JUNOS High Availability: Best Practices for High Network Uptime [NOOK Book]

Overview

Whether your network is a complex carrier or just a few machines supporting a small enterprise, JUNOS High Availability will help you build reliable and resilient networks that include Juniper Networks devices. With this book's valuable advice on software upgrades, scalability, remote network monitoring and management, high-availability protocols such as VRRP, and more, you'll have your network uptime at the ...

See more details below
JUNOS High Availability: Best Practices for High Network Uptime

Available on NOOK devices and apps  
  • NOOK Devices
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK Study
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$31.99
BN.com price
(Save 42%)$55.99 List Price

Overview

Whether your network is a complex carrier or just a few machines supporting a small enterprise, JUNOS High Availability will help you build reliable and resilient networks that include Juniper Networks devices. With this book's valuable advice on software upgrades, scalability, remote network monitoring and management, high-availability protocols such as VRRP, and more, you'll have your network uptime at the five, six, or even seven nines -- or 99.99999% of the time.


Rather than focus on "greenfield" designs, the authors explain how to intelligently modify multi-vendor networks. You'll learn to adapt new devices to existing protocols and platforms, and deploy continuous systems even when reporting scheduled downtime. JUNOS High Availability will help you save time and money.

  • Manage network equipment with Best Common Practices
  • Enhance scalability by adjusting network designs and protocols
  • Combine the IGP and BGP networks of two merging companies
  • Perform network audits
  • Identify JUNOScripting techniques to maintain high availability
  • Secure network equipment against breaches, and contain DoS attacks
  • Automate network configuration through specific strategies and tools



This book is a core part of the Juniper Networks Technical Library™.
Read More Show Less

Product Details

  • ISBN-13: 9781449379445
  • Publisher: O'Reilly Media, Incorporated
  • Publication date: 8/18/2009
  • Series: Animal Guide
  • Sold by: Barnes & Noble
  • Format: eBook
  • Edition number: 1
  • Pages: 690
  • File size: 12 MB
  • Note: This product may take a few minutes to download.

Meet the Author

James Sonderegger (JNCIE-M #130, JNCIS-FWV, JNCIS-ER, and Juniper Certified Instructor) holds a MS in IT Management and is a Resident Engineer Manager on Juniper Networks' Professional Services Team. James spent five years as an Engineer in Residence for Federal customers and has been in the networks industry for the last twelve years. His former employers include The Analysis Corporation (TAC), Ericsson IP Infrastructure, and Automated Data Processing. James was a co-author on "Juniper Networks Reference Guide. Routing, Configuration, and Architecture", ISBN 0201775921, Addison-Wesley Publishing, 2002.

Orin Blomberg (CCNP, CCSP, CCIP, CCVP, CCDP, JNCIS-M, JNCIS-FWV, JNCIS-ER, JNCIA-IDP, JNCI) is the technical lead for SSL VPNs and remote access at the Washington State Department of Information Service. His primary responsibilities include providing remote access and secure connectivity for state agencies, county, city governments, and tribal nation governments, as well as connectivity to federal agencies. His former employers include General Dynamics C4 Systems, Ericsson IP Infrastructure, and the US Army.

Kieran Milne (JNCIE-M #380, JNCIS-ER, JNCIA-WX, JNCIA-EX, JNCIA-E, JNCI, CCNA, Nortel NCTS) is a training developer and technical trainer within the Education Services department at Juniper Networks. With over ten years of experience in the networking industry, Kieran has taught all over the world, in both corporate and college settings. Before joining Juniper Networks, Kieran spent time at Nortel Networks and Alcatel. He is the author of the O'Reilly book JUNOS Networking Essentials, and contributes to exam development for the Juniper Networks Technical Certification Program. Kieran lives and works out of Canada.

Senad Palislamovic (JNCIE-M #145 and JNCIS-E) is a Professional Services Engineer at Juniper Networks, where he consults, designs, and implements MPLS enabled NGEN services for largest global ASPs and financial networks. He has also worked as a JTAC Engineer troubleshooting major ISPs' networks. Before JTAC, Senad held various network positions at Weber State University where he designed and implemented scalable network solutions. Senad holds B.S Degree in Telecommunications and IS&T from Weber State University and has over 10 years of experience in various enterprise and ISP networking technologies. He lives in New York with his wife Samera.

Read More Show Less

Table of Contents

PrefaceJUNOS HA ConceptsChapter 1: High Availability Network Design ConsiderationsChapter 2: Hardware High AvailabilityChapter 3: Software High AvailabilityChapter 4: Control Plane High AvailabilityChapter 5: Virtualization for High AvailabilityJUNOS HA TechniquesChapter 6: JUNOS Pre-Upgrade ProceduresChapter 7: Painless Software UpgradesChapter 8: JUNOS Post-Upgrade VerificationsChapter 9: Monitoring for High AvailabilityChapter 10: Management InterfacesChapter 11: Management ToolsChapter 12: Managing Intradomain Routing Table GrowthChapter 13: Managing an Interdomain Routing TableNetwork AvailabilityChapter 14: Fast High Availability ProtocolsChapter 15: Transitioning Routing and Switching to a Multivendor EnvironmentChapter 16: Transitioning MPLS to a Multivendor EnvironmentChapter 17: Monitoring Multivendor NetworksChapter 18: Network ScalabilityChapter 19: Choosing, Migrating, and Merging Interior Gateway ProtocolsChapter 20: Merging BGP Autonomous SystemsChapter 21: Making Configuration Audits PainlessChapter 22: Securing Your Network Equipment Against Security BreachesChapter 23: Monitoring and Containing DoS Attacks in Your NetworkChapter 24: Goals of Configuration AutomationChapter 25: Automated Configuration StrategiesAppendixesSystem Test PlanConfiguration AuditHigh Availability Configuration StatementsColophon

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)