after the member
comes back online.

For many-to-one (N:1) high availability (HA) for service applications like Network Address Translation
(NAT), this configuration allows the failed members to rejoin the pool of active members automatically.

Default

If you do not configure this option, then the failed members do not automatically rejoin the ams
interface even after coming back online.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 11.4.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

redistribute-all-traffic (Aggregated Multiservices)


Understanding Aggregated Multiservices Interfaces
Example: Configuring an Aggregated Multiservices Interface (AMS)
651

enable-subscriber-analysis (Services Options VMS Interfaces)

IN THIS SECTION

Syntax | 651

Hierarchy Level | 651

Description | 651

Required Privilege Level | 651

Release Information | 652

Syntax

enable-subscriber-analysis;

Hierarchy Level

[edit interfaces interface-name services-options]

Description

Enable the creation of subscribers if the following are not configured, but you want subscribers to be
created:

• NAT

• The max-sessions-per-subscriber statement at the [edit services service-set service-set-name]


hierarchy level

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.


652

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

How to Configure Services Interfaces for Next Gen Services | 96

event-rate (Next Gen Services Service-Set Local System Logging)

IN THIS SECTION

Syntax | 652

Hierarchy Level | 652

Description | 652

Required Privilege Level | 653

Release Information | 653

Syntax

event-rate rate-per-second;

Hierarchy Level

[edit services services-set name syslog]

Description

Rate at which log messages are sent per second to the local file.
653

Required Privilege Level

system

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128

file (Next Gen Services Global System Logging)

IN THIS SECTION

Syntax | 653

Hierarchy Level | 654

Description | 654

Options | 654

Required Privilege Level | 654

Release Information | 654

Syntax

file <filename> <files files> <match match> <size size> <(world-readable | no-
world-readable)>;
654

Hierarchy Level

[edit services rtlog traceoptions]

Description

Trace file information

Options

filename Name of file in which to write trace information

files Maximum number of trace files

• Default: 3

• Range: 2 through 1000

match Regular expression for lines to be logged

no-world-readable Don't allow any user to read the log file

size Maximum trace file size

• Default: 128k

• Range: through

world-readable Allow any user to read the log file

All other options are explained separately.

Required Privilege Level

system

Release Information

Statement introduced in Junos OS Release 19.3R2.


655

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128

files (Next Gen Services Global System Logging)

IN THIS SECTION

Syntax | 655

Hierarchy Level | 655

Description | 655

Options | 656

Required Privilege Level | 656

Release Information | 656

Syntax

files files;

Hierarchy Level

[edit services rtlog traceoptions file filename]

Description

Maximum number of trace files


656

Options

files Maximum number of trace files

• Default: 3

• Range: 2 through 1000

Required Privilege Level

system

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128

filename (Next Gen Services Global System Logging)

IN THIS SECTION

Syntax | 657

Hierarchy Level | 657

Description | 657

Options | 657

Required Privilege Level | 657

Release Information | 657


657

Syntax

filename;

Hierarchy Level

[edit services rtlog traceoptions file]

Description

Name of file in which to write trace information

Options

filename Name of file in which to write trace information

Required Privilege Level

system

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128
658

filtering-type (Source NAT Next Gen Services)

IN THIS SECTION

Syntax | 658

Hierarchy Level | 658

Description | 658

Options | 658

Required Privilege Level | 659

Release Information | 659

Syntax

filtering-type {
endpoint-independent {
prefix-list [allowed-host] except [denied-host ];
}

Hierarchy Level

[edit services nat source rule-set rule-set rule rule-name then source-nat]

Description

Specify prefix lists that contain prefixes of hosts that are allowed to establish inbound connections using
endpoint-independent mapping, and prefix lists for hosts that are not allowed to establish inbound
connections. (Prefix lists are configured at the [edit policy-options] hierarchy level.)

Options

[allowed-host ] Names of the prefix lists for hosts that are allowed to establish connections.
659

except [ denied-host ] Names of prefix lists for hosts that are not allowed to establish connections.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

fin-no-ack (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 659

Hierarchy Level | 659

Description | 660

Required Privilege Level | 660

Release Information | 660

Syntax

fin-no-ack;

Hierarchy Level

[edit services screen ids-option screen-name tcp]


660

Description

Identify and drop any packet with a FIN flag set and without the ACK flag set. The TPC FIN No Ack
attack can allow the attacker to identify the operating system of the target or to identify open ports on
the target.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

flag (Next Gen Services Global System Logging)

IN THIS SECTION

Syntax | 661

Hierarchy Level | 661

Description | 661

Options | 661

Required Privilege Level | 661

Release Information | 661


661

Syntax

flag name;

Hierarchy Level

[edit services rtlog traceoptions]

Description

List of things to include in trace.

Options

name
• Values:

• all—Enable all interface trace flags. event —Trace interface events.

• cache—Enable interface flags for Web filtering cache maintained on the routing table.

• enhanced—Enable interface flags for processing through Enhanced Web Filtering.

• ipc—Trace interface IPC messages.

• media—Trace interface media changes.

• critical—Trace critical events.

• major—Trace major events

Required Privilege Level

system

Release Information

Statement introduced in Junos OS Release 19.3R2.


662

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128

format (Next Gen Services Service-Set Remote System Logging)

IN THIS SECTION

Syntax | 662

Hierarchy Level | 662

Description | 662

Options | 663

Required Privilege Level | 663

Release Information | 663

Syntax

format format;

Hierarchy Level

edit services service-set name syslog stream stream-name

Description

Specify the file format for the log messages being sent to the remote server.
663

Options

The file format can be one of the following:

binary Binary syslog defined by Juniper Networks. Requires Juniper Networks decoders on the
server side to decode the logs.

sd-syslog Structured syslog (defined by RFC5424)

syslog Traditional syslog (defined by RFC5424)

Required Privilege Level

system

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128

forwarding-class (Services PIC Classifiers)

IN THIS SECTION

Syntax | 664

Hierarchy Level | 664

Description | 664

Options | 664

Required Privilege Level | 664


664

Release Information | 664

Syntax

forwarding-class class-name;

Hierarchy Level

[edit services cos application-profile profile-name (ftp | sip) (data | video |


voice)],
[edit services cos rule rule-name term term-name then],
[edit services cos rule rule-name term term-name then reflexive; | revert; |
reverse {]

Description

Define the forwarding class to which packets are assigned.

Options

class-name—Name of the target application.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 8.1.

RELATED DOCUMENTATION

Configuring CoS Rules on Services PICs


665

forwarding-class (Services PIC Classifiers)

IN THIS SECTION

Syntax | 665

Hierarchy Level | 665

Description | 665

Options | 665

Required Privilege Level | 665

Release Information | 666

Syntax

forwarding-class class-name;

Hierarchy Level

[edit services cos application-profile profile-name (ftp | sip) (data | video |


voice)],
[edit services cos rule rule-name term term-name then],
[edit services cos rule rule-name term term-name then reverse]

Description

Assign the packets to the specified forwarding class.

Options

class-name—Name of the target application.

Required Privilege Level

interface—To view this statement in the configuration.


666

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 8.1.

RELATED DOCUMENTATION

Configuring Actions in CoS Rules

forwarding-class (Services PIC Classifiers)

IN THIS SECTION

Syntax | 666

Hierarchy Level | 666

Description | 667

Options | 667

Required Privilege Level | 667

Release Information | 667

Syntax

forwarding-class class-name;

Hierarchy Level

[edit services cos application-profile profile-name (ftp | sip) (data | video |


voice)],
[edit services cos rule rule-name term term-name then],
667

[edit services cos rule rule-name term term-name then reflexive; | revert; |
reverse {]

Description

Define the forwarding class to which packets are assigned.

Options

class-name—Name of the target application.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 8.1.

RELATED DOCUMENTATION

Configuring CoS Rules on Services PICs

fragment (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 668

Hierarchy Level | 668

Description | 668

Required Privilege Level | 668

Release Information | 668


668

Syntax

fragment;

Hierarchy Level

[edit services screen ids-option screen-name icmp]

Description

Identify and drop ICMP packets that are IP fragments. These are considered suspicious packets because
ICMP packets are usually short. When the target receives these packets, the results can range from
processing packets incorrectly to crashing the entire system.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

fragment-limit

IN THIS SECTION

Syntax | 669
669

Hierarchy Level | 669

Description | 669

Options | 669

Required Privilege Level | 669

Release Information | 670

Syntax

fragment-limit number-of-fragments;

Hierarchy Level

[edit interfaces interface-name services-options]


[edit security flow]

Description

Configure the maximum number of fragments permitted in a packet before the packet is dropped.

Options

number-of-fragments—Maximum number of fragments permitted.

• Range: 1 to 250 fragments.

• Default: 250 fragments.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.


670

Release Information

Statement introduced in Junos OS Release 12.1.

Statement added in Junos OS Release 20.3R1 for Next Gen Services on MX240, MX480, and MX960
routers.

RELATED DOCUMENTATION

Configuring Fragmentation Control for MS-DPC and MS-PIC Service Interfaces

ftp (Services CoS Next Gen Services)

IN THIS SECTION

Syntax | 670

Hierarchy Level | 671

Description | 671

Options | 671

Required Privilege Level | 671

Release Information | 671

Syntax

ftp {
data {
dscp (alias | bits);
forwarding-class class-name;
}
}
671

Hierarchy Level

[edit services cos application-profile profile-name]

Description

Configure CoS actions for FTP traffic in an application profile. The application profile can then be used in
CoS rule actions.

Options

dscp (alias | bits) Either a code point alias or a DSCP bit value to apply to the FTP packets.

forwarding-class class-name Forwarding class name to apply to the FTP packets. The choices are:

• assured-forwarding

• best-effort

• expedited-forwarding

• network-control

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Class of Service for Services PICs (Next Gen Services) | 327


672

gate-timeout

IN THIS SECTION

Syntax | 672

Hierarchy Level | 672

Description | 672

Options | 672

Required Privilege Level | 673

Release Information | 673

Syntax

gate-timeout seconds;

Hierarchy Level

[edit applications application ike-esp-nat]

Description

For an IKE ALG application, configure the length of time that can pass after IKE establishes the security
association between the IPsec client and server and before the ESP traffic starts in both directions. If the
ESP traffic has not started before this timeout value, the ESP gates are deleted and the ESP traffic is
blocked.

The IKE ALG enables the passing of IKEv1 and IPsec packets through NAPT-44 and NAT64 rules
between IPsec peers that are not NAT-T compliant.

Options

seconds Number of seconds.

• Default: 120 seconds


673

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 17.1.

RELATED DOCUMENTATION

ALG Descriptions
Configuring Application Sets
Configuring Application Properties

general-ikeid

IN THIS SECTION

Syntax | 673

Hierarchy Level | 674

Description | 674

Required Privilege Level | 674

Release Information | 674

Syntax

general-ikeid;
674

Hierarchy Level

[set security ike gateway gateway_name dynamic]

Description

During IKE Phase 1 negotiation, when negotiation request is received, there are two identity checks.

1. IKE-ID validation from ID payload.

2. 2. Phase 1 authentication by pre-shared key or RSA/DSA certificate.

Configure remote-identity to lookup the certificate of the peer for certificate authentication. This
remote-identity should match the corresponding field in the SubjectAltname extension of the peer
certificate for successful detection of peer certificate and authentication.

The identity check with the same IKE-ID is repeated, that is, the IKE-ID validation with remote-identity
and the certificate authentication. To avoid this, during authentication of remote peer, use the general-
ikeid under theset security ike gateway gateway_name dynamic hierarchy level to bypass the validation
process.

Required Privilege Level

system—To view this statement in the configuration.

system-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 21.1R1

global-dns-stats-log-timer

IN THIS SECTION

Syntax | 675

Hierarchy Level | 675


675

Description | 675

Options | 675

Required Privilege Level | 675

Release Information | 675

Syntax

global-dns-stats-log-timer minutes;

Hierarchy Level

[edit services web-filter profile profile-name]

Description

Configure the interval for logging per-client statistics for filtering of DNS requests for disallowed
website domains.

Options

minutes The number of minutes in the logging interval.

• Default: 5

• Range: 0 through 60

Required Privilege Level

system—To view this statement in the configuration.

system-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 18.3R1 on MX Series.


676

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

DNS Request Filtering for Disallowed Website Domains

group (Traffic Load Balancer)

IN THIS SECTION

Syntax | 676

Hierarchy Level | 676

Description | 677

Options | 677

Required Privilege Level | 677

Release Information | 677

Syntax

group group-name {
health-check-interface-subunit health-check-interface-subunit;
network-monitoring-profile [profile-name1, <profile-name2>];
real-service-rejoin-options no-auto-rejoin;
real-services [server-list];
<routing-instance routing-instance>;
}

Hierarchy Level

[edit services traffic-load-balance instance instance-name]


677

Description

Configure a group of servers as a pool for next-hop session distribution.

Options

group-name Use the specified string identifier for a group of servers to which sessions
are distributed using the server distribution table in conjunction with the
session distribution API.

group health-check- Use the specified subunit of the ms- interface used for health checking.
interface-subunit health-
check-interface-subunit
network-monitoring- Name of the network monitoring profile used to monitor the health of
profile profile-name1 servers in the group.

network-monitoring- (Optional) Name of a second network monitoring profile used to monitor


profile profile-name2 the health of servers in the group.

real-services server-list Use the specified list of individual servers to which sessions are distributed
using the server distribution table in conjunction with the session
distribution API.

real-services-rejoin- Disable the default behavior that allows a server to rejoin the group
options no-auto-rejoin automatically when it comes up.

routing-instance routing- (Optional) Use the specified routing instance if the default inet.0 is not
instance used.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 16.1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
678

RELATED DOCUMENTATION

Traffic Load Balancer Overview


Configuring TLB

hash-keys (Interfaces)

IN THIS SECTION

Syntax | 678

Hierarchy Level | 678

Description | 678

Options | 679

Required Privilege Level | 679

Release Information | 679

Syntax

hash-keys {
egress-key (source-ip | destination-ip);
ingress-key (source-ip | destination-ip);
ipv6-source-prefix-length ipv6-source-prefix-length;
}

Hierarchy Level

[edit interfaces unit unit-name load-balancing-options]

Description

Configure the hash keys used for load balancing in aggregated multiservices (AMS) for next-hop style
services. The hash keys supported in the ingress and egress direction are the source IP address and
destination IP address.
679

Hash keys are used to define the load-balancing behavior among the various members in the AMS. For
example, if hash-keys is configured as source-ip, then the hashing is performed based on the source IP
address of the packet, so that all packets with the same source IP address land on the same member.
When you use ingress-key and egress-key, you must configure hash keys to take the traffic direction
into consideration. For example, if you configure hash-keys as source-ip in the ingress direction, then
you must configure hash-keys as destination-ip in the egress direction. This is required to ensure that
the packets of the same flow reach the same member of the AMS group.

If you are configuring an AMS interface used in a service set for DS-Lite,

The remaining statements are explained separately. See CLI Explorer.

Options

egress-key Use the destination IP address of the flow to compute the hash used in load
destination-ip balancing. Configure the hash keys to be used in the egress flow direction.

egress-key source-ip Use the source IP address of the flow to compute the hash used in load
balancing. Configure the hash keys to be used in the egress flow direction.

ingress-key Use the destination IP address of the flow to compute the hash used in load
destination-ip balancing. Configure the hash keys to be used in the ingress flow direction.

ingress-key source- Use the source IP address of the flow to compute the hash used in load
ip balancing. Configure the hash keys to be used in the ingress flow direction.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 11.4.

ipv6-source-prefix-length option introduced in Junos OS Release 18.2R1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card. The ipv6-source-prefix-length option is not supported for
Next Gen Services.
680

RELATED DOCUMENTATION

Configuring Load Balancing on AMS Infrastructure

header-integrity-check (Next Gen Services)

IN THIS SECTION

Syntax | 680

Hierarchy Level | 680

Description | 680

Required Privilege Level | 681

Release Information | 681

Syntax

header-integrity-check {
enable-all;
}

Hierarchy Level

[edit services service-set service-set service-set-options]

Description

Drop packets that have packet header anomalies. These anomalies include:

• Not an IP packet

• Not an IPv4 packet or an IPv6 packet

• TTL error (TTL is 0)

• Bad source/destination IP
681

• IP checksum error

• Protocol error

• TCP port zero

• TCP header length error (less than 20 bytes)

• TCP SEQNUM is zero and no flags are set

• TCP SEQNUM is zero and flags are set

• No TCP flags are set

• TCP FIN with no Ack

• TCP FIN & Reset

• TCP SYN & (FIN or URG or RESET)

• UDP port zero

• UDP header length error

• ICMP header length error (not within 48-576 bytes)

• ICMP packet error length

• ICMP large packet (1024)

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
682

high-availability-options (Aggregated Multiservices)

IN THIS SECTION

Syntax | 682

Hierarchy Level | 682

Description | 682

Required Privilege Level | 683

Release Information | 683

Syntax

high-availability-options {
(many-to-one | one-to-one) {
preferred-backup preferred-backup;
}
}

Hierarchy Level

[edit interfaces interface-name load-balancing-options]

Description

Configure the high availability options for the aggregated multiservices (AMS) interface. For service
applications, if only the load-balancing feature is being used, then this configuration is optional.

For many-to-one (N:1) high availability support for service applications like Network Address Translation
(NAT), the preferred backup services PIC, in hot standby mode, backs up one or more (N) active services
PICs.
683

NOTE: In both cases, if one of the active services PICs goes down, then the backup replaces it as
the active PIC. When the failed PIC comes back up, it becomes the new backup. This is called
floating backup.

One-to-one (1:1) high availability support associates a single backup interface with a single active
interface. 1:1 configuration is supported only on the MS-MPC and MX-SPC3. In 1:1 (stateful)
configurations, synchronization causes the active and back up PICs to synchronize traffic states and data
structures, preventing data loss during a failover event. Stateful synchronization is required for IPsec
high availability support. For IPsec connections, AMS supports 1:1 configuration only.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 11.4.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

load-balancing-options
Understanding Aggregated Multiservices Interfaces
Example: Configuring an Aggregated Multiservices Interface (AMS)
684

host (Next Gen Services Service-Set Remote System Logging)

IN THIS SECTION

Syntax | 684

Hierarchy Level | 684

Description | 684

Options | 684

Required Privilege Level | 684

Release Information | 684

Syntax

host host-ip-address;

Hierarchy Level

edit services service-set name syslog stream stream-name

Description

Specify the IP address of syslog server to receive log messages.

Options

Required Privilege Level

system

Release Information

Statement introduced in Junos OS Release 19.3R2.


685

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128

host-address-base (Source NAT Next Gen Services)

IN THIS SECTION

Syntax | 685

Hierarchy Level | 685

Description | 685

Options | 686

Required Privilege Level | 686

Release Information | 686

Syntax

host-address-base ip-address;

Hierarchy Level

[edit services nat source pool nat-pool-name]

Description

Configure static mapping of the source address.

For static NAT that is performed on the services card, configure a one-to-one static shifting of a range of
original source addresses to the range of addresses in the source pool by specifying the base address of
the original source address range.
686

For example, if the host address base is 198.51.100.30 and the NAT pool uses the range 203.0.113.10
to 203.0.113.20, then 198.51.100.30 translates to 203.0.113.10, 198.51.100.31 translates to
203.0.113.11, and so on.

Options

host-address-base ip-address The IP address used as the host address base.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

inactivity-timeout

IN THIS SECTION

Syntax | 686

Hierarchy Level | 687

Description | 687

Options | 687

Required Privilege Level | 687

Release Information | 687

Syntax

inactivity-timeout seconds;
687

Hierarchy Level

[edit interfaces interface-name services-options]


[edit services service-set-name service-set-options]

Description

Configure the inactivity timeout period for established flows. The timeout value configured in the
application protocol definition overrides this value.

Options

seconds—Timeout period.

• Default: 30 seconds

• Range: 4 through 86,400 seconds

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced before Junos OS Release 7.4.

Support added in Junos OS Release 19.3R2 for MX-SPC3 services card on MX240, MX480 and MX960
routers.

RELATED DOCUMENTATION

Configuring Default Timeout Settings for Services Interfaces


688

inactivity-asymm-tcp-timeout (Service Set Next Gen Services)

IN THIS SECTION

Syntax | 688

Hierarchy Level | 688

Description | 688

Required Privilege Level | 688

Release Information | 688

Syntax

inactivity-asymm-tcp-timeout seconds;

Hierarchy Level

[edit services service-set service-set-name service-set-options tcp-session]

Description

Configure the number of seconds that a unidirectional TCP session can be inactive before it is closed.
Valid settings: 4 through 86400 seconds.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.


689

icmp (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 689

Hierarchy Level | 689

Description | 689

Required Privilege Level | 689

Release Information | 690

Syntax

icmp {
fragment;
icmpv6-malformed;
large;
ping-death;
}

Hierarchy Level

[edit services screen ids-option screen-name]

Description

Configure ICMP intrusion detection service options.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.


690

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

icmp-type

IN THIS SECTION

Syntax | 690

Hierarchy Level | 690

Description | 690

Options | 691

Required Privilege Level | 691

Release Information | 691

Syntax

icmp-type value;

Hierarchy Level

[edit applications application application-name]

Description

ICMP packet type value.


691

Options

value—The ICMP type value, such as echo or echo-reply. For a complete list, see Configuring the ICMP
Code and Type.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced before Junos OS Release 7.4.

RELATED DOCUMENTATION

ALG Descriptions
Configuring Application Sets
Configuring the ICMP Code and Type
Examples: Configuring Application Protocols
Verifying the Output of ALG Sessions

icmpv6-malformed (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 692

Hierarchy Level | 692

Description | 692

Required Privilege Level | 692

Release Information | 692


692

Syntax

icmpv6-malformed;

Hierarchy Level

[edit services screen ids-option screen-name icmp]

Description

Identify and drop malformed ICMPv6 packets, which might cause damage to the device and network.
Examples of malformed IPv6 packets are packets that are too big (message type 2), that have the next
header set to routing (43), or that have a routing header set to hop-by hop.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

ip (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 693
693

Hierarchy Level | 694

Description | 694

Required Privilege Level | 694

Release Information | 694

Syntax

ip {
bad-option;
block-frag;
ipv6-extension-header {
AH-header;
ESP-header;
fragment-header;
hop-by-hop-header {
CALIPSO-option;
jumbo-payload-option;
quick-start-option;
router-alert-option;
RPL-option;
SFM-DPD-option;
user-defined-option-type <type-low> to <type-high>;
}
mobility-header;
routing-header;
}
loose-source-route-option;
record-route-option;
security-option;
source-route-option;
stream-option;
strict-source-route-option;
tear-drop;
timestamp-option;
unknown-protocol;
}
694

Hierarchy Level

[edit services screen ids-option screen-name]

Description

Configure protection against suspicious IP packet attacks.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R1.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

ipv6-extension-header (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 695

Hierarchy Level | 695

Description | 695

Options | 695

Required Privilege Level | 696

Release Information | 696


695

Syntax

ipv6-extension-header {
AH-header;
ESP-header;
fragment-header;
hop-by-hop-header {
CALIPSO-option;
jumbo-payload-option;
quick-start-option;
router-alert-option;
RPL-option;
SFM-DPD-option;
user-defined-option-type <type-low> to <type-high>;
}
mobility-header;
routing-header;
}

Hierarchy Level

[edit services screen ids-option screen-name ip]

Description

Identify and drop IP packets that have the configured IPv6 extension header values.

Options

ah-header Authentication Header extension header

esp-header Encapsulating Security Payload extension header

fragment-header Fragment Header extension header

hop-by-hop-header The specified Hop-by-Hop option:

CALIPSO-option Common Architecture Label IPv6 Security Option


696

jumbo-payload-option IPv6 jumbo payload option

quick-start-option IPv6 quick start option

router-alert-option IPv6 router alert option

RPL-option Routing Protocol for Low-Power and Lossy


Networks option

SFM-DPD-option Simplified Muliticast Forwarding IPv6 Duplicate


Packet Detection option

user-defined-option-type A range of header types


type-low to type-high
• Range: 1 through 255.

mobility-header Mobility Header extension header

routing-header Routing Header extension header

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
697

limit-session (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 697

Hierarchy Level | 698

Description | 698

Required Privilege Level | 699

Release Information | 699

Syntax

limit-session {
by-destination{
by-protocol {
icmp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
tcp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
udp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
}
maximum-sessions number;
packet-rate number;
session-rate number;
}
by-source {
by-protocol {
698

icmp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
tcp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
udp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
}
maximum-sessions number;
packet-rate number;
session-rate number;
}
}

Hierarchy Level

[edit services screen ids-option screen-name]

Description

Configure session limits for individual destination or source addresses, or for individual destination or
source subnets. This protects against network probing attacks and network flooding attacks. You can
specify limits for specific protocols (ICMP, TCP, and UDP), or specify limits independent of a protocol.
When a session limit is exceeded for a source or destination, packets from the source or to the
destination are dropped until the session limit is no longer exceeded.

To specify limits for destination or source subnets rather than individual addresses, include the
aggregations statement at the [edit services screen ids-option screen-name] hierarchy level.

The remaining statements are explained separately. See CLI Explorer.


699

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

inline-services (PIC level)

IN THIS SECTION

Syntax | 699

Hierarchy Level | 700

Description | 700

Required Privilege Level | 700

Release Information | 700

Syntax

inline-services {
bandwidth (1g | 10g | 20g | 30g | 40g | 100g);
}
700

Hierarchy Level

[edit chassis fpc slot-number pic number]

Description

Enable inline services on PICs residing on MPCs and optionally specify a bandwidth for traffic on the
inline service interface.

NOTE: For an MPC, such as MPC2, always configure inline-services at the [chassis fpc slot-
number pic number] hierarchy level. Do not configure inline services for a service card such as
MS-MPC.

The remaining statement is explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 11.4.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Enabling Inline Service Interfaces


Configuring an L2TP LNS with Inline Service Interfaces
701

ipv6-extension-header (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 701

Hierarchy Level | 701

Description | 702

Options | 702

Required Privilege Level | 702

Release Information | 703

Syntax

ipv6-extension-header {
AH-header;
ESP-header;
fragment-header;
hop-by-hop-header {
CALIPSO-option;
jumbo-payload-option;
quick-start-option;
router-alert-option;
RPL-option;
SFM-DPD-option;
user-defined-option-type <type-low> to <type-high>;
}
mobility-header;
routing-header;
}

Hierarchy Level

[edit services screen ids-option screen-name ip]


702

Description

Identify and drop IP packets that have the configured IPv6 extension header values.

Options

ah-header Authentication Header extension header

esp-header Encapsulating Security Payload extension header

fragment-header Fragment Header extension header

hop-by-hop-header The specified Hop-by-Hop option:

CALIPSO-option Common Architecture Label IPv6 Security Option

jumbo-payload-option IPv6 jumbo payload option

quick-start-option IPv6 quick start option

router-alert-option IPv6 router alert option

RPL-option Routing Protocol for Low-Power and Lossy


Networks option

SFM-DPD-option Simplified Muliticast Forwarding IPv6 Duplicate


Packet Detection option

user-defined-option-type A range of header types


type-low to type-high
• Range: 1 through 255.

mobility-header Mobility Header extension header

routing-header Routing Header extension header

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.


703

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

instance (Traffic Load Balancer)

IN THIS SECTION

Syntax | 703

Hierarchy Level | 704

Description | 704

Options | 705

Required Privilege Level | 705

Release Information | 705

Syntax

instance instance-name {
client-interface client-interface;
client-vrf client-vrf;
group group-name {
health-check-interface-subunit health-check-interface-subunit;
network-monitoring-profile profile-name;
real-service-rejoin-options no-auto-rejoin;
real-services [ server-list ];
<routing-instance routing-instance>;
}
interface interface-name;
real-service real-service {
address server-ip-address;
704

admin-down;
}
server-inet-bypass-filter server-inet-bypass-filter ;
server-inet6-bypass-filter server-inet6-bypass-filter ;
server-interface server-interface;
server-vrf server-vrf-name;
virtual-service virtual-service-name {
address virtual-ip–address;
group group-name;
load-balance-method {
hash {
hash-key method;
}
random;
}
mode (layer2-direct-server-return | direct-server-return | translated);

<routing-instance routing-instance-name>;
<routing-metric route-metric>;
server-interface server-interface;
service service-name {
protocol (udp | tcp);
server-listening-port port;
virtual-port virtual-port;
}
}
}

Hierarchy Level

[edit services traffic-load-balance]

Description

Configure a Traffic Load Balancer instance.


705

Options

client-interface —For translated mode, client interface where the implicit filter is installed to
client-interface direct the traffic in the forward direction.

client-vrf client-vrf Use the specified name of the routing instance in which the data traffic in the
reverse direction is routed to the clients.

instance instance- Identifier (text string) for a TLB configuration.


name
server-inet-bypass- Name of the firewall filter from which the terms are referenced and added to
filter server-inet- the server-side implicit filters. This enables the operator to bypass reverse (RIP
bypass-filter
to VIP) translation of IPv4 traffic.

server-inet6-bypass- Name of the firewall filter from which the terms are referenced and added to
filter server-inet6- the server-side implicit filters. This enables the operator to bypass reverse (RIP
bypass-filter
to VIP) translation of IPv6 traffic.

server-interface For translated mode, specifies the server interfaces where the server filters are
server-interface implicitly installed to direct the return traffic to the load balancing next hop.

server-vrf server-vrf- The routing instance in which the data traffic in the forward direction is routed
name to the servers

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 16.1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Traffic Load Balancer Overview


706

Configuring TLB

interface-service (Services Interfaces)

IN THIS SECTION

Syntax | 706

Hierarchy Level | 706

Description | 706

Options | 707

Required Privilege Level | 707

Release Information | 707

Syntax

interface-service {
load-balancing-options {
hash-keys {
egress-key (destination-ip | source-ip);
ingress-key (destination-ip | source-ip);
}
}
service-interface name;
}

Hierarchy Level

[edit services service-set service-set-name]

Description

Specify the device name for the interface service Physical Interface Card (PIC).
707

Options

service-interface name—Name of the service device associated with the interface-wide service set.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced before Junos OS Release 7.4.

RELATED DOCUMENTATION

Configuring Service Sets to be Applied to Services Interfaces

land (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 707

Hierarchy Level | 708

Description | 708

Required Privilege Level | 708

Release Information | 708

Syntax

land;
708

Hierarchy Level

[edit services screen ids-option screen-name tcp]

Description

Identify and drop SYN packets that have the same source and destination address or port, which
protects against land attacks. In a land attack, the target using up its resources as it repeatedly replies to
itself.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

large (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 709

Hierarchy Level | 709

Description | 709

Required Privilege Level | 709

Release Information | 709


709

Syntax

large;

Hierarchy Level

[edit services screen ids-option screen-name icmp]

Description

Identify and drop any ICMP frame with an IP length greater than 1024 bytes, which protects against
ICMP large packet attacks.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

limit-session (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 710

Hierarchy Level | 711


710

Description | 711

Required Privilege Level | 711

Release Information | 711

Syntax

limit-session {
by-destination{
by-protocol {
icmp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
tcp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
udp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
}
maximum-sessions number;
packet-rate number;
session-rate number;
}
by-source {
by-protocol {
icmp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
tcp {
maximum-sessions number;
711

packet-rate number;
session-rate number;
}
udp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
}
maximum-sessions number;
packet-rate number;
session-rate number;
}
}

Hierarchy Level

[edit services screen ids-option screen-name]

Description

Configure session limits for individual destination or source addresses, or for individual destination or
source subnets. This protects against network probing attacks and network flooding attacks. You can
specify limits for specific protocols (ICMP, TCP, and UDP), or specify limits independent of a protocol.
When a session limit is exceeded for a source or destination, packets from the source or to the
destination are dropped until the session limit is no longer exceeded.

To specify limits for destination or source subnets rather than individual addresses, include the
aggregations statement at the [edit services screen ids-option screen-name] hierarchy level.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.


712

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

load-balancing-options (Aggregated Multiservices)

IN THIS SECTION

Syntax | 712

Hierarchy Level | 713

Description | 713

Required Privilege Level | 714

Release Information | 714

Syntax

load-balancing-options {
high-availability-options {
(many-to-one | one-to-one) {
preferred-backup preferred-backup;
}
}
member-failure-options {
drop-member-traffic {
rejoin-timeout rejoin-timeout;
}
redistribute-all-traffic {
enable-rejoin;
}
}
hash-keys {
egress-key (destination-ip | source-ip);
ingress-key (destination-ip | source-ip);
}
713

member-interface interface-name;
}

Hierarchy Level

[edit interfaces interface-name]

Description

Configure the high availability (HA) options for the aggregated multiservices (AMS) interface.

Many-to-one (N:1) high availability mode for service applications like Network Address Translation
(NAT) is supported. In the case of N:1 high availability mode, one services PIC is the backup (in hot
standby mode) for one or more (N) active services PICs. If one of the active services PICs goes down,
then the backup replaces it as the active services PIC. When the failed PIC comes back online, it
becomes the new backup. This is called floating backup mode. In an N:1 (stateless) configuration, traffic
states and data structures are not synchronized between active PICs and the backup PIC.

You can also configure a one-to-one (1:1) high availability mode. In the 1:1 configuration, a single
interface is configured as the backup for another single active interface. If the active interface goes
down, the backup interface replaces it as the active interface. A 1:1 (stateful) configuration synchronizes
traffic states and data structures between the active services PIC and the backup services PIC. This is
required for IPsec connections. One-to-one high availability is supported on the MS-MPC but it is not
supported for MX-SPC3 in this release.

Load-balancing might not be uniform among member interfaces in certain network deployments. The
variance can be because of a misconfiguration, which causes the traffic itself not to be sufficiently
randomly distributed, causing the hash keys to be ineffective (for example, the hash key is destination IP
but all sessions have only source IP address). The variation can be within the expected range and the
load balancing depends on the IP addresses chosen. The hash calculation performs a checksum on
several bits of the IP address and not only on the last few lower significant bits of the IP address. In such
a scenario, the load-balancing ratio can change, for instance, if the source IP address is changed from
20.0.0.0/24 to 20.0.1.0/24.

The distribution of traffic across member interfaces of an AMS interface is static load-balancing. Flows
are load balanced based on a packet hash on parameters such as source IP or destination IP. Load-
balancing effectiveness depends on the IP address or protocol diversity. For example, if the hash key is
destination IP and all packets have the same destination, then all flows are directed to the same
member. This is flow-level load balancing and not per packet. As a result, traffic between a pair of
addresses may be 10,000 pps, whereas another pair of addresses may have 1 pps. The load of the
former is not distributed among members. High availability is limited to stateless HA. When a backup
714

interface takes over as an active interface, all flows are reestablished (for example. packets may undergo
NAT processing differently after failover).

With a stateful firewall, static NAT as basic-nat44 or destination-nat44, and dynamic NAT as nat64,
napt-44, dynamic-nat44, and with application layer gateways (ALGs) configured, NAT hairpinning is not
supported. Input direction for rule match to be applied is supported only for dynamic NAT types
(NAT64, NAT44, and dynamic-NAT44). Service-set policies need to have input or input-output direction
only. Flows on all active members are reset when the number of actives changes. The resetting of flows
can be avoided at the cost of failed-member's traffic loss using certain options.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 11.4.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Understanding Aggregated Multiservices Interfaces


Example: Configuring an Aggregated Multiservices Interface (AMS)

local-category (Next Gen Services Service-Set Local System Logging)

IN THIS SECTION

Syntax | 715

Hierarchy Level | 715

Description | 715
715

Options | 715

Required Privilege Level | 716

Release Information | 716

Syntax

local-category category, category....category;

Hierarchy Level

[edit services service-set name syslog

Description

Specify the category for which you want to collect local logs.

Options

all All events are logged

content-security Content security events are logged

fw-auth Fw-auth events are logged

screen Screen events are logged

alg Alg events are logged

nat NAT events are logged

flow Flow events are logged

sctp Sctp events are logged

gtp Gtp events are logged


716

ipsec Ipsec events are logged

idp Idp events are logged

rtlog Rtlog events are logged

pst-ds-lite Pst-ds-lite events are logged

appqos Appqos events are logged

secintel Secintel events are logged

aamw AAMW events are logged

sfw Stateful Firewall events are logged

session Session open and close events are logged

session-open Session open events are logged

session-close Session close events are logged

urlf DNS request filtering events are logged

ha Stateful High-Availability open and close events are logged

ha-open Stateful High-Availability open events are logged

ha-close Stateful High-Availability close events are logged

pcp PCP logs

Required Privilege Level

system

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


717

Enabling Global System Logging for Next Gen Services | 127


Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128

local-log-tag (Next Gen Services Service-Set System Logging)

IN THIS SECTION

Syntax | 717

Hierarchy Level | 717

Description | 717

Required Privilege Level | 717

Release Information | 718

Syntax

local-log-tag tag-stamp;

Hierarchy Level

[edit services service-set name syslog


edit services service-set name syslog stream stream-name

Description

Each log message is stamped with this tag.

Required Privilege Level

system
718

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128

loose-source-route-option (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 718

Hierarchy Level | 718

Description | 719

Required Privilege Level | 719

Release Information | 719

Syntax

loose-source-route-option;

Hierarchy Level

[edit services screen ids-option screen-name ip]


719

Description

Identify and drop IPv4 packets that have the IP option of 3 (Loose Source Routing).

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

many-to-one (Aggregated Multiservices)

IN THIS SECTION

Syntax | 720

Hierarchy Level | 720

Description | 720

Options | 720

Required Privilege Level | 720

Release Information | 720


720

Syntax

many-to-one {
preferred-backup preferred-backup;
}

Hierarchy Level

[edit interfaces interface-name load-balancing-options high-availability-options]

Description

Configure the many-to-one (N:1) preferred backup for the aggregated multiservices (AMS) interface.

NOTE: The preferred backup must be one of the member interfaces (mams–) that have already
been configured at the [edit interfaces interface-name load-balancing-options] hierarchy level.
Even in the case of mobile control plane redundancy, which is one-to-one (1:1), the initial
preferred backup is configured at this hierarchy level.

Options

preferred-backup Use the specified interface as the preferred backup member interface. The member
preferred-backup interface format is mams-a/b/0, where a is the FPC slot number and b is the PIC
slot number.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 11.4.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
721

RELATED DOCUMENTATION

high-availability-options (Aggregated Multiservices)


Understanding Aggregated Multiservices Interfaces
Example: Configuring an Aggregated Multiservices Interface (AMS)

map-e

IN THIS SECTION

Syntax | 721

Hierarchy Level | 722

Description | 722

Options | 722

Required Privilege Level | 724

Release Information | 724

Syntax

map-e name {
confidentiality;
disable-auto-route;
ea-bits-len ea-bits-len;
ipv4-prefix ipv4-prefix;
mape-prefix mape-prefix;
mtu-v6 mtu-v6;
psid-length psid-length;
psid-offset psid-offset;
softwire-address softwire-address;
v4-reassembly;
v6-reassembly;
version-03;
}
722

Hierarchy Level

[edit services softwire softwire-concentrator]


[edit services softwires softwire-types
[edit security softwires]

Description

Configure Mapping of Address and port – Encapsulation (MAP-E) as an inline service on MX Series
routers that use MPC and MIC interfaces. MAP-E is an automatic tunneling mechanism that
encapsulates IPv4 packets within an IPv6 address. The IPv4 packets are carried in an IPV4-over-IPV6
tunnel from the MAP-E Customer Edge (CE) devices to the MAP-E Provider Edge (PE) devices (also
called as Border Relay (BR) devices) through an IPV6 routing topology, where they are de-tunneled for
further processing.

Options

confidentiality Configure Junos MAP-E confidentiality. This helps to hide MAP-E rule parameters
in CLI show commands and logs.

disable-auto-route Disable auto-routes and enable static routes to facilitate ECMP load balancing.

NOTE: When you enable the disable-auto-route option, you must configure
static routes.

name Name of the MAP-E softwire concentrator.

ea-bits-len Configure rule for Embedded Address (EA) length for the MAP-E domain.

NOTE:

• If v4-prefix-len is 0 then ea-bits-len must be non-zero, and vice versa.

• It is possible that ea-bits-len is equal to 0, but psid-len is non-zero.

• If the sum of v4-prefix-len and ea-bits-len is less than 32, then the psid-
len must be equal to the difference between 32 and the sum total of v4-
prefix-len and ea-bits-len.
723

• Range: 0 through 48

ipv4-prefix Configure rule for IPv4 prefix and length of the MAP-E domain.

• Range: 0 through 32

mape-prefix Configure rule for IPV6 prefix and length for the MAP-E domain. The MAP-E IPv4
and IPv6 prefix must be unique per softwire concentrator.

mtu-v6 (Optional) Specify the Maximum transmission unit (MTU) for the MAP-E softwire
tunnel.

• Default: 9192

• Range: 1280 through 9192

psid-length Configure Port Set ID (PSID) length value for the MAP-E domain.

NOTE:

• If the sum of v4-prefix-len and ea-bits-len is less than 32, then the psid-
len must be equal to the difference between 32 and the sum total of v4-
prefix-len and ea-bits-len.

• Range: 0 through 16

psid-offset (Optional) Configure PSID offset value for the MAP-E domain.

• Default: 4

• Range: 0 through 16

softwire-address Specify the Border Relay device unicast IPv6 address as the softwire concentrator
IPV6 address.

v4-reassembly | (Optional) Enable IPv4 and IPv6 reassembly for MAP-E.


v6-reassembly
version-03 (Optional) Configure version number to distinguish between currently supported
version of the Internet draft draft-ietf-softwire-map-03 (expires on July 28, 2013),
Mapping of Address and Port with Encapsulation (MAP) and the latest available
version.
724

Required Privilege Level

system

Release Information

Statement introduced in Junos OS Release 18.2R1.

Support added in Junos OS release 20.2R1 at MAP-E for Next Gen Services on MX240, MX480, and
MX960 routers.

Support added in Junos OS release 20.4R1 at MAP-E CE confidentiality on NFX150, NFX250,


NFX350,and SRX1500 devices.

mapping-timeout (Source NAT Next Gen Services)

IN THIS SECTION

Syntax | 724

Hierarchy Level | 724

Description | 725

Options | 725

Required Privilege Level | 725

Release Information | 725

Syntax

mapping-timeout mapping-timeout;

Hierarchy Level

[edit services nat source pool nat-pool-name]


725

Description

Specify the timeout period for address-pooling paired mappings that use the specified NAT pool.
Mappings that are inactive for this amount of time are dropped.

If you do not configure ei-mapping-timeout for endpoint independent translations, then the mapping-
timeout value is used for endpoint independent translations.

Options

mapping-timeout mapping-timeout Length of timeout period in seconds.

• Range: 120 through 86,400

• Default: 300

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

mapping-type (Source NAT Next Gen Services)

IN THIS SECTION

Syntax | 726

Hierarchy Level | 726

Description | 726

Options | 726

Required Privilege Level | 726

Release Information | 726


726

Syntax

mapping-type {
address-pooling-paired;
endpoint-independent;
}

Hierarchy Level

[edit services nat source rule-set rule-set rule rule-name then source-nat]

Description

Configure the source NAT mapping type.

Options

endpoint- Mapping to ensure that the same external address and port are assigned to all
independent connections from a given host.

address-pooling- Mapping to ensure assignment of the same external IP address for all sessions
paired originating from the same internal host.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.


727

match (Next Gen Services Global System Logging)

IN THIS SECTION

Syntax | 727

Hierarchy Level | 727

Description | 727

Options | 727

Required Privilege Level | 727

Release Information | 728

Syntax

match match;

Hierarchy Level

[edit services rtlog traceoptions file]

Description

Regular expression for lines to be logged

Options

match Regular expression for lines to be logged

Required Privilege Level

system
728

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128

match (Services CoS Next Gen Services)

IN THIS SECTION

Syntax | 728

Hierarchy Level | 729

Description | 729

Options | 729

Required Privilege Level | 730

Release Information | 730

Syntax

match {
application [ application-names ];
destination-address address;
destination-address-range low minimum-value high maximum-value;
destination-port port-number;
destination-prefix-list list-name;
source-address address;
source-address-range low minimum-value high maximum-value;
729

source-prefix-list list-name;
}

Hierarchy Level

[edit services cos rule rule-name policy policy-name]

Description

Configure the matching conditions for a policy in a services CoS rule. Matching conditions include
packet source and destination addresses and packet applications. Packets that are processed by a
service set and that match the conditions are assigned the Differentiated Services (DiffServ) code point
(DSCP) marking and forwarding-class assignments specified in the policy.

The service set that the CoS rule is assigned to must include at least one stateful firewall rule or NAT
rule, or CoS does not work. Only stateful firewall and NAT rules can be used with CoS rules in a service
set.

Options

application [ application- One or more port-based applications.


names ]
destination-address address Destination address of the packet.

destination-address-range low Range of destination addresses of the packet.


minimum-value high
maximum-value minimum-value Lower boundary of address range.

maximum-value Upper boundary of address range.

destination-port port-number Destination port number of the packet.

source-address address Source address of the packet.

source-address-range low Range of source addresses of the packet.


minimum-value high
maximum-value minimum-value Lower boundary of address range.

maximum-value Upper boundary of address range.

source-prefix-list list-name Name of a prefix list for matching the source address prefix.
730

You configure the prefix list by using the prefix-list statement at the
[edit policy-options] hierarchy level.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Class of Service for Services PICs (Next Gen Services) | 327

match (Stateful Firewall Rule Next Gen Services)

IN THIS SECTION

Syntax | 730

Hierarchy Level | 731

Description | 731

Options | 731

Required Privilege Level | 731

Release Information | 732

Syntax

match {
application [application-name];
destination-address (address | any);
731

destination-address-excluded address;
source-address (address | any);
source-address-excluded address;
}

Hierarchy Level

[edit services policies stateful-firewall-rule rule-name policy policy-name]

Description

Specify the matching properties for a stateful firewall rule policy. When a flow matches these properties,
the policy actions are applied to the flow.

Options

application [application- One or more application protocols of flows to which the stateful firewall
name] policy applies. The application protocol definition is configured at the [edit
applications] hierarchy level.

destination-address The destination address of the flows to which the stateful firewall rule policy
(address | any) applies. The option any matches all destination addresses.

destination-address- The destination address of the flows to which the stateful firewall rule policy
excluded address does not apply.

source-address (address The source address of the flows to which the stateful firewall rule policy
| any) applies. The option any matches all source addresses.

source-address- The source address of the flows to which the stateful firewall rule policy does
excluded address not apply.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.


732

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Stateful Firewalls for Next Gen Services | 339

match-direction (NAT Next Gen Services)

IN THIS SECTION

Syntax | 732

Hierarchy Level | 732

Description | 732

Required Privilege Level | 733

Release Information | 733

Syntax

Hierarchy Level

[edit services nat source rule-set rule-set],


[edit services nat destination rule-set rule-set]

Description
733

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

match-rules-on-reverse-flow (Next Gen Services)

IN THIS SECTION

Syntax | 733

Hierarchy Level | 733

Description | 733

Required Privilege Level | 734

Release Information | 734

Syntax

match-rules-on-reverse-flow;

Hierarchy Level

[edit services service-set service-set-name cos-options]

Description

Configure the service set to create a CoS session even if a packet is first received in the reverse direction
of the matching direction of the CoS rule. The CoS rule values are then applied as soon as a packet in
the correct match direction is received.
734

Required Privilege Level

system—To view this statement in the configuration.

system-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2 on MX Series routers (MX240, MX480 and MX960)
running Next Gen Services with the MX-SPC3 services card.

RELATED DOCUMENTATION

Class of Service for Services PICs (Next Gen Services) | 327

max-session-setup-rate (Service Set)

IN THIS SECTION

Syntax | 734

Hierarchy Level | 735

Description | 735

Options | 735

Required Privilege Level | 735

Release Information | 735

Syntax

max-session-setup-rate (number | numberk);


735

Hierarchy Level

[edit services service-set service-set-name]

Description

Set the maximum number of session setups allowed per second for the service set. After this setup rate
is reached, any additional session setup attempts are dropped. If you do not include the max-session-
setup-rate statement, the session setup rate is not limited.

Options

max-session- Use the specified maximum number of session setups per second.
setup-rate
number • Range: 1 through 429,496,729

• Default: 0 (The session setup rate is not limited.)

numberk Maximum number of sessions, expressed in thousands. Starting in Junos OS Release


18.4R1, 1k=1000. Prior to Junos OS Release 18.4R1, 1k=1024.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 17.1R1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Configuring Service Set Limitations


736

max-sessions-per-subscriber (Service Set Next Gen Services)

IN THIS SECTION

Syntax | 736

Hierarchy Level | 736

Description | 736

Options | 736

Required Privilege Level | 737

Release Information | 737

Syntax

max-sessions-per-subscriber session-number;

Hierarchy Level

[edit services service-set service-set-name service-set-options]

Description

Set the maximum number of sessions allowed from a single subscriber.

Options

session- Maximum number of sessions.


number

NOTE: There is no default value. You must configure a value for the
configuration to take effect.

• Range: 1 through 32000


737

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

maximum

IN THIS SECTION

Syntax | 737

Hierarchy Level | 737

Description | 738

Options | 738

Required Privilege Level | 738

Release Information | 738

Syntax

maximum number;

Hierarchy Level

[edit interfaces interface-name services-options session-limit]


738

Description

Specify the maximum number of sessions allowed simultaneously on services cards. If you specify the
maximum number of sessions to be zero, it indicates that the configuration is not effective. You must
specify a value higher than zero for the maximum number of sessions.

Options

number Maximum number of sessions.

• Range: 1 through 4,294,967,295

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 9.6.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

member-failure-options (Aggregated Multiservices)

IN THIS SECTION

Syntax | 739

Hierarchy Level | 739

Description | 739

Default | 741

Required Privilege Level | 741

Release Information | 741


739

Syntax

member-failure-options {
drop-member-traffic {
rejoin-timeout rejoin-timeout;
}
redistribute-all-traffic {
enable-rejoin;
}
}

Hierarchy Level

[edit interfaces interface-name load-balancing-options]

Description

Configure the possible behavior for the aggregated Multiservices (AMS) interface in case of failure of
more than one active member.

NOTE: The drop-member-traffic configuration and the redistribute-all-traffic configuration are


mutually exclusive.

Table 53 on page 740 displays the behavior of the member interface after the failure of the first
services PIC. Table 54 on page 740 displays the behavior of the member interface after the failure of
two services PICs.

NOTE: The AMS infrastructure has been designed to handle one failure automatically. However,
in the unlikely event that more than one services PIC fails, the AMS infrastructure provides
configuration options to minimize the impact on existing traffic flows.
740

Table 53: Behavior of Member Interface After One Multiservices PIC Fails

High Availability Mode Member Interface Behavior

Many-to-one (N:1) high availability support for service Automatically handled by the AMS
applications infrastructure

Table 54: Behavior of Member Interface After Two Multiservices PICs Fail

High Configuration rejoin- Behavior when member Behavior when member


Availability timeout rejoins before rejoin- rejoins after rejoin-
Mode timeout expires timeout expires

Many-to-one drop-member- Configured The existing traffic for The existing traffic for
(N:1) high traffic the second failed the second failed
availability member will not be member will not be
support for redistributed to the redistributed to the
service other members. other members.
applications
The first member to The first member will
rejoin becomes an active rejoin the AMS
member. The second automatically. However,
member to rejoin the other members who
becomes the backup. are rejoining will be
This behavior is handled moved to the discard
automatically by the state.
AMS infrastructure.

Many-to-one redistribute- Not Before rejoin, the traffic is redistributed to existing


(N:1) high all-traffic applicable active members.
availability
After a failed member rejoins, the traffic is load-
support for
balanced afresh. This may impact existing traffic
service
flows.
applications

The remaining statements are explained separately. See CLI Explorer.


741

Default

If member-failure-options are not configured, then the default behavior is to drop member traffic with a
rejoin timeout of 120 seconds.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 11.4.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

load-balancing-options (Aggregated Multiservices)


Understanding Aggregated Multiservices Interfaces
Example: Configuring an Aggregated Multiservices Interface (AMS)

member-interface (Aggregated Multiservices)

IN THIS SECTION

Syntax | 742

Hierarchy Level | 742

Description | 742

Options | 742

Required Privilege Level | 742

Release Information | 743


742

Syntax

member-interface interface-name;

Hierarchy Level

[edit interfaces interface-name load-balancing-options]

Description

Specify the member interfaces for the aggregated multiservices (AMS) interface. You can configure
multiple interfaces by specifying each interface in a separate statement.

Starting with Junos OS Release 16.2, an AMS interface can have up to 32 member interfaces. In Junos
OS Release 16.1 and earlier, an AMS interface can have a maximum of 24 member interfaces. If you
configure more than 24 member interfaces, you must set the pic-boot-timeout value to 240 or 300
seconds at the [edit interfaces interface-name multiservice-options] hierarchy level for every services
PIC interface on the MX Series router.

For high availability service applications like Network Address Translation (NAT) that support many-to-
one (N:1) redundancy, you can specify two or more interfaces.

On an MS-MPC, you can configure one-to-one (1:1) redundancy. In a 1:1 (stateful) configuration, a single
backup interface provides redundancy for a single active interface. A 1:1 configuration is required for
IPsec. 1:1 redundancy is not supported on the MX-SPC3 in this release.

NOTE: The member interfaces that you specify must be members of aggregated multiservices
interfaces (mams-).

Options

interface- Name of the member interface. The member interface format is mams-a/b/0, where a
name is the FPC slot number and b is the PIC slot number.

Required Privilege Level

interface—To view this statement in the configuration.


743

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 11.4.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Understanding Aggregated Multiservices Interfaces for Next Gen Services


Configuring Aggregated Multiservices Interfaces
load-balancing-options (Aggregated Multiservices)

mode (Next Gen Services Service-Set System Logging)

IN THIS SECTION

Syntax | 743

Hierarchy Level | 744

Description | 744

Options | 744

Required Privilege Level | 744

Release Information | 744

Syntax

mode {
event ;
stream stream-name;
}
744

Hierarchy Level

[edit services services-set name syslog]

Description

Mode in which the system message logger sends messages

Options

event Send messages to a file on the local routing engine

stream Send messages to one or more remote log servers. Each remote server requires its own stream.

Required Privilege Level

system

Release Information

Support introduced in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240,
MX480 and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128
745

name (Next Gen Services Global System Logging)

IN THIS SECTION

Syntax | 745

Hierarchy Level | 745

Description | 745

Options | 745

Required Privilege Level | 746

Release Information | 746

Syntax

name;

Hierarchy Level

[edit services rtlog traceoptions flag]

Description

Specify what to flag in the trace information.

Options

all Everything

configuration Reading of configuration

hpl Trace HPL logging

report Trace report

source Communication with security log forwarder


746

Required Privilege Level

system

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128

nat-options (Next Gen Services)

IN THIS SECTION

Syntax | 746

Hierarchy Level | 747

Description | 747

Required Privilege Level | 747

Release Information | 747

Syntax

nat-options {
nptv6 {
icmpv6-error-messages;
}
}
747

Hierarchy Level

[edit services service-set service-set-name]

Description

Send ICMP error messages if NPTv6 address translation fails.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

nat-rule-sets (Service Set Next Gen Services)

IN THIS SECTION

Syntax | 747

Hierarchy Level | 748

Description | 748

Required Privilege Level | 748

Release Information | 748

Syntax

nat-rule-sets rule-set-name;
748

Hierarchy Level

[edit services service-set service-set-name]

Description

Specify the NAT rules set included in the service set.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

next-hop-service

IN THIS SECTION

Syntax | 748

Hierarchy Level | 749

Description | 749

Options | 749

Required Privilege Level | 749

Release Information | 750

Syntax

next-hop-service {
inside-service-interface interface-name.unit-number;
749

outside-service-interface interface-name.unit-number;
outside-service-interface-type interface-type;
service-interface-pool name;
}

Hierarchy Level

[edit services service-set service-set-name]

Description

Specify interface names or a service interface pool for the forwarding next-hop service set. You cannot
specify both a service interface pool and an inside or outside interface.

Options

inside-service-interface interface-name.unit-number—Name and logical unit number of the service


interface associated with the service set applied inside the network.

outside-service-interface interface-name.unit-number—Name and logical unit number of the service


interface associated with the service set applied outside the network.

outside-service-interface-type interface-type—Identifies the interface type of the service interface


associated with the service set applied outside the network. For inline IP reassembly, set the interface
type to local.

service-interface-pool name—Name of the pool of logical interfaces configured at the [edit services
service-interface-pools pool pool-name] hierarchy level. You can configure a service interface pool
only if the service set has a PGCP rule configured. The service set cannot contain any other type of rule.

NOTE: service-interface-pool is not applicable for IP reassembly configuration on L2TP.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.


750

Release Information

Statement introduced before Junos OS Release 7.4.

service-interface-pool option added in Junos OS Release 9.3.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Configuring Service Sets to be Applied to Services Interfaces

no-bundle-flap

IN THIS SECTION

Syntax | 750

Hierarchy Level | 750

Description | 751

Required Privilege Level | 751

Release Information | 751

Syntax

no-bundle-flap;

Hierarchy Level

[edit dynamic-profiles name interfaces name load-balancing-options]


751

Description

When you add a new member to an existing AMS bundle, all the existing members and the newly added
member of the AMS bundle go for reboot and disrupts the traffic. To overcome this problem for IPsec
services, configure the no-bundle-flap statement before adding a new member to the AMS bundle.
When you configure no-bundle-flap command and add a new member to the AMS bundle, the existing
members of AMS bundle will not reboot, only the newly added member reboot avoiding the traffic
disruption.

Required Privilege Level

system—To view this statement in the configuration.

system-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 21.1R1

no-remote-trace (Next Gen Services Global System Logging)

IN THIS SECTION

Syntax | 751

Hierarchy Level | 752

Description | 752

Required Privilege Level | 752

Release Information | 752

Syntax

no-remote-trace;
752

Hierarchy Level

[edit services rtlog traceoptions]

Description

Disable remote tracing

Required Privilege Level

system

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128

no-translation (Source NAT Next Gen Services)

IN THIS SECTION

Syntax | 753

Hierarchy Level | 753

Description | 753

Required Privilege Level | 753

Release Information | 753


753

Syntax

no-translation;

Hierarchy Level

[edit services nat source pool nat-pool-name port]

Description

Disable port translation for NAT. By default, port translation is enabled for NAT.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

no-world-readable (Next Gen Services Global System Logging)

IN THIS SECTION

Syntax | 754

Hierarchy Level | 754

Description | 754

Options | 754

Required Privilege Level | 754

Release Information | 754


754

Syntax

Hierarchy Level

[edit services rtlog traceoptions file]

Description

Don't allow any user to read the log file

Options

no-world-readable Don't allow any user to read the log file

Required Privilege Level

system

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128
755

off (Destination NAT Next Gen Services)

IN THIS SECTION

Syntax | 755

Hierarchy Level | 755

Description | 755

Required Privilege Level | 755

Syntax

off;

Hierarchy Level

[edit services nat destination rule-set rule-set-name rule rule-name then


destination-nat]

Description

Tun off destination address translation for the rule. Use this statement when configuring port forwarding
without destination address translation.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.


756

open-timeout

IN THIS SECTION

Syntax | 756

Hierarchy Level | 756

Description | 756

Options | 756

Required Privilege Level | 757

Release Information | 757

Syntax

open-timeout seconds;

Hierarchy Level

[edit interfaces interface-name services-options]

[edit services service-set service-set-name service-set-options tcp-session]

Description

Configure a timeout period for Transmission Control Protocol (TCP) session establishment.

Options

seconds—Timeout period.

• Default: 5 seconds

• Range: 4 through 224 seconds


757

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced before Junos OS Release 7.4.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Configuring Default Timeout Settings for Services Interfaces

pcp-rules

IN THIS SECTION

Syntax | 757

Hierarchy Level | 758

Description | 758

Options | 758

Required Privilege Level | 758

Release Information | 758

Syntax

pcp-rules rule-name;
758

Hierarchy Level

[edit services service-set service-set-name]

Description

Specify the PCP rule to apply to the service set. A PCP rule assigns the PCP server that handles selected
traffic.

PCP is supported on the MS-DPC, MS-100, MS-400, and MS-500 MultiServices PICS. Starting in Junos
OS Release 17.4R1, PCP is also supported on the MS-MPC and MS-MIC. Starting in Junos OS Release
20.1R1, PCP is also supported for Next Gen Services.

Options

rule-name The PCP rule to apply to the service set.

Required Privilege Level

system—To view this statement in the configuration.

system-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 13.2R1.

ping-death (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 759

Hierarchy Level | 759

Description | 759

Required Privilege Level | 759


759

Release Information | 759

Syntax

ping-death;

Hierarchy Level

[edit services screen ids-option screen-name icmp]

Description

Identify and drop oversized and irregular ICMP packets, which protects against the ping of death attack.
In the ping of death attack, the attacker sends the target ping packets whose IP datagram length (ip_len)
exceeds the maximum legal length (65,535 bytes) for IP packets, and the packets are fragmented. When
the target attempts to reassemble the IP packets, a buffer overflow might occur, resulting in system
crashing, freezing, and restarting.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
760

policy (Services CoS Next Gen Services)

IN THIS SECTION

Syntax | 760

Hierarchy Level | 761

Description | 761

Options | 761

Required Privilege Level | 761

Release Information | 761

Syntax

policy policy-name {
match {
application [ application-names ];
destination-address address;
destination-address-range low minimum-value high maximum-value;
destination-port port-number;
destination-prefix-list list-name;
source-address address;
source-address-range low minimum-value high maximum-value;
source-prefix-list list-name;
}
then {
application-profile profile-name;
dscp (alias | bits);
forwarding-class class-name;
reflexive; | revert; | reverse {
application-profile profile-name;
dscp (alias | bits);
forwarding-class class-name;
}
}
}
761

Hierarchy Level

[edit services cos rule rule-name]

Description

Configure a policy in a services CoS rule. The policy specifies Differentiated Services (DiffServ) code
point (DSCP) marking and forwarding-class assignment for packets that are processed by a service set.
The policy identifies the matching conditions for packet source and destination addresses and for packet
applications, and the actions to take on those packets. A CoS rule can include multiple policies.

The service set that the CoS rule is assigned to must include at least one stateful firewall rule or NAT
rule, or CoS does not work. Only stateful firewall and NAT rules can be used with CoS rules in a service
set.

Options

policy-name Name of the policy.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Class of Service for Services PICs (Next Gen Services) | 327


762

policy (Stateful Firewall Rules Next Gen Services)

IN THIS SECTION

Syntax | 762

Hierarchy Level | 762

Description | 763

Options | 763

Required Privilege Level | 763

Release Information | 763

Syntax

policy policy-name {
match {
application [application-name];
destination-address (address | any);
destination-address-excluded address;
source-address (address | any);
source-address-excluded address;
}
then {
count;
deny;
permit;
reject;
}
}

Hierarchy Level

[edit services policies stateful-firewall-rule rule-name]


763

Description

Configure one or more policies in a stateful firewall rule. Each policy identifies the matching conditions
for a flow, and whether or not to allow the flow. Once a policy in the rule matches a flow, that policy is
applied and no other policies in the rule are processed.

Options

policy-name Name of the policy.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Stateful Firewalls for Next Gen Services | 339

pool (Destination NAT Next Gen Services)

IN THIS SECTION

Syntax | 764

Hierarchy Level | 764

Description | 764

Options | 764

Required Privilege Level | 764


764

Release Information | 764

Syntax

pool nat-pool-name{
address address-prefix;
}

Hierarchy Level

[edit services nat destination]

Description

Configure a set of addresses used for Network Address Translation (NAT) of destination addresses.

Options

nat-pool- Name of the NAT pool.


name
If you are configuring twice NAT, do not use the same name that you use for the source
pool.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.


765

pool (Source NAT Next Gen Services)

IN THIS SECTION

Syntax | 765

Hierarchy Level | 766

Description | 766

Options | 766

Required Privilege Level | 766

Release Information | 766

Syntax

pool nat-pool-name {
address address-prefix | address address-prefix to address address-prefix;
address-pooling {
}
ei-mapping-timeout ei-mapping-timeout;
host-address-base ip-address;
mapping-timeout mapping-timeout;
pool-utilization-alarm {
clear-threshold value;
raise-threshold value;
}
port {
automatic (random-allocation | round-robin);
block-allocation {
active-block-timeout timeout-interval;
block-size block-size;
interim-logging-interval timeout-interval;
maximum-blocks-per-host maximum-block-number
}
deterministic {
block-size block-size;
host {
address address;
}
766

include-boundary-addresses;
}
deterministic-nat-configuration-log-interval seconds;
no-translation;
preserve-range;
preserve-parity;
range {
port-low to port-high;
(random-allocation | round-robin);
}
}
}

Hierarchy Level

[edit services nat source]

Description

Configure a set of addresses (or prefixes), address ranges, and ports used for Network Address
Translation (NAT) of source addresses.

Options

nat-pool- Name of the NAT pool.


name
If you are configuring twice NAT, do not use the same name that you use for the
destination pool.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.


767

pool (NAT Rule Next Gen Services)

IN THIS SECTION

Syntax | 767

Hierarchy Level | 767

Description | 767

Required Privilege Level | 767

Release Information | 767

Syntax

pool nat-pool-name;

Hierarchy Level

[edit services nat destination rule-set rule-set rule rule-name then source-nat],
[edit services nat source rule-set rule-set rule rule-name then source-nat]

Description

Specify the name of the NAT pool that contains the addresses or subnets to which addresses are
translated.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.


768

pool-default-port-range (Source NAT Next Gen Services)

IN THIS SECTION

Syntax | 768

Hierarchy Level | 768

Description | 768

Options | 768

Required Privilege Level | 769

Release Information | 769

Syntax

pool-default-port-range port-low to port-high;

Hierarchy Level

[edit services nat source]

Description

Configure a global default port range for NAT pools that use port translation. This port range is used
when a NAT pool does not specify a port range and does not specify automatic port assignment.

Options

port-low The lower end of the port range.

port-high The upper end of the port range.

• Range: 1024 through 65,535


769

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

pool-utilization-alarm (Source NAT Next Gen Services)

IN THIS SECTION

Syntax | 769

Hierarchy Level | 769

Description | 770

Options | 770

Required Privilege Level | 770

Release Information | 770

Syntax

pool-utilization-alarm {
clear-threshold value;
raise-threshold value;
}

Hierarchy Level

[edit services nat source pool nat-pool-name]


770

Description

Define the NAT pool utilization level that triggers SNMP traps and the pool utilization level that clears
SNMP traps. For pools that use port-block allocation, the utilization is based on the number of ports
that are used; for pools that do not use port-block allocation, the utilization is based on the number of
addresses that are used.

If you do not configure pool-utilization-alarm, traps are not created.

Options

clear-threshold NAT pool utilization percentage that clears the trap.


value
• Range: 40 through 100

• Default: 0 (traps are not created)

raise-threshold NAT pool utilization percentage that triggers the trap.


value
• Range: 50 through 100

• Default: There is not default value. Traps are not raised if you do not configure a
value.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

port (Source NAT Next Gen Services)

IN THIS SECTION

Syntax | 771
771

Hierarchy Level | 771

Description | 772

Required Privilege Level | 772

Release Information | 772

Syntax

port {
automatic (random-allocation | round-robin);
block-allocation {
active-block-timeout timeout-interval;
block-size block-size;
interim-logging-interval timeout-interval;
maximum-blocks-per-host maximum-block-number
}
deterministic {
block-size block-size;
host {
address address;
}
include-boundary-addresses;
}
deterministic-nat-configuration-log-interval seconds;
no-translation;
preserve-range;
preserve-parity;
range {
port-low to port-high;
(random-allocation | round-robin);
}
}

Hierarchy Level

[edit services nat source pool nat-pool-name]


772

Description

Configure port assignment for a source NAT pool.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

port-forwarding (Destination NAT Next Gen Services)

IN THIS SECTION

Syntax | 772

Hierarchy Level | 773

Description | 773

Options | 773

Required Privilege Level | 773

Syntax

port-forwarding map-name {
destined-port port-id translated-port port-id;
}
773

Hierarchy Level

[edit services nat destination]

Description

Configure a port forwarding map, which translates the original destination port of a packet to a different
port. This translation is a static, one-to-one mapping.

Port forwarding allows a packet to reach a host within a masqueraded, typically private, network, based
on the port number on which the packet was received from the originating host. An example of this type
of destination is the host of a public HTTP server within a private network.

Options

map-name Name of the port forwarding map.

destined-port port-id Original destination port number.

translated-port port-id Port number to which the original port is mapped.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

port-forwarding-mappings (Destination NAT Rule Next Gen Services)

IN THIS SECTION

Syntax | 774

Hierarchy Level | 774

Description | 774

Required Privilege Level | 774


774

Syntax

port-forwarding-mappings map-name;

Hierarchy Level

[edit services nat destination rule-set rule-set-name rule rule-name then]

Description

Specify the name of the port-forwarding map that the NAT rule uses to translate the original destination
port of a packet to a different port.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

port-round-robin (Source NAT Next Gen Services)

IN THIS SECTION

Syntax | 775

Hierarchy Level | 775

Description | 775

Required Privilege Level | 775

Release Information | 775


775

Syntax

port-round-robin {
disable;
}

Hierarchy Level

[edit services nat source]

Description

Disable round-robin port allocation for any NAT pools that do not specify an automatic (random-
allocation | round-robin) setting at the [edit services nat source pool nat-pool-name port] hierarchy
level. The automatic (random-allocation | round-robin) setting for a pool overrides the port-round-robin
disable setting.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

ports-per-session

IN THIS SECTION

Syntax | 776

Hierarchy Level | 776

Description | 776
776

Options | 776

Required Privilege Level | 776

Release Information | 776

Syntax

ports-per-session ports;

Hierarchy Level

[edit services nat pool nat-pool-name pgcp]

Description

Configure the number of ports required to support Real-Time Transport Protocol (RTP), Real-Time
Control Protocol (RTCP), Real-Time Streaming Protocol (RTSP), and forward error correction (FEC) for
voice and video flows on the Multiservices PIC.

Options

number-of-ports—Number of ports to enable: 2 or 4 for combined voice and video services.

• Default: 2

Required Privilege Level

interface—To view this statement in the configuration.

interface–control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 8.4.


777

preserve-parity (Source NAT Next Gen Services)

IN THIS SECTION

Syntax | 777

Hierarchy Level | 777

Description | 777

Required Privilege Level | 777

Release Information | 777

Syntax

preserve-parity;

Hierarchy Level

[edit services nat source pool nat-pool-name port]

Description

Assign a port with the same parity (even or odd) as the incoming source port. This feature is not
available if you configure port-block allocation, and is not available for deterministic NAT.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.


778

preserve-range (Source NAT Next Gen Services)

IN THIS SECTION

Syntax | 778

Hierarchy Level | 778

Description | 778

Required Privilege Level | 778

Release Information | 778

Syntax

preserve-range;

Hierarchy Level

[edit services nat source pool nat-pool-name port]

Description

For source NAT with port translation, except for deterministic NAT, assign a port within the same range
as the incoming port—either 0 through 1023 or 1024 through 65,535. This feature is not available if you
configure port block allocation.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.


779

profile (Traffic Load Balancer)

IN THIS SECTION

Syntax | 779

Hierarchy Level | 780

Description | 780

Options | 780

Required Privilege Level | 782

Release Information | 782

Syntax

profile profile-name {
custom {
cmd priority {
default-real-service-status (down | up);
expect (ascii | binary) receive-string;
port port;
real-service-action (down | up);
send (ascii | binary) send-string;
}
protocol (tcp | udp);
}
failure-retries number-of-retries;
http {
host hostname;
method (get | option);
port http-port-number;
url url;
}
icmp;
probe-interval interval;
recovery-retries number-of-recovery-retries;
ssl-hello {
port port;
ssl-version;
780

}
tcp {
port tcp-port-number;
}
}

Hierarchy Level

[edit services network-monitoring]

Description

Configure a monitoring profile that can be used for health-checking a group of TLB servers.

Options

custom Use custom probes for server health checking.

cmd priority Use the specified command priority to send for a custom probe.

• Values: 1 or 2

default-real-service- Assign a server status for when the probe times out. The up
status (down | up) value is used when the server or the intermediate network
nodes are only expected to send a negative response to a
probe.

• Default: down

expect (ascii | binary) Use the specified ascii or binary string as an expected probe
receive-string response.

• Range: 1 through 512 characters

port port Use the specified port for custom probes.

protocol (tcp | udp) Use the selected protocol for custom probes.

real-service-action Assign a server status for when the expected response to the
(down | up) probe is received.
781

• Default: down

send (ascii | binary) Send the specified ascii or binary string as a probe.
send-string
• Range: 1 through 512 characters

failure-retries Use the specified number of probes that are sent after which the real server is tagged
number-of- as down.
retries
• Default: 5

http Use HTTP probes for server health checking.

host hostname Use the specified hostname for HTTP probes for server health
checks.

method (get | option) Use the get or option HTTP method for server health checks.

port http-port-number Use the specified port number for HTTP probes.

url url Use the specified URL for HTTP probes. Maximum length is
128 bytes.

icmp Use ICMP probes for server health checking.

probe-interval Use the specified interval of time, in seconds, at which health check probes are sent.
interval
• Default: 5

profile-name Identifier for the network monitoring profile.

recovery- Use the specified number of successful probe attempts after which the server is
retries declared up.
number-of-
recovery- • Default: 5
retries
ssl-hello Use a Client Hello for server health checks

port port Use the specified port number for Client Hello server health checks.

ssl-version SSL version.

• Default: 3

tcp Use TCP probes for server health checks.


782

port tcp-port-number Use the specified port number for TCP probes.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 16.1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Traffic Load Balancer Overview


Configuring TLB

profile (Web Filter)

IN THIS SECTION

Syntax | 783

Hierarchy Level (starting in Junos OS Release 18.3R1 | 784

Hierarchy Level (before Junos OS Release 18.3R1) | 784

Description | 784

Options | 785

Required Privilege Level | 785

Release Information | 785


783

Syntax

profile profile-name {
dns-filter {
database-file filename;
dns-resp-ttl seconds;
dns-server [ ip-address ];
hash-key key-string;
hash-method hash-method-name;
statistics-log-timer minutes;
wildcarding-level level;
}
dns-filter-template template-name {
client-interfaces [ client-interface-name ];
client-routing-instance client-routing-instance-name;
dns-filter {
database-file filename;
dns-resp-ttl seconds;
dns-server [ ip-address ];
hash-key key-string;
hash-method hash-method-name;
statistics-log-timer minutes;
wildcarding-level level;
}
server-interfaces [ server-interface-name ];
server-routing-instance server-routing-instance-name;
term term-name {
from {
src-ip-prefix [ source-prefix ];
}
then {
accept;
dns-sinkhole;
}
}
}
global-dns-stats-log-timer minutes;
url-filter-database filename;
(url-filter-template | template) template-name {
client-interfaces [ client-interface-name1 client-interface-name2 ];
disable-url-filtering;
dns-resolution-interval minutes;
784

dns-resolution-rate seconds;
dns-retries number;
dns-routing-instance dns-routing-instance-name;
dns-server [ ip-address1 ip-address2 ip-address3 ];
dns-source-interface loopback-interface-name;
dns-routing-instance dns-routing-instance-name;
routing-instance routing-instance-name;
server-interfaces [ server-interface-name1 server-interface-name2 ];
term term-name {
from {
src-ip-prefix [prefix1 prefix2];
dest-port [port1 port2];
}
then {
accept;
custom-page custom-page;
http-status-code http-status-code;
redirect-url redirect-url;
tcp-reset;
}
}
url-filter-database filename
}

Hierarchy Level (starting in Junos OS Release 18.3R1

[edit services web-filter]

Hierarchy Level (before Junos OS Release 18.3R1)

[edit services url-filter]

Description

Define URL filter profile or DNS filter profile.

A URL filter profile is for filtering access to disallowed URLs. A URL filter profile includes a general
database setting and templates. The template settings apply to specific interfaces or to access from
specific source IP address prefixes, and override the database setting at the profile level.
785

A DNS filter profile is used to filter DNS requests for disallowed website domains. A DNS filter profile
includes general DNS filtering settings and up to 32 templates. The template settings apply to DNS
requests on specific interfaces or to DNS requests from specific source IP address prefixes, and override
the corresponding settings at the profile level. You can configure up to eight DNS filter profiles.

NOTE: For URL filtering, use the url-filter-template option starting in Junos OS Release 18.3R1
and use the template option in Junos OS Releases before 18.3R1.

Options

profile-name Name of the filter profile.

url-filter-database filename Specify the filename of the URL filter database. This option is mandatory.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

system—To view this statement in the configuration.

system-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 17.2.

dns-filter, dns-filter-templates, global-dns-stats-log-timer, and url-filter-template options introduced in


Junos OS Release 18.3R1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

DNS Request Filtering for Disallowed Website Domains


Configuring URL Filtering
786

protocol (Applications)

IN THIS SECTION

Syntax | 786

Hierarchy Level | 786

Description | 786

Options | 786

Required Privilege Level | 787

Release Information | 787

Syntax

protocol type;

Hierarchy Level

[edit applications application application-name]

Description

Networking protocol type or number.

Options

type—Networking protocol type. The following text values are supported:

1. ah

2. egp

3. esp

4. gre
787

5. icmp

6. icmp6

7. igmp

8. ipip

9. ospf

10. pim

11. rsvp

12. tcp

13. udp

NOTE: IP version 6 (IPv6) is not supported as a network protocol in application definitions.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced before Junos OS Release 7.4.

RELATED DOCUMENTATION

ALG Descriptions
Configuring Application Sets
Configuring Application Properties
Examples: Configuring Application Protocols
Verifying the Output of ALG Sessions
788

range (Source NAT Next Gen Services)

IN THIS SECTION

Syntax | 788

Hierarchy Level | 788

Description | 788

Options | 789

Required Privilege Level | 789

Release Information | 789

Syntax

range {
port-low to port-high;
(random-allocation | round-robin);
}

Hierarchy Level

[edit services nat source pool nat-pool-name port]

Description

To configure a range of ports to assign to a pool, specify the low and high values for the port. If you do
not configure automatic port assignment, you must configure a range of ports. This statement applies to
source NAT with port translation, but not to deterministic NAT.

If you specify a range, ports are selected a round-robin fashion. If you specify a range of ports to assign,
the automatic statement is ignored.
789

Options

port-low Lowest port number.

port-high Highest port number.

random-allocation Randomly assigns a port from the range 1024 through 65535 for each port
translation.

round-robin First assigns port 1024, and uses the next higher port for each successive port
assignment. Round robin allocation is the default.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

rate (Interface Services)

IN THIS SECTION

Syntax | 790

Hierarchy Level | 790

Description | 790

Options | 790

Required Privilege Level | 790

Release Information | 790


790

Syntax

rate new-sessions-per-second;

Hierarchy Level

[edit interfaces interface-name services-options session-limit]

Description

Specify the maximum number of new sessions allowed per second on services cards.

Options

rate new-sessions-per-second Specify the maximum number of new sessions allowed per second.

• Range: 0, which indicates no limit, or greater.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 9.6.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
791

real-service (Traffic Load Balancer)

IN THIS SECTION

Syntax | 791

Hierarchy Level | 791

Description | 791

Options | 791

Required Privilege Level | 792

Release Information | 792

Syntax

real-service real-service-name {
address server-ip-address;
admin-down;
}

Hierarchy Level

[edit services traffic-load-balance instance instance-name]

Description

Configure a traffic load balancer server.

Options

admin-down Set a server’s status to Down.

real-service-name Identifier for a server to which sessions can be distributed using the server
distribution table in conjunction with the session distribution API.
792

server-ip-address IP address for the server.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 16.1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Traffic Load Balancer Overview


Configuring TLB

reassembly-timeout

IN THIS SECTION

Syntax | 793

Hierarchy Level | 793

Description | 793

Options | 793

Required Privilege Level | 793

Release Information | 793


793

Syntax

reassembly-timeout seconds;

Hierarchy Level

[edit interfaces interface-name services-options]


[edit security flow]

Description

The maximum acceptable time, in seconds, from the receipt of the first and latest fragments in a packet.
When the number is exceeded, the packet is dropped.

Options

seconds—Maximum seconds allowed.

• Range: 1 to 60 seconds.

• Default: 4 seconds.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 12.1.

Statement added in Junos OS Release 20.3R1 for Next Gen Services on MX240, MX480, and MX960
routers.

RELATED DOCUMENTATION

Configuring Fragmentation Control for MS-DPC and MS-PIC Service Interfaces


794

record-route-option (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 794

Hierarchy Level | 794

Description | 794

Required Privilege Level | 794

Release Information | 794

Syntax

record-route-option;

Hierarchy Level

[edit services screen ids-option screen-name ip]

Description

Identify and drop IPv4 packets that have the IP option of 7 (Record Route).

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.


795

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

redistribute-all-traffic (Aggregated Multiservices)

IN THIS SECTION

Syntax | 795

Hierarchy Level | 795

Description | 795

Required Privilege Level | 796

Release Information | 796

Syntax

redistribute-all-traffic {
enable-rejoin;
}

Hierarchy Level

[edit interfaces interface-name load-balancing-options member-failure-options]

Description

Enable the option to redistribute traffic of a failed active member to the other active members.

For many-to-one (N:1) high availability support for Network Address Translation (NAT), the traffic for
the failed member is automatically redistributed to the other active members.

The remaining statement is explained separately. See CLI Explorer.


796

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 11.4.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Understanding Aggregated Multiservices Interfaces


Example: Configuring an Aggregated Multiservices Interface (AMS)
member-failure-options (Aggregated Multiservices)

redundancy-event (Services Redundancy Daemon)

IN THIS SECTION

Syntax | 796

Hierarchy Level | 797

Description | 797

Options | 797

Required Privilege Level | 797

Release Information | 798

Syntax

redundancy-event event-name {
monitor {
797

<link-down interface-name;>
<peer {
(mastership-acquire | mastership-release);
}>
<process routing abort;>
<process routing restart;>
}
]

Hierarchy Level

[edit services event-options]

Description

Configure events monitored to trigger change of primary role and routing using inter-chassis
redundancy.

Options

event-name Alphanumeric name for a monitored event.

link-down interface-name Name of an interface, link, or link aggregation, to monitor.

peer mastership-acquire (Optional) Monitor primary-role acquisition peer events.

peer mastership-release (Optional) Monitor primary role release peer events.

process routing abort (Optional, and only applies to Next Gen Services) Monitor process routing
daemon (rpd) terminate requests.

process routing restart (Optional) Monitor process routing daemon (rpd) restart requests.

Required Privilege Level

maintenance—To view this statement in the configuration.

maintenance-control—To add this statement to the configuration.


798

Release Information

Statement introduced in Junos OS Release 17.1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Configuring Inter-Chassis Services Redundancy for Next Gen Services


Configuring the Service Redundancy Daemon

redundancy-options (Aggregated Multiservices)

IN THIS SECTION

Syntax | 798

Hierarchy Level | 799

Description | 799

Options | 799

Required Privilege Level | 799

Release Information | 799

Syntax

redundancy-options {
primary mams-a/b/0;
secondary mams-a/b/0;
}
799

Hierarchy Level

[edit interfaces interface-name]

Description

Configure warm standby for an aggregated multiservices (AMS) interface. Specify a primary and a
secondary (backup) member services interface for the AMS interface. The primary interface is the
service interface that you want to back up, and it is the active interface unless it fails. The secondary
interface is the backup interface, and does not handle any traffic unless the primary interface fails. You
can use the same services interface as the backup in multiple warm standby AMS interfaces.

You cannot use both the redundancy-options and the load-balancing-options statements in the same
AMS interface.

Options

primary mams-a/b/0 Name of the primary services interface, where a is the FPC slot number and b
is the PIC slot number.

secondary mams- Name of the secondary (backup) services interface, where a is the FPC slot
a/b/0 number and b is the PIC slot number.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 17.2.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Configuring Warm Standby for Services Interfaces


800

redundancy-options (Stateful Synchronization)

IN THIS SECTION

Syntax | 800

Hierarchy Level | 800

Description | 800

Options | 801

Required Privilege Level | 801

Release Information | 801

Syntax

redundancy-options {
redundancy-local {
data-address address;
}
redundancy-peer {
ipaddress address;
}
replication-threshold seconds;
routing-instance instance-name;
apply-groups (apply-groups-except |redundancy-local | redundancy-peer)
replication-options (apply-groups | apply-groups-except | mtu | replication-
threshold | replication-threshold routing-instance )
}

Hierarchy Level

[edit interfaces interface-name]

Description

Specify the primary and secondary (backup) adaptive services PIC interfaces.
801

Options

data-address address Internal IP address of the local redundant PIC.

ipaddress address Internal IP address of the remote redundant PIC.

instance-name Name of the routing instance to apply to the HA synchronization traffic


between the high availability pair.

seconds Length of time that the flow remains active for replication.

• Default: 180 seconds

apply-groups apply-groups- Specify the groups from which NOT to inherit the configuration.
except
apply-groups redundancy- Specify information for the local peer.
local
apply-groups redundancy- Specify information for peer.
peer
replication-options apply- Specify groups from which to inherit the configuration.
groups
replication-options apply- Specify the groups from which NOT to inherit the configuration.
groups-except
replication-options mtu Specify the maximal packet size for the replicated data.

• Range: 1500 through 8000 bytes

replication-options Specify the duration for which flow should remain active for replication.
replication-threshold
• Range: 60 through 3600 seconds

replication-options Specify routing-instance for the HA traffic.


replication-threshold
routing-instance

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 13.3.


802

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card (interfaces of type vms-x/y/z).

RELATED DOCUMENTATION

Configuring Inter-Chassis Stateful Synchronization for Long Lived NAT and Stateful Firewall Flows
(MS-MPC, MS-MIC) (Release 16.1 and later)
Inter-Chassis High Availability for MS-MIC and MS-MPC (Release 15.1 and earlier)

redundancy-policy (Interchassis Services Redundancy)

IN THIS SECTION

Syntax | 802

Hierarchy Level | 803

Description | 803

Options | 803

Required Privilege Level | 804

Release Information | 804

Syntax

redundancy-policy policy-name {
redundancy-events [event-list] {
then {
acquire-mastership;
<add-static-route destination {
(next-hop next-hop | receive);
routing-instance routing-instance
}>
<broadcast-warning> ;
<delete-static-route destination {
routing-instance routing-instance;
}>
803

<(release-mastership | release-mastership-force);>
}
}
}

Hierarchy Level

[edit policy-options]

Description

Specify the actions to be taken for redundancy events. These include acquiring or releasing primary role
and adding or deleting static routes.

Options

acquire-mastership Switch from standby to primary role.

add-static-route (Optional) Use the specified destination IP address and prefix for an added
destination signal route.

broadcast-warning (Optional) Switch status from Standby to Standby (Warned).

delete-static-route (Optional) Use the specified destination IP address and prefix for a deleted
destination signal route.

event-list List of names of one or more monitored events that trigger the actions
specified in this policy.

next-hop Interface name for the next hop for an added signal route.

policy-name Name of the redundancy policy.

receive Use the added signal route as a receive route.

release-mastership (Optional) Switch from primary to standby role.

release-mastership-force (Optional) Force switch from primary to standby role.

routing-instance routing- (Optional) Name of the vrf used for the added signal route.
instance
804

Required Privilege Level

maintenance—To view this statement in the configuration.

maintenance-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 17.1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Configuring Inter-Chassis Services Redundancy for Next Gen Services


Configuring the Service Redundancy Daemon

redundancy-set

IN THIS SECTION

Syntax | 804

Hierarchy Level | 805

Description | 805

Options | 805

Required Privilege Level | 806

Release Information | 806

Syntax

redundancy-set redundancy-set {
healthcheck-timer-interval healthcheck-timer-interval;
hold-time hold-time;
805

keepalive keepalive;
redundancy-group redundancy-group;
redundancy-policy [redundancy-policy-list]
}

Hierarchy Level

[edit services]

Description

Specify the characteristics of a redundancy set.

Options

healthcheck-timer- Frequency of health check probes in seconds.


interval healthcheck-
timer-interval • Range: 0 through 3600 seconds

hold-time Maximum wait time for a health check response. When this time expires, the
peer is considered down.

• Range: 0 through 3600 seconds

keepalive Frequency of srd hello messages in seconds.

• Range: 1 through 60 seconds

redundancy-group Redundancy group identifier. This must match a redundancy group ID in the
ICCP configuration.

• Range: 1 through 100

redundancy-policy-list Names of one or more redundancy policies applied to the redundancy set.

redundancy-set Redundancy set identifier.

• Range: 1 through 100


806

Required Privilege Level

maintenance—To view this statement in the configuration.

maintenance-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 17.1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Configuring Inter-Chassis Services Redundancy for Next Gen Services


Configuring the Service Redundancy Daemon

redundancy-set-id (Service Set)

IN THIS SECTION

Syntax | 806

Hierarchy Level | 807

Description | 807

Options | 807

Required Privilege Level | 807

Release Information | 807

Syntax

redundancy-set-id redundancy-set;
807

Hierarchy Level

[edit services service-set service-set-name]

Description

Specify the identifier of the redundancy set to use in the stateful synchronization of services for a
service set.

Options

redundancy-set Identifier for the redundancy set. The identifier can be a number from 1-100.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 17.1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Configuring Inter-Chassis Services Redundancy for Next Gen Services


Configuring the Service Redundancy Daemon
808

rejoin-timeout (Aggregated Multiservices)

IN THIS SECTION

Syntax | 808

Hierarchy Level | 808

Description | 808

Default | 808

Options | 809

Required Privilege Level | 809

Release Information | 809

Syntax

rejoin-timeout rejoin-timeout;

Hierarchy Level

[edit interfaces interface-name load-balancing-options member-failure-options


drop-member-traffic]

Description

Configure the time by when failed members (members in the DISCARD state) should rejoin the
aggregated Multiservices (AMS) interface automatically. All members that do not rejoin by the
configured time are moved to the INACTIVE state and the traffic meant for each of the members is
dropped.

If multiple members fail around the same time, then they are held in the DISCARD state using a single
timer. When the timer expires, all the failed members move to INACTIVE state at the same time.

Default

If you do not configure a value, the default value of 120 seconds is used.
809

Options

rejoin-timeout—Time, in seconds, by which a failed member must rejoin.

• Default: 120 seconds

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 11.4.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Understanding Aggregated Multiservices Interfaces


Example: Configuring an Aggregated Multiservices Interface (AMS)
drop-member-traffic (Aggregated Multiservices)

rpc-program-number

IN THIS SECTION

Syntax | 810

Hierarchy Level | 810

Description | 810

Options | 810

Required Privilege Level | 810

Release Information | 810


810

Syntax

rpc-program-number number;

Hierarchy Level

[edit applications application application-name]

Description

Remote procedure call (RPC) or Distributed Computing Environment (DCE) value.

Options

number—RPC or DCE program value.

• Range: 100,000 through 400,000

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced before Junos OS Release 7.4.

RELATED DOCUMENTATION

ALG Descriptions
Configuring an RPC Program Number
Examples: Configuring Application Protocols
Verifying the Output of ALG Sessions
811

rtlog (Next Gen Services Global System Logging)

IN THIS SECTION

Syntax | 811

Hierarchy Level | 811

Description | 811

Required Privilege Level | 812

Release Information | 812

Syntax

rtlog {
name {
apply-groups group-names;
apply-groups-except group-names;
flag name;
file filename,
no-remote-trace;
}
}

Hierarchy Level

[edit services]

Description

Enable global system logging for Next Gen Services.

traceoptions Specify the options to include in the trace.

All other options are explained separtely.


812

Required Privilege Level

system

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128
traceoptions (Next Gen Services Global System Logging) | 908

rule (Destination NAT Next Gen Services)

IN THIS SECTION

Syntax | 812

Hierarchy Level | 813

Description | 813

Required Privilege Level | 813

Release Information | 813

Syntax

rule rule-name {
match {
application [application-name]
destination-address (NAT Next Gen Services) (address | any-unicast);
destination-address-name address-name;
813

source-address (address | any-unicast);


source-address-name address-name;
}
}
then {
destination-nat {
destination-prefix destination-prefix;
off;
pool nat-pool-name;
}
port-forwarding-mappings map-name;
}
syslog;

Hierarchy Level

[edit services nat destination rule-set rule-set]

Description

Configure a destination NAT rule, which translates the destination address of IP packets.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.


814

rule (Services CoS Next Gen Services)

IN THIS SECTION

Syntax | 814

Hierarchy Level | 815

Description | 815

Options | 815

Required Privilege Level | 816

Release Information | 816

Syntax

rule rule-name {
match-direction (input | input-output | output);
policy policy-name {
match {
application [ application-names ];
destination-address address;
destination-address-range low minimum-value high maximum-value;
destination-port port-number;
destination-prefix-list list-name;
source-address address;
source-address-range low minimum-value high maximum-value;
source-prefix-list list-name;
}
then {
application-profile profile-name;
dscp (alias | bits);
forwarding-class class-name;
reflexive; | revert; | reverse {
application-profile profile-name;
dscp (alias | bits);
forwarding-class class-name;
}
}
815

}
}

Hierarchy Level

[edit services cos]

Description

Configure a services CoS rule, which specifies Differentiated Services (DiffServ) code point (DSCP)
marking and forwarding-class assignment for packets that are processed by a service set. The CoS rule
identifies the matching conditions for packet source and destination addresses and for packet
applications, and the actions to take on those packets.

The service set that the CoS rule is assigned to must include at least one stateful firewall rule or NAT
rule, or CoS does not work. Only stateful firewall and NAT rules can be used with CoS rules in a service
set.

Options

match-direction The direction in which the rule is matched.


(input | input-
output | output) input Apply the rule match on input. If the CoS rule is assigned to an interface
service set, input means traffic entering the interface. If the CoS rule is
assigned to a next-hop service set, input means traffic routed with the
inside interface.

input- Apply the rule match in both directions.


output
output Apply the rule match on output. If the CoS rule is assigned to an interface
service set, input means traffic leaving the interface. If the CoS rule is
assigned to a next-hop service set, output means traffic routed with the
outside interface.

rule-name Name of the CoS rule.

The remaining statements are explained separately. See CLI Explorer.


816

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Class of Service for Services PICs (Next Gen Services) | 327

rule (PCP)

IN THIS SECTION

Syntax | 816

Hierarchy Level | 817

Description | 817

Options | 817

Required Privilege Level | 817

Release Information | 818

Syntax

rule rule-name {
match-direction (input | output);
term term-name {
from {
application-sets set-name;
applications [ application-name ];
destination-address address <except>;
817

destination-address-range high maximum-value low minimum-value


<except>;
destination-port high maximum-value low minimum-value;
destination-prefix-list list-name <except>;
source-address address <except>;
source-address-range high maximum-value low minimum-value <except>;
source-prefix-list list-name <except>;
}
then {
pcp-server server-name;
}
}
}
}

Hierarchy Level

[edit services pcp]

Description

Configure a rule to assign the port control protocol (PCP) server that handles selected traffic. PCP
enables hosts to operate servers for a long time (as in the case of a webcam) or a short time (for
example, while playing a game or on a phone call) when behind a NAT device, including when behind a
carrier-grade NAT operated by their ISP. PCP enables applications to create mappings from an external
IP address and port to an internal IP address and port.

PCP is supported on the MS-DPC, MS-100, MS-400, and MS-500 MultiServices PICS. Starting in Junos
OS Release 17.4R1, PCP is also supported on the MS-MPC and MS-MIC.

Options

rule-name Rule name

The remaining statements are explained separately.

Required Privilege Level

interface—To view this statement in the configuration.


818

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 13.2R1.

RELATED DOCUMENTATION

Configuring Port Control Protocol

rule (Source NAT Next Gen Services)

IN THIS SECTION

Syntax | 818

Hierarchy Level | 819

Description | 819

Required Privilege Level | 819

Release Information | 819

Syntax

rule rule-name {
match {
application [application-name]
destination-address (NAT Next Gen Services) address;
destination-address-name address-name;
source-address (address | any-unicast);
source-address-name address-name;
}
then {
source-nat {
clat-prefix clat-prefix;
filtering-type {
819

endpoint-independent {
prefix-list [allowed-host] except [denied-host];
}

}
mapping-type {
endpoint-independent;
}
pool nat-pool-name;
secure-nat-mapping {
eif-flow-limit number-of-flows;
mapping-refresh (inbound | inbound-outbound | outbound);
}
}
syslog;
}
}

Hierarchy Level

[edit services nat source rule-set rule-set]

Description

Configure a source NAT rule, which translates the source address of IP packets.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.


820

rule-set (Services CoS Next Gen Services)

IN THIS SECTION

Syntax | 820

Hierarchy Level | 820

Description | 820

Options | 820

Required Privilege Level | 821

Release Information | 821

Syntax

rule-set rule-set-name {
[ rule rule-name ];
}

Hierarchy Level

[edit services cos]

Description

Configure a set of services CoS rules. You can then assign the rule set to a service set, which processes
the rules in the order they appear. Once a rule matches the packet, the router performs the
corresponding action, and no further rules are applied.

Options

rule rule-name The name of each rule in the rule set.

rule-set-name The name for the set of rules.


821

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Class of Service for Services PICs (Next Gen Services) | 327

rule-set (Softwires Next Gen Services)

IN THIS SECTION

Syntax | 821

Hierarchy Level | 822

Description | 822

Options | 822

Required Privilege Level | 822

Release Information | 822

Syntax

rule-set rule-set-name {
match-direction (input | output);
rule rule-name {
then {
ds-lite ds-lite-concentrator-name
map-e map-e-concentrator-name
v6rd v6rd-softwire-concentrator;
822

}
}

Hierarchy Level

[edit services softwires]

Description

Configure a rule to apply a DS-Lite, MAP-E, or v6rd softwire concentrator to a flow.

Options

input Apply the rule on the input side of the interface.

output Apply the rule on the output side of the interface.

rule rule-name Name of the rule.

rule-set rule-set-name Name of the rule set that contains the rule.

ds-lite ds-lite-softwire-concentrator Name of the softwire concentrator that the rule assigns to a flow.

map-e map-e-softwire-concentrator Name of the softwire concentrator that the rule assigns to a flow.

v6rd v6rd-softwire-concentrator Name of the softwire concentrator that the rule assigns to a flow.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.


823

RELATED DOCUMENTATION

6rd Softwires in Next Gen Services | 232

secure-nat-mapping (Source NAT Next Gen Services)

IN THIS SECTION

Syntax | 823

Hierarchy Level | 823

Description | 823

Options | 824

Required Privilege Level | 824

Release Information | 824

Syntax

secure-nat-mapping {
eif-flow-limit number-of-flows;
mapping-refresh (inbound | inbound-outbound | outbound);
}

Hierarchy Level

[edit services nat source rule-set rule-set rule rule-name then source-nat]

Description

For endpoint-independent mapping, configure the maximum number of simultaneous inbound flows and
the direction in which mappings are refreshed.
824

Options

eif-flow-limit number-of-flows Maximum number of simultaneous inbound flows.

• Range: 0 through 655334

mapping-refresh (inbound | inbound-outbound | Direction in which mappings are refreshed.


outbound)

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

security-intelligence

IN THIS SECTION

Syntax | 824

Hierarchy Level | 825

Description | 825

Options | 825

Required Privilege Level | 826

Release Information | 826

Syntax

authentication {
auth-token auth-token;
tls-profile tls-profile;
825

traceoptions {
no-remote-trace;
file [ filename <files number> <size bytes> <match expression> <world-
readable | no-world-readable>];
flag [all | feed | ipc];
level [all| error | info | notice | verbose | warning];
no-remote-trace;
url url;

Hierarchy Level

[edit services]

Description

You can configure security intelligence profiles and policies to work with security intelligence feeds, such
as infected hosts and C&C. You then configure a firewall policy to include the security intelligence policy,
for example, block outgoing requests to a C&C host.

Options

authentication Configure authentication, such as an auth token or TLS profile, to commute with the
feed server. This operation is performed by the ops script used to enroll your devices
and is typically not required afterwards. If you have problems establishing a connection
with the Juniper Sky ATP cloud server, we recommend that you rerun the ops script
instead of manually entering all the CLI commands.

traceoptions Set security intelligence trace options.

• file—Name of the file to receive the output of the tracing operation.

• files number —Maximum number of trace files

Range: 2 through 1000

• match— Regular expression for lines to be logged

• no-world-readable—Prevent any user from reading the log file


826

• size—Maximum size of each trace file

Range: 10240 through 1073741824

• world-readable—Allow any user to read the log file

• flag—Tracing operation to perform

• all—All interface tracing operation

• feed—Trace feed operation

• ipc—Trace interface interprocess communication (IPC) module messages

• level—Level of debugging output

• no-remote-trace—Disable the remote trace

url url-address Configure the URL of the feed server. This operation is performed by the ops script
used to enroll your devices and is typically not required afterwards. If you have
problems establishing a connection with the Juniper Sky ATP cloud server, we
recommend that you rerun the ops script instead of manually entering all the CLI
commands.

Required Privilege Level

system—To view this statement in the configuration.

system-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2 on MX Series routers with Juniper Sky Advanced
Threat Prevention (ATP).

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240,
MX480, and MX960. This support runs inline on the MPC card.
827

security-intelligence-policy

IN THIS SECTION

Syntax | 827

Hierarchy Level | 827

Description | 828

Options | 828

Required Privilege Level | 828

Release Information | 828

Syntax

security-intelligence-policy {
threat-level threat-level;
threat-action {
drop
drop-and-log
drop-and-sample
drop-log-and-sample
log
log-and-sample
sample
}
}

Hierarchy Level

[edit services web-filter profile profile-name]


828

Description

Define the threat level and action for the Web filter profile. The packets are redirected at the Packet
Forwarding Engine based on the configured threat-level action associated with the threat-level of the
destination IP address.

Options

threat- Define the Web filtering threat level. The value ranges from 1 through 10
level
threat- Define the way the Packet Forwarding Engine processes packets in response to a threat.
action Only one action can be configured for each threat level that is defined. The default threat-
action is accept.

• drop—Drop the packets and do not generate a log message.

• drop-and-log—Drop the packets and generate a log message.

• drop-and-sample—Drop and sample the packets.

• drop-log-and-sample—Drop, sample, and allow the packets, and generate a log message.

• log—Allow the packets and generate a log message.

• log-and-sample—Allow, sample the packets, and generate a log message.

• sample—Sample the packets.

Required Privilege Level

system—To view this statement in the configuration.

system-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R1 on MX Series routers with Juniper Sky Advanced
Threat Prevention (Juniper Sky ATP) .

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240,
MX480, and MX960 with the MX-SPC3 services card
829

RELATED DOCUMENTATION

web-filter

security-option (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 829

Hierarchy Level | 829

Description | 829

Required Privilege Level | 829

Release Information | 830

Syntax

security-option;

Hierarchy Level

[edit services screen ids-option screen-name ip]

Description

Identify and drop IPv4 packets that have the IP option of 2 (Security).

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.


830

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

server (pcp)

IN THIS SECTION

Syntax | 830

Hierarchy Level | 831

Description | 831

Options | 831

Required Privilege Level | 832

Release Information | 832

Syntax

server server-name {
ipv4-address ipv4-address;
ipv6-address ipv6-address;
long-lifetime-error long-lifetime-error;
mapping-lifetime-max mapping-lifetime-max;
mapping-lifetime-min mapping-lifetime-min;
max-mappings-per-client max-mappings-per-client;
nat-options {
pool pool-name ;
}
pcp-options {
prefer-failure;
third-party;
831

}
short-lifetime-error short-lifetime-error;
softwire-concentrator softwire-concentrator-name;
}

Hierarchy Level

[edit services pcp]

Description

Configure PCP server options. PCP enables hosts to operate servers for a long time (as in the case of a
webcam) or a short time (for example, while playing a game or on a phone call) when behind a NAT
device, including when behind a carrier-grade NAT operated by their ISP. PCP enables applications to
create mappings from an external IP address and port to an internal IP address and port.

PCP is supported on the MS-DPC, MS-100, MS-400, and MS-500 MultiServices PICS. Starting in Junos
OS Release 17.4R1, PCP is also supported on the MS-MPC and MS-MIC. Starting in Junos OS Release
20.1R1, PCP is also supported for Next Gen Services.

Options

ipv4-address IPv4 address of the PCP server.

ipv6-address IPv6 address of the PCP server.

long-lifetime-error Time limit for generating long lifetime errors.

• Default: 1800 seconds

• Range: 900 through 18,000 seconds

mapping-lifetime- Maximum lifetime, in seconds, for PCP mapping. If the PCP client requests a
max lifetime less than the maximum configured, the server will assign the maximum
lifetime and respond accordingly.

• Default: 86,400 seconds

• Range: 3600 through 4294667 seconds


832

mapping-lifetime- Minimum lifetime, in seconds, for PCP mapping. If a PCP client requests a lifetime
min less than the minimum configured, the server will assign a minimum lifetime and
respond accordingly.

• Default: 300 seconds

• Range: 120 through 3600 seconds

max-mappings-per- Maximum number of PCP mappings that the PCP client can request.
client
• Default: 32

• Range: 1 through 32

pool-name Name of the NAT pool to use for PCP mapping. You can identify multiple pools. If
you do not specify a NAT pool for mapping, the Junos OS performs a partial rule
match based on the source IP, source port, and protocol, and the Junos OS uses
the NAT pool configured for the first matching rule to allocate mappings for PCP.

prefer-failure Generate an error message when the PCP client requests a specific IP address or
port that is not available, rather than assigning another available address from the
NAT pool.

short-lifetime-error Time limit for generating short lifetime errors.

• Default: 30 seconds

• Range: 15 through 300 seconds

softwire- Softwire concentrator name whose softwire-address is used in creating PCP


concentrator-name mappings. The PCP server address must be the same as the softwire-
concentrator address.

third-party Enable third-party requests by the PCP client.

The other statements are explained separately.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 13.2R1.


833

RELATED DOCUMENTATION

Configuring Port Control Protocol

service-domain

IN THIS SECTION

Syntax | 833

Hierarchy Level | 833

Description | 833

Options | 834

Required Privilege Level | 834

Release Information | 834

Syntax

service-domain (inside | outside);

Hierarchy Level

[edit interfaces interface-name unit logical-unit-number family inet],


[edit logical-systems logical-system-name interfaces interface-name unit logical-
unit-number family inet]

Description

Specify the service interface domain. If you specify this interface using the next-hop-service statement
at the [edit services service-set service-set-name] hierarchy level, the interface domain must match that
specified with the inside-service-interface and outside-service-interface statements.
834

Options

inside—Interface used within the network.

outside—Interface used outside the network.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced before Junos OS Release 7.4.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Configuring the Address and Domain for Services Interfaces

service-interface (Services Interfaces)

IN THIS SECTION

Syntax | 835

Hierarchy Level | 835

Description | 835

Options | 835

Required Privilege Level | 835

Release Information | 835


835

Syntax

service-interface interface-name;

Hierarchy Level

[edit services service-set service-set-name interface-service]

Description

Specify the name for the services interface associated with an interface-wide service set.

Options

interface-name Identifier of the service interface.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced before Junos OS Release 7.4.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Configuring Service Sets to be Applied to Services Interfaces


Applying Services to Subscriber-Aware Traffic with a Service Set
836

services-options (Next Gen Services Interfaces)

IN THIS SECTION

Syntax | 836

Hierarchy Level | 837

Description | 837

Options | 837

Required Privilege Level | 840

Release Information | 840

Syntax

services-options {
enable-subscriber-analysis
fragment-limit;
jflow-log {
message-rate-limit messages-per-second;
}
session-limit {
maximum number;
rate new-sessions-per-second;
cpu-load-threshold percentage;
}
flow
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
packet-filter filter-name {
conn-tag session-conn
837

destination-port port-identifier;
destination-prefix address;
interface interface-name;
protocol protocol-identifier;
source-port port-identifier;
source-prefix address;
}
rate-limit messages-per-second;
trace-level (brief | detail | error);
}

Hierarchy Level

[edit interfaces interfaces-name]

Description

Define the service options to be applied on the virtual multi-service (VMS) interface.

This statement is supported only on the MX-SPC3 Services Card.

The remaining statements are explained separately. See CLI Explorer.

Options

file Configure the trace file options.

filename Name of the file to receive the output of the tracing operation.
Enclose the name within quotation marks. All files are placed in the
directory /var/log. By default, the name of the file is the name of the
process being traced.

files number Maximum number of trace files. When a trace file named trace-file
reaches its maximum size, it is renamed to trace-file.0, then trace-
file.1, and so on, until the maximum number of trace files is reached.
The oldest archived file is overwritten.

If you specify a maximum number of files, you also must specify a


maximum file size with the size option and a filename.
838

• Range: 2 through 1000 files

• Default: 10 files

match Refine the output to include lines that contain the regular expression.
regular-
expression
size Maximum size of each trace file, in kilobytes (KB), megabytes (MB), or
maximum- gigabytes (GB). When a trace file named trace-file reaches this size, it
file-size
is renamed trace-file.0. When the trace-file again reaches its
maximum size, trace-file.0 is renamed trace-file.1 and trace-file is
renamed trace-file.0. This renaming scheme continues until the
maximum number of trace files is reached. Then the oldest trace file is
overwritten.

If you specify a maximum file size, you also must specify a maximum
number of trace files with the files option and a filename.

Syntax: x K to specify KB, x m to specify MB, or x g to specify GB

• Range: 0 KB through 1 GB

• Default: 128 KB

world- By default, log files can be accessed only by the user who configures
readable | no- the tracing operation. The world-readable option enables any user to
world-
readable read the file. To explicitly set the default behavior, use the no-world-
readable option.

flag Trace operation to perform. To specify more than one trace operation, include multiple
flag statements.

all Trace with all flags enabled

basic-datapath Trace basic packet flow activity

fragmentation Trace IP fragmentation and reassembly events

high-availability Trace flow high-availability information

host-traffic Trace flow host traffic information

multicast Trace multicast flow information

route Trace route lookup information


839

session Trace session creation and deletion events

session-scan Trace session scan information

tcp-basic Trace TCP packet flow information

tunnel Trace tunnel information

no-remote- Set remote tracing as disabled.


trace
packet-filter Packet filter to enable during the tracing operation. Configure the filtering options.
filter-name
destination-port port-identifier Match TCP/UDP destination port

destination-prefix address Destination IP address prefix

interface interface-name Logical interface

protocol protocol-identifier Match IP protocol type

source-port port-identifier Match TCP/UDP source port

source-prefix address Source IP address prefix

rate-limit Limit the incoming rate of trace messages.


messages-per-
second
trace-level Set the level for trace logging. This option is available only when the flag is set.

brief Trace key flow information, such as message types sent between SPU and
central point, policy match, and packet drop reasons.

detail Trace extensive flow information, such as detailed information about sessions
and fragments. Detail is the default level.

error Trace error information, such as system failure, unknown message type, and
packet drop.

fragment-limit Specify the maximum number of fragments to be supported for the PIC. This overrides
the value specified, if any, in the set security flow fragment-limit statement.

reassembly- Specify the reassembly timeout value for all fragmentation packets for the PIC. This
timeout overrides the value specified, if any, in the set security flow reassembly-timeout
statement
840

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

Support introduced in Junos OS Release 20.3R1 for Next Gen Services on MX240, MX480 and MX960
routers for the flow configuration statement.

service-set (Interfaces)

IN THIS SECTION

Syntax | 840

Hierarchy Level | 840

Description | 841

Options | 841

Required Privilege Level | 841

Release Information | 841

Syntax

service-set service-set-name;

Hierarchy Level

[edit interfaces interface-name unit logical-unit-number family inet service


(input | output)],
841

[edit logical-systems logical-system-name interfaces interface-name unit logical-


unit-number family inet service (input | output)]

Description

Define one or more service sets to be applied to an interface. If you define multiple service sets, the
router software evaluates the filters in the order in which they appear in the configuration.

Options

service-set-name—Name of the service set.

Required Privilege Level

System—To view this statement in the configuration.

System-control—To add this statement to the configuration.

Release Information

Statement introduced before Junos OS Release 7.4.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Guidelines for Configuring Service Filters

service-set (Services)

IN THIS SECTION

Syntax | 842

Hierarchy Level | 844

Description | 844
842

Options | 845

Required Privilege Level | 845

Release Information | 845

Syntax

service-set service-set-name {
allow-multicast;
captive-portal-content-delivery-profile;
cos-options {
match-rules-on-reverse-flow;
}
cos-rules [cos-rule-name];
extension-service service-name {
provider-specific-rules-configuration;
}
(ids-rules rule-name | ids-rule-sets rule-set-name);
interface-service {
load-balancing-options {
hash-keys {
egress-key (destination-ip | source-ip);
ingress-key (destination-ip | source-ip);
}
}
service-interface interface-name;
}
ipsec-vpn-options {
anti-replay-window-size bits;
clear-dont-fragment-bit;
ike-access-profile profile-name;
local-gateway address;
no-anti-replay;
no-certificate-chain-in-ike;
passive-mode-tunneling;
trusted-ca [ ca-profile-names ];
tunnel-mtu bytes;
udp-encapsulation {
<udp-dest-port destination-port>;
843

}
}
ip-reassembly-rules rule-name};
(ipsec-vpn-rules rule-name | ipsec-vpn-rule-sets rule-set-name);
max-flows number;
max-drop-flows {
ingress ingress-flows;
egress egress-flows;
}
max-session-setup-rate max-setup-rate;
nat-options {
land-attack-check (ip-only | ip-port);
max-sessions-per-subscriber session-number;

stateful-nat64 {
clear-dont-fragment-bit;
}
}
(nat-rules rule-name | nat-rule-sets rule-set-name);
next-hop-service {
inside-service-interface interface-name.unit-number;
outside-service-interface interface-name.unit-number;
outside-service-interface-type local;
service-interface-pool name;
}
pcp-rules rule-name;
(pgcp-rules rule-name | pgcp-rule-sets rule-set-name);
(ptsp-rules rule-name | ptsp-rule-sets rule-set-name);
service-set-options {
bypass-traffic-on-exceeding-flow-limits;
bypass-traffic-on-pic-failure;
disable-session-open-syslog;
enable-asymmetric-traffic-processing;
header-integrity-check;
routing-engine-services;
support-uni-directional-traffic;
}
snmp-trap-thresholds {
flows high high-threshold | low low-threshold;
nat-address-port high-threshold | low low-threshold;
}
}
softwire-options {
844

dslite-ipv6-prefix-length dslite-ipv6-prefix-length;
}
(softwire-rules rule-name | softwire-rule-sets rule-set-name);
(stateful-firewall-rules rule-name | stateful-firewall-rule-sets rule-set-
name);
syslog {
host hostname {
class {
alg-logs;
deterministic-nat-configuration-log;
ids-logs;
nat-logs;
packet-logs;
pcp-logs;
session-logs <open | close>;
stateful-firewall-logs ;
}
services severity-level;
facility-override facility-name;
interface-service prefix-value;
port port-number;
services severity-level;
}
}
(web-filter-profile | url-filter-profile) profile-name;
}

Hierarchy Level

[edit services]

Description

Define the service set.

NOTE: Use the web-filter-profile option starting in Junos OS Release 18.3R1 and use the url-
filter-profile option in Junos OS Releases before 18.3R1.
845

Options

service-set-name—Name of the service set. You can include special characters, such as a forward slash
(/), colon (:), or a period (.).

• Range: Up to 64 alphanumeric characters.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

system—To view this statement in the configuration.

system-control—To add this statement to the configuration.

Release Information

Statement introduced before Junos OS Release 7.4.

pgcp-rules and pgcp-rule-sets options added in Junos OS Release 8.4.

server-set-options option added in Junos OS Release 10.1.

ptsp-rules and ptsp-rule-sets options added in Junos OS Release 10.2.

softwire-rules and clear-rule-sets options added in Junos OS Release 10.4.

ip-reassembly-rules and outside-service-interface-type option added in Junos OS Release 13.1R1.

pcp-rules option added in Junos OS Release 13.2R1.

softwire-options option added in Junos OS Release 14.1.

url-filter-profile option added in Junos OS Release 17.2R1.

match-rules-on-reverse-flow option added in Junos OS Release 16.1R5 and 17.4R1.

no-certificate-chain-in-ike option added in Junos OS Release 18.2R1.

web-filter-profile option added in Junos OS Release 18.3R1, replacing the deprecated url-filter-profile
option.

max-session-setup-rate option added in Junos OS Release 19.1R1, replacing the deprecated option
max-session-creation rate, which was added in Junos OS Release 17.1R1.

Support added in Junos 20.2R1 for Next Gen Services NAT PT feature.
846

RELATED DOCUMENTATION

Understanding Service Sets

service-set-options (Next Gen Services Services)

IN THIS SECTION

Syntax | 846

Hierarchy Level | 847

Description | 847

Required Privilege Level | 847

Release Information | 847

Syntax

service-set-options {
bypass-traffic-on-exceeding-flow-limits;
disable-global-timeout-override;
disable-session-open-syslog ;
enable-asymmetric-traffic-processing;
inactivity-non-tcp-timeout ;
max-sessions-per-subscriber
session-limit;
session-timeout;
tcp-session {
inactivity-asymm-tcp-timeout ;
inactivity-tcp-timeout ;
open-timeout ;
tcp-fast-open ;
tcp-mss ;
tcp-non-syn ;
tcp-tickles ;
}
}
847

Hierarchy Level

[edit services service-set service-set-name]

Description

Specify the service set options to apply to a service set.

disable-session-open-syslog Disable session open information from being collected in system logs.

inactivity-non-tcp-timeout Specify the inactivity timeout period for non-TCP established sessions.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Service Sets to be Applied to Services Interfaces


Configuring APPID Support for Unidirectional Traffic

session-limit

IN THIS SECTION

Syntax | 848

Hierarchy Level | 848


848

Description | 848

Required Privilege Level | 848

Release Information | 848

Syntax

session-limit {
maximum number;
rate (Interface Services) new-sessions-per-second;
cpu-load-threshold percentage;
}

Hierarchy Level

[edit interfaces interface-name services-options]

Description

Restrict the maximum number of sessions and the session rate on services cards.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 9.6.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
849

session-limit (Service Set Next Gen Services)

IN THIS SECTION

Syntax | 849

Hierarchy Level | 849

Description | 849

Options | 849

Required Privilege Level | 850

Release Information | 850

Syntax

session-limit {
maximum number;
}

Hierarchy Level

[edit services service-set service-set-name service-set-options]

Description

Specify the maximum number of sessions allowed simultaneously on the service set. If you specify the
maximum number of sessions to be zero, it indicates that the configuration is not effective. You must
specify a value higher than zero for the maximum number of sessions.

Options

number Maximum number of sessions.

• Range: 1 through 4,294,967,295


850

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

session-timeout (Service Set Next Gen Services)

IN THIS SECTION

Syntax | 850

Hierarchy Level | 850

Description | 851

Options | 851

Required Privilege Level | 851

Release Information | 851

Syntax

session-timeout seconds;

Hierarchy Level

[edit services service-set service-set-name service-set-options]


851

Description

Define session lifetime for the service set in seconds. The session is closed after this amount of time,
even if traffic is running on the session.

Options

seconds—Duration of session.

• Range: 4 through 86,400

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

severity (Next Gen Services Service-Set Remote System Logging)

IN THIS SECTION

Syntax | 851

Hierarchy Level | 852

Description | 852

Required Privilege Level | 852

Release Information | 852

Syntax

severity severity;
852

Hierarchy Level

edit services service-set name syslog stream stream-name

Description

Specify the level of severity for the stream.

You can set the following severity levels:

• ANY — Includes all severity levels

• ALERT — Action must be taken immediately

• CRITICAL — Critical conditions

• EMERGENCY — System is unusable

• ERROR — Error conditions

• WARNING — Warning conditions

• NOTICE — Normal but significant condition

• INFO — Informational

• DEBUG — Debug-level messages

Required Privilege Level

system

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128
853

stream (Next Gen Services Service-Set Remote System Logging) | 880

sip (Services CoS Next Gen Services)

IN THIS SECTION

Syntax | 853

Hierarchy Level | 853

Description | 853

Options | 854

Required Privilege Level | 854

Release Information | 854

Syntax

sip {
data {
dscp (alias | bits);
forwarding-class class-name;
}
}

Hierarchy Level

[edit services cos application-profile profile-name]

Description

Configure CoS actions for SIP traffic in an application profile. The application profile can then be used in
CoS rule actions.
854

Options

dscp (alias | bits) Either a code point alias or a DSCP bit value to apply to the SIP packets.

forwarding-class class-name Forwarding class name to apply to the SIP packets. The choices are:

• assured-forwarding

• best-effort

• expedited-forwarding

• network-control

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Class of Service for Services PICs (Next Gen Services) | 327

size (Next Gen Services Global System Logging)

IN THIS SECTION

Syntax | 855

Hierarchy Level | 855

Description | 855

Options | 855

Required Privilege Level | 855


855

Release Information | 855

Syntax

size size;

Hierarchy Level

[edit services rtlog traceoptions file]

Description

Maximum trace file size

Options

size Maximum trace file size

• Default: 128k

• Range: through

Required Privilege Level

system

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
856

Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128

snmp-command

IN THIS SECTION

Syntax | 856

Hierarchy Level | 856

Description | 856

Options | 856

Required Privilege Level | 857

Release Information | 857

Syntax

snmp-command command;

Hierarchy Level

[edit applications application application-name]

Description

SNMP command format.

Options

command—Supported commands are SNMP get, get-next, set, and trap.


857

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced before Junos OS Release 7.4.

RELATED DOCUMENTATION

ALG Descriptions
Configuring an SNMP Command for Packet Matching
Examples: Configuring Application Protocols
Verifying the Output of ALG Sessions

snmp-trap-thresholds (Next Gen Services)

IN THIS SECTION

Syntax | 857

Hierarchy Level | 858

Description | 858

Options | 858

Required Privilege Level | 858

Release Information | 858

Syntax

snmp-trap-thresholds {
flow high percent low percent;
nat-address-port high percent low percent;
858

session high percent low percent;


}

Hierarchy Level

[edit services service-set]

Description

Define snmp traps for Next Gen Services service sets.

Options

session Specify the low and high session threshold limits for generating SNMP traps.

The default for high = 90%.

The default for low = 70%.

Required Privilege Level

system

Release Information

Statement introduced in Junos OS Release 19.3R2.

softwire-name (Next Gen Services)

IN THIS SECTION

Syntax | 859

Hierarchy Level | 859

Description | 859
859

Options | 859

Required Privilege Level | 860

Release Information | 860

Syntax

softwire-name v6rd-softwire-concentrator {
ipv4-prefix ipv4-prefix;
mtu-v4 number-of-bytes;
softwire-concentrator address;
softwire-type v6rd;
v6rd-prefix v6rd-prefix
}

Hierarchy Level

[edit services softwires]

Description

Configure a 6rd softwire concentrator. A 6rd softwire allows an IPv6 end user to send traffic over an
IPv4 network to reach an IPv6 network. The softwire concentrator decapsulates IPv6 packets that were
encapsulated in IPv4 packets by a software initiator at the customer edge WAN, and forwards the
packets for IPv6 routing.

Options

ipv4-prefix ipv4-prefix IPv4 prefix of the customer edge (CE) network.

mtu-v4 number-of-bytes The size, in bytes, of the maximum transmission unit for IPv6 packets
encapsulated in IPv4. Compute this as the maximum expected IPv4 packet
size plus 20. Packets that are larger than the configured value are dropped.

• Range: 576 through 9192


860

softwire-concentrator IPv4 address of a softwire concentrator. This is an IPv4 address


address independent of any interface and on a different prefix.

softwire-name v6rd- Name of the softwire concentrator.


softwire-concentrator
softwire-type v6rd Sets softwire concentrator type to 6rd.

v6rd-prefix v6rd-prefix IPv6 prefix for the 6rd domain.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

6rd Softwires in Next Gen Services | 232

softwires (Next Gen Services)

IN THIS SECTION

Syntax | 861

Hierarchy Level | 861

Description | 861

Required Privilege Level | 861

Release Information | 861


861

Syntax

softwires {
rule-set name {
match-direction (input | output);
rule name {
then {
(ds-lite ds-lite | map-e map-e | v6rd v6rd);
}
}
}
softwire-name name {
}
softwire-types {
}
traceoptions {
file <filename> <files files> <match match> <size size> <(world-readable
| no-world-readable)>;
flag name;
no-remote-trace;
}
}

Hierarchy Level

[edit services]

Description

Configure softwire feature

Required Privilege Level

system

Release Information

Statement introduced in Junos OS Release 20.2 for Next Gen Services.


862

softwire-name (Next Gen Services)

IN THIS SECTION

Syntax | 862

Hierarchy Level | 862

Description | 862

Options | 863

Required Privilege Level | 863

Release Information | 863

Syntax

softwire-name v6rd-softwire-concentrator {
ipv4-prefix ipv4-prefix;
mtu-v4 number-of-bytes;
softwire-concentrator address;
softwire-type v6rd;
v6rd-prefix v6rd-prefix
}

Hierarchy Level

[edit services softwires]

Description

Configure a 6rd softwire concentrator. A 6rd softwire allows an IPv6 end user to send traffic over an
IPv4 network to reach an IPv6 network. The softwire concentrator decapsulates IPv6 packets that were
encapsulated in IPv4 packets by a software initiator at the customer edge WAN, and forwards the
packets for IPv6 routing.
863

Options

ipv4-prefix ipv4-prefix IPv4 prefix of the customer edge (CE) network.

mtu-v4 number-of-bytes The size, in bytes, of the maximum transmission unit for IPv6 packets
encapsulated in IPv4. Compute this as the maximum expected IPv4 packet
size plus 20. Packets that are larger than the configured value are dropped.

• Range: 576 through 9192

softwire-concentrator IPv4 address of a softwire concentrator. This is an IPv4 address


address independent of any interface and on a different prefix.

softwire-name v6rd- Name of the softwire concentrator.


softwire-concentrator
softwire-type v6rd Sets softwire concentrator type to 6rd.

v6rd-prefix v6rd-prefix IPv6 prefix for the 6rd domain.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

6rd Softwires in Next Gen Services | 232


864

softwire-options

IN THIS SECTION

Syntax | 864

Hierarchy Level | 864

Description | 864

Options | 864

Required Privilege Level | 865

Release Information | 865

Syntax

softwire-options {
dslite-ipv6-prefix-length dslite-ipv6-prefix-length ;
}

Hierarchy Level

[edit services service-set service-set-name]

Description

Specify the IPv6 prefix length associated with a subscriber’s basic broadband bridging device that is
subject to a limited number of sessions.

This feature is supported on MX Series routers equipped with MS-DPCs. Starting in Junos OS Release
18.2R1, this option is also supported on MS-MPCs and MS-MICs.

Options

dslite-ipv6-prefix-length Subnet prefix representing the size of the subnet subject to session limitation.
865

• Values: 56, 64, 96, 128

• Default: 0—no limitation.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 14.1.

Support added in Junos OS 20.2R1 for Next Gen Services on MX240, MX480, and MX960 routers.

RELATED DOCUMENTATION

DS-Lite Per Subnet Limitation Overview

softwire-types (Next Gen Services)

IN THIS SECTION

Syntax | 866

Hierarchy Level | 866

Description | 866

Options | 866

Required Privilege Level | 868

Release Information | 869


866

Syntax

softwire-types {
ds-lite ds-lite-softwire-concentrator {
auto-update-mtu;
flow-limit flow-limit | session-limit-per-prefix session-limit-per-
prefix;
mtu-v6 bytes;
softwire-address address;
}
map-e
v6rd v6rd-softwire-concentator {
ipv4-prefix ipv4-prefix;
v6rd-prefix ipv6-prefix;
mtu-v4 mtu-v4;
}
}

Hierarchy Level

[edit services softwires]

Description

Configure ds-lite, 6rd and MAP-E softwire objects.

Options

The following options are available for each type of softwire:

ds-lite Specify options for DS-Lite softwites.

v6rd Specify options for v6rd softwites.

map-e Specify options for map-e softwires.

auto-update-mtu This option is not currently supported.

copy-dscp Copy DSCP information to IPv4 headers during decapsulation.


867

flow-limit —Maximum number of IPv4 flows per softwire.

ipv4-prefix IPv4 prefix of the customer edge (CE) network

mtu-v4 Maximum transmission unit (MTU), in bytes (576 through 9192), for IPv6
packets encapsulated into IPv4. If the final length is greater than the
configured value, the IPv4 packet is dropped. This option is mandatory except
for DS-Lite softwires since it depends on other network parameters under
administrator control.

mtu-v6 Maximum transmission unit when encapsulating IPv4 packets into IPv6. If the
final length is greater than the MTU, the IPv6 packet is fragmented. This
option is mandatory since it depends on other network parameters under
administrator control.

session-limit-per- Maximum number of sessions per B4 subnet prefix.


prefix
softwire-concentrator Specify the IP address of the softwire concentrator.

softwire-type Sets softwire concentrator type to 6rd.

• Values: v6rd

v6rd-prefix IPv6 prefix for the 6rd domain.

For map-e softwires:

Options for MAP-E rules:

name Name of the MAP-E softwire domain name.

br-address Specify the Border Relay (BR) device unicast IPv6 address as the softwire
concentrator IPV6 address.

version 3(Optional) Configure version number to distinguish between currently supported


version of the Internet draft draft-ietf-softwire-map-03 (expires on July 28, 2013),
Mapping of Address and Port with Encapsulation (MAP) and the latest available
version.

rule Specify the name of Map-E the rule.

v4-reassembly | (Optional) Enable IPv4 and IPv6 reassembly for MAP-E.


v6-reassembly
disable-auto- Disable auto-routes and enable static routes to facilitate ECMP load balancing.
route
868

NOTE: When you enable the disable-auto-route option, you must configure
static routes.

ipv4-prefix Configure rule for IPv4 prefix of the MAP-E domain.

ipv6-prefix Configure rule for IPv6 prefix of the MAP-E domain.

ea-bits-length Configure rule for Embedded Address (EA) length for the MAP-E domain.

• Range: 0 through 48

psid-length Configure Port Set ID (PSID) length value for the MAP-E domain.

NOTE:

• If the sum of v4-prefix-len and ea-bits-len is less than 32, then the psid-
len must be equal to the difference between 32 and the sum total of v4-
prefix-len and ea-bits-len.

• Range: 0 through 16

psid-offset (Optional) Configure PSID offset value for the MAP-E domain.

• Default: 4

• Range: 0 through 16

mtu-v6 (Optional) Specify the Maximum transmission unit (MTU) for the MAP-E softwire
tunnel.

• Default: 9192

• Range: 1280 through 9192

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.


869

Release Information

Statement introduced in Junos OS Release 20.2 for Next Gen Services on MX240, MX480 and MX960.

softwires-rule-set (Service Set Next Gen Services)

IN THIS SECTION

Syntax | 869

Hierarchy Level | 869

Description | 869

Required Privilege Level | 869

Release Information | 870

Syntax

softwires-rule-set softwire-rule-set-name;

Hierarchy Level

[edit services service-set service-set-name]

Description

Specify the softwire rule-set that contains the rule to be used with the service set.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.


870

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

6rd Softwires in Next Gen Services | 232

source-address (Next Gen Services Service-Set Remote System Logging)

IN THIS SECTION

Syntax | 870

Hierarchy Level | 870

Description | 870

Required Privilege Level | 871

Release Information | 871

Syntax

source-address address;

Hierarchy Level

edit services service-set name syslog

Description

Specify the IP address of the source for Next Gen Services system log messages.
871

BEST PRACTICE: The syslog source address can be any arbitrary IP address. It does not have to
be an IP address that is assigned to the device. Rather, this IP address is used on the syslog
collector to identify the syslog source. The best practice is to configure the source address as the
IP address of the interface that the traffic is sent out on.

Required Privilege Level

system

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128
stream (Next Gen Services Service-Set Remote System Logging) | 880

source-address (NAT Next Gen Services)

IN THIS SECTION

Syntax | 872

Hierarchy Level | 872

Description | 872

Options | 872

Required Privilege Level | 872

Release Information | 872


872

Syntax

source-address (address | any-unicast);

Hierarchy Level

[edit services nat destination rule-set rule-set rule rule-name match],


[edit services nat source rule-set rule-set rule rule-name match]

Description

Specify the source address that the packet must match for the NAT rule to take effect.

Options

address A specific address that must be matched.

any-unicast Any unicast source address results in a match.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

source-address-name (NAT Next Gen Services)

IN THIS SECTION

Syntax | 873
873

Hierarchy Level | 873

Description | 873

Required Privilege Level | 873

Release Information | 873

Syntax

source-address-name address-name;

Hierarchy Level

[edit services nat destination rule-set rule-set rule rule-name match],


[edit services nat source rule-set rule-set rule rule-name match]

Description

Specify the name of the range of source addresses that the packet must match for the NAT rule to take
effect. The range of addresses is configured with the address statement at the [edit services address-
book global] hierarchy level.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.


874

source-port

IN THIS SECTION

Syntax | 874

Hierarchy Level | 874

Description | 874

Options | 874

Required Privilege Level | 874

Release Information | 875

Syntax

source-port port-number;

Hierarchy Level

[edit applications application application-name]

Description

Source port identifier.

Options

port-value—Identifier for the port. For a complete list, see Configuring Source and Destination Ports.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.


875

Release Information

Statement introduced before Junos OS Release 7.4.

RELATED DOCUMENTATION

ALG Descriptions
Configuring Application Properties
Configuring Source and Destination Ports
Verifying the Output of ALG Sessions

source-route-option (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 875

Hierarchy Level | 875

Description | 876

Required Privilege Level | 876

Release Information | 876

Syntax

source-route-option;

Hierarchy Level

[edit services screen ids-option screen-name ip]


876

Description

Identify and drop IPv4 packets that have either the IP option of 3 (Loose Source Routing) or the IP
option of 9 (Strict Source Routing).

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

stateful-firewall-rules (Service Set Next Gen Services)

IN THIS SECTION

Syntax | 876

Hierarchy Level | 877

Description | 877

Required Privilege Level | 877

Release Information | 877

Syntax

stateful-firewall-rules [rule-name];
877

Hierarchy Level

[edit services service-set service-set-name]

Description

Specify the stateful firewall rules to be used with the service set. A stateful firewall rule is configured at
the [edit services policies] hierarchy level.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Stateful Firewalls for Next Gen Services | 339

stateful-firewall-rule-set (Next Gen Services)

IN THIS SECTION

Syntax | 878

Hierarchy Level | 878

Description | 878

Options | 878

Required Privilege Level | 878

Release Information | 878


878

Syntax

stateful-firewall-rule-set {
stateful-firewall-rule [rule-name];
]

Hierarchy Level

[edit services policies]

Description

Specify a set of stateful firewall rules, which are processed in the order in which they appear in the rule
set configuration. Once a stateful firewall rule in the rule set matches a flow, that rule is applied and no
other rules in the rule set are processed˙.

Options

stateful-firewall- Names of the stateful firewall rules that belong to the rule set. A stateful firewall
rule [rule-name] rule is configured at the [edit services policies] hierarchy level.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Stateful Firewalls for Next Gen Services | 339


879

stateful-firewall-rule-sets (Service Set Next Gen Services)

IN THIS SECTION

Syntax | 879

Hierarchy Level | 879

Description | 879

Required Privilege Level | 879

Release Information | 879

Syntax

stateful-firewall-rule-sets [rule-set-name];

Hierarchy Level

[edit services service-set service-set-name]

Description

Specify the stateful firewall rule sets to be used with the service set. A stateful firewall rule set is
configured at the [edit services policies] hierarchy level.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.


880

RELATED DOCUMENTATION

Configuring Stateful Firewalls for Next Gen Services | 339

stream (Next Gen Services Service-Set Remote System Logging)

IN THIS SECTION

Syntax | 880

Hierarchy Level | 880

Description | 880

Options | 881

Required Privilege Level | 881

Release Information | 881

Syntax

stream stream-name (severity debug | category screen | format sd-syslog | host);

Hierarchy Level

edit services service-set name syslog

Description

Specify the name of the stream to the remote log server.

NOTE: Each remote server requires a unique stream name.


881

Options

severity debug

category screen

format sd-syslog

host

Required Privilege Level

system

Release Information

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128
stream (Next Gen Services Service-Set Remote System Logging) | 880

stream-option (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 882

Hierarchy Level | 882

Description | 882

Required Privilege Level | 882

Release Information | 882


882

Syntax

stream-option;

Hierarchy Level

[edit services screen ids-option screen-name ip]

Description

Identify and drop IPv4 packets that have the IP option of 8 (Stream ID).

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

strict-source-route-option (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 883

Hierarchy Level | 883

Description | 883
883

Required Privilege Level | 883

Release Information | 883

Syntax

strict-source-route-option;

Hierarchy Level

[edit services screen ids-option screen-name ip]

Description

Identify and drop IPv4 packets that have the IP option of 9 (Strict Source Routing).

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
884

syn-ack-ack-proxy (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 884

Hierarchy Level | 884

Description | 884

Options | 884

Required Privilege Level | 885

Release Information | 885

Syntax

syn-ack-ack-proxy {
threshold number;
}

Hierarchy Level

[edit services screen ids-option screen-name tcp]

Description

Configure the maximum number of connections from an IP address that can be opened without being
completed. Once this threshold has been reached, further connection requests are rejected. In the SYN-
ACK-ACK attack, the session table can fill up, resulting in the device rejecting legitimate connection
requests.

Options

threshold number Maximum number of uncompleted connections from any single IP address.
885

• Range: 1 through 250,000

• Default: 512

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

syn-fin (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 885

Hierarchy Level | 886

Description | 886

Required Privilege Level | 886

Release Information | 886

Syntax

syn-fin;
886

Hierarchy Level

[edit services screen ids-option screen-name tcp]

Description

Identify and drop packets that have both the SYN and FIN flags set, which can cause unpredictable
behavior.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

syn-frag (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 887

Hierarchy Level | 887

Description | 887

Required Privilege Level | 887

Release Information | 887


887

Syntax

syn-frag;

Hierarchy Level

[edit services screen ids-option screen-name tcp]

Description

Identify and drop SYN packet fragments. In TCP SYN fragment attacks, the target caches SYN
fragments, waiting for the remaining fragments to arrive so it can reassemble them and complete the
connection. A flood of SYN fragments eventually fills the host’s memory buffer, preventing valid traffic
connections.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

syslog (Services CoS)

IN THIS SECTION

Syntax | 888
888

Hierarchy Level | 888

Description | 888

Required Privilege Level | 888

Release Information | 888

Syntax

syslog;

Hierarchy Level

[edit services cos rule rule-name term term-name then],


[edit services cos rule rule-name term term-name then reverse]

Description

Enable system logging. The system log information from the Multiservices and Services PICs is passed to
the kernel for logging in the /var/log directory. This setting overrides any syslog statement setting
included in the service set or interface default configuration.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 8.1.

RELATED DOCUMENTATION

Configuring CoS Rules on Services PICs


Configuring Actions in CoS Rules
889

syslog (Next Gen Services Service-Set System Logging)

IN THIS SECTION

Syntax | 889

Hierarchy Level | 889

Description | 889

Options | 889

Required Privilege Level | 889

Release Information | 890

Syntax

syslog ;

Hierarchy Level

[edit services service-set name]

Description

Configure the filename Next Gen Services system logs.

Options

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

system
890

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128

tcp-no-flag (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 890

Hierarchy Level | 890

Description | 891

Required Privilege Level | 891

Release Information | 891

Syntax

tcp-no-flag;

Hierarchy Level

[edit services screen ids-option screen-name tcp]


891

Description

Identify and drop TCP packets that have no flag fields set. A TCP no flag attack can cause unpredictable
behavior on the target.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

tcp-session (Service Set Next Gen Services)

IN THIS SECTION

Syntax | 891

Hierarchy Level | 892

Description | 892

Options | 892

Required Privilege Level | 892

Release Information | 893

Syntax

tcp-session {
inactivity-asymm-tcp-timeout ;
892

inactivity-tcp-timeout ;
open-timeout ;
tcp-fast-open ;
tcp-mss ;
tcp-non-syn ;
tcp-tickles ;
}

Hierarchy Level

[edit services service-set service-set-name service-set-options]

Description

Configure the TCP options for the service set.

Options

close-timeout Timeout period for TCP session tear-down (2. through 300 seconds)

ignore-errors Ignore anomalies or errors for TCP

"inactivity-asymm-tcp-timeout
" on page 688
"tcp-tickles" on page 893 Number of TCP keep-alive packets to be sent for bidirectional TCP
flows

inactivity-tcp-timeout Inactivity timeout period for TCP established sessions

open-timeout Timeout period for TCP session establishment (seconds)

tcp-fast-open Tcp-fast-Open enabled packets will be handled accordingly

tcp-mss Enable the limit on TCP Max. Seg. Size in SYN packets

tcp-non-syn Deny session creation on receiving first non SYN packet

Required Privilege Level

interface—To view this statement in the configuration.


893

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

tcp-tickles (Service Set Next Gen Services)

IN THIS SECTION

Syntax | 893

Hierarchy Level | 893

Description | 893

Required Privilege Level | 893

Release Information | 894

Syntax

tcp-tickles tcp-tickles;

Hierarchy Level

[edit service-set service-set-name service-set-optionstcp-session]

Description

Define the maximum number of keep-alive messages sent before a TCP session is allowed to timeout.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.


894

Release Information

Statement introduced in Junos OS Release 19.3R1.

tear-drop (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 894

Hierarchy Level | 894

Description | 894

Required Privilege Level | 894

Release Information | 895

Syntax

tear-drop;

Hierarchy Level

[edit services screen ids-option screen-name ip]

Description

Identify and drop fragmented IP packets that overlap, which protects against teardrop attacks. In
teardrop attacks, the target machine uses up its resources as it attempts to reassemble the packets, and
then it can no longer process valid traffic.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.


895

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

then (Services CoS Next Gen Services)

IN THIS SECTION

Syntax | 895

Hierarchy Level | 896

Description | 896

Options | 896

Required Privilege Level | 897

Release Information | 897

Syntax

then {
application-profile profile-name;
dscp (alias | bits);
forwarding-class class-name;
reflexive; | revert; | reverse {
application-profile profile-name;
dscp (alias | bits);
forwarding-class class-name;
}
}
896

Hierarchy Level

[edit services cos rule rule-name policy policy-name]

Description

Specify the Differentiated Services (DiffServ) code point (DSCP) marking and forwarding-class
assignments for packets that are processed by a service set and that match the conditions of the policy
in a services CoS rule.

The service set that the CoS rule is assigned to must include at least one stateful firewall rule or NAT
rule, or CoS does not work. Only stateful firewall and NAT rules can be used with CoS rules in a service
set.

Options

application-profile The application profile that sets the CoS actions for FTP and SIP traffic.
profile-name
dscp (alias | bits) Either a code point alias or a DSCP bit value to apply to the packet.

forwarding-class Forwarding class name to apply to the packet. The choices are:
class-name
• assured-forwarding

• best-effort

• expedited-forwarding

• network-control

reflexive Applies the CoS rule policy actions to flows in the reverse direction as well as to
flows in the matching direction.

revert Stores the DSCP and forwarding class of a packet that is received in the match
direction of the rule and then applies that DSCP and forwarding class to packets
that are received in the reverse direction of the same session.

reverse Specifies actions to apply to flows in the reverse direction of the matching
direction.
897

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Class of Service for Services PICs (Next Gen Services) | 327

then (Stateful Firewall Rule Next Gen Services)

IN THIS SECTION

Syntax | 897

Hierarchy Level | 898

Description | 898

Options | 898

Required Privilege Level | 898

Release Information | 898

Syntax

then {
count;
deny;
permit;
reject;
}
898

Hierarchy Level

[edit services policies stateful-firewall-rule rule-name policy policy-name]

Description

Specify the actions for a stateful firewall rule policy. The policy actions are applied to flows that meet
the policy’s matching properties.

Options

count Enables a count, in bytes or kilobytes, of all network traffic the policy allows to pass.

deny Drop the packets.

permit Accept the packets and send them to their destination.

reject Drop the packets. For TCP traffic, send a TCP reset (RST) segment to the source host. For UDP
traffic, send an ICMP destination unreachable, port unreachable message (type 3, code 3) to
the source host.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Stateful Firewalls for Next Gen Services | 339


899

timestamp-option (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 899

Hierarchy Level | 899

Description | 899

Required Privilege Level | 899

Release Information | 899

Syntax

timestamp-option;

Hierarchy Level

[edit services screen ids-option screen-name ip]

Description

Identify and drop IPv4 packets that have the IP option of 4 (Internet timestamp).

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.


900

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

traceoptions (Next Gen Services Service-Set Flow)

IN THIS SECTION

Syntax | 900

Hierarchy Level | 901

Description | 901

Options | 901

Required Privilege Level | 903

Release Information | 903

Syntax

traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
packet-filter filter-name {
conn-tag session-conn
destination-port port-identifier;
destination-prefix address;
interface interface-name;
protocol protocol-identifier;
source-port port-identifier;
source-prefix address;
}
901

rate-limit messages-per-second;
trace-level (brief | detail | error);
}

Hierarchy Level

[edit services service-set name flow]

Description

Configure flow tracing options for a service-set.

Options

file Configure the trace file options.

filename Name of the file to receive the output of the tracing operation. Enclose
the name within quotation marks. All files are placed in the
directory /var/log. By default, the name of the file is the name of the
process being traced.

files number Maximum number of trace files. When a trace file named trace-file
reaches its maximum size, it is renamed to trace-file.0, then trace-file.1,
and so on, until the maximum number of trace files is reached. The
oldest archived file is overwritten.

If you specify a maximum number of files, you also must specify a


maximum file size with the size option and a filename.

• Range: 2 through 1000 files

• Default: 10 files

match Refine the output to include lines that contain the regular expression.
regular-
expression
size Maximum size of each trace file, in kilobytes (KB), megabytes (MB), or
maximum- gigabytes (GB). When a trace file named trace-file reaches this size, it is
file-size
renamed trace-file.0. When the trace-file again reaches its maximum
size, trace-file.0 is renamed trace-file.1 and trace-file is renamed trace-
902

file.0. This renaming scheme continues until the maximum number of


trace files is reached. Then the oldest trace file is overwritten.

If you specify a maximum file size, you also must specify a maximum
number of trace files with the files option and a filename.

Syntax: x K to specify KB, x m to specify MB, or x g to specify GB

• Range: 0 KB through 1 GB

• Default: 128 KB

world- By default, log files can be accessed only by the user who configures the
readable | no- tracing operation. The world-readable option enables any user to read
world-
readable the file. To explicitly set the default behavior, use the no-world-readable
option.

flag Trace operation to perform. To specify more than one trace operation, include multiple
flag statements.

all Trace with all flags enabled

basic-datapath Trace basic packet flow activity

fragmentation Trace IP fragmentation and reassembly events

high-availability Trace flow high-availability information

host-traffic Trace flow host traffic information

multicast Trace multicast flow information

route Trace route lookup information

session Trace session creation and deletion events

session-scan Trace session scan information

tcp-basic Trace TCP packet flow information

tunnel Trace tunnel information

no-remote- Set remote tracing as disabled.


trace
packet-filter Packet filter to enable during the tracing operation. Configure the filtering options.
filter-name
903

destination-port port-identifier Match TCP/UDP destination port

destination-prefix address Destination IP address prefix

interface interface-name Logical interface

protocol protocol-identifier Match IP protocol type

source-port port-identifier Match TCP/UDP source port

source-prefix address Source IP address prefix

rate-limit Limit the incoming rate of trace messages.


messages-
per-second
trace-level Set the level for trace logging. This option is available only when the flag is set.

brief Trace key flow information, such as message types sent between SPU and
central point, policy match, and packet drop reasons.

detail Trace extensive flow information, such as detailed information about sessions
and fragments. Detail is the default level.

error Trace error information, such as system failure, unknown message type, and
packet drop.

Required Privilege Level

trace—To view this in the configuration.

trace-control—To add this to the configuration.

Release Information

Statement introduced in Junos OS Release 20.3R1.


904

traceoptions (Traffic Load Balancer)

IN THIS SECTION

Syntax | 904

Hierarchy Level | 904

Description | 904

Options | 905

Required Privilege Level | 907

Release Information | 907

Syntax

traceoptions {
file file-name <files number> <no-word-readable | world-readable> <size
size>;
flag flag;
level (all | critical | error | info | notice | verbose | warning);
monitor monitor-object-name {
instance-name instance-name;
virtual-svc-name virtual-service-name;
}
no-remote-trace;
}

Hierarchy Level

[edit services traffic-load-balance]

Description

Configure tracing options for the traffic load balancer.


905

Options

For Next Gen Services on the MX-SPC3 services card, set the monitor-object-name to either:

file file-name Name of the file to receive the output of the tracing operation.

files number (Optional) Maximum number of trace files. When a trace file named trace-file reaches
its maximum size, it is renamed trace-file.0, then trace-file.1, and so on, until the
maximum number of trace files is reached. Then the oldest trace file is overwritten.

• Range: 2 through 1000 files

• Default: 3 files

flag flag Specify which operations you want to trace from Table 55 on page 905. To specify
more than one operation, include multiple flag statements.

Table 55: Trace Flags

Flag Support on MS-MPC Description


and MX-SPC3 Cards

all MS-MPC and MX- Trace all operations.


SPC3

all-real-services MS-MPC and MX- Trace all real services.


SPC3

database MS-MPC and MX- Trace database events.


SPC3

file-descriptor-queue MS-MPC and MX- Trace file descriptor queue events.


SPC3

inter-thread MS-MPC and MX- Trace inter-thread communication


SPC3 events.

messages MS-MPC and MX- Trace normal events.


SPC3
906

Table 55: Trace Flags (Continued)

Flag Support on MS-MPC Description


and MX-SPC3 Cards

probe MS-MPC and MX- Trace probe events.


SPC3

probe-infra MS-MPC and MX- Trace probe infra events.


SPC3

instance-name (Optional) Name of the TLB instance to monitor.


instance-name
level Use the specified level of tracing. You can specify any of the following levels:

• all—Match all levels.

• error—Match error conditions.

• info—Match informational messages.

• notice—Match conditions that must be handled specially.

• verbose—Match verbose messages.

• warning—Match warning messages.

These trace levels are available for both the MS-MPC and MX-SPC3 services cards
unless otherwise specified.

monitor Name of a monitoring object that contains an instance name or virtual service name.
monitor-
object-name
no-remote- (Optional) Disable remote tracing.
trace
no-world- (Optional) Disable unrestricted file access.
readable
group-name Name of the group.

real-services- Name of the real service


name
size size (Optional) Use the maximum size of each trace file, in kilobytes (KB) or megabytes
(MB). When a trace file named trace-file reaches this size, it is renamed trace-file.0.
907

When the trace-file again reaches its maximum size, trace-file.0 is renamed trace-file.1
and trace-file is renamed trace-file.0. This renaming scheme continues until the
maximum number of trace files is reached. Then, the oldest trace file is overwritten. If
you specify a maximum number of files, you must also specify a maximum file size
with the size option.

• Syntax: xk to specify KB, xm to specify MB, or xg to specify GB.

• Range: 10,240 through 1,073,741,824 bytes.

• Default: 128 KB

virtual-svc- (Optional) Name of the virtual service to monitor.


name virtual-
service-name
word-readable (Optional) Enable unrestricted file access.

Required Privilege Level

trace and interface—To view this statement in the configuration.

trace-control and interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 16.1.

instance-name and virtual-service-name options added in Junos OS Release 16.1R6 and 18.2R1 on MX
Series.

Support for Next Gen Services MX-SPC3 services card add in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Traffic Load Balancer Overview


Configuring TLB
908

traceoptions (Next Gen Services Global System Logging)

IN THIS SECTION

Syntax | 908

Hierarchy Level | 908

Description | 908

Options | 908

Required Privilege Level | 909

Release Information | 909

Syntax

traceoptions {
apply-groups group-names;
apply-groups-except group-names;
flag name;
file filename,
no-remote-trace;
}

Hierarchy Level

[edit services rtlog]

Description

Specify the trace information you want to include in the system log messages.

Options

The remaining statements are explained separately. See CLI Explorer.


909

Required Privilege Level

system

Release Information

Support introduced in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240,
MX480 and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128

traceoptions (Next Gen Services Softwires)

IN THIS SECTION

Syntax | 909

Hierarchy Level | 910

Description | 910

Options | 910

Required Privilege Level | 911

Release Information | 911

Syntax

traceoptions {
file {
filename;
files number;
910

match regular-expression;
(no-world-readable | world-readable);
size maximum-file-size;
}
flag (all | configuration | flow);
no-remote-trace;
}

Hierarchy Level

[edit security softwires]

Description

Configure softwire tracing options.

Options

• file—Configure trace file information.

• filename—Name of the file to which to write the trace information.

• files number—Maximum number of trace files.

Range: 2 through 1000 files

• match regular-expression—Regular expression for lines to be logged.

• no-world-readable | world-readable—Allow or deny any user to read the log file.

• size maximum-file-size—Maximum trace file size.

Range: 10,240 to 1,073,741,824 bytes

• flag—Specify events to trace.

• all—Trace all events

• configuration—Trace configuration events

• flow—Trace flow events

• no-remote-trace—Disable remote tracing.


911

Required Privilege Level

trace—To view this statement in the configuration.

trace-control—To add this statement to the configuration.

Release Information

Statement introduced before Release 12.1 of Junos OS.

traffic-load-balance (Traffic Load Balancer)

IN THIS SECTION

Syntax | 911

Hierarchy Level | 913

Description | 913

Required Privilege Level | 913

Release Information | 913

Syntax

traffic-load-balance {
instance instance-name {
client-interface client-interface;
client-vrf client-vrf;
group group-name {
health-check-interface-subunit health-check-interface-subunit;
network-monitoring-profile [profile-name1, <profile-name2>];
real-service-rejoin-options no-auto-rejoin;
real-services [server-list];
<routing-instance routing-instance>;
}
interface interface-name;
real-service real-service {
912

address server-ip-address;
admin-down;
}
server-inet-bypass-filter server-inet-bypass-filter ;
server-inet6-bypass-filter server-inet6-bypass-filter ;
server-interface server-interface;
server-vrf server-vrf;
traceoptions {
file file-name <files number> <no-word-readable | world-readable>
<size size>;
flag flag;
level (all | critical | error | info | notice | verbose | warning);
monitor {
instance-name instance-name;
virtual-svc-name virtual-service-name;
}
no-remote-trace;
}
virtual-service virtual-service-name {
address virtual-ip–address;
group group-name;
load-balance-method {
hash {
hash-key method;
}
random;
}
mode ( layer2-direct-server-return | direct-server-return |
translated );
<routing-instance routing-instance-name>;
<routing-metric route-metric>;
server-interface server-interface;
service service-name {
protocol (udp | tcp);
server-listening-port port;
virtual-port virtual-port;
}
}
}
}
913

Hierarchy Level

[edit services]

Description

Configure traffic load balancer options.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 16.1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Traffic Load Balancer Overview


Configuring TLB

transport (Next Gen Services Syslog Message Security)

IN THIS SECTION

Syntax | 914

Hierarchy Level | 914

Description | 914
914

Options | 914

Required Privilege Level | 914

Release Information | 915

Syntax

transport;

Hierarchy Level

[edit services service-set name syslog

Description

Specify the category for which you want to collect local logs.

Options

apply-groups Groups from which to inherit configuration data

apply-groups-except Don't inherit configuration data from these groups

protocol Set security log transport protocol for the device. You can set the protocol to
TCP, TLS or UDP

tcp-connections Set tcp connection number per-stream (1..5)

tls-profile If you are using the TLS protocol as the security log transport, specify the TLS
profile name to use.

Required Privilege Level

system
915

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128

ttl-threshold

IN THIS SECTION

Syntax | 915

Hierarchy Level | 915

Description | 916

Options | 916

Required Privilege Level | 916

Release Information | 916

Syntax

ttl-threshold number;

Hierarchy Level

[edit applications application application-name]


916

Description

Specify the traceroute time-to-live (TTL) threshold value. This value sets the acceptable level of network
penetration for trace routing.

Options

number—TTL threshold value.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced before Junos OS Release 7.4.

RELATED DOCUMENTATION

ALG Descriptions
Configuring the TTL Threshold
Examples: Configuring Application Protocols
Verifying the Output of ALG Sessions

unknown-protocol (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 917

Hierarchy Level | 917

Description | 917

Required Privilege Level | 917

Release Information | 917


917

Syntax

unknown-protocol;

Hierarchy Level

[edit services screen ids-option screen-name ip]

Description

Identify and drop IP frames with protocol numbers greater than 137 for IPv4 and 139 for IPv6, which
protects against IP unknown protocol attacks.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

url-filter

IN THIS SECTION

Syntax | 918

Hierarchy Level | 919


918

Description | 919

Options | 919

Required Privilege Level | 919

Release Information | 919

Syntax

url-filter {
profile profile-name {
template template-name {
client-interfaces [ client-interface-name1 client-interface-name2 ];
disable-url-filtering;
dns-resolution-interval minutes;
dns-resolution-rate seconds;
dns-retries number;
dns-routing-instance dns-routing-instance-name;
dns-server [ ip-address1 ip-address2 ip-address3 ];
dns-source-interface loopback-interface-name;
routing-instance routing-instance-name;
server-interfaces [ server-interface-name1 server-interface-name2 ];
term term-name {
from {
src-ip-prefix [prefix1 prefix2];
dest-port [port1 port2];
}
then {
accept;
custom-page custom-page;
http-status-code http-status-code;
redirect-url redirect-url;
tcp-reset;
}
}
url-filter-database filename
}
url-filter-database filename;
919

}
}

Hierarchy Level

[edit services]

Description

Configure URL filtering service.

NOTE: Starting in Junos OS Release 18.3R1, the url-filter statement is deprecated and has been
replaced by the web-filter statement. The url-filter statement is supported for backward
compatibility.

Options

url-filter-database filename Specify the filename of the URL filter database. This option is mandatory.

The remaining statements are explained separately.

Required Privilege Level

system—To view this statement in the configuration.

system-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 17.2.

RELATED DOCUMENTATION

Configuring URL Filtering


URL Filtering Overview
920

url-filter-profile

IN THIS SECTION

Syntax | 920

Hierarchy Level | 920

Description | 920

Options | 921

Required Privilege Level | 921

Release Information | 921

Syntax

url-filter-profile profile-name;

Hierarchy Level

[edit services service-set service-set-name]

Description

Specify the URL filter profile that the service set uses. The URL filter profile specifies how to filter access
to disallowed URLs, and is configured at the [edit services url-filter] hierarchy level.

NOTE: You must also configure the next-hop-service statement with this statement.

NOTE: Starting in Junos OS Release 18.3R1, the url-filter-profile statement is deprecated and
has been replaced by the web-filter-profile statement. The url-filter-profile statement is
supported for backward compatibility.
921

Options

profile-name Name of the URL filter profile.

Required Privilege Level

system—To view this statement in the configuration.

system-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 17.2.

RELATED DOCUMENTATION

Configuring URL Filtering


URL Filtering Overview
url-filter

url-filter-template

IN THIS SECTION

Syntax | 922

Hierarchy Level | 922

Description | 922

Options | 923

Required Privilege Level | 924

Release Information | 924


922

Syntax

url-filter-template template-name {
client-interfaces [ client-interface-name1 client-interface-name2 ];
disable-url-filtering;
dns-resolution-interval minutes;
dns-resolution-rate seconds;
dns-retries number;
dns-routing-instance dns-routing-instance-name;
dns-server [ ip-address1 ip-address2 ip-address3 ];
dns-source-interface loopback-interface-name;
routing-instance routing-instance-name;
security-intelligence-policy
server-interfaces [ server-interface-name1 server-interface-name2 ];
term term-name {
from {
src-ip-prefix [prefix1 prefix2];
dest-port [port1 port2];
}
then {
accept;
custom-page custom-page;
http-status-code http-status-code;
redirect-url redirect-url;
tcp-reset;
}
}
url-filter-database filename
}

Hierarchy Level

[edit services web-filter profile profile-name]

Description

Configure a URL filter template.


923

Options

template-name Name of the URL filter template.

client-interfaces [ client- The list of client-facing logical interfaces (uplink) on which the URL filtering
interface-name1 client- is configured. This option is mandatory.
interface-name2 ]
disable-url-filtering Disables the filtering of HTTP traffic that contains an embedded IP address
(for example, http:/10.1.1.1) belonging to a disallowed domain name in the
URL filter database.

dns-resolution-interval DNS resolution time interval in minutes.


minutes
• Default: 1440

• Range: 60 through 1440 minutes.

dns-resolution-rate Number of DNS queries per second sent out from the system before
seconds initiating further DNS queries.

• Default: 50

• Range: 50 through 100.

dns-retries number Number of retries for a DNS query in case query fails or times out.

• Default: 3

• Range: 1 through 5.

dns-routing-instance The VRF on which the DNS server is reachable. This option is mandatory.
dns-routing-instance- You can use the default routing instance inet.0 or a defined routing instance.
name
dns-server [ ip-address1 One or more IP (IPv4 or IPv6) addresses of DNS servers to which the DNS
ip-address2 ip-address3 ] queries are sent out. This option is mandatory.

dns-source-interface The loopback interface for which source IP address is picked for sending
loopback-interface-name DNS queries. This option is mandatory.

routing-instance routing- The VRF on which URL filtering feature is configured. This option is
instance-name mandatory. You can use the default routing instance inet.0 or a defined
routing instance.

server-interfaces Server-facing interfaces to which traffic is destined. This option is


[ server-interface-name1 mandatory.
server-interface-name2 ]
924

The list of server-facing logical interfaces (downlink) on which the URL


filtering is configured. This option is mandatory.

url-filter-database The filename of the URL filter database. The file should be placed in
filename the /var/db/url-filterd directory, but indicate just the filename here and not
the full path.

The remaining statements are explained separately.

Required Privilege Level

system—To view this statement in the configuration.

system-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 18.3R1 on MX Series.

Statement introduced in Junos OS Release 20.1R1.

RELATED DOCUMENTATION

Configuring URL Filtering

uuid

IN THIS SECTION

Syntax | 925

Hierarchy Level | 925

Description | 925

Options | 925

Required Privilege Level | 925

Release Information | 925


925

Syntax

uuid hex-value;

Hierarchy Level

[edit applications application application-name]

Description

Specify the Universal Unique Identifier (UUID) for DCE RPC objects.

Options

hex-value—Hexadecimal value.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced before Junos OS Release 7.4.

RELATED DOCUMENTATION

ALG Descriptions
Configuring a Universal Unique Identifier
Examples: Configuring Application Protocols
Verifying the Output of ALG Sessions
926

v6rd

IN THIS SECTION

Syntax | 926

Hierarchy Level | 926

Description | 926

Options | 927

Required Privilege Level | 927

Release Information | 927

Syntax

v6rd v6rd-softwire-concentator {
ipv4-prefix ipv4-prefix;
v6rd-prefix ipv6-prefix;
mtu-v4 mtu-v4;
softwire-address ipv4-address;
}

Hierarchy Level

[edit services softwire softwire-concentrator]


[edit services softwires softwire-types

Description

Configure settings for a 6rd concentrator used to process IPv6 packets encapsulated in IPv4 packets.

The v6rd statement is supported only on the MS-DPC, MS-100, MS-400, and MS-500 line cards. The
v6rd statement is not supported on MS-MPCs and MS-MICs.
927

Options

ipv4-prefix—IPv4 prefix of the customer edge (CE) network

ipv6-prefix—IPv6 prefix of the 6rd domain.

mtu-v4— Maximum transmission unit (MTU), in bytes (576 through 9192), for IPv6 packets
encapsulated into IPv4. If the final length is greater than the configured value, the IPv4 packet will be
dropped.

address—IPv4 address of a softwire concentrator. This is an IPv4 address independent of any interface
and on a different prefix.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 10.4.

Support added in Junos OS release 20.2R1 for the v6rd concentrator at the [edit services softwires
softwire-types edit hierarchy for Next Gen Services on MX240, MX480, and MX860 routers.

RELATED DOCUMENTATION

Configuring a 6rd Softwire Concentrator

video (Application Profile)

IN THIS SECTION

Syntax | 928

Hierarchy Level | 928

Description | 928

Default | 928
928

Required Privilege Level | 928

Release Information | 928

Syntax

video {
dscp (alias | bits);
forwarding-class class-name;
}

Hierarchy Level

[edit services cos application-profileprofile-name sip]

Description

Set the appropriate dscp and forwarding-class values for SIP video traffic.

Default

By default, the system will not alter the DSCP or forwarding class for SIP video traffic.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 9.3.


929

RELATED DOCUMENTATION

voice (Application Profile)

video (Application Profile)

IN THIS SECTION

Syntax | 929

Hierarchy Level | 929

Description | 929

Default | 929

Required Privilege Level | 930

Release Information | 930

Syntax

video {
dscp (alias | bits);
forwarding-class class-name;
}

Hierarchy Level

[edit services cos application-profileprofile-name sip]

Description

Set the appropriate dscp and forwarding-class values for SIP video traffic.

Default

By default, the system will not alter the DSCP or forwarding class for SIP video traffic.
930

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 9.3.

RELATED DOCUMENTATION

voice (Application Profile)

virtual-service (Traffic Load Balancer)

IN THIS SECTION

Syntax | 930

Hierarchy Level | 931

Description | 931

Options | 931

Required Privilege Level | 932

Release Information | 932

Syntax

virtual-service virtual-service-name {
address virtual-ip–address;
group group-name;
load-balance-method {
hash {
hash-key method;
}
931

random;
}
mode ( layer2-direct-server-return | direct-server-return | translated );
<routing-instance routing-instance-name>;
<routing-metric route-metric>;
server-interface server-interface;
service service-name {
protocol (udp | tcp);
server-listening-port port;
virtual-port virtual-port;
}
}

Hierarchy Level

[edit services traffic-load-balance instance instance-name]

Description

Configure a TLB virtual service.

Options

address virtual-ip- Address of the virtual service.


address
group group-name Server group for the virtual service.

load-balance method Use a combination of these hash-key methods for the session distribution API:
hash hash-key method
dest-ip Hash on destination IP address.

proto Hash on protocol.

source-ip Hash on source IP address.

load-balance-method Use randomizing algorithm for session distribution.


random
mode ( layer2-direct- Traffic load balancer mode of operation:
server-return | direct-
server-return | direct-server- Transparent mode Layer 3 direct server return.
translated ) return
932

layer2-direct- Transparent mode Layer 2 direct server return. Load


server-return balancing works by changing the Layer 2 MAC of packets;
Layer 3 and higher level headers are not modified.

translated The Packet Forwarding Engine performs stateless load


balancing.

route-metric (Optional) Route metric

• Range: 1 through 255

routing-instance-name (Optional) Routing instance for the virtual service. Default is inet.0.

server-interface (Optional) The server-interface specified under the virtual-service, will be used
server-interface instead of the values provided under the instance level.

service service-name Translated mode details. Packets destined to this virtual ip-address + virtual-
port + protocol will be load balanced to the appropriate server. The destination
IP address and port are replaced by the real services IP address and the server-
listening-port (configured here).

protocol (udp | tcp) Protocol.

server-listening-port port Port number.

virtual-port virtual-port Virtual port number.

virtual-ip–address Local address for the virtual service.

virtual-service-name Identifier for the virtual service.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 16.1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
933

RELATED DOCUMENTATION

Traffic Load Balancer Overview


Configuring TLB

voice

IN THIS SECTION

Syntax | 933

Hierarchy Level | 933

Description | 933

Required Privilege Level | 934

Release Information | 934

Syntax

voice {
dscp (Services CoS) (alias | bits);
forwarding-class (Services PIC Classifiers) class-name;
}

Hierarchy Level

[edit services (CoS) cos application-profile profile-name sip]

Description

Set the appropriate dscp and forwarding-class values for SIP voice traffic.

The remaining statements are explained separately. See CLI Explorer.


934

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 9.3.

RELATED DOCUMENTATION

Configuring Application Profiles for Use as CoS Rule Actions

voice (Application Profile)

IN THIS SECTION

Syntax | 934

Hierarchy Level | 935

Description | 935

Default | 935

Required Privilege Level | 935

Release Information | 935

Syntax

voice {
dscp (alias | bits);
forwarding-class class-name;
}
935

Hierarchy Level

[edit services cos application-profileprofile-name sip]

Description

Set the appropriate dscp and forwarding-class values for SIP voice traffic.

Default

By default, the system will not alter the DSCP or forwarding class for SIP voice traffic.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 9.3.

RELATED DOCUMENTATION

Configuring CoS Rules on Services PICs


video (Application Profile)

web-filter

IN THIS SECTION

Syntax | 936

Hierarchy Level | 937

Description | 938
936

Required Privilege Level | 938

Release Information | 938

Syntax

web-filter {
profile (Web Filter) profile-name {
dns-filter {
database-file filename;
dns-resp-ttl seconds;
dns-server [ ip-address ];
hash-key key-string;
hash-method hash-method-name;
statistics-log-timer minutes;
wildcarding-level level;
}
dns-filter-template template-name {
client-interfaces [ client-interface-name ];
client-routing-instance client-routing-instance-name;
dns-filter {
database-file filename;
dns-resp-ttl seconds;
dns-server [ ip-address ];
hash-key key-string;
hash-method hash-method-name;
statistics-log-timer minutes;
wildcarding-level level;
}
server-interfaces [ server-interface-name ];
server-routing-instance server-routing-instance-name;
term term-name {
from {
src-ip-prefix [ source-prefix ];
}
then {
accept;
dns-sinkhole;
}
937

}
}
global-dns-stats-log-timer minutes;
url-filter-database filename;
url-filter-template template-name {
client-interfaces [ client-interface-name1 client-interface-name2 ];
disable-url-filtering;
dns-resolution-interval minutes;
dns-resolution-rate seconds;
dns-retries number;
dns-routing-instance dns-routing-instance-name;
dns-server [ ip-address1 ip-address2 ip-address3 ];
dns-source-interface loopback-interface-name;
dns-routing-instance dns-routing-instance-name;
routing-instance routing-instance-name;
server-interfaces [ server-interface-name1 server-interface-name2 ];
term term-name {
from {
src-ip-prefix [prefix1 prefix2];
dest-port [port1 port2];
}
then {
accept;
custom-page custom-page;
http-status-code http-status-code;
redirect-url redirect-url;
tcp-reset;
}
}
url-filter-database filename
}
}
}

Hierarchy Level

[edit services]
938

Description

Configure filtering of DNS requests for disallowed website domains. Filtering can result in either:

• Blocking access to the site by sending the client a DNS response that includes an IP address or
domain name of a sinkhole server instead of the disallowed domain.

• Logging the DNS request and allowing access.

The remaining statements are explained separately. See CLI Explorer.

Required Privilege Level

system—To view this statement in the configuration.

system-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 18.3R1 on MX Series.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

DNS Request Filtering for Disallowed Website Domains

web-filter-profile

IN THIS SECTION

Syntax | 939

Hierarchy Level | 939

Description | 939

Options | 939

Required Privilege Level | 939


939

Release Information | 939

Syntax

web-filter-profile profile-name;

Hierarchy Level

[edit services service-set service-set-name]

Description

Specify the DNS filter profile or the URL filter profile that the service set uses. The filter profile is
configured at the [edit services web-filter] hierarchy level, and specifies how to filter DNS requests for
disallowed website domains or how to filter access to disallowed URLs.

Options

profile-name Name of the DNS filter profile.

Required Privilege Level

system—To view this statement in the configuration.

system-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 18.3R1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
940

RELATED DOCUMENTATION

DNS Request Filtering for Disallowed Website Domains

winnuke (IDS Screen Next Gen Services)

IN THIS SECTION

Syntax | 940

Hierarchy Level | 940

Description | 940

Required Privilege Level | 940

Release Information | 941

Syntax

winnuke;

Hierarchy Level

[edit services screen ids-option screen-name tcp]

Description

Identify and drop TCP segments that are destined for port 139 and have the urgent (URG) flag set,
which provides protection against WinNuke attacks.

Required Privilege Level

interface—To view this statement in the configuration.

interface-control—To add this statement to the configuration.


941

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349

world-readable (Next Gen Services Global System Logging)

IN THIS SECTION

Syntax | 941

Hierarchy Level | 941

Description | 941

Options | 942

Required Privilege Level | 942

Release Information | 942

Syntax

world-readable;

Hierarchy Level

[edit services rtlog traceoptions file]

Description

Allow any user to read the log file


942

Options

world-readable Allow any user to read the log file

Required Privilege Level

system

Release Information

Statement introduced in Junos OS Release 19.3R2.

RELATED DOCUMENTATION

Understanding Next Gen Services CGNAT Global System Logging | 125


Enabling Global System Logging for Next Gen Services | 127
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128

xlat-source-rule

IN THIS SECTION

Syntax | 943

Hierarchy Level | 943

Description | 943

Required Privilege Level | 943

Release Information | 943


943

Syntax

xlat-source-rule {
rule-set r1 {
rule r1;
}
}

Hierarchy Level

[edit services nat destination rule-set name rule name then destination-nat]

Description

Set the source NAT rule to match for NAT464

Required Privilege Level

system—To view this statement in the configuration.

system-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 21.1R1.


14 PART

Operational Commands

Operational Commands | 945


945

CHAPTER 36

Operational Commands

IN THIS CHAPTER

clear log (Next Gen Services) | 948

clear services alg statistics | 949

clear services nat source mappings | 950

clear services sessions | 953

clear services sessions analysis | 958

clear services stateful-firewall flows | 959

clear services stateful-firewall sip-call | 962

clear services stateful-firewall sip-register | 966

clear services stateful-firewall statistics | 970

clear services subscriber analysis | 971

clear services web-filter statistics profile | 972

request services web-filter update dns-filter-database | 974

request services web-filter validate dns-filter-file-name | 975

request system disable unified-services | 976

request system enable unified-services | 978

show interfaces load-balancing (Aggregated Multiservices) | 979

show log | 985

show services alg conversations | 992

show services alg statistics | 1001

show services cos statistics (Next Gen Services) | 1021

show services inline softwire statistics | 1026

show services inline ip-reassembly statistics | 1032

show services nat destination pool | 1040

show services nat destination rule | 1042

show services nat destination summary | 1046

show services nat ipv6-multicast-interfaces | 1049


946

show services nat resource-usage source-pool | 1052

show services nat source deterministic | 1054

show services nat source mappings address-pooling-paired | 1057

show services nat source mappings endpoint-independent | 1061

show services nat source mappings pcp | 1065

show services nat source mappings summary | 1067

show services nat source pool | 1069

show services nat source port-block | 1075

show services nat source rule | 1079

show services nat source rule-application | 1083

show services nat source summary | 1085

show services pcp statistics | 1088

show services policies | 1092

show services policies detail | 1095

show services policies hit-count | 1099

show services policies interface | 1100

show services policies service-set | 1102

show services redundancy-group | 1103

show services screen ids-option (Next Gen Services) | 1116

show services screen-statistics service-set (Next Gen Services) | 1119

show services security-intelligence category summary | 1125

show services security-intelligence update status | 1128

show services service-sets cpu-usage | 1129

show services service-sets memory-usage | 1132

show services service-sets plug-ins | 1134

show services service-sets statistic screen-drops (Next Gen Services) | 1136

show services service-sets statistic screen-session-limit-counters (Next Gen Services) | 1146

show services service-sets statistics integrity-drops | 1156

show services service-sets statistics packet-drops | 1162

show services service-sets statistics syslog | 1165

show services service-sets statistics tcp | 1175

show services service-sets summary | 1177


947

show services sessions (Next Gen Services) | 1179

show services sessions (Aggregated Multiservices) | 1194

show services sessions analysis | 1204

show services sessions analysis (USF) | 1210

show services sessions count | 1215

show services sessions service-set | 1216

show services sessions service-set | 1218

show services sessions softwire | 1220

show services sessions utilization | 1225

show services softwire | 1226

show services softwire flows | 1229

show services softwire statistics | 1234

show services stateful-firewall conversations | 1246

show services stateful-firewall flow-analysis | 1252

show services stateful-firewall flows | 1259

show services stateful-firewall sip-call | 1267

show services stateful-firewall sip-register | 1273

show services stateful-firewall statistics | 1278

show services stateful-firewall statistics application-protocol sip | 1291

show services subscriber analysis | 1296

show services tcp-log | 1300

show services traffic-load-balance statistics | 1301

show services web-filter dns-resolution profile | 1319

show services web-filter dns-resolution-statistics profile template | 1323

show services web-filter secintel-policy status | 1329

show services web-filter statistics dns-filter-template | 1333

show services web-filter statistics profile | 1336

show system unified-services status | 1343


948

clear log (Next Gen Services)

IN THIS SECTION

Syntax | 948

Description | 948

Options | 948

Required Privilege Level | 948

Output Fields | 948

Sample Output | 949

Release Information | 949

Syntax

clear log service-set | interface | file-name

Description

Clear log for service-set, interface, or file.

Options

service-set Specify the name of the service-set for which you want to clear the log.

interface-name Specify the name of the interface for which you want to clear the log.

file-name Specify the file-name for which you want to clear the log.

Required Privilege Level

View

Output Fields

This command produces no output.


949

Sample Output

clear log

user@host> clear log vms 1/0/0

Release Information

Command introduced in Junos OS Release 20.3R1.

RELATED DOCUMENTATION

monitor start (JDM)

clear services alg statistics

IN THIS SECTION

Syntax | 949

Description | 949

Options | 950

Required Privilege Level | 950

Release Information | 950

Syntax

clear services alg statistics

Description

Clear ALG statistics for Junos OS extension-provider packages.


950

Options

application-profile Clear all sessions for the application profile.

interface Clear all sessions for the interface.

Required Privilege Level

view

Release Information

Command introduced in Junos OS Release 10.4.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

clear services nat source mappings

IN THIS SECTION

Syntax | 951

Description | 951

Options | 951

Required Privilege Level | 951

Output Fields | 951

Sample Output | 952

Release Information | 953


951

Syntax

clear services nat source mappings


<app | eim | pcp>
subscriber private-ip [port port-num] [service-set service-set]

Description

Clear services NAT source mappings. After one mapping is cleared, all the port block alloation blocks
referring to that mapping are released.

Options

app Clear all APP mappings.

app subscriber private-ip [port port-num] [service-set Clear one APP mapping by matching conditions
service-set ]
eim Clear all EIM mappings.

eim subscriber private-ip [port port-num] [service-set Clear one EIM mapping by matching conditions
service-set ]
pcp Clear all PCP mappings.

Required Privilege Level

view

Output Fields

Table 56 on page 951 lists the output fields for the clear services nat source mappings command.
Output fields are listed in the approximate order in which they appear.

Table 56: clear services nat source mappings Output Fields

Field Name Field Description

NAT pool Name of the NAT pool.


952

Table 56: clear services nat source mappings Output Fields (Continued)

Field Name Field Description

Mappings removed Number of mappings removed.

Sessions removed Number of sessions removed.

Sample Output

clear services nat source mappings eim

user@host> clear services nat source mappings eim


NAT pool Mappings removed Sessions removed
Test-pool 1 0

clear service nat source mappings eim subscriber 2.1.1.1

user@host> clear service nat source mappings eim subscriber 2.1.1.1


NAT pool Mappings removed Sessions removed
Test-pool 1 0

clear services nat source mappings subscriber 2.1.1.1 port 1026 service-set ss1

user@host> clear services nat source mappings subscriber 2.1.1.1 port 1026 service-set
ss1
NAT pool Mappings removed Sessions removed
Test-pool 1 0
953

clear services nat source mappings app

user@host> clear services nat source mappings app


NAT pool Mappings removed Sessions removed
Test-pool 1 0

clear services nat source mappings app subscriber 2.1.1.1

user@host> clear services nat source mappings app subscriber 2.1.1.1


NAT pool Mappings removed Sessions removed
Test-pool 1 0

clear services nat source mappings app subscriber 2.1.1.1 port 1026 service-set ss1

user@host> clear services nat source mappings app subscriber 2.1.1.1 port 1026 service-set
ss1
NAT pool Mappings removed Sessions removed
Test-pool 1 0

Release Information

Command introduced in Junos OS Release 19.3R2.

clear services sessions

IN THIS SECTION

Syntax | 954

Description | 954

Options | 954

Required Privilege Level | 957

Output Fields | 957


954

Sample Output | 957

Release Information | 957

Syntax

clear services sessions


<application-protocol protocol>
<destination-port destination-port>
<destination-prefix destination-prefix>
<interface interface-name>
<ip-action>
<protocol protocol>
<service-set service-set>
<source-port source-port>
<source-prefix source-prefix>

Description

Clear services sessions currently active on the embedded PIC or MIC. When you enter this command,
the sessions are marked for deletion and are cleared thereafter. The time that is taken to clear the
currently active sessions varies, depending on the scaled nature of the environment.

Options

none Clear all sessions.

application- (Optional) Clear sessions for one of the following application protocols:
protocol protocol
• bootp—Bootstrap protocol

• dce-rpc—Distributed Computing Environment-Remote Procedure Call protocols

• dce-rpc-portmap—Distributed Computing Environment-Remote Procedure Call


protocols portmap service

• dns—Domain Name System protocol


955

• exec—Exec

• ftp—File Transfer Protocol

• h323—H.323 standards

• icmp—Internet Control Message Protocol

• iiop—Internet Inter-ORB Protocol

• ip—IP

• login—Login

• netbios—NetBIOS

• netshow—NetShow

• pptp—Point-to-Point Tunneling Protocol

• realaudio—RealAudio

• rpc—Remote Procedure Call protocol

• rpc-portmap—Remote Procedure Call protocol portmap service

• rtsp—Real-Time Streaming Protocol

• shell—Shell

• sip—Session Initiation Protocol

• snmp—Simple Network Management Protocol

• sqlnet—SQLNet

• talk—Talk Program

• tftp—Trivial File Transfer Protocol

• traceroute—Traceroute

• winframe—WinFrame

destination-port (Optional) Clear sessions for the specified destination port. The range of values is
destination-port from 0 to 65535.

destination-prefix (Optional) Clear sessions for the specified destination prefix.


destination-prefix
956

interface (Optional) Clear sessions for the specified interface. On M Series and T Series
interface-name routers, the interface-name can be ms-fpc/ pic/ port or rspnumber.

ip-action (Optional) Clear ip-action entries generated by the router to log, drop, or block
traffic based on previous matches. The IP action options and targets are configured
at the {edit security idp idp-policy policy-name rulebase-ips rule rule-name then]
hierarchy level.

protocol protocol (Optional) Clear sessions for one of the following IP types:

• number—Numeric protocol value from 0 to 255

• ah—IPsec Authentication Header protocol

• egp—An exterior gateway protocol

• esp—IPsec Encapsulating Security Payload protocol

• gre—A generic routing encapsulation protocol

• icmp—Internet Control Message Protocol

• icmp6—Internet Control Message Protocol version 6

• igmp—Internet Group Management Protocol

• ipip—IP-over-IP Encapsulation Protocol

• ospf—Open Shortest Path First protocol

• pim—Protocol Independent Multicast protocol

• rsvp—Resource Reservation Protocol

• sctp—Stream Control Transmission Protocol

• tcp—Transmission Control Protocol

• udp—User Datagram Protocol

service-set (Optional) Clear sessions for the specified service set.


service-set
source-port (Optional) Clear sessions for the specified source port. The range of values is from 0
source-port through 65535.

source-prefix (Optional) Clear sessions for the specified source prefix.


source-prefix
957

Required Privilege Level

clear

Output Fields

Table 57 on page 957 lists the output fields for the clear services sessions command. Output fields are
listed in the approximate order in which they appear.

Table 57: clear services sessions Output Fields

Field Name Field Description

Interface Name of an interface.

Service set Name of the service set from which sessions are being cleared.

Sessions marked for deletion Number of sessions that are marked for deletion and are subsequently
cleared.

Sample Output

clear services sessions

user@host>clear services sessions


Interface Service set Sessions marked for deletion
ms-0/0/0 sset 10

Release Information

Command introduced in Junos OS Release 13.1.

RELATED DOCUMENTATION

show services sessions


958

clear services sessions analysis

IN THIS SECTION

Syntax | 958

Description | 958

Options | 958

Required Privilege Level | 958

Release Information | 958

Syntax

clear services sessions analysis

Description

Clear session statistics.

Options

interface interface- (Optional) Clear sessions statistics for the specified interface. The interface-name
name can be vms-fpc/ pic/ port.

Required Privilege Level

view

Release Information

Statement introduced in Junos OS Release 17.1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
959

clear services stateful-firewall flows

IN THIS SECTION

Syntax | 959

Description | 959

Options | 960

Required Privilege Level | 961

Output Fields | 961

Sample Output | 961

Release Information | 961

Syntax

clear services stateful-firewall flows


<application-protocol protocol>
<destination-port destination-port>
<destination-prefix destination-prefix>
<interface interface-name>
<protocol protocol>
<service-set service-set>
<source-port source-port>
<source-prefix source-prefix>

Description

Clear stateful firewall flows. Issue this command to clear the stateful firewall flows for the specified
option. The default option is "none", that is, to close all stateful firewall flows unless another option is
specified.

Starting in Junos Release 14.1, the method for closing flows has changed. With the change, even for
peak flows, the command prompt now returns to an active state after 30 seconds and the clear
command completes in 90 to 120 seconds. In previous releases, closing peak flows could take as long as
4 minutes, after which the command prompt would return. Note too that during the first 30 seconds of
issuing the command, the flows to be deleted remain visible in the show services stateful-firewall flows
command output.
960

Options

none Clear all stateful firewall flows.

destination-port (Optional) Clear stateful firewall flows for a particular destination port. The range
destination-port of values is 0 to 65535.

destination-prefix (Optional) Clear stateful firewall flows for a particular destination prefix.
destination-prefix
interface interface- (Optional) Clear stateful firewall flows for a particular interface. On M Series and T
name Series routers, the interface-name can be ms-fpc/pic/port or rspnumber.

protocol (Optional) Clear stateful firewall flows for one of the following IP types:

• number—Numeric protocol value from 0 to 255.

• ah—IPsec Authentication Header protocol

• egp—An exterior gateway protocol

• esp—IPsec Encapsulating Security Payload protocol

• gre—A generic routing encapsulation protocol

• icmp—Internet Control Message Protocol

• igmp—Internet Group Management Protocol

• ipip—IP-over-IP Encapsulation Protocol

• ospf—Open Shortest Path First protocol

• pim—Protocol Independent Multicast protocol

• rsvp—Resource Reservation Protocol

• sctp—Stream Control Protocol

• tcp—Transmission Control Protocol

• udp—User Datagram Protocol

service-set service- (Optional) Clear stateful firewall flows for a particular service set.
set
source-port source- (Optional) Clear stateful firewall flows for a particular source port. The range of
port values is from 0 through 65535.
961

source-prefix (Optional) Clear stateful firewall flows for a particular source prefix.
source-prefix

Required Privilege Level

view

Output Fields

Table 58 on page 961 lists the output fields for the clear services stateful-firewall flows command.
Output fields are listed in the approximate order in which they appear.

Table 58: clear services stateful-firewall flows Output Fields

Field Name Field Description

Interface Name of an adaptive services interface.

Service set Name of the service set from which flows are being cleared.

Conv removed Number of conversations removed.

Sample Output

clear services stateful-firewall flows

user@host> clear services stateful-firewall flows


Interface Service set Conv removed
ms-0/3/0 svc_set_trust 0
ms-0/3/0 svc_set_untrust 0

Release Information

Command introduced before Junos OS Release 7.4.


962

RELATED DOCUMENTATION

show services stateful-firewall flows

clear services stateful-firewall sip-call

IN THIS SECTION

Syntax | 962

Description | 962

Options | 963

Required Privilege Level | 965

Output Fields | 965

Sample Output | 965

Release Information | 965

Syntax

clear services stateful-firewall sip-call


<application-protocol protocol>
<destination-port destination-port>
<destination-prefix destination-prefix>
<interface interface-name>
<protocol protocol>
<service-set service-set>
<source-port source-port>
<source-prefix source-prefix>

Description

Clear Session Initiation Protocol (SIP) call information in stateful firewall flows.
963

Options

none Clear stateful firewall statistics for all interfaces and all service sets.

application- (Optional) Clear information about one of the following application protocols:
protocol
• bootp—(SIP only) Bootstrap protocol

• dce-rpc—(SIP only) Distributed Computing Environment-Remote Procedure Call


protocols

• dce-rpc-portmap—(SIP only) Distributed Computing Environment-Remote


Procedure Call protocols portmap service

• dns—(SIP only) Domain Name System protocol

• exec—(SIP only) Exec

• ftp—(SIP only) File Transfer Protocol

• h323—H.323 standards

• icmp—Internet Control Message Protocol

• iiop—Internet Inter-ORB Protocol

• login—Login

• netbios—NetBIOS

• netshow—NetShow

• realaudio—RealAudio

• rpc—Remote Procedure Call protocol

• rpc-portmap—Remote Procedure Call protocol portmap service

• rtsp—Real-Time Streaming Protocol

• shell—Shell

• sip—Session Initiation Protocol

• snmp—Simple Network Management Protocol

• sqlnet—SQLNet
964

• tftp—Trivial File Transfer Protocol

• traceroute—Traceroute

• winframe—WinFrame

destination-port (Optional) Clear information for a particular destination port. The range of values is
destination-port 0 to 65535.

destination-prefix (Optional) Clear information for a particular destination prefix.


destination-prefix
interface (Optional) Clear information for a particular adaptive services interface. On M
interface-name Series and T Series routers, the interface-name can be sp-fpc/pic/port or
rspnumber.

protocol (Optional) Clear information about one of the following IP types:

• ah—IPsec Authentication Header protocol

• egp—An exterior gateway protocol

• esp—IPsec Encapsulating Security Payload protocol

• gre—A generic routing encapsulation protocol

• icmp—Internet Control Message Protocol

• igmp—Internet Group Management Protocol

• ipip—IP-within-IP Encapsulation Protocol

• ipv6—IPv6 within IP

• ospf—Open Shortest Path First protocol

• pim—Protocol Independent Multicast protocol

• rsvp—Resource Reservation Protocol

• sctp—Stream Control Protocol

• tcp—Transmission Control Protocol

• udp—User Datagram Protocol

service-set (Optional) Clear information for a particular service set.


service-set
965

source-port (Optional) Clear information for a particular source port. The range of values is 0 to
source-port 65535.

source-prefix (Optional) Clear information for a particular source prefix.


source-prefix

Required Privilege Level

view

Output Fields

Table 59 on page 965 lists the output fields for the clear services stateful-firewall sip-call command.
Output fields are listed in the approximate order in which they appear.

Table 59: clear services stateful-firewall sip-call Output Fields

Field Name Field Description

Interface Name of an adaptive services interface.

Service set Name of the service set from which flows are being cleared.

SIP calls removed Number of SIP calls removed.

Sample Output

clear services stateful-firewall sip-call

user@host> clear services stateful-firewall sip-call


Interface Service set SIP calls removed
sp-0/3/0 test_sip_777 1

Release Information

Command introduced in Junos OS Release 7.4.


966

RELATED DOCUMENTATION

show services stateful-firewall sip-call

clear services stateful-firewall sip-register

IN THIS SECTION

Syntax | 966

Description | 966

Options | 967

Required Privilege Level | 969

Output Fields | 969

Sample Output | 969

Release Information | 969

Syntax

clear services stateful-firewall sip-register


<application-protocol protocol>
<destination-port destination-port>
<destination-prefix destination-prefix>
<interface interface-name>
<protocol protocol>
<service-set service-set>
<source-port source-port>
<source-prefix source-prefix>

Description

Clear Session Initiation Protocol (SIP) register information in stateful firewall flows.
967

Options

application- (Optional) Clear information about one of the following application protocols:
protocol
• bootp—(SIP only) Bootstrap protocol

• dce-rpc—(SIP only) Distributed Computing Environment-Remote Procedure Call


protocols

• dce-rpc-portmap—(SIP only) Distributed Computing Environment-Remote


Procedure Call protocols portmap service

• dns—(SIP only) Domain Name System protocol

• exec—(SIP only) Exec

• ftp—(SIP only) File Transfer Protocol

• h323—H.323 standards

• icmp—Internet Control Message Protocol

• iiop—Internet Inter-ORB Protocol

• login—Login

• netbios—NetBIOS

• netshow—NetShow

• realaudio—RealAudio

• rpc—Remote Procedure Call protocol

• rpc-portmap—Remote Procedure Call protocol portmap service

• rtsp—Real-Time Streaming Protocol

• shell—Shell

• sip—Session Initiation Protocol

• snmp—Simple Network Management Protocol

• sqlnet—SQLNet

• tftp—Trivial File Transfer Protocol


968

• traceroute—Traceroute

• winframe—WinFrame

destination-port (Optional) Clear information for a particular destination port. The range of values is
destination-port 0 to 65535.

destination-prefix (Optional) Clear information for a particular destination prefix.


destination-prefix
interface (Optional) Clear information about a particular interface. On M Series and T Series
interface routers, the interface-name can be sp-fpc/pic/port or rspnumber.

protocol (Optional) Clear information about one of the following IP types:

• ah—IPsec Authentication Header protocol

• egp—An exterior gateway protocol

• esp—IPsec Encapsulating Security Payload protocol

• gre—A generic routing encapsulation protocol

• icmp—Internet Control Message Protocol

• igmp—Internet Group Management Protocol

• ipip—IP-within-IP Encapsulation Protocol

• ipv6—IPv6 within IP

• ospf—Open Shortest Path First protocol

• pim—Protocol Independent Multicast protocol

• rsvp—Resource Reservation Protocol

• sctp—Stream Control Protocol

• tcp—Transmission Control Protocol

• udp—User Datagram Protocol

service-set (Optional) Clear information for a particular service set.


service-set
source-port (Optional) Clear information for a particular source port. The range of values is 0
source-port through 65535.

source-prefix (Optional) Clear information for a particular source prefix.


source-prefix
969

Required Privilege Level

view

Output Fields

Table 60 on page 969 lists the output fields for the clear services stateful-firewall sip-register
command. Output fields are listed in the approximate order in which they appear.

Table 60: clear services stateful-firewall sip-register Output Fields

Field Name Field Description

Interface Name of an adaptive services interface.

Service set Name of the service set from which flows are being cleared.

SIP registration removed Number of SIP registers removed.

Sample Output

clear services stateful-firewall sip-register

user@host> clear services stateful-firewall sip-register


Interface Service set SIP registration removed
sp-0/3/0 test_sip_777 1

Release Information

Command introduced in Junos OS Release 7.4.

RELATED DOCUMENTATION

show services stateful-firewall sip-register


970

clear services stateful-firewall statistics

IN THIS SECTION

Syntax | 970

Description | 970

Options | 970

Required Privilege Level | 971

Output Fields | 971

Sample Output | 971

Release Information | 971

Syntax

clear services stateful-firewall statistics


<interface interface-name>
<service-set service-set>

Description

Clear stateful firewall statistics.

Options

none Clear stateful firewall statistics for all interfaces and all service sets.

interface interface-name (Optional) Clear stateful firewall statistics for the specified interface. On M
Series and T Series routers, the interface-name can be ms-fpc/pic/port or
rspnumber.

service-set service-set (Optional) Clear stateful firewall statistics for the specified service set.
971

Required Privilege Level

view

Output Fields

When you enter this command, you are provided feedback on the status of your request.

Sample Output

clear services stateful-firewall statistics

user@host> clear services stateful-firewall statistics

Release Information

Command introduced before Junos OS Release 7.4.

RELATED DOCUMENTATION

show services stateful-firewall statistics

clear services subscriber analysis

IN THIS SECTION

Syntax | 972

Description | 972

Options | 972

Required Privilege Level | 972

Release Information | 972


972

Syntax

clear services subscriber analysis

Description

Clear information about the number of active subscribers on the services PIC.

Options

interface interface-name (Optional) Display information about a particular interface.

Required Privilege Level

view

Release Information

Statement introduced in Junos OS Release 17.1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

clear services web-filter statistics profile

IN THIS SECTION

Syntax | 973

Description | 973

Options | 973

Required Privilege Level | 973

Output Fields | 973

Sample Output | 973

Release Information | 974


973

Syntax

clear services web-filter statistics profile profile-name


<dns-filter-template template-name>
<fpc-slot fpc-slot pic-slot pic-slot>
<url-filter-template template-name>

Description

Clear statistics for DNS request filtering or URL filtering for the specified filter profile.

Options

dns-filter-template template- (Optional) Name of the DNS filter template for which statistics are
name cleared.

fpc-slot fpc-slot pic-slot pic-slot (Optional) Location of the services PIC for which statistics are
cleared.

profile profile-name Name of the filter profile for which statistics are cleared.

url-filter-template template- (Optional) Name of the URL filter template for which statistics are
name cleared.

Required Privilege Level

clear

Output Fields

When you enter this command, the statistics for DNS request filtering are cleared. There is no specific
output.

Sample Output

clear services web-filter statistics profile

user@host> clear services web-filter statistics profile profile1


974

Release Information

Command introduced in Junos OS Release 18.3R1.

RELATED DOCUMENTATION

DNS Request Filtering for Disallowed Website Domains


Configuring URL Filtering

request services web-filter update dns-filter-database

IN THIS SECTION

Syntax | 974

Description | 974

Options | 974

Required Privilege Level | 975

Release Information | 975

Syntax

request services web-filter update dns-filter-database filename

Description

When you make changes to the domain filter database file, which is used in filtering DNS requests for
disallowed domains, apply the changes.

Options

filename File name of the database file.


975

Required Privilege Level

maintenance

Release Information

Command introduced in Junos OS Release 18.3R1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

DNS Request Filtering for Disallowed Website Domains

request services web-filter validate dns-filter-file-name

IN THIS SECTION

Syntax | 975

Description | 976

Options | 976

Required Privilege Level | 976

Release Information | 976

Syntax

request services web-filter validate dns-filter-file-name filename hash-key key-


string hash-method hash-method-name
976

Description

Validate the file format of the domain filter database file, which is used in filtering DNS requests for
disallowed domains.

Options

filename File name of the database file.

hash-method-name Hash method you used to produce the hashed domain name values in the
database file.

key-string Hash key you used to produce the hashed domain name values in the database
file.

Required Privilege Level

maintenance

Release Information

Command introduced in Junos OS Release 18.3R1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

DNS Request Filtering for Disallowed Website Domains

request system disable unified-services

IN THIS SECTION

Syntax | 977

Description | 977
977

Required Privilege Level | 977

Output Fields | 977

Sample Output | 977

Release Information | 978

Syntax

request system disable unified-services

Description

Disable Next Gen Services services on the MX Series.

Before you disable Next Gen Services, delete any router configuration for services. This includes
configuration under the [edit services] hierarchy, configuration for services interfaces, and any
configuration that refers to services interfaces.

After you enter request system enable unified-services, reboot the chassis.

Required Privilege Level

Output Fields

When you enter this command, you are provided feedback on the status of your request.

Sample Output

request system disable unified-services

user@host> request system disable unified-services


Before disabling unified services, please move to baseline configuration.
Are above conditions satisfied ? [yes,no]
978

Release Information

Command introduced in Junos OS Release 19.3R1.

RELATED DOCUMENTATION

Enabling and Disabling Next Gen Services | 121

request system enable unified-services

IN THIS SECTION

Syntax | 978

Description | 978

Required Privilege Level | 979

Output Fields | 979

Sample Output | 979

Release Information | 979

Syntax

request system enable unified-services

Description

Enable Next Gen Services services on the MX Series.

Before you enable Next Gen Services, delete any router configuration for services. This includes
configuration under the [edit services] hierarchy, configuration for services interfaces, and any
configuration that refers to services interfaces.

After you enter request system enable unified-services, reboot the chassis.
979

In Junos node slicing, you can enable unified services at guest network function (GNF), by using the CLI
request system enable unified-services at GNF.

Required Privilege Level

Output Fields

When you enter this command, you are provided feedback on the status of your request.

Sample Output

request system enable unified-services

user@host> request system enable unified-services


Before enabling unified services, please move to baseline configuration.
Are above conditions satisfied ? [yes,no]

Release Information

Command introduced in Junos OS Release 19.3R1.

RELATED DOCUMENTATION

Enabling and Disabling Next Gen Services | 121

show interfaces load-balancing (Aggregated Multiservices)

IN THIS SECTION

Syntax | 980

Description | 980

Options | 980

Required Privilege Level | 980


980

Output Fields | 980

Sample Output | 983

Release Information | 985

Syntax

show interfaces load-balancing


<detail>
<interface-name>

Description

Display information about the aggregated multiservices interface (AMS) as well as its individual member
interfaces and the status of the replication state.

Options

none Display standard information about status of all AMS interfaces.

detail (Optional) Display detailed status of all AMS interfaces.

interface-name (Optional) Name of the aggregated multiservices interface (ams). If this is omitted, then
the information for all the aggregated multiservices interfaces, including those used in
control plane redundancy and high availability (HA) for service applications, is
displayed.

Required Privilege Level

view

Output Fields

Table 61 on page 981 lists the output fields for the show interfaces load-balancing (aggregated
multiservices interfaces) command. Output fields are listed in the approximate order in which they
appear.
981

Table 61: Aggregated Multiservices show interfaces load-balancing Output Fields

Field Name Field Description Level of Output

Interface Name of the aggregated multiservices (AMS) interface. detail none

State Status of AMS interfaces: detail none

• Coming Up—Interface is becoming operational.

• Members Seen—Member interfaces (mams) are available.

• Up—Interface is configured and operational.

• Wait for Members—Member interfaces (mams) are not


available.

• Wait Timer—Interface is waiting for member interfaces


(mams) to come online.

Last change Time (in hh:mm:ss [hours:minutes:seconds] format) when the detail none
state last changed.

Members Number of member interfaces (mams-). none specified

Member count Number of member PICs (mams) that are part of the aggregated detail none
interface.

HA Model High availability (HA) model supported on the interface. detail none

• Many-to-One—The preferred backup Multiservices PIC, in


hot standby mode, backs up one or more (N) active
Multiservices PICs.

• One-to-One—–The preferred backup Multiservices PIC, in


hot standby mode, backs up only one active Multiservices
PIC.

NOTE: One-to-One is not supported on MX-SPC3 cards.


982

Table 61: Aggregated Multiservices show interfaces load-balancing Output Fields (Continued)

Field Name Field Description Level of Output

Members Information about the member interfaces: detail

• Interface—Name of the member interface.

• Weight—Not applicable for the current release.

• State—State of the member interface (mams-).

• Active—Member is an active member.

• Backup—Member is a backup.

• Discard—Member has not yet rejoined the ams interface


after failure.

• Down—Member has not yet powered on.

• Inactive—Member has failed to rejoin the ams interface


within the configured rejoin-timeout.

• Invalid—Multiservices PIC corresponding to the member


interface has been configured but is not physically present
in the chassis.
983

Table 61: Aggregated Multiservices show interfaces load-balancing Output Fields (Continued)

Field Name Field Description Level of Output

Sync-state Synchronization (sync) status of the control plane redundancy. detail


The sync state is displayed only when the ams interface is Up.

• Interface—Name of the member interface.

• Status—Synchronization status of the member interfaces.

• In progress—The active member is currently synchronizing


its state information with the backup member.

• In sync—The active member has finished synchronizing its


state information with the backup and the backup is ready
to take over if the active member fails.

• NA (Not applicable)—The backup member is not yet ready


to synchronize with the active (primary) member. This
condition may occur if the backup is still powered off or
still booting.

• Unknown—The daemons are still initializing and the state


information is unavailable.

Sample Output

show interfaces load-balancing

user@host> show interfaces load-balancing


Interface State Last change Members HA Model
ams0 Up 00:10:02 4 Many-to-One

show interfaces load-balancing detail

user@host> show interfaces load-balancing detail


Load-balancing interfaces detail
Interface : ams0
984

State : Up
Last change : 00:10:23
Member count : 4
HA Model : Many-to-One
Members :
Interface Weight State
mams-4/0/0 10 Active
mams-4/1/0 10 Active
mams-5/0/0 10 Active
mams-5/1/0 10 Backup
Sync-state :
Interface Status
mams-4/0/0 Unknown
mams-4/1/0 Unknown
mams-5/0/0 Unknown

show interfaces load-balancing detail (Specific Interface)

user@host> show interfaces load-balancing ams0 detail


Load-balancing interfaces detail
Interface : ams0
State : Up
Last change : 00:11:28
Member count : 4
HA Model : Many-to-One
Members :
Interface Weight State
mams-4/0/0 10 Active
mams-4/1/0 10 Active
mams-5/0/0 10 Active
mams-5/1/0 10 Backup
Sync-state :
Interface Status
mams-4/0/0 Unknown
mams-4/1/0 Unknown
mams-5/0/0 Unknown
985

Release Information

Command introduced in Junos OS Release 11.4.

interface-name option added in Junos OS Release 16.1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Understanding Aggregated Multiservices Interfaces


Understanding Aggregated Multiservices Interfaces for Next Gen Services
Example: Configuring an Aggregated Multiservices Interface (AMS)

show log

IN THIS SECTION

Syntax | 985

Syntax (QFX Series and OCX Series) | 986

Syntax (TX Matrix Router) | 986

Description | 986

Options | 986

Required Privilege Level | 987

Sample Output | 987

Release Information | 992

Syntax

show log
<filename | user <username>>
986

Syntax (QFX Series and OCX Series)

show log filename


<device-type (device-id | device-alias)>

Syntax (TX Matrix Router)

show log
<all-lcc | lcc number | scc>
<filename | user <username>>

Description

List log files, display log file contents, or display information about users who have logged in to the
router or switch.

NOTE: On MX Series routers, modifying a configuration to replace a service interface with


another service interface is treated as a catastrophic event. When you modify a configuration,
the entire configuration associated with the service interface—including NAT pools, rules, and
service sets—is deleted and then re-created for the newly specified service interface. If there are
active sessions associated with the service interface that is being replaced, these sessions are
deleted and the NAT pools are then released, which leads to the generation of the
NAT_POOL_RELEASE system log messages. However, because NAT pools are already deleted as
a result of the catastrophic configuration change and no longer exist, the NAT_POOL_RELEASE
system log messages are not generated for the changed configuration.

Options

none List all log files.

<all-lcc | lcc (Routing matrix only)(Optional) Display logging information about all T640 routers (or
number | scc> line-card chassis) or a specific T640 router (replace number with a value from 0
through 3) connected to a TX Matrix router. Or, display logging information about
the TX Matrix router (or switch-card chassis).

device-type (QFabric system only) (Optional) Display log messages for only one of the following
device types:
987

• director-device—Display logs for Director devices.

• infrastructure-device—Display logs for the logical components of the QFabric


system infrastructure, including the diagnostic Routing Engine, fabric control
Routing Engine, fabric manager Routing Engine, and the default network Node
group and its backup (NW-NG-0 and NW-NG-0-backup).

• interconnect-device—Display logs for Interconnect devices.

• node-device—Display logs for Node devices.

NOTE: If you specify the device-type optional parameter, you must also
specify either the device-id or device-alias optional parameter.

(device-id | If a device type is specified, display logs for a device of that type. Specify either the
device-alias) device ID or the device alias (if configured).

filename (Optional) Display the log messages in the specified log file. For the routing matrix,
the filename must include the chassis information.

NOTE: The filename parameter is mandatory for the QFabric system. If you
did not configure a syslog filename, specify the default filename of messages.

user (Optional) Display logging information about users who have recently logged in to
<username> the router or switch. If you include username, display logging information about the
specified user.

Required Privilege Level

trace

Sample Output

show log

user@host> show log


total 57518
-rw-r--r-- 1 root bin 211663 Oct 1 19:44 dcd
988

-rw-r--r-- 1 root bin 999947 Oct 1 19:41 dcd.0


-rw-r--r-- 1 root bin 999994 Oct 1 17:48 dcd.1
-rw-r--r-- 1 root bin 238815 Oct 1 19:44 rpd
-rw-r--r-- 1 root bin 1049098 Oct 1 18:00 rpd.0
-rw-r--r-- 1 root bin 1061095 Oct 1 12:13 rpd.1
-rw-r--r-- 1 root bin 1052026 Oct 1 06:08 rpd.2
-rw-r--r-- 1 root bin 1056309 Sep 30 18:21 rpd.3
-rw-r--r-- 1 root bin 1056371 Sep 30 14:36 rpd.4
-rw-r--r-- 1 root bin 1056301 Sep 30 10:50 rpd.5
-rw-r--r-- 1 root bin 1056350 Sep 30 07:04 rpd.6
-rw-r--r-- 1 root bin 1048876 Sep 30 03:21 rpd.7
-rw-rw-r-- 1 root bin 19656 Oct 1 19:37 wtmp

show log filename

user@host> show log rpd


Oct 1 18:00:18 trace_on: Tracing to ?/var/log/rpd? started
Oct 1 18:00:18 EVENT <MTU> ds-5/2/0.0 index 24 <Broadcast PointToPoint Multicast
Oct 1 18:00:18
Oct 1 18:00:19 KRT recv len 56 V9 seq 148 op add Type route/if af 2 addr
192.0.2.21 nhop type local nhop 192.0.2.21
Oct 1 18:00:19 KRT recv len 56 V9 seq 149 op add Type route/if af 2 addr
192.0.2.22 nhop type unicast nhop 192.0.2.22
Oct 1 18:00:19 KRT recv len 48 V9 seq 150 op add Type ifaddr index 24 devindex
43
Oct 1 18:00:19 KRT recv len 144 V9 seq 151 op chnge Type ifdev devindex 44
Oct 1 18:00:19 KRT recv len 144 V9 seq 152 op chnge Type ifdev devindex 45
Oct 1 18:00:19 KRT recv len 144 V9 seq 153 op chnge Type ifdev devindex 46
Oct 1 18:00:19 KRT recv len 1272 V9 seq 154 op chnge Type ifdev devindex 47
...

user@host:LSYS1> show log flow_lsys1.log


Nov 7 07:34:09 07:34:09.491800:CID-0:THREAD_ID-00:LSYS_ID-01:RT:got route table
lock

Nov 7 07:34:09 07:34:09.491809:CID-0:THREAD_ID-00:LSYS_ID-01:RT:released route


table lock

Nov 7 07:34:09 07:34:09.491840:CID-0:THREAD_ID-00:LSYS_ID-01:RT:got route table


lock
989

Nov 7 07:34:09 07:34:09.491841:CID-0:THREAD_ID-00:LSYS_ID-01:RT:released route


table lock

Nov 7 07:34:09 07:34:09.491854:CID-0:THREAD_ID-00:LSYS_ID-01:RT:cache final


sw_nh 0x0

Nov 7 07:34:09 07:34:09.491868:CID-0:THREAD_ID-00:LSYS_ID-01:RT:got route table


lock

Nov 7 07:34:09 07:34:09.491869:CID-0:THREAD_ID-00:LSYS_ID-01:RT:released route


table lock

Nov 7 07:34:09 07:34:09.491881:CID-0:THREAD_ID-00:LSYS_ID-01:RT:cache final


sw_nh 0x0
user@host:TSYS1> show log flow_tsys1.log
Nov 7 13:21:47 13:21:47.217744:CID-0:THREAD_ID-05:LSYS_ID-32:RT:<192.0.2.0/0-
>198.51.100.0/9011;1,0x0> :

Nov 7 13:21:47 13:21:47.217747:CID-0:THREAD_ID-05:LSYS_ID-32:RT:packet [84]


ipid = 39281, @0x7f490ae56d52

Nov 7 13:21:47 13:21:47.217749:CID-0:THREAD_ID-05:LSYS_ID-32:RT:----


flow_process_pkt: (thd 5): flow_ctxt type 0, common flag 0x0, mbuf 0x4882b600,
rtbl7

Nov 7 13:21:47 13:21:47.217752:CID-0:THREAD_ID-05:LSYS_ID-32:RT: flow process


pak fast ifl 88 in_ifp lt-0/0/0.101

Nov 7 13:21:47 13:21:47.217753:CID-0:THREAD_ID-05:LSYS_ID-32:RT:


lt-0/0/0.101:192.0.2.0->198.51.100.0, icmp, (0/0)

Nov 7 13:21:47 13:21:47.217756:CID-0:THREAD_ID-05:LSYS_ID-32:RT: find flow:


table 0x11d0a2680, hash 20069(0xffff), sa 192.0.2.0, da 198.51.100.0, sp 0, d0

Nov 7 13:21:47 13:21:47.217760:CID-0:THREAD_ID-05:LSYS_ID-32:RT:Found: session


id 0x12. sess tok 28685

Nov 7 13:21:47 13:21:47.217761:CID-0:THREAD_ID-05:LSYS_ID-32:RT: flow got


session.

Nov 7 13:21:47 13:21:47.217761:CID-0:THREAD_ID-05:LSYS_ID-32:RT: flow session


id 18
990

Nov 7 13:21:47 13:21:47.217763:CID-0:THREAD_ID-05:LSYS_ID-32:RT: vector bits


0x200 vector 0x84ae85f0

Nov 7 13:21:47 13:21:47.217764:CID-0:THREAD_ID-05:LSYS_ID-32:RT:set nat


0x11e463550(18) timeout const to 2

Nov 7 13:21:47 13:21:47.217765:CID-0:THREAD_ID-05:LSYS_ID-32:RT:


set_nat_timeout 2 on session 18

Nov 7 13:21:47 13:21:47.217765:CID-0:THREAD_ID-05:LSYS_ID-32:RT:refresh nat


0x11e463550(18) timeout to 2

Nov 7 13:21:47 13:21:47.217767:CID-0:THREAD_ID-05:LSYS_ID-32:RT:insert usp tag


for apps

Nov 7 13:21:47 13:21:47.217768:CID-0:THREAD_ID-05:LSYS_ID-32:RT:mbuf


0x4882b600, exit nh 0xfffb0006

show log filename (QFabric System)

user@qfabric> show log messages


Mar 28 18:00:06 qfabric chassisd: QFABRIC_INTERNAL_SYSLOG: Mar 28 18:00:06
ED1486 chassisd: CHASSISD_SNMP_TRAP10: SNMP trap generated: FRU power on
(jnxFruContentsIndex 8, jnxFruL1Index 1, jnxFruL2Index 1, jnxFruL3Index 0,
jnxFruName PIC: 48x 10G-SFP+ @ 0/0/*, jnxFruType 11, jnxFruSlot 0,
jnxFruOfflineReason 2, jnxFruLastPowerOff 0, jnxFruLastPowerOn 2159)
Mar 28 18:00:07 qfabric chassisd: QFABRIC_INTERNAL_SYSLOG: Mar 28 18:00:07
ED1486 chassisd: CHASSISD_SNMP_TRAP10: SNMP trap generated: FRU power on
(jnxFruContentsIndex 8, jnxFruL1Index 1, jnxFruL2Index 2, jnxFruL3Index 0,
jnxFruName PIC: @ 0/1/*, jnxFruType 11, jnxFruSlot 0, jnxFruOfflineReason 2,
jnxFruLastPowerOff 0, jnxFruLastPowerOn 2191)
Mar 28 18:00:07 qfabric chassisd: QFABRIC_INTERNAL_SYSLOG: Mar 28 18:00:07
ED1492 chassisd: CHASSISD_SNMP_TRAP10: SNMP trap generated: FRU power on
(jnxFruContentsIndex 8, jnxFruL1Index 1, jnxFruL2Index 1, jnxFruL3Index 0,
jnxFruName PIC: 48x 10G-SFP+ @ 0/0/*, jnxFruType 11, jnxFruSlot 0,
jnxFruOfflineReason 2, jnxFruLastPowerOff 0, jnxFruLastPowerOn 242726)
Mar 28 18:00:07 qfabric chassisd: QFABRIC_INTERNAL_SYSLOG: Mar 28 18:00:07
ED1492 chassisd: CHASSISD_SNMP_TRAP10: SNMP trap generated: FRU power on
(jnxFruContentsIndex 8, jnxFruL1Index 1, jnxFruL2Index 2, jnxFruL3Index 0,
jnxFruName PIC: @ 0/1/*, jnxFruType 11, jnxFruSlot 0, jnxFruOfflineReason 2,
jnxFruLastPowerOff 0, jnxFruLastPowerOn 242757)
991

Mar 28 18:00:16 qfabric file: QFABRIC_INTERNAL_SYSLOG: Mar 28 18:00:16 ED1486


file: UI_COMMIT: User 'root' requested 'commit' operation (comment: none)
Mar 28 18:00:27 qfabric file: QFABRIC_INTERNAL_SYSLOG: Mar 28 18:00:27 ED1486
file: UI_COMMIT: User 'root' requested 'commit' operation (comment: none)
Mar 28 18:00:50 qfabric file: QFABRIC_INTERNAL_SYSLOG: Mar 28 18:00:50
_DCF_default___NW-INE-0_RE0_ file: UI_COMMIT: User 'root' requested 'commit'
operation (comment: none)
Mar 28 18:00:50 qfabric file: QFABRIC_INTERNAL_SYSLOG: Mar 28 18:00:50
_DCF_default___NW-INE-0_RE0_ file: UI_COMMIT: User 'root' requested 'commit'
operation (comment: none)
Mar 28 18:00:55 qfabric file: QFABRIC_INTERNAL_SYSLOG: Mar 28 18:00:55 ED1492
file: UI_COMMIT: User 'root' requested 'commit' operation (comment: none)
Mar 28 18:01:10 qfabric file: QFABRIC_INTERNAL_SYSLOG: Mar 28 18:01:10 ED1492
file: UI_COMMIT: User 'root' requested 'commit' operation (comment: none)
Mar 28 18:02:37 qfabric chassisd: QFABRIC_INTERNAL_SYSLOG: Mar 28 18:02:37
ED1491 chassisd: CHASSISD_SNMP_TRAP10: SNMP trap generated: FRU power on
(jnxFruContentsIndex 8, jnxFruL1Index 1, jnxFruL2Index 1, jnxFruL3Index 0,
jnxFruName PIC: 48x 10G-SFP+ @ 0/0/*, jnxFruType 11, jnxFruSlot 0,
jnxFruOfflineReason 2, jnxFruLastPowerOff 0, jnxFruLastPowerOn 33809)

show log user

user@host> show log user


usera mg2546 Thu Oct 1 19:37 still logged in
usera mg2529 Thu Oct 1 19:08 - 19:36 (00:28)
usera mg2518 Thu Oct 1 18:53 - 18:58 (00:04)
root mg1575 Wed Sep 30 18:39 - 18:41 (00:02)
root ttyp2 aaa.bbbb.com Wed Sep 30 18:39 - 18:41 (00:02)
userb ttyp1 192.0.2.0 Wed Sep 30 01:03 - 01:22 (00:19)

show log accepted-traffic (SRX4600, SRX5400, SRX5600, and SRX5800)

user@host> show log accepted-traffic


Jul 17 20:26:04 sourpunch RT_FLOW: RT_FLOW_SESSION_CREATE: session created
3.3.3.5/2->4.4.4.2/63 0x0 None 3.3.3.5/2->4.4.4.2/63 0x0 N/A N/A N/A N/A 17 p2
TRUST UNTRUST 2617282058 N/A(N/A) xe-7/0/0.0 UNKNOWN UNKNOWN UNKNOWN N/A N/A -1
N/A N/A N/A
Jul 17 20:26:04 sourpunch RT_FLOW: RT_FLOW_SESSION_CREATE: session created
992

3.3.3.4/4->4.4.4.2/63 0x0 None 3.3.3.4/4->4.4.4.2/63 0x0 N/A N/A N/A N/A 17 p2


TRUST UNTRUST 2550162754 N/A(N/A) xe-7/0/0.0 UNKNOWN UNKNOWN UNKNOWN N/A N/A -1
N/A N/A N/A
Jul 17 20:26:04 sourpunch RT_FLOW: RT_FLOW_SESSION_CREATE: session created
3.3.3.4/1->4.4.4.2/63 0x0 None 3.3.3.4/1->4.4.4.2/63 0x0 N/A N/A N/A N/A 17 p2
TRUST UNTRUST 2550162755 N/A(N/A) xe-7/0/0.0 UNKNOWN UNKNOWN UNKNOWN N/A N/A -1
N/A N/A N/A
Jul 17 20:26:04 sourpunch RT_FLOW: RT_FLOW_SESSION_CREATE: session created
3.3.3.3/0->4.4.4.2/63 0x0 None 3.3.3.3/0->4.4.4.2/63 0x0 N/A N/A N/A N/A 17 p2
TRUST UNTRUST 2550162752 N/A(N/A) xe-7/0/0.0 UNKNOWN UNKNOWN UNKNOWN N/A N/A -1
N/A N/A N/A
Jul 17 20:26:04 sourpunch RT_FLOW: RT_FLOW_SESSION_CREATE: session created
3.3.3.5/5->4.4.4.2/63 0x0 None 3.3.3.5/5->4.4.4.2/63 0x0 N/A N/A N/A N/A 17 p2
TRUST UNTRUST 2550162751 N/A(N/A) xe-7/0/0.0 UNKNOWN UNKNOWN UNKNOWN N/A N/A -1
N/A N/A N/A
Jul 17 20:26:04 sourpunch RT_FLOW: RT_FLOW_SESSION_CREATE: session created
3.3.3.3/3->4.4.4.2/63 0x0 None 3.3.3.3/3->4.4.4.2/63 0x0 N/A N/A N/A N/A 17 p2
TRUST UNTRUST 2550162753 N/A(N/A) xe-7/0/0.0 UNKNOWN UNKNOWN UNKNOWN N/A N/A -1
N/A N/A N/A

Release Information

Command introduced before Junos OS Release 7.4.

Option device-type (device-id | device-alias) is introduced in Junos OS Release 13.1 for the QFX Series.

RELATED DOCUMENTATION

syslog (System)

show services alg conversations

IN THIS SECTION

Syntax | 993

Description | 993
993

Options | 993

Required Privilege Level | 994

Output Fields | 994

Sample Output | 996

Release Information | 1001

Syntax

show services alg conversations


<brief >
<application-protocol protocol>
<extensive>
<interface interface-name>

Description

Display ALG information for Junos OS extension-provider packages.

NOTE: In Junos OS releases earlier than 12.3, the extension-provider packages were variously
referred to as Junos Services Framework (JSF), MP-SDK, and eJunos.

Options

none Display standard information about all Junos OS extension-provider packages ALG
sessions.

brief (Optional) Display the specified level of output.

application- (Optional) Display information about one of the following application protocols:
protocol
dce-rpc Distributed Computing Environment-Remote Procedure Call
protocols
994

dce-rpc-portmap Distributed Computing Environment-Remote Procedure Call


protocols portmap service

dns Domain Name System protocol

ftp File Transfer Protocol

h323 H323 protocol

ike-esp-nat IKE ALG

pptp Point-to-Point Tunneling Protocol

rpc Remote Procedure Call protocol

rpc-portmap Remote Procedure Call protocol portmap service

rtsp Real-Time Streaming Protocol

rsh Remote Shell

sip Session Initiation Protocol

sql SQLNet

talk Talk Program

extensive Display extensive information

interface (Optional) Display information about a particular interface.


interface-name

Required Privilege Level

view

Output Fields

Table 62 on page 995 lists the output fields for the show services alg conversations command. Output
fields are listed in the approximate order in which they appear.
995

Table 62: show services alg conversations Output Fields

Field Name Field Description

Interface Name of the interface.

ALG Name of the ALG in use.

Number of Number of ALG conversations open. A conversation is a group of parent and child
conversations sessions.

Group ID Numeric identifier for the session.

Parent session Status of the parent session:


status
• Active

• Closed

Parent session Numeric identifier for the parent session.


ID

Protocol Protocol used for the parent session.

Forward Flow The source and destination prefixes for forward flow.

Reverse Flow The source and destination prefixes for reverse flow.

Child session Status of the child session:


status
• Active

• Closed

Child session Numeric identifier for the child session.


ID
996

Table 62: show services alg conversations Output Fields (Continued)

Field Name Field Description

Number of Total number of active child sessions associated with the parent session.
Resources

Resource ID Numeric identifier for the resources associated with the parent session.

Protocol Protocol used for the child session.

Sample Output

show services alg conversations

user@host> show services alg conversations


Interface name: ms-2/1/0
ALG : SQLV2 ALG, State : active
Number of conversations: 1
Parent session status: closed
Child session : 1, protocol: TCP
Forward Flow : {10.50.50.2:37244 -> 10.40.40.10:4334}
Reverse Flow : {10.40.40.10:4334 -> 10.11.11.10:37244}

show services alg conversations brief

The output for the show services alg conversations brief command is identical to that for the show
services alg conversations command. For sample output, see "show services alg conversations" on page
996.

show services alg conversations extensive

user@host> show services alg conversations extensive


Interface name: ms-1/0/0
ALG : H323 ALG, State : active
Number of conversations: 1
Group ID : 3499913712, State : active
997

Parent session state: active


Parent session ID: 33554433, protocol : TCP
Forward Flow : {198.51.100.2:30000 -> 192.0.2.2:1720}
Reverse Flow : {192.0.2.2:1720 -> 203.0.113.1:57730}
Number of resources: 4
Resource ID: 3499927656, State: active
Number of sessions: 1
Child session ID: 33554436, protocol : UDP
Forward Flow : {198.51.100.2:5086 -> 192.0.2.2:5090}
Reverse Flow : {192.0.2.2:5090 -> 203.0.113.3:55916}
Resource ID: 3499927376, State: active
Number of sessions: 1
Child session ID: 67108867, protocol : UDP
Forward Flow : {192.0.2:5091 -> 203.0.113.3:55917}
Reverse Flow : {198.51.100.2:5087 -> 192.0.2.2:5091}
Resource ID: 3499926816, State: active
Number of sessions: 1
Child session ID: 33554438, protocol : UDP
Forward Flow : {198.51.100.2:5089 -> 192.0.2.2:5093}
Reverse Flow : {192.0.2.2:5093 -> 203.0.113.2:63435}
Resource ID: 3499926536, State: active
Number of sessions: 1
Child session ID: 33554437, protocol : UDP
Forward Flow : {198.51.100.2:5088 -> 192.0.2.2:5092}
Reverse Flow : {192.0.2.2:5092 -> 203.0.113.2:63434}
ALG : RAS ALG, State : active
Number of conversations: 1
Group ID : 799037592, State : active
Parent session state: closed
Number of resources: 0

show services alg conversations application-protocol

This command has the same output for the rpc, dce-rpc, rpc-portmap and dce-rpc-portmap ALGs.

user@router> show services alg conversations application-protocol rpc


Interface name: ms-1/1/0
ALG : SUNRPC ALG, State : active
Number of conversations: 2
Parent session status: closed
Child session : 1, protocol: UDP
998

Forward Flow : {192.168.203.198:1019 -> 192.168.203.194:2049}


Reverse Flow : {192.168.203.194:2049 -> 192.168.203.198:1019}
Child session : 2, protocol: UDP
Forward Flow : {192.168.203.198:36595 -> 192.168.203.194:2049}
Reverse Flow : {192.168.203.194:2049 -> 192.168.203.198:36595}
Parent session status: closed
Child session : 1, protocol: UDP
Forward Flow : {192.168.203.198:954 -> 192.168.203.194:613}
Reverse Flow : {192.168.203.194:613 -> 192.168.203.198:954}
Child session : 2, protocol: UDP
Forward Flow : {192.168.203.198:53836 -> 192.168.203.194:613}
Reverse Flow : {192.168.203.194:613 -> 192.168.203.198:53836}

user@router> show services alg conversations application-protocol dns


Interface name: ms-1/1/0
ALG : DNS ALG, State : active
Number of conversations: 1
Parent session status: closed
Child session : 1, protocol: UDP
Forward Flow : {192.168.203.198:1019 -> 192.168.203.194:2049}
Reverse Flow : {192.168.203.194:2049 -> 192.168.203.198:1019}

user@router> show services alg conversations application-protocol ftp


Interface name: ms-1/1/0
ALG : DNS ALG, State : active
Number of conversations: 1
Parent session status: closed
Child session : 1, protocol: UDP
Forward Flow : {192.168.203.198:53836 -> 192.168.203.194:613}
Reverse Flow : {192.168.203.194:613 -> 192.168.203.198:53836}
user@router> show services alg conversations application-protocol ike-esp-nat
Interface name: ms-2/2/0
ALG : IKE ALG, State : active
Number of conversations: 1
Parent session status: closed
Child session : 1, protocol: ESP
Forward Flow : {198.51.100.101:2623 -> 203.0.113.1:46838}
Reverse Flow : {192.0.2.101:46838 -> 198.51.10.101:2623}
Child session : 2, protocol: ESP
Forward Flow : {192.0.2.101:2666 -> 198.51.10.101:57882}
Reverse Flow : {198.51.10.101:57882 -> 203.0.113.1:2666}
user@router> show services alg conversations application-protocol pptp
999

Interface name: ms-2/0/0


ALG : PPTP ALG, State : active
Number of conversations: 1
Parent session status: active
Parent session : 1, protocol : TCP
Forward Flow : {192.0.2.10:1511 -> 198.51.100.10:1723}
Reverse Flow : {198.51.100.10:1723 -> 192.0.2.10:1511}
Child session : 1, protocol: GRE
Forward Flow : {192.0.2.10:0 -> 198.51.100.10:49913}
Reverse Flow : {198.51.100.10:49913 -> 192.0.2.10:65001}
Child session : 2, protocol: GRE
Forward Flow : {198.51.100.10:0 -> 192.0.2.10:0}
Reverse Flow : {192.0.2.10:0 -> 198.51.100.10:65000}

user@router> show services alg conversations application-protocol rtsp


Interface name: ms-0/1/0
ALG : RTSP ALG, State : active
Number of conversations: 1
Parent session : 1, protocol : TCP
Forward Flow : {198.51.100.2:3985 -> 192.0.2.1:554}
Reverse Flow : {203.0.113.2:554 -> 198.51.100.2:3985}
Child session : 1, protocol: UDP
Forward Flow : {203.0.113.2:35859 -> 198.51.100.2:38159}
Reverse Flow : {198.51.100.2:38159 -> 192.0.2.1:35859}
Child session : 2, protocol: UDP
Forward Flow : {203.0.113.2:35859 -> 198.51.100.2:37391}
Reverse Flow : {198.51.100.2:37391 -> 192.0.2.1:35859}
user@router> show services alg conversations application-protocol rsh
Interface name: ms-0/1/0
ALG : RSH ALG, State : active
Number of conversations: 1
Parent session : 1, protocol : TCP
Forward Flow : {198.51.100.2:3985 -> 192.0.2.1:554}
Reverse Flow : {203.0.113.2:554 -> 198.51.100.2:3985}
Child session : 1, protocol: UDP
Forward Flow : {203.0.113.2:35859 -> 198.51.100.2:38159}
Reverse Flow : {198.51.100.2:38159 -> 192.0.2.1:35859}

user@router> show services alg conversations application-protocol sip


Interface name: ms-1/1/0
ALG : SIP ALG, State : active
Number of conversations: 1
Parent session status: active
1000

Parent session : 1, protocol : UDP


Forward Flow : {192.0.2.2:5060 -> 198.51.100.2:5060}
Reverse Flow : {198.51.100.2:5060 -> 203.0.113.2:5060}
Child session : 1, protocol: UDP
Forward Flow : {192.0.2.2:6000 -> 198.51.100.2:12442}
Reverse Flow : {198.51.100.2:12442 -> 203.0.113.2:6000}

user@router> show services alg conversations application-protocol sql


Interface name: ms-2/0/0
ALG : SQLV2 ALG, State : active
Number of conversations: 1
Parent session : 1, protocol : 0
Forward Flow : {0.0.0.0:0 -> 0.0.0.0:0}
Reverse Flow : {0.0.0.0:0 -> 0.0.0.0:0}
Child session : 1, protocol: TCP
Forward Flow : {203.0.113.2:19099 -> 198.51.100.10:32773}
Reverse Flow : {198.51.100.10:32773 -> 192.0.2.1:19099}
user@router> show services alg conversations application-protocol talk
Interface name: ms-0/1/0
ALG : TALK ALG, State : active
Number of conversations: 1
Parent session : 1, protocol : TCP
Forward Flow : {198.51.2:3985 -> 192.0.2.1:554}
Reverse Flow : {203.0.113.2:554 -> 198.51.2:3985}
Child session : 1, protocol: UDP
Forward Flow : {203.0.113.2:35859 -> 198.51.2:38159}
Reverse Flow : {198.51.2:38159 -> 192.0.2.1:35859}

show services alg conversations interface

user@router> show services alg conversations interface ms-1/1/0

ALG : FTP ALG, State : active


Number of conversations: 1
Parent session status: active
Parent session : 1, protocol : TCP
Forward Flow : {10.20.20.10:47164 -> 10.30.30.30:21}
1001

Release Information

Command introduced in Junos OS Release 10.4.

h323 option introduced in Junos OS Release 17.1.

ike-esp-nat option introduced in Junos OS Release 17.1.

show services alg statistics

IN THIS SECTION

Syntax | 1001

Description | 1001

Options | 1002

Required Privilege Level | 1002

Output Fields | 1003

Sample Output | 1016

Release Information | 1021

Syntax

show services alg statistics


<application-protocol protocol>
<interface interface-name>

Description

Display ALG statistics for Junos OS extension-provider packages.

NOTE: In Junos OS releases earlier than 12.3, the extension-provider packages were variously
referred to as Junos Services Framework (JSF), MP-SDK, and eJunos.
1002

Options

application- (Optional) Display statistics for one of the following application protocols:
protocol
dce-rpc Distributed Computing Environment-Remote Procedure Call
protocols

dce-rpc-portmap Distributed Computing Environment-Remote Procedure Call


protocols portmap service

dns Domain Name System protocol

ftp File Transfer Protocol

h323 H323 protocol

ike-esp-nat IKE ALG

pptp Point-to-Point Tunneling Protocol

rpc Remote Procedure Call protocol

rpc-portmap Remote Procedure Call protocol portmap service

rtsp Real-Time Streaming Protocol

rsh Remote Shell

sip Session Initiation Protocol

sql SQLNet

talk Talk Program

tftp Trivial File Transfer Protocol

interface (Optional) Display information about a particular interface.


interface-name

Required Privilege Level

view
1003

Output Fields

Table 63 on page 1003 lists the output fields for the show services alg statistics command. Output
fields are listed in the approximate order in which they appear.

Table 63: show services alg statistics Output Fields

Field Name Field Description

Interface Name of the interface.

ALG statistics Name of the ALG for which the statistics are displayed.

Packets with Number of packets with wrong header.


wrong header

Non epm 3.0 Number of non epm 3.0 packets.


packets

Packets with Number of packets with type mismatch.


type mismatch

Packets with id Number of packets with id mismatch.


mismatch

Packets with Number of packets with call mismatch.


call mismatch

Packets Number of packets fragmented.


fragmented

Packets Number of packets queued.


queued

Packets Number of packets dropped.


dropped
1004

Table 63: show services alg statistics Output Fields (Continued)

Field Name Field Description

Packets Number of packets released.


released

Invalid packets Number of invalid packets received.


received

Reply packets Number of reply packets received.


received

Oversized Number of oversized packets received.


packets
received

ALG parser Number of parsing failed errors.


errors

Packets Number of packets translated.


translated

H323 total Total number of audio/video calls that have been established.
calls

H323 active Current number of active H.323 calls.


calls

H323 gate Number of gate installation failures for child sessions.


install failed

H323 pinhole Number of H323 parent sessions that released the resources before pinhole creation.
opened too
late
1005

Table 63: show services alg statistics Output Fields (Continued)

Field Name Field Description

H323 pinhole Number of H323 gate hits that have been dropped.
hit dropped

H323 gate Number of gate timeout failures due to an error.


timeout failed

H323 packets Number of packets dropped.


dropped

H323 get Number of failures to get the session virtualization ctx information.
virtual ctx
failed

H323 obj alloc Number of memory allocation failures for H323 session cookie.
failed

H323 group Number of H323 session resource/group memory allocation failures.


alloc failed

H323 ce alloc Number of H323 session call entity object memory allocation failures.
failed

H323 Q931 Number of errors in decoding Q931 packets.


decode error

H323 H245 Number of errors in decoding H245 packets.


decode error

H323 Q931 Number of errors in processing Q931 packets.


process error
1006

Table 63: show services alg statistics Output Fields (Continued)

Field Name Field Description

H323 H245 Number of errors in processing H245 packets.


process error

H323 do nat Number of NAT translation failures after packet decode.


failed

H323 do rm Number of H323 vsip table creation failures.


failed

H323 dscp Number of Differentiated Services code point (DSCP) packets marked.
marked

H323 dscp Number of Differentiated Services code point (DSCP) packets marked as errors.
marked error

RAS obj alloc Number of RAS session object memory allocation failures.
failed

RAS group Number of RAS session group memory allocation failures.


alloc failed

RAS packets Number of RAS packets dropped.


dropped

RAS packet Number of times that some packets exist in existing RAS sessions cookie.
exists in cookie
error

RAS decode Number of errors in decoding RAS packets.


error
1007

Table 63: show services alg statistics Output Fields (Continued)

Field Name Field Description

RAS flood Number of gatekeeper requests that were dropped because of too many RAS request
error messages.

RAS do nat Number of RAS session payload IP translation errors.


failed

PPTP Objects Number of PPTP objects active.


Active

PPTP Objects Number of PPTP objects in total.


Total

PPTP Objects Number of PPTP objects having errors.


Error

PPTP ASL Number of PPTP groups active.


Group Active

PPTP ASL Number of PPTP groups in total.


Group Total

PPTP ASL Number of PPTP groups having errors.


Group Error

PPTP Packets Number of PPTP packets received.


received

PPTP Packets Number of PPTP packets discarded.


Discarded
1008

Table 63: show services alg statistics Output Fields (Continued)

Field Name Field Description

PPTP Packets Number of PPTP packets freed.


Free

PPTP OCRQ Number of Outgoing Call Requests received.


Received

PPTP OCRQ Number of Outgoing Call Requests discarded.


Discarded

PPTP OCRP Number of Outgoing Call Packets received.


Received

PPTP OCRP Number of Outgoing Call Packets discarded.


Discarded

PPTP Number of WEN (SLI) packets received.


WEN(SLI)
Received

PPTP Number of WEN (SLI) packets discarded.


WEN(SLI)
Discarded

PPTP CCRQ- Number of Call Clear Requests received.


CDSN
Received

PPTP CDSN Number of Call Disconnection Notifications received.


Received
1009

Table 63: show services alg statistics Output Fields (Continued)

Field Name Field Description

PPTP CCRQ- Number of Call Clear Requests discarded.


CDSN
Discarded

PPTP Session Number of PPTP sessions created.


Create

PPTP Session Number of PPTP sessions destroyed.


Destroy

PPTP Gate Number of PPTP gates created.


Create

PPTP Gate Hit Number of PPTP gates hit.

PPTP Gate Number of PPTP gates timed out.


Timeout

PPTP NAT Number of NAT events.


Events

PPTP DO-NAT Number of DO NATs in total.


Total

PPTP DO-NAT Number of DO NATs okay.


Ok

PPTP DO-NAT Number of DO NATs pending.


Pending
1010

Table 63: show services alg statistics Output Fields (Continued)

Field Name Field Description

PPTP DO-NAT Number of DO NATs failed.


Fail

PPTP DO-RM Number of DO RMs in total.


Total

PPTP DO-RM Number of DO RMs okay.


Ok

PPTP DO-RM Number of DO RMs pending.


Pending

PPTP DO-RM Number of DO RMs failed.


Fail

PPTP NAT- Number of NAT-ASYNCs in total.


ASYNC Total

PPTP NAT- Number of NAT-ASYNCs invalid.


ASYNC Invalid

PPTP NAT- Number of NAT-ASYNCs error1.


ASYNC Error1

PPTP NAT- Number of NAT-ASYNCs error2.


ASYNC Error2

PPTP ASL Hole Number of ASYNC holes okay.


Ok
1011

Table 63: show services alg statistics Output Fields (Continued)

Field Name Field Description

PPTP ASL Hole Number of ASYNC hole errors.


Error

PPTP ASL First Number of ASYNC holes first hit.


Hit

PPTP ASL Hole Number of ASYNC holes timed out.


Timeout

PPTP ASL Number of ASYNC holes invalid.


Invalid

PPTP NAT Ctx Number of NAT Ctxs free.


Free

PPTP Create Number of create resource errors.


Resource Error

PPTP set S2C Number of server-to-client hole errors.


hole error

PPTP set C2S Number of client-to-server hole errors.


hole error

PPTP lnbrk Number of PPTP lnbrk errors.


error

PPTP Mpool Number of Mpool create errors.


Create Error
1012

Table 63: show services alg statistics Output Fields (Continued)

Field Name Field Description

PPTP RM Number of client registration errors.


register client
Error

Call packet Number of call packets with rpcbind2.


with rpcbind2

Call packet Number of call packets with rpcbind3.


with rpcbind3

Call packet Number of call packets with rpcbind4.


with rpcbind4

Invalid rpcbind Number of invalid rpcbind calls.


call

Reply packet Number of reply packets with rpcbind2.


with rpcbind2

Reply packet Number of reply packets with rpcbind3.


with rpcbind3

Reply packet Number of reply packets with rpcbind4.


with rpcbind4

Invalid rpcbind Number of invalid rpcbind replies.


reply

Packets Number of packets exceeding maximum length.


exceeded
maximum
length
1013

Table 63: show services alg statistics Output Fields (Continued)

Field Name Field Description

Packets Number of packets dropped by the ALG.


dropped by
ALG

Number of Number of describe messages received.


describe
messages
received

Number of Number of setup messages received.


setup
messages
received

Number of Number of teardown messages received.


teardown
messages
received

Total packets Total number of SIP packets dropped.


dropped

Unexpected Number of unexpected requests dropped.


requests
dropped

Unexpected Number of unexpected responses dropped.


responses
dropped

Packets DSCP Number of Differentiated Services code point (DSCP) packets marked.
marked
1014

Table 63: show services alg statistics Output Fields (Continued)

Field Name Field Description

Packets DSCP Number of Differentiated Services code point (DSCP) packets marked as error.
marked error

NAT errors Number of Network Address Translation errors.

RR headers Number of RR headers exceeded maximum limits.


exceeded
maximum
limits

Contact Number of contact headers exceeded maximum limits.


headers
exceeded
maximum
limits

Invite dropped Number of invites dropped due to call limit.


due to call limit

Messages not Number of messages not processed by sip stack.


processed by
sip stack

Unknown Number of unknown packets dropped.


packets
dropped

Decoding Number of decoding errors.


Errors
1015

Table 63: show services alg statistics Output Fields (Continued)

Field Name Field Description

Packets Number of packets received in out of state.


received in out
of state

Packets Number of packets received.


received

Packets freed Number of packets freed by ALG.


by ALG

Gate fail errors Number of gate fail errors.

Lookup Number of lookup packets.


packets

Announce Number of announce packets.


packets

Delete packets Number of delete packets.

Number of Number of packets received.


packets
received

Number of Number of invalid packets.


Invalid packets

Total number Total number of sessions.


of sessions
1016

Table 63: show services alg statistics Output Fields (Continued)

Field Name Field Description

Number of Number of active sessions.


actives
sessions

Sample Output

show services alg statistics application-protocol

While the statistics are the same for dce-rpc and dce-rpc-portmap, both rpc and rpc-portmap have the
same output too.

user@router> show services alg statistics application-protocol dce-rpc


Interface name: ms-1/1/0
DCE-RPC ALG statistics:
Packets with wrong header : 0
Non epm 3.0 packets : 0
Packets with type mismatch: 0
Packets with id mismatch : 0
Packets with call mismatch: 0
Packets fragmented : 0
Packets queued : 0
Packets dropped : 0
Packets released : 0

user@router> show services alg statistics application-protocol dns


Interface name: ms-2/0/0
DNS ALG statistics:
Invalid packets received : 0
Reply packets received : 3509
Oversized packets received : 0

user@router> show services alg statistics application-protocol ftp


Interface name: ms-1/1/0
FTP ALG statistics:
Packets dropped : 0
1017

ALG parser errors : 0


Packets translated : 0

user@router> show services alg conversations application-protocol h323


Interface name: ms-1/0/0
H323 ALG statistics:
H323 total calls: 1
H323 active calls: 1
H323 gate install failed: 0
H323 pinhole opened too late: 0
H323 pinhole hit dropped: 0
H323 gate timeout failed: 0
H323 packets dropped: 0
H323 get virtual ctx failed: 0
H323 obj alloc failed: 0
H323 group alloc failed: 0
H323 ce alloc failed: 0
H323 Q931 decode error: 0
H323 H245 decode error: 0
H323 Q931 process error: 0
H323 H245 process error: 0
H323 do nat failed: 0
H323 do rm failed: 0
H323 dscp marked: 0
H323 dscp marked error: 0
RAS obj alloc failed: 0
RAS group alloc failed: 0
RAS packets dropped: 0
RAS packet exists in cookie error: 0
RAS decode error: 0
RAS flood error: 0
RAS do nat failed: 0
user@router> show services alg statistics application-protocol ike-esp-nat
Interface name: ms-4/1/0
IKE ESP ALG statistics:
Session interests processed: 2
Sessions created: 2
Sessions destroyed: 1
Control sessions created: 2
Control sessions destroyed: 1
Data sessions created: 0
Data sessions destroyed: 0
Gates created: 4
1018

Gate hits: 0
Gates timedout: 4
user@router> show services alg statistics application-protocol pptp
Interface name: ms-2/0/0
PPTP ALG statistics:
PPTP Objects Active : 1
PPTP Objects Total : 1
PPTP Objects Error : 0
PPTP ASL Group Active : 1
PPTP ASL Group Total : 1
PPTP ASL Group Error : 0
PPTP Packets received : 11
PPTP Packets Discarded : 0
PPTP Packets Free : 0
PPTP OCRQ Received : 1
PPTP OCRQ Discarded : 0
PPTP OCRP Received : 1
PPTP OCRP Discarded : 0
PPTP WEN(SLI) Received : 3
PPTP WEN(SLI) Discarded : 0
PPTP CCRQ-CDSN Received : 0
PPTP CDSN Received : 0
PPTP CCRQ-CDSN Discarded : 0
PPTP Session Create : 3
PPTP Session Destroy : 0
PPTP Gate Create : 0
PPTP Gate Hit : 2
PPTP Gate Timeout : 0
PPTP NAT Events : 0
PPTP DO-NAT Total : 1
PPTP DO-NAT Ok : 1
PPTP DO-NAT Pending : 0
PPTP DO-NAT Fail : 0
PPTP DO-RM Total : 1
PPTP DO-RM Ok : 2
PPTP DO-RM Pending : 0
PPTP DO-RM Fail : 0
PPTP NAT-ASYNC Total : 0
PPTP NAT-ASYNC Invalid : 0
PPTP NAT-ASYNC Error1 : 0
PPTP NAT-ASYNC Error2 : 0
PPTP ASL Hole Ok : 2
PPTP ASL Hole Error : 0
1019

PPTP ASL First Hit : 2


PPTP ASL Hole Timeout : 0
PPTP ASL Invalid : 0
PPTP NAT Ctx Free : 0
PPTP Create Resource Error : 0
PPTP set S2C hole error : 0
PPTP set C2S hole error : 0
PPTP lnbrk error : 0
PPTP Mpool Create Error : 0
PPTP RM register client Error : 0

user@router> show services alg statistics application-protocol rpc


Interface name: ms-1/1/0
RPC ALG statistics:
Call packet with rpcbind2 : 2
Call packet with rpcbind3 : 0
Call packet with rpcbind4 : 0
Invalid rpcbind call : 0
Reply packet with rpcbind2: 2
Reply packet with rpcbind3: 0
Reply packet with rpcbind4: 0
Invalid rpcbind reply : 0
Packets fragmented : 0
Packets dropped : 0
Packets released : 0

user@router> show services alg statistics application-protocol rtsp


Interface name: ms-0/1/0
RTSP ALG statistics:
Packets exceeded maximum length : 0
Packets dropped by ALG : 0
Number of describe messages received : 8
Number of setup messages received : 30
Number of teardown messages received : 7
user@router> show services alg statistics application-protocol rsh
Interface name: ms-2/0/0
RSH ALG statistics:
Invalid packets received : 0
Packets dropped by ALG : 0
ALG parser errors : 0
Packets freed by ALG : 0
1020

user@router> show services alg statistics application-protocol sip


Interface name: ms-2/0/0
SIP ALG statistics:
Total packets dropped : 0
Unexpected requests dropped : 0
Unexpected responses dropped : 0
Packets DSCP marked : 0
Packets DSCP marked error : 0
NAT errors : 0
RR headers exceeded maximum limits : 0
Contact headers exceeded maximum limits : 0
Invite dropped due to call limit : 0
Messages not processed by sip stack : 0
Unknown packets dropped : 0
Decoding Errors : 0
Packets received in out of state : 0

user@router> show services alg statistics application-protocol sql


Interface name: ms-2/0/0
SQLNET ALG statistics:
Packets received : 5
ALG parser errors : 0
Packets freed by ALG : 0
Gate fail errors : 0

user@router> show services alg statistics application-protocol talk


Interface name: ms-2/0/0
TALK ALG statistics:
Lookup packets : 5
Announce packets : 0
Delete packets : 0

user@router> show services alg statistics application-protocol tftp


Interface name: ms-0/0/0
TFTP ALG statistics:
Number of packets received : 0
Number of Invalid packets : 0
Total number of sessions : 0
Number of active sessions: 0
1021

show services alg statistics interface

user@router> show services alg statistics interface ms-1/1/0


Interface name: ms-1/1/0
FTP ALG statistics:
Packets dropped : 0
ALG parser errors : 0
Packets translated : 0

Release Information

Command introduced in Junos OS Release 10.4.

h323 option introduced in Junos OS Release 17.1.

ike-esp-nat option introduced in Junos OS Release 17.1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

show services cos statistics (Next Gen Services)

IN THIS SECTION

Syntax | 1022

Description | 1022

Options | 1022

Required Privilege Level | 1022

Output Fields | 1022

Sample Output | 1023

Release Information | 1026


1022

Syntax

show services cos statistics


<brief | detail | extensive>
<diffserv | forwarding-class>
<interface interface-name>
<service-set service-set-name>
<summary>

Description

Display the mapping of class-of-service (CoS) code point aliases to corresponding bit patterns and the
mapping of forwarding class names to queue numbers as configured in CoS services for Next Gen
Services services PICs.

Options

none Display all services CoS statistics.

brief | detail | extensive (Optional) Display the specified level of output.

diffserv | forwarding-class (Optional) Display only the selected information, either DiffServ
codepoints or forwarding classes.

interface interface-name (Optional) Display statistics for the specified interface only.

service-set service-set-name (Optional) Display statistics for the specified service set only.

summary (Optional) Display summary of statistics on a per-interface basis.

Required Privilege Level

view

Output Fields

Table 64 on page 1023 describes the output fields for the show services cos statistics command.
Output fields are listed in the approximate order in which they appear.
1023

Table 64: show services cos statistics Output Fields

Field Name Field Description Level of Output

Interface Name of interface. All levels

Service set Name of service set. All levels

DSCP DiffServ code point bit pattern. All levels

Packets in Number of packets received. All levels

Packets out Number of packets transmitted. All levels

Forwarding Forwarding class queue number. All levels


class

Sample Output

show services cos statistics

user@host> show services cos statistics details


Interface: vms-0/2/0, Service set: ss1
DSCP Packets in Packets out
DSCP Packets in Packets out
000000 0 0
000001 0 0
000010 0 0
000011 0 0
000100 0 0
000101 0 0
000110 0 0
000111 0 0
001000 0 0
001001 0 0
001010 0 0
001011 0 0
1024

001100 0 0
001101 0 0
001110 0 0
001111 0 0
010000 0 0
010001 0 0
010010 0 0
010011 0 0
010100 0 0
010101 0 0
010110 0 0
010111 0 0
011000 0 0
011001 0 0
011010 0 0
011011 0 0
011100 0 0
011101 0 0
011110 0 0
011111 0 0
100000 0 0
100001 0 0
100010 0 0
100011 0 0
100100 0 0
100101 0 0
100110 0 0
100111 0 0
101000 0 0
101001 0 0
101010 0 0
101011 0 0
101100 0 0
101101 0 0
101110 0 0
101111 0 0
110000 0 0
110001 0 0
110010 0 0
110011 0 0
110100 0 0
110101 0 0
110110 0 0
1025

110111 0 0
111000 0 0
111001 0 0
111010 0 0
111011 0 0
111100 0 0
111101 0 0
111110 0 0
111111 0 0
Forwarding class Packets in Packets out
0 0 0
1 0 0
2 0 0
3 0 0
4 0 0
5 0 0
6 0 0
7 0 0
8 0 0
9 0 0
10 0 0
11 0 0
12 0 0
13 0 0
14 0 0
15 0 0

show services cos statistics brief

The output for the show services cos statistics brief command is identical to that for the show services
cos statistics command.

show services cos statistics detail

The output for the show services cos statistics detail command is identical to that for the show services
cos statistics command.

show services cos statistics extensive

The output for the show services cos statistics extensive command is identical to that for the show
services cos statistics command.
1026

Release Information

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

show services inline softwire statistics

IN THIS SECTION

Syntax | 1026

Description | 1026

Options | 1026

Required Privilege Level | 1027

Output Fields | 1027

Sample Output | 1029

Release Information | 1031

Syntax

show services inline softwire statistics


<interface interface-name>
<mape name>
<v6rd>

Description

Display information about inline softwire activity.

Options

interface interface- (Optional) Display information about the specified services-inline interface only.
name When a specific interface is not specified, statistics for all services-inline
interfaces are shown.
1027

mape name (Optional) Display information on per physical service interface basis.

v6rd (Optional) Display information for 6rd.

Required Privilege Level

view

Output Fields

Table 65 on page 1027 lists the output fields for the show services inline softwire statistics command.
Output fields are listed in the order in which they appear.

Table 65: show services inline softwire statistics Output Fields

Field Name Field Description

Service PIC Name Name of the service PIC for which statistics are displayed.

Control Plane Statistics on the control plane.


Statistics

ICMPv4 echo Number of ICMPv4 echo received by the softwire concentrator.


requests to
IPv6 ICMP type = 128, code =0. destined to BR IPv6 address
softwire
concentrator

ICMPv4 echo Number of ICMPv4 echo responses sent from the softwire concentrator or BR.
responses from
IPv6 ICMP type = 129
softwire
concentrator

Dropped ICMPv4 Number of ICMP packets (except ICMP request) received by the softwire
packets to softwire concentrator or BR. All these packets are dropped in by the packet forwarding
concentrator engine Ukernel.
1028

Table 65: show services inline softwire statistics Output Fields (Continued)

Field Name Field Description

Trace route UDP Number of UDP trace route packets (port numbers 33434 through 33534)
packets to softwire received by the softwire concentrator.
concentrator

ICMPv4 Port Number of ICMP port unreachable errors sent by the softwire concentrator
unreachable errors after receiving the UDP trace route packets.
sent from softwire
concentrator

Other dropped Number of non-ICMPpackets that were received and dropped because of
IPv4 packets to fragmentation during encapsulation or decapsulation.
softwire
concentrator

Data Plane Statistics of the data plane.


Statistics

6rd decaps Number of 6rd decapsulated packets and bytes in the data plane. Decapsulation
includes removing the outer IPv4 header and routing the inner IPv6 packet.

6rd encaps Number of 6rd encapsulted (IPv4) packets and bytes in the data plane.

6rd decap errors Number of all the packets and bytes that are not IPv4-IPv6, IPv4-UDP, or IPV4-
ICMP packets.

6rd decap Number of IPv4 fragmented packets and bytes.


fragment errors

6rd decap spoof Number of spoof attack packets and bytes, which includes packets for which
attacks the 6rd derived IPv4 address does not match with the source IPv4 address and
packets for which the source IPv6 prefix does not match the 6rd IPv6 prefix.
1029

Table 65: show services inline softwire statistics Output Fields (Continued)

Field Name Field Description

6rd encap v4 mtu Count of packets and bytes with IPv4 encapsulation MTU errors. For downlink
errors packets after encapsulating with an IPv4 header, if the packet length is more
than Tunnel MTU then it is dropped as v4 MTU errors. For these packet drops,
an ICMPv6 packet too big error is sent back to the sender.

Data Plane
Statistics (MAP-E
upstream)

MAPE decaps IPv6 packets successfully decapsulated by BR (includes reassembled IPv6)

MAPE ICMP decap IPv6 packets dropped due to unsupported type/code of inner ICMPv4
errors

MAPE decap spoof IPv6 Packets that failed MAPE spoof check
errors

Sample Output

show services inline softwire statistics

user@host> show services inline softwire statistics


Border Router v6rd statistics:

Service PIC Name si-0/0/0

Control Plane Statistics


ICMPv4 echo requests to softwire concentrator 0
ICMPv4 echo responses from softwire concentrator 0
Dropped ICMPv4 packets to softwire concentrator 0
Trace route UDP packets to softwire concentrator 0
ICMPv4 Port unreachable errors sent from softwire concentrator 0
Other dropped IPv4 packets to softwire concentrator 0
1030

Data Plane Statistics Packets Bytes


6rd decaps 32222173891 3061106519645
6rd encaps 415480622 28252710148
6rd decap errors 0 0
6rd decap fragment errors 0 0
6rd decap spoof attacks 0 0

Service PIC Name si-0/2/0

Control Plane Statistics


ICMPv4 echo requests to softwire concentrator 0
ICMPv4 echo responses from softwire concentrator 0
Dropped ICMPv4 packets to softwire concentrator 0
Trace route UDP packets to softwire concentrator 0
ICMPv4 Port unreachable errors sent from softwire concentrator 0
Other dropped IPv4 packets to softwire concentrator 0

Data Plane Statistics Packets Bytes


6rd decaps 0 0
6rd encaps 0 0
6rd decap errors 0 0
6rd decap fragment errors 0 0
6rd decap spoof attacks 0 0
6rd encap v4 mtu errors 0 0

show services inline softwire statistics mape (Adaptive Services si- interfaces)

user@host> show services inline softwire statistics mape


Service PIC Name si-0/0/0

Statistics Packets Bytes

MAP-E decaps 0
0
MAP-E encaps 0
0
MAP-E decap errors 0
0
1031

MAP-E encap errors 0


0
MAP-E decap spoof attacks 0
0
MAP-E decap v4 fragmented 0
0
MAP-E decap v4 reassembled 0
0
MAP-E encap v4 mtu errors 0 0

show services inline softwire statistics mape (Next Gen Services si- interfaces)

user@host> show services inline softwire statistics mape


Service PIC Name si-2/0/0

Control Plane Statistics


MAPE ICMPv6 echo requests to softwire concentrator 0
MAPE ICMPv6 echo responses from softwire concentrator 0
MAPE Dropped ICMPv6 packets to softwire concentrator 0

Data Plane Statistics (v6-to-v4) Packets Bytes


MAPE decaps 0 0
MAPE ICMP decap errors 0 0
MAPE decap spoof errors 0 0
MAPE v6 reassembled 0 0
MAPE dropped v6 fragments 0 0
MAPE v6 unsupp protocol drops 0 0

Data Plane Statistics (v4-to-v6) Packets Bytes


MAPE encaps 0 0
MAPE ICMP encap errors 0 0
MAPE v6 mtu errors 0 0
MAPE v4 reassembled 0 0
MAPE dropped v4 fragments 0 0

Release Information

Command introduced in Junos OS Release 13.3R3.


1032

map-e option introduced in Junos OS Release 18.2R1 for MX Series Routers with MPC and MIC
interfaces.

map-e option introduced in Junos OS Release 20.2R1 for Next Gen Services on MX240, MX480 and
MX960 routers.

show services inline ip-reassembly statistics

IN THIS SECTION

Syntax | 1032

Description | 1032

Options | 1033

Required Privilege Level | 1033

Output Fields | 1033

Sample Output | 1038

Release Information | 1040

Syntax

show services inline ip-reassembly statistics


<fpc fpc-slot>
<pfe pfe-slot>

Description

Display the inline IP reassembly statistics for the Packet Forwarding Engines on one or more MPCs or
Next Gen Services MX-SPC3 services card. Inline IP reassembly statistics are collected at the Packet
Forwarding Engine level.

NOTE: For more information on MPCs that support inline IP reassembly, refer to Protocols and
Applications Supported on the MPC1E for MX Series Routers.
1033

Options

none Displays standard inline IP reassembly statistics for all MPCs or MX-SPC3 services card.

fpc fpc (Optional) Displays inline IP reassembly statistics for the specified MPC or MX-SPC3 services
card.

NOTE: Starting with Junos OS Release 14.2, the FPC option is not displayed for MX
Series routers that do not contain switch fabrics, such as MX80 and MX104 routers.

pfe pfe (Optional) Displays inline IP reassembly for the specified Packet Forwarding Engine slot. You
must specify an FPC slot number before specifying a Packet Forwarding Engine slot.

Required Privilege Level

view

Output Fields

Table 66 on page 1033 lists the output fields for the show services inline ip-reassembly statistics
command. Output fields are listed in the approximate order in which they appear.

Table 66: show services inline ip-reassembly statistics Output Fields

Field Name Field Description

FPC MPC or MX-SPC3 services card slot number for


which the statistics are displayed.

PFE Packet Forwarding Engine on the MPC or MX-SPC3


services card for which the statistics are displayed.
1034

Table 66: show services inline ip-reassembly statistics Output Fields (Continued)

Field Name Field Description

NOTE: The output fields displayed (per Packet Forwarding Engine) are arranged in a logical sequence
from top to bottom to enable users to understand how the inline IP reassembly statistics are gathered.
The information about total number of fragments received is displayed first, and then the information
about the reassembled packets and those pending reassembly are displayed. Then, the reasons why
the fragments were dropped or not reassembled are displayed. Finally, the information about the
fragments reassembled, fragments dropped, and fragments sent to the backup user plane PIC
(services PIC) are displayed.

Total Fragments Received Total number of fragments received and the current
rate of fragments received for inline IP reassembly.
The following information is also displayed:

• First Fragments—Number of first fragments


received and current rate of first fragments
processed.

• Intermediate Fragments—Number of
intermediate fragments received and current rate
of intermediate fragments processed.

• Last Fragments—Number and rate of last


fragments received.

NOTE: Current rate refers to the current number of


fragments processed per second in the instant
preceding the command’s execution.

Total Packets Reassembled Total number of packets reassembled and current


rate, in the instant preceding the command’s
execution, at which the packets are reassembled.

Approximate Packets Pending Reassembly Approximate number of packets pending reassembly.


1035

Table 66: show services inline ip-reassembly statistics Output Fields (Continued)

Field Name Field Description

Fragments Dropped Reasons Total number of fragments dropped reasons and the
current rate of total fragment dropped reasons. The
number of dropped reasons and rate corresponding
to each of the following reasons are also displayed:

• Buffers not available

• Fragments per packet exceeded

• Packet length exceeded

• Record insert error

• Record in use error

• Duplicate first fragments

• Duplicate last fragments

• Missing first fragment

NOTE:

• These fields indicate why a fragment was


dropped. When a fragment is dropped, the
corresponding reason field is incremented by 1.
For example, when a fragment is dropped
because the memory runs out, the Buffers not
available field increases by 1.

• The maximum number of fragments allowed for


reassembly is 16. If the interface encounters a
17th fragment, it drops the entire packet and
increments the Fragment per packet exceeded
field by 17.

• Current rate refers to the current number of


fragment dropped reasons per second in the
instant preceding the command’s execution.
1036

Table 66: show services inline ip-reassembly statistics Output Fields (Continued)

Field Name Field Description

Reassembly Errors Reasons Number of errors during reassembly and the current
rate of reassembly errors. The number of errors and
the rate for each of the following types of errors are
also displayed:

• Fragment not found

• Fragment not in sequence

• ASIC errors

NOTE: Current rate refers to the current number of


reassembly errors processed per second in the
instant preceding the command’s execution.

Aged out packets Number of aged out packets and the current number
of packets aged out per second in the instant
preceding the command’s execution.

NOTE: In some cases, aged out packets can refer to


aged out fragments. If previous fragments of the
packet have already been discarded then linking of
the dropped fragments to the aged out fragments
cannot occur.

Total Fragments Successfully Reassembled Number of fragments successfully reassembled and


the current number of fragments reassembled per
second in the instant preceding the command’s
execution.
1037

Table 66: show services inline ip-reassembly statistics Output Fields (Continued)

Field Name Field Description

Total Fragments Dropped Total number of fragments dropped and the current
rate of total number of fragments dropped. The
number of fragments dropped and rate
corresponding to each of the following reasons are
also displayed:

• Buffers not available

• Fragments per packet exceeded

• Packet length exceeded

• Record insert error

• Record in use error

• Duplicate first fragments

• Duplicate last fragments

• Missing first fragment

• Fragment not found

• Fragment not in sequence

• ASIC errors

• Aged out fragments

Total fragments punted to UPIC Number of fragments sent to the backup user plane
PIC (services PIC) and current rate of fragments sent
per second in the instant preceding the command’s
execution

The following information applies to the Total Fragments Dropped field.

• These fields indicate how many of the packet fragments received were then dropped due to a
particular reason.

For example, consider a packet that has 10 fragments, 9 of which have been received and stored in
memory. When the tenth fragment arrives, if the memory runs out (Buffers not available), then this
1038

fragment is dropped. Because the tenth fragment has been dropped, the other 9 fragments must also
be dropped. In this case, the Buffers not available field (under the Fragments Dropped Reasons field)
is incremented by 1 and the Buffers not available field (under the Total Fragments Dropped field) is
incremented by 10.

For the next packet arriving, which also has 10 fragments, the first four fragments are stored but the
memory runs out for the fifth fragment. Then the first 5 fragments (fifth and the first four) are
dropped. In this case, the Buffers not available field (under the Fragments Dropped Reasons field) is
incremented by 1 and the Buffers not available field (under the Total Fragments Dropped field) is
incremented by 5.

For fragments of the packet, if memory becomes available, the next 5 fragments (6 through 10) that
arrive are stored in memory. The fragments are stored until the timeout period elapses, and are
eventually dropped. In this case, the Aged out packets field is incremented by 1 and the Aged out
fragments field (under the Total Fragments Dropped field) is incremented by 5.

The fragment counters (after both packets have been processed) are as follows:

• Fragments Dropped Reasons

• Buffers not available 2

• Aged out packets 1

• Total Fragment Dropped

• Buffers not available 15

• Aged out packets 5

• Current rate refers to the current total number fragments dropped per second in the instant
preceding the command’s execution.

Sample Output

show services inline ip-reassembly statistics fpc

user@host> show services inline ip-reassembly statistics fpc 0


FPC: 0 PFE: 0
=============
Total Current Rate
Total Fragments Received 728177644 83529
First Fragments 260759430 29924
Intermediate Fragments 206658784 23681
Last Fragments 260759430 29924
1039

Total Packets Successfully Reassembled 260746982 29924

Approximate Packets Pending Reassembly 4

Fragments Dropped Reasons 34558 3


Buffers not available 0 0
Fragments per packet exceeded 0 0
Packet length exceeded 0 0
Record insert error 0 0
Record in use error 34558 3
Duplicate first fragments 0 0
Duplicate last fragments 0 0
Missing first fragment 0 0

Reassembly Errors Reasons 0 0


Fragment not found 0 0
Fragment not in sequence 0 0
ASIC errors 0 0

Aged out packets 63 0

Total Fragments Successfully Reassembled 728142977 83528

Total Fragments Dropped 34673 3


Buffers not available 0 0
Fragments per packet exceeded 0 0
Packet length exceeded 0 0
Record insert error 0 0
Record in use error 34558 3
Duplicate first fragments 0 0
Duplicate last fragments 0 0
Missing first fragment 0 0
Fragment not found 0 0
Fragment not in sequence 0 0
ASIC errors 0 0
Aged out fragments 115 0

Total fragments punted to UPIC 0 0


1040

Release Information

Statement introduced in Junos OS Release 12.2X49.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

ip-reassembly

show services nat destination pool

IN THIS SECTION

Syntax | 1040

Description | 1040

Options | 1041

Required Privilege Level | 1041

Output Fields | 1041

Sample Output | 1042

Release Information | 1042

Syntax

show services nat destination pool


<interface interface-name>
<service-set service set>
<all>

Description

Display destination NAT address pool information.


1041

Options

interface interface-name> Optional. Display destination NAT information specific to the interface.

service-set service-set> Optional. Display destination NAT information specific to the service set.

all Optional. Display all destination NAT address pool information.

Required Privilege Level

view

Output Fields

Table 67 on page 1041lists the output fields for the show services nat destination pool command.
Output fields are listed in the approximate order in which they appear.

Table 67: show services nat destination pool Output Fields

Field Name Description

Interface Interface name.

Service set Service set name.

Pool name Pool name.

Pool id Pool identification.

Total address Number of IP addresses that are in use.

Translation hits Number of times a translation in the translation table is used for a
source NAT rule.

Address range IP address range in the source pool.


1042

Table 67: show services nat destination pool Output Fields (Continued)

Field Name Description

Port Port number used to access the pool.

Sample Output

show services nat destination pool

user@host> show services nat destination pool service-set ss1_interface_style1 interface vms-0/2/0 all
ss1_interface_style1 interface vms-0/2/0 all | no-more
Interface: vms-0/2/0 , Service set: ss1_interface_style1
Pool name : dest_pool
Pool id : 1
Total address : 253
Translation hits: 11
Address range Port
30.1.1.2 - 30.1.1.254 0

Release Information

Command introduced in Junos OS Release 19.3R2.

show services nat destination rule

IN THIS SECTION

Syntax | 1043

Description | 1043

Options | 1043

Required Privilege Level | 1043

Output Fields | 1043


1043

Sample Output | 1045

Release Information | 1045

Syntax

show services nat destination rule


rule-name
<service-set service-set>
<interface interface-name>
<all>

Description

Display destination NAT rule-set information.

Options

rule-name Display information about the specified destination NAT rule.

service-set service-set Display information specific to the service-set.

interface interface-name Display information specific to the interface.

all Display all NAT rule-set information.

Required Privilege Level

view

Output Fields

Table 68 on page 1044 lists the output fields for the show services nat destination rule command.
Output fields are listed in the approximate order in which they appear.
1044

Table 68: show services nat destination rule Output Fields

Field Name Description

Interface Interface name.

Service set Service set name.

Destination NAT rule Name of the destination NAT rule.

Rule-Id Rule identification number.

Rule-position Position of the destination NAT rule.

Match-direction Three options:

• input―Apply the rule match on the input side of the interface.

• input-output―Apply the rule match bidirectionally.

• output―Apply the rule match on the output side of the interface.

Destination addresses Name of the destination addresses that match the rule. The default value
is any.

Action The action taken when a packet matches the rule’s tuples. Actions include
the following:

• destination NAT pool―Use user-defined destination NAT pool to


perform destination NAT.

• off―Do not perform destination NAT.

Translation hits Number of times a translation in the translation table is used for a source
NAT rule.

Successful sessions Number of successful session installations after the NAT rule is matched.
1045

Table 68: show services nat destination rule Output Fields (Continued)

Field Name Description

Failed sessions Number of unsuccessful session installations after the NAT rule is
matched.

Number of sessions Number of sessions that reference the specified rule.

Sample Output

show services nat destination rule service-set ss1_interface_style1 interface vms-0/2/0 all |
no-more

user@host> show services nat destination rule service-set ss1_interface_style1 interface vms-0/2/0 all |
no-more
ss1_interface_style1 interface vms-0/2/0 all | no-
more
Interface: vms-0/2/0 , Service set: ss1_interface_style1
Destination NAT rule: r1 Rule-set: rs2
Rule-Id : 2
Rule position : 1
Match-direction : input
Destination addresses : 50.1.1.2 - 50.1.1.2
Action : dest_pool
Translation hits : 34
Successful sessions : 34
Failed sessions : 0
Number of sessions : 0

Release Information

Command introduced in Junos OS Release 19.3R2.


1046

show services nat destination summary

IN THIS SECTION

Syntax | 1046

Description | 1046

Options | 1046

Required Privilege Level | 1046

Output Fields | 1047

Sample Output | 1048

Release Information | 1048

Syntax

show services nat destination summary


<interface interface-name>
<service-set service-set>

Description

Display summary destination NAT information.

Options

interface interface-name Display summary destination NAT information for the specified service
interface.

service-set service-set Display summary destination NAT information for the specified service set.

Required Privilege Level

view
1047

Output Fields

Table 69 on page 1047 lists the output fields for the show services nat destination summary command.
Output fields are listed in the approximate order in which they appear.

Table 69: show services nat destination summary Output Fields

Field Name Description

Interface Interface name.

Service set Service set name.

Pool name Name of the destination address pool.

Address Range IP address or IP address range for the pool.

Routing Instance Name of the routing instance.

Port Port number.

Total Address Number of IP addresses that are in use.

Rule name Rule name.

Rule set The set of rules for destination NAT.

Match-direction Three options:

• input―Apply the rule match on the input side of the


interface.

• input-output―Apply the rule match bidirectionally.

• output―Apply the rule match on the output side of


the interface.
1048

Table 69: show services nat destination summary Output Fields (Continued)

Field Name Description

Action The action taken when a packet matches the rule’s


tuples. Actions include the following:

• destination NAT pool―Use user-defined destination


NAT pool to perform destination NAT.

• off―Do not perform destination NAT.

Sample Output

show services nat destination summary service-set ss1_interface_style1 interface vms-0/2/0

user@host> show services nat destination summary service-set ss1_interface_style1 interface vms-0/2/0
Interface: vms-0/2/0 , Service set: ss1_interface_style1
Pool name Address Routing Port
Total
Range Instance
Address
dest_pool 30.1.1.2 - 30.1.1.254 0 253
Interface: vms-0/2/0 , Service set: ss1_interface_style1
Rule name Rule set Match-direction Action
r1 rs2 input dest_pool

Release Information

Command introduced in Junos OS Release 19.3R2.


1049

show services nat ipv6-multicast-interfaces

IN THIS SECTION

Syntax | 1049

Description | 1049

Required Privilege Level | 1049

Output Fields | 1049

Sample Output | 1050

Release Information | 1052

Syntax

show services nat ipv6-multicast-interfaces

Description

Displays a list of interfaces enabled for IPv6 multicast.

Required Privilege Level

view

Output Fields

Table 70 on page 1049 lists the output fields for the show services nat ipv6-multicast-interfaces
command. Output fields are listed in the approximate order in which they appear.

Table 70: show services nat ipv6-multicast-interfaces Output Fields

Field Name Field Description Level of Output

Interface Name of a service interface. All levels


1050

Table 70: show services nat ipv6-multicast-interfaces Output Fields (Continued)

Field Name Field Description Level of Output

Admin State Configured IPv6 multicast capability of an interface , All levels

Operational Operation IPv6 multicast status of an interface. All levels


State

Sample Output

show services nat ipv6-multicast-interfaces

user@host> show services nat ipv6-multicast-interfaces


Interface Admin Operational
State State
ge-5/1/9 Enabled Enabled
ge-5/1/8 Enabled Enabled
ge-5/1/7 Enabled Enabled
ge-5/1/6 Enabled Enabled
ge-5/1/5 Enabled Enabled
ge-5/1/4 Enabled Enabled
ge-5/1/3 Enabled Enabled
ge-5/1/2 Enabled Enabled
ge-5/1/1 Enabled Enabled
ge-5/1/0 Enabled Enabled
ge-5/0/9 Enabled Enabled
ge-5/0/8 Enabled Enabled
ge-5/0/7 Enabled Enabled
ge-5/0/6 Enabled Enabled
ge-5/0/5 Enabled Enabled
ge-5/0/4 Enabled Enabled
ge-5/0/3 Enabled Enabled
ge-5/0/2 Enabled Enabled
ge-5/0/1 Enabled Enabled
ge-5/0/0 Enabled Enabled
ge-1/3/9 Enabled Enabled
ge-1/3/8 Enabled Enabled
ge-1/3/7 Enabled Enabled
1051

ge-1/3/6 Enabled Enabled


ge-1/3/5 Enabled Enabled
ge-1/3/4 Enabled Enabled
ge-1/3/3 Enabled Enabled
ge-1/3/2 Enabled Enabled
ge-1/3/1 Enabled Enabled
ge-1/3/0 Enabled Enabled
ge-1/2/9 Enabled Enabled
ge-1/2/8 Enabled Enabled
ge-1/2/7 Enabled Enabled
ge-1/2/6 Enabled Enabled
ge-1/2/5 Enabled Enabled
ge-1/2/4 Enabled Enabled
ge-1/2/3 Enabled Enabled
ge-1/2/2 Enabled Enabled
ge-1/2/1 Enabled Enabled
ge-1/2/0 Enabled Enabled
ge-1/1/9 Enabled Enabled
ge-1/1/8 Enabled Enabled
ge-1/1/7 Enabled Enabled
ge-1/1/6 Enabled Enabled
ge-1/1/5 Enabled Enabled
ge-1/1/4 Enabled Enabled
ge-1/1/3 Enabled Enabled
ge-1/1/2 Enabled Enabled
ge-1/1/1 Enabled Enabled
ge-1/1/0 Enabled Enabled
ge-1/0/9 Enabled Enabled
ge-1/0/8 Enabled Enabled
ge-1/0/7 Enabled Enabled
ge-1/0/6 Enabled Enabled
ge-1/0/5 Enabled Enabled
ge-1/0/4 Enabled Enabled
ge-1/0/3 Enabled Enabled
ge-1/0/2 Enabled Enabled
ge-1/0/1 Enabled Enabled
ge-1/0/0 Enabled Enabled
xe-0/3/0 Enabled Enabled
xe-0/2/0 Enabled Enabled
xe-0/1/0 Enabled Enabled
xe-0/0/0 Enabled Enabled
1052

Release Information

Command introduced in Junos OS Release 8.5.

show services nat resource-usage source-pool

IN THIS SECTION

Syntax | 1052

Description | 1052

Options | 1052

Required Privilege Level | 1053

Output Fields | 1053

Sample Output | 1053

Release Information | 1054

Syntax

show services nat resource-usage source-pool


<all>
pool-name

Description

Display NAT resource usage.

Options

<all> Display all NAT resource usage statistics.

pool-name Display NAT resource usage statistics for the specified pool.
1053

Required Privilege Level

view

Output Fields

Table 71 on page 1053 lists the output fields for the show services nat resource-usage command.
Output fields are listed in the approximate order in which they appear.

Table 71: show services nat resource-usage Output Fields

Field Name Description

Pool Name of the pool.

Address Address of the pool.

Used Number of used resources in the pool.

Available Number of available resources in the pool.

Total Total number of addresses in the pool.

Usage Percent of resources used.

Sample Output

show services nat resource-usage source-pool all

user@host> show services nat resource-usage source-pool all


PAT pools(including address-shared pool) port utilization:
Pool Address Used Avail Total Usage
src-nat-pool-1 1 64 0 64 100%
src-nat-pool-2 4 0 258048 258048 0%
1054

show services nat resource-usage source-pool src-nat-pool-2

show services nat resource-usage source-pool src-nat-pool-2


Pool name: src-nat-pool-2
Total address: 4
Port-overloading-factor: 1
Total ports: 258048 Used: 0 Avail: 258048
Current usage: 0% Peak usage: 0% at 1970-01-01 00:00:00 UTC
Address Factor-index Port-range Used Avail Total Usage
1.1.1.20
0 Single Ports 0 64512 64512 0%
1.1.1.21
0 Single Ports 0 64512 64512 0%
1.1.1.22
0 Single Ports 0 64512 64512 0%
1.1.1.23
0 Single Ports 0 64512 64512 0%

Release Information

Command introduced in Junos OS Release 19.3R2.

show services nat source deterministic

IN THIS SECTION

Syntax | 1055

Description | 1055

Options | 1055

Required Privilege Level | 1055

Output Fields | 1055

Sample Output | 1056

Release Information | 1057


1055

Syntax

show services source nat deterministic


host-address-range
host-ip ip-address
pool pool-name
xlated-ip translated-ip-address
xlated-port translated-port-number

Description

Display deterministic port block allocation information.

Options

host-address-range Display the deterministic host address range without overlap.

host-ip ip-address Display the internal host IP address.

pool pool-name Display the source NAT pool.

xlated-ip translated-ip-address Display translated IP address.

xlated-port translated-port-number Display the translated port number.

Required Privilege Level

view

Output Fields

Table 72 on page 1056 lists the output fields for the command. Output fields are listed in the
approximate order in which they appear.
1056

Table 72: show services nat source deterministic Output Fields

Field Name Field Description

Pool name Name of the NAT source pool.

Port overloading Factor of port overloading for the source pool.


factor

Used/total port Port block used number and port block total number for this source NAT pool.
blocks

Host IP Host IP address.

External IP IP address of external router.

Port Block Range The range of ports in a block, ranging from lowest to highest.

Ports Used/Ports Number of ports used and total ports.


Total

Total host ranges Host ranges in total.


number

Min Host Address Minimum host address.

Max Host Address Maximum host address.

Sample Output

show services nat source deterministic

user@host> show services nat source deterministic

Pool name: src-nat-pool-1


1057

Port-overloading-factor: 1 Port block size: 256


Used/total port blocks: 0/12
Host_IP External_IP Port_Block Ports_Used/
Range Ports_Total
10.1.1.1 202.0.0.1 1280-1535 0/256*1
10.1.1.2 202.0.0.1 1536-1791 0/256*1

show services nat source deterministic host-address-range

user@host> show services nat source deterministic host-address-range


Pool name: src-nat-pool-1
Total host ranges number: 1
Min Host Address Max Host Address
10.1.1.1 10.1.1.2

Release Information

This command was introduced in Junos OS 19.3R2.

show services nat source mappings address-pooling-paired

IN THIS SECTION

Syntax | 1058

Description | 1058

Options | 1058

Required Privilege Level | 1058

Sample Output | 1059

Release Information | 1061


1058

Syntax

show services nat source mappings address-pooling-paired

Description

Displays NAT source mappings address pooling information

Options

address-pooling-paired (Optional) Display only information about address-pooling paired mappings.

endpoint-independent (Optional) Display only information about endpoint-independent mappings.

pcp (Optional) Display only information about port control protocol mappings.

NOTE: PCP requests with the prefer-failure option request a particular external IP address and
port. When the request cannot be fulfilled, the mapping is not created. In this case, the
subscriber does not have a mapped IP address. Such a subscriber is counted in the summary of
the number or address mappings, but is not displayed in the list of address mappings, as shown in
the following examples:

user@host# show services nat mappings summary


Service Interface: sp-2/0/0
Total number of address mappings: 1
Total number of endpoint independent port mappings: 0
Total number of endpoint independent filters: 0

user@host# show services nat mappings address-pooling-paired


[edit]

This is expected behavior because unfulfilled address mappings (IP of 0.0.0.0) are not displayed
in the output of the second CLI command. These address mappings will time out based on
configured or default values.

Required Privilege Level

view
1059

Sample Output

show services nat source mappings address-pooling-paired

user@host> show services nat source mappings address-pooling-paired


Interface: ms-2/0/0, Service set: ss1
Pool name: sp1
Internal address External address Session Count Mapping State
1.1.1.100 30.30.30.1 1 Active
1.1.1.101 30.30.30.2 1 Active

show services nat source mappings address-pooling-paired private 1.1.1.100

user@host> show services nat source mappings address-pooling-paired private 1.1.1.100


Interface: ms-2/0/0, Service set: ss1
Pool name: sp1
Internal address External address Session Count Mapping State
1.1.1.100 30.30.30.1 1 Active

show services nat source mappings address-pooling-paired public 30.30.30.2

user@host> show services nat source mappings address-pooling-paired public 30.30.30.2


Interface: ms-2/0/0, Service set: ss1
Pool name: sp1
Internal address External address Session Count Mapping State
1.1.1.101 30.30.30.2 1 Active

show services nat source mappings address-pooling-paired pool-name sp1

user@host> show services nat source mappings address-pooling-paired pool-name sp1


Interface: ms-2/0/0, Service set: ss1
Pool name: sp1
Internal address External address Session Count Mapping State
1.1.1.100 30.30.30.1 1 Active
1.1.1.101 30.30.30.2 1 Active
1060

show services nat mappings address-pooling-paired

user@host> show services nat mappings address-pooling-paired


Interface: sp-3/0/0, Service set: NAPT44-SS1
NAT pool: napt44-SS1-p1
Mapping : 29.32.38.255 --> 192.168.75.23
Ports In Use : 9
Session Count : 1
Mapping State : Active

show services nat mappings address-pooling-paired (mapping of active B4 for a subscriber)

user@host> show services nat mappings address-pooling-paired


Interface: sp-0/0/0, Service set: sset_1

NAT pool: nat_pool1

Mapping : 2001:: --> 33.33.33.2


Ports In Use : 1
Session Count : 9
Mapping State : Timeout

show services nat mappings endpoint-independent

user@host> show services nat mappings endpoint-independent


Interface: sp-3/0/0, Service set: NAPT44-SS1
NAT pool: napt44-SS1-p1
Mapping : 29.32.38.255:10000 --> 192.168.75.23:1024
Session Count : 1
Mapping State : Active

show services nat mappings pcp

user@host> show services nat mappings pcp


PCP Client : 172.16.0.1 PCP Lifetime : 45
Mapping : 29.32.38.255:10000 --> 192.168.75.23:1024
1061

Session Count : 1
Mapping State : Active

show services nat mappings nptv6 internal

user@host> show services nat mappings nptv6 internal 1111:2222:3333:aaaa:bbbb::1

Interface Service-set NAT-Pool Address Mapping


vms-0/1/0 ss_nptv6 ss_nptv6_pool 1111:2222:3333:aaaa:bbbb::1 -
> aaaa:bbbb:cccc:dddd:bbbb::1

show services nat mappings nptv6 external

user@host> show services nat mappings nptv6 external aaaa:bbbb:cccc:dddd:bbbb::1

Interface Service-set NAT-Pool Address Mapping


vms-0/1/0 ss_nptv6 ss_nptv6_pool
1111:2222:3333:aaaa:bbbb::1 -> aaaa:bbbb:cccc:dddd:bbbb::1

Release Information

show services nat source mappings endpoint-independent

IN THIS SECTION

Syntax | 1062

Description | 1062

Options | 1062

Required Privilege Level | 1062

Output Fields | 1062

Sample Output | 1063


1062

Sample Output | 1064

Release Information | 1065

Syntax

show services nat source mappings endpoint-independent


<pool-name>
<private | public>

Description

Displays NAT endpoint independent mapping.

Options

<pool-name> Name of address pool.

<private> Private IPv4/IPv6 prefix to use as a filter.

<public> Public IP prefix to use as a filter.

Required Privilege Level

view

Output Fields

Table 73 on page 1063 lists the output fields from the show services nat source mappings endpoint-
independent command. Output fields are listed in the approximate order in which they appear.
1063

Table 73: show services nat source mappings endpoint-independent Output Fields

Field Name Description

Interface Name of the interface.

Service set Name of the service set.

NAT pool Name of the NAT pool.

Mapping Shows the mapping of IP addresses.

Session Count Number of sessions currently using the mapping.

Mapping State NAT mapping state. The following states are possible:

• ACTIVE―Indicates that the entry is active and in use.

• TIMEOUT―Indicates that the mapping is not is in use.


After the mapping-timeout, configured at the [edit
services nat pool pool-name] hierarchy level, lapses, the
mapping is deleted. This fields also displays the number of
seconds after which the timeout occurs.

Sample Output

show services nat source mappings endpoint-independent (ms- interfaces)

user@host> show services nat source mappings endpoint independent


Interface: ms-2/0/0, Service set: ss1
NAT pool: test-pool
Mapping : 2.1.1.1 : 1026 --> 123.0.0.5 :10926
Session Count : 1
Mapping State : Active
1064

show services nat source mappings endpoint-independent private 15.4.4.2 public 20.20.20.1
(ms-interfaces)

user@host> show services nat source mappings endpoint-independent private 15.4.4.2 public
20.20.20.1
Interface: ms-2/0/0, Service set: ss1
NAT pool: p1
Mapping : 15.4.4.2 :12841 --> 20.20.20.1 :11205
Session Count : 1
Mapping State : Active

show services nat source mappings endpoint-independent pool-name p1 (ms-interfaces)

user@host> show services nat source mappings endpoint-independent pool-name p1


Interface: ms-2/0/0, Service set: ss1
NAT pool: p1
Mapping : 15.4.4.2 :12841 --> 20.20.20.1 :11205
Session Count : 1
Mapping State : Active

show services nat source mappings address-pooling-paired pool-name sp1 (sp- interfaces)

user@host> show services nat source mappings address-pooling-paired pool-name sp1


Interface: ms-2/0/0, Service set: ss1
Pool name: sp1
Internal address External address Session Count Mapping State
1.1.1.100 30.30.30.1 1 Active
1.1.1.101 30.30.30.2 1 Active

Sample Output

show services nat source mappings endpoint-independent (vms- interfaces)

user@host> show services nat source mappings endpoint-independent


Interface: vms-2/0/0, Service set: vms-sset10
Pool name: napt44-pool12
1065

Mapping : 20.1.0.101 : 1024 --> 50.0.12.1 : 1024


Session Count : 1
Mapping State : Active
B4 Address : 2002:2010::1401:4 >>>>>>>> B4 Address in mapping

Release Information

Command introduced in Junos OS 19.3R2.

Support for Next Gen Services with the MX-SPC3 security services card added in Junos OS Release
20.2.

show services nat source mappings pcp

IN THIS SECTION

Syntax | 1065

Description | 1065

Options | 1066

Required Privilege Level | 1066

Sample Output | 1066

Release Information | 1066

Syntax

show services nat source mappings pcp


<interface interface-name>
<service-set service-set.>

Description

Display NAT source mapping for PCP.


1066

Options

interface interface-name Display PCP source NAT mapping for the specified interface.

service-set service-set Display PCP source NAT mapping for the specified service set.

Required Privilege Level

view

Sample Output

show services nat source mappings pcp

user@host> show services nat source mappings pcp Interface: vms-0/0/0, Service set: in
NAT pool: p
PCP Client : 10.1.1.2 PCP lifetime : 995
Mapping : 10.1.1.2 : 9000 --> 8.8.8.8 : 1025
Session Count : 1
Mapping State : Active

DS-LITE output:
===============
PCP Client : 2222::1 PCP lifetime : 106
Mapping : 88.1.0.47 : 47 --> 70.70.70.1 :41972
Session Count : 1
Mapping State : Active
B4 Address : 2222::1

Release Information

Command introduced in Junos OS 20.1R1.


1067

show services nat source mappings summary

IN THIS SECTION

Syntax | 1067

Description | 1067

Options | 1067

Required Privilege Level | 1067

Output Fields | 1068

Sample Output | 1068

Release Information | 1068

Syntax

show services nat source mappings summary


<interface interface-name>
<service-set service-set.>

Description

Display NAT mapping summary information.

Options

interface interface-name Display source NAT mapping information for the specified interface.

service-set service-set Display source NAT mapping information for the specified service set.

Required Privilege Level

view
1068

Output Fields

Table 74 on page 1068 lists the output fields for the show services nat source mappings summary
command. Output fields are listed in the approximate order in which they appear.

Table 74: show services nat source mappings summary Output Fields

Field Name Field Description

Service Interface Name of the service interface.

Total number of address mappings Displays total number of address mappings.

Total number of endpoint independent port Displays total number of endpoint independent port
mappings mappings.

Total number of endpoint independent filters Displays total number of endpoint independent
filters.

Sample Output

show services nat source mappings summary

user@host> show services nat source mappings summary


Service Interface: ms-2/0/0
Total number of address mappings: 2
Total number of endpoint independent port mappings: 1
Total number of endpoint independent filters: 1

Release Information

Command introduced in Junos OS 19.3R2.


1069

show services nat source pool

IN THIS SECTION

Syntax | 1069

Description | 1069

Options | 1069

Required Privilege Level | 1070

Output Fields | 1070

Sample Output | 1072

Release Information | 1075

Syntax

show services nat source pool pool-name


<all>
<interface interface-name>
<service-set service-set>

Description

Display source NAT information for a pool.

Options

pool-name Display information about the specified pool.

all Display all source NAT pool information.

interface interface-name Display information specific to the adaptive services interface.

service-set service-set Display information specific to the service set.


1070

Required Privilege Level

view

Output Fields

Table 75 on page 1070 lists the output fields for the show services nat source pool command. Output
fields are listed in the approximate order in which they appear.

Table 75: show services nat source pool Output Fields

Field Name Description

Pool name Name of the source pool.

Pool id Pool identification number.

Routing instance Name of the routing instance.

Host address base Base address of the original source IP address range.

Port Port numbers used for the source pool.

Port overloading Number of port overloading for the source pool.

Address assignment Type of address assignment.

Total addresses Number of IP addresses that are in use.

Translation hits Number of times there is traffic that matches the source
rule.

Limit ports per host


1071

Table 75: show services nat source pool Output Fields (Continued)

Field Name Description

Include-boundary-addresses Include the lowest and highest addresses in the source


address range of the NAT rule to be translated when the
NAT pool is used.

Ei-mapping-timeout Duration for endpoint independent translations that use


the specified NAT pool.

Mapping-timeout Duration for mappings that use the specified NAT pool.

EIF Inbound session count Number of EIF inbound sessions.

EIF Inbound session limit exceeded drops Number of EIF inbound sessions that exceed the drop
limit.

Address range IP address range for the source pool.

Ports

Total used ports


1072

Table 75: show services nat source pool Output Fields (Continued)

Field Name Description

Error Counters The following bullets describe the fields:

• Out of port errors • No ports available.

• Out of address errors • No room in the pool for another address.

• Parity port errors •

• Preserve Range errors •

• APP port allocation errors •

• App port limit allocation errors •

• Port block allocation errors •

• Port blocks limit exceeded errors •

Sample Output

show services nat source pool JNPR-CGNAT-PUB-POOL (NAT Pool)

user@host> show services nat source pool JNPR-CGNAT-PUB-POOL


Interface: vms-0/2/0 , Service set: JNPR-IF-SSET
Pool name : JNPR-CGNAT-PUB-POOL
Pool id : 4
Routing instance : default
Host address base : 0.0.0.0
Port : [1024, 65535]
Port overloading : 1
Address assignment : no-paired
Total addresses : 254
Translation hits : 0
+Limit ports per host : 10
Include-boundary-addresses: Disable
Ei-mapping-timeout : 300
Mapping-timeout : 300
EIF Inbound session count: 0
1073

EIF Inbound session limit exceeded drops: 0


Address range Ports
20.20.20.1 - 20.20.20.254 0
Total used ports : 0
+Error Counters:
+ Out of port errors : 0
+ Out of address errors : 0
+ Parity port errors : 0
+ Preserve Range errors : 0
+ APP port allocation errors : 0
+ APP port limit allocation errors : 0
+ Port block allocation errors : 0
+ Port blocks limit exceeded errors: 0

show services nat source pool JNPR-CGNAT-PUB-POOL (PBA Pool)

user@host> show services nat source pool JNPR-CGNAT-PUB-POOL


Interface: vms-0/2/0 , Service set: JNPR-IF-SSET
Pool name : JNPR-CGNAT-PUB-POOL
Pool id : 4
Routing instance : default
Port : [1024, 65535]
Port overloading : 1
Address assignment : no-paired
Total addresses : 510
Translation hits : 0
Port block size : 256
Max blocks per host : 8
Active block timeout : 0
Interim logging interval : 0
PBA block log : Enable
Used/total port blocks: 0/128520
+Max number of port blocks used: 0
Include-boundary-addresses: Disable
Ei-mapping-timeout : 300
Mapping-timeout : 300
EIF Inbound session count: 0
EIF Inbound session limit exceeded drops: 0
Address range Ports
100.0.0.1 - 100.0.1.254 0
Total used ports : 0
1074

Error Counters:
Out of port errors : 0
Out of address errors : 0
Parity port errors : 0
Preserve Range errors : 0
APP port allocation errors : 0
APP port limit allocation errors : 0
Port block allocation errors : 0
Port blocks limit exceeded errors : 0

show services nat source pool JNPR-CGNAT-PUB-POOL (Deterministic)

user@host> show services nat source pool JNPR-CGNAT-PUB-POOL


Interface: vms-0/2/0 , Service set: JNPR-IF-SSET
Pool name : JNPR-CGNAT-PUB-POOL
Pool id : 4
Routing instance : default
Port : [1024, 65535]
Port overloading : 1
Address assignment : no-paired
Total addresses : 510
Translation hits : 0
Port block size : 256
Determ host range num: 1
+Unique pool users: 0
Include-boundary-addresses: Disable
Ei-mapping-timeout : 300
Mapping-timeout : 300
EIF Inbound session count: 0
EIF Inbound session limit exceeded drops: 0
Address range Single Ports Twin Ports
100.0.0.1 - 100.0.1.254 0 0
Total used ports : 0 0
Error Counters:
Out of port errors : 0
Out of address errors : 0
Parity port errors : 0
Preserve Range errors : 0
APP port allocation errors : 0
APP port limit allocation errors : 0
1075

Port block allocation errors : 0


Port blocks limit exceeded errors : 0

show services nat source pool service-set ss1_interface_style1 interface vms-0/2/0 all

user@router>show services nat source pool service-set ss1_interface_style1 interface vms-0/2/0 all
Interface: vms-0/2/0 , Service set: ss1_interface_style1
Pool name : src_pool1
Pool id : 4
Routing instance : default
Host address base : 0.0.0.0
Port : [1024, 63487]
Twin port : [63488, 65535]
Port overloading : 1
Address assignment : no-paired
Total addresses : 254
Translation hits : 3
Address range Single Ports Twin Ports
44.0.0.1 - 44.0.0.254 1 0
Total used ports : 1 0

Release Information

Command introduced in Junos OS Release 19.3R2.

show services nat source port-block

IN THIS SECTION

Syntax | 1076

Description | 1076

Options | 1076

Required Privilege Level | 1076

Output Fields | 1076


1076

Sample Output | 1078

Release Information | 1079

Syntax

show services nat source port-block


<host-ip ip-address>
<pool pool-name>
<xlated-ip translated-ip-address>
<xlated-port translated-port-number>

Description

Display port block allocation information.

Options

host-ip ip-address Display port block allocation information for the specified host.

pool pool-name Display port block allocation information for the specified pool.

xlated-ip translated-ip-address Display port block allocation information for the specified translated
IP address.

xlated-port translated-port- Display port block allocation information for the specified translated
number port number.

Required Privilege Level

view

Output Fields

Table 76 on page 1077 lists the output fields for the show services nat source port block command.
Output fields are listed in the approximate order in which they appear.
1077

Table 76: show services nat source port block Output Fields

Field Name Field Description

Pool name Name of the pool.

Port-overloading-factor Factor of port overloading for the source pool.

Port block size Number of ports that a port block contains.

Max port blocks per host Maximum number of blocks that one host can use for translation.

Port block active timeout Longest duration that a block remains active for port allocation.

Used/total port blocks Current number of used ports and total number of ports in this source
pool.

Host IP Host IP address.

External IP External IP address.

Port Block Range Port range of one PBA port block entry from the lowest to the highest
port number that can be allowed to allocate ports for this block.

Ports Used/Ports Total Current number of used ports and total number of ports in this source
pool.
1078

Table 76: show services nat source port block Output Fields (Continued)

Field Name Field Description

Block State/Left Time (s) PBA port block entry state for NAT port allocation, including Active,
Inactive, Query, and the time left for a port block that is in the Active or
Query state.

• Active–When an internal subscriber initiates a NAT request, a port


block is allocated from the pool, and the status is set to Active. When
there is a subsequent request from the same subscriber, a port is
allocated from the existing Active block.

• Inactive–When there is a request from an internal subscriber who had


previously had a port allocated from this port block, but the time on
the Active port block has expired or the ports are used up, the port
block status changes from Active to Inactive.

• InactiveB–When a chassis cluster is in active/passive mode, and a port


block is created on the active node, the status for the synced port
block on the backup node is InactiveB.

• Query–When no ports are used in an Active port block, the status


changes from Active to Query.

Failed sessions Number of failed sessions.

Number of sessions Total number of sessions.

Sample Output

show services nat source port-block

user@host> show services nat source port-block


Pool name: sp1
Port-overloading-factor: 1 Port block size: 512
Max port blocks per host: 8 Port block active timeout: 100
Used/total port blocks: 1/64260
Host_IP External_IP Port_Block
Ports_Used/ Block_State/
1079

Range
Ports_Total Left_Time(s)
1.1.1.100 30.30.30.1 13824-14335
1/512*1 Active/71

Failed sessions : 0
Number of sessions : 0

Release Information

Command introduced in Junos OS 19.3R2.

show services nat source rule

IN THIS SECTION

Syntax | 1079

Description | 1080

Options | 1080

Required Privilege Level | 1080

Output Fields | 1080

Sample Output | 1081

Release Information | 1083

Syntax

show services nat source rule


rule-name
<all>
<interface interface-name>
<service-set service-set>
1080

Description

Display source NAT rule-set information.

Options

rule-name Display source NAT rule-set information for the specified rule.

all Display all source NAT rule-set information.

interface interface-name Display rule-set information about the adaptive services interface.

service-set service-set Display rule-set information about the service set.

Required Privilege Level

view

Output Fields

Table 77 on page 1080 lists the output fields for the show services nat source rule command. Output
fields are described in the approximate order in which they appear.

Table 77: show services nat source rule Output Fields

Field Name Description

Interface Interface name.

Service set Service set name.

Rule Id Rule identification number.

Rule position Position of the source NAT rule.

Match-direction Specifies the direction in which to match traffic that


meets the rule conditions.
1081

Table 77: show services nat source rule Output Fields (Continued)

Field Name Description

Match Match the following:

• Source address • Name of the source address that matches the rule.

• Destination address • Name of the destination address that matches the


rule.
• Application
• Indicates whether the application option is
configured.

Action

• Persistent NAT type

• Persistent NAT mapping type

• Inactivity timeout

• Max session number

Translation hits Use this field to check for traffic that matches the rule.
Note the successful or failed sessions.
• Successful sessions

• Failed sessions

Number of sessions Number of active sessions.

Sample Output

show services nat source rule

user@host> show services nat source rule all


ss1_interface_style1 interface vms-0/2/0 all | no-more
Interface: vms-0/2/0 , Service set: ss1_interface_style1
source NAT rule: r1 Rule-set: rs1
Rule-Id : 1
1082

Rule position : 1
Match-direction : input
Match
Source addresses : 0.0.0.0 - 255.255.255.255
Destination addresses : 0.0.0.0 - 255.255.255.255
Application : configured
Action : src_pool1
Persistent NAT type : N/A
Persistent NAT mapping type : address-port-mapping
Inactivity timeout : 0
Max session number : 0
Translation hits : 3
Successful sessions : 3
Failed sessions : 0
Number of sessions : 1

show services nat source rule (Mapping and EIF Configuration)

show services nat source rule all


Total rules: 1
Total referenced IPv4/IPv6 ip-prefixes: 1/0
source NAT rule: r1 Rule-set: rs1
Rule-Id : 1
Rule position : 1
From zone : nh-JNPR-NH-SSET-ZoneIn
To zone : nh-JNPR-NH-SSET-ZoneOut
Match
Source addresses : 30.30.30.0 - 30.30.30.255
Action : p2
+Mapping-type : endpoint-independent;
+Mapping-refresh : inbound
+Filtering-type: endpoint-independent
+Prefix-list :
1.2.2.0 --- 2.2.2.3
3.3.3.0 --- 3.3.3.3 except
Translation hits : 0
Successful sessions : 0
Failed sessions : 0
Number of sessions : 0
1083

Release Information

Command introduced in Junos OS 19.3R2.

show services nat source rule-application

IN THIS SECTION

Syntax | 1083

Description | 1083

Options | 1083

Required Privilege Level | 1084

Output Fields | 1084

Sample Output | 1085

Release Information | 1085

Syntax

show services nat source rule-application


<all>
<interface interface-name>
<service-set service-set>

Description

Display source NAT rule application information.

Options

all Display all source NAT rule application information.

interface interface-name Display source NAT rule application information for the specified interface.
1084

service-set service-set Display source NAT rule application information for the specified service set.

Required Privilege Level

view

Output Fields

Table 78 on page 1084 lists the output fields for the show services nat source rule-application
command. Output fields are described in the approximate order in which they appear.

Table 78: show services nat source rule-application Output Fields

Field Name Description

Interface Displays rule application for the specified interface.

Service set Displays rule application for the specified service set.

Source NAT rule The name of the source NAT rule.

• Rule-set • Set of rules for matching traffic.

• Rule-Id • Rule identification number.

• Match-direction • Specifies the direction in which to match traffic that


meets the rule conditions.
• Application
• Name of the application or application set.
• IP Protocol
• IP protocol identifier.
• Source port range
• Source port range identifier.
• Destination port range
• Destination port range identifier.
1085

Sample Output

show services nat source rule-application

user@host> show services nat source rule-application service-set ss1_interface_style1 interface


vms-0/2/0 all
Interface: vms-0/2/0 , Service set: ss1_interface_style1
source NAT rule: r1 Rule-set: rs1
Rule-Id : 1
Match-direction : input
Application: any
IP protocol: 0
Source port range: [0-0]
Destination port range: [0-0]

Release Information

Command introduced in Junos OS Release 19.3R2.

show services nat source summary

IN THIS SECTION

Syntax | 1086

Description | 1086

Options | 1086

Required Privilege Level | 1086

Output Fields | 1086

Sample Output | 1087

Release Information | 1088


1086

Syntax

show services nat source summary


<interface interface-name>
<service-set service-set>

Description

Displays source NAT summary information.

Options

interface interface-name Display source NAT summary information for the specified interface.

service-set service-set Display source NAT summary information for the specified service set.

Required Privilege Level

view

Output Fields

Table 79 on page 1086 lists the output fields for the show services nat source summary command.
Output fields are listed in the approximate order in which they appear.

Table 79: show services nat source summary Output Fields

Field Name Description

Interface Interface name.

Service set Service set name.

Pool Name Name of the source address pool.

Address Range IP address or IP address range for the pool.


1087

Table 79: show services nat source summary Output Fields (Continued)

Field Name Description

Routing Instance Name of the routing instance.

PAT Whether Port Address Translation (PAT) is enabled


(yes or no).

Total Address Number of IP addresses that are in use.

Rule name Name of the rule.

Rule set Set of rules.

Match-direction Specifies the direction in which to match traffic that


meets the rule conditions.

Action Action taken for a packet that matches a rule.

Sample Output

show services nat source summary

user@host> show services nat source summary service-set ss1_interface_style11 interface vms-0/2/0
Interface: vms-0/2/0 , Service set: ss1_interface_style1
Pool Address Routing PAT Total
Name Range Instance Address
src_pool1 44.0.0.1-44.0.0.254 default yes 254
Interface: vms-0/2/0 , Service set: ss1_interface_style1
Rule name Rule set Match-direction Action
r1 rs1 input src_pool1
1088

Release Information

Command introduced in Junos OS Release 19.3R2.

show services pcp statistics

IN THIS SECTION

Syntax | 1088

Description | 1088

Options | 1088

Required Privilege Level | 1088

Output Fields | 1089

Sample Output | 1091

Release Information | 1092

Syntax

show services pcp statistics

Description

Display information PCP mappings.

Options

Required Privilege Level

view
1089

Output Fields

Table 80 on page 1089 lists the output fields for the show services pcp statistics command. Output
fields are listed in the approximate order in which they appear.

Table 80: show services pcp statistics Output Fields

Field Name Field Description

Services PIC Name Name of a service interface.

Protocol Statistics Overall PCP statistics, consisting of: operational, option, and
results statistics.

Operational Statistics Operational statistics group.

Map request received Total PCP MAP requests received from PCP clients.

Peer request received Number of peer requests received.

Option Statistics Number of requests using available options.

Unprocessed requests received Number of requests received with no option specified.

Third party requests received Number of third-party requests received.

Prefer fail option received Number of prefer fail requests received.

Filter option received Number of filter option requests received.

Other options counters Number of packets received with options other than prefer-fail
and third-party.

Other optional received


1090

Table 80: show services pcp statistics Output Fields (Continued)

Field Name Field Description

Results Statistics Information about the results of PCP requests.

PCP success Number of PCP MAP requests successfully processed by the


server.

PCP unsupported version Number of PCP packets received with version other than 1.

Not authorized Number of unauthorized MAP delete requests.

Bad requests Number of requests with invalid PCP packets.

Unsupported opcode Number of packets that have an unsupported opcode.

Unsupported option Number of packets that have an unsupported option.

Bad option Number of packet that have a malformed option.

Network failure Number of times a mapping could not be provided due to a


network failure.

Out of resources Number of times a mapping could not be provided because the
PCP server ran out of pool resources.

Unsupported protocol Number of requests for which the protocol was neither TCP nor
UDP.

User exceeded quota Number of requests for which the PCP client requested more
than the configured number of ports.
1091

Table 80: show services pcp statistics Output Fields (Continued)

Field Name Field Description

Cannot provide external Number of requests for which the PCP server cannot provide the
external address or port requested by the client.

Address mismatch Number of requests for which the PCP client IP address and the
layer-3 source IP do not match.

Excessive number of remote peers This counter is not currently used.

Processing error Number of requests with malformed PCP packets information,


such as an invalid IP address in a third-party request .

Other result counters Not currently used.

Sample Output

show services pcp statistics pcp

user@host> show services pcp statistics pcp


Services PIC Name: sp-2/1/0

Protocol Statistics:

Operational Statistics

Map request received : 0


Peer request received : 0
Other operational counters : 0

Option Statistics

Unprocessed requests received : 0


Third party requests received : 0
Prefer fail option received : 0
1092

Filter option received : 0


Other options counters : 0
Option optional received : 0

Result Statistics

PCP success : 0
PCP unsupported version : 0
Not authorized : 0
Bad requests : 0
Unsupported opcode : 0
Unsupported option : 0
Bad option : 0
Network failure : 0
Out of resources : 0
Unsupported protocol : 0
User exceeded quota : 0
Cannot provide external : 0
Address mismatch : 0
Excessive number of remote peers : 0
Processing error : 0
Other result counters : 0

Release Information

Command introduced in Junos OS Release 13.2

show services policies

IN THIS SECTION

Syntax | 1093

Description | 1093

Required Privilege Level | 1093

Output Fields | 1093

Sample Output | 1095


1093

Release Information | 1095

Syntax

show services policies

Description

Display services policy information.

Required Privilege Level

view

Output Fields

Table 81 on page 1093 lists the output fields for the show services policies command. Fields are listed in
the approximate order in which they appear.

Table 81: show services policies Output Fields

Field Name Description

Default policy

Policy Name of the applicable policy.

State Status of the policy:

• enabled: The policy can be used in the policy lookup process,


which determines access rights for a packet and the action
taken in regard to it.

• disabled: The policy cannot be used in the policy lookup


process, and therefore it is not available for access control.
1094

Table 81: show services policies Output Fields (Continued)

Field Name Description

Index Internal number associated with the policy.

Scope policy

Sequence number Number of the policy within a given context. For example, three
policies that are applicable in a from-zoneA-to-zoneB context
might be ordered with sequence numbers 1,2,3. Also, in a from-
zoneC-to-zoneD context, four policies might have sequence
numbers 1,2,3,4.

Stateful firewall rule

Service set Name of the service set.

Interface Name of the interface.

Match direction

Source addresses Names of the source addresses for a policy. Address sets are
resolved to their individual Names of the source addresses for a
policy. Address sets are resolved to their individual

Destination addresses Name of the destination address (or address set as it was
entered om the destination zone’s address book.

Application
1095

Sample Output

show services policies

user@host> show services policies


Default policy: deny-all
Policy: p1, State: enabled, Index: 1007, Scope Policy: 0, Sequence number: 1
Stateful firewall rule: sfw1, Service set: JNPR-NH-SSET, Interface:
vms-0/2/0, Match Direction: input
Source addresses: any-ipv4
Destination addresses: any
Applications: junos-ftp
Policy: p2, State: enabled, Index: 1008, Scope Policy: 0, Sequence number: 2
Stateful firewall rule: sfw1, Service set: JNPR-NH-SSET, Interface:
vms-0/2/0, Match Direction: input
Source addresses: any
Destination addresses: any
Applications: any

Release Information

Command introduced in Junos OS Release 19.3R2.

show services policies detail

IN THIS SECTION

Syntax | 1096

Description | 1096

Required Privilege Level | 1096

Output Fields | 1096

Sample Output | 1098

Release Information | 1099


1096

Syntax

show services policies detail

Description

Display detailed information about configured services policies.

Required Privilege Level

view

Output Fields

Table 82 on page 1096 lists the output fields for the show services policies detail command. Output
fields are listed in the approximate order in which they appear.

Table 82: show services policies detail

Field Name Description

Default policy

Policy

Action type

State Status of the policy:

• enabled: The policy can be used in the policy lookup process,


which determines access rights for a packet and the action
taken in regard to it.

• disabled: The policy cannot be used in the policy lookup


process, and therefore it is not available for access control.

Index Internal number associated with the policy.


1097

Table 82: show services policies detail (Continued)

Field Name Description

Scope policy

Policy type

Sequence number Number of the policy within a given context. For example, three
policies that are applicable in a from-zoneA-to-zoneB context
might be ordered with sequence numbers 1,2,3. Also, in a from-
zoneC-to-zoneD context, four policies might have sequence
numbers 1,2,3,4.

Stateful firewall rule

Service set Service set name.

Interface Interface name.

Source addresses The names and corresponding IP addresses for the policy.
Address sets are resolved to their individual address name-IP
address pairs.

Destination addresses Name of the destination address (or address set) as it was
entered in the destination zone’s address book. A packet’s
destination address must match this value for the policy to apply
to it.

Application

IP protocol

Inactivity timeout
1098

Table 82: show services policies detail (Continued)

Field Name Description

Source port range

Destination port range

Per policy TCP Options

Sample Output

show services policies detail

user@host> show services policies detail


Default policy: deny-all
Policy: p1, action-type: permit, State: enabled, Index: 1007, Scope Policy: 0
Policy Type: Configured
Sequence number: 1
Stateful firewall rule: sfw1, Service set: JNPR-NH-SSET, Interface: vms-0/2/0,
Match Direction: input
Source addresses:
any-ipv4(global): 0.0.0.0/0
Destination addresses:
any-ipv4(global): 0.0.0.0/0
any-ipv6(global): ::/0
Application: junos-ftp
IP protocol: tcp, ALG: ftp, Inactivity timeout: 1800
Source port range: [0-0]
Destination port range: [21-21]
Per policy TCP Options: SYN check: No, SEQ check: No, Window scale: No
Policy: p2, action-type: permit, State: enabled, Index: 1008, Scope Policy: 0
Policy Type: Configured
Sequence number: 2
Stateful firewall rule: sfw1, Service set: JNPR-NH-SSET, Interface: vms-0/2/0,
Match Direction: input
Source addresses:
any-ipv4(global): 0.0.0.0/0
1099

any-ipv6(global): ::/0
Destination addresses:
any-ipv4(global): 0.0.0.0/0
any-ipv6(global): ::/0
Application: any
IP protocol: 0, ALG: 0, Inactivity timeout: 0
Source port range: [0-0]
Destination port range: [0-0]
Per policy TCP Options: SYN check: No, SEQ check: No, Window scale: No

Release Information

Command introduced in Junos OS Release 19.3R2.

show services policies hit-count

IN THIS SECTION

Syntax | 1099

Description | 1099

Required Privilege Level | 1100

Output Fields | 1100

Sample Output | 1100

Release Information | 1100

Syntax

show services policies hit-count

Description

Display the hit count of policies.


1100

Required Privilege Level

view

Output Fields

Sample Output

show services policies hit-count

user@host> show services policies hit-count


Index Service Set Interface Name Sfw rule
Direction Policy count
1 JNPR-NH-SSET vms-0/2/0 p1
sfw1 input 0
2 JNPR-NH-SSET vms-0/2/0 p2
sfw1 input 0
Number of policy: 2

Release Information

Command introduced in Junos OS Release 19.3R2.

show services policies interface

IN THIS SECTION

Syntax | 1101

Description | 1101

Required Privilege Level | 1101

Output Fields | 1101

Sample Output | 1101

Release Information | 1101


1101

Syntax

show services policies interface interface-name

Description

Display services policies for the specified interface.

Required Privilege Level

view

Output Fields

Sample Output

show services policies interface vms-0/2/0

user@host> show services policies interface vms-0/2/0


Default policy: deny-all
Policy: p1, State: enabled, Index: 1007, Scope Policy: 0, Sequence number: 1
Stateful firewall rule: sfw1, Service set: JNPR-NH-SSET, Interface:
vms-0/2/0, Match Direction: input
Source addresses: any-ipv4
Destination addresses: any
Applications: junos-ftp
Policy: p2, State: enabled, Index: 1008, Scope Policy: 0, Sequence number: 2
Stateful firewall rule: sfw1, Service set: JNPR-NH-SSET, Interface:
vms-0/2/0, Match Direction: input
Source addresses: any
Destination addresses: any
Applications: any

Release Information

Command introduced in Junos OS Release 19.3R2.


1102

show services policies service-set

IN THIS SECTION

Syntax | 1102

Description | 1102

Required Privilege Level | 1102

Output Fields | 1102

Sample Output | 1102

Release Information | 1103

Syntax

show services policies service-set service-set

Description

Display policy information for the specified service set.

Required Privilege Level

view

Output Fields

Sample Output

show services policies service-set

user@host> show services policies service-set JNPR-NH-SSET


Default policy: deny-all
Policy: p1, State: enabled, Index: 1007, Scope Policy: 0, Sequence number: 1
Stateful firewall rule: sfw1, Service set: JNPR-NH-SSET, Interface:
1103

vms-0/2/0, Match Direction: input


Source addresses: any-ipv4
Destination addresses: any
Applications: junos-ftp
Policy: p2, State: enabled, Index: 1008, Scope Policy: 0, Sequence number: 2
Stateful firewall rule: sfw1, Service set: JNPR-NH-SSET, Interface:
vms-0/2/0, Match Direction: input
Source addresses: any
Destination addresses: any
Applications: any

Release Information

Command introduced in Junos OS Release 19.3R2.

show services redundancy-group

IN THIS SECTION

Syntax | 1103

Description | 1104

Options | 1104

Required Privilege Level | 1104

Output Fields | 1104

Sample Output | 1113

Release Information | 1116

Syntax

show services redundancy-group


<rg-id>
<brief | extensive | terse>
1104

Description

Display redundancy group status information for all redundancy groups or a specified redundancy group.

Options

rg-id (Optional) Name of a specific redundancy group.

brief | extensive | terse (Optional) Display the specified level of output. When no level is specified,
display terse level output.

• Default: terse

Required Privilege Level

view

Output Fields

Table 83 on page 1104 lists the output fields for the show services redundancy-group command.
Output fields are listed in the approximate order in which they appear.

Table 83: show services redundancy-group Output Fields

Field Name Field Description Level of Output

ICCP process Status of the connection between the srd and all levels
connection iccpd.

• Connected

• Not connected

Redundancy Group Identifier of the redundancy group. all levels


ID

Number of peer RG Total number of peers in the redundancy group. brief, extensive
connections
1105

Table 83: show services redundancy-group Output Fields (Continued)

Field Name Field Description Level of Output

Local RG IP IP address of the local redundancy group. all levels

RS ID terse

Local RS state State of the local redundancy set. terse

• MASTER

• STANDBY

• INITIALIZING

• STANDBY (WARNED)

Peer RS state State of the peer redundancy set. terse

• MASTER

• STANDBY

• INITIALIZING

• STANDBY (WARNED)

Peer RG IP Peer redundancy group IP address. all

Status Status of redundancy group connection with this terse


peer.

• Connected

• Not Connected

Number of peer RG Total number of peers in the redundancy group. brief


connections
1106

Table 83: show services redundancy-group Output Fields (Continued)

Field Name Field Description Level of Output

Redundancy Set ID Identifier of the redundancy set. brief, extensive

Connection status Status of the connection between the srd and brief, extensive
iccpd.

• Connected

• Not Connected

Redundancy Set State of the local redundancy set state. brief, extensive
state
• INITIALIZING

• MASTER

• STANDBY

• STANDBY (WARNED)

Redundancy Set State of the peer redundancy set state. brief, extensive
peer state
• INITIALIZING

• MASTER

• STANDBY

• STANDBY (WARNED)

Redundancy Set • Passed brief, extensive


health status
• Failed

Number of Number of monitored interfaces that are d brief, extensive


Monitored interface
down
1107

Table 83: show services redundancy-group Output Fields (Continued)

Field Name Field Description Level of Output

Failed Interfaces List of all monitored interfaces that are down. brief, extensive

Service Set Service set used for stateful sync. brief, extensive

Service Interface Service set used for brief, extensive

Type Type of redundancy and stateful sync for the brief, extensive
listed service interface.

• Inter-chassis

• Intra-chassis

Role Role of the listed service interface. brief, extensive

• active

• backup

Connection Status of connection with peer service PIC. brief, extensive

• Up

• Down
1108

Table 83: show services redundancy-group Output Fields (Continued)

Field Name Field Description Level of Output

Synchronization Type of synchronization. When all eligible brief, extensive


sessions are still synchronizing, it is cold
synchronization. When all current existing
sessions are synchronized, it is a HOT
synchronization, When long lived sessions are
eligible, they are synchronized.

• Hot—All current existing sessions are synced.


When long-lived sessions are eligible, they are
synchronized.

• Cold–Eligible sessions are in the processing of


synchronizing.

ICCP process Number of completed opens of ICCP process extensive


connection open connections.
complete count

ICCP process Number of completed closes of ICCP process


connection close connections.
complete count

ICCP packet sent Number of ICCP packets sent. extensive


count

ICCP packet receive Number of ICCP packets received. extensive


count

ICCP process Number of ICCP process keepalive messages extensive


keepalive receive received.
count

ICCP process Number of ICCP process keepalive messages extensive


keepalive sent count sent.
1109

Table 83: show services redundancy-group Output Fields (Continued)

Field Name Field Description Level of Output

ICCP redundancy Number of redundancy group add messages extensive


group add count received by srd from ICCP.

ICCP redundancy Number of redundancy group delete messages extensive


group delete count received by srd from ICCP.

RG connection up Number of redundancy group connection up extensive


count messages received by srd from ICCP.

RG connection Number of redundancy group connection down extensive


down count messages received by srd from ICCP.

RG join count Number of redundancy group join messages sent extensive


from srd to ICCP.

RG data receive Number of packets of messages received by srd extensive


count from a peer.

RG data sent count Number of packets of messages sent from srd to extensive
a peer.

RG connect message Number of connect messages sent from srd to extensive


sent count ICCP.

RG connect message Number of connect messages received by srd extensive


receive count from ICCP.

RG disconnect Number of disconnect messages sent from srd to extensive


message sent count ICCP.
1110

Table 83: show services redundancy-group Output Fields (Continued)

Field Name Field Description Level of Output

RG disconnect Number of disconnect messages received by srd extensive


message receive from ICCP.
count

RG ack sent count Number of RG ack messages sent. extensive

RG nack sent count Number of RG nack messages sent. extensive

RG nack receive Number of RG nack messages received. extensive


count

Transition Events Number of transition events received in each of extensive


Received the following categories:

• Acquire primary role auto

• Acquire primary role manual

• Release primary role auto

• Release primary role manual


1111

Table 83: show services redundancy-group Output Fields (Continued)

Field Name Field Description Level of Output

Transition Events Number of transition events ignored in each of extensive


Ignored the following categories:

• Acquire primary role auto

• Acquire primary role manual

• Release primary role auto

• Release primary role manual

In a high-availability or redundancy pair of SDGs,


in which one SDG is the primary and the other is
the standby, when perform a double failover of
the SDGs, the second failover event is not
ignored, which is the expected behavior. The
event is not disregarded because it arrives as a
critical redundancy-event based on the
redundancy-policy. However, because the SDG is
already be in Standby state, the finite state
machine transitions to the Standby-Warned state
until it recovers. Therefore, the event is honored
and not ignored. Although there was no primary
role transition, it is because of a valid reason that
the SDG is already in Standby state. The
redundancy-event is associated with to a primary
role release policy based on the configuration
and the Release primary role field under the
Transition Events Ignored column displays a
number that corresponds to the redundancy
event.

The services redundancy daemon (SRD) finite


state machine quickly recovers (transitions from
Standby-Warned to Standby) during restart-
routing because the rpd restart-handling and
recovery are fast and the following critical event
is not ignored. However, disabling or deactivating
the interface results in the FSM remaining in
1112

Table 83: show services redundancy-group Output Fields (Continued)

Field Name Field Description Level of Output

Standby-Warned until the interface is up. Any


critical events during the time when the interface
is down are ignored because the state is already
Standby-Warned and does not transition to a
different state. In summary, the following is the
manner in which critical events are analyzed
during state transitions:

• Standby -> Standby Warned = Critical Event


Not ignored [valid state transition]

• Standby Warned -> Standby Warned = Critical


Event Ignored [no state transition]

Monitored Events Number of monitored events received in each of extensive


Received the following categories:

• Link-down

• Routing restart/terminate

• Route update error

• Peer primary-role-acquire

• Peer primary-role-release

Monitored Events Number of monitored events ignored in each of extensive


Ignored the following categories:

• Link-down

• Routing restart/terminate

• Route update error

• Peer primary-role-acquire

• Peer primary-role-release
1113

Sample Output

show services redundancy-group terse

user@host> show services redundancy-group terse


ICCP process connection : Connected

Redundancy Group ID : 1
Number of peer RG connections : 1
Local RG IP : 172.19.39.70
RS ID Local RS state Peer RS state Peer RG IP Status
1 MASTER STANDBY 172.19.39.69 Connected

show services redundancy-group brief (Health Status Passed)

user@host> show services redundancy-group brief


ICCP process connection : Connected
Redundancy Group ID : 1
Number of peer RG connections : 1
Local RG IP : 172.19.39.70
Redundancy Set ID : 1
Connection status : Connected
Redundancy Set state : MASTER
Redundancy Set peer state : STANDBY
Peer RG IP : 172.19.39.69
Redundancy Set health status : Passed
Service Set : IPv6-SFW
Service interface Type Role Connection
Synchronization
ms-1/3/0 Inter-chassis active Up Hot

ms-1/2/0 Inter-chassis active Up Hot

ms-1/1/0 Inter-chassis active Up Hot

ms-1/0/0 Inter-chassis active Up Hot

Service Set : NAPT44-SS1-SS4


Service interface Type Role Connection
Synchronization
1114

ms-1/3/0 Inter-chassis active Up Hot

ms-1/2/0 Inter-chassis active Up Hot

ms-1/1/0 Inter-chassis active Up Hot

ms-1/0/0 Inter-chassis active Up Hot

show services redundancy-group brief (Health Status Failed)

user@host> show services redundancy-group brief


ICCP Process Connection : Connected
Redundancy Group ID : 1
Number of Members : 2
Redundancy Set ID : 1
Remote IP address : 203.0.113.2
Connection Status : Connected
Redundancy Set State : STANDBY (WAIT)
Redundancy Set Peer State : MASTER
Redundancy Set Health Status : Failed
Number of Monitored interface down : 1 <<<<<<< Failure Reasons
Failed Interfaces
<<<<<<< Name of the monitored interfaces which have gone down
ms-2/3/0
Service Set : ss2
Service Interface Type Role
Connection Synchronization
ms-2/2/0 Inter-chassis backup
Up Hot
ms-2/1/0 Inter-chassis backup
Down Off
ms-2/0/0 Inter-chassis backup
Down Off
Service Set : ss_new
Service Interface Type Role Connection
Synchronization
ms-2/3/0
1115

show services redundancy-group extensive

user@host> show services redundancy-group extensive


ICCP process connection : Connected
ICCP process connection close count : 0
ICCP process connection open complete count : 1
ICCP packet sent count : 7303
ICCP packet receive count : 7321
ICCP process keepalive receive count : 7253
ICCP process keepalive sent count : 7253
ICCP redundancy group add count : 0
ICCP redundancy group delete count : 0
Redundancy Group ID : 1
Number of peer RG connections : 1
Local RG IP : 172.19.39.70
RG connection up count : 4
RG connection down count : 2
RG join count : 4
RG data receive count : 37
RG data sent count : 0
RG connect message sent count : 4
RG connect message receive count : 4
RG disconnect message sent count : 0
RG disconnect message receive count : 4
RG ack sent count : 4
RG nack sent count : 0
RG nack receive count : 4
Redundancy Set ID : 1
Connection status : Connected
Redundancy Set state : MASTER
Redundancy Set peer state : STANDBY
Peer RG IP : 172.19.39.69
Redundancy Set health status : Passed
Service Set : IPv6-SFW
Service interface Type Role Connection
Synchronization
ms-1/3/0 Inter-chassis active Up Hot

ms-1/2/0 Inter-chassis active Up Hot

ms-1/1/0 Inter-chassis active Up Hot


1116

ms-1/0/0 Inter-chassis active Up Hot

Service Set : NAPT44-SS1-SS4


Service interface Type Role Connection
Synchronization
ms-1/3/0 Inter-chassis active Up Hot

ms-1/2/0 Inter-chassis active Up Hot

ms-1/1/0 Inter-chassis active Up Hot

ms-1/0/0 Inter-chassis active Up Hot

Transition events Received Ignored


Acquire mastership auto 3 0
Acquire mastership manual 0 0
Release mastership auto 3 0
Release mastership manual 0 0

Monitored events Received Ignored


Link-down 145 31
Routing restart/abort 1 0
Route update error 0 0
Peer mastership-acquire 3 0
Peer mastership-release 3 0

Release Information

Statement introduced in Junos OS Release 16.1.

show services screen ids-option (Next Gen Services)

IN THIS SECTION

Syntax | 1117

Description | 1117

Options | 1117
1117

Required Privilege Level | 1117

Output Fields | 1117

Sample Output | 1118

Release Information | 1119

Syntax

show services screen <ids-option>


screen-name
logical-system
root-logical-system
tenant

Description

Display the configuration information about the specified services screen. You can configure a ids-
option to enable screen protection on the MX Series devices.

Options

• screen-name —Name of the screen.

• logical-system—Name of the logical system.

• root-logical-system—Displays root logical system as default.

• tenant | all—Name of the tenant system or all tenants.

Required Privilege Level

view

Output Fields
1118

Sample Output

show services screen ids-option

user@host> show services screen ids-option <option1>


Screen object status:

Name Value
ICMP flood threshold 0
UDP flood threshold 0
TCP winnuke enabled
TCP port scan threshold 0
ICMP address sweep threshold 0
TCP sweep threshold 0
UDP sweep threshold 0
IP tear drop enabled
TCP SYN flood attack threshold 0
TCP SYN flood alarm threshold 0
TCP SYN flood source threshold 0
TCP SYN flood destination threshold 0
TCP SYN flood timeout 0
ICMP ping of death enabled
IP source route option enabled
TCP land attack enabled
TCP SYN fragment enabled
TCP no flag enabled
IP unknown protocol enabled
IP bad options enabled
IP record route option enabled
IP timestamp option enabled
IP security option enabled
IP lose source route option enabled
IP stream option enabled
ICMP fragmentation enabled
ICMP large packet enabled
TCP SYN FIN enabled
TCP FIN no ACK enabled
Session source limit threshold 0
Session destination limit threshold 0
Alarm without drop enabled
1119

Release Information

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

ids-option

show services screen-statistics service-set (Next Gen Services)

IN THIS SECTION

Syntax | 1119

Description | 1119

Options | 1119

Required Privilege Level | 1120

Output Fields | 1120

Sample Output | 1123

Release Information | 1124

Syntax

show services screen statistics service-set service-set

Description

Display intrusion detection service (IDS) screen statistics.

Options

• screen-name —Name of the screen.


1120

• logical-system—Name of the logical system.

• root-logical-system—Displays root logical system as default.

• tenant—Name of the tenant system.

Required Privilege Level

view

Output Fields

Table 84 on page 1120 lists the output fields for the show services screen statistics service-set
command. Output fields are listed in the approximate order in which they appear.

Table 84: show services screen statistics service-set Output Fields

Field Name Field Description

ICMP flood Internet Control Message Protocol (ICMP) flood counter. An ICMP
flood typically occurs when ICMP echo requests use all resources in
responding, such that valid network traffic can no longer be processed.

UDP flood User Datagram Protocol (UDP) flood counter. UDP flooding occurs
when an attacker sends IP packets containing UDP datagrams with the
purpose of slowing down the resources, such that valid connections
can no longer be handled.

TCP winnuke Number of Transport Control Protocol (TCP) WinNuke attacks.


WinNuke is a denial-of-service (DoS) attack targeting any computer on
the Internet running Windows.

TCP port scan Number of TCP port scans. The purpose of this attack is to scan the
available services in the hopes that at least one port will respond, thus
identifying a service to target.

ICMP address sweep Number of ICMP address sweeps. An IP address sweep can occur with
the intent of triggering responses from active hosts.
1121

Table 84: show services screen statistics service-set Output Fields (Continued)

Field Name Field Description

IP tear drop Number of teardrop attacks. Teardrop attacks exploit the reassembly
of fragmented IP packets.

TCP SYN flood Number of TCP SYN attacks.

IP spoofing Number of IP spoofs. IP spoofing occurs when an invalid source


address is inserted in the packet header to make the packet appear to
come from a trusted source.

ICMP ping of death ICMP ping of death counter. Ping of death occurs when IP packets are
sent that exceed the maximum legal length (65,535 bytes).

IP source route option Number of IP source route attacks.

TCP address sweep Number of TCP address sweeps.

TCP land attack Number of land attacks. Land attacks occur when an attacker sends
spoofed SYN packets containing the IP address of the victim as both
the destination and source IP address.

TCP SYN fragment Number of TCP SYN fragments.

TCP no flag Number of TCP headers without flags set. A normal TCP segment
header has at least one control flag set.

IP unknown protocol Number of IPs.

IP bad options Number of invalid options.


1122

Table 84: show services screen statistics service-set Output Fields (Continued)

Field Name Field Description

IP record route option Number of packets with the IP record route option enabled. This
option records the IP addresses of the network devices along the path
that the IP packet travels.

IP timestamp option Number of IP timestamp option attacks. This option records the time
(in Universal Time) when each network device receives the packet
during its trip from the point of origin to its destination.

IP security option Number of IP security option attacks.

IP loose source route option Number of IP loose source route option attacks. This option specifies a
partial route list for a packet to take on its journey from source to
destination.

IP strict source route option Number of IP strict source route option attacks. This option specifies
the complete route list for a packet to take on its journey from source
to destination.

IP stream option Number of stream option attacks. This option provides a way for the
16-bit SATNET stream identifier to be carried through networks that
do not support streams.

ICMP fragment Number of ICMP fragments. Because ICMP packets contain very short
messages, there is no legitimate reason for ICMP packets to be
fragmented. If an ICMP packet is so large that it must be fragmented,
something is amiss.

ICMP large packet Number of large ICMP packets.

TCP SYN FIN Number of TCP SYN FIN packets.

TCP FIN no ACK Number of TCP FIN flags without the acknowledge (ACK) flag.
1123

Table 84: show services screen statistics service-set Output Fields (Continued)

Field Name Field Description

Source session limit Number of concurrent sessions that can be initiated from a source IP
address.

TCP SYN-ACK-ACK proxy Number of TCP flags enabled with SYN-ACK-ACK. To prevent
flooding with SYN-ACK-ACK sessions, you can enable the SYN-ACK-
ACK proxy protection screen option. After the number of connections
from the same IP address reaches the SYN-ACK-ACK proxy threshold
and SRX Series devices running Junos OS reject further connection
requests from that IP address.

IP block fragment Number of IP block fragments.

Destination session limit Number of concurrent sessions that can be directed to a single
destination IP address.

Sample Output

show services screen statistics service-set

user@host> show services screen statistics service-set USF-Service-Set-X


Screen statistics:

IDS attack type


Statistics
ICMP flood 0
UDP flood 0
TCP winnuke 0
TCP port scan 0
ICMP address sweep 0
TCP sweep 0
UDP sweep 0
IP tear drop 0
TCP SYN flood 0
ICMP ping of death 0
1124

IP source route option 0


TCP land attack 0
TCP SYN fragment 0
TCP no flag 0
IP unknown protocol 0
IP bad options 0
IP record route option 0
IP timestamp option 0
IP security option 0
IP loose source route option 0
IP strict source route option 0
IP stream option 0
ICMP fragment 0
ICMP large packet 0
TCP SYN FIN 0
TCP FIN no ACK 0
Source session limit 0
TCP SYN-ACK-ACK proxy 0
IP block fragment 0
Destination session limit 0

Release Information

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

ids-option
Example: Configuring Multiple Screening Options
1125

show services security-intelligence category summary

IN THIS SECTION

Syntax | 1125

Description | 1125

Options | 1125

Required Privilege Level | 1125

Output Fields | 1125

Sample Output | 1127

Release Information | 1127

Syntax

show services security-intelligence category summary category-name

Description

Display summary for the specified Security Intelligence category.

Options

category-name Name of the category.

Required Privilege Level

View

Output Fields

Table 85 on page 1126 lists the output fields for the show services security-intelligence category
summary command. Output fields are listed in the approximate order in which they appear.
1126

Table 85: show services security-intelligence category summary Output Fields

Field Name Field Description

Category name Name of the Security Intelligence category.

Status Status of the Security Intelligence category.

Description Description of the Security Intelligence category

Update interval Amount of time after which Policy Enforcer sends an update for the feed.

TTL Length of time (in minutes) the file remains open, receiving statistics before it is
closed, transferred, and rotated. When either the time or the file size is exceeded,
the file is closed and a new one is opened, whether or not a transfer site is
specified.

Feed name Information about the feed, including:

• Version

• Object umber

• Create time

• Update time

• Update status

• Expired

• Options

• Status
1127

Sample Output

show services security-intelligence category summary

user@host> show services security-intelligence category summary


node1:
--------------------------------------------------------------------------

Category name :CC


Status :Enable
Description :Command and Control data schema
Update interval :1800s
TTL :3456000s
Feed name :cc_ip_data
Version :N/A
Objects number:0
Create time :2018-03-16 05:57:39 PDT
Update time :2018-03-19 12:30:32 PDT
Update status :N/A
Expired :No
Options :N/A
Status :Enabled
Feed name :cc_ipv6_data
Version :20180228.1
Objects number:1
Create time :2018-03-16 05:57:39 PDT
Update time :2018-03-16 06:19:47 PDT
Update status :Store succeeded
Expired :No
Options :N/A
Status :Disabled

Release Information

Statement introduced before Junos OS Release 18.4.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240,
MX480, and MX960 with the MX-SPC3 services card.

Support for threat feed status (enabled, disabled, or user disabled) is added in Junos OS Release 20.1R1.
1128

RELATED DOCUMENTATION

security-intelligence

show services security-intelligence update status

IN THIS SECTION

Syntax | 1128

Description | 1128

Required Privilege Level | 1128

Sample Output | 1128

Release Information | 1129

Syntax

show services security-intelligence update status

Description

Display the status of the connection with Policy Enforcer.

Required Privilege Level

View

Sample Output

show services security-intelligence update status

user@host> show services security-intelligence update status


node1:
--------------------------------------------------------------------------
1129

Current action :Start downloading the latest manifest.


Last update status :Download manifest failed.
Last connection status:succeeded
Last update time :2018-03-21 16:59:59 PDT

Release Information

Statement introduced before Junos OS Release 18.4.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240,
MX480, and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

security-intelligence

show services service-sets cpu-usage

IN THIS SECTION

Syntax | 1129

Description | 1130

Options | 1130

Required Privilege Level | 1130

Output Fields | 1130

Sample Output | 1131

Release Information | 1131

Syntax

show services service-sets cpu-usage


<interface interface-name>
<service-set service-set-name>
1130

Description

Display service set CPU usage as a percentage. The command is supported only on Adaptive Services
PICs (SP PICs).

Options

none Display CPU usage for all adaptive services interfaces and service sets.

interface (Optional) Display CPU usage for a particular interface. On M Series and T Series
interface-name routers, the interface-name parameter can have the value sp-fpc/pic/port or
rspnumber.

service-set (Optional) Display CPU usage for a particular service set. For the Layer 2 Tunneling
service-set-name Protocol (L2TP), you can use a tunnel group to represent a service set.

Required Privilege Level

view

Output Fields

Table 86 on page 1130 lists the output fields for the show services service-sets cpu-usage command.
Output fields are listed in the approximate order in which they appear.

Table 86: show services service-sets cpu-usage Output Fields

Field Name Field Description

Interface Name of an adaptive services interface


1131

Table 86: show services service-sets cpu-usage Output Fields (Continued)

Field Name Field Description

Service set (system Name of the CPU usage category:


category)
• idp_recommended—Name of the service sets (displays all the
service sets attached to the service PICs)

• Idle

• System

• Receive

• Transmit

CPU utilization % Percentage of the CPU resources being used

Sample Output

show services service-sets cpu-usage

user@host> show services service-sets cpu-usage


Interface Service set (system category) CPU utilization %
sp-4/1/0 idp_recommended 18.20 %
sp-4/1/0 Idle 44.69 %
sp-4/1/0 System 7.01 %
sp-4/1/0 Receive 15.10 %
sp-4/1/0 Transmit 15.00 %

Release Information

Command introduced before Junos OS Release 7.4.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
1132

show services service-sets memory-usage

IN THIS SECTION

Syntax | 1132

Description | 1132

Options | 1132

Required Privilege Level | 1133

Output Fields | 1133

Sample Output | 1134

Release Information | 1134

Syntax

show services service-sets memory-usage


<interface interface-name>
<service-set service-set-name>
<zone>

Description

Display service set memory usage.

Options

none Display service set memory usage.

interface (Optional) Display memory usage for a particular interface. On M Series and T Series
interface-name routers, the interface-name can be sp-fpc/pic/port, or rspnumber.

NOTE: This command is not supported on Multilink Protocol–based services


PICs.
1133

The interface option is not supported on Multiservice PICs.

service-set (Optional) Display memory usage for a particular service set. For Layer 2 Tunneling
service-set- Protocol (L2TP), you can use a tunnel group to represent a service set.
name
zone (Optional) Display the memory usage zone of the adaptive services interface or an
individual service set.

Required Privilege Level

view

Output Fields

Table 87 on page 1133 lists the output fields for the show services service-sets memory-usage
command. Output fields are listed in the approximate order in which they appear.

Table 87: show services service-sets memory-usage Output Fields

Field Name Field Description

Interface Name of an adaptive services interface

Service set Name of a service set

Bytes Used Number of bytes of memory being used

Memory zone Memory zone in which the adaptive services interface is currently
operating:

• Green—All new flows are allowed.

• Yellow—Unused memory is reclaimed. All new flows are allowed.

• Orange—New flows are allowed only for service sets that are using
less than their equal share of memory.

• Red—No new flows are allowed.


1134

Sample Output

show services service-sets memory-usage

user@host> show services service-sets memory-usage


Interface Service set Bytes Used
ms-4/0/0 N/A 14817036
ms-4/1/0 N/A 14691700

show services service-sets memory-usage zone

user@host> show services service-sets memory-usage zone


Interface Memory zone

show services service-sets memory-usage interface

user@host> show services service-sets memory-usage interface ms-4/1/0


Interface Service Set Bytes Used
ms-4/1/0 N/A 14691700

Release Information

Command introduced before Junos OS Release 7.4.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

show services service-sets plug-ins

IN THIS SECTION

Syntax | 1135

Description | 1135
1135

Options | 1135

Required Privilege Level | 1135

Output Fields | 1135

Sample Output | 1135

Release Information | 1136

Syntax

show services service-sets plug-ins <interface interface-name>

Description

Display service set plug-ins summary.

Options

interface interface-name Display service set plug-ins information for the specified interface.

Required Privilege Level

view

Output Fields

Sample Output

show services service-sets plug-ins

user@host> show services service-sets plug-ins


Interface: vms-0/2/0
Service-set: ss1_interface_style1, State: Ready
1136

Plugins configured: 1
Plugin: junos-alg, ID: 25

Release Information

Command introduced in Junos OS Release 19.3R2.

show services service-sets statistic screen-drops (Next Gen Services)

IN THIS SECTION

Syntax | 1136

Description | 1136

Options | 1136

Required Privilege Level | 1137

Output Fields | 1137

Sample Output | 1144

Release Information | 1145

Syntax

show services service-sets statistic screen-drops [service-set| interface


interface-name]

Description

Display statistics for packet drops resulting from header-integrity, suspicious packet pattern, and
session-limit checks performed by an MS-MPC or MS-MIC.

Options

none Display statistics for all configured service interfaces and service sets.
1137

<interface interface-name> (Optional) Display statistics for the specified services interface.

<service-set service-set-name > (Optional) Display statistics for the specified service set.

Required Privilege Level

view

Output Fields

Table 88 on page 1137 lists the output fields for the show services service-set integrity-drops
command. Output fields are listed in the approximate order in which they appear.

Table 88: show services service-set statistics screen drops Output Fields

Field Name Field Description

Interface Name of an adaptive services interface.

Service set Name of a service set.

Errors Total errors, categorized by protocol:

• IP—Total IP version 4 errors.

• TCP—Total Transmission Control Protocol (TCP) errors.

• UDP—Total User Datagram Protocol (UDP) errors.

• ICMP—Total Internet Control Message Protocol (ICMP) errors.


1138

Table 88: show services service-set statistics screen drops Output Fields (Continued)

Field Name Field Description

IP Errors Number of IPv4 errors for the following categories:

• IP packet length inconsistencies—IP packet length did not match


the Layer 2 reported length.

• Minimum IP header length check failures—Minimum IP header


length is 20 bytes. The received packet contained less than 20
bytes.

• Reassembled packet exceeds maximum IP length—After fragment


reassembly, the reassembled IP packet length exceeded 65,535.

• Illegal source address 0—Source address is not a valid address.


Invalid addresses are loopback, broadcast, multicast, and reserved
addresses. Source address 0, however, is allowed to support
BOOTP and the destination address 0xffffffff.

• Illegal destination address —Destination address was not a valid


address. The address is reserved.

• TTL zero errors—Received packet had a time-to-live (TTL) value of


0.

• Illegal IP protocol number 0 or 255—IP protocol is 0 or 255.

• Land attack—IP source address is the same as the destination


address.

• Non-IP packets—Packet did not conform to the IP standard.

• IP option—Packet had a non-allowed IP option.

• Non-IPv4 packets—Packet was not of the IPv4 type.

• Non-IPv6 packets—Packet was not of the IPv6 type.

• Bad checksum—Packet had an invalid IP checksum.

• Illegal IP fragment length—Illegal fragment length. All fragments


(other than the last fragment) must have a length that is a multiple
of 8 bytes.
1139

Table 88: show services service-set statistics screen drops Output Fields (Continued)

Field Name Field Description

• IP fragment overlap—Fragments had overlapping fragment offsets.

• IP fragment limit exceeded —Configured number of allowed


fragments for a packet was exceeded.

• IP fragment reassembly timeout—Some of the fragments for an IP


packet were not received in time, and the reassembly handler
dropped partial fragments. Whenever a fragment is received, it is
maintained in a chain until all other fragments are received. If other
fragments do not arrive within the configured value of reassembly-
timeout, this packet is dropped and the value of the counter shown
in this field is incremented. If other fragments arrive in time but the
total number of fragments is more than the configured value of
fragment-limit, all the fragments (of this packet) are dropped and
the value of the counter shown in this field is incremented.

• IPv4 bad options—Packet IP header contained IPv4 option that is


not allowed.

• IPv6 bad extension headers—Packet contained IPv6 extension


header type that is not allowed.

• session-limit exceeded for source—Number of concurrent sessions


from an individual source address or subnet exceeded limit.

• session-limit exceeded for destination—Number of concurrent


sessions to an individual destination address or subnet exceeded
limit.

• connections/second limit exceeded for source—Number of


connections per second for an individual source address or subnet
exceeded limit.

• connections/second limit exceeded for destination—Number of


connections per second for an individual destination address or
subnet exceeded limit.

• packets/second limit exceeded for source—Number of packets per


second for an individual source address or subnet exceeded limit.
1140

Table 88: show services service-set statistics screen drops Output Fields (Continued)

Field Name Field Description

• packet/second limit exceeded for destination—Number of packets


per second for an individual destination address or subnet
exceeded limit.

• Unknown —Unknown fragments.


1141

Table 88: show services service-set statistics screen drops Output Fields (Continued)

Field Name Field Description

TCP Errors Number of TCP protocol errors for the following categories:

• TCP header length inconsistencies—Minimum TCP header length is


20 bytes, and the IP packet received did not contain at least 20
bytes.

• Source or destination port number is zero—TCP source or


destination port was zero.

• Illegal sequence number, flags combination—Packet had any type


of TCP header anomaly.

• TCP winnuke—TCP segments destined for port 139 with the


urgent (URG) flag set.

• TCP SYN Fragment—TCP SYN packet was a fragment.

• TCP connection closed due to SYN defense—Unestablished TCP


connection closed because open-timeout value expired.

• TCP session-limit exceeded for source—Number of concurrent


TCP sessions from an individual source address or subnet exceeded
limit.

• TCP session-limit exceeded for destination—Number of


concurrent TCP sessions to an individual destination address or
subnet exceeded limit.

• TCP connections/second limit exceeded for source—Number of


TCP connections per second for an individual source address or
subnet exceeded limit.

• TCP connections/second limit exceeded for destination—Number


of TCP connections per second for an individual destination
address or subnet exceeded limit.

• TCP packets/second limit exceeded for source—Number of TCP


packets per second for an individual source address or subnet
exceeded limit.
1142

Table 88: show services service-set statistics screen drops Output Fields (Continued)

Field Name Field Description

• TCP packet/second limit exceeded for destination—Number of


TCP packets per second for an individual destination address or
subnet exceeded limit.

UDP Errors Number of UDP protocol errors for the following categories:

• IP data length less than minimum UDP header length (8 bytes)—


Minimum UDP header length is 8 bytes. The received IP packets
contained less than 8 bytes.

• Source or destination port is zero—UDP source or destination port


was 0.

• UDP session-limit exceeded for source—Number of concurrent


UDP sessions from an individual source address or subnet
exceeded limit.

• UDP session-limit exceeded for destination—Number of


concurrent UDP sessions to an individual destination address or
subnet exceeded limit.

• UDP connections/second limit exceeded for source—Number of


UDP connections per second for an individual source address or
subnet exceeded limit.

• UDP connections/second limit exceeded for destination—Number


of UDP connections per second for an individual destination
address or subnet exceeded limit.

• UDP packets/second limit exceeded for source—Number of UDP


packets per second for an individual source address or subnet
exceeded limit.

• UDP packet/second limit exceeded for destination—Number of


UDP packets per second for an individual destination address or
subnet exceeded limit.
1143

Table 88: show services service-set statistics screen drops Output Fields (Continued)

Field Name Field Description

ICMP Errors Number of ICMP protocol errors for the following categories:

• IP data length less than minimum ICMP header length (8 bytes)—


ICMP header length contained less than 8 bytes.

• ICMP error length inconsistencies—ICMP error packet length was


outside range of 48 bytes through 576 bytes.

• ICMP fragments— ICMP packet was an IP fragment.

• ICMP session-limit exceeded for source—Number of concurrent


ICMP sessions from an individual source address or subnet
exceeded limit.

• ICMP session-limit exceeded for destination—Number of


concurrent ICMP sessions to an individual destination address or
subnet exceeded limit.

• ICMP connections/second limit exceeded for source—Number of


ICMP connections per second for an individual source address or
subnet exceeded limit.

• ICMP connections/second limit exceeded for destination—


Number of ICMP connections per second for an individual
destination address or subnet exceeded limit.

• ICMP packets/second limit exceeded for source—Number of ICMP


packets per second for an individual source address or subnet
exceeded limit.

• ICMP packet/second limit exceeded for destination—Number of


ICMP packets per second for an individual destination address or
subnet exceeded limit.
1144

Sample Output

show services service-sets statistic screen-drops

user@host> show services service-sets statistic screen-drops USF-Service-Set-X interface vms-0/2/0


Interface: vms-0/2/0
Service set: sset1
Errors:
IP: 0, TCP: 0
UDP: 0, ICMP: 0
IP errors:
IP packet length inconsistencies: 0
Illegal source address: 0
Illegal destination address: 0
TTL zero errors: 0, Illegal IP protocol number (0 or 255): 0
Land attack: 0
Non-IPv4 packets: 0
Non-IPv6 packets: 0
Bad checksum: 0
Illegal IP fragment length: 0
IP fragment overlap: 0
IP fragment reassembly timeout: 0
IP fragment limit exceeded: 0
IPv4 bad options: 0
IPv6 bad extension headers: 0
session-limit exceeded for source: 0
session-limit exceeded for destination: 0
connections/second limit exceeded for source: 0
connections/second limit exceeded for destination: 0
packets/second limit exceeded for source: 0
packet/second limit exceeded for destination: 0
Unknown: 0
TCP errors:
TCP header length inconsistencies: 0
Source or destination port number is zero: 0
Illegal sequence number and flags combinations: 0
TCP winnuke: 0
TCP SYN Fragment: 0
TCP connection closed due to SYN defense: 0
TCP session-limit exceeded for source: 0
TCP session-limit exceeded for destination: 0
TCP connections/second limit exceeded for source: 0
1145

TCP connections/second limit exceeded for destination: 0


TCP packets/second limit exceeded for source: 0
TCP packet/second limit exceeded for destination: 0
UDP errors:
IP data length less than minimum UDP header length (8 bytes): 0
Source or destination port number is zero: 0
UDP session-limit exceeded for source: 0
UDP session-limit exceeded for destination: 0
UDP connections/second limit exceeded for source: 0
UDP connections/second limit exceeded for destination: 0
UDP packets/second limit exceeded for source: 0
UDP packet/second limit exceeded for destination: 0
ICMP errors:
IP data length less than minimum ICMP header length (8 bytes): 0
ICMP error length inconsistencies: 0
ICMP fragments: 0
ICMP session-limit exceeded for source: 0
ICMP session-limit exceeded for destination: 0
ICMP connections/second limit exceeded for source: 0
ICMP connections/second limit exceeded for destination: 0
ICMP packets/second limit exceeded for source: 0
ICMP packet/second limit exceeded for destination: 0

Release Information

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Configuring Protection Against Network Attacks on an MS-MPC


1146

show services service-sets statistic screen-session-limit-counters (Next


Gen Services)

IN THIS SECTION

Syntax | 1146

Description | 1146

Options | 1146

Required Privilege Level | 1147

Output Fields | 1147

Sample Output | 1154

Release Information | 1156

Syntax

show services service-set statistic screen-session-limit-counters


<interface interface>
<service-set service-set>

Description

Display counters for session drops and packet drops resulting from session-limit checks performed by an
IDS rule on an MS-MPC or MS-MIC.

Options

none Display statistics for all configured services interfaces.

interface interface-name (Optional) Display statistics for the specified services interface.

service service-set Display statistics for the specified service set.


1147

Required Privilege Level

view

Output Fields

Table 89 on page 1147 lists the output fields for the show services service-set statistics ids session-
limits counters command. Output fields are listed in the approximate order in which they appear.

Table 89: show services service-sets statistics ids session-limits counters Output Fields

Field Name Field Description

TCP Counters Session-limit TCP counters in the ingress direction for the
following:

• Sessions allowed—Number of TCP sessions allowed by the


IDS rule.

• Sessions ignored—Number of TCP sessions that did not


undergo IDS processing because traffic matched a stateful
firewall rule that included accept skip-ids.

• Sessions dropped due to maximum reached—Number of


TCP sessions dropped because the number of TCP
sessions exceeded the limit.

• Sessions dropped due to high rate—Number of TCP


sessions dropped because the number of TCP connections
per second exceeded the limit.

• Packets allowed—Number of TCP packets that the IDS


rule allowed.

• Packets dropped due to high pps—Number of TCP packets


dropped because the number of TCP packets per second
exceeded the limit.
1148

Table 89: show services service-sets statistics ids session-limits counters Output Fields (Continued)

Field Name Field Description

UDP Counters Session-limit UDP counters in the ingress direction for the
following:

• Sessions allowed—Number of UDP sessions allowed by


the IDS rule.

• Sessions ignored—Number of UDP sessions that did not


undergo IDS processing because traffic matched a stateful
firewall rule that included accept skip-ids.

• Sessions dropped due to maximum reached—Number of


UDP sessions dropped because the number of UDP
sessions exceeded the limit.

• Sessions dropped due to high rate—Number of UDP


sessions dropped because the number of UDP connections
per second exceeded the limit.

• Packets allowed—Number of UDP packets that the IDS


rule allowed.

• Packets dropped due to high pps—Number of UDP


packets dropped because the number of TCP packets per
second exceeded the limit.
1149

Table 89: show services service-sets statistics ids session-limits counters Output Fields (Continued)

Field Name Field Description

ICMP Counters Session-limit ICMP counters in the ingress direction for the
following:

• Sessions allowed—Number of ICMP sessions allowed by


the IDS rule.

• Sessions ignored—Number of ICMP sessions that did not


undergo IDS processing because traffic matched a stateful
firewall rule that included accept skip-ids.

• Sessions dropped due to maximum reached—Number of


ICMP sessions dropped because the number of ICMP
sessions exceeded the limit.

• Sessions dropped due to high rate—Number of ICMP


sessions dropped because the number of ICMP
connections per second exceeded the limit.

• Packets allowed—Number of ICMP packets that the IDS


rule allowed.

• Packets dropped due to high pps—Number of ICMP


packets dropped because the number of ICMP packets per
second exceeded the limit.
1150

Table 89: show services service-sets statistics ids session-limits counters Output Fields (Continued)

Field Name Field Description

Other-Protocols Counters Session-limit counters in the ingress direction for protocols


other than TCP, UDP, and ICMP for the following:

• Sessions allowed—Number of sessions allowed by the IDS


rule.

• Sessions ignored—Number of sessions that did not


undergo IDS processing because traffic matched a stateful
firewall rule that included accept skip-ids.

• Sessions dropped due to maximum reached—Number of


sessions dropped because the number of sessions
exceeded the limit.

• Sessions dropped due to high rate—Number of sessions


dropped because the number of connections per second
exceeded the limit.

• Packets allowed—Number of packets that the IDS rule


allowed.

• Packets dropped due to high pps—Number of packets


dropped because the number of packets per second
exceeded the limit.

Egress General Info Information for IDS rules for the service set in the egress
direction.

• Match-direction—Displays output.

• Rule name—Name of the IDS rule.

• Term name—Name of the term in the IDS rule.


1151

Table 89: show services service-sets statistics ids session-limits counters Output Fields (Continued)

Field Name Field Description

Egress TCP Counters Session-limit TCP counters in the egress direction for the
following:

• Sessions allowed—Number of TCP sessions allowed by the


IDS rule.

• Sessions ignored—Number of TCP sessions that did not


undergo IDS processing because traffic matched a stateful
firewall rule that included accept skip-ids.

• Sessions dropped due to maximum reached—Number of


TCP sessions dropped because the number of TCP
sessions exceeded the limit.

• Sessions dropped due to high rate—Number of TCP


sessions dropped because the number of TCP connections
per second exceeded the limit.

• Packets allowed—Number of TCP packets that the IDS


rule allowed.

• Packets dropped due to high pps—Number of TCP packets


dropped because the number of TCP packets per second
exceeded the limit.
1152

Table 89: show services service-sets statistics ids session-limits counters Output Fields (Continued)

Field Name Field Description

Egress UDP Counters Session-limit UDP counters in the egress direction for the
following:

• Sessions allowed—Number of UDP sessions allowed by


the IDS rule.

• Sessions ignored—Number of UDP sessions that did not


undergo IDS processing because traffic matched a stateful
firewall rule that included accept skip-ids.

• Sessions dropped due to maximum reached—Number of


UDP sessions dropped because the number of UDP
sessions exceeded the limit.

• Sessions dropped due to high rate—Number of UDP


sessions dropped because the number of UDP connections
per second exceeded the limit.

• Packets allowed—Number of UDP packets that the IDS


rule allowed.

• Packets dropped due to high pps—Number of UDP


packets dropped because the number of TCP packets per
second exceeded the limit.
1153

Table 89: show services service-sets statistics ids session-limits counters Output Fields (Continued)

Field Name Field Description

Egress ICMP Counters Session-limit ICMP counters in the egress direction for the
following:

• Sessions allowed—Number of ICMP sessions allowed by


the IDS rule.

• Sessions ignored—Number of ICMP sessions that did not


undergo IDS processing because traffic matched a stateful
firewall rule that included accept skip-ids.

• Sessions dropped due to maximum reached—Number of


ICMP sessions dropped because the number of ICMP
sessions exceeded the limit.

• Sessions dropped due to high rate—Number of ICMP


sessions dropped because the number of ICMP
connections per second exceeded the limit.

• Packets allowed—Number of ICMP packets that the IDS


rule allowed.

• Packets dropped due to high pps—Number of ICMP


packets dropped because the number of ICMP packets per
second exceeded the limit.
1154

Table 89: show services service-sets statistics ids session-limits counters Output Fields (Continued)

Field Name Field Description

Egress Other-Protocols Counters Session-limit counters in the egress direction for protocols
other than TCP, UDP, and ICMP for the following:

• Sessions allowed—Number of sessions allowed by the IDS


rule.

• Sessions ignored—Number of sessions that did not


undergo IDS processing because traffic matched a stateful
firewall rule that included accept skip-ids.

• Sessions dropped due to maximum reached—Number of


sessions dropped because the number of sessions
exceeded the limit.

• Sessions dropped due to high rate—Number of sessions


dropped because the number of connections per second
exceeded the limit.

• Packets allowed—Number of packets that the IDS rule


allowed.

• Packets dropped due to high pps—Number of packets


dropped because the number of packets per second
exceeded the limit.

Sample Output

show services service-sets statistic screen-session-limit-counters

user@host> show services service-sets statistic screen-session-limit-counters


IDS Option Name: option-1
---------------------------------------------------------------
TCP Counters:
Sessions allowed: 0
Sessions ignored: 0
Sessions dropped due to maximum reached: 0
Sessions dropped due to high rate: 0
1155

Packets allowed: 0
Packets dropped due to high pps: 0
UDP Counters:
Sessions allowed: 0
Sessions ignored: 0
Sessions dropped due to maximum reached: 0
Sessions dropped due to high rate: 0
Packets allowed: 0
Packets dropped due to high pps: 0
ICMP Counters:
Sessions allowed: 0
Sessions ignored: 0
Sessions dropped due to maximum reached: 0
Sessions dropped due to high rate: 0
Packets allowed: 0
Packets dropped due to high pps: 0
Other-Protocols Counters:
Sessions allowed: 0
Sessions ignored: 0
Sessions dropped due to maximum reached: 0
Sessions dropped due to high rate: 0
Packets allowed: 0
Packets dropped due to high pps: 0

IDS Option Name: option-2


----------------------------------------------------------------
TCP Counters:
Sessions allowed: 0
Sessions ignored: 0
Sessions dropped due to maximum reached: 0
Sessions dropped due to high rate: 0
Packets allowed: 0
Packets dropped due to high pps: 0
UDP Counters:
Sessions allowed: 0
Sessions ignored: 0
Sessions dropped due to maximum reached: 0
Sessions dropped due to high rate: 0
Packets dropped due to high pps: 0
ICMP Counters:
Sessions allowed: 0
Sessions ignored: 0
Sessions dropped due to maximum reached: 0
1156

Sessions dropped due to high rate: 0


Packets allowed: 0
Packets dropped due to high pps: 0
Other-Protocols Counters:
Sessions allowed: 0
Sessions ignored: 0
Sessions dropped due to maximum reached: 0
Sessions dropped due to high rate: 0
Packets allowed: 0
Packets dropped due to high pps: 0 Destination session limit 0

Release Information

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

show services service-sets statistics integrity-drops

IN THIS SECTION

Syntax | 1157

Description | 1157

Options | 1157

Required Privilege Level | 1157

Output Fields | 1157

Sample Output | 1161

Release Information | 1162


1157

Syntax

show services service-sets statistics integrity-drops


<interface interface-name>
<service-set service-set-name>

Description

Display integrity-drops statistics for one adaptive services interface, for all adaptive services interfaces,
or for one service-set. You can configure use the output of this command to verify the packet header for
anomalies in IP, TCP, UDP, and IGMP information and to examine any anomalies and errors.

Options

none Display integrity-drops statistics for all configured adaptive service


interfaces/ service-set.

service-set service-set- (Optional) Display integrity-drops statistics for the specified service-set
name
interface interface-name (Optional) Display integrity-drops statistics for the specified adaptive
services interface.

Required Privilege Level

view

Output Fields

Table 90 on page 1157 lists the output fields for the show services service-sets integrity-drops
command. Output fields are listed in the approximate order in which they appear.

Table 90: show services service-sets integrity-drops Output Fields

Field Name Field Description

Interface Name of an adaptive services interface.


1158

Table 90: show services service-sets integrity-drops Output Fields (Continued)

Field Name Field Description

Service set Name of a service set.

Errors Total errors, categorized by protocol:

• IP—Total IP version 4 errors.

• TCP—Total Transmission Control Protocol (TCP) errors.

• UDP—Total User Datagram Protocol (UDP) errors.

• ICMP—Total Internet Control Message Protocol (ICMP) errors.


1159

Table 90: show services service-sets integrity-drops Output Fields (Continued)

Field Name Field Description

IP Errors IPv4 errors:

• IP packet length inconsistencies—IP packet length does not match


the Layer 2 reported length.

• Minimum IP header length check failures—Minimum IP header


length is 20 bytes. The received packet contains less than 20 bytes.

• Reassembled packet exceeds maximum IP length—After fragment


reassembly, the reassembled IP packet length exceeds 65,535.

• Illegal source address 0—Source address is not a valid address.


Invalid addresses are, loopback, broadcast, multicast, and reserved
addresses. Source address 0, however, is allowed to support
BOOTP and the destination address 0xffffffff.

• Illegal destination address —Destination address is not a valid


address. The address is reserved.

• TTL zero errors—Received packet had a time-to-live (TTL) value of


0.

• Illegal IP protocol number 0 or 255—IP protocol is 0 or 255.

• Land attack—IP source address is the same as the destination


address.

• Non-IP packets—Packet did not conform to the IP standard.

• IP option—Packet dropped because of a nonallowed IP option.

• Non-IPv4 packets—Packet was not of the IPv4 type.

• Non-IPv6 packets—Packet was not of the IPv6 type.

• Bad checksum—Packet had an invalid IP checksum.

• Illegal IP fragment length—Illegal fragment length. All fragments


(other than the last fragment) must have a length that is a multiple
of 8 bytes.
1160

Table 90: show services service-sets integrity-drops Output Fields (Continued)

Field Name Field Description

• IP fragment overlap—Fragments have overlapping fragment


offsets.

• IP fragment limit exceeded: —Fragments dropped because the


configured number of allowed fragments for a packet was
exceeded.

• IP fragment reassembly timeout—Some of the fragments for an IP


packet were not received in time, and the reassembly handler
dropped partial fragments. Whenever a fragment is received, it is
maintained in a chain until all other fragments are received. If other
fragments do not arrive within the configured value of reassembly-
timeout, this packet is dropped and the value of the counter shown
in this field is incremented. If other fragments arrive in time but the
total number of fragments is more than the configured value of
fragment-limit, all the fragments (of this packet) are dropped and
the value of the counter shown in this field is incremented.

• Unknown: —Unknown fragments.

TCP Errors TCP protocol errors:

• TCP header length inconsistencies—Minimum TCP header length is


20 bytes, and the IP packet received does not contain at least 20
bytes.

• Source or destination port number is zero—TCP source or


destination port is zero.

• Illegal sequence number, flags combination—Dropped because of


TCP errors, such as an illegal sequence number, which causes an
illogical combination of flags to be set.
1161

Table 90: show services service-sets integrity-drops Output Fields (Continued)

Field Name Field Description

UDP Errors UDP protocol errors:

• IP data length less than minimum UDP header length (8 bytes)—


Minimum UDP header length is 8 bytes. The received IP packets
contain less than 8 bytes.

• Source or destination port is zero—UDP source or destination port


is 0.

ICMP Errors ICMP protocol errors:

• IP data length less than minimum ICMP header length (8 bytes)—


ICMP header length is 8 bytes. This counter is incremented when
received IP packets contain less than 8 bytes.

• ICMP error length inconsistencies—Minimum length of an ICMP


error packet is 48 bytes, and the maximum length is 576 bytes. This
counter is incremented when the received ICMP error falls outside
this range.

Sample Output

show services service-sets statistics integrity-drops

user@host> show services service-sets statistics integrity-drops


Interface: ms-1/0/0
Service set: sset1
Errors:
IP: 0, TCP: 0
UDP: 0, ICMP: 0
IP errors:
IP packet length inconsistencies: 0
Illegal source address: 0
Illegal destination address: 0
TTL zero errors: 0, Illegal IP protocol number (0 or 255): 0
Land attack: 0
1162

Non-IPv4 packets: 0
Non-IPv6 packets: 0
Bad checksum: 0
Illegal IP fragment length: 0
IP fragment overlap: 0
IP fragment limit exceeded: 0
IP fragment reassembly timeout: 0
Unknown: 0
TCP errors:
TCP header length inconsistencies: 0
Source or destination port number is zero: 0
Illegal sequence number and flags combinations: 0
UDP errors:
IP data length less than minimum UDP header length (8 bytes): 0
Source or destination port number is zero: 0
ICMP errors:
IP data length less than minimum ICMP header length (8 bytes): 0
ICMP error length inconsistencies: 0

Release Information

Command introduced in Junos OS Release 13.1

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

clear services service-sets statistics integrity-drops

show services service-sets statistics packet-drops

IN THIS SECTION

Syntax | 1163

Description | 1163
1163

Options | 1163

Required Privilege Level | 1163

Output Fields | 1163

Sample Output | 1164

Release Information | 1164

Syntax

show services service-sets statistics packet-drops


<interface interface-name>

Description

Display the number of dropped packets for service sets exceeding CPU limits or memory limits.

Options

none Display the number of dropped service sets packets for all adaptive services
interfaces.

interface (Optional) Display the number of dropped service sets packets for a particular
interface-name interface. On M Series and T Series routers, interface-name can be ms-fpc/pic/port,
sp-fpc/pic/port, or rspnumber.

Required Privilege Level

view

Output Fields

Table 91 on page 1164 lists the output fields for the show services service-sets packet-drops command.
Output fields are listed in the approximate order in which they appear.
1164

Table 91: show services service-sets packet-drops Output Fields

Field Name Field Description

Interface Name of an adaptive services interface.

Service set Name of a service set.

CPU limit Drops Number of packets dropped because the service set exceeded the
average CPU limit.

Memory limit Drops Number of packets dropped because the service set exceeded the
memory limit.

Flow limit Drops Number of packets dropped because the service set exceeded the
flow limit.

Sample Output

show services service-sets statistics packet-drops

user@host> show services service-sets statistics packet-drops


Interface: vms-1/0/0
Service set: ss1
CPU limit drops: 0
Memory limit drops: 0
Flow limit drops: 0

Release Information

Command introduced in Junos OS Release 7.4.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
1165

RELATED DOCUMENTATION

clear services flow-collector statistics

show services service-sets statistics syslog

IN THIS SECTION

Syntax | 1165

Description | 1165

Options | 1165

Required Privilege Level | 1166

Output Fields | 1166

Sample Output | 1171

Sample Output | 1172

For Next Gen Services MX-SPC3 Services Card | 1173

Release Information | 1174

Syntax

show services service-sets statistics syslog


<interface interface-name>
<service-set service-set-name>
<brief | detail>

Description

Display the system log statistics with optional filtering by interface and service set name.

Options

none Display the system log statistics for all services interfaces and all service sets.
1166

brief (Default) (Optional) Display abbreviated system log statistics.

detail (Optional) Display detailed system log statistics.

interface interface- (Optional) Display the system log statistics for a specific adaptive service
name interface. On M Series and T Series routers, interface-name can be ms-fpc/pic/
port, sp-fpc/pic/port, or rspnumber.

service-set service- (Optional) Display the system log statistics for a specific named service-set.
set-name

Required Privilege Level

view

Output Fields

Table 92 on page 1166 lists the output fields for the show services service-sets statistics syslog
command. Output fields are listed in the approximate order in which they appear.

Table 92: show services service-sets statistics syslog Output Fields

Field Name Field Description Level

Interface Name of a services interface. all

Rate limit Maximum number of messages per second written to all


the interface’s system log.

Sent Number of messages sent that are not associated with all
a service set.

Dropped Number of messages dropped that are not associated all


with a service set.

Service-set

Service-set Name of a service set. all


1167

Table 92: show services service-sets statistics syslog Output Fields (Continued)

Field Name Field Description Level

Sent Number of sent messages that are associated with the all
service set.

Dropped Number of dropped messages that are associated with all


the service set.

Session open logs The following information is displayed for system log detail
messages for session open events that are logged and
are associated with the service set:

• Sent—Number of messages sent.

• Dropped—Number of messages dropped. Counts


are given for these drop reasons:

• low priority—Priority of the message was too


low for the message to be sent.

• no class set—Specific classes of event messages


were configured and this class was not selected.

• above rate limit—Maximum number of system


log messages per second was exceeded.
1168

Table 92: show services service-sets statistics syslog Output Fields (Continued)

Field Name Field Description Level

Session close logs The following information is displayed for system log detail
messages for session close events that are logged and
are associated with the service set:

• Sent—Number of messages sent.

• Dropped—Number of messages dropped. Counts


are given for these drop reasons:

• low priority—Priority of the message was too


low for the message to be sent.

• no class set—Specific classes of event messages


were configured and this class was not selected.

• above rate limit—Maximum number of system


log messages per second was exceeded.

Packet logs The following information is displayed for system log detail
messages for packet events that are logged and are
associated with the service set:

• Sent—Number of messages sent.

• Dropped—Number of messages dropped. Counts


are given for these drop reasons:

• low priority—Priority of the message was too


low for the message to be sent.

• no class set—Specific classes of event messages


were configured and this class was not selected.

• above rate limit—Maximum number of system


log messages per second was exceeded.
1169

Table 92: show services service-sets statistics syslog Output Fields (Continued)

Field Name Field Description Level

Stateful firewall logs The following information is displayed for system log detail
messages for stateful firewall events that are logged
and are associated with the service set:

• Sent—Number of messages sent.

• Dropped—Number of messages dropped. Counts


are given for these drop reasons:

• low priority—Priority of the message was too


low for the message to be sent.

• no class set—Specific classes of event messages


were configured and this class was not selected.

• above rate limit—Maximum number of system


log messages per second was exceeded.

ALG logs The following information is displayed for system log detail
messages for ALG events that are logged and are
associated with the service set:

• Sent—Number of messages sent.

• Dropped—Number of messages dropped. Counts


are given for these drop reasons:

• low priority—Priority of the message was too


low for the message to be sent.

• no class set—Specific classes of event messages


were configured and this class was not selected.

• above rate limit—Maximum number of system


log messages per second was exceeded.
1170

Table 92: show services service-sets statistics syslog Output Fields (Continued)

Field Name Field Description Level

NAT logs The following information is displayed for system log detail
messages for NAT events that are logged and are
associated with the service set:

• Sent—Number of messages sent.

• Dropped—Number of messages dropped. Counts


are given for these drop reasons:

• low priority—Priority of the message was too


low for the message to be sent.

• no class set—Specific classes of event messages


were configured and this class was not selected.

• above rate limit—Maximum number of system


log messages per second was exceeded.

IDS logs The following information is displayed for system log detail
messages for IDS events that are logged and are
associated with the service set:

• Sent—Number of messages sent.

• Dropped—Number of messages dropped. Counts


are given for these drop reasons:

• low priority—Priority of the message was too


low for the message to be sent.

• no class set—Specific classes of event messages


were configured and this class was not selected.

• above rate limit—Maximum number of system


log messages per second was exceeded.
1171

Table 92: show services service-sets statistics syslog Output Fields (Continued)

Field Name Field Description Level

Other logs The following information is displayed for system log detail
messages for other types of events that are logged and
are associated with the service set:

• Sent—Number of messages sent.

• Dropped—Number of messages dropped. Counts


are given for these drop reasons:

• low priority—Priority of the message was too


low for the message to be sent.

• no class set—Specific classes of event messages


were configured and this class was not selected.

• above rate limit—Maximum number of system


log messages per second was exceeded.

Sample Output

show services service-sets statistics syslog brief

user@host> show services service-sets statistics syslog brief


Interface: sp-1/1/0
Rate limit: 200000
Sent: 0
Dropped: 0
Service-set: sset-sfw-sp1
Sent: 20
Dropped: 3488
Service-set: sset-nat-sp1
Sent: 18
Dropped: 91
Interface: sp-1/2/0
Rate limit: 15000
Sent: 0
Dropped: 0
1172

Service-set: sset-sfw-sp2
Sent: 210
Dropped: 579

Sample Output

show services service-sets statistics syslog detail

user@host> show services service-sets statistics syslog detail

Interface: ms-2/1/0
Rate limit: 0
Sent: 0
Dropped: 0
Service-set: sset1
Sent: 0
Dropped: 0
Session open logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)
Session close logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)
Packet logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)
Stateful firewall logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)
ALG logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)
NAT logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)
1173

IDS logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)
PCP MAP logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)
PCP protocol logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)
PCP protocol error logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)
PCP debug logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)
Other logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)

For Next Gen Services MX-SPC3 Services Card

Following shows the output for the show services service-sets statistics syslog on the MX-SPC3
services cards vms-x/y/z interfaces.

command-name

user@host> show services service-sets statistics syslog


show services service-sets statistics syslog
Log Module Statistics
Interface-Name- vms-2/0/0
Service-set Name- Sset1
Name Generated Discarded
--------------------------------------------
UTM 0 0
FW_AUTH 0 0
1174

SCREEN 0 0
ALG 0 0
NAT 0 0
FLOW 0 0
SCTP 0 0
GTP 0 0
IPSEC 0 0
IDP 0 0
RTLOG 0 0
PST_DS_LITE 0 0
APPQOS 0 0
SECINTEL 0 0
AAMW 0 0
OTHERS 0 0

Log stream Statistics


Interface-Name- vms-2/0/0
Service-set Name- Sset1
Name send Fail
--------------------------------------------
database 0 0

Release Information

Command introduced in Junos OS Release 11.1.

Support for this command introduced in Junos OS Release 19.3R2 for Next Gen Services with the MX-
SPC3 services card on MX240, MX480 and MX960 routers.

RELATED DOCUMENTATION

clear services service-sets statistics syslog


1175

show services service-sets statistics tcp

IN THIS SECTION

Syntax | 1175

Description | 1175

Options | 1175

Required Privilege Level | 1175

Output Fields | 1175

Sample Output | 1176

Release Information | 1176

Syntax

show services service-sets statistics tcp


<interface interface-name>
<service-set service-set-name>

Description

Display TCP-related statistics.

Options

interface interface-name Name of adaptive services interface.

service-set service-set-name Name of service set.

Required Privilege Level

view

Output Fields
1176

Sample Output

show services service-sets statistics tcp

user@host> show services service-sets statistics tcp


Interface:vms-0/2/0
Service set: ss1_interface_style1
TCP open/close statistics:
TCP first packet non-syn: 1
TCP first packet reset: 0
TCP first packet FIN: 0
TCP non syn discard: 0
TCP extension alloc fail: 0
TFO SYN with cookie request: 0
TFO SYN with cookie: 0
TFO SYN ACK with cookie: 0
TFO packets forwarded: 0
TFO packets dropped: 0
TFO packets stripped: 0
TCP invalid syn ack: 0
TCP invalid ack window check: 0
TCP invalid syn transmit: 0
TCP invalid reset in listen: 0
TCP invalid reset in syn received: 0
TCP invalid reset in syn sent: 0
TCP invalid flags handshake: 0
TCP MSS statistics:
TCP SYN MSS Received: 0
TCP SYN MSS Modified: 0

Release Information

Command introduced in Junos OS Release 17.2.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

Configuring TFO
1177

show services service-sets summary

IN THIS SECTION

Syntax | 1177

Description | 1177

Options | 1177

Required Privilege Level | 1177

Output Fields | 1178

Sample Output | 1178

Release Information | 1179

Syntax

show services service-sets summary


<interface interface-name>

Description

Display service set summary information.

Options

none Display service set summary information for all adaptive services interfaces.

interface interface- (Optional) Display service set summary information for a particular interface.
name On M Series and T Series routers, interface-name can be ms-fpc/pic/port, sp-
fpc/pic/port, or rspnumber.

On MX Series MX240, MX480, and MX960 routers, interface-name can be


vms-fpc/pic/port for the MX-SPC3 services card for Next Gen Services.

Required Privilege Level

view
1178

Output Fields

Table 93 on page 1178 lists the output fields for the show services service-sets summary command.
Output fields are listed in the approximate order in which they appear.

Table 93: show services service-sets summary Output Fields

Field Name Field Description

Interface Name of an adaptive services interface

Service type Type of adaptive service, such as stateful firewall (SFW), Network
Address Translation (NAT), intrusion detection service (IDS), Layer 2
Tunneling Protocol (L2TP), Compressed Real-Time Transport Protocol
(CRTP), or IP Security (IPsec)

Service sets configured Total number of service sets configured on the PIC that use internal
service set IDs and do not consume external service sets, including
CRTP and L2TP

Bytes used Bytes used by a particular service or all services

Policy bytes used Policy bytes used by a particular service or all services

CPU utilization Percentage of the CPU resources being used

Sample Output

show services service-sets summary

user@host> show services service-sets summary


Service
sets CPU
Interface configured Bytes used Session bytes used
Policy bytes used utilization
1179

vms-3/0/0 1 3453621040 (24.93%) 0 ( 0.00%)


8161168 ( 0.90%) 0.14 %

show services service-sets summary interface

user@host> show services service-sets summary interface sp-1/3/0


Interface: sp-1/3/0
Service sets CPU
Service type configured Bytes used utilization
SFW/NAT/IDS 1 54 ( 0.00 %) N/A
L2TP 1 58 ( 0.00 %) N/A
CRTP 1 58 ( 0.00 %) N/A
System 0 920831 ( 0.44 %) N/A
Idle 0 0 ( 0.00 %) N/A
Total 3 921001 ( 0.44 %) N/A

Release Information

Command introduced before Junos OS Release 7.4.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

show services sessions (Next Gen Services)

IN THIS SECTION

Syntax | 1180

Description | 1180

Options | 1180

Required Privilege Level | 1183

Output Fields | 1183

Sample Output | 1184

Release Information | 1194


1180

Syntax

show services sessions


<brief | extensive | terse>
<application-protocol protocol>
<count>
<destination-port destination-port>
<destination-prefix destination-prefix>
<interface interface-name>
<limit number>
<protocol protocol>
<service-set service-set>
<source-port source-port>
<source-prefix source-prefix>
<utilization>

Description

Display session information.

NOTE: On MX Series routers (with interchassis redundancy configured), the idle timeout for
every flow is displayed in the show services session extensive and show services flows
extensive commands.

Options

none Display standard information about all sessions.

brief | extensive | (Optional) Display the specified level of output.


terse
application- (Optional) Display information about one of the following application protocols:
protocol protocol
• bootp—Bootstrap protocols

• dce-rpc—Distributed Computing Environment-Remote Procedure Call


protocols

• dce-rpc-portmap—Distributed Computing Environment-Remote Procedure


Call protocols portmap service
1181

• dns—Domain Name System protocol

• exec—Remote Execution Protocol

• ftp—File Transfer Protocol

• h323—H.323

• icmp—ICMP

• icmpv6—ICMPv6

• iiop—Internet Inter-ORB Protocol

• ike-esp-nat—IKE ALG

• ip—IP

• login—LOGIN

• netbios—NETBIOS

• netshow—NETSHOW

• pptp—Point-to-Point Tunneling Protocol

• realaudio—RealAudio

• rpc—Remote Procedure Call protocol

• rpc-portmap—Remote Procedure Call protocol portmap service

• rtsp—Real-Time Streaming Protocol

• rsh—Remote Shell

• sip—Session Initiation Protocol

• shell—Shell

• snmp—SNMP

• sql—SQLNet

• talk—Talk Program

• tftp—Trivial File Transfer Protocol

• traceroute—Traceroute
1182

• winframe—WinFrame

NOTE: You can use the none option with the show services sessions
count application-protocol command to display information about
sessions other than ALG sessions.

count (Optional) Display a count of the matching entries.

destination-port (Optional) Display information for the specified destination port. The range of
destination-port values is from 0 to 65,535.

destination-prefix (Optional) Display information for the specified destination prefix.


destination-prefix
interface interface- (Optional) Display information about the specified services interface.
name
limit number (Optional) Maximum number of entries to display.

protocol protocol (Optional) Display information about one of the following IP types:

• number—Numeric protocol value from 0 to 255

• ah—IPsec Authentication Header protocol

• egp—An exterior gateway protocol

• esp—IPsec Encapsulating Security Payload protocol

• gre—A generic routing encapsulation protocol

• icmp—Internet Control Message Protocol

• icmp6—Internet Control Message Protocol version 6

• igmp—Internet Group Management Protocol

• ipip—IP-within-IP Encapsulation Protocol

• ospf—Open Shortest Path First protocol

• pim—Protocol Independent Multicast protocol

• rsvp—Resource Reservation Protocol

• sctp—Stream Control Transmission Protocol


1183

• tcp—Transmission Control Protocol

• udp—User Datagram Protocol

service-set service- (Optional) Display information for the specified service set.
set
source-port source- (Optional) Display information for the specified source port. The range of values is
port from 0 to 65,535.

source-prefix (Optional) Display information for the specified source prefix.


source-prefix
utilization (Optional) Display statistical details about session utilization.

Required Privilege Level

view

Output Fields

Table 94 on page 1183 lists the output fields for the show services sessions command. Output fields are
listed in the approximate order in which they appear.

Table 94: show services sessions Output Fields

Field Name Field Description Level of Output

Interface Name of the services interface. application-protocol

Session Session ID that uniquely identifies the session. All levels

ALG Name of the application. terse


1184

Table 94: show services sessions Output Fields (Continued)

Field Name Field Description Level of Output

Flags Session flag for the ALG: All levels

• 0x1—Found an existing session.

• 0x2—Reached session or flow limit.

• 0x3—No memory available for new sessions.

• 0x4—No free session ID available.

• 0x0000—No session ID found.

IP Action Flag indicating whether IP action has been set for the All levels
session.

Offload Flag indicating whether the session has been offloaded to All levels
the Packet Forwarding Engine.

Asymmetric Flag indicating whether the session is uni-directional. terse

application-protocol

Service set Name of a service set. Individual empty service sets are not count
displayed.

Sessions Count Number of sessions. count

Sample Output

show services sessions

user@host> show services sessions


Session ID: 536870913, Service-set: vms-sset10, Policy name: default-service-set-
policy/32779, Timeout: 26, Valid
Logical system: root-logical-system
1185

In: DSLITE 2002:2010::1401:4/1 --> 2002:2010::1401:1/1;ipip, Conn Tag: 0x0,


If: vms-2/0/0.16391, Pkts: 1, Bytes: 110,
Out: DSLITE 2002:2010::1401:1/1 --> 2002:2010::1401:4/1;ipip, Conn Tag: 0x0,
If: vms-2/0/0.0, Pkts: 0, Bytes: 0,

Session ID: 536870914, Service-set: vms-sset10, Policy name: default-service-set-


policy/32779, Timeout: 26, Valid
Logical system: root-logical-system
Softwire 2002:2010::1401:4 -> 2002:2010::1401:1
In: 30.1.0.101/1024 --> 30.2.0.101/1024;udp, Conn Tag: 0x0, If:
vms-2/0/0.16391, Pkts: 1, Bytes: 70,
Out: 30.2.0.101/1024 --> 50.0.12.1/1024;udp, Conn Tag: 0x0, If: vms-2/0/0.0,
Pkts: 0, Bytes: 0,
Total sessions: 2

show services sessions brief

The output for the show services flows brief command is identical to that for the show services
sessions command. For sample output, see "show services sessions" on page 1184.

show services sessions extensive

user@host> show services sessions extensive


Session ID: 536870917, Service-set: vms-sset10, Status: Normal
Flags: 0x40/0x0/0x4000/0x2000103
Policy name: default-service-set-policy/32779
Source NAT pool: Null, Destination NAT pool: Null
Dynamic application: junos:UNKNOWN,
Encryption: Unknown
Application traffic control rule-set: INVALID, Rule: INVALID
Maximum timeout: 30, Current timeout: 28
Session State: Valid
Logical system: root-logical-system
Start time: 1878, Duration: 2
In: DSLITE 2002:2010::1401:4/1 --> 2002:2010::1401:1/1;ipip,
Conn Tag: 0x0, Interface: vms-2/0/0.16391,
Session token: 0xfcc, Flag: 0x400023
Route: 0x0, Gateway: 2002:2010::1401:4, Tunnel ID: 0, Tunnel type: None
Port sequence: 0, FIN sequence: 0,
FIN state: 0,
1186

Pkts: 1, Bytes: 110


Out: DSLITE 2002:2010::1401:1/1 --> 2002:2010::1401:4/1;ipip,
Conn Tag: 0x0, Interface: vms-2/0/0.0,
Session token: 0x4fcc, Flag: 0x400022
Route: 0x0, Gateway: 2002:2010::1401:1, Tunnel ID: 0, Tunnel type: None
Port sequence: 0, FIN sequence: 0,
FIN state: 0,
Pkts: 0, Bytes: 0
Total sessions: 1

show services sessions terse

user@router> show services sessions terse


vms-1/1/0
Session: 1, ALG: ftp, Flags: 0x2000, IP Action: no, Offload: no, Asymmetric: no
TCP 10.2.2.2:52138 -> 10.1.1.2:21 Forward I 33
TCP 10.1.1.2:21 -> 10.2.2.2:52138 Forward O 31

show services sessions analysis

user@router>show services sessions analysis


vms-1/0/0
Interface: vms-1/0/0

Session Analysis Statistics:

Total sessions Active :0


Total TCP Sessions Active :0
Tcp sessions from gate :0
Tunneled TCP sessions :0
Regular TCP sessions :0
IPv4 active Session :0
IPv6 active Session :0
Total UDP sessions Active :0
UDP sessions from gate :0
Tunneled UDP sessions :0
Regular UDP sessions :0
IPv4 active Session :0
IPv6 active Session :0
1187

Total Other sessions Active :0


IPv4 active Session :0
IPv6 active Session :0
Created sessions per Second :0
Deleted sessions per Second :0
Peak Total sessions Active :0
Peak Total TCP sessions Active :0
Peak Total UDP sessions Active :0
Peak Total Other sessions Active :0
Peak Created Sessions per Second :0
Peak Deleted Sessions per Second :0
Packets received :0
Packets transmitted :0
Slow path forward :0
Slow path discard :0

Session Rate Data:


Number of Samples: 638051

Session Rate Distribution(sec)

Session Operation :Creation

400000+ :0
350001 - 400000 :0
300001 - 350000 :0
250001 - 300000 :0
200001 - 250000 :0
150001 - 200000 :0
50001 - 150000 :0
40001 - 50000 :0
30001 - 40000 :0
20001 - 30000 :0
10001 - 20000 :0
1001 - 10000 :0
1 - 1000 :0
0 :638051

Session Operation :Deletion

400000+ :0
350001 - 400000 :0
1188

300001 - 350000 :0
250001 - 300000 :0
200001 - 250000 :0
150001 - 200000 :0
50001 - 150000 :0
40001 - 50000 :0
30001 - 40000 :0
20001 - 30000 :0
10001 - 20000 :0
1001 - 10000 :0
1 - 1000 :0
0 :638051

Session Lifetime Distribution(sec):

TCP UDP HTTP


240+ :0 0 0
120 - 240 :0 0 0
60 - 120 :0 0 0
30 - 60 :0 0 0
15 - 30 :0 0 0
5 - 15 :0 0 0
1 - 5 :0 0 0
0 - 1 :0 0 0

show services sessions application-protocol

This command has the same output for the rpc, dce-rpc, rpc-portmap and dce-rpc-portmap ALGs.

user@router> show services sessions application-protocol dce-rpc


Interface name: vms-1/1/0
Session: 8, ALG: portmapper, Flags: 0x1800, IP Action: no, Offload: no
UDP 192.168.203.198:1019 ->192.168.203.194:2049 Forward I 4
UDP 192.168.203.194:2049 ->192.168.203.198:1019 Forward O 4
Session: 7, ALG: portmapper, Flags: 0x1800, IP Action: no, Offload: no
UDP 192.168.203.198:954 ->192.168.203.194:613 Forward I 1
UDP 192.168.203.194:613 ->192.168.203.198:954 Forward O 1
Session: 6, ALG: portmapper, Flags: 0x1800, IP Action: no, Offload: no
UDP 192.168.203.198:53836 ->192.168.203.194:613 Forward I 1
UDP 192.168.203.194:613 ->192.168.203.198:53836 Forward O 1
1189

Session: 5, ALG: portmapper, Flags: 0x1000, IP Action: no, Offload: no


UDP 192.168.203.198:59813 ->192.168.203.194:111 Forward I 1
UDP 192.168.203.194:111 ->192.168.203.198:59813 Forward O 1
Session: 4, ALG: portmapper, Flags: 0x1800, IP Action: no, Offload: no
UDP 192.168.203.198:36595 ->192.168.203.194:2049 Forward I 1
UDP 192.168.203.194:2049 ->192.168.203.198:36595 Forward O 1
Session: 3, ALG: portmapper, Flags: 0x1000, IP Action: no, Offload: no
UDP 192.168.203.198:56050 ->192.168.203.194:111 Forward I 1
UDP 192.168.203.194:111 ->192.168.203.198:56050 Forward O 1

user@router> show services sessions application-protocol dns


Interface name: vms-2/0/0
Session: 293, ALG: 16, Flags: 0x0040, IP Action: no, Offload: no
UDP 198.51.100.2:43677 -> 203.0.113.10:53 Forward I 1
UDP 203.0.113.10:53 -> 192.0.2.1:43677 Forward O 1
Session: 53, ALG: 16, Flags: 0x0040, IP Action: no, Offload: no
UDP 198.51.100.2:37494 -> 203.0.113.10:53 Forward I 1
UDP 203.0.113.10:53 -> 192.0.2.1:37494 Forward O 1
Session: 66, ALG: 16, Flags: 0x0040, IP Action: no, Offload: no
UDP 198.51.100.2:48161 -> 203.0.113.10:53 Forward I 1
UDP 203.0.113.10:53 -> 192.0.2.1:48161 Forward O 1
Session: 17, ALG: 16, Flags: 0x0040, IP Action: no, Offload: no
UDP 198.51.100.2:38908 -> 203.0.113.10:53 Forward I 1
UDP 203.0.113.10:53 -> 192.0.2.1:38908 Forward O 1
Session: 42, ALG: 16, Flags: 0x0040, IP Action: no, Offload: no
UDP 198.51.100.2:58189 -> 203.0.113.10:53 Forward I 1
UDP 203.0.113.10:53 -> 192.0.2.1:58189 Forward O 1
user@router> show services sessions application-protocol ftp
Interface name: vms-4/1/0
Session: 1, ALG: 1, Flags: 0x0040, IP Action: no, Offload: no
TCP 192.0.2.129:32843 -> 198.51.100.129:21 Forward I
26
TCP 198.51.100.129:21 -> 192.0.2.0:32843 Forward O
30
user@router> show services sessions application-protocol ike-esp-nat
Service Set: ss_ipv4, Session: 33554435, ALG: ike-esp-nat, Flags: 0x0800, IP
Action: no, Offload: no, Asymmetric: no
ESP 198.51.100.2:4689 -> 203.0.113.1:62108 Forward O 2199
ESP 192.0.2.2:62108 -> 198.51.100.2:4689 Forward I 0
Service Set: ss_ipv4, Session: 33554434, ALG: ike-esp-nat, Flags: 0x0800, IP
Action: no, Offload: no, Asymmetric: no
ESP 192.0.2.2:44179 -> 198.51.100.2:43809 Forward I 2199
ESP 198.51.100.2:43809 -> 203.0.113.1:44179 Forward O 0
1190

Service Set: ss_ipv4, Session: 33554433, ALG: ike-esp-nat, Flags: 0x0000, IP


Action: no, Offload: no, Asymmetric: no
UDP 192.0.2.2:500 -> 198.51.100.2:500 Forward I 8
UDP 198.51.100.2:500 -> 203.0.113.1:57730 Forward O
user@router> show services sessions application-protocol pptp
Interface name: vms-2/0/0
Session: 3, ALG: pptp, Flags: 0x2800, IP Action: no, Offload: no, Asymmetric: no
GRE 203.0.113.138:0 -> 203.0.113.138:0 Forward O
21
GRE 192.0.2.794:0 -> 203.0.113.138:0:65000 Forward
I 0
Session: 2, ALG: pptp, Flags: 0x2800, IP Action: no, Offload: no, Asymmetric: no
GRE 192.0.2.794:0 -> 203.0.113.138:0:49913 Forward I
88
GRE 203.0.113.138:0:49913 -> 192.0.2.794:65001 Forward
O 0
Session: 1, ALG: pptp, Flags: 0x2000, IP Action: no, Offload: no, Asymmetric: no
TCP 192.0.2.794:1511 -> 203.0.113.138:0:1723 Forward I
13
TCP 203.0.113.138:0:1723 -> 192.0.2.794:1511 Forward O
12

user@router> show services sessions application-protocol rtsp


Interface name: vms-0/1/0
Session: 13, ALG: rtsp, Flags: 0x0800, IP Action: no, Offload: no
UDP 203.0.113.66:5004 -> 198.51.100.66:3989 Forward
O 152
UDP 198.51.100.66:3989 -> 192.0.2.161:5004 Forward
I 0
Session: 9, ALG: rtsp, Flags: 0x0800, IP Action: no, Offload: no
UDP 203.0.113.66:5004 -> 198.51.100.66:3986 Forward
O 3
UDP 198.51.100.66:3986 -> 192.0.2.161:5004 Forward
I 0

user@router> show services sessions application-protocol rsh


Interface name: vms-2/0/0
Session: 3, ALG: 2, Flags: 0x0840, IP Action: no, Offload: no
TCP 203.0.113.10:1023 -> 198.51.100.2:1020 Forward O 4
TCP 198.51.100.2:1020 -> 203.0.113.10:1023 Forward I 3
Session: 1, ALG: 2, Flags: 0x0040, IP Action: no, Offload: no
TCP 198.51.100.2:1021 -> 203.0.113.10:514 Forward I 1331
TCP 203.0.113.10:514 -> 198.51.100.2:1021 Forward O 2485
1191

user@router> show services sessions application-protocol sip


Interface name: vms-2/0/0
Session: 4, ALG: sip, Flags: 0x0800, IP Action: no, Offload: no
UDP 198.51.100.130:6000 -> 192.0.2.129:12682 Forward
I 246
UDP 192.0.2.129:12682 -> 198.51.100.162:6000 Forward
O 0
Session: 1, ALG: sip, Flags: 0x0000, IP Action: no, Offload: no
UDP 198.51.100.130:5060 -> 192.0.2.130:5060 Forward
I 10
UDP 192.0.2.130:5060 -> 198.51.100.162:5060 Forward
O 9

user@router> show services sessions application-protocol sql


Interface name: vms-2/0/0
Session: 3934, ALG: sqlnet, Flags: 0x0800, IP Action: no, Offload: no
TCP 198.51.100.2:39754 -> 203.0.113.138:0:1408 Forward I 26
TCP 203.0.113.138:0:1408 -> 192.0.2.1:39754 Forward O 23

user@router> show services sessions application-protocol talk


Interface name: vms-0/2/0
Session: 4, ALG: 65, Flags: 0x0800, IP Action: no, Offload: no
TCP 203.0.113.162:36888 -> 192.0.2.2:33294 Forward
O 4
TCP 192.0.2.1:33294 -> 203.0.113.162:36888 Forward
I 3
Session: 7, ALG: 65, Flags: 0x0800, IP Action: no, Offload: no
UDP 203.0.113.162:1165 -> 192.0.2.2:518 Forward
O 1
UDP 192.0.2.2:518 -> 203.0.113.162:1165 Forward
I 1
Session: 8, ALG: 65, Flags: 0x0000, IP Action: no, Offload: no
UDP 192.0.2.2:1509 -> 203.0.113.162:518 Forward
I 3
UDP 203.0.113.162:518 -> 192.0.2.2:1509 Forward
O 3
Session: 6, ALG: 0, Flags: 0x0000, IP Action: no, Offload: no
UDP 192.0.2.1:123 -> 192.0.2.2:123 Forward
O 4
1192

show services sessions count

user@host> show services sessions count


Interface Service set Valid Invalid Pending Other
state
vms-0/2/0 ss1_interface_style1 1 0
0 0

show services sessions destination-port

user@router> show services sessions destination-port 21


vms-1/1/0
Session: 1, ALG: ftp, Flags: 0x2000, IP Action: no, Offload: no, Asymmetric: no
TCP 10.2.2.2:52138 -> 10.1.1.2:21 Forward I 25
TCP 10.1.1.2:21 -> 10.2.2.2:52138 Forward O 24

show services sessions destination-prefix

user@router> show services sessions destination-prefix 10.1.1.2


vms-1/1/0
Session: 1, ALG: ftp, Flags: 0x2000, IP Action: no, Offload: no, Asymmetric: no
TCP 10.2.2.2:52138 -> 10.1.1.2:21 Forward I 25
TCP 10.1.1.2:21 -> 10.2.2.2:52138 Forward O 24

show services sessions interface

user@router> show services sessions interface vms-1/1/0


vms-1/1/0
Session: 1, ALG: ftp, Flags: 0x2000, IP Action: no, Offload: no, Asymmetric: no
TCP 10.2.2.2:52138 -> 10.1.1.2:21 Forward I 30
TCP 10.1.1.2:21 -> 10.2.2.2:52138 Forward O 29
1193

show services sessions protocol

user@router> show services sessions protocol tcp


vms-1/1/0
Session: 1, ALG: ftp, Flags: 0x2000, IP Action: no, Offload: no, Asymmetric: no
TCP 10.2.2.2:52138 -> 10.1.1.2:21 Forward I 30
TCP 10.1.1.2:21 -> 10.2.2.2:52138 Forward O 29

show services sessions service-set

user@router> show services sessions service-set ss1_interface_style1


Session ID: 3, Service-set: ss1_interface_style1, Policy name: R11/7, Timeout:
30, Valid
In: 20.1.1.2/48102 --> 30.1.1.2/22;tcp, Conn Tag: 0x0, If: vms-0/2/0.16387,
Pkts: 70, Bytes: 6257,
Out: 30.1.1.2/22 --> 44.0.0.3/29071;tcp, Conn Tag: 0x0, If: vms-0/2/0.0, Pkts:
59, Bytes: 8193,
Total sessions: 1

show services sessions source-port

user@router> show services sessions source-port 21


vms-1/1/0
Session: 1, ALG: ftp, Flags: 0x2000, IP Action: no, Offload: no, Asymmetric: no
TCP 10.2.2.2:52138 -> 10.1.1.2:21 Forward I 33
TCP 10.1.1.2:21 -> 10.2.2.2:52138 Forward O 31

show services sessions source-prefix

user@router> show services sessions source-prefix 10.2.2.2


vms-1/1/0
Session: 1, ALG: ftp, Flags: 0x2000, IP Action: no, Offload: no, Asymmetric: no
TCP 10.2.2.2:52138 -> 10.1.1.2:21 Forward I 33
TCP 10.1.1.2:21 -> 10.2.2.2:52138 Forward O 31
1194

Release Information

Command introduced in Junos OS Release 19.3R2 on MX Series for Next Gen Services for CGNAT 6rd
softwires running inline on the MPC card and specifying the si-1/0/0 interface naming
convention.Support added in Junos OS Release 20.2R1 for Next Gen Services CGNAT DS-Lite softwires
on the MX-SPC3 security services card .

show services sessions (Aggregated Multiservices)

IN THIS SECTION

Syntax | 1194

Description | 1195

Options | 1195

Required Privilege Level | 1196

Output Fields | 1196

Sample Output | 1198

Release Information | 1204

Syntax

show services sessions


<brief | extensive | terse>
<application-protocol protocol>
<count>
<destination-port destination-port>
<destination-prefix destination-prefix>
<interface interface-name>
<limit number>
<protocol protocol>
<service-set service-set>
<source-port source-port>
<source-prefix source-prefix>
1195

Description

Display the session information for each service set in each member interface of the AMS interface.

Options

none Display standard information about all sessions.

brief | extensive | (Optional) Display the specified level of output.


terse
application- (Optional) Display information about one of the following application protocols:
protocol
• ftp—File Transfer Protocol

• icmp—Internet Control Message Protocol

• pptp—Point-to-Point Tunneling Protocol

• rtsp—Real-Time Streaming Protocol

• sqlnet—SQL *Net

• tcp—Transmission Control Protocol

• traceroute—Traceroute

• tftp—Trivial File Transfer Protocol

• udp—User Datagram Protocol

count (Optional) Display a count of the matching entries.

destination-port (Optional) Display information for a particular destination port. The range of
destination-port values is from 0 through 65,535.

destination-prefix (Optional) Display information for a particular destination prefix.


destination-prefix
interface interface- (Optional) Display information about a particular interface. On M Series and T
name Series routers, interface-name can be ms-fpc/pic/port or rspnumber. On J Series
routers, interface-name is ms-pim/0/port.

limit number (Optional) Maximum number of entries to display.

protocol protocol (Optional) Display information about one of the following IP types:
1196

• number—Numeric protocol value from 0 through 255

• ah—IPsec Authentication Header protocol

• egp—An exterior gateway protocol

• esp—IPsec Encapsulating Security Payload protocol

• gre—A generic routing encapsulation protocol

• icmp—Internet Control Message Protocol

• icmp6—Internet Control Message Protocol version 6

• igmp—Internet Group Management Protocol

• ipip—IP-over-IP encapsulation protocol

• ospf—Open Shortest Path First protocol

• pim—Protocol Independent Multicast protocol

• rsvp—Resource Reservation Protocol

• sctp—Stream Control Transmission Protocol

• tcp—Transmission Control Protocol

• udp—User Datagram Protocol

service-set service- (Optional) Display information for a particular service set.


set
source-port source- (Optional) Display information for a particular source port. The range of values is
port from 0 through 65,535.

source-prefix (Optional) Display information for a particular source prefix.


source-prefix

Required Privilege Level

view

Output Fields

Table 95 on page 1197 lists the output fields for the show services sessions command. Output fields are
listed in the approximate order in which they appear.
1197

Table 95: show services sessions Output Fields

Field Name Field Description

Interface Name of the member interface (mams-) and the aggregated multiservices interface
(ams) to which it belongs.

Session ID Session ID that uniquely identifies the session.

ALG Name of the application.

Flags Session flag for the ALG:

• 0x1—Found an existing session.

• 0x2—Reached session or flow limit.

• 0x3—No memory available for new sessions.

• 0x4—No free session ID available.

IP Action Flag indicating whether IP action has been set for the session.

Offload Flag indicating whether the session has been offloaded to the Packet Forwarding
Engine.

Asymmetric Flag indicating whether the session is unidirectional.

Service set Name of a service set. Individual empty service sets are not displayed.

Sessions Count Number of sessions.

Flow or Flow Protocol used for this session.


Prot

Source Source prefix of the flow in the format source-prefix:port. For ICMP flows, port
information is not displayed.
1198

Table 95: show services sessions Output Fields (Continued)

Field Name Field Description

Dest Destination prefix of the flow. For ICMP flows, port information is not displayed.

State Status of the flow:

• Drop—Drop all packets in the flow without response.

• Forward—Forward the packet in the flow without looking at it.

• Reject—Drop all packets in the flow with response.

• Watch—Inspect packets in the flow.

• Bypass—Bypass packets in the flow.

• Unknown—Unknown flow status.

Packet Direction of the flow: ingress (I), egress (O), or unknown.


Direction

Frm count Number of frames in the flow.

Sample Output

show services sessions brief

user@host> show services sessions brief


mams-1/0/0 (ams0)
Service Set: napt_set, Session: 16777217, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
UDP 30.30.30.2:63 -> 40.40.40.2:63 Forward I 85689
UDP 40.40.40.2:63 -> 30.30.30.160:6000 Forward O 0
1199

show services sessions interface mams-5/0/0 extensive

user@host> show services sessions interface mams-5/0/0 extensive


mams-1/0/0 (ams0)
Service Set: napt_set, Session: 16777235, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
NAT PLugin Data:
NAT Action: Translation Type - NAPT-44
NAT source 30.30.30.62:63 -> 30.30.30.176:6003
UDP 30.30.30.62:63 -> 40.40.40.62:63 Forward I 1805
Byte count: 83030
Flow role: Initiator, Timeout: 0
UDP 40.40.40.62:63 -> 30.30.30.176:6003 Forward O 0
Byte count: 0
Flow role: Responder, Timeout: 0
Service Set: napt_set, Session: 16777234, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no

NAT PLugin Data:


NAT Action: Translation Type - NAPT-44
NAT source 30.30.30.57:63 -> 30.30.30.163:6003
UDP 30.30.30.57:63 -> 40.40.40.57:63 Forward I 1805
Byte count: 83030
Flow role: Initiator, Timeout: 0
UDP 40.40.40.57:63 -> 30.30.30.163:6003 Forward O 0
Byte count: 0
Flow role: Responder, Timeout: 0

[...output truncated...]
mams-1/1/0 (ams0)
Service Set: napt_set, Session: 16777234, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no

NAT PLugin Data:


NAT Action: Translation Type - NAPT-44
NAT source 30.30.30.63:63 -> 30.30.30.165:6004
UDP 30.30.30.63:63 -> 40.40.40.63:63 Forward I 1805
Byte count: 83030
Flow role: Initiator, Timeout: 0
UDP 40.40.40.63:63 -> 30.30.30.165:6004 Forward O 0
Byte count: 0
Flow role: Responder, Timeout: 0
1200

Service Set: napt_set, Session: 16777233, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no

NAT PLugin Data:


NAT Action: Translation Type - NAPT-44
NAT source 30.30.30.60:63 -> 30.30.30.164:6004
UDP 30.30.30.60:63 -> 40.40.40.60:63 Forward I 1805
Byte count: 83030
Flow role: Initiator, Timeout: 0
UDP 40.40.40.60:63 -> 30.30.30.164:6004 Forward O 0
Byte count: 0
Flow role: Responder, Timeout: 0
Service Set: napt_set, Session: 16777232, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no

[...output truncated...]
mams-5/0/0 (ams0)
Service Set: napt_set, Session: 16777225, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no

NAT PLugin Data:


NAT Action: Translation Type - NAPT-44
NAT source 30.30.30.64:63 -> 30.30.30.168:6002
UDP 30.30.30.64:63 -> 40.40.40.64:63 Forward I 1805
Byte count: 83030
Flow role: Initiator, Timeout: 0
UDP 40.40.40.64:63 -> 30.30.30.168:6002 Forward O 0
Byte count: 0
Flow role: Responder, Timeout: 0
Service Set: napt_set, Session: 16777224, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no

NAT PLugin Data:


NAT Action: Translation Type - NAPT-44
NAT source 30.30.30.56:63 -> 30.30.30.171:6001
UDP 30.30.30.56:63 -> 40.40.40.56:63 Forward I 1805
Byte count: 83030
Flow role: Initiator, Timeout: 0
UDP 40.40.40.56:63 -> 30.30.30.171:6001 Forward O 0
Byte count: 0
Flow role: Responder, Timeout: 0
Service Set: napt_set, Session: 16777223, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
1201

[...output truncated...]
mams-5/1/0 (ams0)
Service Set: napt_set, Session: 16777233, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no

NAT PLugin Data:


NAT Action: Translation Type - NAPT-44
NAT source 30.30.30.61:63 -> 30.30.30.172:6004
UDP 30.30.30.61:63 -> 40.40.40.61:63 Forward I 1805
Byte count: 83030
Flow role: Initiator, Timeout: 0
UDP 40.40.40.61:63 -> 30.30.30.172:6004 Forward O 0
Byte count: 0
Flow role: Responder, Timeout: 0
Service Set: napt_set, Session: 16777232, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no

NAT PLugin Data:


NAT Action: Translation Type - NAPT-44
NAT source 30.30.30.52:63 -> 30.30.30.175:6003
UDP 30.30.30.52:63 -> 40.40.40.52:63 Forward I 1805
Byte count: 83030
Flow role: Initiator, Timeout: 0
UDP 40.40.40.52:63 -> 30.30.30.175:6003 Forward O 0
Byte count: 0
Flow role: Responder, Timeout: 0
Service Set: napt_set, Session: 16777231, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no

[...output truncated...]

show services sessions terse

user@router> show services sessions terse


mams-1/0/0 (ams0)
Service Set: napt_set, Session: 16777235, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
UDP 30.30.30.62:63 -> 40.40.40.62:63 Forward I 2541
UDP 40.40.40.62:63 -> 30.30.30.176:6003 Forward O 0
Service Set: napt_set, Session: 16777234, ALG: none, Flags: 0x2000, IP Action:
1202

no, Offload: no, Asymmetric: no


UDP 30.30.30.57:63 -> 40.40.40.57:63 Forward I 2541
UDP 40.40.40.57:63 -> 30.30.30.163:6003 Forward O 0
Service Set: napt_set, Session: 16777233, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
UDP 30.30.30.50:63 -> 40.40.40.50:63 Forward I 2541
UDP 40.40.40.50:63 -> 30.30.30.162:6003 Forward O 0
Service Set: napt_set, Session: 16777232, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
UDP 30.30.30.48:63 -> 40.40.40.48:63 Forward I 2541
UDP 40.40.40.48:63 -> 30.30.30.161:6003 Forward O 0
[...output truncated...]
mams-1/1/0 (ams0)
Service Set: napt_set, Session: 16777234, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
UDP 30.30.30.63:63 -> 40.40.40.63:63 Forward I 2543
UDP 40.40.40.63:63 -> 30.30.30.165:6004 Forward O 0
Service Set: napt_set, Session: 16777233, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
UDP 30.30.30.60:63 -> 40.40.40.60:63 Forward I 2543
UDP 40.40.40.60:63 -> 30.30.30.164:6004 Forward O 0
Service Set: napt_set, Session: 16777232, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
UDP 30.30.30.59:63 -> 40.40.40.59:63 Forward I 2543
UDP 40.40.40.59:63 -> 30.30.30.167:6003 Forward O 0
Service Set: napt_set, Session: 16777231, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
UDP 30.30.30.58:63 -> 40.40.40.58:63 Forward I 2543
UDP 40.40.40.58:63 -> 30.30.30.166:6003 Forward O 0
[...output truncated...]
mams-5/0/0 (ams0)
Service Set: napt_set, Session: 16777225, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
UDP 30.30.30.64:63 -> 40.40.40.64:63 Forward I 2543
UDP 40.40.40.64:63 -> 30.30.30.168:6002 Forward O 0
Service Set: napt_set, Session: 16777224, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
UDP 30.30.30.56:63 -> 40.40.40.56:63 Forward I 2543
UDP 40.40.40.56:63 -> 30.30.30.171:6001 Forward O 0
Service Set: napt_set, Session: 16777223, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
UDP 30.30.30.55:63 -> 40.40.40.55:63 Forward I 2543
UDP 40.40.40.55:63 -> 30.30.30.170:6001 Forward O 0
1203

Service Set: napt_set, Session: 16777222, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
UDP 30.30.30.51:63 -> 40.40.40.51:63 Forward I 2543
UDP 40.40.40.51:63 -> 30.30.30.169:6001 Forward O 0
[...output truncated...]
mams-5/1/0 (ams0)
Service Set: napt_set, Session: 16777233, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
UDP 30.30.30.61:63 -> 40.40.40.61:63 Forward I 2544
UDP 40.40.40.61:63 -> 30.30.30.172:6004 Forward O 0
Service Set: napt_set, Session: 16777232, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
UDP 30.30.30.52:63 -> 40.40.40.52:63 Forward I 2545
UDP 40.40.40.52:63 -> 30.30.30.175:6003 Forward O 0
Service Set: napt_set, Session: 16777231, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
UDP 30.30.30.47:63 -> 40.40.40.47:63 Forward I 2545
UDP 40.40.40.47:63 -> 30.30.30.174:6003 Forward O 0
Service Set: napt_set, Session: 16777230, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
UDP 30.30.30.46:63 -> 40.40.40.46:63 Forward I 2545
UDP 40.40.40.46:63 -> 30.30.30.173:6003 Forward O 0
[...output truncated...]

show services sessions count

user@host> show services sessions count


Interface Service set Sessions count
mams-1/0/0 napt_set 19
mams-1/0/0 ss1 0
mams-1/1/0 napt_set 18
mams-1/1/0 ss1 0
mams-5/0/0 napt_set 9
mams-5/0/0 ss1 0
mams-5/1/0 napt_set 17
mams-5/1/0 ss1 0
1204

Release Information

Statement introduced in Junos OS Release 16.1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

show services sessions analysis

IN THIS SECTION

Syntax | 1204

Description | 1204

Options | 1204

Required Privilege Level | 1205

Output Fields | 1205

Sample Output | 1207

Release Information | 1209

Syntax

show services sessions analysis


<interface interface-name>

Description

Display session statistics.

Options

none Display standard information about all session statistics.

interface interface-name (Optional) Display information about the specified interface.


1205

Required Privilege Level

view

Output Fields

Table 96 on page 1205 lists the output fields for the show services sessions analysis command. Output
fields are listed in the approximate order in which they appear.

Table 96: show services sessions analysis Output Fields

Field Name Field Description

Services PIC Name FPC and PIC slots for the services PIC on which the sessions are running.

Session Analysis Statistics:

Total Sessions Active Total active sessions in the MS-PIC including TCP, UDP, ICMP and
Softwires.

Total TCP Sessions Total active TCP sessions in the MS-PIC.


Active

Total UDP Sessions Total active UDP session in the MS-PIC.


Active

Total Other Sessions Total other active sessions in the MS-PIC including ICMP and softwires.
Active

Total Predicted Sessions Predicted sessions are created only by the ALG traffic using the L3/L4
Active information available.

Created Sessions per Session setup rate at the time of running the command.
Second
1206

Table 96: show services sessions analysis Output Fields (Continued)

Field Name Field Description

Deleted Sessions per Session deletion rate at the time of running the command.
Second

Peak Total Sessions Highest number of active sessions since the last PIC restart or since the
Active last time session statistics are flushed.

Peak Total TCP Sessions Highest number of active TCP sessions since the last PIC restart or since
Active the last time session stats are flushed.

Peak Total UDP Highest number of active UDP sessions since the last PIC restart or since
Sessions Active the last time session statistics are flushed.

Peak Total Other Highest number of other active sessions since the last PIC restart or since
Sessions Active the last time session statistics are flushed.

Peak Created Sessions Maximum session setup rate observed since the last PIC restart or since
per Second the last time session statistics are flushed.

Peak Deleted Sessions Maximum session deletion rate observed since the last PIC restart or from
per Second the last time session statistics are flushed.

Packets received Total number of packets received by the MS-PIC.

Packets transmitted Total number of packets transmitted by the MS-PIC.

Slow path forward Number of packets forwarded in the slow path (that is, after the successful
rule match and session creation).

Slow path discard Number of packets discarded before the session creation.
1207

Table 96: show services sessions analysis Output Fields (Continued)

Field Name Field Description

Session Rate Data: Number of samples used to calculate the session rate since the last PIC
Number of Samples restart or since the last time session statistics are flushed.

Session Rate Distribution(sec)

Session Number of sampling intervals during which a number of sessions in the


Operation :Creation indicated range were created during the current sampling period.

Session Number of sampling intervals during which a number of sessions in the


Operation :Deletion indicated range were deleted during the current sampling period.

Session Lifetime Number of TCP, UDP, and HTTP sessions whose length was in the
Distribution(sec): indicated range in seconds.

Sample Output

show services sessions analysis interface

user@host> show services sessions analysis interface ms-5/1/0


Services PIC Name: ms-5/1/0

Session Analysis Statistics:

Total sessions Active :0


Total TCP Sessions Active :0
Tcp sessions from gate :0
Tunneled TCP sessions :0
Regular TCP sessions :0
IPv4 active Session :0
IPv6 active Session :0
Total UDP sessions Active :0
UDP sessions from gate :0
Tunneled UDP sessions :0
1208

Regular UDP sessions :0


IPv4 active Session :0
IPv6 active Session :0
Total Other sessions Active :0
IPv4 active Session :0
IPv6 active Session :0
Created sessions per Second :0
Deleted sessions per Second :0
Peak Total sessions Active :0
Peak Total TCP sessions Active :0
Peak Total UDP sessions Active :0
Peak Total Other sessions Active :0
Peak Created Sessions per Second :0
Peak Deleted Sessions per Second :0
Packets received :0
Packets transmitted :0
Slow path forward :0
Slow path discard :0
Session Rate Data:
Number of Samples: 3518

Session Rate Distribution(sec)

Session Operation :Creation

400000+ :0
350001 - 400000 :0
300001 - 350000 :0
250001 - 300000 :0
200001 - 250000 :0
150001 - 200000 :0
50001 - 150000 :0
40001 - 50000 :0
30001 - 40000 :0
20001 - 30000 :0
10001 - 20000 :0
1001 - 10000 :0
1 - 1000 :0
0 :3518

Session Operation :Deletion


1209

400000+ :0
350001 - 400000 :0
300001 - 350000 :0
250001 - 300000 :0
200001 - 250000 :0
150001 - 200000 :0
50001 - 150000 :0
40001 - 50000 :0
30001 - 40000 :0
20001 - 30000 :0
10001 - 20000 :0
1001 - 10000 :0
1 - 1000 :0
0 :3518

Session Lifetime Distribution(sec):

TCP UDP HTTP


240+ :0 0 0
120 - 240 :0 0 0
60 - 120 :0 0 0
30 - 60 :0 0 0
15 - 30 :0 0 0
5 - 15 :0 0 0
1 - 5 :0 0 0
0 - 1 :0 0 0

Release Information

Statement introduced in Junos OS Release 17.1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
1210

show services sessions analysis (USF)

IN THIS SECTION

Syntax | 1210

Description | 1210

Options | 1210

Required Privilege Level | 1210

Output Fields | 1211

Sample Output | 1213

Release Information | 1215

Syntax

show services sessions analysis


<interface interface-name>

Description

Display session statistics.

Options

none Display standard information about all session statistics.

interface interface-name (Optional) Display information about the specified services interface.

Required Privilege Level

view
1211

Output Fields

Table 97 on page 1211 lists the output fields for the show services sessions analysis command. Output
fields are listed in the approximate order in which they appear.

Table 97: show services sessions analysis Output Fields

Field Name Field Description

Services PIC Name FPC and PIC slots for the services PIC on which the sessions are running.

Session Analysis Statistics:

Total Sessions Active Total active sessions in the services PIC, including TCP, UDP, ICMP and
Softwires.

Total TCP Sessions Total active TCP sessions in the services PIC.
Active

Total UDP Sessions Total active UDP session in the services PIC.
Active

Total Other Sessions Total other active sessions in the services PIC, including ICMP and
Active softwires.

Total Predicted Sessions Predicted sessions are created only by the ALG traffic using the L3/L4
Active information available.

Created Sessions per Session setup rate at the time of running the command.
Second

Deleted Sessions per Session deletion rate at the time of running the command.
Second

Peak Total Sessions Highest number of active sessions since the last PIC restart or since the
Active last time session statistics are flushed.
1212

Table 97: show services sessions analysis Output Fields (Continued)

Field Name Field Description

Peak Total TCP Sessions Highest number of active TCP sessions since the last PIC restart or since
Active the last time session stats are flushed.

Peak Total UDP Highest number of active UDP sessions since the last PIC restart or since
Sessions Active the last time session statistics are flushed.

Peak Total Other Highest number of other active sessions since the last PIC restart or since
Sessions Active the last time session statistics are flushed.

Peak Created Sessions Maximum session setup rate observed since the last PIC restart or since
per Second the last time session statistics are flushed.

Peak Deleted Sessions Maximum session deletion rate observed since the last PIC restart or from
per Second the last time session statistics are flushed.

Packets received Total number of packets received by the services PIC.

Packets transmitted Total number of packets transmitted by the services PIC.

Slow path forward Number of packets forwarded in the slow path (that is, after the successful
rule match and session creation).

Slow path discard Number of packets discarded before the session creation.

Session Rate Data: Number of samples used to calculate the session rate since the last PIC
Number of Samples restart or since the last time session statistics are flushed.

Session Rate Distribution(sec)


1213

Table 97: show services sessions analysis Output Fields (Continued)

Field Name Field Description

Session Number of sampling intervals during which a number of sessions in the


Operation :Creation indicated range were created during the current sampling period.

Session Number of sampling intervals during which a number of sessions in the


Operation:Deletion indicated range were deleted during the current sampling period.

Session Lifetime Number of TCP, UDP, and HTTP sessions whose length was in the
Distribution(sec): indicated range in seconds.

Sample Output

show services sessions analysis interface

user@host> show services sessions analysis interface vms-5/1/0


Services PIC Name: vms-5/1/0

Session Analysis Statistics:

Total sessions Active :0


Total TCP Sessions Active :0
Tcp sessions from gate :0
Tunneled TCP sessions :0
Regular TCP sessions :0
IPv4 active Session :0
IPv6 active Session :0
Total UDP sessions Active :0
UDP sessions from gate :0
Tunneled UDP sessions :0
Regular UDP sessions :0
IPv4 active Session :0
IPv6 active Session :0
Total Other sessions Active :0
IPv4 active Session :0
IPv6 active Session :0
1214

Created sessions per Second :0


Deleted sessions per Second :0
Peak Total sessions Active :0
Peak Total TCP sessions Active :0
Peak Total UDP sessions Active :0
Peak Total Other sessions Active :0
Peak Created Sessions per Second :0
Peak Deleted Sessions per Second :0
Packets received :0
Packets transmitted :0
Slow path forward :0
Slow path discard :0
Session Rate Data:
Number of Samples: 3518

Session Rate Distribution(sec)

Session Operation :Creation

400000+ :0
350001 - 400000 :0
300001 - 350000 :0
250001 - 300000 :0
200001 - 250000 :0
150001 - 200000 :0
50001 - 150000 :0
40001 - 50000 :0
30001 - 40000 :0
20001 - 30000 :0
10001 - 20000 :0
1001 - 10000 :0
1 - 1000 :0
0 :3518

Session Operation :Deletion

400000+ :0
350001 - 400000 :0
300001 - 350000 :0
250001 - 300000 :0
200001 - 250000 :0
150001 - 200000 :0
1215

50001 - 150000 :0
40001 - 50000 :0
30001 - 40000 :0
20001 - 30000 :0
10001 - 20000 :0
1001 - 10000 :0
1 - 1000 :0
0 :3518

Session Lifetime Distribution(sec):

TCP UDP HTTP


240+ :0 0 0
120 - 240 :0 0 0
60 - 120 :0 0 0
30 - 60 :0 0 0
15 - 30 :0 0 0
5 - 15 :0 0 0
1 - 5 :0 0 0
0 - 1 :0 0 0

Release Information

Command introduced in Junos OS Release 19.3R2.

show services sessions count

IN THIS SECTION

Syntax | 1216

Description | 1216

Required Privilege Level | 1216

Output Fields | 1216

Sample Output | 1216

Release Information | 1216


1216

Syntax

show services sessions count

Description

Display the count of matching entries.

Required Privilege Level

view

Output Fields

Sample Output

show services sessions count

user@host> show services sessions count


Interface Service set Valid Invalid Pending Other state
vms-0/2/0 ss1_interface_style1 1 0 0 0

Release Information

Command introduced in Junos OS Release 19.3R2.

show services sessions service-set

IN THIS SECTION

Syntax | 1217

Description | 1217
1217

Required Privilege Level | 1217

Output Fields | 1217

Sample Output | 1217

Release Information | 1218

Syntax

show services sessions service-set service-set

Description

Display table session entries for the specified service set.

Required Privilege Level

view

Output Fields

Sample Output

show services sessions service-set

user@host> show services sessions service-set ss1_interface_style1


Session ID: 3, Service-set: ss1_interface_style1, Policy name: R11/7, Timeout:
30, Valid
In: 20.1.1.2/48102 --> 30.1.1.2/22;tcp, Conn Tag: 0x0, If: vms-0/2/0.16387,
Pkts: 70, Bytes: 6257,
Out: 30.1.1.2/22 --> 44.0.0.3/29071;tcp, Conn Tag: 0x0, If: vms-0/2/0.0, Pkts:
59, Bytes: 8193,
Total sessions: 1
1218

Release Information

Command introduced in Junos OS release 19.3R2.

show services sessions service-set

IN THIS SECTION

Syntax | 1218

Description | 1218

Required Privilege Level | 1218

show services sessions service-set | 1218

Release Information | 1219

Syntax

show services sessions service-set

Description

Display the open and close sessions for a service-set.

Required Privilege Level

show services sessions service-set

command-name

user@host> show services sessions service-set service-set-name

Session ID: 268436944, Policy name: self-traffic-policy/1, Timeout: 554, Valid


Logical system: root-logical-system
1219

In: 5.5.5.1/12253 --> 70.0.0.2/514;tcp, Conn Tag: 0x0, If: .local..6, Pkts: 2,
Bytes: 84,
Out: 70.0.0.2/514 --> 5.5.5.1/12253;tcp, Conn Tag: 0x0, If: .local..6, Pkts:
2, Bytes: 84,

Session ID: 268436945, Policy name: self-traffic-policy/1, Timeout: 554, Valid


Logical system: root-logical-system
In: 5.5.5.1/12254 --> 70.0.0.2/514;tcp, Conn Tag: 0x0, If: .local..6, Pkts: 2,
Bytes: 84,
Out: 70.0.0.2/514 --> 5.5.5.1/12254;tcp, Conn Tag: 0x0, If: .local..6, Pkts:
2, Bytes: 84,

Session ID: 268436946, Policy name: self-traffic-policy/1, Timeout: 596, Valid


Logical system: root-logical-system
In: 5.5.5.1/12255 --> 70.0.0.2/514;tcp, Conn Tag: 0x0, If: .local..6, Pkts: 2,
Bytes: 84,
Out: 70.0.0.2/514 --> 5.5.5.1/12255;tcp, Conn Tag: 0x0, If: .local..6, Pkts:
1, Bytes: 44,

Session ID: 268436947, Policy name: self-traffic-policy/1, Timeout: 554, Valid


Logical system: root-logical-system
In: 5.5.5.1/12256 --> 70.0.0.2/514;tcp, Conn Tag: 0x0, If: .local..6, Pkts: 2,
Bytes: 84,
Out: 70.0.0.2/514 --> 5.5.5.1/12256;tcp, Conn Tag: 0x0, If: .local..6, Pkts:
2, Bytes: 84,

Session ID: 268436948, Policy name: self-traffic-policy/1, Timeout: 596, Valid


Logical system: root-logical-system
In: 5.5.5.1/12257 --> 70.0.0.2/514;tcp, Conn Tag: 0x0, If: .local..6, Pkts: 2,
Bytes: 84,
Out: 70.0.0.2/514 --> 5.5.5.1/12257;tcp, Conn Tag: 0x0, If: .local..6, Pkts:
1, Bytes: 44,
Total sessions: 5

Release Information

Command introduced in Junos OS Release 19.3R2.


1220

show services sessions softwire

IN THIS SECTION

Syntax | 1220

Description | 1220

Options | 1220

Required Privilege Level | 1221

Output Fields | 1221

Sample Output | 1221

show services sessions softwire count | 1221

show services sessions softwire ds-lite | 1222

show services sessions softwire ds-lite count | 1222

show services sessions softwire ds-lite aftr | 1223

show services sessions softwire ds-lite b4 | 1223

show services sessions softwire ds-lite b4 <ip-address> aftr <ip-address> | 1224

Show services sessions softwire flow-details | 1224

Release Information | 1225

Syntax

show services sessions softwire


interfaces interface-name

Description

Display session information for softwires.

Options

count Display statistics and information on the number of softwires.

ds-lite Display information about DS-Lite softwires.


1221

Required Privilege Level

view

Output Fields

Sample Output

show services sessions softwire

user@host> show services sessions softwire


Session ID: 536870913, Service-set: vms-sset10, Policy name: default-service-set-
policy/32779, Timeout: 26, Valid
Logical system: root-logical-system
In: DSLITE 2002:2010::1401:4/1 --> 2002:2010::1401:1/1;ipip, Conn Tag: 0x0,
If: vms-2/0/0.16391, Pkts: 1, Bytes: 110,
Out: DSLITE 2002:2010::1401:1/1 --> 2002:2010::1401:4/1;ipip, Conn Tag: 0x0,
If: vms-2/0/0.0, Pkts: 0, Bytes: 0,

Session ID: 536870914, Service-set: vms-sset10, Policy name: default-service-set-


policy/32779, Timeout: 26, Valid
Logical system: root-logical-system
Softwire 2002:2010::1401:4 -> 2002:2010::1401:1
In: 30.1.0.101/1024 --> 30.2.0.101/1024;udp, Conn Tag: 0x0, If:
vms-2/0/0.16391, Pkts: 1, Bytes: 70,
Out: 30.2.0.101/1024 --> 50.0.12.1/1024;udp, Conn Tag: 0x0, If: vms-2/0/0.0,
Pkts: 0, Bytes: 0,
Total sessions: 2

show services sessions softwire count

show services sessions softwire count

user@host> show services sessions softwire count


Interface Service set Valid Invalid Pending
Other state
vms-2/0/0 vms-sset10 1 0
0 0
1222

vms-2/0/0 vms-sset11

show services sessions softwire ds-lite

show services sessions softwire ds-lite

user@host> show services sessions softwire ds-lite


Session ID: 536870913, Service-set: vms-sset10, Policy name: default-service-set-
policy/32779, Timeout: 26, Valid
Logical system: root-logical-system
In: DSLITE 2002:2010::1401:4/1 --> 2002:2010::1401:1/1;ipip, Conn Tag: 0x0,
If: vms-2/0/0.16391, Pkts: 1, Bytes: 110,
Out: DSLITE 2002:2010::1401:1/1 --> 2002:2010::1401:4/1;ipip, Conn Tag: 0x0,
If: vms-2/0/0.0, Pkts: 0, Bytes: 0,

Session ID: 536870914, Service-set: vms-sset10, Policy name: default-service-set-


policy/32779, Timeout: 26, Valid
Logical system: root-logical-system
Softwire 2002:2010::1401:4 -> 2002:2010::1401:1
In: 30.1.0.101/1024 --> 30.2.0.101/1024;udp, Conn Tag: 0x0, If:
vms-2/0/0.16391, Pkts: 1, Bytes: 70,
Out: 30.2.0.101/1024 --> 50.0.12.1/1024;udp, Conn Tag: 0x0, If: vms-2/0/0.0,
Pkts: 0, Bytes: 0,
Total sessions: 2

show services sessions softwire ds-lite count

show services sessions softwire ds-lite count

user@host> show services sessions softwire ds-lite count


Interface Service set Valid Invalid Pending
Other state
vms-2/0/0 vms-sset10 1 0
0 0
vms-2/0/0 vms-sset11
1223

show services sessions softwire ds-lite aftr

show services sessions softwire ds-lite aftr

user@host> show services sessions softwire ds-lite aftr


Session ID: 536870913, Service-set: vms-sset10, Policy name: default-service-set-
policy/32779, Timeout: 6, Valid
Logical system: root-logical-system
In: DSLITE 2002:2010::1401:4/1 --> 2002:2010::1401:1/1;ipip, Conn Tag: 0x0,
If: vms-2/0/0.16391, Pkts: 1, Bytes: 110,
Out: DSLITE 2002:2010::1401:1/1 --> 2002:2010::1401:4/1;ipip, Conn Tag: 0x0,
If: vms-2/0/0.0, Pkts: 0, Bytes: 0,

Session ID: 536870914, Service-set: vms-sset10, Policy name: default-service-set-


policy/32779, Timeout: 6, Valid
Logical system: root-logical-system
Softwire 2002:2010::1401:4 -> 2002:2010::1401:1
In: 30.1.0.101/1024 --> 30.2.0.101/1024;udp, Conn Tag: 0x0, If:
vms-2/0/0.16391, Pkts: 1, Bytes: 70,
Out: 30.2.0.101/1024 --> 50.0.12.1/1024;udp, Conn Tag: 0x0, If: vms-2/0/0.0,
Pkts: 0, Bytes: 0,
Total sessions: 2

show services sessions softwire ds-lite b4

show services sessions softwire ds-lite b4

user@host> show services sessions softwire ds-lite b4


Session ID: 536870913, Service-set: vms-sset10, Policy name: default-service-set-
policy/32779, Timeout: 6, Valid
Logical system: root-logical-system
In: DSLITE 2002:2010::1401:4/1 --> 2002:2010::1401:1/1;ipip, Conn Tag: 0x0,
If: vms-2/0/0.16391, Pkts: 1, Bytes: 110,
Out: DSLITE 2002:2010::1401:1/1 --> 2002:2010::1401:4/1;ipip, Conn Tag: 0x0,
If: vms-2/0/0.0, Pkts: 0, Bytes: 0,

Session ID: 536870914, Service-set: vms-sset10, Policy name: default-service-set-


policy/32779, Timeout: 6, Valid
Logical system: root-logical-system
Softwire 2002:2010::1401:4 -> 2002:2010::1401:1
1224

In: 30.1.0.101/1024 --> 30.2.0.101/1024;udp, Conn Tag: 0x0, If:


vms-2/0/0.16391, Pkts: 1, Bytes: 70,
Out: 30.2.0.101/1024 --> 50.0.12.1/1024;udp, Conn Tag: 0x0, If: vms-2/0/0.0,
Pkts: 0, Bytes: 0,
Total sessions: 2

show services sessions softwire ds-lite b4 <ip-address> aftr <ip-address>

show services sessions softwire ds-lite b4 <ip address> aftr <ip-address>

user@host> show services sessions softwire ds-lite b4 ip address aftr ip-address


Session ID: 536870913, Service-set: vms-sset10, Policy name: default-service-set-
policy/32779, Timeout: 6, Valid
Logical system: root-logical-system
In: DSLITE 2002:2010::1401:4/1 --> 2002:2010::1401:1/1;ipip, Conn Tag: 0x0,
If: vms-2/0/0.16391, Pkts: 1, Bytes: 110,
Out: DSLITE 2002:2010::1401:1/1 --> 2002:2010::1401:4/1;ipip, Conn Tag: 0x0,
If: vms-2/0/0.0, Pkts: 0, Bytes: 0,

Session ID: 536870914, Service-set: vms-sset10, Policy name: default-service-set-


policy/32779, Timeout: 6, Valid
Logical system: root-logical-system
Softwire 2002:2010::1401:4 -> 2002:2010::1401:1
In: 30.1.0.101/1024 --> 30.2.0.101/1024;udp, Conn Tag: 0x0, If:
vms-2/0/0.16391, Pkts: 1, Bytes: 70,
Out: 30.2.0.101/1024 --> 50.0.12.1/1024;udp, Conn Tag: 0x0, If: vms-2/0/0.0,
Pkts: 0, Bytes: 0,
Total sessions: 2

Show services sessions softwire flow-details

Show services sessions softwire flow-details

user@host> show services sessions softwire flow-details


Interface: vms-2/0/0, Service set: vms-sset10
Softwire Direction Flow
count
2002:2010::1401:4->2002:2010::1401:1 In 1
1225

Release Information

Command introduced in Junos OS Release 20.2R1.

show services sessions utilization

IN THIS SECTION

Syntax | 1225

Description | 1225

Options | 1225

Required Privilege Level | 1225

Output Fields | 1226

Sample Output | 1226

Release Information | 1226

Syntax

show services sessions utilization


<interface interface-name>

Description

Display session utilization statistics.

Options

interface interface-name Display session utilization statistics specific to the interface.

Required Privilege Level

view
1226

Output Fields

Sample Output

show services sessions utilization

user@host> show services sessions utilization


Session %Memory %Session-Memory Setup %Rate Drop
Teardown %CPU
Interface Count Rate Rate Rate
vms-3/0/0 0 24.96 0.00 0
0 0.13 Green

Release Information

Command introduced in Junos OS Release 19.3R2.

show services softwire

IN THIS SECTION

Syntax | 1227

Description | 1227

Options | 1227

Required Privilege Level | 1227

Output Fields | 1227

Sample Output | 1228

Release Information | 1228


1227

Syntax

show services softwire

Description

Display information about softwire services. Information is displayed on both 6rd and DS-Lite services.

Options

count interface- (Optional) Display the current softwire counts for a service set for both DS-Lite
name and 6rd.

count (Optional) Display the number of created softwires.

Required Privilege Level

view

Output Fields

Table 98 on page 1227 lists the output fields for the command-name command. Output fields are listed
in the approximate order in which they appear.

Table 98: show-services-softwire Output Fields

Field Name Field Description Level of Output

Interface Interface for which information is displayed. All levels

Service Set Service set containing the softwire rules for the interface. All levels

Softwire Name of the softwire concentrator. All levels

Direction Direction of the flow. All levels


1228

Table 98: show-services-softwire Output Fields (Continued)

Field Name Field Description Level of Output

Flow count Number of flows. All levels

Sample Output

show services softwire

user@host> show services softwire


Interface: sp-3/0/0, Service set: v6rd-dom1-dom3-service-set
Softwire Direction Flow count
10.10.10.2 -> 192.0.2.1 I 13

show services softwire count (sp- interfaces)

user@host> show services softwire count


Interface Service set DS-Lite 6RD
sp-0/0/0 dslite-svc-set1 2 0

show services softwires count (vms- interfaces

user@host> show services softwire count


Interface Service set DS-Lite 6RD MAPE
vms-2/0/0 vms-sset10 1 0

Release Information

Command introduced in Junos OS Release 10.4.

count option added in Junos OS Release 11.2.

Support added for Next Gen Services in Junos OS Release 20.2 on the MX-SPC3 security services card.
1229

show services softwire flows

IN THIS SECTION

Syntax | 1229

Description | 1229

Options | 1230

Required Privilege Level | 1230

Output Fields | 1230

Sample Output | 1231

Release Information | 1234

Syntax

show services softwire flows


(<interface interface-name> <service-set service-set-name>|
count <interface interface-name> <service-set service-set-name>|
ds-lite <B4 b4-address> <AFTR aftr-address>|
v6rd <initiator initiator-ip-address><concentrator concentrator-ip-address>)

Description

Display statistics information about the softwire flows.

NOTE: Starting with Junos OS Release 14.1R4, the IPv6 prefix length associated with a
subscriber’s basic broadband bridging device that is subject to a limited number of sessions
(dslite-ipv6-prefix-length attribute) is taken into account while the session count is calculated
and displayed in the output of the show services softwire flows command. Until Junos OS
Release 14.1R3, only IPv4 flows were counted and IPv6 flows were not considered for the
statistics about softwire flows
1230

Options

interface interface-name (Optional) Display statistics information about the specified


interface only.

service-set service-set-name (Optional) Display statistics information about the specified


service set only.

count <interface interface-name> (Optional) Display flow count information only, with
<service-set service-set-name>| optional filtering by interface and service set.

ds-lite <B4 b4-address> <AFTR aftr- (Optional) Display DS-Lite flow information, with optional
address>| filtering by B4 (softwire initiator) and AFTR (softwire
concentrator).

v6rd <initiator initiator-ip- (Optional) Display v6rd flow information, with optional
address><concentrator concentrator-ip- filtering by the softwire initiator and softwire concentrator.
address>)

Required Privilege Level

view

Output Fields

Table 99 on page 1230 lists the output fields for the show services softwire flows command. Output
fields are listed in the approximate order in which they appear.

Table 99: show services softwire flows Output Fields

Field Name Field Description

Interface Name of the interface.

Service set Name of the service set.

Flow Description of flow, including protocol input and output interface addresses.
1231

Table 99: show services softwire flows Output Fields (Continued)

Field Name Field Description

State Flow state. Value is:

• Forward

Dir Flow direction. Values are:

• I—inbound

• O—outbound

Frm count Number of frames transferred.

NAT dest NAT translation of the decapsulated address.

Softwire For outbound flows, the address of the local softwire initiator (B4 for DS-Lite) is
shown first, followed by the address of the softwire concentrator (AFTR for DS-
Lite). For inbound flows, the address of the software concentrator is shown first,
followed by the address of the softwire initiator.

Sample Output

show services softwire flows

user@host> show services softwire flows


Interface: sp-0/0/0, Service set: dslite-svc-set1
Flow State Dir Frm
count
TCP 200.200.200.2:80 -> 33.33.33.1:1066 Forward O 2005418
NAT dest 33.33.33.1:1066 -> 20.20.1.2:1025
Softwire 1001::1 -> 2001::2
TCP 20.20.1.2:1025 -> 200.200.200.2:80 Forward I 2007168
NAT source 20.20.1.2:1025 -> 33.33.33.1:1066
Softwire 2001::2 -> 1001::1
TCP 20.20.1.2:1025 -> 200.200.200.2:80 Forward I 2635998
1232

NAT source 20.20.1.2:1025 -> 33.33.33.1:1065


Softwire 2001::3 -> 1001::1
DS-LITE 2001::2 -> 1001::1 Forward I 2008157
TCP 200.200.200.2:80 -> 33.33.33.1:1065 Forward O 2637909
NAT dest 33.33.33.1:1065 -> 20.20.1.2:1025
Softwire 1001::1 -> 2001::3
DS-LITE 2001::3 -> 1001::1 Forward I 2640499

show services softwire flows count

user@host> show services softwire flows count


Interface Service set Flow count
sp-0/0/0 dslite-svc-set1 6

show services softwire flows ds-lite B4

user@host> show services softwire flows ds-lite B4 2001::2


Interface: sp-0/0/0, Service set: dslite-svc-set1
Flow State Dir Frm
count
TCP 200.200.200.2:80 -> 33.33.33.1:1066 Forward O 2884037
NAT dest 33.33.33.1:1066 -> 20.20.1.2:1025
Softwire 1001::1 -> 2001::2
TCP 20.20.1.2:1025 -> 200.200.200.2:80 Forward I 2885884
NAT source 20.20.1.2:1025 -> 33.33.33.1:1066
Softwire 2001::2 -> 1001::1
DS-LITE 2001::2 -> 1001::1 Forward I 2886821

show services softwire flows ds-lite AFTR

user@host> show services softwire flows ds-lite AFTR 1001::1


Interface: sp-0/0/0, Service set: dslite-svc-set1
Flow State Dir Frm
count
TCP 200.200.200.2:80 -> 33.33.33.1:1066 Forward O 3359356
NAT dest 33.33.33.1:1066 -> 20.20.1.2:1025
Softwire 1001::1 -> 2001::2
TCP 20.20.1.2:1025 -> 200.200.200.2:80 Forward I 3361235
1233

NAT source 20.20.1.2:1025 -> 33.33.33.1:1066


Softwire 2001::2 -> 1001::1
TCP 20.20.1.2:1025 -> 200.200.200.2:80 Forward I 4479810
NAT source 20.20.1.2:1025 -> 33.33.33.1:1065
Softwire 2001::3 -> 1001::1
DS-LITE 2001::2 -> 1001::1 Forward I 3362168
TCP 200.200.200.2:80 -> 33.33.33.1:1065 Forward O 4481520
NAT dest 33.33.33.1:1065 -> 20.20.1.2:1025
Softwire 1001::1 -> 2001::3
DS-LITE 2001::3 -> 1001::1 Forward I 4484094

services softwire flows ds-lite AFTR and B4

user@host> show services softwire flows ds-lite AFTR 1001::1 B4 2001::2


Interface: sp-0/0/0, Service set: dslite-svc-set1
Flow State Dir Frm
count
TCP 200.200.200.2:80 -> 33.33.33.1:1066 Forward O 3931026
NAT dest 33.33.33.1:1066 -> 20.20.1.2:1025
Softwire 1001::1 -> 2001::2
TCP 20.20.1.2:1025 -> 200.200.200.2:80 Forward I 3932792
NAT source 20.20.1.2:1025 -> 33.33.33.1:1066
Softwire 2001::2 -> 1001::1
DS-LITE 2001::2 -> 1001::1 Forward I 3933782

show services softwires softwire-types map-e

user@host> show services softwires softwire-types map-e mape-tun1


br-address 2001:db8:ffff::1/128; //Mandatory
rule r1 {
ipv4-prefix 192.0.2.0/24; //Mandatory
ipv6-prefix 2001:db8:0000::/40; //Mandatory
ea-bits-length 16; //Mandatory
psid-offset 4; //Mandatory
psid-len 8;
}
version 3;
1234

Release Information

Command introduced in Junos OS Release 10.2.

Support added for Next Gen Services in Junos OS Release 20.2

show services softwire statistics

IN THIS SECTION

Syntax | 1234

Description | 1234

Options | 1235

Required Privilege Level | 1235

Output Fields | 1235

Sample Output | 1240

Sample Output | 1244

Release Information | 1246

Syntax

show services softwire statistics


<ds-lite>
<ds-lite>
<inferface interface-name>
<v6rd>

Description

Display information about softwire services.


1235

Options

ds-lite (Optional) Display only DS-Lite.

interface interface- (Optional) Name of the interface servicing the softwire. When you omit this
name option, data for all interfaces are shown.

v6rd (Optional) Display only 6rd statistics.

Required Privilege Level

view

Output Fields

Table 100 on page 1235 lists the output fields for the command-name command. Output fields are
listed in the approximate order in which they appear.

Table 100: command-name Output Fields

Field Name Field Description Level of Output

Service PIC Name of service PIC for which statistics are shown. statistics
Name

Softwires Number of softwires created. statistics


Created

Softwires Number of softwires created for endpoint-independent filtering statistics for ds-
Created for (EIF) or hairpinning (HP). lite only
EIF/HP

Softwires Number of softwires deleted. statistics


Deleted

Softwires Number of flows created. statistics


Flows Created
1236

Table 100: command-name Output Fields (Continued)

Field Name Field Description Level of Output

Softwires Number of flows deleted. statistics


Flows Deleted

Slow Path Number of packets processed as initial packets in a softwire statistics


Packets session. These packets require a rule lookup and setting up of
Processed flows; this processing of an initial packet in a flow is called the
slow path.

Slow Path Number of slow path EIF/HP packets processed. statistics for ds-
Packets lite only
Processed for
EIF/HP

Fast Path Number of packets processed that are not slow path. statistics
Packets
Processed

Fast Path Number of packets encapsulated in the fast path. statistics


Encapsulated

Softwire EIF Number of packets that matched an EIF entry that initiated the statistics for ds-
Accept creation of a DS-Lite tunnel. The EIF entry was previously lite only
triggered by a DS-Lite packet.

Rule Match Number of packets that matched a softwire rule. statistics


Succeeded

Rule Match Number of packets that did not match any softwire rule. statistics
Failed

IPv6 Packets Number of packets fragmented by the services PIC. statistics for ds-
Fragmented lite only
1237

Table 100: command-name Output Fields (Continued)

Field Name Field Description Level of Output

IPv4 Client Number of IPv4 fragments received from the client end over the statistics for ds-
Fragments softwire tunnel destined to the server. lite only

IPv4 Server Number of IPv4 first fragments received from the server statistics for ds-
First destined to go over the softwire tunnel to the client. lite only
Fragments

IPv4 Server Number of IPv4 other fragments (excluding first and last statistics for ds-
More fragment) received from the server destined to go over the lite only
Fragments softwire tunnel to the client.

IPv4 Server Number of IPv4 last fragments received from the server statistics for ds-
Last Fragments destined to go over the softwire tunnel to the client. lite only

ICMPv4 Number of ICMPv4 packets sent to the softwire concentrator. statistics


Packets sent

ICMPv4 Error Number of ICMPv4 error packets sent to the softwire statistics
Packets sent concentrator.

ICMPv6 Number of ICMPv6 packets sent to the softwire concentrator. statistics


Packets sent

Dropped Number of ICMPv6 packets dropped instead of sending to the statistics


ICMPv6 softwire concentrator.
packets
destined to
AFTR

Softwire Number of softwire creation failures. statistics for ds-


Creation Failed lite and 6rd
1238

Table 100: command-name Output Fields (Continued)

Field Name Field Description Level of Output

Softwire Number of softwire creation failures for EIF/HP. statistics for ds-
Creation Failed lite only
for EIF/HP

Flow Creation Number of flow creation failures. statistics


Failed

Flow Creation Number of flow creation failures for EIF/HP. statistics for ds-
Failed for lite only
EIF/HP

Flow Creation Number of flow creations retried after failure. statistics


Failed - Retry

Slow Path Number of failures detected in the slow path. statistics


Failed

Slow Path Number of times processing of a packet was reprocessed in the statistics
Failed - Retry slow path.

Packet not Number of IPv4 packets not encapsulated in IPv6. statistics for ds-
IPv4-in-IPv6 lite only

IPv6 Number of IPv6 packets with fragmentation errors. statistics


Fragmentation
Error

Slow Path Number of IPv6 header errors detected in slow path processing. statistics for ds-
Failed- IPv6 lite only
Next Header
Offset
1239

Table 100: command-name Output Fields (Continued)

Field Name Field Description Level of Output

Decapsulated Number of packets without IPv4 inner header. statistics for ds-
Packet not lite only
IPv4

Decap Failed - Decapsulation failure due to an unexpected inner header. statistics for ds-
IPv6 Next lite only
Header Offset

Decap Failed - Decapsulation failure due to incorrect Layer 3 data, such as not statistics for ds-
IPv4 L3 an IP packet, bad source or destination address, checksum error, lite only
Integrity or protocol error.

Decap Failed - Decapsulation failure due to incorrect Layer 4 data, such as statistics for ds-
IPv4 L4 errors in TCP, UDP, or TCP headers. lite only
Integrity

No Softwire ID Number of times a softwire ID was not found. statistics

No Flow Number of times flow extensions were not found. statistics


Extension

ICMPv4 Number of ICMPv4 packets dropped. statistics


Dropped
Packets

Packet not Number of IPv6 packets not encapsulated in IPv4. statistics for v6rd
IPv6-in-IPv4 only

Decapsulated Number of packets without an IPv6 inner header. statistics for v6rd
Packet not only
IPv6
1240

Table 100: command-name Output Fields (Continued)

Field Name Field Description Level of Output

Encapsulation Failed to encapsulate IPv6 packets in IPv4 due to low memory. statistics for v6rd
Failed - No only
packet
memory

Flow limit Flow not created because configured maximum flows per statistics
exceeded softwire is exceeded.

Session limit Flow not created because configured maximum DS-Lite softwire statistics for ds-
exceeded sessions per IPv6 prefix is exceeded. lite only

Sample Output

show services softwire statistics (sp- interfaces)

user@host> show services softwire statistics


DS-Lite Statistics:

Service PIC Name: :sp-0/0/0

Statistics
----------

Softwires Created :0
Softwires Created for EIF/HP :0
Softwires Deleted :0
Softwires Flows Created :0
Softwires Flows Deleted :0
Slow Path Packets Processed :0
SLow Path Packets Processed for EIF/HP :0
Fast Path Packets Processed :0
Fast Path Packets Encapsulated :0
Softwire EIF Accept :0
1241

Rule Match Succeeded :0


Rule Match Failed :0
IPv6 Packets Fragmented :0
IPv4 Client Fragments :0
IPv4 Server First Fragments :0
IPv4 Server More Fragments :0
IPv4 Server Last Fragments :0
ICMPv4 Packets sent :0
ICMPv4 Error Packets sent :0
ICMPv6 Packets sent :0
Dropped ICMPv6 packets destined to AFTR :0

Transient Errors
----------------

Flow Creation Failed - Retry :0


FLow Creation Failed - Retry for EIF/HP :0
Slow Path Failed - Retry :0

Errors
------

Softwire Creation Failed :0


Softwire Creation Failed for EIF/HP :0
Flow Creation Failed :0
FLow Creation Failed For EIF/HP :0
Slow Path Failed :0
Packet not IPv4-in-IPv6 :0
IPv6 Fragmentation Error :0
Softwire Creation Failed - IPv6 Next Header Offset :0
Decapsulated Packet not IPv4 :0
Decap Failed - IPv6 Next Header Offset :0
Decap Failed - IPv4 L3 Integrity :0
Decap Failed - IPv4 L4 Integrity :0
No Softwire ID :0
No Flow Extension :0
Flow Limit Exceeded :0

6rd Statistics:

Service PIC Name :sp-0/0/0


1242

Statistics
----------

Softwires Created :0
Softwires Deleted :0
Softwires Flows Created :0
Softwires Flows Deleted :0
Slow Path Packets Processed :0
Fast Path Packets Processed :0
Fast Path Packets Encapsulated :0
Rule Match Failed :0
Rule Match Succeeded :0

Transient Errors
----------------

Flow Creation Failed - Retry :0


Slow Path Failed - Retry :0

Errors
------

Softwire Creation Failed :0


Flow Creation Failed :0
Slow Path Failed :0
Packet not IPv6-in-IPv4 :0
Slow Path Failed - IPv6 Next Header Offset :0
Decapsulated Packet not IPv6 :0
Encapsulation Failed - No packet memory :0
No Softwire ID :0
No Flow Extension :0
ICMPv4 Dropped Packets :0

show services softwire statistics ds-lite (sp- interfaces)

user@host> show services softwire statistics ds-lite


DS-Lite Statistics:

Service PIC Name: :sp-0/0/0


1243

Statistics
----------

Softwires Created :0
Softwires Created for EIF/HP :0
Softwires Deleted :0
Softwires Flows Created :0
Softwires Flows Deleted :0
Slow Path Packets Processed :0
SLow Path Packets Processed for EIF/HP :0
Fast Path Packets Processed :0
Fast Path Packets Encapsulated :0
Softwire EIF Accept :0
Rule Match Succeeded :0
Rule Match Failed :0
IPv6 Packets Fragmented :0
IPv4 Client Fragments :0
IPv4 Server First Fragments :0
IPv4 Server More Fragments :0
IPv4 Server Last Fragments :0
ICMPv4 Packets sent :0
ICMPv4 Error Packets sent :0
ICMPv6 Packets sent :0
Dropped ICMPv6 packets destined to AFTR :0

Transient Errors
----------------

Flow Creation Failed - Retry :0


FLow Creation Failed - Retry for EIF/HP :0
Slow Path Failed - Retry :0

Errors
------

Softwire Creation Failed :0


Softwire Creation Failed for EIF/HP :0
Flow Creation Failed :0
FLow Creation Failed For EIF/HP :0
Slow Path Failed :0
Packet not IPv4-in-IPv6 :0
IPv6 Fragmentation Error :0
1244

Softwire Creation Failed - IPv6 Next Header Offset :0


Decapsulated Packet not IPv4 :0
Decap Failed - IPv6 Next Header Offset :0
Decap Failed - IPv4 L3 Integrity :0
Decap Failed - IPv4 L4 Integrity :0
No Softwire ID :0
No Flow Extension :0
Flow Limit Exceeded :0
Session Limit Exceeded :0

Sample Output

show services softwire statistics (vms- interfaces)

user@host> show services softwire statistics


vms-2/0/0
Total Session Interest events :3
Total Session Destroy events :2
Total Session Public Request events :0
Total Session Accepts :1
Total Session Discards :0
Total Session Ignores :0
Total Session extension alloc failures :0
Total Session extension set failures :0
Softwire statistics
Total Softwire sessions created :1
Total Softwire sessions deleted :2
Total Softwire sessions created for reverse packets :1
Total Softwire session create failed for reverse pkts :0
Total Softwire rule match success :1
Total Softwire rule match failed :0
Softwire session limit exceeded :0
Softwire packet statistics
Total Packets processed :1
Total packets encapsulated :1
Total packets decapsulated :1
Encapsulation errors :0
Decapsulation errors :0
Encapsulated pkts re-inject failures :0
Decapsulated pkts re-inject failures :0
DS-Lite ICMPv4 Echo replies sent :0
1245

DS-Lite ICMPv4 TTL exceeded messages sent :0


ICMPv6 ECHO request messages received destined to AFTR :0
ICMPv6 ECHO reply messages sent from AFTR :0
ICMPv6 ECHO requests to AFTR process failures :0
V6 untunnelled packets destined to AFTR dropped :1
Softwire policy add errors :0
Softwire policy delete errors :0
Softwire policy memory alloc failures :0
Softwire Untunnelled packets ignored :0
Softwire Misc errors
DS-Lite ICMPv4 TTL exceed message process errors :0

show services softwire statistics ds-lite (vms- interfaces)

user@host> show services softwire statistics ds-lite interface vms-2/0/0


vms-2/0/0
Total Session Interest events :3
Total Session Destroy events :2
Total Session Public Request events :0
Total Session Accepts :1
Total Session Discards :0
Total Session Ignores :0
Total Session extension alloc failures :0
Total Session extension set failures :0
Softwire statistics
Total Softwire sessions created :1
Total Softwire sessions deleted :2
Total Softwire sessions created for reverse packets :1
Total Softwire session create failed for reverse pkts :0
Total Softwire rule match success :1
Total Softwire rule match failed :0
Softwire session limit exceeded :0
Softwire packet statistics
Total Packets processed :1
Total packets encapsulated :1
Total packets decapsulated :1
Encapsulation errors :0
Decapsulation errors :0
Encapsulated pkts re-inject failures :0
Decapsulated pkts re-inject failures :0
DS-Lite ICMPv4 Echo replies sent :0
1246

DS-Lite ICMPv4 TTL exceeded messages sent :0


ICMPv6 ECHO request messages received destined to AFTR :0
ICMPv6 ECHO reply messages sent from AFTR :0
ICMPv6 ECHO requests to AFTR process failures :0
V6 untunnelled packets destined to AFTR dropped :1
Softwire policy add errors :0
Softwire policy delete errors :0
Softwire policy memory alloc failures :0
Softwire Untunnelled packets ignored :0
Softwire Misc errors
DS-Lite ICMPv4 TTL exceed message process errors :0

Release Information

Command introduced in Junos OS Release 10.4.

Support for Next Gen Services with the MX-SPC3 security services card added in Junos OS Release
20.2.

show services stateful-firewall conversations

IN THIS SECTION

Syntax | 1247

Description | 1247

Options | 1247

Required Privilege Level | 1249

Output Fields | 1249

Sample Output | 1251

Release Information | 1252


1247

Syntax

show services stateful-firewall conversations


<brief | extensive | terse>
<application-protocol protocol>
<destination-port destination-port>
<destination-prefix destination-prefix>
<interface interface-name>
<limit number>
<pgcp>
<protocol protocol>
<service-set service-set>
<source-port source-port>
<source-prefix source-prefix>

Description

Display information about stateful firewall conversations.

Options

none Display standard information about all stateful firewall conversations.

brief | extensive | terse (Optional) Display the specified level of output.

application- (Optional) Display information about one of the following application


protocol protocol protocols:

• bootp—Bootstrap protocol

• dce-rpc—Distributed Computing Environment-Remote Procedure Call


protocols

• dce-rpc-portmap—Distributed Computing Environment-Remote


Procedure Call protocols portmap service

• dns—Domain Name System protocol

• exec—Exec

• ftp—File Transfer Protocol


1248

• h323—H.323 standards

• icmp—Internet Control Message Protocol

• iiop—Internet Inter-ORB Protocol

• login—Login

• netbios—NetBIOS

• netshow—NetShow

• realaudio—RealAudio

• rpc—Remote Procedure Call protocol

• rpc-portmap—Remote Procedure Call protocol portmap service

• rtsp—Real-Time Streaming Protocol

• shell—Shell

• sip—Session Initiation Protocol

• snmp—Simple Network Management Protocol

• sqlnet—SQLNet

• tftp—Trivial File Transfer Protocol

• traceroute—Traceroute

• winframe—WinFrame

destination-port (Optional) Display information for a particular destination port. The range of
destination-port values is 0 to 65535.

destination-prefix (Optional) Display information for a particular destination prefix.


destination-prefix
interface interface-name (Optional) Display information about a particular interface. On M Series and
T Series routers, the interface-name can be sp-fpc/pic/port or rspnumber.

limit number (Optional) Maximum number of entries to display.

pgcp (Optional) Display information about stateful firewall conversations for


Packet Gateway Control Protocol (PGCP) flows.

protocol protocol (Optional) Display information about one of the following IP types:
1249

• number—Numeric protocol value from 0 to 255

• ah—IPsec Authentication Header protocol

• egp—An exterior gateway protocol

• esp—IPsec Encapsulating Security Payload protocol

• gre—A generic routing encapsulation protocol

• icmp—Internet Control Message Protocol

• igmp—Internet Group Management Protocol

• ipip—IP-within-IP Encapsulation Protocol

• ospf—Open Shortest Path First protocol

• pim—Protocol Independent Multicast protocol

• rsvp—Resource Reservation Protocol

• sctp—Stream Control Protocol

• tcp—Transmission Control Protocol

• udp—User Datagram Protocol

service-set service-set (Optional) Display information for the specific service set.

source-port source-port (Optional) Display information for a particular source port. The range of
values is 0 to 65535.

source-prefix source- (Optional) Display information for a particular source prefix.


prefix

Required Privilege Level

view

Output Fields

Table 101 on page 1250 lists the output fields for the show services stateful-firewall conversations
command. Output fields are listed in the approximate order in which they appear.
1250

Table 101: show services stateful-firewall conversations Output Fields

Field Name Field Description

Interface Name of an adaptive services interface.

Service set Name of a service set. Individual empty service sets are not displayed, but if no service
set has any flows, a flow table header is printed for each service set.

Conversation Information about a group of related flows.

• ALG Protocol—Application-level gateway protocol.

• Number of initiators—Number of flows that initiated a session.

• Number of responders—Number of flows that responded in a session.

Flow or Flow Protocol used for this flow.


Prot

Source Source prefix of the flow, in the format source-prefix-port.

Destination Destination prefix of the flow.

State Status of the flow:

• Drop—Drop all packets in the flow without response.

• Forward—Forward the packet in the flow without looking at it.

• Reject—Drop all packets in the flow with response.

• Watch—Inspect packets in the flow.

Dir Direction of the flow: input (I) or output (O).

Source NAT Original and translated source IPv4 or IPv6 addresses are displayed if Network
Address Translation (NAT) is configured on this particular flow or conversation.
1251

Table 101: show services stateful-firewall conversations Output Fields (Continued)

Field Name Field Description

Frm Count Number of frames in the flow.

Destin NAT Original and translated destination IPv4 or IPv6 addresses are displayed if NAT is
configured on this particular flow or conversation.

Byte count Number of bytes forwarded in the flow.

TCP Whether a TCP connection was established: Yes or No.


established

TCP window Negotiated TCP connection window size, in bytes.


size

TCP TCP acknowledgment sequence number.


acknowledge

TCP tickle Whether TCP inquiry mode is on (enabled or disabled) and the time remaining to send
the next inquiry, in seconds.

Master flow Flow that initiated the conversation.

TImeout Lifetime of the flow, in seconds.

Sample Output

show services stateful-firewall conversations

user@host> show services stateful-firewall conversations


Interface: sp-1/3/0, Service set: green
Conversation: ALG Protocol: any, Number of initiators: 1,
Number of responders: 1
1252

Flow
Prot Source Dest State Dir Frm count
TCP 10.58.255.50:33005-> 10.58.255.178:23 Forward I 13
Source NAT 10.58.255.50:33005-> 10.59.16.100:4000
Destin NAT 10.58.255.178:23 -> 0.0.0.0:4000
Byte count: 918
TCP established, TCP window size: 65535, TCP acknowledge: 2502627025
TCP tickle enabled, 0 seconds,
Master flow, Timeout: 30 seconds
TCP 10.58.255.178:23 -> 10.59.16.100:4000 Forward O 8

show services stateful-firewall conversations destination-port

user@host> show services stateful-firewall conversations destination-port 21


Interface: sp-0/3/0, Service set: svc_set_trust

Interface: sp-0/3/0, Service set: svc_set_untrust


Conversation: ALG protocol: ftp
Number of initiators: 1, Number of responders: 1
Flow State Dir Frm count
TCP 10.50.10.2:2143 -> 10.50.20.2:21 Watch O 0
TCP 10.50.20.2:21 -> 10.50.10.2:2143 Watch I 0
TCP 10.50.20.2:21 -> 10.50.10.2:2143 Watch I 0

Release Information

Command introduced before Junos OS Release 7.4.

pgcp option introduced in Junos OS Release 8.4.

show services stateful-firewall flow-analysis

IN THIS SECTION

Syntax | 1253
1253

Description | 1253

Options | 1253

Required Privilege Level | 1253

Output Fields | 1253

Sample Output | 1256

Sample Output | 1257

Release Information | 1259

Syntax

show services stateful-firewall flow-analysis


<interface interface-name>

Description

Display stateful firewall flow statistics.

Options

none Display standard information about all stateful firewall flow statistics.

interface interface-name (Optional) Display information about a particular interface.

Required Privilege Level

view

Output Fields

Table 102 on page 1254 lists the output fields for the show services stateful-firewall flow-analysis
command. Output fields are listed in the approximate order in which they appear.
1254

Table 102: show services stateful-firewall flow-analysis Output Fields

Field Name Field Description

Total Flows Active Total active flows in the MS-PIC including TCP, UDP, ICMP and Softwires.

Total TCP Flows Active Total active TCP flows in the MS-PIC.

Total UDP Flows Active Total active UDP flows in the MS-PIC.

Total Other Flows Total other active flows in the MS-PIC including ICMP and softwires.
Active

Total Predicted Flows Predicted flows are created only by the ALG traffic using the L3/L4
Active information available.

Created Flows per Flow setup rate at the time of running the command.
Second

Deleted Flows per Flow deletion rate at the time of running the command.
Second

Peak Total Flows Active The highest number of active flows since the last PIC restart or since the
last time flow statistics are flushed.

Peak Total TCP Flows The highest number of active TCP flows since the last PIC restart or since
Active the last time flow stats are flushed.

Peak Total UDP Flows The highest number of active UDP flows since the last PIC restart or since
Active the last time flow statistics are flushed.

Peak Total Other Flows The highest number of other active flows since the last PIC restart or since
Active the last time flow statistics are flushed.
1255

Table 102: show services stateful-firewall flow-analysis Output Fields (Continued)

Field Name Field Description

Peak Created Flows per The maximum flow setup rate observed since the last PIC restart or since
Second the last time flow statistics are flushed.

Peak Deleted Flows per The maximum flow deletion rate observed since the last PIC restart or
Second from the last time flow statistics are flushed.

Average HTTP Flow Average HTTP Flow Lifetime in millisecond.


Lifetime(ms)

Packets received The total number of packets received by the MS-PIC.

Packets transmitted The total number of packets transmitted by the MS-PIC.

Slow path forward The number of packets forwarded in the slow path (i.e. after the successful
rule match and flow creation).

Slow path discard The number of packets discarded before the flow creation.

Flow Rate Data: The number of samples used to calculate the flow rate, since the last PIC
Number of Samples restart or since the last time flow statistics are flushed.

Flow Rate Histogram of the samples used for flow rate calculation.
Distribution(sec) Flow
Operation :Creation
Flow
Operation :Deletion

Flow Lifetime Histogram of the samples used to calculate the flow life time in sec.
Distribution(sec):
1256

Sample Output

show services stateful-firewall flow-analysis

user@host> show services stateful-firewall flow-analysis


Services PIC Name: sp-3/0/0
Flow Analysis Statistics:
Total Flows Active :40
Total TCP Flows Active :0
Total UDP Flows Active :40
Total Other Flows Active :0
Total Predicted Flows Active :0
Created Flows per Second :0
Deleted Flows per Second :0
Peak Total Flows Active :40
Peak Total TCP Flows Active :0
Peak Total UDP Flows Active :40
Peak Total Other Flows Active :0
Peak Created Flows per Second :20
Peak Deleted Flows per Second :20
Average HTTP Flow Lifetime(ms) :0
Packets received :48682539117
Packets transmitted :48682502703
Slow path forward :6550
Slow path discard :0
Flow Rate Data:
Number of Samples: 19720
Flow Rate Distribution(sec)
Flow Operation :Creation
300000+ :0
250000 - 300000 :0
200000 - 250000 :0
160000 - 200000 :0
150000 - 160000 :0
50000 - 150000 :0
40000 - 50000 :0
30000 - 40000 :0
20000 - 30000 :0
10000 - 20000 :0
1000 - 10000 :0
0 - 1000 :19720
Flow Operation :Deletion
1257

300000+ :0
250000 - 300000 :0
200000 - 250000 :0
160000 - 200000 :0
150000 - 160000 :0
50000 - 150000 :0
40000 - 50000 :0
30000 - 40000 :0
20000 - 30000 :0
10000 - 20000 :0
1000 - 10000 :0
0 - 1000 :19720
Flow Lifetime Distribution(sec):
TCP UDP HTTP
240+ :0 0 0
120 - 240 :0 0
60 - 120 :0 0
30 - 60 :0 0
15 - 30 :0 6530
5 - 15 :0 0
1 - 5 :0 0
0 - 1 :0 6530

Sample Output

show services stateful-firewall flow-analysis interface sp-3/0/0

user@host> show services stateful-firewall flow-analysis interface sp-3/0/0


Services PIC Name: sp-3/0/0
Flow Analysis Statistics:
Total Flows Active :40
Total TCP Flows Active :0
Total UDP Flows Active :40
Total Other Flows Active :0
Total Predicted Flows Active :0
Created Flows per Second :0
Deleted Flows per Second :0
Peak Total Flows Active :40
Peak Total TCP Flows Active :0
Peak Total UDP Flows Active :40
Peak Total Other Flows Active :0
1258

Peak Created Flows per Second :20


Peak Deleted Flows per Second :20
Average HTTP Flow Lifetime(ms) :0
Packets received :54696856768
Packets transmitted :54696815873
Slow path forward :7350
Slow path discard :0
Flow Rate Data:
Number of Samples: 22139
Flow Rate Distribution(sec)
Flow Operation :Creation
300000+ :0
250000 - 300000 :0
200000 - 250000 :0
160000 - 200000 :0
150000 - 160000 :0
50000 - 150000 :0
40000 - 50000 :0
30000 - 40000 :0
20000 - 30000 :0
10000 - 20000 :0
1000 - 10000 :0
0 - 1000 :22139
Flow Operation :Deletion
300000+ :0
250000 - 300000 :0
200000 - 250000 :0
160000 - 200000 :0
150000 - 160000 :0
50000 - 150000 :0
40000 - 50000 :0
30000 - 40000 :0
20000 - 30000 :0
10000 - 20000 :0
1000 - 10000 :0
0 - 1000 :22139
Flow Lifetime Distribution(sec):
TCP UDP HTTP
240+ :0 0 0
120 - 240 :0 0
60 - 120 :0 0
30 - 60 :0 0
15 - 30 :0 7330
1259

5 - 15 :0 0
1 - 5 :0 0
0 - 1 :0 7330

Release Information

Command introduced in Junos OS Release 10.4R1.

show services stateful-firewall flows

IN THIS SECTION

Syntax | 1259

Description | 1260

Options | 1260

Required Privilege Level | 1262

Output Fields | 1262

Sample Output | 1264

Release Information | 1266

Syntax

show services stateful-firewall flows


<brief | extensive | summary | terse>
<application-protocol protocol>
<count>
<destination-port destination-port>
<destination-prefix destination-prefix>
<interface interface-name>
<limit number>
<protocol protocol>
<service-set service-set>
1260

<source-port source-port>
<source-prefix source-prefix>

Description

Display stateful firewall flow table entries. When the interface is used for softwire processing, the type
of softwire concentrator (DS-LITE or 6rd) is shown, and frame counts are provided.

Options

none Display standard information about all stateful firewall flows.

brief | extensive | (Optional) Display the specified level of output.


summary | terse
application- (Optional) Display information about one of the following application-level
protocol gateway (ALG) protocol types:
application-
protocol • bootp—Bootstrap protocol

• dce-rpc—Distributed Computing Environment (DCE) remote procedure call


(RPC) protocol

NOTE: Use this option to select Microsoft Remote Procedure Call


(MSRPC).

• dce-rpc-portmap—Distributed Computing Environment (DCE) remote


procedure call (RPC) portmap protocol

• dns—Domain Name Service protocol

• exec—Remote execution protocol

• ftp—File Transfer Protocol

• h323—H.323 protocol

• icmp—Internet Control Message Protocol

• iiop—Internet Inter-ORB Protocol

• ip—Internet protocol
1261

• netbios—NetBIOS protocol

• netshow—Netshow protocol

• pptp —Point-to-Point Tunneling Protocol

• realaudio—RealAudio protocol

• rpc—Remote Procedure Call protocol

NOTE: Use this option to select Sun Microsystems Remote Procedure


Call protocol (SunRPC).

• rpc-portmap—Remote Procedure Call portmap protocol

• rtsp—Real-Time Streaming Protocol

• sip—Session Initiation Protocol

• snmp—Simple Network Management Protocol

• talk—Talk protocol

• tftp—Trivial File Transfer Protocol

• traceroute—Traceroute

• winframe—WinFrame

count (Optional) Display a count of the matching entries.

destination-port (Optional) Display information for a particular destination port. The range of
destination-port values is from 0 to 65535.

destination-prefix (Optional) Display information for a particular destination prefix.


destination-prefix
interface interface- (Optional) Display information about a particular interface. On M Series and T
name Series routers, interface-name can be ms-fpc/pic/port or rspnumber.

limit number (Optional) Maximum number of entries to display.

protocol protocol (Optional) Display information about one of the following IP types:

• number—Numeric protocol value from 0 to 255


1262

• ah—IPsec Authentication Header protocol

• egp—An exterior gateway protocol

• esp—IPsec Encapsulating Security Payload protocol

• gre—A generic routing encapsulation protocol

• icmp—Internet Control Message Protocol

• igmp—Internet Group Management Protocol

• ipip—IP-within-IP Encapsulation Protocol

• ospf—Open Shortest Path First protocol

• pim—Protocol Independent Multicast protocol

• rsvp—Resource Reservation Protocol

• sctp—Stream Control Protocol

• tcp—Transmission Control Protocol

• udp—User Datagram Protocol

service-set service- (Optional) Display information for a particular service set.


set
source-port (Optional) Display information for a particular source port. The range of values is
source-port from 0 to 65535.

source-prefix (Optional) Display information for a particular source prefix.


source-prefix

Required Privilege Level

view

Output Fields

Table 103 on page 1263 lists the output fields for the show services stateful-firewall flows command.
Output fields are listed in the approximate order in which they appear.
1263

Table 103: show services stateful-firewall flows Output Fields

Field Name Field Description

Interface Name of the interface.

Service set Name of a service set. Individual empty service sets are not displayed. If no service set
has any flows, a flow table header is displayed for each service set.

Flow Count Number of flows in a session.

Flow or Flow Protocol used for this flow.


Prot

Source Source prefix of the flow in the format source-prefix:port. For ICMP flows, port
information is not displayed.

Dest Destination prefix of the flow. For ICMP flows, port information is not displayed.

State Status of the flow:

• Drop—Drop all packets in the flow without response.

• Forward—Forward the packet in the flow without looking at it.

• Reject—Drop all packets in the flow with response.

• Watch—Inspect packets in the flow.

Dir Direction of the flow: input (I) or output (O). For any configured stateful firewall rule,
the reverse flow is dynamically created, so you will see an input and an output flow.

Frm count Number of frames in the flow. If this value is zero, then that flow does not yet exist.
1264

Sample Output

show services stateful-firewall flows

On the MX Series router, both input (I) and output (O) flow entries appear, even if traffic only flows in
one direction. This applies to both NAT and non-NAT cases.

user@host> show services stateful-firewall flows


Interface: ms-1/3/0, Service set: green

Flow
Prot Source Dest State Dir Frm count
TCP 10.58.255.178:23 -> 10.59.16.100:4000 Forward O
TCP 10.58.255.50:33005-> 10.58.255.178:23 Forward I 1
Source NAT 10.58.255.50:33005-> 10.59.16.100:4000
Destin NAT 10.58.255.178:23 -> 0.0.0.0:4000

show services stateful-firewall flows (For Softwire Flows)

When a service set includes softwire processing, the following output format is used for the softwire
flows:

user@host> show services stateful-firewall flows


Interface: sp-0/1/0, Service set: dslite-svc-set2
Flow State Dir Frm count
TCP 200.200.200.2:80 -> 44.44.44.1:1025 Forward O 219942
NAT dest 44.44.44.1:1025 -> 20.20.1.4:1025
Softwire 2001::2 -> 1001::1
TCP 20.20.1.2:1025 -> 200.200.200.2:80 Forward I 110244
NAT source 20.20.1.2:1025 -> 44.44.44.1:1024
Softwire 2001::2 -> 1001::1
TCP 200.200.200.2:80 -> 44.44.44.1:1024 Forward O 219140
NAT dest 44.44.44.1:1024 -> 20.20.1.2:1025
Softwire 2001::2 -> 1001::1
DS-LITE 2001::2 -> 1001::1 Forward I 988729
TCP 200.200.200.2:80 -> 44.44.44.1:1026 Forward O 218906
NAT dest 44.44.44.1:1026 -> 20.20.1.3:1025
Softwire 2001::2 -> 1001::1
TCP 20.20.1.3:1025 -> 200.200.200.2:80 Forward I 110303
NAT source 20.20.1.3:1025 -> 44.44.44.1:1026
1265

Softwire 2001::2 -> 1001::1


TCP 20.20.1.4:1025 -> 200.200.200.2:80 Forward I 110944
NAT source 20.20.1.4:1025 -> 44.44.44.1:1025
Softwire 2001::2 -> 1001::1

show services stateful-firewall flows brief

The output for the show services stateful-firewall flows brief command is identical to that for the show
services stateful-firewall flows command. For sample output, see "show services stateful-firewall flows"
on page 1259.

show services stateful-firewall flows extensive

user@host> show services stateful-firewall flows extensive


Interface: ms-0/3/0, Service set: ss_nat
Flow State
Dir Frm count
TCP 16.1.0.1:2330 -> 16.49.0.1:21
Forward I 8
NAT source 16.1.0.1:2330 -> 16.41.0.1:2330
NAT dest 16.49.0.1:21 -> 16.99.0.1:21
Byte count: 455, TCP established, TCP window size: 57344
TCP acknowledge: 3251737524, TCP tickle enabled, tcp_tickle: 0
Flow role: Master, Timeout: 720
TCP 16.99.0.1:21 -> 16.41.0.1:2330
Forward O 5
NAT source 16.99.0.1:21 -> 16.49.0.1:21
NAT dest 16.41.0.1:2330 -> 16.1.0.1:2330
Byte count: 480, TCP established, TCP window size: 57344
TCP acknowledge: 463128048, TCP tickle enabled, tcp_tickle: 0
Flow role: Responder, Timeout: 720

show services stateful-firewall flows count

user@host> show services stateful-firewall flows count


Interface Service set Flow Count

ms-1/3/0 green 2
1266

show services stateful-firewall flows destination port

user@host> show services stateful-firewall flows destination-port 21


Interface: ms-0/3/0, Service set: svc_set_trust
Flow
State Dir Frm count
Interface: ms-0/3/0, Service set: svc_set_untrust
Flow State Dir Frm count
TCP 10.50.10.2:2143 -> 10.50.20.2:21 Watch O 0

show services stateful-firewall flows source port

user@host> show services stateful-firewall flows source-port 2143


Interface: ms-0/3/0, Service set: svc_set_trust
Flow
State Dir Frm count
Interface: ms-0/3/0, Service set: svc_set_untrust
Flow State Dir Frm count
TCP 10.50.10.2:2143 -> 10.50.20.2:21 Watch O 0

show services stateful-firewall flows (Twice NAT)

user@host> show services stateful-firewall flows


Flow State Dir Frm count
UDP 40.0.0.8:23439 -> 80.0.0.1:16485 Watch I 20
NAT source 40.0.0.8:23439 -> 172.16.1.10:1028
NAT dest 80.0.0,1:16485 -> 192.16.1.10:22415
UDP 192.16.1.10:22415 -> 172.16.1.10:1028 Watch O 20
NAT source 192.16.1.10:22415 -> 80.0.0.1:16485
NAT dest 172.16.1.10:1028 -> 40.0.0.8:23439

Release Information

Command introduced before Junos OS Release 7.4.

pgcp option introduced in Junos OS Release 8.4.

application-protocol option introduced in Junos OS Release 10.4.


1267

RELATED DOCUMENTATION

clear services stateful-firewall flows

show services stateful-firewall sip-call

IN THIS SECTION

Syntax | 1267

Description | 1267

Options | 1268

Required Privilege Level | 1270

Output Fields | 1270

Sample Output | 1272

Release Information | 1273

Syntax

show services stateful-firewall sip-call


<brief | extensive | terse>
<application-protocol protocol>
<destination-port destination-port>
<destination-prefix destination-prefix>
<interface interface-name>
<limit number>
<protocol protocol>
<service-set service-set>
<source-port source-port>
<source-prefix source-prefix>

Description

Display stateful firewall Session Initiation Protocol (SIP) call information.


1268

Options

count (Optional) Display a count of the matching entries.

brief (Optional) Display brief SIP call information.

extensive (Optional) Display detailed SIP call information.

terse (Optional) Display terse SIP call information.

application- (Optional) Display information about one of the following application protocols:
protocol
• bootp—(SIP only) Bootstrap protocol

• dce-rpc—(SIP only) Distributed Computing Environment-Remote Procedure Call


protocols

• dce-rpc-portmap—(SIP only) Distributed Computing Environment-Remote


Procedure Call protocols portmap service

• dns—(SIP only) Domain Name System protocol

• exec—(SIP only) Exec

• ftp—(SIP only) File Transfer Protocol

• h323—H.323 standards

• icmp—Internet Control Message Protocol

• iiop—Internet Inter-ORB Protocol

• login—Login

• netbios—NetBIOS

• netshow—NetShow

• realaudio—RealAudio

• rpc—Remote Procedure Call protocol

• rpc-portmap—Remote Procedure Call protocol portmap service

• rtsp—Real-Time Streaming Protocol

• shell—Shell
1269

• sip—Session Initiation Protocol

• snmp—Simple Network Management Protocol

• sqlnet—SQLNet

• tftp—Trivial File Transfer Protocol

• traceroute—Traceroute

• winframe—WinFrame

destination-port (Optional) Display information for a particular destination port. The range of values
destination-port is from 0 to 65535.

destination-prefix (Optional) Display information for a particular destination prefix.


destination-prefix
interface (Optional) Display information about a particular adaptive services interface. On M
interface-name Series and T Series routers, interface-name can be sp-fpc/pic/port or rspnumber.

limit number (Optional) Maximum number of entries to display.

protocol (Optional) Display information about one of the following IP types:

• ah—IPsec Authentication Header protocol

• egp—An exterior gateway protocol

• esp—IPsec Encapsulating Security Payload protocol

• gre—A generic routing encapsulation protocol

• icmp—Internet Control Message Protocol

• igmp—Internet Group Management Protocol

• ipip—IP-within-IP Encapsulation Protocol

• ipv6—IPv6 within IP

• ospf—Open Shortest Path First protocol

• pim—Protocol Independent Multicast protocol

• rsvp—Resource Reservation Protocol

• sctp—Stream Control Protocol


1270

• tcp—Transmission Control Protocol

• udp—User Datagram Protocol

service-set (Optional) Display information for a particular service set.


service-set
source-port (Optional) Display information for a particular source port. The range of values is
source-port from 0 to 65535.

source-prefix (Optional) Display information for a particular source prefix.


source-prefix

Required Privilege Level

view

Output Fields

Table 104 on page 1270 lists the output fields for the show services stateful-firewall sip-call command.
Output fields are listed in the approximate order in which they appear.

Table 104: show services stateful-firewall sip-call Output Fields

Field Name Field Description

Interface Name of an adaptive services interface.

Service set Name of a service set.

From Initiator address.

To Responder address.

Call ID SIP call identification string.

Number of initiator Number of control, contact, or media initiator flows.


flows
1271

Table 104: show services stateful-firewall sip-call Output Fields (Continued)

Field Name Field Description

Number of Number of control, contact, or media responder flows.


responder flows

protocol Protocol used for this flow.

source-prefix Source prefix of the flow in the format source-prefix : port.

destination-prefix Destination prefix of the flow.

state Status of the flow:

• Drop—Drop all packets in the flow without a response.

• Forward—Forward the packet in the flow without examining it.

• Reject—Drop all packets in the flow with a response.

• Unknown—Unknown status.

• Watch—Inspect packets in the flow.

direction Direction of the flow: input (I), output (O), or unknown (U).

frame-count Number of frames in the flow.

Byte count Number of bytes forwarded in the flow.

Flow role Role of the flow that is under evaluation: Initiator, Master, Responder, or
Unknown.

Timeout Lifetime of the flow, in seconds.


1272

Sample Output

show services stateful-firewall sip-call extensive

user@host> show services stateful-firewall sip-call extensive


Interface: sp-0/3/0, Service set: test_sip_777

From: : [email protected]:0;000ff73ac89900021bb231dc-3ef68435
To: : [email protected]:0;0011bb65c2a30007777bd0fc-5748b749
Call ID: : [email protected]
Number of control initiator flows: : 1, Number of control responder flows:
: 1
UDP 10.20.70.2:50354 -> 10.200.100.1:5060 Watch I
2
Byte count: 1112
Flow role: Master, Timeout: 30
UDP 10.200.100.1:5060 -> 10.20.170.111:50354 Watch O
0
Byte count: 0
Flow role: Responder, Timeout: 30
UDP 0.0.0.0:0 -> 10.20.170.111:5060 Watch O
7
Byte count: 2749
Flow role: Responder, Timeout: 30
Number of contact initiator flows: 1, Number of contact responder flows: 1
UDP 0.0.0.0:0 -> 10.20.140.11:5060 Watch I
1
Byte count: 409
Flow role: Master, Timeout: 30
UDP 10.20.140.11:31864 -> 10.20.170.111:18808 Forward O
622
Byte count: 124400
Flow role: Master, Timeout: 30
UDP 0.0.0.0:0 -> 10.20.170.111:18809 Forward O
0
Byte count: 0
Flow role: Initiator, Timeout: 30
Number of media initiator flows: 4, Number of media responder flows: 0
UDP 10.20.70.2:18808 -> 10.20.140.11:31864 Forward I
628
Byte count: 125600
Flow role: Initiator, Timeout: 30
1273

UDP 0.0.0.0:0 -> 10.20.140.11:31865 Forward I


0
Byte count: 0
Flow role: Initiator, Timeout: 30
0 0.0.0.0:0 -> 0.0.0.0:0 Unknown U
0
Byte count: 0
Flow role: Unknown, Timeout: 0
0 0.0.0.0:0 -> 0.0.0.0:0 Unknown U
Interface: sp-0/3/0, Service set: test_sip_888

Release Information

Command introduced in Junos OS Release 7.4.

RELATED DOCUMENTATION

clear services stateful-firewall sip-call

show services stateful-firewall sip-register

IN THIS SECTION

Syntax | 1274

Description | 1274

Options | 1274

Required Privilege Level | 1276

Output Fields | 1276

Sample Output | 1277

Release Information | 1278


1274

Syntax

show services stateful-firewall sip-register


<brief | extensive | terse>
<application-protocol protocol>
<destination-port destination-port>
<destination-prefix destination-prefix>
<interface interface-name>
<limit number>
<protocol protocol>
<service-set service-set>
<source-port source-port>
<source-prefix source-prefix>

Description

Display stateful firewall Session Initiation Protocol (SIP) register information.

Options

count (Optional) Display a count of the matching entries.

brief (Optional) Display brief SIP register information.

extensive (Optional) Display detailed SIP register information.

terse (Optional) Display terse SIP register information.

application-protocol (Optional) Display information about one of the following application


protocols:

• bootp—(SIP only) Bootstrap protocol

• dce-rpc—(SIP only) Distributed Computing Environment-Remote


Procedure Call protocols

• dce-rpc-portmap—(SIP only) Distributed Computing Environment-


Remote Procedure Call protocols portmap service

• dns—(SIP only) Domain Name System protocol

• exec—(SIP only) Exec


1275

• ftp—(SIP only) File Transfer Protocol

• h323—H.323 standards

• icmp—Internet Control Message Protocol

• iiop—Internet Inter-ORB Protocol

• login—Login

• netbios—NetBIOS

• netshow—NetShow

• realaudio—RealAudio

• rpc—Remote Procedure Call protocol

• rpc-portmap—Remote Procedure Call protocol portmap service

• rtsp—Real-Time Streaming Protocol

• shell—Shell

• sip—Session Initiation Protocol

• snmp—Simple Network Management Protocol

• sqlnet—SQLNet

• tftp—Trivial File Transfer Protocol

• traceroute—Traceroute

• winframe—WinFrame

destination-port (Optional) Display information for a particular destination port.


destination-port
destination-prefix (Optional) Display information for a particular destination prefix. The range
destination-prefix of values is from 0 to 65535.

interface interface-name (Optional) Display information about a particular interface. On M Series and
T Series routers, the interface-name can be sp-fpc/pic/port or rspnumber.

limit number (Optional) Maximum number of entries to display.

protocol (Optional) Display information about one of the following IP types:


1276

• ah—IPsec Authentication Header protocol

• egp—An exterior gateway protocol

• esp—IPsec Encapsulating Security Payload protocol

• gre—A generic routing encapsulation protocol

• icmp—Internet Control Message Protocol

• igmp—Internet Group Management Protocol

• ipip—IP-within-IP Encapsulation Protocol

• ipv6—IPv6 within IP

• ospf—Open Shortest Path First protocol

• pim—Protocol Independent Multicast protocol

• rsvp—Resource Reservation Protocol

• sctp—Stream Control Protocol

• tcp—Transmission Control Protocol

• udp—User Datagram Protocol

service-set service-set (Optional) Display information for a particular service set.

source-port source-port (Optional) Display information for a particular source port. The range of
values is from 0 to 65535.

source-prefix source- (Optional) Display information for a particular source prefix.


prefix

Required Privilege Level

view

Output Fields

Table 105 on page 1277 lists the output fields for the show services stateful-firewall sip-register
command. Output fields are listed in the approximate order in which they appear.
1277

Table 105: show services stateful-firewall sip-register Output Fields

Field Name Field Description

Interface Name of an adaptive services interface.

Service set Name of a service set.

SIP Register Register information header.

Protocol Protocol used for this flow.

Registered IP Register IP address.

Port Register port number.

Expiration timeout Configured lifetime, in seconds.

Timeout remaining Lifetime remaining, in seconds.

From Initiator address.

To Responder address.

Call ID SIP call identification string.

Sample Output

show services stateful-firewall sip-register extensive

user@host> show services stateful-firewall sip-register extensive


Interface: sp-0/3/0, Service set: test_sip_777

SIP Register: Protocol: UDP, Registered IP: 10.20.170.111, Port: 5060, Acked
1278

Expiration timeout: 36000, Timeout remaining: 35544


From: : [email protected]:0;
To: : [email protected]:0;
Call ID: : [email protected]

Interface: sp-0/3/0, Service set: test_sip_888

SIP Register: Protocol: UDP, Registered IP: 10.20.170.112, Port: 5060, Acked
Expiration timeout: 36000, Timeout remaining: 35549
From: : [email protected]:0;
To: : [email protected]:0;
Call ID: : [email protected]

Release Information

Command introduced in Junos OS Release 7.4.

RELATED DOCUMENTATION

clear services stateful-firewall sip-register

show services stateful-firewall statistics

IN THIS SECTION

Syntax | 1279

Description | 1279

Options | 1279

Required Privilege Level | 1279

Output Fields | 1279

Sample Output | 1288

Release Information | 1290


1279

Syntax

show services stateful-firewall statistics


<application-protocol protocol>
<brief | detail | extensive | summary>
<interface interface-name>
<service-set service-set>

Description

Display stateful firewall statistics.

Options

none Display standard information about all stateful firewall statistics.

brief | detail | extensive | (Optional) Display the specified level of output.


summary
interface interface-name (Optional) Display information about a particular interface. On M Series and
T Series routers, the interface-name can be ms-fpc/pic/port or rspnumber.

service-set service-set (Optional) Display information about a particular service set.

Required Privilege Level

view

Output Fields

Table 106 on page 1279 lists the output fields for the show services stateful-firewall statistics
command. Output fields are listed in the approximate order in which they appear.

Table 106: show services stateful-firewall statistics Output Fields

Field Name Field Description

Interface Name of an adaptive services interface.


1280

Table 106: show services stateful-firewall statistics Output Fields (Continued)

Field Name Field Description

Service set Name of a service set.

New flows Rule match counters for new flows:

• Rule Accepts—New flows accepted.

• Rule Discards—New flows discarded.

• Rule Rejects—New flows rejected.

Existing flow types Rule match counters for existing flows:


packet counters
• Accepts—Match existing forward or watch flow.

• Drop—Match existing discard flow.

• Rejects—Match existing reject flow.

Hairpinning Hairpinning counters:


Counters
• Slow Path Hairpinned Packets—Slow path packets that were hairpinned
back to the internal network.

• Fast Path Hairpinned Packets—Fast path packets that were hairpinned back
to the internal network.

Drops Drop counters:

• IP option—Packets dropped in IP options processing.

• TCP SYN defense—Packets dropped by SYN defender.

• NAT ports exhausted—Hide mode. The router has no available Network


Address Translation (NAT) ports for a given address or pool.

• Sessions dropped due to subscriber flow limit—Sessions dropped because


the subscriber’s flow limit was exceeded.
1281

Table 106: show services stateful-firewall statistics Output Fields (Continued)

Field Name Field Description

Errors Total errors, categorized by protocol:

• IP—Total IP version 4 errors.

• TCP—Total Transmission Control Protocol (TCP) errors.

• UDP—Total User Datagram Protocol (UDP) errors.

• ICMP—Total Internet Control Message Protocol (ICMP) errors.

• Non-IP packets—Total non-IPv4 errors.

• ALG—Total application-level gateway (ALG) errors


1282

Table 106: show services stateful-firewall statistics Output Fields (Continued)

Field Name Field Description

IP Errors IPv4 errors:

• IP packet length inconsistencies—IP packet length does not match the


Layer 2 reported length.

• Minimum IP header length check failures—Minimum IP header length is


20 bytes. The received packet contains less than 20 bytes.

• Reassembled packet exceeds maximum IP length—After fragment


reassembly, the reassembled IP packet length exceeds 65,535.

• Illegal source address 0—Source address is not a valid address. Invalid


addresses are, loopback, broadcast, multicast, and reserved addresses.
Source address 0, however, is allowed to support BOOTP and the
destination address 0xffffffff.

• Illegal destination address 0—Destination address is not a valid address.


The address is reserved.

• TTL zero errors—Received packet had a time-to-live (TTL) value of 0.

• Illegal IP protocol number (0 or 255)—IP protocol is 0 or 255.

• Land attack—IP source address is the same as the destination address.

• Non-IPv4 packets—Packet was not IPv4. (Only IPv4 is supported.)

• Bad checksum—Packet had an invalid IP checksum.

• Illegal IP fragment length—Illegal fragment length. All fragments (other than


the last fragment) must have a length that is a multiple of 8 bytes.

• IP fragment overlap—Fragments have overlapping fragment offsets.

• IP fragment reassembly timeout—Some of the fragments for an IP packet


were not received in time, and the reassembly handler dropped partial
fragments.

• IP fragment limit exceeded: 0—Fragments that exceeded the limit.

• Unknown: 0—Unknown fragments.


1283

Table 106: show services stateful-firewall statistics Output Fields (Continued)

Field Name Field Description

TCP Errors TCP protocol errors:

• TCP header length inconsistencies—Minimum TCP header length is


20 bytes, and the IP packet received does not contain at least 20 bytes.

• Source or destination port number is zero—TCP source or destination port is


zero.

• Illegal sequence number and flags combinations — Dropped because of TCP


errors, such as an illegal sequence number, which causes an illogical
combination of flags to be set.

• SYN attack (multiple SYN messages seen for the same flow)—Multiple SYN
packets received for the same flow are treated as a SYN attack. The packets
might be retransmitted SYN packets and therefore valid, but a large number
is cause for concern.

• First packet not a SYN message—First packets for a connection are not SYN
packets. These packets might originate from previous connections or from
someone performing an ACK/FIN scan.

• TCP port scan (TCP handshake, RST seen from server for SYN)—In the case
of a SYN defender, if an RST (reset) packet is received instead of a SYN/ACK
message, someone is probably trying to scan the server. This behavior can
result in false alarms if the RST packet is not combined with an intrusion
detection service (IDS).

• Bad SYN cookie response—SYN cookie generates a SYN/ACK message for


all incoming SYN packets. If the ACK received for the SYN/ACK message
does not match, this counter is incremented.

• TCP reconstructor sequence number error—This counter is incremented in


the following cases:

The TCP seqno is 0 and all the TCP flags are also 0.

The TCP seqno is 0 and FIN/PSH/URG TCP flags are set.

• TCP reconstructor retransmissions—This counter is incremented for the


retransmitted packets during connection 3-way handshake.
1284

Table 106: show services stateful-firewall statistics Output Fields (Continued)

Field Name Field Description

• TCP partially opened connection timeout (SYN)—This counter is


incremented when the SYN Defender is enabled and the 3-way handshake is
not completed within the SYN DEFENDER TIMEOUT. The connection will
be closed and resources will be released by sending RST to the responder.

• TCP partially opened connection timeout (SYN-ACK)—This counter is


incremented when the SYN Defender is enabled and the 3-way handshake is
not completed within the SYN DEFENDER TIMEOUT. The connection will
be closed and resources will be released by sending RST to the responder.

• TCP partially closed connection reuse—Not supported.

• TCP 3-way error - client sent SYN+ACK—A SYN/ACK should be sent by the
server on receiving a SYN. This counter is incremented when the first
message received from the initiator is SYN+ACK.

• TCP 3-way error - server sent ACK—ACK should be sent by the client on
receiving a SYN/ACK from the server. This counter is incremented when the
ACK is received from the Server instead of from the Client.

• TCP 3-way error - SYN seq number retransmission mismatch—This counter


is incremented when the SYN is received again with a different sequence
number from the first SYN sequence number.

• TCP 3-way error - RST seq number mismatch—A reset could be received
from either side. The server could send a RST on receiving a SYN or the
client could send a RST on receiving SYN/ACK. This counter is incremented
when the RST is received either from the client or server with a non-
matching sequence number.

• TCP 3-way error - FIN received—This counter is incremented when the FIN
is received during the 3-way handshake.

• TCP 3-way error - invalid flags (PSH, URG, ECE, CWR)—This counter is
incremented when any of the PSH, URG, ECE, or CWR flags were received
during the 3-way handshake.

• TCP 3-way error - SYN recvd but no client flows—This counter is


incremented when SYN is received but not from the connection initiator.
1285

Table 106: show services stateful-firewall statistics Output Fields (Continued)

Field Name Field Description

The counter is not incremented in the case of simultaneous open, when the
SYN is received in both the directions.

• TCP 3-way error - first packet SYN+ACK—The first packet received was
SYN+ACK instead of SYN.

• TCP 3-way error - first packet FIN+ACK—The first packet received was FIN
+ACK instead of SYN.

• TCP 3-way error - first packet FIN—The first packet received was FIN
instead of SYN.

• TCP 3-way error - first packet RST—The first packet received was RST
instead of SYN.

• TCP 3-way error - first packet ACK—The first packet received was ACK
instead of SYN.

• TCP 3-way error - first packet invalid flags (PSH, URG, ECE, CWR)—The first
packet received had invalid flags.

• TCP Close error - no final ACK—This counter is incremented when ACK is


not received after the FINs are received from both directions.

• TCP Resumed Flow—Plain ACKs create flows if rule match permits, and
these are classified as TCP Resumed Flows. This counter is incremented in
the case of a TCP Resumed Flow.

UDP Errors UDP protocol errors:

• IP data length less than minimum UDP header length (8 bytes)—Minimum


UDP header length is 8 bytes. The received IP packets contain less than
8 bytes.

• Source or destination port is zero—UDP source or destination port is 0.

• UDP port scan (ICMP error seen for UDP flow)—ICMP error is received for a
UDP flow. This could be a genuine UDP flow, but it is counted as an error.
1286

Table 106: show services stateful-firewall statistics Output Fields (Continued)

Field Name Field Description

ICMP Errors ICMP protocol errors:

• IP data length less than minimum ICMP header length (8 bytes)—ICMP


header length is 8 bytes. This counter is incremented when received IP
packets contain less than 8 bytes.

• ICMP error length inconsistencies—Minimum length of an ICMP error


packet is 48 bytes, and the maximum length is 576 bytes. This counter is
incremented when the received ICMP error falls outside this range.

• Duplicate ping sequence number—Received ping packet has a duplicate


sequence number.

• Mismatched ping sequence number—Received ping packet has a


mismatched sequence number.

• No matching flow—No matching existing flow was found for the ICMP error.
1287

Table 106: show services stateful-firewall statistics Output Fields (Continued)

Field Name Field Description

ALG errors Accumulation of all the application-level gateway protocol (ALG) drops counted
separately in the ALG context:

• BOOTP—Bootstrap protocol errors

• DCE-RPC—Distributed Computing Environment-Remote Procedure Call


protocols errors

• DCE-RPC portmap—Distributed Computing Environment-Remote Procedure


Call protocols portmap service errors

• DNS—Domain Name System protocol errors

• Exec—Exec errors

• FTP—File Transfer Protocol errors

• H323—H.323 standards errors

• ICMP—Internet Control Message Protocol errors

• IIOP—Internet Inter-ORB Protocol errors

• Login—Login errors

• NetBIOS—NetBIOS errors

• Netshow—NetShow errors

• Real Audio—RealAudio errors

• RPC—Remote Procedure Call protocol errors

• RPC portmap—Remote Procedure Call protocol portmap service errors

• RTSP—Real-Time Streaming Protocol errors

• Shell—Shell errors

• SIP—Session Initiation Protocol errors

• SNMP—Simple Network Management Protocol errors


1288

Table 106: show services stateful-firewall statistics Output Fields (Continued)

Field Name Field Description

• SQLNet—SQLNet errors

• TFTP—Trivial File Transfer Protocol errors

• Traceroute—Traceroute errors

Drop Flows • Maximum Ingress Drop flows allowed-–Maximum number of ingress flow
drops allowed.

• Maximum Egress Drop flows allowed-–Maximum number of egress flow


drops allowed.

• Current Ingress Drop flows-–Current number of ingress flow drops.

• Current Egress Drop flows-–Current number of egress flow drops.

• Ingress Drop Flow limit drops count-–Number of ingress flow drops due to
maximum number of ingress flow drops being exceeded.

• Egress Drop Flow limit drops count-–Number of egress flow drops due to
maximum number of egress flow drops being exceeded.

Sample Output

show services stateful-firewall statistics extensive

user@host> show services stateful-firewall statistics extensive


Interface: ms-1/3/0
Service set: interface-svc-set
New flows:
Rule Accepts: 907, Rule Discards: 0, Rule Rejects: 0
Existing flow types packet counters:
Accepts: 3535, Drop: 0, Rejects: 0
Haripinning counters:
Slow Path Hairpinned Packets: 0, Fast Path Hairpinned Packets: 0
Drops:
IP option: 0, TCP SYN defense: 0
1289

NAT ports exhausted: 0, Sessions dropped due to subscriber flow limit: 0


Errors:
IP: 0, TCP: 0
UDP: 0, ICMP: 0
Non-IP packets: 0, ALG: 0
IP errors:
IP packet length inconsistencies: 0
Minimum IP header length check failures: 0
Reassembled packet exceeds maximum IP length: 0
Illegal source address: 0
Illegal destination address: 0
TTL zero errors: 0, Illegal IP protocol number (0 or 255): 0
Land attack: 0
Non-IPv4 packets: 0, Bad checksum: 0
Illegal IP fragment length: 0
IP fragment overlap: 0
IP fragment reassembly timeout: 0
IP fragment limit exceeded:0
Unknown: 0
TCP errors:
TCP header length inconsistencies: 0
Source or destination port number is zero: 0
Illegal sequence number and flags combination: 0
SYN attack (multiple SYN messages seen for the same flow): 0
First packet not a SYN message: 0
TCP port scan (TCP handshake, RST seen from server for SYN): 0
Bad SYN cookie response: 0
TCP reconstructor sequence number error: 0
TCP reconstructor retransmissions: 0
TCP partially opened connection timeout (SYN): 0
TCP partially opened connection timeout (SYN-ACK): 0
TCP partially closed connection reuse: 0
TCP 3-way error - client sent SYN+ACK: 0
TCP 3-way error - server sent ACK: 0
TCP 3-way error - SYN seq number retransmission mismatch: 0
TCP 3-way error - RST seq number mismatch: 0
TCP 3-way error - FIN received: 0
TCP 3-way error - invalid flags (PSH, URG, ECE, CWR): 0
TCP 3-way error - SYN recvd but no client flows: 0
TCP 3-way error - first packet SYN+ACK: 0
TCP 3-way error - first packet FIN+ACK: 0
TCP 3-way error - first packet FIN: 0
TCP 3-way error - first packet RST: 0
1290

TCP 3-way error - first packet ACK: 0


TCP 3-way error - first packet invalid flags (PSH, URG, ECE, CWR): 0
TCP Close error - no final ACK: 0
TCP Resumed Flow: 0
UDP errors:
IP data length less than minimum UDP header length (8 bytes): 0
Source or destination port is zero: 0
UDP port scan (ICMP error seen for UDP flow): 0
ICMP errors:
IP data length less than minimum ICMP header length (8 bytes): 0
ICMP error length inconsistencies: 0
Duplicate ping sequence number: 0
Mismatched ping sequence number: 0
No matching flow: 0
ALG errors:
BOOTP: 0, DCE-RPC: 0, DCE-RPC portmap: 0
DNS: 0, Exec: 0, FTP: 0
H323: 0, ICMP: 0, IIOP: 0
Login: 0, NetBIOS: 0, Netshow: 0
Real Audio: 0, RPC: 0, RPC portmap: 0
RTSP: 0, Shell: 0, SIP: 0
SNMP: 0, SQLNet: 0, TFTP: 0
Traceroute: 0
Drop Flows:
Maximum Ingress Drop flows allowed: 20
Maximum Egress Drop flows allowed: 20
Current Ingress Drop flows: 0
Current Egress Drop flows: 0
Ingress Drop Flow limit drops count: 0
Egress Drop Flow limit drops count: 0

**If max-drop-flows is not configured, the following is shown**


Drop Flows:
Maximum Ingress Drop flows allowed: Default
Maximum Egress Drop flows allowed: Default

Release Information

Command introduced before Junos OS Release 7.4.


1291

RELATED DOCUMENTATION

clear services stateful-firewall statistics

show services stateful-firewall statistics application-protocol sip

IN THIS SECTION

Syntax | 1291

Description | 1291

Options | 1291

Required Privilege Level | 1291

Output Fields | 1292

Sample Output | 1294

Release Information | 1295

Syntax

show services stateful-firewall application-protocol sip

Description

Display stateful firewall Session Initiation Protocol (SIP) statistics.

Options

This command has no options.

Required Privilege Level

view
1292

Output Fields

Table 107 on page 1292 lists the output fields for the show services stateful-firewall statistics
application-protocol-sip command. Output fields are listed in the approximate order in which they
appear.

Table 107: show services stateful-firewall statistics application-protocol-sip Output Fields

Field Name Field Description

Interface Name of an adaptive services interface.

Service set Name of the service set flow.

ALG Name of the application-layer gateway.

Active SIP call Number of active SIP calls.


count

Active SIP Number of active SIP registrations.


registration count

REGISTER Number of new, invalid, and retransmitted register requests sent to the SIP
registrar.

INVITE Number of new, invalid, and retransmitted invite messages sent by user agent
clients.

ReINVITE Number of new, invalid, and retransmitted reinvite messages sent by user agent
clients.

ACK Number of new, invalid, and retransmitted ACK messages received (in response to
a SIP Call Invite message).

BYE Number of new, invalid, and retransmitted requests to terminate SIP dialogues.
1293

Table 107: show services stateful-firewall statistics application-protocol-sip Output Fields (Continued)

Field Name Field Description

CANCEL Number of new, invalid, and retransmitted SIP request cancellations.

SUBSCRIBE Number of new, invalid, and retransmitted SIP requests to subscribe for event
notifications.

NOTIFY Number of new, invalid, and retransmitted event notifications in SIP dialogues.

OPTIONS Number of new, invalid, and retransmitted requests to query SIP capabilities.

INFO Number of new, invalid, and retransmitted requests carrying application-level


information.

UPDATE Number of new, invalid, and retransmitted SIP dialogue updates.

REFER Number of new, invalid, and retransmitted requests to the recipient to contact a
third party.

Provisional Number of new, invalid, and retransmitted responses from the user agent server to
responses indicate the progress of a SIP transaction.

OK responses to OK responses sent from the user agent clients to user agent servers in response to
INVITEs Invite messages. The server can then return an ACK message.

OK responses to OK responses to SIP messages other than an Invite message.


non-INVITES

Redirection Responses from the user agent server to a user agent client requesting the client to
responses contact a different SIP uniform resource identifier (URI).

Request failure Responses that indicate a definite failure from a particular server. The client must
responses not retry the same request without modification after receiving this response.
1294

Table 107: show services stateful-firewall statistics application-protocol-sip Output Fields (Continued)

Field Name Field Description

Server failure Responses that indicate a server failure.


responses

Global failure Responses that indicate a server has definitive information about a particular user,
responses not just the particular instance indicated in the Request URI.

Invalid responses Responses that are invalid.

Response (all) Retransmissions of all responses.


retransmits

Parser Syntax errors, content errors, and unknown methods counted by the message
parser.

Sample Output

show services stateful-firewall statistics application-protocol-sip

user@host> show services stateful-firewall statistics application-protocol sip


Interface: sp-0/3/0
Service set: test_sip_777, ALG: SIP
Active SIP call count: 0, Active SIP registration count: 1
New Invalid Retransmit
REGISTER 2
INVITE 1 0
ReINVITE 1
ACK 1 0 0
BYE 0 0
CANCEL 0 0
SUBSCRIBE 0 0
NOTIFY 0 0
OPTIONS 0 0
INFO 0 0
1295

UPDATE 0 0
REFER 0 0
Provisional responses (18x): 1, OK responses to INVITEs: 2
OK responses to non-INVITEs: 2, Redirection (3xx) responses: 0
Request failure (4xx) responses: 0, Server failure (5xx) responses: 0
Global failure (6xx) responses: 0, Invalid responses: 0
Response (all) retransmits: 0
Parser:
Syntax errors: 0, Content errors: 0, Unknown methods: 0
Service set: test_sip_888, ALG: SIP
Active SIP call count: 0, Active SIP registration count: 1
New Invalid Retransmit
REGISTER 2
INVITE 0 0
ReINVITE 0
ACK 0 0 0
BYE 0 0
CANCEL 0 0
SUBSCRIBE 0 0
NOTIFY 0 0
OPTIONS 0 0
INFO 0 0
UPDATE 0 0
REFER 0 0
Provisional responses (18x): 0, OK responses to INVITEs: 0
OK responses to non-INVITEs: 2, Redirection (3xx) responses: 0
Request failure (4xx) responses: 0, Server failure (5xx) responses: 0
Global failure (6xx) responses: 0, Invalid responses: 0
Response (all) retransmits: 0
Parser:
Syntax errors: 0, Content errors: 0, Unknown methods: 0

Release Information

Command introduced in Junos OS Release 7.4.


1296

show services subscriber analysis

IN THIS SECTION

Syntax | 1296

Description | 1296

Options | 1296

Required Privilege Level | 1296

Output Fields | 1297

Sample Output | 1298

Release Information | 1299

Syntax

show services subscriber analysis


<interface interface-name>

Description

Display information about the number of active subscribers on the services PIC.

Options

none Display standard information about all active subscribers on the PIC.

interface interface-name (Optional) Display information about the specified interface.

Required Privilege Level

view
1297

Output Fields

Table 108 on page 1297 lists the output fields for the show services subscriber analysis command.
Output fields are listed in the approximate order in which they appear.

Table 108: show services subscriber analysis Output Fields

Field Name Field Description

Services PIC Name Name of an adaptive services interface.

Subscriber Analysis Statistics:

Total Subscribers Active Total number of subscribers currently active on the service PIC.

Created Subscribers per Rate at which subscribers are currently being created on the service
Second PIC.

Deleted Subscribers per Rate at which subscribers are currently being deleted on the service
Second PIC.

Peak Total Subscribers Active Highest number of subscribers that were active during the lifetime
of the service PIC.

Peak Created Subscribers per Highest rate at which subscribers were being created during the
Second lifetime of the service PIC.

Peak Deleted Subscribers per Highest rate at which subscribers were being deleted during the
Second lifetime of the service PIC.

Number of Samples Number of samples during the current sampling period lifetime.

Subscriber Rate Distribution(sec)


1298

Table 108: show services subscriber analysis Output Fields (Continued)

Field Name Field Description

Subscriber Operation: Creation Number of sampling intervals during which a number of subscribers
in the indicated range were created during the current sampling
period.

Subscriber Operation: Deletion Number of sampling intervals during which a number of subscribers
in the indicated range were deleted during the current sampling
period.

Sample Output

show services subscriber analysis interface

user@host> show services subscriber analysis interface ms-5/1/0


Services PIC Name: ms-5/1/0

Subscriber Analysis Statistics:

Total Subscribers Active :0


Created Subscribers per Second :0
Deleted Subscribers per Second :0
Peak Total Subscribers Active :0
Peak Created Subscribers per Second :0
Peak Deleted Subscribers per Second :0

Subscriber Rate Data:


Number of Samples: 3916

Subscriber Rate Distribution(sec)

Subscriber Operation :Creation

400000+ :0
350001 - 400000 :0
300001 - 350000 :0
250001 - 300000 :0
1299

200001 - 250000 :0
160001 - 200000 :0
150001 - 160000 :0
50001 - 150000 :0
40001 - 50000 :0
30001 - 40000 :0
20001 - 30000 :0
10001 - 20000 :0
1001 - 10000 :0
1 - 1000 :0
0 :3916

Subscriber Operation :Deletion

400000+ :0
350001 - 400000 :0
300001 - 350000 :0
250001 - 300000 :0
200001 - 250000 :0
160001 - 200000 :0
150001 - 160000 :0
50001 - 150000 :0
40001 - 50000 :0
30001 - 40000 :0
20001 - 30000 :0
10001 - 20000 :0
1001 - 10000 :0
1 - 1000 :0
0 :3916

Release Information

Statement introduced in Junos OS Release 17.1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
1300

show services tcp-log

IN THIS SECTION

Syntax | 1300

Description | 1300

Required Privilege Level | 1300

Sample Output | 1300

Release Information | 1301

Syntax

show services tcp-log

Description

Display the specified TCP log.

Required Privilege Level

Sample Output

show services tcp-log

user@host> show services tcp-log


user@hst> show services tcp-log log1
Interface: vms-1/0/0

State: Reconnect-In-Progress
5.5.5.1 -> 70.0.0.2 : 514
1301

Release Information

Command introduced in Junos OS Release 19.3R2.

show services traffic-load-balance statistics

IN THIS SECTION

Syntax | 1301

Description | 1301

Options | 1302

Required Privilege Level | 1302

Output Fields | 1302

Sample Output | 1312

Release Information | 1319

Syntax

show services traffic-load-balance statistics


<extensive>
<group group-name>
<instance instance-name>
<num-instances number>
<real-service real-service-name>
<summary>
<virtual-service virtual-service-name>

Description

The basic form of the command displays the list of real servers associated with this group and traffic
statistics, including packet count and byte count
1302

Options

none Display information about the load-balancing statistics in brief.

extensive (Optional) Display extensive information about the traffic load-balancing


statistics.

group group-name (Optional) Display load-balancing statistics for a specified group of load-
balancer servers.

instance instance-name (Optional) Display load-balancing statistics for a specific traffic load balancer
(TLB) instance.

num-instances number (Optional) Display load-balancing statistics for a specified number of TLB
instances.

real-service real- (Optional) Display load-balancing statistics for a specified load balancer serve.
service-name
summary (Optional) Display summary information about the traffic load-balancing
statistics.

virtual-service virtual- (Optional) Display load-balancing statistics for a specified TLB virtual service.
service-name

Required Privilege Level

view

Output Fields

Table 109 on page 1302 lists the output fields for the show services traffic-load-balance statistics
command. Output fields are listed in the approximate order in which they appear.

Table 109: show services traffic-load-balance statistics Output Fields

Field Name Field Description Level of Output

Traffic load Name of the traffic load balancer (TLB) instance that contains All levels
balance the load-distribution-related configuration settings.
instance name
1303

Table 109: show services traffic-load-balance statistics Output Fields (Continued)

Field Name Field Description Level of Output

Multi services Name of the services interface used for the TLB instance to All levels
interface name provide one-to-one redundancy for server health monitoring.

For MS-MPC services card, this is the name of the aggregated


multiservices (AMS) interface or “ms-slot/pic/port”.

For Next Gen Services and the MX-SPC3 services card, this is
the name of the VMS interface or “vms-slot/pic/port”.

Interface state Inter-process communications (IPC) status between the TLB All levels
daemon (traffic-dird) and the health checking daemon (net-
monitord).

• DOWN

• UP

Interface type Logical interface type. All levels

Route hold Time that the programmed VIP routes are kept intact after All levels
timer connectivity between traffic-dird and net-monitord daemons is
lost. If connectivity is not reestablished within this time, all the
VIP routes are withdrawn.

Traffic load Name of the virtual service for the TLB instance. The virtual none
balance virtual service provides an address that is associated with the group of
extensive
svc name servers to which traffic is directed.

Virtual service Name of the virtual service for the TLB instance. The virtual summary
service provides an address that is associated with the group of
servers to which traffic is directed.

Routing Name of the routing instance used for the virtual service. none
instance name
extensive
1304

Table 109: show services traffic-load-balance statistics Output Fields (Continued)

Field Name Field Description Level of Output

IP address IP address of the virtual service. none

extensive

Address IP address of the virtual service. summary

Sts Operational state of the virtual service. summary

Packet Sent Number of packets originating from the clients that the TLB summary
instance virtual service processes for load balancing to next-hop
servers.

Byte Sent Number of bytes originating from the clients that the TLB summary
instance virtual service processes for load balancing to next-hop
servers.

Packet Recv Number of packets returning from the next-hop servers that the summary
TLB instance virtual service processes and forwards to the
clients.

Byte Recv Number of bytes returning from the next-hop servers that the summary
TLB instance virtual service processes and forwards to the
clients.

Virtual service Virtual service processing mode. none


mode
• layer-2-direct-server-return—Virtual service is in transparent extensive
mode with Layer 2 direct server return (DSR)

• direct-server-return—Virtual service is in transparent mode


with Layer 3 direct server return (DSR)

• translated—Virtual service is in translated mode.


1305

Table 109: show services traffic-load-balance statistics Output Fields (Continued)

Field Name Field Description Level of Output

Traffic load Server group name used for the virtual service. none
balance group
extensive
name

Health check Number of the subunit of the multiservice interface used for none
interface health checking.
extensive
subunit

Traffic load Number of times the status of the TLB server group was down. extensive
balance group
down count

Protocol Virtual service protocol, either tcp or udp. In translated mode, none
packets destined to the virtual service IP address+port number
extensive
+protocol are load balanced and then replaced by the real
service IP address and server listening port number.

Port Number Virtual service port number. In translated mode, packets none
destined to the virtual service IP address+port number+protocol
extensive
are load balanced and then replaced by the real service IP
address and server listening port number.

Server Real service port number that replaces the virtual service port none
Listening Port number. In translated mode, packets destined to the virtual
extensive
Number service IP address+port number+protocol are load balanced and
then replaced by the real service IP address and server listening
port number.

Demux Index number of the demultiplexing next hop for the virtual none
Nexthop index service. Index number is unique for a VIP, routing-instance, and
extensive
protocol combination. The demultiplexing next hop is
responsible for port-based demultiplexing of traffic to the load-
balancing next hop for session distribution.
1306

Table 109: show services traffic-load-balance statistics Output Fields (Continued)

Field Name Field Description Level of Output

DFW client-id Client connection identifier assigned to the TLB daemon (traffic- extensive
dird) by the firewall daemon (dfwd) when the daemons are
successfully connected.

Traffic load Time, in seconds, that passes after the traffic-dird daemon extensive
balance group comes up until the traffic-dird programs the distribution table on
warmup time the Packet Forwarding Engine.

Traffic load Indicates whether the option that allows a server to rejoin the extensive
balance group group automatically when it comes up is enabled or not.
auto-rejoin

Route metric Routing metric assigned to the virtual service. A lower metric extensive
makes a route more preferred.

Virtual service Number of times the status of the virtual service was down. extensive
down count

Traffic load Hash key parameter used for load balancing. Hash keys extensive
balance hash supported in the ingress direction are protocol, source IP
method address, and destination IP address.

Nexthop index Index number of the next-hop for the virtual service. A group of none
servers function as a pool for next-hop session distribution.
extensive

Up time Period of time for which the virtual service is up, in the format none
number-of-days hh:mm:ss.
extensive

Real Server Up Starting in Junos OS Release 16.1R6 and 18.2R1, number of real none
count servers that are up for the specified virtual service or server
group.
1307

Table 109: show services traffic-load-balance statistics Output Fields (Continued)

Field Name Field Description Level of Output

Real Server Starting in Junos OS Release 16.1R6 and 18.2R1, number of real none
Down count servers that are down for the specified virtual service or server
group.

Total packet Number of packets originating from the clients that the TLB none
sent count instance virtual service processes for load balancing to next-hop
extensive
servers.

Total byte sent Number of bytes originating from the clients that the TLB none
count instance virtual service processes for load balancing to next-hop
extensive
servers.

Total packet Number of packets returning from the next-hop servers that the none
received count TLB instance virtual service processes and forwards to the
extensive
clients.

Total byte Number of bytes returning from the next-hop servers that the none
received count TLB instance virtual service processes and forwards to the
extensive
clients.

Network Number of network monitoring profiles that are used to monitor extensive
monitoring the health of servers used in TLB session distribution.
profile count

Active real Number of real services that are functional and active. extensive
service count

Total real Total number of real services in different states. extensive


service count
1308

Table 109: show services traffic-load-balance statistics Output Fields (Continued)

Field Name Field Description Level of Output

Network Unique index number associated with the network monitoring extensive
monitoring profile. Network monitoring profiles are used to monitor the
profile index health of servers used in TLB session distribution.

Network Name configured for the network monitoring profile. extensive


monitoring
profile name

Probe type Probe type used to examine the health of servers. TLB supports extensive
ICMP, TCP, and HTTP health check probes to monitor the health
of servers in a group.

Probe interval Frequency, in number of seconds, at which health check probes extensive
are sent.

Probe failure Number of failure retries, after which the real service is tagged extensive
retry count as down.

Probe Number of successful retries after which the real service is extensive
recovery retry tagged as up.
count

Real service Name of the TLB server (also referred to as real service). The none
name is the identifier for a server to which sessions can be
distributed using the server distribution table in conjunction with
the session distribution API.

Address IP address of the configured real service. none

Sts Operational state of the TLB server. none


1309

Table 109: show services traffic-load-balance statistics Output Fields (Continued)

Field Name Field Description Level of Output

Packet Sent Number of packets originating from the clients that the TLB none
instance virtual service sends to the real service.

Byte Sent Number of bytes originating from the clients that the TLB none
instance virtual service sends to the real service next-hop server.

Packet Recv Number of packets returning from the real service next-hop none
server that the TLB instance virtual service processes and
forwards to the clients.

Byte Recv Number of bytes returning from the real service next-hop server none
that the TLB instance virtual service processes and forwards to
the clients.

Traffic load Name of the real service used for traffic load-balancing. extensive
balance real
svc name

Routing Name of the routing instance on which the real service is extensive
instance name configured.

IP address IP address of the configured real service. extensive

Traffic load Name of the server group for real service. extensive
balance group
name

Admin state Administrative state of the real service, such as Up or Down. extensive

Oper state Operational state of the real service, such as Up or Down. extensive
1310

Table 109: show services traffic-load-balance statistics Output Fields (Continued)

Field Name Field Description Level of Output

Network Number of probes for which the status of the server whose extensive
monitoring health is checked is observed to be up. If a server group is
probe up configured for dual health check, a real service is declared to be
count UP only if both health-check probes are simultaneously UP;
otherwise a real service declared to be DOWN.

Network Number of probes for which the status of the server whose extensive
monitoring health is checked is observed to be down.
probe down
count

Total rejoin Number of events that caused a server that was previously down extensive
event count and later operational to rejoin a group of real services for load-
balancing.

Total up event Number of TLB events that identified a virtual service or real extensive
count service to be up.

Total down Number of TLB events that identified a virtual service or real extensive
event count service to be down.

Real Service Number of packets originating from the clients that the TLB extensive
packet sent instance virtual service sends to the real service.
count

Real Service Number of bytes originating from the clients that the TLB extensive
byte sent instance virtual service sends to the real service next-hop server.
count

Real Service Number of packets returning from the real service next-hop extensive
packet server that the TLB instance virtual service processes and
received count forwards to the clients.
1311

Table 109: show services traffic-load-balance statistics Output Fields (Continued)

Field Name Field Description Level of Output

Real Service Number of bytes returning from the real service next-hop server extensive
byte received that the TLB instance virtual service processes and forwards to
count the clients.

Total probe Number of health-monitoring probes sent from the TLB health extensive
sent check daemon.

Total probe Number of health-monitoring probes sent from the TLB health extensive
success check daemon that were successful.

Total probe fail Number of health-monitoring probes attempted to be sent from extensive
the TLB health check daemon that failed.

Total probe Number of health-monitoring probes attempted to be sent from extensive


sent fail the TLB health check daemon that were unsuccessfully initiated.

Probe state Status of the health-check probe, such as Up or Down. extensive

Probe sent Number of health-check probe requests transmitted from the extensive
TLB health check daemon.

Probe success Number of successful health-check probe requests transmitted extensive


from the TLB health check daemon.

Probe fail Number of failed health-check probe requests transmitted from extensive
the TLB health check daemon.

Probe sent Number of times the TLB health check daemon was unable to extensive
failed initiate transmission of a extensive health-check probe.
1312

Table 109: show services traffic-load-balance statistics Output Fields (Continued)

Field Name Field Description Level of Output

Probe Number of health-check probe requests transmitted from the extensive


consecutive TLB health check daemon that were consecutively successful.
success

Probe Number of health-check probe requests transmitted from the extensive


consecutive TLB health check daemon that failed for two successive times.
fail

Sample Output

show services traffic-load-balance statistics

user@host> show services traffic-load-balance statistics


Traffic load balance instance name : lb1
Multi services interface name : ms-3/0/0
Interface state : UP
Interface type : Multi services
Route hold timer : 180
Active real service count : 0
Total real service count : 100
Traffic load balance virtual svc name : v1
IP address : 0.0.0.0
Virtual service mode : Layer-2 based Direct Server Return mode
Routing instance name : internal-client-vrf
Traffic load balance group name : g1
Health check interface subunit : 40
Demux Nexthop index : N/A
Nexthop index : 840
Up time : 2d 19:09
Real Server Up count : 1
Real Server Down count : 1
Total packet sent count : 0
Total byte sent count : 0
Real service Address Sts Packet Sent Byte Sent Packet Recv Byte Recv
r11 203.0.113.11 UP 0 0 0 0
1313

r10 203.0.113.10 UP 0 0 0
0

Traffic load balance virtual svc name : v2


IP address : 192.0.2.11
Virtual service mode : Translate mode
Routing instance name : msp-tproxy-forwarding1
Traffic load balance group name : g2
Health check interface subunit : 50
Protocol : tcp
Port number : 8080
Server Listening Port Number : 8084
Demux Nexthop index : 536
Nexthop index : 539
Up time : 2d 19:06
Total packet sent count : 0
Total byte sent count : 0
Total packet received count : 0
Total byte received count : 0
Real service Address Sts Packet Sent Byte Sent Packet Recv Byte Recv
r12 203.0.113.12 UP 0 0 0
0
r13 203.0.113.13 UP 0 0 0
0

show services traffic-load-balance statistics extensive

user@host> show services traffic-load-balance statistics extensive


Traffic Load Balance General Information
DFW client-id : 39

Traffic load balance instance name : lb1


Multi services interface name : ms-3/0/0
Interface state : UP
Interface type : Multi services
Route hold timer : 180
Active real service count : 0
Total real service count : 100
Traffic load balance virtual svc name : v1
IP address : 0.0.0.0
Virtual service mode : Layer-2 based Direct Server Return mode
1314

Routing instance name : internal-client-vrf


Traffic load balance group name : g1
Traffic load balance group warmup time: 15
Traffic load balance group auto-rejoin: TRUE
Health check interface subunit : 40
Traffic load balance group down count : 1
Route metric : 1
Virtual service down count : 1
Traffic load balance hash method : source
Network monitoring profile count : 1
Active real service count : 2
Total real service count : 2
Demux Nexthop index : N/A
Nexthop index : 840
Up time : 2d 19:09
Total packet sent count : 0
Total byte sent count : 0
Total packet received count : 0
Total byte received count : 0
Network monitoring profile index : 1
Network monitoring profile name : prof1
Probe type : ICMP
Probe interval : 5
Probe failure retry count : 5
Probe recovery retry count : 3

Traffic load balance real svc name : r11


Routing instance name : server-vrf10
IP address : 203.0.113.11
Traffic load balance group name : g1
Admin state : UP
Oper state : UP
Network monitoring probe up count : 1
Network monitoring probe down count : 0
Total rejoin event count : 0
Total up event count : 1
Total down event count : 0
Real Service packet sent count : 0
Real Service byte sent count : 0
Total probe sent : 47939
Total probe success : 47918
Total probe fail : 21
Total probe sent failed : 0
1315

Network monitoring profile index : 1


Network monitoring profile name : prof1
Probe type : ICMP
Probe state : UP
Probe sent : 47939
Probe success : 47918
Probe fail : 21
Probe sent failed : 0
Probe consecutive success : 10090
Probe consecutive fail : 0

Traffic load balance real svc name : r10


Routing instance name : server-vrf10
IP address : 203.0.113.10
Traffic load balance group name : g1
Admin state : UP
Oper state : UP
Network monitoring probe up count : 1
Network monitoring probe down count : 0
Total rejoin event count : 0
Total up event count : 1
Total down event count : 0
Real Service packet sent count : 0
Real Service byte sent count : 0
Total probe sent : 47939
Total probe success : 47917
Total probe fail : 22
Total probe sent failed : 0
Network monitoring profile index : 1
Network monitoring profile name : prof1
Probe type : ICMP
Probe state : UP
Probe sent : 47939
Probe success : 47917
Probe fail : 22
Probe sent failed : 0
Probe consecutive success : 10090
Probe consecutive fail : 0

Traffic load balance virtual svc name : v2


IP address : 192.0.2.11
Virtual service mode : Translate mode
Routing instance name : msp-tproxy-forwarding1
1316

Traffic load balance group name : g2


Traffic load balance group warmup time: 15
Traffic load balance group auto-rejoin: TRUE
Health check interface subunit : 50
Traffic load balance group down count : 1
Protocol : tcp
Port number : 8080
Server Listening Port Number : 8084
Route metric : 1
Virtual service down count : 1
Traffic load balance hash method : source-destination
Network monitoring profile count : 1
Active real service count : 2
Total real service count : 2
Demux Nexthop index : 536
Nexthop index : 539
Up time : 2d 19:07
Total packet sent count : 0
Total byte sent count : 0
Total packet received count : 0
Total byte received count : 0
Network monitoring profile index : 1
Network monitoring profile name : prof1
Probe type : ICMP
Probe interval : 5
Probe failure retry count : 5
Probe recovery retry count : 3

Traffic load balance real svc name : r12


Routing instance name : server-vrf10
IP address : 203.0.113.12
Traffic load balance group name : g2
Admin state : UP
Oper state : UP
Network monitoring probe up count : 1
Network monitoring probe down count : 0
Total rejoin event count : 0
Total up event count : 1
Total down event count : 0
Real Service packet sent count : 0
Real Service byte sent count : 0
Real Service packet received count : 0
Real Service byte received count : 0
1317

Total probe sent : 47939


Total probe success : 47916
Total probe fail : 23
Total probe sent failed : 0
Network monitoring profile index : 1
Network monitoring profile name : prof1
Probe type : ICMP
Probe state : UP
Probe sent : 47939
Probe success : 47916
Probe fail : 23
Probe sent failed : 0
Probe consecutive success : 10089
Probe consecutive fail : 0

Traffic load balance real svc name : r13


Routing instance name : server-vrf10
IP address : 203.0.113.13
Traffic load balance group name : g2
Admin state : UP
Oper state : UP
Network monitoring probe up count : 1
Network monitoring probe down count : 0
Total rejoin event count : 0
Total up event count : 1
Total down event count : 0
Real Service packet sent count : 0
Real Service byte sent count : 0
Real Service packet received count : 0
Real Service byte received count : 0
Total probe sent : 47939
Total probe success : 47910
Total probe fail : 29
Total probe sent failed : 0
Network monitoring profile index : 1
Network monitoring profile name : prof1
Probe type : ICMP
Probe state : UP
Probe sent : 47939
Probe success : 47910
Probe fail : 29
Probe sent failed : 0
1318

Probe consecutive success : 6283


Probe consecutive fail : 0

show services traffic-load-balance statistics summary

user@host> show services traffic-load-balance statistics summary


Traffic load balance instance name : tlb_sdg
Multi services interface name : ms-8/3/0
Interface state : UP
Interface type : Multi services
Route hold timer : 180
Active real service count : 0
Total real service count : 100
Virtual service Address Sts Packet Sent Byte Sent Packet Recv Byte
Recv
DNS-VIP1-TCP 198.51.100.1 Up 13182260 709736171 11951566
732469940
DNS-VIP1-UDP 198.51.100.1 Up 2683203 163675383 2683101
262943898
HTTP-80-ADDRESS-VIP 203.0.113.156 Up 363080548 25152313876 282072340
280409712450
HTTP-8080-ADDR-VIP 203.0.113.157 Up 363198700 25318638843 282030640
280388777065
Secure-Ent-443-VIP 203.0.113.158 Up 30561467 3012763619 28007583
3992807922
Simple-Ent-80-VIP 203.0.113.159 Up 155857682 11558785554 89649255
79217609518

Traffic load balance instance name : tlb_sdg_v6


Multi services interface name : ms-8/3/0
Interface state : UP
Interface type : Multi services
Route hold timer : 180
Virtual service Address Sts Packet Sent Byte Sent Packet Recv Byte
Recv
DNS-VIP1-TCP-V6 2001:db8:a::300 Up 25118146 1829085032 24172053
2088425092
DNS-VIP1-UDP-V6 2001:db8:a::300 Up 1318497 108116747 1319249
386274267
HTTP-80-ADDR-VIP-V6 2001:db8:a::100 Up 368696950 33051271152 282178604
287789935055
1319

HTTP-8080-ADD-VIP-V6 2001:db8:a::100 Up 368797597 33217998028 281989122


287768684085
Sec-Ent-443-VIP-V6 2001:db8:a::200 Up 0662649 3622545250 28080924
4531356641

Release Information

Statement introduced in Junos OS Release 16.1.

num-instances option added in Junos OS Release 16.1R6 and 18.2R1 on MX Series.

Support added in Junos OS 19.3R2 for Next Gen Services with the MX-SPC3 services card.

show services web-filter dns-resolution profile

IN THIS SECTION

Syntax | 1319

Description | 1319

Options | 1320

Required Privilege Level | 1320

Output Fields | 1320

Sample Output | 1321

Release Information | 1323

Syntax

show services web-filter dns-resolution profile profile-name <template template-


name>
<fpc-slot fpc-slot pic-slot pic-slot>

Description

Display URL filter domain name system (DNS) resolution information.


1320

URL filtering resolves the disallowed domains. The total number of domains are divided into chunks of
50 domains per chunk. The filter term in the command output is the name of a chunk.

Options

fpc-slot fpc-slot pic-slot pic- (Optional) Specify the FPC and PIC for which you want URL filter
slot information displayed.

profile profile-name Specify the profile for which you want URL filter information displayed.

template template-name (Optional) Specify the template for which you want URL filter
information displayed.

Required Privilege Level

view

Output Fields

Table 110 on page 1320 lists the output fields for the show services web-filter dns-resolution profile
command. Output fields are listed in the approximate order in which they appear.

Table 110: show services web-filter dns-resolution profile Output Fields

Field Name Field Description

Profile Name of profile.

Template Name of template.

Filter Term Name of the domains chunk. All domains are divided into chunks of 50
domains per chunk.

IPv4 Address Count The number of IPv4 addresses resolved for all domains under the filter term.

IPv6 Address Count The number of IPv6 addresses resolved for all domains under the filter term.
1321

Table 110: show services web-filter dns-resolution profile Output Fields (Continued)

Field Name Field Description

Domain Name Name of domain.

IPv4 Records Listing of IPv4 addresses.

IPv6 Records Listing of IPv6 addresses.

Sample Output

show services web-filter dns-resolution profile

user@host> show services web-filter dns-resolution profile p1


URL filtering DNS resolution:
Profile: p1
Template: t1

1). Filter Term: URLF_t1_0004

IPv4 Address Count: 20


IPv6 Address Count: 20

1 ). Domain Name: www.example.com

IPv4 Records:
31.13.77.36
31.13.76.68

IPv6 Records:
2a03:2880:f122:83:face:b00c:0:25de
2a03:2880:f111:83:face:b00c:0:25de

2 ). Domain Name: www.youtube.com

IPv4 Records:
216.58.193.78
1322

216.58.194.206

IPv6 Records:
2607:f8b0:400a:800::200e
2607:f8b0:4005:809::200e

3 ). Domain Name: www.netflix.com

IPv4 Records:
50.112.200.248
52.10.96.2
52.25.242.211
52.39.87.182
52.38.44.92
52.36.125.176
52.40.2.42
52.42.184.64
52.5.80.199
52.206.203.18
52.5.231.14
52.21.94.89
52.71.118.87
52.201.133.109
52.71.122.233
52.203.136.33

IPv6 Records:
2620:108:700f::342a:b840
2620:108:700f::3644:fc64
2620:108:700f::3459:2ce1
2620:108:700f::3459:c025
2620:108:700f::3459:f556
2620:108:700f::3459:c5c5
2620:108:700f::3644:c2a0
2620:108:700f::342a:df11
2406:da00:ff00::3404:d29c
2406:da00:ff00::3415:a86e
2406:da00:ff00::3415:fda4
2406:da00:ff00::3414:91d2
2406:da00:ff00::3403:73dd
2406:da00:ff00::22c7:d016
2406:da00:ff00::3400:290b
1323

2406:da00:ff00::3213:c65f

Release Information

Command introduced in Junos OS Release 18.3R1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

show services web-filter dns-resolution-statistics profile template


show services web-filter statistics profile
Configuring URL Filtering

show services web-filter dns-resolution-statistics profile template

IN THIS SECTION

Syntax | 1324

Description | 1324

Options | 1324

Required Privilege Level | 1324

Output Fields | 1324

Sample Output | 1327

Release Information | 1329


1324

Syntax

show services web-filter dns-resolution-statistics profile profile-name template


template-name
(extensive | summary)

Description

Display URL filter domain name system (DNS) resolution statistics.

Options

(extensive | summary) Specify the level of detail of information you want displayed.

profile profile-name Specify the profile for which you want URL filter information displayed.

template template-name Specify the template for which you want URL filter information displayed.

Required Privilege Level

view

Output Fields

Table 111 on page 1324 lists the output fields for the show services web-filter dns-resolution-statistics
profile template command. Output fields are listed in the approximate order in which they appear.

Table 111: show services web-filter dns-resolution-statistics profile template Output Fields

Field Name Field Description Level of Detail

Profile Name of profile. all

Template Name of template. all

DNS start time Start time of the DNS summary


resolution.
1325

Table 111: show services web-filter dns-resolution-statistics profile template Output Fields
(Continued)

Field Name Field Description Level of Detail

Next DNS start time Start time of the next DNS summary
resolution.

Number of resolved A Number of resolved IPv4 summary


addresses addresses.

Number of resolved AAAA Number of resolved IPv6 summary


addresses addresses.

Number of unresolved A Number of unresolved IPv4 summary


addresses addresses.

Number of unresolved AAAA Number of unresolved IPv6 summary


addresses addresses.

Number of resolved A domains Number of resolved IPv4 summary


domains.

Number of resolved AAAA Number of resolved IPv6 summary


domains domains.

Number of unresolved A Number of unresolved IPv4 summary


domains domains.

Number of unresolved AAAA Number of unresolved IPv6 summary


domains domains.

Number of requests sent Number of DNS requests sent. summary


1326

Table 111: show services web-filter dns-resolution-statistics profile template Output Fields
(Continued)

Field Name Field Description Level of Detail

Number of responses received Number of DNS responses summary


received.

Domain Name Name of domain. extensive

IPv4 Address information IPv4 address information extensive


includes the following fields:

• DNS server IP—IPv4 address


of DNS server.

• Req Sent—Number of DNS


requests sent.

• Resp Received—Number of
DNS responses received.

• DNS retries—Number of
times no DNS response was
received and so retried.

IPv6 Address information IPv6 address information extensive


includes the following fields:

• DNS server IP—IPv6 address


of DNS server.

• Req Sent—Number of DNS


requests sent.

• Resp Received—Number of
DNS responses received.

• DNS retries—Number of
times no DNS response was
received and so retried.
1327

Sample Output

show services web-filter dns-resolution-statistics profile template summary

user@host> show services web-filter dns-resolution-statistics profile1 template t1 summary


URL filtering DNS resolution statistics:
Profile: p1
Template: t1

DNS start time : May 01 16:40:24 PDT


Next DNS start time : May 01 17:40:24 PDT
Number of resolved A domains : 114
Number of resolved AAAA domains : 114
Number of unresolved A domains : 0
Number of unresolved AAAA domains : 0
Number of requests sent : 246
Number of responses received : 228

show services web-filter dns-resolution-statistics profile template extensive

user@host> show services web-filter dns-resolution-statistics profile p1 template t1 extensive


URL filtering DNS resolution statistics:
Profile: p1
Template: t1

1) Domain Name: www.facebook.com

IPv4 Address information:


DNS server IP 8.8.8.8
Req Sent 20
Resp Received 20
DNS retries 0

IPv4 Address information:


DNS server IP 172.29.131.60
Req Sent 21
Resp Received 20
DNS retries 0

IPv6 Address information:


1328

DNS server IP 8.8.8.8


Req Sent 25
Resp Received 20
DNS retries 0

IPv6 Address information:


DNS server IP 172.29.131.60
Req Sent 24
Resp Received 20
DNS retries 0
2) Domain Name: www.youtube.com

IPv4 Address information:


DNS server IP 8.8.8.8
Req Sent 21
Resp Received 20
DNS retries 0

IPv4 Address information:


DNS server IP 172.29.131.60
Req Sent 21
Resp Received 20
DNS retries 0

IPv6 Address information:


DNS server IP 8.8.8.8
Req Sent 21
Resp Received 20
DNS retries 0

IPv6 Address information:


DNS server IP 172.29.131.60
Req Sent 21
Resp Received 20
DNS retries 0
3) Domain Name: www.netflix.com

IPv4 Address information:


DNS server IP 8.8.8.8
Req Sent 21
Resp Received 20
DNS retries 0
1329

IPv4 Address information:


DNS server IP 172.29.131.60
Req Sent 21
Resp Received 20
DNS retries 0

IPv6 Address information:


DNS server IP 8.8.8.8
Req Sent 21
Resp Received 20
DNS retries 0

IPv6 Address information:


DNS server IP 172.29.131.60
Req Sent 21
Resp Received 20
DNS retries 0

Release Information

Command introduced in Junos OS Release 18.3R1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

show services web-filter dns-resolution profile


show services web-filter statistics profile
Configuring URL Filtering

show services web-filter secintel-policy status

IN THIS SECTION

Syntax | 1330
1330

Description | 1330

Options | 1330

Required Privilege Level | 1330

Sample Output | 1331

Sample Output | 1331

Release Information | 1333

Syntax

show services web-filter secintel-policy status


profile profile-name
template template-name

Description

Display the IPv4 and IPv6 count per threat level received from the C&C feed from Policy Enforcer. It also
displays the count of the number of terms used in the implicit filter per threat level.

Options

profile-name Name of the profile

template-name Name of the template

Required Privilege Level

view
1331

Sample Output

show services web-filter secintel-policy status

user@host> show services web-filter secintel-policy status profile


URL Filtering SecIntel Policy Status:
Profile : Profile1
C&C DB File : /var/db/url-filterd/urlf_si_cc_db.txt
Policy State: Ready
DB File Change Time : Tue Nov 27 11:01:10 2018
DB File Load Time : Tue Nov 27 11:01:38 2018
C&C Prefix Count : IPv4: 11093 IPv6: 5
Filters:
Threat level Action v4 Term Count IPv4 v6 Term Count IPv6

1 ACCEPT 23 1129 1 2
2 ACCEPT 11 1444 0 0
3 ACCEPT 6 996 0 0
4 ACCEPT 7 564 0 0
5 ACCEPT 7 451 0 0
6 ACCEPT 4 126 0 0
7 LOG 5 175 0 0
8 DROP AND LOG 4 396 1 1
9 ACCEPT 2 164 0 0
10 ACCEPT 33 5601 1 2

Sample Output

command-name

user@host> show services web-filter secintel-policy-status profile Profile1 url-filter-template template200


Template : template200
C&C DB File : /var/db/url-filterd/urlf_si_ip_white_list_db.txt
Policy State: NA
DB File Change Time : NA
DB File Load Time : NA
C&C Prefix Count : IPv4: 0 IPv6: 0
1332

C&C DB File : /var/db/url-filterd/urlf_si_ip_black_list_db.txt


Policy State: NA
DB File Change Time : NA
DB File Load Time : NA
C&C Prefix Count : IPv4: 0 IPv6: 0

C&C DB File : /var/db/url-filterd/urlf_si_ip_custom_db.txt


Policy State: Ready
DB File Change Time : Tue Feb 04 15:22:20 2020
DB File Load Time : Tue Feb 04 15:24:29 2020
C&C Prefix Count : IPv4: 16 IPv6: 0
Filters:
Threat level Action v4 Term Count IPv4 v6 Term
Count IPv6

0 ACCEPT AND SAMPLE 0 0


0 0
255 DROP AND SAMPLE 0 0
0 0
1 DROP AND SAMPLE 1 11
0 0
2 ACCEPT 0 0
0 0
3 DROP AND SAMPLE 1 1
0 0
4 DROP AND SAMPLE 1 1
0 0
5 ACCEPT 0 0
0 0
6 ACCEPT 1 1
0 0
7 ACCEPT 1 1
0 0
8 DROP AND SAMPLE 0 0
0 0
9 ACCEPT 1 1
0 0
10 DROP AND SAMPLE 0 0
0 0
1333

Release Information

Statement introduced before Junos OS Release 18.4.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240,
MX480, and MX960 with the MX-SPC3 services card.

RELATED DOCUMENTATION

security-intelligence

show services web-filter statistics dns-filter-template

IN THIS SECTION

Syntax | 1333

Description | 1333

Options | 1334

Required Privilege Level | 1334

Output Fields | 1334

Sample Output | 1334

Release Information | 1336

Syntax

show services web-filter statistics dns-filter-template template-name

Description

Display statistics for DNS request filtering and URL filtering for the specified filter profile.
1334

Options

dns-filter-template template-name (Optional) Display statistics for the specified DNS filter template.

Required Privilege Level

view

Output Fields

Table 112 on page 1334 lists the output fields for the show services web-filter statistics profile
command. Output fields are listed in the approximate order in which they appear.

Table 112: show services web-filter statistics profile Output Fields

Field Name Field Description

UDP DNS Number of UDP DNS requests, responses, and log only responses for DNS request
filtering for queries of types A, AAAA, MX, CNAME, SRV, TXT, and MISC.

TCP DNS Number of TCP DNS requests, responses, and log only responses for DNS request
filtering for queries of types A, AAAA, MX, CNAME, SRV, TXT, and MISC.

Sample Output

show services web-filter statistics dns-filter-template

user@host> show services web-filter statistics dns-filter-template DNS_CUSTOMER-A


DNS filtering counters:

UDP DNS A req count : 0


UDP DNS A resp count : 0
UDP DNS A log only count : 0
UDP DNS AAAA req count : 0
UDP DNS AAAA resp count : 0
UDP DNS AAAA log only count : 0
UDP DNS MX req count : 0
1335

UDP DNS MX resp count : 0


UDP DNS MX log only count : 0
UDP DNS CNAME req count : 0
UDP DNS CNAME resp count : 0
UDP DNS CNAME log only count : 0
UDP DNS SRV req count : 0
UDP DNS SRV resp count : 0
UDP DNS SRV resp count : 0

UDP DNS SRV resp count : 0


+ UDP DNS SRV Resp No Err count : 0
+ UDP DNS SRV Resp Resp Refused Err count : 0
UDP DNS SRV log only count : 0
UDP DNS TXT req count : 0
UDP DNS TXT resp count : 0
UDP DNS TXT log only count : 0
+ UDP DNS TXT Resp No Err count : 0
+ UDP DNS TXT Resp Resp Refused Err count : 0
UDP DNS ANY req count : 0
UDP DNS ANY resp count : 0
UDP DNS ANY log only count : 0
UDP DNS MISC req count : 0
UDP DNS MISC log only count : 0
TCP DNS A req count : 0
TCP DNS A resp count : 0
TCP DNS A log only count : 0
TCP DNS AAAA req count : 0
TCP DNS AAAA resp count : 0
TCP DNS AAAA log only count : 0
TCP DNS MX req count : 0
TCP DNS MX resp count : 0
TCP DNS MX log only count : 0
TCP DNS CNAME req count : 0
TCP DNS CNAME resp count : 0
TCP DNS CNAME log only count : 0
TCP DNS SRV req count : 0
TCP DNS SRV resp count : 0
TCP DNS SRV log only count : 0
+ TCP DNS SRV Resp No Err count : 0
+ TCP DNS SRV Resp Resp Refused Err count : 0

TCP DNS TXT req count : 0


TCP DNS TXT resp count : 0
1336

TCP DNS TXT log only count : 0


+ TCP DNS SRV Resp No Err count : 0
+ TCP DNS SRV Resp Resp Refused Err count : 0

TCP DNS ANY req count : 0


TCP DNS ANY resp count : 0
TCP DNS ANY log only count : 0
TCP DNS MISC req count : 0
TCP DNS MISC log only count : 0

Release Information

RELATED DOCUMENTATION

DNS Request Filtering for Disallowed Website Domains


Configuring URL Filtering

show services web-filter statistics profile

IN THIS SECTION

Syntax | 1337

Description | 1337

Options | 1337

Required Privilege Level | 1337

Output Fields | 1337

Sample Output | 1339

Sample Output | 1340

Release Information | 1342


1337

Syntax

show services web-filter statistics profile profile-name


<dns-filter-template template-name>
<dns-filter-term term-name>
<fpc-slot fpc-slot pic-slot pic-slot>
<url-filter-template template-name>

Description

Display statistics for DNS request filtering and URL filtering for the specified filter profile.

Options

dns-filter-template template-name (Optional) Display statistics for the specified DNS filter template.

dns-filter-term term-name (Optional) Display statistics for the specified term in the DNS filter
template.

fpc-slot fpc-slot pic-slot pic-slot (Optional) Display statistics for the specified services PIC.

profile profile-name Display statistics for the specified filter profile.

url-filter-template template-name (Optional) Display statistics for the specified URL filter template.

Required Privilege Level

view

Output Fields

Table 113 on page 1338 lists the output fields for the show services web-filter statistics profile
command. Output fields are listed in the approximate order in which they appear.
1338

Table 113: show services web-filter statistics profile Output Fields

Field Name Field Description

UDP Counters Number of UDP DNS requests, responses, and log only responses for DNS
request filtering for queries of types A, AAAA, MX, CNAME, SRV, TXT, and
MISC.

TCP Counters Number of TCP DNS requests, responses, and log only responses for DNS
request filtering for queries of types A, AAAA, MX, CNAME, SRV, TXT, and
MISC.

Accept Action counters for accepted packets for URL filtering.

Custom page Action counters for custom page sent to recipient for URL filtering.

Http scode Action counters for HTTP status code response for URL filtering.

Redirect url Action counters for redirect URL response for URL filtering.

TCP reset Action counters for TCP reset for URL filtering. Connection is closed.

Bypass session Number of sessions not blocked by URL filtering because the match criteria
count was not met for URL filtering.

IPV4 Disable IP Action counters for IPv4 packets that were accepted because filtering is
Blocking disabled for HTTP traffic that contains an embedded IP address belonging to a
disallowed domain name in the URL filter database.

IPV6 Disable IP Action counters for IPv6 packets that were accepted because filtering is
Blocking disabled for HTTP traffic that contains an embedded IP address belonging to a
disallowed domain name in the URL filter database.
1339

Table 113: show services web-filter statistics profile Output Fields (Continued)

Field Name Field Description

session count The session of activity that a user with a unique IP address spends on a
website during a specified period of time for URL filtering. A session, in this
case, would be the packets going to the service PIC from the Packet
Forwarding Engine and then back to the service PIC.

uplink packet count Number of packets going from the Packet Forwarding Engine to the service PIC
for URL filtering.

uplink bytes Number of bytes passing uplink for URL filtering.

downlink packet Number of packets going from the service PIC to the service Packet
count Forwarding Engine for URL filtering.

downlink bytes Number of bytes passing downlink for URL filtering.

UDP DNS Number of UDP DNS requests, responses, and log only responses for DNS
request filtering for queries of types A, AAAA, MX, CNAME, SRV, TXT, and
MISC.

TCP DNS Number of TCP DNS requests, responses, and log only responses for DNS
request filtering for queries of types A, AAAA, MX, CNAME, SRV, TXT, and
MISC.

Sample Output

show services web-filter statistics profile dns-filter-template

user@host> show services web-filter statistics profile pdns dns-filter-template tdns


Query Requests Responses Log
Type only

UDP Counters:
1340

A 0 0 0
AAAA 0 0 0
MX 0 0 0
CNAME 0 0 0
SRV 0 0 0
TXT 0 0 0
MISC 0 0 0

TCP Counters:

A 0 0 0
AAAA 0 0 0
MX 0 0 0
CNAME 0 0 0
SRV 0 0 0
TXT 0 0 0
MISC 0 0 0

Sample Output

show services web-filter statistics profile

user@host> show services web-filter statistics profile Profile1


URL filtering action counters:

Accept session count : 0


Accept uplink packet count : 0
Accept uplink bytes : 0
Accept downlink packet count : 0
Accept downlink bytes : 0

Custom page session count : 0


Custom page uplink packet count : 0
Custom page uplink bytes : 0
Custom page downlink packet count : 0
Custom page downlink bytes : 0

Http scode session count : 0


Http scode uplink packet count : 0
1341

Http scode uplink bytes : 0


Http scode dowlink packet count : 0
Http scode downlink bytes : 0

Redirect url session count : 0


Redirect url uplink packet count : 0
Redirect url uplink bytes : 0
Redirect url downlink packet count : 0
Redirect url downlink bytes : 0

Tcp reset session count : 0


Tcp reset uplink packet count : 0
Tcp reset uplink bytes : 0
Tcp reset downlink packet count : 0
Tcp reset downlink bytes : 0

Bypass session count : 0

IPV4 Disable IP Blocking Sessions : 0


IPV4 Disable IP Blocking uplink packets : 0
IPV4 Disable IP Blocking uplink bytes : 0
IPV4 Disable IP Blocking downlink packets : 0
IPV4 Disable IP Blocking downlink bytes : 0
IPV6 Disable IP Blocking Sessions : 0
IPV6 Disable IP Blocking uplink packets : 0
IPV6 Disable IP Blocking uplink bytes : 0
IPV6 Disable IP Blocking downlink packets : 0
IPV6 Disable IP Blocking downlink bytes : 0

DNS filtering counters:

UDP DNS A req count : 0


UDP DNS A resp count : 0
UDP DNS A log only count : 0
UDP DNS AAAA req count : 0
UDP DNS AAAA resp count : 0
UDP DNS AAAA log only count : 0
UDP DNS MX req count : 0
UDP DNS MX resp count : 0
UDP DNS MX log only count : 0
UDP DNS CNAME req count : 0
UDP DNS CNAME resp count : 0
UDP DNS CNAME log only count : 0
1342

UDP DNS SRV req count : 0


UDP DNS SRV resp count : 0
UDP DNS SRV log only count : 0
UDP DNS TXT req count : 0
UDP DNS TXT resp count : 0
UDP DNS TXT log only count : 0
UDP DNS ANY req count : 0
UDP DNS ANY resp count : 0
UDP DNS ANY log only count : 0
UDP DNS MISC req count : 0
UDP DNS MISC log only count : 0
TCP DNS A req count : 0
TCP DNS A resp count : 0
TCP DNS A log only count : 0
TCP DNS AAAA req count : 0
TCP DNS AAAA resp count : 0
TCP DNS AAAA log only count : 0
TCP DNS MX req count : 0
TCP DNS MX resp count : 0
TCP DNS MX log only count : 0
TCP DNS CNAME req count : 0
TCP DNS CNAME resp count : 0
TCP DNS CNAME log only count : 0
TCP DNS SRV req count : 0
TCP DNS SRV resp count : 0
TCP DNS SRV log only count : 0
TCP DNS TXT req count : 0
TCP DNS TXT resp count : 0
TCP DNS TXT log only count : 0
TCP DNS ANY req count : 0
TCP DNS ANY resp count : 0
TCP DNS ANY log only count : 0
TCP DNS MISC req count : 0
TCP DNS MISC log only count : 0

Release Information

Command introduced in Junos OS Release 18.3R1.

Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
1343

RELATED DOCUMENTATION

DNS Request Filtering for Disallowed Website Domains


Configuring URL Filtering

show system unified-services status

IN THIS SECTION

Syntax | 1343

Description | 1343

Required Privilege Level | 1343

Output Fields | 1343

Sample Output | 1344

Release Information | 1344

Syntax

show system unified-services status

Description

Determine whether Next Gen Services is enabled or disabled on the MX.

Required Privilege Level

Output Fields

When you enter this command, you are provided feedback on the status of your request.
1344

Sample Output

show system unified-services status

user@host> show system unified-services status

One of the following four messages appears:

Enabled
Unified Services : Upgrade staged , please reboot with 'request system reboot'
to enable unified services.
Disabled
Unified Services : Upgrade staged , please reboot with 'request system reboot'
to disable unified services.

Release Information

Command introduced in Junos OS Release 19.3R1.

You might also like