Flylib.com
Juniper Networks Reference Guide: JUNOS Routing, Configuration, and Architecture: JUNOS Routing, Configuration, and Architecture
Juniper Networks Reference Guide: JUNOS Routing, Configuration, and Architecture: JUNOS Routing, Configuration, and Architecture
ISBN: 0201775921
EAN: 2147483647
Year: 2002
Pages: 176
Authors:
Thomas M. Thomas
,
Doris Pavlichek
,
Lawrence H. Dwyer
,
Rajah Chowbay
,
Wayne W. Downing
,
James Sonderegger
BUY ON AMAZON
Main Page
Table of content
Copyright
Preface
Intended Audience
Organization of This Book
How to Use This Book
Acknowledgments
Thomas M. Thomas II
Doris Pavlichek
Larry Dwyer
Rajah Chowbay
Wayne Downing
James Sonderegger
Chapter 1. Juniper Networks from the Internet to the Classroom
1.1 The Growth of the Internet
1.2 Juniper Networks M-Series
1.3 Juniper Networks Education Services
1.4 Technical Certification Program
1.5 Chapter Summary
Bibliography
Chapter 2. Networking Primer
2.1 Overview of the OSI Model
2.2 Transmission Technologies
2.3 Chapter Summary
Bibliography
Chapter 3. Juniper Networks Router Architecture
3.1 Juniper Networks Router Models
3.2 Architecture Overview
3.3 Management and Traffic Interfaces
3.4 Cooling Systems
3.5 Router Power-up and Boot Process
3.6 JUNOS Software Upgrade Procedure
3.7 JUNOScript
3.8 Chapter Summary
Bibliography
Chapter 4. The Command Line Interface
4.1 Operational Mode
4.2 Entering and Exiting Operational Mode
4.3 Operational-Mode Commands
4.4 set CLI Command
4.5 Navigating in Operational Mode
4.6 Interpreting CLI Messages
4.7 Controlling CLI Output on the Screen
4.8 Viewing the CLI Command History
4.9 Monitoring Users
4.10 Getting Help in the CLI
4.11 Configuration Mode
4.12 Entering and Exiting Configuration Mode
4.13 Configuration-Mode Hierarchy
4.14 Understanding the Configuration-Mode Banner
4.15 Navigating in Configuration Mode
4.16 Understanding How and Where the Configuration Files Are Stored
4.17 Returning to a Previous Configuration
4.18 Executing Operational-Mode Commands in Configuration Mode
4.19 Displaying Your Configuration
4.20 Saving, Modifying, and Loading Configuration Files
4.21 Creating Configuration Groups
4.22 Getting Help in Configuration Mode
4.23 Chapter Summary
Bibliography
Case Study: User and Access Configuration
Chapter 5. Router Access and System Administration
5.1 Communicating with the Router
5.2 System Administration
5.3 Chapter Summary
Bibliography
Case Study: A Typical Base Configuration
Chapter 6. Router Management, Firewall Filters, and Accounting
6.1 SNMP Overview
6.2 Configuring SNMP on a Juniper Networks Router
6.3 Introduction to Firewall Filters
6.4 Accounting
6.5 Chapter Summary
References
Bibliography
Case Study: Securing a Juniper Networks Router
Chapter 7. Interface Configuration
7.1 Introduction to Interfaces
7.2 Ethernet, Fast Ethernet, and GigE Interfaces
7.3 SONETSDH Interfaces
7.4 ATM Interfaces
7.5 Serial Interfaces
7.6 Aggregated Interfaces
7.7 Tunnel Interfaces
7.8 Loopback
7.9 Chapter Summary
Bibliography
Chapter 8. IGP Routing Protocol Configuration
8.1 Routing Protocol Primer
8.2 RIP
8.3 Checking RIP Operation
8.4 OSPF
8.5 IS-IS
8.6 Chapter Summary
Bibliography
Chapter 9. BGP Routing Configuration
9.1 BGP Overview
9.2 The Finite State Machine
9.3 JUNOS BGP Minimum Configuration
9.4 Configuration Parameters
9.5 Scaling BGP
9.6 Chapter Summary
Bibliography
Chapter 10. BGP Routing Case Studies
10.1 Case Study 1: Path Selection
10.2 Case Study 2: Advanced Path Selection
10.3 Case Study 3: Load BalancingMultipath and Multihop
10.4 Case Study 4: Scaling BGP
10.5 Chapter Summary
Chapter 11. Defining and Implementing Routing Policies
11.1 Routing Policy Overview
11.2 RPSL
11.3 Structure of JUNOS Routing Policy Language
11.4 DIET Policies
11.5 Route Redistribution and Filtering
11.6 Route Flap Damping
11.7 Regular Expressions and Communities
11.8 Chapter Summary
Bibliography
Chapter 12. MPLS and Traffic Engineering
12.1 Traffic-Engineering Problems
12.2 Traffic-Engineering Solutions
12.3 MPLS Operation and Design Principles
12.4 MPLS Configuration
12.5 Static LSP Configuration
12.6 RSVP-Based Dynamic-LSP Configuration
12.7 LDP-Based Dynamic-LSP Configuration
12.8 CCCs
12.9 Chapter Summary
Bibliography
Case Study 1: Prefix Mapping and BGP
Case Study 2: Using Constraints in RSVP LSPs
Case Study 3: CCC Configuration
Chapter 13. Virtual Private Networks
13.1 Overview of VPNs
13.2 VPN Implementation and Topologies
13.3 VPN Physical Topologies
13.4 Dedicated Extranet VPN
13.5 Centralized Extranet VPN
13.6 Layer 3 VPNs
13.7 Route Distinguishers
13.8 Forwarding Tables
13.9 Configuring BGP MPLS VPNs
13.10 Activating RSVP Signaling Options
13.11 Activating LDP Signaling Options
13.12 Configuring an IGP
13.13 Configuring M-BGP on the PE Routers
13.14 Configuring the VRF for the VPN
13.15 PE-CE Configuration
13.16 Chapter Summary
Bibliography
Case Study 1: Full-Mesh VPN Configuration
Case Study 2: Hub-and-Spoke VPN Configuration
Chapter 14. Multicast Protocols
14.1 Multicast Backbone
14.2 Multicast Characteristics
14.3 IGMP
14.4 Multicast Routing
14.5 Dense-Mode Multicast Routing Protocols
14.6 Chapter Summary
Bibliography
Chapter 15. Troubleshooting Juniper Networks Routers
15.1 Introduction to Troubleshooting
15.2 Juniper Networks Troubleshooting Model
15.3 Trouble Indicators
15.4 Troubleshooting the Chassis
15.5 Monitoring Interfaces
15.6 Troubleshooting Routing Protocols with the traceoptions Command
15.7 Working with JTAC
15.8 Chapter Summary
Bibliography
Acronyms
About the Authors. (cisco certified internetwork expert)
Appendix A. Practice JNCIS Questions
Juniper Networks Reference Guide: JUNOS Routing, Configuration, and Architecture: JUNOS Routing, Configuration, and Architecture
ISBN: 0201775921
EAN: 2147483647
Year: 2002
Pages: 176
Authors:
Thomas M. Thomas
,
Doris Pavlichek
,
Lawrence H. Dwyer
,
Rajah Chowbay
,
Wayne W. Downing
,
James Sonderegger
BUY ON AMAZON
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Conclusion
Appendix B Kanban Supermarkets
Appendix F Implementation in Large Plants
Appendix I Case Study 2: Rubber Extrusion Plant
Appendix J Abbreviations and Acronyms
Postfix: The Definitive Guide
Message Store Formats
Mailing-List Managers
SASL Overview
TLS Certificates
C.7. Wrapping Things Up
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
Crash Course in the Internet Protocol Suite
Unauthorized Activity I
IDS and IPS Architecture
Internet Security Systems RealSecure
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 20. Track Official Storm Reporting
Hacks 5161: Introduction
Hack 52. Put a Map and HTML into Your Info Windows
Hack 53. Add Flash Applets to Your Google Maps
Hack 59. Show Lots of StuffQuickly
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 17. Choose a Cellular Data Plan
Hack 50. Interrogate the Network
Hack 64. Bridge Your Linux AP
Hack 93. Build Cheap, Effective Roof Mounts
Section A.1. 802.11: The Mother of All IEEE Wireless Ethernet
VBScript in a Nutshell, 2nd Edition
Differences Between VBScript and VBA
Global Code
Variables and Constants
Program Flow
Section B.4. Date Format Constants
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies