Skip to content

Juniper Networks Warrior A Guide to the Rise of Juniper Networks Implementations

Best in textbook rentals since 2012!

ISBN-10: 1449316638

ISBN-13: 9781449316631

Edition: 2012

Authors: Peter Southwick

List price: $47.99
Shipping box This item qualifies for FREE shipping.
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

If you’re considering a move to Junos and Juniper Networks equipment, this unique book provides a collection of real-world solutions—including detailed examples, configurations, and tutorials—on a network-by-network basis. Juniper Network Consultant Peter Southwick offers a unique first-person perspective on the design, configuration, and troubleshooting support he delivered in each case.Switching network hardware is an involved process, not to be taken lightly. Enterprise network engineers and administrators often seek practical examples of hardware implementations before they begin. This guide puts you right up front in the driver’s seat with Southwick’s insightful observation of how…    
Customers also bought

Book details

List price: $47.99
Copyright year: 2012
Publisher: O'Reilly Media, Incorporated
Publication date: 11/27/2012
Binding: Paperback
Pages: 432
Size: 7.01" wide x 9.21" long x 0.88" tall
Weight: 1.540
Language: English

Peter Southwick is a Senior Network Engineer at Proteus Networks, providing both professional services support and training for Proteus Networks customers. He is a JNCI, holds JNCIE-M #473 and other Juniper certifications in routing and security. He is an author of Telecommunications: a Beginners Guide, co-author of ISDN: Concepts, Facilities and Services (both published by McGraw Hill), and contributing author to The Handbook of Local Area Networks (CRC Press).

Preface
An Enterprise VPN
Company Profile
Network
Traffic Flow
Need for Change
Class of Service
Design Trade-Offs
Implementation
Prototype Phase
Class of Service
Cut-Over
Main Site
Remote Site JAX
Remote Sites PHL and IAD
Backup Site BNA
Conclusions
Maintaining IDP Systems
IDP8200 Background
Command-Line Interface
Web Management Interface
NSM Management
Support Tasks
Daily Tasks
IDP Policies
Rulebase Optimization
Other Tasks
Conclusion
Data Center Security Design
Discussion
Design Trade-Offs
Decision
Configuration
Take One Configuration: Clustering
Take 2 Configuration: Active/Active without Reths
Take 3 Configuration: Active/Active with One-Legged Reths
Testing
Summary
Layer 3 to Layer 2 Conversion
Problem
Q-in-Q Framing
VPLS Overhead
Solutions
RFC 4623
Configurations
Management
Protocols
Core Router Configurations
Distribution Switch Configurations
Distribution Router Configurations
Rate Control
CPE Switch Configuration
Conclusion
Internet Access Redress
Objective
Design
Trade-offs
Configuration
Clustering
Security
Routing
Implementation
Lessons Learned
Conclusion
Service Provider Engagement
Company Profile
Physical Network Topology
Services
Design Approach
Design Trade-Offs
Configurations
Boilerplate Configuration
MX Interfaces
EX Boilerplate and Interfaces
OSPF
MBGP
MPLS
RSVP
Layer 3 VPN
VPLS
OBM
Conclusion
A PCI-Compliant Data Center
Introduction
Client Goals
Design Trade-Offs
Recommended Design
Switching Layer
Routing Layer
Firewall Layer
Virtualization
Configurations
EX4200 Configuration
MX240 Configuration
Firewall Configuration
Deployment
Initial Connectivity
The Maintenance Window
PCI Compliance
Summary
Facilitating Dark Fiber Replacement Using a QFX3500
Existing Design
Introduction to Fibre Channel
Proposed Design
Concerns and Resolutions
Network Upgrade
Advantages and Benefits of the Solution
QFX3500 Fibre Channel Gateway Configurations
Management Configurations
Fibre Channel Gateway Interface Configuration
DCB Configuration
EX4500 Transit Switch Configurations
Interfaces and VLANs
Transit Switch DCB Configuration
Verification
Conclusions
MX Network Deployment
Plans and Topology
Phase 1
MX Configuration
Management Configuration
Routing Engine Protection
Policy Configurations
Protocol Configurations
Phase 2
Final Phases
Conclusion
A Survivable Internet Solution for a Fully Distributed Network
Original Network Architecture
WAN Connectivity
Addressing
Internal Connectivity
Firewalls
Problem Definition
Proposed Solution 1
Solution 1 Advantages
Solution 1 Details
Solution 1 Issues
Proposed Solution 2: OSPF over Tunnels
Early Death of Solution 2
Configuration for Solution 2
Final Solution: Static Routes over Tunnels
Solution Advantages
Solution Issues
Email Server Address Resolution
Firewall Configurations
Conclusion
Internet Access Rebuild
Requirements
Existing Network
Routing Protocols
Solution Options
Three-Layer Design
Two-Layer Design
One-Tier Design
Configurations
Deployment Scenario
Management Staging and Testing
Top-of-Rack Switch Testing
ISP Link Testing
Production Configuration
Cut-Over
Conclusion
Index