•
Cannot access Global Configuration mode and cannot configure VRs to which they
have access.
•
Cannot see or use any commands associated with the file system, boot settings, or
system configuration.
The following table lists some, but not all, commands accessed from Exec mode that
are available only to users with no VR restriction:
show redundancy
reload
clear line
show secrets
reload slot
clock set
show subsystems
rename
copy
show timing
redundancy force-switchover
copy running-configuration
show users
redundancy revert
delete
show utilization
show boot
dir
srp switch
show config
disconnect ssh
synchronize
show exception dump
configure
–
show ip ssh
erase secrets
–
show line
halt
Denial of Service (DoS) Protection
A denial-of-service (DoS) attack is any attempt to deny valid users access to network
or server resources by using up all the resources of the network element or server. Denial
of service protection provides reactive prevention from attack and determines whether
the source of traffic is valid or invalid. DoS protection includes diagnostic tools and
configuration options. DoS protection groups provide a simple policy that can be applied
to interfaces, which can specify a set of parameters to tune behavior.
Figure 26 on page 436 shows an example of the state of a flow with DoS protection using
suspicious control flow detection (SCFD).
435
Copyright © 2010, Juniper Networks, Inc.
Chapter 7: Passwords and Security
Summary of Contents for JUNOSE 11.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 8: ...Copyright 2010 Juniper Networks Inc viii JunosE 11 3 x System Basics Configuration Guide...
Page 24: ...Copyright 2010 Juniper Networks Inc xxiv JunosE 11 3 x System Basics Configuration Guide...
Page 32: ...Copyright 2010 Juniper Networks Inc 2 JunosE 11 3 x System Basics Configuration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 116 JunosE 11 3 x System Basics Configuration Guide...
Page 166: ...Copyright 2010 Juniper Networks Inc 136 JunosE 11 3 x System Basics Configuration Guide...
Page 432: ...Copyright 2010 Juniper Networks Inc 402 JunosE 11 3 x System Basics Configuration Guide...
Page 488: ...Copyright 2010 Juniper Networks Inc 458 JunosE 11 3 x System Basics Configuration Guide...
Page 524: ...Copyright 2010 Juniper Networks Inc 494 JunosE 11 3 x System Basics Configuration Guide...
Page 554: ...Copyright 2010 Juniper Networks Inc 524 JunosE 11 3 x System Basics Configuration Guide...
Page 566: ...Copyright 2010 Juniper Networks Inc 536 JunosE 11 3 x System Basics Configuration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 558 JunosE 11 3 x System Basics Configuration Guide...
Page 613: ...PART 3 Index Index on page 585 583 Copyright 2010 Juniper Networks Inc...
Page 614: ...Copyright 2010 Juniper Networks Inc 584 JunosE 11 3 x System Basics Configuration Guide...
Page 632: ...Copyright 2010 Juniper Networks Inc 602 JunosE 11 3 x System Basics Configuration Guide...