| |
| |
Acknowledgments | |
| |
| |
Preface | |
| |
| |
Hardware and Architecture | |
| |
| |
System Evolution | |
| |
| |
Router Functionality | |
| |
| |
The Craft Interface | |
| |
| |
Product Features | |
| |
| |
Juniper Software Design | |
| |
| |
Ensuring Performance with Juniper Networks Routers | |
| |
| |
Juniper Networks Router Processes and Functions | |
| |
| |
Routing Information Databases | |
| |
| |
The File System | |
| |
| |
Software Mechanics | |
| |
| |
JUNOS Software Command Line Interface | |
| |
| |
Introduction to JUNOS Software CLI | |
| |
| |
CLI Features | |
| |
| |
System Management and Services | |
| |
| |
Operating System and File Locations | |
| |
| |
Managing User Accounts and Access | |
| |
| |
RADIUS and TACACS+ | |
| |
| |
Services and Processes | |
| |
| |
Diagnostic Tools | |
| |
| |
Interface Configuration and Control | |
| |
| |
Permanent vs. Transient Interfaces | |
| |
| |
Configuring the Juniper Networks Interface | |
| |
| |
Configuring SONET Interfaces | |
| |
| |
Configuring the ATM Interface | |
| |
| |
Configuring the Plesiochronous Digital Hierarchy: T-1/E-1 | |
| |
| |
Configuring the Plesiochronous Digital Hierarchy: T-3/E-3 Interfaces | |
| |
| |
Configuring Ethernet Interfaces: Gigabit Ethernet and Fast Ethernet | |
| |
| |
Configuring Tunnel Interfaces | |
| |
| |
Troubleshooting | |
| |
| |
Protocol-Independent Routing | |
| |
| |
Route Types | |
| |
| |
Martian Routes | |
| |
| |
Routing Tables | |
| |
| |
Other Features | |
| |
| |
Routing Policy | |
| |
| |
Basic Routing Policy | |
| |
| |
Basic Routing Policy | |
| |
| |
The JUNOS Software Policy Framework | |
| |
| |
Policy Framework Mechanics | |
| |
| |
Protocol-Specific Policy | |
| |
| |
Troubleshooting Policy | |
| |
| |
Policy Design | |
| |
| |
Summary | |
| |
| |
Routing Information Protocol | |
| |
| |
Distance Vector Routing Protocols | |
| |
| |
Introduction to RIP | |
| |
| |
OSPF Theory | |
| |
| |
OSPF: A Link-State Routing Protocol | |
| |
| |
OSPF Network Types | |
| |
| |
Adjacency Establishment | |
| |
| |
OSPF Packets | |
| |
| |
Flooding | |
| |
| |
The Link-State Database | |
| |
| |
Topology Maintenance | |
| |
| |
OSPF Hierarchy | |
| |
| |
OSPF Configuration | |
| |
| |
OSPF Minimum Configuration Requirements | |
| |
| |
Point-to-Point Network with Unnumbered Interfaces | |
| |
| |
P2P Network with Numbered Interfaces | |
| |
| |
BMA Network | |
| |
| |
Hierarchical Routing--Multiple-Area Configuration | |
| |
| |
Route Redistribution into OSPF | |
| |
| |
Stub Area Configuration | |
| |
| |
OSPF Route Summarization | |
| |
| |
NSSA Configuration | |
| |
| |
Virtual Link Configuration | |
| |
| |
OSPF Metrics and Shortest Path Calculation | |
| |
| |
IS-IS | |
| |
| |
Introduction and Historical Background | |
| |
| |
Sample Network | |
| |
| |
IS-IS Terminology | |
| |
| |
Link-State Protocol Fundamentals and Introduction to IS-IS | |
| |
| |
Troubleshooting IS-IS | |
| |
| |
Interdomain Routing Theory | |
| |
| |
BGP Overview | |
| |
| |
BGP Basics | |
| |
| |
Scaling BGP | |
| |
| |
Resolving BGP Next-Hop Addresses | |
| |
| |
Hot-Potato Routing | |
| |
| |
Damping | |
| |
| |
Internal BGP Timers | |
| |
| |
New BGP v4 Knobs and Features | |
| |
| |
Interdomain Routing Case Studies | |
| |
| |
Basic BGP Configuration and Best Practices | |
| |
| |
ISP Design Using Routing Policy for BGP Control | |
| |
| |
Load Balancing with BGP | |
| |
| |
Route Reflection and Path Selection in a Multi-Vendor Network | |
| |
| |
Persistent Route Oscillation with Route Reflection | |
| |
| |
Using Confederations for BGP Scalability | |
| |
| |
BGP in the Enterprise | |
| |
| |
Introduction to MPLS | |
| |
| |
History of MPLS | |
| |
| |
Overview of MPLS | |
| |
| |
Static LSPs | |
| |
| |
Signaled LSPs | |
| |
| |
Introduction to MPLS Virtual Private Networks | |
| |
| |
2547bis MPLS Virtual Private Networks | |
| |
| |
Circuit Cross-Connect | |
| |
| |
Layer 2 MPLS Virtual Private Networks | |
| |
| |
Internet Processor II and Firewall Filters | |
| |
| |
Overview of IP2 Features and Capabilities | |
| |
| |
Firewall Filter Syntax and Operation | |
| |
| |
Routing Engine Protection | |
| |
| |
Transit Filtering | |
| |
| |
IP2 Rate Limiting | |
| |
| |
Rate Limiting | |
| |
| |
IP2 Statistical Sampling | |
| |
| |
Statistical Sampling | |
| |
| |
Tracing and Minimizing DoS Attacks | |
| |
| |
Index | |