Book description
The Juniper Networks routing platforms are becoming the go-to solution for core, edge, metro and remote office networks, and JUNOS software is behind it all. The operating system is so full of industrial-strength routing protocols and IP innovations that those treading into the world of JUNOS will need clarification, explanation, and a showcase example or two. Look no further. This JUNOS Cookbook provides it all and more.
Yes, you can mine through the 5,000 pages of documentation or take a two-thousand-dollar training course, but JUNOS's interprocess sophistication can be baffling unless you know the shortcuts and tricks, as well as those rays of illuminating comprehension that can come only from those who live with it. JUNOS Cookbook is the first comprehensive book about JUNOS software and it provides over 200 time-saving step-by-step techniques including discussions about the processes and alternative ways to perform the same task. It's been tested and tech-reviewed by field engineers who know how to take JUNOS out for a spin and it's applicable to the entire line of M-, T-, and J-series routers. JUNOS Cookbook will not only pay for itself the first few times you use it, it will make your network easier to manage and update.
"Aviva Garrett has done a tremendous job of distilling the features of JUNOS software in a form that will be useful for a wide audience-students, field engineers, network architects, and other networking professionals alike will benefit from this book. For many people, this is the only book on JUNOS they will need."Pradeep Sindhu, CTO and Founder, Juniper Networks
"This cookbook is superb. Aviva Garrett has masterfully assembled a complete set of practical real-world examples with step-by-step instructions. Security, management, routing: it's all here!"Stephen Gill, Research Fellow, Team Cymru
"A technical time-saver for any NOC or SOC working with JUNOS. It's clear, concise, and informative recipes are are an invaluable resource. "Scott A. McIntyre, Security Officer, XS4ALL Internet B.V
Publisher resources
Table of contents
- JUNOS Cookbook
- Foreword
- Preface
-
1. Router Configuration and File Management
- Introduction
- 1.1. Configuring the Router for the First Time
- 1.2. Configuring the Router from the CLI
- 1.3. Getting Exclusive Access to Configure the Router
- 1.4. Displaying the Commands to Recreate a Configuration
- 1.5. Including Comments in the Configuration
- 1.6. Checking the Syntax of the Configuration
- 1.7. Activating the Router Configuration
- 1.8. Debugging a Failed Commit
- 1.9. Exiting Configuration Mode
- 1.10. Keeping a Record of Configuration Changes
- 1.11. Determining What Changes You Have Made to the Configuration
- 1.12. Configuring the Router by Copying a File from a Server
- 1.13. Configuring the Router by Copying Text from a Terminal Window
- 1.14. Backing Up the Router’s Configuration
- 1.15. Scheduling the Activation of a Configuration
- 1.16. Provisionally Activating a Configuration
- 1.17. Loading a Previous Router Configuration
- 1.18. Creating an Emergency Rescue Configuration
- 1.19. Backing Up Filesystems on M-Series and T-Series Routers
- 1.20. Backing Up Filesystems on J-Series Routers
- 1.21. Restoring a Backed-Up Filesystem
- 1.22. Installing a Different Software Release on M-Series and T-Series Routers
- 1.23. Installing a Different Software Release on J-Series Routers
- 1.24. Creating an Emergency Boot Disk
- 1.25. Gathering Software Version Information
- 1.26. Gathering Hardware Inventory Information
- 1.27. Finding Out How Long the Router Has Been Up
- 1.28. Gathering Information Before Contacting Support
- 1.29. Managing Routers with Similar Configurations
- 1.30. Managing Redundant Routing Engines
- 1.31. Using the Second Routing Engine to Upgrade to a New Software Version
-
2. Basic Router Security and Access Control
- Introduction
- 2.1. Allowing Access to the Router
- 2.2. Controlling Root Authentication
- 2.3. Logging In to the Router’s Console
- 2.4. Setting the Login Authentication Methods
- 2.5. Setting Up Login Accounts on the Router
- 2.6. Changing the Format of Plain-Text Passwords
- 2.7. Changing the Plain-Text Password Encryption Method
- 2.8. Creating a Login Account for Remote Authentication
- 2.9. Creating a Group Login Account
- 2.10. Customizing Account Privileges
- 2.11. Creating a Privilege Class that Hides Encrypted Passwords
- 2.12. Setting Up RADIUS User Authentication
- 2.13. Setting Up TACACS+ User Authentication
- 2.14. Restricting Inbound SSH and Telnet Access
- 2.15. Setting the Source Address for Telnet Connections
- 2.16. Creating a Login Banner
- 2.17. Finding Out Who Is Logged In to the Router
- 2.18. Logging Out of the Router
- 2.19. Forcibly Logging a User Out
- 3. IPSec
-
4. SNMP
- Introduction
- 4.1. Configuring SNMP
- 4.2. Setting Router Information for the MIB-II System Group
- 4.3. Setting Up SNMP Traps
- 4.4. Controlling SNMP Access to the Router
- 4.5. Using a Firewall Filter to Protect SNMP Access
- 4.6. Controlling Access to Router MIBs
- 4.7. Extracting Software Inventory Information with SNMP
- 4.8. Extracting Hardware Inventory Information with SNMP
- 4.9. Collecting Router Operational Information with SNMP
- 4.10. Logging SNMP Access to the Router
- 4.11. Logging Enterprise-Specific Traps
- 4.12. Using RMON Traps to Monitor the Router’s Temperature
- 4.13. Configuring SNMPv3
- 4.14. Tracking Router Configuration Changes
- 4.15. Setting Up SNMPv3 Traps
-
5. Logging
- Introduction
- 5.1. Turning On Logging
- 5.2. Limiting the Messages Collected
- 5.3. Including the Facility and Severity in Messages
- 5.4. Changing the Size of a Logging File
- 5.5. Clearing the Router’s Logfiles
- 5.6. Sending Log Messages to Your Screen
- 5.7. Sending Logging Messages to a Log Server
- 5.8. Saving Logging Messages to the Other Routing Engine
- 5.9. Turning Off Logging
- 5.10. Turning On Basic Tracing
- 5.11. Monitoring Interface Traffic
- 6. NTP
-
7. Router Interfaces
- Introduction
- 7.1. Viewing Interface Status
- 7.2. Viewing Traffic Statistics on an Interface
- 7.3. Setting an IP Address for the Router
- 7.4. Setting the Router’s Source Address
- 7.5. Configuring an IPv4 Address on an Interface
- 7.6. Configuring an IPv6 Address on an Interface
- 7.7. Configuring an ISO Address on an Interface
- 7.8. Creating an MPLS Protocol Family on a Logical Interface
- 7.9. Configuring an Interface Description
- 7.10. Choosing Primary and Preferred Interface Addresses
- 7.11. Using the Management Interface
- 7.12. Finding Out What IP Addresses Are Used on the Router
- 7.13. Configuring Ethernet Interfaces
- 7.14. Using VRRP on Ethernet Interfaces
- 7.15. Connecting to an Ethernet Switch
- 7.16. Configuring T1 Interfaces
- 7.17. Performing a Loopback Test on a T1 Interface
- 7.18. Setting Up a BERT Test on a T1 Interface
- 7.19. Configuring Frame Relay on a T1 Interface
- 7.20. Configuring a SONET Interface
- 7.21. Using APS to Protect Against SONET Circuit Failures
- 7.22. Configuring an ATM Interface
- 7.23. Dealing with Nonconfigurable Interfaces
- 7.24. Configuring Interfaces Before the PICs Are Installed
-
8. IP Routing
- Introduction
- 8.1. Viewing the Routes in the Routing Table
- 8.2. Viewing Routes to a Particular Prefix
- 8.3. Viewing Routes Learned from a Specific Protocol
- 8.4. Displaying the Routes in the Forwarding Table
- 8.5. Creating Static Routes
- 8.6. Blackholing Routes
- 8.7. Filtering Traffic Using Unicast Reverse-Path Forwarding
- 8.8. Aggregating Routes
- 8.9. Load-Balancing Traffic Flows
- 8.10. Adding Martian Addresses
- 8.11. Changing Route Preferences to Migrate to Another IGP
- 8.12. Configuring Routing Protocols to Restart Without Losing Adjacencies
-
9. Routing Policy and Firewall Filters
- Introduction
- 9.1. Creating a Simple Routing Policy
- 9.2. Changing a Route’s Routing Information
- 9.3. Filtering Routes by IP Address
- 9.4. Filtering Long Prefixes
- 9.5. Filtering Unallocated Prefix Blocks
- 9.6. Creating a Chain of Routing Policies
- 9.7. Making Sure a Routing Policy Is Functioning Properly
- 9.8. Creating a Simple Firewall Filter that Matches Packet Contents
- 9.9. Creating a Firewall Filter that Negates a Match
- 9.10. Reordering Firewall Terms
- 9.11. Filtering Traffic Transiting the Router
- 9.12. Using a Firewall Filter to Count Traffic on an Interface
- 9.13. Logging the Traffic on an Interface
- 9.14. Limiting Traffic on an Interface
- 9.15. Protecting the Local Routing Engine
- 9.16. Rate-Limiting Traffic Flow to the Routing Engine
- 9.17. Using Counters to Determine Whether a Router Is Under Attack
- 10. RIP
-
11. IS-IS
- Introduction
- 11.1. Configuring IS-IS
- 11.2. Viewing the IS-IS Link-State Database
- 11.3. Viewing Routes Learned by IS-IS
- 11.4. Configuring IS-IS for IPv6
- 11.5. Configuring a Level 1–Only Router
- 11.6. Controlling DIS Election
- 11.7. Enabling IS-IS Authentication
- 11.8. Redistributing Static Routes into IS-IS
- 11.9. Leaking IS-IS Level 2 Routes into Level 1
- 11.10. Adjusting IS-IS Link Costs
- 11.11. Improving IS-IS Convergence Times
- 11.12. Moving IS-IS Traffic off a Router
- 11.13. Disabling IS-IS on an Interface
- 11.14. Tracing IS-IS Protocol Traffic
-
12. OSPF
- Introduction
- 12.1. Configuring OSPF
- 12.2. Viewing Routes Learned by OSPF
- 12.3. Viewing the OSPF Link-State Database
- 12.4. Configuring OSPF for IPv6
- 12.5. Configuring a Multiarea OSPF Network
- 12.6. Setting Up Stub Areas
- 12.7. Creating a Not-So-Stubby Area
- 12.8. Summarizing Routes in OSPF
- 12.9. Enabling OSPF Authentication
- 12.10. Redistributing Static Routes into OSPF
- 12.11. Adjusting OSPF Link Costs
- 12.12. Improving OSPF Convergence Times
- 12.13. Moving OSPF Traffic off a Router
- 12.14. Disabling OSPF on an Interface
- 12.15. Tracing OSPF Protocol Traffic
-
13. BGP
- Introduction
- 13.1. Configuring a BGP Session Between Routers in Two ASs
- 13.2. Configuring BGP on Routers Within an AS
- 13.3. Diagnosing TCP Session Problems
- 13.4. Adjusting the Next-Hop Attribute
- 13.5. Adjusting Local Preference Values
- 13.6. Removing Private AS Numbers from the AS Path
- 13.7. Prepending AS Numbers to the AS Path
- 13.8. Filtering BGP Routes Based on AS Paths
- 13.9. Restricting the Number of Routes Advertised to a BGP Peer
- 13.10. Authenticating BGP Peers
- 13.11. Setting Up Route Reflectors
- 13.12. Mitigating Route Instabilities with Route Flap Damping
- 13.13. Adding a BGP Community to Routes
- 13.14. Load-Balancing BGP Traffic
- 13.15. Tracing BGP Protocol Traffic
-
14. MPLS
- Introduction
- 14.1. Configuring LSPs Using LDP as the Signaling Protocol
- 14.2. Viewing Information and LDP-Signaled LSPs in the Routing Tables
- 14.3. Verifying that an LDP-Signaled LSP Is Carrying Traffic
- 14.4. Enabling LDP Authentication
- 14.5. Tracing LDP Operations
- 14.6. Setting Up RSVP-Signaled LSPs
- 14.7. Viewing Information About RSVP-Signaled LSPs in the Routing Tables
- 14.8. Verifying Packet Labels
- 14.9. Verifying that the RSVP-Signaled LSP Is Carrying Traffic
- 14.10. Configuring RSVP Authentication
- 14.11. Protecting an LSP’s Path
- 14.12. Using Fast Reroute to Reduce Packet Loss Following a Link Failure
- 14.13. Automatically Allocating Bandwidth
- 14.14. Prioritizing LSPs
- 14.15. Allowing IGP Traffic to Use an LSP
- 14.16. Installing LSPs into the Unicast Routing Table
- 14.17. Tracing RSVP Operations
- 15. VPNs
-
16. IP Multicast
- Introduction
- 16.1. Configuring PIM-SM
- 16.2. Manually Establishing a PIM-SM RP
- 16.3. Using Auto-RP to Dynamically Map RPs
- 16.4. Setting Up a PIM-SM Bootstrap Router
- 16.5. Filtering PIM-SM Bootstrap Messages
- 16.6. Configuring Multiple RPs in a PIM-SM Domain with Anycast RP
- 16.7. Configuring Multiple RPs in a PIM-SM Domain Anycast PIM
- 16.8. Limiting the Group Ranges an RP Services
- 16.9. Viewing Multicast Routes
- 16.10. Checking the Groups for Which a PIM-SM Router Maintains Join State
- 16.11. Manually Configuring IGMP
- 16.12. Using SSM
- 16.13. Connecting PIM-SM Domains Using MSDP and MBGP
- 16.14. Configuring PIM-DM
- 16.15. Tracing PIM Packets
- Index
- About the Author
- Colophon
- Copyright
Product information
- Title: JUNOS Cookbook
- Author(s):
- Release date: April 2006
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9780596553371
You might also like
book
AWS Cookbook
This practical guide provides over 70 self-contained recipes to help you creatively solve common AWS challenges …
book
Ansible: Up and Running, 3rd Edition
Among the many configuration management tools available, Ansible has some distinct advantages: It's minimal in nature. …
book
The Linux Programming Interface
The Linux Programming Interface is the definitive guide to the Linux and UNIX programming interface—the interface …
book
bash Cookbook, 2nd Edition
For system administrators, programmers, and end users, shell command or carefully crafted shell script can save …