Network Configuration Example

Size: px
Start display at page:

Download "Network Configuration Example"

Transcription

1 Network Configuration Example Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks Release 11.2 Published:

2 Juniper Networks, Inc North Mathilda Avenue Sunnyvale, California USA This product includes the Envoy SNMP Engine, developed by Epilogue Technology, an Integrated Systems Company. Copyright , Epilogue Technology Corporation. All rights reserved. This program and its documentation were developed at private expense, and no part of them is in the public domain. This product includes memory allocation software developed by Mark Moraes, copyright 1988, 1989, 1993, University of Toronto. This product includes FreeBSD software developed by the University of California, Berkeley, and its contributors. All of the documentation and software included in the 4.4BSD and 4.4BSD-Lite Releases is copyrighted by the Regents of the University of California. Copyright 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, The Regents of the University of California. All rights reserved. GateD software copyright 1995, the Regents of the University. All rights reserved. Gate Daemon was originated and developed through release 3.0 by Cornell University and its collaborators. Gated is based on Kirton s EGP, UC Berkeley s routing daemon (routed), and DCN s HELLO routing protocol. Development of Gated has been supported in part by the National Science Foundation. Portions of the GateD software copyright 1988, Regents of the University of California. All rights reserved. Portions of the GateD software copyright 1991, D. L. S. Associates. This product includes software developed by Maker Communications, Inc., copyright 1996, 1997, Maker Communications, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785. Network Configuration Example Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks Release 11.2 All rights reserved. Revision History April 2011 R1 Junos OS 11.2 The information in this document is current as of the date listed in the revision history. YEAR 2000 NOTICE Juniper Networks hardware and software products are Year 2000 compliant. The Junos OS has no known time-related limitations through the year However, the NTP application is known to have some difficulty in the year ii

3 END USER LICENSE AGREEMENT READ THIS END USER LICENSE AGREEMENT ( AGREEMENT ) BEFORE DOWNLOADING, INSTALLING, OR USING THE SOFTWARE. BY DOWNLOADING, INSTALLING, OR USING THE SOFTWARE OR OTHERWISE EXPRESSING YOUR AGREEMENT TO THE TERMS CONTAINED HEREIN, YOU (AS CUSTOMER OR IF YOU ARE NOT THE CUSTOMER, AS A REPRESENTATIVE/AGENT AUTHORIZED TO BIND THE CUSTOMER) CONSENT TO BE BOUND BY THIS AGREEMENT. IF YOU DO NOT OR CANNOT AGREE TO THE TERMS CONTAINED HEREIN, THEN (A) DO NOT DOWNLOAD, INSTALL, OR USE THE SOFTWARE, AND (B) YOU MAY CONTACT JUNIPER NETWORKS REGARDING LICENSE TERMS. 1. The Parties. The parties to this Agreement are (i) Juniper Networks, Inc. (if the Customer s principal office is located in the Americas) or Juniper Networks (Cayman) Limited (if the Customer s principal office is located outside the Americas) (such applicable entity being referred to herein as Juniper ), and (ii) the person or organization that originally purchased from Juniper or an authorized Juniper reseller the applicable license(s) for use of the Software ( Customer ) (collectively, the Parties ). 2. The Software. In this Agreement, Software means the program modules and features of the Juniper or Juniper-supplied software, for which Customer has paid the applicable license or support fees to Juniper or an authorized Juniper reseller, or which was embedded by Juniper in equipment which Customer purchased from Juniper or an authorized Juniper reseller. Software also includes updates, upgrades and new releases of such software. Embedded Software means Software which Juniper has embedded in or loaded onto the Juniper equipment and any updates, upgrades, additions or replacements which are subsequently embedded in or loaded onto the equipment. 3. License Grant. Subject to payment of the applicable fees and the limitations and restrictions set forth herein, Juniper grants to Customer a non-exclusive and non-transferable license, without right to sublicense, to use the Software, in executable form only, subject to the following use restrictions: a. Customer shall use Embedded Software solely as embedded in, and for execution on, Juniper equipment originally purchased by Customer from Juniper or an authorized Juniper reseller. b. Customer shall use the Software on a single hardware chassis having a single processing unit, or as many chassis or processing units for which Customer has paid the applicable license fees; provided, however, with respect to the Steel-Belted Radius or Odyssey Access Client software only, Customer shall use such Software on a single computer containing a single physical random access memory space and containing any number of processors. Use of the Steel-Belted Radius or IMS AAA software on multiple computers or virtual machines (e.g., Solaris zones) requires multiple licenses, regardless of whether such computers or virtualizations are physically contained on a single chassis. c. Product purchase documents, paper or electronic user documentation, and/or the particular licenses purchased by Customer may specify limits to Customer s use of the Software. Such limits may restrict use to a maximum number of seats, registered endpoints, concurrent users, sessions, calls, connections, subscribers, clusters, nodes, realms, devices, links, ports or transactions, or require the purchase of separate licenses to use particular features, functionalities, services, applications, operations, or capabilities, or provide throughput, performance, configuration, bandwidth, interface, processing, temporal, or geographical limits. In addition, such limits may restrict the use of the Software to managing certain kinds of networks or require the Software to be used only in conjunction with other specific Software. Customer s use of the Software shall be subject to all such limitations and purchase of all applicable licenses. d. For any trial copy of the Software, Customer s right to use the Software expires 30 days after download, installation or use of the Software. Customer may operate the Software after the 30-day trial period only if Customer pays for a license to do so. Customer may not extend or create an additional trial period by re-installing the Software after the 30-day trial period. e. The Global Enterprise Edition of the Steel-Belted Radius software may be used by Customer only to manage access to Customer s enterprise network. Specifically, service provider customers are expressly prohibited from using the Global Enterprise Edition of the Steel-Belted Radius software to support any commercial network access services. The foregoing license is not transferable or assignable by Customer. No license is granted herein to any user who did not originally purchase the applicable license(s) for the Software from Juniper or an authorized Juniper reseller. 4. Use Prohibitions. Notwithstanding the foregoing, the license provided herein does not permit the Customer to, and Customer agrees not to and shall not: (a) modify, unbundle, reverse engineer, or create derivative works based on the Software; (b) make unauthorized copies of the Software (except as necessary for backup purposes); (c) rent, sell, transfer, or grant any rights in and to any copy of the Software, in any form, to any third party; (d) remove any proprietary notices, labels, or marks on or in any copy of the Software or any product in which the Software is embedded; (e) distribute any copy of the Software to any third party, including as may be embedded in Juniper equipment sold in the secondhand market; (f) use any locked or key-restricted feature, function, service, application, operation, or capability without first purchasing the applicable license(s) and obtaining a valid key from Juniper, even if such feature, function, service, application, operation, or capability is enabled without a key; (g) distribute any key for the Software provided by Juniper to any third party; (h) use the iii

4 Software in any manner that extends or is broader than the uses purchased by Customer from Juniper or an authorized Juniper reseller; (i) use Embedded Software on non-juniper equipment; (j) use Embedded Software (or make it available for use) on Juniper equipment that the Customer did not originally purchase from Juniper or an authorized Juniper reseller; (k) disclose the results of testing or benchmarking of the Software to any third party without the prior written consent of Juniper; or (l) use the Software in any manner other than as expressly provided herein. 5. Audit. Customer shall maintain accurate records as necessary to verify compliance with this Agreement. Upon request by Juniper, Customer shall furnish such records to Juniper and certify its compliance with this Agreement. 6. Confidentiality. The Parties agree that aspects of the Software and associated documentation are the confidential property of Juniper. As such, Customer shall exercise all reasonable commercial efforts to maintain the Software and associated documentation in confidence, which at a minimum includes restricting access to the Software to Customer employees and contractors having a need to use the Software for Customer s internal business purposes. 7. Ownership. Juniper and Juniper s licensors, respectively, retain ownership of all right, title, and interest (including copyright) in and to the Software, associated documentation, and all copies of the Software. Nothing in this Agreement constitutes a transfer or conveyance of any right, title, or interest in the Software or associated documentation, or a sale of the Software, associated documentation, or copies of the Software. 8. Warranty, Limitation of Liability, Disclaimer of Warranty. The warranty applicable to the Software shall be as set forth in the warranty statement that accompanies the Software (the Warranty Statement ). Nothing in this Agreement shall give rise to any obligation to support the Software. Support services may be purchased separately. Any such support shall be governed by a separate, written support services agreement. TO THE MAXIMUM EXTENT PERMITTED BY LAW, JUNIPER SHALL NOT BE LIABLE FOR ANY LOST PROFITS, LOSS OF DATA, OR COSTS OR PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR FOR ANY SPECIAL, INDIRECT, OR CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, THE SOFTWARE, OR ANY JUNIPER OR JUNIPER-SUPPLIED SOFTWARE. IN NO EVENT SHALL JUNIPER BE LIABLE FOR DAMAGES ARISING FROM UNAUTHORIZED OR IMPROPER USE OF ANY JUNIPER OR JUNIPER-SUPPLIED SOFTWARE. EXCEPT AS EXPRESSLY PROVIDED IN THE WARRANTY STATEMENT TO THE EXTENT PERMITTED BY LAW, JUNIPER DISCLAIMS ANY AND ALL WARRANTIES IN AND TO THE SOFTWARE (WHETHER EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE), INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT DOES JUNIPER WARRANT THAT THE SOFTWARE, OR ANY EQUIPMENT OR NETWORK RUNNING THE SOFTWARE, WILL OPERATE WITHOUT ERROR OR INTERRUPTION, OR WILL BE FREE OF VULNERABILITY TO INTRUSION OR ATTACK. In no event shall Juniper s or its suppliers or licensors liability to Customer, whether in contract, tort (including negligence), breach of warranty, or otherwise, exceed the price paid by Customer for the Software that gave rise to the claim, or if the Software is embedded in another Juniper product, the price paid by Customer for such other product. Customer acknowledges and agrees that Juniper has set its prices and entered into this Agreement in reliance upon the disclaimers of warranty and the limitations of liability set forth herein, that the same reflect an allocation of risk between the Parties (including the risk that a contract remedy may fail of its essential purpose and cause consequential loss), and that the same form an essential basis of the bargain between the Parties. 9. Termination. Any breach of this Agreement or failure by Customer to pay any applicable fees due shall result in automatic termination of the license granted herein. Upon such termination, Customer shall destroy or return to Juniper all copies of the Software and related documentation in Customer s possession or control. 10. Taxes. All license fees payable under this agreement are exclusive of tax. Customer shall be responsible for paying Taxes arising from the purchase of the license, or importation or use of the Software. If applicable, valid exemption documentation for each taxing jurisdiction shall be provided to Juniper prior to invoicing, and Customer shall promptly notify Juniper if their exemption is revoked or modified. All payments made by Customer shall be net of any applicable withholding tax. Customer will provide reasonable assistance to Juniper in connection with such withholding taxes by promptly: providing Juniper with valid tax receipts and other required documentation showing Customer s payment of any withholding taxes; completing appropriate applications that would reduce the amount of withholding tax to be paid; and notifying and assisting Juniper in any audit or tax proceeding related to transactions hereunder. Customer shall comply with all applicable tax laws and regulations, and Customer will promptly pay or reimburse Juniper for all costs and damages related to any liability incurred by Juniper as a result of Customer s non-compliance or delay with its responsibilities herein. Customer s obligations under this Section shall survive termination or expiration of this Agreement. 11. Export. Customer agrees to comply with all applicable export laws and restrictions and regulations of any United States and any applicable foreign agency or authority, and not to export or re-export the Software or any direct product thereof in violation of any such restrictions, laws or regulations, or without all necessary approvals. Customer shall be liable for any such violations. The version of the Software supplied to Customer may contain encryption or other capabilities restricting Customer s ability to export the Software without an export license. iv

5 12. Commercial Computer Software. The Software is commercial computer software and is provided with restricted rights. Use, duplication, or disclosure by the United States government is subject to restrictions set forth in this Agreement and as provided in DFARS through , FAR , FAR (b)(2), FAR , or FAR (ALT III) as applicable. 13. Interface Information. To the extent required by applicable law, and at Customer's written request, Juniper shall provide Customer with the interface information needed to achieve interoperability between the Software and another independently created program, on payment of applicable fee, if any. Customer shall observe strict obligations of confidentiality with respect to such information and shall use such information in compliance with any applicable terms and conditions upon which Juniper makes such information available. 14. Third Party Software. Any licensor of Juniper whose software is embedded in the Software and any supplier of Juniper whose products or technology are embedded in (or services are accessed by) the Software shall be a third party beneficiary with respect to this Agreement, and such licensor or vendor shall have the right to enforce this Agreement in its own name as if it were Juniper. In addition, certain third party software may be provided with the Software and is subject to the accompanying license(s), if any, of its respective owner(s). To the extent portions of the Software are distributed under and subject to open source licenses obligating Juniper to make the source code for such portions publicly available (such as the GNU General Public License ( GPL ) or the GNU Library General Public License ( LGPL )), Juniper will make such source code portions (including Juniper modifications, as appropriate) available upon request for a period of up to three years from the date of distribution. Such request can be made in writing to Juniper Networks, Inc., 1194 N. Mathilda Ave., Sunnyvale, CA 94089, ATTN: General Counsel. You may obtain a copy of the GPL at and a copy of the LGPL at Miscellaneous. This Agreement shall be governed by the laws of the State of California without reference to its conflicts of laws principles. The provisions of the U.N. Convention for the International Sale of Goods shall not apply to this Agreement. For any disputes arising under this Agreement, the Parties hereby consent to the personal and exclusive jurisdiction of, and venue in, the state and federal courts within Santa Clara County, California. This Agreement constitutes the entire and sole agreement between Juniper and the Customer with respect to the Software, and supersedes all prior and contemporaneous agreements relating to the Software, whether oral or written (including any inconsistent terms contained in a purchase order), except that the terms of a separate written agreement executed by an authorized Juniper representative and Customer shall govern to the extent such terms are inconsistent or conflict with terms contained herein. No modification to this Agreement nor any waiver of any rights hereunder shall be effective unless expressly assented to in writing by the party to be charged. If any portion of this Agreement is held invalid, the Parties agree that such invalidity shall not affect the validity of the remainder of this Agreement. This Agreement and associated documentation has been written in the English language, and the Parties agree that the English version will govern. (For Canada: Les parties aux présentés confirment leur volonté que cette convention de même que tous les documents y compris tout avis qui s'y rattaché, soient redigés en langue anglaise. (Translation: The parties confirm that this Agreement and all related documentation is and will be in the English language)). v

6 vi

7 Table of Contents Introduction Requirements of a Two-Tiered Virtualized Data Center for Large Enterprise Networks Network Traffic Segmentation Flexibility Security Access and Availability Cost-Effective Incremental Scaling Orchestration and Automation Two-Tiered Virtualized Data Center Solution for Large Enterprise Networks Network Traffic Segmentation Flexibility Security Access and Availability Cost-Effective Incremental Scaling Orchestration and Automation Example: Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks vii

8 Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks viii

9 Introduction This network configuration example provides a step-by-step procedure to configure a two-tiered virtualized data center using Juniper Networks MX Series 3D Universal Edge Routers, EX Series Ethernet Switches, and SRX Series Services Gateways. 1

10 Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks 2

11 Requirements of a Two-Tiered Virtualized Data Center for Large Enterprise Networks Large enterprises have certain specific needs for the hosting environment that the design of their data center must meet. This section describes the requirements of a company that operates as a service provider to its individual business units (BUs). One of the primary requirements of a virtualized data center (VDC) for a large enterprise is the ability to segment the network by business unit. This includes traffic segmentation and administrative control segmentation. Other requirements include security controls between business units, security controls between the company and the outside world, flexibility to grow and adapt the network, and a robust and cost-effective way to manage the entire network. Network Traffic Segmentation The requirement described here is for network resources to be isolated in several ways. Traffic must be segmented by business units. Traffic flows between network segments must be prohibited except where specifically allowed. Traffic isolation must be controlled at designated policy enforcement points. Network resources must be dedicated to a segment, but the network must have the flexibility to change the allocation of resources. Segmented resources must be logically grouped according to policies. For example, test traffic must be isolated from production traffic. Traffic must also be isolated according to business entities, contractual requirements, legal or regulatory requirements, risk rating, and corporate standards. The network segmentation design must not be disruptive to the business, must be integrated with the larger data center and cloud network design, must allow business units to access network resources globally, and must support new business capabilities. Flexibility The network design must be flexible enough to react to business and environment changes with minimal design and re-engineering efforts. The VDC design must be flexible in terms of isolating business unit workloads from other business units and general data center services and applications. The network solution must ensure that the business is minimally impacted when network and segmentation changes take place. The VDC must be flexible enough to be implemented: Within a single data center Within a data hall Across two or more data centers Across two or more data halls within or between data centers Between a data center and an external cloud service provider 3

12 Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks Security The network design must allow business units to be isolated within the hosting environment. In the event of a network security incident, business units must be isolated from the hosting environment and other business units. Traffic flow between business unit segments must be denied by default and must be explicitly permitted only at policy enforcement points owned and controlled by the data center service provider. The policy enforcement point must include access control capabilities and might include threat protection capabilities. Access and Availability The VDC must provide access to common data center services such as computation, storage, security, traffic management, operations, and applications. The network must operate across multiple global service providers and must deliver optimal, predictable, and consistent performance across the network. The VDC must be implemented across data center business units. The network solution must meet business unit availability requirements as defined in service-level agreements. Cost-Effective Incremental Scaling The VDC design must be cost effective for the business to run and must enable new business capabilities. It must be possible to implement the network solution in an incremental manner with minimal impact to the business. Orchestration and Automation The VDC design must include a management system that supports automation for provisioning, availability and workload monitoring, and reporting. Workload and availability reports must be available by business unit. Related Documentation Two-Tiered Virtualized Data Center Solution for Large Enterprise Networks on page 5 Example: Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks on page 7 4

13 Two-Tiered Virtualized Data Center Solution for Large Enterprise Networks The following describes a Juniper Networks two-tiered, high-speed, multiservice virtualized data center (VDC). A two-tiered architecture meets the low latency requirements of a virtualized server environment and supports the overlying security mandate to maintain controlled segmentation between various business units. Network Traffic Segmentation Juniper Networks VDC design uses virtualization technologies such as virtual LANs (VLANs), virtual routers, virtual route forwarders, inter-virtual route forwarding, and logical systems to provide flexible traffic isolation. A fully redundant two-tiered data center design consists of Juniper Networks EX Series Ethernet Switches at the access layer for server connectivity, MX Series 3D Universal Edge Routers as a collapsed LAN aggregation/core layer, and clustered SRX Series Services Gateways to provide firewall security services across the data center trust boundaries. Flexibility The Juniper Networks VDC design uses 802.1Q VLANs, MPLS, BGP, Virtual Router Redundancy Protocol (VRRP), Traffic Engineering, and Fast Reroute to provide design flexibility while maintaining a standards-based approach. The design can also support a virtual private LAN service (VPLS). Security The Juniper Networks VDC design uses security zones to implement the policy enforcement points. The SRX cluster is responsible for all stateful packet inspection for traffic that crosses business unit trust boundaries as well as all ingress and egress traffic for the data center. The Juniper Networks Junos operating system is configured with different administrator accounts for each logical system that supports confined access to network resources and can be customized for individual business units. Access and Availability In the Juniper Networks VDC design, described in Example: Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks on page 7, top-of-rack (TOR) EX Series switches provide access to the servers and provide redundancy. All uplinks from the TOR switches are 802.1Q trunk links that are terminated directly into each of the MX Series devices that make up the Point of Delivery (POD) at the aggregation/core layer. A VRRP instance is defined on each VLAN within the MX Series device to act as the default router for all server hosts in a given VLAN. To allow for VRRP to work properly, each bridge domain is extended between each MX Series device through an interconnection link. The MX Series device uses an integrated routing and bridging (IRB) interface as the Layer 3 interface for each bridge domain, with VRRP configured for redundancy. 5

14 Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks A pair of 802.3ad aggregated Ethernet bundles are used between the MX Series devices. Each MX Series device is divided into a number of Logical Systems. Logical systems in the MX Series device are used to define logical trust boundaries within the data center itself and between respective business units. A clustered pair of SRX Series devices acting as firewalls provide security services across the data center trust boundaries. Virtual routers on the SRX Series devices act as customer edge (CE) routers for each business unit. A single redundancy group for the data plane is defined on the SRX Series Services Gateways with two redundant Ethernet interfaces as member interfaces. This redundancy group handles the data plane failover of the SRX Series firewall and is configured such that any loss of either northbound or southbound SRX Series interfaces forces a full failover to the secondary node. This failover is essentially a Layer 1 failover, which means that it occurs quickly and does not disrupt the routing topology above it. Cost-Effective Incremental Scaling The Juniper Networks VDC design supports incremental scaling of the network. This allows the VDC to be created with minimum cost to meet the current need. The access layer can be expanded by adding EX Series switches at the top of rack. The aggregation/core layer can be expanded by adding additional MX Series devices within a given POD. The security services can be expanded by adding 4-port 10-Gigabit Ethernet I/O cards (IOCs) and services processing cards (SPCs) in the SRX Series devices. The addition of IOCs increases the 10-Gigabit Ethernet port density. The addition of each SPC card to the chassis adds another 10 Gbps (5 Gbps Internet mix (IMIX)), 2 million sessions, and 100,000 connections per second (CPS) up to a maximum rated capacity for the platform of 150 Gbps (47.5 Gbps IMIX), 10 million sessions, and 350,000 CPS (as measured in Junos OS Release 10.2). Orchestration and Automation The Juniper Networks VDC design uses the Juniper Networks Junos Space management platform. Junos Space includes a portfolio of applications for scaling services, simplifying network operations, and automating support for complex network environments. In addition, the network devices are configured to support background Secure Copy Protocol (SCP) file transfers, commit scripts, and a file archive site. Related Documentation Requirements of a Two-Tiered Virtualized Data Center for Large Enterprise Networks on page 3 Example: Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks on page 7 6

15 Example: Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks This example provides a step-by-step procedure for configuring a two-tiered virtualized data center for large enterprise networks. Requirements on page 7 Configuring a Two-Tiered Virtualized Data Center Overview on page 7 Configuring the Access Layer on page 10 Configuring the Aggregation Layer in the Trusted Logical Systems on page 14 Configuring the Core Layer in the Untrusted Logical Systems on page 22 Configuring the Security Device on page 27 Requirements This example uses the following hardware and software components: Two MX Series 3D Universal Edge Routers running Junos OS Release 10.2 or later Six EX Series Ethernet Switches running Junos OS Release 10.2 or later Two SRX Series Services Gateways running Junos OS Release 10.4 or later Configuring a Two-Tiered Virtualized Data Center Overview This example provides a step-by-step procedure for configuring a two-tiered virtualized data center for large enterprises. The steps in the example follow the data path from an interface connected to a server in BU2 using VLAN 17, to Logical System Trust1, through Virtual Router MX-VR2, through Virtual Router SRX-VR2, through VRF2 in the Logical System Untrust, and out to the core network. The core network in this example simultaneously supports IP-based routing and MPLS-based label switching. The virtual routers on the SRX Series device perform the functions of customer edge (CE) routers. The VPN routing and forwarding (VRF) routing instances on the MX Series devices perform the functions of service provider edge (PE) routers. The OSPF protocol serves as the interior gateway protocol to carry routes to the PE router loopback addresses that are used as the BGP next-hop address for the IP-based and MPLS-based networks supported by this example. NOTE: The steps in this example are representative of the entire network configuration. The example does not show every step for every virtual device. The physical connections used in this example are shown in Figure 1 on page 8. 7

16 Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks Figure 1: Virtualized Data Center Physical Topology Core xe-1/3/0 xe-2/3/0 xe-2/3/0 xe-1/3/0 reth2 xe-2/2/0 xe-0/3/0 xe-1/2/0 xe-2/2/0 reth2 xe-2/0/0 xe-15/0/0 SRX 0 MX 0 MX 1 SRX 1 xe-1/0/0 xe-14/0/0 reth1 reth1 xe-1/1/0 xe-0/1/0 xe-2/1/0 xe-1/1/0 xe-1/0/0 xe-1/0/0 xe-0/0/0 xe-2/0/0 xe-2/0/1 xe-15/0/1 fab0 fab1 xe-1/0/1 xe-14/0/1 xe-0/1/2 xe-0/1/0 xe-0/1/1 xe-0/1/0 EX EX EX EX EX EX Rack 1 Rack 2 Rack 3 g The logical connections used in this example are shown in Figure 2 on page 9. 8

17 Example: Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks Figure 2: Virtualized Data Center Logical Topology OSPF/eBGP VRRP ibgp Core Untrusted Security Zones SRX 0 Untrust 1 Untrust 2 Untrust 3 Untrust n MX 0 LS Untrust LS Untrust MX 1 SRX 1 (passive) Untrusted Security Zones Untrust 1 Untrust 2 Untrust 3 Untrust n VRF 1 VRF 2 VRF 3 VRF n VRF 1 VRF 2 VRF 3 VRF n SRX VR 1 SRX VR 2 SRX VR 3 SRX VR n LS Trust 1 LS LS Trust 2 Trust n LS Trust 1 LS LS Trust 2 Trust n SRX VR 1 SRX VR 2 SRX VR 3 SRX VR n Trust 1 Trust 2 Trust 3 Trust n Trusted Security Zones MX VR 2 MX VR 3 MX VR n MX VR 2 MX VR 3 MX VR n Trust 1 Trust 2 Trust 3 Trust n Trusted Security Zones VLANs 11, 12, 13 BU1 VLANs 16, 17, 18, 1002 BU2 VLANs 21, 22, 23, 1003 BU3 VLANs 26, 27, 28, 1004 BU4 Server Rack 1 VLANs 11, 12, 13 BU1 VLANs 16, 17, 18, 1002 BU2 VLANs 21, 22, 23, 1003 BU3 VLANs 26, 27, 28, 1004 BU4 Server Rack 2 VLANs 11, 12, 13 BU1 VLANs 16, 17, 18, 1002 BU2 VLANs 21, 22, 23, 1003 BU3 VLANs 26, 27, 28, 1004 BU4 Server Rack n g In the logical topology illustration: Users access the data center across the enterprise core network shown at the top. Virtual routers configured in Logical System Untrust on the MX Series devices forward the traffic to separate virtual routers configured in the Untrusted security zone on the SRX Series devices. These virtual routers act as edge routers for the various business units. Virtual routers configured on the active SRX Series device forward the traffic to the Trusted security zones. Virtual routers configured in separate logical systems on the MX Series devices forward the traffic to a bridge domain of VLANs configured on the EX Series devices. Business unit 1 requires additional separation. In this case, the virtual router (VR) configured on the SRX Series device forwards the traffic directly to the bridge domain on the EX Series devices. The EX Series devices switch the traffic to the data center server. 9

18 Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks The SRX Series devices apply security policy to all traffic traversing the untrust to trust boundary and all traffic forwarded between logical systems. The SRX Series devices are configured in an active/passive cluster so that only one node in the cluster is active on the data forwarding plane at a time. The SRX Series devices are configured with a single redundancy group for the data plane. The redundancy group uses two Ethernet interfaces (reth1 and reth2 in Figure 1 on page 8) as member interfaces. Configuring the Access Layer Configure the access layer by doing the following: Configuring Interfaces on page 10 Configuring VLANs in the Access Layer on page 11 Configuring a Redundant Trunk Group and Disabling the Spanning Tree Protocol for the Trunk Interfaces on page 12 Configuring Management Automation on page 13 Configuring Interfaces Step-by-Step Procedure This procedure explains how to configure the physical, logical, and network management interfaces for the access layer devices. This procedure shows a representative sample of the configuration. The example does not show the configuration for every interface. 1. Configure the access layer server-facing 10-Gigabit Ethernet interfaces. This example configures the ge-0/0/17 interface with VLAN ID 17. Include the member statement and specify VLAN ID 17 at the [edit interfaces ge-0/0/17 unit 0 family ethernet-switching vlan] hierarchy level. [edit interfaces ge-0/0/17 unit 0] user@ex# set family ethernet-switching vlan members 17 Repeat this step for every server-facing interface by using the appropriate interface name and VLAN number. 2. Configure the 10-Gigabit Ethernet trunk interfaces from the EX Series device to the two MX Series devices. This example configures the xe-0/1/2 and xe-0/1/0 interfaces. Include the port-mode statement and specify the trunk option at the [edit interfaces xe-0/1/2 unit 0 family ethernet-switching] and [edit interfaces xe-0/1/0 unit 0 family ethernet-switching] hierarchy levels. Include the members statement and specify the all option at the [edit interfaces xe-0/1/2 unit 0 family ethernet-switching vlan] and [edit interfaces xe-0/1/0 unit 0 family ethernet-switching] hierarchy levels. [edit interfaces xe-0/1/2 unit 0] user@ex# set family ethernet-switching port-mode trunk user@ex# set family ethernet-switching vlan members all [edit interfaces xe-0/1/0 unit 0] 10

19 Example: Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks user@ex# set family ethernet-switching port-mode trunk user@ex# set family ethernet-switching vlan members all Repeat this step for every 10-Gigabit Ethernet trunk interface by using the appropriate interface name. 3. Enable the IPv4 address family for the loopback logical interface. Include the family statement and specify the inet option to enable IPv4 at the [edit interfaces lo0 unit 0] hierarchy level. [edit interfaces lo0 unit 0] user@ex# set family inet Repeat this step for every EX Series device by using the appropriate address for that device. 4. Configure the EX Series device management Ethernet interface. This example configures the unit 0 logical interface. Include the family statement and specify the inet option at the [edit me0 unit 0] hierarchy level. Include the address statement and specify /24 as the IPv4 address at the [edit interfaces me0 unit 0 family inet] hierarchy level. [edit interfaces me0 unit 0] user@ex# set family inet address /24 Repeat this step for every EX Series device by using the appropriate management interface address for that device. Configuring VLANs in the Access Layer Step-by-Step Procedure This procedure explains how to configure the VLAN names and tag IDs and associate trunk interfaces with one of the access layer devices. This procedure shows a representative sample of the configuration. The example does not show the configuration for every VLAN. 1. Configure the VLAN name and tag ID (number) for each VLAN on the EX Series device. This example configures a VLAN with the name vlan17 and tag ID 17. Include the vlan-id statement and specify 17 as the VLAN tag ID at the [edit vlans vlan17] hierarchy level. [edit vlans vlan17] user@ex# set vlan-id 17 Repeat this step for every VLAN on each EX Series device by using the appropriate VLAN names and tag IDs. 2. Associate the logical trunk interfaces with each VLAN on the EX Series device. This example associates logical interfaces xe-0/1/0.0 and xe-0/1/2.0 with vlan17. Include the interface statement and specify xe-0/1/0.0 at the [edit vlans vlan17] hierarchy level. 11

20 Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks Include the interface statement and specify xe-0/1/2.0 at the [edit vlans vlan17] hierarchy level. [edit vlans vlan17] user@ex# set interface xe-0/1/0.0 user@ex# set interface xe-0/1/2.0 Repeat this step for every VLAN on each EX Series device by using the appropriate trunk interface names. Configuring a Redundant Trunk Group and Disabling the Spanning Tree Protocol for the Trunk Interfaces Step-by-Step Procedure This procedure explains how to configure a redundant trunk group and disable the Rapid Spanning Tree Protocol (RSTP) on the trunk interfaces. 1. Configure the trunk interfaces as a redundant trunk group. This example configures the xe-0/1/0.0 and xe-0/1/2.0 trunk interfaces in a redundant trunk group named rtgroup1. Include the interface statement at the [edit ethernet-switching-options redundant-trunk-group group rtgroup1] hierarchy level and specify each trunk interface name. Include the primary statement at the [edit ethernet-switching-options redundant-trunk-group group rtgroup1 xe-0/1/2.0] hierarchy level. [edit ethernet-switching-options redundant-trunk-group group rtgroup1] user@ex# set interface xe-0/1/0.0 user@ex# set interface xe-0/1/2.0 primary Repeat this step for every redundant trunk group by using the appropriate interface names. 2. Disable RSTP on the trunk interfaces. On an EX Series device, RSTP is enabled by default. RSTP cannot be enabled on the same interface as routing. This example disables RSTP on the xe-0/1/0.0 and xe-0/1/2.0 trunk interfaces. Include the disable statement at the [edit protocols rstp interface xe-0/1/0.0] and [edit protocols rstp interface xe-0/1/2.0] hierarchy levels. [edit protocols rstp] user@ex# set interface xe-0/1/0.0 disable user@ex# set interface xe-0/1/2.0 disable Repeat this step for every core-facing trunk interface by using the appropriate interface name. 12

21 Example: Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks Configuring Management Automation Step-by-Step Procedure This procedure explains how to configure static routes to the management network, a known host to support background Secure Copy Protocol (SCP) file transfers, a commit script, and an event archive site. 1. Configure static routes so the Ethernet management interface can reach the management network. Include the route statement, and specify /16 as the IPv4 subnet address of the management network at the [edit routing-options static] hierarchy level. Include the next-hop statement, and specify the IPv4 host address of the next-hop router at the [edit routing-options static route /16] hierarchy level. [edit routing-options static] user@ex# set route /16 next-hop Repeat this step for every Ethernet management interface on the EX Series devices. 2. Configure an SSH known host. Include the host statement, and specify the IPv4 address and RSA host key options for trusted servers at the [edit security ssh-known-hosts] hierarchy level. In this example, the RSA host key is truncated to make it easier to read. [edit security ssh-known-hosts] user@ex# set host rsa-key AAAAB3NzaC1yc2 Repeat this step for every EX Series device. 3. Configure outbound SSH to support Juniper Message Bundle (JMB) transfers to Juniper Support Systems (JSS). In this example, the client ID is configured as 00187D0B670D. Include the client statement, specify 00187D0B670D as the client ID, and specify as the IPv4 address at the [edit system services outbound-ssh] hierarchy level. Include the port statement and specify 7804 as the TCP port at the [edit system services outbound-ssh client 00187D0B670D ] hierarchy level. Include the device-id statement and specify FA022D as the device ID at the [edit system services outbound-ssh client 00187D0B670D] hierarchy level. Include the secret statement at the [edit system services outbound-ssh client 00187D0B670D ] hierarchy level. Include the services statement and specify netconf as the available service at the [edit system services outbound-ssh client 00187D0B670D ] hierarchy level. [edit system services outbound-ssh client 00187D0B670D] user@ex# set port 7804 user@ex# set device-id FA022D user@ex# set secret "$9$-9w4aik.QznDj9A0BEhrlKMxN" user@ex# set services netconf Repeat this step for every EX Series device. 13

22 Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks 4. Configure a commit script. In this example the script file name is jais-activate-scripts.slax. Include the allow-transients statement at the [edit system scripts commit] hierarchy level. Include the optional statement at the [edit system scripts commit file jais-activate-scripts.slax] hierarchy level. [edit system scripts commit] user@ex# set allow-transients user@ex# set file jais-activate-scripts.slax optional Repeat this step for every EX Series devices. 5. Configure an event archive site. In this example, the archive URL is the local /var/tmp/ directory, and the name given to the destination is juniper-aim. Include the archive-sites statement and specify the archive URL at the [edit event-options destinations juniper-aim] hierarchy level. [edit event-options destinations juniper-aim] user@ex# set archive-sites "scp://admin@ ://var/tmp" password Repeat this step for every EX Series device. Configuring the Aggregation Layer in the Trusted Logical Systems Configure the aggregation layer by doing the following: Configuring Interfaces in the Trusted Logical Systems on page 14 Configuring VLANs in the Aggregation Layer on page 17 Configuring the Virtual Router Routing Instance on page 18 Configuring Management Interfaces on page 19 Configuring Logical System Administrator Accounts on page 20 Configuring Management Automation on page 21 Configuring Interfaces in the Trusted Logical Systems Step-by-Step Procedure This procedure explains how to configure the physical, logical, and Layer 3 routing interfaces for the logical system in the trusted security zone of the aggregation layer. This procedure shows a representative sample of the configuration. The example does not show the configuration for every interface. 1. Enable flexible VLAN tagging on the physical interfaces. This example configures physical interface xe-1/0/0. Include the encapsulation statement and specify the flexible-ethernet-services option at the [edit interfaces xe-1/0/0] hierarchy level. Include the flexible-vlan-tagging statement at the [edit interfaces xe-1/0/0] hierarchy level. 14

23 Example: Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks [edit interfaces xe-1/0/0] user@mx# set encapsulation flexible-ethernet-services user@mx# set flexible-vlan-tagging Repeat this step for every physical interface connected to the EX series, SRX Series, and MX Series devices using the appropriate interface name. 2. Configure the 10-Gigabit Ethernet interfaces connected to the EX Series access layer device. This example configures logical interface 17on the xe-1/0/0 interface under the logical system named Trust1. Include the encapsulation statement and specify the vlan-bridge option at the [edit logical-systems Trust1 interfaces xe-1/0/0 unit 17] hierarchy level. Include the vlan-id statement and specify 17 as the VLAN ID at the [edit logical-systems Trust1 interfaces xe-1/0/0 unit 17] hierarchy level. [edit logical-systems Trust1 interfaces xe-1/0/0 unit 17] user@mx# set encapsulation vlan-bridge user@mx# set vlan-id 17 Repeat this step for every interface connected to the access layer devices by using the appropriate interface name, logical interface number, VLAN ID, and logical system name. 3. Configure the 10-Gigabit Ethernet interfaces connected to the other MX Series device shown in Figure 1 on page 8. This example configures logical interface 17 on the xe-0/1/0 interface. Include the encapsulation statement and specify the vlan-bridge option at the [edit logical-systems Trust1 interfaces xe-0/1/0 unit 17] hierarchy level. Include the vlan-id statement and specify 17 as the VLAN tag ID at the [edit logical-systems Trust1 interfaces xe-0/1/0 unit 17] hierarchy level. [edit logical-systems Trust1 interfaces xe-0/1/0 unit 17] user@mx# set encapsulation vlan-bridge user@mx# set vlan-id 17 Repeat this step for every interface connected to the other MX Series device shown in Figure 1 on page 8 by using the appropriate interface name, logical interface number, VLAN ID, and logical system name. 4. Configure the 10-Gigabit Ethernet interface connected to the SRX Series device. This example configures logical interface 15 on the xe-1/1/0 interface. Include the encapsulation statement and specify the vlan-bridge option at the [edit logical-systems Trust1 interfaces xe-1/1/0 unit 15] hierarchy level. Include the vlan-id statement and specify 15 as the VLAN tag ID at the [edit logical-systems Trust1 interfaces xe-1/1/0 unit 15] hierarchy level. [edit logical-systems Trust1 interfaces xe-1/1/0 unit 15] user@mx# set encapsulation vlan-bridge user@mx# set vlan-id 15 15

24 Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks Repeat this step for every interface connected to the SRX Series device by using the appropriate interface name, logical interface number, VLAN ID, and logical system name. 5. Configure the Layer 3 integrated routing and bridging (IRB) interface address. This example configures the unit 17 logical interface with /24 as the IPv4 address under the logical system named Trust1. Include the address statement and specify /24 as the IPv4 address at the [edit logical-systems Trust1 interfaces irb unit 17 family inet] hierarchy level. [edit logical-systems Trust1 interfaces irb unit 17 family inet] user@mx# set address /24 Repeat this step for every Layer 3 IBR by using the appropriate logical interface name and IPv4 address. 6. Configure the IRB interface to participate in Virtual Router Redundancy Protocol (VRRP). This example configures the unit 17 logical interface with 17 as the VRRP group name. Include the virtual-address statement and specify as the IPv4 address of the virtual router at the [edit logical-systems Trust1 interfaces irb unit 17 family inet address /24 vrrp-group 17] hierarchy level. Include the accept-data statement at the [edit logical-systems Trust1 interfaces irb unit 17 family inet address /24 vrrp-group 17] hierarchy level so the interface will accept packets destined for the virtual IP address. Include the priority statement and specify 200 as the router s priority at the [edit logical-systems Trust1 interfaces irb unit 17 family inet address /24 vrrp-group 17] hierarchy level. Include the fast-interval statement and specify 200 as the interval between VRRP advertisements at the [edit logical-systems Trust1 interfaces irb unit 17 family inet address /24 vrrp-group 17] hierarchy level. Include the preempt statement at the [edit logical-systems Trust1 interfaces irb unit 17 family inet address /24 vrrp-group 17] hierarchy level. [edit logical-systems Trust1 interfaces irb unit 17 family inet address /24 vrrp-group 17] user@mx# set virtual-address user@mx# set accept-data user@mx# set priority 200 user@mx# set fast-interval 200 user@mx# set preempt Repeat this step for every Layer 3 IBR interface by using the appropriate logical interface name, IPv4 address, VRRP group name, and priority. 16

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks Release NCE 33 Modified: 2016-08-01 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California

More information

vgw Series Installation and Administration Guide Release 5.0 r2 Published: Revision 2 Copyright 2012, Juniper Networks, Inc.

vgw Series Installation and Administration Guide Release 5.0 r2 Published: Revision 2 Copyright 2012, Juniper Networks, Inc. vgw Series Installation and Administration Guide Release 5.0 r2 Published: 2012-02-03 Revision 2 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Migration Guide. Release 9.2. JUNOS Software with Enhanced Services. for J-series Services Routers. Juniper Networks, Inc.

Migration Guide. Release 9.2. JUNOS Software with Enhanced Services. for J-series Services Routers. Juniper Networks, Inc. JUNOS Software with Enhanced Services Migration Guide for J-series Services Routers Release 9.2 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Part

More information

Implementing Interprovider Layer-3 VPN Option 3

Implementing Interprovider Layer-3 VPN Option 3 Network Configuration Example Implementing Interprovider Layer-3 VPN Option 3 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Published: 2009-12-17

More information

Unified Access Control

Unified Access Control Unified Access Control UAC Interoperability with the ScreenOS Enforcer Release Published: 2010-05-20 Part Number:, Revision 1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089

More information

Junos OS Multiple Instances for Label Distribution Protocol Feature Guide Release 11.4 Published: Copyright 2011, Juniper Networks, Inc.

Junos OS Multiple Instances for Label Distribution Protocol Feature Guide Release 11.4 Published: Copyright 2011, Juniper Networks, Inc. Junos OS Multiple Instances for Label Distribution Protocol Feature Guide Release 11.4 Published: 2011-11-08 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

End User License Agreement

End User License Agreement End User License Agreement Kyocera International, Inc. ( Kyocera ) End User License Agreement. CAREFULLY READ THE FOLLOWING TERMS AND CONDITIONS ( AGREEMENT ) BEFORE USING OR OTHERWISE ACCESSING THE SOFTWARE

More information

Junos OS. WLAN Configuration and Administration Guide for SRX210, SRX240, and SRX650 Services Gateways. Release Published:

Junos OS. WLAN Configuration and Administration Guide for SRX210, SRX240, and SRX650 Services Gateways. Release Published: Junos OS WLAN Configuration and Administration Guide for SRX210, SRX240, and SRX650 Services Gateways Release 11.2 Published: 2011-05-11 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California

More information

1. License Grant; Related Provisions.

1. License Grant; Related Provisions. IMPORTANT: READ THIS AGREEMENT CAREFULLY. THIS IS A LEGAL AGREEMENT BETWEEN AVG TECHNOLOGIES CY, Ltd. ( AVG TECHNOLOGIES ) AND YOU (ACTING AS AN INDIVIDUAL OR, IF APPLICABLE, ON BEHALF OF THE INDIVIDUAL

More information

Technical Configuration Example

Technical Configuration Example Technical Configuration Example Feature Automation Script cpu-usage-60.slax View a chart of the CPU usage for the last 60 minutes Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA

More information

Terms of Use. Changes. General Use.

Terms of Use. Changes. General Use. Terms of Use THESE TERMS AND CONDITIONS (THE TERMS ) ARE A LEGAL CONTRACT BETWEEN YOU AND SPIN TRANSFER TECHNOLOGIES ( SPIN TRANSFER TECHNOLOGIES, STT, WE OR US ). THE TERMS EXPLAIN HOW YOU ARE PERMITTED

More information

Junos OS. RSVP LSP Tunnels Feature Guide. Release Published: Copyright 2011, Juniper Networks, Inc.

Junos OS. RSVP LSP Tunnels Feature Guide. Release Published: Copyright 2011, Juniper Networks, Inc. Junos OS RSVP LSP Tunnels Feature Guide Release 11.4 Published: 2011-11-08 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product includes

More information

Mobile Banking and Mobile Deposit Terms & Conditions

Mobile Banking and Mobile Deposit Terms & Conditions Mobile Banking and Mobile Deposit Terms & Conditions PLEASE CAREFULLY REVIEW THESE TERMS AND CONDITIONS BEFORE PROCEEDING: This Mobile Banking and Mobile Deposit Addendum ( Addendum ) to the Old National

More information

Oracle Technology Network Developer License Terms for Java Card Classic Edition and Java Card Connected Edition Software Development Kits

Oracle Technology Network Developer License Terms for Java Card Classic Edition and Java Card Connected Edition Software Development Kits Oracle Technology Network Developer License Terms for Java Card Classic Edition and Java Card Connected Edition Software Development Kits Export Controls Export laws and regulations of the United States

More information

Oracle Binary Code License Agreement for Java Secure Sockets Extension for Connected Device Configuration 1.0.2

Oracle Binary Code License Agreement for Java Secure Sockets Extension for Connected Device Configuration 1.0.2 Oracle Binary Code License Agreement for Java Secure Sockets Extension 1.0.3 for Connected Device Configuration 1.0.2 ORACLE AMERICA, INC. ("ORACLE"), FOR AND ON BEHALF OF ITSELF AND ITS SUBSIDIARIES AND

More information

Junos Pulse Access Control Service

Junos Pulse Access Control Service Junos Pulse Access Control Service RADIUS Server Management Guide Release 4.4 Published: 2013-02-15 Part Number: Juniper Networks, Inc. 1194 rth Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Deploying Secure Multicast Market Data Services for Financial Services Environments Modified: 2016-07-29 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089

More information

Oracle Technology Network Developer License Terms for Java Card Classic Edition and Java Card Connected Edition Specifications

Oracle Technology Network Developer License Terms for Java Card Classic Edition and Java Card Connected Edition Specifications Oracle Technology Network Developer License Terms for Java Card Classic Edition and Java Card Connected Edition Specifications Export Controls Export laws and regulations of the United States and any other

More information

Installing Enterprise Switch Manager

Installing Enterprise Switch Manager Installing Enterprise Switch Manager NN47300-300 Document status: Standard Document version: 0401 Document date: 26 March 2008 All Rights Reserved The information in this document is subject to change

More information

Installing Enterprise Switch Manager

Installing Enterprise Switch Manager Installing Enterprise Switch Manager ATTENTION Clicking on a PDF hyperlink takes you to the appropriate page If necessary, scroll up or down the page to see the beginning of the referenced section NN47300-300

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring SRX Chassis Clusters for High Availability Modified: 2018-09-26 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Network-MIDI Driver Installation Guide

Network-MIDI Driver Installation Guide Network-MIDI Driver Installation Guide ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY PERMITTED TO USE

More information

Funding University Inc. Terms of Service

Funding University Inc. Terms of Service Funding University Inc. Terms of Service None of the information contained in Funding University's website constitutes a recommendation, solicitation or offer by Funding University or its affiliates to

More information

Complete Hardware Guide for EX 3200 and EX 4200 Switches

Complete Hardware Guide for EX 3200 and EX 4200 Switches Complete Hardware Guide for EX 3200 and EX 4200 Switches Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Part Number:, Revision R1 This product

More information

AhnLab Software License Agreement

AhnLab Software License Agreement AhnLab Software License Agreement IMPORTANT - READ CAREFULLY BEFORE USING THE SOFTWARE. This AhnLab Software License Agreement (this "Agreement") is a legal agreement by and between you and AhnLab, Inc.

More information

FLUENDO GENERIC EULA

FLUENDO GENERIC EULA FLUENDO GENERIC EULA FLUENDO S.A. Avenida Diagonal 579, 8th floor 08014 Barcelona Spain 1 END USER LICENSE AGREEMENT (EULA) FLUENDO LICENSE AGREEMENT BY FLUENDO, S.A. ( FLUENDO ) IMPORTANT - READ CAREFULLY

More information

Entrust SSL Web Server Certificate Subscription Agreement

Entrust SSL Web Server Certificate Subscription Agreement Entrust SSL Web Server Certificate Subscription Agreement ATTENTION - READ CAREFULLY: THIS SUBSCRIPTION AGREEMENT (THIS "AGREEMENT") IS A LEGAL CONTRACT BETWEEN THE PERSON, ENTITY, OR ORGANIZATION NAMED

More information

DME-N Network Driver Installation Guide for M7CL

DME-N Network Driver Installation Guide for M7CL DME-N Network Driver Installation Guide for M7CL ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY PERMITTED

More information

HIGHSOFT SOLUTIONS AS STANDARD LICENSE TERMS AND CONDITIONS 2.2

HIGHSOFT SOLUTIONS AS STANDARD LICENSE TERMS AND CONDITIONS 2.2 HIGHSOFT SOLUTIONS AS STANDARD LICENSE TERMS AND CONDITIONS 2.2 1. Definitions: Agreement shall mean the standard terms and conditions in this document; Confidential Information shall mean any and all

More information

LOGO LICENSE AGREEMENT(S) CERTIPORT AND IC³

LOGO LICENSE AGREEMENT(S) CERTIPORT AND IC³ LOGO LICENSE AGREEMENT(S) CERTIPORT AND IC³ EXHIBIT B-2 LICENSEE: Address: Attention: Phone: Fax: Email: Account #: CERTIPORT LOGO LICENSE AGREEMENT Authorized Testing Centers This Logo License Agreement

More information

HPE Education Services ESE (East and South Europe) Terms and Conditions

HPE Education Services ESE (East and South Europe) Terms and Conditions HPE Education Services ESE (East and South Europe) Terms and Conditions These terms and conditions govern the purchase of education services from Hewlett Packard Enterprise Company ( HPE ). 1. Definitions

More information

OCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA)

OCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA) OCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA) This is a License Agreement (the "Agreement") for certain code (the Software ) owned by Akamai Technologies, Inc. ( Akamai ) that is useful in connection

More information

The Travel Tree Terms and Conditions

The Travel Tree Terms and Conditions The Travel Tree Terms and Conditions Please read the following Terms & Conditions carefully before using this site. Use of this site indicates acceptance of these Terms and Conditions. The following terms

More information

Apple Inc. itunes 10 and QuickTime 7 Bundling Agreement (University CD Distribution) Licensee (Institution Name): Individual to Contact:

Apple Inc. itunes 10 and QuickTime 7 Bundling Agreement (University CD Distribution) Licensee (Institution Name): Individual to Contact: Apple Inc. itunes 10 and QuickTime 7 Bundling Agreement (University CD Distribution) Please complete, sign and mail this agreement to: APPLE INC. Software Licensing Department 12545 Riata Vista Circle

More information

Webfont License End User License Agreement (EULA)

Webfont License End User License Agreement (EULA) Hurme Design Webfont End User License Agreement 2018 Page 1 5 Webfont License End User License Agreement (EULA) Hurme Design 2018 This License Agreement ( Agreement or License ) is a legal contract between

More information

Mobile Banking Enrollment Terms & Conditions

Mobile Banking Enrollment Terms & Conditions END USER TERMS Mobile Banking Enrollment Terms & Conditions This service is provided to you by Bremer Bank and powered by a Third Party (the Licensor ) mobile technology solution. Section A of these End

More information

ABSOFT Corporation Software License Agreement. Specifically for IMSL FORTRAN 5.0 BUNDLED WITH FORTRAN COMPILERS FROM ABSOFT FOR WINDOWS OR OS X

ABSOFT Corporation Software License Agreement. Specifically for IMSL FORTRAN 5.0 BUNDLED WITH FORTRAN COMPILERS FROM ABSOFT FOR WINDOWS OR OS X ABSOFT Corporation Software License Agreement Specifically for IMSL FORTRAN 5.0 BUNDLED WITH FORTRAN COMPILERS FROM ABSOFT FOR WINDOWS OR OS X (March 2008) IMPORTANT - READ THIS ENTIRE LICENSE AGREEMENT

More information

End User License Agreement

End User License Agreement End User License Agreement This End User License Agreement ( EULA ) is a legal agreement between the end-user Customer of Gigamon hardware and software products ( Customer ) and Gigamon Inc. ( Gigamon

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring a Single SRX Series Device in a Branch Office Modified: 2017-01-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring BGP Autodiscovery for LDP VPLS Release NCE0035 Modified: 2017-01-24 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Updated December 12, Chapter 10 Service Description IBM Cloud for Government

Updated December 12, Chapter 10 Service Description IBM Cloud for Government Updated December 12, 2018 Chapter 10 Service Description IBM Cloud for Government IBM Cloud for Government This Service Description describes IBM s Cloud for Government available to Clients under the Federal

More information

If you do not wish to agree to these terms, please click DO NOT ACCEPT and obtain a refund of the purchase price as follows:

If you do not wish to agree to these terms, please click DO NOT ACCEPT and obtain a refund of the purchase price as follows: IMPORTANT: READ THIS AGREEMENT CAREFULLY. THIS IS A LEGAL AGREEMENT BETWEEN AVG TECHNOLOGIES CZ, s.r.o. ( AVG TECHNOLOGIES ) AND YOU (ACTING AS AN INDIVIDUAL OR, IF APPLICABLE, ON BEHALF OF THE INDIVIDUAL

More information

XO SITE SECURITY SERVICES

XO SITE SECURITY SERVICES XO SITE SECURITY SERVICES 1.0 Product and Services 1.1 Product Description. XO Site Security (the "Service") is a managed security service which uses Premises-based, multi-threat sensing Customer Premises

More information

Z.com Hosting Service Order

Z.com Hosting Service Order 1 Z.com Hosting Service Order This Z.com Hosting Service Order (hereinafter referred to as the Order ) is an integral part of the Master Service Agreement (hereinafter referred to as the Agreement or MSA

More information

Daniel MeterLink Software v1.40

Daniel MeterLink Software v1.40 Quick Start Manual P/N 3-9000-763, Rev K June 2017 Daniel MeterLink Software v1.40 for Daniel Gas and Liquid Ultrasonic Flow Meters Software License Agreement PLEASE READ THIS SOFTWARE LICENSE AGREEMENT

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Validated Reference - Business Edge Solution - Device R-10 Release 1.0 Published: 2014-03-31 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089

More information

SUPPORT SERVICES FOR DGX PRODUCTS TERMS AND CONDITIONS Release Date: August 17, 2017

SUPPORT SERVICES FOR DGX PRODUCTS TERMS AND CONDITIONS Release Date: August 17, 2017 SUPPORT SERVICES FOR DGX PRODUCTS TERMS AND CONDITIONS Release Date: August 17, 2017 WHAT SUPPORT SERVICES ARE INCLUDED NVIDIA Corporation or a designated subsidiary of NVIDIA Corporation with distribution

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Interconnecting a Layer 2 Circuit with a Layer 3 VPN Modified: 2017-01-19 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Ethernet CFM Over VPLS Modified: 2017-01-24 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights

More information

TERMS OF SERVICE AGREEMENT

TERMS OF SERVICE AGREEMENT TERMS OF SERVICE AGREEMENT LAST REVISION: [Date-Month-Year] PLEASE READ THIS TERMS OF SERVICE AGREEMENT CAREFULLY. BY USING THIS WEBSITE OR ORDERING PRODUCTS FROM THIS WEBSITE YOU AGREE TO BE BOUND BY

More information

Installing the Shrew Soft VPN Client

Installing the Shrew Soft VPN Client Windows Install Installing the Shrew Soft VPN Client ShrewVPNWindows201211-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email:

More information

RingMaster Software. Configuration Guide. Release 9.1. March 2014 (Release Date) Copyright 2014, Juniper Networks, Inc. 1

RingMaster Software. Configuration Guide. Release 9.1. March 2014 (Release Date) Copyright 2014, Juniper Networks, Inc. 1 RingMaster Software Configuration Guide Release 9.1 March 2014 (Release Date) Copyright 2014, Juniper Networks, Inc. 1 Juniper Network, Inc. 1194 N. Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000

More information

Online Localization Service

Online Localization Service DEVELOPER EXPRESS INC DEVEXPRESS Copyright (C) 2011-2017 Developer Express Inc. IMPORTANT- READ CAREFULLY: This DEVELOPER EXPRESS INC ("DEVEXPRESS") End-User License Agreement ("EULA") is a legal agreement

More information

Terms and Conditions - Dedicated Internet Access Service

Terms and Conditions - Dedicated Internet Access Service Terms and Conditions - Dedicated Internet Access Service 1. Description of Service: Dedicated Internet Access ( DIA ) Service ( Service ), which includes T1, DS-3, Ethernet, Fast Ethernet, Gigabit Ethernet

More information

Beta Testing Licence Agreement

Beta Testing Licence Agreement Beta Testing Licence Agreement This Beta Testing Licence Agreement is a legal agreement (hereinafter Agreement ) between BullGuard UK Limited ( BullGuard ) and you, either an individual or a single entity,

More information

CERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement

CERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement CERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement Welcome to Certified Mail Envelopes and Certified Mail Labels web sites (the Site ) a website, trademark and business name owned and operated

More information

1.4 Oracle Linux/Oracle VM Term(s) is defined as the duration for which You have acquired the applicable Oracle Linux/Oracle VM Service Offering(s).

1.4 Oracle Linux/Oracle VM Term(s) is defined as the duration for which You have acquired the applicable Oracle Linux/Oracle VM Service Offering(s). ORACLE LINUX AND ORACLE VM SERVICES AGREEMENT GENERAL TERMS This Oracle Linux and Oracle VM Services Agreement is between Oracle America, Inc. ( Oracle ) and the individual or entity identified below in

More information

Products: Software, content and digital materials distributed via the Vuzix App Store.

Products: Software, content and digital materials distributed via the Vuzix App Store. Vuzix Publisher Distribution Agreement By uploading or otherwise making available applications or any other materials via the Vuzix App Store, you (on behalf of yourself or the business you represent)

More information

BCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding)

BCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding) BCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding) CLAUSE 13 ON-LINE BIDDING 13.1 ON-LINE BIDDING.1 Definitions: Owner means the party and/or their agent designated to receive on-line

More information

INCLUDING MEDICAL ADVICE DISCLAIMER

INCLUDING MEDICAL ADVICE DISCLAIMER Jordan s Guardian Angels Terms and Conditions of Use INCLUDING MEDICAL ADVICE DISCLAIMER Your use of this website and its content constitutes your agreement to be bound by these terms and conditions of

More information

Oracle Binary Code License Agreement for the Java SE Platform Products and JavaFX

Oracle Binary Code License Agreement for the Java SE Platform Products and JavaFX Oracle Binary Code License Agreement for the Java SE Platform Products and JavaFX ORACLE AMERICA, INC. ("ORACLE"), FOR AND ON BEHALF OF ITSELF AND ITS SUBSIDIARIES AND AFFILIATES UNDER COMMON CONTROL,

More information

PLAINSCAPITAL BANK SAMSUNG PAY TERMS AND CONDITIONS - PERSONAL

PLAINSCAPITAL BANK SAMSUNG PAY TERMS AND CONDITIONS - PERSONAL PLAINSCAPITAL BANK SAMSUNG PAY TERMS AND CONDITIONS - PERSONAL Last Modified: 3/12/2018 These terms and conditions ( Terms and Conditions ) are a legal agreement between you and PlainsCapital Bank that

More information

This Access Agreement (the "Agreement") for the use of Math-Whizz Teachers Resource for Schools is between:-

This Access Agreement (the Agreement) for the use of Math-Whizz Teachers Resource for Schools is between:- Access Agreement for the use of Math-Whizz Teachers Resource for Schools IMPORTANT: Please read carefully these terms and conditions regarding your use of the Math-Whizz Teachers Resource for Schools service

More information

PORSCHE DESIGN SMARTPHONE FROM BLACKBERRY REPAIR SERVICE TERMS AND CONDITIONS

PORSCHE DESIGN SMARTPHONE FROM BLACKBERRY REPAIR SERVICE TERMS AND CONDITIONS PORSCHE DESIGN SMARTPHONE FROM BLACKBERRY REPAIR SERVICE TERMS AND CONDITIONS THESE PORSCHE DESIGN SMARTPHONE FROM BLACKBERRY REPAIR SERVICE TERMS AND CONDITIONS (THIS AGREEMENT ) FORM A LEGAL AGREEMENT

More information

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT

PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT Last Revised: 12/20/17 1. Private Mobile Connection - Custom APN. Pursuant to the terms and conditions of

More information

CALSTRS ONLINE AGREEMENT TERMS AND CONDITIONS

CALSTRS ONLINE AGREEMENT TERMS AND CONDITIONS CALSTRS ONLINE AGREEMENT TERMS AND CONDITIONS INTRODUCTION: Before the California State Teachers Retirement System (hereinafter "CalSTRS," "We," or "Us") will provide services found at mycalstrs.com (the

More information

VSC-PCTS2003 TEST SUITE TIME-LIMITED LICENSE AGREEMENT

VSC-PCTS2003 TEST SUITE TIME-LIMITED LICENSE AGREEMENT VSC-PCTS2003 TEST SUITE TIME-LIMITED LICENSE AGREEMENT Notes These notes are intended to help prospective licensees complete the attached Test Suite Time-Limited License Agreement. If you wish to execute

More information

ROYAL MAIL GROUP ADDRESS MANAGEMENT UNIT PAF DATA END USER TERMS ( End User Terms )

ROYAL MAIL GROUP ADDRESS MANAGEMENT UNIT PAF DATA END USER TERMS ( End User Terms ) ROYAL MAIL GROUP ADDRESS MANAGEMENT UNIT PAF DATA END USER TERMS ( End User Terms ) Introduction These End User Terms permit the use of PAF Data in Solutions by End Users. These terms are not applicable

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Virtual Router Use Case for Educational Networks Release NCE0039 Modified: 2017-01-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000

More information

Site Impact Policies for Website Use

Site Impact Policies for Website Use Site Impact Policies for Website Use Thank you for visiting the Site Impact website (the Website ). We have set up some ground rules to ensure protection of our rights and yours. Site Impact reserves the

More information

TechTarget Event Sponsorship Terms and Conditions

TechTarget Event Sponsorship Terms and Conditions TechTarget Event Sponsorship Terms and Conditions TechTarget, Inc. ( TechTarget ) and the company listed on the applicable Insertion Order(s) as the sponsor of the Event(s) ( Sponsor ) each agree that

More information

WOWZA MEDIA SERVER SOFTWARE END USER LICENSE AGREEMENT ( EULA ) VERSION 2.1.2

WOWZA MEDIA SERVER SOFTWARE END USER LICENSE AGREEMENT ( EULA ) VERSION 2.1.2 WOWZA MEDIA SERVER SOFTWARE END USER LICENSE AGREEMENT ( EULA ) VERSION 2.1.2 NOTICE: BY DOWNLOADING, INSTALLING, COPYING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO BE BOUND BY THE TERMS OF THIS EULA.

More information

You may use the Service to either access, establish or change the following:

You may use the Service to either access, establish or change the following: Online Access Agreement June 18, 2015 (Revision date) I. Introduction This Online Access Agreement (this "Agreement") contains the terms that govern your use of the Participants' Private Area of the www.afmsagaftrafund.org

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Active Flow Monitoring Version 9 Modified: 2017-01-18 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

NOOTRY TERMS OF SERVICE

NOOTRY TERMS OF SERVICE NOOTRY TERMS OF SERVICE Nootry LLC ( Nootry ), a Delaware limited liabilities company, provides access to and use of the services, including our website, APIs, email notifications, and application (the

More information

DEMO MANUAL DC2645A LTC MHz to 9GHz High Linearity I/Q Demodulator with Wideband IF Amplifier DESCRIPTION BOARD PHOTO

DEMO MANUAL DC2645A LTC MHz to 9GHz High Linearity I/Q Demodulator with Wideband IF Amplifier DESCRIPTION BOARD PHOTO DESCRIPTION Demonstration circuit 2645A showcases the LTC 5594 300MHz to 9GHz high linearity I/Q demodulator with wideband IF amplifiers. The USB serial controller, DC590B, is required to control and configure

More information

TERMS OF USE FOR NAT TRAVERSAL FUNCTION TRIAL VERSION

TERMS OF USE FOR NAT TRAVERSAL FUNCTION TRIAL VERSION TERMS OF USE FOR NAT TRAVERSAL FUNCTION TRIAL VERSION THESE TERMS OF USE INCLUDE IMPORTANT LEGAL INFORMATION REGARD- ING YOUR ACCESS AND USE OF THIS FUNCTION. PLEASE READ THEM CARE- FULLY BEFORE PROCEEDING.

More information

Junos OS Release 12.1X47 Feature Guide

Junos OS Release 12.1X47 Feature Guide Junos OS Release 12.1X47 Feature Guide Junos OS Release 12.1X47-D15 19 November 2014 Revision 1 This feature guide accompanies Junos OS Release 12.1X47-D15. This guide contains detailed information about

More information

Terms Of Use AGREEMENT BETWEEN USER AND DRAKE MODIFICATION OF THESE TERMS OF USE LINKS TO THIRD PARTY WEB SITES USE OF COOKIES

Terms Of Use AGREEMENT BETWEEN USER AND DRAKE MODIFICATION OF THESE TERMS OF USE LINKS TO THIRD PARTY WEB SITES USE OF COOKIES Terms Of Use AGREEMENT BETWEEN USER AND DRAKE This website and other related websites and mobile applications (collectively referred to as "Sites") comprise various web pages and services operated by Drake

More information

WEBSITE DESIGN CONTRACT RECITALS AGREEMENT

WEBSITE DESIGN CONTRACT RECITALS AGREEMENT WEBSITE DESIGN CONTRACT We are delighted that you have selected Wards Enterprise Web Design, Inc. for your website design needs! We look forward to working with you on this exciting project. In order to

More information

TERMS & CONDITIONS. Complied with GDPR rules and regulation CONDITIONS OF USE PROPRIETARY RIGHTS AND ACCEPTABLE USE OF CONTENT

TERMS & CONDITIONS. Complied with GDPR rules and regulation CONDITIONS OF USE PROPRIETARY RIGHTS AND ACCEPTABLE USE OF CONTENT TERMS & CONDITIONS www.karnevalkings.com (the "Site") is a website and online service owned and operated by the ViisTek Media group of companies (collectively known as "Karnevalkings.com", "we," "group",

More information

Evaluation Board User Guide UG-163

Evaluation Board User Guide UG-163 Evaluation Board User Guide UG-163 One Technology Way P.O. Box 9106 Norwood, MA 02062-9106, U.S.A. Tel: 781.329.4700 Fax: 781.461.3113 www.analog.com GSM900 Evaluation Board for PLL Frequency Synthesizer

More information

Quick Start Guide. BlackBerry Workspaces app for Android. Version 5.0

Quick Start Guide. BlackBerry Workspaces app for Android. Version 5.0 Quick Start Guide BlackBerry Workspaces app for Android Version 5.0 Published: 2017-01-22 SWD-20170122060917401 Contents Overview... 4 Browse workspaces, folders, and files... 5 Create new workspaces,

More information

CA File Master Plus. Release Notes. Version

CA File Master Plus. Release Notes. Version CA File Master Plus Release Notes Version 9.0.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for

More information

Hitachi ID Identity and Access Management Suite TRIAL USE LICENSE AGREEMENT. between

Hitachi ID Identity and Access Management Suite TRIAL USE LICENSE AGREEMENT. between between Hitachi ID Systems, Inc. (hereinafter referred to as "HIDS", "we" and/or "us") and LICENSEE (see below) (hereinafter referred to as "LICENSEE" and/or "you".) (Please complete ALL fields below by

More information

Entrust WAP Server Certificate Relying Party Agreement

Entrust WAP Server Certificate Relying Party Agreement Entrust WAP Server Certificate Relying Party Agreement The WAP/WTLS specification v1.1 does not provide a means for certificate revocation checking. The following Relying Party Agreement" provides further

More information

Building Information Modeling and Digital Data Exhibit

Building Information Modeling and Digital Data Exhibit Document E203 2013 Building Information Modeling and Digital Data Exhibit This Exhibit dated the day of in the year is incorporated into the agreement (the Agreement ) between the Parties for the following

More information

EMPLOYER CONTRIBUTION AGREEMENT

EMPLOYER CONTRIBUTION AGREEMENT EMPLOYER CONTRIBUTION AGREEMENT This Employer Contribution Agreement ( Agreement ) is entered into by and between, your successors and assigns ( You ) and Oracle America, Inc. ( Oracle ) as of the date

More information

Page 1 of Matthews Mint Hill Road, Suite C; Matthews, NC Phone Fax

Page 1 of Matthews Mint Hill Road, Suite C; Matthews, NC Phone Fax 1. PURPOSE The Loss Prevention Foundation, ( the foundation, LPF, the examiner ) makes high-stakes retail loss prevention certification Exams publicly available for the purpose of earning certification

More information

TERMS OF SERVICE. Maui Lash Extensions All Rights Reserved.

TERMS OF SERVICE. Maui Lash Extensions All Rights Reserved. TERMS OF SERVICE Electronic Communication: When you visit our website or send e-mails to us, you are communicating with us electronically. You consent to receive communications from us electronically.

More information

J-series Advanced Switching Configuration

J-series Advanced Switching Configuration Application Note J-series Advanced Switching Configuration Configuring JUNOS Software Advanced Switching on J-series Services Routers Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California

More information

TERMS OF USE Effective Date: January 1, 2015 To review material modifications and their effective dates scroll to the bottom of the page. 1.Parties.

TERMS OF USE Effective Date: January 1, 2015 To review material modifications and their effective dates scroll to the bottom of the page. 1.Parties. TERMS OF USE Effective Date: January 1, 2015 To review material modifications and their effective dates scroll to the bottom of the page. 1.Parties. The parties to these Terms of Use are you, and the owner

More information

IMPLEMENTING A LAYER 2 ENTERPRISE INFRASTRUCTURE WITH VIRTUAL CHASSIS TECHNOLOGY

IMPLEMENTING A LAYER 2 ENTERPRISE INFRASTRUCTURE WITH VIRTUAL CHASSIS TECHNOLOGY IMPLEMENTATION GUIDE IMPLEMENTING A LAYER 2 ENTERPRISE INFRASTRUCTURE WITH VIRTUAL CHASSIS TECHNOLOGY Although Juniper Networks has attempted to provide accurate information in this guide, Juniper Networks

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Private VLANs on a QFX Switch Using Extended Functionality Modified: 2016-08-01 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000

More information

Bar Code Discovery. Administrator's Guide

Bar Code Discovery. Administrator's Guide Bar Code Discovery Administrator's Guide November 2012 www.lexmark.com Contents 2 Contents Overview...3 Configuring the application...4 Configuring the application...4 Configuring Bar Code Discovery...4

More information

MyCreditChain Terms of Use

MyCreditChain Terms of Use MyCreditChain Terms of Use Date: February 1, 2018 Overview The following are the terms of an agreement between you and MYCREDITCHAIN. By accessing, or using this Web site, you acknowledge that you have

More information

NISUS WEBSOLUTIONS PVT.LTD. Ahmedabad

NISUS WEBSOLUTIONS PVT.LTD. Ahmedabad WEBSITE AND DOMAIN LEASE SERVICE AGREEMENT This Website and Domain Lease Service Agreement is between NISUS WEBSOLUTIONS PVT LTD, G-17 Swastik Super Market, Nr. Sales India, Ashram Road, Navrangpura, Ahmedabad-380009,

More information

Weebly API Terms of Use

Weebly API Terms of Use Weebly API Terms of Use Thank you for using Weebly s application programming interfaces (the "Weebly APIs"). By accessing and using the Weebly APIs, including using the Weebly APIs through a third-party

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring VPLS Multihoming Using Autodiscovery (FEC 129) Release NCE0072 Modified: 2016-10-26 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA

More information

MERIDIANSOUNDINGBOARD.COM TERMS AND CONDITIONS

MERIDIANSOUNDINGBOARD.COM TERMS AND CONDITIONS MERIDIANSOUNDINGBOARD.COM TERMS AND CONDITIONS Introduction This document sets forth the terms and conditions ("Terms and Conditions") governing your use of the MeridianHealth.com Web site ("Web Site")

More information