Skip to Content
JUNOS Enterprise Switching
book

JUNOS Enterprise Switching

by Harry Reynolds, Doug Marschke
July 2009
Intermediate to advanced
752 pages
23h 19m
English
O'Reilly Media, Inc.
Content preview from JUNOS Enterprise Switching

Secondary Configuration

After completing the initial configuration via either the CLI or EZSetup, you will likely need additional configuration, such as:

  • Non-root-user accounts and privileges

  • OoB management

  • Additional remote access functionality

  • Dynamic Host Configuration Protocol (DHCP) services

Customized User Accounts, Authentication, and Authorization

There are two types of users on a Juniper Networks system: non-root users and the root user. All users must be authenticated before they can access the switch, and when desired, various levels of authorization are possible to limit the scope of actions or commands available to users in each class. Recall that the root user is the only predefined user, and that root can log in only via the console port until SSH access is configured; the root user is not permitted to remotely access the router via Telnet for security reasons.

Note

Non-root users can telnet to the router and su to root when authorized if the SSH service is not running. This is not recommended, as Telnet sends in plain text.

You must set a root password before the switch will allow you to commit a modified factory-default configuration. As we showed previously, to set up a root password, issue the set root-authentication statement under the [edit system] level. There are several options:

root@Tequila# set system root-authentication ? Possible completions: + apply-groups Groups from which to inherit configuration data + apply-groups-except Don't inherit configuration data from ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

JUNOS Enterprise Routing

JUNOS Enterprise Routing

Doug Marschke, Harry Reynolds
JUNOS High Availability

JUNOS High Availability

James Sonderegger, Orin Blomberg, Kieran Milne, Senad Palislamovic
Junos Security

Junos Security

Rob Cameron, Brad Woodberg, Patricio Giecco, Timothy Eberhard, James Quinn

Publisher Resources

ISBN: 9780596804244Errata Page