Flylib.com
Juniper Networks Reference Guide: JUNOS Routing, Configuration, and Architecture: JUNOS Routing, Configuration, and Architecture
Juniper Networks Reference Guide: JUNOS Routing, Configuration, and Architecture: JUNOS Routing, Configuration, and Architecture
ISBN: 0201775921
EAN: 2147483647
Year: 2002
Pages: 176
Authors:
Thomas M. Thomas
,
Doris Pavlichek
,
Lawrence H. Dwyer
,
Rajah Chowbay
,
Wayne W. Downing
,
James Sonderegger
BUY ON AMAZON
Main Page
Table of content
Copyright
Preface
Intended Audience
Organization of This Book
How to Use This Book
Acknowledgments
Thomas M. Thomas II
Doris Pavlichek
Larry Dwyer
Rajah Chowbay
Wayne Downing
James Sonderegger
Chapter 1. Juniper Networks from the Internet to the Classroom
1.1 The Growth of the Internet
1.2 Juniper Networks M-Series
1.3 Juniper Networks Education Services
1.4 Technical Certification Program
1.5 Chapter Summary
Bibliography
Chapter 2. Networking Primer
2.1 Overview of the OSI Model
2.2 Transmission Technologies
2.3 Chapter Summary
Bibliography
Chapter 3. Juniper Networks Router Architecture
3.1 Juniper Networks Router Models
3.2 Architecture Overview
3.3 Management and Traffic Interfaces
3.4 Cooling Systems
3.5 Router Power-up and Boot Process
3.6 JUNOS Software Upgrade Procedure
3.7 JUNOScript
3.8 Chapter Summary
Bibliography
Chapter 4. The Command Line Interface
4.1 Operational Mode
4.2 Entering and Exiting Operational Mode
4.3 Operational-Mode Commands
4.4 set CLI Command
4.5 Navigating in Operational Mode
4.6 Interpreting CLI Messages
4.7 Controlling CLI Output on the Screen
4.8 Viewing the CLI Command History
4.9 Monitoring Users
4.10 Getting Help in the CLI
4.11 Configuration Mode
4.12 Entering and Exiting Configuration Mode
4.13 Configuration-Mode Hierarchy
4.14 Understanding the Configuration-Mode Banner
4.15 Navigating in Configuration Mode
4.16 Understanding How and Where the Configuration Files Are Stored
4.17 Returning to a Previous Configuration
4.18 Executing Operational-Mode Commands in Configuration Mode
4.19 Displaying Your Configuration
4.20 Saving, Modifying, and Loading Configuration Files
4.21 Creating Configuration Groups
4.22 Getting Help in Configuration Mode
4.23 Chapter Summary
Bibliography
Case Study: User and Access Configuration
Chapter 5. Router Access and System Administration
5.1 Communicating with the Router
5.2 System Administration
5.3 Chapter Summary
Bibliography
Case Study: A Typical Base Configuration
Chapter 6. Router Management, Firewall Filters, and Accounting
6.1 SNMP Overview
6.2 Configuring SNMP on a Juniper Networks Router
6.3 Introduction to Firewall Filters
6.4 Accounting
6.5 Chapter Summary
References
Bibliography
Case Study: Securing a Juniper Networks Router
Chapter 7. Interface Configuration
7.1 Introduction to Interfaces
7.2 Ethernet, Fast Ethernet, and GigE Interfaces
7.3 SONETSDH Interfaces
7.4 ATM Interfaces
7.5 Serial Interfaces
7.6 Aggregated Interfaces
7.7 Tunnel Interfaces
7.8 Loopback
7.9 Chapter Summary
Bibliography
Chapter 8. IGP Routing Protocol Configuration
8.1 Routing Protocol Primer
8.2 RIP
8.3 Checking RIP Operation
8.4 OSPF
8.5 IS-IS
8.6 Chapter Summary
Bibliography
Chapter 9. BGP Routing Configuration
9.1 BGP Overview
9.2 The Finite State Machine
9.3 JUNOS BGP Minimum Configuration
9.4 Configuration Parameters
9.5 Scaling BGP
9.6 Chapter Summary
Bibliography
Chapter 10. BGP Routing Case Studies
10.1 Case Study 1: Path Selection
10.2 Case Study 2: Advanced Path Selection
10.3 Case Study 3: Load BalancingMultipath and Multihop
10.4 Case Study 4: Scaling BGP
10.5 Chapter Summary
Chapter 11. Defining and Implementing Routing Policies
11.1 Routing Policy Overview
11.2 RPSL
11.3 Structure of JUNOS Routing Policy Language
11.4 DIET Policies
11.5 Route Redistribution and Filtering
11.6 Route Flap Damping
11.7 Regular Expressions and Communities
11.8 Chapter Summary
Bibliography
Chapter 12. MPLS and Traffic Engineering
12.1 Traffic-Engineering Problems
12.2 Traffic-Engineering Solutions
12.3 MPLS Operation and Design Principles
12.4 MPLS Configuration
12.5 Static LSP Configuration
12.6 RSVP-Based Dynamic-LSP Configuration
12.7 LDP-Based Dynamic-LSP Configuration
12.8 CCCs
12.9 Chapter Summary
Bibliography
Case Study 1: Prefix Mapping and BGP
Case Study 2: Using Constraints in RSVP LSPs
Case Study 3: CCC Configuration
Chapter 13. Virtual Private Networks
13.1 Overview of VPNs
13.2 VPN Implementation and Topologies
13.3 VPN Physical Topologies
13.4 Dedicated Extranet VPN
13.5 Centralized Extranet VPN
13.6 Layer 3 VPNs
13.7 Route Distinguishers
13.8 Forwarding Tables
13.9 Configuring BGP MPLS VPNs
13.10 Activating RSVP Signaling Options
13.11 Activating LDP Signaling Options
13.12 Configuring an IGP
13.13 Configuring M-BGP on the PE Routers
13.14 Configuring the VRF for the VPN
13.15 PE-CE Configuration
13.16 Chapter Summary
Bibliography
Case Study 1: Full-Mesh VPN Configuration
Case Study 2: Hub-and-Spoke VPN Configuration
Chapter 14. Multicast Protocols
14.1 Multicast Backbone
14.2 Multicast Characteristics
14.3 IGMP
14.4 Multicast Routing
14.5 Dense-Mode Multicast Routing Protocols
14.6 Chapter Summary
Bibliography
Chapter 15. Troubleshooting Juniper Networks Routers
15.1 Introduction to Troubleshooting
15.2 Juniper Networks Troubleshooting Model
15.3 Trouble Indicators
15.4 Troubleshooting the Chassis
15.5 Monitoring Interfaces
15.6 Troubleshooting Routing Protocols with the traceoptions Command
15.7 Working with JTAC
15.8 Chapter Summary
Bibliography
Acronyms
About the Authors. (cisco certified internetwork expert)
Appendix A. Practice JNCIS Questions
Juniper Networks Reference Guide: JUNOS Routing, Configuration, and Architecture: JUNOS Routing, Configuration, and Architecture
ISBN: 0201775921
EAN: 2147483647
Year: 2002
Pages: 176
Authors:
Thomas M. Thomas
,
Doris Pavlichek
,
Lawrence H. Dwyer
,
Rajah Chowbay
,
Wayne W. Downing
,
James Sonderegger
BUY ON AMAZON
Java I/O
Numeric Data
Duplication
Channels
UTF-16
Service Records
Network Security Architectures
Network Security Axioms
Avoid Security Through Obscurity
Vulnerability Types
DoS Design Considerations
Identity Design Considerations
C & Data Structures (Charles River Media Computer Engineering)
The scanf Function
Storage of Variables
Recursion
Structures
Trees
Comparing, Designing, and Deploying VPNs
Supporting Multicast Transport in MPLS Layer 3 VPNs
IPsec: A Security Architecture for IP
Designing and Implementing L2TP Compulsory/NAS-Initiated Tunnel Mode Remote Access VPNs
Summary
Review Questions
Java All-In-One Desk Reference For Dummies
Adding Some Methods to Your Madness
Working with Strings
Choosing from a List
Using Java Server Pages
Database for $100, Please
Understanding Digital Signal Processing (2nd Edition)
Chapter Two. Periodic Sampling
BILINEAR TRANSFORM IIR FILTER DESIGN METHOD
Chapter Seven. Specialized Lowpass FIR Filters
POLYPHASE FILTERS
COHERENT AVERAGING
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies