Next Gen Service
Next Gen Service
Routing Devices
Published
2021-04-18
ii
Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc.
in the United States and other countries. All other trademarks, service marks, registered marks, or registered service
marks are the property of their respective owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right
to change, modify, transfer, or otherwise revise this publication without notice.
Next Gen Services Interfaces User Guide for Routing Devices Next Gen Services Interfaces User Guide for Routing
Devices
Copyright © 2021 Juniper Networks, Inc. All rights reserved.
The information in this document is current as of the date on the title page.
Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related
limitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036.
The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use
with) Juniper Networks software. Use of such software is subject to the terms and conditions of the End User License
Agreement ("EULA") posted at https://support.juniper.net/support/eula/. By downloading, installing or using such
software, you agree to the terms and conditions of that EULA.
iii
Table of Contents
About This Guide | xxv
1 Overview
Next Gen Services Overview | 2
Configuration Overview | 16
Configuration Differences Between Adaptive Services and Next Gen Services on the MX-SPC3 | 16
Overview | 17
Interfaces | 18
Service Set | 23
Stateful Firewall | 26
How to Configure Next-Hop Style Service Sets for Next Gen Services | 100
How to Configure Service Set Limits for Next Gen Services | 101
Example: Next Gen Services Inter-Chassis Stateful High Availability for NAT and Stateful Firewall
(MX-SPC3) | 104
Requirements | 104
Overview | 104
Configuration | 104
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Syslog Events for NAT Rule Conditions with Next Gen Services | 142
Configuring the NAT Pool for Deterministic NAPT for Next Gen Services | 178
Configuring the NAT Rule for Deterministic NAPT44 for Next Gen Services | 179
Configuring the NAT Rule for Deterministic NAPT64 for Next Gen Services | 181
Configuring the Service Set for Deterministic NAT for Next Gen Services | 181
Configuring Dynamic Address-Only Source NAT for Next Gen Services | 184
Configuring the Source Pool for Dynamic Address-Only Source NAT | 184
Configuring the NAT Source Rule for Dynamic Address-Only Source NAT | 185
Configuring the Service Set for Dynamic Address-Only Source NAT | 187
Configuring Network Address Port Translation for Next Gen Services | 189
v
Configuring Syslog Events for NAT Rule Conditions with Next Gen Services | 196
NAT46 | 198
Configuring 464XLAT Provider-Side Translator for IPv4 Connectivity Across IPv6-Only Network for
Next Gen Services | 217
Stateless Source Network Prefix Translation for IPv6 Overview and Configuration | 227
Stateless Source Network Prefix Translation for IPv6 for IPv6 | 227
Configuring DS-Lite Per Subnet Session Limitation to Prevent Denial of Service Attacks | 251
Reducing Traffic and Bandwidth Requirements Using Port Control Protocol | 254
Transitioning to IPv6 Using Mapping of Address and Port with Encapsulation (MAP-E) | 264
vii
Mapping of Address and Port with Encapsulation (MAP-E) for Next Gen Services | 264
Configuring Mapping of Address and Port with Encapsulation (MAP-E) for Next Gen Services | 268
Equal Cost Multiple Path (ECMP) support for Mapping of Address and Port with Encapsulation
(MAP-E) | 271
Equal Cost Multiple Path (ECMP) support for Mapping of Address and Port with Encapsulation
(MAP-E) | 272
Disabling auto-routes to support ECMP with Mapping of Address and Port with Encapsulation
(MAP-E) | 272
Configuring Port Forwarding with Static Destination Address Translation for Next Gen Services | 282
Configuring the NAT Rule for Port Forwarding with Destination Address Translation | 283
Configuring the Service Set for Port Forwarding with Destination Address Translation | 285
Configuring Port Forwarding without Static Destination Address Translation for Next Gen
Services | 286
Configuring the NAT Rule for Port Forwarding without Destination Address Translation | 287
Configuring the Service Set for Port Forwarding without Destination Address Translation | 288
Address Pooling and Endpoint Independent Mapping for Port Translation | 290
Configuring Static Source NAT44 or NAT66 for Next Gen Services | 295
Configuring the Source Pool for Static Source NAT44 or NAT66 | 295
Configuring the NAT Rule for Static Source NAT44 or NAT66 | 296
Configuring the Service Set for Static Source NAT44 or NAT66 | 297
Configuring the Source and Destination Pools for Twice NAPT | 305
Configuring the Source and Destination Pools for Twice Static NAT44 | 315
Configuring the Source and Destination Pools for Twice Dynamic NAT | 321
Class of Service Overview for Services PICs (Next Gen Services) | 327
Configuring CoS for Traffic Processed by a Services PIC (Next Gen Services) | 328
ix
Configuring Stateful Firewall Rule Sets for Next Gen Services | 342
Configuring the Service Set for Stateful Firewalls for Next Gen Services | 342
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
Configuring the IDS Screen Name, Direction, and Alarm Option | 349
Configuration | 406
7 URL Filtering
URL Filtering | 427
Next Gen Services Inter-chassis High Availability Overview for NAT, Stateful Firewall, and IDS
Flows | 466
Inter-chassis High Availability Overview for NAT, Stateful Firewall, and IDS Flows for Next Gen
Services | 467
Example: Next Gen Services Inter-Chassis Stateful High Availability for NAT and Stateful
Firewall (MX-SPC3) | 467
Requirements | 468
Overview | 468
Configuration | 468
Inter-Chassis Stateful Synchronization for Long Lived NAT, Stateful Firewall, and IDS Flows for Next
Gen Services | 480
Configuring Inter-Chassis Stateful Synchronization for Long- Lived NAT, Stateful Firewall, and
IDS Flows for Next Gen Services | 483
Configuring Inter-Chassis Stateful Synchronization for Next Gen Services with non-AMS
Interface | 483
Configuring Inter-Chassis Stateful Synchronization for Next Gen Services with AMS
Interface | 486
Configuring Non-Stop Services Redundancy for Next Gen Services Service Set | 493
Configuring One-Way Services Redundancy for Next Gen Services Service Set | 499
Configuring Inline Static Source NAT44 for Next Gen Services | 556
Configuring the Source Pool for Inline Static Source NAT44 | 556
Configuring the NAT Rule for Inline Static Source NAT44 | 557
Configuring the Service Set for Inline Static Source NAT44 | 558
Configuring Inline Static Destination NAT for Next Gen Services | 560
Configuring the Destination Pool for Inline Static Destination NAT | 561
Configuring the NAT Rule for Inline Static Destination NAT | 561
Configuring the Service Set for Inline Static Destination NAT | 563
Configuring Inline Twice Static NAT44 for Next Gen Services | 565
Configuring the Source and Destination Pools for Inline Twice Static NAT44 | 565
Configuring the NAT Rules for Inline Twice Static NAT44 | 566
Configuring the Service Set for Inline Twice Static NAT44 | 569
13 Configuration Statements
Configuration Statements | 572
white-list | 586
application-protocol | 592
xiii
application-set | 594
bypass-traffic-on-exceeding-flow-limits | 605
child-inactivity-timeout | 613
clat-ipv6-prefix-length | 614
close-timeout | 618
cpu-load-threshold | 622
disable-global-timeout-override | 635
dns-filter | 636
dns-filter-template | 639
ds-lite | 645
fragment-limit | 668
gate-timeout | 672
xv
general-ikeid | 673
global-dns-stats-log-timer | 674
inactivity-timeout | 686
icmp-type | 690
map-e | 721
maximum | 737
next-hop-service | 748
no-bundle-flap | 750
open-timeout | 756
xvii
pcp-rules | 757
ports-per-session | 775
reassembly-timeout | 792
redundancy-set | 804
rpc-program-number | 809
security-intelligence | 824
security-intelligence-policy | 827
service-domain | 833
session-limit | 847
xix
snmp-command | 856
softwire-options | 864
source-port | 874
ttl-threshold | 915
url-filter | 917
url-filter-profile | 920
url-filter-template | 921
uuid | 924
v6rd | 926
voice | 933
web-filter | 935
web-filter-profile | 938
xlat-source-rule | 942
14 Operational Commands
Operational Commands | 945
Use this guide to understand and configure Next Gen Services on MX240, MX480, and MX960 routers.
1 PART
Overview
Configuration Overview | 16
CHAPTER 1
IN THIS CHAPTER
IN THIS SECTION
This topic provides an overview of Next Gen Services and includes the following topics
MX Series 5G Universal routers support several types of Services interfaces, which provide specific
capabilities for inspecting, monitoring and manipulating traffic as it transits an MX Series router. Services
can be categorized into Adaptive Services and Next Gen Services, with each category providing Inline
3
services interfaces and Multiservices interfaces options. Table 1 on page 3 lists the cards that provide
these services.
NOTE: The MX-SPC3 replaces MS- type cards providing a significant overall performance
improvement together with high-end scale and capacity.
• Adaptive Services can run on MS-DPC, MS-MPC, and MS-MIC cards using Multiservices (MS) PICs
or Adaptive Services (AS) PICs.
• Next Gen Services can run on MPC cards and the MX-SPC3 security services card.
Inline services are configured on MX Series Modular Port Concentrators (MPC)s. Inline services
interfaces, are virtual physical interfaces that reside on the Packet Forwarding Engine. They provide high
performance processing on traffic transiting the MPC, and allow you to maximize your chassis slot
capacity and utilization.
Multiservices Security cards (MS-DPC, MS-MPC, MS-MIC or MX-SPC3), provide services that can be
applied to any traffic transiting the MX chassis beyond just an individual MPC. They also provide
dedicated processing to support a variety of security features at scale and high performance.
Adaptive Services run inline on MPCs and on MS-DPC, MS-MPC, and MS-MIC Multiservice security
cards. Adaptive Services (AS) PICs and Multiservices PICs enable you to perform multiple services on
the same PIC by configuring a set of services and applications. The AS and Multiservices PICs offer a
range of services that you can configure in one or more service sets.
4
NOTE: On Juniper Networks MX Series 5G Universal Routing Platforms, the MS-DPC provides
essentially the same capabilities as the MS-MPC. The interfaces on both platforms are
configured in the same way.
For more information about Adaptive Services including inline services, see Adaptive Services Overview.
Inline Services
Adaptive Services also use inline services interfaces to provide inline services. Inline services interfaces
are virtual interfaces that reside on the Packet Forwarding Engine.
You configure inline services only on MPCs using the naming convention si-fpc/pic/port rather than the
ms-fpc/pic/port naming convention.
Next Gen Services provide the combined capabilities of MX and SRX security services enabling you to
inspect, monitor and manipulate traffic as it transits the MX Series router. Next Gen Services are
supported both inline on Modular Port Concentrators (MPCs) and the MX-SPC3 security services card in
MX240, MX480 and MX960 routers. Please refer to Table 2 on page 5, which provides a summary of
Next Gen Services that are supported both inline and on the MX-SPC3 card. Both Inline and MX-SPC3
based services can be used at the same time.
You configure Next Gen Services on the MX-SPC3 security services card using the virtual multiservices
naming convention: vms-fpc/pic/port.
Table 2 on page 5 provides a summary of the services supported under Next Gen Services.
5
Junos OS Junos OS
Sub-Service Sub-Service
Release Release
NAPT66
Deterministic-nat44 and
nat64
Persistent NAT –
Application Pool Pairing
(APP)
Twice-NAT44 – Basic,
Dynamic and NAPT
NAT64
XLAT-464
6
Junos OS Junos OS
Sub-Service Sub-Service
Release Release
NPTv6
DS-Lite
20.2R1 MAP-E
NAT46
Aggregated 19.3R2
Multiservices N/A
Interfaces
7
Junos OS Junos OS
Sub-Service Sub-Service
Release Release
You can run Next Gen Services on the MX240, MX480, and MX960 if you have the MX-SPC3 services
card installed in the router. Refer to our TechLibrary for all MX router documentation. For Next Gen
Services, refer to the following documentation:
8
• To learn about and configure Next Gen Services, see Next Gen Services Interfaces User Guide for
Routing Devices (this guide).
• For details on installing or replacing the MX-SPC3 card, see MX Series 5G Universal Routing Platform
Interface Module Reference.
• To monitor flows and sample traffic — See the Monitoring, Sampling, and Collection Services
Interfaces Feature Guide, which describes how to configure traffic flow monitoring, packet flow
capture, traffic sampling for accounting or discard, port mirroring to an external device, and real-time
performance monitoring.
To run Next Gen Services, you must enable it on the MX Series router. This enables the operating
system to run it’s own operating system (OS) for Next Gen Services.
There are specific steps you’ll need to take if you’re migrating your services from legacy services cards to
the MX-SPC3. The Next Gen Services CLI differs from these legacy services. For more information, see
"Configuration Differences Between Adaptive Services and Next Gen Services on the MX-SPC3" on
page 16.
The MX-SPC3 services card is compatible end-to-end with the MX Series Switch Fabrics, Routing
Engines and MS-MPC line cards as described in Table 3 on page 9.
9
Table 3: MX-SPC3 Services Card Compatibility with MX Series Switch Fabrics, Routing Engines and
MPC Line Cards
RE-S-1800X4-16G-UPG-BB MPC2-3D-NG
RE-S-1800X4-16G-R MPC4E-3D
RE-S-1800X4-32G-BB MPC-3D-16XGE
RE-S-1800X4-32G-UB
RE-S-1800X4-32G-S
RE-S-1800X4-32G-R
10
Table 3: MX-SPC3 Services Card Compatibility with MX Series Switch Fabrics, Routing Engines and
MPC Line Cards (Continued)
RE-S-1800X4-16G-UPG-BB MPC2-3D-NG
RE-S-1800X4-16G-R MPC4E-3D
RE-S-1800X4-32G-S MPC-3D-16XGE
RE-S-1800X4-32G-R
RE-S-X6-64G-BB
RE-S-X6-64G-UB
RE-S-X6-64G-S
RE-S-X6-64G-R
RE-S-X6-128G-S-BB
RE-S-X6-128G-S-S
RE-S-X6-128G-S-R
11
Table 3: MX-SPC3 Services Card Compatibility with MX Series Switch Fabrics, Routing Engines and
MPC Line Cards (Continued)
RE-S-X6-64G-BB
RE-S-X6-64G-UB
RE-S-X6-64G-S
RE-S-X6-64G-R
RE-S-X6-128G-S-BB
RE-S-X6-128G-S-S
RE-S-X6-128G-S-R
The interfaces on the MX-SPC3 services card are referred to as a virtual multi service (vms) PIC. When
you configure an MX-SPC3 interface, you specify the interface as a vms- interface as follows:
Aside from the CLI differences, you need to be aware of the basic hardware differences between
multiservices (MS) type (MS-DPC, MS-MPC, and MS-MIC) cards and the MX-SPC3 services card. MS
12
type cards contain four CPU complexes whereas the MX-SPC3 card, while more powerful, contains two
CPU complexes. Each CPU complex services a single PIC, meaning that MS type cards support four PICs
whereas the MX-SPC3 supports two PICs. MS type cards use special multiservices (MS) and adaptive
services (AS) PICs, whereas the PICs on the MX-SPC3 card are integrated.
Because the number of PICs directly affects the number of interfaces, you might need to add logical
units to each interface on the MX-SPC3 to increase the number of interfaces to four. For example, if you
currently use all four interfaces on the MS type card and you have a service set per interface, you can
create two logical units per interface on the MX-SPC3 to bring the total number of interfaces to four,
and then reassociate the four service sets to these four logical interfaces.
When you configure Next Gen Services, you can apply those services with either of the following
methods:
• Apply the configured services to traffic that flows through a particular interface on the MX router.
• Apply the configured services to traffic that is destined for a particular next hop.
To configuring IPsec on MX-SPC3 service card, use the CLI configuration statements at the [edit
security] hierarchy level as the IPsec CLI configuration at the [edit services] is replaced with the CLI
configuration at the [edit security] hierarchy level as shown in Table 4 on page 12
set services ipsec-vpn ike policy policy-name set security ike respond-bad-spi
respond-bad-spi
set services ipsec-vpn rule rule-name term term- set security ipsec vpn vpn-name traffic-selector
name from [source-address| destination-address] selector-name [local-ip | remote-ip]
set services ipsec-vpn rule rule-name term term- set security ipsec vpn vpn-name bind-interface
name from ipsec-inside-interface
set services ipsec-vpn rule rule-name term term- set security ike gateway gw-name address
name then remote-gateway
set services ipsec-vpn rule rule-name term term- set security ike gateway gw-name address
name then backup-remote-gateway
set services ipsec-vpn rule rule-name term term- set security ike gateway gw-name dead-peer-
name then dead-peer-detection detection
set services ipsec-vpn rule rule-name term term- set security ike gateway gw-nameike-policy
name then dynamic ike-policy
set services ipsec-vpn rule rule-name term term- set security ipsec vpn vpn-name ike ipsec-policy
name then dynamic ipsec-policy
set services ipsec-vpn rule rule-name term term- set security ipsec vpn vpn-name manual
name then manual
set services ipsec-vpn rule rule-name term term- set security ipsec vpn vpn-name df-bit clear
name then clear-dont-fragment-bit
set services ipsec-vpn rule rule-name term term- set security ipsec vpn vpn-name df-bit copy
name then copy-dont-fragment-bit
set services ipsec-vpn rule rule-name term term- set security ipsec vpn vpn-name df-bit copy
name then set-dont-fragment-bit
set services ipsec-vpn rule rule-name term term- set security ipsec vpn vpn-name tunnel-mtu
name then tunnel-mtu
14
set services ipsec-vpn rule rule-name term term- set security ipsec vpn vpn-name ike no-anti-
name then no-anti-replay replay
set services ipsec-vpn rule rule-name match- set security ipsec vpn vpn-namematch-direction
direction
set services service-set svc-set-name ipsec-vpn- set security ipsec vpn vpn-nameike gateway
options local-gateway address gateway-name
set services service-set svc-set-name ipsec-vpn- No global service-set setting. Must be configured
options clear-dont-fragment-bit on a per vpn object basis.
set services service-set svc-set-name ipsec-vpn- No global service-set setting. Must be configured
options copy-dont-fragment-bit on a per vpn object basis.
set services service-set svc-set-name ipsec-vpn- No global service-set setting. Must be configured
options set-dont-fragment-bit on a per vpn object basis.
set services service-set svc-set-name ipsec-vpn- set security ipsec vpn vpn-nameudp-encapsulate
options udp-encapsulate
set services service-set svc-set-name ipsec-vpn- No global service-set setting. Must be configured
options no-anti-replay on a per vpn object basis.
set services service-set svc-set-name ipsec-vpn- set security ipsec vpn vpn-namepassive-mode-
options passive-mode-tunneling tunneling
set services service-set svc-set-name ipsec-vpn- No global service-set setting. Must be configured
options tunnel-mtu on a per vpn object basis.
set services service-set svc-set-name ipsec-vpn- set services service-set svc-set-name ipsec-vpn-
rules rules
15
RELATED DOCUMENTATION
CHAPTER 2
Configuration Overview
IN THIS CHAPTER
Configuration Differences Between Adaptive Services and Next Gen Services on the MX-SPC3 | 16
How to Configure Next-Hop Style Service Sets for Next Gen Services | 100
How to Configure Service Set Limits for Next Gen Services | 101
Example: Next Gen Services Inter-Chassis Stateful High Availability for NAT and Stateful Firewall (MX-
SPC3) | 104
IN THIS SECTION
Overview | 17
Interfaces | 18
Service Set | 23
Stateful Firewall | 26
Overview
Next Gen Services on the MX-SPC3 require you to configure services differently from what you are
accustomed to with Adaptive Services, which run on MS type cards (MS-MPC, MS-MIC and MS-DPC).
Configuring the MX-SPC3 services card more closely aligns with the way you configure the SRX Series
services gateway. Once you are familiar with this more unified approach, you should be able to configure
services on these two platforms in a more seamless fashion, ultimately resulting in less training overhead
and lower risk of configuration error.
Aside from the CLI differences, you need to be aware of the basic hardware differences between
multiservices (MS) type (MS-DPC, MS-MPC, and MS-MIC) cards and the MX-SPC3 services card. MS
type cards contain four CPU complexes whereas the MX-SPC3 card, while more powerful, contains two
CPU complexes. Each CPU complex services a single PIC, meaning that MS type cards support four PICs
whereas the MX-SPC3 supports two PICs. MS type cards use special multiservices (MS) and adaptive
services (AS) PICs, whereas the PICs on the MX-SPC3 card are integrated.
Because the number of PICs directly affects the number of interfaces (Table 5 on page 17), you might
need to add logical units to each interface on the MX-SPC3 to increase the number of interfaces to four.
For example, if you currently use all four interfaces on the MS type card and you have a service set per
interface, you can create two logical units per interface on the MX-SPC3 to bring the total number of
interfaces to four, and then reassociate the four service sets to these four logical interfaces.
MS-Cards MX-SPC3
NOTE: See the MX Series 5G Universal Routing Platform Interface Module Reference for more
information on the MX-SPC3 hardware.
The following sections provide an overview of the basic configuration differences between services on
the MS type cards and services on the MX-SPC3 card. The intent of these sections is to help you get
started by using basic examples to illustrate the major changes. These examples show a subset of the
CLI configuration options and do not replace the more formal treatment of the subject matter found in
18
the Next Gen Services Interfaces User Guide for Routing Devices and the Junos OS CLI Reference
Guide.
The configuration examples in these sections are presented side-by-side so you can easily see the
differences between the two. The examples are intended to show you how to configure existing MS
type card features on the MX-SPC3. The examples are not intended to show you how to configure new
features only found on the MX-SPC3. For legibility and ease of comparison, the order of statements
presented might differ slightly from the actual order of statements displayed in the CLI.
If you have a large set of existing adaptive services, we recognize that these changes might be an
inconvenience to you. To help you migrate from MS type cards to the MX-SPC3, we suggest that you
proceed as follows:
• Look through the examples in this guide to get an overall view of the changes required.
• Look through the set of configuration examples in knowledge base article KB35348.
• Look through this guide and the Junos OS CLI Reference Guide to understand all the features,
configuration options, and syntax.
You do not need to make these configuration changes if you continue to run adaptive services on the
MS type cards. However, once you deploy the MX-SPC3 on a router, you must replace all MS type cards
on that router and reconfigure your services to align with the Next Gen Services configuration paradigm.
Interfaces
MS type cards use the interface naming convention ms-1/0/0, whereas you specify MX-SPC3 interfaces
using the virtual multiservices or vms-1/0/0 interface naming convention. There are no changes to the
names of ams and mams interfaces.
In addition, a number of parameters that are configured under services-options on an ms interface are
configured under service-set-options in a service set.
[edit interfaces]
# All session-limit parameters continue
to be
# configurable per interface. If the
maximum
# number of sessions is different from
the associated
# service-set, the smaller number takes
effect.
vms-5/1/0 {
services-options {
session-limit {
maximum 100;
cpu-load-threshold 12;
rate 10;
}
}
}
22
Not supported
[edit interfaces]
ms-5/1/0 {
services-options {
ignore-errors alg;
disable-global-timeout-
override;
trio-flow-offload {
minimum-bytes 1000;
}
}
}
Service Set
Table 7 on page 24 shows minor changes in the way some service-set parameters are configured.
24
Currently unsupported
[edit services]
service-set sset1 {
tag-rule-sets <...>
tag-rules <...>
hcm-profile <...>
hcm-url-rule-sets <...>
hcm-url-rules <...>
service-set-options {
bypass-traffic-on-pic-
failure;
}
}
Stateful Firewall
IN THIS SECTION
Applications | 33
27
Stateful firewall rules on the MX-SPC3 are structured slightly differently from stateful firewall rules for
services on the MS type cards. On the MX-SPC3, you enclose the rules within a policies wrapper, and
you define the match terms and actions for the rule in a policy contained within the rule.
Just like a stateful firewall service on the MS type card, you create a service set to associate an interface
with a rule set. A rule set contains references to one or more rules. Rules are applied sequentially in the
order that you list them until a match occurs and an action taken.
Each rule contains one or more pairs of match terms and actions. On the MX-SPC3, each pair of match
terms and actions is called a policy. Policies are applied sequentially in the order that you specify them
until a match occurs and an action taken.
Table 8 on page 27 shows the configuration differences between stateful firewall rules on the MS card
and the MX-SPC3. In particular, note the different definitions for the permit/deny/reject actions.
MS Card MX-SPC3
service-set s1 { service-set s1 {
stateful-firewall-rule-sets stateful-firewall-rule-sets rule-
rule-set-basic-sfw; set-basic-sfw;
interface-service { interface-service {
service-interface service-interface vms-1/1/0;
ms-1/1/0; }
} }
}
28
MS Card MX-SPC3
MS Card MX-SPC3
MS Card MX-SPC3
}
policy accept {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}
}
} # end Rule1
} # end Rule2
31
MS Card MX-SPC3
Stateful firewall rules can contain match terms that refer to address ranges and lists.
On the MX-SPC3, the prefix-list element is not used for stateful firewall rules. You use an address-book
under services to define address lists and ranges for use within stateful firewall rules. The prefix-list
element still exists, but is used exclusively for routing policies. You therefore need to configure both
address-book and prefix-list elements if you are specifying address lists for stateful firewall rules and
address lists for routing policies.
Table 9 on page 32 shows the differences between how you specify addresses for stateful firewall rules
on the MS card versus the MX-SPC3.
32
Table 9: Addresses
MS Card MX-SPC3
MS Card MX-SPC3
log;
}
<...>
Applications
The MX-SPC3 supports more built-in Junos applications than the MS card. You can match on these
built-in applications when you create a stateful firewall rule.
To see the complete list of built-in applications, use the show groups junos-defaults applications
configuration mode command. For example:
[edit]
# show groups junos-defaults applications | match junos
application junos-ftp {
application junos-ftp-data {
application junos-tftp {
application junos-twamp {
application junos-rtsp {
application junos-netbios-session {
<...>
Stateful firewalls for Next Gen Services on the MX-SPC3 support additional capabilities to help debug
and count traffic:
• traceoptions - Use to trace policy-related events such as policy lookups and rules-based events. The
events are captured in the specified file for viewing.
• count - Use to count traffic-related events such as incoming/outgoing bytes and packets. View the
counters using show commands:
• show services policies detail - the output includes traffic-related counters when you specify the
count option in your policy
34
• show services policies hit-count - the hit count is always available regardless of whether you use
the count option in your policy or not
Table 10 on page 34 shows how to use the traceoptions and count elements:
MS Card MX-SPC3
Not supported
[edit services]
policies {
# Enable traceoptions to trace policy-related events.
traceoptions {
file policylogs size 10m files 5;
flag all;
}
stateful-firewall-rule Rule1 {
match-direction input;
policy my-policy {
match {
source-address any;
destination-address any;
application [ junos-dns-udp junos-dns-tcp ];
}
then {
permit
# Enable counting of traffic events.
count;
}
} # end my-policy
...
• On the MX-SPC3, you configure source NAT separately from destination NAT. You configure source
NAT in the source branch of the configuration tree and you configure destination NAT in the
destination branch of the configuration tree. Source NAT and destination NAT each has its own sets
of address pools and rules in its respective branch of the configuration tree.
35
• On the MX-SPC3, if you configure both source NAT and destination NAT, destination NAT applies
first, and then source NAT applies to the destination NAT translated result. In other words, you write
the source NAT rule not based on the original packet, but based on the destination NAT translated
result.
• On the MX-SPC3, you do not explicitly configure a translation-type. The type of translation is
determined implicitly by your configuration.
• On the MX-SPC3, port translation is the default behavior for dynamic mappings (where different pre-
NAT addresses might map to the same post-NAT address over time). If you do not explicitly include
the port statement in a pool definition, port translation takes place with a port range [1024, 65535],
and the port is selected in a round robin fashion. If you do not want port translation to take place,
you must add a port statement with the no-translation option. This default does not apply to static
mappings where a pre-NAT address always maps to the same post-NAT address.
Table 11 on page 35 through Table 23 on page 74 show examples of how the different translation
types are configured on the MX-SPC3.
MS Card MX-SPC3
nat { nat {
source {
36
MS Card MX-SPC3
pool src-pool {
address 10.10.10.0/24; pool src-pool {
} address {
10.10.10.0/24;
}
# host-address-base indicates
a type of static mapping
# where the base address
10.45.1.0/32 maps to the
# lowest address in the pool,
namely 10.10.10.0/32,
# and the other addresses map
sequentially from there
# e.g. 10.45.1.1 maps to
10.10.10.1, and so on.
# Since this is a static
mapping, there is no port translation
# by default.
# Note that host-address-base
does not have to be the
# lowest address allowed by
the subsequent source rule.
# Any packet with a source
address allowed by the source rule
# but is lower than the host-
address-base is discarded.
host-address-base
10.45.1.0/32;
}
37
MS Card MX-SPC3
} # end nat
} # end source
} # end nat
38
MS Card MX-SPC3
nat { nat {
source {
pool src-pool {
address pool src-pool {
2001:DB8:2222::0/128; address {
} 2001:DB8:2222::0/128;
}
}
39
MS Card MX-SPC3
} # end nat
} # end source
} # end nat
40
MS Card MX-SPC3
nat { nat {
source {
41
MS Card MX-SPC3
pool src-pool {
address-range low pool src-pool {
10.10.10.2 high 10.10.10.10; address {
} 10.10.10.2/32 to
10.10.10.10/32;
}
# Since this is implicitly
a dynamic mapping,
# there is port translation
by default , so we need to
# explictly specify that we
don’t want port translation.
port {
no-translation;
}
}
42
MS Card MX-SPC3
MS Card MX-SPC3
}
}
} # end nat
} # end source
} # end nat
address-book {
global {
address addr1 {
address-range 10.45.0.2/32 {
to {
10.45.0.10/32;
}
}
}
}
}
MS Card MX-SPC3
MS Card MX-SPC3
nat { nat {
source {
pool src-pool {
address 10.10.10.0/24; pool src-pool {
port { address {
automatic; 10.10.10.0/24;
} }
} # Since this is implicitly
a dynamic mapping,
# and there is no explicit
port statement
# to indicate otherwise,
the default port
# mapping behavior takes
effect.
}
45
MS Card MX-SPC3
rule rule-napt44 {
match-direction input; rule-set rule-napt44 {
term t1 { match-direction input;
from { rule r1 {
source-address { match {
10.45.1.0/24 source-address
} 10.45.1.0/24;
application- application accept-
sets accept-algs; algs;
} }
then { then {
translated { source-nat {
source-pool pool {
src-pool; src-pool;
translation- }
type { }
napt44; }
} }
} }
}
}
}
} # end nat
} # end source
} # end nat
46
MS Card MX-SPC3
nat { nat {
source {
pool src-pool {
address pool src-pool {
2001:DB8:2222::0/112; address {
port { 2001:DB8:2222::0/112;
range low 20000 high }
30000; port {
} range {
} 20000;
to {
30000;
}
}
}
}
47
MS Card MX-SPC3
rule rule-napt66 {
match-direction input; rule-set rule-napt66 {
term t1 { match-direction input;
from { rule r1 {
source-address { match {
source-address
2001:DB8:1111::0/96; 2001:DB8:1111::0/96;
} }
} then {
then { source-nat {
translated { pool {
source-pool src-pool;
src-pool; }
translation- }
type { }
napt66; }
} }
}
}
}
}
} # end nat
} # end source
} # end nat
48
MS Card MX-SPC3
nat { nat {
destination {
pool dest-pool {
address 10.10.10.2/32; pool dest-pool {
} address {
10.10.10.2/32;
}
}
49
MS Card MX-SPC3
} # end nat
} # end destination
} # end nat
50
MS Card MX-SPC3
nat { nat {
source {
pool src-pool {
address 10.10.10.0/24; pool src-pool {
port { address {
automatic; 10.10.10.0/24;
} }
} port {
automatic {
round-robin;
}
}
}
51
MS Card MX-SPC3
MS Card MX-SPC3
}
}
} # end nat
} # end source
destination {
MS Card MX-SPC3
} # end destination
} # end nat
MS Card MX-SPC3
nat { nat {
source {
54
MS Card MX-SPC3
pool src-pool {
address 10.10.10.0/24; pool src-pool {
port { address {
automatic; 10.10.10.0/24;
random- }
allocation; port {
} automatic {
} random-allocation;
mapping-timeout 500; }
} }
mapping-timeout 500;
}
55
MS Card MX-SPC3
2001:DB8:3333::0/64;
}
}
then {
translated {
source-pool
src-pool;
56
MS Card MX-SPC3
destination-
prefix 2001:DB8:3333::0/64;
translation-
type {
stateful-nat64;
}
}
}
}
}
} # end nat
} # end source
destination {
57
MS Card MX-SPC3
MS Card MX-SPC3
} # end destination
} # end nat
MS Card MX-SPC3
nat { nat {
source {
59
MS Card MX-SPC3
pool src-pool {
address pool src-pool {
10.98.10.0/24; address {
} 10.98.10.0/24;
pool dest-pool { }
address # host-address-base indicates
10.99.10.0/24; a type of static mapping where
} # the base address
10.10.10.0/32 maps to the lowest
# address in the pool, namely
10.98.10.0/32,
# and the other addresses map
sequentially from there
# e.g. 10.10.10.1 maps to
10.98.10.1, and so on.
# Since this is a static
mapping, there is no port translation
# by default.
# Note that host-address-base
does not have to be the
# lowest address allowed by
the subsequent source rule.
# Any packet with a source
address allowed by the source rule
# but is lower than the host-
address-base is discarded.
host-address-base
10.10.10.0/32;
}
60
MS Card MX-SPC3
twice-basic-nat-44;
}
}
}
}
}
61
MS Card MX-SPC3
} # end nat
} # end source
destination {
pool dest-pool {
address {
10.99.10.0/24;
}
}
62
MS Card MX-SPC3
} # end destination
} # end nat
MS Card MX-SPC3
MS Card MX-SPC3
nat { nat {
source {
pool src-pool {
address 10.98.10.0/24; pool src-pool {
} address {
pool dest-pool { 10.98.10.0/24;
address 10.99.10.0/24; }
} port {
no-translation;
}
}
64
MS Card MX-SPC3
MS Card MX-SPC3
} # end nat
} # end source
destination {
pool dest-pool {
# By default, address
mapping in destination pools is static.
address {
10.99.10.0/24;
}
}
66
MS Card MX-SPC3
} # end destination
} # end nat
MS Card MX-SPC3
MS Card MX-SPC3
nat { nat {
source {
pool src-pool {
address 10.98.10.0/24; pool src-pool {
port { address {
automatic; 10.98.10.0/24;
secured-port-block- }
allocation block-size 256 max- port {
blocks-per-address 1 active- automatic {
block-timeout 300; round-robin;
} }
} block-allocation {
pool dest-pool { block-size 256;
address 10.99.10.2/32; maximum-blocks-per-
} host 1;
active-block-timeout
300;
}
}
}
68
MS Card MX-SPC3
MS Card MX-SPC3
} # end nat
} # end source
destination {
pool dest-pool {
address {
10.99.10.2/32;
}
}
70
MS Card MX-SPC3
} # end destination
} # end nat
71
MS Card MX-SPC3
nat { nat {
source {
72
MS Card MX-SPC3
pool src-pool {
address 10.10.10.0/24; pool src-pool {
port { address {
range low 1024 high 10.10.10.0/24;
19999; }
deterministic-port- port {
block-allocation block-size 256; range {
} 1024;
mapping-timeout 120; to {
} 19999;
}
}
deterministic {
block-size 256;
# host address
specifies the subnet that you
# want to apply to
this pool.
host address
10.2.0.0/20;
}
}
mapping-timeout 120;
}
73
MS Card MX-SPC3
} # end nat
} # end source
} # end nat
74
MS Card MX-SPC3
nat { nat {
source {
75
MS Card MX-SPC3
pool src-pool {
address 10.98.10.0/24; pool src-pool {
port { address {
automatic; 10.98.10.0/24;
random-allocation; }
} port {
deterministic- automatic {
port-block-allocation block- random-allocation;
size 256; }
} deterministic {
} block-size 256;
host address
2001:DB8:1111::1/120;
}
}
}
76
MS Card MX-SPC3
} # end nat
} # end source
77
MS Card MX-SPC3
destination {
pool dest-pool {
address {
10.99.10.2/32;
}
}
MS Card MX-SPC3
} # end destination
} # end nat
MS Card MX-SPC3
nat { nat {
source {
79
MS Card MX-SPC3
pool src-pool {
address 10.10.10.2/32; pool src-pool {
} address {
pool dest-pool { 10.10.10.2/32;
address 10.99.10.2/32; }
} }
80
MS Card MX-SPC3
} # end nat
} # end source
81
MS Card MX-SPC3
destination {
pool dest-pool {
address {
10.99.10.2/32;
}
}
rule-set rule-napt-pt-dest {
match-direction input;
rule r1 {
match {
destination-address
2001:DB8:2222::2/128;
}
then {
destination-nat {
pool {
dest-pool;
}
}
}
}
}
82
MS Card MX-SPC3
} # end destination
} # end nat
• For the IDS service on the MS Card, the default behavior is to detect and drop packets with IPv4
options and IPv6 extensions. If you want to allow these packets, you have to allow them explicitly
through configuration.
• For the IDS Next Gen Service on the MX-SPC3, the default behavior is to allow packets with IPv4
options and IPv6 extensions. If you want to detect and drop these packets, you have to disallow
them explicitly through configuration.
MS Card MX-SPC3
MS Card MX-SPC3
MS Card MX-SPC3
MS Card MX-SPC3
MS Card MX-SPC3
MS Card MX-SPC3
MS Card MX-SPC3
MS Card MX-SPC3
MS Card MX-SPC3
MS Card MX-SPC3
}
}
92
MS Card MX-SPC3
MS Card MX-SPC3
}
}
You typically use this procedure to migrate a router supporting legacy services on the MS card to a
router supporting Next Gen Services on the MX-SPC3, but this procedure applies even if the router that
you are migrating from does not contain MS card cards.
Because Next Gen Services configuration is not compatible with legacy service provisioning, migrating a
router to support Next Gen Services on the MX-SPC3 requires you to completely deprovision and
reprovision your router . Furthermore:
• You cannot configure Next Gen Services on a router equipped with MS cards.
• You cannot configure legacy services on a router equipped with MX-SPC3 cards.
In other words, a router can run with either MS cards or MX-SPC3 cards but not both at the same time.
NOTE: This procedure is service affecting. You are setting the router to factory default
configuration.
b. Configure the management interface with the same IP address as you had before you loaded the
factory default configuration:
c. Configure SSH so that you can continue to access the router. For example:
SEE ALSO
IN THIS SECTION
Service Sets | 95
Services Interfaces | 96
To configure services with Next Gen Services, you need to configure the following objects:
• Service rules
• Service sets
• Services interfaces
Service rules specify a set of matching conditions and a set of actions to apply to traffic when it matches
the conditions. For example, a stateful firewall rule can specify a destination address that must be
matched, and take the action of dropping packets that have that destination address.
Service rule sets consist of a group of services rules that belong to the same category. For example, a
stateful firewall rule set consists of stateful firewall rules.
Service Sets
A service set specifies one or more service rules or rule sets to apply to traffic. The service set also
specifies a services interface, which indicates where the services processing is performed.
The service set applies the service rules to all traffic that flows through a particular interface.
The service set applies the service rules to traffic that is destined for a particular next hop. You must
redirect the next-hop traffic to the services interface that the service set uses.
Services Interfaces
A services interface indicates where a service is applied to traffic. Services interfaces are not physical
links to external devices.
If a service is performed on an MX-SPC3 services card, the service interface has the format:
vms-slot-number/pic-number/port-number
If a service is performed on a line card’s PFE (inline services), the service interface has the format si-slot-
number/pic-number/0.
RELATED DOCUMENTATION
[edit]
user@host# set interfaces interface-name
[edit]
user@host# set interfaces interface-name unit logical-unit-number family (inet | inet6)
b. If you are using the services interface in a next-hop service set, configure inside and outside
interface units:
[edit]
user@host# set interfaces interface-name unit logical-unit-number family (inet | inet6)
user@host# set interfaces interface-name unit logical-unit-number service-domain inside
user@host# set interfaces interface-name unit logical-unit-number family (inet | inet6)
user@host# set interfaces interface-name unit logical-unit-number service-domain outside
For example:
[edit]
user@host# set interfaces vms-1/0/0 unit 100 family inet
user@host# set interfaces vms-1/0/0 unit 100 service-domain inside
user@host# set interfaces vms-1/0/0 unit 1000 family inet
user@host# set interfaces vms-1/0/0 unit 1000 service-domain outside
3. When neither NAT nor the max-sessions-per-subscriber statement at the [edit service-set service-
set-name service-set-options] hierarchy level are configured, enable the creation of subscribers if
you want to track subscribers.
When the CPU usage exceeds the value (percentage of the total available CPU resources), the system
reduces the rate of new sessions so that the existing sessions are not affected by low CPU
availability. The CPU utilization is constantly monitored, and if the CPU usage remains above the
configured cpu-load-threshold value for a continuous period of 5 seconds, Junos OS reduces the
session rate value configured at edit interfaces interface-name services-options session-limit
rate by 10%. This is repeated until the CPU utilization comes down to the configured limit.
If you specify the maximum number of sessions to be zero, it indicates that the configuration is not
effective. You must specify a value higher than zero for the maximum number of sessions.
6. Configure the maximum number of new sessions allowed per second on a services card.
RELATED DOCUMENTATION
[edit services]
user@host# edit service-set service-set-name
99
2. Specify the service interface that the service set uses to apply services.
3. Specify the service rules that the service set applies to traffic.
For example:
6. Apply the service set to an interface that is passing traffic. You can apply a service filter to apply the
service set to only certain traffic on the interface.
For details about configuring the service-filter, see Guidelines for Configuring Service Filters.
The input option applies the service set to the input side of the interface, and the output option
applies the service set to the output side of the interface. If you are using a bidirectional service rule
in the service set, then the same service set must be used for input and output.
RELATED DOCUMENTATION
How to Configure Service Set Limits for Next Gen Services | 101
Configuration Differences Between Adaptive Services and Next Gen Services on the MX-SPC3 | 16
How to Configure Next-Hop Style Service Sets for Next Gen Services
[edit services]
user@host# edit service-set service-set-name
2. Specify the services interface inside unit and outside unit for the service set.
The inside-service-interface must be a service interface logical unit that is configured with service-
domain inside The outside-service-interface must be a service interface logical unit that is configured
with service-domain outside.
3. Specify the service rules that the service set applies to traffic.
For example:
5. Configure a static route to force traffic to the inside or outside interface of the next-hop service set.
101
For example, if you want traffic with the destination 198.51.100.33 to be processed by the service
set with the inside interface vms-1/0/0.100:
[edit routing-options]
user@host# set static route 198.51.100.33 next-hop vms-1/0/0.100
RELATED DOCUMENTATION
1. Set the maximum number of session setups allowed per second for the service set. After this setup
rate is reached, any additional session setup attempts are dropped. If you do not include the max-
session-creation-rate statement, the session setup rate is not limited.
3. To limit the session open information in you system logs, you can disable it from being collected.
5. Specify the maximum number of sessions allowed simultaneously on the service set. If you specify
the maximum number of sessions to be zero, it indicates that the configuration is not effective. You
must specify a value higher than zero for the maximum number of sessions.
6. Configure the session lifetime for the service set in seconds. The session is closed after this amount
of time, even if traffic is running on the session.
a. Set the timeout period for the Transmission Control Protocol (TCP) session tear-down.
b. Configure the inactivity timeout period for asymmetric TCP established sessions
c. Configure the number of seconds that a unidirectional TCP session can be inactive before it is
closed.
The default value is 30 seconds. The range is 4 through 86,400 seconds. Any value you configure
in the application protocol definition overrides the value specified here; for more information, see
"Configuring Application Properties for Next Gen Services" on page 524.
d. Set the timeout period for Transmission Control Protocol (TCP) session establishment, for use
with SYN-cookie defenses against network intrusion.
The default value is 5 seconds. The range of possible values is from 4 through 224 seconds. Any
value you configure in the intrusion detection service (IDS) definition overrides the value specified
here; for more information, see "Configuring Network Attack Protection With IDS Screens for
Next Gen Services" on page 349.
RELATED DOCUMENTATION
IN THIS SECTION
Requirements | 104
Overview | 104
Configuration | 104
This example shows how to configure Next Gen Services inter-chassis high availability for stateful
firewall and NAT services.
Requirements
This example uses the following hardware and software components:
Overview
Two MX 3D routers are identically configured to facilitate stateful failover for firewall and NAT services
in case of a chassis failure.
Configuration
IN THIS SECTION
To configure inter-chassis high availability for this example, perform these tasks:
To quickly configure this example on the routers, copy the following commands and paste them into the
router terminal window after removing line breaks and substituting interface information specific to
your site.
[edit]
set interfaces vms-4/0/0 redundancy-options redundancy-peer ipaddress 5.5.5.2
set interfaces vms-4/0/0 redundancy-options routing-instance HA
set interfaces vms-4/0/0 unit 10 ip-address-owner service-plane
set interfaces vms-4/0/0 unit 10 family inet address 5.5.5.1/32
set interfaces vms-4/0/0 unit 20 family inet
set interfaces vms-4/0/0 unit 20 service-domain inside
set interfaces vms-4/0/0 unit 30 family inet
set interfaces vms-4/0/0 unit 30 service-domain outside
set interfaces ge-2/0/0 vlan-tagging
set interfaces ge-2/0/0 unit 0 vlan-id 100 family inet address 20.1.1.1/24
set routing-instances HA instance-type vrf
set routing-instances HA interface ge-2/0/0.0
set routing-instances HA interface vms-4/0/0.10
set routing-instances HA route-distinguisher 1:1
set policy-options policy-statement dummy term 1 then reject
set routing-instances HA vrf-import dummy
set routing-instances HA vrf-export dummy
set routing-instances HA routing-options static route route 5.5.5.1/32 next-hop vms-4/0/0.10
set routing-instances HA routing-options static route route 5.5.5.2/32 next-hop 20.1.1.2
set services nat pool p2 address 32.0.0.0/24
set services nat pool p2 port automatic random-allocation
set services nat pool p2 address-allocation round-robin
set services nat rule r2 match-direction input
set services nat rule r2 term t1 from source-address 129.0.0.0/8
set services nat rule r2 term t1 from source-address 128.0.0.0/8
set services nat rule r2 term t1 then translated source-pool p2
set services nat rule r2 term t1 then translated translation-type napt-44
set services nat rule r2 term t1 then translated address-pooling paired
106
NOTE: The following configuration is for chassis 2. The NAT, stateful firewall, and service-set
information must be identical for chassis 1 and 2.
Step-by-Step Procedure
The interfaces for each of the HA pair of routers are configured identically with the exception of the
following service PIC options:
• unit unit-number family inet address address of a unit, other than 0, that contains the ip-address-
owner service-plane option
To configure interfaces:
[edit interfaces}
user@host# set interfaces vms-4/0/0 redundancy-options redundancy-peer ipaddress 5.5.5.2
108
2. Configure the interfaces for chassis 1 that are used as interchassis links for synchronization traffic.
Results
unit 20 {
family inet;
family inet6;
service-domain inside;
}
unit 30 {
family inet;
family inet6;
service-domain outside;
}
}
}
Step-by-Step Procedure
Detailed routing configuration is not included for this example. A routing instance is required for the HA
synchronization traffic between the chassis as follows:
Results
interface vms-4/0/0.10;
route-distinguisher 1:1;
vrf-import dummy;
vrf-export dummy;
routing-options {
static {
route 5.5.5.1/32 next-hop vms-4/0/0.10;
route 5.5.5.2/32 next-hop 20.1.1.2;
}
}
}
Step-by-Step Procedure
Configure NAT and stateful firewall identically on both routers. To configure NAT and stateful firewall:
Results
term t1 {
from {
source-address {
any-unicast;
}
}
then {
accept;
syslog;
}
}
}
Step-by-Step Procedure
Configure the the service set identically on both routers. To configure the service set:
2. Configure references to NAT and stateful firewall rules for the service set.
user@host# set services service-set ss2 syslog host local class session-logs
user@host# set services service-set ss2 syslog host local class stateful-firewall-logs
user@host# set services service-set ss2 syslog host local class nat-logs
Results
Step-by-Step Procedure
The interfaces for each of the HA pair of routers are configured identically with the exception of the
following service PIC options:
• unit unit-number family inet address address of a unit, other than 0, that contains the ip-address-
owner service-plane option
The redundancy-peer ipaddress points to the address of the unit (unit 10) on vms-4/0/0 on chassis
on chassis 1 that contains the ip-address-owner service-plane statement.
[edit interfaces}
set interfaces vms-4/0/0 redundancy-options redundancy-peer ipaddress 5.5.5.1
user@host# set interfaces vms-4/0/0 redundancy-options routing-instance HA
user@host# set interfaces vms-4/0/0 unit 10 ip-address-owner service-plane
user@host# set interfaces vms-4/0/0 unit 10 family inet address 5.5.5.2/32
user@host# set interfaces vms-4/0/0 unit 20 family inet
user@host# set interfaces vms-4/0/0 unit 20 service-domain inside
user@host# set interfaces vms-4/0/0 unit 30 family inet
user@host# set interfaces vms-4/0/0 unit 30 service-domain outside
2. Configure the interfaces for chassis 2 that are used as interchassis links for synchronization traffic
Results
family inet {
address 5.5.5.2/32;
}
}
ge-2/0/0 {
vlan-tagging;
unit 0 {
vlan-id 100;
family inet {
address 20.1.1.2/24;
}
}
unit 10 {
vlan-id 10;
family inet {
address 2.10.1.2/24;
}
Step-by-Step Procedure
Detailed routing configuration is not included for this example. A routing instance is required for the HA
synchronization traffic between the two chassis and is included here.
NOTE: The following configuration steps are identical to the steps shown for chassis 1.
116
Results
Requirements | 117
Configuration | 117
Configuration | 119
This example shows how to configure different IKE preshared key used by the VPN gateway to
authenticate the remote peer. Similarly, to configure same IKE preshared key used by the VPN gateway
to authenticate the remote peer.
117
Requirements
Configuration
To configure different IKE preshared key that the VPN gateway uses to authenticate the remote peer,
perform these tasks.
1. Configure the seeded-psk for ike policy in the device with autovpn hub.
[edit]
user@host# set security ike policy IKE_POL seeded-pre-shared-key ascii-text ascii-text
or
For example:
or
2. Generate the pre-shared-key for remote peer using gateway name and user-id.
[edit]
user@host# show security ike pre-shared-key gateway-name gw-name|master key user-id user-id
For example:
3. Configure the generated PSK on the ike policy for remote peer device.
[edit]
user@host# set security ike policy IKE_POL pre-shared-key ascii-text generated-psk
For example:
user@host# set security ike policy IKE_POL pre-shared-key ascii-text $ABC1223"; ## SECRET-DATA
Result
From the configuration mode, confirm your configuration by entering the show security command. If the
output does not display the intended configuration, repeat the instructions in this example to correct
the configuration.
[edit]
user@host# show security security {
ike {
traceoptions {
file iked size 10m;
flag all;
level 15;
trace-buffer;
}
proposal IKE_PROP {
authentication-method pre-shared-keys;
dh-group group14;
authentication-algorithm sha-256;
encryption-algorithm aes-256-cbc;
lifetime-seconds 180;
}
policy IKE_POL {
mode aggressive;
proposals IKE_PROP;
pre-shared-key ascii-text "$9$wo2oGk.569pDi9p0BSys24"; ## SECRET-DATA
}
gateway r0r1_GW {
ike-policy IKE_POL;
dynamic {
119
hostname .juniper.net;
ike-user-type group-ike-id;
}
local-identity hostname hub.juniper.net;
external-interface lo0;
local-address 11.0.0.1;
version v1-only;
}
}
}
Configuration
To configure same IKE preshared key that the VPN gateway uses to authenticate the remote peer,
perform these tasks.
1. Configure the common pre-shared-key for ike policy in the device with autovpn hub.
[edit]
user@host# set security ike policy IKE_POL pre-shared-key ascii-text ascii text
For example:
2. onfigure the common pre-shared-key on the ike policy for remote peer device.
[edit]
user@host# set security ike policy IKE_POL pre-shared-key ascii-text ascii text
For example:
Result
120
From the configuration mode, confirm your configuration by entering the show security command. If the
output does not display the intended configuration, repeat the instructions in this example to correct
the configuration.
[edit]
user@host# show security security {
ike {
traceoptions {
file iked size 10m;
flag all;
level 15;
trace-buffer;
}
proposal IKE_PROP {
authentication-method pre-shared-keys;
dh-group group14;
authentication-algorithm sha-256;
encryption-algorithm aes-256-cbc;
lifetime-seconds 180;
}
policy IKE_POL {
mode aggressive;
proposals IKE_PROP;
seeded-pre-shared-key ascii-text "$9$zoDln9pIEyWLN0BLNdboaFn/
C0BRhSeM8"; ## SECRET-DATA
}
gateway r0r1_GW {
ike-policy IKE_POL;
dynamic {
hostname .juniper.net;
ike-user-type group-ike-id;
}
local-identity hostname hub.juniper.net;
external-interface lo0.0;
local-address 11.0.0.1;
version v1-only;
}
}
121
IN THIS SECTION
To use Next Gen Services, you must first enable it on the MX Series router. This topic describes how to
enable Next Gen Services, how to disable Next Gen Services, and how to determine whether Next Gen
Services is enabled or disabled on your system.
• The MX-SPC3 card remains in Present state and does not come online
• The MX-SPC3 comes online successfully with different a software image (either a previously installed
image or the pre-loaded image from manufacturing)
To work around this problem, you must install the jpfe-spc3* package manually on the NG-RE. To install
this package manually, follow one of these procedures, depending on whether or not you have enabled
Next Gen Services (unified-services) mode:
4. After the RE comes up, copy package jpfe-spc3-mx-x86-32-19.4R1.9.tgz to the /var/tmp directory.
5. Load jpfe-spc3*.
The following procedure is a general procedure for enabling and disabling Next Gen Services.
For more details on the differences between the configuration of the MX-SPC3 services card and legacy
services cards, see "Configuration Differences Between Adaptive Services and Next Gen Services on the
MX-SPC3" on page 16 and plan your migration appropriately.
You can run Next Gen Services on the MX240, MX480 and MX960 using the MX-SPC3 services card. To
use Next Gen Services on the MX Series, you must first enable Next Gen Services:
1. Delete any router configuration that is for services. This includes configuration under the [edit
services] hierarchy, configuration for services interfaces, and any configuration that refers to services
interfaces.
2. Enable Next Gen Services.
You can also enable the Next Gen Services on a Guest network function (GNF), by using the CLI
request system enable unified-services at the GNF level. For more information, see Next Gen
Services on Junos node slicing.
1. Delete any router configuration that is for services. This includes configuration under the [edit
services] hierarchy, configuration for services interfaces, and any configuration that refers to services
interfaces.
2. Disable Next Gen Services.
• Unified Services : Upgrade staged , please reboot with 'request system reboot' to enable unified
services.—You must perform a system reboot before Next Gen Services is enabled.
• Unified Services : Upgrade staged , please reboot with 'request system reboot' to disable unified
services.—You must perform a system reboot before Next Gen Services is disabled.
RELATED DOCUMENTATION
CHAPTER 3
IN THIS CHAPTER
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Syslog Events for NAT Rule Conditions with Next Gen Services | 142
IN THIS SECTION
All CGNAT services supported under Next Gen Services use global system logging. This topic describes
global system logging for Next Gen Services CGNAT services and how to configure it.
The CGNAT services supported under Next Gen Services support global system logging for syslog
messages. You configure syslog messaging for these services under the service-set hierarchy. You can
126
send logs to either the local routing engine (RE) or one or more remote servers (each of these is
identified as a stream). You can configure files to log system messages and also assign attributes, such as
severity levels, to messages. Reboot requests are recorded to the system log files, which you can view
with the show log command.
In the case of an AMS bundle, each PIC establishes a TCP connection with the log server and the
external collector receives log messages from all the AMS members.
You can save logs for Next Gen Services locally, which is called: event mode, or send the log messages to
one or more external servers, called: stream mode.
In event mode, after the log message is recorded, the log is stored within a log file which is then stored
in the database table of the local routing engine (RE) for further analysis.
When configured in stream mode, log messages are streamed to one or more remote log servers. Each
remote log server is assigned a stream from which it receives logs.
When configured in stream mode, Next Gen Services log messages are streamed to a remote device.
For stream mode log forwarding, you can configure which transport protocol is used between MX-SPC3
services card and the log server. You can use either UDP, TCP, or TLS as the transport protocol.
When the device is configured in stream mode, you can configure a maximum of eight system log hosts
to stream to.
Configuring system logging for Next Gen Services involves several main steps and considerations:
• Global system logging — Next Gen Services system logging uses a global logging option that you
need to enable in order to collect system log messages.
To enable global system logging for Next Gen Services, set the traceoptions option under the edit
services rtlog hierarchy.
• For Next Gen Services, syslogs are always set at the service-set level regardless of whether you are
running event mode or stream mode.
You must configure system logging for each service-set for which you want to collect logs. Each
service-set uses a separate TCP connection in stream mode.
127
As a log client, Next Gen Services initiates TCP/TLS connections to the remote log server. By default,
we connect to port 514 for TCP logging [RFC 6587], and port 6514 for TLS logging [RFC 5425]. You
can also specify port numbers for TCP and TLS logging using CLI.
• If you are using AMS bundles, syslogs are generated from each member interface of AMS group
You can stop open session information from cluttering up your syslogs by disabling session open
information from being collected:
RELATED DOCUMENTATION
To configure either event mode or stream mode system logging for Next Gen Services, you must first
globally enable logging:
[edit]
user@host# edit services rtlogtraceoptions
4. Configure information about the files that contain trace logging information.
5. Define tracing operations for individual service-sets. To specify more than one tracing operation,
include multiple flag statements.
6. (Optional) If you prefer not to perform any system logging, you can disable it.
RELATED DOCUMENTATION
You must enable global system logging for Next Gen Services in order to perform event mode system
logging. See, "Enabling Global System Logging for Next Gen Services" on page 127.
To send Next Gen Services log messages to a file on the local router, you’ll need to configure system
logging for event mode. This procedure describes this configuration process.
129
NOTE: For Next Gen Services, syslogs are always set at the service-set level. You must perform
this procedure for each service-set for which you want to collect logs.
2. Specify the name of the service-set for which you want to log messages.
5. Specify the rate at which log messages are sent per second.
For example, to collect logs for stateful firewall, sessions and NAT:
RELATED DOCUMENTATION
You must enable global system logging for Next Gen Services in order to perform stream logging. See,
"Enabling Global System Logging for Next Gen Services" on page 127.
To send system log messages about Next Gen Services to one or more remote servers, you can configure
system logging for stream mode. This procedure describes the configuration process.
NOTE: Next Gen Services system log messages are configured and collected at the service-set
level.
In this procedure, you’ll configure a stream for the log messages between each service set and
each remote server that you want to send log messages.
Complete this procedure for each service-set and each remote server for which you want to
collect logs and send logs.
1. Specify the names of the service-set for which you want to collect log messages.
BEST PRACTICE: The syslog source address can be any arbitrary IP address. It does not
have to be an IP address that is assigned to the device. Rather, this IP address is used on the
syslog collector to identify the syslog source. The best practice is to configure the source
address as the IP address of the interface that the traffic is sent out on.
For example, to collect logs for stateful firewall, sessions and NAT:
RELATED DOCUMENTATION
IN THIS SECTION
This topic describes Next Gen Services MX-SPC3 services card system log error messages and provides
a comparison of these messages with the MS-MPC services card.
Following are example session open logs for MS-MPC services cards versus MX-SPC3 services
processing card:
134
Following are example session close logs for MS-MPC services cards versus MX-SPC3 services
processing card:
Following are example NAT Out of Address logs for MS-MPC services cards versus MX-SPC3 services
processing card:
JSERVICES_NAT_OUTOF_ADDRESSES: nat-pool-name
Following are example NAT Out of Ports logs for MS-MPC services cards versus MX-SPC3 services
processing card:
Following are example NAT rule match logs for MS-MPC services cards versus MX-SPC3 services
processing card:
Following are example NAT Rule Match logs for MS-MPC services cards versus MX-SPC3 services
processing card:
Following are example NAT port block allocation logs for MS-MPC services cards versus MX-SPC3
services processing card:
SYSLOG_MSMPC{ss1}[jservices-nat]: JSERVICES_NAT_PORT_BLOCK_RELEASE:
2001:2010:0:0:0:0:0:2 -> 161.161.16.1:56804-56813 0x597ef2c3
Following are example interim logs for MS-MPC services cards versus MX-SPC3 services processing
card:
Following are example NAT port block release logs for MS-MPC services cards versus MX-SPC3 services
processing card:
Following are example stateful firewall rule accept logs for MS-MPC services cards versus MX-SPC3
services processing card:
Sep 20 01:36:51 mobst480b (FPC Slot 5, PIC Slot 0) 2017-09-20 08:36:19: SYSLOG_MSMPC{SS_TEST}
[jservices-sfw]: JSERVICES_SFW_RULE_ACCEPT: proto 17 (UDP) application: any, interface:
xe-2/2/1.0, 24.0.0.2:1234 -> 25.0.0.2:1234, Match SFW allow rule-set: (null), rule: SFW_RULE_TEST,
term: t
140
Following are example stateful firewall rule reject logs for MS-MPC services cards versus MX-SPC3
services processing card:
Sep 20 01:42:02 mobst480b (FPC Slot 5, PIC Slot 0) 2017-09-20 08:41:31: SYSLOG_MSMPC{SS_TEST}
[jservices-sfw]: JSERVICES_SFW_RULE_REJECT: proto 17 (UDP) application: any, 24.0.0.2:1234 ->
25.0.0.2:1234, Match SFW reject rule-set: (null), rule: SFW_RULE_TEST, term: t
Following are example stateful firewall rule discard logs for MS-MPC services cards versus MX-SPC3
services processing card:
Sep 20 01:43:57 mobst480b (FPC Slot 5, PIC Slot 0) 2017-09-20 08:43:26: SYSLOG_MSMPC{SS_TEST}
[jservices-sfw]: JSERVICES_SFW_RULE_DISCARD: proto 17 (UDP) application: any, 24.0.0.2:1234 ->
25.0.0.2:1234, Match SFW drop rule-set: (null), rule: SFW_RULE_TEST, term: t
Following are example stateful firewall rule no rule drop logs for MS-MPC services cards versus MX-
SPC3 services processing card:
Sep 20 01:43:57 mobst480b (FPC Slot 5, PIC Slot 0) 2017-09-20 08:43:26: SYSLOG_MSMPC{SS_TEST}
[jservices-sfw]: JSERVICES_SFW_NO_RULE_DROP: proto 17 (UDP) application: any, 24.0.0.2:1234 ->
25.0.0.2:1234
Following are example stateful firewall logs for MS-MPC services cards versus MX-SPC3 services
processing card:
RELATED DOCUMENTATION
Configuring Syslog Events for NAT Rule Conditions with Next Gen
Services
To configure syslog events to be generated when traffic matches NAT rule conditions for Next Gen
Services NAT:
Configure the generation of a syslog when traffic matches the NAT rule conditions.
Out of addresses logs — If the allocation request fails to be handled as the public IP addresses in the No-
PAT pool are used up, the out of addresses syslog is generated.
Out of ports logs — If the allocation request fails to be handled as the public IPs and ports in the NAPT
pool are used up, the out of ports syslog is generated.
143
NAT Rule Match Logs — If the packet matches the NAT rule, the NAT rule match syslog is generated.
Pool resource release logs — If the public IP and port succeeds to be released to the NAPT pool, the pool
release syslog is generated.
RELATED DOCUMENTATION
CHAPTER 4
IN THIS CHAPTER
IN THIS SECTION
Summary Mapping of MX-SPC3 CLI Services Operational Commands to SNMP MIBs | 153
This topic describes the SNMP MIBS and traps for Next Gen Services with the MX-SPC3 services. As a
reference, it also compares MX-SPC3 services card MIBS and traps with the MPC services card.
Table 26 on page 145, Table 27 on page 147, and Table 28 on page 148 describe the MIB objects in the
service-set related SNMP MIB tables supported in jnxSPMIB. This MIB is supported for both MS-MPC
services cards and MX-SPC3 services cards with the exception of the following:
• The MX-SPC3 services card supports counters, such as memory usage and cpu usage, at the per
service-set and per pic level, whereas MS-MPC services cards support these counters at the service
level, for example, stateful firewall (SFW) and NAT).
The MX-SPC3 card uses the jnxSpSvcSetTable MIB for these counters and the MS-MPC services card
uses the jnxSpSvcSetSvcTypeTable MIB for these counters.
145
• InTable 26 on page 145 the jnxSpSvcSetTable, the object jnxSpSvcSetSvcType field will show a value
of “ALL” since no per service-type specific counters are supported.
• Interface-service—The service is
interface based.
Table 27: Service-Set Service Type SNMP MIB Table (jnxSpSvcSetSvcTypeTable) (Continued)
• Yellow—Unused memory is
reclaimed. All new flows are
allowed.
jnxSpSvcSetIfNumTotalUdpSessAct
ive
jnxSpSvcSetIfNumTotalOtherSessA
ctive
151
jnxSpSvcSetIfPeakTotalUdpSessAct
ive
jnxSpSvcSetIfPeakTotalOtherSessA
ctive
jnxSpSvcSetIfNumTotalUdpIpv4Ses
sActive
jnxSpSvcSetIfNumTotalUdpIpv6Ses
sActive
jnxSpSvcSetIfNumTotalOtherIpv4S
essActive
jnxSpSvcSetIfNumTotalOtherIpv6S
essActive
152
jnxSpSvcSetIfNumTotalUdpGatedS
essActive
jnxSpSvcSetIfNumTotalUdpRegSes
sActive
jnxSpSvcSetIfNumTotalUdpTunSess
Active
Table 29 on page 153 summarizes the mapping of the MX-SPC3 services card operations commands to
the respective SNMP MIB.
Table 29: Summary Mapping of MX-SPC3 CLI Services Set Command to SNMP MIBs
Table 29: Summary Mapping of MX-SPC3 CLI Services Set Command to SNMP MIBs (Continued)
flowlimit-drops jnxSpSvcSetFlowLimitPktDr
ops64
memlimit-drops jnxSpSvcSetMemLimitPktDr
ops64
service-set-cpu- jnxSpSvcSetIfCpuUtil
utilization
service-set- jnxSpSvcSetIfPctMemoryUs
percent-bytes- age
used
service-set- jnxSpSvcSetIfPctPolMemor
percent-policy- yUsage
bytes-used
service-set-policy- jnxSpSvcSetIfPolMemoryUs
bytes-used age64
service-sets- jnxSpSvcSetIfSvcSets
configured
155
Table 29: Summary Mapping of MX-SPC3 CLI Services Set Command to SNMP MIBs (Continued)
peak-total-session- jnxSpSvcSetIfPeakTotalSess
active Active
num-created- jnxSpSvcSetIfNumCreatedS
session-per-sec essPerSec
num-deleted- jnxSpSvcSetIfNumDeletedS
session-per-sec essPerSec
num-total-tcp- jnxSpSvcSetIfNumTotalTcpS
session-active essActive
num-total-udp- jnxSpSvcSetIfNumTotalUdp
session-active SessActive
peak-total-tcp- jnxSpSvcSetIfPeakTotalTcpS
session-active essActive
peak-total-udp- jnxSpSvcSetIfPeakTotalUdp
session-active SessActive
num-total-other- jnxSpSvcSetIfNumTotalOthe
session-active rSessActive
156
Table 29: Summary Mapping of MX-SPC3 CLI Services Set Command to SNMP MIBs (Continued)
peak-created- jnxSpSvcSetIfPeakCreatedS
session-per- essPerSec
second
peak-deleted- jnxSpSvcSetIfPeakDeletedS
session-per- essPerSec
second
peak-total-other- jnxSpSvcSetIfPeakTotalOthe
session-active rSessActive
num-total-tcp- jnxSpSvcSetIfNumTotalTcpIp
ipv4-session-active v4SessActive
num-total-tcp- jnxSpSvcSetIfNumTotalTcpIp
ipv6-session-active v6SessActive
num-total-udp- jnxSpSvcSetIfNumTotalUdpI
ipv4-session-active pv4SessActive
num-total-udp- jnxSpSvcSetIfNumTotalUdpI
ipv6-session-active pv6SessActive
num-total-tcp- jnxSpSvcSetIfNumTotalTcpG
gated-session- atedSessActive
active
num-total-udp- jnxSpSvcSetIfNumTotalUdp
gated-session- GatedSessActive
active
157
Table 29: Summary Mapping of MX-SPC3 CLI Services Set Command to SNMP MIBs (Continued)
num-total-other- jnxSpSvcSetIfNumTotalOthe
ipv4-session-active rIpv4SessActive
num-total-other- jnxSpSvcSetIfNumTotalOthe
ipv6-session-active rIpv6SessActive
num-total-tcp- jnxSpSvcSetIfNumTotalTcpR
regular-session- egSessActive
active
num-total-tcp- jnxSpSvcSetIfNumTotalTcpT
tunneled-session- unSessActive
active
num-total-udp- jnxSpSvcSetIfNumTotalUdpT
tunneled-session- unSessActive
active
session-pkts- jnxSpSvcSetIfSessPktRecv
received
session-pkts- jnxSpSvcSetIfSessPktXmit
transmitted
session-slow-path- jnxSpSvcSetIfSessSlowPath
discard Discard
158
Table 29: Summary Mapping of MX-SPC3 CLI Services Set Command to SNMP MIBs (Continued)
session-slow-path- jnxSpSvcSetIfSessSlowPath
forward Forward
msp-num-deleted- jnxSpSvcSetIfMspNumDelet
subs-per-sec edSubsPerSec
msp-num-total- jnxSpSvcSetIfMspNumTotal
subs-active SubsActive
msp-peak-created- jnxSpSvcSetIfMspPeakCreat
subs-per-second edSubsPerSec
msp-peak-deleted- jnxSpSvcSetIfMspPeakDelet
subs-per-second edSubsPerSec
msp-peak-total- jnxSpSvcSetIfMspPeakTotal
subs-active SubsActive
Table 30 on page 159 describes the source NAT SNMP MIB objects for the MS-MPC services card. This
table exposes the source NAT translation attributes of the translated addresses.
Table 31 on page 160 describes the source NAT SNMP MIB objects for the MX-SPC3 services card. This
table contains information on source IP address translation only.
159
Table 30: MS-MPC Services Card Source NAT SNMP MIB Table (jnxSrcNatStatsTable)
Table 30: MS-MPC Services Card Source NAT SNMP MIB Table (jnxSrcNatStatsTable) (Continued)
Table 31: MX-SPC3 Source NAT SNMP MIB Table (jnxNatObjects) (Continued)
Table 31: MX-SPC3 Source NAT SNMP MIB Table (jnxNatObjects) (Continued)
SNMP Traps
Table 32 on page 162 describes the SNMP traps supported by both the MS-MPC services card and the
MX-SPC3 services card.
Trap Description
Trap Description
SPD_TRAP_OIDS(jnxSpSvcSetFlowLimitUtilized) jnxSpSvcSetFlowLimitUtilized —
Indicates a service-set has reached its
upper limit of flows threshold of a
maximun flows allowed for a service
set.
This sections describes how to configure the MS-MPC service card versus the MX-SPC3 services card to
generate SNMP traps.
If the current usage is above the raise threshold or below the clear threshold, we will generate a SNMP
trap.
164
Configuring SNMP Traps for NAT Ports in a Source NAT Pool on an MS-MPC
Configuring SNMP Traps for NAT Ports in a Source NAT Pool on an MX-SPC3
This is infra trap which configures SNMP flow thresholds for all flows for a service set or flows for all
NAT pools configured for a service set.
Example Configuration
jnxJsNatSrcNumAddressAvail.2.112.49.0.0.0.0.0 = 1
jnxJsNatSrcNumAddressInuse.2.112.49.0.0.0.0.0 = 0
This section provides some example trace logs for these SNMP traps.
CPU-Utilization Trap
Memoryzone Trap
RELATED DOCUMENTATION
NAT46 | 198
Reducing Traffic and Bandwidth Requirements Using Port Control Protocol | 254
CHAPTER 5
IN THIS CHAPTER
IN THIS SECTION
Under Next Gen Services with the MX-SPC3, you can configure both Deterministic NAPT44 and
NAPT64 services. Next Gen Services deterministic NAPT services use an algorithm to allocate blocks of
destination ports.
Next Gen Services deterministic NAPT44 service ensures that the original source IPv4 address and port
always map to the same post-NAT IPv4 address and port range, and that the reverse mapping of a given
translated external IPv4 address and port are always mapped to the same internal IPv4 address.
Next Gen Services deterministic NAPT64 service ensures that the original source IPv6 address and port
always map to the same post-NAT IPv4 address and port range, and that the reverse mapping of a given
translated external IPv4 address and port are always mapped to the same internal IPv6 address.
For detailed information on how to configure deterministic NAPT, see "Configuring Deterministic NAPT
for Next Gen Services" on page 177.
173
• Eliminates the need for address translation logging because an IP address is always mapped to the
same external IP address and port range, and the reverse mapping of a given translated external IP
address and port are always mapped to the same internal IP address.
The effectiveness of your implementation of deterministic NAPT depends on your analysis of your
subscriber requirements. The block size you provide indicates how many ports will be made available for
each incoming subscriber address from the range in the from clause specified in the applicable NAT rule.
The allocation algorithm computes an offset value to determine the outgoing IP address and port. A
reverse algorithm is used to derive the originating subscriber address.
NOTE: In order to track subscribers without using logs, an ISP must use a reverse algorithm to
derive a subscriber (source) addresses from a translated address.
The following variables are used in forward calculation (private subscriber IP address to public IP
address) and reverse calculation (public IP address to private subscriber IP address):
If block-size is configured as zero, the method for computing the block size is computed as follows:
block-size = int(64512/ceil[(Nr_Addr_PR_Prefix/Nr_Addr_PU_Prefix)])
where 64512 is the maximum available port range per public IP address.
• Base_PR_Prefix—First usable pre-NAT IPv4 subscriber address in a from clause of the NAT rule.
• Base_PU_Prefix—First usable post-NAT IPv4 subscriber address configured in the NAT pool.
• Pr_Offset—The offset of the pre-NAT IP address that is being translated from the first usable pre-
NAT IPv4 subscriber address in a from clause of the NAT rule. PR_Offset = Pr_Prefix –
Base_Pr_Prefix.
• Nr_Addr_PR_Prefix — Number of usable pre-NAT IPv4 subscriber addresses in a from clause of the
NAT rule.
• Nr_Addr_PU_Prefix — Number of usable post-NAT IPv4 addresses configured in the NAT pool.
• Pu_Offset—Offset of the post-NAT IP address from the first usable post-NAT address. Pu_Offset =
Pu_Prefix – Base_Pu_Prefix.
• Pu_Port_Offset— Offset of the post-NAT port from 1024 added to the product of the offset of the
post-NAT IP address and the number of ports available for each post-NAT IP address.
Pu_Port_Offset = (Pu_Offset * Rounded_Port_Range_Per_IP) + (Pu_Actual_Port –
Pu_Port_Range_Start).
services {
nat {
source {
pool src-pool {
address 203.0.113.0/16;
port {
automatic {
random-allocation;
}
deterministic {
block-size 249;
host address 10.1.0.1/16;
}
}
}
rule-set set1 {
rule det-nat {
match-direction-input;
match {
source-address 10.1.0.0/16;
}
175
then {
source-nat {
pool src-pool;
}
}
}
}
}
}
}
Forward Translation
Using the sample configuration and assuming a subscriber flow sourced from 10.1.1.250:5000:
• The starting port is 62278. There are 249 ports available to the subscriber based on the
configured block size. The available port range spans ports 62278 through 62526 (inclusive).
• The specific flow 10.1.1.250:5000 randomly assigns any of the ports in its range because random
allocation was specified.
Reverse Translation
NOTE: In reverse translation, only the original private IP address can be derived, and not the
original port in use. This is sufficiently granular for law enforcement requirements.
When you have configured deterministic NAPT, you can use the show services nat deterministic-
nat internal-host and show services nat deterministic-nat nat-port-block commands to
show forward and reverse mapping. However, mappings will change if you reconfigure your
deterministic port block allocation block size or the from clause for your NAT rule. In order to provide
historical information on mappings, we recommend that you write scripts that can show specific
mappings for prior configurations.
• For IPv6 deterministic NAT64 host address configuration, we support the last 32-bit (4 byte) change
of the IPv6 host prefix. This means we only can configure /96 prefix masks for IPv6 address, which
supports a maximum address number of 232 for one IPv6 prefix. The host address is specified at the
[services nat source pool p1 port deterministic host] configuration hierarchy.
• Usually, the number of address in host-range should be more than the number of address in pool.
•
BEST PRACTICE: We don’t recommend the host address number be configured to exceed the
total port block resource number because some hosts may not receive a port block resource
successfully.
• The minimum block size for deterministic NAT is 1. If you configure a smaller block size, the commit
fails. If the block size is configured to 0, the block size will be automatically calculated based on host
number and translated address number. If the calculated block size is less than 1, the commit fails.
177
• For Next Gen Services deterministic NAPT, you can configure a mix of IPv4 and IPv6 host addresses
together in a NAT pool in either a host address or an address name list, However. the total host
prefix number cannot exceed 1000.
• You cannot configure an address range or DNS name in a host address book name.
• The configured host address prefix and host address book name are merged together if its prefixes
are overlapped. You can use the show services nat source deterministic operational command to
show the merged prefixes.
•
BEST PRACTICE: We recommend, you keep subscriber host addresses consistent with
multiple rule’s matching the source address prefix, if the same deterministic NAT pool is used
across multiple rules; otherwise, traffic from hosts which are not configured in the NAT pool,
even it matches the NAT rule, may not allocate the port successfully.
• For Next Gen Services NAPT services, the total number of host addresses configured must be greater
than or equal to the deterministic NAT port blocks available.
RELATED DOCUMENTATION
IN THIS SECTION
Configuring the NAT Pool for Deterministic NAPT for Next Gen Services | 178
Configuring the NAT Rule for Deterministic NAPT44 for Next Gen Services | 179
Configuring the NAT Rule for Deterministic NAPT64 for Next Gen Services | 181
Configuring the Service Set for Deterministic NAT for Next Gen Services | 181
Configuring the NAT Pool for Deterministic NAPT for Next Gen Services
To configure the NAT pool for deterministic NAPT:
1. Create a pool.
or
4. If you want the lowest and highest IPv4 addresses (the network and broadcast addresses) in the
source address range of a NAT rule to be translated when the NAT pool is used, configure include-
boundary-address.
5. Configure the port block size. The range is 1 to 64,512. The default block size is 256.
6. Configure the first usable pre-NAT subscriber address, which is used in calculating the offset value
for a pre-NAT address that is being translated. This offset is used to perform the deterministic NAT
mapping.
7. Configure the interval at which the syslog is generated for the deterministic NAT configuration.
8. To configure automatic port assignment for the pool, specify either random allocation or round-robin
allocation.
Random allocation randomly assigns a port from the range 1024 through 65535 for each port
translation. Round robin allocation first assigns port 1024, and uses the next higher port for each
successive port assignment. Round robin allocation is the default.
9. To disable round-robin port allocation for all NAT pools that do not specify an automatic (random-
allocation | round-robin) setting, configure the global setting.
SEE ALSO
Configuring the NAT Rule for Deterministic NAPT44 for Next Gen Services
To configure the NAT rule for deterministic NAPT44:
180
2. Specify the traffic direction to which the NAT rule set applies.
3. Specify the addresses that are translated by the source NAT rule.
To specify one address or prefix value:
To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:
4. Specify one or more application protocols to which the NAT rule applies. The number of applications
listed in the rule must not exceed 3072.
5. Specify the NAT pool that contains the addresses for translated traffic.
Configuring the NAT Rule for Deterministic NAPT64 for Next Gen Services
To configure the NAT rule for deterministic NAPT64:
2. Specify the traffic direction to which the NAT rule set applies.
3. Specify the IPv6 prefix for the source addresses that are translated by the NAT rule.
4. Specify one or more application protocols to which the NAT rule applies. The number of application
terms must not exceed 3072.
5. Specify the NAT source pool that contains the addresses for translated source addresses.
Configuring the Service Set for Deterministic NAT for Next Gen Services
To configure the service set for deterministic NAPT:
182
[edit services]
user@host# edit service-set service-set-name
2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.
or
3. Specify the NAT rule sets to be used with the service set.
This prevents unnecessary creation of an IPv6 fragmentation header when translating IPv4 packets that
are less than 1280 bytes.
RELATED DOCUMENTATION
CHAPTER 6
IN THIS CHAPTER
Configuring Dynamic Address-Only Source NAT for Next Gen Services | 184
IN THIS SECTION
With dynamic address-only translation, you can map a private IP source address to a public IP address. A
public address is picked up dynamically from a source NAT pool, and the mapping from the original
source address to the translated source address is maintained as long as there is at least one active flow
that uses this mapping. The port is not mapped.
• Allows hosts in the private network to connect with the external domain, while hiding the private
network.
RELATED DOCUMENTATION
Configuring Dynamic Address-Only Source NAT for Next Gen Services | 184
184
IN THIS SECTION
Configuring the Source Pool for Dynamic Address-Only Source NAT | 184
Configuring the NAT Source Rule for Dynamic Address-Only Source NAT | 185
Configuring the Service Set for Dynamic Address-Only Source NAT | 187
or
4. Define the NAT pool utilization levels that trigger SNMP traps. The raise-threshold is the pool
utilization percentage that triggers the trap, and the range is 50 through 100. The clear-threshold is
185
the pool utilization percentage that clears the trap, and the range is 40 through 100. The utilization is
based on the number of addresses that are used.
Configuring the NAT Source Rule for Dynamic Address-Only Source NAT
To configure the NAT source rule for dynamic address-only source NAT:
2. Specify the traffic direction to which the NAT rule set applies.
3. Specify the addresses that are translated by the source NAT rule.
To specify one address or prefix value:
To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:
4. Specify one or more application protocols to which the NAT rule applies. The number of applications
listed in the rule must not exceed 3072.
5. Specify the NAT pool that contains the addresses for translated traffic.
6. Configure the address-pooling paired feature if you want to ensure assignment of the same external
IP address for all sessions originating from the same internal host.
[edit services nat source rule-set rule-set-name rule rule-name then source-
nat mapping-type]
user@host# set address-pooling-paired
7. Specify the timeout period for address-pooling-paired mappings that use the NAT pool. The range is
120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this amount of
time are dropped.
If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.
8. Configure the generation of a syslog when traffic matches the NAT rule conditions.
[edit services]
user@host# edit service-set service-set-name
2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.
or
3. Specify the NAT rule sets to be used with the service set.
RELATED DOCUMENTATION
CHAPTER 7
IN THIS CHAPTER
Configuring Network Address Port Translation for Next Gen Services | 189
Configuring Syslog Events for NAT Rule Conditions with Next Gen Services | 196
IN THIS SECTION
NAPT translates a private source IP address to an external source address and port. Multiple private IP
addresses can be mapped to the same external address because each private address is mapped to a
different port of the external address.
With NAPT, you can configure up to 32 external address ranges, and map up to 65,536 private
addresses to each external address.
• Round-robin port and address allocation (see "Round-Robin Port Allocation" on page 292).
• Address pooling and endpoint independent mapping (see "Address Pooling and Endpoint
Independent Mapping for Port Translation" on page 290).
• Secured port block allocation (see "Secured Port Block Allocation for Port Translation" on page 293
189
Benefits of NAPT
• Allows hosts in the private network to connect with the external domain, while hiding the private
network.
• Minimizes the number of public IP addresses that are allocated for NAT.
IN THIS SECTION
or
3. To configure automatic port assignment for the pool, specify either random allocation or round-
robin allocation. Round-robin allocation is the default.
Random allocation randomly assigns a port from the range 1024 through 65535 for each port
translation. Round-robin allocation first assigns port 1024, and uses the next higher port for each
successive port assignment.
4. To disable round-robin port allocation for all NAT pools that do not specify an automatic (random-
allocation | round-robin) setting, configure the global setting.
NOTE: If you specify a range of ports to assign, the automatic statement is ignored.
a. Specify the low and high values for the port. If you do not configure automatic port assignment,
you must configure a range of ports.
b. Specify either random allocation or round-robin allocation. Round-robin allocation is the default.
6. Assign a port within the same range as the incoming port—either 0 through 1023 or 1024 through
65,535. This feature is not available if you configure port-block allocation.
7. Assign a port with the same parity (even or odd) as the incoming source port. This feature is not
available if you configure port-block allocation.
8. Configure a global default port range for NAT pools that use port translation. This port range is
used when a NAT pool does not specify a port range and does not specify automatic port
assignment. The global port range can be from 1024 through 65,535.
9. If you want to allocate a block of ports for each subscriber to use for NAPT, configure port-block
allocation:
a. Configure the number of ports in a block. The range is 1 through 64,512 and the default is 128.
b. Configure the interval, in seconds, for which the block is active. After the timeout, a new block is
allocated, even if ports are available in the active block. If you set the timeout to 0, port blocks
are filled completely before a new port block is allocated, and the last port block remains active
indefinitely. The range is 0 through 86,400, and the default is 0.
c. Specify the timeout period for address-pooling paired mappings that use the NAT pool. The
range is 120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this
amount of time are dropped.
If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.
192
d. Configure the maximum number of blocks that can be allocated to a user address. The range is 1
through 512, and the default is 8.
e. Specify how often to send interim system logs for active port blocks and for inactive port blocks
with live sessions. This increases the reliability of system logs, which are UDP-based and can get
lost in the network. The range is 1800 through 86,400 seconds, and the default is 0 (interim logs
are disabled).
10. Specify the timeout period for endpoint independent translations that use the specified NAT pool.
Mappings that are inactive for this amount of time are dropped. The range is 120 through 86,400
seconds. If you do not configure ei-mapping-timeout, then the mapping-timeout value is used for
endpoint independent translations.
11. Specify the timeout period for address-pooling paired mappings that use the NAT pool. The range
is 120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this amount
of time are dropped.
If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.
12. Define the NAT pool utilization levels that trigger SNMP traps. The raise-threshold is the pool
utilization percentage that triggers the trap, and the range is 50 through 100. The clear-threshold is
the pool utilization percentage that clears the trap, and the range is 40 through 100. For pools that
use port-block allocation, the utilization is based on the number of ports that are used; for pools
193
that do not use port-block allocation, the utilization is based on the number of addresses that are
used.
2. Specify the traffic direction to which the NAT rule set applies.
3. Specify the source addresses that are translated by the source NAT rule.
To specify one address or prefix value:
To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:
[edit services nat source rule-set rule-set-name rule rule-name rule rule-
name]
user@host# set match source-address any-unicast
4. Specify one or more application protocols to which the NAT rule applies. The number of applications
listed in the rule must not exceed 3072.
5. Specify the NAT pool that contains the addresses for translated traffic.
6. Configure the address-pooling paired feature if you want to ensure assignment of the same external
IP address for all sessions originating from the same internal host.
[edit services nat source rule-set rule-set-name rule rule-name then source-
nat mapping-type]
user@host# set address-pooling
7. If you want to ensure that the same external address and port are assigned to all connections from a
given host, configure endpoint-independent mapping:
195
b. Specify prefix lists that contain the hosts that are allowed to establish inbound connections using
the endpoint-independent mapping. (Prefix lists are configured at the [edit policy-options]
hierarchy level.)
8. Configure the generation of a syslog when traffic matches the NAT rule conditions.
[edit services]
user@host# edit service-set service-set-name
2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.
or
3. Specify the NAT rule sets to be used with the service set.
RELATED DOCUMENTATION
Configuring Syslog Events for NAT Rule Conditions with Next Gen
Services
To configure syslog events to be generated when traffic matches NAT rule conditions for Next Gen
Services NAT:
197
Configure the generation of a syslog when traffic matches the NAT rule conditions.
Out of addresses logs — If the allocation request fails to be handled as the public IP addresses in the No-
PAT pool are used up, the out of addresses syslog is generated.
Out of ports logs — If the allocation request fails to be handled as the public IPs and ports in the NAPT
pool are used up, the out of ports syslog is generated.
NAT Rule Match Logs — If the packet matches the NAT rule, the NAT rule match syslog is generated.
Pool resource release logs — If the public IP and port succeeds to be released to the NAPT pool, the pool
release syslog is generated.
RELATED DOCUMENTATION
CHAPTER 8
NAT46
IN THIS CHAPTER
IN THIS SECTION
Staring in Junos OS Release 20.2R1 you can run NAT46 Next Gen Services.
Starting in Junos OS Release 20.2R1, Network Address Translation and Protocol Translation (NAT-PT)
[RFC2766] are supported for CGNAT Next Gen Services. NAT46 is a IPv4-to-IPv6 transition mechanism
that provides a way for end-nodes in IPv6 realm to communicate with end-nodes in IPv4 realm and vice
versa. This is achieved using a combination of Network Address Translation and Protocol Translation.
NAT46 is supported on both the SRX and on MX240, MX480, and MX960 for CGNAT Next Gen
Services. This topic provides example configurations to help you understand how to configure NAT46
CGNAT Next Gen Services on these MX Series routers.
NOTE: These examples are for SRX devices, however, you can use these same examples to
configure NAT46 Next Gen Services on MX Series devices by substituting [edit security.....]
configuration statements with [edit services....] configuration statements on the MX Series
devices.
• Configuring an IPv4-Initiated Connection to an IPv6 Node Using Default Destination Address Prefix
Static Mapping — This example shows how to configure an IPv4-initiated connection to an IPv6 node
using default destination address prefix static mapping.
• Configuring an IPv4-Initiated Connection to an IPv6 Node Using Static Destination Address One-to-
One Mapping — This example shows how to configure an IPv4-initiated connection to an IPv6 node
using static destination address one-to-one mapping.
• Configuring an IPv6-Initiated Connection to an IPv4 Node Using Default Destination Address Prefix
Static Mapping — This example shows how to configure an IPv6-initiated connection to an IPv4 node
using default destination address prefix static mapping. This example does not show how to
configure the NAT translation for the reverse direction.
• Configuring an IPv6-Initiated Connection to an IPv4 Node Using Static Destination Address One-to-
One Mapping — This example shows how to configure an IPv6-initiated connection to an IPv4 node
using static destination address one-to-one mapping.
• Static mapping is used to communicate between the IPv4 to IPv6 side of the subscriber connection.
• Bi-directional traffic flow is supported if you have other ways to convey the mapping between the
IPv6 address and the dynamically allocated IPv4 address.
Keep these things in mind when configuring NAT46 for Next Gen Services:
• Static NAT is not used for the source translation in any NAT scenario.
• Except DNS, FTP and ICMP, other ALGs are not supported for NAT46.
• Port translation is not tested with Source Address NAT (when source pool is a IPv6 prefix) for the
NAT46 feature.
200
services {
nat {
source {
pool ipv6_prefix {
address 27a6::/96;
}
rule-set myipv6_rs {
rule ipv6_rule {
match {
source-address 10.1.1.1/30 ;
destination-address 27a6::a0a:a2d/126;
}
then {
source-nat {
pool {
ipv6_prefix;
}
}
}
}
match-direction input;
}
}
static {
rule-set test_rs {
rule test_rule {
match {
destination-address ip-address;
}
then {
static-nat {
prefix ip-address;
}
}
}
.....match-direction input;
}
}
}
service-set sset1 {
201
...
nat-rule-sets test_rs;
nat-rule-sets myipv6_rs;
...
}
}
Release Description
20.2R1 Staring in Junos OS Release 20.2R1 you can run NAT46 Next Gen Services.
20.2R1 Starting in Junos OS Release 20.2R1, Network Address Translation and Protocol Translation (NAT-PT)
[RFC2766] are supported for CGNAT Next Gen Services.
RELATED DOCUMENTATION
CHAPTER 9
IN THIS CHAPTER
IN THIS SECTION
Stateful NAT64 translates IPv6 addresses to public IPv4 addresses, allowing IPv6-only clients to contact
IPv4 servers using unicast UDP, TCP, or ICMP. Stateful NAT64 translates the destination IPv6 address to
the embedded IPv4 address, and translates the source IPv6 address to a public IPv4 address and port
from a block of IPv4 addresses that you set aside.
• Round-robin port and address allocation (see "Round-Robin Port Allocation" on page 292).
• Address pooling and endpoint independent mapping (see "Address Pooling and Endpoint
Independent Mapping for Port Translation" on page 290).
• Secured port block allocation (see "Secured Port Block Allocation for Port Translation" on page 293
• Let IPv6-only clients contact IPv4 servers using unicast UDP, TCP, or ICMP
RELATED DOCUMENTATION
Stateful NAT64 and XLAT464 embed IPv4 addresses in IPv6 addresses by using an IPv6 prefix that you
specify. The prefix length you use determines how the IPv4 address is embedded.
IPv6 addresses with embedded IPv4 addresses are composed of a variable-length prefix, the embedded
IPv4 address, and a variable-length suffix. Bits 64 to 71 are reserved and must be set to 0. The suffix
follows the last bit of the embedded IPv4 address, and the suffix bits are ignored and should be set to 0.
The format for the IPv4-embedded IPv6 address depends on the prefix length, as shown in Table 33 on
page 203.
Prefix length Prefix bits IPv4 address bits Reserved bits (must be set to 0) Suffix bits
32 0-31 32 to 63 64 to 71 72 to 127
40 0 to 39 40 to 63 and 72 to 79 64 to 71 80 to 127
48 0 to 47 48 to 63 and 72 to 87 64 to 71 88 to 127
56 0 to 55 56 to 63 and 72 to 95 64 to 71 96 to 127
The following table shows an example of an IPv4 address embedded in an IPv6 address for various
prefix lengths.
IN THIS SECTION
Perform the following steps to configure Next Gen Services Stateful NAT64
or
To disable round-robin port allocation for all NAT pools that do not specify an automatic (random-
allocation | round-robin) setting, configure the global setting.
NOTE: If you specify a range of ports to assign, the automatic statement is ignored.
a. Specify the low and high values for the port. If you do not configure automatic port assignment,
you must configure a range of ports.
b. Specify either random allocation or round-robin allocation. Round-robin allocation is the default.
4. Assign a port within the same range as the incoming port—either 0 through 1023 or 1024 through
65,535. This feature is not available if you configure port-block allocation.
5. Assign a port with the same parity (even or odd) as the incoming port. This feature is not available if
you configure port-block allocation.
6. Configure a global default port range for NAT pools that use port translation. This port range is
used when a NAT pool does not specify a port range and does not specify automatic port
assignment. The global port range can be from 1024 through 65,535.
8. Configure the maximum number of ports that can be allocated for each host. The range is 2 through
65,535.
9. If you want to allocate a block of ports for each subscriber to use, configure port-block allocation:
a. Configure the number of ports in a block. The range is 1 through 64,512 and the default is 128.
b. Configure the interval, in seconds, for which the block is active. After the timeout, a new block is
allocated, even if ports are available in the active block. If you set the timeout to 0, port blocks
207
are filled completely before a new port block is allocated, and the last port block remains active
indefinitely. The range is 0 through 86,400, and the default is 0.
c. Specify the timeout period for address-pooling paired mappings that use the NAT pool. The
range is 120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this
amount of time are dropped.
If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.
d. Configure the maximum number of blocks that can be allocated to a user address. The range is 1
through 512, and the default is 8.
e. Specify how often to send interim system logs for active port blocks and for inactive port blocks
with live sessions. This increases the reliability of system logs, which are UDP-based and can get
lost in the network. The range is 1800 through 86,400 seconds, and the default is 0 (interim logs
are disabled).
10. Specify the timeout period for endpoint independent translations that use the specified NAT pool.
Mappings that are inactive for this amount of time are dropped. The range is 120 through 86,400
seconds. If you do not configure ei-mapping-timeout, then the mapping-timeout value is used for
endpoint independent translations.
11. Specify the timeout period for address-pooling paired mappings that use the NAT pool. The range
is 120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this amount
of time are dropped.
If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.
12. To allow the IP addresses of a NAT source pool to overlap with IP addresses in pools used in other
service sets, configure allow-overlapping-pools.
2. Specify the traffic direction to which the NAT rule set applies.
3. Specify the IPv6 source addresses that are translated by the NAT rule.
5. Specify one or more application protocols to which the NAT rule applies. The number of
applications listed in the rule must not exceed 3072.
6. Specify the NAT source pool that contains the addresses for translated source addresses.
7. Configure endpoint-independent mapping, which ensures that the same external address and port
are assigned to all connections from a given host.
b. Specify prefix lists that contain the hosts that are allowed to establish inbound connections
using the endpoint-independent mapping. (Prefix lists are configured at the [edit policy-options]
hierarchy level.)
9. Specify the traffic direction to which the destination NAT rule set applies.
10. Specify the IPv6 prefix source addresses that are translated by the destination NAT rule. Use the
same value that you used for the NAT source rule.
11. Specify the prefix that is used to embed the IPv4 destination address in the IPv6 destination
address.
12. Configure the IPv6 destination address to match. This is the IPv4 destination address embedded in
IPv6 by using the destination-prefix.
13. Configure the generation of a syslog when traffic matches the NAT rule conditions.
[edit services]
user@host# edit service-set service-set-name
2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.
or
3. Specify the NAT rule sets to be used with the service set.
RELATED DOCUMENTATION
CHAPTER 10
IN THIS CHAPTER
Configuring 464XLAT Provider-Side Translator for IPv4 Connectivity Across IPv6-Only Network for Next
Gen Services | 217
464XLAT Overview
IN THIS SECTION
You can configure the MX Series router as an 464XLAT Provider-Side Translator (PLAT). 464XLAT
provides a simple and scalable technique for an IPv4 client with a private address to connect to an IPv4
host over an IPv6 network. 464XLAT only supports IPv4 in the client-server model, so it does not
support IPv4 peer-to-peer communication or inbound IPv4 connections.
XLAT464 provides the advantages of not having to maintain an IPv4 network for this IPv4 traffic and
not having to assign additional public IPv4 addresses.
A customer-side translator (CLAT), which is not a Juniper Networks product, translates the IPv4 packet
to IPv6 by embedding the IPv4 source and destination addresses in IPv6 prefixes, and sends the packet
214
over an IPv6 network to the PLAT. The PLAT translates the packet to IPv4, and sends the packet to the
IPv4 host over an IPv4 network (see Figure 1 on page 214).
The CLAT uses a unique source IPv6 prefix for each end user, and translates the IPv4 source address to
an IPv6 address by embedding it in the IPv6 /96prefix. In Figure 1 on page 214, the CLAT source IPv6
prefix is 2001:db8:aaaa::/96, and the IPv4 source address 192.168.1.2 is translated to
2001:db8:aaaa::192.168.1.2. The CLAT translates the IPv4 destination address to IPv6 by embedding it
in the IPv6 prefix of the PLAT (MX Series router). In Figure 1 on page 214, the PLAT destination IPv6
prefix is 2001:db8:bbbb::/96, so the CLAT translates the IPv4 destination address 198.51.100.1 to
2001:db8:bbbb::198.51.100.
The PLAT translates the IPv6 source address to a public IPv4 address, and translates the IPv6
destination address to a public IPv4 address by removing the PLAT prefix.
215
The CLAT can reside on the end user mobile device in an IPv6-only mobile network, allowing mobile
network providers to roll out IPv6 for their users and support IPv4-only applications on mobile devices
(see Figure 2 on page 215).
• Address pooling and endpoint independent mapping (see "Address Pooling and Endpoint
Independent Mapping for Port Translation" on page 290).
• Secured port block allocation (see "Secured Port Block Allocation for Port Translation" on page 293
Benefits of 464XLAT
Stateful NAT64 and XLAT464 embed IPv4 addresses in IPv6 addresses by using an IPv6 prefix that you
specify. The prefix length you use determines how the IPv4 address is embedded.
IPv6 addresses with embedded IPv4 addresses are composed of a variable-length prefix, the embedded
IPv4 address, and a variable-length suffix. Bits 64 to 71 are reserved and must be set to 0. The suffix
follows the last bit of the embedded IPv4 address, and the suffix bits are ignored and should be set to 0.
The format for the IPv4-embedded IPv6 address depends on the prefix length, as shown in Table 34 on
page 216.
216
Prefix length Prefix bits IPv4 address bits Reserved bits (must be set to 0) Suffix bits
32 0-31 32 to 63 64 to 71 72 to 127
40 0 to 39 40 to 63 and 72 to 79 64 to 71 80 to 127
48 0 to 47 48 to 63 and 72 to 87 64 to 71 88 to 127
56 0 to 55 56 to 63 and 72 to 95 64 to 71 96 to 127
The following table shows an example of an IPv4 address embedded in an IPv6 address for various
prefix lengths.
IN THIS SECTION
1. Create a source NAT pool that is used to translate source IPv6 addresses to source public IPv4
addresses on PLAT.
3. If you want to allocate a block of ports for each subscriber to use, configure port-block allocation:
a. Configure the number of ports in a block. The range is 1 through 64,512 and the default is 128.
b. Configure the interval, in seconds, for which the block is active. After the timeout, a new block is
allocated, even if ports are available in the active block. If you set the timeout to 0, port blocks are
218
filled completely before a new port block is allocated, and the last port block remains active
indefinitely. The range is 0 through 86,400, and the default is 0.
c. Specify the timeout period for address-pooling paired mappings that use the NAT pool. The range
is 120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this amount
of time are dropped.
If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.
d. Configure the maximum number of blocks that can be allocated to a user address. The range is 1
through 512, and the default is 8.
e. Specify how often to send interim system logs for active port blocks and for inactive port blocks
with live sessions. This increases the reliability of system logs, which are UDP-based and can get
lost in the network. The range is 1800 through 86,400 seconds, and the default is 0 (interim logs
are disabled).
4. Specify the timeout period for endpoint independent translations that use the specified NAT pool.
Mappings that are inactive for this amount of time are dropped. The range is 120 through 86,400
seconds. If you do not configure ei-mapping-timeout, then the mapping-timeout value is used for
endpoint independent translations.
5. Specify the timeout period for address-pooling paired mappings that use the NAT pool. The range is
120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this amount of
time are dropped.
If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.
For 464XLAT, you must configure a source rule and a destination rule. To configure the NAT rules for
464XLAT:
2. Specify the traffic direction to which the NAT rule set applies.
4. Configure the IPv6 source address prefix to match. This is the IPv4 source address embedded in
IPv6 by using the CLAT prefix.
5. Specify the NAT source pool that the PLAT uses for converting the IPv6 source address to a public
IPv4 address.
6. If you want to ensure that the same external address and port are assigned to all connections from
a given host, configure endpoint-independent mapping:
a. Configure the mapping type as endpoint independent.
b. Specify prefix lists that contain the hosts that are allowed to establish inbound connections
using the endpoint-independent mapping. (Prefix lists are configured at the [edit policy-options]
hierarchy level.)
e. Configure the address-pooling paired feature if you want to ensure assignment of the same
external IP address for all sessions originating from the same internal host.
f. Specify the timeout period for address-pooling-paired mappings that use the NAT pool. The
range is 120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this
amount of time are dropped.
If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.
g. Configure the generation of a syslog when traffic matches the NAT rule conditions.
8. Specify the traffic direction to which the destination NAT rule set applies.
9. Configure the IPv6 source address prefix to match. Use the same value that you used for the NAT
source rule.
11. Configure the IPv6 destination address to match. This is the IPv4 destination address embedded in
IPv6 by using the PLAT destination prefix.
[edit services]
user@host# edit service-set service-set-name
2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.
or
3. Specify the NAT rule sets to be used with the service set.
This prevents unnecessary creation of an IPv6 fragmentation header when translating IPv4 packets that
are less than 1280 bytes.
224
CHAPTER 11
IN THIS CHAPTER
Starting in Junos OS Release 20.2R1 you can run IPv6 NAT-PT Next Gen Services on MX240, MX480,
and MX960 routers.
IPv6 Network Address Translation-Protocol Translation (NAT-PT) provides address allocation and
protocol translation between IPv4 and IPv6 addressed network devices. The translation process is based
on the Stateless IP/ICMP Translation (SIIT) method; however, the state and the context of each
communication are retained during the session lifetime. IPv6 NAT-PT supports Internet Control
Message Protocol (ICMP), TCP, and UDP packets.
• Traditional NAT-PT—In traditional NAT-PT, the sessions are unidirectional and outbound from the
IPv6 network . Traditional NAT-PT allows hosts within an IPv6 network to access hosts in an IPv4
network. There are two variations to traditional NAT-PT: basic NAT-PT and NAPT-PT.
In basic NAT-PT, a block of IPv4 addresses at an IPv4 interface is set aside for translating addresses
as IPv6 hosts as they initiate sessions to the IPv4 hosts. The basic NAT-PT translates the source IP
address and related fields such as IP, TCP, UDP, and ICMP header checksums for packets outbound
from the IPv6 domain . For inbound packets, it translates the the destination IP address and the
checksums.
Network Address Port Translation-Protocol Translation (NAPT-PT) can be combined with basic NAT-
PT so that a pool of external addresses is used in conjunction with port translation. NAPT-PT allows
a set of IPv6 hosts to share a single IPv4 address. NAPT-PT translates the source IP address, source
transport identifier, and related fields such as IP, TCP, UDP, and ICMP header checksums, for packets
outbound from the IPv6 network. The transport identifier can be a TCP/UDP port or an ICMP query
225
ID. For inbound packets, it translates the destination IP address, destination transport identifier, and
the IP and the transport header checksums.
• Bidirectional NAT-PT—In bidirectional NAT-PT, sessions can be initiated from hosts in the IPv4
network as well as the IPv6 network. IPv6 network addresses are bound to IPv4 addresses, either
statically or dynamically as connections are established in either direction. The static configuration is
similar to static NAT translation. Hosts in IPv4 realm access hosts in the IPv6 realm using DNS for
address resolution. A DNS ALG must be employed in conjunction with bidirectional NAT-PT to
facilitate name-to-address mapping. Specifically, the DNS ALG must be capable of translating IPv6
addresses in DNS queries and responses into their IPv4 address bindings, and vice versa, as DNS
packets traverse between IPv6 and IPv4 realms.
NOTE: The devices partially support the bidirectional NAT-PT specification. It supports flow
of bidirectional traffic assuming that there are other ways to convey the mapping between
the IPv6 address and the dynamically allocated IPv4 address. For example, a local DNS can be
configured with the mapped entries for IPv4 nodes to identify the addresses.
NAT- PT Operation—The devices support the traditional NAT-PT and allow static mapping for the user
to communicate from IPv4 to IPv6 . The user needs to statically configure the DNS server with an IPv4
address for the hostname and then create a static NAT on the device for the IPv6-only node to
communicate from an IPv4-only node to an IPv6-only node based on the DNS.
20.2R1 Starting in Junos OS Release 20.2R1 you can run IPv6 NAT-PT Next Gen Services on MX240, MX480,
and MX960 routers.
RELATED DOCUMENTATION
NAT-PT communication with static mapping— Network Address Translation-Protocol Translation (NAT-
PT) can be done in two directions, from IPv6 to IPv4 and vice versa. For each direction, static NAT is
used to map the destination host to a local address and a source address NAT is used to translate the
226
source address. There are two types of static NAT and source NAT mapping: one-to-one mapping and
prefix-based mapping.
NAT- PT communication with DNS ALG—A DNS-based mechanism dynamically maps IPv6 addresses to
IPv4-only servers. NAT-PT uses the DNS ALG to transparently do the translations. For example, a
company using an internal IPv6 network needs to be able to communicate with external IPv4 servers
that do not yet have IPv6 addresses.
To support the dynamic address binding, a DNS should be used for name resolution. The IPv4 host looks
up the name of the IPv6 node in its local configured IPv4 DNS server, which then passes the query to
the IPv6 DNS server through a device using NAT-PT.
• Stores a mapping of the allocated IPv4 address to the IPv6 address returned in the IPv6 address
resolution so that the session can be established from any-IPv4 hosts to the IPv6 host.
RELATED DOCUMENTATION
CHAPTER 12
IN THIS CHAPTER
IN THIS SECTION
Stateless Source Network Prefix Translation for IPv6 for IPv6 | 227
IN THIS SECTION
When an IPv6 packet is going from an internal network to the external network, Stateless Source
Network Prefix Translation for IPv6 (NPTv6) maps the IPv6 prefix of the source address to an IPv6 prefix
of an external network. When an IPv6 packet is coming from the external network to the internal
network, NPTv6 maps the IPv6 prefix of the destination address to the IPv6 prefix of the internal
network.
228
NPTv6 uses an algorithm to translate the addresses, and does not need to maintain the state for each
node or each flow in the translator. NPTv6 also removes the need to recompute the transport layer
checksum.
• For edge networks, you do not need to renumber the IPv6 addresses used inside the local network
for interfaces, access lists, and system logging messages if:
• The IPv6 addresses are used inside the edge network or within other upstream networks (such as
multihomed devices) when a site adds, drops, or changes upstream networks.
• IPv6 addresses used by the edge network do not need ingress filtering in upstream networks and do
not need their customer-specific prefixes advertised to upstream networks.
• Connections that traverse the translation function are not disrupted by a reset or brief outage of an
NPTv6 translator.
IN THIS SECTION
2. Define the IPv6 prefix to which the IPv6 source address prefix is translated.
[edit]
user@host# edit services nat source rule-set rule-set-name rule rule-name
2. Specify the traffic direction to which the NAT rule set applies.
3. Specify the IPv6 prefix of source addresses that are translated by the source NAT rule.
To specify one address or prefix value:
4. Configure the address-pooling paired feature if you want to ensure assignment of the same external
IP address for all sessions originating from the same internal host.
[edit services nat source rule-set rule-set-name rule rule-name then source-
nat mapping-type]
user@host# set address-pooling-paired
5. Specify the timeout period for address-pooling-paired mappings that use the NAT pool. The range is
120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this amount of
time are dropped.
If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.
6. Specify the NAT pool that contains the IPv6 prefix for translated traffic.
7. Configure the generation of a syslog when traffic matches the NAT rule conditions.
[edit services]
user@host# edit service-set service-set-name
2. Configure either an interface service set, which requires a single service interface, or a next-hop
service set, which requires an inside and outside service interface.
3. Specify the NAT rule sets to be used with the service set.
4. Specify that ICMP error messages are sent if NPTv6 address translation fails.
CHAPTER 13
IN THIS CHAPTER
IN THIS SECTION
IN THIS SECTION
Benefits | 233
Next Gen Services supports a 6rd softwire concentrator on the MX-SPC3 services card. 6rd softwires
allow IPv6 end users to send traffic over an IPv4 network to reach an IPv6 network. IPv6 packets are
encapsulated in IPv4 packets by a softwire initiator at the customer edge WAN, and tunneled to a 6rd
softwire concentrator. A softwire is created when IPv4 packets containing IPv6 destination information
are received at the softwire concentrator, which decapsulates IPv6 packets and forwards them for IPv6
routing.
233
In the reverse path, IPv6 packets are sent to the 6rd softwire concentrator, which encapsulates them in
IPv4 packets corresponding to the proper softwire and sends them to the customer edge WAN.
IPv6 flows are also created for the encapsulated IPv6 payload, and are associated with the specific
softwire that carried them in the first place. When the last IPv6 flow associated with a softwire ends, the
softwire is deleted. This simplifies configuration and there is no need to create or manage tunnel
interfaces.
For more information on 6rd softwires, see RFC 5969, IPv6 Rapid Deployment on IPv4 Infrastructures
(6rd) -- Protocol Specification.
Benefits
• Rapid deployment of IPv6 service to subscribers on native IPv4 customer edge WANs.
IN THIS SECTION
For example:
2. Configure the softwire type as v6rd and specify a name for it.
For example:
1. Specify the name of the rule set that the rule belongs to.
Inline services run on MX line cards that can operate under Next Gen Services, for example MPC3 and
MPC4 cards. This topic describes how to enable an inline service.
1. Enable inline services for the FPC and PIC slot, and define the amount of bandwidth to dedicate to
inline services.
2. Configure the inline services logical interfaces. Inline interfaces use the following interface naming
convention:
si-slot/pic/port
• If you are using an interface service set, configure one logical unit, and include units for IPv4 and
IPv6:
For example:
• If you are using a next-hop service set, configure two logical units and define the inside and
outside interfaces for IPv4 and IPv6:
For example:
• To configure an interface to use with an interface-style service set, configure input and output
service and specify the service set.
user@host# set interfaces interface-name unit unit-number family inet service input service-set
service-set-name
user@host# set interfaces interface-name unit unit-number family inet service output service-set
237
service-set-name
user@host# set interfaces interface-name unit unit-number family inet address ip-address
• To configure an interface to use with a next-hop style service set, omit the service input and
service output references.
[edit services]
user@host# edit service-set service-set-name
2. Configure either an interface service set, which requires a single service interface, or a next-hop
service set, which requires an inside and outside service interface.
3. Specify the 6rd rule-set that contains the 6rd rule to be used with the service set.
CHAPTER 14
IN THIS CHAPTER
IN THIS SECTION
Junos OS enables service providers to transition to IPv6 by using softwire encapsulation and
decapsulation techniques. A softwire is a tunnel that is created between softwire customer premises
equipment (CPE). A softwire CPE can share a unique common internal state for multiple softwires,
making it a very light and scalable solution. When you use softwires, you need not maintain an interface
infrastructure for each softwire, unlike a typical mesh of generic routing encapsulation (GRE) tunnels
that requires you to do so. A softwire initiator at the customer end encapsulates native packets and
tunnels them to a softwire concentrator at the service provider. The softwire concentrator decapsulates
the packets and sends them to their destination. A softwire is created when a softwire concentrator
receives the first tunneled packet of a flow and prepares the packet for flow processing. The softwire
exists as long as the softwire concentrator is providing flows for routing. A flow counter is maintained;
when the number of active flows is 0, the softwire is deleted. Statistics are kept for both flows and
softwires.
When an ISP begins to allocate new subscriber home IPv6 addresses and IPv6-capable equipment, dual-
stack lite (DS-Lite) provides a method for the private IPv4 addresses behind the IPv6 customer edge
WAN equipment to reach the IPv4 network. DS-Lite enables IPv4 customers to continue to access the
Internet using their current hardware by using a softwire initiator, referred to as a Basic Bridging
Broadband (B4), at the customer edge to encapsulate IPv4 packets into IPv6 packets and tunnel them
over an IPv6 network to a softwire concentrator, referred to as an Address Family Transition Router
(AFTR), for decapsulation. DS-Lite creates the IPv6 softwires that terminate on the services PIC. Packets
coming out of the softwire can then have other services such as NAT applied on them.
Starting in Junos OS release 20.2R1, DS-Lite is supported Next Gen Services on MX240, MX480 and
MX960 routers with the MX-SPC3.
For more information on DS-Lite softwires, see the IETF draft Dual Stack Lite Broadband Deployments
Following IPv4 Exhaustion.
NOTE: The most recent IETF draft documentation for DS-Lite uses new terminology:
The Junos OS documentation generally uses the original terms when discussing configuration in
order to be consistent with the command-line interface (CLI) statements used to configure DS-
Lite.
In Next Gen Services, DS-Lite changes the way NAT works with respect to the address-pooling-paired
statement for the endpoint independent mapping (EIM), endpoint independent filtering (EIF), and port
block allocation (PBA) features. In the earlier Adaptive Services implementation, all of these NAT
features are subscriber-based and the subscriber is either a B4 IP address or an IPv6 prefix. In addition,
for Adaptive Services, the address-pooling-paired association is between internal IPv4 address and NAT
pool address. However in Next Gen Services DS-Lite, the address-pooling-paired pairing is between
either the subscriber (B4 IPv6 address or IPv6 prefix) and a NAT pool address. Otherwise, the address-
pooling-paired functionality remains the same for Next Gen Services.
NOTE: For CGNAT Next Gen Services on the MX-SPC3 security services card, when you
configure DS-Lite use the following rules:
241
• For non-prefix based DS-Lite subscriber softwires, specify the B4 IPv6 address as the softwire
concentrator.
• For prefix-based DS-Lite subscriber softwires, specify the IPv6 prefix address as the softwire
concentrator. In addition for prefix-based subscriber DS-Lite softwires, you must specify the
subscriber prefix length per service-set under the [edit softwire-options dslite-ipv6-prefix-
length dslite-ipv6-prefix-length configuration hierarchy.
You create EIM mappings on a per-softwire basis and they are bound to B4 address; which means the
rule matching criteria includes B4 address. For Next Gen Services DS-Lite softwires, there is no special
mapping timeout for softwire sessions, instead, they take the value of inactivity-non-tcp-timeout as
their timeout value.
When a subscriber requires a port to be assigned for the first time, Port Block Allocation (PBA) ensures a
block of ports is allocated to that particular subscriber. All subsequent requests from this subscriber use
ports from the assigned block. A new port block is allocated when the current active block is exhausted,
or after the active port block timeout interval has expired.
AMS groups several PICs together and load balances traffic across all PICs that are part of the same
group. In a standalone PIC configuration, all softwire sessions originated from any B4, which are
destined to a softwire concentrator, are serviced on the same PIC where the softwire concentrator is
configured. In the case of a DS-Lite in an AMS configuration, the softwire concentrator is hosted on all
PICs in AMS group, however, softwire sessions from various B4 devices are distributed across member
PICs. Thus, a softwire session originated from one B4 to the softwire concentrator, is assigned to one
member PIC and all packets (IPv4-in-IPv6 and inner IPv4) in both directions (originated from B4 and
destined to B4) related to that softwire session are serviced in the same PIC.
For prefix-based DS-Lite subscribers you need to configure the IPv6-prefix for DS-Lite traffic. When a
prefix-based subscriber is active, the configured prefix length is taken from the B4 address and is
completed with trailing zeros to form a 128-bit IPv6 NAT subscriber. This means that all B4 entities with
a matching prefix and all IPv4 networks behind those matching B4 entities, are all identified as a single
subscriber. An option is provided to configure the subscriber prefix length per service-set under the [edit
softwire-options dslite-ipv6-prefix-length dslite-ipv6-prefix-length. hierarchy.
NOTE: For CGNAT Next Gen Services on the MX-SPC3 security services card, when you
configure prefix-based DS-Lite subscribers always specify the IPv6 prefix address for the softwire
concentrator.
242
With the prefix-based subscriber feature enabled, only one subscriber context is maintained per-prefix.
Hence, the Port Block Allocation (NAT PBA) function would account for port blocks per each subscriber,
instead of every single B4 address. Session limits configured under the softwire concentrator, limit the
number of IPv4 sessions per subscriber, instead of per softwire/B4 address. Enabling the address-
pooling-paired option in prefix-based subscriber configurations results in one public IP address for the
subscriber instead of per B4 address.
Release Description
20.2R1 Starting in Junos OS release 20.2R1, DS-Lite is supported Next Gen Services on MX240, MX480 and
MX960 routers with the MX-SPC3.
RELATED DOCUMENTATION
IN THIS SECTION
Starting in Junos OS release 19.3R2 6rd softwires are supported. Starting in Junos OS release 20.2, DS-
Lite and Mapping of Address and Port with Encapsulation (MAP-E).
You can create a softwire rule consisting of one or more terms and associate a particular 6rd, DS-Lite, or
MAP-E softwire concentrator with each term. You can include the softwire rule in service sets along
with other services rules.
For example:
2. Configure the input and output match directions for the rule set.
3. Specify the name of the rule to apply if the match in this direction is met.
For example:
For example, to associate a DS-Lite softwire specify the name of the DS-Lite softwire.
5. Repeat steps "2" on page 243 and "3" on page 243, and "4" on page 243for the output direction.
SEE ALSO
Starting in Junos OS release 20.2R1, DS-Lite, MAP-E and 6rd softwires are supported in MX240,
MX480, and MX960 routers. MAP-E and 6rd softwires are supported inline on an MPC by specifying
the si-1/0/0 interface naming convention. DS-Lite is softwires run on the MX-SPC3 security services
card.
[edit services]
user@host# edit service-set service-set-name
For example:
[edit services]
user@host# edit service-set vms-sw-ss
We support four prefix lengths: 56, 64,96 and 128, which is the default.
3. For NAT, you can include a NAT rule for flows originated by DS-Lite softwires.
NOTE:
Currently a NAT rule configuration is required with a DS-Lite softwire configuration when you
use interface service set configurations; NAT is not required when using next-hop service set
configurations. NAT processing from IPv4 to IPv6 address pools and vice versa is not
currently supported. FTP, HTTP, and RSTP are supported.
NOTE: With a DS-Lite softwire, if you configure stateful firewall rules without configuring
NAT rules, using an interface service set causes the ICMP echo reply messages to not be sent
correctly to DS-Lite. This behavior occurs if you apply a service set to both inet and inet6
families. In such a scenario, the traffic that is not destined to the DS-Lite softwire
concentrator is also processed by the service set and the packets might be dropped, although
the service set must not process such packets.
To prevent the problem to incorrect processing of traffic applicable for DS-Lite, you must
configure a next-hop style service set and not an interface style service set. This problem
does not occur when you configure NAT rules with interface service sets for DS-Lite.
5. Specify the name of the previously defined softwires rule set that you want to apply to this service
set.
[edit]
user@host# edit services softwires softwire-types ds-lite name
[edit}
user@host# edit services softwires softwire-types ds-lite name
For example:
NOTE: For CGNAT Next Gen Services on the MX-SPC3 security services card, when you
configure DS-Lite concentrator, use the following rules:
For example:
4. You can specify the maximum transmission unit (MTU) for the softwire tunnel automatically or
manually.
247
NOTE: This MTU-v6 option sets the maximum transmission unit when encapsulating IPv4
packets into IPv6. If the final length is greater than the MTU-v4 value, the IPv6 packet is
fragmented. This option is mandatory because it depends on other network parameters
under administrator control.
6. (Optional) For prefix-based DS-Lite subscriber softwires, configure the maximum number of
subscriber sessions allowed per prefix. You can configure from 0 through 16,384 sessions.
NOTE: You cannot use flow-limit and session-limit-per-prefix in the same DS-Lite
configuration.
7. Configure the size of the IPv4 subnet prefix to which limiting is applied. ipv4prefix=6rd customer
edge ipv4
8. Configure the size of the IPv6 subnet prefix to which limiting is applied. Specify a prefix length of 56,
64, 96, or 128.
NOTE: Ensure that all mappings are cleared before changing the prefix length.
20.2R1 Starting in Junos OS release 20.2R1, you can configure DS-Lite softwires for Next Gen Services on the
MX-SPC3 services card.
20.2R1 Starting in Junos OS release 20.2, DS-Lite and Mapping of Address and Port with Encapsulation (MAP-
E).
20.2R1 Starting in Junos OS release 20.2R1, DS-Lite, MAP-E and 6rd softwires are supported in MX240,
MX480, and MX960 routers.
IN THIS SECTION
Configuring DS-Lite Per Subnet Session Limitation to Prevent Denial of Service Attacks | 251
MX Series routers equipped with MS-DPCs. Starting in Junos OS Release 18.2R1, MS-MPCs and MS-
MICs also support the subnet limitation feature.Starting in Junos OS Release 19.2R1, MX Virtual Chassis
and MX Broadband Network Gateway (BNG) routers also support the subnet limitation feature.Starting
in Junos OS release 20.2R1, DS-Lite is supported for CGNAT Next Gen Services on MX240, MX480 and
MX960 routers.
A household using IPv6 with DS-Lite is a subnet, not just an individual IP address. The subnet limitation
feature associates a subscriber and mapping with an IPv6 prefix instead of an IPv6 address. A subscriber
can use any IPv6 addresses in that prefix as a DS-Lite B4 address and potentially exhaust carrier-grade
NAT resources. The subnet limitation feature enables greater control of resource utilization by
identifying a subscriber with a prefix instead of a specific address.
• Prefix length can be configured per service set under softwire-options for the individual service-set.
• Port blocks are allocated per prefix of the subscriber B4 device, and not on each B4 address (if the
prefix length is less than 128). If the prefix length is 128, then each IPv6 address is treated as a B4.
Port blocks are allocated per 128-bit IPv6 address.
• Session limit, defined under the DS-Lite softwire concentrator configuration, limits the number of
IPv4 sessions for the prefix.
• EIM, EIF, and PCP mappings are created per softwire tunnel (full 128 bit IPv6 address). Stale
mappings time out based on timeout values.
• SYSLOGS for PBA allocation and release contain the prefix portion of the address completed with all
zeros. SYSLOGS for PCP allocate and release, flow creation and deletion will still contain the
complete IPv6 address.
The show services nat mappings address-pooling-paired operational command output now shows the
mapping for the prefix. The mapping shows the address of the active B4.
The show services softwire statistics ds-lite output includes a new field that displays the number of
times the session limit was exceeded for the MPC.
For Next Gen Services on MX240, MX480, and MX960 routers, the subnet limit statistic is displayed in
the Softwire session limit exceeded field.
250
SEE ALSO
Starting in Junos OS Release 19.2R1, MX Virtual Chassis and MX Broadband Network Gateway (BNG)
routers also support the subnet limitation feature.
1. Configure the size of the subnet prefix to which limiting is applied. Specify a prefix length of 56, 64,
96, or 128.
[edit}
user@host# set services service-set service-set-name softwire-options dslite-ipv6-prefix-length dslite-
ipv6-prefix-length
NOTE: Ensure that all mappings are cleared before changing the prefix length.
2. If you are using a next-hop service set on an AMS interface for DS-Lite, set the AMS inside
interface’s IPv6 source prefix length to the same value you use for the subnet prefix in Step "1" on
page 251.
3. Configure the maximum number of subscriber sessions allowed per prefix. You can configure from 0
through 16,384 sessions.
[edit}
user@host# set services softwire softwire-concentrator dslite dslite-concentrator-name session-limit-
per-prefix 12
For Next Gen Services DS-Lite, MAP-E and V6rd softwires, configure the maximum number of
subscriber sessions allowed per prefix:
[edit}
user@host# set services softwires softwire-types ds-lite | map-e | v6rd session-limit-per-prefix limit
NOTE: You cannot use flow-limit and session-limit-per-prefix in the same dslite
configuration.
SEE ALSO
Release Description
20.2R1 Starting in Junos OS release 20.2R1, DS-Lite is supported for CGNAT Next Gen Services on MX240,
MX480 and MX960 routers.
20.2R1 Starting in Junos OS Release 20.2R1, the Next Gen Services MX-SPC3 security services card supports
the subnet limitation feature.
19.2R1 Starting in Junos OS Release 19.2R1, MX Virtual Chassis and MX Broadband Network Gateway (BNG)
routers also support the subnet limitation feature.
18.2R1 Starting in Junos OS Release 18.2R1, MS-MPCs and MS-MICs also support the subnet limitation
feature.
253
IN THIS SECTION
You can now choose configuration options that help prevent or minimize the effect of attempted denial
of service (DOS) attacks.
Prior to the implementation of the new options for configuring NAT mapping refresh behavior,
described in this topic, a conversation was kept alive when either inbound or outbound flows were
active. This remains the default behavior. You can now also specify mapping refresh for only inbound
flows or only outbound flows. To configure mapping refresh behavior, include the mapping-refresh
(inbound | outbound | inbound-outbound) statement at the [edit services nat rule rule-name term term-
name then translated secure-nat-mapping] hierarchy level.
Previously. the number of inbound connections on an EIF mapping was limited only by the maximum
flows allowed on the system. You can now configure the number of inbound flows allowed for an EIF. To
limit the number of inbound connections on an EIF mapping, include the eif-flow-limit number-of-flows
statement at the [edit services nat rule rule-name term term-name then translated secure-nat-
mapping] hierarchy level.
254
CHAPTER 15
IN THIS CHAPTER
IN THIS SECTION
Port Control Protocol (PCP) provides a way to control the forwarding of incoming packets by upstream
devices, such as NAT44 and firewall devices, and a way to reduce application keepalive traffic. PCP is
supported on the MS-DPC, MS-100, MS-400, and MS-500 MultiServices PICs. Starting in Junos OS
Release 17.4R1, PCP for NAPT44 is also supported on the MS-MPC and MS-MIC. Starting in Junos
20.2R1, PCP for CGNAT DS-Lite services are supported for Next Gen Services.Starting in Junos OS
Release 18.2R1, PCP on the MS-MPC and MS-MIC supports DS-Lite. In Junos OS Release 18.1 and
earlier releases, PCP on the MS-MPC and MS-MIC does not support DS-Lite.
PCP is designed to be implemented in the context of both Carrier-Grade NATs (CGNs) and small NATs
(for example, residential NATs). PCP enables hosts to operate servers for a long time (as in the case of a
webcam) or a short time (for example, while playing a game or on a phone call) when behind a NAT
device, including when behind a CGN operated by their ISP. PCP enables applications to create
mappings from an external IP address and port to an internal IP address and port. These mappings are
required for successful inbound communications destined to machines located behind a NAT or a
firewall. After a mapping for incoming connections is created, remote computers must be informed
255
about the IP address and port for the incoming connection. This is usually done in an application-specific
manner.
• PCP client—A host or gateway that issues PCP requests to a PCP server in order to obtain and
control resources.
• PCP server—Typically a CGN gateway or co-located server that receives and processes PCP requests
Junos OS enables configuring PCP servers for mapping flows using NAPT44 capabilities such as port
forwarding and port block allocation. Flows can be processed from these sources:
• Traffic containing PCP requests received directly from user equipment, as shown in Figure 4 on page
255.
• Mapping of traffic containing PCP requests added by a router functioning as a DS-Lite softwire
initiator (B4). This mode, known as DS-Lite plain mode, is shown in Figure 5 on page 256.
NOTE: Junos OS does not support deterministic port block allocation for PCP-originated traffic.
Many NAT-friendly applications send frequent application-level messages to ensure their sessions are
not being timed out by a NAT device. PCP is used to:
Starting with Junos OS Release 15.1, Port Control Protocol (PCP) version 2 is supported, which is in
compliance with RFC 6887. PCP provides a way to control the forwarding of incoming packets by
upstream devices, such as NAT44, and firewall devices, and a way to reduce application keep-alive
traffic. PCP version 2 supports nonce authentication. PCP allows applications to create mappings from
an external IP address and port to an internal IP address and port. A nonce payload prevents a replay
attack and it is sent by default unless it is explicitly disabled.
257
Client nonce verification for version 2 map requests (for refresh or delete) requires that the nonce
received in the original map request that causes the PCP mapping to be created is preserved. The
version of the initial request that enables the mapping to be created is also preserved. This behavior of
saving the nonce and version parameters denotes that 13 bytes per PCP mapping are used. This slight
increase in storage space is not significant when matched with the current memory usage of a system
for a single requested mapping (taking into account the endpoint-independent mapping (EIM) and
endpoint-independent filtering (EIF) that are created along with it). In a customer deployment, PCP
causes EIM and EIF mappings to represent a fraction of all such mappings.
Until Junos Release 15.1, services PICs support PCP servers on Juniper Networks routers in accordance
with PCP draft version 22 with version 1 message encoding. With PCP being refined from the draft
version as defined in Port Control Protocol (PCP) draft-ietf-pcp-base-22 (July 2012 expiration) to a
finalized, standard version as defined in RFC 6887 -- Port Control Protocol (PCP), the message encoding
changed to version 2 with the addition of a random nonce payload to authenticate peer and map
requests as necessary. Version 1 does not decode messages compliant with version 2 format and nonce
authentication is not supported. In a real-word network environment, with customer premises
equipment (CPE) devices increasingly supporting version 2 only, it is required to parse and send version
2 messages. Backward compatibility with version 1-supporting CPE devices is maintained (version
negotiation is part of the standard) and authenticates request nonce payload packets when v2 messages
are in use.
The output of the show services pcp statistics command contains the PCP unsupported version field,
which is incremented to indicate whenever the version is not 1 or 2. A new field, PCP request nonce
does not match existing mapping, is introduced to indicate the number of PCP version 2 requests that
were ignored because the nonce payload did not match the one recorded in the mapping (authentication
failed). If version 2 is in use, the client nonce is used for authentication.
Release Description
20.2R1 Starting in Junos 20.2R1, PCP for CGNAT DS-Lite services are supported for Next Gen Services.
18.2R1 Starting in Junos OS Release 18.2R1, PCP on the MS-MPC and MS-MIC supports DS-Lite.
17.4R1 Starting in Junos OS Release 17.4R1, PCP for NAPT44 is also supported on the MS-MPC and MS-MIC.
15.1 Starting with Junos OS Release 15.1, Port Control Protocol (PCP) version 2 is supported, which is in
compliance with RFC 6887.
258
IN THIS SECTION
This topic describes how to configure port control protocol (PCP). PCP is supported on the MS-DPC,
MS-100, MS-400, and MS-500 MultiServices PICs. Starting in Junos OS Release 17.4R1, PCP for
NAPT44 is also supported on the MS-MPC and MS-MIC. Starting in Junos OS Release 18.2R1, PCP on
the MS-MPC and MS-MIC supports DS-Lite. In Junos OS Release 18.1 and earlier releases, PCP on the
MS-MPC and MS-MIC does not support DS-Lite. Starting in Junos OS release 20.2R1 PCP is supported
on the MX-SPC3 security services card for CGNAT services.
2. Set the IPv4 or IPv6 addresses of the server. For PCP DS-Lite, the ipv6-address must match the
address of the AFTR (Address Family Transition Router or softwire concentrator).
NOTE: Starting in Junos OS Release 18.2R1, PCP on the MS-MPC and MS-MIC supports DS-
Lite. In Junos OS Release 18.1 and earlier releases, PCP on the MS-MPC and MS-MIC does
not support DS-Lite.
or
3. For PCP DS-Lite, provide the name of the DS-Lite softwire concentrator configuration.
4. Specify the minimum and maximum mapping lifetimes for the server.
5. Specify the time limits for generating short lifetime or long lifetime errors.
6. (Optional)—Enable PCP options on the specified PCP server. The following options are available—
third-party and prefer-failure. The third-party option is required to enable third-party requests by
the PCP client. DS-Lite requires the third-party option. The prefer-failure option requests generation
of an error message when the PCP client requests a specific IP address/port that is not available,
rather than assigning another available address from the NAT pool. If prefer-failure is not specified
NAPT44 assigns an available address/port from the NAT pool based on the configured NAT options.
NOTE: When you do not explicitly specify a NAT pool for mapping, the Junos OS performs a
partial rule match based on source IP, source port, and protocol, and the Junos OS uses the
NAT pool configured for the first matching rule to allocate mappings for PCP.
You must use explicit configuration in order to use multiple NAT pools.
For the MX-SPC3 security services card and Next Gen Services, the nat-options statement
supports only one pool name to attach to a PCP server.
8. (Optional)—Configure the maximum number of mappings per client. The default is 32 and maximum
is 128.
A term is not required when running the MX-SPC3 security services card for Next Gen Services.
• A from option that identifies the traffic that is subject to the rule.
• A then option that identifies what action is to be taken. In the case of a PCP rule, this option
Identifies the pcp server that handles selected traffic
1. Go to the [edit services pcp rule rule-name] hierarchy level and specify match-direction input.
2. Go to the [edit services pcp rule rule-name term term-name] hierarchy level and provide a term
name.
This step is not required when running the MX-SPC3 security services card for Next Gen Services.
3. (Optional)—Provide a from option to filter the traffic to be selected for processing by the rule. When
you omit the from option, all traffic handled by the service set’s service interface is subject to the
261
rule. The following options are available at the [edit services pcp rule rule-name term term-name
from] hierarchy level:
application-sets set-name Traffic for the application set is processed by the PCP rule.
applications [ application- Traffic for the application is processed by the PCP rule.
name ]
This option is not required when running the MX-SPC3 security
services card for Next Gen Services.
destination-address Traffic for the destination address or prefix is processed by the PCP
address <except> rule. If you include the except option, traffic for the destination
address or prefix is not processed by the PCP rule.
destination-address- Traffic for the destination address range is processed by the PCP
range high maximum-value rule. If you include the except option, traffic for the destination
low minimum-value <except> address range is not processed by the PCP rule.
destination-port high Traffic for the destination port range is processed by the PCP rule.
maximum-value low
minimum-value
destination-prefix-list Traffic for a destination address in the prefix list is processed by the
list-name <except> PCP rule. If you include the except option, traffic for a destination
address in the prefix list is not processed by the PCP rule.
source-address address Traffic from the source address or prefix is processed by the PCP
<except> rule. If you include the except option, traffic from the source
address or prefix is not processed by the PCP rule.
source-address-range high Traffic from the source address range is processed by the PCP rule.
maximum-value low If you include the except option, traffic from the source address
minimum-value <except> range is not processed by the PCP rule.
source-prefix-list list- Traffic from a source address in the prefix list is processed by the
name <except> PCP rule. If you include the except option, traffic from a source
address in the prefix list is not processed by the PCP rule.
4. If you are using PCP with IPv4-to-IPv4 NAT or with DS-Lite, configure endpoint-independent
mapping (EIM) and endpoint-independent filtering (EIF).
NOTE: The PCP mappings are not created if you do not configure EIM and EIF with PCP for
IPv4-to-IPv4 NAT or for DS-Lite.
2. If this is a new service set, provide basic service set information, including interface information and
any other rules that may apply.
3. Specify the name of the PCP rule or rule list used to send traffic to the specified PCP server.
NOTE: Your service set must also identify any required nat-rule and softwire-rule.
• protocol—All logs related to mapping creation, deletion are included at this level of logging.
• protocol-error—–All protocol error related logs (such as mapping refresh failed, PCP look up failed,
mapping creation failed). are included in this level of logging.
Release Description
20.2R1 Starting in Junos OS release 20.2R1 PCP is supported on the MX-SPC3 security services card for
CGNAT services.
18.2R1
17.4R1 Starting in Junos OS Release 17.4R1, PCP for NAPT44 is also supported on the MS-MPC and MS-MIC.
264
CHAPTER 16
IN THIS CHAPTER
Mapping of Address and Port with Encapsulation (MAP-E) for Next Gen Services | 264
Equal Cost Multiple Path (ECMP) support for Mapping of Address and Port with Encapsulation (MAP-
E) | 271
Mapping of Address and Port with Encapsulation (MAP-E) for Next Gen
Services
IN THIS SECTION
Configuring Mapping of Address and Port with Encapsulation (MAP-E) for Next Gen Services | 268
IN THIS SECTION
Mapping of Address and Port with Encapsulation (MAP-E) Supported and Unsupported Features | 266
265
This topic provides an overview of Mapping of Address and Port with Encapsulation (MAP-E) feature
and its benefit to service providers when used as an inline service on MX Series routers with MPC and
MIC interfaces. Starting in Junos OS release 20.2R1, MAP-E softwires are supported under Next Gen
Services on either an MPC or MIC by specifying the inline services si-1/1/0 naming convention. Starting
in Junos OS release 20.3R1, MPC10E and MX2K-MPC11E support MAP-E.
Reduces administrative overhead and creates a scalable network infrastructure that easily supports
connectivity to a large number of IPv4 subscribers over the ISP's IPv6 access network.
1. Border Relay (BR)—MAP-E-enabled provider edge device in a MAP domain. A BR device has at least
an IPv6-enabled interface and an IPv4 interface connected to the native IPv4 network.
3. MAP domain—One or more MAP-E CE devices and BR devices connected to the same virtual link.
4. Port Set ID (PSID)—Separate part of the transport layer port space that is denoted as port set ID.
5. Embedded Address (EA) Bits—EA-bits in the IPv6 address identify an IPv4 prefix or address or a
shared IPv4 address and a port-set identifier.
6. Softwire—Tunnel between two IPv6 end-points to carry IPv4 packets or two IPv4 end-points to carry
IPv6 packets.
7. Softwire Initiator (SI)—Softwire at the customer end that encapsulates native packets and tunnels
them to a softwire concentrator at the service provider.
8. Softwire Concentrator (SC)—Softwire that decapsulates the packets received from a softwire initiator
and sends them to their destination.
266
In the MAP-E network topology, there are two MAP-E customer edge (CE) devices, each connected to a
private IPv4 host. The MAP-E CE devices are dual stack and are capable of Network Address Port
Translation (NAPT). The MAP-E CE devices connect to a MAP-E Border Relay (BR) device through an
IPv6-only MAP-E network domain. The MAP-E BR device is dual stack and is connected to both a public
IPv4 network and an IPv6 MAP-E network.
1. The MAP-E CE devices are capable of NAPT. On receiving an IPv4 packet from the host, the MAP-E
CE device performs NAT translation on the incoming IPv4 packets.
2. The NAT translated IPv4 packets are then encapsulated into IPv6 packets by the MAP-E CE device,
and sent to the MAP-E BR device.
3. The IPv6 packet gets transported through the IPv6-only service provider network and reaches the
MAP-E BR device.
4. On receiving the IPv6 packets, the incoming IPv6 packets are decapsulated by the MAP-E CE device
and routed to the IPv4 public network.
In the reverse path, the incoming IPv4 packet is encapsulated into an IPv6 packet by the MAP-E BR
device, and routed to the MAP-E CE devices.
Mapping of Address and Port with Encapsulation (MAP-E) Supported and Unsupported Features
• support for Inline MAP-E Border Relay (BR) solution that adheres to draft version 03 of RFC 7597
Fully compliant with draft version 03 of RFC 7597, Mapping of Address and Port with Encapsulation
(MAP), when the version-3 option is disabled at the services softwires softwire-types map-e map-e-
concentrator-name
• Support the feature on all MPCs using service interfaces with 100 Gigabits.
• Support reassembly of fragmented IPv4 traffic arriving from IPv4 network before encapsulating it
into an IPv6 packet.
• Support fragmentation of inner IPv4 packet if the packet size after encapsulation exceeds the MAP-E
maximum transmission unit (MTU).
• Packets having Internet Control Message Protocol (ICMP) payload with the following message types
are accepted for MAP-E encapsulation and decapsulation:
The following features and functionality are not supported with the MAP-E feature:
• Anti-spoof check is not supported for fragmented IPv4 packets coming from a customer edge (CE)
device.
• Section 8.2 of the Internet draft draft-ietf-softwire-map-03 (expires on July 28, 2013), Mapping of
Address and Port with Encapsulation (MAP) is not supported. Instead of responding with an ICMPv6
Destination Unreachable, Source address failed ingress/egress policy (Type 1, Code 5) message,
spoof packets are silently dropped and the counter is incremented.
• Inline MAP-E with virtual routing and forwarding (VRF) is not supported.
268
• Inline MAP-E with inline Network Address Translation (NAT) or dual stack (DS)-Lite is not supported.
Configuring Mapping of Address and Port with Encapsulation (MAP-E) for Next Gen
Services
This example shows you how to configure the MAP-E Border Relay (BR) solution using a next hop-based
style of configuration.
To configure MAP-E:
[edit chassis]
user@host# set fpc 0 pic 0 inline-services bandwidth 100g
[edit interfaces]
user@host# set si-0/0/0 unit 0 family inet
user@host# set si-0/0/0 unit 0 family inet6
[edit interfaces]
user@host# set si-0/0/0 unit 1 family inet
user@host# set si-0/0/0 unit 1 family inet family inet6
user@host# set si-0/0/0 unit 1 service-domain inside
[edit interfaces]
user@host# set si-0/0/0 unit 2 family inet
user@host# set si-0/0/0 unit 2 family inet family inet6
user@host# set si-0/0/0 unit 2 service-domain outside
269
[edit interfaces]
user@host# set ge-0/2/7 unit 0 family inet address 10.10.10.1/16
[edit interfaces]
user@host# set ge-0/2/8 unit 0 family inet6 address 3abc::1/16
NOTE: For full RFC 7597 compliance do not configure MAP-E version 3.
[edit]
user@host# edit services softwires softwire-types map-e mape-tun1
NOTE: When configuring the MAP-E softwire concentrator, take the following into
consideration:
• Possible values for ea-bits-len is 0 through 48.
• If the sum of v4-prefix-len and ea-bits-len is less than 32, then the psid-len must be
equal to the difference between 32 and the sum total of v4-prefix-len and ea-bits-len.
• The MAP-E IPv4 and IPv6 prefix must be unique per softwire concentrator.
• MAP-E PSID offset has a default value of 4, and MAP-E tunnel maximum transmission
unit (MTU) has a default value of 9192.
i. Specify the rule length for the IPv4 and IPv6 prefixes.
vi. Configure the softwire rule, which specifies the direction of the traffic to be tunneled
through the MAP-E softwire.
[edit]
user@host# edit services service-set sset1
[edit services service-set sset1]
user@host# set softwires-rule-set domain-1
user@host# set next-hop-service inside-service-interface si-4/2/0.1
user@host# set next-hop-service outside-service-interface si-4/2/0.2
Release Description
20.3R1 Starting in Junos OS release 20.3R1, MPC10E and MX2K-MPC11E support MAP-E.
20.2R1 Starting in Junos OS release 20.2R1, MAP-E softwires are supported under Next Gen Services on either
an MPC or MIC by specifying the inline services si-1/1/0 naming convention.
Equal Cost Multiple Path (ECMP) support for Mapping of Address and
Port with Encapsulation (MAP-E)
IN THIS SECTION
Equal Cost Multiple Path (ECMP) support for Mapping of Address and Port with Encapsulation (MAP-
E) | 272
Disabling auto-routes to support ECMP with Mapping of Address and Port with Encapsulation (MAP-
E) | 272
272
Equal Cost Multiple Path (ECMP) support for Mapping of Address and Port with
Encapsulation (MAP-E)
IN THIS SECTION
Benefits | 272
This topic provides an overview of Equal Cost Multiple Path (ECMP) support for Mapping of Address
and Port with Encapsulation (MAP-E) feature and its benefit to service providers when used as an inline
service on MX Series routers with MPC and MIC interfaces.
In a MAP-E network topology, in the reverse path, the border relay router receives IPv4 traffic and
encapsulates it in a IPv6 packet. Longer routes are used for faster matching. However, they do not
facilitate EMCP load balancing on the PIC, as the routes point to a single PIC. Starting in 19.3R1, you
can disable auto-routes by configuring the disable-auto-route statement at the [edit services softwire
softwire-concentrator map-e <domain-name>] hierarchy, and direct the static routes to an ECMP load
balancer. Hence, the packets can be distributed among different inline service interfaces.
Benefits
Disabling auto-routes to support ECMP with Mapping of Address and Port with
Encapsulation (MAP-E)
This example shows you how to disable auto-routes on a MAP-E Border Relay (BR) solution to support
ECMP.
[edit chassis]
user@host# set fpc 0 pic 0 inline-services bandwidth 100g
[edit interfaces]
user@host# set si-0/0/0 unit 0 family inet
user@host# set si-0/0/0 unit 0 family inet6
273
[edit interfaces]
user@host# set si-0/0/0 unit 1 family inet
user@host# set si-0/0/0 unit 1 family inet family inet6
user@host# set si-0/0/0 unit 1 service-domain inside
[edit interfaces]
user@host# set si-0/0/0 unit 2 family inet
user@host# set si-0/0/0 unit 2 family inet family inet6
user@host# set si-0/0/0 unit 2 service-domain outside
[edit interfaces]
user@host# set ge-0/2/7 unit 0 family inet address 10.10.10.1/16
[edit interfaces]
user@host# set ge-0/2/8 unit 0 family inet6 address 3abc::1/16
9. Configure a softwire rule for MAP-E domain-1 to specify the direction of traffic to be tunneled.
10. Configure a softwire rule for MAP-E domain-2 to specify the direction of traffic to be tunneled.
[edit routing-options]
user@host# set rib inet6.0 static route 2001:db8:ffff::1/128 next-hop si-0/0/0.1
user@host# set rib inet6.0 static route 2001:db8:ffff::1/128 next-hop si-0/1/0.1
user@host# set rib inet.0 static route 192.0.2.0/24 next-hop si-0/0/0.2
user@host# set rib inet.0 static route 192.0.2.0/24 next-hop si-0/1/0.2
user@host# set rib inet.0 static route 192.0.3.0/24 next-hop si-0/0/0.2
user@host# set rib inet.0 static route 192.0.3.0/24 next-hop si-0/1/0.2
[edit ]
user@host# set policy-options policy-statement LB then load-balance per-packet
user@host# set routing-options forwarding-table export LB
[edit ]
user@host# run show route 2001:db8:ffff::1
inet6.0: 10 destinations, 10 routes (10 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
2001:db8:ffff::1/128
*[Static/5] 00:00:12
> via si-1/0/0.1
via si-1/1/0.1
The service sets of the PICs have ecmp-rules configured and they carry the MAP-E rules of
domain-1 and domain-2. From the output, you can understand that when the disable-auto-route is
enabled and ecmp -rules configured, instead of the longer auto routes, static routes are created.
RELATED DOCUMENTATION
map-e
276
CHAPTER 17
IN THIS CHAPTER
With Junos OS Release 11.4, you can use the ping and traceroute commands to determine the status of
the DS-Lite softwire tunnels:
• IPv6 ping—The softwire address endpoint on the DS-Lite softwire terminator (AFTR) is usually
configured only at the [edit services softwire] hierarchy level; it need not be hosted on any interface.
Previous releases of the Junos OS software did not provide replies to pings to the IPv6 softwire
address when the AFTR was not configured on a specific interface or loopback. An IPv6 ping enables
the softwire initiator (B4) to verify the softwire address of the AFTR before creating a tunnel.
• IPv4 ping—A special IPv4 address, 192.0.0.1, is reserved for the AFTR. Previous releases of the Junos
OS did not respond to any pings sent to this address. A B4 and other IPv4 nodes can now ping to this
address to determine whether the DS-Lite tunnel is working.
• Traceroute—The AFTR now generates and forwards traceroute packets over the DS-Lite tunnel.
IN THIS SECTION
Purpose | 277
Action | 277
Purpose
You can review softwire global statistics by using the show services softwire or show services
softwire statistics command.
Action
No Flow Extension :0
ICMPv4 Dropped Packets :0
IN THIS SECTION
Purpose | 279
Action | 279
Purpose
Use the following commands to check the creation of the softwires, pre-NAT flows, and post-NAT
flows. Output can be filtered using more specific fields such as AFTR or B4 address or both for DS-Lite,
and softwire-concentrator or softwire-initiator or both for 6rd.
Action
RELATED DOCUMENTATION
CHAPTER 18
IN THIS CHAPTER
IN THIS SECTION
Configuring Port Forwarding with Static Destination Address Translation for Next Gen Services | 282
Configuring Port Forwarding without Static Destination Address Translation for Next Gen Services | 286
IN THIS SECTION
Benefits | 282
Port forwarding allows the public destination address and port of a packet to be translated to an IP
address and port in a private network. This translation is a static, one-to-one mapping.
Port forwarding allows a packet to reach a host within a masqueraded, typically private, network, based
on the port number on which the packet was received from the originating host. An example of this type
of destination is the host of a public HTTP server within a private network.
282
If you only need to change the destination port, you can also configure port forwarding without
translating the destination address.
Port forwarding is supported for destination NAT and twice NAPT 44. Port forwarding works only with
the FTP application-level gateway (ALG), and has no support for technologies that offer IPv6 services
over IPv4 infrastructure, such as IPv6 rapid deployment (6rd) and dual-stack lite (DS-Lite).
Benefits
• Allows remote computers, such as public machines on the Internet, to connect to a non-standard
port of a specific computer that is hidden within a private network.
Configuring Port Forwarding with Static Destination Address Translation for Next
Gen Services
IN THIS SECTION
Configuring the NAT Rule for Port Forwarding with Destination Address Translation | 283
Configuring the Service Set for Port Forwarding with Destination Address Translation | 285
You can configure port forwarding with static destination address translation, which changes the
destination address and port of a packet so it can reach the correct host and port within a masqueraded,
typically private, network.
To configure the destination pool for the static destination address translation:
3. To allow the IP addresses of a NAT destination pool to overlap with IP addresses in pools used in
other service sets, configure allow-overlapping-pools.
2. Specify the original destination port number that needs to be translated and the port number to
which the original port is mapped. You can configure a maximum of 32 destination port mappings in a
port forwarding map.
In the following example, the destination port number that needs to be translated is 23 and the port
to which traffic is mapped is 45.
Configuring the NAT Rule for Port Forwarding with Destination Address Translation
To configure the NAT rule for port forwarding with destination address translation:
284
2. Specify the traffic direction to which the NAT rule set applies.
3. Specify the destination addresses that the NAT rule applies to.
To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:
4. Specify the destination port range that the NAT rule applies to.
5. Specify the NAT pool that contains the destination addresses for translated traffic.
6. Specify the name of the mapping for port forwarding. You can only configure one mapping within a
NAT rule term.
7. Configure the generation of a syslog when traffic matches the destination NAT rule match
conditions.
Configuring the Service Set for Port Forwarding with Destination Address Translation
[edit services]
user@host# edit service-set service-set-name
2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.
or
NOTE: You cannot use an AMS interface in a port forwarding service set.
286
3. Specify the NAT rule sets to be used with the service set.
Configuring Port Forwarding without Static Destination Address Translation for Next
Gen Services
IN THIS SECTION
Configuring the NAT Rule for Port Forwarding without Destination Address Translation | 287
Configuring the Service Set for Port Forwarding without Destination Address Translation | 288
You can configure port forwarding without static destination address translation, which changes the
destination port of a packet so it can reach the correct port on the destination host.
2. Specify the original destination port number that needs to be translated and the port number to
which the original port is mapped. You can configure a maximum of 32 destination port mappings in a
port forwarding map.
In the following example, the destination port number that needs to be translated is 23 and the port
to which traffic is mapped is 45.
Configuring the NAT Rule for Port Forwarding without Destination Address Translation
To configure the NAT rule for port forwarding without destination address translation:
2. Specify the traffic direction to which the NAT rule set applies.
3. Specify the destination addresses that the NAT rule applies to.
To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:
5. Specify the name of the mapping for port forwarding. You can only configure one mapping within a
NAT rule term.
6. Configure the generation of a syslog when traffic matches the destination NAT rule match
conditions.
Configuring the Service Set for Port Forwarding without Destination Address Translation
[edit services]
user@host# edit service-set service-set-name
2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.
or
NOTE: You cannot use an AMS interface in a port forwarding service set.
3. Specify the NAT rule sets to be used with the service set.
CHAPTER 19
IN THIS CHAPTER
Address Pooling and Endpoint Independent Mapping for Port Translation | 290
IN THIS SECTION
Address Pooling
Address pooling, or address pooling paired (APP) ensures assignment of the same external IP address for
all sessions originating from the same internal host. You can use this feature when assigning external IP
addresses from a pool. This option does not affect port utilization.
Address pooling solves the problems of an application opening multiple connections. For example, when
Session Initiation Protocol (SIP) client sends Real-Time Transport Protocol (RTP) and Real-Time Control
Protocol (RTCP) packets, the SIP generally server requires that they come from the same IP address,
even if they have been subject to NAT. If RTP and RTCP IP addresses are different, the receiving
endpoint might drop packets. Any point-to-point (P2P) protocol that negotiates ports (assuming address
stability) benefits from address pooling paired.
• A site that offers instant messaging services requires that chat and their control sessions come from
the same public source address. When the user signs on to chat, a control session authenticates the
user. A different session begins when the user starts a chat session. If the chat session originates
from a source address that is different from the authentication session, the instant messaging server
rejects the chat session, because it originates from an unauthorized address.
• Certain websites such as online banking sites require that all connections from a given host come
from the same IP address.
NOTE: When you deactivate a service set that contains address pooling paired (APP) for that
service set, messages are displayed on the PIC console and the mappings are cleared for that
service set. These messages are triggered when the deletion of a service-set commences and
again generated when the deletion of the service set is completed. The following sample
messages are displayed when deletion starts and ends:
• Nov 15 08:33:13.974 LOG: Critical] SVC-SET ss1 (iid 5) deactivate/delete: NAT Mappings
and flows deletion initiated
• Nov 15 08:33:14.674 LOG: Critical] SVC-SET ss1 (iid 5) deactivate/delete: NAT Mappings
and flows deletion completed
In a scaled environment that contains a large number of APP in a service set, a heavy volume of
messages is generated and this process takes some amount of time. We recommend that you
wait until the console messages indicating the completion of deletion of the service set are
completed before you reactivate the service-set again.
Endpoint independent mapping (EIM) ensures the assignment of the same external address and port for
all connections from a given host if they use the same internal port. This means if they come from a
different source port, you are free to assign a different external address.
• EIM provides a stable external IP address and port (for a period of time) to which external hosts can
connect. Endpoint independent filtering (EIF) controls which external hosts can connect to an
internal host.
NOTE: When you deactivate a service set that contains endpoint independent mapping (EIM)
mapping for that service set, messages are displayed on the PIC console and the mappings are
292
cleared for that service set. These messages are triggered when the deletion of a service set
commences and again generated when the deletion of the service set is completed. The
following sample messages are displayed when deletion starts and ends:
• Nov 15 08:33:13.974 LOG: Critical] SVC-SET ss1 (iid 5) deactivate/delete: NAT Mappings
and flows deletion initiated
• Nov 15 08:33:14.674 LOG: Critical] SVC-SET ss1 (iid 5) deactivate/delete: NAT Mappings
and flows deletion completed
In a scaled environment that contains a large number of EIM mappings in a service set, a heavy
volume of messages is generated and this process takes some amount of time. We recommend
that you wait until the console messages indicating the completion of deletion of the service set
are completed before you reactivate the service-set again.
Round-robin allocation is one method you can configure to allocate private addresses to external
addresses and ports. Round-robin allocation assigns one port from each external address in a range
before repeating the process for each address in the next range. After ports have been allocated for all
addresses in the last range, the allocation process wraps around and allocates the next unused port for
addresses in the first range. For example, if you have a NAT pool range of 100.0.0.1 through 100.0.0.12
and the first port is 3333:
• Wraparound occurs and the thirteenth connection is allocated to the address:port 100.0.0.1:3334.
You can configure secured port block allocation, which allocates blocks of ports to a subscriber for
source NAT port translation. The most recently allocated block is the current active block. New requests
for NAT ports for the subscriber are served from the active block. Ports are allocated randomly from the
current active block.
Carriers track subscribers using the IP address (RADIUS or DHCP) log. If they use port translation
without port block allocation, an IP address is shared by multiple subscribers, and the carrier must track
the IP address and port, which are part of the NAT log. Because ports are used and reused at a very high
rate, tracking subscribers using the log becomes difficult because of the large number of messages,
which are difficult to archive and correlate. By using port block allocation, you can significantly reduce
the number of logs, making it easier to track subscribers.
With port block allocation, we generate one syslog log per set of ports allocated for a subscriber. These
logs are UDP based and can be lost in the network, particularly for long-running flows. You can
configure an interim logging interval to re-send logs for active blocks that have traffic on at least one of
the ports.
294
CHAPTER 20
IN THIS CHAPTER
Configuring Static Source NAT44 or NAT66 for Next Gen Services | 295
IN THIS SECTION
Benefits | 294
Static source NAT performs a one-to-one static mapping of the original private domain host source
address to a public source address. A block of external addresses is set aside for this mapping, and
source addresses are translated as hosts in a private domain originate sessions to the external domain.
Static source NAT does not perform port mapping. For packets outbound from the private network,
static source NAT translates source IP addresses and related fields such as IP, TCP, UDP, and ICMP
header checksums. For inbound packets, static source NAT translates the destination IP address and the
checksums.
Benefits
• Allows hosts in the private network to connect with the external domain, while hiding the private
network.
295
IN THIS SECTION
Configuring the Source Pool for Static Source NAT44 or NAT66 | 295
Configuring the NAT Rule for Static Source NAT44 or NAT66 | 296
Configuring the Service Set for Static Source NAT44 or NAT66 | 297
or
3. Configure a one-to-one static shifting of a range of original source addresses to the range of
addresses in the source pool by specifying the base address of the original source address range.
For example, if the host address base is 198.51.100.30 and the NAT pool uses the range
203.0.113.10 to 203.0.113.20, then 198.51.100.30 translates to 203.0.113.10, 198.51.100.31
translates to 203.0.113.11, and so on.
296
4. To allow the IP addresses of a NAT source pool to overlap with IP addresses in pools used in other
service sets, configure allow-overlapping-pools.
2. Specify the traffic direction to which the NAT rule set applies.
3. Specify the addresses that are translated by the source NAT rule.
To specify one address or prefix value:
To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:
4. Specify one or more application protocols to which the NAT rule applies. The number of applications
listed in the rule must not exceed 3072.
5. Specify the NAT pool that contains the addresses for translated traffic.
6. Configure the address-pooling paired feature if you want to ensure assignment of the same external
IP address for all sessions originating from the same internal host.
[edit services nat source rule-set rule-set-name rule rule-name then source-
nat mapping-type]
user@host# set address-pooling-paired
7. Specify the timeout period for address-pooling-paired mappings that use the NAT pool. The range is
120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this amount of
time are dropped.
If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.
8. Configure the generation of a syslog when traffic matches the NAT rule conditions.
[edit services]
user@host# edit service-set service-set-name
2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.
or
3. Specify the NAT rule sets to be used with the service set.
SEE ALSO
CHAPTER 21
IN THIS CHAPTER
IN THIS SECTION
Static destination NAT translates the IPv4 destination address of an incoming packet to the IPv4
address of a private server. This redirects traffic destined to a virtual host (identified by the original
destination IP address) to the real host (identified by the translated destination IP address).
Static destination NAT uses a one-to-one mapping between the original address and the translated
address; the mapping is configured statically.
You can also statically translate the destination port by using port forwarding. See "Port Forwarding for
Next Gen Services" on page 281.
• Allows external traffic to communicate with a private host without revealing the host’s private IP
address
RELATED DOCUMENTATION
IN THIS SECTION
3. To allow the IP addresses of a NAT destination pool to overlap with IP addresses in pools used in
other service sets, configure allow-overlapping-pools.
2. Specify the traffic direction to which the destination NAT rule set applies.
3. Specify the source addresses of traffic that the NAT rule applies to.
To specify one address or prefix value:
To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:
4. Specify the destination addresses that the NAT rule applies to.
To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:
5. Specify one or more application protocols to which the destination NAT rule applies. The number of
applications listed in the rule must not exceed 3072.
6. Specify the NAT pool that contains the destination addresses for translated traffic.
7. Configure the generation of a syslog when traffic matches the destination NAT rule match
conditions.
[edit services]
user@host# edit service-set service-set-name
303
2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.
or
3. Specify the NAT rule sets to be used with the service set.
RELATED DOCUMENTATION
CHAPTER 22
IN THIS CHAPTER
IN THIS SECTION
Benefits | 304
The private source address is translated by dynamically assigning a public address from a pool and a port
number. Multiple private IP addresses can be mapped to the same external address because each
private address is mapped to a different port of the external address.
The destination address is translated to the IPv4 address of a private server. This redirects traffic
destined to a virtual host (identified by the original destination IP address) to the real host (identified by
the translated destination IP address). The destination addresses is translated with a one-to-one static
mapping to an address in a pool. Port mapping is not performed for the destination address.
You can also statically translate the destination port by using port forwarding. See "Port Forwarding for
Next Gen Services" on page 281.
Benefits
• Allows hosts in the private network to connect with the external domain, while hiding the private
network.
305
• Minimizes the number of public IP addresses that are allocated for NAT.
• Allows external traffic to communicate with a private host without revealing the host’s private IP
address
IN THIS SECTION
Configuring the Source and Destination Pools for Twice NAPT | 305
or
3. To configure automatic port assignment, specify either random allocation or round-robin allocation.
Random allocation randomly assigns a port from the range 1024 through 65535 for each port
translation. Round robin allocation first assigns port 1024, and uses the next higher port for each
successive port assignment. Round robin allocation is the default.
4. To disable round-robin port allocation for all NAT pools that do not specify an automatic (random-
allocation | round-robin) setting, configure the global setting.
NOTE: If you specify a range of ports to assign, the automatic statement is ignored.
a. Specify the low and high values for the port. If you do not configure automatic port assignment,
you must configure a range of ports.
b. Specify either random allocation or round-robin allocation. Round-robin allocation is the default.
6. Assign a port within the same range as the incoming port—either 0 through 1023 or 1024 through
65,535. This feature is not available if you configure port-block allocation.
7. Assign a port with the same parity (even or odd) as the incoming port. This feature is not available if
you configure port-block allocation.
8. Configure a global default port range for NAT pools that use port translation. This port range is
used when a NAT pool does not specify a port range and does not specify automatic port
assignment. The global port range can be from 1024 through 65,535.
9. If you want to allocate a block of ports for each subscriber to use for NAPT, configure port-block
allocation:
a. Configure the number of ports in a block. The range is 1 through 64,512 and the default is 128.
b. Configure the interval, in seconds, for which the block is active. After the timeout, a new block is
allocated, even if ports are available in the active block. If you set the timeout to 0, port blocks
are filled completely before a new port block is allocated, and the last port block remains active
indefinitely. The range is 0 through 86,400, and the default is 0.
c. Specify the timeout period for address-pooling paired mappings that use the NAT pool. The
range is 120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this
amount of time are dropped.
If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.
308
d. Configure the maximum number of blocks that can be allocated to a user address. The range is 1
through 512, and the default is 8.
e. Specify how often to send interim system logs for active port blocks and for inactive port blocks
with live sessions. This increases the reliability of system logs, which are UDP-based and can get
lost in the network. The range is 1800 through 86,400 seconds, and the default is 0 (interim logs
are disabled).
10. Specify the timeout period for endpoint independent translations that use the specified NAT pool.
Mappings that are inactive for this amount of time are dropped. The range is 120 through 86,400
seconds. If you do not configure ei-mapping-timeout, then the mapping-timeout value is used for
endpoint independent translations.
11. Specify the timeout period for address-pooling paired mappings that use the NAT pool. The range
is 120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this amount
of time are dropped.
If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.
12. Define the NAT pool utilization levels that trigger SNMP traps. The raise-threshold is the pool
utilization percentage that triggers the trap, and the range is 50 through 100. The clear-threshold is
the pool utilization percentage that clears the trap, and the range is 40 through 100. For pools that
use port-block allocation, the utilization is based on the number of ports that are used; for pools
309
that do not use port-block allocation, the utilization is based on the number of addresses that are
used.
14. Define the addresses or subnets to which destination addresses are translated.
15. To allow the IP addresses of a NAT source pool or destination pool to overlap with IP addresses in
pools used in other service sets, configure allow-overlapping-pools. However, pools that configure
port-block allocation must not overlap with other pools.
2. Specify the traffic direction to which the NAT rule set applies.
3. Specify the addresses that are translated by the source NAT rule.
310
To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:
4. Specify one or more application protocols to which the NAT rule applies. The number of
applications listed in the rule must not exceed 3072.
5. Specify the NAT pool that contains the addresses for translated traffic.
6. If you want to ensure that the same external address and port are assigned to all connections from
a given host, configure endpoint-independent mapping:
b. Specify prefix lists that contain the hosts that are allowed to establish inbound connections
using the endpoint-independent mapping. (Prefix lists are configured at the [edit policy-options]
hierarchy level.)
7. Configure the generation of a syslog when traffic matches the NAT rule conditions.
9. Specify the traffic direction to which the destination NAT rule set applies.
10. Specify the destination addresses of traffic that the destination NAT rule applies to.
To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:
11. Specify one or more application protocols to which the destination NAT rule applies. The number
of applications listed in the rule must not exceed 3072.
12. Specify the destination NAT pool that contains the destination addresses for translated traffic.
13. Configure the generation of a syslog when traffic matches the destination NAT rule match
conditions.
[edit services]
user@host# edit service-set service-set-name
2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.
or
3. Specify the NAT rule sets to be used with the service set. Include the source NAT rule set and the
destination NAT rule set.
CHAPTER 23
IN THIS CHAPTER
IN THIS SECTION
Benefits | 314
Twice static NAT translates both the source and destination IP addresses. An addresses is translated
with a one-to-one static mapping to an address in a pool. Port mapping is not performed.
The original private domain host source address is translated to a public source address.
The destination address is translated to the IPv4 address of a private server. This redirects traffic
destined to a virtual host (identified by the original destination IP address) to the real host (identified by
the translated destination IP address).
Benefits
• Allows hosts in the private network to connect with the external domain, while hiding the private
network.
• Allows external traffic to communicate with a private host without revealing the host’s private IP
address
IN THIS SECTION
Configuring the Source and Destination Pools for Twice Static NAT44 | 315
Configuring the Source and Destination Pools for Twice Static NAT44
To configure the source and destination pools for twice static NAT44:
or
3. Configure a one-to-one static shifting of a range of original source addresses to the range of
addresses in the source pool by specifying the base address of the original source address range.
For example, if the host address base is 198.51.100.30 and the NAT pool uses the range
203.0.113.10 to 203.0.113.20, then 198.51.100.30 translates to 203.0.113.10, 198.51.100.31
translates to 203.0.113.11, and so on.
4. Create a destination pool. Do not use the same name that you used for the source pool.
6. To allow the IP addresses of a NAT pool to overlap with IP addresses in pools used in other service
sets, configure allow-overlapping-pools.
2. Specify the traffic direction to which the NAT rule set applies.
3. Specify the addresses that are translated by the source NAT rule.
317
To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:
4. Specify one or more application protocols to which the source NAT rule applies. The number of
applications listed in the rule must not exceed 3072.
5. Specify the source NAT pool that contains the addresses for translated traffic.
6. Configure the generation of a syslog when traffic matches the NAT rule conditions.
8. Specify the traffic direction to which the destination NAT rule set applies.
9. Specify the destination addresses of traffic that the destination NAT rule applies to.
To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:
10. Specify one or more application protocols to which the destination NAT rule applies. The number
of applications listed in the rule must not exceed 3072.
11. Specify the destination NAT pool that contains the destination addresses for translated traffic.
12. Configure the generation of a syslog when traffic matches the destination NAT rule match
conditions.
[edit services]
user@host# edit service-set service-set-name
2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.
or
3. Specify the NAT rule sets to be used with the service set. Include the source NAT rule set and the
destination NAT rule set.
IN THIS SECTION
Benefits | 320
Twice dynamic NAT translates both the source and destination IP addresses. Port mapping is not
performed.
The private source address is translated by dynamically assigning a public address from a pool, and the
mapping from the original source address to the translated source address is maintained as long as there
is at least one active flow that uses this mapping.
The destination address is translated to the IPv4 address of a private server. This redirects traffic
destined to a virtual host (identified by the original destination IP address) to the real host (identified by
the translated destination IP address). The destination addresses is translated with a one-to-one static
mapping to an address in a pool.
Benefits
• Allows hosts in the private network to connect with the external domain, while hiding the private
network.
• Allows external traffic to communicate with a private host without revealing the host’s private IP
address
IN THIS SECTION
Configuring the Source and Destination Pools for Twice Dynamic NAT | 321
Configuring the Source and Destination Pools for Twice Dynamic NAT
To configure the source and destination pools for twice dynamic NAT:
or
4. Define the NAT pool utilization levels that trigger SNMP traps. The raise-threshold is the pool
utilization percentage that triggers the trap, and the range is 50 through 100. The clear-threshold is
the pool utilization percentage that clears the trap, and the range is 40 through 100. The utilization is
based on the number of addresses that are used.
5. Create a destination pool. Do not use the same name that you used for the source pool.
7. To allow the IP addresses of a NAT source pool or destination pool to overlap with IP addresses in
pools used in other service sets, configure allow-overlapping-pools.
2. Specify the traffic direction to which the NAT rule set applies.
3. Specify the addresses that are translated by the source NAT rule.
To specify one address or prefix value:
To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:
4. Specify one or more application protocols to which the source NAT rule applies. The number of
applications listed in the rule must not exceed 3072.
5. Configure the address-pooling paired feature if you want to ensure assignment of the same external
IP address for all sessions originating from the same internal host.
[edit services nat source rule-set rule-set-name rule rule-name then source-
nat mapping-type]
user@host# set address-pooling-paired
6. Specify the timeout period for address-pooling-paired mappings that use the NAT pool. The range
is 120 through 86,400 seconds, and the default is 300. Mappings that are inactive for this amount
of time are dropped.
If you do not configure ei-mapping-timeout for endpoint independent translations, then the
mapping-timeout value is used for endpoint independent translations.
324
7. Specify the source NAT pool that contains the addresses for translated traffic.
8. Configure the generation of a syslog when traffic matches the NAT rule conditions.
10. Specify the traffic direction to which the destination NAT rule set applies.
11. Specify the destination addresses of traffic that the destination NAT rule applies to.
To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:
12. Specify one or more application protocols to which the destination NAT rule applies. The number
of applications listed in the rule must not exceed 3072.
13. Specify the destination NAT pool that contains the destination addresses for translated traffic.
14. Configure the generation of a syslog when traffic matches the destination NAT rule match
conditions.
[edit services]
user@host# edit service-set service-set-name
2. Configure either an interface service, which requires a single service interface, or a next-hop service,
which requires an inside and outside service interface.
or
3. Specify the NAT rule sets to be used with the service set. Include the source NAT rule set and the
destination NAT rule set.
CHAPTER 24
IN THIS CHAPTER
IN THIS SECTION
Class of Service Overview for Services PICs (Next Gen Services) | 327
Configuring CoS for Traffic Processed by a Services PIC (Next Gen Services) | 328
IN THIS SECTION
Benefits | 328
You can configure CoS Differentiated Services (DiffServ) code point (DSCP) marking and forwarding-
class assignment for packets transiting a services PIC while being processed by a service set.
Configure services CoS rules, which identify the matching conditions for packet source and destination
addresses and for packet applications, and the actions to take on those packets. You must apply CoS
rules to a service set before the rules can be applied to traffic. Only stateful firewall and NAT rules can
be used with CoS rules in a service set.
328
You can also configure specific CoS actions for FTP and for SIP traffic by creating an application profile.
The application profile can then be referenced in the CoS rule actions.
The services CoS rules do not support scheduling. You must configure scheduling at the [edit class-of-
service] hierarchy level on the output interface or fabric.
NOTE: When configuring Next Gen Services with the MX-SPC3 services card, the service set
must include at least one stateful firewall (SFW) rule or NAT rule, or services CoS does not work.
Only stateful firewall and NAT rules can be used with CoS rules in a service set. CoS works
without NAT and SFW rules also.
Benefits
CoS for traffic on a services PIC lets you classify traffic flows based on stateful firewall and NAT
configurations.
SEE ALSO
Configuring CoS for Traffic Processed by a Services PIC (Next Gen Services) | 0
Configuring CoS for Traffic Processed by a Services PIC (Next Gen Services)
IN THIS SECTION
If this CoS rule is applied to an interface-type service set, the direction is determined by whether a
packet is entering or leaving the interface on which the service set is applied. If this CoS rule is
applied to a next-hop service set, the direction is input if the inside interface is used to route the
packet, and the direction is output if the outside interface is used to route the package.
If you configure input-output, the rule is applied to sessions initiated from either direction.
3. Configure a name for a CoS rule policy.
You can configure multiple policies for a CoS rule. Each policy identifies the matching conditions for
packet source and destination addresses and for packet applications, and the CoS actions to take
on those packets. Once a policy in the rule matches a packet, that policy is applied and no other
policies in the rule are processed.
4. Specify one or more port-based applications that match the policy.
10. Specify a prefix list of source address prefixes that match the policy.
You configure a prefix list by using the prefix-list statement at the [edit policy-options] hierarchy
level.
11. Specify the application profile that defines the CoS policy actions for FTP and SIP traffic.
The DSCP can be either a code point alias or a DSCP bit value.
13. Specify the forwarding class name to apply to the packet.
• assured-forwarding
• best-effort
• expedited-forwarding
• network-control
• user-defined classifiers.
You can define classifiers under [edit class-of-service classifiers dscp] hierarchy.
14. Configure system logging for the CoS rule policy.
15. Specify the treatment of flows in the reverse direction of the matching direction. Perform only one
of the following:
b. Apply the CoS rule policy actions to flows in the reverse direction as well as to flows in the
matching direction.
c. Store the DSCP and forwarding class of a packet that is received in the match direction of the
rule and then apply that DSCP and forwarding class to packets that are received in the reverse
direction of the same session.
Configure CoS actions for FTP and SIP traffic. The application profile can then be used in CoS rule
actions.
332
2. Specify the DSCP value to apply to the FTP or SIP (voice or video) packets.
For FTP traffic:
The DSCP can be either a code point alias or a DSCP bit value.
3. Specify the forwarding class to apply to FTP or SIP packets.
For FTP traffic:
• assured-forwarding
• best-effort
• expedited-forwarding
• network-control
333
A CoS rule set lets you specify a set of services CoS rules. You can then assign the rule set to a service
set, which processes the rules in the order they appear. Once a rule matches the packet, the router
performs the corresponding action, and no further rules in the rule set are applied.
You must apply CoS rules to a service set before the rules can be applied to traffic. Only stateful firewall
and NAT rules can be used with CoS rules in a service set.
[edit services]
user@host# edit service-set service-set-name
2. Configure either an interface service set, which requires a single service interface, or a next-hop
service set, which requires an inside and outside service interface.
or
3. Specify the CoS rules to be used with the service set. You can either specify individual rules or rule
sets.
To apply individual CoS rules:
The service set processes the CoS rules or rule sets in the order in which they appear in the service
set configuration.
4. (Optional) Assign at least one stateful firewall rule or NAT rule to the service set.
5. (Optional) Configure the service set to create a CoS session even if a packet is first received in the
reverse direction of the matching direction of the CoS rule. The CoS rule values are then applied as
soon as a packet in the correct match direction is received.
SEE ALSO
CHAPTER 25
IN THIS CHAPTER
IN THIS SECTION
Benefits | 337
Services PICs employ a type of firewall called a stateful firewall. Contrasted with a stateless firewall,
which inspects packets in isolation, a stateful firewall provides an extra layer of security by using state
information derived from past communications and other applications to make dynamic control
decisions for new communication attempts.
Stateful firewalls group relevant flows into conversations, and decide whether the conversation is
allowed to be established. If a conversation is allowed, all flows within the conversation are permitted,
including flows that are created during the life cycle of the conversation.
337
Benefits
By Inspecting the application protocol data of a flow, the stateful firewall intelligently enforces security
policies and permits only the minimally required packet traffic.
A typical Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) conversation consists of
two flows: the initiation flow and the responder flow. However, some conversations, such as an FTP
conversation, might consist of two control flows and many data flows.
• Source address
• Source port
• Destination address
• Destination port
• Protocol
Stateful firewall rules govern whether the conversation is allowed to be established. A rule consists of
matching conditions and actions to take.
Matching conditions include direction, source address, destination address, and application protocol or
service. In addition to the specific values you configure, you can assign the value any, any-ipv4, any-
ipv6, or you can use an address-book under services to define address lists and ranges for use within
stateful firewall rules. Finally, you can specify matches that result in the rule not being applied.
Actions in a stateful firewall rule include allowing the traffic or dropping the traffic.
Stateful firewall rules are directional. For each new conversation, the router software determines
whether the initiation flow direction matches the rule direction.
Stateful firewall rules are ordered. The software checks the rules in the order in which you include them
in the configuration. The first time the software finds a matching rule for a flow, the router implements
the action specified by that rule, and ignores subsequent rules.
The stateful firewall rules are configured in relation to an interface. By default, the stateful firewall
allows all sessions initiated from the hosts behind the interface to pass through the router.
338
The stateful firewall recognizes the following events as anomalies and sends them to the IDS software
for processing:
• IP anomalies:
• IP address anomalies:
• IP fragmentation anomalies:
• IP fragment overlap.
• IP fragment missed.
• TCP anomalies:
• TCP port 0.
• UDP anomalies:
IN THIS SECTION
Configuring Stateful Firewall Rule Sets for Next Gen Services | 342
Configuring the Service Set for Stateful Firewalls for Next Gen Services | 342
To configure stateful firewalls, you configure stateful firewall rules, and apply those rules to a service set.
You can also configure stateful firewall rule sets, which contain a set of stateful firewall rules.
2. Specify the traffic flow direction to which the stateful firewall rule applies.
If you configure input-output, the rule is applied to sessions initiated from either direction.
If this stateful firewall rule is applied to an interface-type service set, the direction is determined by
whether a packet is entering or leaving the interface on which the service set is applied. If this
stateful firewall rule is applied to a next-hop service set, the direction is input if the inside interface is
used to route the packet, and the direction is output if the outside interface is used to route the
package.
3. Configure a name for a policy.
You can configure multiple policies for a stateful firewall rule. Each policy identifies the matching
conditions for a flow, and whether or not to allow the flow. Once a policy in the rule matches a
packet, that policy is applied and no other policies in the rule are processed.
4. Specify the destination address of the flows to which the policy applies.
Alternatively, you can specify an address-book under the services configuration hierarchy to use in
this step.
6. Specify the source address of the flows to which the policy applies.
Alternatively, you can specify an address-book under the services configuration hierarchy to use in
this step.
Use an application protocol definition you have configured at the [edit applications] hierarchy level.
9. Specify an action that the policy takes.
where:
count Enables a count, in bytes or kilobytes, of all network traffic the policy allows to pass.
reject Drop the packets. For TCP traffic, send a TCP reset (RST) segment to the source host. For
UDP traffic, send an ICMP destination unreachable, port unreachable message (type 3,
code 3) to the source host.
342
2. Specify the stateful firewall rules that belong to the rule set.
Configuring the Service Set for Stateful Firewalls for Next Gen Services
Stateful firewall rules must be assigned to a service set before they can be applied to traffic.
[edit services]
user@host# edit service-set service-set-name
2. Configure either an interface service set, which requires a single service interface, or a next-hop
service set, which requires an inside and outside service interface.
or
3. Specify the stateful firewall rules to be used with the service set. You can specify either individual
rules or rule sets but not both.
To apply individual stateful firewall rules:
The service set processes the stateful firewall rules or rule sets in the order in which they appear in
the service set configuration.
4 PART
IDS Screens for Network Attack Protection Overview and Configuration | 345
345
CHAPTER 26
IN THIS CHAPTER
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
IN THIS SECTION
Benefits | 346
Intrusion detection services (IDS) screens give you a way to identify and drop traffic that is part of a
network attack.
• The limits on the number of sessions that originate from individual sources or that terminate at
individual destinations
You can also choose to log an alarm when an IDS screen identifies a packet, rather than drop the packet.
346
In addition to IDS screens, you can use firewall filters and policers to stop illegal TCP flags and other bad
flag combinations, and to specify general rate limiting (see the Routing Policies, Firewall Filters, and
Traffic Policers User Guide). IDS screens add a more granular level of filtering.
Use firewall filters and stateful firewall filters to filter out traffic that does not need to be processed by
an IDS screen.
Benefits
Session Limits
You can use IDS screens to set session limits for traffic from an individual source or to an individual
destination. This protects against network probing and flooding attacks. Traffic that exceeds the session
limits is dropped. You can specify session limits either for traffic with a particular IP protocol, such as
ICMP, or for traffic in general.
You decide whether the limits apply to individual addresses or to an aggregation of traffic from
individual subnets of a particular prefix length. For example, if you aggregate limits for IPv4 subnets with
a prefix length of 24, traffic from 192.0.2.2 and 192.0.2.3 is counted against the limits for the
192.0.2.0/24 subnet.
Some common network probing and flooding attacks that session limits protect against include:
ICMP The attacker sends ICMP request probes (pings) to multiple targets. If a target machine
Address replies, the attacker receives the IP address of the target.
Sweep
ICMP Flood The attacker floods a target machine by sending a large number of ICMP packets from one
or more source IP addresses. The target machine uses up its resources as it attempts to
process those ICMP packets, and then it can no longer process valid traffic.
TCP Port The attacker sends TCP SYN packets from one source to multiple destination ports of the
Scan target machine. If the target replies with a SYN-ACK from one or more destination ports,
the attacker learns which ports are open on the target.
TCP SYN The attacker floods a target machine by sending a large number of TCP SYN packets from
Flood one or more source IP addresses. The attacker might use real source IP addresses, which
results in a completed TCP connection, or might use fake source IP addresses, resulting in
the TCP connection not being completed. The target creates states for all the completed
and incomplete TCP connections. The target uses up its resources as it attempts to
manage the connection states, and then it can no longer process valid traffic.
347
UDP Flood The attacker floods a target machine by sending a large number of UDP packets from one
or more source IP addresses. The target machine uses up its resources as it attempts to
process those UDP packets, and then it can no longer process valid traffic.
IDS screens also install a dynamic filter on the PFEs of line cards for suspicious activity when the
following conditions occur:
• Either the packets per second or the number of connections per second for an individual source or
destination address exceeds four times the session limit in the IDS screen. (Dynamic filters are not
created from IDS screens that use subnet aggregation.)
• The services card CPU utilization percentage exceeds a configured value (default value is 90 percent).
The dynamic filter drops the suspicious traffic at the PFE, without the traffic being processed by the IDS
screen. When the packet or connection rate no longer exceeds four times the limit in the IDS screen, the
dynamic filter is removed.
You can use IDS screens to identify and drop traffic with a suspicious packet pattern. This protects
against attackers that craft unusual packets to launch denial-of-service attacks.
Suspicious packet patterns and attacks that you can specify in an IDS screen are:
ICMP The attacker sends the target ICMP packets that are IP fragments. These are
fragmentation considered suspicious packets because ICMP packets are usually short. When the
attack
target receives these packets, the results can range from processing packets
incorrectly to crashing the entire system.
Malformed ICMPv6 Malformed ICMPv6 packets can cause damage to the device and network.
packets Examples of malformed IPv6 packets are packets that are too big (message type
2), that have the next header set to routing (43), or that have a routing header set
to hop-by hop.
ICMP large packet The attacker sends the target ICMP frames with an IP length greater than 1024
attack bytes. These are considered suspicious packets because most ICMP messages are
small.
348
Ping of death attack The attacker sends the target ICMP ping packets whose IP datagram length
(ip_len) exceeds the maximum legal length (65,535 bytes) for IP packets, and the
packet is fragmented. When the target attempts to reassemble the IP packets, a
buffer overflow might occur, resulting in a system crashing, freezing, and
restarting.
Bad option attack The attacker sends the target packets with incorrectly formatted IPv4 options or
IPv6 extension headers. This can cause unpredictable issues, depending on the IP
stack implementation of routers and the target.
IPv6 extension Attackers can maliciously use extension headers for denial-of-service attacks or to
headers bypass filters.
IPv4 options Attackers can maliciously use IPv4 options for denial-of-service attacks.
IP teardrop attack The attacker sends the target fragmented IP packets that overlap. The target
machine uses up its resources as it attempts to reassemble the packets, and then
it can no longer process valid traffic.
IP unknown The attacker sends the target packets with protocol numbers greater than 137 for
protocol attack IPv4 and 139 for IPv6. An unknown protocol might be malicious.
TCP FIN No ACK The attacker sends the target TCP packets that have the FIN bit set but have the
attack ACK bit unset. This can allow the attacker to identify the operating system of the
target or to identify open ports on the target.
Land attack The attacker sends the target spoofed SYN packets that contain the target’s IP
address as both the destination and the source IP address. The target uses up its
resources as it repeatedly replies to itself. In another variation of the land attack,
the SYN packets also contain the same source and destination ports.
TCP SYN ACK ACK The attacker initiates Telnet or FTP connections with the target without
attack completing the connections. The target’s session table can fill up, resulting in the
device rejecting legitimate connection requests.
TCP SYN FIN attack The attacker sends the target TCP packets that have both the SYN and the FIN
bits set. This can cause unpredictable behavior on the target, depending on its
TCP stack implementation.
349
SYN fragment The attacker sends the target SYN packet fragments. The target caches SYN
attack fragments, waiting for the remaining fragments to arrive so it can reassemble
them and complete the connection. A flood of SYN fragments eventually fills the
host’s memory buffer, preventing valid traffic connections.
TCP no flag attack The attacker sends the target TCP packets containing no flags. This can cause
unpredictable behavior on the target, depending on its TCP stack implementation.
TCP WinNuke The attacker sends a TCP segment with the urgent (URG) flag set and destined for
attack port 139 of a target running Windows. This might cause the target machine to
crash.
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
Configuring Network Attack Protection With IDS Screens for Next Gen
Services
IN THIS SECTION
Configuring the IDS Screen Name, Direction, and Alarm Option | 349
2. Specify whether the IDS screen is applied to input traffic, output traffic, or both.
3. If you want the IDS screen to log an alarm when packets exceed the session limit, rather than drop
packets, configure alarm-without-drop.
ICMP Flood
by-destination by-protocol icmp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
351
Table 35: IDS Screen Options for Network Attacks Type (Continued)
UDP Flood
by-destination by-protocol udp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
1. If you want to apply session limits to an aggregation of all sessions to individual destination subnets
or from individual source subnets rather than individual addresses, configure aggregation.
a. To apply session limits to an aggregation of all sessions from within an individual IPv4 subnet,
specify the subnet prefix length. The range is from 1 through 32.
For example, the following statement configures an IPv4 prefix length of 24, and sessions from
192.0.2.2 and 192.0.2.3 are counted as sessions from the 192.0.2.0/24/24 subnet.
b. To apply session limits to an aggregation of all sessions from within an individual IPv6 subnet,
specify the subnet prefix length. The range is from 1 through 128.
For example, the following statement configures an IPv6 prefix length of 64, and sessions from
2001:db8:1234:72a2::2 and 2001:db8:1234:72a2::3 are counted as sessions from the
2001:db8:1234:72a2::/64 subnet.
c. To apply session limits to an aggregation of all sessions to an individual IPv4 subnet, specify the
subnet prefix length. The range is from 1 through 32.
d. To apply session limits to an aggregation of all sessions to an individual IPv6 subnet, specify the
subnet prefix length. The range is from 1 through 128.
2. If you want to apply session limits from a source for a particular IP protocol:
353
a. Configure the maximum number of concurrent sessions allowed from an individual source IP
address or subnet for a particular IP protocol.
b. Configure the maximum number of packets per second allowed from an individual source IP
address or subnet for a particular protocol.
c. Configure the maximum number of connections per second allowed from an individual source IP
address or subnet for a particular protocol.
b. Configure the maximum number of packets per second allowed to an individual destination IP
address or subnet for a particular protocol.
c. Configure the maximum number of connections per second allowed to an individual destination
IP address or subnet for a particular protocol.
4. If you want to apply session limits from a source regardless of the IP protocol:
a. Configure the maximum number of concurrent sessions allowed from an individual source IP
address or subnet.
b. Configure the maximum number of packets per second allowed from an individual source IP
address or subnet
c. Configure the maximum number of connections per second allowed from an individual source IP
address or subnet.
b. Configure the maximum number of packets per second allowed to an individual destination IP
address or subnet
c. Configure the maximum number of connections per second allowed to an individual destination
IP address or subnet.
6. Specify the services card CPU utilization percentage that triggers the installation of a dynamic filter
on the PFEs of the line cards for suspicious traffic. The default value is 90.
In addition to the CPU utilization percentage threshold, the packet rate or connection rate for an
individual source or destination address must exceed four times the session limit in the IDS screen
before the dynamic filter is installed. Dynamic filters are not created from IDS screens that use
subnet aggregation.
The dynamic filter drops the suspicious traffic at the PFE, without the traffic being processed by the
IDS screen. When the packet or connection rate no longer exceeds four times the limit in the IDS
screen, the dynamic filter is removed.
1. To protect against ICMP fragmentation attacks, identify and drop ICMP packets that are IP
fragments.
3. To protect against ICMP large packet attacks, identify and drop ICMP packets that are larger than
1024 bytes.
4. To protect against ping of death attacks, identify and drop oversized and irregular ICMP packets.
5. To protect against bad option attacks, identify and drop packets with incorrectly formatted IPv4
options or IPv6 extension headers.
7. To drop IPv6 packets with particular extension header values, specify the values.
8. To drop IPv4 packets with particular IPv4 option values, specify the values.
9. To protect against IP teardrop attacks, identify and drop fragmented IP packets that overlap.
10. To protect against IP unknown protocol attacks, identify and drop IP frames with protocol numbers
greater than 137 for IPv4 and 139 for IPv6.
11. To protect against TCP FIN No ACK Attacks, identify and drop any packet with the FIN flag set and
without the ACK flag set.
12. To protect against land attacks, identify and drop SYN packets that have the same source and
destination address or port.
13. To protect against TCP SYN ACK ACK attacks, configure the maximum number of connections from
an IP address that can be opened without being completed.
14. To protect against TCP SYN FIN attacks, identify and drop packets that have both the SYN and FIN
flags set.
15. To protect against SYN fragment attacks, identify and drop SYN packet fragments.
16. To protect against TCP no flag attacks, identify and drop TCP packets that have no flag fields set.
17. To protect against TCP WinNuke attacks, identify and drop TCP segments that are destined for port
139 and have the urgent (URG) flag set.
[edit services]
user@host# set service-set service-set-name ids-option screen-name
If the service set is associated with an AMS interface, then the session limits you configure are
applicable to each member interface.
2. Limit the packets that the IDS screen processes by configuring a stateful firewall rule . The stateful
firewall rule can identify either the traffic that should undergo IDS processing or the traffic that
should skip IDS processing:
• To allow IDS processing on the traffic that matches the stateful firewall rule, include accept at the
[edit services stateful-firewall rule rule-name term term-name then] hierarchy level.
• To skip IDS processing on the traffic that matches the stateful firewall rule, include accept skip-ids
at the [edit services stateful-firewall rule rule-name term term-name then] hierarchy level.
360
[edit services]
user@host# set service-set service-set-name stateful-firewall-rules rule-name
4. To protect against header anomaly attacks, configure a header integrity check for the service set.
[edit services]
user@host# set service-set service-set-name service-set-options header-integrity-check enable-all
RELATED DOCUMENTATION
CHAPTER 27
IN THIS CHAPTER
IN THIS SECTION
Table 36 on page 363 provides a summary of the traffic load balancing support on the MS-MPC and MS-
MIC cards for Adaptive Services versus support on the MX-SPC3 security services card for Next Gen
Services.
363
MS-MPC MX-SPC3
Supported Health Check ICMP, TCP, UDP, HTTP, SSL, Custom ICMP, TCP, UDP, HTTP,
Protocols SSL, Custom
364
Traffic Load Balancer (TLB) is supported on MX Series routers with either of the Multiservices Modular
Port Concentrator (MS-MPC), Multiservices Modular Interface Card (MS-MIC), or the MX Security
Services Processing Card (MX-SPC3) and in conjunction with the Modular Port Concentrator (MPC) line
cards supported on the MX Series routers as described in Table 37 on page 364.
Multiservices Modular Interface Card MX5, MX10, MX40, MX80, MX104, MX240, MX2480,
(MS-MIC) MX960, MX2008, MX2010, MX2020
• TLB employs an MS-MPC-based control plane and a data plane using the MX Series router
forwarding engine.
• TLB uses an enhanced version of equal-cost multipath (ECMP). Enhanced ECMP facilitates the
distribution of flows across groups of servers. Enhancements to native ECMP ensure that when
servers fail, only flows associated with those servers are impacted, minimizing the overall network
churn on services and sessions.
• TLB provides application-based health monitoring for up to 255 servers per group, providing
Intelligent traffic steering based on health checking of server availability information. You can
configure an aggregated multiservices (AMS) interface to provide one-to-one redundancy for MS-
MPCs or Next Gen Services MX-SPC3 card used for server health monitoring.
• TLB supports multiple virtual routing instances to provide improved support for large scale load
balancing requirements.
Traffic Load Balancer provides three modes of operation for the distribution of outgoing traffic and for
handling the processing of return traffic.
Table 38 on page 365 summarizes the TLB support and which cards it’s supported on.
When you use transparent mode Layer 2 direct server return (DSR):
• Real servers must be directly (Layer 2) reachable from the MX Series router.
• TLB installs a route and all the traffic over that route is load-balanced.
Figure 7 on page 366 shows the TLB topology for transparent mode Layer 2 DSR.
Translated Mode
Translated mode provides greater flexibility than transparent mode Layer 2 DSR. When you choose
translated mode:
• Data traffic directed to a virtual IP address undergoes translation of the virtual IP address to a real
server IP address and translates the virtual port to a server listening port. Return traffic undergoes
the reverse translation.
• Client to virtual IP traffic is translated; the traffic is routed to reach its destination.
• Server-to-client traffic is captured using implicit filters and directed to an appropriate load-
balancing next hop for reverse processing. After translation, traffic is routed back to the client.
• Two load balancing methods are available: random and hash. The random method is only for UDP
traffic and provides quavms-random distribution. While not literally random, this mode provides
fair distribution of traffic to an available set of servers. The hash method provides a hash key
based on any combination of the source IP address, destination IP address, and protocol.
367
NOTE: Translated mode processing is only available for IPv4-to-IPv4 and IPv6-to-IPv6
traffic.
Figure 8 on page 367 shows the TLB topology for translated mode.
Transparent mode Layer 3 DSR load balancing distributes sessions to servers that can be a Layer 3 hop
away. Traffic is returned directly to the client from the real-server.
• TLB always distributes the requests for any flow. When you specify DSR mode, the response returns
directly to the source. When you specify translated mode, reverse traffic is steered through implicit
filters on server-facing interfaces.
• TLB enables you to configure servers offline to prevent a performance impact that might be caused
by a rehashing for all existing flows. You can add a server in the administrative down state and use it
368
later for traffic distribution by disabling the administrative down state. Configuring servers offline
helps prevent traffic impact to other servers.
• When health checking determines a server to be down, only the affected flows are rehashed.
• When a previously down server is returned to service, all flows belonging to that server based on
hashing return to it, impacting performance for the returned flows. For this reason, you can disable
the automatic rejoining of a server to an active group. You can return servers to service by issuing the
request services traffic-load-balance real-service rejoin operational command.
• Health check monitoring application runs on an MS-MPC/NPU. This network processor unit (NPU) is
not used for handling data traffic.
TLB enables configuration of groups of up to 255 servers (referred to in configuration statements as real
services) for use as alternate destinations for stateless session distribution. All servers used in server
groups must be individually configured before assignment to groups. Load balancing uses hashing or
randomization for session distribution. Users can add and delete servers to and from the TLB server
distribution table and can also change the administrative status of a server.
NOTE: TLB uses the session distribution next-hop API to update the server distribution table and
retrieve statistics. Applications do not have direct control on the server distribution table
management. They can only influence changes indirectly through the add and delete services of
the TLB API.
Server Health Monitoring — Single Health Check and Dual Health Check
TLB supports TCP, HTTP, SSL Hello, and custom health check probes to monitor the health of servers in
a group. You can use a single probe type for a server group, or a dual health check configuration that
includes two probe types. The configurable health monitoring function resides on either an MX-SPC3 or
369
an MS-MPC. By default, probe requests are sent every 5 seconds. Also by default, a real server is
declared down only after five consecutive probe failures and declared up only after five consecutive
probe successes.
• Server status to assign when the probe times out (up or down)
• Server status to assign when the expected response to the probe is received (up or down)
TLB provides application stickiness, meaning that server failures or changes do not affect traffic flows to
other active servers. Changing a server’s administrative state from up to down does not impact any
active flows to remaining servers in the server distribution table. Adding a server or deleting a server
from a group has some traffic impact for a length of time that depends on your configuration of the
interval and retry parameters in the monitoring profile.
• Single Health Check—One probe type is attached to a server group by means of the network-
monitoring-profile configuration statement.
• TLB Dual Health Check (TLB-DHC)—Two probe types are associated with a server group by means of
the network-monitoring-profile configuration statement. A server’s status is declared based on the
result of two health check probes. Users can configure up to two health check profiles per server
group. If a server group is configured for dual health check, a real-service is declared to be UP only
when both health-check probes are simultaneously UP; otherwise, a real-service is declared to be
DOWN.
NOTE: The following restrictions apply to AMS interfaces used for server health monitoring:
• An AMS interface configured under a TLB instance uses its configured member interfaces
exclusively for health checking of configured multiple real servers.
• The member interfaces use unit 0 for single VRF cases, but can use units other than 1 for
multiple VRF cases.
• TLB uses the IP address that is configured for AMS member interfaces as the source IP
address for health checks.
370
• The member interfaces must be in the same routing instance as the interface used to reach
real servers. This is mandatory for TLB server health-check procedures.
Virtual Services
The virtual service provides a virtual IP address (VIP) that is associated with the group of servers to
which traffic is directed as determined by hash-based or random session distribution and server health
monitoring. In the case of Layer2 DSR and Layer3 DSR, the special address 0.0.0.0 causes all traffic
flowing to the forwarding instance to be load balanced.
BEST PRACTICE: Although you can assign a virtual address of 0.0.0.0 in order to use default
routing, we recommend using a virtual address that can be assigned to a routing instance set up
specifically for TLB.
Traffic Load Balancer configuration limits are described in Table 39 on page 371.
371
Maximum number of health checks per services For MS-MPC services cards: 2000
PIC in a 5-second interval
For Next Gen Services mode and the MX-SPC3
services cards: 1250
Release Description
16.1R6 Starting in Junos OS Release 16.1R6 and Junos OS Release 18.2R1, the TLB application supports 2000
TLB instances for virtual services that use the direct-server-return or the translated mode.
RELATED DOCUMENTATION
Interchassis High-Availability
Understanding AMS Interfaces
Configuring TLB
IN THIS SECTION
The following topics describe how to configure TLB. To create a complete application, you must also
define interfaces and routing information. You can optionally define firewall filters and policy options in
order to differentiate TLB traffic.
NOTE: For Next Gen Services and the MX-SPC3 services card, you do not need to load this
package.
For example:
• At the [edit services traffic-load-balance] hierarchy level, identify the TLB instance name.
For example:
1. At the [edit services traffic-load-balance instance instance-name] hierarchy level, identify the service
interface associated with this instance.
2. Enable the routing of health-check packet responses from real servers to the service interface that
you identified in Step "1" on page 374.
[edit interfaces]
user@host# set interface-name unit 0 ip-address-owner service-plane
[edit interfaces]
user@host# set ms-1/0/0 unit 0 ip-address-owner service-plane
[edit interfaces]
user@host# set vms-1/0/0 unit 0 ip-address-owner service-plane
375
3. Specify the client interface for which an implicit filter is defined to direct traffic in the forward
direction. This is required only for translated mode.
For example:
4. Specify the virtual routing instance used to route data traffic in the forward direction to servers. This
is required for SLT and Layer 3 DSR; it is optional for Layer 2 DSR.
For example:
5. Specify the server interface for which implicit filters are defined to direct return traffic to the client.
NOTE: Implicit filters for return traffic are not used for DSR.
For example:
6. (Optional) Specify the filter used to bypass health checking for return traffic.
For example:
7. Specify the virtual routing instance in which you want the data in the reverse direction to be routed
to the clients.
For example:
NOTE: Virtual routing instances for routing data in the reverse direction are not used with
DSR.
Configuring Servers
To configure servers for the TLB instance:
• Configure a logical name and IP address for each server to be made available for next-hop
distribution.
For example:
1. Configure the type of probe to use for health monitoring — icmp, tcp, http, ssl-hello, or custom.
For example:
3. Configure the number of failure retries, after which the real server is tagged as down.
For example:
4. Configure the number of recovery retries, which is the number of successful probe attempts after
which the server is declared up.
For example:
For example:
2. Configure the routing instance for the group when you do not want to use the default instance,
inet.0.
For example:
3. (Optional) Disable the default option that allows a server to rejoin the group automatically when it
comes up.
4. (Optional) Configure the logical unit of the instance’s service interface to use for health checking.
b. Enable the routing of health-check packet responses from real servers to the interface.
[edit interfaces]
[email protected]# set interface-name unit subunit ip-address-owner service-plane
For example:
5. Configure one or two network monitoring profiles to be used to monitor the health of servers in this
group.
For example:
1. At the [edit services traffic-load-balance instance instance-name] hierarchy level, specify a non-zero
address for the virtual service.
For example:
For example:
3. (Optional) Specify a routing instance for the virtual service. If you do not specify a routing instance,
the default routing instance is used.
For example:
For example:
5. (Optional) For a translated mode virtual service, enable the addition of the IP addresses for all the
real servers in the group under the virtual service to the server-side filters. Doing this allows you to
configure two virtual services with the same listening port and protocol on the same interface and
VRF.
For example:
7. Specify the method used for load balancing. You can specify a hash method that provides a hash key
based on any combination of the source IP address, destination IP address, and protocol, or you can
specify random.
For example:
or
NOTE: If you switch between the hash method and the random method for a virtual service,
the statistics for the virtual service are lost.
8. For a translated mode virtual service, specify a service for translation, including a virtual-port, server-
listening-port, and protocol.
For example:
NOTE: In the absence of a client-interface configuration under the TLB instance, the implicit
client filter (for VIP) is attached to the client-vrf configured under the TLB instance. In this
case, the routing-instance under a translate mode virtual service cannot be the same as the
client-vrf configured under the TLB instance. if it is, the commit fails.
1. Specify that you want to configure tracing options for the health check monitoring function.
2. (Optional) Configure the name of the file used for the trace output.
Table 40 on page 385 describes the flags that you can include.
385
connect MS-MPC and MX-SPC3 Trace traffic load balancer ipc events.
health MS-MPC and MX-SPC3 Trace traffic load balancer health events.
operational-commands MS-MPC and MX-SPC3 Trace traffic load balancer show events.
parse MS-MPC and MX-SPC3 Trace traffic load balancer parse events.
386
route MS-MPC and MX-SPC3 Trace traffic load balancer route events.
snmp MS-MPC and MX-SPC3 Trace traffic load balancer SNMP events.
statistics MS-MPC and MX-SPC3 Trace traffic load balancer statistics events.
system MS-MPC and MX-SPC3 Trace traffic load balancer system events.
6. (Optional) Configure tracing for a particular real server within a particular server group.
7. (Optional) Starting in Junos OS Release 16.1R6 and 18.2R1, configure tracing for a particular virtual
service and instance.
Release Description
16.1R6 Starting in Junos OS Release 16.1R6 and 18.2R1, configure tracing for a particular virtual service and
instance.
6 PART
CHAPTER 28
IN THIS CHAPTER
IN THIS SECTION
IN THIS SECTION
Benefits | 391
Starting in Junos OS Release 18.3R1, you can configure DNS filtering to identify DNS requests for
disallowed website domains. Starting in Junos OS Release 19.3R2, you can configure DNS filtering if you
are running Next Gen Services with the MX-SPC3 services card. Next Gen Services are supported on
MX240, MX480 and MX960 routers. For DNS request types A, AAAA, MX, CNAME, TXT, SRV, and
ANY, you configure the action to take for a DNS request for a disallowed domain. You can either:
• Block access to the website by sending a DNS response that contains the IP address or fully qualified
domain name (FQDN) of a DNS sinkhole server. This ensures that when the client attempts to send
traffic to the disallowed domain, the traffic instead goes to the sinkhole server (see Figure 9 on page
391).
Starting in Junos OS release 21.1R1, you can also configure the following actions for a DNS request for
a disallowed domain:
• Alert
• Accept
• Drop
• Drop-no-log
For other DNS request types for a disallowed domain, the request is logged and access is allowed.
391
The actions that the sinkhole server takes are not controlled by the DNS request filtering feature; you
are responsible for configuring the sinkhole server actions. For example, the sinkhole server could send a
message to the requestor that the domain is not reachable and prevent access to the disallowed domain.
Benefits
DNS filtering redirects DNS requests for disallowed website domains to sinkhole servers, while
preventing anyone operating the system from seeing the list of disallowed domains. This is because the
disallowed domain names are in an encrypted format.
DNS request filtering requires a disallowed domain filter database .txt file, which identifies each
disallowed domain name, the action to take on a DNS request for the disallowed domain, and the IP
address or fully qualified domain name (FQDN) of a DNS sinkhole server.
392
You configure a DNS filter profile to specify which disallowed domain filter database file to use. You can
also specify the interfaces on which DNS request filtering is performed, limit the filtering to requests for
specific DNS servers, and limit the filtering to requests from specific source IP address prefixes.
IN THIS SECTION
To filter DNS requests for disallowed website domains, perform the following:
Create one or more domain filter database files that include an entry for each disallowed domain. Each
entry specifies what to do with a DNS request for a disallowed website domain.
1. Create the name for the file. The database file name can have a maximum length of 64 characters
and must have a .txt extension.
2. Add a file header with a format such as
20170314_01:domain,sinkhole_ip,v6_sinkhole,sinkhole_fqdn,id,action.
3. Add an entry in the file for each disallowed domain. You can include a maximum of 10,000 domain
entries. Each entry in the database file has the following items:
hashed-domain-name,IPv4 sinkhole address, IPv6 sinkhole address, sinkhole FQDN, ID, action
where:
• IPv4 sinkhole address is the address of the DNS sinkhole server for IPv4 DNS requests.
• IPv6 sinkhole address is the address of the DNS sinkhole server for IPv6 DNS requests.
393
• sinkhole FQDN is the fully qualified domain name of the DNS sinkhole server.
• ID is a 32-bit number that uniquely associates the entry with the hashed domain name.
• action is the action to apply to a DNS request that matches the disallowed domain name. If you
enter :
• replace, the MX Series router sends the client a DNS response with the IP address or FQDN of
the DNS sinkhole server. If you enter report, the DNS request is logged and then sent to the
DNS server.
• report, the DNS request is logged and then sent to the DNS server.
• alert, the DNS request is logged and the request is sent to the DNS server.
• accept, the DNS request is logged and the request is sent to the DNS server.
• drop, the DNS request is dropped and the request is logged .DNS request is not sent to the
DNS server.
• drop-no-log, the DNS request is dropped and no syslog is generated. DNS request is not sent
to the DNS server.
4. In the last line of the file, include the file hash, which you calculate by using the same key and hash
method that you used to produce the hashed domain names.
5. Save the database files on the Routing Engine in the /var/db/url-filterd directory.
6. Validate the domain filter database file.
user@host> request services web-filter validate dns-filter-file-name filename hash-key key-string hash-
method hash-method-name
7. If you make any changes to the database file, apply the changes.
A DNS filter profile includes general settings for filtering DNS requests for disallowed website domains,
and includes up to 32 templates. The template settings apply to DNS requests on specific uplink and
downlink logical interfaces or routing instances, or to DNS requests from specific source IP address
prefixes, and override the corresponding settings at the DNS profile level. You can configure up to eight
DNS filter profiles.
[edit]
user@host# edit services web-filter profile profile-name
3. Configure general DNS filtering settings for the profile. These values are used if a DNS request does
not match a specific template.
a. Specify the name of the domain filter database to use when filtering DNS requests.
b. (Optional) To limit DNS filtering to DNS requests that are destined for specific DNS servers,
specify up to three IP addresses (IPv4 or IPv6).
d. Specify the hash key that you used to create the hashed domain name in the domain filter
database file.
e. Specify the hash method that was used to create the hashed domain name in the domain filter
database file.
f. Configure the interval for logging statistics for DNS requests and for sinkhole actions performed
for each customer IP address. The range is 1 through 60 minutes and the default is 5 minutes.
g. Configure the time to live while sending the DNS response after taking the DNS sinkhole action.
The range is 0 through 86,400 seconds and the default is 1800.
h. Configure the level of subdomains that are searched for a match. The range is 0 through 10. A
value of 0 indicates that subdomains are not searched.
For example, if you set the wildcarding-level to 4 and the database file includes an entry for
example.com, the following comparisons are made for a DNS request that arrives with the
domain 198.51.100.0.example.com:
• 198.51.100.0.example.com: no match
4. Configure a template. You can configure a maximum of 8 templates in a profile. Each template
identifies filter settings for DNS requests on specific uplink and downlink logical interfaces or routing
instances, or for DNS requests from specific source IP address prefixes.
b. (Optional) Specify the client-facing logical interfaces (uplink) to which the DNS filtering is applied.
c. (Optional) Specify the server-facing logical interfaces (downlink) to which the DNS filtering is
applied.
d. (Optional) Specify the routing instance for the client-facing logical interface to which the DNS
filtering is applied.
e. (Optional) Specify the routing instance for the server-facing logical interface to which DNS
filtering is applied.
NOTE: If you configure the client and server interfaces or the client and server routing
instances, implicit filters are installed on the interfaces or routing instances to direct DNS
traffic to the services PIC for DNS filtering. If you configure neither the client and server
interfaces nor the routing instances, you must provide a way to direct DNS traffic to the
services PIC (for example, via routes).
f. Specify the name of the domain filter database to use when filtering DNS requests.
g. (Optional) To limit DNS filtering to DNS requests that are destined for specific DNS servers,
specify up to three IP addresses (IPv4 or IPv6).
h. Specify the hash method that was used to create the hashed domain name in the domain filter
database file.
i. Specify the hash key that was used to create the hashed domain name in the domain filter
database file.
j. Configure the interval for logging statistics for DNS requests and for sinkhole actions performed
for each customer IP address. The range is 1 through 60 minutes and the default is 5 minutes.
k. Configure the time to live while sending the DNS response after taking the DNS sinkhole action.
The range is 0 through 86,400 seconds and the default is 1800.
l. Configure the level of subdomains that are searched for a match. The range is 0 through 10. A
value of 0 indicates that subdomains are not searched.
For example, if you set the wildcarding-level to 4 and the database file includes an entry for
example.com, the following comparisons are made for a DNS request that arrives with the
domain 198.51.100.0.example.com:
• 198.51.100.0.example.com: no match
m. (Optional) Specify the response error code for SRV and TXT query types.
(Optional) Specify the response error code for SRV and TXT query types.
n. Configure a term for the template. You can configure a maximum of 64 terms in a template.
o. (Optional) Specify the source IP address prefixes of DNS requests you want to filter. You can
configure a maximum of 64 prefixes in a term.
p. Specify that the sinkhole action identified in the domain filter database is performed on
disallowed DNS requests.
• Associate the DNS filter profile with a next-hop service set and enable logging for DNS filtering. The
service interface can be an ms- or vms- interface Next Gen Services with MX-SPC3 services card), or
it can be an aggregated multiservices (AMS) interface.
IN THIS SECTION
Overview | 400
Overview
Starting in Junos OS Release 21.1R1, you can configure custom domain feeds per customer or IP
subgroup. You can :
• Configure domain names and actions for multiple tenants such that domain feeds can be managed on
a per tenant basis.
• Configure hierarchical domain feed management per profile, per dns-filter-template or per dns-filter-
term.
To implement the mutiltenant support for DNS filtering, creating the domain filter database file under
template or profile level is disabled. You need not specify a file at the template or profile level. Starting in
Junos OS 21.1R1, by default, a global file with a fixed name, nsf_multi_tenant_dn_custom_file.txt (plain
text format) or dnsf_multi_tenant_dn_custom_file_hashed.txt (encrypted file) is available.
hashed-domain-name, IPv4 sinkhole address, IPv6 sinkhole address, sinkhole FQDN, ID, action, feed-
name.
The file hash is calculated and appended to the list of domain name entries in the file. The file hash is
calculated using a global key and method ,which is validated with the file hash computed using the hash
key configured at the [edit services web-filter] hierarchy. The file validation is successful only if the
calculated file-hash matches the file hash present in the file.
When the DNS packets are received from a particular SRC IP address, the corresponding feed-name is
fetched and lookup happens against the domain-names mapped with the feed-name associated with the
term. If the feed-name is not provisioned for that IP address, then it falls back to the feed-name
configured at the template-level and lookup happens against the domain-names mapped with the feed-
401
name associated with the template. If the feed-name is not configured at template, then the lookup is
against the domain-names mapped against the feed-name associated with the profile.
[edit]
user@host# edit services web-filter
NOTE: When multi-tenant-hashis configured, it indicates that the global dns feed file consists
of only encrypted feeds. When multi-tenant-hash s not configured it indicates that the global
dns feed file has feeds in plain text format.
4. Configure the name for a DNS filter profile and map the domain feed at the profile level. The feed
name indicator configured at the profile level is applied to all the templates and terms under the
profile that do not have the feed name indicator configured.
[edit]
user@host# [edit services web-filter profile profile-name]
user@host# [edit services web-filter profile profile-name feed-name feed-name]
5. Configure general DNS filtering settings for the profile. These values are used if a DNS request does
not match a specific template.
402
a. (Optional) To limit DNS filtering to DNS requests that are destined for specific DNS servers,
specify up to three IP addresses (IPv4 or IPv6).
b. Configure the interval for logging statistics for DNS requests and for sinkhole actions performed
for each customer IP address. The range is 1 through 60 minutes and the default is 5 minutes.
c. Configure the time to live (TTL) to send the DNS response after taking the DNS sinkhole action.
The range is 0 through 86,400 seconds and the default is 1800.
d. Configure the level of subdomains that are searched for a match. The range is 0 through 10. A
value of 0 indicates that subdomains are not searched.
e. (Optional) Specify the response error code for the TXT query type.
6. Configure a template. You can configure a maximum of 8 templates in a profile. Each template
identifies filter settings for DNS requests on specific uplink and downlink logical interfaces or routing
instances, or for DNS requests from specific source IP address prefixes.
b. Configure the feed name. With multitenant format, you can no longer add a file name under
profile or template. The feed name specified under profile has lesser precedence compared to the
one configured under the template.
c. (Optional) Specify the client-facing logical interfaces (uplink) to which the DNS filtering is applied.
d. (Optional) Specify the server-facing logical interfaces (downlink) to which the DNS filtering is
applied.
e. (Optional) Specify the routing instance for the client-facing logical interface to which the DNS
filtering is applied.
f. (Optional) Specify the routing instance for the server-facing logical interface to which DNS
filtering is applied.
NOTE: If you configure the client and server interfaces or the client and server routing
instances, implicit filters are installed on the interfaces or routing instances to direct DNS
traffic to the services PIC for DNS filtering. If you configure neither the client and server
interfaces nor the routing instances, you must provide a way to direct DNS traffic to the
services PIC (for example, through routes).
g. Configure the interval for logging statistics for DNS requests and for sinkhole actions performed
for each customer IP address. The range is 1 through 60 minutes and the default is 5 minutes.
h. Configure the time to live while sending the DNS response after taking the DNS sinkhole action.
The range is 0 through 86,400 seconds and the default is 1800.
i. Configure the level of subdomains that are searched for a match. The range is 0 through 10. A
value of 0 indicates that subdomains are not searched.
j. Configure a term for the template. You can configure a maximum of 64 terms in a template.
k. Configure the feed name. The feed name configured at the term takes higher precedence over the
one configured under the template. However, if the sinkhole domain is matching the only domain
mentioned in the feed name under template, the action specified for that entry is implemented.
l. (Optional) Specify the source IP address prefixes of DNS requests you want to filter. You can
configure a maximum of 64 prefixes in a term.
m. Configure that the sinkhole action identified in the domain filter database is performed on
disallowed DNS requests.
7. Associate the DNS filter profile with a next-hop service set and enable logging for DNS filtering. The
service interface can be a multiservices (ms) or virtual multi service (vms) interface (Next Gen
Services with MX-SPC3 services card), or it can be an aggregated multiservices (AMS) interface.
8. If you are running Next Gen Services on the MX-SPC3 services card, configure the vms interface to
get the FPC and PIC information in the syslog.
IN THIS SECTION
Configuration | 406
Configuration
IN THIS SECTION
To quickly configure this example, copy the following commands, paste them into a text file, remove any
line breaks, change any details necessary to match your network configuration, and then copy and paste
the commands into the CLI at the [edit] hierarchy level.
Release Description
19.3R2 Starting in Junos OS Release 19.3R2, you can configure DNS filtering if you are running Next Gen
Services with the MX-SPC3 services card. Next Gen Services are supported on MX240, MX480 and
MX960 routers.
IN THIS SECTION
The message format for system logs related to DNS request filtering differs slightly for the Next Gen
Services MX-SPC3 services card versus early services cards. This topic describes the differences in the
DNS request filtering related system log messages and provides a description of all fields in these
messages.
Next Gen Services DNS request filtering system logging generates these events:
a. A single syslog is generated for each DNS match to the list of filtered domains.
a. Each term in the template represents a customer, enabling you to collect per-customer statistics.
413
b. You can configure the interval in which you want to collect statistics in each template.
3. You can report an event each time a DNS disallow-list file is added or updated
(DNS_SR_FILE_UPDATE_NOTICE)
a. Statistics are generated every 5 minutes. This interval value is not configurable.
NOTE: To enable these logs you must configure a syslog for each service-set for which
you’ve configured dns-filtering.
All system log messages for Next Gen Services are configured at the service-set level using
the following statement:
To collect DNS request filtering system log messages, include urlf in the local-category
statement:
NOTE: System system log messages for Next Gen Services DNS request filtering doesn’t include
the FPC slot/PIC slot and UTC time.
Table 41 on page 414 describes the fields contained in DNS request filtering match events.
414
(Size of ID is assumed to be a
32-bit number)
Jan 23 13:45:52 cliq (FPC Slot 1, PIC Slot 1) 2018-01-23 21:45:52: {s1}[jservices-urlf]:
JSERVICES_URLF_MATCH_EVENT: DNS_SR_MATCH_EVENT ID=1235, IP_SRC=2.2.2.3,
IP_DST=101.10.10.100, SRC_PRT=34342, DST_PRT=53, Sinkhole_IP=1.1.1.1, Sinkhole_IPv6=NA,
Sinkhole_fqdn=NA, Count=9, Replaced=Y, Reason_Mask=0x0, QType=A, Profile=webf-prof-1,
Template=dnsf-temp-1, Term=dnsf-term-1, Time=Tue Jan 23 13:45:52 2018
Table 42 on page 417 describes the reason mask value fields and interpretations for MX Next Gen
Services DNS filtering.
417
Table 42: Reason Mask Values & Interpretations for DNS Filtering
0x0 Replaced
Here’s an example of MX Next Gen Services syslog format for DNS filtering showing the reason mask
and interpretation:
Jan 23 13:45:52 cliq (FPC Slot 1, PIC Slot 1) 2018-01-23 21:45:52: {s1}[jservices-urlf]:
JSERVICES_URLF_MATCH_EVENT: DNS_SR_MATCH_EVENT ID=1235, IP_SRC=2.2.2.3,
IP_DST=101.10.10.100, SRC_PRT=34342, DST_PRT=53, Sinkhole_IP=1.1.1.1, Sinkhole_IPv6=NA,
Sinkhole_fqdn=NA, Count=9, Replaced=Y, Reason_Mask=0x0, QType=A, Profile=webf-prof-1,
Template=dnsf-temp-1, Term=dnsf-term-1, Time=Tue Jan 23 13:45:52 2018
Table 43 on page 418 describes the fields for MX Next Gen Services DNS filtering per-term statistics
syslog format.
Here’s an example of MX-SPC3 DNS filtering syslog format for per-term statistics:
Mar 8 12:16:05 iphone3gs (FPC Slot 5, PIC Slot 0) 2019-03-08 20:16:04: {ATT-Zone5}[jservices-urlf]:
JSERVICES_URLF_CUSTOMER_STATS: DNS_SR_CUSTOMER_STATS, Profile=ATT-Profile-5-Zone5,
Template=ATT-Profile-5-Zone5-Area1, Term=ATT-Profile-5-Zone5-Area1-Customer3,
Requests_Processed=0, DNS_UDP_Requests_Processed=0, DNS_TCP_Requests_Processed=0,
DNS_UDP_Requests_Sinkholed=0, DNS_TCP_Requests_Sinkholed=0,
DNS_UDP_Requests_Reported=0, DNS_TCP_Requests_Reported=0, Time=Fri Mar 08 12:16:05 2019,
Count=111
Table 44 on page 420 describes the fields for MX Next Gen Services DNS filtering disallow-list file
additions and updates syslog format.
Here’s an example of the syslog format for MX-SPC3 DNS filtering disallow-list add/change file updates:
Here’s an example of the syslog format for DNS filtering disallow-list file changes with the MS-MPC
services card:
Jan 23 13:34:34 cliq (FPC Slot 1, PIC Slot 1) 2018-01-23 21:34:33: {s1}[jservices-urlf]:
JSERVICES_URLF_FILE_UPDATE_NOTICE: DNS_SR_FILE_UPDATE_NOTICE,
File_Name=dnsf1_hashed.txt, File_Version=20170314_01, Domain_Filter_File_Updated=Tue Jan 23
13:34:34 2018 Profile=webf-prof-1, Template=dnsf-temp-1, Domains=4, Report_Only_Domains=1
Summary report statistics syslog format Stats will be reported in syslog with the following format:
Here’s an example summary report syslog message for MX-SPC3 Next Gen Services DNS filtering:
Here’s an example summary report syslog message for MS-MPC services card DNS filtering:
Mar 8 12:20:41 iphone3gs (FPC Slot 5, PIC Slot 1) 2019-03-08 20:20:40: {ATT-Zone1}[jservices-urlf]:
JSERVICES_URLF_REPORT_STATS: DNS_SR_REPORT_STATS, TCP_DNS_Packets=0,
TCP_DNS_Non_Segmented=0, TCP_DNS_Segmented=0, Count=169
Table 45 on page 423 describes the syslog fields for MX-SPC3 DNS filtering per-client-IP statistics that
is reported per-PIC, per-profile for all known client IP addresses known to the system.
423
Here’s an example syslog message for DNS filtering client-IP statistics on MS-MPC services cards:
Mar 7 17:58:54 iphone3gs (FPC Slot 5, PIC Slot 3) 2019-03-08 01:58:54: {dns}[jservices-urlf]:
JSERVICES_URLF_CLIENT_IP_STATS: DNS_SR_CLIENT_IP_STATS, Client-IP=2004:db0:2228:8001::1,
Profile=dns-profile1, Template=dns1, Term=3, A_Req=19, AAAA_Req=19, MX_Req=0, CNAME_Req=0,
SRV_Req=0, TXT_Req=0, ANY_Req=0, A_Req_SH=19, AAAA_Req_SH=19, MX_Req_SH=0,
CNAME_Req_SH=0, SRV_Req_SH=0, TXT_Req_SH=0, ANY_Req_SH=0, Req_Rep=0
7 PART
URL Filtering
CHAPTER 29
URL Filtering
IN THIS CHAPTER
IN THIS SECTION
You can use URL filtering to determine which Web content is not accessible to users.
The URL filter database file is stored on the Routing Engine and contains all the disallowed URLs.
Configured templates define which traffic to monitor, what criteria to match, and which actions to take.
You configure the templates and the location of the URL filter database file in a profile.
Starting in Junos OS Release 17.2R2 and 17.4R1, for Adaptive Services, you can disable the filtering of
HTTP traffic that contains an embedded IP address (for example, http:/10.1.1.1) belonging to a
428
disallowed domain name in the URL filter database.Starting in Junos OS Release 19.3R2, this same
functionaly is supported for Next Gen Services on MX240, MX480, and MX960.
To enable the URL filtering feature, you must configure jservices-urlf as the package-name at the [edit
chassis fpc slot-number pic pic-number adaptive-services service-package extension-provider]
hierarchy level. Once enabled, jservices-urlf maintains the URL filtering profile and receives all traffic to
be filtered, the filtering criteria, and the action to be taken on the filtered traffic.
The URL filtering daemon (url-filterd), which also resides on the Routing Engine, resolves the domain
name of each URL in the URL filter database to a list of IPv4 and IPv6 addresses. It then downloads the
list of IP addresses to the service PIC, which runs jservices-urlf. Then url-filterd interacts with the
Dynamic Firewall process (dfwd) to install filters on the Packet Forwarding Engine to punt the selected
traffic from the Packet Forwarding Engine to the service PIC.
As new HTTP and HTTPS traffic reaches the router, a decision is made based on the information in the
URL filter database file. The filtering rules are checked and either the router accepts the traffic and
passes it on or blocks the traffic. If the traffic is blocked, one of the following configured actions is taken:
For more details on the URL filtering feature, see the following sections:
The URL filter database file contains entries of URLs and IP addresses. Create the URL filter database
file in the format indicated in Table 46 on page 428 and locate it on the Routing Engine in the /var/db/
url-filterd directory.
You must specify a custom URL filter database in the profile. If needed, you can also assign a custom
URL filter database file with any template, and that database takes precedence over the database
configured at the profile level.
If you change the contents of the URL filter database file, use the request services (url-filter | web-filter)
update command. Other commands to help maintain the URL filter database file include the following:
The URL filter profile consists of from one to eight templates. Each template consists of a set of
configured logical interfaces where traffic is monitored for URL filtering and one or more terms.
A term is a set of match criteria with actions to be taken if the match criteria is met. You must configure
at least one term to configure URL filtering. Each term consists of a from statement and a then
statement, where the from statement defines the source IP prefixes and destination ports that are
monitored. The then statement specifies the action to be taken. If you omit the from statement, any
source IP prefix and any destination port are considered to match. But you can omit only one from
statement per template or per profile.
template1 {
client-interfaces [ xe-4/0/3.35 xe-4/0/3.36 ];
server-interfaces xe-4/0/0.31;
dns-source-interface xe-4/0/0.1;
dns-routing-instance data_vr;
430
routing-instance data_vr2;
dns-server 50.0.0.3;
dns-retries 3;
url-filter-database url_database.txt;
term term1 {
then {
tcp-reset;
}
}
term term2 {
then {
redirect-url www.google.com;
}
}
}
If you omit more than one from statement per template, you will get the following error message on
commit:
Release Description
19.3R2 Starting in Junos OS Release 19.3R2, this same functionaly is supported for Next Gen Services on
MX240, MX480, and MX960.
17.2R2 Starting in Junos OS Release 17.2R2 and 17.4R1, for Adaptive Services, you can disable the filtering of
HTTP traffic that contains an embedded IP address (for example, http:/10.1.1.1) belonging to a
disallowed domain name in the URL filter database.
RELATED DOCUMENTATION
To configure the URL filtering feature, you must first configure jservices-urlf as the package-name at the
[edit chassis fpc slot-number pic pic-number adaptive-services service-package extension-provider]
hierarchy level. For more information on configuring the extension-provider package package-name
configuration statement, see the package (Loading on PIC) statement.
URL filtering is configured on a service PIC. The interfaces you are dealing with are services interfaces
(which use the ms prefix) or aggregated multiservices (AMS) interfaces (which use the ams prefix). For
more information on AMS interfaces, see the Adaptive Services Interfaces User Guide for Routing
Devices starting with Understanding Aggregated Multiservices Interfaces.
A URL filtering profile is a collection of templates. Each template consists of a set of criteria that defines
which URLs are disallowed and how the recipient is notified.
[edit]
user@host# edit services (web-filter | url-filter) profile profile-name
Starting in Junos OS Release 18.3R1, for Adaptive Services. configure the profile at the [edit services
web-filter] hierarchy level. Before Junos OS Release 18.3R1, configure the profile at the [edit
services url-filter] hierarchy level.Starting in Junos OS Release 19.3R2, this same functionality is
available for Next Gen Serices on MX240, MX480, and MX960.
2. Specify the name of the URL filter database to use.
NOTE: Starting in Junos OS Release 18.3R1, configure the template with the url-filter-
template statement. Before Junos OS Release 18.3R1, configure the template with the
template statement.
d. Specify the loopback interface for which the source IP address is picked for sending DNS queries.
e. Disable the filtering of HTTP traffic that contains an embedded IP address (for example, http:/
10.1.1.1) belonging to a disallowed domain name in the URL filter database.
g. Configure the number of retries for a DNS query in case the query fails or times out.
h. Specify the IP addresses (IPv4 or IPv6) of DNS servers to which the DNS queries are sent.
i. Specify the client-facing logical interfaces on which the URL filtering is configured.
j. Specify the server-facing logical interfaces on which the URL filtering is configured.
c. Specify the source IP address prefixes for traffic you want to filter.
NOTE: For URL filtering, you must configure the service set as a next-hop service set.
[edit]
user@host# set services service-set service-set-name (web-filter-profile profile-name | url-filter-profile
profile-name)
user@host# set services service-set service-set-name next-hop-service inside-service-interface
interface-name.unit-number
user@host# set services service-set service-set-name next-hop-service outside-service-interface
interface-name.unit-number
NOTE: The service interface can also be of the ams prefix. If you are using ams interfaces at
the [edit services service-set service-set-name] hierarchy level for the URL filter, you must
also configure the load-balancing-options hash-keys statement at the [edit interfaces ams-
interface-name unit number] hierarchy level. .
NOTE: Starting in Junos OS Release 18.3R1, configure the service set with the web-filter-
profile statement. Before Junos OS Release 18.3R1, configure the service set with the url-
filter-profile statement.
Release Description
19.3R2 Starting in Junos OS Release 19.3R2, this same functionality is available for Next Gen Serices on
MX240, MX480, and MX960.
18.3R1 Starting in Junos OS Release 18.3R1, for Adaptive Services. configure the profile at the [edit services
web-filter] hierarchy level. Before Junos OS Release 18.3R1, configure the profile at the [edit services
url-filter] hierarchy level.
436
RELATED DOCUMENTATION
CHAPTER 30
IN THIS CHAPTER
IN THIS SECTION
Overview | 438
Overview
IN THIS SECTION
Benefits | 439
Juniper Sky™ Advanced Threat Prevention (Juniper ATP Cloud) is integrated with MX series routers to
protect all hosts in your network against evolving security threats by employing cloud-based threat
detection software with a next-generation firewall system.
439
This topic provides an overview of Juniper ATP Cloud, Policy Enforcer, Security Intelligence, Web
filtering, and their benefits when integrated on MX Series routers (MX240, MX480 and MX960).
Benefits
• Simplifies deployment and enhances the anti-threat capabilities when integrated with the MX
routers.
• Delivers protection against “zero-day” threats using a combination of tools to provide robust
coverage against sophisticated, evasive threats.
• Checks inbound and outbound traffic with policy enhancements that allow users to stop malware,
quarantine infected systems, prevent data exfiltration, and disrupt lateral movement.
• Provides scalability to handle increasing loads that require more computing resources, increased
network bandwidth to receive more customer submissions, and a large storage for malware.
Juniper Networks Security Director comprises a feature called the Policy Enforcer (PE) that enables it to
learn from threat conditions, automate the policy creation, and to dynamically deploy enforcement to
Juniper devices in the network.
Figure 10 on page 440 illustrates the traffic flow between the PE, the Juniper ATP Cloud, and the MX
router which functions as a firewall.
• Policy Enforcer (PE) learns from threat conditions, automates the policy creation, and deploys
enforcement to Juniper devices in the network.
• Juniper Sky™ Advanced Threat Prevention (Juniper ATP Cloud) protects all hosts in your network by
employing cloud-based threat detection software with a next-generation firewall system.
• MX router fetches the threat intelligence feeds from Policy Enforcer (PE) and implements those
policies to quarantine compromised hosts. It comprises of the following important components:
• Firewall process
To understand the functionality of the system architecture consider the following example—if a user
downloads a file from the Internet and that file passes through an MX firewall, the file can be sent to the
Juniper ATP Cloud cloud for malware inspection (depending on your configuration settings.) If the file is
determined to be malware, PE identifies the IP address and MAC address of the host that downloaded
the file. Based on a user-defined policy, that host can be put into a quarantine VLAN or blocked from
accessing the Internet.
MX Series routers (MX240, MX480, and MX960) can be integrated with the Juniper ATP Cloud to
prevent compromised hosts (botnets) from communicating with command and control servers:
• Starting in Junos OS Release 18.4R1 with the Adaptive Services as an Inline security capability
• Starting in Junos OS Release 19.3R2 with the Next Gen Services as an Inline security capability
The Security Intelligence process (IPFD), is responsible for downloading the security intelligence feeds
and parsing from the feed connector or ATP Cloud cloud feed server. The IPFD process on the MX
441
platforms fetches the command and control IPv4/IPv6 feeds from Policy Enforcer. C&C feeds are
essentially a list of servers that are known command and control servers for botnets. The list also
includes servers that are known sources for malware downloads. The information thus fetched is saved
in a file (urlf_si_cc_db.txt) created under the /var/db/url-filterd directory.
The file format of the disallowed IPs sent by IPFD to the web filtering process is as follows:
The threat-level is an integer ranging from 1 to 10 to indicate the threat level of files scanned for
malware and for infected hosts. Here, 1 represents the lowest threat level and 10 represents the highest
threat level.
The C&C feed database is synced onto the backup Routing Engine. IPFD then shares the information to
the web filtering process (url-filterd). The web filtering process reads the file contents and configures the
filters accordingly.
To download the command and control IPv4/IPv6 feeds from Juniper ATP Cloud/Policy Enforcer,
include the security-intelligence statement at the [edit services] hierarchy as shown in the following
example:
security-intelligence {
authentication {
auth-token 7QGSBL5ZRKR5UHUZ2X2R6QLHB656D5EN;
}
url https://10.92.83.245:443/api/v1/manifest.xml;
traceoptions {
file security-inteligence.log size 1g;
level all;
flag all;
}
}
The web filtering process reads the file contents fetched from the IPFD and configures the filters on the
Packet Forwarding Engine accordingly. The web filtering process enforces the command and control
442
feeds by programming the filters in the Packet Forwarding Engine to block the packets destined to the
blocked IP addresses and to generate logs for reporting the incident.
Figure 11 on page 442 illustrates the way C&C feed is fetched by the IPFD and then processed by the
web filtering process.
The web filter profile can have more than one templates. Each template consists of a set of configured
logical interfaces for Web filtering and one or more terms. A term is a set of match criteria with actions
to be taken if the match criteria is met. To configure the web filter profile to use dynamically fetched
C&C feed, you can configure the security-intelligence-policy command under the [edit services web-
filter profile profile-name hierarchy level. You need not configure a term for a security-intelligence-
policy based web filter profiles.
You can configure the following threat level actions for the web filter profile at the edit web-filter profile
profile-name security-intelligence-policy threat-level threat-level threat-action hierarchy level:
• drop
443
• drop-and-log
• log
You can configure only one threat-action for each threat level. If the threat-action is not configured for
a particular threat level, the default threat-action is accept.
SEE ALSO
security-intelligence-policy | 827
security-intelligence | 824
IN THIS SECTION
Configure a Sampling Instance and Associate the Template With the Sampling Instance. | 445
Configure the sample instance and associate the flow-server IP address and other parameters. | 446
Starting in Junos OS Release 19.3R1, web filtering process (url-filterd) supports inline sampling of
packets as a threat level action. The packets are dropped, logged, and sampled based on the threat-
action you configure. For scaled scenarios, sampling of packets is preferred over the logging option.
Along with the existing threat level actions, you can configure the following threat level actions on the
web filter profile at the edit web-filter profile profile-name security-intelligence-policy threat-level
threat-level threat-action hierarchy level:
• drop-and-sample
• drop-log-and-sample
• log-and-sample
• sample
The inline flow monitoring samples the packets and sends the flow records in IPFIX format to a flow
collector. You can derive the threat level for the sampled packets received at the external collector by
matching the received IP from the sampled packets with the corresponding IP entry in /var/db/url-
filterd/urlf_si_cc_db.txt. You can configure sampling using any of the following methods:
444
• Associate a sampling instance with the FPC on which the media interface is present at the [edit
chassis] hierarchy level. If you are configuring sampling of IPv4 flows, IPv6 flows, or VPLS flows, you
can configure the flow hash table size for each family.
• Configure the template properties for inline flow monitoring at the [edit services flow-monitoring
hierarchy level.
• Configure a sampling instance and associate the flow-server IP address, port number, flow export
rate, and specify the collectors at the [edit forwarding-options hierarchy level.
To associate the defined instance with a particular FPC, MPC, or DPC, you include the sampling-
instance statement at the [edit chassis fpc number] hierarchy level, as shown in the following example:
chassis {
redundancy {
graceful-switchover;
}
fpc 0 {
pic0 {
inline-services {
bandwidth 10g;
}
}
}
pic 2 {
inline-services {
bandwidth 10g;
}
}
pic 3 {
inline-services {
bandwidth 10g;
}
}
sampling-instance 1to1;
inline-services{
flow-table-size {
ipv4-flow-table-size 5;
ipv6flow-table-size 5;
}
445
}
}
Configure a Sampling Instance and Associate the Template With the Sampling Instance.
To configure the template properties for inline flow monitoring, include the following statements at the
edit services flow-monitoring hierarchy level as shown in the following example:
services {
flow-monitoring {
version-ipfix {
template ipv4 {
flow-active-timeout 60;
flow-inactive-timeout 60;
template-refresh-rate {
packets 48000;
seconds 60;
}
option-refresh-rate {
packets 48000;
seconds 60;
}
ipv4-template;
template ipv6 {
flow-active-timeout 60;
flow-inactive-timeout 60;
template-refresh-rate {
packets 48000;
seconds 60;
}
ipv6-template;
}
}
}
446
Configure the sample instance and associate the flow-server IP address and other parameters.
To configure a sampling instance and associate the flow-server IP address and other parameters. include
the following statements at the [edit forwarding-options] hierarchy, as shown in the following example:
forwarding-options {
sampling {
traceoptions {
file ipfix.log size 10k;
}
instance {
1to1 {
input {
rate 1;
}
family inet {
output {
flow-server 192.168.9.194;
port 2055;;
autonomous-system-type origin;
version-ipfix {
template {
ipv4;
}
}
}
inline-jflow {
source-address 192.168.9.195;
}
}
}
family inet6 {
output {
flow-server 192.168.9.194;
port 2000;
autonomous-system-type origin;
version-ipfix {
template {
ipv6;
}
}
}
447
inline-jflow {
source-address 192.168.9.195;
}
}
}
}
}
web-filter {
profile Profile1 ;
security-intelligence-policy{
file-type txt;
threat-level 7 {
threat-action {
log-and-sample;
}
}
threat-level 8 {
threat-action {
drop-log-and-sample;
}
}
threat-level 10 {
threat-action {
drop-log-and-sample;
}
}
threat-level 5{
threat-action {
drop-log-and-sample;
}
}
threat-level 6 {
threat-action {
drop-log-and-sample;
}
}
threat-level 9{
threat-action {
448
drop-log-and-sample;
}
}
}
url-filter-template template1 {
client-interfaces ge-0/0/4.0;
client-routing-instance inet.0;
}
}
traceoptions {
file webfilter_log size 1g;
level all;
flag all;
}
}
}
SEE ALSO
security-intelligence-policy | 827
Configuring Traffic Sampling on MX, M and T Series Routers
19.3R2 Starting in Junos OS Release 19.3R2 with the Next Gen Services as an Inline security capability
19.3R1 Starting in Junos OS Release 19.3R1, web filtering process (url-filterd) supports inline sampling of
packets as a threat level action
18.4R1 Starting in Junos OS Release 18.4R1 with the Adaptive Services as an Inline security capability
9 PART
CHAPTER 31
IN THIS CHAPTER
IN THIS SECTION
This topic provides an overview of using the Aggregated Multiservices Interfaces feature with the MX-
SPC3 services card for Next Gen Services. It contains the following sections:
In Junos OS, you can combine multiple services interfaces to create a bundle of services interfaces that
can function as a single interface. Such a bundle of interfaces is known as an aggregated multiservices
interface (AMS), and is denoted as amsN in the configuration, where N is a unique number that identifies
451
an AMS interface (for example, ams0). Starting in Junos OS Release 19.3R2, AMS interfaces are
supported on the Next Gen Services MX-SPC3 services card.
AMS configuration provides higher scalability, improved performance, and better failover and load-
balancing options.
An AMS configuration enables service sets to support multiple services PICs by associating an AMS
bundle with a service set. For Next Gen Services, the MX-SPC3 services card supports up to two PICs
and you can have a maximum of eight MX-SPC3 services cards in your chassis. This enables a Next Gen
Services AMS bundle to have up to 16 services PICs as member interfaces and you can distribute
services among the member interfaces.
Member interfaces are identified as mams in the configuration. The chassisd process in routers that
support AMS configuration creates a mams entry for every multiservices interface on the router.
When you configure services options at the ams interface level, the options apply to all member
interfaces (mams) for the ams interface.
The options also apply to service sets configured on services interfaces corresponding to the ams
interface’s member interfaces. All settings are per PIC. For example, session-limit applies per member
and not at an aggregate level.
NOTE: You cannot configure services options at both the ams (aggregate) and member-interface
level. If services options are configured on vms-x/y/z, they also apply to service sets on mams-
x/y/z.
When you want services options settings to apply uniformly to all members, configure services
options at the ams interface level. If you need different settings for individual members,
configure services options at the member interface level.
NOTE: Per-member drop of traffic and per-member next-hop configuration is required for
NAT64. For NAPT44, this per-member specification allows arbitrary hash keys, providing better
load-balancing options to allow dynamic NAT operations to be performed. For NAT64, NAPT44,
and dynamic NAT44, it is not possible to determine which member allocates the dynamic NAT
address. To ensure that reverse flow packets arrive at the same member as the forward flow
packets, pool-address-based routes are used to steer reverse flow packets.
NOTE: If you modify a NAT pool that is being used by a service set assigned to an AMS interface,
you must deactivate and activate the service set before the NAT pool changes take effect.
452
Traffic distribution over the member interfaces of an AMS interface can occur in either a round-robin
fashion or hash-based. You can configure the following hash key values to regulate the traffic
distribution: source-ip, destination-ip , and protocol. For services that require traffic symmetry, you
must configure symmetrical hashing. Symmetrical hashing configuration ensures that both forward and
reverse traffic is routed through the same member interface.
If the service set is applied on the Gigabit Ethernet or 10-Gigabit Ethernet interface (interface-style
service set) that functions as the NAT inside interface, then the hash keys used for load balancing might
be configured in such a way that the ingress key is set as destination IP address and the egress key is set
as source IP address. Because the source IP address undergoes NAT processing, it is not available for
hashing the traffic in the reverse direction. Therefore, load balancing does not happen on the same IP
address and forward and reverse traffic does not map to the same PIC. With the hash keys reversed,
load balancing occurs correctly.
With next-hop services, for forward traffic, the ingress key on the inside interface load -balances traffic,
and for reverse traffic, the ingress key on the outside interface load -balances traffic or per-member next
hops steer reverse traffic. With interface-style services, the ingress key load-balances forward traffic and
the egress key load-balances forward traffic or per-member next hops steer reverse traffic. Forward
traffic is traffic entering from the inner side of a service set and reverse traffic is traffic entering from the
outer side of a service set. The forward key is the hash key used for the forward direction of traffic and
the reverse key is the hash key used for the reverse direction of traffic (depends on whether it relates to
interface services or next-hop services style.)
With stateful firewalls, you can configure the following combinations of forward and reverse keys for
load balancing. In the following combinations presented for hash keys, FOR-KEY refers to the forward
key, REV-KEY denotes the reverse key, SIP signifies source IP address, DIP signifies destination IP
address, and PROTO refers to protocol such as IP.
With static NAT configured as basic NAT44 or destination NAT44, and with stateful firewall configured
or not, if the forward direction of traffic must undergo NAT processing, configure the hash keys as
follows:
If the reverse direction of traffic must undergo NAT processing, configure the hash keys as follows:
With dynamic NAT configured, and with stateful firewall configured or not, only the forward direction
traffic can undergo NAT. The forward hash key can be any combination of SIP, DIP, and protocol, and the
reverse hash key is ignored.
NOTE: The Junos OS AMS configuration supports IPv4 and IPv6 traffic.
You can use AMS interfaces for IPv6 traffic. To configure IPv6 support for an AMS interface, include the
family inet6 statement at the [edit interfaces ams-interface-name unit 1] hierarchy level. When family
inet and family inet6 are set for an AMS interface subunit, the hash-keys is configured at service-set
level for interface style and at IFL level for next-hop style.
When a member interface of an AMS bundle fails, traffic destined to the failed member is redistributed
among the remaining active members. The traffic (flows or sessions) traversing through the existing
active members is unaffected. If M members are currently active, the expected result is that only about
1/M fraction of the traffic (flows/sessions) is impacted because that amount of traffic is shifted from the
failed member to remain active members. When the failed member interface comes back online, only a
fraction of the traffic is redistributed to the new member. If N members are currently active, the
expected result is that only about 1/(N+1) fraction of the traffic (flows/sessions) is impacted because
that amount of traffic moves to the new restored member. The 1/M and 1/(N+1) values assume that the
flows are uniformly distributed among members, because a packet-hash is used to load-balance and
because traffic usually contains a typical random combination of IP addresses (or any other fields that
are used as load-balancing keys).
Similar to IPv4 traffic, for IPv6 packets, an AMS bundle must contain members of only one services PIC
type.
The number of flows distributed, in an ideal environment, can be 1/N in a best-case scenario when the
Nth member goes up or down. However, this assumption considers that the hash keys load-balance the
real or dynamic traffic. For example, consider a real-world deployment where member A is serving only
one flow, whereas member B is serving 10 flows. If member B goes down, then the number of flows
disrupted is 10/11. The NAT pool-split behavior is designed to utilize the benefits of the rehash-
minimization feature. The splitting of a NAT pool is performed for dynamic NAT scenarios (dynamic
NAT, NAT64, and NAPT44).
With the preceding definitions of the original and redistributed flows for member interfaces, the
following observations apply:
• The member-original-flows of a member stay intact as long as that member is up. Such flows are not
impacted when other members move between the up and down states.
• The member-redistributed-flows of a member can change when other members go up or down. This
change of flows occurs because these additional flows need to be rebalanced among all active
members. Therefore, the member-redistributed-flow can vary a lot based on other members going
down or up. Although it might seem that when a member goes down, the flows on active-members
are preserved, and that when a member goes up, flows on active-members are not preserved in an
effective way, this behavior is only because of static or hash-based rebalancing of traffic among
active members.
The rehash-minimization feature handles the operational changes in a member interface status only
(such as member offline or member Junos OS reset). It does not handle changes in configuration. For
example, addition or deletion, or activation and deactivation, of member interfaces at the [edit
interfaces amsN load-balancing-options member-interface mams-a/b/0] hierarchy level requires the
member PICs to be bounced. Twice NAT or hairpinning is not supported, similar to IPv4 support for
AMS interfaces.
Because multiple service interfaces are configured as part of an AMS bundle, AMS configuration also
provides for failover and high availability support. You can either configure one of the member interfaces
as a backup interface that becomes active when any one of the other member interfaces goes down, or
configure the AMS in such a way that when one of the member interfaces goes down, the traffic
assigned to that interface is shared across the active interfaces.
The member-failure-options configuration statement enables you to configure how to handle traffic
when a member interface fails. One option is to redistribute the traffic immediately among the other
member interfaces. However, redistribution of traffic involves recalculating the hash tags, and might
cause some disruption in traffic on all the member interfaces.
The other option is to configure the AMS to drop all traffic that is assigned to the failed member
interface. With this you can optionally configure an interval, rejoin-timeout, for the AMS to wait for the
failed interface to come back online after which the AMS can redistribute the traffic among other
member interfaces. If the failed member interface comes back online before the configured wait time,
455
traffic continues unaffected on all member interfaces, including the interface that has come back online
and resumed the operations.
You can also control the rejoining of the failed interface when it comes back online. If you do not include
the enable-rejoin statement in the member-failure-options configuration, the failed interface cannot
rejoin the AMS when it comes back online. In such cases, you can manually rejoin that to the AMS by
executing the request interfaces revert interface-name operational mode command.
The rejoin-timeout and enable-rejoin statements enable you to minimize traffic disruptions when
member interfaces flap.
NOTE: When member-failure-options are not configured, the default behavior is to drop
member traffic with a rejoin timeout of 120 seconds.
The high-availability-options configuration enables you to designate one of the member interfaces as a
backup interface. The backup interface does not participate in routing operations as long as it remains a
backup interface. When a member interface fails, the backup interface handles the traffic assigned to
the failed interface. When the failed interface comes back online, it becomes the new backup interface.
In a many-to-one configuration (N:1), a single backup interface supports all other member interfaces in
the group. If any of the member interfaces fails, the backup interface takes over. In this stateless
configuration, data is not synchronized between the backup interface and the other member interfaces.
When both member-failure-options and high-availability-options are configured for an AMS, the high-
availability-options configuration takes precedence over the member-failure-options configuration. If a
second failure occurs before the failed interface comes back online to be the new backup, the member-
failure-options configuration takes effect.
Starting in Junos OS Release 19.3R2, the N:1 warm standby option is supported on the MX-SPC3 if you
are running Next Gen Services. Each warm standby AMS interface contains two members; one member
is the service interface you want to protect, called the primary interface, and one member is the
secondary (backup) interface. The primary interface is the active interface and the backup interface does
not handle any traffic unless the primary interface fails.
To configure warm standby on an AMS interface, you use the redundancy-options statement. You
cannot use the load-balancing-options statement in a warm standby AMS interface.
To switch from the primary interface to the secondary interface, issue the request interface switchover
amsN command.
To revert to the primary interface from the secondary interface, issue the request interface revert amsN
command.
456
Release Description
19.3R2 Starting in Junos OS Release 19.3R2, AMS interfaces are supported on the Next Gen Services MX-SPC3
services card.
19.3R2 Starting in Junos OS Release 19.3R2, the N:1 warm standby option is supported on the MX-SPC3 if you
are running Next Gen Services.
The aggregated multiservices (AMS) interface configuration in Junos OS enables you to combine
services interfaces from multiple PICs to create a bundle of interfaces that can function as a single
interface. You identify the PIC that you want to act as the backup.
1. Create an aggregated multiservices interface and add member interfaces. Starting in Junos OS
Release 19.3R2, an MX-SPC3 Next Gen Services AMS interface can have up to 16 member
interfaces with a maximum of 8 MX-SPC3 services cards with up to 2 PICs on each card. Starting
with Junos OS Release 16.2, an MS-MPC AMS interface can have up to 36 member interfaces. In
Junos OS Release 16.1 and earlier, an AMS interface can have a maximum of 24 member interfaces.
NOTE: The member interface format is mams-a/b/0, where a is the Flexible PIC Concentrator
(FPC) slot number and b is the PIC slot number.
[edit interfaces]
user@host# set interface-name load-balancing-options member-interface mams-a/b/0
user@host# set interface-name load-balancing-options member-interface mams-a/b/0
[edit interfaces]
user@host# set ams1 load-balancing-options member-interface mams-1/1/0
user@host# set ams1 load-balancing-options member-interface mams-1/2/0
457
[edit interfaces]
user@host# set ams1 load-balancing-options member-interface mams-1/0/0
user@host# set ams1 load-balancing-options member-interface mams-1/1/0
[edit interfaces]
user@host# set interface-name unit logical-unit-number family family
user@host# set interface-name unit logical-unit-number family family
For example:
[edit interfaces]
user@host# set ams1 unit 1 family inet
user@host# set ams1 unit 2 family inet6
For example:
For example:
5.
NOTE: This step is not applicable to the Next Gen Services MX-SPC3 services card in the
MX240, MX480 or MX960 chassis.
If the AMS interface has more than 24 member interfaces, set the service PIC boot timeout value to
240 or 300 seconds for every services PIC on the MX Series router. We recommend that you use a
value of 240.
NOTE: Starting with Junos OS Release 16.2, an AMS interface can have up to 36 member
interfaces. In Junos OS Release 16.1 and earlier, an AMS interface could have a maximum of
24 member interfaces.
For example:
Release Description
19.3R2 Starting in Junos OS Release 19.3R2, an MX-SPC3 Next Gen Services AMS interface can have up to 16
member interfaces with a maximum of 8 MX-SPC3 services cards with up to 2 PICs on each card.
16.2 Starting with Junos OS Release 16.2, an MS-MPC AMS interface can have up to 36 member interfaces.
459
RELATED DOCUMENTATION
IN THIS SECTION
Configuring load balancing requires an aggregated multiservices (AMS) system. AMS involves grouping
several services PICs together. An AMS configuration eliminates the need for separate routers within a
system. The primary benefit of having an AMS configuration is the ability to support load balancing of
traffic across multiple services PICs.
AMS is supported on the MS-MPC and MS-MIC. Starting in Junos OS Release 19.3R2, AMS interfaces
are also supported on the MX-SPC3 if you are running Next Gen Services.
High availability (HA) is supported on AMS infrastructure on all MX Series 5G Universal Routing
Platforms. AMS has several benefits:
• Support for configuring behavior if a services PIC that is part of the AMS configuration fails
• Support for specifying hash keys for each service set in either direction
• Support for adding routes to individual PICs within the AMS system
AMS supports load balancing across multiple service sets. All ingress or egress traffic for a service set
can be load balanced across different services PICs. To enable load balancing, you have to configure an
aggregate interface with existing services interfaces.
member-failure-options {
drop-member-traffic {
rejoin-timeout rejoin-timeout;
}
redistribute-all-traffic {
enable-rejoin;
}
}
}
If a PIC fails, you can configure the traffic to the failed PIC to be redistributed by using the redistribute-
all-traffic statement at the [edit interfaces interface-name load-balancing-options member-failure-
options] hierarchy level. If the drop-member-traffic statement is used, all traffic to the failed PIC is
dropped. Both options are mutually exclusive.
Only mams- interfaces (services interfaces that are part of AMS) can be aggregated. After an AMS
interface has been configured, you cannot configure the individual constituent mams- interfaces. A
mams- interface cannot be used as an ams interface (this is not applicable to Next Gen Services MX-
SPC3). AMS supports IPv4 (family inet) and IPv6 (family inet6). You cannot configure addresses on an
AMS interface. Network Address Translation (NAT) is the only application that runs on AMS
infrastructure at this time.
To support multiple applications and different types of translation, AMS infrastructure supports
configuring hashing for each service set. You can configure the hash keys separately for ingress and
egress. The default configuration uses source IP, destination IP, and the protocol for hashing; incoming-
interface for ingress and outgoing-interface for egress are also available.
NOTE: When using AMS in a load-balanced setup for the NAT solution, the number of NAT IP
addresses must be greater than or equal to the number of active mams-interfaces you have
added to the AMS bundle.
461
In an AMS system configured with high availability, a designated services PIC acts as a backup for other
active PICs that are part of the AMS system in a many-to-one (N:1) backup configuration. In a N:1
backup configuration, one PIC is available as backup for all other active PICs. If any of the active PICs
fail, the backup PIC takes over for the failed PIC. In an N:1 (stateless) backup configuration, traffic states
and data structures are not synchronized between the active PICs and the backup PIC.
An AMS system also supports a one-to-one (1:1) configuration. In the case of 1:1 backup, a backup
interface is paired with a single active interface. If the active interface fails, the backup interface takes
over. In a 1:1 (stateful) configuration, traffic states and data structures are synchronized between the
active PICs and the backup PIC. Stateful synchronization is required for high availability of IPsec
connections. For IPsec connections, AMS supports 1:1 configuration only.
NOTE: IPsec connections are not supported on the MX-SPC3 in this release.
High availability for load balancing is configured by adding the high-availability-options statement at the
[edit interfaces interface-name load-balancing-options] hierarchy level.
To configure N:1 high availability, include the high-availability-options statement with the many-to-one
option:
Starting in Junos OS Release 16.1, you can configure stateful 1:1 high availability on an MS-MPC. To
configure stateful 1:1 high availability, at the [edit interfaces interface-name load-balancing-options]
hierarchy level, include the high-availability-options statement with the one-to-one option:
462
NOTE: The Next Gen Services MX-SPC3 services card does not support AMS 1:1 high
availability.
Network Address Translation (NAT) has been programmed as a plug-in and is a function of load
balancing and high availability. The plug-in runs on AMS infrastructure. All flows for translation are
automatically distributed to different services PICs that are part of the AMS infrastructure. In case of
failure of an active services PIC, the configured backup PIC takes over the NAT pool resources of the
failed PIC. The hashing method selected depends on the type of NAT. Using NAT on AMS infrastructure
has a few limitations:
IPv6 address pools are not supported with AMS, however NAT64 is supported with AMS, so that
IPv6 flows enters AMS.
NAT64 is supported for Next Gen Services on the MX-SPC3 services card, there is no support of
NAT66. IPv6 flows for different NAT services are supported except where the translation is required
to be IPv6 to IPv6 or IPv4 to IPv6.
Twice NAT is supported for load balancing on the Next Gen Services MX-SPC3 services card.
• Deterministic NAT uses warm-standby AMS configuration and can distribute the load using multiple
AMS bundles in warm-standby mode.
463
Release Description
19.3R2 Starting in Junos OS Release 19.3R2, AMS interfaces are also supported on the MX-SPC3 if you are
running Next Gen Services.
16.1 Starting in Junos OS Release 16.1, you can configure stateful 1:1 high availability on an MS-MPC.
You can configure an N:1 warm standby option for MS-MPCs, MS-MICs, and MX-SPC3s by creating
multiple aggregated multiservices (AMS) interfaces, each of which contains the service interface you
want to backup and the service interface that acts as the backup. The same backup service interface can
be used in all these AMS interfaces. Starting in Junos OS Release 19.3R2, the N:1 warm standby option
is also supported on the MX-SPC3 if you are running Next Gen Services.
[edit interfaces]
user@host# set amsN
The variable a is the FPC slot number and b is the PIC slot number for the primary service interface.
3. Specify the secondary service interface, which backs up the primary interface.
The variable a is the FPC slot number and b is the PIC slot number for the secondary service
interface.
464
4. Repeat Steps "1" on page 463 through "3" on page 463 to create an AMS interface for each service
interface that you want to backup. You can use the same secondary service interface in each AMS
interface.
Release Description
19.3R2 Starting in Junos OS Release 19.3R2, the N:1 warm standby option is also supported on the MX-SPC3 if
you are running Next Gen Services.
RELATED DOCUMENTATION
CHAPTER 32
IN THIS CHAPTER
Next Gen Services Inter-chassis High Availability Overview for NAT, Stateful Firewall, and IDS Flows | 466
Inter-Chassis Stateful Synchronization for Long Lived NAT, Stateful Firewall, and IDS Flows for Next Gen
Services | 480
IN THIS SECTION
Inter-chassis High Availability Overview for NAT, Stateful Firewall, and IDS Flows for Next Gen
Services | 467
Example: Next Gen Services Inter-Chassis Stateful High Availability for NAT and Stateful Firewall (MX-
SPC3) | 467
467
Inter-chassis High Availability Overview for NAT, Stateful Firewall, and IDS Flows for
Next Gen Services
IN THIS SECTION
Benefits | 467
Carrier-grade NAT, stateful firewall, and IDS flows can be configured with a dual-chassis, redundant data
path. Although intra-chassis high availability can be used in an MX Series device by employing the AMS
interfaces, this method only deals locally with services PIC failures. If for any reason traffic is switched to
a backup router due to some other failure in the router, the session state from the services PIC is lost
unless you configure synchronization of the services session states with a services PIC on the backup
router.
Inter-chassis high availability provides this synchronization, and controls switchovers between the
services PICs in the redundancy pair. Inter-chassis high availability is a primary-secondary model, not an
active-active cluster. Only one services PIC in a redundancy pair, the current primary, receives traffic to
be serviced.
To configure interchassis high availability for NAT, stateful firewall, and IDS, you configure:
1. Stateful synchronization, which replicates the session state from the primary services PICs on the
primary to the backup services PIC on the other chassis.
2. Inter-chassis services redundancy, which controls primary role switchovers in the services PIC
redundancy pair, based on monitored events. Most operators would not want to employ stateful
synchronization without also implementing services redundancy.
Benefits
Interchassis high availability provides automatic switchovers from a services PIC on one chassis to a
services PIC on another chassis, while providing uninterrupted services for customer traffic.
Example: Next Gen Services Inter-Chassis Stateful High Availability for NAT and
Stateful Firewall (MX-SPC3)
IN THIS SECTION
Requirements | 468
468
Overview | 468
Configuration | 468
This example shows how to configure Next Gen Services inter-chassis high availability for stateful
firewall and NAT services.
Requirements
Overview
Two MX 3D routers are identically configured to facilitate stateful failover for firewall and NAT services
in case of a chassis failure.
Configuration
IN THIS SECTION
To configure inter-chassis high availability for this example, perform these tasks:
469
To quickly configure this example on the routers, copy the following commands and paste them into the
router terminal window after removing line breaks and substituting interface information specific to
your site.
[edit]
set interfaces vms-4/0/0 redundancy-options redundancy-peer ipaddress 5.5.5.2
set interfaces vms-4/0/0 redundancy-options routing-instance HA
set interfaces vms-4/0/0 unit 10 ip-address-owner service-plane
set interfaces vms-4/0/0 unit 10 family inet address 5.5.5.1/32
set interfaces vms-4/0/0 unit 20 family inet
set interfaces vms-4/0/0 unit 20 service-domain inside
set interfaces vms-4/0/0 unit 30 family inet
set interfaces vms-4/0/0 unit 30 service-domain outside
set interfaces ge-2/0/0 vlan-tagging
set interfaces ge-2/0/0 unit 0 vlan-id 100 family inet address 20.1.1.1/24
set routing-instances HA instance-type vrf
set routing-instances HA interface ge-2/0/0.0
set routing-instances HA interface vms-4/0/0.10
set routing-instances HA route-distinguisher 1:1
set policy-options policy-statement dummy term 1 then reject
set routing-instances HA vrf-import dummy
set routing-instances HA vrf-export dummy
set routing-instances HA routing-options static route route 5.5.5.1/32 next-hop vms-4/0/0.10
set routing-instances HA routing-options static route route 5.5.5.2/32 next-hop 20.1.1.2
set services nat pool p2 address 32.0.0.0/24
set services nat pool p2 port automatic random-allocation
set services nat pool p2 address-allocation round-robin
set services nat rule r2 match-direction input
set services nat rule r2 term t1 from source-address 129.0.0.0/8
set services nat rule r2 term t1 from source-address 128.0.0.0/8
set services nat rule r2 term t1 then translated source-pool p2
set services nat rule r2 term t1 then translated translation-type napt-44
set services nat rule r2 term t1 then translated address-pooling paired
set services nat rule r2 term t1 then syslog
set services stateful-firewall rule r2 match-direction input
470
NOTE: The following configuration is for chassis 2. The NAT, stateful firewall, and service-set
information must be identical for chassis 1 and 2.
Step-by-Step Procedure
The interfaces for each of the HA pair of routers are configured identically with the exception of the
following service PIC options:
• unit unit-number family inet address address of a unit, other than 0, that contains the ip-address-
owner service-plane option
To configure interfaces:
[edit interfaces}
user@host# set interfaces vms-4/0/0 redundancy-options redundancy-peer ipaddress 5.5.5.2
user@host# set interfaces vms-4/0/0 redundancy-options routing-instance HA
user@host# set interfaces vms-4/0/0 unit 10 ip-address-owner service-plane
472
2. Configure the interfaces for chassis 1 that are used as interchassis links for synchronization traffic.
Results
family inet6;
service-domain inside;
}
unit 30 {
family inet;
family inet6;
service-domain outside;
}
}
}
Step-by-Step Procedure
Detailed routing configuration is not included for this example. A routing instance is required for the HA
synchronization traffic between the chassis as follows:
Results
vrf-import dummy;
vrf-export dummy;
routing-options {
static {
route 5.5.5.1/32 next-hop vms-4/0/0.10;
route 5.5.5.2/32 next-hop 20.1.1.2;
}
}
}
Step-by-Step Procedure
Configure NAT and stateful firewall identically on both routers. To configure NAT and stateful firewall:
Results
term t1 {
from {
source-address {
any-unicast;
}
}
then {
accept;
syslog;
}
}
}
Step-by-Step Procedure
Configure the the service set identically on both routers. To configure the service set:
2. Configure references to NAT and stateful firewall rules for the service set.
user@host# set services service-set ss2 syslog host local class session-logs
user@host# set services service-set ss2 syslog host local class stateful-firewall-logs
user@host# set services service-set ss2 syslog host local class nat-logs
Results
Step-by-Step Procedure
The interfaces for each of the HA pair of routers are configured identically with the exception of the
following service PIC options:
• unit unit-number family inet address address of a unit, other than 0, that contains the ip-address-
owner service-plane option
The redundancy-peer ipaddress points to the address of the unit (unit 10) on vms-4/0/0 on chassis
on chassis 1 that contains the ip-address-owner service-plane statement.
[edit interfaces}
set interfaces vms-4/0/0 redundancy-options redundancy-peer ipaddress 5.5.5.1
user@host# set interfaces vms-4/0/0 redundancy-options routing-instance HA
user@host# set interfaces vms-4/0/0 unit 10 ip-address-owner service-plane
user@host# set interfaces vms-4/0/0 unit 10 family inet address 5.5.5.2/32
user@host# set interfaces vms-4/0/0 unit 20 family inet
user@host# set interfaces vms-4/0/0 unit 20 service-domain inside
user@host# set interfaces vms-4/0/0 unit 30 family inet
user@host# set interfaces vms-4/0/0 unit 30 service-domain outside
2. Configure the interfaces for chassis 2 that are used as interchassis links for synchronization traffic
Results
family inet {
address 5.5.5.2/32;
}
}
ge-2/0/0 {
vlan-tagging;
unit 0 {
vlan-id 100;
family inet {
address 20.1.1.2/24;
}
}
unit 10 {
vlan-id 10;
family inet {
address 2.10.1.2/24;
}
Step-by-Step Procedure
Detailed routing configuration is not included for this example. A routing instance is required for the HA
synchronization traffic between the two chassis and is included here.
NOTE: The following configuration steps are identical to the steps shown for chassis 1.
480
Results
RELATED DOCUMENTATION
Inter-Chassis Stateful Synchronization for Long Lived NAT, Stateful Firewall, and IDS Flows for Next
Gen Services | 480
Inter-Chassis Services Redundancy Overview for Next Gen Services | 489
IN THIS SECTION
Configuring Inter-Chassis Stateful Synchronization for Long- Lived NAT, Stateful Firewall, and IDS Flows for
Next Gen Services | 483
IN THIS SECTION
Benefits | 482
Stateful synchronization replicates the state of long-lived NAT, stateful firewall, and IDS sessions on the
primary services PIC and sends it to the backup services PIC, which is on a different MX Series chassis.
By default, long lived sessions are defined as having been active on the services PIC for at least 180
seconds, though you can configure this to a higher value.
Replicating state information for the port block allocation (PBA), endpoint-independent mapping (EIM),
or endpoint-independent filters (EIF) features are supported supported for Next Gen Services.
When configuring a service set for NAT, stateful firewall, or IDS that belongs to a stateful
synchronization setup, you must use a next-hop service set, and the NAT, stateful firewall, and IDS
configurations for the service set must be identical on both MX Series chassis.
482
Benefits
Interchassis stateful synchronization of the services session state allows uninterrupted services when a
switchover occurs from a services PIC on one chassis to a services PIC on another chassis.
SEE ALSO
Configuring Inter-Chassis Stateful Synchronization for Long- Lived NAT, Stateful Firewall, and IDS
Flows for Next Gen Services | 0
483
IN THIS SECTION
Configuring Inter-Chassis Stateful Synchronization for Next Gen Services with non-AMS
Interface | 483
Configuring Inter-Chassis Stateful Synchronization for Next Gen Services with AMS Interface | 486
Configuring Inter-Chassis Stateful Synchronization for Next Gen Services with non-AMS Interface
To configure stateful synchronization inter-chassis high availability for NAT, stateful firewall, and IDS
flows for Next Gen Services when the services interfaces are not AMS, perform the following
configuration steps on each chassis of the high availability pair.
1. Specify the IP address of the vms- interface. This address is used by the TCP channel between the
HA pairs.
For example:
When you configure the other chassis, this is the address you use for the redundancy-peer
ipaddress.
2. Specify the IP address of the remote services interface. This address is used by the TCP channel
between the HA pairs.
For example:
When you configure the other chassis, this is the address you use for the redundancy-local data-
address.
3. Configure the length of time that the flow remains active for replication, in seconds.
For example:
4. Configure a unit other than 0, and assign it the IP address of the local services interface that you
configured with the redundancy-local data-address option.
For example:
5. For ease of management, we recommend you create a special routing instance with instance-type vrf
to host the HA synchronization traffic between the MX Series high availability pair. Then specify the
name of the special routing instance to apply to the HA synchronization traffic between the high
availability pair.
6. Configure the inside and outside interface units, which are used by the next-hop service set. Use
different unit numbers for the inside and outside units, and do not use 0 or the unit number used in
Step "4".
[edit]
user@host# set interfaces interface-name unit logical-unit-number family (inet | inet6)
user@host# set interfaces interface-name unit logical-unit-number service-domain inside
user@host# set interfaces interface-name unit logical-unit-number family (inet | inet6)
user@host# set interfaces interface-name unit logical-unit-number service-domain outside
For example:
[edit]
user@host# set interfaces vms-1/0/0 unit 100 family inet
user@host# set interfaces vms-1/0/0 unit 100 family inet6
user@host# set interfaces vms-1/0/0 unit 100 service-domain inside
user@host# set interfaces vms-1/0/0 unit 1000 family inet
user@host# set interfaces vms-1/0/0 unit 1000 family inet6
user@host# set interfaces vms-1/0/0 unit 1000 service-domain outside
7. Configure the next-hop service set that contains the NAT rules, stateful firewall rules, or IDS screens.
The service set must be configured identically on each chassis of the high availability pair. The NAT
rules, stateful firewall rules, and IDS screens must also be configured identically on each chassis.
For example:
8. Repeat these steps for the other chassis of the high availability pair.
SEE ALSO
Configuring Inter-Chassis Stateful Synchronization for Next Gen Services with AMS Interface | 0
486
Configuring Inter-Chassis Stateful Synchronization for Next Gen Services with AMS Interface
To configure stateful synchronization inter-chassis high availability for NAT, stateful firewall, and IDS
flows for Next Gen Services for an AMS services interface, perform the following configuration steps on
each chassis of the high availability pair.
1. Configure a services vms- interface for every member of the AMS interface:
a. Specify the IP address of the vms- interface. This address is used by the TCP channel between the
HA pairs.
For example:
When you configure the other chassis, this is the address you use for the redundancy-peer
ipaddress.
b. Specify the IP address of the remote services interface. This address is used by the TCP channel
between the HA pairs.
For example:
When you configure the other chassis, this is the address you use for the redundancy-local data-
address.
c. Configure the length of time that the flow remains active for replication, in seconds.
For example:
d. Configure a unit other than 0, and assign it the IP address of the local services interface that you
configured with the redundancy-local data-address option.
For example:
e. For ease of management, we recommend you create a special routing instance with instance-type
vrf to host the HA synchronization traffic between the MX Series high availability pair. Then
specify the name of the special routing instance to apply to the HA synchronization traffic
between the high availability pair.
2. Create the AMS interface and add the member interfaces you configured in Step "1" on page 486.
[edit interfaces]
user@host# set interface-name load-balancing-options [member-interface mams-a/b/0]
where the interface-name is amsN, and a is the FPC slot number and b is the PIC slot number for
each member interface.
For example:
[edit interfaces]
user@host# set ams0 load-balancing-options member-interface mams-1/0/0
user@host# set ams0 load-balancing-options member-interface mams-1/1/0
488
3. Configure the inside interface for the AMS interface, which is used by the next-hop service set:
a. Configure the family for the inside interface. Do not use 0 for the unit number.
[edit]
user@host# set interfaces interface-name unit logical-unit-number service-domain inside
user@host# set interfaces interface-name unit logical-unit-number family (inet | inet6)
For example:
[edit]
user@host# set interfaces ams0 unit 100 service-domain inside
user@host# set interfaces ams0 unit 100 family inet
user@host# set interfaces ams0 unit 100 family inet6
b. Configure the hash key to regulate distribution for the inside interface.
4. Configure the outside interface for the AMS interface, which is used by the next-hop service set. Do
not use 0 or the same unit number that you used for the inside interface.
[edit]
user@host# set interfaces interface-name unit logical-unit-number service-domain outside
user@host# set interfaces interface-name unit logical-unit-number family (inet | inet6)
For example:
[edit]
user@host# set interfaces ams0 unit 1000 service-domain outside
user@host# set interfaces ams0 unit 1000 family inet
user@host# set interfaces ams0 unit 1000 family inet6
489
b. Configure the hash key to regulate distribution for the outside interface.
5. Configure the next-hop service set that contains the NAT rules, stateful firewall rules, or IDS screens.
The service set must be configured identically on each chassis of the high availability pair. The NAT
rules, stateful firewall rule, and IDS screens must also be configured identically on each chassis.
For example:
6. Repeat these steps for the other chassis of the high availability pair.
SEE ALSO
Configuring Inter-Chassis Stateful Synchronization for Next Gen Services with non-AMS Interface |
0
IN THIS SECTION
Benefits | 490
Interchassis redundancy for services is controlled by the services redundancy daemon (SRD). The SRD
lets you specify events that trigger a switchover between the primary and standby services PICs, which
490
are on two different MX Series chassis. The SRD monitors conditions, and performs a switchover when
an event occurs. Inter-chassis services redundancy is a primary-secondary model, not an active-active
cluster. Only one services PIC in a redundancy pair, the current primary, receives traffic to be serviced.
• Peer gateway events, including requests to acquire or release primary role, or to broadcast warnings.
Benefits
Inter-chassis services redundancy provides automatic switchovers from a services PIC on one chassis to
a services PIC on another chassis when a monitored event occurs.
• Redundancy Event—A monitored critical event that triggers the redundancy peers to acquire or
release primary role or to create a warning, and to add or delete signal routes.
One monitored interface can be part of only one redundancy event, but one redundancy event can
have multiple monitored interfaces.
• Redundancy Policy—A policy that defines the set of actions taken when a redundancy event occurs.
Available actions include acquisition or release of primary role, creation of a warning, and addition or
deletion of signal routes. You can configure a maximum of 256 redundancy policies. A redundancy
policy can have a maximum of 256 interface-down events.
One redundancy event can be part of only one redundancy policy, but one redundancy policy can
have multiple redundancy events. For example, redundancy policy RP1 can include redundancy
events RE1 and RE2. Redundancy events RE1 and RE2 cannot be included in redundancy policies
other than RP1.
• Redundancy Set—A collection of one or more redundancy policies that is assigned to one or more
service sets on each MX Series chassis of the redundant pair, and the redundancy group that is
associated with the redundancy set. At a given time, a particular redundancy set can be active on
only one gateway, but not all redundancy sets have to be active on the same gateway. For example,
redundancy set A can be active on gateway 1 while redundancy set B is active on gateway 2. You can
configure a maximum of 128 redundancy sets.
491
One service set can be assigned only one redundancy set, but multiple service sets can be assigned
the same redundancy set.
One redundancy policy can be part of only one redundancy set, but one redundancy set can have
multiple redundancy policies. For example, redundancy set RS1 can include redundancy policies RP1
and RP2. Redundancy policies RP1 and RP2 cannot be included in redundancy sets other than RS1. A
redundancy set can have a maximum of 16 redundancy policies.
• Redundancy Group—The redundancy group identifies the associated ICCP redundancy group. A one-
to-one relationship exists between a redundancy set and a redundancy group. One redundancy set
can be part of only one redundancy group. You can configure a maximum of 16 redundancy groups. A
maximum of 16 redundancy sets can be associated with the same redundancy group.
• Signal routes—Static routes that are added or deleted by services redundancy processing, based on
primary role state changes.
• Routing Policies—Policies that advertise routes based on the existence or non-existence of signal
routes.
• VRRP (Virtual Router Redundancy Protocol) route tracking—Tracks whether a reachable signal route
exists in the routing table of the routing instance in the configuration. Based on the reachability of
the tracked route, VRRP route tracking dynamically changes the priority of the VRRP group.
1. The services redundancy daemon runs on the Routing Engine. It continuously monitors configured
redundancy events.
NOTE: The order of routing priorities must match the order of services primary role.
If a redundancy policy action is release-primary role and the redundancy peer’s state is wait, the
primary-role-release fails. If a redundancy policy action is release-primary role-force, the primary role
release succeeds even if the redundancy peer’s state is warned.
Similarly, if a redundancy policy action on the standby is acquire-primary role and the local state is wait,
the primary-role-release fails. If a redundancy policy action is acquire-primary role-force, the primary
role release succeeds even if the standby state is wait.
You can also use a manual command to trigger a redundancy policy that releases or acquires primary
role.
If gateway 1, the chassis that is configured with the lower IP address, is the primary chassis and you
deactivate the services redundancy daemon on it, a switchover to gateway 2 occurs . If gateway 2, the
chassis that is configured with the higher IP address, is the primary chassis and you deactivate the
services redundancy daemon on it, a switchover does not occur.
RELATED DOCUMENTATION
IN THIS SECTION
Configuring Non-Stop Services Redundancy for Next Gen Services Service Set | 493
Configuring One-Way Services Redundancy for Next Gen Services Service Set | 499
493
This topic describes how to configure interchassis-services redundancy for Next Gen Services. This topic
contains a procedure for configuring non-stop services redundancy (automatic switchovers in both
directions) and a procedure for one-way redundancy (automatic switchovers only from the original
primary to the original standby).
You can also use a manual request command to release or acquire primary role:
The command automatically triggers the specified redundancy event. You must create a configuration
that assigns the redundancy event to a redundancy policy that either releases or acquires primary role.
You must also assign the redundancy policy to the redundancy set used in the command.
Configuring Non-Stop Services Redundancy for Next Gen Services Service Set
Non-stop services redundancy gives you automatic services switchovers between the MX Series routers
when a critical event occurs. Automatic switchovers from gateway1 to gateway2 and from gateway2 to
gateway1 take place without manual intervention.
To configure non-stop services redundancy for a service set, perform the following steps on both
gateway1 and gateway2:
1. Configure one or more redundancy events to monitor the conditions that trigger a services
switchover to the peer gateway.
[edit services]
user@host# set event-options redundancy-event event-name
For example:
[edit services]
user@host# set event-options redundancy-event RELS_MSHIP_CRIT_EV
b. Specify any interfaces that trigger a services switchover when the interface goes down.
c. Specify that a process routing daemon restart request triggers a services switchover.
d. Specify that a process routing daemon terminate request triggers a services switchover.
e. Specify that a request from the peer to acquire ownership triggers a services switchover.
2. Configure a redundancy policy that releases primary role and deletes a static route when the
redundancy event conditions are met.
For example:
For example:
If you want to be able to run the request services redundancy-set redundancy-set trigger
redundancy-event event-name <force> to manually release primary role, include that event-name
in the redundancy policy. The redundancy event itself does not need to be configured, because it
is triggered by the request command.
For example:
3. Configure a redundancy event to identify when the peer gateway releases primary role.
[edit services]
user@host# set event-options redundancy-event event-name monitor peer release-mastership
For example:
[edit services]
user@host# set event-options redundancy-event PEER_RELS_MSHIP_EV monitor peer release-
mastership
4. Configure a redundancy policy that acquires primary role from the peer gateway and adds a static
route.
For example:
For example:
If you want to be able to run the request services redundancy-set redundancy-set trigger
redundancy-event event-name <force> to manually acquire primary role, include that event-name
in the redundancy policy. The redundancy event itself does not need to be configured, because it
is triggered by the request command.
For example:
[edit services]
user@host# set redundancy-set redundancy-set
For example:
[edit services]
user@host# set redundancy-set 1
For example:
The redundancy group ID is the same redundancy group ID configured for the ICCP daemon
(iccpd) through the existing ICCP configuration hierarchy. For example,
iccp {
local-ip-addr 1.1.1.1;
peer 2.2.2.2 {
redundancy-group-id-list 1;
liveness-detection {
minimum-interval 1000;
}
}
}
498
c. Specify the redundancy policy that releases primary role and the redundancy policy that acquires
primary role.
For example:
d. Configure the frequency of health check probes of the redundancy set, in seconds.
e. Configure the maximum wait time for a help check response, in seconds.
a. Identify signal routes that requires redundancy-related routing changes. Specify the signal route
and the routing table that is used.
For example:
b. To change the local-preference for the signal route, enter it in a policy statement.
c. To change as-path-prepend values for the signal route, enter them in the policy statement.
7. Configure redundancy for the service set by assigning the redundancy set to the service set.
[edit]
user@host# set services service-set service-set-name redundancy-set-id redundancy-set
SEE ALSO
Configuring One-Way Services Redundancy for Next Gen Services Service Set
Configuring One-Way Services Redundancy for Next Gen Services Service Set
One-way services redundancy gives you automatic services switchovers from gateway1, the original
primary gateway, to gateway2, the original standby gateway. An automatic switchover from gateway 2
to gateway1 does not happen. To switchover from gateway2 to gateway1, you must perform a manual
switchover.
1. On gateway1, the initial primary, configure one or more redundancy events to monitor the
conditions that trigger a services switchover to gateway2, the standby gateway.
500
[edit services]
user@gateway1# set event-options redundancy-event event-name
For example:
[edit services]
user@gateway1# set event-options redundancy-event RELS_MSHIP_CRIT_EV
b. Specify any interfaces that trigger a services switchover when the interface goes down.
c. Specify that a process routing daemon restart request triggers a services switchover.
d. Specify that a process routing daemon terminate request triggers a services switchover.
2. On gateway1, configure a redundancy policy that releases primary role and deletes a static route
when the redundancy event conditions are met.
For example:
For example:
If you want to be able to run the request services redundancy-set redundancy-set trigger
redundancy-event event-name <force> to manually release primary role, include that event-
name in the redundancy policy. The redundancy event itself does not need to be configured,
because it is triggered by the request command.
For example:
3. On gateway1, configure a redundancy policy that acquires primary role from gateway2 when you
perform a manual request on gateway1 (request services redundancy-set redundancy-set trigger
redundancy-event event-name <force>) .
For example:
b. Specify the name of the redundancy event that the manual request uses.
For example:
The redundancy event itself does not need to be configured, because it is triggered by the
request command.
[edit services]
user@gateway1# set redundancy-set redundancy-set
For example:
[edit services]
user@gateway1# set redundancy-set 1
503
For example:
The redundancy group ID is the same redundancy group ID configured for the ICCP daemon
(iccpd) through the existing ICCP configuration hierarchy. For example,
iccp {
local-ip-addr 1.1.1.1;
peer 2.2.2.2 {
redundancy-group-id-list 1;
liveness-detection {
minimum-interval 1000;
}
}
}
c. Specify the redundancy policy that releases primary role and the redundancy policy that
acquires primary role.
For example:
d. Configure the frequency of health check probes of the redundancy set, in seconds.
e. Configure the maximum wait time for a help check response, in seconds.
a. Identify signal routes that requires redundancy-related routing changes. Specify the signal route
and the routing table that is used.
For example:
b. To change the local-preference for the signal route, enter it in a policy statement.
c. To change as-path-prepend values for the signal route, enter them in the policy statement.
6. On gateway1, configure redundancy for the service set by assigning the redundancy set to the
service set.
[edit]
user@gateway1# set services service-set service-set-name redundancy-set-id redundancy-set
7. On gateway2, the initial standby, configure a redundancy event to identify when the peer gateway
releases primary role.
[edit services]
user@gateway2# set event-options redundancy-event event-name monitor peer release-mastership
For example:
[edit services]
user@gateway2# set event-options redundancy-event PEER_RELS_MSHIP_EV monitor peer release-
mastership
8. On gateway2, configure a redundancy policy that acquires primary role from the peer gateway and
adds a static route.
For example:
b. Specify the configured redundancy event for the peer gateway primary role release event.
For example:
9. On gateway2, configure a redundancy event to identify when the peer gateway requests primary
role.
[edit services]
user@gateway2# set event-options redundancy-event event-name monitor peer mastership-acquire
For example:
[edit services]
user@gateway2# set event-options redundancy-event PEER_MSHIP_ACQU_EV monitor peer
mastership-acquire
10. On gateway2, configure a redundancy policy that releases primary role and deletes a static route
when gateway1 requests primary role.
507
For example:
b. Specify the configured redundancy event that identifies when the peer gateway requests
primary role.
For example:
11. On gateway2, configure one or more redundancy events to monitor the conditions that trigger a
warning.
[edit services]
user@gateway2# set event-options redundancy-event event-name
508
For example:
[edit services]
user@gateway2# set event-options redundancy-event WARN_EV
b. Specify any interfaces that trigger a warning when the interface goes down.
For example:
For example:
[edit services]
user@gateway2# set redundancy-set redundancy-set
For example:
[edit services]
user@gateway2# set redundancy-set 1
For example:
The redundancy group ID is the same redundancy group ID configured for the ICCP daemon
(iccpd) through the existing ICCP configuration hierarchy. For example,
iccp {
local-ip-addr 10.1.1.1;
peer 10.2.2.2 {
510
redundancy-group-id-list 1;
liveness-detection {
minimum-interval 1000;
}
}
}
c. Specify the redundancy policy that releases primary role, the redundancy policy that acquires
primary role, and the redundancy policy that triggers a warning.
For example:
d. Configure the frequency of health check probes of the redundancy set, in seconds.
e. Configure the maximum wait time for a help check response, in seconds.
a. Identify signal routes that requires redundancy-related routing changes. Specify the signal route
and the routing table that is used.
For example:
b. To change the local-preference for the signal route, enter it in a policy statement.
c. To change as-path-prepend values for the signal route, enter them in the policy statement.
15. On gateway2, configure redundancy for the service set by assigning the redundancy set to the
service set.
[edit]
user@gateway2# set services service-set service-set-name redundancy-set-id redundancy-set
SEE ALSO
CHAPTER 33
IN THIS CHAPTER
IN THIS SECTION
RTSP | 513
SIP | 514
This topic describes the Application Layer Gateways (ALGs) supported by Junos OS for Next Gen
Services. ALG support includes managing pinholes and parent-child relationships for the supported
ALGs.
RTSP
The Real-Time Streaming Protocol (RTSP) controls the delivery of data with real-time properties such as
audio and video. The streams controlled by RTSP can use RTP, but it is not required. Media can be
transmitted on the same RTSP control stream. This is an HTTP-like text-based protocol, but client and
514
server maintain session information. A session is established using the SETUP message and terminated
using the TEARDOWN message. The transport (the media protocol, address, and port numbers) is
negotiated in the setup and the setup-response.
Support for stateful firewall and NAT services requires that you configure the RTSP ALG for TCP
port 554.
The ALG monitors the control connection, opens flows dynamically for media (RTP/RTSP) streams, and
performs NAT address and port rewrites.
SIP
The Session Initiation Protocol (SIP) is an application layer protocol that can establish, maintain, and
terminate media sessions. It is a widely used voice over IP (VoIP) signaling protocol. The SIP ALG
monitors SIP traffic and dynamically creates and manages pinholes on the signaling and media paths.
The ALG only allows packets with the correct permissions. The SIP ALG also performs the following
functions:
• Stateful firewall
NOTE: SIP sessions are limited to 12 hours (720 minutes) for NAT processing on the MS-MIC
and MS-MPC interface cards. SIP sessions on the MS-DPC have no time limit.
Configuring SIP
The Session Initiation Protocol (SIP) is a generalized protocol for communication between endpoints
involved in Internet services such as telephony, fax, video conferencing, instant messaging, and file
exchange.
515
The Junos OS provides ALG services in accordance with the standard described in RFC 3261, SIP:
Session Initiation Protocol. SIP flows under the Junos OS are as described in RFC 3665, Session
Initiation Protocol (SIP) Basic Call Flow Examples.
NOTE: Before implementing the Junos OS SIP ALG, you should be familiar with certain
limitations, discussed in "Junos OS SIP ALG Limitations" on page 522
The use of NAT in conjunction with the SIP ALG results in changes in SIP header fields due to
address translation. For an explanation of these translations, refer to "SIP ALG Interaction with
Network Address Translation" on page 516.
To implement SIP on adaptive services interfaces, you configure the application-protocol statement at
the [edit applications application application-name] hierarchy level with the value sip. In addition, there
are two other statements you can configure to modify how SIP is implemented:
• You can enable the router to accept any incoming SIP calls for the endpoint devices that are behind
the NAT firewall. When a device behind the firewall registers with the proxy that is outside the
firewall, the AS or Multiservices PIC maintains the registration state. When the learn-sip-register
statement is enabled, the router can use this information to accept inbound calls. If this statement is
not configured, no inbound calls are accepted; only the devices behind the firewall can call devices
outside the firewall.
To configure SIP registration, include the learn-sip-register statement at the [edit applications
application application-name] hierarchy level:
NOTE: The learn-sip-register statement is not applicable to the Next Gen Services MX-SPC3.
You can also manually inspect the SIP register by issuing the show services stateful-firewall sip-
register command; for more information, see the Junos OS System Basics and Services Command
Reference. The show services stateful-firewall sip-register command is not supported for Next Gen
Services.
• You can specify a timeout period for the duration of SIP calls that are placed on hold. When a call is
put on hold, there is no activity and flows might time out after the configured inactivity-timeout
period expires, resulting in call state teardown. To avoid this, when a call is put on hold, the flow
timer is reset to the sip-call-hold-timeout cycle to preserve the call state and flows for longer than
the inactivity-timeout period.
516
NOTE: The sip-call-hold-timeout statement is not applicable to the Next Gen Services MX-
SPC3.
To configure a timeout period, include the sip-call-hold-timeout statement at the [edit applications
application application-name] hierarchy level:
The default value is 7200 seconds and the range is from 0 through 36,000 seconds (10 hours).
The Network Address Translation (NAT) protocol enables multiple hosts in a private subnet to share a
single public IP address to access the Internet. For outgoing traffic, NAT replaces the private IP address
of the host in the private subnet with the public IP address. For incoming traffic, the public IP address is
converted back into the private address, and the message is routed to the appropriate host in the private
subnet.
Using NAT with the Session Initiation Protocol (SIP) service is more complicated because SIP messages
contain IP addresses in the SIP headers as well as in the SIP body. When using NAT with the SIP service,
the SIP headers contain information about the caller and the receiver, and the device translates this
information to hide it from the outside network. The SIP body contains the Session Description Protocol
(SDP) information, which includes IP addresses and port numbers for transmission of the media. The
device translates SDP information for allocating resources to send and receive the media.
How IP addresses and port numbers in SIP messages are replaced depends on the direction of the
message. For an outgoing message, the private IP address and port number of the client are replaced
with the public IP address and port number of the Juniper Networks firewall. For an incoming message,
the public address of the firewall is replaced with the private address of the client.
When an INVITE message is sent out across the firewall, the SIP Application Layer Gateway (ALG)
collects information from the message header into a call table, which it uses to forward subsequent
messages to the correct endpoint. When a new message arrives, for example an ACK or 200 OK, the
ALG compares the “From:, To:, and Call-ID:” fields against the call table to identify the call context of the
message. If a new INVITE message arrives that matches the existing call, the ALG processes it as a
REINVITE.
When a message containing SDP information arrives, the ALG allocates ports and creates a NAT
mapping between them and the ports in the SDP. Because the SDP requires sequential ports for the
Real-Time Transport Protocol (RTP) and Real-Time Control Protocol (RTCP) channels, the ALG provides
consecutive even-odd ports. If it is unable to find a pair of ports, it discards the SIP message.
517
Outgoing Calls
When a SIP call is initiated with a SIP request message from the internal to the external network, NAT
replaces the IP addresses and port numbers in the SDP and binds the IP addresses and port numbers to
the Juniper Networks firewall. Via, Contact, Route, and Record-Route SIP header fields, if present, are
also bound to the firewall IP address. The ALG stores these mappings for use in retransmissions and for
SIP response messages.
The SIP ALG then opens pinholes in the firewall to allow media through the device on the dynamically
assigned ports negotiated based on information in the SDP and the Via, Contact, and Record-Route
header fields. The pinholes also allow incoming packets to reach the Contact, Via, and Record-Route IP
addresses and ports. When processing return traffic, the ALG inserts the original Contact, Via, Route,
and Record-Route SIP fields back into packets.
Incoming Calls
Incoming calls are initiated from the public network to public static NAT addresses or to interface IP
addresses on the device. Static NATs are statically configured IP addresses that point to internal hosts;
interface IP addresses are dynamically recorded by the ALG as it monitors REGISTER messages sent by
internal hosts to the SIP registrar. When the device receives an incoming SIP packet, it sets up a session
and forwards the payload of the packet to the SIP ALG.
The ALG examines the SIP request message (initially an INVITE) and, based on information in the SDP,
opens gates for outgoing media. When a 200 OK response message arrives, the SIP ALG performs NAT
on the IP addresses and ports and opens pinholes in the outbound direction. (The opened gates have a
short time-to-live, and they time out if a 200 OK response message is not received quickly.)
When a 200 OK response arrives, the SIP proxy examines the SDP information and reads the IP
addresses and port numbers for each media session. The SIP ALG on the device performs NAT on the
addresses and port numbers, opens pinholes for outbound traffic, and refreshes the timeout for gates in
the inbound direction.
When the ACK arrives for the 200 OK, it also passes through the SIP ALG. If the message contains SDP
information, the SIP ALG ensures that the IP addresses and port numbers are not changed from the
previous INVITE—if they are, the ALG deletes old pinholes and creates new pinholes to allow media to
pass through. The ALG also monitors the Via, Contact, and Record-Route SIP fields and opens new
pinholes if it determines that these fields have changed.
Forwarded Calls
A forwarded call is when, for example, user A outside the network calls user B inside the network, and
user B forwards the call to user C outside the network. The SIP ALG processes the INVITE from user A
518
as a normal incoming call. But when the ALG examines the forwarded call from B to C outside the
network and notices that B and C are reached using the same interface, it does not open pinholes in the
firewall, because media will flow directly between user A and user C.
Call Termination
The BYE message terminates a call. When the device receives a BYE message, it translates the header
fields just as it does for any other message. But because a BYE message must be acknowledged by the
receiver with a 200 OK, the ALG delays call teardown for five seconds to allow time for transmission of
the 200 OK.
Re-INVITE messages add new media sessions to a call and remove existing media sessions. When new
media sessions are added to a call, new pinholes are opened in the firewall and new address bindings are
created. The process is identical to the original call setup. When one or more media sessions are
removed from a call, pinholes are closed and bindings released just as with a BYE message.
The SIP ALG uses the Session-Expires value to time out a session if a Re-INVITE or UPDATE message is
not received. The ALG gets the Session-Expires value, if present, from the 200 OK response to the
INVITE and uses this value for signaling timeout. If the ALG receives another INVITE before the session
times out, it resets all timeout values to this new INVITE or to default values, and the process is
repeated.
As a precautionary measure, the SIP ALG uses hard timeout values to set the maximum amount of time
a call can exist. This ensures that the device is protected should one of the following events occur:
• End systems crash during a call and a BYE message is not received.
• Poor implementations of SIP proxy fail to process Record-Route and never send a BYE message.
Call Cancellation
Either party can cancel a call by sending a CANCEL message. Upon receiving a CANCEL message, the
SIP ALG closes pinholes through the firewall—if any have been opened—and releases address bindings.
Before releasing the resources, the ALG delays the control channel age-out for approximately five
seconds to allow time for the final 200 OK to pass through. The call is terminated when the five second
timeout expires, regardless of whether a 487 or non-200 response arrives.
519
Forking
Forking enables a SIP proxy to send a single INVITE message to multiple destinations simultaneously.
When the multiple 200 OK response messages arrive for the single call, the SIP ALG parses but updates
call information with the first 200 OK messages it receives.
SIP Messages
The SIP message format consists of a SIP header section and the SIP body. In request messages, the first
line of the header section is the request line, which includes the method type, request-URI, and protocol
version. In response messages, the first line is the status line, which contains a status code. SIP headers
contain IP addresses and port numbers used for signaling. The SIP body, separated from the header
section by a blank line, is reserved for session description information, which is optional. Junos OS
currently supports the SDP only. The SIP body contains IP addresses and port numbers used to
transport the media.
SIP Headers
In the following sample SIP request message, NAT replaces the IP addresses in the header fields to hide
them from the outside network.
How IP address translation is performed depends on the type and direction of the message. A message
can be any of the following:
• Inbound request
• Outbound response
• Outbound request
• Inbound response
Table 47 on page 520 shows how NAT is performed in each of these cases. Note that for several of the
header fields the ALG determine more than just whether the messages comes from inside or outside the
520
network. It must also determine what client initiated the call, and whether the message is a request or
response.
(from public to
private) From: None
Call-ID: None
Via: None
Contact: None
Record-Route: None
Route: None
Call-ID: None
Via: None
Request-URI: N/A
Route: None
Call-ID: None
Request-URI: None
Call-ID: None
Request-URI: N/A
Contact: None
SIP Body
The SDP information in the SIP body includes IP addresses the ALG uses to create channels for the
media stream. Translation of the SDP section also allocates resources, that is, port numbers to send and
receive the media.
The following excerpt from a sample SDP section shows the fields that are translated for resource
allocation.
SIP messages can contain more than one media stream. The concept is similar to attaching multiple files
to an e-mail message. For example, an INVITE message sent from a SIP client to a SIP server might have
the following fields:
Junos OS supports up to 6 SDP channels negotiated for each direction, for a total of 12 channels per
call.
• TCP is not supported as a transport mechanism for signaling messages for MS-MPCs but is
supported for Next Gen Services.
523
• Do not configure the SIP ALG when using STUN. if clients use STUN/TURN to detect the firewall or
NAT devices between the caller and responder or proxy, the client attempts to best-guess the NAT
device behavior and act accordingly to place the call.
• On MS-MPCs, do not use the endpoint-independent mapping NAT pool option in conjunction with
the SIP ALG. Errors will result. This does not apply to Next Gen Services.
• IPv6 signaling data is not supported for MS-MPCs but is supported for Next Gen Services.
• SIP fragmentation is not supported for MS-MPCs but is supported for Next Gen Services.
• The maximum UDP packet size containing a SIP message is assumed to be 9 KB. SIP messages larger
than this are not supported.
• Fully qualified domain names (FQDNs) are not supported in critical fields.
RELATED DOCUMENTATION
ALG Descriptions
ALGs Available for Junos OS Address Aware NAT
You can group the applications you have defined into a named object by including the application-set
statement at the [edit applications] hierarchy level with an application statement for each application:
[edit applications]
application-set application-set-name {
524
application application;
}
For an example of a typical application set, see Examples: Configuring Application Protocols.
IN THIS SECTION
To configure application properties, include the application statement at the [edit applications] hierarchy
level:
[edit applications]
application application-name {
application-protocol protocol-name;
child-inactivity-timeout seconds;
destination-port port-number;
gate-timeout seconds;
icmp-code value;
icmp-type value;
inactivity-timeout value;
protocol type;
rpc-program-number number;
snmp-command command;
source-port port-number;
ttl-threshold value;
525
uuid hex-value;
}
You can group application objects by configuring the application-set statement; for more information,
see Configuring Application Sets.
The application-protocol statement allows you to specify which of the supported application protocols
(ALGs) to configure and include in an application set for service processing. To configure application
protocols, include the application-protocol statement at the [edit applications application application-
name] hierarchy level:
Table 48 on page 525 shows the list of supported protocols for Next Gen Services. For more
information about specific protocols, see ALG Descriptions.
Bootstrap protocol (BOOTP) bootp Supports BOOTP and dynamic host configuration
protocol (DHCP).
Distributed Computing dce-rpc Requires the protocol statement to have the value udp or
Environment (DCE) remote tcp. Requires a uuid value. You cannot specify
procedure call (RPC) destination-port or source-port values.
DCE RPC portmap dce-rpc- Requires the protocol statement to have the value udp or
portmap tcp. Requires a destination-port value.
Domain Name System (DNS) dns Requires the protocol statement to have the value udp.
This application protocol closes the DNS flow as soon as
the DNS response is received.
526
Exec exec Requires the protocol statement to have the value tcp or
to be unspecified. Requires a destination-port value.
FTP ftp Requires the protocol statement to have the value tcp or
to be unspecified. Requires a destination-port value.
H.323 h323 –
Internet Control Message icmp Requires the protocol statement to have the value icmp
Protocol (ICMP) or to be unspecified.
IP ip –
Login login –
NetBIOS netbios Requires the protocol statement to have the value udp or
to be unspecified. Requires a destination-port value.
NetShow netshow Requires the protocol statement to have the value tcp or
to be unspecified. Requires a destination-port value.
RealAudio realaudio –
Real-Time Streaming Protocol rtsp Requires the protocol statement to have the value tcp or
(RTSP) to be unspecified. Requires a destination-port value.
SNMP snmp Requires the protocol statement to have the value udp or
to be unspecified. Requires a destination-port value.
527
SQLNet sqlnet Requires the protocol statement to have the value tcp or
to be unspecified. Requires a destination-port or source-
port value.
Trace route traceroute Requires the protocol statement to have the value udp or
to be unspecified. Requires a destination-port value.
Trivial FTP (TFTP) tftp Requires the protocol statement to have the value udp or
to be unspecified. Requires a destination-port value.
WinFrame winframe –
NOTE: You can configure application-level gateways (ALGs) for ICMP and trace route under
stateful firewall, NAT, or CoS rules when twice NAT is configured in the same service set. These
ALGs cannot be applied to flows created by the Packet Gateway Controller Protocol (PGCP).
Twice NAT does not support any other ALGs. NAT applies only the IP address and TCP or UDP
headers, but not the payload.
For more information about configuring twice NAT, see Junos Address Aware Network
Addressing Overview.
The protocol statement allows you to specify which of the supported network protocols to match in an
application definition. To configure network protocols, include the protocol statement at the [edit
applications application application-name] hierarchy level:
You specify the protocol type as a numeric value; for the more commonly used protocols, text names are
also supported in the command-line interface (CLI). Table 49 on page 528shows the list of the
supported protocols.
For a complete list of possible numeric values, see RFC 1700, Assigned Numbers (for the Internet
Protocol Suite).
The ICMP code and type provide additional specification, in conjunction with the network protocol, for
packet matching in an application definition. To configure ICMP settings, include the icmp-code and
icmp-type statements at the [edit applications application application-name] hierarchy level:
You can include only one ICMP code and type value. The application-protocol statement must have the
value icmp. Table 50 on page 529 shows the list of supported ICMP values.
icmp-code This value or keyword provides more specific information than icmp-type.
Because the value’s meaning depends upon the associated icmp-type value,
you must specify icmp-type along with icmp-code. For more information,
see the Routing Policies, Firewall Filters, and Traffic Policers User Guide.
In place of the numeric value, you can specify one of the following text
synonyms (the field values are also listed). The keywords are grouped by the
ICMP type with which they are associated:
Table 50: ICMP Codes and Types Supported by Services Interfaces (Continued)
icmp-type Normally, you specify this match in conjunction with the protocol match
statement to determine which protocol is being used on the port. For more
information, see the Routing Policies, Firewall Filters, and Traffic Policers
User Guide.
In place of the numeric value, you can specify one of the following text
synonyms (the field values are also listed): echo-reply (0), echo-request (8),
info-reply (16), info-request (15), mask-request (17), mask-reply (18),
parameter-problem (12), redirect (5), router-advertisement (9), router-
solicit (10), source-quench (4), time-exceeded (11), timestamp (13),
timestamp-reply (14), or unreachable (3).
NOTE: If you configure an interface with an input firewall filter that includes a reject action and
with a service set that includes stateful firewall rules, the router executes the input firewall filter
before the stateful firewall rules are run on the packet. As a result, when the Packet Forwarding
Engine sends an ICMP error message out through the interface, the stateful firewall rules might
drop the packet because it was not seen in the input direction.
Possible workarounds are to include a forwarding-table filter to perform the reject action,
because this type of filter is executed after the stateful firewall in the input direction, or to
include an output service filter to prevent the locally generated ICMP packets from going to the
stateful firewall service.
The TCP or UDP source and destination port provide additional specification, in conjunction with the
network protocol, for packet matching in an application definition. To configure ports, include the
destination-port and source-port statements at the [edit applications application application-name]
hierarchy level:
You must define one source or destination port. Normally, you specify this match in conjunction with
the protocol match statement to determine which protocol is being used on the port.
You can specify either a numeric value or one of the text synonyms listed in Table 51 on page 531.
snmp 161
snmptrap 162
For more information about matching criteria, see the Routing Policies, Firewall Filters, and Traffic
Policers User Guide.
You can specify a timeout period for application inactivity. If the software has not detected any activity
during the duration, the flow becomes invalid when the timer expires. To configure a timeout period,
include the inactivity-timeout statement at the [edit applications application application-name]
hierarchy level:
The default value is 14,400 seconds. The value you configure for an application overrides any global
value configured at the [edit interfaces interface-name service-options] hierarchy level; for more
information, see Configuring Default Timeout Settings for Services Interfaces.
Configuring SIP
The Session Initiation Protocol (SIP) is a generalized protocol for communication between endpoints
involved in Internet services such as telephony, fax, video conferencing, instant messaging, and file
exchange.
The Junos OS provides ALG services in accordance with the standard described in RFC 3261, SIP:
Session Initiation Protocol. SIP flows under the Junos OS are as described in RFC 3665, Session
Initiation Protocol (SIP) Basic Call Flow Examples.
532
NOTE: Before implementing the Junos OS SIP ALG, you should be familiar with certain
limitations, discussed in "Junos OS SIP ALG Limitations" on page 539
The use of NAT in conjunction with the SIP ALG results in changes in SIP header fields due to
address translation. For an explanation of these translations, refer to "SIP ALG Interaction with
Network Address Translation" on page 533.
To implement SIP on adaptive services interfaces, you configure the application-protocol statement at
the [edit applications application application-name] hierarchy level with the value sip. In addition, there
are two other statements you can configure to modify how SIP is implemented:
• You can enable the router to accept any incoming SIP calls for the endpoint devices that are behind
the NAT firewall. When a device behind the firewall registers with the proxy that is outside the
firewall, the AS or Multiservices PIC maintains the registration state. When the learn-sip-register
statement is enabled, the router can use this information to accept inbound calls. If this statement is
not configured, no inbound calls are accepted; only the devices behind the firewall can call devices
outside the firewall.
To configure SIP registration, include the learn-sip-register statement at the [edit applications
application application-name] hierarchy level:
NOTE: The learn-sip-register statement is not applicable to the Next Gen Services MX-SPC3.
You can also manually inspect the SIP register by issuing the show services stateful-firewall sip-
register command; for more information, see the Junos OS System Basics and Services Command
Reference. The show services stateful-firewall sip-register command is not supported for Next Gen
Services.
• You can specify a timeout period for the duration of SIP calls that are placed on hold. When a call is
put on hold, there is no activity and flows might time out after the configured inactivity-timeout
period expires, resulting in call state teardown. To avoid this, when a call is put on hold, the flow
timer is reset to the sip-call-hold-timeout cycle to preserve the call state and flows for longer than
the inactivity-timeout period.
533
NOTE: The sip-call-hold-timeout statement is not applicable to the Next Gen Services MX-
SPC3.
To configure a timeout period, include the sip-call-hold-timeout statement at the [edit applications
application application-name] hierarchy level:
The default value is 7200 seconds and the range is from 0 through 36,000 seconds (10 hours).
The Network Address Translation (NAT) protocol enables multiple hosts in a private subnet to share a
single public IP address to access the Internet. For outgoing traffic, NAT replaces the private IP address
of the host in the private subnet with the public IP address. For incoming traffic, the public IP address is
converted back into the private address, and the message is routed to the appropriate host in the private
subnet.
Using NAT with the Session Initiation Protocol (SIP) service is more complicated because SIP messages
contain IP addresses in the SIP headers as well as in the SIP body. When using NAT with the SIP service,
the SIP headers contain information about the caller and the receiver, and the device translates this
information to hide it from the outside network. The SIP body contains the Session Description Protocol
(SDP) information, which includes IP addresses and port numbers for transmission of the media. The
device translates SDP information for allocating resources to send and receive the media.
How IP addresses and port numbers in SIP messages are replaced depends on the direction of the
message. For an outgoing message, the private IP address and port number of the client are replaced
with the public IP address and port number of the Juniper Networks firewall. For an incoming message,
the public address of the firewall is replaced with the private address of the client.
When an INVITE message is sent out across the firewall, the SIP Application Layer Gateway (ALG)
collects information from the message header into a call table, which it uses to forward subsequent
messages to the correct endpoint. When a new message arrives, for example an ACK or 200 OK, the
ALG compares the “From:, To:, and Call-ID:” fields against the call table to identify the call context of the
message. If a new INVITE message arrives that matches the existing call, the ALG processes it as a
REINVITE.
When a message containing SDP information arrives, the ALG allocates ports and creates a NAT
mapping between them and the ports in the SDP. Because the SDP requires sequential ports for the
Real-Time Transport Protocol (RTP) and Real-Time Control Protocol (RTCP) channels, the ALG provides
consecutive even-odd ports. If it is unable to find a pair of ports, it discards the SIP message.
534
Outgoing Calls
When a SIP call is initiated with a SIP request message from the internal to the external network, NAT
replaces the IP addresses and port numbers in the SDP and binds the IP addresses and port numbers to
the Juniper Networks firewall. Via, Contact, Route, and Record-Route SIP header fields, if present, are
also bound to the firewall IP address. The ALG stores these mappings for use in retransmissions and for
SIP response messages.
The SIP ALG then opens pinholes in the firewall to allow media through the device on the dynamically
assigned ports negotiated based on information in the SDP and the Via, Contact, and Record-Route
header fields. The pinholes also allow incoming packets to reach the Contact, Via, and Record-Route IP
addresses and ports. When processing return traffic, the ALG inserts the original Contact, Via, Route,
and Record-Route SIP fields back into packets.
Incoming Calls
Incoming calls are initiated from the public network to public static NAT addresses or to interface IP
addresses on the device. Static NATs are statically configured IP addresses that point to internal hosts;
interface IP addresses are dynamically recorded by the ALG as it monitors REGISTER messages sent by
internal hosts to the SIP registrar. When the device receives an incoming SIP packet, it sets up a session
and forwards the payload of the packet to the SIP ALG.
The ALG examines the SIP request message (initially an INVITE) and, based on information in the SDP,
opens gates for outgoing media. When a 200 OK response message arrives, the SIP ALG performs NAT
on the IP addresses and ports and opens pinholes in the outbound direction. (The opened gates have a
short time-to-live, and they time out if a 200 OK response message is not received quickly.)
When a 200 OK response arrives, the SIP proxy examines the SDP information and reads the IP
addresses and port numbers for each media session. The SIP ALG on the device performs NAT on the
addresses and port numbers, opens pinholes for outbound traffic, and refreshes the timeout for gates in
the inbound direction.
When the ACK arrives for the 200 OK, it also passes through the SIP ALG. If the message contains SDP
information, the SIP ALG ensures that the IP addresses and port numbers are not changed from the
previous INVITE—if they are, the ALG deletes old pinholes and creates new pinholes to allow media to
pass through. The ALG also monitors the Via, Contact, and Record-Route SIP fields and opens new
pinholes if it determines that these fields have changed.
Forwarded Calls
A forwarded call is when, for example, user A outside the network calls user B inside the network, and
user B forwards the call to user C outside the network. The SIP ALG processes the INVITE from user A
535
as a normal incoming call. But when the ALG examines the forwarded call from B to C outside the
network and notices that B and C are reached using the same interface, it does not open pinholes in the
firewall, because media will flow directly between user A and user C.
Call Termination
The BYE message terminates a call. When the device receives a BYE message, it translates the header
fields just as it does for any other message. But because a BYE message must be acknowledged by the
receiver with a 200 OK, the ALG delays call teardown for five seconds to allow time for transmission of
the 200 OK.
Re-INVITE messages add new media sessions to a call and remove existing media sessions. When new
media sessions are added to a call, new pinholes are opened in the firewall and new address bindings are
created. The process is identical to the original call setup. When one or more media sessions are
removed from a call, pinholes are closed and bindings released just as with a BYE message.
The SIP ALG uses the Session-Expires value to time out a session if a Re-INVITE or UPDATE message is
not received. The ALG gets the Session-Expires value, if present, from the 200 OK response to the
INVITE and uses this value for signaling timeout. If the ALG receives another INVITE before the session
times out, it resets all timeout values to this new INVITE or to default values, and the process is
repeated.
As a precautionary measure, the SIP ALG uses hard timeout values to set the maximum amount of time
a call can exist. This ensures that the device is protected should one of the following events occur:
• End systems crash during a call and a BYE message is not received.
• Poor implementations of SIP proxy fail to process Record-Route and never send a BYE message.
Call Cancellation
Either party can cancel a call by sending a CANCEL message. Upon receiving a CANCEL message, the
SIP ALG closes pinholes through the firewall—if any have been opened—and releases address bindings.
Before releasing the resources, the ALG delays the control channel age-out for approximately five
seconds to allow time for the final 200 OK to pass through. The call is terminated when the five second
timeout expires, regardless of whether a 487 or non-200 response arrives.
536
Forking
Forking enables a SIP proxy to send a single INVITE message to multiple destinations simultaneously.
When the multiple 200 OK response messages arrive for the single call, the SIP ALG parses but updates
call information with the first 200 OK messages it receives.
SIP Messages
The SIP message format consists of a SIP header section and the SIP body. In request messages, the first
line of the header section is the request line, which includes the method type, request-URI, and protocol
version. In response messages, the first line is the status line, which contains a status code. SIP headers
contain IP addresses and port numbers used for signaling. The SIP body, separated from the header
section by a blank line, is reserved for session description information, which is optional. Junos OS
currently supports the SDP only. The SIP body contains IP addresses and port numbers used to
transport the media.
SIP Headers
In the following sample SIP request message, NAT replaces the IP addresses in the header fields to hide
them from the outside network.
How IP address translation is performed depends on the type and direction of the message. A message
can be any of the following:
• Inbound request
• Outbound response
• Outbound request
• Inbound response
Table 52 on page 537 shows how NAT is performed in each of these cases. Note that for several of the
header fields the ALG determine more than just whether the messages comes from inside or outside the
537
network. It must also determine what client initiated the call, and whether the message is a request or
response.
(from public to
private) From: None
Call-ID: None
Via: None
Contact: None
Record-Route: None
Route: None
Call-ID: None
Via: None
Request-URI: N/A
Route: None
Call-ID: None
Request-URI: None
Call-ID: None
Request-URI: N/A
Contact: None
SIP Body
The SDP information in the SIP body includes IP addresses the ALG uses to create channels for the
media stream. Translation of the SDP section also allocates resources, that is, port numbers to send and
receive the media.
The following excerpt from a sample SDP section shows the fields that are translated for resource
allocation.
SIP messages can contain more than one media stream. The concept is similar to attaching multiple files
to an e-mail message. For example, an INVITE message sent from a SIP client to a SIP server might have
the following fields:
Junos OS supports up to 6 SDP channels negotiated for each direction, for a total of 12 channels per
call.
• TCP is not supported as a transport mechanism for signaling messages for MS-MPCs but is
supported for Next Gen Services.
540
• Do not configure the SIP ALG when using STUN. if clients use STUN/TURN to detect the firewall or
NAT devices between the caller and responder or proxy, the client attempts to best-guess the NAT
device behavior and act accordingly to place the call.
• On MS-MPCs, do not use the endpoint-independent mapping NAT pool option in conjunction with
the SIP ALG. Errors will result. This does not apply to Next Gen Services.
• IPv6 signaling data is not supported for MS-MPCs but is supported for Next Gen Services.
• SIP fragmentation is not supported for MS-MPCs but is supported for Next Gen Services.
• The maximum UDP packet size containing a SIP message is assumed to be 9 KB. SIP messages larger
than this are not supported.
• Fully qualified domain names (FQDNs) are not supported in critical fields.
You can specify an SNMP command setting for packet matching. To configure SNMP, include the snmp-
command statement at the [edit applications application application-name] hierarchy level:
The supported values are get, get-next, set, and trap. You can configure only one value for matching.
The application-protocol statement at the [edit applications application application-name] hierarchy
level must have the value snmp.
RELATED DOCUMENTATION
The following example shows an application protocol definition describing a special FTP application
running on port 78:
[edit applications]
application my-ftp-app {
application-protocol ftp;
protocol tcp;
destination-port 78;
timeout 100; # inactivity timeout for FTP service
}
The following example shows a special ICMP protocol (application-protocol icmp) of type 8 (ICMP
echo):
[edit applications]
application icmp-app {
application-protocol icmp;
protocol icmp;
icmp-type icmp-echo;
}
[edit applications]
application-set basic {
http;
ftp;
telnet;
nfs;
icmp;
}
The software includes a predefined set of well-known application protocols. The set includes
applications for which the TCP and UDP destination ports are already recognized by stateless firewall
filters.
542
IN THIS SECTION
This section contains examples of successful output from ALG sessions and information on system log
configuration. You can compare the results of your sessions to check whether the configurations are
functioning correctly.
FTP Example
This example analyzes the output during an active FTP session. It consists of four different flows; two
are control flows and two are data flows. The example consists of the following parts:
Sample Output
MS-MPC Card
For MS-MPCs, the following is a complete sample output from the show services stateful-firewall
conversations application-protocol ftp operational mode command:
For each flow, the first line shows flow information, including protocol (TCP), source address, source
port, destination address, destination port, flow state, direction, and frame count.
• A Watch flow state indicates that the control flow is monitored by the ALG for information in the
payload. NAT processing is performed on the header and payload as needed.
• A Forward flow forwards the packets without monitoring the payload. NAT is performed on the
header as needed.
• The frame count (Frm count) shows the number of packets that were processed on that flow.
• The first address and port in the NAT line are the original address and port being translated for that
flow.
• The second address and port in the NAT line are the translated address and port for that flow.
MX-SPC3 Card
On the MX-SPC3 services card, the following is a complete sample output from the show services
sessions application-protocol ftp operational mode command:
Session ID: 536870919, Service-set: ss1, Policy name: p1/131085, Timeout: 29,
544
Valid
Logical system: root-logical-system
Resource information : FTP ALG, 1, 0
In: 12.10.10.10/44194 --> 22.20.20.3/21;tcp, Conn Tag: 0x0, If: vms-2/0/0.100,
Pkts: 13, Bytes: 585,
Out: 22.20.20.3/21 --> 60.1.1.2/48660;tcp, Conn Tag: 0x0, If: vms-2/0/0.200,
Pkts: 11, Bytes: 650,
Total sessions: 2
• The first line shows flow information, including session ID, service-set name, policy name, session
timeout, logical system name, and its state.
• The second line, Resource information, indicates the session is created by ALG, including the ALG
name (FTP ALG) and ASL group id, which is 1and the ASL resource id, which is 0 for control session
and 1 for data session.
• The third line In is forward flow and the fourth line Out is reverse flow, including the source address,
source port, destination address, destination port, protocol (TCP), session conn-tag, incoming for
Inand outgoing for Out interface, received frame count and bytes. NAT is performed on the header
as needed.
System log messages are generated during an FTP session. For more information about system logs, see
"System Log Messages" on page 552.
MS-MPC Card
The following system log messages are generated during creation of the FTP control flow:
MX-SPC3 CardCard
The following system log messages are generated during creation of the FTP control flow:
Analysis
Control Flows
MS-MPC Card
The control flows are established after the three-way handshake is complete.
• Control flow from FTP client to FTP server. TCP destination port is 21.
• Control flow from FTP server to FTP client. TCP source port is 21.
MX-SPC3 Card
The control flows are established after the three-way handshake is complete.
• Control session from FTP client to FTP server, TCP destination port is 21.
Session ID: 536870919, Service-set: ss1, Policy name: p1/131085, Timeout: 29,
Valid
Logical system: root-logical-system
Resource information : FTP ALG, 1, 0
In: 12.10.10.10/44194 --> 22.20.20.3/21;tcp, Conn Tag: 0x0, If:
vms-2/0/0.100, Pkts: 13, Bytes: 585,
Out: 22.20.20.3/21 --> 60.1.1.2/48660;tcp, Conn Tag: 0x0, If:
vms-2/0/0.200, Pkts: 11, Bytes: 650,
• Data session from FTP client to FTP server, it’s for FTP passive mode.
• Data session from FTP server to FTP client, it’s for FTP active mode:
Data Flows
A data port of 20 is negotiated for data transfer during the course of the FTP control protocol. These
two flows are data flows between the FTP client and the FTP server:
Troubleshooting Questions
• There should be a valid frame count (Frm count) in the control flows.
• A valid frame count in the data flows indicates that data transfer has taken place.
2. What do I need to check if the FTP connection is established but data transfer does not take place?
• Most probably, the control connection is up, but the data connection is down.
• Check the conversations output to determine whether both the control and data flows are
present.
The following is an example of an RTSP conversation. The application uses the RTSP protocol for control
connection. Once the connection is set up, the media is sent using UDP protocol (RTP).
Here is the output from the show services stateful-firewall conversations operational mode command:
Here is the output from the show services sessions application-protocol rtsp operational mode
command:
Analysis
An RTSP conversation should consist of TCP flows corresponding to the RTSP control connection. There
should be two flows, one in each direction, from client to server and from server to client:
• The RTSP control connection for the initiator flow is sent from destination port 554.
• The RTSP control connection for the responder flow is sent from source port 554.
The UDP flows correspond to RTP media sent over the RTSP connection.
Troubleshooting Questions
1. Media does not work when the RTSP ALG is configured. What do I do?
• Check RTSP conversations to see whether both TCP and UDP flows exist.
NOTE: The state of the flow is displayed as Watch, because the ALG processing is taking
place and the client is essentially “watching” or processing payload corresponding to the
application. For FTP and RTSP ALG flows, the control connections are always Watch flows.
551
• You can check for errors by issuing the following command. Each ALG has a separate field for ALG
packet errors.
Enabling system log generation and checking the system log are also helpful for ALG flow analysis. This
section contains the following:
You can configure the enabling of system log messages at a number of different levels in the Junos OS
CLI. As shown in the following sample configurations, the choice of level depends on how specific you
want the event logging to be and what options you want to include. For details on the configuration
options, see the Junos OS Administration Library for Routing Devices (system level) or the Junos OS
Services Interfaces Library for Routing Devices (all other levels).
System log messages are generated during flow creation, as shown in the following examples:
The following system log message indicates that the ASP matched an accept rule:
For a complete listing of system log messages, see the System Log Explorer.
12 PART
CHAPTER 34
IN THIS CHAPTER
Configuring Inline Static Source NAT44 for Next Gen Services | 556
Configuring Inline Static Destination NAT for Next Gen Services | 560
Configuring Inline Twice Static NAT44 for Next Gen Services | 565
IN THIS SECTION
Benefits | 556
Inline static source NAT uses the capabilities of the MPC line card to perform address translation,
eliminating the need for a services card.
Static source NAT performs a one-to-one static mapping of the original private domain host source
address to a public source address. A block of external addresses is set aside for this mapping, and
source addresses are translated as hosts in a private domain originate sessions to the external domain.
Static source NAT does not perform port mapping. For packets outbound from the private network,
static source NAT translates source IP addresses and related fields such as IP, TCP, UDP, and ICMP
header checksums. For inbound packets, static source NAT translates the destination IP address and the
checksums.
556
Benefits
• Allows hosts in the private network to connect with the external domain, while hiding the private
network.
IN THIS SECTION
Configuring the Source Pool for Inline Static Source NAT44 | 556
Configuring the NAT Rule for Inline Static Source NAT44 | 557
Configuring the Service Set for Inline Static Source NAT44 | 558
or
3. Configure a one-to-one static mapping of the original source addresses to the addresses in the
source pool by specifying the first address from the matching source-address prefix that is in the
source NAT rule.
4. To allow the IP addresses of a NAT source pool to overlap with IP addresses in pools used in other
service sets, configure allow-overlapping-pools.
2. Specify the traffic direction to which the NAT rule set applies.
3. Specify the addresses that are translated by the source NAT rule.
To specify one address or prefix value:
To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:
4. Specify the NAT pool that contains the addresses for translated traffic.
5. Configure the generation of a syslog when traffic matches the NAT rule conditions.
[edit services]
user@host# edit service-set service-set-name
2. Configure either an interface service set, which requires a single service interface, or a next-hop
service set, which requires an inside and outside service interface.
3. Specify the NAT rule sets to be used with the service set.
1. Enable inline services for the FPC and PIC slot, and define the amount of bandwidth to dedicate to
inline services.
• If you are using an interface service set, configure one logical unit:
• If you are using a next-hop service set, configure two logical units and define the inside and
outside interfaces:
IN THIS SECTION
Benefits | 560
Inline static destination NAT uses the capabilities of the MPC line card to perform address translation,
eliminating the need for a services card.
Static destination NAT translates the IPv4 destination address of an incoming packet to the IPv4
address of a private server. This redirects traffic destined to a virtual host (identified by the original
destination IP address) to the real host (identified by the translated destination IP address).
Static destination NAT uses a one-to-one mapping between the original address and the translated
address; the mapping is configured statically.
Benefits
• Allows external traffic to communicate with a private host without revealing the host’s private IP
address
IN THIS SECTION
Configuring the Destination Pool for Inline Static Destination NAT | 561
Configuring the NAT Rule for Inline Static Destination NAT | 561
Configuring the Service Set for Inline Static Destination NAT | 563
3. To allow the IP addresses of a NAT destination pool to overlap with IP addresses in pools used in
other service sets, configure allow-overlapping-pools.
2. Specify the traffic direction to which the NAT rule set applies.
3. Specify the source addresses of traffic that the NAT rule applies to.
To specify one address or prefix value:
To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:
4. Specify the destination addresses that the NAT rule applies to.
To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:
5. Specify the NAT pool that contains the destination addresses for translated traffic.
6. Configure the generation of a syslog when traffic matches the destination NAT rule match
conditions.
[edit services]
user@host# edit service-set service-set-name
2. Configure either an interface service set, which requires a single service interface, or a next-hop
service set, which requires an inside and outside service interface.
3. Specify the NAT rule sets to be used with the service set.
1. Enable inline services for the FPC and PIC slot, and define the amount of bandwidth to dedicate to
inline services.
• If you are using an interface service set, configure one logical unit:
• If you are using a next-hop service set, configure two logical units and define the inside and
outside interfaces:
IN THIS SECTION
Benefits | 565
Inline twice static NAT uses the capabilities of the MPC line card to perform address translation,
eliminating the need for a services card.
Twice static NAT translates both the source and destination IP addresses. An addresses is translated
with a one-to-one static mapping to an address in a pool. Port mapping is not performed.
The original private domain host source address is translated to a public source address.
The destination address is translated to the IPv4 address of a private server. This redirects traffic
destined to a virtual host (identified by the original destination IP address) to the real host (identified by
the translated destination IP address).
565
Benefits
• Allows hosts in the private network to connect with the external domain, while hiding the private
network.
• Allows external traffic to communicate with a private host without revealing the host’s private IP
address
IN THIS SECTION
Configuring the Source and Destination Pools for Inline Twice Static NAT44 | 565
Configuring the NAT Rules for Inline Twice Static NAT44 | 566
Configuring the Service Set for Inline Twice Static NAT44 | 569
Configuring the Source and Destination Pools for Inline Twice Static NAT44
To configure the source and destination pools for inline twice static NAT44:
or
3. Configure a one-to-one static mapping of the original source addresses to the addresses in the
source pool by specifying the first address from the matching source-address prefix that is in the
source NAT rule.
4. Create a destination pool. Do not use the same name that you used for the source pool.
6. To allow the IP addresses of a NAT pool to overlap with IP addresses in pools used in other service
sets, configure allow-overlapping-pools.
2. Specify the traffic direction to which the source NAT rule set applies.
3. Specify the addresses that are translated by the source NAT rule.
To specify one address or prefix value:
To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:
4. Specify the source NAT pool that contains the addresses for translated traffic.
5. Configure the generation of a syslog when traffic matches the source NAT rule conditions.
7. Specify the traffic direction to which the destination NAT rule set applies.
8. Specify the destination addresses of traffic that the destination NAT rule applies to.
To specify a range of addresses, configure an address book global address with the desired address
range, and assign the global address to the NAT rule:
9. Specify the destination NAT pool that contains the destination addresses for translated traffic.
10. Configure the generation of a syslog when traffic matches the destination NAT rule match
conditions.
[edit services]
user@host# edit service-set service-set-name
2. Configure either an interface service set, which requires a single service interface, or a next-hop
service set, which requires an inside and outside service interface.
3. Specify the NAT rule sets to be used with the service set.
1. Enable inline services for the FPC and PIC slot, and define the amount of bandwidth to dedicate to
inline services.
• If you are using a next-hop service set, configure two logical units and define the inside and
outside interfaces:
Configuration Statements
CHAPTER 35
Configuration Statements
IN THIS CHAPTER
white-list | 586
application-protocol | 592
application-set | 594
bypass-traffic-on-exceeding-flow-limits | 605
child-inactivity-timeout | 613
clat-ipv6-prefix-length | 614
close-timeout | 618
573
cpu-load-threshold | 622
disable-global-timeout-override | 635
dns-filter | 636
dns-filter-template | 639
ds-lite | 645
fragment-limit | 668
gate-timeout | 672
general-ikeid | 673
global-dns-stats-log-timer | 674
inactivity-timeout | 686
icmp-type | 690
map-e | 721
maximum | 737
next-hop-service | 748
no-bundle-flap | 750
open-timeout | 756
pcp-rules | 757
ports-per-session | 775
reassembly-timeout | 792
redundancy-set | 804
rpc-program-number | 809
security-intelligence | 824
security-intelligence-policy | 827
service-domain | 833
session-limit | 847
snmp-command | 856
softwire-options | 864
source-port | 874
ttl-threshold | 915
url-filter | 917
url-filter-profile | 920
url-filter-template | 921
uuid | 924
v6rd | 926
voice | 933
web-filter | 935
web-filter-profile | 938
xlat-source-rule | 942
IN THIS SECTION
Syntax | 579
Description | 580
Options | 580
Syntax
Hierarchy Level
Description
Configure a range of addresses that can be referenced in the match stanza of a NAT rule.
Options
Release Information
IN THIS SECTION
Syntax | 581
Description | 581
Options | 581
Syntax
Hierarchy Level
Description
Define the addresses or subnets to which source addresses or destination addresses are translated. You
can configure a single address, an address range, a single subnet, or a subnet range.
Options
Release Information
IN THIS SECTION
Syntax | 582
Description | 582
Options | 582
Syntax
address-pooling {
no-paired;
}
Hierarchy Level
Description
Options
no-paired Allow address-pooling no-paired for a source pool without port translation.
Release Information
IN THIS SECTION
Syntax | 583
Description | 584
Options | 584
Syntax
aggregations {
destination-prefix-ipv6-mask prefix-length;
destination-prefix-mask prefix-length;
source-prefix-ipv6-mask prefix-length;
source-prefix-mask prefix-length;
}
Hierarchy Level
Description
Configure intrusion detection service session limits for individual destination subnets or source subnets
rather than individual addresses. This applies session limits to an aggregation of all sessions from or to
an individual subnet of the specified length.
For example, if you configure a value of 24 for destination-prefix-mask, then sessions to 10.1.1.2 and
10.1.1.3 are counted as sessions to the 10.1.1/24 subnet.
Options
• Range: 0 through 32
• Range: 0 through 32
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
585
IN THIS SECTION
Syntax | 585
Description | 585
Syntax
alarm-without-drop;
Hierarchy Level
Description
Configure the IDS screen to log an alarm for an offending packet, but not drop the packet. The screen
skips the rest of the screen checks. The packet is not counted as a dropped packet.
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
white-list
IN THIS SECTION
Syntax | 586
Description | 587
Options | 587
Syntax
white-list name {
destination-address [address];
source-address [address];
}
Hierarchy Level
Description
Configure a list of IP addresses that are exempt from the SYN cookie and SYN proxy mechanisms that
occur during the SYN flood screen protection process. This list of exempt addresses is called an allowlist.
You can also use this statement to configure an allowlist of IP addresses that bypass UDP flood
detection.
NOTE: This statement is not supported to create UDP flood screen allowlists on SRX5400,
SRX5600, and SRX5800 devices
Both IPv4 and IPv6 allowlists are supported. Addresses in the list must be all IPv4 or all IPv6. Each
allowlist can have up to 32 IP address prefixes.
Options
Release Information
Support for UDP flood screen allowlist introduced in Junos OS Release 17.4.
Support for UDP and TCP flood screen allowlists added in Junos OS Release 20.3R1 for Next Gen
Services on MX240, MX480 and MX960 routers.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 588
Description | 588
Syntax
allow-overlapping-pools;
Hierarchy Level
Description
Specify that NAT source or destination pools can have IP addresses that overlap with IP addresses in
pools used in other service sets. However, pools that configure port-block allocation must not overlap
with other pools.
589
Release Information
IN THIS SECTION
Syntax | 589
Description | 589
Syntax
application [application-name]
Hierarchy Level
Description
Specify one or more application protocols to which the NAT rule applies. The number of applications
must not exceed 3072.
590
Release Information
IN THIS SECTION
Syntax | 590
Description | 591
Options | 591
Syntax
application-profile name {
ftp {
data {
dscp dscp;
forwarding-class
forwarding-class;
}
}
sip {
video {
dscp dscp;
forwarding-class
591
forwarding-class;
}
voice {
dscp dscp;
forwarding-class
forwarding-class;
}
}
}
Hierarchy Level
Description
Configure CoS actions for FTP and SIP traffic. The application profile can then be used in CoS rule
actions. This enables you to apply a certain DSCP, or forwarding-class to a set of L7 flows.
Options
Release Information
RELATED DOCUMENTATION
application-protocol
IN THIS SECTION
Syntax | 592
Description | 592
Options | 592
Syntax
application-protocol protocol-name;
Hierarchy Level
Description
Identify the application protocol name. Application protocols are also called application layer gateways
(ALGs).
Options
1. bootp—Bootstrap protocol
2. dce-rpc—DCE RPC
7. h323—H.323
8. icmp—ICMP
11. ip—IP
12. login—Login
13. netbios—NetBIOS
14. netshow—NetShow
17. realaudio—RealAudio
18. rpc—RPC
21. shell—Shell
23. snmp—SNMP
24. sqlnet—SQLNet
27. traceroute—Traceroute
28. winframe—WinFrame
594
Release Information
RELATED DOCUMENTATION
ALG Descriptions
Configuring Application Sets
Configuring Application Properties
Examples: Configuring Application Protocols
Verifying the Output of ALG Sessions
application-set
IN THIS SECTION
Syntax | 595
Description | 595
Options | 595
Syntax
application-set application-set-name {
application application-name;
}
Hierarchy Level
[edit applications]
Description
Options
Release Information
RELATED DOCUMENTATION
ALG Descriptions
Configuring Application Sets
Configuring Application Properties
Examples: Configuring Application Protocols
Verifying the Output of ALG Sessions
596
IN THIS SECTION
Syntax | 596
Description | 596
Syntax
applications { ... }
Hierarchy Level
[edit]
Description
Release Information
RELATED DOCUMENTATION
ALG Descriptions
Configuring Application Sets
Configuring Application Properties
Examples: Configuring Application Protocols
Verifying the Output of ALG Sessions
IN THIS SECTION
Syntax | 597
Description | 597
Options | 598
Syntax
Hierarchy Level
Description
Configure automatic port assignment for source NAT with port translation, except for deterministic
NAT. Automatic port assignment uses the port range 1024 through 65535. Specify either random
allocation or round-robin allocation. Random allocation randomly assigns a port from the range 1024
598
through 65535 for each port translation. Round robin allocation first assigns port 1024, and uses the
next higher port for each successive port assignment. Round robin allocation is the default.
Options
random- Randomly assigns a port from the range 1024 through 65535 for each port
allocation translation.
round-robin First assigns port 1024, and uses the next higher port for each successive port
assignment. Round robin allocation is the default.
Release Information
IN THIS SECTION
Syntax | 598
Description | 599
Syntax
bad-option;
599
Hierarchy Level
Description
Identify and drop any packet with incorrectly formatted IPv4 options or IPv6 extension headers.
Incorrectly formatted IPv4 options or IPv6 extension headers can cause unpredictable issues, depending
on the IP stack implementation of routers and the target.
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
IN THIS SECTION
Syntax | 600
Description | 600
Options | 600
Syntax
block-allocation {
active-block-timeout timeout-interval;
block-size block-size;
interim-logging-interval timeout-interval;
maximum-blocks-per-host maximum-block-number
log disable | enable
}
Hierarchy Level
Description
Allocate a block of ports for each subscriber to use for source NAT with port translation, except for
deterministic NAT. New requests for NAT ports for the subscriber are served from the active block.
With port block allocation, we generate one syslog log per set of ports allocated for a subscriber. This
reduces the number of logs, making it easier to track subscribers.
Options
active-block- The interval, in seconds, for which the block is active. After the timeout, a new
timeout timeout- block is allocated, even if ports are available in the active block. If you set the
interval
timeout to 0, port blocks are filled completely before a new port block is allocated,
and the last port block remains active indefinitely.
• Default: 0
• Default: 128
601
interim-logging- The interval, in seconds, at which to send interim system logs for active port
interval timeout- blocks and for inactive port blocks with live sessions. This increases the reliability
interval
of system logs, which are UDP-based and can get lost in the network.
maximum-blocks- The maximum number of blocks that can be allocated to a subscriber address.
per-host
maximum-block- • Range: 1 through 512
number
• Default: 8
log disable Disable logs for port block allocation. Logs are enbled by default.
Release Information
IN THIS SECTION
Syntax | 602
Description | 602
Syntax
block-frag;
Hierarchy Level
Description
Identify and drop fragmented IP packets. IP fragments might contain an attacker's attempt to exploit the
vulnerabilities in the packet reassembly code of specific IP stack implementations. When the target
receives these packets, the results can range from processing the packets incorrectly to crashing the
entire system.
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
IN THIS SECTION
Syntax | 603
603
Description | 604
Options | 604
Syntax
by-destination {
by-protocol {
icmp {
maximum-sessions number;
packets-rate number;
session-rate number;
}
tcp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
udp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
}
maximum-sessions number;
packet-rate number;
session-rate number;
;
}
Hierarchy Level
Description
Configure session limits for individual destination addresses or for individual destination subnets. This
protects against network probing attacks and network flooding attacks. You can specify limits for
specific protocols (ICMP, TCP, and UDP), or specify limits independent of a protocol. When a session
limit is exceeded for a destination, packets to the destination are dropped until the session limit is no
longer exceeded.
To specify limits for destination subnets rather than individual addresses, include the aggregations
statement at the [edit services screen ids-option screen-name] hierarchy level.
Options
maximum-sessions Specify the maximum number of concurrent sessions allowed for an individual
number destination address or subnet.
packet-rate number Specify the maximum number of packets per second allowed for an individual
destination address or subnet.
session-rate number Specify the maximum number of connections per second allowed for an
individual destination address or subnet.
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
605
bypass-traffic-on-exceeding-flow-limits
IN THIS SECTION
Syntax | 605
Description | 605
Syntax
bypass-traffic-on-exceeding-flow-limits;
Hierarchy Level
Description
Release Information
Statement introduced in Junos OS Release 19.3R2 on MX240, MX480 and MX960 routers using the
MX-SPC3 services card.
606
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 606
Description | 607
Options | 607
Syntax
by-protocol {
icmp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
tcp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
udp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
}
607
Hierarchy Level
Description
Configure session limits for individual destination or source addresses, or for individual destination or
source subnets, for the specified protocol. This protects against network probing attacks and network
flooding attacks. When a session limit is exceeded for a source or destination for the protocol, packets
from the source or to the destination are dropped until the session limit is no longer exceeded.
To specify limits for destination or source subnets rather than individual addresses, include the
aggregations statement at the [edit services screen ids-option screen-name] hierarchy level.
Options
maximum- Specify the maximum number of concurrent ICMP sessions allowed for
sessions number individual destination or source addresses, or for individual destination or
source subnets.
packet-rate Specify the maximum number of ICMP packets per second allowed for
number individual destination or source addresses, or for individual destination or
source subnets.
session-rate Specify the maximum number of ICMP connections per second allowed for
number individual destination or source addresses, or for individual destination or
source subnets.
maximum- Specify the maximum number of concurrent TCP sessions allowed for
sessions number individual destination or source addresses, or for individual destination or
source subnets.
packet-rate Specify the maximum number of TCP packets per second allowed for
number individual destination or source addresses, or for individual destination or
source subnets.
608
session-rate Specify the maximum number of TCP connections per second allowed for
number individual destination or source addresses, or for individual destination or
source subnets.
maximum- Specify the maximum number of concurrent UDP sessions allowed for
sessions number individual destination or source addresses, or for individual destination or
source subnets.
packet-rate Specify the maximum number of UDP packets per second allowed for
number individual destination or source addresses, or for individual destination or
source subnets.
session-rate Specify the maximum number of UDP connections per second allowed for
number individual destination or source addresses, or for individual destination or
source subnets.
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
609
IN THIS SECTION
Syntax | 609
Description | 610
Options | 610
Syntax
by-source {
by-protocol {
icmp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
tcp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
udp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
}
maximum-sessions number;
packet-rate number;
session-rate number;
;
}
610
Hierarchy Level
Description
Configure session limits for individual source addresses or for individual source subnets. This protects
against network probing attacks and network flooding attacks. You can specify limits for specific
protocols (ICMP, TCP, and UDP), or specify limits independent of a protocol. When a session limit is
exceeded for a source, packets from the source are dropped until the session limit is no longer exceeded.
To specify limits for source subnets rather than individual addresses, include the aggregations statement
at the [edit services screen ids-option screen-name] hierarchy level.
Options
maximum-sessions Specify the maximum number of concurrent sessions allowed for an individual
number source address or subnet.
packet-rate number Specify the maximum number of packets per second allowed for an individual
source address or subnet.
session-rate number Specify the maximum number of connections per second allowed for an
individual source address or subnet.
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
611
IN THIS SECTION
Syntax | 611
Description | 611
Options | 611
Syntax
Hierarchy Level
Description
Options
Release Information
child-inactivity-timeout
IN THIS SECTION
Syntax | 613
Description | 613
Options | 614
Syntax
child-inactivity-timeout seconds;
Hierarchy Level
Description
For an IKE ALG application, configure the ESP session (IPsec data traffic) idle timeout. If no IPsec data
traffic is passed on the ESP session in this time, the session is deleted.
The IKE ALG enables the passing of IKEv1 and IPsec packets through NAPT-44 and NAT64 rules
between IPsec peers that are not NAT-T compliant.
614
Options
Release Information
RELATED DOCUMENTATION
ALG Descriptions
Configuring Application Sets
Configuring Application Properties
clat-ipv6-prefix-length
IN THIS SECTION
Syntax | 615
Description | 615
Options | 615
Syntax
Hierarchy Level
[edit services nat source rule-set name rule name then source-nat]
Description
Specify the ipv6 prefix length for CLAT source address. Once you configure this command, source-
address and clat-prefix are no more mandatory configuration. It allows the NAT rules to accept the
traffic from different CLAT prefix and apply XLAT464 based on destination-address of the traffic.
Options
Release Information
IN THIS SECTION
Syntax | 616
Description | 616
Syntax
clat-prefix clat-prefix;
Hierarchy Level
[edit services nat source rule-set rule-set rule rule-name then source-nat]
Description
Specify the customer-side translator (CLAT) IPv6 source prefix, which is used for 464XLAT.
464XLAT lets an IPv4 client with a private IP address connect to an IPv4 host over an IPv6 network. The
CLAT translates IPv4 source addresses to IPv6 by embedding the IPv4 source address in this IPv6
source prefix. The CLAT then sends the packets over an IPv6 network to the MX Series router, which
acts as a provider-side translator (PLAT). The MX translates the embedded IPv4 private IP address to a
public IPv4 address.
Release Information
IN THIS SECTION
Syntax | 617
Description | 617
Syntax
set clear-dont-fragment-bit;
Hierarchy Level
Description
Specify that the don’t fragment (DF) bit for IPv4 packet headers is cleared when the packet length is less
than 1280 bytes. Use this statement when configuring stateful NAT64, deterministic NAPT64, and
464XLAT. This prevents unnecessary creation of an IPv6 fragmentation header when translating IPv4
packets that are less than 1280 bytes.
Release Information
close-timeout
IN THIS SECTION
Syntax | 618
Description | 618
Options | 619
Syntax
close-timeout seconds;
Hierarchy Level
Description
Configure the timeout period for Transmission Control Protocol (TCP) session tear-down.
619
Options
• Default: 1 second
Release Information
Support for Next Gen Services added in Junos OS Release 19.3R2 on MX Series MX240, MX480 and
MX960 using MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 620
Description | 620
Options | 620
Syntax
cos-rule-sets [cos-rule-set-name];
Hierarchy Level
Description
Specify the services CoS rule set to apply to the service set. The service set processes the rules in the
order they appear in the rule set.
The service set that the CoS rule set is assigned to must include at least one stateful firewall rule or NAT
rule, or CoS does not work. Only stateful firewall and NAT rules can be used with CoS rules in a service
set.
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 621
Description | 621
Options | 621
Syntax
cos-rules [cos-rule-name];
Hierarchy Level
Description
Specify the CoS rules to apply to the service set. You can configure multiple rules.
The service set that the CoS rule is assigned to must include at least one stateful firewall rule or NAT
rule, or CoS does not work. Only stateful firewall and NAT rules can be used with CoS rules in a service
set.
Options
Release Information
RELATED DOCUMENTATION
cpu-load-threshold
IN THIS SECTION
Syntax | 622
Description | 623
Options | 623
Syntax
cpu-load-threshold percentage;
Hierarchy Level
Description
Regulate the usage of CPU resources on services cards. When the CPU usage exceeds the configured
value (percentage of the total available CPU resources), the system reduces the rate of new sessions so
that the existing sessions are not affected by low CPU availability. The CPU utilization is constantly
monitored, and if the CPU usage remains above the configured cpu-load-threshold value for a
continuous period of 5 seconds, Junos OS reduces the session rate value configured at edit interfaces
interface-name services-options session-limit rate (Interface Services) by 10%. This is repeated
until the CPU utilization comes down to the configured limit.
Options
Release Information
Support added in Junos OS Release 19.3R2for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
IN THIS SECTION
Syntax | 624
Description | 624
Options | 625
Syntax
cpu-throttle {
percentage percent;
}
Hierarchy Level
Description
Specify the services card CPU utilization percentage that triggers the installation of a dynamic filter on
the PFEs of the line cards for suspicious activity. The dynamic filter drops the suspicious traffic.
In addition to this threshold, at least one of the following conditions is required to trigger the installation
of a dynamic filter:
• The packet rate from an individual source address or to an individual destination address must
exceed four times the configured packet-rate at the [edit services screen ids-option screen-name
limit-session by-source] or [edit services screen ids-option screen-name limit-session by-
destination] hierarchy level.
• The connection rate from an individual source address or to an individual destination address must
exceed four times the configured session-rate at the [edit services screen ids-option screen-name
limit-session by-source] or [edit services screen ids-option screen-name limit-session by-
destination] hierarchy level.
Dynamic filters are not created from IDS screens that use subnet aggregation.
The dynamic filter drops the suspicious traffic at the PFE, without the traffic being processed by the IDS
screen. When the packet or connection rate no longer exceeds four times the limit in the IDS screen, the
dynamic filter is removed.
625
Options
• Default: 90
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
data (FTP)
IN THIS SECTION
Syntax | 626
Description | 626
Default | 626
Syntax
data {
dscp (alias | bits);
forwarding-class class-name;
}
Hierarchy Level
Description
Set the appropriate dscp and forwarding-class value for FTP data.
Default
By default, the system will not alter the DSCP or forwarding class for FTP data traffic.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 627
Description | 627
Options | 627
Syntax
description description;
Hierarchy Level
Description
Enter descriptive text for an IKE policy, an IPsec policy, an IKE proposal, or an IPsec proposal.
Options
Release Information
IN THIS SECTION
Syntax | 628
Description | 628
Options | 629
Syntax
Hierarchy Level
Description
Specify the destination address that the packet must match for the NAT rule to take effect.
629
Options
Release Information
IN THIS SECTION
Syntax | 629
Description | 630
Syntax
destination-address-name address-name;
630
Hierarchy Level
Description
Specify the name of the range of destination addresses that the packet must match for the NAT rule to
take effect. The range of addresses is configured with the address statement at the [edit services
address-book global] hierarchy level.
Release Information
IN THIS SECTION
Syntax | 631
Description | 631
Syntax
destination-prefix destination-prefix;
Hierarchy Level
[edit services nat destination rule-set rule-set rule rule-name then destination-
nat]
Description
Specify the IPv6 prefix that is used to embed an IPv4 destination address in an IPv6 address. The
destination-prefix statement is used in Stateful NAT64 and 464XLAT translations.
Release Information
IN THIS SECTION
Syntax | 632
Description | 632
Options | 632
Syntax
deterministic {
block-size block-size;
host {
address address;
}
include-boundary-addresses;
}
Hierarchy Level
Description
Configure deterministic NAT to ensure that the original internal source IPv4 or IPv6 address and port
always map to the same post-NAT IPv4 address and block of ports. In addition, the reverse mapping of a
given translated external IPv4 address and port are always mapped to the same internal IP address.
Options
• Default: 256
host address The first usable pre-NAT subscriber address, which is used to perform the
address deterministic NAT mapping.
633
include-boundary- Include the translation of the lowest and highest IPv4 addresses (the network and
addresses broadcast addresses) in the source address range of a NAT rule. This does not
apply to IPv6 source addresses.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 634
Description | 634
Options | 634
Syntax
deterministic-nat-configuration-log-interval seconds;
Hierarchy Level
Description
Configure the interval at which the syslog is generated for the deterministic NAT configuration.
Options
• Default: 1800
Release Information
RELATED DOCUMENTATION
disable-global-timeout-override
IN THIS SECTION
Syntax | 635
Description | 635
Syntax
disable-global-timeout-override;
Hierarchy Level
Description
Release Information
Support added in Junos OS Release 20.3R1 for Next Gen Services on MX240, MX480, and MX960
routers.
RELATED DOCUMENTATION
dns-filter
IN THIS SECTION
Syntax | 636
Description | 637
Options | 637
Syntax
dns-filter {
database-file filename;
dns-resp-ttl seconds;
dns-server [ ip-address ];
hash-key key-string;
hash-method hash-method-name;
statistics-log-timer minutes;
wildcarding-level level;
}
637
Hierarchy Level
Description
Configure the settings for filtering DNS requests for disallowed website domains. Filtering can result in
either:
• Blocking access to the site by sending the client a DNS response that includes an IP address or
domain name of a sinkhole server instead of the disallowed domain.
Options
database-file Name of the domain filter database file to use when filtering DNS requests.
filename
dns-resp-ttl Number of seconds to live while sending the DNS response after taking the DNS
seconds sinkhole action.
• Default: 1800
dns-server [ ip- (Optional) IP addresses (IPv4 or IPv6) for up to three specific DNS servers. DNS
address ] filtering examines only DNS requests that are destined for those DNS servers.
hash-key key- Hash key that you used to create the hashed domain name in the domain filter
string database file.
hash-method Hash method that you used to create the hashed domain name in the domain filter
hash-method- database file. The only supported hash method is hmac-sha2-256.
name
statistics-log- Number of minutes in the interval for logging statistics for DNS requests and for
timer minutes sinkhole actions performed for each customer IP address.
638
• Default: 5
• Range: 0 through 60
wildcarding-level Level of subdomains that are searched for a match. A value of 0 indicates that
level subdomains are not searched.
For example, if you set the wildcarding-level to 4 and the database file includes an
entry for example.com, the following comparisons are made for a DNS request that
arrives with the domain 198.51.100.0.example.com:
• 198.51.100.0.example.com: no match
• Range: 0 through 10
Release Information
Support added for Next Gen Services on MX Series routers MX240, MX480 and MX960 with MX-SPC3
services cards in Junos OS Release 19.3R2.
RELATED DOCUMENTATION
dns-filter-template
IN THIS SECTION
Syntax | 639
Description | 640
Options | 640
Syntax
dns-filter-template template-name {
client-interfaces [ client-interface-name ];
client-routing-instance client-routing-instance-name;
dns-filter {
database-file filename;
dns-resp-ttl seconds;
dns-server [ ip-address ];
hash-key key-string;
hash-method hash-method-name;
statistics-log-timer minutes;
wildcarding-level level;
}
server-interfaces [ server-interface-name ];
server-routing-instance server-routing-instance-name;
term term-name {
from {
src-ip-prefix [ source-prefix ];
}
then {
accept;
dns-sinkhole;
}
640
}
}
Hierarchy Level
Description
Configure filtering of DNS requests for disallowed website domains for requests on specific uplink and
downlink logical interfaces or routing instances, or for requests from specific source IP address prefixes.
The DNS filter template overrides the corresponding settings at the DNS profile level. You can configure
up to 32 DNS filter templates in a profile.
• Blocking access to the site by sending the client a DNS response that includes an IP address or
domain name of a sinkhole server instead of the disallowed domain.
Options
client-interfaces (Optional) Client-facing (uplink) logical interfaces on which the DNS filter
[ client-interface- template settings are applied.
name ]
client-routing- (Optional) Client-facing (uplink) routing instance on which the DNS filter
instance client- template settings are applied.
routing-instance-
name
dns-filter-template Name of the DNS filter template.
template-name
dns-sinkhole Perform the sinkhole action identified in the domain filter database for
disallowed DNS requests.
server-interfaces (Optional) Server-facing logical interfaces (downlink) on which the DNS filter
[ server-interface- template settings are applied.
name ]
server-routing- (Optional) Server-facing (downlink) routing instance on which the DNS filter
instance server- template settings are applied.
641
routing-instance-
name
NOTE: If you configure the client and server interfaces or the client and
server routing instances, implicit filters are installed on the interfaces or
routing instances to direct DNS traffic to the MS-MPC for DNS filtering.
If you configure neither the client and server interfaces nor the routing
instances, you must provide a way to direct DNS traffic to the MS-MPC
(for example, via routes).
src-ip-prefix [ source- (Optional) Source IP address prefixes of DNS requests you want to filter. You
prefix ] can configure a maximum of 64 prefixes in a term. If you do not specify any
source prefixes, then all DNS requests are filtered.
term term-name Name for a term. You can configure a maximum of 64 terms in a template.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 642
Description | 642
Default | 642
Syntax
drop-member-traffic {
rejoin-timeout rejoin-timeout;
}
Hierarchy Level
Description
Specify whether the broadband gateway should drop traffic to a services PIC when it fails.
For many-to-one (N:1) high availability (HA) for service applications like Network Address Translation
(NAT), this configuration is valid only when two or more services PICs have failed.
Default
If this statement is not configured, then the default behavior is to drop member traffic with a rejoin
timeout of 120 seconds.
643
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 643
Description | 644
Options | 644
Syntax
Hierarchy Level
Description
Define the Differentiated Services code point (DSCP) mapping that is applied to the packets. Change the
DSCP (or TOS) on the packet to the specified value. Any conformant bit string can be specified, but only
the default alias can be used.
Options
Release Information
RELATED DOCUMENTATION
ds-lite
IN THIS SECTION
Syntax | 645
Description | 645
Options | 646
Syntax
ds-lite ds-lite-softwire-concentrator {
auto-update-mtu;
flow-limit flow-limit | session-limit-per-prefix session-limit-per-
prefix;
mtu-v6 bytes;
softwire-address softwire-address;
}
}
Hierarchy Level
Description
Configure settings for a DS-Lite concentrator used to process IPv4 packets encapsulated in IPv6.
The ds-lite statement is supported on MX Series routers with MS-DPCs and on M Series routers with
MS-100, MS-400, and MS-500 line Multiservices PICs. Starting in Junos OS release 17.4R1, DS-Lite is
supported on MX Series routers with MS-MPCs and MS-MICs.
646
Options
bytes—Maximum transmission unit (MTU), in bytes, for encapsulating IPv4 packets into IPv6. If the final
length is greater than the configured value, the IPv6 packet is fragmented. This option is supported on
MX Series routers equipped with MS-DPCs. Starting in Junos OS release 18.1R1, this option is also
supported on MX Series routers with MS-MPCs or MS-MICs.
Release Information
Support for DS-Lite at the [edit services softwires softwire-types] added in Junos OS release 20.2R1
for Next Gen Services on MX240, MX480 and MX960 routers.
647
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 647
Description | 647
Options | 648
Syntax
ei-mapping-timeout ei-mapping-timeout;
Hierarchy Level
Description
Specify the timeout period for endpoint independent translations that use the NAT pool. Mappings that
are inactive for this amount of time are dropped.
If you do not configure ei-mapping-timeout for endpoint independent translations, then the mapping-
timeout value is used for endpoint independent translations.
648
Options
Release Information
IN THIS SECTION
Syntax | 648
Description | 649
Syntax
enable-asymmetric-traffic-processing;
649
Hierarchy Level
Description
Release Information
IN THIS SECTION
Syntax | 649
Description | 650
Default | 650
Syntax
enable-rejoin;
650
Hierarchy Level
Description
Enable the failed member to rejoin the aggregated Multiservices (AMS) interface after the member
comes back online.
For many-to-one (N:1) high availability (HA) for service applications like Network Address Translation
(NAT), this configuration allows the failed members to rejoin the pool of active members automatically.
Default
If you do not configure this option, then the failed members do not automatically rejoin the ams
interface even after coming back online.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 651
Description | 651
Syntax
enable-subscriber-analysis;
Hierarchy Level
Description
Enable the creation of subscribers if the following are not configured, but you want subscribers to be
created:
• NAT
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 652
Description | 652
Syntax
event-rate rate-per-second;
Hierarchy Level
Description
Rate at which log messages are sent per second to the local file.
653
system
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 653
Description | 654
Options | 654
Syntax
file <filename> <files files> <match match> <size size> <(world-readable | no-
world-readable)>;
654
Hierarchy Level
Description
Options
• Default: 3
• Default: 128k
• Range: through
system
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 655
Description | 655
Options | 656
Syntax
files files;
Hierarchy Level
Description
Options
• Default: 3
system
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 657
Description | 657
Options | 657
Syntax
filename;
Hierarchy Level
Description
Options
system
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 658
Description | 658
Options | 658
Syntax
filtering-type {
endpoint-independent {
prefix-list [allowed-host] except [denied-host ];
}
Hierarchy Level
[edit services nat source rule-set rule-set rule rule-name then source-nat]
Description
Specify prefix lists that contain prefixes of hosts that are allowed to establish inbound connections using
endpoint-independent mapping, and prefix lists for hosts that are not allowed to establish inbound
connections. (Prefix lists are configured at the [edit policy-options] hierarchy level.)
Options
[allowed-host ] Names of the prefix lists for hosts that are allowed to establish connections.
659
except [ denied-host ] Names of prefix lists for hosts that are not allowed to establish connections.
Release Information
IN THIS SECTION
Syntax | 659
Description | 660
Syntax
fin-no-ack;
Hierarchy Level
Description
Identify and drop any packet with a FIN flag set and without the ACK flag set. The TPC FIN No Ack
attack can allow the attacker to identify the operating system of the target or to identify open ports on
the target.
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
IN THIS SECTION
Syntax | 661
Description | 661
Options | 661
Syntax
flag name;
Hierarchy Level
Description
Options
name
• Values:
• cache—Enable interface flags for Web filtering cache maintained on the routing table.
system
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 662
Description | 662
Options | 663
Syntax
format format;
Hierarchy Level
Description
Specify the file format for the log messages being sent to the remote server.
663
Options
binary Binary syslog defined by Juniper Networks. Requires Juniper Networks decoders on the
server side to decode the logs.
system
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 664
Description | 664
Options | 664
Syntax
forwarding-class class-name;
Hierarchy Level
Description
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 665
Description | 665
Options | 665
Syntax
forwarding-class class-name;
Hierarchy Level
Description
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 666
Description | 667
Options | 667
Syntax
forwarding-class class-name;
Hierarchy Level
[edit services cos rule rule-name term term-name then reflexive; | revert; |
reverse {]
Description
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 668
Description | 668
Syntax
fragment;
Hierarchy Level
Description
Identify and drop ICMP packets that are IP fragments. These are considered suspicious packets because
ICMP packets are usually short. When the target receives these packets, the results can range from
processing packets incorrectly to crashing the entire system.
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
fragment-limit
IN THIS SECTION
Syntax | 669
669
Description | 669
Options | 669
Syntax
fragment-limit number-of-fragments;
Hierarchy Level
Description
Configure the maximum number of fragments permitted in a packet before the packet is dropped.
Options
Release Information
Statement added in Junos OS Release 20.3R1 for Next Gen Services on MX240, MX480, and MX960
routers.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 670
Description | 671
Options | 671
Syntax
ftp {
data {
dscp (alias | bits);
forwarding-class class-name;
}
}
671
Hierarchy Level
Description
Configure CoS actions for FTP traffic in an application profile. The application profile can then be used in
CoS rule actions.
Options
dscp (alias | bits) Either a code point alias or a DSCP bit value to apply to the FTP packets.
forwarding-class class-name Forwarding class name to apply to the FTP packets. The choices are:
• assured-forwarding
• best-effort
• expedited-forwarding
• network-control
Release Information
RELATED DOCUMENTATION
gate-timeout
IN THIS SECTION
Syntax | 672
Description | 672
Options | 672
Syntax
gate-timeout seconds;
Hierarchy Level
Description
For an IKE ALG application, configure the length of time that can pass after IKE establishes the security
association between the IPsec client and server and before the ESP traffic starts in both directions. If the
ESP traffic has not started before this timeout value, the ESP gates are deleted and the ESP traffic is
blocked.
The IKE ALG enables the passing of IKEv1 and IPsec packets through NAPT-44 and NAT64 rules
between IPsec peers that are not NAT-T compliant.
Options
Release Information
RELATED DOCUMENTATION
ALG Descriptions
Configuring Application Sets
Configuring Application Properties
general-ikeid
IN THIS SECTION
Syntax | 673
Description | 674
Syntax
general-ikeid;
674
Hierarchy Level
Description
During IKE Phase 1 negotiation, when negotiation request is received, there are two identity checks.
Configure remote-identity to lookup the certificate of the peer for certificate authentication. This
remote-identity should match the corresponding field in the SubjectAltname extension of the peer
certificate for successful detection of peer certificate and authentication.
The identity check with the same IKE-ID is repeated, that is, the IKE-ID validation with remote-identity
and the certificate authentication. To avoid this, during authentication of remote peer, use the general-
ikeid under theset security ike gateway gateway_name dynamic hierarchy level to bypass the validation
process.
Release Information
global-dns-stats-log-timer
IN THIS SECTION
Syntax | 675
Description | 675
Options | 675
Syntax
global-dns-stats-log-timer minutes;
Hierarchy Level
Description
Configure the interval for logging per-client statistics for filtering of DNS requests for disallowed
website domains.
Options
• Default: 5
• Range: 0 through 60
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 676
Description | 677
Options | 677
Syntax
group group-name {
health-check-interface-subunit health-check-interface-subunit;
network-monitoring-profile [profile-name1, <profile-name2>];
real-service-rejoin-options no-auto-rejoin;
real-services [server-list];
<routing-instance routing-instance>;
}
Hierarchy Level
Description
Options
group-name Use the specified string identifier for a group of servers to which sessions
are distributed using the server distribution table in conjunction with the
session distribution API.
group health-check- Use the specified subunit of the ms- interface used for health checking.
interface-subunit health-
check-interface-subunit
network-monitoring- Name of the network monitoring profile used to monitor the health of
profile profile-name1 servers in the group.
real-services server-list Use the specified list of individual servers to which sessions are distributed
using the server distribution table in conjunction with the session
distribution API.
real-services-rejoin- Disable the default behavior that allows a server to rejoin the group
options no-auto-rejoin automatically when it comes up.
routing-instance routing- (Optional) Use the specified routing instance if the default inet.0 is not
instance used.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
678
RELATED DOCUMENTATION
hash-keys (Interfaces)
IN THIS SECTION
Syntax | 678
Description | 678
Options | 679
Syntax
hash-keys {
egress-key (source-ip | destination-ip);
ingress-key (source-ip | destination-ip);
ipv6-source-prefix-length ipv6-source-prefix-length;
}
Hierarchy Level
Description
Configure the hash keys used for load balancing in aggregated multiservices (AMS) for next-hop style
services. The hash keys supported in the ingress and egress direction are the source IP address and
destination IP address.
679
Hash keys are used to define the load-balancing behavior among the various members in the AMS. For
example, if hash-keys is configured as source-ip, then the hashing is performed based on the source IP
address of the packet, so that all packets with the same source IP address land on the same member.
When you use ingress-key and egress-key, you must configure hash keys to take the traffic direction
into consideration. For example, if you configure hash-keys as source-ip in the ingress direction, then
you must configure hash-keys as destination-ip in the egress direction. This is required to ensure that
the packets of the same flow reach the same member of the AMS group.
If you are configuring an AMS interface used in a service set for DS-Lite,
Options
egress-key Use the destination IP address of the flow to compute the hash used in load
destination-ip balancing. Configure the hash keys to be used in the egress flow direction.
egress-key source-ip Use the source IP address of the flow to compute the hash used in load
balancing. Configure the hash keys to be used in the egress flow direction.
ingress-key Use the destination IP address of the flow to compute the hash used in load
destination-ip balancing. Configure the hash keys to be used in the ingress flow direction.
ingress-key source- Use the source IP address of the flow to compute the hash used in load
ip balancing. Configure the hash keys to be used in the ingress flow direction.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card. The ipv6-source-prefix-length option is not supported for
Next Gen Services.
680
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 680
Description | 680
Syntax
header-integrity-check {
enable-all;
}
Hierarchy Level
Description
Drop packets that have packet header anomalies. These anomalies include:
• Not an IP packet
• Bad source/destination IP
681
• IP checksum error
• Protocol error
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
682
IN THIS SECTION
Syntax | 682
Description | 682
Syntax
high-availability-options {
(many-to-one | one-to-one) {
preferred-backup preferred-backup;
}
}
Hierarchy Level
Description
Configure the high availability options for the aggregated multiservices (AMS) interface. For service
applications, if only the load-balancing feature is being used, then this configuration is optional.
For many-to-one (N:1) high availability support for service applications like Network Address Translation
(NAT), the preferred backup services PIC, in hot standby mode, backs up one or more (N) active services
PICs.
683
NOTE: In both cases, if one of the active services PICs goes down, then the backup replaces it as
the active PIC. When the failed PIC comes back up, it becomes the new backup. This is called
floating backup.
One-to-one (1:1) high availability support associates a single backup interface with a single active
interface. 1:1 configuration is supported only on the MS-MPC and MX-SPC3. In 1:1 (stateful)
configurations, synchronization causes the active and back up PICs to synchronize traffic states and data
structures, preventing data loss during a failover event. Stateful synchronization is required for IPsec
high availability support. For IPsec connections, AMS supports 1:1 configuration only.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
load-balancing-options
Understanding Aggregated Multiservices Interfaces
Example: Configuring an Aggregated Multiservices Interface (AMS)
684
IN THIS SECTION
Syntax | 684
Description | 684
Options | 684
Syntax
host host-ip-address;
Hierarchy Level
Description
Options
system
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 685
Description | 685
Options | 686
Syntax
host-address-base ip-address;
Hierarchy Level
Description
For static NAT that is performed on the services card, configure a one-to-one static shifting of a range of
original source addresses to the range of addresses in the source pool by specifying the base address of
the original source address range.
686
For example, if the host address base is 198.51.100.30 and the NAT pool uses the range 203.0.113.10
to 203.0.113.20, then 198.51.100.30 translates to 203.0.113.10, 198.51.100.31 translates to
203.0.113.11, and so on.
Options
Release Information
inactivity-timeout
IN THIS SECTION
Syntax | 686
Description | 687
Options | 687
Syntax
inactivity-timeout seconds;
687
Hierarchy Level
Description
Configure the inactivity timeout period for established flows. The timeout value configured in the
application protocol definition overrides this value.
Options
seconds—Timeout period.
• Default: 30 seconds
Release Information
Support added in Junos OS Release 19.3R2 for MX-SPC3 services card on MX240, MX480 and MX960
routers.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 688
Description | 688
Syntax
inactivity-asymm-tcp-timeout seconds;
Hierarchy Level
Description
Configure the number of seconds that a unidirectional TCP session can be inactive before it is closed.
Valid settings: 4 through 86400 seconds.
Release Information
IN THIS SECTION
Syntax | 689
Description | 689
Syntax
icmp {
fragment;
icmpv6-malformed;
large;
ping-death;
}
Hierarchy Level
Description
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
icmp-type
IN THIS SECTION
Syntax | 690
Description | 690
Options | 691
Syntax
icmp-type value;
Hierarchy Level
Description
Options
value—The ICMP type value, such as echo or echo-reply. For a complete list, see Configuring the ICMP
Code and Type.
Release Information
RELATED DOCUMENTATION
ALG Descriptions
Configuring Application Sets
Configuring the ICMP Code and Type
Examples: Configuring Application Protocols
Verifying the Output of ALG Sessions
IN THIS SECTION
Syntax | 692
Description | 692
Syntax
icmpv6-malformed;
Hierarchy Level
Description
Identify and drop malformed ICMPv6 packets, which might cause damage to the device and network.
Examples of malformed IPv6 packets are packets that are too big (message type 2), that have the next
header set to routing (43), or that have a routing header set to hop-by hop.
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
IN THIS SECTION
Syntax | 693
693
Description | 694
Syntax
ip {
bad-option;
block-frag;
ipv6-extension-header {
AH-header;
ESP-header;
fragment-header;
hop-by-hop-header {
CALIPSO-option;
jumbo-payload-option;
quick-start-option;
router-alert-option;
RPL-option;
SFM-DPD-option;
user-defined-option-type <type-low> to <type-high>;
}
mobility-header;
routing-header;
}
loose-source-route-option;
record-route-option;
security-option;
source-route-option;
stream-option;
strict-source-route-option;
tear-drop;
timestamp-option;
unknown-protocol;
}
694
Hierarchy Level
Description
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
IN THIS SECTION
Syntax | 695
Description | 695
Options | 695
Syntax
ipv6-extension-header {
AH-header;
ESP-header;
fragment-header;
hop-by-hop-header {
CALIPSO-option;
jumbo-payload-option;
quick-start-option;
router-alert-option;
RPL-option;
SFM-DPD-option;
user-defined-option-type <type-low> to <type-high>;
}
mobility-header;
routing-header;
}
Hierarchy Level
Description
Identify and drop IP packets that have the configured IPv6 extension header values.
Options
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
697
IN THIS SECTION
Syntax | 697
Description | 698
Syntax
limit-session {
by-destination{
by-protocol {
icmp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
tcp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
udp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
}
maximum-sessions number;
packet-rate number;
session-rate number;
}
by-source {
by-protocol {
698
icmp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
tcp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
udp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
}
maximum-sessions number;
packet-rate number;
session-rate number;
}
}
Hierarchy Level
Description
Configure session limits for individual destination or source addresses, or for individual destination or
source subnets. This protects against network probing attacks and network flooding attacks. You can
specify limits for specific protocols (ICMP, TCP, and UDP), or specify limits independent of a protocol.
When a session limit is exceeded for a source or destination, packets from the source or to the
destination are dropped until the session limit is no longer exceeded.
To specify limits for destination or source subnets rather than individual addresses, include the
aggregations statement at the [edit services screen ids-option screen-name] hierarchy level.
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
IN THIS SECTION
Syntax | 699
Description | 700
Syntax
inline-services {
bandwidth (1g | 10g | 20g | 30g | 40g | 100g);
}
700
Hierarchy Level
Description
Enable inline services on PICs residing on MPCs and optionally specify a bandwidth for traffic on the
inline service interface.
NOTE: For an MPC, such as MPC2, always configure inline-services at the [chassis fpc slot-
number pic number] hierarchy level. Do not configure inline services for a service card such as
MS-MPC.
The remaining statement is explained separately. Search for a statement in CLI Explorer or click a linked
statement in the Syntax section for details.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 701
Description | 702
Options | 702
Syntax
ipv6-extension-header {
AH-header;
ESP-header;
fragment-header;
hop-by-hop-header {
CALIPSO-option;
jumbo-payload-option;
quick-start-option;
router-alert-option;
RPL-option;
SFM-DPD-option;
user-defined-option-type <type-low> to <type-high>;
}
mobility-header;
routing-header;
}
Hierarchy Level
Description
Identify and drop IP packets that have the configured IPv6 extension header values.
Options
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
IN THIS SECTION
Syntax | 703
Description | 704
Options | 705
Syntax
instance instance-name {
client-interface client-interface;
client-vrf client-vrf;
group group-name {
health-check-interface-subunit health-check-interface-subunit;
network-monitoring-profile profile-name;
real-service-rejoin-options no-auto-rejoin;
real-services [ server-list ];
<routing-instance routing-instance>;
}
interface interface-name;
real-service real-service {
address server-ip-address;
704
admin-down;
}
server-inet-bypass-filter server-inet-bypass-filter ;
server-inet6-bypass-filter server-inet6-bypass-filter ;
server-interface server-interface;
server-vrf server-vrf-name;
virtual-service virtual-service-name {
address virtual-ip–address;
group group-name;
load-balance-method {
hash {
hash-key method;
}
random;
}
mode (layer2-direct-server-return | direct-server-return | translated);
<routing-instance routing-instance-name>;
<routing-metric route-metric>;
server-interface server-interface;
service service-name {
protocol (udp | tcp);
server-listening-port port;
virtual-port virtual-port;
}
}
}
Hierarchy Level
Description
Options
client-interface —For translated mode, client interface where the implicit filter is installed to
client-interface direct the traffic in the forward direction.
client-vrf client-vrf Use the specified name of the routing instance in which the data traffic in the
reverse direction is routed to the clients.
server-inet6-bypass- Name of the firewall filter from which the terms are referenced and added to
filter server-inet6- the server-side implicit filters. This enables the operator to bypass reverse (RIP
bypass-filter
to VIP) translation of IPv6 traffic.
server-interface For translated mode, specifies the server interfaces where the server filters are
server-interface implicitly installed to direct the return traffic to the load balancing next hop.
server-vrf server-vrf- The routing instance in which the data traffic in the forward direction is routed
name to the servers
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
Configuring TLB
IN THIS SECTION
Syntax | 706
Description | 706
Options | 707
Syntax
interface-service {
load-balancing-options {
hash-keys {
egress-key (destination-ip | source-ip);
ingress-key (destination-ip | source-ip);
}
}
service-interface name;
}
Hierarchy Level
Description
Specify the device name for the interface service Physical Interface Card (PIC).
707
Options
service-interface name—Name of the service device associated with the interface-wide service set.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 707
Description | 708
Syntax
land;
708
Hierarchy Level
Description
Identify and drop SYN packets that have the same source and destination address or port, which
protects against land attacks. In a land attack, the target using up its resources as it repeatedly replies to
itself.
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
IN THIS SECTION
Syntax | 709
Description | 709
Syntax
large;
Hierarchy Level
Description
Identify and drop any ICMP frame with an IP length greater than 1024 bytes, which protects against
ICMP large packet attacks.
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
IN THIS SECTION
Syntax | 710
Description | 711
Syntax
limit-session {
by-destination{
by-protocol {
icmp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
tcp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
udp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
}
maximum-sessions number;
packet-rate number;
session-rate number;
}
by-source {
by-protocol {
icmp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
tcp {
maximum-sessions number;
711
packet-rate number;
session-rate number;
}
udp {
maximum-sessions number;
packet-rate number;
session-rate number;
}
}
maximum-sessions number;
packet-rate number;
session-rate number;
}
}
Hierarchy Level
Description
Configure session limits for individual destination or source addresses, or for individual destination or
source subnets. This protects against network probing attacks and network flooding attacks. You can
specify limits for specific protocols (ICMP, TCP, and UDP), or specify limits independent of a protocol.
When a session limit is exceeded for a source or destination, packets from the source or to the
destination are dropped until the session limit is no longer exceeded.
To specify limits for destination or source subnets rather than individual addresses, include the
aggregations statement at the [edit services screen ids-option screen-name] hierarchy level.
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
IN THIS SECTION
Syntax | 712
Description | 713
Syntax
load-balancing-options {
high-availability-options {
(many-to-one | one-to-one) {
preferred-backup preferred-backup;
}
}
member-failure-options {
drop-member-traffic {
rejoin-timeout rejoin-timeout;
}
redistribute-all-traffic {
enable-rejoin;
}
}
hash-keys {
egress-key (destination-ip | source-ip);
ingress-key (destination-ip | source-ip);
}
713
member-interface interface-name;
}
Hierarchy Level
Description
Configure the high availability (HA) options for the aggregated multiservices (AMS) interface.
Many-to-one (N:1) high availability mode for service applications like Network Address Translation
(NAT) is supported. In the case of N:1 high availability mode, one services PIC is the backup (in hot
standby mode) for one or more (N) active services PICs. If one of the active services PICs goes down,
then the backup replaces it as the active services PIC. When the failed PIC comes back online, it
becomes the new backup. This is called floating backup mode. In an N:1 (stateless) configuration, traffic
states and data structures are not synchronized between active PICs and the backup PIC.
You can also configure a one-to-one (1:1) high availability mode. In the 1:1 configuration, a single
interface is configured as the backup for another single active interface. If the active interface goes
down, the backup interface replaces it as the active interface. A 1:1 (stateful) configuration synchronizes
traffic states and data structures between the active services PIC and the backup services PIC. This is
required for IPsec connections. One-to-one high availability is supported on the MS-MPC but it is not
supported for MX-SPC3 in this release.
Load-balancing might not be uniform among member interfaces in certain network deployments. The
variance can be because of a misconfiguration, which causes the traffic itself not to be sufficiently
randomly distributed, causing the hash keys to be ineffective (for example, the hash key is destination IP
but all sessions have only source IP address). The variation can be within the expected range and the
load balancing depends on the IP addresses chosen. The hash calculation performs a checksum on
several bits of the IP address and not only on the last few lower significant bits of the IP address. In such
a scenario, the load-balancing ratio can change, for instance, if the source IP address is changed from
20.0.0.0/24 to 20.0.1.0/24.
The distribution of traffic across member interfaces of an AMS interface is static load-balancing. Flows
are load balanced based on a packet hash on parameters such as source IP or destination IP. Load-
balancing effectiveness depends on the IP address or protocol diversity. For example, if the hash key is
destination IP and all packets have the same destination, then all flows are directed to the same
member. This is flow-level load balancing and not per packet. As a result, traffic between a pair of
addresses may be 10,000 pps, whereas another pair of addresses may have 1 pps. The load of the
former is not distributed among members. High availability is limited to stateless HA. When a backup
714
interface takes over as an active interface, all flows are reestablished (for example. packets may undergo
NAT processing differently after failover).
With a stateful firewall, static NAT as basic-nat44 or destination-nat44, and dynamic NAT as nat64,
napt-44, dynamic-nat44, and with application layer gateways (ALGs) configured, NAT hairpinning is not
supported. Input direction for rule match to be applied is supported only for dynamic NAT types
(NAT64, NAT44, and dynamic-NAT44). Service-set policies need to have input or input-output direction
only. Flows on all active members are reset when the number of actives changes. The resetting of flows
can be avoided at the cost of failed-member's traffic loss using certain options.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 715
Description | 715
715
Options | 715
Syntax
Hierarchy Level
Description
Specify the category for which you want to collect local logs.
Options
system
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 717
Description | 717
Syntax
local-log-tag tag-stamp;
Hierarchy Level
Description
system
718
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 718
Description | 719
Syntax
loose-source-route-option;
Hierarchy Level
Description
Identify and drop IPv4 packets that have the IP option of 3 (Loose Source Routing).
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
IN THIS SECTION
Syntax | 720
Description | 720
Options | 720
Syntax
many-to-one {
preferred-backup preferred-backup;
}
Hierarchy Level
Description
Configure the many-to-one (N:1) preferred backup for the aggregated multiservices (AMS) interface.
NOTE: The preferred backup must be one of the member interfaces (mams–) that have already
been configured at the [edit interfaces interface-name load-balancing-options] hierarchy level.
Even in the case of mobile control plane redundancy, which is one-to-one (1:1), the initial
preferred backup is configured at this hierarchy level.
Options
preferred-backup Use the specified interface as the preferred backup member interface. The member
preferred-backup interface format is mams-a/b/0, where a is the FPC slot number and b is the PIC
slot number.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
721
RELATED DOCUMENTATION
map-e
IN THIS SECTION
Syntax | 721
Description | 722
Options | 722
Syntax
map-e name {
confidentiality;
disable-auto-route;
ea-bits-len ea-bits-len;
ipv4-prefix ipv4-prefix;
mape-prefix mape-prefix;
mtu-v6 mtu-v6;
psid-length psid-length;
psid-offset psid-offset;
softwire-address softwire-address;
v4-reassembly;
v6-reassembly;
version-03;
}
722
Hierarchy Level
Description
Configure Mapping of Address and port – Encapsulation (MAP-E) as an inline service on MX Series
routers that use MPC and MIC interfaces. MAP-E is an automatic tunneling mechanism that
encapsulates IPv4 packets within an IPv6 address. The IPv4 packets are carried in an IPV4-over-IPV6
tunnel from the MAP-E Customer Edge (CE) devices to the MAP-E Provider Edge (PE) devices (also
called as Border Relay (BR) devices) through an IPV6 routing topology, where they are de-tunneled for
further processing.
Options
confidentiality Configure Junos MAP-E confidentiality. This helps to hide MAP-E rule parameters
in CLI show commands and logs.
disable-auto-route Disable auto-routes and enable static routes to facilitate ECMP load balancing.
NOTE: When you enable the disable-auto-route option, you must configure
static routes.
ea-bits-len Configure rule for Embedded Address (EA) length for the MAP-E domain.
NOTE:
• If the sum of v4-prefix-len and ea-bits-len is less than 32, then the psid-
len must be equal to the difference between 32 and the sum total of v4-
prefix-len and ea-bits-len.
723
• Range: 0 through 48
ipv4-prefix Configure rule for IPv4 prefix and length of the MAP-E domain.
• Range: 0 through 32
mape-prefix Configure rule for IPV6 prefix and length for the MAP-E domain. The MAP-E IPv4
and IPv6 prefix must be unique per softwire concentrator.
mtu-v6 (Optional) Specify the Maximum transmission unit (MTU) for the MAP-E softwire
tunnel.
• Default: 9192
psid-length Configure Port Set ID (PSID) length value for the MAP-E domain.
NOTE:
• If the sum of v4-prefix-len and ea-bits-len is less than 32, then the psid-
len must be equal to the difference between 32 and the sum total of v4-
prefix-len and ea-bits-len.
• Range: 0 through 16
psid-offset (Optional) Configure PSID offset value for the MAP-E domain.
• Default: 4
• Range: 0 through 16
softwire-address Specify the Border Relay device unicast IPv6 address as the softwire concentrator
IPV6 address.
system
Release Information
Support added in Junos OS release 20.2R1 at MAP-E for Next Gen Services on MX240, MX480, and
MX960 routers.
IN THIS SECTION
Syntax | 724
Description | 725
Options | 725
Syntax
mapping-timeout mapping-timeout;
Hierarchy Level
Description
Specify the timeout period for address-pooling paired mappings that use the specified NAT pool.
Mappings that are inactive for this amount of time are dropped.
If you do not configure ei-mapping-timeout for endpoint independent translations, then the mapping-
timeout value is used for endpoint independent translations.
Options
• Default: 300
Release Information
IN THIS SECTION
Syntax | 726
Description | 726
Options | 726
Syntax
mapping-type {
address-pooling-paired;
endpoint-independent;
}
Hierarchy Level
[edit services nat source rule-set rule-set rule rule-name then source-nat]
Description
Options
endpoint- Mapping to ensure that the same external address and port are assigned to all
independent connections from a given host.
address-pooling- Mapping to ensure assignment of the same external IP address for all sessions
paired originating from the same internal host.
Release Information
IN THIS SECTION
Syntax | 727
Description | 727
Options | 727
Syntax
match match;
Hierarchy Level
Description
Options
system
728
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 728
Description | 729
Options | 729
Syntax
match {
application [ application-names ];
destination-address address;
destination-address-range low minimum-value high maximum-value;
destination-port port-number;
destination-prefix-list list-name;
source-address address;
source-address-range low minimum-value high maximum-value;
729
source-prefix-list list-name;
}
Hierarchy Level
Description
Configure the matching conditions for a policy in a services CoS rule. Matching conditions include
packet source and destination addresses and packet applications. Packets that are processed by a
service set and that match the conditions are assigned the Differentiated Services (DiffServ) code point
(DSCP) marking and forwarding-class assignments specified in the policy.
The service set that the CoS rule is assigned to must include at least one stateful firewall rule or NAT
rule, or CoS does not work. Only stateful firewall and NAT rules can be used with CoS rules in a service
set.
Options
source-prefix-list list-name Name of a prefix list for matching the source address prefix.
730
You configure the prefix list by using the prefix-list statement at the
[edit policy-options] hierarchy level.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 730
Description | 731
Options | 731
Syntax
match {
application [application-name];
destination-address (address | any);
731
destination-address-excluded address;
source-address (address | any);
source-address-excluded address;
}
Hierarchy Level
Description
Specify the matching properties for a stateful firewall rule policy. When a flow matches these properties,
the policy actions are applied to the flow.
Options
application [application- One or more application protocols of flows to which the stateful firewall
name] policy applies. The application protocol definition is configured at the [edit
applications] hierarchy level.
destination-address The destination address of the flows to which the stateful firewall rule policy
(address | any) applies. The option any matches all destination addresses.
destination-address- The destination address of the flows to which the stateful firewall rule policy
excluded address does not apply.
source-address (address The source address of the flows to which the stateful firewall rule policy
| any) applies. The option any matches all source addresses.
source-address- The source address of the flows to which the stateful firewall rule policy does
excluded address not apply.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 732
Description | 732
Syntax
Hierarchy Level
Description
733
Release Information
IN THIS SECTION
Syntax | 733
Description | 733
Syntax
match-rules-on-reverse-flow;
Hierarchy Level
Description
Configure the service set to create a CoS session even if a packet is first received in the reverse direction
of the matching direction of the CoS rule. The CoS rule values are then applied as soon as a packet in
the correct match direction is received.
734
Release Information
Statement introduced in Junos OS Release 19.3R2 on MX Series routers (MX240, MX480 and MX960)
running Next Gen Services with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 734
Description | 735
Options | 735
Syntax
Hierarchy Level
Description
Set the maximum number of session setups allowed per second for the service set. After this setup rate
is reached, any additional session setup attempts are dropped. If you do not include the max-session-
setup-rate statement, the session setup rate is not limited.
Options
max-session- Use the specified maximum number of session setups per second.
setup-rate
number • Range: 1 through 429,496,729
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 736
Description | 736
Options | 736
Syntax
max-sessions-per-subscriber session-number;
Hierarchy Level
Description
Options
NOTE: There is no default value. You must configure a value for the
configuration to take effect.
Release Information
maximum
IN THIS SECTION
Syntax | 737
Description | 738
Options | 738
Syntax
maximum number;
Hierarchy Level
Description
Specify the maximum number of sessions allowed simultaneously on services cards. If you specify the
maximum number of sessions to be zero, it indicates that the configuration is not effective. You must
specify a value higher than zero for the maximum number of sessions.
Options
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
IN THIS SECTION
Syntax | 739
Description | 739
Default | 741
Syntax
member-failure-options {
drop-member-traffic {
rejoin-timeout rejoin-timeout;
}
redistribute-all-traffic {
enable-rejoin;
}
}
Hierarchy Level
Description
Configure the possible behavior for the aggregated Multiservices (AMS) interface in case of failure of
more than one active member.
Table 53 on page 740 displays the behavior of the member interface after the failure of the first
services PIC. Table 54 on page 740 displays the behavior of the member interface after the failure of
two services PICs.
NOTE: The AMS infrastructure has been designed to handle one failure automatically. However,
in the unlikely event that more than one services PIC fails, the AMS infrastructure provides
configuration options to minimize the impact on existing traffic flows.
740
Table 53: Behavior of Member Interface After One Multiservices PIC Fails
Many-to-one (N:1) high availability support for service Automatically handled by the AMS
applications infrastructure
Table 54: Behavior of Member Interface After Two Multiservices PICs Fail
Many-to-one drop-member- Configured The existing traffic for The existing traffic for
(N:1) high traffic the second failed the second failed
availability member will not be member will not be
support for redistributed to the redistributed to the
service other members. other members.
applications
The first member to The first member will
rejoin becomes an active rejoin the AMS
member. The second automatically. However,
member to rejoin the other members who
becomes the backup. are rejoining will be
This behavior is handled moved to the discard
automatically by the state.
AMS infrastructure.
Default
If member-failure-options are not configured, then the default behavior is to drop member traffic with a
rejoin timeout of 120 seconds.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 742
Description | 742
Options | 742
Syntax
member-interface interface-name;
Hierarchy Level
Description
Specify the member interfaces for the aggregated multiservices (AMS) interface. You can configure
multiple interfaces by specifying each interface in a separate statement.
Starting with Junos OS Release 16.2, an AMS interface can have up to 32 member interfaces. In Junos
OS Release 16.1 and earlier, an AMS interface can have a maximum of 24 member interfaces. If you
configure more than 24 member interfaces, you must set the pic-boot-timeout value to 240 or 300
seconds at the [edit interfaces interface-name multiservice-options] hierarchy level for every services
PIC interface on the MX Series router.
For high availability service applications like Network Address Translation (NAT) that support many-to-
one (N:1) redundancy, you can specify two or more interfaces.
On an MS-MPC, you can configure one-to-one (1:1) redundancy. In a 1:1 (stateful) configuration, a single
backup interface provides redundancy for a single active interface. A 1:1 configuration is required for
IPsec. 1:1 redundancy is not supported on the MX-SPC3 in this release.
NOTE: The member interfaces that you specify must be members of aggregated multiservices
interfaces (mams-).
Options
interface- Name of the member interface. The member interface format is mams-a/b/0, where a
name is the FPC slot number and b is the PIC slot number.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 743
Description | 744
Options | 744
Syntax
mode {
event ;
stream stream-name;
}
744
Hierarchy Level
Description
Options
stream Send messages to one or more remote log servers. Each remote server requires its own stream.
system
Release Information
Support introduced in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240,
MX480 and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 745
Description | 745
Options | 745
Syntax
name;
Hierarchy Level
Description
Options
all Everything
system
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 746
Description | 747
Syntax
nat-options {
nptv6 {
icmpv6-error-messages;
}
}
747
Hierarchy Level
Description
Release Information
IN THIS SECTION
Syntax | 747
Description | 748
Syntax
nat-rule-sets rule-set-name;
748
Hierarchy Level
Description
Release Information
next-hop-service
IN THIS SECTION
Syntax | 748
Description | 749
Options | 749
Syntax
next-hop-service {
inside-service-interface interface-name.unit-number;
749
outside-service-interface interface-name.unit-number;
outside-service-interface-type interface-type;
service-interface-pool name;
}
Hierarchy Level
Description
Specify interface names or a service interface pool for the forwarding next-hop service set. You cannot
specify both a service interface pool and an inside or outside interface.
Options
service-interface-pool name—Name of the pool of logical interfaces configured at the [edit services
service-interface-pools pool pool-name] hierarchy level. You can configure a service interface pool
only if the service set has a PGCP rule configured. The service set cannot contain any other type of rule.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
no-bundle-flap
IN THIS SECTION
Syntax | 750
Description | 751
Syntax
no-bundle-flap;
Hierarchy Level
Description
When you add a new member to an existing AMS bundle, all the existing members and the newly added
member of the AMS bundle go for reboot and disrupts the traffic. To overcome this problem for IPsec
services, configure the no-bundle-flap statement before adding a new member to the AMS bundle.
When you configure no-bundle-flap command and add a new member to the AMS bundle, the existing
members of AMS bundle will not reboot, only the newly added member reboot avoiding the traffic
disruption.
Release Information
IN THIS SECTION
Syntax | 751
Description | 752
Syntax
no-remote-trace;
752
Hierarchy Level
Description
system
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 753
Description | 753
Syntax
no-translation;
Hierarchy Level
Description
Disable port translation for NAT. By default, port translation is enabled for NAT.
Release Information
IN THIS SECTION
Syntax | 754
Description | 754
Options | 754
Syntax
Hierarchy Level
Description
Options
system
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 755
Description | 755
Syntax
off;
Hierarchy Level
Description
Tun off destination address translation for the rule. Use this statement when configuring port forwarding
without destination address translation.
open-timeout
IN THIS SECTION
Syntax | 756
Description | 756
Options | 756
Syntax
open-timeout seconds;
Hierarchy Level
Description
Configure a timeout period for Transmission Control Protocol (TCP) session establishment.
Options
seconds—Timeout period.
• Default: 5 seconds
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
pcp-rules
IN THIS SECTION
Syntax | 757
Description | 758
Options | 758
Syntax
pcp-rules rule-name;
758
Hierarchy Level
Description
Specify the PCP rule to apply to the service set. A PCP rule assigns the PCP server that handles selected
traffic.
PCP is supported on the MS-DPC, MS-100, MS-400, and MS-500 MultiServices PICS. Starting in Junos
OS Release 17.4R1, PCP is also supported on the MS-MPC and MS-MIC. Starting in Junos OS Release
20.1R1, PCP is also supported for Next Gen Services.
Options
Release Information
IN THIS SECTION
Syntax | 759
Description | 759
Syntax
ping-death;
Hierarchy Level
Description
Identify and drop oversized and irregular ICMP packets, which protects against the ping of death attack.
In the ping of death attack, the attacker sends the target ping packets whose IP datagram length (ip_len)
exceeds the maximum legal length (65,535 bytes) for IP packets, and the packets are fragmented. When
the target attempts to reassemble the IP packets, a buffer overflow might occur, resulting in system
crashing, freezing, and restarting.
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
760
IN THIS SECTION
Syntax | 760
Description | 761
Options | 761
Syntax
policy policy-name {
match {
application [ application-names ];
destination-address address;
destination-address-range low minimum-value high maximum-value;
destination-port port-number;
destination-prefix-list list-name;
source-address address;
source-address-range low minimum-value high maximum-value;
source-prefix-list list-name;
}
then {
application-profile profile-name;
dscp (alias | bits);
forwarding-class class-name;
reflexive; | revert; | reverse {
application-profile profile-name;
dscp (alias | bits);
forwarding-class class-name;
}
}
}
761
Hierarchy Level
Description
Configure a policy in a services CoS rule. The policy specifies Differentiated Services (DiffServ) code
point (DSCP) marking and forwarding-class assignment for packets that are processed by a service set.
The policy identifies the matching conditions for packet source and destination addresses and for packet
applications, and the actions to take on those packets. A CoS rule can include multiple policies.
The service set that the CoS rule is assigned to must include at least one stateful firewall rule or NAT
rule, or CoS does not work. Only stateful firewall and NAT rules can be used with CoS rules in a service
set.
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 762
Description | 763
Options | 763
Syntax
policy policy-name {
match {
application [application-name];
destination-address (address | any);
destination-address-excluded address;
source-address (address | any);
source-address-excluded address;
}
then {
count;
deny;
permit;
reject;
}
}
Hierarchy Level
Description
Configure one or more policies in a stateful firewall rule. Each policy identifies the matching conditions
for a flow, and whether or not to allow the flow. Once a policy in the rule matches a flow, that policy is
applied and no other policies in the rule are processed.
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 764
Description | 764
Options | 764
Syntax
pool nat-pool-name{
address address-prefix;
}
Hierarchy Level
Description
Configure a set of addresses used for Network Address Translation (NAT) of destination addresses.
Options
Release Information
IN THIS SECTION
Syntax | 765
Description | 766
Options | 766
Syntax
pool nat-pool-name {
address address-prefix | address address-prefix to address address-prefix;
address-pooling {
}
ei-mapping-timeout ei-mapping-timeout;
host-address-base ip-address;
mapping-timeout mapping-timeout;
pool-utilization-alarm {
clear-threshold value;
raise-threshold value;
}
port {
automatic (random-allocation | round-robin);
block-allocation {
active-block-timeout timeout-interval;
block-size block-size;
interim-logging-interval timeout-interval;
maximum-blocks-per-host maximum-block-number
}
deterministic {
block-size block-size;
host {
address address;
}
766
include-boundary-addresses;
}
deterministic-nat-configuration-log-interval seconds;
no-translation;
preserve-range;
preserve-parity;
range {
port-low to port-high;
(random-allocation | round-robin);
}
}
}
Hierarchy Level
Description
Configure a set of addresses (or prefixes), address ranges, and ports used for Network Address
Translation (NAT) of source addresses.
Options
Release Information
IN THIS SECTION
Syntax | 767
Description | 767
Syntax
pool nat-pool-name;
Hierarchy Level
[edit services nat destination rule-set rule-set rule rule-name then source-nat],
[edit services nat source rule-set rule-set rule rule-name then source-nat]
Description
Specify the name of the NAT pool that contains the addresses or subnets to which addresses are
translated.
Release Information
IN THIS SECTION
Syntax | 768
Description | 768
Options | 768
Syntax
Hierarchy Level
Description
Configure a global default port range for NAT pools that use port translation. This port range is used
when a NAT pool does not specify a port range and does not specify automatic port assignment.
Options
Release Information
IN THIS SECTION
Syntax | 769
Description | 770
Options | 770
Syntax
pool-utilization-alarm {
clear-threshold value;
raise-threshold value;
}
Hierarchy Level
Description
Define the NAT pool utilization level that triggers SNMP traps and the pool utilization level that clears
SNMP traps. For pools that use port-block allocation, the utilization is based on the number of ports
that are used; for pools that do not use port-block allocation, the utilization is based on the number of
addresses that are used.
Options
• Default: There is not default value. Traps are not raised if you do not configure a
value.
Release Information
IN THIS SECTION
Syntax | 771
771
Description | 772
Syntax
port {
automatic (random-allocation | round-robin);
block-allocation {
active-block-timeout timeout-interval;
block-size block-size;
interim-logging-interval timeout-interval;
maximum-blocks-per-host maximum-block-number
}
deterministic {
block-size block-size;
host {
address address;
}
include-boundary-addresses;
}
deterministic-nat-configuration-log-interval seconds;
no-translation;
preserve-range;
preserve-parity;
range {
port-low to port-high;
(random-allocation | round-robin);
}
}
Hierarchy Level
Description
Release Information
IN THIS SECTION
Syntax | 772
Description | 773
Options | 773
Syntax
port-forwarding map-name {
destined-port port-id translated-port port-id;
}
773
Hierarchy Level
Description
Configure a port forwarding map, which translates the original destination port of a packet to a different
port. This translation is a static, one-to-one mapping.
Port forwarding allows a packet to reach a host within a masqueraded, typically private, network, based
on the port number on which the packet was received from the originating host. An example of this type
of destination is the host of a public HTTP server within a private network.
Options
IN THIS SECTION
Syntax | 774
Description | 774
Syntax
port-forwarding-mappings map-name;
Hierarchy Level
Description
Specify the name of the port-forwarding map that the NAT rule uses to translate the original destination
port of a packet to a different port.
IN THIS SECTION
Syntax | 775
Description | 775
Syntax
port-round-robin {
disable;
}
Hierarchy Level
Description
Disable round-robin port allocation for any NAT pools that do not specify an automatic (random-
allocation | round-robin) setting at the [edit services nat source pool nat-pool-name port] hierarchy
level. The automatic (random-allocation | round-robin) setting for a pool overrides the port-round-robin
disable setting.
Release Information
ports-per-session
IN THIS SECTION
Syntax | 776
Description | 776
776
Options | 776
Syntax
ports-per-session ports;
Hierarchy Level
Description
Configure the number of ports required to support Real-Time Transport Protocol (RTP), Real-Time
Control Protocol (RTCP), Real-Time Streaming Protocol (RTSP), and forward error correction (FEC) for
voice and video flows on the Multiservices PIC.
Options
• Default: 2
Release Information
IN THIS SECTION
Syntax | 777
Description | 777
Syntax
preserve-parity;
Hierarchy Level
Description
Assign a port with the same parity (even or odd) as the incoming source port. This feature is not
available if you configure port-block allocation, and is not available for deterministic NAT.
Release Information
IN THIS SECTION
Syntax | 778
Description | 778
Syntax
preserve-range;
Hierarchy Level
Description
For source NAT with port translation, except for deterministic NAT, assign a port within the same range
as the incoming port—either 0 through 1023 or 1024 through 65,535. This feature is not available if you
configure port block allocation.
Release Information
IN THIS SECTION
Syntax | 779
Description | 780
Options | 780
Syntax
profile profile-name {
custom {
cmd priority {
default-real-service-status (down | up);
expect (ascii | binary) receive-string;
port port;
real-service-action (down | up);
send (ascii | binary) send-string;
}
protocol (tcp | udp);
}
failure-retries number-of-retries;
http {
host hostname;
method (get | option);
port http-port-number;
url url;
}
icmp;
probe-interval interval;
recovery-retries number-of-recovery-retries;
ssl-hello {
port port;
ssl-version;
780
}
tcp {
port tcp-port-number;
}
}
Hierarchy Level
Description
Configure a monitoring profile that can be used for health-checking a group of TLB servers.
Options
cmd priority Use the specified command priority to send for a custom probe.
• Values: 1 or 2
default-real-service- Assign a server status for when the probe times out. The up
status (down | up) value is used when the server or the intermediate network
nodes are only expected to send a negative response to a
probe.
• Default: down
expect (ascii | binary) Use the specified ascii or binary string as an expected probe
receive-string response.
protocol (tcp | udp) Use the selected protocol for custom probes.
real-service-action Assign a server status for when the expected response to the
(down | up) probe is received.
781
• Default: down
send (ascii | binary) Send the specified ascii or binary string as a probe.
send-string
• Range: 1 through 512 characters
failure-retries Use the specified number of probes that are sent after which the real server is tagged
number-of- as down.
retries
• Default: 5
host hostname Use the specified hostname for HTTP probes for server health
checks.
method (get | option) Use the get or option HTTP method for server health checks.
port http-port-number Use the specified port number for HTTP probes.
url url Use the specified URL for HTTP probes. Maximum length is
128 bytes.
probe-interval Use the specified interval of time, in seconds, at which health check probes are sent.
interval
• Default: 5
recovery- Use the specified number of successful probe attempts after which the server is
retries declared up.
number-of-
recovery- • Default: 5
retries
ssl-hello Use a Client Hello for server health checks
port port Use the specified port number for Client Hello server health checks.
• Default: 3
port tcp-port-number Use the specified port number for TCP probes.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 783
Description | 784
Options | 785
Syntax
profile profile-name {
dns-filter {
database-file filename;
dns-resp-ttl seconds;
dns-server [ ip-address ];
hash-key key-string;
hash-method hash-method-name;
statistics-log-timer minutes;
wildcarding-level level;
}
dns-filter-template template-name {
client-interfaces [ client-interface-name ];
client-routing-instance client-routing-instance-name;
dns-filter {
database-file filename;
dns-resp-ttl seconds;
dns-server [ ip-address ];
hash-key key-string;
hash-method hash-method-name;
statistics-log-timer minutes;
wildcarding-level level;
}
server-interfaces [ server-interface-name ];
server-routing-instance server-routing-instance-name;
term term-name {
from {
src-ip-prefix [ source-prefix ];
}
then {
accept;
dns-sinkhole;
}
}
}
global-dns-stats-log-timer minutes;
url-filter-database filename;
(url-filter-template | template) template-name {
client-interfaces [ client-interface-name1 client-interface-name2 ];
disable-url-filtering;
dns-resolution-interval minutes;
784
dns-resolution-rate seconds;
dns-retries number;
dns-routing-instance dns-routing-instance-name;
dns-server [ ip-address1 ip-address2 ip-address3 ];
dns-source-interface loopback-interface-name;
dns-routing-instance dns-routing-instance-name;
routing-instance routing-instance-name;
server-interfaces [ server-interface-name1 server-interface-name2 ];
term term-name {
from {
src-ip-prefix [prefix1 prefix2];
dest-port [port1 port2];
}
then {
accept;
custom-page custom-page;
http-status-code http-status-code;
redirect-url redirect-url;
tcp-reset;
}
}
url-filter-database filename
}
Description
A URL filter profile is for filtering access to disallowed URLs. A URL filter profile includes a general
database setting and templates. The template settings apply to specific interfaces or to access from
specific source IP address prefixes, and override the database setting at the profile level.
785
A DNS filter profile is used to filter DNS requests for disallowed website domains. A DNS filter profile
includes general DNS filtering settings and up to 32 templates. The template settings apply to DNS
requests on specific interfaces or to DNS requests from specific source IP address prefixes, and override
the corresponding settings at the profile level. You can configure up to eight DNS filter profiles.
NOTE: For URL filtering, use the url-filter-template option starting in Junos OS Release 18.3R1
and use the template option in Junos OS Releases before 18.3R1.
Options
url-filter-database filename Specify the filename of the URL filter database. This option is mandatory.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
protocol (Applications)
IN THIS SECTION
Syntax | 786
Description | 786
Options | 786
Syntax
protocol type;
Hierarchy Level
Description
Options
1. ah
2. egp
3. esp
4. gre
787
5. icmp
6. icmp6
7. igmp
8. ipip
9. ospf
10. pim
11. rsvp
12. tcp
13. udp
Release Information
RELATED DOCUMENTATION
ALG Descriptions
Configuring Application Sets
Configuring Application Properties
Examples: Configuring Application Protocols
Verifying the Output of ALG Sessions
788
IN THIS SECTION
Syntax | 788
Description | 788
Options | 789
Syntax
range {
port-low to port-high;
(random-allocation | round-robin);
}
Hierarchy Level
Description
To configure a range of ports to assign to a pool, specify the low and high values for the port. If you do
not configure automatic port assignment, you must configure a range of ports. This statement applies to
source NAT with port translation, but not to deterministic NAT.
If you specify a range, ports are selected a round-robin fashion. If you specify a range of ports to assign,
the automatic statement is ignored.
789
Options
random-allocation Randomly assigns a port from the range 1024 through 65535 for each port
translation.
round-robin First assigns port 1024, and uses the next higher port for each successive port
assignment. Round robin allocation is the default.
Release Information
IN THIS SECTION
Syntax | 790
Description | 790
Options | 790
Syntax
rate new-sessions-per-second;
Hierarchy Level
Description
Specify the maximum number of new sessions allowed per second on services cards.
Options
rate new-sessions-per-second Specify the maximum number of new sessions allowed per second.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
791
IN THIS SECTION
Syntax | 791
Description | 791
Options | 791
Syntax
real-service real-service-name {
address server-ip-address;
admin-down;
}
Hierarchy Level
Description
Options
real-service-name Identifier for a server to which sessions can be distributed using the server
distribution table in conjunction with the session distribution API.
792
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
reassembly-timeout
IN THIS SECTION
Syntax | 793
Description | 793
Options | 793
Syntax
reassembly-timeout seconds;
Hierarchy Level
Description
The maximum acceptable time, in seconds, from the receipt of the first and latest fragments in a packet.
When the number is exceeded, the packet is dropped.
Options
• Range: 1 to 60 seconds.
• Default: 4 seconds.
Release Information
Statement added in Junos OS Release 20.3R1 for Next Gen Services on MX240, MX480, and MX960
routers.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 794
Description | 794
Syntax
record-route-option;
Hierarchy Level
Description
Identify and drop IPv4 packets that have the IP option of 7 (Record Route).
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
IN THIS SECTION
Syntax | 795
Description | 795
Syntax
redistribute-all-traffic {
enable-rejoin;
}
Hierarchy Level
Description
Enable the option to redistribute traffic of a failed active member to the other active members.
For many-to-one (N:1) high availability support for Network Address Translation (NAT), the traffic for
the failed member is automatically redistributed to the other active members.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 796
Description | 797
Options | 797
Syntax
redundancy-event event-name {
monitor {
797
<link-down interface-name;>
<peer {
(mastership-acquire | mastership-release);
}>
<process routing abort;>
<process routing restart;>
}
]
Hierarchy Level
Description
Configure events monitored to trigger change of primary role and routing using inter-chassis
redundancy.
Options
process routing abort (Optional, and only applies to Next Gen Services) Monitor process routing
daemon (rpd) terminate requests.
process routing restart (Optional) Monitor process routing daemon (rpd) restart requests.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 798
Description | 799
Options | 799
Syntax
redundancy-options {
primary mams-a/b/0;
secondary mams-a/b/0;
}
799
Hierarchy Level
Description
Configure warm standby for an aggregated multiservices (AMS) interface. Specify a primary and a
secondary (backup) member services interface for the AMS interface. The primary interface is the
service interface that you want to back up, and it is the active interface unless it fails. The secondary
interface is the backup interface, and does not handle any traffic unless the primary interface fails. You
can use the same services interface as the backup in multiple warm standby AMS interfaces.
You cannot use both the redundancy-options and the load-balancing-options statements in the same
AMS interface.
Options
primary mams-a/b/0 Name of the primary services interface, where a is the FPC slot number and b
is the PIC slot number.
secondary mams- Name of the secondary (backup) services interface, where a is the FPC slot
a/b/0 number and b is the PIC slot number.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 800
Description | 800
Options | 801
Syntax
redundancy-options {
redundancy-local {
data-address address;
}
redundancy-peer {
ipaddress address;
}
replication-threshold seconds;
routing-instance instance-name;
apply-groups (apply-groups-except |redundancy-local | redundancy-peer)
replication-options (apply-groups | apply-groups-except | mtu | replication-
threshold | replication-threshold routing-instance )
}
Hierarchy Level
Description
Specify the primary and secondary (backup) adaptive services PIC interfaces.
801
Options
seconds Length of time that the flow remains active for replication.
apply-groups apply-groups- Specify the groups from which NOT to inherit the configuration.
except
apply-groups redundancy- Specify information for the local peer.
local
apply-groups redundancy- Specify information for peer.
peer
replication-options apply- Specify groups from which to inherit the configuration.
groups
replication-options apply- Specify the groups from which NOT to inherit the configuration.
groups-except
replication-options mtu Specify the maximal packet size for the replicated data.
replication-options Specify the duration for which flow should remain active for replication.
replication-threshold
• Range: 60 through 3600 seconds
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card (interfaces of type vms-x/y/z).
RELATED DOCUMENTATION
Configuring Inter-Chassis Stateful Synchronization for Long Lived NAT and Stateful Firewall Flows
(MS-MPC, MS-MIC) (Release 16.1 and later)
Inter-Chassis High Availability for MS-MIC and MS-MPC (Release 15.1 and earlier)
IN THIS SECTION
Syntax | 802
Description | 803
Options | 803
Syntax
redundancy-policy policy-name {
redundancy-events [event-list] {
then {
acquire-mastership;
<add-static-route destination {
(next-hop next-hop | receive);
routing-instance routing-instance
}>
<broadcast-warning> ;
<delete-static-route destination {
routing-instance routing-instance;
}>
803
<(release-mastership | release-mastership-force);>
}
}
}
Hierarchy Level
[edit policy-options]
Description
Specify the actions to be taken for redundancy events. These include acquiring or releasing primary role
and adding or deleting static routes.
Options
add-static-route (Optional) Use the specified destination IP address and prefix for an added
destination signal route.
delete-static-route (Optional) Use the specified destination IP address and prefix for a deleted
destination signal route.
event-list List of names of one or more monitored events that trigger the actions
specified in this policy.
next-hop Interface name for the next hop for an added signal route.
routing-instance routing- (Optional) Name of the vrf used for the added signal route.
instance
804
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
redundancy-set
IN THIS SECTION
Syntax | 804
Description | 805
Options | 805
Syntax
redundancy-set redundancy-set {
healthcheck-timer-interval healthcheck-timer-interval;
hold-time hold-time;
805
keepalive keepalive;
redundancy-group redundancy-group;
redundancy-policy [redundancy-policy-list]
}
Hierarchy Level
[edit services]
Description
Options
hold-time Maximum wait time for a health check response. When this time expires, the
peer is considered down.
redundancy-group Redundancy group identifier. This must match a redundancy group ID in the
ICCP configuration.
redundancy-policy-list Names of one or more redundancy policies applied to the redundancy set.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 806
Description | 807
Options | 807
Syntax
redundancy-set-id redundancy-set;
807
Hierarchy Level
Description
Specify the identifier of the redundancy set to use in the stateful synchronization of services for a
service set.
Options
redundancy-set Identifier for the redundancy set. The identifier can be a number from 1-100.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 808
Description | 808
Default | 808
Options | 809
Syntax
rejoin-timeout rejoin-timeout;
Hierarchy Level
Description
Configure the time by when failed members (members in the DISCARD state) should rejoin the
aggregated Multiservices (AMS) interface automatically. All members that do not rejoin by the
configured time are moved to the INACTIVE state and the traffic meant for each of the members is
dropped.
If multiple members fail around the same time, then they are held in the DISCARD state using a single
timer. When the timer expires, all the failed members move to INACTIVE state at the same time.
Default
If you do not configure a value, the default value of 120 seconds is used.
809
Options
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
rpc-program-number
IN THIS SECTION
Syntax | 810
Description | 810
Options | 810
Syntax
rpc-program-number number;
Hierarchy Level
Description
Options
Release Information
RELATED DOCUMENTATION
ALG Descriptions
Configuring an RPC Program Number
Examples: Configuring Application Protocols
Verifying the Output of ALG Sessions
811
IN THIS SECTION
Syntax | 811
Description | 811
Syntax
rtlog {
name {
apply-groups group-names;
apply-groups-except group-names;
flag name;
file filename,
no-remote-trace;
}
}
Hierarchy Level
[edit services]
Description
system
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 812
Description | 813
Syntax
rule rule-name {
match {
application [application-name]
destination-address (NAT Next Gen Services) (address | any-unicast);
destination-address-name address-name;
813
Hierarchy Level
Description
Configure a destination NAT rule, which translates the destination address of IP packets.
Release Information
IN THIS SECTION
Syntax | 814
Description | 815
Options | 815
Syntax
rule rule-name {
match-direction (input | input-output | output);
policy policy-name {
match {
application [ application-names ];
destination-address address;
destination-address-range low minimum-value high maximum-value;
destination-port port-number;
destination-prefix-list list-name;
source-address address;
source-address-range low minimum-value high maximum-value;
source-prefix-list list-name;
}
then {
application-profile profile-name;
dscp (alias | bits);
forwarding-class class-name;
reflexive; | revert; | reverse {
application-profile profile-name;
dscp (alias | bits);
forwarding-class class-name;
}
}
815
}
}
Hierarchy Level
Description
Configure a services CoS rule, which specifies Differentiated Services (DiffServ) code point (DSCP)
marking and forwarding-class assignment for packets that are processed by a service set. The CoS rule
identifies the matching conditions for packet source and destination addresses and for packet
applications, and the actions to take on those packets.
The service set that the CoS rule is assigned to must include at least one stateful firewall rule or NAT
rule, or CoS does not work. Only stateful firewall and NAT rules can be used with CoS rules in a service
set.
Options
Release Information
RELATED DOCUMENTATION
rule (PCP)
IN THIS SECTION
Syntax | 816
Description | 817
Options | 817
Syntax
rule rule-name {
match-direction (input | output);
term term-name {
from {
application-sets set-name;
applications [ application-name ];
destination-address address <except>;
817
Hierarchy Level
Description
Configure a rule to assign the port control protocol (PCP) server that handles selected traffic. PCP
enables hosts to operate servers for a long time (as in the case of a webcam) or a short time (for
example, while playing a game or on a phone call) when behind a NAT device, including when behind a
carrier-grade NAT operated by their ISP. PCP enables applications to create mappings from an external
IP address and port to an internal IP address and port.
PCP is supported on the MS-DPC, MS-100, MS-400, and MS-500 MultiServices PICS. Starting in Junos
OS Release 17.4R1, PCP is also supported on the MS-MPC and MS-MIC.
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 818
Description | 819
Syntax
rule rule-name {
match {
application [application-name]
destination-address (NAT Next Gen Services) address;
destination-address-name address-name;
source-address (address | any-unicast);
source-address-name address-name;
}
then {
source-nat {
clat-prefix clat-prefix;
filtering-type {
819
endpoint-independent {
prefix-list [allowed-host] except [denied-host];
}
}
mapping-type {
endpoint-independent;
}
pool nat-pool-name;
secure-nat-mapping {
eif-flow-limit number-of-flows;
mapping-refresh (inbound | inbound-outbound | outbound);
}
}
syslog;
}
}
Hierarchy Level
Description
Configure a source NAT rule, which translates the source address of IP packets.
Release Information
IN THIS SECTION
Syntax | 820
Description | 820
Options | 820
Syntax
rule-set rule-set-name {
[ rule rule-name ];
}
Hierarchy Level
Description
Configure a set of services CoS rules. You can then assign the rule set to a service set, which processes
the rules in the order they appear. Once a rule matches the packet, the router performs the
corresponding action, and no further rules are applied.
Options
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 821
Description | 822
Options | 822
Syntax
rule-set rule-set-name {
match-direction (input | output);
rule rule-name {
then {
ds-lite ds-lite-concentrator-name
map-e map-e-concentrator-name
v6rd v6rd-softwire-concentrator;
822
}
}
Hierarchy Level
Description
Options
rule-set rule-set-name Name of the rule set that contains the rule.
ds-lite ds-lite-softwire-concentrator Name of the softwire concentrator that the rule assigns to a flow.
map-e map-e-softwire-concentrator Name of the softwire concentrator that the rule assigns to a flow.
v6rd v6rd-softwire-concentrator Name of the softwire concentrator that the rule assigns to a flow.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 823
Description | 823
Options | 824
Syntax
secure-nat-mapping {
eif-flow-limit number-of-flows;
mapping-refresh (inbound | inbound-outbound | outbound);
}
Hierarchy Level
[edit services nat source rule-set rule-set rule rule-name then source-nat]
Description
For endpoint-independent mapping, configure the maximum number of simultaneous inbound flows and
the direction in which mappings are refreshed.
824
Options
Release Information
security-intelligence
IN THIS SECTION
Syntax | 824
Description | 825
Options | 825
Syntax
authentication {
auth-token auth-token;
tls-profile tls-profile;
825
traceoptions {
no-remote-trace;
file [ filename <files number> <size bytes> <match expression> <world-
readable | no-world-readable>];
flag [all | feed | ipc];
level [all| error | info | notice | verbose | warning];
no-remote-trace;
url url;
Hierarchy Level
[edit services]
Description
You can configure security intelligence profiles and policies to work with security intelligence feeds, such
as infected hosts and C&C. You then configure a firewall policy to include the security intelligence policy,
for example, block outgoing requests to a C&C host.
Options
authentication Configure authentication, such as an auth token or TLS profile, to commute with the
feed server. This operation is performed by the ops script used to enroll your devices
and is typically not required afterwards. If you have problems establishing a connection
with the Juniper Sky ATP cloud server, we recommend that you rerun the ops script
instead of manually entering all the CLI commands.
url url-address Configure the URL of the feed server. This operation is performed by the ops script
used to enroll your devices and is typically not required afterwards. If you have
problems establishing a connection with the Juniper Sky ATP cloud server, we
recommend that you rerun the ops script instead of manually entering all the CLI
commands.
Release Information
Statement introduced in Junos OS Release 19.3R2 on MX Series routers with Juniper Sky Advanced
Threat Prevention (ATP).
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240,
MX480, and MX960. This support runs inline on the MPC card.
827
security-intelligence-policy
IN THIS SECTION
Syntax | 827
Description | 828
Options | 828
Syntax
security-intelligence-policy {
threat-level threat-level;
threat-action {
drop
drop-and-log
drop-and-sample
drop-log-and-sample
log
log-and-sample
sample
}
}
Hierarchy Level
Description
Define the threat level and action for the Web filter profile. The packets are redirected at the Packet
Forwarding Engine based on the configured threat-level action associated with the threat-level of the
destination IP address.
Options
threat- Define the Web filtering threat level. The value ranges from 1 through 10
level
threat- Define the way the Packet Forwarding Engine processes packets in response to a threat.
action Only one action can be configured for each threat level that is defined. The default threat-
action is accept.
• drop-log-and-sample—Drop, sample, and allow the packets, and generate a log message.
Release Information
Statement introduced in Junos OS Release 19.3R1 on MX Series routers with Juniper Sky Advanced
Threat Prevention (Juniper Sky ATP) .
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240,
MX480, and MX960 with the MX-SPC3 services card
829
RELATED DOCUMENTATION
web-filter
IN THIS SECTION
Syntax | 829
Description | 829
Syntax
security-option;
Hierarchy Level
Description
Identify and drop IPv4 packets that have the IP option of 2 (Security).
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
server (pcp)
IN THIS SECTION
Syntax | 830
Description | 831
Options | 831
Syntax
server server-name {
ipv4-address ipv4-address;
ipv6-address ipv6-address;
long-lifetime-error long-lifetime-error;
mapping-lifetime-max mapping-lifetime-max;
mapping-lifetime-min mapping-lifetime-min;
max-mappings-per-client max-mappings-per-client;
nat-options {
pool pool-name ;
}
pcp-options {
prefer-failure;
third-party;
831
}
short-lifetime-error short-lifetime-error;
softwire-concentrator softwire-concentrator-name;
}
Hierarchy Level
Description
Configure PCP server options. PCP enables hosts to operate servers for a long time (as in the case of a
webcam) or a short time (for example, while playing a game or on a phone call) when behind a NAT
device, including when behind a carrier-grade NAT operated by their ISP. PCP enables applications to
create mappings from an external IP address and port to an internal IP address and port.
PCP is supported on the MS-DPC, MS-100, MS-400, and MS-500 MultiServices PICS. Starting in Junos
OS Release 17.4R1, PCP is also supported on the MS-MPC and MS-MIC. Starting in Junos OS Release
20.1R1, PCP is also supported for Next Gen Services.
Options
mapping-lifetime- Maximum lifetime, in seconds, for PCP mapping. If the PCP client requests a
max lifetime less than the maximum configured, the server will assign the maximum
lifetime and respond accordingly.
mapping-lifetime- Minimum lifetime, in seconds, for PCP mapping. If a PCP client requests a lifetime
min less than the minimum configured, the server will assign a minimum lifetime and
respond accordingly.
max-mappings-per- Maximum number of PCP mappings that the PCP client can request.
client
• Default: 32
• Range: 1 through 32
pool-name Name of the NAT pool to use for PCP mapping. You can identify multiple pools. If
you do not specify a NAT pool for mapping, the Junos OS performs a partial rule
match based on the source IP, source port, and protocol, and the Junos OS uses
the NAT pool configured for the first matching rule to allocate mappings for PCP.
prefer-failure Generate an error message when the PCP client requests a specific IP address or
port that is not available, rather than assigning another available address from the
NAT pool.
• Default: 30 seconds
Release Information
RELATED DOCUMENTATION
service-domain
IN THIS SECTION
Syntax | 833
Description | 833
Options | 834
Syntax
Hierarchy Level
Description
Specify the service interface domain. If you specify this interface using the next-hop-service statement
at the [edit services service-set service-set-name] hierarchy level, the interface domain must match that
specified with the inside-service-interface and outside-service-interface statements.
834
Options
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 835
Description | 835
Options | 835
Syntax
service-interface interface-name;
Hierarchy Level
Description
Specify the name for the services interface associated with an interface-wide service set.
Options
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 836
Description | 837
Options | 837
Syntax
services-options {
enable-subscriber-analysis
fragment-limit;
jflow-log {
message-rate-limit messages-per-second;
}
session-limit {
maximum number;
rate new-sessions-per-second;
cpu-load-threshold percentage;
}
flow
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
packet-filter filter-name {
conn-tag session-conn
837
destination-port port-identifier;
destination-prefix address;
interface interface-name;
protocol protocol-identifier;
source-port port-identifier;
source-prefix address;
}
rate-limit messages-per-second;
trace-level (brief | detail | error);
}
Hierarchy Level
Description
Define the service options to be applied on the virtual multi-service (VMS) interface.
Options
filename Name of the file to receive the output of the tracing operation.
Enclose the name within quotation marks. All files are placed in the
directory /var/log. By default, the name of the file is the name of the
process being traced.
files number Maximum number of trace files. When a trace file named trace-file
reaches its maximum size, it is renamed to trace-file.0, then trace-
file.1, and so on, until the maximum number of trace files is reached.
The oldest archived file is overwritten.
• Default: 10 files
match Refine the output to include lines that contain the regular expression.
regular-
expression
size Maximum size of each trace file, in kilobytes (KB), megabytes (MB), or
maximum- gigabytes (GB). When a trace file named trace-file reaches this size, it
file-size
is renamed trace-file.0. When the trace-file again reaches its
maximum size, trace-file.0 is renamed trace-file.1 and trace-file is
renamed trace-file.0. This renaming scheme continues until the
maximum number of trace files is reached. Then the oldest trace file is
overwritten.
If you specify a maximum file size, you also must specify a maximum
number of trace files with the files option and a filename.
• Range: 0 KB through 1 GB
• Default: 128 KB
world- By default, log files can be accessed only by the user who configures
readable | no- the tracing operation. The world-readable option enables any user to
world-
readable read the file. To explicitly set the default behavior, use the no-world-
readable option.
flag Trace operation to perform. To specify more than one trace operation, include multiple
flag statements.
brief Trace key flow information, such as message types sent between SPU and
central point, policy match, and packet drop reasons.
detail Trace extensive flow information, such as detailed information about sessions
and fragments. Detail is the default level.
error Trace error information, such as system failure, unknown message type, and
packet drop.
fragment-limit Specify the maximum number of fragments to be supported for the PIC. This overrides
the value specified, if any, in the set security flow fragment-limit statement.
reassembly- Specify the reassembly timeout value for all fragmentation packets for the PIC. This
timeout overrides the value specified, if any, in the set security flow reassembly-timeout
statement
840
Release Information
Support introduced in Junos OS Release 20.3R1 for Next Gen Services on MX240, MX480 and MX960
routers for the flow configuration statement.
service-set (Interfaces)
IN THIS SECTION
Syntax | 840
Description | 841
Options | 841
Syntax
service-set service-set-name;
Hierarchy Level
Description
Define one or more service sets to be applied to an interface. If you define multiple service sets, the
router software evaluates the filters in the order in which they appear in the configuration.
Options
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
service-set (Services)
IN THIS SECTION
Syntax | 842
Description | 844
842
Options | 845
Syntax
service-set service-set-name {
allow-multicast;
captive-portal-content-delivery-profile;
cos-options {
match-rules-on-reverse-flow;
}
cos-rules [cos-rule-name];
extension-service service-name {
provider-specific-rules-configuration;
}
(ids-rules rule-name | ids-rule-sets rule-set-name);
interface-service {
load-balancing-options {
hash-keys {
egress-key (destination-ip | source-ip);
ingress-key (destination-ip | source-ip);
}
}
service-interface interface-name;
}
ipsec-vpn-options {
anti-replay-window-size bits;
clear-dont-fragment-bit;
ike-access-profile profile-name;
local-gateway address;
no-anti-replay;
no-certificate-chain-in-ike;
passive-mode-tunneling;
trusted-ca [ ca-profile-names ];
tunnel-mtu bytes;
udp-encapsulation {
<udp-dest-port destination-port>;
843
}
}
ip-reassembly-rules rule-name};
(ipsec-vpn-rules rule-name | ipsec-vpn-rule-sets rule-set-name);
max-flows number;
max-drop-flows {
ingress ingress-flows;
egress egress-flows;
}
max-session-setup-rate max-setup-rate;
nat-options {
land-attack-check (ip-only | ip-port);
max-sessions-per-subscriber session-number;
stateful-nat64 {
clear-dont-fragment-bit;
}
}
(nat-rules rule-name | nat-rule-sets rule-set-name);
next-hop-service {
inside-service-interface interface-name.unit-number;
outside-service-interface interface-name.unit-number;
outside-service-interface-type local;
service-interface-pool name;
}
pcp-rules rule-name;
(pgcp-rules rule-name | pgcp-rule-sets rule-set-name);
(ptsp-rules rule-name | ptsp-rule-sets rule-set-name);
service-set-options {
bypass-traffic-on-exceeding-flow-limits;
bypass-traffic-on-pic-failure;
disable-session-open-syslog;
enable-asymmetric-traffic-processing;
header-integrity-check;
routing-engine-services;
support-uni-directional-traffic;
}
snmp-trap-thresholds {
flows high high-threshold | low low-threshold;
nat-address-port high-threshold | low low-threshold;
}
}
softwire-options {
844
dslite-ipv6-prefix-length dslite-ipv6-prefix-length;
}
(softwire-rules rule-name | softwire-rule-sets rule-set-name);
(stateful-firewall-rules rule-name | stateful-firewall-rule-sets rule-set-
name);
syslog {
host hostname {
class {
alg-logs;
deterministic-nat-configuration-log;
ids-logs;
nat-logs;
packet-logs;
pcp-logs;
session-logs <open | close>;
stateful-firewall-logs ;
}
services severity-level;
facility-override facility-name;
interface-service prefix-value;
port port-number;
services severity-level;
}
}
(web-filter-profile | url-filter-profile) profile-name;
}
Hierarchy Level
[edit services]
Description
NOTE: Use the web-filter-profile option starting in Junos OS Release 18.3R1 and use the url-
filter-profile option in Junos OS Releases before 18.3R1.
845
Options
service-set-name—Name of the service set. You can include special characters, such as a forward slash
(/), colon (:), or a period (.).
Release Information
web-filter-profile option added in Junos OS Release 18.3R1, replacing the deprecated url-filter-profile
option.
max-session-setup-rate option added in Junos OS Release 19.1R1, replacing the deprecated option
max-session-creation rate, which was added in Junos OS Release 17.1R1.
Support added in Junos 20.2R1 for Next Gen Services NAT PT feature.
846
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 846
Description | 847
Syntax
service-set-options {
bypass-traffic-on-exceeding-flow-limits;
disable-global-timeout-override;
disable-session-open-syslog ;
enable-asymmetric-traffic-processing;
inactivity-non-tcp-timeout ;
max-sessions-per-subscriber
session-limit;
session-timeout;
tcp-session {
inactivity-asymm-tcp-timeout ;
inactivity-tcp-timeout ;
open-timeout ;
tcp-fast-open ;
tcp-mss ;
tcp-non-syn ;
tcp-tickles ;
}
}
847
Hierarchy Level
Description
disable-session-open-syslog Disable session open information from being collected in system logs.
inactivity-non-tcp-timeout Specify the inactivity timeout period for non-TCP established sessions.
Release Information
RELATED DOCUMENTATION
session-limit
IN THIS SECTION
Syntax | 848
Description | 848
Syntax
session-limit {
maximum number;
rate (Interface Services) new-sessions-per-second;
cpu-load-threshold percentage;
}
Hierarchy Level
Description
Restrict the maximum number of sessions and the session rate on services cards.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
849
IN THIS SECTION
Syntax | 849
Description | 849
Options | 849
Syntax
session-limit {
maximum number;
}
Hierarchy Level
Description
Specify the maximum number of sessions allowed simultaneously on the service set. If you specify the
maximum number of sessions to be zero, it indicates that the configuration is not effective. You must
specify a value higher than zero for the maximum number of sessions.
Options
Release Information
IN THIS SECTION
Syntax | 850
Description | 851
Options | 851
Syntax
session-timeout seconds;
Hierarchy Level
Description
Define session lifetime for the service set in seconds. The session is closed after this amount of time,
even if traffic is running on the session.
Options
seconds—Duration of session.
Release Information
IN THIS SECTION
Syntax | 851
Description | 852
Syntax
severity severity;
852
Hierarchy Level
Description
• INFO — Informational
system
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 853
Description | 853
Options | 854
Syntax
sip {
data {
dscp (alias | bits);
forwarding-class class-name;
}
}
Hierarchy Level
Description
Configure CoS actions for SIP traffic in an application profile. The application profile can then be used in
CoS rule actions.
854
Options
dscp (alias | bits) Either a code point alias or a DSCP bit value to apply to the SIP packets.
forwarding-class class-name Forwarding class name to apply to the SIP packets. The choices are:
• assured-forwarding
• best-effort
• expedited-forwarding
• network-control
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 855
Description | 855
Options | 855
Syntax
size size;
Hierarchy Level
Description
Options
• Default: 128k
• Range: through
system
Release Information
RELATED DOCUMENTATION
Configuring System Logging to One or More Remote Servers for Next Gen Services | 130
Configuring Local System Logging for Next Gen Services | 128
snmp-command
IN THIS SECTION
Syntax | 856
Description | 856
Options | 856
Syntax
snmp-command command;
Hierarchy Level
Description
Options
Release Information
RELATED DOCUMENTATION
ALG Descriptions
Configuring an SNMP Command for Packet Matching
Examples: Configuring Application Protocols
Verifying the Output of ALG Sessions
IN THIS SECTION
Syntax | 857
Description | 858
Options | 858
Syntax
snmp-trap-thresholds {
flow high percent low percent;
nat-address-port high percent low percent;
858
Hierarchy Level
Description
Options
session Specify the low and high session threshold limits for generating SNMP traps.
system
Release Information
IN THIS SECTION
Syntax | 859
Description | 859
859
Options | 859
Syntax
softwire-name v6rd-softwire-concentrator {
ipv4-prefix ipv4-prefix;
mtu-v4 number-of-bytes;
softwire-concentrator address;
softwire-type v6rd;
v6rd-prefix v6rd-prefix
}
Hierarchy Level
Description
Configure a 6rd softwire concentrator. A 6rd softwire allows an IPv6 end user to send traffic over an
IPv4 network to reach an IPv6 network. The softwire concentrator decapsulates IPv6 packets that were
encapsulated in IPv4 packets by a software initiator at the customer edge WAN, and forwards the
packets for IPv6 routing.
Options
mtu-v4 number-of-bytes The size, in bytes, of the maximum transmission unit for IPv6 packets
encapsulated in IPv4. Compute this as the maximum expected IPv4 packet
size plus 20. Packets that are larger than the configured value are dropped.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 861
Description | 861
Syntax
softwires {
rule-set name {
match-direction (input | output);
rule name {
then {
(ds-lite ds-lite | map-e map-e | v6rd v6rd);
}
}
}
softwire-name name {
}
softwire-types {
}
traceoptions {
file <filename> <files files> <match match> <size size> <(world-readable
| no-world-readable)>;
flag name;
no-remote-trace;
}
}
Hierarchy Level
[edit services]
Description
system
Release Information
IN THIS SECTION
Syntax | 862
Description | 862
Options | 863
Syntax
softwire-name v6rd-softwire-concentrator {
ipv4-prefix ipv4-prefix;
mtu-v4 number-of-bytes;
softwire-concentrator address;
softwire-type v6rd;
v6rd-prefix v6rd-prefix
}
Hierarchy Level
Description
Configure a 6rd softwire concentrator. A 6rd softwire allows an IPv6 end user to send traffic over an
IPv4 network to reach an IPv6 network. The softwire concentrator decapsulates IPv6 packets that were
encapsulated in IPv4 packets by a software initiator at the customer edge WAN, and forwards the
packets for IPv6 routing.
863
Options
mtu-v4 number-of-bytes The size, in bytes, of the maximum transmission unit for IPv6 packets
encapsulated in IPv4. Compute this as the maximum expected IPv4 packet
size plus 20. Packets that are larger than the configured value are dropped.
Release Information
RELATED DOCUMENTATION
softwire-options
IN THIS SECTION
Syntax | 864
Description | 864
Options | 864
Syntax
softwire-options {
dslite-ipv6-prefix-length dslite-ipv6-prefix-length ;
}
Hierarchy Level
Description
Specify the IPv6 prefix length associated with a subscriber’s basic broadband bridging device that is
subject to a limited number of sessions.
This feature is supported on MX Series routers equipped with MS-DPCs. Starting in Junos OS Release
18.2R1, this option is also supported on MS-MPCs and MS-MICs.
Options
dslite-ipv6-prefix-length Subnet prefix representing the size of the subnet subject to session limitation.
865
Release Information
Support added in Junos OS 20.2R1 for Next Gen Services on MX240, MX480, and MX960 routers.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 866
Description | 866
Options | 866
Syntax
softwire-types {
ds-lite ds-lite-softwire-concentrator {
auto-update-mtu;
flow-limit flow-limit | session-limit-per-prefix session-limit-per-
prefix;
mtu-v6 bytes;
softwire-address address;
}
map-e
v6rd v6rd-softwire-concentator {
ipv4-prefix ipv4-prefix;
v6rd-prefix ipv6-prefix;
mtu-v4 mtu-v4;
}
}
Hierarchy Level
Description
Options
mtu-v4 Maximum transmission unit (MTU), in bytes (576 through 9192), for IPv6
packets encapsulated into IPv4. If the final length is greater than the
configured value, the IPv4 packet is dropped. This option is mandatory except
for DS-Lite softwires since it depends on other network parameters under
administrator control.
mtu-v6 Maximum transmission unit when encapsulating IPv4 packets into IPv6. If the
final length is greater than the MTU, the IPv6 packet is fragmented. This
option is mandatory since it depends on other network parameters under
administrator control.
• Values: v6rd
br-address Specify the Border Relay (BR) device unicast IPv6 address as the softwire
concentrator IPV6 address.
NOTE: When you enable the disable-auto-route option, you must configure
static routes.
ea-bits-length Configure rule for Embedded Address (EA) length for the MAP-E domain.
• Range: 0 through 48
psid-length Configure Port Set ID (PSID) length value for the MAP-E domain.
NOTE:
• If the sum of v4-prefix-len and ea-bits-len is less than 32, then the psid-
len must be equal to the difference between 32 and the sum total of v4-
prefix-len and ea-bits-len.
• Range: 0 through 16
psid-offset (Optional) Configure PSID offset value for the MAP-E domain.
• Default: 4
• Range: 0 through 16
mtu-v6 (Optional) Specify the Maximum transmission unit (MTU) for the MAP-E softwire
tunnel.
• Default: 9192
Release Information
Statement introduced in Junos OS Release 20.2 for Next Gen Services on MX240, MX480 and MX960.
IN THIS SECTION
Syntax | 869
Description | 869
Syntax
softwires-rule-set softwire-rule-set-name;
Hierarchy Level
Description
Specify the softwire rule-set that contains the rule to be used with the service set.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 870
Description | 870
Syntax
source-address address;
Hierarchy Level
Description
Specify the IP address of the source for Next Gen Services system log messages.
871
BEST PRACTICE: The syslog source address can be any arbitrary IP address. It does not have to
be an IP address that is assigned to the device. Rather, this IP address is used on the syslog
collector to identify the syslog source. The best practice is to configure the source address as the
IP address of the interface that the traffic is sent out on.
system
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 872
Description | 872
Options | 872
Syntax
Hierarchy Level
Description
Specify the source address that the packet must match for the NAT rule to take effect.
Options
Release Information
IN THIS SECTION
Syntax | 873
873
Description | 873
Syntax
source-address-name address-name;
Hierarchy Level
Description
Specify the name of the range of source addresses that the packet must match for the NAT rule to take
effect. The range of addresses is configured with the address statement at the [edit services address-
book global] hierarchy level.
Release Information
source-port
IN THIS SECTION
Syntax | 874
Description | 874
Options | 874
Syntax
source-port port-number;
Hierarchy Level
Description
Options
port-value—Identifier for the port. For a complete list, see Configuring Source and Destination Ports.
Release Information
RELATED DOCUMENTATION
ALG Descriptions
Configuring Application Properties
Configuring Source and Destination Ports
Verifying the Output of ALG Sessions
IN THIS SECTION
Syntax | 875
Description | 876
Syntax
source-route-option;
Hierarchy Level
Description
Identify and drop IPv4 packets that have either the IP option of 3 (Loose Source Routing) or the IP
option of 9 (Strict Source Routing).
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
IN THIS SECTION
Syntax | 876
Description | 877
Syntax
stateful-firewall-rules [rule-name];
877
Hierarchy Level
Description
Specify the stateful firewall rules to be used with the service set. A stateful firewall rule is configured at
the [edit services policies] hierarchy level.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 878
Description | 878
Options | 878
Syntax
stateful-firewall-rule-set {
stateful-firewall-rule [rule-name];
]
Hierarchy Level
Description
Specify a set of stateful firewall rules, which are processed in the order in which they appear in the rule
set configuration. Once a stateful firewall rule in the rule set matches a flow, that rule is applied and no
other rules in the rule set are processed˙.
Options
stateful-firewall- Names of the stateful firewall rules that belong to the rule set. A stateful firewall
rule [rule-name] rule is configured at the [edit services policies] hierarchy level.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 879
Description | 879
Syntax
stateful-firewall-rule-sets [rule-set-name];
Hierarchy Level
Description
Specify the stateful firewall rule sets to be used with the service set. A stateful firewall rule set is
configured at the [edit services policies] hierarchy level.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 880
Description | 880
Options | 881
Syntax
Hierarchy Level
Description
Options
severity debug
category screen
format sd-syslog
host
system
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 882
Description | 882
Syntax
stream-option;
Hierarchy Level
Description
Identify and drop IPv4 packets that have the IP option of 8 (Stream ID).
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
IN THIS SECTION
Syntax | 883
Description | 883
883
Syntax
strict-source-route-option;
Hierarchy Level
Description
Identify and drop IPv4 packets that have the IP option of 9 (Strict Source Routing).
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
884
IN THIS SECTION
Syntax | 884
Description | 884
Options | 884
Syntax
syn-ack-ack-proxy {
threshold number;
}
Hierarchy Level
Description
Configure the maximum number of connections from an IP address that can be opened without being
completed. Once this threshold has been reached, further connection requests are rejected. In the SYN-
ACK-ACK attack, the session table can fill up, resulting in the device rejecting legitimate connection
requests.
Options
threshold number Maximum number of uncompleted connections from any single IP address.
885
• Default: 512
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
IN THIS SECTION
Syntax | 885
Description | 886
Syntax
syn-fin;
886
Hierarchy Level
Description
Identify and drop packets that have both the SYN and FIN flags set, which can cause unpredictable
behavior.
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
IN THIS SECTION
Syntax | 887
Description | 887
Syntax
syn-frag;
Hierarchy Level
Description
Identify and drop SYN packet fragments. In TCP SYN fragment attacks, the target caches SYN
fragments, waiting for the remaining fragments to arrive so it can reassemble them and complete the
connection. A flood of SYN fragments eventually fills the host’s memory buffer, preventing valid traffic
connections.
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
IN THIS SECTION
Syntax | 888
888
Description | 888
Syntax
syslog;
Hierarchy Level
Description
Enable system logging. The system log information from the Multiservices and Services PICs is passed to
the kernel for logging in the /var/log directory. This setting overrides any syslog statement setting
included in the service set or interface default configuration.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 889
Description | 889
Options | 889
Syntax
syslog ;
Hierarchy Level
Description
Options
system
890
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 890
Description | 891
Syntax
tcp-no-flag;
Hierarchy Level
Description
Identify and drop TCP packets that have no flag fields set. A TCP no flag attack can cause unpredictable
behavior on the target.
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
IN THIS SECTION
Syntax | 891
Description | 892
Options | 892
Syntax
tcp-session {
inactivity-asymm-tcp-timeout ;
892
inactivity-tcp-timeout ;
open-timeout ;
tcp-fast-open ;
tcp-mss ;
tcp-non-syn ;
tcp-tickles ;
}
Hierarchy Level
Description
Options
close-timeout Timeout period for TCP session tear-down (2. through 300 seconds)
"inactivity-asymm-tcp-timeout
" on page 688
"tcp-tickles" on page 893 Number of TCP keep-alive packets to be sent for bidirectional TCP
flows
tcp-mss Enable the limit on TCP Max. Seg. Size in SYN packets
Release Information
IN THIS SECTION
Syntax | 893
Description | 893
Syntax
tcp-tickles tcp-tickles;
Hierarchy Level
Description
Define the maximum number of keep-alive messages sent before a TCP session is allowed to timeout.
Release Information
IN THIS SECTION
Syntax | 894
Description | 894
Syntax
tear-drop;
Hierarchy Level
Description
Identify and drop fragmented IP packets that overlap, which protects against teardrop attacks. In
teardrop attacks, the target machine uses up its resources as it attempts to reassemble the packets, and
then it can no longer process valid traffic.
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
IN THIS SECTION
Syntax | 895
Description | 896
Options | 896
Syntax
then {
application-profile profile-name;
dscp (alias | bits);
forwarding-class class-name;
reflexive; | revert; | reverse {
application-profile profile-name;
dscp (alias | bits);
forwarding-class class-name;
}
}
896
Hierarchy Level
Description
Specify the Differentiated Services (DiffServ) code point (DSCP) marking and forwarding-class
assignments for packets that are processed by a service set and that match the conditions of the policy
in a services CoS rule.
The service set that the CoS rule is assigned to must include at least one stateful firewall rule or NAT
rule, or CoS does not work. Only stateful firewall and NAT rules can be used with CoS rules in a service
set.
Options
application-profile The application profile that sets the CoS actions for FTP and SIP traffic.
profile-name
dscp (alias | bits) Either a code point alias or a DSCP bit value to apply to the packet.
forwarding-class Forwarding class name to apply to the packet. The choices are:
class-name
• assured-forwarding
• best-effort
• expedited-forwarding
• network-control
reflexive Applies the CoS rule policy actions to flows in the reverse direction as well as to
flows in the matching direction.
revert Stores the DSCP and forwarding class of a packet that is received in the match
direction of the rule and then applies that DSCP and forwarding class to packets
that are received in the reverse direction of the same session.
reverse Specifies actions to apply to flows in the reverse direction of the matching
direction.
897
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 897
Description | 898
Options | 898
Syntax
then {
count;
deny;
permit;
reject;
}
898
Hierarchy Level
Description
Specify the actions for a stateful firewall rule policy. The policy actions are applied to flows that meet
the policy’s matching properties.
Options
count Enables a count, in bytes or kilobytes, of all network traffic the policy allows to pass.
reject Drop the packets. For TCP traffic, send a TCP reset (RST) segment to the source host. For UDP
traffic, send an ICMP destination unreachable, port unreachable message (type 3, code 3) to
the source host.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 899
Description | 899
Syntax
timestamp-option;
Hierarchy Level
Description
Identify and drop IPv4 packets that have the IP option of 4 (Internet timestamp).
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
IN THIS SECTION
Syntax | 900
Description | 901
Options | 901
Syntax
traceoptions {
file {
filename;
files number;
match regular-expression;
size maximum-file-size;
(world-readable | no-world-readable);
}
flag flag;
no-remote-trace;
packet-filter filter-name {
conn-tag session-conn
destination-port port-identifier;
destination-prefix address;
interface interface-name;
protocol protocol-identifier;
source-port port-identifier;
source-prefix address;
}
901
rate-limit messages-per-second;
trace-level (brief | detail | error);
}
Hierarchy Level
Description
Options
filename Name of the file to receive the output of the tracing operation. Enclose
the name within quotation marks. All files are placed in the
directory /var/log. By default, the name of the file is the name of the
process being traced.
files number Maximum number of trace files. When a trace file named trace-file
reaches its maximum size, it is renamed to trace-file.0, then trace-file.1,
and so on, until the maximum number of trace files is reached. The
oldest archived file is overwritten.
• Default: 10 files
match Refine the output to include lines that contain the regular expression.
regular-
expression
size Maximum size of each trace file, in kilobytes (KB), megabytes (MB), or
maximum- gigabytes (GB). When a trace file named trace-file reaches this size, it is
file-size
renamed trace-file.0. When the trace-file again reaches its maximum
size, trace-file.0 is renamed trace-file.1 and trace-file is renamed trace-
902
If you specify a maximum file size, you also must specify a maximum
number of trace files with the files option and a filename.
• Range: 0 KB through 1 GB
• Default: 128 KB
world- By default, log files can be accessed only by the user who configures the
readable | no- tracing operation. The world-readable option enables any user to read
world-
readable the file. To explicitly set the default behavior, use the no-world-readable
option.
flag Trace operation to perform. To specify more than one trace operation, include multiple
flag statements.
brief Trace key flow information, such as message types sent between SPU and
central point, policy match, and packet drop reasons.
detail Trace extensive flow information, such as detailed information about sessions
and fragments. Detail is the default level.
error Trace error information, such as system failure, unknown message type, and
packet drop.
Release Information
IN THIS SECTION
Syntax | 904
Description | 904
Options | 905
Syntax
traceoptions {
file file-name <files number> <no-word-readable | world-readable> <size
size>;
flag flag;
level (all | critical | error | info | notice | verbose | warning);
monitor monitor-object-name {
instance-name instance-name;
virtual-svc-name virtual-service-name;
}
no-remote-trace;
}
Hierarchy Level
Description
Options
For Next Gen Services on the MX-SPC3 services card, set the monitor-object-name to either:
file file-name Name of the file to receive the output of the tracing operation.
files number (Optional) Maximum number of trace files. When a trace file named trace-file reaches
its maximum size, it is renamed trace-file.0, then trace-file.1, and so on, until the
maximum number of trace files is reached. Then the oldest trace file is overwritten.
• Default: 3 files
flag flag Specify which operations you want to trace from Table 55 on page 905. To specify
more than one operation, include multiple flag statements.
These trace levels are available for both the MS-MPC and MX-SPC3 services cards
unless otherwise specified.
monitor Name of a monitoring object that contains an instance name or virtual service name.
monitor-
object-name
no-remote- (Optional) Disable remote tracing.
trace
no-world- (Optional) Disable unrestricted file access.
readable
group-name Name of the group.
When the trace-file again reaches its maximum size, trace-file.0 is renamed trace-file.1
and trace-file is renamed trace-file.0. This renaming scheme continues until the
maximum number of trace files is reached. Then, the oldest trace file is overwritten. If
you specify a maximum number of files, you must also specify a maximum file size
with the size option.
• Default: 128 KB
Release Information
instance-name and virtual-service-name options added in Junos OS Release 16.1R6 and 18.2R1 on MX
Series.
Support for Next Gen Services MX-SPC3 services card add in Junos OS Release 19.3R2.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 908
Description | 908
Options | 908
Syntax
traceoptions {
apply-groups group-names;
apply-groups-except group-names;
flag name;
file filename,
no-remote-trace;
}
Hierarchy Level
Description
Specify the trace information you want to include in the system log messages.
Options
system
Release Information
Support introduced in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240,
MX480 and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 909
Description | 910
Options | 910
Syntax
traceoptions {
file {
filename;
files number;
910
match regular-expression;
(no-world-readable | world-readable);
size maximum-file-size;
}
flag (all | configuration | flow);
no-remote-trace;
}
Hierarchy Level
Description
Options
Release Information
IN THIS SECTION
Syntax | 911
Description | 913
Syntax
traffic-load-balance {
instance instance-name {
client-interface client-interface;
client-vrf client-vrf;
group group-name {
health-check-interface-subunit health-check-interface-subunit;
network-monitoring-profile [profile-name1, <profile-name2>];
real-service-rejoin-options no-auto-rejoin;
real-services [server-list];
<routing-instance routing-instance>;
}
interface interface-name;
real-service real-service {
912
address server-ip-address;
admin-down;
}
server-inet-bypass-filter server-inet-bypass-filter ;
server-inet6-bypass-filter server-inet6-bypass-filter ;
server-interface server-interface;
server-vrf server-vrf;
traceoptions {
file file-name <files number> <no-word-readable | world-readable>
<size size>;
flag flag;
level (all | critical | error | info | notice | verbose | warning);
monitor {
instance-name instance-name;
virtual-svc-name virtual-service-name;
}
no-remote-trace;
}
virtual-service virtual-service-name {
address virtual-ip–address;
group group-name;
load-balance-method {
hash {
hash-key method;
}
random;
}
mode ( layer2-direct-server-return | direct-server-return |
translated );
<routing-instance routing-instance-name>;
<routing-metric route-metric>;
server-interface server-interface;
service service-name {
protocol (udp | tcp);
server-listening-port port;
virtual-port virtual-port;
}
}
}
}
913
Hierarchy Level
[edit services]
Description
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 914
Description | 914
914
Options | 914
Syntax
transport;
Hierarchy Level
Description
Specify the category for which you want to collect local logs.
Options
protocol Set security log transport protocol for the device. You can set the protocol to
TCP, TLS or UDP
tls-profile If you are using the TLS protocol as the security log transport, specify the TLS
profile name to use.
system
915
Release Information
RELATED DOCUMENTATION
ttl-threshold
IN THIS SECTION
Syntax | 915
Description | 916
Options | 916
Syntax
ttl-threshold number;
Hierarchy Level
Description
Specify the traceroute time-to-live (TTL) threshold value. This value sets the acceptable level of network
penetration for trace routing.
Options
Release Information
RELATED DOCUMENTATION
ALG Descriptions
Configuring the TTL Threshold
Examples: Configuring Application Protocols
Verifying the Output of ALG Sessions
IN THIS SECTION
Syntax | 917
Description | 917
Syntax
unknown-protocol;
Hierarchy Level
Description
Identify and drop IP frames with protocol numbers greater than 137 for IPv4 and 139 for IPv6, which
protects against IP unknown protocol attacks.
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
url-filter
IN THIS SECTION
Syntax | 918
Description | 919
Options | 919
Syntax
url-filter {
profile profile-name {
template template-name {
client-interfaces [ client-interface-name1 client-interface-name2 ];
disable-url-filtering;
dns-resolution-interval minutes;
dns-resolution-rate seconds;
dns-retries number;
dns-routing-instance dns-routing-instance-name;
dns-server [ ip-address1 ip-address2 ip-address3 ];
dns-source-interface loopback-interface-name;
routing-instance routing-instance-name;
server-interfaces [ server-interface-name1 server-interface-name2 ];
term term-name {
from {
src-ip-prefix [prefix1 prefix2];
dest-port [port1 port2];
}
then {
accept;
custom-page custom-page;
http-status-code http-status-code;
redirect-url redirect-url;
tcp-reset;
}
}
url-filter-database filename
}
url-filter-database filename;
919
}
}
Hierarchy Level
[edit services]
Description
NOTE: Starting in Junos OS Release 18.3R1, the url-filter statement is deprecated and has been
replaced by the web-filter statement. The url-filter statement is supported for backward
compatibility.
Options
url-filter-database filename Specify the filename of the URL filter database. This option is mandatory.
Release Information
RELATED DOCUMENTATION
url-filter-profile
IN THIS SECTION
Syntax | 920
Description | 920
Options | 921
Syntax
url-filter-profile profile-name;
Hierarchy Level
Description
Specify the URL filter profile that the service set uses. The URL filter profile specifies how to filter access
to disallowed URLs, and is configured at the [edit services url-filter] hierarchy level.
NOTE: You must also configure the next-hop-service statement with this statement.
NOTE: Starting in Junos OS Release 18.3R1, the url-filter-profile statement is deprecated and
has been replaced by the web-filter-profile statement. The url-filter-profile statement is
supported for backward compatibility.
921
Options
Release Information
RELATED DOCUMENTATION
url-filter-template
IN THIS SECTION
Syntax | 922
Description | 922
Options | 923
Syntax
url-filter-template template-name {
client-interfaces [ client-interface-name1 client-interface-name2 ];
disable-url-filtering;
dns-resolution-interval minutes;
dns-resolution-rate seconds;
dns-retries number;
dns-routing-instance dns-routing-instance-name;
dns-server [ ip-address1 ip-address2 ip-address3 ];
dns-source-interface loopback-interface-name;
routing-instance routing-instance-name;
security-intelligence-policy
server-interfaces [ server-interface-name1 server-interface-name2 ];
term term-name {
from {
src-ip-prefix [prefix1 prefix2];
dest-port [port1 port2];
}
then {
accept;
custom-page custom-page;
http-status-code http-status-code;
redirect-url redirect-url;
tcp-reset;
}
}
url-filter-database filename
}
Hierarchy Level
Description
Options
client-interfaces [ client- The list of client-facing logical interfaces (uplink) on which the URL filtering
interface-name1 client- is configured. This option is mandatory.
interface-name2 ]
disable-url-filtering Disables the filtering of HTTP traffic that contains an embedded IP address
(for example, http:/10.1.1.1) belonging to a disallowed domain name in the
URL filter database.
dns-resolution-rate Number of DNS queries per second sent out from the system before
seconds initiating further DNS queries.
• Default: 50
dns-retries number Number of retries for a DNS query in case query fails or times out.
• Default: 3
• Range: 1 through 5.
dns-routing-instance The VRF on which the DNS server is reachable. This option is mandatory.
dns-routing-instance- You can use the default routing instance inet.0 or a defined routing instance.
name
dns-server [ ip-address1 One or more IP (IPv4 or IPv6) addresses of DNS servers to which the DNS
ip-address2 ip-address3 ] queries are sent out. This option is mandatory.
dns-source-interface The loopback interface for which source IP address is picked for sending
loopback-interface-name DNS queries. This option is mandatory.
routing-instance routing- The VRF on which URL filtering feature is configured. This option is
instance-name mandatory. You can use the default routing instance inet.0 or a defined
routing instance.
url-filter-database The filename of the URL filter database. The file should be placed in
filename the /var/db/url-filterd directory, but indicate just the filename here and not
the full path.
Release Information
RELATED DOCUMENTATION
uuid
IN THIS SECTION
Syntax | 925
Description | 925
Options | 925
Syntax
uuid hex-value;
Hierarchy Level
Description
Specify the Universal Unique Identifier (UUID) for DCE RPC objects.
Options
hex-value—Hexadecimal value.
Release Information
RELATED DOCUMENTATION
ALG Descriptions
Configuring a Universal Unique Identifier
Examples: Configuring Application Protocols
Verifying the Output of ALG Sessions
926
v6rd
IN THIS SECTION
Syntax | 926
Description | 926
Options | 927
Syntax
v6rd v6rd-softwire-concentator {
ipv4-prefix ipv4-prefix;
v6rd-prefix ipv6-prefix;
mtu-v4 mtu-v4;
softwire-address ipv4-address;
}
Hierarchy Level
Description
Configure settings for a 6rd concentrator used to process IPv6 packets encapsulated in IPv4 packets.
The v6rd statement is supported only on the MS-DPC, MS-100, MS-400, and MS-500 line cards. The
v6rd statement is not supported on MS-MPCs and MS-MICs.
927
Options
mtu-v4— Maximum transmission unit (MTU), in bytes (576 through 9192), for IPv6 packets
encapsulated into IPv4. If the final length is greater than the configured value, the IPv4 packet will be
dropped.
address—IPv4 address of a softwire concentrator. This is an IPv4 address independent of any interface
and on a different prefix.
Release Information
Support added in Junos OS release 20.2R1 for the v6rd concentrator at the [edit services softwires
softwire-types edit hierarchy for Next Gen Services on MX240, MX480, and MX860 routers.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 928
Description | 928
Default | 928
928
Syntax
video {
dscp (alias | bits);
forwarding-class class-name;
}
Hierarchy Level
Description
Set the appropriate dscp and forwarding-class values for SIP video traffic.
Default
By default, the system will not alter the DSCP or forwarding class for SIP video traffic.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 929
Description | 929
Default | 929
Syntax
video {
dscp (alias | bits);
forwarding-class class-name;
}
Hierarchy Level
Description
Set the appropriate dscp and forwarding-class values for SIP video traffic.
Default
By default, the system will not alter the DSCP or forwarding class for SIP video traffic.
930
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 930
Description | 931
Options | 931
Syntax
virtual-service virtual-service-name {
address virtual-ip–address;
group group-name;
load-balance-method {
hash {
hash-key method;
}
931
random;
}
mode ( layer2-direct-server-return | direct-server-return | translated );
<routing-instance routing-instance-name>;
<routing-metric route-metric>;
server-interface server-interface;
service service-name {
protocol (udp | tcp);
server-listening-port port;
virtual-port virtual-port;
}
}
Hierarchy Level
Description
Options
load-balance method Use a combination of these hash-key methods for the session distribution API:
hash hash-key method
dest-ip Hash on destination IP address.
routing-instance-name (Optional) Routing instance for the virtual service. Default is inet.0.
server-interface (Optional) The server-interface specified under the virtual-service, will be used
server-interface instead of the values provided under the instance level.
service service-name Translated mode details. Packets destined to this virtual ip-address + virtual-
port + protocol will be load balanced to the appropriate server. The destination
IP address and port are replaced by the real services IP address and the server-
listening-port (configured here).
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
933
RELATED DOCUMENTATION
voice
IN THIS SECTION
Syntax | 933
Description | 933
Syntax
voice {
dscp (Services CoS) (alias | bits);
forwarding-class (Services PIC Classifiers) class-name;
}
Hierarchy Level
Description
Set the appropriate dscp and forwarding-class values for SIP voice traffic.
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 934
Description | 935
Default | 935
Syntax
voice {
dscp (alias | bits);
forwarding-class class-name;
}
935
Hierarchy Level
Description
Set the appropriate dscp and forwarding-class values for SIP voice traffic.
Default
By default, the system will not alter the DSCP or forwarding class for SIP voice traffic.
Release Information
RELATED DOCUMENTATION
web-filter
IN THIS SECTION
Syntax | 936
Description | 938
936
Syntax
web-filter {
profile (Web Filter) profile-name {
dns-filter {
database-file filename;
dns-resp-ttl seconds;
dns-server [ ip-address ];
hash-key key-string;
hash-method hash-method-name;
statistics-log-timer minutes;
wildcarding-level level;
}
dns-filter-template template-name {
client-interfaces [ client-interface-name ];
client-routing-instance client-routing-instance-name;
dns-filter {
database-file filename;
dns-resp-ttl seconds;
dns-server [ ip-address ];
hash-key key-string;
hash-method hash-method-name;
statistics-log-timer minutes;
wildcarding-level level;
}
server-interfaces [ server-interface-name ];
server-routing-instance server-routing-instance-name;
term term-name {
from {
src-ip-prefix [ source-prefix ];
}
then {
accept;
dns-sinkhole;
}
937
}
}
global-dns-stats-log-timer minutes;
url-filter-database filename;
url-filter-template template-name {
client-interfaces [ client-interface-name1 client-interface-name2 ];
disable-url-filtering;
dns-resolution-interval minutes;
dns-resolution-rate seconds;
dns-retries number;
dns-routing-instance dns-routing-instance-name;
dns-server [ ip-address1 ip-address2 ip-address3 ];
dns-source-interface loopback-interface-name;
dns-routing-instance dns-routing-instance-name;
routing-instance routing-instance-name;
server-interfaces [ server-interface-name1 server-interface-name2 ];
term term-name {
from {
src-ip-prefix [prefix1 prefix2];
dest-port [port1 port2];
}
then {
accept;
custom-page custom-page;
http-status-code http-status-code;
redirect-url redirect-url;
tcp-reset;
}
}
url-filter-database filename
}
}
}
Hierarchy Level
[edit services]
938
Description
Configure filtering of DNS requests for disallowed website domains. Filtering can result in either:
• Blocking access to the site by sending the client a DNS response that includes an IP address or
domain name of a sinkhole server instead of the disallowed domain.
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
web-filter-profile
IN THIS SECTION
Syntax | 939
Description | 939
Options | 939
Syntax
web-filter-profile profile-name;
Hierarchy Level
Description
Specify the DNS filter profile or the URL filter profile that the service set uses. The filter profile is
configured at the [edit services web-filter] hierarchy level, and specifies how to filter DNS requests for
disallowed website domains or how to filter access to disallowed URLs.
Options
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
940
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 940
Description | 940
Syntax
winnuke;
Hierarchy Level
Description
Identify and drop TCP segments that are destined for port 139 and have the urgent (URG) flag set,
which provides protection against WinNuke attacks.
Release Information
RELATED DOCUMENTATION
Configuring Network Attack Protection With IDS Screens for Next Gen Services | 349
IN THIS SECTION
Syntax | 941
Description | 941
Options | 942
Syntax
world-readable;
Hierarchy Level
Description
Options
system
Release Information
RELATED DOCUMENTATION
xlat-source-rule
IN THIS SECTION
Syntax | 943
Description | 943
Syntax
xlat-source-rule {
rule-set r1 {
rule r1;
}
}
Hierarchy Level
[edit services nat destination rule-set name rule name then destination-nat]
Description
Release Information
Operational Commands
CHAPTER 36
Operational Commands
IN THIS CHAPTER
IN THIS SECTION
Syntax | 948
Description | 948
Options | 948
Syntax
Description
Options
service-set Specify the name of the service-set for which you want to clear the log.
interface-name Specify the name of the interface for which you want to clear the log.
file-name Specify the file-name for which you want to clear the log.
View
Output Fields
Sample Output
clear log
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 949
Description | 949
Options | 950
Syntax
Description
Options
view
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
IN THIS SECTION
Syntax | 951
Description | 951
Options | 951
Syntax
Description
Clear services NAT source mappings. After one mapping is cleared, all the port block alloation blocks
referring to that mapping are released.
Options
app subscriber private-ip [port port-num] [service-set Clear one APP mapping by matching conditions
service-set ]
eim Clear all EIM mappings.
eim subscriber private-ip [port port-num] [service-set Clear one EIM mapping by matching conditions
service-set ]
pcp Clear all PCP mappings.
view
Output Fields
Table 56 on page 951 lists the output fields for the clear services nat source mappings command.
Output fields are listed in the approximate order in which they appear.
Table 56: clear services nat source mappings Output Fields (Continued)
Sample Output
clear services nat source mappings subscriber 2.1.1.1 port 1026 service-set ss1
user@host> clear services nat source mappings subscriber 2.1.1.1 port 1026 service-set
ss1
NAT pool Mappings removed Sessions removed
Test-pool 1 0
953
clear services nat source mappings app subscriber 2.1.1.1 port 1026 service-set ss1
user@host> clear services nat source mappings app subscriber 2.1.1.1 port 1026 service-set
ss1
NAT pool Mappings removed Sessions removed
Test-pool 1 0
Release Information
IN THIS SECTION
Syntax | 954
Description | 954
Options | 954
Syntax
Description
Clear services sessions currently active on the embedded PIC or MIC. When you enter this command,
the sessions are marked for deletion and are cleared thereafter. The time that is taken to clear the
currently active sessions varies, depending on the scaled nature of the environment.
Options
application- (Optional) Clear sessions for one of the following application protocols:
protocol protocol
• bootp—Bootstrap protocol
• exec—Exec
• h323—H.323 standards
• ip—IP
• login—Login
• netbios—NetBIOS
• netshow—NetShow
• realaudio—RealAudio
• shell—Shell
• sqlnet—SQLNet
• talk—Talk Program
• traceroute—Traceroute
• winframe—WinFrame
destination-port (Optional) Clear sessions for the specified destination port. The range of values is
destination-port from 0 to 65535.
interface (Optional) Clear sessions for the specified interface. On M Series and T Series
interface-name routers, the interface-name can be ms-fpc/ pic/ port or rspnumber.
ip-action (Optional) Clear ip-action entries generated by the router to log, drop, or block
traffic based on previous matches. The IP action options and targets are configured
at the {edit security idp idp-policy policy-name rulebase-ips rule rule-name then]
hierarchy level.
protocol protocol (Optional) Clear sessions for one of the following IP types:
clear
Output Fields
Table 57 on page 957 lists the output fields for the clear services sessions command. Output fields are
listed in the approximate order in which they appear.
Service set Name of the service set from which sessions are being cleared.
Sessions marked for deletion Number of sessions that are marked for deletion and are subsequently
cleared.
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 958
Description | 958
Options | 958
Syntax
Description
Options
interface interface- (Optional) Clear sessions statistics for the specified interface. The interface-name
name can be vms-fpc/ pic/ port.
view
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
959
IN THIS SECTION
Syntax | 959
Description | 959
Options | 960
Syntax
Description
Clear stateful firewall flows. Issue this command to clear the stateful firewall flows for the specified
option. The default option is "none", that is, to close all stateful firewall flows unless another option is
specified.
Starting in Junos Release 14.1, the method for closing flows has changed. With the change, even for
peak flows, the command prompt now returns to an active state after 30 seconds and the clear
command completes in 90 to 120 seconds. In previous releases, closing peak flows could take as long as
4 minutes, after which the command prompt would return. Note too that during the first 30 seconds of
issuing the command, the flows to be deleted remain visible in the show services stateful-firewall flows
command output.
960
Options
destination-port (Optional) Clear stateful firewall flows for a particular destination port. The range
destination-port of values is 0 to 65535.
destination-prefix (Optional) Clear stateful firewall flows for a particular destination prefix.
destination-prefix
interface interface- (Optional) Clear stateful firewall flows for a particular interface. On M Series and T
name Series routers, the interface-name can be ms-fpc/pic/port or rspnumber.
protocol (Optional) Clear stateful firewall flows for one of the following IP types:
service-set service- (Optional) Clear stateful firewall flows for a particular service set.
set
source-port source- (Optional) Clear stateful firewall flows for a particular source port. The range of
port values is from 0 through 65535.
961
source-prefix (Optional) Clear stateful firewall flows for a particular source prefix.
source-prefix
view
Output Fields
Table 58 on page 961 lists the output fields for the clear services stateful-firewall flows command.
Output fields are listed in the approximate order in which they appear.
Service set Name of the service set from which flows are being cleared.
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 962
Description | 962
Options | 963
Syntax
Description
Clear Session Initiation Protocol (SIP) call information in stateful firewall flows.
963
Options
none Clear stateful firewall statistics for all interfaces and all service sets.
application- (Optional) Clear information about one of the following application protocols:
protocol
• bootp—(SIP only) Bootstrap protocol
• h323—H.323 standards
• login—Login
• netbios—NetBIOS
• netshow—NetShow
• realaudio—RealAudio
• shell—Shell
• sqlnet—SQLNet
964
• traceroute—Traceroute
• winframe—WinFrame
destination-port (Optional) Clear information for a particular destination port. The range of values is
destination-port 0 to 65535.
• ipv6—IPv6 within IP
source-port (Optional) Clear information for a particular source port. The range of values is 0 to
source-port 65535.
view
Output Fields
Table 59 on page 965 lists the output fields for the clear services stateful-firewall sip-call command.
Output fields are listed in the approximate order in which they appear.
Service set Name of the service set from which flows are being cleared.
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 966
Description | 966
Options | 967
Syntax
Description
Clear Session Initiation Protocol (SIP) register information in stateful firewall flows.
967
Options
application- (Optional) Clear information about one of the following application protocols:
protocol
• bootp—(SIP only) Bootstrap protocol
• h323—H.323 standards
• login—Login
• netbios—NetBIOS
• netshow—NetShow
• realaudio—RealAudio
• shell—Shell
• sqlnet—SQLNet
• traceroute—Traceroute
• winframe—WinFrame
destination-port (Optional) Clear information for a particular destination port. The range of values is
destination-port 0 to 65535.
• ipv6—IPv6 within IP
view
Output Fields
Table 60 on page 969 lists the output fields for the clear services stateful-firewall sip-register
command. Output fields are listed in the approximate order in which they appear.
Service set Name of the service set from which flows are being cleared.
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 970
Description | 970
Options | 970
Syntax
Description
Options
none Clear stateful firewall statistics for all interfaces and all service sets.
interface interface-name (Optional) Clear stateful firewall statistics for the specified interface. On M
Series and T Series routers, the interface-name can be ms-fpc/pic/port or
rspnumber.
service-set service-set (Optional) Clear stateful firewall statistics for the specified service set.
971
view
Output Fields
When you enter this command, you are provided feedback on the status of your request.
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 972
Description | 972
Options | 972
Syntax
Description
Clear information about the number of active subscribers on the services PIC.
Options
view
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
IN THIS SECTION
Syntax | 973
Description | 973
Options | 973
Syntax
Description
Clear statistics for DNS request filtering or URL filtering for the specified filter profile.
Options
dns-filter-template template- (Optional) Name of the DNS filter template for which statistics are
name cleared.
fpc-slot fpc-slot pic-slot pic-slot (Optional) Location of the services PIC for which statistics are
cleared.
profile profile-name Name of the filter profile for which statistics are cleared.
url-filter-template template- (Optional) Name of the URL filter template for which statistics are
name cleared.
clear
Output Fields
When you enter this command, the statistics for DNS request filtering are cleared. There is no specific
output.
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 974
Description | 974
Options | 974
Syntax
Description
When you make changes to the domain filter database file, which is used in filtering DNS requests for
disallowed domains, apply the changes.
Options
maintenance
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 975
Description | 976
Options | 976
Syntax
Description
Validate the file format of the domain filter database file, which is used in filtering DNS requests for
disallowed domains.
Options
hash-method-name Hash method you used to produce the hashed domain name values in the
database file.
key-string Hash key you used to produce the hashed domain name values in the database
file.
maintenance
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 977
Description | 977
977
Syntax
Description
Before you disable Next Gen Services, delete any router configuration for services. This includes
configuration under the [edit services] hierarchy, configuration for services interfaces, and any
configuration that refers to services interfaces.
After you enter request system enable unified-services, reboot the chassis.
Output Fields
When you enter this command, you are provided feedback on the status of your request.
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 978
Description | 978
Syntax
Description
Before you enable Next Gen Services, delete any router configuration for services. This includes
configuration under the [edit services] hierarchy, configuration for services interfaces, and any
configuration that refers to services interfaces.
After you enter request system enable unified-services, reboot the chassis.
979
In Junos node slicing, you can enable unified services at guest network function (GNF), by using the CLI
request system enable unified-services at GNF.
Output Fields
When you enter this command, you are provided feedback on the status of your request.
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 980
Description | 980
Options | 980
Syntax
Description
Display information about the aggregated multiservices interface (AMS) as well as its individual member
interfaces and the status of the replication state.
Options
interface-name (Optional) Name of the aggregated multiservices interface (ams). If this is omitted, then
the information for all the aggregated multiservices interfaces, including those used in
control plane redundancy and high availability (HA) for service applications, is
displayed.
view
Output Fields
Table 61 on page 981 lists the output fields for the show interfaces load-balancing (aggregated
multiservices interfaces) command. Output fields are listed in the approximate order in which they
appear.
981
Last change Time (in hh:mm:ss [hours:minutes:seconds] format) when the detail none
state last changed.
Member count Number of member PICs (mams) that are part of the aggregated detail none
interface.
HA Model High availability (HA) model supported on the interface. detail none
Table 61: Aggregated Multiservices show interfaces load-balancing Output Fields (Continued)
• Backup—Member is a backup.
Table 61: Aggregated Multiservices show interfaces load-balancing Output Fields (Continued)
Sample Output
State : Up
Last change : 00:10:23
Member count : 4
HA Model : Many-to-One
Members :
Interface Weight State
mams-4/0/0 10 Active
mams-4/1/0 10 Active
mams-5/0/0 10 Active
mams-5/1/0 10 Backup
Sync-state :
Interface Status
mams-4/0/0 Unknown
mams-4/1/0 Unknown
mams-5/0/0 Unknown
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
show log
IN THIS SECTION
Syntax | 985
Description | 986
Options | 986
Syntax
show log
<filename | user <username>>
986
show log
<all-lcc | lcc number | scc>
<filename | user <username>>
Description
List log files, display log file contents, or display information about users who have logged in to the
router or switch.
Options
<all-lcc | lcc (Routing matrix only)(Optional) Display logging information about all T640 routers (or
number | scc> line-card chassis) or a specific T640 router (replace number with a value from 0
through 3) connected to a TX Matrix router. Or, display logging information about
the TX Matrix router (or switch-card chassis).
device-type (QFabric system only) (Optional) Display log messages for only one of the following
device types:
987
NOTE: If you specify the device-type optional parameter, you must also
specify either the device-id or device-alias optional parameter.
(device-id | If a device type is specified, display logs for a device of that type. Specify either the
device-alias) device ID or the device alias (if configured).
filename (Optional) Display the log messages in the specified log file. For the routing matrix,
the filename must include the chassis information.
NOTE: The filename parameter is mandatory for the QFabric system. If you
did not configure a syslog filename, specify the default filename of messages.
user (Optional) Display logging information about users who have recently logged in to
<username> the router or switch. If you include username, display logging information about the
specified user.
trace
Sample Output
show log
Release Information
Option device-type (device-id | device-alias) is introduced in Junos OS Release 13.1 for the QFX Series.
RELATED DOCUMENTATION
syslog (System)
IN THIS SECTION
Syntax | 993
Description | 993
993
Options | 993
Syntax
Description
NOTE: In Junos OS releases earlier than 12.3, the extension-provider packages were variously
referred to as Junos Services Framework (JSF), MP-SDK, and eJunos.
Options
none Display standard information about all Junos OS extension-provider packages ALG
sessions.
application- (Optional) Display information about one of the following application protocols:
protocol
dce-rpc Distributed Computing Environment-Remote Procedure Call
protocols
994
sql SQLNet
view
Output Fields
Table 62 on page 995 lists the output fields for the show services alg conversations command. Output
fields are listed in the approximate order in which they appear.
995
Number of Number of ALG conversations open. A conversation is a group of parent and child
conversations sessions.
• Closed
Forward Flow The source and destination prefixes for forward flow.
Reverse Flow The source and destination prefixes for reverse flow.
• Closed
Number of Total number of active child sessions associated with the parent session.
Resources
Resource ID Numeric identifier for the resources associated with the parent session.
Sample Output
The output for the show services alg conversations brief command is identical to that for the show
services alg conversations command. For sample output, see "show services alg conversations" on page
996.
This command has the same output for the rpc, dce-rpc, rpc-portmap and dce-rpc-portmap ALGs.
Release Information
IN THIS SECTION
Syntax | 1001
Description | 1001
Options | 1002
Syntax
Description
NOTE: In Junos OS releases earlier than 12.3, the extension-provider packages were variously
referred to as Junos Services Framework (JSF), MP-SDK, and eJunos.
1002
Options
application- (Optional) Display statistics for one of the following application protocols:
protocol
dce-rpc Distributed Computing Environment-Remote Procedure Call
protocols
sql SQLNet
view
1003
Output Fields
Table 63 on page 1003 lists the output fields for the show services alg statistics command. Output
fields are listed in the approximate order in which they appear.
ALG statistics Name of the ALG for which the statistics are displayed.
H323 total Total number of audio/video calls that have been established.
calls
H323 pinhole Number of H323 parent sessions that released the resources before pinhole creation.
opened too
late
1005
H323 pinhole Number of H323 gate hits that have been dropped.
hit dropped
H323 get Number of failures to get the session virtualization ctx information.
virtual ctx
failed
H323 obj alloc Number of memory allocation failures for H323 session cookie.
failed
H323 ce alloc Number of H323 session call entity object memory allocation failures.
failed
H323 dscp Number of Differentiated Services code point (DSCP) packets marked.
marked
H323 dscp Number of Differentiated Services code point (DSCP) packets marked as errors.
marked error
RAS obj alloc Number of RAS session object memory allocation failures.
failed
RAS packet Number of times that some packets exist in existing RAS sessions cookie.
exists in cookie
error
RAS flood Number of gatekeeper requests that were dropped because of too many RAS request
error messages.
Packets DSCP Number of Differentiated Services code point (DSCP) packets marked.
marked
1014
Packets DSCP Number of Differentiated Services code point (DSCP) packets marked as error.
marked error
Sample Output
While the statistics are the same for dce-rpc and dce-rpc-portmap, both rpc and rpc-portmap have the
same output too.
Gate hits: 0
Gates timedout: 4
user@router> show services alg statistics application-protocol pptp
Interface name: ms-2/0/0
PPTP ALG statistics:
PPTP Objects Active : 1
PPTP Objects Total : 1
PPTP Objects Error : 0
PPTP ASL Group Active : 1
PPTP ASL Group Total : 1
PPTP ASL Group Error : 0
PPTP Packets received : 11
PPTP Packets Discarded : 0
PPTP Packets Free : 0
PPTP OCRQ Received : 1
PPTP OCRQ Discarded : 0
PPTP OCRP Received : 1
PPTP OCRP Discarded : 0
PPTP WEN(SLI) Received : 3
PPTP WEN(SLI) Discarded : 0
PPTP CCRQ-CDSN Received : 0
PPTP CDSN Received : 0
PPTP CCRQ-CDSN Discarded : 0
PPTP Session Create : 3
PPTP Session Destroy : 0
PPTP Gate Create : 0
PPTP Gate Hit : 2
PPTP Gate Timeout : 0
PPTP NAT Events : 0
PPTP DO-NAT Total : 1
PPTP DO-NAT Ok : 1
PPTP DO-NAT Pending : 0
PPTP DO-NAT Fail : 0
PPTP DO-RM Total : 1
PPTP DO-RM Ok : 2
PPTP DO-RM Pending : 0
PPTP DO-RM Fail : 0
PPTP NAT-ASYNC Total : 0
PPTP NAT-ASYNC Invalid : 0
PPTP NAT-ASYNC Error1 : 0
PPTP NAT-ASYNC Error2 : 0
PPTP ASL Hole Ok : 2
PPTP ASL Hole Error : 0
1019
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
IN THIS SECTION
Syntax | 1022
Description | 1022
Options | 1022
Syntax
Description
Display the mapping of class-of-service (CoS) code point aliases to corresponding bit patterns and the
mapping of forwarding class names to queue numbers as configured in CoS services for Next Gen
Services services PICs.
Options
diffserv | forwarding-class (Optional) Display only the selected information, either DiffServ
codepoints or forwarding classes.
interface interface-name (Optional) Display statistics for the specified interface only.
service-set service-set-name (Optional) Display statistics for the specified service set only.
view
Output Fields
Table 64 on page 1023 describes the output fields for the show services cos statistics command.
Output fields are listed in the approximate order in which they appear.
1023
Sample Output
001100 0 0
001101 0 0
001110 0 0
001111 0 0
010000 0 0
010001 0 0
010010 0 0
010011 0 0
010100 0 0
010101 0 0
010110 0 0
010111 0 0
011000 0 0
011001 0 0
011010 0 0
011011 0 0
011100 0 0
011101 0 0
011110 0 0
011111 0 0
100000 0 0
100001 0 0
100010 0 0
100011 0 0
100100 0 0
100101 0 0
100110 0 0
100111 0 0
101000 0 0
101001 0 0
101010 0 0
101011 0 0
101100 0 0
101101 0 0
101110 0 0
101111 0 0
110000 0 0
110001 0 0
110010 0 0
110011 0 0
110100 0 0
110101 0 0
110110 0 0
1025
110111 0 0
111000 0 0
111001 0 0
111010 0 0
111011 0 0
111100 0 0
111101 0 0
111110 0 0
111111 0 0
Forwarding class Packets in Packets out
0 0 0
1 0 0
2 0 0
3 0 0
4 0 0
5 0 0
6 0 0
7 0 0
8 0 0
9 0 0
10 0 0
11 0 0
12 0 0
13 0 0
14 0 0
15 0 0
The output for the show services cos statistics brief command is identical to that for the show services
cos statistics command.
The output for the show services cos statistics detail command is identical to that for the show services
cos statistics command.
The output for the show services cos statistics extensive command is identical to that for the show
services cos statistics command.
1026
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
IN THIS SECTION
Syntax | 1026
Description | 1026
Options | 1026
Syntax
Description
Options
interface interface- (Optional) Display information about the specified services-inline interface only.
name When a specific interface is not specified, statistics for all services-inline
interfaces are shown.
1027
mape name (Optional) Display information on per physical service interface basis.
view
Output Fields
Table 65 on page 1027 lists the output fields for the show services inline softwire statistics command.
Output fields are listed in the order in which they appear.
Service PIC Name Name of the service PIC for which statistics are displayed.
ICMPv4 echo Number of ICMPv4 echo responses sent from the softwire concentrator or BR.
responses from
IPv6 ICMP type = 129
softwire
concentrator
Dropped ICMPv4 Number of ICMP packets (except ICMP request) received by the softwire
packets to softwire concentrator or BR. All these packets are dropped in by the packet forwarding
concentrator engine Ukernel.
1028
Table 65: show services inline softwire statistics Output Fields (Continued)
Trace route UDP Number of UDP trace route packets (port numbers 33434 through 33534)
packets to softwire received by the softwire concentrator.
concentrator
ICMPv4 Port Number of ICMP port unreachable errors sent by the softwire concentrator
unreachable errors after receiving the UDP trace route packets.
sent from softwire
concentrator
Other dropped Number of non-ICMPpackets that were received and dropped because of
IPv4 packets to fragmentation during encapsulation or decapsulation.
softwire
concentrator
6rd decaps Number of 6rd decapsulated packets and bytes in the data plane. Decapsulation
includes removing the outer IPv4 header and routing the inner IPv6 packet.
6rd encaps Number of 6rd encapsulted (IPv4) packets and bytes in the data plane.
6rd decap errors Number of all the packets and bytes that are not IPv4-IPv6, IPv4-UDP, or IPV4-
ICMP packets.
6rd decap spoof Number of spoof attack packets and bytes, which includes packets for which
attacks the 6rd derived IPv4 address does not match with the source IPv4 address and
packets for which the source IPv6 prefix does not match the 6rd IPv6 prefix.
1029
Table 65: show services inline softwire statistics Output Fields (Continued)
6rd encap v4 mtu Count of packets and bytes with IPv4 encapsulation MTU errors. For downlink
errors packets after encapsulating with an IPv4 header, if the packet length is more
than Tunnel MTU then it is dropped as v4 MTU errors. For these packet drops,
an ICMPv6 packet too big error is sent back to the sender.
Data Plane
Statistics (MAP-E
upstream)
MAPE ICMP decap IPv6 packets dropped due to unsupported type/code of inner ICMPv4
errors
MAPE decap spoof IPv6 Packets that failed MAPE spoof check
errors
Sample Output
show services inline softwire statistics mape (Adaptive Services si- interfaces)
MAP-E decaps 0
0
MAP-E encaps 0
0
MAP-E decap errors 0
0
1031
show services inline softwire statistics mape (Next Gen Services si- interfaces)
Release Information
map-e option introduced in Junos OS Release 18.2R1 for MX Series Routers with MPC and MIC
interfaces.
map-e option introduced in Junos OS Release 20.2R1 for Next Gen Services on MX240, MX480 and
MX960 routers.
IN THIS SECTION
Syntax | 1032
Description | 1032
Options | 1033
Syntax
Description
Display the inline IP reassembly statistics for the Packet Forwarding Engines on one or more MPCs or
Next Gen Services MX-SPC3 services card. Inline IP reassembly statistics are collected at the Packet
Forwarding Engine level.
NOTE: For more information on MPCs that support inline IP reassembly, refer to Protocols and
Applications Supported on the MPC1E for MX Series Routers.
1033
Options
none Displays standard inline IP reassembly statistics for all MPCs or MX-SPC3 services card.
fpc fpc (Optional) Displays inline IP reassembly statistics for the specified MPC or MX-SPC3 services
card.
NOTE: Starting with Junos OS Release 14.2, the FPC option is not displayed for MX
Series routers that do not contain switch fabrics, such as MX80 and MX104 routers.
pfe pfe (Optional) Displays inline IP reassembly for the specified Packet Forwarding Engine slot. You
must specify an FPC slot number before specifying a Packet Forwarding Engine slot.
view
Output Fields
Table 66 on page 1033 lists the output fields for the show services inline ip-reassembly statistics
command. Output fields are listed in the approximate order in which they appear.
Table 66: show services inline ip-reassembly statistics Output Fields (Continued)
NOTE: The output fields displayed (per Packet Forwarding Engine) are arranged in a logical sequence
from top to bottom to enable users to understand how the inline IP reassembly statistics are gathered.
The information about total number of fragments received is displayed first, and then the information
about the reassembled packets and those pending reassembly are displayed. Then, the reasons why
the fragments were dropped or not reassembled are displayed. Finally, the information about the
fragments reassembled, fragments dropped, and fragments sent to the backup user plane PIC
(services PIC) are displayed.
Total Fragments Received Total number of fragments received and the current
rate of fragments received for inline IP reassembly.
The following information is also displayed:
• Intermediate Fragments—Number of
intermediate fragments received and current rate
of intermediate fragments processed.
Table 66: show services inline ip-reassembly statistics Output Fields (Continued)
Fragments Dropped Reasons Total number of fragments dropped reasons and the
current rate of total fragment dropped reasons. The
number of dropped reasons and rate corresponding
to each of the following reasons are also displayed:
NOTE:
Table 66: show services inline ip-reassembly statistics Output Fields (Continued)
Reassembly Errors Reasons Number of errors during reassembly and the current
rate of reassembly errors. The number of errors and
the rate for each of the following types of errors are
also displayed:
• ASIC errors
Aged out packets Number of aged out packets and the current number
of packets aged out per second in the instant
preceding the command’s execution.
Table 66: show services inline ip-reassembly statistics Output Fields (Continued)
Total Fragments Dropped Total number of fragments dropped and the current
rate of total number of fragments dropped. The
number of fragments dropped and rate
corresponding to each of the following reasons are
also displayed:
• ASIC errors
Total fragments punted to UPIC Number of fragments sent to the backup user plane
PIC (services PIC) and current rate of fragments sent
per second in the instant preceding the command’s
execution
• These fields indicate how many of the packet fragments received were then dropped due to a
particular reason.
For example, consider a packet that has 10 fragments, 9 of which have been received and stored in
memory. When the tenth fragment arrives, if the memory runs out (Buffers not available), then this
1038
fragment is dropped. Because the tenth fragment has been dropped, the other 9 fragments must also
be dropped. In this case, the Buffers not available field (under the Fragments Dropped Reasons field)
is incremented by 1 and the Buffers not available field (under the Total Fragments Dropped field) is
incremented by 10.
For the next packet arriving, which also has 10 fragments, the first four fragments are stored but the
memory runs out for the fifth fragment. Then the first 5 fragments (fifth and the first four) are
dropped. In this case, the Buffers not available field (under the Fragments Dropped Reasons field) is
incremented by 1 and the Buffers not available field (under the Total Fragments Dropped field) is
incremented by 5.
For fragments of the packet, if memory becomes available, the next 5 fragments (6 through 10) that
arrive are stored in memory. The fragments are stored until the timeout period elapses, and are
eventually dropped. In this case, the Aged out packets field is incremented by 1 and the Aged out
fragments field (under the Total Fragments Dropped field) is incremented by 5.
The fragment counters (after both packets have been processed) are as follows:
• Current rate refers to the current total number fragments dropped per second in the instant
preceding the command’s execution.
Sample Output
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
ip-reassembly
IN THIS SECTION
Syntax | 1040
Description | 1040
Options | 1041
Syntax
Description
Options
interface interface-name> Optional. Display destination NAT information specific to the interface.
service-set service-set> Optional. Display destination NAT information specific to the service set.
view
Output Fields
Table 67 on page 1041lists the output fields for the show services nat destination pool command.
Output fields are listed in the approximate order in which they appear.
Translation hits Number of times a translation in the translation table is used for a
source NAT rule.
Table 67: show services nat destination pool Output Fields (Continued)
Sample Output
user@host> show services nat destination pool service-set ss1_interface_style1 interface vms-0/2/0 all
ss1_interface_style1 interface vms-0/2/0 all | no-more
Interface: vms-0/2/0 , Service set: ss1_interface_style1
Pool name : dest_pool
Pool id : 1
Total address : 253
Translation hits: 11
Address range Port
30.1.1.2 - 30.1.1.254 0
Release Information
IN THIS SECTION
Syntax | 1043
Description | 1043
Options | 1043
Syntax
Description
Options
view
Output Fields
Table 68 on page 1044 lists the output fields for the show services nat destination rule command.
Output fields are listed in the approximate order in which they appear.
1044
Destination addresses Name of the destination addresses that match the rule. The default value
is any.
Action The action taken when a packet matches the rule’s tuples. Actions include
the following:
Translation hits Number of times a translation in the translation table is used for a source
NAT rule.
Successful sessions Number of successful session installations after the NAT rule is matched.
1045
Table 68: show services nat destination rule Output Fields (Continued)
Failed sessions Number of unsuccessful session installations after the NAT rule is
matched.
Sample Output
show services nat destination rule service-set ss1_interface_style1 interface vms-0/2/0 all |
no-more
user@host> show services nat destination rule service-set ss1_interface_style1 interface vms-0/2/0 all |
no-more
ss1_interface_style1 interface vms-0/2/0 all | no-
more
Interface: vms-0/2/0 , Service set: ss1_interface_style1
Destination NAT rule: r1 Rule-set: rs2
Rule-Id : 2
Rule position : 1
Match-direction : input
Destination addresses : 50.1.1.2 - 50.1.1.2
Action : dest_pool
Translation hits : 34
Successful sessions : 34
Failed sessions : 0
Number of sessions : 0
Release Information
IN THIS SECTION
Syntax | 1046
Description | 1046
Options | 1046
Syntax
Description
Options
interface interface-name Display summary destination NAT information for the specified service
interface.
service-set service-set Display summary destination NAT information for the specified service set.
view
1047
Output Fields
Table 69 on page 1047 lists the output fields for the show services nat destination summary command.
Output fields are listed in the approximate order in which they appear.
Table 69: show services nat destination summary Output Fields (Continued)
Sample Output
user@host> show services nat destination summary service-set ss1_interface_style1 interface vms-0/2/0
Interface: vms-0/2/0 , Service set: ss1_interface_style1
Pool name Address Routing Port
Total
Range Instance
Address
dest_pool 30.1.1.2 - 30.1.1.254 0 253
Interface: vms-0/2/0 , Service set: ss1_interface_style1
Rule name Rule set Match-direction Action
r1 rs2 input dest_pool
Release Information
IN THIS SECTION
Syntax | 1049
Description | 1049
Syntax
Description
view
Output Fields
Table 70 on page 1049 lists the output fields for the show services nat ipv6-multicast-interfaces
command. Output fields are listed in the approximate order in which they appear.
Sample Output
Release Information
IN THIS SECTION
Syntax | 1052
Description | 1052
Options | 1052
Syntax
Description
Options
pool-name Display NAT resource usage statistics for the specified pool.
1053
view
Output Fields
Table 71 on page 1053 lists the output fields for the show services nat resource-usage command.
Output fields are listed in the approximate order in which they appear.
Sample Output
Release Information
IN THIS SECTION
Syntax | 1055
Description | 1055
Options | 1055
Syntax
Description
Options
view
Output Fields
Table 72 on page 1056 lists the output fields for the command. Output fields are listed in the
approximate order in which they appear.
1056
Used/total port Port block used number and port block total number for this source NAT pool.
blocks
Port Block Range The range of ports in a block, ranging from lowest to highest.
Sample Output
Release Information
IN THIS SECTION
Syntax | 1058
Description | 1058
Options | 1058
Syntax
Description
Options
pcp (Optional) Display only information about port control protocol mappings.
NOTE: PCP requests with the prefer-failure option request a particular external IP address and
port. When the request cannot be fulfilled, the mapping is not created. In this case, the
subscriber does not have a mapped IP address. Such a subscriber is counted in the summary of
the number or address mappings, but is not displayed in the list of address mappings, as shown in
the following examples:
This is expected behavior because unfulfilled address mappings (IP of 0.0.0.0) are not displayed
in the output of the second CLI command. These address mappings will time out based on
configured or default values.
view
1059
Sample Output
Session Count : 1
Mapping State : Active
Release Information
IN THIS SECTION
Syntax | 1062
Description | 1062
Options | 1062
Syntax
Description
Options
view
Output Fields
Table 73 on page 1063 lists the output fields from the show services nat source mappings endpoint-
independent command. Output fields are listed in the approximate order in which they appear.
1063
Table 73: show services nat source mappings endpoint-independent Output Fields
Mapping State NAT mapping state. The following states are possible:
Sample Output
show services nat source mappings endpoint-independent private 15.4.4.2 public 20.20.20.1
(ms-interfaces)
user@host> show services nat source mappings endpoint-independent private 15.4.4.2 public
20.20.20.1
Interface: ms-2/0/0, Service set: ss1
NAT pool: p1
Mapping : 15.4.4.2 :12841 --> 20.20.20.1 :11205
Session Count : 1
Mapping State : Active
show services nat source mappings address-pooling-paired pool-name sp1 (sp- interfaces)
Sample Output
Release Information
Support for Next Gen Services with the MX-SPC3 security services card added in Junos OS Release
20.2.
IN THIS SECTION
Syntax | 1065
Description | 1065
Options | 1066
Syntax
Description
Options
interface interface-name Display PCP source NAT mapping for the specified interface.
service-set service-set Display PCP source NAT mapping for the specified service set.
view
Sample Output
user@host> show services nat source mappings pcp Interface: vms-0/0/0, Service set: in
NAT pool: p
PCP Client : 10.1.1.2 PCP lifetime : 995
Mapping : 10.1.1.2 : 9000 --> 8.8.8.8 : 1025
Session Count : 1
Mapping State : Active
DS-LITE output:
===============
PCP Client : 2222::1 PCP lifetime : 106
Mapping : 88.1.0.47 : 47 --> 70.70.70.1 :41972
Session Count : 1
Mapping State : Active
B4 Address : 2222::1
Release Information
IN THIS SECTION
Syntax | 1067
Description | 1067
Options | 1067
Syntax
Description
Options
interface interface-name Display source NAT mapping information for the specified interface.
service-set service-set Display source NAT mapping information for the specified service set.
view
1068
Output Fields
Table 74 on page 1068 lists the output fields for the show services nat source mappings summary
command. Output fields are listed in the approximate order in which they appear.
Table 74: show services nat source mappings summary Output Fields
Total number of endpoint independent port Displays total number of endpoint independent port
mappings mappings.
Total number of endpoint independent filters Displays total number of endpoint independent
filters.
Sample Output
Release Information
IN THIS SECTION
Syntax | 1069
Description | 1069
Options | 1069
Syntax
Description
Options
view
Output Fields
Table 75 on page 1070 lists the output fields for the show services nat source pool command. Output
fields are listed in the approximate order in which they appear.
Host address base Base address of the original source IP address range.
Translation hits Number of times there is traffic that matches the source
rule.
Table 75: show services nat source pool Output Fields (Continued)
Mapping-timeout Duration for mappings that use the specified NAT pool.
EIF Inbound session limit exceeded drops Number of EIF inbound sessions that exceed the drop
limit.
Ports
Table 75: show services nat source pool Output Fields (Continued)
Sample Output
Error Counters:
Out of port errors : 0
Out of address errors : 0
Parity port errors : 0
Preserve Range errors : 0
APP port allocation errors : 0
APP port limit allocation errors : 0
Port block allocation errors : 0
Port blocks limit exceeded errors : 0
show services nat source pool service-set ss1_interface_style1 interface vms-0/2/0 all
user@router>show services nat source pool service-set ss1_interface_style1 interface vms-0/2/0 all
Interface: vms-0/2/0 , Service set: ss1_interface_style1
Pool name : src_pool1
Pool id : 4
Routing instance : default
Host address base : 0.0.0.0
Port : [1024, 63487]
Twin port : [63488, 65535]
Port overloading : 1
Address assignment : no-paired
Total addresses : 254
Translation hits : 3
Address range Single Ports Twin Ports
44.0.0.1 - 44.0.0.254 1 0
Total used ports : 1 0
Release Information
IN THIS SECTION
Syntax | 1076
Description | 1076
Options | 1076
Syntax
Description
Options
host-ip ip-address Display port block allocation information for the specified host.
pool pool-name Display port block allocation information for the specified pool.
xlated-ip translated-ip-address Display port block allocation information for the specified translated
IP address.
xlated-port translated-port- Display port block allocation information for the specified translated
number port number.
view
Output Fields
Table 76 on page 1077 lists the output fields for the show services nat source port block command.
Output fields are listed in the approximate order in which they appear.
1077
Table 76: show services nat source port block Output Fields
Max port blocks per host Maximum number of blocks that one host can use for translation.
Port block active timeout Longest duration that a block remains active for port allocation.
Used/total port blocks Current number of used ports and total number of ports in this source
pool.
Port Block Range Port range of one PBA port block entry from the lowest to the highest
port number that can be allowed to allocate ports for this block.
Ports Used/Ports Total Current number of used ports and total number of ports in this source
pool.
1078
Table 76: show services nat source port block Output Fields (Continued)
Block State/Left Time (s) PBA port block entry state for NAT port allocation, including Active,
Inactive, Query, and the time left for a port block that is in the Active or
Query state.
Sample Output
Range
Ports_Total Left_Time(s)
1.1.1.100 30.30.30.1 13824-14335
1/512*1 Active/71
Failed sessions : 0
Number of sessions : 0
Release Information
IN THIS SECTION
Syntax | 1079
Description | 1080
Options | 1080
Syntax
Description
Options
rule-name Display source NAT rule-set information for the specified rule.
interface interface-name Display rule-set information about the adaptive services interface.
view
Output Fields
Table 77 on page 1080 lists the output fields for the show services nat source rule command. Output
fields are described in the approximate order in which they appear.
Table 77: show services nat source rule Output Fields (Continued)
• Source address • Name of the source address that matches the rule.
Action
• Inactivity timeout
Translation hits Use this field to check for traffic that matches the rule.
Note the successful or failed sessions.
• Successful sessions
• Failed sessions
Sample Output
Rule position : 1
Match-direction : input
Match
Source addresses : 0.0.0.0 - 255.255.255.255
Destination addresses : 0.0.0.0 - 255.255.255.255
Application : configured
Action : src_pool1
Persistent NAT type : N/A
Persistent NAT mapping type : address-port-mapping
Inactivity timeout : 0
Max session number : 0
Translation hits : 3
Successful sessions : 3
Failed sessions : 0
Number of sessions : 1
Release Information
IN THIS SECTION
Syntax | 1083
Description | 1083
Options | 1083
Syntax
Description
Options
interface interface-name Display source NAT rule application information for the specified interface.
1084
service-set service-set Display source NAT rule application information for the specified service set.
view
Output Fields
Table 78 on page 1084 lists the output fields for the show services nat source rule-application
command. Output fields are described in the approximate order in which they appear.
Service set Displays rule application for the specified service set.
Sample Output
Release Information
IN THIS SECTION
Syntax | 1086
Description | 1086
Options | 1086
Syntax
Description
Options
interface interface-name Display source NAT summary information for the specified interface.
service-set service-set Display source NAT summary information for the specified service set.
view
Output Fields
Table 79 on page 1086 lists the output fields for the show services nat source summary command.
Output fields are listed in the approximate order in which they appear.
Table 79: show services nat source summary Output Fields (Continued)
Sample Output
user@host> show services nat source summary service-set ss1_interface_style11 interface vms-0/2/0
Interface: vms-0/2/0 , Service set: ss1_interface_style1
Pool Address Routing PAT Total
Name Range Instance Address
src_pool1 44.0.0.1-44.0.0.254 default yes 254
Interface: vms-0/2/0 , Service set: ss1_interface_style1
Rule name Rule set Match-direction Action
r1 rs1 input src_pool1
1088
Release Information
IN THIS SECTION
Syntax | 1088
Description | 1088
Options | 1088
Syntax
Description
Options
view
1089
Output Fields
Table 80 on page 1089 lists the output fields for the show services pcp statistics command. Output
fields are listed in the approximate order in which they appear.
Protocol Statistics Overall PCP statistics, consisting of: operational, option, and
results statistics.
Map request received Total PCP MAP requests received from PCP clients.
Other options counters Number of packets received with options other than prefer-fail
and third-party.
PCP unsupported version Number of PCP packets received with version other than 1.
Out of resources Number of times a mapping could not be provided because the
PCP server ran out of pool resources.
Unsupported protocol Number of requests for which the protocol was neither TCP nor
UDP.
User exceeded quota Number of requests for which the PCP client requested more
than the configured number of ports.
1091
Cannot provide external Number of requests for which the PCP server cannot provide the
external address or port requested by the client.
Address mismatch Number of requests for which the PCP client IP address and the
layer-3 source IP do not match.
Sample Output
Protocol Statistics:
Operational Statistics
Option Statistics
Result Statistics
PCP success : 0
PCP unsupported version : 0
Not authorized : 0
Bad requests : 0
Unsupported opcode : 0
Unsupported option : 0
Bad option : 0
Network failure : 0
Out of resources : 0
Unsupported protocol : 0
User exceeded quota : 0
Cannot provide external : 0
Address mismatch : 0
Excessive number of remote peers : 0
Processing error : 0
Other result counters : 0
Release Information
IN THIS SECTION
Syntax | 1093
Description | 1093
Syntax
Description
view
Output Fields
Table 81 on page 1093 lists the output fields for the show services policies command. Fields are listed in
the approximate order in which they appear.
Default policy
Scope policy
Sequence number Number of the policy within a given context. For example, three
policies that are applicable in a from-zoneA-to-zoneB context
might be ordered with sequence numbers 1,2,3. Also, in a from-
zoneC-to-zoneD context, four policies might have sequence
numbers 1,2,3,4.
Match direction
Source addresses Names of the source addresses for a policy. Address sets are
resolved to their individual Names of the source addresses for a
policy. Address sets are resolved to their individual
Destination addresses Name of the destination address (or address set as it was
entered om the destination zone’s address book.
Application
1095
Sample Output
Release Information
IN THIS SECTION
Syntax | 1096
Description | 1096
Syntax
Description
view
Output Fields
Table 82 on page 1096 lists the output fields for the show services policies detail command. Output
fields are listed in the approximate order in which they appear.
Default policy
Policy
Action type
Scope policy
Policy type
Sequence number Number of the policy within a given context. For example, three
policies that are applicable in a from-zoneA-to-zoneB context
might be ordered with sequence numbers 1,2,3. Also, in a from-
zoneC-to-zoneD context, four policies might have sequence
numbers 1,2,3,4.
Source addresses The names and corresponding IP addresses for the policy.
Address sets are resolved to their individual address name-IP
address pairs.
Destination addresses Name of the destination address (or address set) as it was
entered in the destination zone’s address book. A packet’s
destination address must match this value for the policy to apply
to it.
Application
IP protocol
Inactivity timeout
1098
Sample Output
any-ipv6(global): ::/0
Destination addresses:
any-ipv4(global): 0.0.0.0/0
any-ipv6(global): ::/0
Application: any
IP protocol: 0, ALG: 0, Inactivity timeout: 0
Source port range: [0-0]
Destination port range: [0-0]
Per policy TCP Options: SYN check: No, SEQ check: No, Window scale: No
Release Information
IN THIS SECTION
Syntax | 1099
Description | 1099
Syntax
Description
view
Output Fields
Sample Output
Release Information
IN THIS SECTION
Syntax | 1101
Description | 1101
Syntax
Description
view
Output Fields
Sample Output
Release Information
IN THIS SECTION
Syntax | 1102
Description | 1102
Syntax
Description
view
Output Fields
Sample Output
Release Information
IN THIS SECTION
Syntax | 1103
Description | 1104
Options | 1104
Syntax
Description
Display redundancy group status information for all redundancy groups or a specified redundancy group.
Options
brief | extensive | terse (Optional) Display the specified level of output. When no level is specified,
display terse level output.
• Default: terse
view
Output Fields
Table 83 on page 1104 lists the output fields for the show services redundancy-group command.
Output fields are listed in the approximate order in which they appear.
ICCP process Status of the connection between the srd and all levels
connection iccpd.
• Connected
• Not connected
Number of peer RG Total number of peers in the redundancy group. brief, extensive
connections
1105
RS ID terse
• MASTER
• STANDBY
• INITIALIZING
• STANDBY (WARNED)
• MASTER
• STANDBY
• INITIALIZING
• STANDBY (WARNED)
• Connected
• Not Connected
Connection status Status of the connection between the srd and brief, extensive
iccpd.
• Connected
• Not Connected
Redundancy Set State of the local redundancy set state. brief, extensive
state
• INITIALIZING
• MASTER
• STANDBY
• STANDBY (WARNED)
Redundancy Set State of the peer redundancy set state. brief, extensive
peer state
• INITIALIZING
• MASTER
• STANDBY
• STANDBY (WARNED)
Failed Interfaces List of all monitored interfaces that are down. brief, extensive
Service Set Service set used for stateful sync. brief, extensive
Type Type of redundancy and stateful sync for the brief, extensive
listed service interface.
• Inter-chassis
• Intra-chassis
• active
• backup
• Up
• Down
1108
RG data sent count Number of packets of messages sent from srd to extensive
a peer.
• Link-down
• Routing restart/terminate
• Peer primary-role-acquire
• Peer primary-role-release
• Link-down
• Routing restart/terminate
• Peer primary-role-acquire
• Peer primary-role-release
1113
Sample Output
Redundancy Group ID : 1
Number of peer RG connections : 1
Local RG IP : 172.19.39.70
RS ID Local RS state Peer RS state Peer RG IP Status
1 MASTER STANDBY 172.19.39.69 Connected
Release Information
IN THIS SECTION
Syntax | 1117
Description | 1117
Options | 1117
1117
Syntax
Description
Display the configuration information about the specified services screen. You can configure a ids-
option to enable screen protection on the MX Series devices.
Options
view
Output Fields
1118
Sample Output
Name Value
ICMP flood threshold 0
UDP flood threshold 0
TCP winnuke enabled
TCP port scan threshold 0
ICMP address sweep threshold 0
TCP sweep threshold 0
UDP sweep threshold 0
IP tear drop enabled
TCP SYN flood attack threshold 0
TCP SYN flood alarm threshold 0
TCP SYN flood source threshold 0
TCP SYN flood destination threshold 0
TCP SYN flood timeout 0
ICMP ping of death enabled
IP source route option enabled
TCP land attack enabled
TCP SYN fragment enabled
TCP no flag enabled
IP unknown protocol enabled
IP bad options enabled
IP record route option enabled
IP timestamp option enabled
IP security option enabled
IP lose source route option enabled
IP stream option enabled
ICMP fragmentation enabled
ICMP large packet enabled
TCP SYN FIN enabled
TCP FIN no ACK enabled
Session source limit threshold 0
Session destination limit threshold 0
Alarm without drop enabled
1119
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
ids-option
IN THIS SECTION
Syntax | 1119
Description | 1119
Options | 1119
Syntax
Description
Options
view
Output Fields
Table 84 on page 1120 lists the output fields for the show services screen statistics service-set
command. Output fields are listed in the approximate order in which they appear.
ICMP flood Internet Control Message Protocol (ICMP) flood counter. An ICMP
flood typically occurs when ICMP echo requests use all resources in
responding, such that valid network traffic can no longer be processed.
UDP flood User Datagram Protocol (UDP) flood counter. UDP flooding occurs
when an attacker sends IP packets containing UDP datagrams with the
purpose of slowing down the resources, such that valid connections
can no longer be handled.
TCP port scan Number of TCP port scans. The purpose of this attack is to scan the
available services in the hopes that at least one port will respond, thus
identifying a service to target.
ICMP address sweep Number of ICMP address sweeps. An IP address sweep can occur with
the intent of triggering responses from active hosts.
1121
Table 84: show services screen statistics service-set Output Fields (Continued)
IP tear drop Number of teardrop attacks. Teardrop attacks exploit the reassembly
of fragmented IP packets.
ICMP ping of death ICMP ping of death counter. Ping of death occurs when IP packets are
sent that exceed the maximum legal length (65,535 bytes).
TCP land attack Number of land attacks. Land attacks occur when an attacker sends
spoofed SYN packets containing the IP address of the victim as both
the destination and source IP address.
TCP no flag Number of TCP headers without flags set. A normal TCP segment
header has at least one control flag set.
Table 84: show services screen statistics service-set Output Fields (Continued)
IP record route option Number of packets with the IP record route option enabled. This
option records the IP addresses of the network devices along the path
that the IP packet travels.
IP timestamp option Number of IP timestamp option attacks. This option records the time
(in Universal Time) when each network device receives the packet
during its trip from the point of origin to its destination.
IP loose source route option Number of IP loose source route option attacks. This option specifies a
partial route list for a packet to take on its journey from source to
destination.
IP strict source route option Number of IP strict source route option attacks. This option specifies
the complete route list for a packet to take on its journey from source
to destination.
IP stream option Number of stream option attacks. This option provides a way for the
16-bit SATNET stream identifier to be carried through networks that
do not support streams.
ICMP fragment Number of ICMP fragments. Because ICMP packets contain very short
messages, there is no legitimate reason for ICMP packets to be
fragmented. If an ICMP packet is so large that it must be fragmented,
something is amiss.
TCP FIN no ACK Number of TCP FIN flags without the acknowledge (ACK) flag.
1123
Table 84: show services screen statistics service-set Output Fields (Continued)
Source session limit Number of concurrent sessions that can be initiated from a source IP
address.
TCP SYN-ACK-ACK proxy Number of TCP flags enabled with SYN-ACK-ACK. To prevent
flooding with SYN-ACK-ACK sessions, you can enable the SYN-ACK-
ACK proxy protection screen option. After the number of connections
from the same IP address reaches the SYN-ACK-ACK proxy threshold
and SRX Series devices running Junos OS reject further connection
requests from that IP address.
Destination session limit Number of concurrent sessions that can be directed to a single
destination IP address.
Sample Output
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
ids-option
Example: Configuring Multiple Screening Options
1125
IN THIS SECTION
Syntax | 1125
Description | 1125
Options | 1125
Syntax
Description
Options
View
Output Fields
Table 85 on page 1126 lists the output fields for the show services security-intelligence category
summary command. Output fields are listed in the approximate order in which they appear.
1126
Update interval Amount of time after which Policy Enforcer sends an update for the feed.
TTL Length of time (in minutes) the file remains open, receiving statistics before it is
closed, transferred, and rotated. When either the time or the file size is exceeded,
the file is closed and a new one is opened, whether or not a transfer site is
specified.
• Version
• Object umber
• Create time
• Update time
• Update status
• Expired
• Options
• Status
1127
Sample Output
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240,
MX480, and MX960 with the MX-SPC3 services card.
Support for threat feed status (enabled, disabled, or user disabled) is added in Junos OS Release 20.1R1.
1128
RELATED DOCUMENTATION
security-intelligence
IN THIS SECTION
Syntax | 1128
Description | 1128
Syntax
Description
View
Sample Output
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240,
MX480, and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
security-intelligence
IN THIS SECTION
Syntax | 1129
Description | 1130
Options | 1130
Syntax
Description
Display service set CPU usage as a percentage. The command is supported only on Adaptive Services
PICs (SP PICs).
Options
none Display CPU usage for all adaptive services interfaces and service sets.
interface (Optional) Display CPU usage for a particular interface. On M Series and T Series
interface-name routers, the interface-name parameter can have the value sp-fpc/pic/port or
rspnumber.
service-set (Optional) Display CPU usage for a particular service set. For the Layer 2 Tunneling
service-set-name Protocol (L2TP), you can use a tunnel group to represent a service set.
view
Output Fields
Table 86 on page 1130 lists the output fields for the show services service-sets cpu-usage command.
Output fields are listed in the approximate order in which they appear.
• Idle
• System
• Receive
• Transmit
Sample Output
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
1132
IN THIS SECTION
Syntax | 1132
Description | 1132
Options | 1132
Syntax
Description
Options
interface (Optional) Display memory usage for a particular interface. On M Series and T Series
interface-name routers, the interface-name can be sp-fpc/pic/port, or rspnumber.
service-set (Optional) Display memory usage for a particular service set. For Layer 2 Tunneling
service-set- Protocol (L2TP), you can use a tunnel group to represent a service set.
name
zone (Optional) Display the memory usage zone of the adaptive services interface or an
individual service set.
view
Output Fields
Table 87 on page 1133 lists the output fields for the show services service-sets memory-usage
command. Output fields are listed in the approximate order in which they appear.
Memory zone Memory zone in which the adaptive services interface is currently
operating:
• Orange—New flows are allowed only for service sets that are using
less than their equal share of memory.
Sample Output
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
IN THIS SECTION
Syntax | 1135
Description | 1135
1135
Options | 1135
Syntax
Description
Options
interface interface-name Display service set plug-ins information for the specified interface.
view
Output Fields
Sample Output
Plugins configured: 1
Plugin: junos-alg, ID: 25
Release Information
IN THIS SECTION
Syntax | 1136
Description | 1136
Options | 1136
Syntax
Description
Display statistics for packet drops resulting from header-integrity, suspicious packet pattern, and
session-limit checks performed by an MS-MPC or MS-MIC.
Options
none Display statistics for all configured service interfaces and service sets.
1137
<interface interface-name> (Optional) Display statistics for the specified services interface.
<service-set service-set-name > (Optional) Display statistics for the specified service set.
view
Output Fields
Table 88 on page 1137 lists the output fields for the show services service-set integrity-drops
command. Output fields are listed in the approximate order in which they appear.
Table 88: show services service-set statistics screen drops Output Fields
Table 88: show services service-set statistics screen drops Output Fields (Continued)
Table 88: show services service-set statistics screen drops Output Fields (Continued)
Table 88: show services service-set statistics screen drops Output Fields (Continued)
Table 88: show services service-set statistics screen drops Output Fields (Continued)
TCP Errors Number of TCP protocol errors for the following categories:
Table 88: show services service-set statistics screen drops Output Fields (Continued)
UDP Errors Number of UDP protocol errors for the following categories:
Table 88: show services service-set statistics screen drops Output Fields (Continued)
ICMP Errors Number of ICMP protocol errors for the following categories:
Sample Output
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1146
Description | 1146
Options | 1146
Syntax
Description
Display counters for session drops and packet drops resulting from session-limit checks performed by an
IDS rule on an MS-MPC or MS-MIC.
Options
interface interface-name (Optional) Display statistics for the specified services interface.
view
Output Fields
Table 89 on page 1147 lists the output fields for the show services service-set statistics ids session-
limits counters command. Output fields are listed in the approximate order in which they appear.
Table 89: show services service-sets statistics ids session-limits counters Output Fields
TCP Counters Session-limit TCP counters in the ingress direction for the
following:
Table 89: show services service-sets statistics ids session-limits counters Output Fields (Continued)
UDP Counters Session-limit UDP counters in the ingress direction for the
following:
Table 89: show services service-sets statistics ids session-limits counters Output Fields (Continued)
ICMP Counters Session-limit ICMP counters in the ingress direction for the
following:
Table 89: show services service-sets statistics ids session-limits counters Output Fields (Continued)
Egress General Info Information for IDS rules for the service set in the egress
direction.
• Match-direction—Displays output.
Table 89: show services service-sets statistics ids session-limits counters Output Fields (Continued)
Egress TCP Counters Session-limit TCP counters in the egress direction for the
following:
Table 89: show services service-sets statistics ids session-limits counters Output Fields (Continued)
Egress UDP Counters Session-limit UDP counters in the egress direction for the
following:
Table 89: show services service-sets statistics ids session-limits counters Output Fields (Continued)
Egress ICMP Counters Session-limit ICMP counters in the egress direction for the
following:
Table 89: show services service-sets statistics ids session-limits counters Output Fields (Continued)
Egress Other-Protocols Counters Session-limit counters in the egress direction for protocols
other than TCP, UDP, and ICMP for the following:
Sample Output
Packets allowed: 0
Packets dropped due to high pps: 0
UDP Counters:
Sessions allowed: 0
Sessions ignored: 0
Sessions dropped due to maximum reached: 0
Sessions dropped due to high rate: 0
Packets allowed: 0
Packets dropped due to high pps: 0
ICMP Counters:
Sessions allowed: 0
Sessions ignored: 0
Sessions dropped due to maximum reached: 0
Sessions dropped due to high rate: 0
Packets allowed: 0
Packets dropped due to high pps: 0
Other-Protocols Counters:
Sessions allowed: 0
Sessions ignored: 0
Sessions dropped due to maximum reached: 0
Sessions dropped due to high rate: 0
Packets allowed: 0
Packets dropped due to high pps: 0
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
IN THIS SECTION
Syntax | 1157
Description | 1157
Options | 1157
Syntax
Description
Display integrity-drops statistics for one adaptive services interface, for all adaptive services interfaces,
or for one service-set. You can configure use the output of this command to verify the packet header for
anomalies in IP, TCP, UDP, and IGMP information and to examine any anomalies and errors.
Options
service-set service-set- (Optional) Display integrity-drops statistics for the specified service-set
name
interface interface-name (Optional) Display integrity-drops statistics for the specified adaptive
services interface.
view
Output Fields
Table 90 on page 1157 lists the output fields for the show services service-sets integrity-drops
command. Output fields are listed in the approximate order in which they appear.
Sample Output
Non-IPv4 packets: 0
Non-IPv6 packets: 0
Bad checksum: 0
Illegal IP fragment length: 0
IP fragment overlap: 0
IP fragment limit exceeded: 0
IP fragment reassembly timeout: 0
Unknown: 0
TCP errors:
TCP header length inconsistencies: 0
Source or destination port number is zero: 0
Illegal sequence number and flags combinations: 0
UDP errors:
IP data length less than minimum UDP header length (8 bytes): 0
Source or destination port number is zero: 0
ICMP errors:
IP data length less than minimum ICMP header length (8 bytes): 0
ICMP error length inconsistencies: 0
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1163
Description | 1163
1163
Options | 1163
Syntax
Description
Display the number of dropped packets for service sets exceeding CPU limits or memory limits.
Options
none Display the number of dropped service sets packets for all adaptive services
interfaces.
interface (Optional) Display the number of dropped service sets packets for a particular
interface-name interface. On M Series and T Series routers, interface-name can be ms-fpc/pic/port,
sp-fpc/pic/port, or rspnumber.
view
Output Fields
Table 91 on page 1164 lists the output fields for the show services service-sets packet-drops command.
Output fields are listed in the approximate order in which they appear.
1164
CPU limit Drops Number of packets dropped because the service set exceeded the
average CPU limit.
Memory limit Drops Number of packets dropped because the service set exceeded the
memory limit.
Flow limit Drops Number of packets dropped because the service set exceeded the
flow limit.
Sample Output
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
1165
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1165
Description | 1165
Options | 1165
Syntax
Description
Display the system log statistics with optional filtering by interface and service set name.
Options
none Display the system log statistics for all services interfaces and all service sets.
1166
interface interface- (Optional) Display the system log statistics for a specific adaptive service
name interface. On M Series and T Series routers, interface-name can be ms-fpc/pic/
port, sp-fpc/pic/port, or rspnumber.
service-set service- (Optional) Display the system log statistics for a specific named service-set.
set-name
view
Output Fields
Table 92 on page 1166 lists the output fields for the show services service-sets statistics syslog
command. Output fields are listed in the approximate order in which they appear.
Sent Number of messages sent that are not associated with all
a service set.
Service-set
Table 92: show services service-sets statistics syslog Output Fields (Continued)
Sent Number of sent messages that are associated with the all
service set.
Session open logs The following information is displayed for system log detail
messages for session open events that are logged and
are associated with the service set:
Table 92: show services service-sets statistics syslog Output Fields (Continued)
Session close logs The following information is displayed for system log detail
messages for session close events that are logged and
are associated with the service set:
Packet logs The following information is displayed for system log detail
messages for packet events that are logged and are
associated with the service set:
Table 92: show services service-sets statistics syslog Output Fields (Continued)
Stateful firewall logs The following information is displayed for system log detail
messages for stateful firewall events that are logged
and are associated with the service set:
ALG logs The following information is displayed for system log detail
messages for ALG events that are logged and are
associated with the service set:
Table 92: show services service-sets statistics syslog Output Fields (Continued)
NAT logs The following information is displayed for system log detail
messages for NAT events that are logged and are
associated with the service set:
IDS logs The following information is displayed for system log detail
messages for IDS events that are logged and are
associated with the service set:
Table 92: show services service-sets statistics syslog Output Fields (Continued)
Other logs The following information is displayed for system log detail
messages for other types of events that are logged and
are associated with the service set:
Sample Output
Service-set: sset-sfw-sp2
Sent: 210
Dropped: 579
Sample Output
Interface: ms-2/1/0
Rate limit: 0
Sent: 0
Dropped: 0
Service-set: sset1
Sent: 0
Dropped: 0
Session open logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)
Session close logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)
Packet logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)
Stateful firewall logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)
ALG logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)
NAT logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)
1173
IDS logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)
PCP MAP logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)
PCP protocol logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)
PCP protocol error logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)
PCP debug logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)
Other logs:
Sent: 0
Dropped: 0 (low priority: 0, none severity: 0, no class set: 0, above rate
limit: 0)
Following shows the output for the show services service-sets statistics syslog on the MX-SPC3
services cards vms-x/y/z interfaces.
command-name
SCREEN 0 0
ALG 0 0
NAT 0 0
FLOW 0 0
SCTP 0 0
GTP 0 0
IPSEC 0 0
IDP 0 0
RTLOG 0 0
PST_DS_LITE 0 0
APPQOS 0 0
SECINTEL 0 0
AAMW 0 0
OTHERS 0 0
Release Information
Support for this command introduced in Junos OS Release 19.3R2 for Next Gen Services with the MX-
SPC3 services card on MX240, MX480 and MX960 routers.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1175
Description | 1175
Options | 1175
Syntax
Description
Options
view
Output Fields
1176
Sample Output
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
Configuring TFO
1177
IN THIS SECTION
Syntax | 1177
Description | 1177
Options | 1177
Syntax
Description
Options
none Display service set summary information for all adaptive services interfaces.
interface interface- (Optional) Display service set summary information for a particular interface.
name On M Series and T Series routers, interface-name can be ms-fpc/pic/port, sp-
fpc/pic/port, or rspnumber.
view
1178
Output Fields
Table 93 on page 1178 lists the output fields for the show services service-sets summary command.
Output fields are listed in the approximate order in which they appear.
Service type Type of adaptive service, such as stateful firewall (SFW), Network
Address Translation (NAT), intrusion detection service (IDS), Layer 2
Tunneling Protocol (L2TP), Compressed Real-Time Transport Protocol
(CRTP), or IP Security (IPsec)
Service sets configured Total number of service sets configured on the PIC that use internal
service set IDs and do not consume external service sets, including
CRTP and L2TP
Policy bytes used Policy bytes used by a particular service or all services
Sample Output
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
IN THIS SECTION
Syntax | 1180
Description | 1180
Options | 1180
Syntax
Description
NOTE: On MX Series routers (with interchassis redundancy configured), the idle timeout for
every flow is displayed in the show services session extensive and show services flows
extensive commands.
Options
• h323—H.323
• icmp—ICMP
• icmpv6—ICMPv6
• ike-esp-nat—IKE ALG
• ip—IP
• login—LOGIN
• netbios—NETBIOS
• netshow—NETSHOW
• realaudio—RealAudio
• rsh—Remote Shell
• shell—Shell
• snmp—SNMP
• sql—SQLNet
• talk—Talk Program
• traceroute—Traceroute
1182
• winframe—WinFrame
NOTE: You can use the none option with the show services sessions
count application-protocol command to display information about
sessions other than ALG sessions.
destination-port (Optional) Display information for the specified destination port. The range of
destination-port values is from 0 to 65,535.
protocol protocol (Optional) Display information about one of the following IP types:
service-set service- (Optional) Display information for the specified service set.
set
source-port source- (Optional) Display information for the specified source port. The range of values is
port from 0 to 65,535.
view
Output Fields
Table 94 on page 1183 lists the output fields for the show services sessions command. Output fields are
listed in the approximate order in which they appear.
IP Action Flag indicating whether IP action has been set for the All levels
session.
Offload Flag indicating whether the session has been offloaded to All levels
the Packet Forwarding Engine.
application-protocol
Service set Name of a service set. Individual empty service sets are not count
displayed.
Sample Output
The output for the show services flows brief command is identical to that for the show services
sessions command. For sample output, see "show services sessions" on page 1184.
400000+ :0
350001 - 400000 :0
300001 - 350000 :0
250001 - 300000 :0
200001 - 250000 :0
150001 - 200000 :0
50001 - 150000 :0
40001 - 50000 :0
30001 - 40000 :0
20001 - 30000 :0
10001 - 20000 :0
1001 - 10000 :0
1 - 1000 :0
0 :638051
400000+ :0
350001 - 400000 :0
1188
300001 - 350000 :0
250001 - 300000 :0
200001 - 250000 :0
150001 - 200000 :0
50001 - 150000 :0
40001 - 50000 :0
30001 - 40000 :0
20001 - 30000 :0
10001 - 20000 :0
1001 - 10000 :0
1 - 1000 :0
0 :638051
This command has the same output for the rpc, dce-rpc, rpc-portmap and dce-rpc-portmap ALGs.
Release Information
Command introduced in Junos OS Release 19.3R2 on MX Series for Next Gen Services for CGNAT 6rd
softwires running inline on the MPC card and specifying the si-1/0/0 interface naming
convention.Support added in Junos OS Release 20.2R1 for Next Gen Services CGNAT DS-Lite softwires
on the MX-SPC3 security services card .
IN THIS SECTION
Syntax | 1194
Description | 1195
Options | 1195
Syntax
Description
Display the session information for each service set in each member interface of the AMS interface.
Options
• sqlnet—SQL *Net
• traceroute—Traceroute
destination-port (Optional) Display information for a particular destination port. The range of
destination-port values is from 0 through 65,535.
protocol protocol (Optional) Display information about one of the following IP types:
1196
view
Output Fields
Table 95 on page 1197 lists the output fields for the show services sessions command. Output fields are
listed in the approximate order in which they appear.
1197
Interface Name of the member interface (mams-) and the aggregated multiservices interface
(ams) to which it belongs.
IP Action Flag indicating whether IP action has been set for the session.
Offload Flag indicating whether the session has been offloaded to the Packet Forwarding
Engine.
Service set Name of a service set. Individual empty service sets are not displayed.
Source Source prefix of the flow in the format source-prefix:port. For ICMP flows, port
information is not displayed.
1198
Dest Destination prefix of the flow. For ICMP flows, port information is not displayed.
Sample Output
[...output truncated...]
mams-1/1/0 (ams0)
Service Set: napt_set, Session: 16777234, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
Service Set: napt_set, Session: 16777233, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
[...output truncated...]
mams-5/0/0 (ams0)
Service Set: napt_set, Session: 16777225, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
[...output truncated...]
mams-5/1/0 (ams0)
Service Set: napt_set, Session: 16777233, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
[...output truncated...]
Service Set: napt_set, Session: 16777222, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
UDP 30.30.30.51:63 -> 40.40.40.51:63 Forward I 2543
UDP 40.40.40.51:63 -> 30.30.30.169:6001 Forward O 0
[...output truncated...]
mams-5/1/0 (ams0)
Service Set: napt_set, Session: 16777233, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
UDP 30.30.30.61:63 -> 40.40.40.61:63 Forward I 2544
UDP 40.40.40.61:63 -> 30.30.30.172:6004 Forward O 0
Service Set: napt_set, Session: 16777232, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
UDP 30.30.30.52:63 -> 40.40.40.52:63 Forward I 2545
UDP 40.40.40.52:63 -> 30.30.30.175:6003 Forward O 0
Service Set: napt_set, Session: 16777231, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
UDP 30.30.30.47:63 -> 40.40.40.47:63 Forward I 2545
UDP 40.40.40.47:63 -> 30.30.30.174:6003 Forward O 0
Service Set: napt_set, Session: 16777230, ALG: none, Flags: 0x2000, IP Action:
no, Offload: no, Asymmetric: no
UDP 30.30.30.46:63 -> 40.40.40.46:63 Forward I 2545
UDP 40.40.40.46:63 -> 30.30.30.173:6003 Forward O 0
[...output truncated...]
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
IN THIS SECTION
Syntax | 1204
Description | 1204
Options | 1204
Syntax
Description
Options
view
Output Fields
Table 96 on page 1205 lists the output fields for the show services sessions analysis command. Output
fields are listed in the approximate order in which they appear.
Services PIC Name FPC and PIC slots for the services PIC on which the sessions are running.
Total Sessions Active Total active sessions in the MS-PIC including TCP, UDP, ICMP and
Softwires.
Total Other Sessions Total other active sessions in the MS-PIC including ICMP and softwires.
Active
Total Predicted Sessions Predicted sessions are created only by the ALG traffic using the L3/L4
Active information available.
Created Sessions per Session setup rate at the time of running the command.
Second
1206
Deleted Sessions per Session deletion rate at the time of running the command.
Second
Peak Total Sessions Highest number of active sessions since the last PIC restart or since the
Active last time session statistics are flushed.
Peak Total TCP Sessions Highest number of active TCP sessions since the last PIC restart or since
Active the last time session stats are flushed.
Peak Total UDP Highest number of active UDP sessions since the last PIC restart or since
Sessions Active the last time session statistics are flushed.
Peak Total Other Highest number of other active sessions since the last PIC restart or since
Sessions Active the last time session statistics are flushed.
Peak Created Sessions Maximum session setup rate observed since the last PIC restart or since
per Second the last time session statistics are flushed.
Peak Deleted Sessions Maximum session deletion rate observed since the last PIC restart or from
per Second the last time session statistics are flushed.
Slow path forward Number of packets forwarded in the slow path (that is, after the successful
rule match and session creation).
Slow path discard Number of packets discarded before the session creation.
1207
Session Rate Data: Number of samples used to calculate the session rate since the last PIC
Number of Samples restart or since the last time session statistics are flushed.
Session Lifetime Number of TCP, UDP, and HTTP sessions whose length was in the
Distribution(sec): indicated range in seconds.
Sample Output
400000+ :0
350001 - 400000 :0
300001 - 350000 :0
250001 - 300000 :0
200001 - 250000 :0
150001 - 200000 :0
50001 - 150000 :0
40001 - 50000 :0
30001 - 40000 :0
20001 - 30000 :0
10001 - 20000 :0
1001 - 10000 :0
1 - 1000 :0
0 :3518
400000+ :0
350001 - 400000 :0
300001 - 350000 :0
250001 - 300000 :0
200001 - 250000 :0
150001 - 200000 :0
50001 - 150000 :0
40001 - 50000 :0
30001 - 40000 :0
20001 - 30000 :0
10001 - 20000 :0
1001 - 10000 :0
1 - 1000 :0
0 :3518
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
1210
IN THIS SECTION
Syntax | 1210
Description | 1210
Options | 1210
Syntax
Description
Options
interface interface-name (Optional) Display information about the specified services interface.
view
1211
Output Fields
Table 97 on page 1211 lists the output fields for the show services sessions analysis command. Output
fields are listed in the approximate order in which they appear.
Services PIC Name FPC and PIC slots for the services PIC on which the sessions are running.
Total Sessions Active Total active sessions in the services PIC, including TCP, UDP, ICMP and
Softwires.
Total TCP Sessions Total active TCP sessions in the services PIC.
Active
Total UDP Sessions Total active UDP session in the services PIC.
Active
Total Other Sessions Total other active sessions in the services PIC, including ICMP and
Active softwires.
Total Predicted Sessions Predicted sessions are created only by the ALG traffic using the L3/L4
Active information available.
Created Sessions per Session setup rate at the time of running the command.
Second
Deleted Sessions per Session deletion rate at the time of running the command.
Second
Peak Total Sessions Highest number of active sessions since the last PIC restart or since the
Active last time session statistics are flushed.
1212
Peak Total TCP Sessions Highest number of active TCP sessions since the last PIC restart or since
Active the last time session stats are flushed.
Peak Total UDP Highest number of active UDP sessions since the last PIC restart or since
Sessions Active the last time session statistics are flushed.
Peak Total Other Highest number of other active sessions since the last PIC restart or since
Sessions Active the last time session statistics are flushed.
Peak Created Sessions Maximum session setup rate observed since the last PIC restart or since
per Second the last time session statistics are flushed.
Peak Deleted Sessions Maximum session deletion rate observed since the last PIC restart or from
per Second the last time session statistics are flushed.
Slow path forward Number of packets forwarded in the slow path (that is, after the successful
rule match and session creation).
Slow path discard Number of packets discarded before the session creation.
Session Rate Data: Number of samples used to calculate the session rate since the last PIC
Number of Samples restart or since the last time session statistics are flushed.
Session Lifetime Number of TCP, UDP, and HTTP sessions whose length was in the
Distribution(sec): indicated range in seconds.
Sample Output
400000+ :0
350001 - 400000 :0
300001 - 350000 :0
250001 - 300000 :0
200001 - 250000 :0
150001 - 200000 :0
50001 - 150000 :0
40001 - 50000 :0
30001 - 40000 :0
20001 - 30000 :0
10001 - 20000 :0
1001 - 10000 :0
1 - 1000 :0
0 :3518
400000+ :0
350001 - 400000 :0
300001 - 350000 :0
250001 - 300000 :0
200001 - 250000 :0
150001 - 200000 :0
1215
50001 - 150000 :0
40001 - 50000 :0
30001 - 40000 :0
20001 - 30000 :0
10001 - 20000 :0
1001 - 10000 :0
1 - 1000 :0
0 :3518
Release Information
IN THIS SECTION
Syntax | 1216
Description | 1216
Syntax
Description
view
Output Fields
Sample Output
Release Information
IN THIS SECTION
Syntax | 1217
Description | 1217
1217
Syntax
Description
view
Output Fields
Sample Output
Release Information
IN THIS SECTION
Syntax | 1218
Description | 1218
Syntax
Description
command-name
In: 5.5.5.1/12253 --> 70.0.0.2/514;tcp, Conn Tag: 0x0, If: .local..6, Pkts: 2,
Bytes: 84,
Out: 70.0.0.2/514 --> 5.5.5.1/12253;tcp, Conn Tag: 0x0, If: .local..6, Pkts:
2, Bytes: 84,
Release Information
IN THIS SECTION
Syntax | 1220
Description | 1220
Options | 1220
Syntax
Description
Options
view
Output Fields
Sample Output
vms-2/0/0 vms-sset11
Release Information
IN THIS SECTION
Syntax | 1225
Description | 1225
Options | 1225
Syntax
Description
Options
view
1226
Output Fields
Sample Output
Release Information
IN THIS SECTION
Syntax | 1227
Description | 1227
Options | 1227
Syntax
Description
Display information about softwire services. Information is displayed on both 6rd and DS-Lite services.
Options
count interface- (Optional) Display the current softwire counts for a service set for both DS-Lite
name and 6rd.
view
Output Fields
Table 98 on page 1227 lists the output fields for the command-name command. Output fields are listed
in the approximate order in which they appear.
Service Set Service set containing the softwire rules for the interface. All levels
Sample Output
Release Information
Support added for Next Gen Services in Junos OS Release 20.2 on the MX-SPC3 security services card.
1229
IN THIS SECTION
Syntax | 1229
Description | 1229
Options | 1230
Syntax
Description
NOTE: Starting with Junos OS Release 14.1R4, the IPv6 prefix length associated with a
subscriber’s basic broadband bridging device that is subject to a limited number of sessions
(dslite-ipv6-prefix-length attribute) is taken into account while the session count is calculated
and displayed in the output of the show services softwire flows command. Until Junos OS
Release 14.1R3, only IPv4 flows were counted and IPv6 flows were not considered for the
statistics about softwire flows
1230
Options
count <interface interface-name> (Optional) Display flow count information only, with
<service-set service-set-name>| optional filtering by interface and service set.
ds-lite <B4 b4-address> <AFTR aftr- (Optional) Display DS-Lite flow information, with optional
address>| filtering by B4 (softwire initiator) and AFTR (softwire
concentrator).
v6rd <initiator initiator-ip- (Optional) Display v6rd flow information, with optional
address><concentrator concentrator-ip- filtering by the softwire initiator and softwire concentrator.
address>)
view
Output Fields
Table 99 on page 1230 lists the output fields for the show services softwire flows command. Output
fields are listed in the approximate order in which they appear.
Flow Description of flow, including protocol input and output interface addresses.
1231
• Forward
• I—inbound
• O—outbound
Softwire For outbound flows, the address of the local softwire initiator (B4 for DS-Lite) is
shown first, followed by the address of the softwire concentrator (AFTR for DS-
Lite). For inbound flows, the address of the software concentrator is shown first,
followed by the address of the softwire initiator.
Sample Output
Release Information
IN THIS SECTION
Syntax | 1234
Description | 1234
Options | 1235
Syntax
Description
Options
interface interface- (Optional) Name of the interface servicing the softwire. When you omit this
name option, data for all interfaces are shown.
view
Output Fields
Table 100 on page 1235 lists the output fields for the command-name command. Output fields are
listed in the approximate order in which they appear.
Service PIC Name of service PIC for which statistics are shown. statistics
Name
Softwires Number of softwires created for endpoint-independent filtering statistics for ds-
Created for (EIF) or hairpinning (HP). lite only
EIF/HP
Slow Path Number of slow path EIF/HP packets processed. statistics for ds-
Packets lite only
Processed for
EIF/HP
Fast Path Number of packets processed that are not slow path. statistics
Packets
Processed
Softwire EIF Number of packets that matched an EIF entry that initiated the statistics for ds-
Accept creation of a DS-Lite tunnel. The EIF entry was previously lite only
triggered by a DS-Lite packet.
Rule Match Number of packets that did not match any softwire rule. statistics
Failed
IPv6 Packets Number of packets fragmented by the services PIC. statistics for ds-
Fragmented lite only
1237
IPv4 Client Number of IPv4 fragments received from the client end over the statistics for ds-
Fragments softwire tunnel destined to the server. lite only
IPv4 Server Number of IPv4 first fragments received from the server statistics for ds-
First destined to go over the softwire tunnel to the client. lite only
Fragments
IPv4 Server Number of IPv4 other fragments (excluding first and last statistics for ds-
More fragment) received from the server destined to go over the lite only
Fragments softwire tunnel to the client.
IPv4 Server Number of IPv4 last fragments received from the server statistics for ds-
Last Fragments destined to go over the softwire tunnel to the client. lite only
ICMPv4 Error Number of ICMPv4 error packets sent to the softwire statistics
Packets sent concentrator.
Softwire Number of softwire creation failures for EIF/HP. statistics for ds-
Creation Failed lite only
for EIF/HP
Flow Creation Number of flow creation failures for EIF/HP. statistics for ds-
Failed for lite only
EIF/HP
Slow Path Number of times processing of a packet was reprocessed in the statistics
Failed - Retry slow path.
Packet not Number of IPv4 packets not encapsulated in IPv6. statistics for ds-
IPv4-in-IPv6 lite only
Slow Path Number of IPv6 header errors detected in slow path processing. statistics for ds-
Failed- IPv6 lite only
Next Header
Offset
1239
Decapsulated Number of packets without IPv4 inner header. statistics for ds-
Packet not lite only
IPv4
Decap Failed - Decapsulation failure due to an unexpected inner header. statistics for ds-
IPv6 Next lite only
Header Offset
Decap Failed - Decapsulation failure due to incorrect Layer 3 data, such as not statistics for ds-
IPv4 L3 an IP packet, bad source or destination address, checksum error, lite only
Integrity or protocol error.
Decap Failed - Decapsulation failure due to incorrect Layer 4 data, such as statistics for ds-
IPv4 L4 errors in TCP, UDP, or TCP headers. lite only
Integrity
Packet not Number of IPv6 packets not encapsulated in IPv4. statistics for v6rd
IPv6-in-IPv4 only
Decapsulated Number of packets without an IPv6 inner header. statistics for v6rd
Packet not only
IPv6
1240
Encapsulation Failed to encapsulate IPv6 packets in IPv4 due to low memory. statistics for v6rd
Failed - No only
packet
memory
Flow limit Flow not created because configured maximum flows per statistics
exceeded softwire is exceeded.
Session limit Flow not created because configured maximum DS-Lite softwire statistics for ds-
exceeded sessions per IPv6 prefix is exceeded. lite only
Sample Output
Statistics
----------
Softwires Created :0
Softwires Created for EIF/HP :0
Softwires Deleted :0
Softwires Flows Created :0
Softwires Flows Deleted :0
Slow Path Packets Processed :0
SLow Path Packets Processed for EIF/HP :0
Fast Path Packets Processed :0
Fast Path Packets Encapsulated :0
Softwire EIF Accept :0
1241
Transient Errors
----------------
Errors
------
6rd Statistics:
Statistics
----------
Softwires Created :0
Softwires Deleted :0
Softwires Flows Created :0
Softwires Flows Deleted :0
Slow Path Packets Processed :0
Fast Path Packets Processed :0
Fast Path Packets Encapsulated :0
Rule Match Failed :0
Rule Match Succeeded :0
Transient Errors
----------------
Errors
------
Statistics
----------
Softwires Created :0
Softwires Created for EIF/HP :0
Softwires Deleted :0
Softwires Flows Created :0
Softwires Flows Deleted :0
Slow Path Packets Processed :0
SLow Path Packets Processed for EIF/HP :0
Fast Path Packets Processed :0
Fast Path Packets Encapsulated :0
Softwire EIF Accept :0
Rule Match Succeeded :0
Rule Match Failed :0
IPv6 Packets Fragmented :0
IPv4 Client Fragments :0
IPv4 Server First Fragments :0
IPv4 Server More Fragments :0
IPv4 Server Last Fragments :0
ICMPv4 Packets sent :0
ICMPv4 Error Packets sent :0
ICMPv6 Packets sent :0
Dropped ICMPv6 packets destined to AFTR :0
Transient Errors
----------------
Errors
------
Sample Output
Release Information
Support for Next Gen Services with the MX-SPC3 security services card added in Junos OS Release
20.2.
IN THIS SECTION
Syntax | 1247
Description | 1247
Options | 1247
Syntax
Description
Options
• bootp—Bootstrap protocol
• exec—Exec
• h323—H.323 standards
• login—Login
• netbios—NetBIOS
• netshow—NetShow
• realaudio—RealAudio
• shell—Shell
• sqlnet—SQLNet
• traceroute—Traceroute
• winframe—WinFrame
destination-port (Optional) Display information for a particular destination port. The range of
destination-port values is 0 to 65535.
protocol protocol (Optional) Display information about one of the following IP types:
1249
service-set service-set (Optional) Display information for the specific service set.
source-port source-port (Optional) Display information for a particular source port. The range of
values is 0 to 65535.
view
Output Fields
Table 101 on page 1250 lists the output fields for the show services stateful-firewall conversations
command. Output fields are listed in the approximate order in which they appear.
1250
Service set Name of a service set. Individual empty service sets are not displayed, but if no service
set has any flows, a flow table header is printed for each service set.
Source NAT Original and translated source IPv4 or IPv6 addresses are displayed if Network
Address Translation (NAT) is configured on this particular flow or conversation.
1251
Destin NAT Original and translated destination IPv4 or IPv6 addresses are displayed if NAT is
configured on this particular flow or conversation.
TCP tickle Whether TCP inquiry mode is on (enabled or disabled) and the time remaining to send
the next inquiry, in seconds.
Sample Output
Flow
Prot Source Dest State Dir Frm count
TCP 10.58.255.50:33005-> 10.58.255.178:23 Forward I 13
Source NAT 10.58.255.50:33005-> 10.59.16.100:4000
Destin NAT 10.58.255.178:23 -> 0.0.0.0:4000
Byte count: 918
TCP established, TCP window size: 65535, TCP acknowledge: 2502627025
TCP tickle enabled, 0 seconds,
Master flow, Timeout: 30 seconds
TCP 10.58.255.178:23 -> 10.59.16.100:4000 Forward O 8
Release Information
IN THIS SECTION
Syntax | 1253
1253
Description | 1253
Options | 1253
Syntax
Description
Options
none Display standard information about all stateful firewall flow statistics.
view
Output Fields
Table 102 on page 1254 lists the output fields for the show services stateful-firewall flow-analysis
command. Output fields are listed in the approximate order in which they appear.
1254
Total Flows Active Total active flows in the MS-PIC including TCP, UDP, ICMP and Softwires.
Total TCP Flows Active Total active TCP flows in the MS-PIC.
Total UDP Flows Active Total active UDP flows in the MS-PIC.
Total Other Flows Total other active flows in the MS-PIC including ICMP and softwires.
Active
Total Predicted Flows Predicted flows are created only by the ALG traffic using the L3/L4
Active information available.
Created Flows per Flow setup rate at the time of running the command.
Second
Deleted Flows per Flow deletion rate at the time of running the command.
Second
Peak Total Flows Active The highest number of active flows since the last PIC restart or since the
last time flow statistics are flushed.
Peak Total TCP Flows The highest number of active TCP flows since the last PIC restart or since
Active the last time flow stats are flushed.
Peak Total UDP Flows The highest number of active UDP flows since the last PIC restart or since
Active the last time flow statistics are flushed.
Peak Total Other Flows The highest number of other active flows since the last PIC restart or since
Active the last time flow statistics are flushed.
1255
Peak Created Flows per The maximum flow setup rate observed since the last PIC restart or since
Second the last time flow statistics are flushed.
Peak Deleted Flows per The maximum flow deletion rate observed since the last PIC restart or
Second from the last time flow statistics are flushed.
Slow path forward The number of packets forwarded in the slow path (i.e. after the successful
rule match and flow creation).
Slow path discard The number of packets discarded before the flow creation.
Flow Rate Data: The number of samples used to calculate the flow rate, since the last PIC
Number of Samples restart or since the last time flow statistics are flushed.
Flow Rate Histogram of the samples used for flow rate calculation.
Distribution(sec) Flow
Operation :Creation
Flow
Operation :Deletion
Flow Lifetime Histogram of the samples used to calculate the flow life time in sec.
Distribution(sec):
1256
Sample Output
300000+ :0
250000 - 300000 :0
200000 - 250000 :0
160000 - 200000 :0
150000 - 160000 :0
50000 - 150000 :0
40000 - 50000 :0
30000 - 40000 :0
20000 - 30000 :0
10000 - 20000 :0
1000 - 10000 :0
0 - 1000 :19720
Flow Lifetime Distribution(sec):
TCP UDP HTTP
240+ :0 0 0
120 - 240 :0 0
60 - 120 :0 0
30 - 60 :0 0
15 - 30 :0 6530
5 - 15 :0 0
1 - 5 :0 0
0 - 1 :0 6530
Sample Output
5 - 15 :0 0
1 - 5 :0 0
0 - 1 :0 7330
Release Information
IN THIS SECTION
Syntax | 1259
Description | 1260
Options | 1260
Syntax
<source-port source-port>
<source-prefix source-prefix>
Description
Display stateful firewall flow table entries. When the interface is used for softwire processing, the type
of softwire concentrator (DS-LITE or 6rd) is shown, and frame counts are provided.
Options
• h323—H.323 protocol
• ip—Internet protocol
1261
• netbios—NetBIOS protocol
• netshow—Netshow protocol
• realaudio—RealAudio protocol
• talk—Talk protocol
• traceroute—Traceroute
• winframe—WinFrame
destination-port (Optional) Display information for a particular destination port. The range of
destination-port values is from 0 to 65535.
protocol protocol (Optional) Display information about one of the following IP types:
view
Output Fields
Table 103 on page 1263 lists the output fields for the show services stateful-firewall flows command.
Output fields are listed in the approximate order in which they appear.
1263
Service set Name of a service set. Individual empty service sets are not displayed. If no service set
has any flows, a flow table header is displayed for each service set.
Source Source prefix of the flow in the format source-prefix:port. For ICMP flows, port
information is not displayed.
Dest Destination prefix of the flow. For ICMP flows, port information is not displayed.
Dir Direction of the flow: input (I) or output (O). For any configured stateful firewall rule,
the reverse flow is dynamically created, so you will see an input and an output flow.
Frm count Number of frames in the flow. If this value is zero, then that flow does not yet exist.
1264
Sample Output
On the MX Series router, both input (I) and output (O) flow entries appear, even if traffic only flows in
one direction. This applies to both NAT and non-NAT cases.
Flow
Prot Source Dest State Dir Frm count
TCP 10.58.255.178:23 -> 10.59.16.100:4000 Forward O
TCP 10.58.255.50:33005-> 10.58.255.178:23 Forward I 1
Source NAT 10.58.255.50:33005-> 10.59.16.100:4000
Destin NAT 10.58.255.178:23 -> 0.0.0.0:4000
When a service set includes softwire processing, the following output format is used for the softwire
flows:
The output for the show services stateful-firewall flows brief command is identical to that for the show
services stateful-firewall flows command. For sample output, see "show services stateful-firewall flows"
on page 1259.
ms-1/3/0 green 2
1266
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1267
Description | 1267
Options | 1268
Syntax
Description
Options
application- (Optional) Display information about one of the following application protocols:
protocol
• bootp—(SIP only) Bootstrap protocol
• h323—H.323 standards
• login—Login
• netbios—NetBIOS
• netshow—NetShow
• realaudio—RealAudio
• shell—Shell
1269
• sqlnet—SQLNet
• traceroute—Traceroute
• winframe—WinFrame
destination-port (Optional) Display information for a particular destination port. The range of values
destination-port is from 0 to 65535.
• ipv6—IPv6 within IP
view
Output Fields
Table 104 on page 1270 lists the output fields for the show services stateful-firewall sip-call command.
Output fields are listed in the approximate order in which they appear.
To Responder address.
• Unknown—Unknown status.
direction Direction of the flow: input (I), output (O), or unknown (U).
Flow role Role of the flow that is under evaluation: Initiator, Master, Responder, or
Unknown.
Sample Output
From: : [email protected]:0;000ff73ac89900021bb231dc-3ef68435
To: : [email protected]:0;0011bb65c2a30007777bd0fc-5748b749
Call ID: : [email protected]
Number of control initiator flows: : 1, Number of control responder flows:
: 1
UDP 10.20.70.2:50354 -> 10.200.100.1:5060 Watch I
2
Byte count: 1112
Flow role: Master, Timeout: 30
UDP 10.200.100.1:5060 -> 10.20.170.111:50354 Watch O
0
Byte count: 0
Flow role: Responder, Timeout: 30
UDP 0.0.0.0:0 -> 10.20.170.111:5060 Watch O
7
Byte count: 2749
Flow role: Responder, Timeout: 30
Number of contact initiator flows: 1, Number of contact responder flows: 1
UDP 0.0.0.0:0 -> 10.20.140.11:5060 Watch I
1
Byte count: 409
Flow role: Master, Timeout: 30
UDP 10.20.140.11:31864 -> 10.20.170.111:18808 Forward O
622
Byte count: 124400
Flow role: Master, Timeout: 30
UDP 0.0.0.0:0 -> 10.20.170.111:18809 Forward O
0
Byte count: 0
Flow role: Initiator, Timeout: 30
Number of media initiator flows: 4, Number of media responder flows: 0
UDP 10.20.70.2:18808 -> 10.20.140.11:31864 Forward I
628
Byte count: 125600
Flow role: Initiator, Timeout: 30
1273
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1274
Description | 1274
Options | 1274
Syntax
Description
Options
• h323—H.323 standards
• login—Login
• netbios—NetBIOS
• netshow—NetShow
• realaudio—RealAudio
• shell—Shell
• sqlnet—SQLNet
• traceroute—Traceroute
• winframe—WinFrame
interface interface-name (Optional) Display information about a particular interface. On M Series and
T Series routers, the interface-name can be sp-fpc/pic/port or rspnumber.
• ipv6—IPv6 within IP
source-port source-port (Optional) Display information for a particular source port. The range of
values is from 0 to 65535.
view
Output Fields
Table 105 on page 1277 lists the output fields for the show services stateful-firewall sip-register
command. Output fields are listed in the approximate order in which they appear.
1277
To Responder address.
Sample Output
SIP Register: Protocol: UDP, Registered IP: 10.20.170.111, Port: 5060, Acked
1278
SIP Register: Protocol: UDP, Registered IP: 10.20.170.112, Port: 5060, Acked
Expiration timeout: 36000, Timeout remaining: 35549
From: : [email protected]:0;
To: : [email protected]:0;
Call ID: : [email protected]
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1279
Description | 1279
Options | 1279
Syntax
Description
Options
view
Output Fields
Table 106 on page 1279 lists the output fields for the show services stateful-firewall statistics
command. Output fields are listed in the approximate order in which they appear.
• Fast Path Hairpinned Packets—Fast path packets that were hairpinned back
to the internal network.
• SYN attack (multiple SYN messages seen for the same flow)—Multiple SYN
packets received for the same flow are treated as a SYN attack. The packets
might be retransmitted SYN packets and therefore valid, but a large number
is cause for concern.
• First packet not a SYN message—First packets for a connection are not SYN
packets. These packets might originate from previous connections or from
someone performing an ACK/FIN scan.
• TCP port scan (TCP handshake, RST seen from server for SYN)—In the case
of a SYN defender, if an RST (reset) packet is received instead of a SYN/ACK
message, someone is probably trying to scan the server. This behavior can
result in false alarms if the RST packet is not combined with an intrusion
detection service (IDS).
The TCP seqno is 0 and all the TCP flags are also 0.
• TCP 3-way error - client sent SYN+ACK—A SYN/ACK should be sent by the
server on receiving a SYN. This counter is incremented when the first
message received from the initiator is SYN+ACK.
• TCP 3-way error - server sent ACK—ACK should be sent by the client on
receiving a SYN/ACK from the server. This counter is incremented when the
ACK is received from the Server instead of from the Client.
• TCP 3-way error - RST seq number mismatch—A reset could be received
from either side. The server could send a RST on receiving a SYN or the
client could send a RST on receiving SYN/ACK. This counter is incremented
when the RST is received either from the client or server with a non-
matching sequence number.
• TCP 3-way error - FIN received—This counter is incremented when the FIN
is received during the 3-way handshake.
• TCP 3-way error - invalid flags (PSH, URG, ECE, CWR)—This counter is
incremented when any of the PSH, URG, ECE, or CWR flags were received
during the 3-way handshake.
The counter is not incremented in the case of simultaneous open, when the
SYN is received in both the directions.
• TCP 3-way error - first packet SYN+ACK—The first packet received was
SYN+ACK instead of SYN.
• TCP 3-way error - first packet FIN+ACK—The first packet received was FIN
+ACK instead of SYN.
• TCP 3-way error - first packet FIN—The first packet received was FIN
instead of SYN.
• TCP 3-way error - first packet RST—The first packet received was RST
instead of SYN.
• TCP 3-way error - first packet ACK—The first packet received was ACK
instead of SYN.
• TCP 3-way error - first packet invalid flags (PSH, URG, ECE, CWR)—The first
packet received had invalid flags.
• TCP Resumed Flow—Plain ACKs create flows if rule match permits, and
these are classified as TCP Resumed Flows. This counter is incremented in
the case of a TCP Resumed Flow.
• UDP port scan (ICMP error seen for UDP flow)—ICMP error is received for a
UDP flow. This could be a genuine UDP flow, but it is counted as an error.
1286
• No matching flow—No matching existing flow was found for the ICMP error.
1287
ALG errors Accumulation of all the application-level gateway protocol (ALG) drops counted
separately in the ALG context:
• Exec—Exec errors
• Login—Login errors
• NetBIOS—NetBIOS errors
• Netshow—NetShow errors
• Shell—Shell errors
• SQLNet—SQLNet errors
• Traceroute—Traceroute errors
Drop Flows • Maximum Ingress Drop flows allowed-–Maximum number of ingress flow
drops allowed.
• Ingress Drop Flow limit drops count-–Number of ingress flow drops due to
maximum number of ingress flow drops being exceeded.
• Egress Drop Flow limit drops count-–Number of egress flow drops due to
maximum number of egress flow drops being exceeded.
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1291
Description | 1291
Options | 1291
Syntax
Description
Options
view
1292
Output Fields
Table 107 on page 1292 lists the output fields for the show services stateful-firewall statistics
application-protocol-sip command. Output fields are listed in the approximate order in which they
appear.
REGISTER Number of new, invalid, and retransmitted register requests sent to the SIP
registrar.
INVITE Number of new, invalid, and retransmitted invite messages sent by user agent
clients.
ReINVITE Number of new, invalid, and retransmitted reinvite messages sent by user agent
clients.
ACK Number of new, invalid, and retransmitted ACK messages received (in response to
a SIP Call Invite message).
BYE Number of new, invalid, and retransmitted requests to terminate SIP dialogues.
1293
Table 107: show services stateful-firewall statistics application-protocol-sip Output Fields (Continued)
SUBSCRIBE Number of new, invalid, and retransmitted SIP requests to subscribe for event
notifications.
NOTIFY Number of new, invalid, and retransmitted event notifications in SIP dialogues.
OPTIONS Number of new, invalid, and retransmitted requests to query SIP capabilities.
REFER Number of new, invalid, and retransmitted requests to the recipient to contact a
third party.
Provisional Number of new, invalid, and retransmitted responses from the user agent server to
responses indicate the progress of a SIP transaction.
OK responses to OK responses sent from the user agent clients to user agent servers in response to
INVITEs Invite messages. The server can then return an ACK message.
Redirection Responses from the user agent server to a user agent client requesting the client to
responses contact a different SIP uniform resource identifier (URI).
Request failure Responses that indicate a definite failure from a particular server. The client must
responses not retry the same request without modification after receiving this response.
1294
Table 107: show services stateful-firewall statistics application-protocol-sip Output Fields (Continued)
Global failure Responses that indicate a server has definitive information about a particular user,
responses not just the particular instance indicated in the Request URI.
Parser Syntax errors, content errors, and unknown methods counted by the message
parser.
Sample Output
UPDATE 0 0
REFER 0 0
Provisional responses (18x): 1, OK responses to INVITEs: 2
OK responses to non-INVITEs: 2, Redirection (3xx) responses: 0
Request failure (4xx) responses: 0, Server failure (5xx) responses: 0
Global failure (6xx) responses: 0, Invalid responses: 0
Response (all) retransmits: 0
Parser:
Syntax errors: 0, Content errors: 0, Unknown methods: 0
Service set: test_sip_888, ALG: SIP
Active SIP call count: 0, Active SIP registration count: 1
New Invalid Retransmit
REGISTER 2
INVITE 0 0
ReINVITE 0
ACK 0 0 0
BYE 0 0
CANCEL 0 0
SUBSCRIBE 0 0
NOTIFY 0 0
OPTIONS 0 0
INFO 0 0
UPDATE 0 0
REFER 0 0
Provisional responses (18x): 0, OK responses to INVITEs: 0
OK responses to non-INVITEs: 2, Redirection (3xx) responses: 0
Request failure (4xx) responses: 0, Server failure (5xx) responses: 0
Global failure (6xx) responses: 0, Invalid responses: 0
Response (all) retransmits: 0
Parser:
Syntax errors: 0, Content errors: 0, Unknown methods: 0
Release Information
IN THIS SECTION
Syntax | 1296
Description | 1296
Options | 1296
Syntax
Description
Display information about the number of active subscribers on the services PIC.
Options
none Display standard information about all active subscribers on the PIC.
view
1297
Output Fields
Table 108 on page 1297 lists the output fields for the show services subscriber analysis command.
Output fields are listed in the approximate order in which they appear.
Total Subscribers Active Total number of subscribers currently active on the service PIC.
Created Subscribers per Rate at which subscribers are currently being created on the service
Second PIC.
Deleted Subscribers per Rate at which subscribers are currently being deleted on the service
Second PIC.
Peak Total Subscribers Active Highest number of subscribers that were active during the lifetime
of the service PIC.
Peak Created Subscribers per Highest rate at which subscribers were being created during the
Second lifetime of the service PIC.
Peak Deleted Subscribers per Highest rate at which subscribers were being deleted during the
Second lifetime of the service PIC.
Number of Samples Number of samples during the current sampling period lifetime.
Subscriber Operation: Creation Number of sampling intervals during which a number of subscribers
in the indicated range were created during the current sampling
period.
Subscriber Operation: Deletion Number of sampling intervals during which a number of subscribers
in the indicated range were deleted during the current sampling
period.
Sample Output
400000+ :0
350001 - 400000 :0
300001 - 350000 :0
250001 - 300000 :0
1299
200001 - 250000 :0
160001 - 200000 :0
150001 - 160000 :0
50001 - 150000 :0
40001 - 50000 :0
30001 - 40000 :0
20001 - 30000 :0
10001 - 20000 :0
1001 - 10000 :0
1 - 1000 :0
0 :3916
400000+ :0
350001 - 400000 :0
300001 - 350000 :0
250001 - 300000 :0
200001 - 250000 :0
160001 - 200000 :0
150001 - 160000 :0
50001 - 150000 :0
40001 - 50000 :0
30001 - 40000 :0
20001 - 30000 :0
10001 - 20000 :0
1001 - 10000 :0
1 - 1000 :0
0 :3916
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
1300
IN THIS SECTION
Syntax | 1300
Description | 1300
Syntax
Description
Sample Output
State: Reconnect-In-Progress
5.5.5.1 -> 70.0.0.2 : 514
1301
Release Information
IN THIS SECTION
Syntax | 1301
Description | 1301
Options | 1302
Syntax
Description
The basic form of the command displays the list of real servers associated with this group and traffic
statistics, including packet count and byte count
1302
Options
group group-name (Optional) Display load-balancing statistics for a specified group of load-
balancer servers.
instance instance-name (Optional) Display load-balancing statistics for a specific traffic load balancer
(TLB) instance.
num-instances number (Optional) Display load-balancing statistics for a specified number of TLB
instances.
real-service real- (Optional) Display load-balancing statistics for a specified load balancer serve.
service-name
summary (Optional) Display summary information about the traffic load-balancing
statistics.
virtual-service virtual- (Optional) Display load-balancing statistics for a specified TLB virtual service.
service-name
view
Output Fields
Table 109 on page 1302 lists the output fields for the show services traffic-load-balance statistics
command. Output fields are listed in the approximate order in which they appear.
Traffic load Name of the traffic load balancer (TLB) instance that contains All levels
balance the load-distribution-related configuration settings.
instance name
1303
Multi services Name of the services interface used for the TLB instance to All levels
interface name provide one-to-one redundancy for server health monitoring.
For Next Gen Services and the MX-SPC3 services card, this is
the name of the VMS interface or “vms-slot/pic/port”.
Interface state Inter-process communications (IPC) status between the TLB All levels
daemon (traffic-dird) and the health checking daemon (net-
monitord).
• DOWN
• UP
Route hold Time that the programmed VIP routes are kept intact after All levels
timer connectivity between traffic-dird and net-monitord daemons is
lost. If connectivity is not reestablished within this time, all the
VIP routes are withdrawn.
Traffic load Name of the virtual service for the TLB instance. The virtual none
balance virtual service provides an address that is associated with the group of
extensive
svc name servers to which traffic is directed.
Virtual service Name of the virtual service for the TLB instance. The virtual summary
service provides an address that is associated with the group of
servers to which traffic is directed.
Routing Name of the routing instance used for the virtual service. none
instance name
extensive
1304
extensive
Packet Sent Number of packets originating from the clients that the TLB summary
instance virtual service processes for load balancing to next-hop
servers.
Byte Sent Number of bytes originating from the clients that the TLB summary
instance virtual service processes for load balancing to next-hop
servers.
Packet Recv Number of packets returning from the next-hop servers that the summary
TLB instance virtual service processes and forwards to the
clients.
Byte Recv Number of bytes returning from the next-hop servers that the summary
TLB instance virtual service processes and forwards to the
clients.
Traffic load Server group name used for the virtual service. none
balance group
extensive
name
Health check Number of the subunit of the multiservice interface used for none
interface health checking.
extensive
subunit
Traffic load Number of times the status of the TLB server group was down. extensive
balance group
down count
Protocol Virtual service protocol, either tcp or udp. In translated mode, none
packets destined to the virtual service IP address+port number
extensive
+protocol are load balanced and then replaced by the real
service IP address and server listening port number.
Port Number Virtual service port number. In translated mode, packets none
destined to the virtual service IP address+port number+protocol
extensive
are load balanced and then replaced by the real service IP
address and server listening port number.
Server Real service port number that replaces the virtual service port none
Listening Port number. In translated mode, packets destined to the virtual
extensive
Number service IP address+port number+protocol are load balanced and
then replaced by the real service IP address and server listening
port number.
Demux Index number of the demultiplexing next hop for the virtual none
Nexthop index service. Index number is unique for a VIP, routing-instance, and
extensive
protocol combination. The demultiplexing next hop is
responsible for port-based demultiplexing of traffic to the load-
balancing next hop for session distribution.
1306
DFW client-id Client connection identifier assigned to the TLB daemon (traffic- extensive
dird) by the firewall daemon (dfwd) when the daemons are
successfully connected.
Traffic load Time, in seconds, that passes after the traffic-dird daemon extensive
balance group comes up until the traffic-dird programs the distribution table on
warmup time the Packet Forwarding Engine.
Traffic load Indicates whether the option that allows a server to rejoin the extensive
balance group group automatically when it comes up is enabled or not.
auto-rejoin
Route metric Routing metric assigned to the virtual service. A lower metric extensive
makes a route more preferred.
Virtual service Number of times the status of the virtual service was down. extensive
down count
Traffic load Hash key parameter used for load balancing. Hash keys extensive
balance hash supported in the ingress direction are protocol, source IP
method address, and destination IP address.
Nexthop index Index number of the next-hop for the virtual service. A group of none
servers function as a pool for next-hop session distribution.
extensive
Up time Period of time for which the virtual service is up, in the format none
number-of-days hh:mm:ss.
extensive
Real Server Up Starting in Junos OS Release 16.1R6 and 18.2R1, number of real none
count servers that are up for the specified virtual service or server
group.
1307
Real Server Starting in Junos OS Release 16.1R6 and 18.2R1, number of real none
Down count servers that are down for the specified virtual service or server
group.
Total packet Number of packets originating from the clients that the TLB none
sent count instance virtual service processes for load balancing to next-hop
extensive
servers.
Total byte sent Number of bytes originating from the clients that the TLB none
count instance virtual service processes for load balancing to next-hop
extensive
servers.
Total packet Number of packets returning from the next-hop servers that the none
received count TLB instance virtual service processes and forwards to the
extensive
clients.
Total byte Number of bytes returning from the next-hop servers that the none
received count TLB instance virtual service processes and forwards to the
extensive
clients.
Network Number of network monitoring profiles that are used to monitor extensive
monitoring the health of servers used in TLB session distribution.
profile count
Active real Number of real services that are functional and active. extensive
service count
Network Unique index number associated with the network monitoring extensive
monitoring profile. Network monitoring profiles are used to monitor the
profile index health of servers used in TLB session distribution.
Probe type Probe type used to examine the health of servers. TLB supports extensive
ICMP, TCP, and HTTP health check probes to monitor the health
of servers in a group.
Probe interval Frequency, in number of seconds, at which health check probes extensive
are sent.
Probe failure Number of failure retries, after which the real service is tagged extensive
retry count as down.
Probe Number of successful retries after which the real service is extensive
recovery retry tagged as up.
count
Real service Name of the TLB server (also referred to as real service). The none
name is the identifier for a server to which sessions can be
distributed using the server distribution table in conjunction with
the session distribution API.
Packet Sent Number of packets originating from the clients that the TLB none
instance virtual service sends to the real service.
Byte Sent Number of bytes originating from the clients that the TLB none
instance virtual service sends to the real service next-hop server.
Packet Recv Number of packets returning from the real service next-hop none
server that the TLB instance virtual service processes and
forwards to the clients.
Byte Recv Number of bytes returning from the real service next-hop server none
that the TLB instance virtual service processes and forwards to
the clients.
Traffic load Name of the real service used for traffic load-balancing. extensive
balance real
svc name
Routing Name of the routing instance on which the real service is extensive
instance name configured.
Traffic load Name of the server group for real service. extensive
balance group
name
Admin state Administrative state of the real service, such as Up or Down. extensive
Oper state Operational state of the real service, such as Up or Down. extensive
1310
Network Number of probes for which the status of the server whose extensive
monitoring health is checked is observed to be up. If a server group is
probe up configured for dual health check, a real service is declared to be
count UP only if both health-check probes are simultaneously UP;
otherwise a real service declared to be DOWN.
Network Number of probes for which the status of the server whose extensive
monitoring health is checked is observed to be down.
probe down
count
Total rejoin Number of events that caused a server that was previously down extensive
event count and later operational to rejoin a group of real services for load-
balancing.
Total up event Number of TLB events that identified a virtual service or real extensive
count service to be up.
Total down Number of TLB events that identified a virtual service or real extensive
event count service to be down.
Real Service Number of packets originating from the clients that the TLB extensive
packet sent instance virtual service sends to the real service.
count
Real Service Number of bytes originating from the clients that the TLB extensive
byte sent instance virtual service sends to the real service next-hop server.
count
Real Service Number of packets returning from the real service next-hop extensive
packet server that the TLB instance virtual service processes and
received count forwards to the clients.
1311
Real Service Number of bytes returning from the real service next-hop server extensive
byte received that the TLB instance virtual service processes and forwards to
count the clients.
Total probe Number of health-monitoring probes sent from the TLB health extensive
sent check daemon.
Total probe Number of health-monitoring probes sent from the TLB health extensive
success check daemon that were successful.
Total probe fail Number of health-monitoring probes attempted to be sent from extensive
the TLB health check daemon that failed.
Probe sent Number of health-check probe requests transmitted from the extensive
TLB health check daemon.
Probe fail Number of failed health-check probe requests transmitted from extensive
the TLB health check daemon.
Probe sent Number of times the TLB health check daemon was unable to extensive
failed initiate transmission of a extensive health-check probe.
1312
Sample Output
r10 203.0.113.10 UP 0 0 0
0
Release Information
Support added in Junos OS 19.3R2 for Next Gen Services with the MX-SPC3 services card.
IN THIS SECTION
Syntax | 1319
Description | 1319
Options | 1320
Syntax
Description
URL filtering resolves the disallowed domains. The total number of domains are divided into chunks of
50 domains per chunk. The filter term in the command output is the name of a chunk.
Options
fpc-slot fpc-slot pic-slot pic- (Optional) Specify the FPC and PIC for which you want URL filter
slot information displayed.
profile profile-name Specify the profile for which you want URL filter information displayed.
template template-name (Optional) Specify the template for which you want URL filter
information displayed.
view
Output Fields
Table 110 on page 1320 lists the output fields for the show services web-filter dns-resolution profile
command. Output fields are listed in the approximate order in which they appear.
Filter Term Name of the domains chunk. All domains are divided into chunks of 50
domains per chunk.
IPv4 Address Count The number of IPv4 addresses resolved for all domains under the filter term.
IPv6 Address Count The number of IPv6 addresses resolved for all domains under the filter term.
1321
Table 110: show services web-filter dns-resolution profile Output Fields (Continued)
Sample Output
IPv4 Records:
31.13.77.36
31.13.76.68
IPv6 Records:
2a03:2880:f122:83:face:b00c:0:25de
2a03:2880:f111:83:face:b00c:0:25de
IPv4 Records:
216.58.193.78
1322
216.58.194.206
IPv6 Records:
2607:f8b0:400a:800::200e
2607:f8b0:4005:809::200e
IPv4 Records:
50.112.200.248
52.10.96.2
52.25.242.211
52.39.87.182
52.38.44.92
52.36.125.176
52.40.2.42
52.42.184.64
52.5.80.199
52.206.203.18
52.5.231.14
52.21.94.89
52.71.118.87
52.201.133.109
52.71.122.233
52.203.136.33
IPv6 Records:
2620:108:700f::342a:b840
2620:108:700f::3644:fc64
2620:108:700f::3459:2ce1
2620:108:700f::3459:c025
2620:108:700f::3459:f556
2620:108:700f::3459:c5c5
2620:108:700f::3644:c2a0
2620:108:700f::342a:df11
2406:da00:ff00::3404:d29c
2406:da00:ff00::3415:a86e
2406:da00:ff00::3415:fda4
2406:da00:ff00::3414:91d2
2406:da00:ff00::3403:73dd
2406:da00:ff00::22c7:d016
2406:da00:ff00::3400:290b
1323
2406:da00:ff00::3213:c65f
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1324
Description | 1324
Options | 1324
Syntax
Description
Options
(extensive | summary) Specify the level of detail of information you want displayed.
profile profile-name Specify the profile for which you want URL filter information displayed.
template template-name Specify the template for which you want URL filter information displayed.
view
Output Fields
Table 111 on page 1324 lists the output fields for the show services web-filter dns-resolution-statistics
profile template command. Output fields are listed in the approximate order in which they appear.
Table 111: show services web-filter dns-resolution-statistics profile template Output Fields
Table 111: show services web-filter dns-resolution-statistics profile template Output Fields
(Continued)
Next DNS start time Start time of the next DNS summary
resolution.
Table 111: show services web-filter dns-resolution-statistics profile template Output Fields
(Continued)
• Resp Received—Number of
DNS responses received.
• DNS retries—Number of
times no DNS response was
received and so retried.
• Resp Received—Number of
DNS responses received.
• DNS retries—Number of
times no DNS response was
received and so retried.
1327
Sample Output
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1330
1330
Description | 1330
Options | 1330
Syntax
Description
Display the IPv4 and IPv6 count per threat level received from the C&C feed from Policy Enforcer. It also
displays the count of the number of terms used in the implicit filter per threat level.
Options
view
1331
Sample Output
1 ACCEPT 23 1129 1 2
2 ACCEPT 11 1444 0 0
3 ACCEPT 6 996 0 0
4 ACCEPT 7 564 0 0
5 ACCEPT 7 451 0 0
6 ACCEPT 4 126 0 0
7 LOG 5 175 0 0
8 DROP AND LOG 4 396 1 1
9 ACCEPT 2 164 0 0
10 ACCEPT 33 5601 1 2
Sample Output
command-name
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240,
MX480, and MX960 with the MX-SPC3 services card.
RELATED DOCUMENTATION
security-intelligence
IN THIS SECTION
Syntax | 1333
Description | 1333
Options | 1334
Syntax
Description
Display statistics for DNS request filtering and URL filtering for the specified filter profile.
1334
Options
dns-filter-template template-name (Optional) Display statistics for the specified DNS filter template.
view
Output Fields
Table 112 on page 1334 lists the output fields for the show services web-filter statistics profile
command. Output fields are listed in the approximate order in which they appear.
UDP DNS Number of UDP DNS requests, responses, and log only responses for DNS request
filtering for queries of types A, AAAA, MX, CNAME, SRV, TXT, and MISC.
TCP DNS Number of TCP DNS requests, responses, and log only responses for DNS request
filtering for queries of types A, AAAA, MX, CNAME, SRV, TXT, and MISC.
Sample Output
Release Information
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1337
Description | 1337
Options | 1337
Syntax
Description
Display statistics for DNS request filtering and URL filtering for the specified filter profile.
Options
dns-filter-template template-name (Optional) Display statistics for the specified DNS filter template.
dns-filter-term term-name (Optional) Display statistics for the specified term in the DNS filter
template.
fpc-slot fpc-slot pic-slot pic-slot (Optional) Display statistics for the specified services PIC.
url-filter-template template-name (Optional) Display statistics for the specified URL filter template.
view
Output Fields
Table 113 on page 1338 lists the output fields for the show services web-filter statistics profile
command. Output fields are listed in the approximate order in which they appear.
1338
UDP Counters Number of UDP DNS requests, responses, and log only responses for DNS
request filtering for queries of types A, AAAA, MX, CNAME, SRV, TXT, and
MISC.
TCP Counters Number of TCP DNS requests, responses, and log only responses for DNS
request filtering for queries of types A, AAAA, MX, CNAME, SRV, TXT, and
MISC.
Custom page Action counters for custom page sent to recipient for URL filtering.
Http scode Action counters for HTTP status code response for URL filtering.
Redirect url Action counters for redirect URL response for URL filtering.
TCP reset Action counters for TCP reset for URL filtering. Connection is closed.
Bypass session Number of sessions not blocked by URL filtering because the match criteria
count was not met for URL filtering.
IPV4 Disable IP Action counters for IPv4 packets that were accepted because filtering is
Blocking disabled for HTTP traffic that contains an embedded IP address belonging to a
disallowed domain name in the URL filter database.
IPV6 Disable IP Action counters for IPv6 packets that were accepted because filtering is
Blocking disabled for HTTP traffic that contains an embedded IP address belonging to a
disallowed domain name in the URL filter database.
1339
Table 113: show services web-filter statistics profile Output Fields (Continued)
session count The session of activity that a user with a unique IP address spends on a
website during a specified period of time for URL filtering. A session, in this
case, would be the packets going to the service PIC from the Packet
Forwarding Engine and then back to the service PIC.
uplink packet count Number of packets going from the Packet Forwarding Engine to the service PIC
for URL filtering.
downlink packet Number of packets going from the service PIC to the service Packet
count Forwarding Engine for URL filtering.
UDP DNS Number of UDP DNS requests, responses, and log only responses for DNS
request filtering for queries of types A, AAAA, MX, CNAME, SRV, TXT, and
MISC.
TCP DNS Number of TCP DNS requests, responses, and log only responses for DNS
request filtering for queries of types A, AAAA, MX, CNAME, SRV, TXT, and
MISC.
Sample Output
UDP Counters:
1340
A 0 0 0
AAAA 0 0 0
MX 0 0 0
CNAME 0 0 0
SRV 0 0 0
TXT 0 0 0
MISC 0 0 0
TCP Counters:
A 0 0 0
AAAA 0 0 0
MX 0 0 0
CNAME 0 0 0
SRV 0 0 0
TXT 0 0 0
MISC 0 0 0
Sample Output
Release Information
Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480
and MX960 with the MX-SPC3 services card.
1343
RELATED DOCUMENTATION
IN THIS SECTION
Syntax | 1343
Description | 1343
Syntax
Description
Output Fields
When you enter this command, you are provided feedback on the status of your request.
1344
Sample Output
Enabled
Unified Services : Upgrade staged , please reboot with 'request system reboot'
to enable unified services.
Disabled
Unified Services : Upgrade staged , please reboot with 'request system reboot'
to disable unified services.
Release Information