Flylib.com
Juniper Networks Reference Guide: JUNOS Routing, Configuration, and Architecture: JUNOS Routing, Configuration, and Architecture
Juniper Networks Reference Guide: JUNOS Routing, Configuration, and Architecture: JUNOS Routing, Configuration, and Architecture
ISBN: 0201775921
EAN: 2147483647
Year: 2002
Pages: 176
Authors:
Thomas M. Thomas
,
Doris Pavlichek
,
Lawrence H. Dwyer
,
Rajah Chowbay
,
Wayne W. Downing
,
James Sonderegger
BUY ON AMAZON
Main Page
Table of content
Copyright
Preface
Intended Audience
Organization of This Book
How to Use This Book
Acknowledgments
Thomas M. Thomas II
Doris Pavlichek
Larry Dwyer
Rajah Chowbay
Wayne Downing
James Sonderegger
Chapter 1. Juniper Networks from the Internet to the Classroom
1.1 The Growth of the Internet
1.2 Juniper Networks M-Series
1.3 Juniper Networks Education Services
1.4 Technical Certification Program
1.5 Chapter Summary
Bibliography
Chapter 2. Networking Primer
2.1 Overview of the OSI Model
2.2 Transmission Technologies
2.3 Chapter Summary
Bibliography
Chapter 3. Juniper Networks Router Architecture
3.1 Juniper Networks Router Models
3.2 Architecture Overview
3.3 Management and Traffic Interfaces
3.4 Cooling Systems
3.5 Router Power-up and Boot Process
3.6 JUNOS Software Upgrade Procedure
3.7 JUNOScript
3.8 Chapter Summary
Bibliography
Chapter 4. The Command Line Interface
4.1 Operational Mode
4.2 Entering and Exiting Operational Mode
4.3 Operational-Mode Commands
4.4 set CLI Command
4.5 Navigating in Operational Mode
4.6 Interpreting CLI Messages
4.7 Controlling CLI Output on the Screen
4.8 Viewing the CLI Command History
4.9 Monitoring Users
4.10 Getting Help in the CLI
4.11 Configuration Mode
4.12 Entering and Exiting Configuration Mode
4.13 Configuration-Mode Hierarchy
4.14 Understanding the Configuration-Mode Banner
4.15 Navigating in Configuration Mode
4.16 Understanding How and Where the Configuration Files Are Stored
4.17 Returning to a Previous Configuration
4.18 Executing Operational-Mode Commands in Configuration Mode
4.19 Displaying Your Configuration
4.20 Saving, Modifying, and Loading Configuration Files
4.21 Creating Configuration Groups
4.22 Getting Help in Configuration Mode
4.23 Chapter Summary
Bibliography
Case Study: User and Access Configuration
Chapter 5. Router Access and System Administration
5.1 Communicating with the Router
5.2 System Administration
5.3 Chapter Summary
Bibliography
Case Study: A Typical Base Configuration
Chapter 6. Router Management, Firewall Filters, and Accounting
6.1 SNMP Overview
6.2 Configuring SNMP on a Juniper Networks Router
6.3 Introduction to Firewall Filters
6.4 Accounting
6.5 Chapter Summary
References
Bibliography
Case Study: Securing a Juniper Networks Router
Chapter 7. Interface Configuration
7.1 Introduction to Interfaces
7.2 Ethernet, Fast Ethernet, and GigE Interfaces
7.3 SONETSDH Interfaces
7.4 ATM Interfaces
7.5 Serial Interfaces
7.6 Aggregated Interfaces
7.7 Tunnel Interfaces
7.8 Loopback
7.9 Chapter Summary
Bibliography
Chapter 8. IGP Routing Protocol Configuration
8.1 Routing Protocol Primer
8.2 RIP
8.3 Checking RIP Operation
8.4 OSPF
8.5 IS-IS
8.6 Chapter Summary
Bibliography
Chapter 9. BGP Routing Configuration
9.1 BGP Overview
9.2 The Finite State Machine
9.3 JUNOS BGP Minimum Configuration
9.4 Configuration Parameters
9.5 Scaling BGP
9.6 Chapter Summary
Bibliography
Chapter 10. BGP Routing Case Studies
10.1 Case Study 1: Path Selection
10.2 Case Study 2: Advanced Path Selection
10.3 Case Study 3: Load BalancingMultipath and Multihop
10.4 Case Study 4: Scaling BGP
10.5 Chapter Summary
Chapter 11. Defining and Implementing Routing Policies
11.1 Routing Policy Overview
11.2 RPSL
11.3 Structure of JUNOS Routing Policy Language
11.4 DIET Policies
11.5 Route Redistribution and Filtering
11.6 Route Flap Damping
11.7 Regular Expressions and Communities
11.8 Chapter Summary
Bibliography
Chapter 12. MPLS and Traffic Engineering
12.1 Traffic-Engineering Problems
12.2 Traffic-Engineering Solutions
12.3 MPLS Operation and Design Principles
12.4 MPLS Configuration
12.5 Static LSP Configuration
12.6 RSVP-Based Dynamic-LSP Configuration
12.7 LDP-Based Dynamic-LSP Configuration
12.8 CCCs
12.9 Chapter Summary
Bibliography
Case Study 1: Prefix Mapping and BGP
Case Study 2: Using Constraints in RSVP LSPs
Case Study 3: CCC Configuration
Chapter 13. Virtual Private Networks
13.1 Overview of VPNs
13.2 VPN Implementation and Topologies
13.3 VPN Physical Topologies
13.4 Dedicated Extranet VPN
13.5 Centralized Extranet VPN
13.6 Layer 3 VPNs
13.7 Route Distinguishers
13.8 Forwarding Tables
13.9 Configuring BGP MPLS VPNs
13.10 Activating RSVP Signaling Options
13.11 Activating LDP Signaling Options
13.12 Configuring an IGP
13.13 Configuring M-BGP on the PE Routers
13.14 Configuring the VRF for the VPN
13.15 PE-CE Configuration
13.16 Chapter Summary
Bibliography
Case Study 1: Full-Mesh VPN Configuration
Case Study 2: Hub-and-Spoke VPN Configuration
Chapter 14. Multicast Protocols
14.1 Multicast Backbone
14.2 Multicast Characteristics
14.3 IGMP
14.4 Multicast Routing
14.5 Dense-Mode Multicast Routing Protocols
14.6 Chapter Summary
Bibliography
Chapter 15. Troubleshooting Juniper Networks Routers
15.1 Introduction to Troubleshooting
15.2 Juniper Networks Troubleshooting Model
15.3 Trouble Indicators
15.4 Troubleshooting the Chassis
15.5 Monitoring Interfaces
15.6 Troubleshooting Routing Protocols with the traceoptions Command
15.7 Working with JTAC
15.8 Chapter Summary
Bibliography
Acronyms
About the Authors. (cisco certified internetwork expert)
Appendix A. Practice JNCIS Questions
Juniper Networks Reference Guide: JUNOS Routing, Configuration, and Architecture: JUNOS Routing, Configuration, and Architecture
ISBN: 0201775921
EAN: 2147483647
Year: 2002
Pages: 176
Authors:
Thomas M. Thomas
,
Doris Pavlichek
,
Lawrence H. Dwyer
,
Rajah Chowbay
,
Wayne W. Downing
,
James Sonderegger
BUY ON AMAZON
A+ Fast Pass
Domain 2 Diagnosing and Troubleshooting
Domain 3 Preventive Maintenance
Domain 6 Basic Networking
Domain 1 Operating System Fundamentals
Domain 4 Networks
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 23. Find All Available Wireless Networks
Hack 34. grep Your Network
Hack 35. Check Wi-Fi Network Performance with Qcheck
Hack 40. Stop Moochers from Stealing Your Wi-Fi Bandwidth
Section A.5. 802.16: WiMAX Long Distance Wireless Infrastructure
Ruby Cookbook (Cookbooks (OReilly))
Running a Code Block Periodically
Computing Set Operations on Arrays
Writing to a Temporary File
Extracting Data While Parsing a Document
Thumbnailing Images
DNS & BIND Cookbook
Checking Whether a Domain Name Is Registered
Pointing a Domain Name to a Particular URL
Setting Up a Hidden Primary Master Name Server
Handling Windows Registration with a BIND Name Server
Signing Queries and Dynamic Updates with TSIG Programmatically
Java All-In-One Desk Reference For Dummies
Working with Statics
Using Abstract Classes and Interfaces
Network Programming
Handling Events
Drawing Shapes
GDI+ Programming with C#
GDI+ from a GDI Perspective
Working with Text and Strings
Advanced 2D Graphics
The Matrix Class and Transformation
Appendix A. Exception Handling in .NET
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies