| | Copyright |
| | Preface |
| | | Intended Audience |
| | | Organization of This Book |
| | | How to Use This Book |
|
| | Acknowledgments |
| | | Thomas M. Thomas II |
| | | Doris Pavlichek |
| | | Larry Dwyer |
| | | Rajah Chowbay |
| | | Wayne Downing |
| | | James Sonderegger |
|
| | Chapter 1. Juniper Networks from the Internet to the Classroom |
| | | Section 1.1. The Growth of the Internet |
| | | Section 1.2. Juniper Networks M-Series |
| | | Section 1.3. Juniper Networks Education Services |
| | | Section 1.4. Technical Certification Program |
| | | Section 1.5. Chapter Summary |
| | | Bibliography |
|
| | Chapter 2. Networking Primer |
| | | Section 2.1. Overview of the OSI Model |
| | | Section 2.2. Transmission Technologies |
| | | Section 2.3. Chapter Summary |
| | | Bibliography |
|
| | Chapter 3. Juniper Networks Router Architecture |
| | | Section 3.1. Juniper Networks Router Models |
| | | Section 3.2. Architecture Overview |
| | | Section 3.3. Management and Traffic Interfaces |
| | | Section 3.4. Cooling Systems |
| | | Section 3.5. Router Power-up and Boot Process |
| | | Section 3.6. JUNOS Software Upgrade Procedure |
| | | Section 3.7. JUNOScript |
| | | Section 3.8. Chapter Summary |
| | | Bibliography |
|
| | Chapter 4. The Command Line Interface |
| | | Section 4.1. Operational Mode |
| | | Section 4.2. Entering and Exiting Operational Mode |
| | | Section 4.3. Operational-Mode Commands |
| | | Section 4.4. set CLI Command |
| | | Section 4.5. Navigating in Operational Mode |
| | | Section 4.6. Interpreting CLI Messages |
| | | Section 4.7. Controlling CLI Output on the Screen |
| | | Section 4.8. Viewing the CLI Command History |
| | | Section 4.9. Monitoring Users |
| | | Section 4.10. Getting Help in the CLI |
| | | Section 4.11. Configuration Mode |
| | | Section 4.12. Entering and Exiting Configuration Mode |
| | | Section 4.13. Configuration-Mode Hierarchy |
| | | Section 4.14. Understanding the Configuration-Mode Banner |
| | | Section 4.15. Navigating in Configuration Mode |
| | | Section 4.16. Understanding How and Where the Configuration Files Are Stored |
| | | Section 4.17. Returning to a Previous Configuration |
| | | Section 4.18. Executing Operational-Mode Commands in Configuration Mode |
| | | Section 4.19. Displaying Your Configuration |
| | | Section 4.20. Saving, Modifying, and Loading Configuration Files |
| | | Section 4.21. Creating Configuration Groups |
| | | Section 4.22. Getting Help in Configuration Mode |
| | | Section 4.23. Chapter Summary |
| | | Bibliography |
| | | Case Study: User and Access Configuration |
|
| | Chapter 5. Router Access and System Administration |
| | | Section 5.1. Communicating with the Router |
| | | Section 5.2. System Administration |
| | | Section 5.3. Chapter Summary |
| | | Bibliography |
| | | Case Study: A Typical Base Configuration |
|
| | Chapter 6. Router Management, Firewall Filters, and Accounting |
| | | Section 6.1. SNMP Overview |
| | | Section 6.2. Configuring SNMP on a Juniper Networks Router |
| | | Section 6.3. Introduction to Firewall Filters |
| | | Section 6.4. Accounting |
| | | Section 6.5. Chapter Summary |
| | | References |
| | | Bibliography |
| | | Case Study: Securing a Juniper Networks Router |
|
| | Chapter 7. Interface Configuration |
| | | Section 7.1. Introduction to Interfaces |
| | | Section 7.2. Ethernet, Fast Ethernet, and GigE Interfaces |
| | | Section 7.3. SONET/SDH Interfaces |
| | | Section 7.4. ATM Interfaces |
| | | Section 7.5. Serial Interfaces |
| | | Section 7.6. Aggregated Interfaces |
| | | Section 7.7. Tunnel Interfaces |
| | | Section 7.8. Loopback |
| | | Section 7.9. Chapter Summary |
| | | Bibliography |
|
| | Chapter 8. IGP Routing Protocol Configuration |
| | | Section 8.1. Routing Protocol Primer |
| | | Section 8.2. RIP |
| | | Section 8.3. Checking RIP Operation |
| | | Section 8.4. OSPF |
| | | Section 8.5. IS-IS |
| | | Section 8.6. Chapter Summary |
| | | Bibliography |
|
| | Chapter 9. BGP Routing Configuration |
| | | Section 9.1. BGP Overview |
| | | Section 9.2. The Finite State Machine |
| | | Section 9.3. JUNOS BGP Minimum Configuration |
| | | Section 9.4. Configuration Parameters |
| | | Section 9.5. Scaling BGP |
| | | Section 9.6. Chapter Summary |
| | | Bibliography |
|
| | Chapter 10. BGP Routing Case Studies |
| | | Section 10.1. Case Study 1: Path Selection |
| | | Section 10.2. Case Study 2: Advanced Path Selection |
| | | Section 10.3. Case Study 3: Load Balancing ”Multipath and Multihop |
| | | Section 10.4. Case Study 4: Scaling BGP |
| | | Section 10.5. Chapter Summary |
|
| | Chapter 11. Defining and Implementing Routing Policies |
| | | Section 11.1. Routing Policy Overview |
| | | Section 11.2. RPSL |
| | | Section 11.3. Structure of JUNOS Routing Policy Language |
| | | Section 11.4. DIET Policies |
| | | Section 11.5. Route Redistribution and Filtering |
| | | Section 11.6. Route Flap Damping |
| | | Section 11.7. Regular Expressions and Communities |
| | | Section 11.8. Chapter Summary |
| | | Bibliography |
|
| | Chapter 12. MPLS and Traffic Engineering |
| | | Section 12.1. Traffic-Engineering Problems |
| | | Section 12.2. Traffic-Engineering Solutions |
| | | Section 12.3. MPLS Operation and Design Principles |
| | | Section 12.4. MPLS Configuration |
| | | Section 12.5. Static LSP Configuration |
| | | Section 12.6. RSVP-Based Dynamic-LSP Configuration |
| | | Section 12.7. LDP-Based Dynamic-LSP Configuration |
| | | Section 12.8. CCCs |
| | | Section 12.9. Chapter Summary |
| | | Bibliography |
| | | Case Study 1: Prefix Mapping and BGP |
| | | Case Study 2: Using Constraints in RSVP LSPs |
| | | Case Study 3: CCC Configuration |
|
| | Chapter 13. Virtual Private Networks |
| | | Section 13.1. Overview of VPNs |
| | | Section 13.2. VPN Implementation and Topologies |
| | | Section 13.3. VPN Physical Topologies |
| | | Section 13.4. Dedicated Extranet VPN |
| | | Section 13.5. Centralized Extranet VPN |
| | | Section 13.6. Layer 3 VPNs |
| | | Section 13.7. Route Distinguishers |
| | | Section 13.8. Forwarding Tables |
| | | Section 13.9. Configuring BGP MPLS VPNs |
| | | Section 13.10. Activating RSVP Signaling Options |
| | | Section 13.11. Activating LDP Signaling Options |
| | | Section 13.12. Configuring an IGP |
| | | Section 13.13. Configuring M-BGP on the PE Routers |
| | | Section 13.14. Configuring the VRF for the VPN |
| | | Section 13.15. PE-CE Configuration |
| | | Section 13.16. Chapter Summary |
| | | Bibliography |
| | | Case Study 1: Full-Mesh VPN Configuration |
| | | Case Study 2: Hub-and-Spoke VPN Configuration |
|
| | Chapter 14. Multicast Protocols |
| | | Section 14.1. Multicast Backbone |
| | | Section 14.2. Multicast Characteristics |
| | | Section 14.3. IGMP |
| | | Section 14.4. Multicast Routing |
| | | Section 14.5. Dense-Mode Multicast Routing Protocols |
| | | Section 14.6. Chapter Summary |
| | | Bibliography |
|
| | Chapter 15. Troubleshooting Juniper Networks Routers |
| | | Section 15.1. Introduction to Troubleshooting |
| | | Section 15.2. Juniper Networks Troubleshooting Model |
| | | Section 15.3. Trouble Indicators |
| | | Section 15.4. Troubleshooting the Chassis |
| | | Section 15.5. Monitoring Interfaces |
| | | Section 15.6. Troubleshooting Routing Protocols with the traceoptions Command |
| | | Section 15.7. Working with JTAC |
| | | Section 15.8. Chapter Summary |
| | | Bibliography |
|
| | Acronyms |
| | About the Authors |
| | Appendix A. Practice JNCIS Questions |