This company authorized field manual for network engineers, administrators, and operators describes the creation and deployment of routing platforms using Juniper Networks hardware and software. Coverage includes, for example, CLI configuration and system management with SNMP, IP security, virtual p
Juniper Networks Reference Guide: JUNOS Routing, Configuration, and Architecture
โ Scribed by Thomas M. Thomas, Doris Pavlichek, Lawrence H. Dwyer, Rajah Chowbay, Wayne W. Downing, James Sonderegger
- Publisher
- Addison-Wesley Professional
- Year
- 2002
- Tongue
- English
- Leaves
- 880
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
SynopsisWritten for networking professionals, this text is an introduction to the Internet routers and operating systems that are part of the Juniper Networks product line. After discussing the company's education and certification efforts and the basics of the carrier- class routing technologies, the authors cover the steps needed to install the router and make it function to include network management and security. A section on interface and routing protocols configuration covers internal routing protocols such as Open Shortest Path First and Intermediate System to Intermediate System. A final section is devoted to advanced router operation configuration and covers routing policies, MPLS, VPNs, and Multicast
๐ SIMILAR VOLUMES
If you are looking for a book that will help you configure the Juniper SA appliance very quickly, this is the book. It very easy to follow with great examples.
Configuring Juniper Networks NetScreen & SSG Firewalls is the only complete reference to this family of products. It covers all of the newly released features of the product line as highlighted by Juniper Networks, including: Complete Coverage of Integrated Intrusion Prevention Step-by-Step Instruct
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to a