Book description
Juniper Networks® Reference Guide is the ideal implementation guide to the Juniper Networks® family of Internet routers and the network operating system JUNOS™. With concise explanations of internetworking theory and detailed examples, this book teaches readers how to configure, deploy, and maintain their Juniper Networks routing solutions. Experienced JUNOS engineers will benefit from the tested configuration examples, which they can apply to their own networks. Those new to the JUNOS Internet software will find everything they need to pass the Juniper Networks JNCIS™ certification exam.
Essential topics covered include:
An introduction to the core technologies of Juniper Networks, including their role in Carrier Class routing
System configuration, from the installation of a Juniper Networks router to the functional inclusion of network management and security
Interface and routing protocol configurations, including internal routing protocols such as OSPF and IS-IS, as well as extensive discussions of external routing protocols like BGP
Explorations of advanced router operation and configuration, covering routing policies, MPLS, VPNs, and multicast
Juniper Networks® Reference Guide also contains information about the entire range of products and technologies behind key Internet building block technologies, giving readers an inside look not found in other books. Whether you are studying to become a JNCIE, need to maintain a multivendor routing solution, or are simply curious about Cisco System's competitor, this book is your key to the world of Juniper Networks.
0201775921B09262002
Table of contents
- Copyright
- Preface
- Acknowledgments
- 1. Juniper Networks from the Internet to the Classroom
- 2. Networking Primer
-
3. Juniper Networks Router Architecture
- 3.1. Juniper Networks Router Models
- 3.2. Architecture Overview
- 3.3. Management and Traffic Interfaces
- 3.4. Cooling Systems
- 3.5. Router Power-up and Boot Process
- 3.6. JUNOS Software Upgrade Procedure
- 3.7. JUNOScript
- 3.8. Chapter Summary
-
Bibliography
-
4. The Command Line Interface
- 4.1. Operational Mode
- 4.2. Entering and Exiting Operational Mode
- 4.3. Operational-Mode Commands
- 4.4. set CLI Command
- 4.5. Navigating in Operational Mode
- 4.6. Interpreting CLI Messages
- 4.7. Controlling CLI Output on the Screen
- 4.8. Viewing the CLI Command History
- 4.9. Monitoring Users
- 4.10. Getting Help in the CLI
- 4.11. Configuration Mode
- 4.12. Entering and Exiting Configuration Mode
- 4.13. Configuration-Mode Hierarchy
- 4.14. Understanding the Configuration-Mode Banner
- 4.15. Navigating in Configuration Mode
- 4.16. Understanding How and Where the Configuration Files Are Stored
- 4.17. Returning to a Previous Configuration
- 4.18. Executing Operational-Mode Commands in Configuration Mode
- 4.19. Displaying Your Configuration
- 4.20. Saving, Modifying, and Loading Configuration Files
- 4.21. Creating Configuration Groups
- 4.22. Getting Help in Configuration Mode
- 4.23. Chapter Summary
-
Bibliography
- Case Study: User and Access Configuration
-
5. Router Access and System Administration
- 5.1. Communicating with the Router
- 5.2. System Administration
- 5.3. Chapter Summary
-
Bibliography
- Case Study: A Typical Base Configuration
-
6. Router Management, Firewall Filters, and Accounting
- 6.1. SNMP Overview
- 6.2. Configuring SNMP on a Juniper Networks Router
- 6.3. Introduction to Firewall Filters
- 6.4. Accounting
- 6.5. Chapter Summary
-
References
-
Bibliography
- Case Study: Securing a Juniper Networks Router
- 7. Interface Configuration
-
8. IGP Routing Protocol Configuration
- 8.1. Routing Protocol Primer
- 8.2. RIP
- 8.3. Checking RIP Operation
-
8.4. OSPF
- 8.4.1. Theory of Operation
- 8.4.2. OSPF Metrics
- 8.4.3. OSPF Areas
- 8.4.4. Router Types
- 8.4.5. OSPF Database
- 8.4.6. Adjacency
- 8.4.7. LSAs
- 8.4.8. OSPF Network Types
- 8.4.9. Router Elections
- 8.4.10. Stub Areas
- 8.4.11. Equal Cost Paths
- 8.4.12. Virtual Links
- 8.4.13. OSPF Single-Area Configuration
- 8.4.14. OSPF Multiple-Area Configuration
- 8.4.15. OSPF Stub Configuration
- 8.4.16. OSPF NSSA Configuration
- 8.4.17. OSPF Virtual-Link Configuration
- 8.4.18. OSPF Authentication and Configuration
- 8.4.19. Configuring OSPF Options
- 8.4.20. Checking OSPF Operation
- 8.4.21. Design Principles
- 8.5. IS-IS
- 8.6. Chapter Summary
-
Bibliography
-
9. BGP Routing Configuration
- 9.1. BGP Overview
- 9.2. The Finite State Machine
- 9.3. JUNOS BGP Minimum Configuration
-
9.4. Configuration Parameters
- 9.4.1. Configuration Hierarchy
-
9.4.2. Configuration Statements
- 9.4.2.1. advertise-inactive
- 9.4.2.2. allow
- 9.4.2.3. as-override
- 9.4.2.4. authentication-key
- 9.4.2.5. bgp
- 9.4.2.6. cluster
- 9.4.2.7. damping
- 9.4.2.8. description
- 9.4.2.9. disable
- 9.4.2.10. export
- 9.4.2.11. family
- 9.4.2.12. group
- 9.4.2.13. hold-time
- 9.4.2.14. import
- 9.4.2.15. keep
- 9.4.2.16. local-address
- 9.4.2.17. local-as
- 9.4.2.18. local-preference
- 9.4.2.19. log-updown
- 9.4.2.20. metric-out
- 9.4.2.21. multihop
- 9.4.2.22. multipath
- 9.4.2.23. neighbor
- 9.4.2.24. no-aggregator-id
- 9.4.2.25. no-client-reflect
- 9.4.2.26. out-delay
- 9.4.2.27. passive
- 9.4.2.28. path-selection
- 9.4.2.29. peer-as
- 9.4.2.30. preference
- 9.4.2.31. prefix-limit
- 9.4.2.32. protocol
- 9.4.2.33. remove-private
- 9.4.2.34. trace-options
- 9.4.2.35. type
- 9.5. Scaling BGP
- 9.6. Chapter Summary
-
Bibliography
- 10. BGP Routing Case Studies
- 11. Defining and Implementing Routing Policies
-
12. MPLS and Traffic Engineering
- 12.1. Traffic-Engineering Problems
- 12.2. Traffic-Engineering Solutions
- 12.3. MPLS Operation and Design Principles
- 12.4. MPLS Configuration
- 12.5. Static LSP Configuration
- 12.6. RSVP-Based Dynamic-LSP Configuration
- 12.7. LDP-Based Dynamic-LSP Configuration
- 12.8. CCCs
- 12.9. Chapter Summary
-
Bibliography
- Case Study 1: Prefix Mapping and BGP
- Case Study 2: Using Constraints in RSVP LSPs
- Case Study 3: CCC Configuration
-
13. Virtual Private Networks
- 13.1. Overview of VPNs
- 13.2. VPN Implementation and Topologies
- 13.3. VPN Physical Topologies
- 13.4. Dedicated Extranet VPN
- 13.5. Centralized Extranet VPN
- 13.6. Layer 3 VPNs
- 13.7. Route Distinguishers
- 13.8. Forwarding Tables
- 13.9. Configuring BGP MPLS VPNs
- 13.10. Activating RSVP Signaling Options
- 13.11. Activating LDP Signaling Options
- 13.12. Configuring an IGP
- 13.13. Configuring M-BGP on the PE Routers
- 13.14. Configuring the VRF for the VPN
- 13.15. PE-CE Configuration
- 13.16. Chapter Summary
-
Bibliography
- Case Study 1: Full-Mesh VPN Configuration
- Case Study 2: Hub-and-Spoke VPN Configuration
- 14. Multicast Protocols
-
15. Troubleshooting Juniper Networks Routers
- 15.1. Introduction to Troubleshooting
- 15.2. Juniper Networks Troubleshooting Model
- 15.3. Trouble Indicators
- 15.4. Troubleshooting the Chassis
- 15.5. Monitoring Interfaces
-
15.6. Troubleshooting Routing Protocols with the traceoptions Command
- 15.6.1. Viewing traceoptions Output
- 15.6.2. Enabling Global traceoptions
- 15.6.3. Using traceoptions with RIP
- 15.6.4. Using traceoptions with OSPF
- 15.6.5. Using traceoptions with IS-IS
- 15.6.6. Using traceoptions with BGP
- 15.6.7. Troubleshooting Commands for MPLS and VPNs
- 15.6.8. Troubleshooting Commands for Multicast Protocols
- 15.7. Working with JTAC
- 15.8. Chapter Summary
-
Bibliography
- Acronyms
- About the Authors
- A. Practice JNCIS Questions
Product information
- Title: Juniper Networks® Reference Guide: JUNOS™ Routing, Configuration, and Architecture
- Author(s):
- Release date: October 2002
- Publisher(s): Addison-Wesley Professional
- ISBN: 0201775921
You might also like
book
Juniper Networks® Field Guide and Reference
Juniper Networks® creates and deploys high-performance routing platforms used by many of the world's largest service …
book
JUNOS Enterprise Routing
Written by the instructors and creators of the JNTCP-ER Certification Exams, JUNOS Enterprise Routing is the …
video
Building Small Office Networks Using the Junos OS
In this Building Small Office Networks Using the Junos OS training course, expert author Martin Brown …
book
Internet Routing Architectures, Second Edition
The industry's leading resource for Internet routing solutions and scenarios Explore the functions, attributes, and applications …