JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification (e-book) Sosnowiec

JUNOS Enterprise Switching is the only detailed technical book on Juniper Networks' new Ethernet-switching EX product platform. With this book, you'll learn all about the hardware and ASIC design prowess of the EX platform, as well as the JUNOS Software that powers it. Not only is this extremely …

od 194,65 Najbliżej: 32 km

Liczba ofert: 1

Oferta sklepu

Opis

JUNOS Enterprise Switching is the only detailed technical book on Juniper Networks' new Ethernet-switching EX product platform. With this book, you'll learn all about the hardware and ASIC design prowess of the EX platform, as well as the JUNOS Software that powers it. Not only is this extremely practical book a useful, hands-on manual to the EX platform, it also makes an excellent study guide for certification exams in the JNTCP enterprise tracks. The authors have based JUNOS Enterprise Switching on their own Juniper training practices and programs, as well as the configuration, maintenance, and troubleshooting guidelines they created for their bestselling companion book, JUNOS Enterprise Routing. Using a mix of test cases, case studies, use cases, and tangential answers to real-world problems, this book covers:Enterprise switching and virtual LANs (VLANs)The Spanning tree protocol and why it's neededInter-VLAN routing, including route tables and preferencesRouting policy and firewall filtersSwitching security, such as DHCP snoopingTelephony integration, including VLAN voicePart of the Juniper Networks Technical Library<™>, JUNOS Enterprise Switching provides all-inclusive coverage of the Juniper Networks EX product platform, including architecture and packet flow, management options, user interface options, and complete details on JUNOS switch deployment. Spis treści: JUNOS Enterprise SwitchingSPECIAL OFFER: Upgrade this ebook with OReillyForewordEvolution of the Bridging WorldWhat Is the Big Deal About Switching Anyway?How This Book Will Help You (a.k.a. Whats in It for Me?)PrefaceWhat Is JUNOS Enterprise Switching?The Juniper Networks Technical Certification Program (JNTCP)How to Use This BookWhats in This Book?Topology of This BookConventions Used in This BookUsing Code ExamplesSafari Books OnlineComments and QuestionsAbout Scott Morris, Lead Tech ReviewerAcknowledgmentsFrom Doug MarschkeFrom Harry Reynolds1. LAN and Internetworking OverviewWhat Is a Network?The OSI ModelLayer functionsNetwork Types and Communication ModesCommunication modesSo, Where Did We LANd?Ethernet TechnologiesA Brief Look BackEthernet or 802.3, That Is the QuestionThe MAC LayerCSMA/CDThe shift away from shared mediaMAC addressingEthernet Standards Wrap-UpA word on auto-negotiationEthernet Technology SummaryThe TCP/IP SuiteEnter OSIExit OSI, Enter IPThe IP Stack, in a NutshellThe network that lies beneathARP me, AmadeusIP, freelyIP addressingHierarchicalClassless is the norm (or, how we learned to subnet)ICMP, the bad news protocolUDP, multiplexing, and not much elseTCP, a transport for all seasonsWhats this Internet thing for again, eh, sonny?IP encapsulation exampleInternet Protocol SummaryLAN InterconnectionRepeatersBridgesProtocol-agnosticLoops are bad, really, really badBridge processing in detailSo much for the 80/20 ruleRoutersMulti-Protocol RoutingOne protocol to rule them allLAN Interconnect SummaryConclusionChapter Review QuestionsChapter Review Answers2. EX Platform OverviewEX Hardware OverviewThe EX8200 SeriesSeparate Control and Forwarding: Its a Good ThingEX Hardware: The NumbersEX Feature SupportLayer 2 featuresLayer 3 and general system featuresEX Hardware SummaryEX Series ArchitectureThe EX-PFE ASICEX3200 ArchitectureEX4200 ArchitectureFront-panel LEDsA Day in the Life of a PacketLayer 2 switchingOutput processing: Layer 2 switchingLayer 3 routingEX Series Architecture SummaryJUNOS Software OverviewJUNOS Software SummaryCLI OverviewJ-Web and EZSetupEZSetupCLI Operational Modes and General FeaturesOperational modeCommand completionEmacs keysThe pipeConfiguration ModeNavigating the configuration hierarchyActive and candidate configurations, commits, and rollbacksCommit confirmedLoading and saving configurationsThe JUNOS CLI SummaryAdvanced CLI and Other Cool StuffSOSScheduled Commits and WildcardsWildcards and regular expressionsCopying, Renaming, and InsertingConclusionChapter Review QuestionsChapter Review Answers3. Initial Configuration and MaintenanceThe Factory-Default Configuration and EZSetupFactory-Default ConfigurationEZSetupFactory-Default Configuration and EZSetup SummaryInitial Configuration Using the CLICLI Configuration SummarySecondary ConfigurationCustomized User Accounts, Authentication, and AuthorizationUser authentication case studyOut of Band NetworkRemote AccessDynamic Host Configuration ProtocolDHCP server configuration in JUNOSDHCP relay configuration in JUNOSSecondary Configuration SummaryEX InterfacesPermanent InterfacesNetwork InterfacesNetwork interface namingLogical unitsInterface ConfigurationPhysical propertiesLogical propertiesEX Interface Configuration ExamplesLayer 2 interfaceLayer 3 interfaceInterface TroubleshootingJUNOS troubleshooting toolsSyslogMonitor interfaceMonitor trafficOperational mode show commandsEthernet OAMDiagnostic commandsLoopbacksHard loopsEX Interface SummaryBasic Switch MaintenanceChassis Health CheckSyslogSyslog case studySNMPNTPIs NTP really working?Rescue ConfigurationPassword RecoverySwitch Maintenance SummaryConclusionChapter Review QuestionsChapter Review Answers4. EX Virtual ChassisThe EX Virtual ChassisVirtual Chassis OverviewVirtual Chassis Control ProtocolMember roles within a VCMember IDMastership priorityDefault election algorithmVirtual Chassis IdentifierVirtual Chassis Design and Deployment OptionsVCP topologiesVCP single rack ringsVCP multiple rack ringsVCP serial chainVCE topologiesExtending the VCPacket Flow in a Virtual ChassisVirtual chassis topology discoveryThe SPF calculationA bifurcated VC: Its a bad thingVirtual chassis packet walk-throughIntersystem packet flowsVirtual Chassis SummaryConfiguration, Operation, and MaintenanceVirtual Chassis Configuration ModesHot or cold insertion: when does a VC addition become a VC merge?Virtual Chassis ConfigurationVirtual management addressVirtual chassis member parametersVCEsVirtual chassis configuration summaryVirtual Chassis Operation and MaintenanceOperational mode commands with member contextVC monitoring commandsMonitor the VC control protocolVC tracingVC maintenanceVC adds, moves, and changesConnecting to non-master membersUsing the no-management-vlan optionConfiguration, Operation, and Maintenance SummaryVirtual Chassis Case StudyPrepare for the MergeConfigure VC ParametersConfirm initial VC operationExpand the VC with VCE LinksPrepare the new switchConfigure the VCE portsCase Study SummaryConclusionChapter Review QuestionsChapter Review Answers5. Virtual LANs and TrunkingVirtual LANs and TrunkingPort ModesTagging User TrafficQinQ, a.k.a. provider bridgingThe Native and Default VLANsThe native VLANThe default VLANPutting it all togetherGeneric Attribute Registration ProtocolCisco and GVRPVLAN and Trunking SummaryEX to Catalyst VLAN IntegrationDefault VLAN/Trunking BehaviorDefine VLANsConfigure and confirm IOS VLANs and trunkingJUNOS VLAN and trunk configurationTroubleshoot a VLAN problemAdd Native VLAN SupportGetting Loopy with ItVLAN Integration SummaryConclusionChapter Review QuestionsChapter Review Answers6. Spanning Tree ProtocolFeeling a Little LoopyStupid Is As Stupid DoesLoop Issue SummarySpanning Tree ProtocolSTP BasicsCalculating and Maintaining the Spanning TreeBridge Protocol Data UnitsBPDU Learning and Port StatesProtocol TimersTable ageHello timeMessage ageForwarding delayPutting the Theory TogetherSTP IssuesSTP SummaryRapid Spanning Tree ProtocolNew BPDU Definition and FunctionInterface Types and StatesRSTP ConvergenceTopology changesLink failuresLink Cost in RSTPCompatibility with STPInteroperability Between Juniper and CiscoRSTP SummarySpanning Tree ConfigurationFailures with Default ParametersConfiguring RSTPWhen RSTP isnt going to be rapidRSTP design considerationSpanning Tree Configuration SummaryMultiple Spanning Tree ProtocolMSTP ConfigurationMSTP SummaryRedundant Trunk GroupsRTG ConfigurationRTG SummaryConclusionChapter Review QuestionsChapter Review Answers7. Routing on the EXEX Routing OverviewWhat Is Routing?Interior Gateway Protocol overviewEX Routing CapabilitiesWhats missing?Layer 3 scaling limitsJUNOS Routing ConceptsGlobal route preferenceRouting tables and RIB groupsThe inet.0 tableRouting policyRouter ID and Autonomous System NumberSummary of EX Routing CapabilitiesInter-VLAN RoutingA Router on a StickEnter the Routed VLAN InterfaceFull Layer 3 functionalityDeploy an RVIConfigure and test an RVIUse VRRP with an RVIRestricting RVI CommunicationsRVI and Layer 3 filtersRVI SummaryStatic RoutingNext Hop TypesForwarding next hop qualifiersRoute Attributes and FlagsFloating Static RoutesEX Static Routing ScenarioStatic routing in the Internet routerEX static routingStatic Routing SummaryRIP RoutingRIP OverviewRIP stability and performance tweaksRIP and RIPv2RIP Deployment ScenarioConfigure RIPVodkilas RIP configurationVerify RIPRIP SummaryConclusionChapter Review QuestionsChapter Review Answers8. Routing Policy and Firewall FiltersRouting PolicyWhat Is Routing Policy, and When Do I Need One?Where and How Is Policy Applied?Applying policy to link state routing protocolsApplying policy to RIPPolicy ComponentsLogical OR and AND functions within termsPolicy Match Criteria and ActionsPolicy match criteriaPolicy actionsRoute FiltersBinary treesRoute filters and match typesLongest match wins, but may notDefault PoliciesOSPF default policyIS-IS default policyRIP default policyBGP default policyTesting and Monitoring PolicyTesting policy resultsPolicy tracingPolicy Case StudyRouting Policy SummaryFirewall FiltersTypes of FiltersFilter Term ProcessingFilter Match ConditionsFilter ActionsApplying a FilterApplying a filter at the port levelApplying a filter at the VLAN levelApplying a filter at the Layer 3 levelTransit Filter Case StudyLayer 3 filterVLAN filtersCase Study: Loopback FiltersPolicersBurst-size-limit mysteryPolicer actionsConfiguring and applying policersPolicer exampleStorm Control and Rate LimitingFilters and Policers SummaryConclusionChapter Review QuestionsChapter Review Answers9. Port Security and Access ControlLayer 2 Security OverviewEX Layer 2 Security SupportMAC Limiting, DHCP, and ARPMAC LimitingLimiting MAC movesMAC limit actionsDeploy and verify MAC limitingDHCP Snooping and ARP InspectionSecuring DHCP and ARPDeploy DHCP snooping and ARP inspectionConfirm DHCP snooping and ARP inspectionMAC Limiting, DHCP, and ARP SummaryIEEE 802.1X Port-Based AuthenticationTerminology and Basic OperationExtensible Authentication ProtocolJUNOS 802.1X Feature SupportAdministrative modesSupplicant modesAdditional capabilitiesDeploy and Verify 802.1XRADIUS server configurationEAP-MD5 supplicant configurationConfigure RADIUS parametersConfigure 802.1X authenticator propertiesVerify 802.1X authenticationConfigure MAC-based RADIUS authentication802.1X Port-Based Authentication SummaryConclusionChapter Review QuestionsChapter Review Answers10. IP TelephonyDeployment ScenariosQoS or CoS?Deployment Scenarios SummaryPower over EthernetJUNOS Support for PoEPoE SummaryLink Layer Discovery ProtocolJUNOS LLDPLLDP SummaryLLDP with Media Endpoint DiscoveryLLDP-MED and JUNOSLLDP-MED SummaryVoice VLANCase StudiesWithout LLDP-MED SupportPlug-and-play solution without LLDP-MEDVoice VLAN and IP phone configurationWith LLDP-MED SupportCase Study SummaryConclusionChapter Review QuestionsChapter Review Answers11. High AvailabilityHardware RedundancyRouting Engine FailoverDefault Failover Layer 2Default Failover Layer 3Graceful Routing Engine SwitchoverGRES with Layer 2GRES with Layer 3Graceful RestartNon-Stop RoutingGRES, GR, NSR, Oh My!VRRPIn-Service Software UpgradesAggregated EthernetLACP in ActionJUNOS ConfigurationAdditional configuration optionsLoad balancing over AEBidirectional Forwarding Detection (BFD)High Availability SummaryConclusionChapter Review QuestionsChapter Review AnswersGlossaryIndexAbout the AuthorsColophonSPECIAL OFFER: Upgrade this ebook with OReilly

Specyfikacja

Podstawowe informacje

Autor
  • Harry Reynolds, Doug Marschke
Rok wydania
  • 2009
Ilość stron
  • 752
Kategorie
  • Hacking
Wybrane wydawnictwa
  • O'Reilly Media