Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches

Size: px
Start display at page:

Download "Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches"

Transcription

1 APPLICATION NOTE Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches Exporting sflow to Collectors Through a Separate Virtual Routing Instance Copyright 2009, Juniper Networks, Inc.

2 Table of Contents Table of Figures Introduction...1 Scope...1 Design Considerations...1 sflow Overview of Juniper Networks EX Series Ethernet Switches...1 Packet Flow... 1 Packet Flow Sampling... 1 Packet Flow Record... 1 Counter Sampling... 1 sflow Agent... 1 sflow Collector Description and Deployment Scenario...2 sflow Implementation on EX Series Switches... 2 Traffic Monitoring Using sflow on EX Series Switches... 2 Exporting sflow-sampled Records to a Remote Collector in a Different Virtual Routing Instance... 6 Summary...15 About Juniper Networks...15 Figure 1: sflow monitoring in a regular network...2 Figure 2: sflow sampled packets sent to the collector...4 Figure 3: Packet header of the sflow sampled packets...5 Figure 4: Details of the sflow sampled packets...6 Figure 5: sflow monitoring with a collector in separate virtual routing instance...7 Figure 6: sflow sampled packets sent to the collector Figure 7: sflow sampled packets sent to the collector Figure 8: sflow sampled packets sent to the collector Figure 9: Details of the sflow sampled packets sent to collector Figure 10: Details of the sflow interface counters sent to collector ii Copyright 2009, Juniper Networks, Inc.

3 Introduction The sflow (RFC 3176) technology is designed for monitoring high-speed switched or routed networks and provides visibility into the type of network traffic to help detect anomalies in traffic flows. This statistical sampling-based network monitoring technology samples network packets and sends the samples to a monitoring station, where it gives the network administrator visibility into network behavior. Scope This application note will describe how sflow technology can be deployed on the Juniper Networks EX3200 Ethernet Switch and EX4200 Ethernet Switch in a typical switched or routed network environment. It will also discuss how to export the sflow sampling data records to remote monitoring collectors through network ports in a separate virtual routing instance on Juniper Networks EX Series Ethernet Switches. Design Considerations The results of the tests described below are based on the use of Juniper Networks EX4200 Ethernet Switches. The EX3200 Ethernet Switches could be substituted for the EX4200 switches. sflow Overview of Juniper Networks EX Series Ethernet Switches Before discussing details about deploying sflow on EX Series switches, it would be useful to first provide an overview of basic sflow terminologies. Packet Flow A packet flow is defined as a set of packets moving through a networking device such as a switch or router. Packets are received on an ingress interface, and a switching or routing decision is made for the egress interface. Packet Flow Sampling Packet flow sampling refers to arbitrarily choosing some packets out of a specified number, reading the first 128 bytes, and exporting the sampled datagram for meaningful analysis. Packet Flow Record The packet flow record contains two kinds of information: first, some basic information about the sample datagram such as encapsulation and header information; and second, information related to selection of the forwarding path. Counter Sampling Counter sampling performs periodic, time-based sampling or polling of counters associated with an interface enabled for sflow. Interface statistics from the counter record are gathered, and the agent constructs a datagram which it sends to the collectors, depending on which collector addresses are configured. sflow Agent The sflow agent provides an interface for configuring sflow instances. The interfaces may be command-line interface (CLI) or SNMP MIBs (in the feature roadmap). The sflow agent is also responsible for making the datagrams and sending them to the collectors. sflow Collector The sflow collector is a piece of hardware/software that can receive sflow datagrams and present a view of traffic and other network parameters which are output as type, length, and value (TLV) in the datagrams. The sflow collectors can also read and configure sflow-managed objects. Copyright 2009, Juniper Networks, Inc. 1

4 Description and Deployment Scenario sflow Implementation on EX Series Switches An sflow agent is typically embedded in a switch s ASIC hardware, where it collects different samples at regular intervals. The datagrams are sent at regular intervals to the sflow collector whose address is configured as an IP address, UDP port pair. The collector reads the datagram, extrapolates the traffic pattern, and generates a traffic report. The sflow technology provides Layer 2-7 visibility and can also scale to 10-Gigabit Ethernet interfaces. The sflow agent does sampling in two phases. Packet flow sampling consists of statistical data gathered from individual flows, while counter sampling involves the periodic polling of counters to gather interface data. The datagrams are output to the UDP port default as Flow samples are then bundled into a datagram. Counter sampling is done at regular intervals to provide details about the interfaces, backplane, and so on. The sflow agent can be configured using CLI or, in the future, by SNMP variables. Communication between the agent and the collector is bidirectional; the agent sends datagrams to the collector, while the collector may configure some SNMP variables in the sflow agent or may read some of the SNMP MIB using UDP packets, as they work efficiently in times of congestion. Traffic Monitoring Using sflow on EX Series Switches The following shows a typical deployment for sflow on EX Series switches in order to monitor network traffic. The next section will cover the details step by step. All configurations have been verified in Juniper Networks JUNOS Software release 9.5R1.8. EX EX sflow sampling data GE-0/0/0 GE-0/0/12 sflow enabled sflow sampling GE-0/0/0 data GE-0/0/13 GE-0/0/0 Network Traffic Stream EX sflow collector ( ) Figure 1: sflow monitoring in a regular network As shown in Figure 1, a bidirectional traffic stream is being transferred across two EX4200 switches, with interface ge-0/0/12 on EX and interface ge0/0/0 on EX The traffic stream is between two endpoints which are not shown in the diagram with IP addresses and The ge-0/0/12 on EX is configured as a Layer 3 interface with IP address /24. show interfaces ge-0/0/12 unit 0 { family inet { address /24; 2 Copyright 2009, Juniper Networks, Inc.

5 sflow is enabled on ge-0/0/12 on EX so that the sflow agent can sample the ingress traffic stream on this particular interface. As of now, sflow can only be enabled on Layer 2 or Layer 3 physical interfaces. show protocols sflow { polling-interval 20; sample-rate 100; collector { udp-port 6343; interfaces ge-0/0/12.0; Up to four collectors can be configured on each EX Series switch, and each collector can receive the same set of sflow data record samples. The sflow data record samples are UDP packets and the default UDP port is 6343, although this is configurable. The polling interval is the interval between each port statistic polling update message, which can range from 0 to 3600 seconds. The sample rate means one out of N packets in the traffic stream will be sampled, and this can be different for various interfaces. The range of sample rate is from 100 to 1 million. In an EX Series switch implementation, the sflow datagram cannot be routed over the management Ethernet interface (me0) or virtual management interface (vme0). It only can be exported over the network Gigabit Ethernet or 10-Gigabit Ethernet ports using valid route information in the routing table. The most important thing here is that the switch must have a route in the default global routing table to point to the next hop via a network port through which it can reach the remote collector s IP address (in this case, the collector has the IP address ). In this example, as shown in Figure 1, a static route is configured on EX4200-1, which tells the switch that the interface ge0/0/0 on EX is the next hop for it to reach the remote collector show routing-options static { route /24 next-hop ; show route inet.0: 11 destinations, 11 routes (11 active, 0 holddown, 0 hidden) + = Active Route, - = Last Active, * = Both /24 *[Static/5] 00:35:14 {master:0 Copyright 2009, Juniper Networks, Inc. 3

6 With the network data traffic stream sending, the sflow sampling data records and counter statistics record have been received on the remote collector, capturing the following information via the version Wireshark tool. Figure 2: sflow sampled packets sent to the collector As shown in Figure 2 above, the collector with IP address received the sflow data records from the sflow agent on EX4200-1, and most data records have seven sflow sampled datagrams bundled. The next step is to take a closer look at each sflow data record packet. 4 Copyright 2009, Juniper Networks, Inc.

7 Figure 3: Packet header of the sflow sampled packets As shown in Figure 3, the sampled sflow record packet that was sent from the sflow agent EX to the sflow collector is a UDP packet with the destination port number Copyright 2009, Juniper Networks, Inc. 5

8 Figure 4: Details of the sflow sampled packets Figure 4 above shows the detailed information for one of the seven flow samples that were bundled together in one sflow data record packet sent from the EX Series switch to the collector. It is possible to discern the following about the network traffic stream that enters the sflow-enabled interface ge-0/0/12 on EX4200-1: The IP source address is The IP destination address is The DiffServ code point (DSCP) value of the packets in the stream is set to 0x28(EF). The traffic is UDP traffic type FTP with destination port 21. Exporting sflow-sampled Records to a Remote Collector in a Different Virtual Routing Instance As mentioned earlier, in an EX Series switch implementation, sflow-sampled records will not be exported out of management interfaces (me0 or vme0) to avoid the possibility of overwhelming the CPU. In certain situations, the need to export sflow data to a remote collector through the management network path still exists. To accommodate this requirement, it is possible to use the virtual routing instance feature on the EX Series Ethernet Switch and utilize one of the network ports as a dedicated management port to have sflow exported through the management network. 6 Copyright 2009, Juniper Networks, Inc.

9 In the lab network used in this example (shown in Figure 5), network port ge-0/0/0 on the EX is used as a dedicated management interface that is connected to the management network. To isolate the interface ge-0/0/0 from other network interfaces on the switch, interface ge-0/0/0 is placed in a separate virtual routing instance called mgnt_net. In this example, two sflow collectors are sitting in the management network data center, while the third sflow collector is connected to EX through the regular network port. VRF: mgnt_net sflow collector ( ) GE-0/0/0 sflow sampling data EX GE-0/0/12 sflow enabled GE-0/0/7 Network Traffic Stream EX Management Network GE-0/0/0 sflow sampling data sflow sampling data sflow collector ( ) sflow collector ( ) Figure 5: sflow monitoring with a collector in separate virtual routing instance All three sflow collectors are configured under protocol sflow on EX : show protocols sflow { polling-interval 20; sample-rate 100; collector ; collector ; collector ; interfaces ge-0/0/12.0; The following configuration places ge-0/0/0 on EX into the separate virtual routing instance mgnt_net to isolate it from other network interfaces on the switch. Static routes are also configured for out-of-band management for switch EX show routing-instances mgnt_net { instance-type virtual-router; interface ge-0/0/0.0; routing-options { static { Copyright 2009, Juniper Networks, Inc. 7

10 route /0 next-hop ; route /32 next-hop ; route /32 next-hop ; The routing table on switch EX shows the following: run show route inet.0:7 destinations, 7 routes (7 active, 0 holddown, 0 hidden) + = Active Route, - = Last Active, * = Both /24 *[Direct/0] 23:23:22 > via ge-0/0/ /32 *[Local/0] 1d 03:20:14 Local via ge-0/0/ /24 *[Static/5] 1d 03:17:49 > to via ge-0/0/ /24 *[Direct/0] 00:26:17 > via ge-0/0/ /32 *[Local/0] 00:26:17 Local via ge-0/0/ /24 *[Direct/0] 1d 03:23:07 > via ge-0/0/ /32 *[Local/0] 1d 03:23:07 Local via ge-0/0/12.0 mgnt_net.inet.0: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden) + = Active Route, - = Last Active, * = Both /0 *[Static/5] 00:26: /32 *[Static/5] 00:26: /32 *[Static/5] 00:26: /24 *[Direct/0] 00:26:17 > via ge-0/0/ /32 *[Local/0] 00:26:17 Local via ge-0/0/0.0 The sflow agent EX needs the routing information in its default routing table to reach the sflow collectors, so that it can export the sflow data records to the collectors through the network interfaces. As shown above, EX can reach the collector , since this collector is connected to EX through interface ge-0/0/7 which belongs to the default global routing instance. Hence, there is a route pointing /24 subnets in its default global routing table. The other collectors, and , are connected to EX through the pseudo management interface ge-0/0/0 which belongs to a separate virtual routing instance mgnt_net. Therefore, EX doesn t have routes to reach these two collectors in the default global routing table, and the routes only show up in the mgnt_net virtual routing table. 8 Copyright 2009, Juniper Networks, Inc.

11 In order for EX to export sflow data records to collectors and through the pseudo management interface ge-0/0/0, these routes ( /32, /32) must be advertised from mgnt_net virtual routing instance to the default global routing instance. First, the policy statement must be set up so that the policy statement sflow_collector will advertise two routes /32 and /32 from virtual routing instance mgnt_net to the default global routing instance. show policy-options policy-statement sflow_collector { term t1 { from { instance mgnt_net; route-filter /32 exact; then accept; term t2 { from { instance mgnt_net; route-filter /32 exact; then accept; term default { then reject; Next, the policy statement must be attached to the default global instance: show routing-options instance-import sflow_collector; A quick review of the routing table shows that two more routes ( /32 and /32) have been redistributed from the mgnt_net routing instance and the outgoing interface is ge-0/0/0. The forwarding table also shows the next hop to be run show route inet.0:9 destinations, 9 routes (9 active, 0 holddown, 0 hidden) + = Active Route, - = Last Active, * = Both /32 *[Static/5] 00:01: /24 *[Direct/0] 23:23:22 > via ge-0/0/ /32 *[Local/0] 1d 03:20:14 Local via ge-0/0/ /24 *[Static/5] 1d 03:17:49 > to via ge-0/0/ /24 *[Direct/0] 00:26:17 > via ge-0/0/7.0 Copyright 2009, Juniper Networks, Inc. 9

12 /32 *[Local/0] 00:26:17 Local via ge-0/0/ /32 *[Static/5] 00:01: /24 *[Direct/0] 1d 03:23:07 > via ge-0/0/ /32 *[Local/0] 1d 03:23:07 Local via ge-0/0/12.0 mgnt_net.inet.0: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden) + = Active Route, - = Last Active, * = Both /0 *[Static/5] 00:26: /32 *[Static/5] 00:26: /32 *[Static/5] 00:26: /24 *[Direct/0] 00:26:17 > via ge-0/0/ /32 *[Local/0] 00:26:17 Local via ge-0/0/0.0 run show route forwarding-table destination Routing table: default.inet /32 user ucst ge-0/0/0.0 Routing table: juniper_private1.inet default perm 0 rjct Routing table: juniper_private2.inet default perm 0 rjct Routing table: master.anon.inet default perm 0 rjct Routing table: mgnt_net.inet /32 user ucst ge-0/0/0.0 run show route forwarding-table destination Routing table: default.inet /32 user ucst ge-0/0/0.0 Routing table: juniper_private1.inet default perm 0 rjct Copyright 2009, Juniper Networks, Inc.

13 Routing table: juniper_private2.inet default perm 0 rjct Routing table: master.anon.inet default perm 0 rjct Routing table: mgnt_net.inet /32 user ucst ge-0/0/0.0 After starting traffic between EX and EX4200-2, sflow sampled records are being sent to all three collectors, which are actually in different virtual routing instances. Figure 6 below shows the captures on collector Figure 6: sflow sampled packets sent to the collector Copyright 2009, Juniper Networks, Inc. 11

14 Figure 7 below shows the captures on collector : Figure 8 below shows the captures on collector : Figure 7: sflow sampled packets sent to the collector Figure 8: sflow sampled packets sent to the collector Copyright 2009, Juniper Networks, Inc.

15 A close look at the sflow sampled data records exported to collector shown in Figure 9 shows that the network traffic stream which enters the sflow-enabled interface ge-0/0/12 on EX has the following patterns: The stream s IP source address is The stream s IP destination address is The DSCP value of the packets in the stream is 0x28(EF). The traffic is UDP traffic type FTP with destination port 21. Figure 9: Details of the sflow sampled packets sent to collector Copyright 2009, Juniper Networks, Inc. 13

16 Figure 10 below shows the captured sflow counter sample record which is exported to collector Figure 10: Details of the sflow interface counters sent to collector Copyright 2009, Juniper Networks, Inc.

17 Summary The sflow technology is used for monitoring traffic in data networks containing switches and routers. With the sflow implementation on Juniper Networks EX Series Ethernet Switches, sflow data records and counters can be sampled and exported to up to four collectors in different virtual routing instances to provide clear visibility into network traffic patterns. About Juniper Networks Juniper Networks, Inc. is the leader in high-performance networking. Juniper offers a high-performance network infrastructure that creates a responsive and trusted environment for accelerating the deployment of services and applications over a single network. This fuels high-performance businesses. Additional information can be found at Corporate and Sales Headquarters Juniper Networks, Inc North Mathilda Avenue Sunnyvale, CA USA Phone: 888.JUNIPER ( ) or Fax: APAC Headquarters Juniper Networks (Hong Kong) 26/F, Cityplaza One 1111 King s Road Taikoo Shing, Hong Kong Phone: Fax: To purchase Juniper Networks solutions, please contact your Juniper Networks representative at or authorized reseller. EMEA Headquarters Juniper Networks Ireland Airside Business Park Swords, County Dublin, Ireland Phone: Fax: Copyright 2009 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, JUNOS, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. JUNOSe is a trademark of Juniper Networks, Inc. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice EN June 2009 Printed on recycled paper. 15

MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES

MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES APPLICATION NOTE MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES Exporting sflow to Collectors Through a Separate Virtual Routing Instance Copyright 2010, Juniper Networks,

More information

PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY

PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY APPLICATION NOTE PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY Copyright 2010, Juniper Networks, Inc. Table of Contents Introduction........................................................................................

More information

IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL

IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL An illustrated Guide to Configuring a Simple IF-MAP Federated Network Juniper Networks, Inc. 1 Table of Contents Introduction...3 Scope...3

More information

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Load Balancing Layer 3 VPN Traffic While Simultaneously Using IP Header Filtering Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California

More information

MIGRATING IPS SECURITY POLICY TO JUNIPER NETWORKS SRX SERIES SERVICES GATEWAYS

MIGRATING IPS SECURITY POLICY TO JUNIPER NETWORKS SRX SERIES SERVICES GATEWAYS APPLICATION NOTE MIGRATING IPS SECURITY POLICY TO JUNIPER NETWORKS SRX SERIES SERVICES GATEWAYS Migrating Advanced Security Policies to SRX Series Services Gateways Copyright 2009, Juniper Networks, Inc.

More information

Optimizing VoIP Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches

Optimizing VoIP Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches APPLICATION NOTE Deploying IP Telephony with JUNIPER NETWORKS ETHERNET Switches Optimizing Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches Copyright 2009, Juniper Networks,

More information

Deploying IP Telephony with EX-Series Switches

Deploying IP Telephony with EX-Series Switches Application Note Deploying IP Telephony with EX-Series Switches Optimizing VoIP Applications with EX 3200 and EX 4200 Series Ethernet Switches Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,

More information

Limitation of Riverbed s Quality of Service (QoS)

Limitation of Riverbed s Quality of Service (QoS) Application Note Limitation of Riverbed s Quality of Service (QoS) Riverbed s Quality of Service (QoS) configuration and limitations Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California

More information

DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES

DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES APPLICATION NOTE DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES Optimizing Applications with Juniper Networks Access Switches Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Introduction.....................................................................................................3

More information

Demonstrating the high performance and feature richness of the compact MX Series

Demonstrating the high performance and feature richness of the compact MX Series WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Virtual Router Use Case for Educational Networks Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

CONFIGURATION OPTIONS FOR HARDWARE RULE SEARCH (RMS) AND SOFTWARE RULE SEARCH (SWRS)

CONFIGURATION OPTIONS FOR HARDWARE RULE SEARCH (RMS) AND SOFTWARE RULE SEARCH (SWRS) APPLICATION NOTE CONFIGURATION OPTIONS FOR HARDWARE RULE SEARCH (RMS) AND SOFTWARE RULE SEARCH (SWRS) Discover Which Juniper Networks ScreenOS Rule Search Works for Your Network Copyright 2010, Juniper

More information

In this activity, you will complete the following objectives.

In this activity, you will complete the following objectives. Lab 3-1: JIR Lab Guide Load Balancing and Filter-Based Forwarding In this activity, you will complete the following objectives. Part 1: Configure load balancing. Part 2: Configure filter based forwarding.

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Multiple Port Mirroring Sessions on EX4200 Switches Published: 2014-04-09 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring IP Monitoring on an SRX Series Device for the Branch Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Implementing Firewalls inside the Core Data Center Network

Implementing Firewalls inside the Core Data Center Network IMPLEMENTATION GUIDE Implementing Firewalls inside the Core Data Center Network Best Practices for Implementing Juniper Networks Firewall Devices in the Data Center Core Copyright 2010, Juniper Networks,

More information

Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources

Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources APPLICATION NOTE Juniper NETWORKS SSL VPN and Windows Mobile Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources Table of Contents Introduction.........................................................................................

More information

VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES

VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES APPLICATION NOTE VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES Configuring Secure SSL VPN Access in a VMware Virtual Desktop Environment Copyright 2010, Juniper Networks, Inc. 1 Table

More information

COORDINATED THREAT CONTROL

COORDINATED THREAT CONTROL APPLICATION NOTE COORDINATED THREAT CONTROL Interoperability of Juniper Networks IDP Series Intrusion Detection and Prevention Appliances and SA Series SSL VPN Appliances Copyright 2010, Juniper Networks,

More information

Introduction...3. Scope...3. Design Considerations...3. Hardware Requirements...3. Software Requirements...3. Description and Deployment Scenario...

Introduction...3. Scope...3. Design Considerations...3. Hardware Requirements...3. Software Requirements...3. Description and Deployment Scenario... APPLICATION NOTE Securing Virtualization in the Cloud-Ready Data Center Integrating vgw Virtual Gateway with SRX Series Services Gateways and STRM Series Security Threat Response Manager for Data Center

More information

Voice Modules for the CTP Series

Voice Modules for the CTP Series DATASHEET Voice Modules for the CTP Series Product Overview Enterprise organizations are leveraging the cost savings associated with IP transport for a variety of new packet based multimedia services.

More information

Identity-Based Traffic Logging and Reporting

Identity-Based Traffic Logging and Reporting Application Note Identity-Based Traffic Logging and Reporting Using UAC in Conjunction with NSM and Infranet Enforcers to Give Additional, User-Identified Visibility into Network Traffic Juniper Networks,

More information

Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET

Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET DATASHEET Network and Security Manager Product Overview Network and Security Manager provides unparalleled capability for device and security policy configuration, comprehensive monitoring, reporting tools,

More information

ENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS

ENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS SOLUTION BRIEF ENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS IT Organizations Can Reduce Costly TDM Leased Line Fees Challenge IP networks were not designed to transport bit-synchronous

More information

Juniper Networks WX Series Large. Integration on Cisco

Juniper Networks WX Series Large. Integration on Cisco APPLICATION NOTE Juniper Networks WX Series Large Deployment with WCCP Off-Path Integration on Cisco Integrating Multiple Juniper Networks WX Series Application Acceleration Platforms into a Cisco Infrastructure

More information

PRODUCT CATEGORY BROCHURE

PRODUCT CATEGORY BROCHURE IDP Series Intrusion Detection and Prevention Appliances PRODUCT CATEGORY BROCHURE Staying One Step Ahead With the accelerating number of applications allowed in from the Internet and the higher frequency

More information

ENSURING RAPID RESTORATION IN JUNOS OS-BASED NETWORKS

ENSURING RAPID RESTORATION IN JUNOS OS-BASED NETWORKS WHITE PAPER ENSURING RAPID RESTORATION IN JUNOS OS-BASED NETWORKS A Complete Convergence Solution Based on Local Repair, Loop Free Alternates, and Hierarchical Forwarding Copyright 0, Juniper Networks,

More information

Web Filtering For Branch SRX Series and J Series

Web Filtering For Branch SRX Series and J Series APPLICATION NOTE Web Filtering For Branch SRX Series and J Series Configuring Web Filtering on Branch SRX Series Services Gateways and J Series Services Routers Copyright 2009, Juniper Networks, Inc. Table

More information

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation

More information

Implementing Firewalls inside the Core Data Center Network

Implementing Firewalls inside the Core Data Center Network Implementation Guide Implementing Firewalls inside the Core Data Center Network Best Practices for Implementing Juniper Networks Firewall Devices in the Data Center Core Juniper Networks, Inc. 1194 North

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring a Single SRX Series Device in a Branch Office Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

USING MX SERIES AS A SERVER LOAD BALANCER

USING MX SERIES AS A SERVER LOAD BALANCER APPLICATION NOTE USING MX SERIES AS A SERVER LOAD BALANCER Leveraging ECMP and the Trio 3D Chipset to Integrate Functionality Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Introduction.....................................................................................................3

More information

Simplifying the Data Center Network to Reduce Complexity and Improve Performance

Simplifying the Data Center Network to Reduce Complexity and Improve Performance SOLUTION BRIEF Juniper Networks 3-2-1 Data Center Network Simplifying the Data Center Network to Reduce Complexity and Improve Performance Challenge Escalating traffic levels, increasing numbers of applications,

More information

Configuring and Implementing A10

Configuring and Implementing A10 IMPLEMENTATION GUIDE Configuring and Implementing A10 Networks Load Balancing Solution with Juniper s SSL VPN Appliances Although Juniper Networks has attempted to provide accurate information in this

More information

WEB FILTERING FOR BRANCH SRX SERIES AND J SERIES

WEB FILTERING FOR BRANCH SRX SERIES AND J SERIES APPLICATION NOTE WEB FILTERING FOR BRANCH SRX SERIES AND J SERIES Configuring Web Filtering on Branch SRX Series Services Gateways and J Series Services Routers Copyright 2010, Juniper Networks, Inc. 1

More information

WHITE PAPER. Copyright 2011, Juniper Networks, Inc. 1

WHITE PAPER. Copyright 2011, Juniper Networks, Inc. 1 WHITE PAPER Network Simplification with Juniper Networks Technology Copyright 2011, Juniper Networks, Inc. 1 WHITE PAPER - Network Simplification with Juniper Networks Technology Table of Contents Executive

More information

JNCIA-Junos Study Guide Part 2

JNCIA-Junos Study Guide Part 2 Worldwide Education Services 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net This document is produced by Juniper Networks, Inc. This document or any part thereof may not

More information

Juniper Networks Solution Portfolio for Public Sector Network Security

Juniper Networks Solution Portfolio for Public Sector Network Security SOLUTION BROCHURE Juniper Networks Solution Portfolio for Public Sector Network Security Protect against Network Downtime, Control Access to Critical Resources, and Provide Information Assurance Juniper

More information

SoLuTIoN guide. CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork

SoLuTIoN guide. CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork SoLuTIoN guide CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork Contents BENEfITS of ThE CLoud-rEAdy data CENTEr NETWork............................3 getting ready......................................................................3

More information

End of Sale (EOS) and End of Life (EOL) Frequently Asked Questions (FAQ)

End of Sale (EOS) and End of Life (EOL) Frequently Asked Questions (FAQ) 1 End of Sale (EOS) and End of Life (EOL) Frequently Asked Questions (FAQ) Effective January 1, 2008, Juniper Networks announced the End of Sale (EOS) for select Netscreen Firewall/VPN and Secure Routing

More information

Understanding Fundamental Issues with TRILL

Understanding Fundamental Issues with TRILL WHITE PAPER TRILL in the Data Center: Look Before You Leap Understanding Fundamental Issues with TRILL Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Executive Summary........................................................................................................

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California

More information

PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series

PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series PRODUCT CATEGORY BROCHURE Juniper Networks SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations

More information

Strategic Network Consulting

Strategic Network Consulting Strategic Network Consulting Service Description Document November 2009 Contents 1. Introduction... 2 2. Eligibility and Prerequisites... 2 3. Service Features and Deliverables... 2 4. Customer Responsibilities...

More information

Interoperability Test Results for Juniper Networks EX Series Ethernet Switches and NetApp Storage Systems

Interoperability Test Results for Juniper Networks EX Series Ethernet Switches and NetApp Storage Systems APPLICATION NOTE Network Attached Storage Interoperability Testing Interoperability Test Results for Juniper Networks EX Series Ethernet Switches and Storage Systems Copyright 2012, Juniper Networks, Inc.

More information

WAN OPTIMIZATION AND IPSEC FOR THE BRANCH OFFICE

WAN OPTIMIZATION AND IPSEC FOR THE BRANCH OFFICE IMPLEMENTATION GUIDE WAN OPTIMIZATION AND IPSEC FOR THE BRANCH OFFICE Although Juniper Networks has attempted to provide accurate information in this guide, Juniper Networks does not warrant or guarantee

More information

AlliedWare Plus OS How To Use sflow in a Network

AlliedWare Plus OS How To Use sflow in a Network AlliedWare Plus OS How To Use sflow in a Network Introduction sflow is an industry-standard sampling system that is embedded in Allied Telesis' high-performing Layer 3 switches. sflow enables you to use

More information

Identity-Based Application and Network Profiling

Identity-Based Application and Network Profiling Application Note Identity-Based Application and Network Profiling Using UAC in Conjunction with NSM, IDP and Infranet Enforcers Permits User-Identified Application and Network Profiling Juniper Networks,

More information

JUNOScope IP Service Manager

JUNOScope IP Service Manager Datasheet JUNOScope IP Service Manager Product Description As service providers and enterprises evolve to meet the demands of their customer base, one key to success is the enhancement of operational efficiencies

More information

Remote Access Protection

Remote Access Protection IMPLEMENTATION GUIDE Remote Access Protection Best Practices for Implementing Remote Access Protection Using Juniper Networks SA Series SSL VPN Appliances, IDP Series Intrusion Detection and Prevention

More information

Features and Benefits

Features and Benefits DATASHEET Optic Modules Product Description Juniper Networks has platforms ranging from the Juniper Networks CTP Series Circuit to Packet Platforms, BX Series Multi-Access Gateways, E Series Broadband

More information

NETWORK AND SECURITY MANAGER

NETWORK AND SECURITY MANAGER DATASHEET NETWORK AND SECURITY MANAGER Product Overview Juniper Networks Network and Security Manager (NSM) is a unified device management solution for Juniper s network infrastructure of routing, switching

More information

JNCIS-ENT Routing Study Guide

JNCIS-ENT Routing Study Guide Worldwide Education Services 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net This document is produced by Juniper Networks, Inc. This document or any part thereof may not

More information

The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more

The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more The dramatic growth in mobile device malware continues to escalate at an ever-accelerating pace. These threats continue to become more sophisticated while the barrier to entry remains low. As specific

More information

Reasons Enterprises. Prefer Juniper Wireless

Reasons Enterprises. Prefer Juniper Wireless Reasons Enterprises Prefer Juniper Wireless Juniper s WLAN solution meets the mobility needs of today s enterprises by delivering the highest levels of reliability, scalability, management, and security.

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Security Options for BGP with TCP Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Meeting PCI Data Security Standards with

Meeting PCI Data Security Standards with WHITE PAPER Meeting PCI Data Security Standards with Juniper Networks STRM Series Security Threat Response Managers When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs Copyright

More information

SECURE ACCESS TO THE VIRTUAL DATA CENTER

SECURE ACCESS TO THE VIRTUAL DATA CENTER SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring DCBX Application Protocol TLV Exchange Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

NETWORK AND SECURITY MANAGER APPLIANCES (NSMXPRESS AND NSM3000)

NETWORK AND SECURITY MANAGER APPLIANCES (NSMXPRESS AND NSM3000) DATASHEET NETWORK AND SECURITY MANAGER APPLIANCES ( AND ) Product Overview Now more than ever, network operators need the ability to easily manage security policies and to have visibility into potential

More information

Implementation Consulting

Implementation Consulting Implementation Consulting Service Description Document August 2009 Table of Contents 1. Introduction...2 2. Eligibility and Prerequisite...2 3. Service Features and Deliverables...2 4. Customer Responsibilities...3

More information

Introduction to Carrier Ethernet VPNs: Understanding the Alternatives

Introduction to Carrier Ethernet VPNs: Understanding the Alternatives WHITE AR Introduction to Carrier Ethernet VNs: Understanding the Alternatives Copyright 2009, Juniper Networks, Inc. WHITE AR - Introduction to Carrier Ethernet VNs: Understanding the Alternatives Table

More information

INTEGRATING OPTICAL TRANSPORT INTO ROUTERS

INTEGRATING OPTICAL TRANSPORT INTO ROUTERS WHITE PAPER INTEGRATING OPTICAL TRANSPORT INTO ROUTERS Tunable Laser-Based Interfaces and Multiplexing Options for 10-Gbps and 40-Gbps Applications Copyright 2010, Juniper Networks, Inc. 1 Table of Contents

More information

GENERATING NEW REVENUE STREAMS AND INCREASING NETWORK SECURITY

GENERATING NEW REVENUE STREAMS AND INCREASING NETWORK SECURITY WHITE PAPER GENERATING NEW REVENUE STREAMS AND INCREASING NETWORK SECURITY Dynamic Application Awareness and Intrusion Prevention System Copyright 2009, Juniper Networks, Inc. 1 Table of Contents Executive

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Branch SRX Series for MPLS over IPsec (1500-byte MTU) Published: 2014-12-17 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Junos OS for EX Series Ethernet Switches

Junos OS for EX Series Ethernet Switches Junos OS for EX Series Ethernet Switches Analyzers for EX9200 Switches Release 13.3 Published: 2014-08-07 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Technology Overview. Lawful Intercept Using Flow-Tap. Published: 2014-01-10. Copyright 2014, Juniper Networks, Inc.

Technology Overview. Lawful Intercept Using Flow-Tap. Published: 2014-01-10. Copyright 2014, Juniper Networks, Inc. Technology Overview Lawful Intercept Using Flow-Tap Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks,

More information

PRODUCT CATEGORY BROCHURE

PRODUCT CATEGORY BROCHURE PRODUCT CATEGORY BROCHURE SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations of Every Size

More information

Service Description Overview

Service Description Overview Service Description Overview Firewall Configuration Migration Service Service Description Overview...1 Firewall Configuration Migration Service...1 1. Introduction...2 2. Service Features...2 3. Service

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

TECHNICAL NOTE INSTALLING AND CONFIGURING ALE USING A CLI. Installing the Adaptive Log Exporter

TECHNICAL NOTE INSTALLING AND CONFIGURING ALE USING A CLI. Installing the Adaptive Log Exporter TECHNICAL NOTE INSTALLING AND CONFIGURING ALE USING A CLI NOVEMBER 2010 If you want to install the Adaptive Log Exporter without the installation wizard, this document provides information about installing

More information

Application Note: Junos NAT Configuration Examples

Application Note: Junos NAT Configuration Examples : Junos NAT Configuration Examples January 2010 Juniper Networks, Inc. 1 Table of Contents Junos NAT Configuration Examples...1 Introduction...3 Requirements...3 Configuration Examples...3 Source NAT...3

More information

Monitoring and Troubleshooting BGP Neighbor Sessions

Monitoring and Troubleshooting BGP Neighbor Sessions Application Note Monitoring and Troubleshooting BGP Neighbor Sessions Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net Part Number:

More information

Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation

Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation White Paper Securing Multi-Tenancy and Cloud Computing Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation Copyright 2012, Juniper Networks,

More information

SRX SERIES AND J SERIES NETWORK ADDRESS TRANSLATION

SRX SERIES AND J SERIES NETWORK ADDRESS TRANSLATION APPLICATION NOTE SRX SERIES AND J SERIES NETWORK ADDRESS TRANSLATION Configuring Next-Generation NAT on Juniper Networks SRX Series Services Gateways and J Series Services Routers Copyright 2010, Juniper

More information

Key Strategies for Long-Term Success

Key Strategies for Long-Term Success WHITE PAPER Security in the Next- Generation Data Center Key Strategies for Long-Term Success Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Executive Summary........................................................................................................

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Link Aggregation Between EX Series Switches and Ruckus Wireless Access Points Modified: 2015-10-01 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California

More information

REAL-TIME PERFORMANCE MONITORING ON JUNIPER NETWORKS DEVICES

REAL-TIME PERFORMANCE MONITORING ON JUNIPER NETWORKS DEVICES APPLICATION NOTE REAL-TIME PERFORMANCE MONITORING ON JUNIPER NETWORKS DEVICES Tips and Tools for Assessing and Analyzing Network Efficiency Copyright 2010, Juniper Networks, Inc. Table of Contents Table

More information

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents

More information

Product Description. Product Overview

Product Description. Product Overview DATASHEET vgw Gateway Product Overview The vgw Gateway provides a best-in-class virtual firewall to meet the unique security challenges of virtual data centers and clouds. IT teams can now secure their

More information

Technology Overview. Class of Service Overview. Published: 2014-01-10. Copyright 2014, Juniper Networks, Inc.

Technology Overview. Class of Service Overview. Published: 2014-01-10. Copyright 2014, Juniper Networks, Inc. Technology Overview Class of Service Overview Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, Junos,

More information

Introduction to Automatic Multicast Tunneling as a Transition Strategy for Local Service Providers

Introduction to Automatic Multicast Tunneling as a Transition Strategy for Local Service Providers WHITE PAPER Unlocking Video Over the Internet with MX Series Routers Introduction to Automatic Multicast Tunneling as a Transition Strategy for Local Service Providers Copyright 2011, Juniper Networks,

More information

Using Multicast Call Admission Control for IPTV Bandwidth Management

Using Multicast Call Admission Control for IPTV Bandwidth Management Application Note Using Multicast Call Admission Control for IPTV Bandwidth Management Managing Multicast Bandwidth in IPTV Networks Using Multicast Call Admission Control in the Edge Router Juniper Networks,

More information

s@lm@n Juniper Exam JN0-343 Juniper Networks Certified Internet Specialist (JNCIS-ENT) Version: 10.1 [ Total Questions: 498 ]

s@lm@n Juniper Exam JN0-343 Juniper Networks Certified Internet Specialist (JNCIS-ENT) Version: 10.1 [ Total Questions: 498 ] s@lm@n Juniper Exam JN0-343 Juniper Networks Certified Internet Specialist (JNCIS-ENT) Version: 10.1 [ Total Questions: 498 ] Topic 1, Volume A Question No : 1 - (Topic 1) How much overhead does the GRE

More information

Tutorial: Options for Blackhole and Discard Routing. Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia

Tutorial: Options for Blackhole and Discard Routing. Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia Tutorial: Options for Blackhole and Discard Routing Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia Caveats and Assumptions The views presented here are those of the authors and they do not

More information

Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products

Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products Application Note Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products Version 1.0 January 2008 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089

More information

Configuring and Deploying the Dynamic VPN Feature Using SRX Series Services Gateways

Configuring and Deploying the Dynamic VPN Feature Using SRX Series Services Gateways APPLICATION NOTE Dynamic VPN Configuring and Deploying the Dynamic VPN Feature Using SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Introduction.....................................................................................................3

More information

JUNIPER CARE PLUS ADVANCED SERVICES CREDITS

JUNIPER CARE PLUS ADVANCED SERVICES CREDITS DATASHEET JUNIPER CARE PLUS ADVANCED SERVICES CREDITS Service Overview Today s organizations are under constant pressure to meet dynamic market demands while increasing their return on investment. IT departments

More information

White Paper. Protect Your Virtual. Realizing the Benefits of Virtualization Without Sacrificing Security. Copyright 2012, Juniper Networks, Inc.

White Paper. Protect Your Virtual. Realizing the Benefits of Virtualization Without Sacrificing Security. Copyright 2012, Juniper Networks, Inc. White Paper Five Best Practices to Protect Your Virtual Environment Realizing the Benefits of Virtualization Without Sacrificing Security Copyright 2012, Juniper Networks, Inc. 1 Table of Contents Executive

More information

EX SERIES ETHERNET SWITCHES: QOS-ENABLING THE ENTERPRISE

EX SERIES ETHERNET SWITCHES: QOS-ENABLING THE ENTERPRISE WHITE PAPER EX SERIES ETHERNET SWITCHES: QOS-ENABLING THE ENTERPRISE Assuring End-to-End Application Performance Copyright 2012, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3

More information

Real-Time Performance Monitoring on

Real-Time Performance Monitoring on APPLICATION NOTE Real-Time Performance Monitoring on Juniper Networks Devices Tips and Tools for Assessing and Analyzing Network Efficiency Copyright 2009, Juniper Networks, Inc. Table of Contents Table

More information

Junos OS for EX Series Ethernet Switches

Junos OS for EX Series Ethernet Switches Junos OS for EX Series Ethernet Switches Services Feature Guide for EX4600 Switches Release 14.1X53 Modified: 2015-08-26 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000

More information

Agenda. sflow intro. sflow architecture. sflow config example. Summary

Agenda. sflow intro. sflow architecture. sflow config example. Summary sflow Features Agenda sflow intro. sflow architecture sflow config example Summary 1 What is sflow? sflow is a technology for monitoring traffic in data networks containing switches and routers. S9700

More information

Configuring NetFlow. Information About NetFlow. NetFlow Overview. Send document comments to nexus7k-docfeedback@cisco.com. CHAPTER

Configuring NetFlow. Information About NetFlow. NetFlow Overview. Send document comments to nexus7k-docfeedback@cisco.com. CHAPTER CHAPTER 16 This chapter describes how to configure the NetFlow feature on Cisco NX-OS devices. This chapter includes the following sections: Information About NetFlow, page 16-1 Licensing Requirements

More information

Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection.

Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection. TECHNICAL NOTE FORWARDING LOGS USING TAIL2SYSLOG MARCH 2013 The Tail2Syslog support script provides a method for monitoring and forwarding events to STRM using syslog for real-time correlation. Tail2Syslog

More information

After you have created your text file, see Adding a Log Source.

After you have created your text file, see Adding a Log Source. TECHNICAL UPLOADING TEXT FILES INTO A REFERENCE SET MAY 2012 This technical note provides information on how to upload a text file into a STRM reference set. You need to be comfortable with writing regular

More information

Juniper Networks QFX3500

Juniper Networks QFX3500 Implementation Guide Juniper Networks QFX3500 Switch and QLogic Converged Network Implementation Guide Copyright 2012, Juniper Networks, Inc. 1 Table of Contents Introduction...3 Implementing Converged

More information