Flylib.com
List of Figures
Previous page
Table of content
Next page
Introduction
Figure I.1: JNTCP M-series Routers & T-series Routing Platforms certification track
Chapter 1: Initial Configuration and Platform Troubleshooting
Figure 1.1: The Out of Band (OoB) management network
Figure 1.2: SSH session settings for the root account
Figure 1.3: Accepting a new host key
Chapter 2: Interface Configuration and Testing
Figure 2.1: POS interface connecting r3 and r4
Figure 2.2: Multipoint Frame Relay connections
Figure 2.3: PPP topology
Figure 2.4: ATM interface topology
Figure 2.5: Multipoint ATM connections
Figure 2.6: Ethernet configuration topology
Figure 2.7: Aggregated Ethernet
Figure 2.8: Aggregated SONET
Figure 2.9: Leaky bucket rate limiting
Figure 2.10: Deactivated leaky buckets
Figure 2.11: Leaky buckets activated
Figure 2.12: Unnumbered interfaces
Figure 2.13: Interface case study topology
Chapter 3: OSPF Configuration and Testing
Figure 3.1: Multi-area OSPF
Figure 3.2: Multipoint OSPF network
Figure 3.3: NBMA OSPF topology
Figure 3.4: Incorrect OSPF network types
Figure 3.5: OSPF stub areas
Figure 3.6: OSPF virtual links
Figure 3.7: OSPF policy and redistribution
Figure 3.8: Single redistribution point.1
Figure 3.9: Two redistribution points
Figure 3.10: OSPF case study topology
Chapter 4: IS-IS Configuration and Testing
Figure 4.1: Multi-level IS-IS
Figure 4.2: Route leaking and summarization
Figure 4.3: IS-IS route redistribution
Figure 4.4: IS-IS case study topology
Chapter 5: IBGP Configuration and Testing
Figure 5.1: IBGP full mesh peering
Figure 5.2: Suggested route reflection topology
Figure 5.3: An alternative route reflection topology
Figure 5.4: Suggested confederation topology
Figure 5.5: An alternative confederation topology
Figure 5.6: Miscellaneous IBGP timers and knobs
Figure 5.7: OSPF case study topology
Figure 5.8: IBGP case study topology
Figure 5.9: Suggested IBGP design
Chapter 6: EBGP Configuration and Testing
Figure 6.1: IBGP case study topology
Figure 6.2: EBGP topology
Figure 6.3: Incorrect use of a next hop self policy
Figure 6.4: Multi-Level IS-IS topology from Chapter 4 case study
Figure 6.5: IBGP confederation topology from Chapter 5
Figure 6.6: EBGP case study topology
Previous page
Table of content
Next page
JNCIP: Juniper Networks Certified Internet Professional Study Guide
ISBN: 0782140734
EAN: 2147483647
Year: 2003
Pages: 132
Authors:
Harry Reynolds
BUY ON AMAZON
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying Project Scope Risk
Managing Project Constraints and Documenting Risks
Quantifying and Analyzing Activity Risks
Managing Activity Risks
Quantifying and Analyzing Project Risk
MySQL Cookbook
Canonizing Not-Quite-ISO Date Strings
Sorting Subsets of a Table
Validating and Transforming Data
Retrieving Sequence Values
Storing Images or Other Binary Data
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
The Challenges of Web Application Development
Creating a Struts-based MVC Application
Form Presentation and Validation with Struts
Managing Business Logic with Struts
Building the JavaEdge Application with Ant and Anthill
What is Lean Six Sigma
Key #4: Base Decisions on Data and Facts
Beyond the Basics: The Five Laws of Lean Six Sigma
When Companies Start Using Lean Six Sigma
Making Improvements That Last: An Illustrated Guide to DMAIC and the Lean Six Sigma Toolkit
Six Things Managers Must Do: How to Support Lean Six Sigma
Extending and Embedding PHP
Summary
Functional Functions
Handlers
Streams Overview
Appendix C. Extending and Embedding Cookbook
Special Edition Using FileMaker 8
Approaching Security
Multiwindow Interfaces
Other Custom Web Publishing Commands and Parameters
Deploying to Handheld Devices
Developing Naming Conventions
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies