command
show int xe/0/9 extensive | match “Framing error'
- #b3dc10
- Top »> exit
- root
- cli
- edit or config
- cisco config mode do junus run and mkt \ all
- run request system zeroize < system defolt >
- set system root-authentication plain-text-password
- root> show interfaces terse < int status check >
- run show configuration | match inter
- run show configuration | match inter | display set
- commit confirmed 2 «< only »>
- configure exclusive
- configure private
- edit protocols ospf area 0
- set interface em0 passive
- set interface em1 interface-type p2p
- show
- root# show | display set
- set protocols ospf area 0.0.0.0 interface em0.0 passive
- set protocols ospf area 0.0.0.0 interface em1.0 interface-type p2p
- [edit protocols ospf area 0.0.0.0]
- exit mane full back
- up = one step back up 2 = 2 stape back
- top and exit same
- =====================================router portt down and up ===
- [edit interfaces em0]
- root# set disable shutdown
- [edit interfaces em0]
- root# show
- disable;
- [edit interfaces em0]
- root# de
- ^
- 'de' is ambiguous.
- Possible completions:
- deactivate Add the inactive tag to a statement
- delete Delete a data element
- [edit interfaces em0]
- root# delete disable no shutdown
- [edit interfaces em0]
- root# show
- [edit interfaces em0]
- run show interfaces em0 terse
- ============================================== exta slot up korle ===
- root# run show chassis hardware ?
- Possible completions:
- <[Enter]> Execute this command
- clei-models Display CLEI barcode and model number for orderable FRUs
- detail Include RAM and disk information in output
- extensive Display ID EEPROM information
- models Display serial number and model number for orderable FRUs
- | Pipe through a command
- [edit interfaces em0]
- root# run show chassis hardware fpc 2
- ping command
- run ping 1.1.1.1 source 5.5.5.5 count 100 rapid size 1000
- run show system uptime
- root# run show arp
- root# show | display set
- set routing-options static route 10.0.0.1/32 next-hop 11.0.0.1
- commit check
- sinha@sinhaFirewaLL# run show configuration | match inter | display set
- set system services web-management http interface ge-0/0/0.0
- set system services web-management http interface ge-0/0/1.0
- set system syslog file interactive-commands interactive-commands error
- set interfaces ge-0/0/0 unit 0 family inet address 172.168.0.1/24
- set interfaces ge-0/0/1 unit 0 family inet address 103.16.73.253/29
- set interfaces lo0 unit 0 family inet address 127.0.0.1/32
- set security nat source rule-set internal-to-internet from zone trust
- set security nat source rule-set internal-to-internet to zone untrust
- set security nat source rule-set internal-to-internet rule internet-access match source-address 0.0.0.0/0
- set security nat source rule-set internal-to-internet rule internet-access match destination-address 0.0.0.0/0
- set security nat source rule-set internal-to-internet rule internet-access then source-nat interface
- set security zones security-zone trust interfaces ge-0/0/0.0 host-inbound-traffic system-services http
- set security zones security-zone trust interfaces ge-0/0/0.0 host-inbound-traffic system-services https
- set security zones security-zone trust interfaces ge-0/0/0.0 host-inbound-traffic system-services ssh
- set security zones security-zone trust interfaces ge-0/0/0.0 host-inbound-traffic system-services telnet
- set security zones security-zone trust interfaces ge-0/0/0.0 host-inbound-traffic system-services dhcp
- set security zones security-zone trust interfaces ge-0/0/0.0 host-inbound-traffic system-services all
- set security zones security-zone untrust interfaces ge-0/0/1.0 host-inbound-traffic system-services all
- sinha@sinhaFirewaLL# show | display set
- set version 9.5R1.8
- set system host-name sinhaFirewaLL
- set system root-authentication encrypted-password “$1$6Kgj7GB7$exUgGdgzemxBbosZ73ff9.”
- set system name-server 8.8.8.8
- set system name-server 8.8.4.4
- set system name-server 4.2.2.2
- set system login user sinha full-name sinha
- set system login user sinha uid 2004
- set system login user sinha class superuser
- set system login user sinha authentication encrypted-password “$1$Clf1Mo/A$sthTOPYb0GZAuUAkcNyW/1”
- set system services ssh
- set system services xnm-clear-text
- set system services web-management http interface ge-0/0/0.0
- set system services web-management http interface ge-0/0/1.0
- set system syslog user * any emergency
- set system syslog file messages any critical
- set system syslog file messages authorization info
- set system syslog file interactive-commands interactive-commands error
- set system max-configurations-on-flash 5
- set system max-configuration-rollbacks 5
- set system license autoupdate url https://ae1.juniper.net/junos/key_retrieval
- set interfaces ge-0/0/0 unit 0 family inet address 172.168.0.1/24
- set interfaces ge-0/0/1 unit 0 family inet address 103.16.73.253/29
- set interfaces lo0 unit 0 family inet address 127.0.0.1/32
- set routing-options static route 0.0.0.0/0 next-hop 103.16.73.249
- set security nat source rule-set internal-to-internet from zone trust
- set security nat source rule-set internal-to-internet to zone untrust
- set security nat source rule-set internal-to-internet rule internet-access match source-address 0.0.0.0/0
- set security nat source rule-set internal-to-internet rule internet-access match destination-address 0.0.0.0/0
- set security nat source rule-set internal-to-internet rule internet-access then source-nat interface
- set security screen ids-option untrust-screen icmp ping-death
- set security screen ids-option untrust-screen ip source-route-option
- set security screen ids-option untrust-screen ip tear-drop
- set security screen ids-option untrust-screen tcp syn-flood alarm-threshold 1024
- set security screen ids-option untrust-screen tcp syn-flood attack-threshold 200
- set security screen ids-option untrust-screen tcp syn-flood source-threshold 1024
- set security screen ids-option untrust-screen tcp syn-flood destination-threshold 2048
- set security screen ids-option untrust-screen tcp syn-flood queue-size 2000
- set security screen ids-option untrust-screen tcp syn-flood timeout 20
- set security screen ids-option untrust-screen tcp land
- set security zones security-zone trust tcp-rst
- set security zones security-zone trust host-inbound-traffic system-services all
- set security zones security-zone trust host-inbound-traffic protocols all
- set security zones security-zone trust interfaces ge-0/0/0.0 host-inbound-traffic system-services http
- set security zones security-zone trust interfaces ge-0/0/0.0 host-inbound-traffic system-services https
- set security zones security-zone trust interfaces ge-0/0/0.0 host-inbound-traffic system-services ssh
- set security zones security-zone trust interfaces ge-0/0/0.0 host-inbound-traffic system-services telnet
- set security zones security-zone trust interfaces ge-0/0/0.0 host-inbound-traffic system-services dhcp
- set security zones security-zone trust interfaces ge-0/0/0.0 host-inbound-traffic system-services all
- set security zones security-zone untrust screen untrust-screen
- set security zones security-zone untrust host-inbound-traffic protocols all
- set security zones security-zone untrust interfaces ge-0/0/1.0 host-inbound-traffic system-services all
- set security policies from-zone trust to-zone trust policy default-permit match source-address any
- set security policies from-zone trust to-zone trust policy default-permit match destination-address any
- set security policies from-zone trust to-zone trust policy default-permit match application any
- set security policies from-zone trust to-zone trust policy default-permit then permit
- set security policies from-zone trust to-zone untrust policy default-permit match source-address any
- set security policies from-zone trust to-zone untrust policy default-permit match destination-address any
- set security policies from-zone trust to-zone untrust policy default-permit match application any
- set security policies from-zone trust to-zone untrust policy default-permit then permit
- set security policies from-zone untrust to-zone trust policy default-deny match source-address any
- set security policies from-zone untrust to-zone trust policy default-deny match destination-address any
- set security policies from-zone untrust to-zone trust policy default-deny match application any
- set security policies from-zone untrust to-zone trust policy default-deny then deny
- set security policies default-policy deny-all
- set security alg dns disable
- set security alg ftp disable
- set security alg h323 disable
- set security alg mgcp disable
- set security alg msrpc disable
- set security alg sccp disable
- set security alg sql disable
- set security alg tftp disable
- set security alg pptp disable
- set security flow tcp-mss all-tcp mss 1300
- set security flow tcp-session no-syn-check
- set security flow tcp-session no-sequence-check
- set firewall family inet filter filter1 term redirect-to-proxy from destination-port 80
- set firewall family inet filter filter1 term redirect-to-proxy then routing-instance redirect
- set firewall family inet filter filter1 term default then accept
- set firewall family inet filter filter2 term 1 from source-port 80
- set firewall family inet filter filter2 term 1 then routing-instance redirect
- set firewall family inet filter filter2 term 2 then accept
- [edit]
- sinha@sinhaFirewaLL#
command.txt · Last modified: 2023/03/25 07:05 by sysadm