Juniper Networks Field Guide and Reference

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 97%)
Other sellers (Paperback)
  • All (11) from $1.99   
  • New (7) from $34.95   
  • Used (4) from $1.99   

Overview

Juniper Networks® creates and deploys high-performance routing platforms used by many of the world's largest service providers. Written by the leading experts and technical writers at Juniper Networks, the Juniper Networks® Field Guide and Reference is the definitive practical guide and reference to Juniper Networks hardware and software. This comprehensive book culls and condenses nearly six thousand pages of technical documentation, field alerts, technical FAQs, and more into a single convenient and accessible resource. It provides essential information for anyone designing, building, installing, configuring, and operating scalable IP networks.

You will find in-depth information about JUNOS™ software, Juniper Networks routers, system management, interfaces, security, and VPNs. All the latest Juniper Networks technologies and releases are covered, including JUNOS 5.4, the T640 routing node and the T320 router, and all M-series routers. Other topics covered include:

  • Router architecture and hardware components, including the T-series routing platforms and M-series routers
  • CLI configuration and system management with SNMP
  • Router interfaces, including Ethernet, SONET/SDH, tunnel, and channelized interfaces
  • Class of service (CoS)
  • IP Security (IPSec)
  • Routing policy and firewall filters
  • Routing protocols, including IS-IS, OSPF, RIP, BGP, PIM, DVMRP, IGMP, SAP, SDP, MSDP, and multicast scoping
  • IPv6, including IPv4-to-IPv6 transition mechanisms
  • Various MPLS applications
  • Virtual Private Networks, covering Layer 2 and Layer 3 VPNs

In addition, this pragmatic guide features sample configurations that come directly from the Juniper Networks testing labs, as well as a summary of all the critical JUNOS software monitoring commands.

Whether you work with Juniper Networks products as a network engineer, administrator, or operator—or if you are just interested in learning how to build scalable multivendor IP networks—you will want to keep this thorough resource close at hand.

0321122445B09032002

Read More Show Less

Product Details

  • ISBN-13: 9780321122445
  • Publisher: Addison-Wesley
  • Publication date: 10/28/2002
  • Edition description: New Edition
  • Pages: 912
  • Product dimensions: 7.40 (w) x 9.00 (h) x 1.90 (d)

Meet the Author

Aviva Garrett is the Director of Technical Publications at Juniper Networks. With coauthors Cris Morris and Gary Drenan, Aviva edited the work of the dozens of Juniper Networks writers, editors, and engineers who contributed to the Juniper Networks® Field Guide and Reference, the authorized Juniper Networks field manual.

Gary Drenan is Senior Technical Writer at Juniper Networks. With coauthors Aviva Garrett and Cris Morris, Gary edited the work of the dozens of Juniper Networks writers, editors, and engineers who contributed to the Juniper Networks® Field Guide and Reference, the authorized Juniper Networks field manual.

Cris Morris is Senior Editing Manager at Juniper Networks. With coauthors Aviva Garrett and Gary Drenan, Cris edited the work of the dozens of Juniper Networks writers, editors, and engineers who contributed to the Juniper Networks® Field Guide and Reference, the authorized Juniper Networks field manual.

0321122445AB09032002

Read More Show Less

Read an Excerpt

When I wrote the first Juniper Networks software manual in the early summer of 1997, it was about 250 pages. When we shipped JUNOS Release 3.2 in March 1999, the JUNOS manual was just shy of 1,000 pages. I was dismayed at the prospect of having the manual be in two volumes and asked the development engineers to stop writing code. Of course, they didn't honor my request. At the time of this writing, the JUNOS documentation set is 5,700 pages in 13 separate volumes. Similarly, the hardware documentation set has grown from a single 120-page manual to more than 250 pages of documentation for each of six platforms.

When our long-time publishing consultant, Patrick Ames, suggested that we might want to create a small field guide for installing, configuring, and operating Juniper Networks routers, I thought it would be nice to return to a world in which we could document the product in under 1,000 pages. We created a small team of technical documentation writers and editors—Gary Drenan, Cris Morris, Patrick Ames, and myself—and together we sifted the contents of all the JUNOS and hardware documentation, extracting the material that we felt was essential for understanding the mission of Juniper Networks and for understanding our hardware and software products. (We felt this was a more prudent method than simply removing all the vowels or deleting all the verbs.)

This book is the result of our extracting and condensing process. We begin with a brief overview of Juniper Networks the company, describing our markets, services, and offerings. While much of this information exists on the Web site—and we recommend you get the most updated material there—we felt that the book should provide some background about the company itself.

Chapter 2, "JUNOS Internet Software Overview," presents the big-picture view of the JUNOS software. This chapter is short not by design, but because the JUNOS architecture has always been straightforward, clear, and succinct. In Chapter 3, "Juniper Network Router Overview," our senior hardware writer Gary Drenan has worked diligently not only to review all the components and specifications of both the M-series and new T-series routers, but also to collect and collate it in one place. In creating Chapter 4, "Router Installation and Basic JUNOS Setup," Gary has similarly collected everything about installation, from unpacking the crate to getting the router up and running in the network.

Chapters 4 through 12 are concerned with configuring the router and describing the feature set of the JUNOS Internet software. Beginning with Chapter 5, "CLI and System Management," our senior editor Cris Morris efficiently describes how to work with the software. The following chapters detail interfaces and class of service (in Chapter 6) and IPSec (in Chapter 7). Chapters 8 through 10 get to the heart of IP networking, discussing routing policy and firewall filters, routing and routing protocols, and IPv6, respectively.

Chapter 11 looks at MPLS applications, Chapter 12 at virtual private networks (VPNs), and Chapter 13 contains a useful, tabular summary of all the critical JUNOS Internet software monitoring commands (I suspect these might turn out to be the most dog-eared pages of your field guide). Chapter 13 provides sample configurations that come directly from the Juniper Networks testing labs. Finally, we conclude with a glossary of the many Juniper Networks-specific acronyms and terms so you don't have to try to memorize them all.

While we have tried to summarize the Juniper Networks hardware and software features in this field guide, there will undoubtedly be places where the information is insufficient for your needs. Please refer to Appendix A in this book that lists additional resources. Also remember that you can always find a full and complete discussion in the Juniper Networks technical product documentation.

If you would like to give us your feedback or errata about this field guide, please send us e-mail at tech-doc@juniper.net.

Aviva Garrett September 2002


Read More Show Less

Table of Contents

List of Figures.

List of Tables.

Introduction.

Book Conventions.

1. Juniper Networks.

Juniper Networks Markets.

Customer Services.

Education Services.

Technical Certification.

Professional Services.

Juniper.net.

Internet and E-mail Contact Information.

2. JUNOS Internet Software Overview.

JUNOS Processes.

Routing Protocol Process.

Interface Process.

Chassis Process.

SNMP and MIB II Processes.

Management Process.

Supported Networking Standards.

3. Juniper Networks Router Overview.

Router Architecture.

Hardware Components.

Chassis.

Flexible PIC Concentrators.

Physical Interface Cards.

Routing Engine.

Power Supplies.

Cooling System.

Cable Management System.

Field-Replaceable Units.

T640 Internet Routing Node.

T320 Internet Router.

M160 Internet Router.

M40e Internet Router.

M40 Internet Router.

M20 Internet Router.

M5 and M10 Internet Routers.

4. Router Installation and Basic JUNOS Setup.

Preparing for Installation.

Rack Requirements.

Power and Grounding Cable Requirements.

Network Cable Requirements.

Site Wiring Guidelines.

Fiber-Optic Connection Guidelines.

Unpacking the Router.

Installing the Router.

Initially Configuring the Software.

Installing the Software.

Upgrading Software Packages.

Upgrading Individual Software Packages.

Basic Software Setup.

Configuring User Accounts.

Configuring Login Classes.

Configuring User Authentication.

Configuring Time.

5. CLI and System Management.

Using the CLI.

CLI Screen Output.

Filtering Screen Output.

CLI Operational Mode.

Setting the Date and Time.

Displaying CLI Command History.

Monitoring Who Uses the CLI.

Controlling the CLI Environment.

CLI Configuration Mode.

Configuration Statements and Identifiers.

How the Configuration Is Stored.

Entering and Exiting Configuration Mode.

Moving among Levels of the Hierarchy.

Displaying the Current Configuration.

Creating and Modifying the Configuration.

Running Operational Mode CLI Commands from Configuration.

Displaying Configuration Mode Command History.

Verifying and Committing a Configuration.

Saving a Configuration to a File.

Loading a Configuration.

Returning to a Previously Committed Configuration.

Getting Help.

Adding Comments in a Configuration.

System Management with SNMP.

Management Information Base.

SNMP Traps.

JUNOS SNMP Agent Features.

System Logging for SNMP Traps.

Configuring SNMP.

Configuring System Information.

Configuring the SNMP Community String.

Configuring SNMP Trap Options.

Configuring the Interfaces on Which SNMP Requests are Accepted.

Configuring MIB Views.

Tracing SNMP Activity.

6. Interfaces and Class of Service.

JUNOS Interface Terminology.

Configuring Interfaces on the Router.

Configuring Physical Interface Properties.

Configuring Logical Interface Properties.

Configuring Family and Address Interface Properties.

Configuring ATM Interfaces.

Configuring E1 and E3 Interfaces.

Configuring Encryption Interfaces.

Configuring Ethernet Interfaces.

Configuring Ethernet Physical Interface Properties.

Configuring 802.1Q VLANs.

Configuring Static ARP Table Entries.

Configuring VRRP.

Configuring the Management Ethernet Interface.

Configuring the Internal Ethernet Interface.

Configuring Aggregated Ethernet Interfaces.

Configuring Frame Relay.

Configuring the Loopback Interface.

Configuring Multilink Interfaces.

Configuring Multilink Properties.

Configuring Physical and Logical Multilink Interfaces.

Configuring SONET/SDH Interfaces.

Configuring SONET/SDH Physical Interface Properties.

Configuring APS.

Configuring the Media MTU.

Configuring the Clock Source.

Configuring Receive and Transmit Leaky Bucket Properties.

Damping Interface Transitions.

Configuring Interface Encapsulation.

Configuring Aggregated SONET/SDH Interfaces.

Configuring T1 and T3 Interfaces.

Configuring Tunnel Interfaces.

Configuring a Unicast Tunnel.

Configuring a Multicast Tunnel.

Configuring a VPN Tunnel for Route Table Lookup.

Configuring a VPN Tunnel for VRF Table Lookup.

Configuring PIM Tunnels.

Configuring Channelized Interfaces.

Configuring Channelized DS-3 to DS-0 Interfaces.

Configuring Channelized DS-3 to DS-1 Interfaces.

Configuring Channelized E1 Interfaces.

Configuring Channelized OC-12 Interfaces.

Configuring Channelized OC-3 and STM-1 Interfaces.

Configuring Class of Service (CoS).

Defining Code-Point Aliases.

Configuring Forwarding Classes.

Classifying Packets by Behavior Aggregate Class.

Configuring Scheduling Policy Maps.

Configuring RED Drop Profiles.

Rewriting Packet Header Information.

Configuring CoS-Based Forwarding.

7. IP Security (IPSec).

Configuring IPSec Global and Proposal Properties.

Configuring Security Associations.

Configuring Dynamic Security Associations.

Configuring IKE.

Configuring an IPSec Proposal.

Configuring an IPSec Policy.

8. Routing Policy and Firewall Filters.

Policy Terminology.

Comparison of Routing Policies and Firewall Filters.

Routing Policy Framework.

Configuring Routing Policy.

Defining Routing Policies.

Applying Routing Policies.

Applying Routing Policies to the Forwarding Table.

Configuring AS Path Regular Expressions.

Configuring Communities.

Configuring Prefix Lists and Route Lists.

Configuring Route Lists.

Configuring Subroutines.

Configuring the AS Path Prepend Action.

Configuring BGP Route Flap Damping.

Configuring Per-Packet Load Balancing.

Configuring Firewall Filters.

Applying Firewall Filters to Interfaces.

Configuring Policing.

Configure Accounting.

Configuring Filter-Based Forwarding.

Configuring Traffic Sampling and Forwarding 3.

Configuring Per-Flow Load Balancing Information.

Configuring Traffic Sampling Output Files.

Tracing Traffic Sampling Operations.

Configuring Flow Aggregation (cflowd).

Configuring Port Mirroring.

9. Routing and Routing Protocols.

Routing Protocols Concepts.

Creating Routing Tables.

Configuring Static, Aggregate, and Generated Routes.

Specifying Policy with Aggregate and Generated Routes.

Configuring Martian Addresses.

BGP.

BGP Messages.

Configuring BGP.

IS-IS.

IS-IS Packets.

Configuring IS-IS.

OSPF.

OSPF Routing Algorithm.

OSPF Packets.

Configuring OSPF.

RIP.

RIP Packets.

Configuring RIP.

Tracing RIP Protocol Traffic.

Multicast Protocols Overview.

PIM.

PIM Packet Formats.

Configuring PIM.

DVMRP.

DVMRP Packet Formats.

Configuring DVMRP.

IGMP.

IGMP Packets.

Configuring IGMP.

Tracing IGMP Protocol Traffic.

SAP and SDP.

SAP and SDP Packets.

Configuring SAP and SDP.

MSDP.

MSDP Packets.

Configuring MSDP.

Configuring MSDP Peers.

Multicast Scoping.

Configuring Multicast Scoping.

10. IPv6.

IPv6 Packet Headers and Addressing.

Configuring IPv6.

Configuring Interfaces.

Configuring Firewall Filters.

Configuring Routing Policy.

Creating IPv6 Routing Tables.

Configuring IPv6 Routing Protocols.

IPv4-to-IPv6 Transition Mechanisms.

Dual IP Layer.

Configured Tunnels.

11. MPLS Applications.

Traffic Engineering.

Traffic Engineering Components.

MPLS.

Types of LSPs.

Flexible LSP Calculation and Configuration.

Labels.

Routers in an LSP.

How a Packet Travels along an LSP.

Constrained-Path LSP Computation.

Fate Sharing.

IGP Shortcuts.

Advertising LSPs into IGPs.

IP and MPLS Packets on Aggregated Interfaces.

MPLS Applications for Traffic Engineering.

MPLS and Routing Tables.

MPLS and Traffic Protection.

Per-Prefix Load Balancing.

Automatic Bandwidth Allocation.

Configuring MPLS-Signaled LSPs.

Configuring the Ingress Router for MPLS-Signaled LSPs.

Configuring LDP Tunneling.

Using Fate Sharing to Configure Alternate Backup Paths.

Enabling RSVP.

Configuring MPLS over GRE Tunnels.

Configuring Static LSPs.

Configuring Explicit-Path LSPs.

Configuring Miscellaneous MPLS Properties.

Popping the Label on the Ultimate-Hop Router.

Configuring Traffic Engineering for LSPs.

Configuring MPLS to Gather Statistics.

Controlling MPLS System Log Messages and SNMP Traps.

Tracing MPLS Protocol Packets and Operations.

RSVP.

Enabling RSVP.

Configuring RSVP Aggregation.

Configuring the RSVP Hello Interval.

Configuring RSVP Authentication.

Reserving Bandwidth on an Interface.

Configuring RSVP Timers.

Preempting RSVP Sessions.

Tracing RSVP Protocol Traffic.

Configuring RSVP and MPLS.

LDP.

Enabling LDP.

Configuring the LDP Hello Interval.

Configuring the LDP Hold Time.

Configuring the LDP Keepalive Interval.

Configuring the LDP Keepalive Timeout.

Configuring LDP Route Preferences.

Popping the LDP Ultimate-Hop Router.

Filtering Inbound and Outbound LDP Labels.

Enabling LDP over LSPs Established by RSVP.

Configuring the Transport Address Used by LDP.

Configuring LDP Egress Policy.

Configuring FEC Deaggregation.

Configuring LDP to Use the IGP Route Metric.

Tracing LDP Protocol Traffic.

Circuit Cross-Connect.

Configuring Layer 2 Switching Cross-Connects.

Configuring MPLS LSP Tunnel Cross-Connects.

Configuring LSP Stitching Cross-Connects.

12. Layer 2 and Layer 3 VPNs.

VPN Concepts.

Configuring Layer 2 VPNs.

Configuring Layer 3 VPNs.

Configuring Policy for the PE Router's VRF Table.

Configuring VPN Routing between the PE and CE Routers.

Configuring Layer 3 VPN Tunnel Interfaces.

13. Monitoring Commands.

System Management.

SNMP.

Chassis.

Accounting Options.

Interfaces.

Firewall Filters.

Forwarding Options.

Class of Service.

Protocol-Independent Routing.

Routing Policy.

IS-IS.

OSPF.

BGP.

Generic IP Multicast Information.

PIM.

DVMRP.

IGMP.

MSDP.

Multicast Scoping.

MPLS.

RSVP.

LDP.

Layer 2 VPNs.

Layer 3 VPNs.

IP Security (IPSec).

14. Sample JUNOS Configurations.

ATM Interface Configuration.

BGP Configurations.

Basic BGP Configuration.

BGP Routing Policy.

Route Aggregation.

Controlling Peering.

Route Flap Damping.

Route Reflectors.

Confederations.

IS-IS Configurations.

Basic Configuration.

Export Static Routes.

Simple Authentication.

Interface-Level Hello Authentication.

Passive Interfaces.

Layer 3 VPN Configurations.

Appendix.

Additional Resources.

Glossary.

Index. 0321122445T09252002

Read More Show Less

Preface

When I wrote the first Juniper Networks software manual in the early summer of 1997, it was about 250 pages. When we shipped JUNOS Release 3.2 in March 1999, the JUNOS manual was just shy of 1,000 pages. I was dismayed at the prospect of having the manual be in two volumes and asked the development engineers to stop writing code. Of course, they didn't honor my request. At the time of this writing, the JUNOS documentation set is 5,700 pages in 13 separate volumes. Similarly, the hardware documentation set has grown from a single 120-page manual to more than 250 pages of documentation for each of six platforms.

When our long-time publishing consultant, Patrick Ames, suggested that we might want to create a small field guide for installing, configuring, and operating Juniper Networks routers, I thought it would be nice to return to a world in which we could document the product in under 1,000 pages. We created a small team of technical documentation writers and editors--Gary Drenan, Cris Morris, Patrick Ames, and myself--and together we sifted the contents of all the JUNOS and hardware documentation, extracting the material that we felt was essential for understanding the mission of Juniper Networks and for understanding our hardware and software products. (We felt this was a more prudent method than simply removing all the vowels or deleting all the verbs.)

This book is the result of our extracting and condensing process. We begin with a brief overview of Juniper Networks the company, describing our markets, services, and offerings. While much of this information exists on the Web site--and we recommend you get the most updated material there--we felt that the book should provide some background about the company itself.

Chapter 2, "JUNOS Internet Software Overview," presents the big-picture view of the JUNOS software. This chapter is short not by design, but because the JUNOS architecture has always been straightforward, clear, and succinct. In Chapter 3, "Juniper Network Router Overview," our senior hardware writer Gary Drenan has worked diligently not only to review all the components and specifications of both the M-series and new T-series routers, but also to collect and collate it in one place. In creating Chapter 4, "Router Installation and Basic JUNOS Setup," Gary has similarly collected everything about installation, from unpacking the crate to getting the router up and running in the network.

Chapters 4 through 12 are concerned with configuring the router and describing the feature set of the JUNOS Internet software. Beginning with Chapter 5, "CLI and System Management," our senior editor Cris Morris efficiently describes how to work with the software. The following chapters detail interfaces and class of service (in Chapter 6) and IPSec (in Chapter 7). Chapters 8 through 10 get to the heart of IP networking, discussing routing policy and firewall filters, routing and routing protocols, and IPv6, respectively.

Chapter 11 looks at MPLS applications, Chapter 12 at virtual private networks (VPNs), and Chapter 13 contains a useful, tabular summary of all the critical JUNOS Internet software monitoring commands (I suspect these might turn out to be the most dog-eared pages of your field guide). Chapter 13 provides sample configurations that come directly from the Juniper Networks testing labs. Finally, we conclude with a glossary of the many Juniper Networks-specific acronyms and terms so you don't have to try to memorize them all.

While we have tried to summarize the Juniper Networks hardware and software features in this field guide, there will undoubtedly be places where the information is insufficient for your needs. Please refer to Appendix A in this book that lists additional resources. Also remember that you can always find a full and complete discussion in the Juniper Networks technical product documentation.

If you would like to give us your feedback or errata about this field guide, please send us e-mail at tech-doc@juniper.net.

Aviva Garrett
September 2002

0321122445P09252002

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)