Juniper Networks Reference Guide: JUNOS Routing, Configuration, and Architecture / Edition 1

Juniper Networks Reference Guide: JUNOS Routing, Configuration, and Architecture / Edition 1

by Thomas M. Thomas II, Doris Pavlichek, Lawrence H. Dwyer III, Rajah Chowbay
     
 

Juniper Networks® Reference Guide is the ideal implementation guide to the Juniper Networks® family of Internet routers and the network operating system JUNOS™. With concise explanations of internetworking theory and detailed examples, this book teaches readers how to configure, deploy, and maintain their Juniper Networks routing

See more details below

Overview

Juniper Networks® Reference Guide is the ideal implementation guide to the Juniper Networks® family of Internet routers and the network operating system JUNOS™. With concise explanations of internetworking theory and detailed examples, this book teaches readers how to configure, deploy, and maintain their Juniper Networks routing solutions. Experienced JUNOS engineers will benefit from the tested configuration examples, which they can apply to their own networks. Those new to the JUNOS Internet software will find everything they need to pass the Juniper Networks JNCIS™ certification exam.

Essential topics covered include:

  • An introduction to the core technologies of Juniper Networks, including their role in Carrier Class routing
  • System configuration, from the installation of a Juniper Networks router to the functional inclusion of network management and security
  • Interface and routing protocol configurations, including internal routing protocols such as OSPF and IS-IS, as well as extensive discussions of external routing protocols like BGP
  • Explorations of advanced router operation and configuration, covering routing policies, MPLS, VPNs, and multicast

Juniper Networks® Reference Guide also contains information about the entire range of products and technologies behind key Internet building block technologies, giving readers an inside look not found in other books. Whether you are studying to become a JNCIE, need to maintain a multivendor routing solution, or are simply curious about Cisco System's competitor, this book is your key to the world of Juniper Networks.

0201775921B09262002

Read More

Product Details

ISBN-13:
9780201775921
Publisher:
Addison-Wesley
Publication date:
10/28/2002
Edition description:
New Edition
Pages:
880
Product dimensions:
7.20(w) x 9.40(h) x 2.00(d)

Meet the Author

Thomas M. Thomas II, founder of NetCerts.com (now CCPREP.com) and the International Network Resource Group (www.ingri.net), is currently working for Hired Guns. He holds Cisco Certified Internetworking Expert (CCIE #9360), Certified Cisco Systems Instructor (CCSI#21702), CCNP, CCDA, and CCNA certifications. Tom is a prolific author whose publications include OSPF Network Design Solutions (Cisco Press, 1999) and other networking books.

Doris E. Pavilchek is a CCNA and CCDA and works as a project manager for Ericsson IP Infrastructure, overseeing product lifecycles and releases.

Lawrence H. Dwyer III holds CCNA and MCSE certifications and is currently the director of the Technical Support Lab for Ericsson IP Infrastructure.

Rajah Chowbay is a Juniper Networks Certified Internet Specialist (JNCIS), Cisco Certified Internetwork Expert (CCIE # 3445), Certified Ericsson Datacom Technician (E1), Certified Ericsson Instructor, and Certified Cisco Systems Instructor (CCSI). Rajah is currently working as Senior Technical Trainer/Technical Support Engineer with Ericsson IP Infrastructure.

Wayne W. Downing III is a Senior Consulting Engineer with Ericsson IP Infrastructure. Wayne has held technical leadership positions with several service providers (MCI Worldcom, Sprint, and AT&T), where he was responsible for network architecture, routing, and other business-related functions. He is a Juniper Networks Certified Internet Specialist (JNCIS) and also holds a variety of Cisco certifications.

James W. Sonderegger holds a B.S. in political science and is a Juniper Networks Certified Internet Specialist (JNCIS) as well as a Juniper Networks Authorized Trainer (JNAT). He also holds Cisco and Ericsson proprietary certifications. James currently works as a course developer and senior instructor for Ericsson Training.

0201775921AB09262002

Read More

Table of Contents

Preface
Acknowledgments
Ch. 1Juniper Networks from the Internet to the Classroom1
1.1The Growth of the Internet1
1.2Juniper Networks M-Series7
1.3Juniper Networks Education Services12
1.4Technical Certification Program17
Ch. 2Networking Primer25
2.1Overview of the OSI Model25
2.2Transmission Technologies35
Ch. 3Juniper Networks Router Architecture73
3.1Juniper Networks Router Models74
3.2Architecture Overview76
3.3Management and Traffic Interfaces96
3.4Cooling Systems99
3.5Router Power-up and Boot Process104
3.6JUNOS Software Upgrade Procedure106
3.7JUNOScript109
Ch. 4The Command Line Interface111
4.1Operational Mode111
4.2Entering and Exiting Operational Mode111
4.3Operational-Mode Commands112
4.4Set CLI Command113
4.5Navigating in Operational Mode117
4.6Interpreting CLI Messages118
4.7Controlling CLI Output on the Screen118
4.8Viewing the CLI Command History128
4.9Monitoring Users128
4.10Getting Help in the CLI129
4.11Configuration Mode131
4.12Entering and Exiting Configuration Mode132
4.13Configuration-Mode Hierarchy133
4.14Understanding the Configuration-Mode Banner133
4.15Navigating in Configuration Mode134
4.16Understanding How and Where the Configuration Files Are Stored135
4.17Returning to a Previous Configuration136
4.18Executing Operational-Mode Commands in Configuration Mode137
4.19Displaying Your Configuration138
4.20Saving, Modifying, and Loading Configuration Files138
4.21Creating Configuration Groups146
4.22Getting Help in Configuration Mode147
Case Study: User and Access Configuration148
Ch. 5Router Access and System Administration151
5.1Communicating with the Router151
5.2System Administration164
Case Study: A Typical Base Configuration203
Ch. 6Router Management, Firewall Filters, and Accounting207
6.1SNMP Overview207
6.2Configuring SNMP on a Juniper Networks Router216
6.3Introduction to Firewall Filters226
6.4Accounting250
Case Study: Securing a Juniper Networks Router254
Ch. 7Interface Configuration269
7.1Introduction to Interfaces269
7.2Ethernet, Fast Ethernet, and GigE Interfaces281
7.3SONET/SDH Interfaces297
7.4ATM Interfaces311
7.5Serial Interfaces319
7.6Aggregated Interfaces326
7.7Tunnel Interfaces329
7.8Loopback332
Ch. 8IGP Routing Protocol Configuration337
8.1Routing Protocol Primer337
8.2RIP343
8.3Checking RIP Operation356
8.4OSPF358
8.5IS-IS399
Ch. 9BGP Routing Configuration419
9.1BGP Overview419
9.2The Finite State Machine435
9.3JUNOS BGP Minimum Configuration448
9.4Configuration Parameters457
9.5Scaling BGP475
Ch. 10BGP Routing Case Studies483
10.1Case Study 1: Path Selection483
10.2Case Study 2: Advanced Path Selection490
10.3Case Study 3: Load Balancing - Multipath and Multihop506
10.4Case Study 4: Scaling BGP511
Ch. 11Defining and Implementing Routing Policies549
11.1Routing Policy Overview549
11.2RPSL552
11.3Structure of JUNOS Routing Policy Language559
11.4DIET Policies572
11.5Route Redistribution and Filtering588
11.6Route Flap Damping593
11.7Regular Expressions and Communities602
Ch. 12MPLS and Traffic Engineering609
12.1Traffic-Engineering Problems609
12.2Traffic-Engineering Solutions611
12.3MPLS Operation and Design Principles615
12.4MPLS Configuration628
12.5Static LSP Configuration630
12.6RSVP-Based Dynamic-LSP Configuration633
12.7LDP-Based Dynamic-LSP Configuration637
12.8CCCs639
Case Study 1Prefix Mapping and BGP643
Case Study 2Using Constraints in RSVP LSPs647
Case Study 3CCC Configuration652
Ch. 13Virtual Private Networks657
13.1Overview of VPNs657
13.2VPN Implementation and Topologies658
13.3VPN Physical Topologies660
13.4Dedicated Extranet VPN662
13.5Centralized Extranet VPN663
13.6Layer 3 VPNs664
13.7Route Distinguishers665
13.8Forwarding Tables668
13.9Configuring BGP MPLS VPNs670
13.10Activating RSVP Signaling Options670
13.11Activating LDP Signaling Options673
13.12Configuring an IGP676
13.13Configuring M-BGP on the PE Routers678
13.14Configuring the VRF for the VPN680
13.15PE-CE Configuration682
Case Study 1Full-Mesh VPN Configuration684
Case Study 2Hub-and-Spoke VPN Configuration691
Ch. 14Multicast Protocols703
14.1Multicast Backbone704
14.2Multicast Characteristics708
14.3IGMP715
14.4Multicast Routing721
14.5Dense-Mode Multicast Routing Protocols726
Ch. 15Troubleshooting Juniper Networks Routers749
15.1Introduction to Troubleshooting749
15.2Juniper Networks Troubleshooting Model750
15.3Trouble Indicators753
15.4Troubleshooting the Chassis756
15.5Monitoring Interfaces762
15.6Troubleshooting Routing Protocols with the traceoptions Command768
15.7Working with JTAC791
App. APractice JNCIS Questions795
Acronyms813
About the Authors821
Index823

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >