Flylib.com
Juniper Networks Reference Guide: JUNOS Routing, Configuration, and Architecture: JUNOS Routing, Configuration, and Architecture
Juniper Networks Reference Guide: JUNOS Routing, Configuration, and Architecture: JUNOS Routing, Configuration, and Architecture
ISBN: 0201775921
EAN: 2147483647
Year: 2002
Pages: 176
Authors:
Thomas M. Thomas
,
Doris Pavlichek
,
Lawrence H. Dwyer
,
Rajah Chowbay
,
Wayne W. Downing
,
James Sonderegger
BUY ON AMAZON
Main Page
Table of content
Copyright
Preface
Intended Audience
Organization of This Book
How to Use This Book
Acknowledgments
Thomas M. Thomas II
Doris Pavlichek
Larry Dwyer
Rajah Chowbay
Wayne Downing
James Sonderegger
Chapter 1. Juniper Networks from the Internet to the Classroom
1.1 The Growth of the Internet
1.2 Juniper Networks M-Series
1.3 Juniper Networks Education Services
1.4 Technical Certification Program
1.5 Chapter Summary
Bibliography
Chapter 2. Networking Primer
2.1 Overview of the OSI Model
2.2 Transmission Technologies
2.3 Chapter Summary
Bibliography
Chapter 3. Juniper Networks Router Architecture
3.1 Juniper Networks Router Models
3.2 Architecture Overview
3.3 Management and Traffic Interfaces
3.4 Cooling Systems
3.5 Router Power-up and Boot Process
3.6 JUNOS Software Upgrade Procedure
3.7 JUNOScript
3.8 Chapter Summary
Bibliography
Chapter 4. The Command Line Interface
4.1 Operational Mode
4.2 Entering and Exiting Operational Mode
4.3 Operational-Mode Commands
4.4 set CLI Command
4.5 Navigating in Operational Mode
4.6 Interpreting CLI Messages
4.7 Controlling CLI Output on the Screen
4.8 Viewing the CLI Command History
4.9 Monitoring Users
4.10 Getting Help in the CLI
4.11 Configuration Mode
4.12 Entering and Exiting Configuration Mode
4.13 Configuration-Mode Hierarchy
4.14 Understanding the Configuration-Mode Banner
4.15 Navigating in Configuration Mode
4.16 Understanding How and Where the Configuration Files Are Stored
4.17 Returning to a Previous Configuration
4.18 Executing Operational-Mode Commands in Configuration Mode
4.19 Displaying Your Configuration
4.20 Saving, Modifying, and Loading Configuration Files
4.21 Creating Configuration Groups
4.22 Getting Help in Configuration Mode
4.23 Chapter Summary
Bibliography
Case Study: User and Access Configuration
Chapter 5. Router Access and System Administration
5.1 Communicating with the Router
5.2 System Administration
5.3 Chapter Summary
Bibliography
Case Study: A Typical Base Configuration
Chapter 6. Router Management, Firewall Filters, and Accounting
6.1 SNMP Overview
6.2 Configuring SNMP on a Juniper Networks Router
6.3 Introduction to Firewall Filters
6.4 Accounting
6.5 Chapter Summary
References
Bibliography
Case Study: Securing a Juniper Networks Router
Chapter 7. Interface Configuration
7.1 Introduction to Interfaces
7.2 Ethernet, Fast Ethernet, and GigE Interfaces
7.3 SONETSDH Interfaces
7.4 ATM Interfaces
7.5 Serial Interfaces
7.6 Aggregated Interfaces
7.7 Tunnel Interfaces
7.8 Loopback
7.9 Chapter Summary
Bibliography
Chapter 8. IGP Routing Protocol Configuration
8.1 Routing Protocol Primer
8.2 RIP
8.3 Checking RIP Operation
8.4 OSPF
8.5 IS-IS
8.6 Chapter Summary
Bibliography
Chapter 9. BGP Routing Configuration
9.1 BGP Overview
9.2 The Finite State Machine
9.3 JUNOS BGP Minimum Configuration
9.4 Configuration Parameters
9.5 Scaling BGP
9.6 Chapter Summary
Bibliography
Chapter 10. BGP Routing Case Studies
10.1 Case Study 1: Path Selection
10.2 Case Study 2: Advanced Path Selection
10.3 Case Study 3: Load BalancingMultipath and Multihop
10.4 Case Study 4: Scaling BGP
10.5 Chapter Summary
Chapter 11. Defining and Implementing Routing Policies
11.1 Routing Policy Overview
11.2 RPSL
11.3 Structure of JUNOS Routing Policy Language
11.4 DIET Policies
11.5 Route Redistribution and Filtering
11.6 Route Flap Damping
11.7 Regular Expressions and Communities
11.8 Chapter Summary
Bibliography
Chapter 12. MPLS and Traffic Engineering
12.1 Traffic-Engineering Problems
12.2 Traffic-Engineering Solutions
12.3 MPLS Operation and Design Principles
12.4 MPLS Configuration
12.5 Static LSP Configuration
12.6 RSVP-Based Dynamic-LSP Configuration
12.7 LDP-Based Dynamic-LSP Configuration
12.8 CCCs
12.9 Chapter Summary
Bibliography
Case Study 1: Prefix Mapping and BGP
Case Study 2: Using Constraints in RSVP LSPs
Case Study 3: CCC Configuration
Chapter 13. Virtual Private Networks
13.1 Overview of VPNs
13.2 VPN Implementation and Topologies
13.3 VPN Physical Topologies
13.4 Dedicated Extranet VPN
13.5 Centralized Extranet VPN
13.6 Layer 3 VPNs
13.7 Route Distinguishers
13.8 Forwarding Tables
13.9 Configuring BGP MPLS VPNs
13.10 Activating RSVP Signaling Options
13.11 Activating LDP Signaling Options
13.12 Configuring an IGP
13.13 Configuring M-BGP on the PE Routers
13.14 Configuring the VRF for the VPN
13.15 PE-CE Configuration
13.16 Chapter Summary
Bibliography
Case Study 1: Full-Mesh VPN Configuration
Case Study 2: Hub-and-Spoke VPN Configuration
Chapter 14. Multicast Protocols
14.1 Multicast Backbone
14.2 Multicast Characteristics
14.3 IGMP
14.4 Multicast Routing
14.5 Dense-Mode Multicast Routing Protocols
14.6 Chapter Summary
Bibliography
Chapter 15. Troubleshooting Juniper Networks Routers
15.1 Introduction to Troubleshooting
15.2 Juniper Networks Troubleshooting Model
15.3 Trouble Indicators
15.4 Troubleshooting the Chassis
15.5 Monitoring Interfaces
15.6 Troubleshooting Routing Protocols with the traceoptions Command
15.7 Working with JTAC
15.8 Chapter Summary
Bibliography
Acronyms
About the Authors. (cisco certified internetwork expert)
Appendix A. Practice JNCIS Questions
Juniper Networks Reference Guide: JUNOS Routing, Configuration, and Architecture: JUNOS Routing, Configuration, and Architecture
ISBN: 0201775921
EAN: 2147483647
Year: 2002
Pages: 176
Authors:
Thomas M. Thomas
,
Doris Pavlichek
,
Lawrence H. Dwyer
,
Rajah Chowbay
,
Wayne W. Downing
,
James Sonderegger
BUY ON AMAZON
MySQL Stored Procedure Programming
Conclusion
Error Handling
Using MySQL Stored Programs with Perl
About the Upcoming Examples
Recursion
CompTIA Project+ Study Guide: Exam PK0-003
IT Project+ Study Guide
Project Initiation
Scope Planning
Project Closure
Appendix A Systems Development Life Cycle
SQL Hacks
Hack 3. Perform Conditional INSERTs
Hack 28. Avoid Dividing by Zero
Hack 47. Exploit an SQL Injection Vulnerability
Hack 49. Keep Track of Infrequently Changing Values
Hack 60. Create a List of Personalized Parameters
101 Microsoft Visual Basic .NET Applications
Working with Microsoft Visual Studio .NET 2003 and Microsoft .NET Framework 1.1
Building Windows Forms User Interfaces
Working with Console Applications
COM Interop/PInvoke
Windows Server 2003 for .NET Developers
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
How case studies are used
The continuing evolution of SOA (standards organizations and contributing vendors)
Part IV: Building SOA (Planning and Analysis)
Considerations for choosing service layers
Service-Oriented Design (Part IV: Business Process Design)
GDI+ Programming with C#
The Coordinate System
Colors, Fonts, and Text
Working with Images
Image Attributes and the ImageAttributes Class
Miscellaneous Advanced 2D Topics
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies