1 HardwareandArchitecture
SystemEvolution
RouterFunctionality
RoutingEngine
PacketForwardingEngine
PacketFlow
TheCraftInterface
UsingtheCraftInterface
ProductFeatures
M40/M20
M160
M5/MIO
2 JuniperSoftwareDesign
EnsuringPerformancewithJuniperNetworksRouters
DivideandConquer
AttheCore:UNIX
ProcessesandDaemons
JUNOSSoftwareOptimizations
JuniperNetworksRouterProcessesandFunctions
TheKernelProcess
TheinitProcess
syslogd
mgdandcli
rpd
dcd
snmpd
mib2d
ilmid
vrrpd
apsd
chassisd
sampled
alarmd
EmbeddedJUNOSSoftware(PFEOS)
RoutingInformationDatabases
BootOrderandProcessInteraction
TheFileSystem
FileSystemComponents
ImportantDirectories
BootSourceSequence
SoftwareMechanics
JUNOSSoftwareReleaseStructure
InstallingandUpgrading
JUNOSSoftwareDocumentation
3 JUNOSSoftwareCommandLineInterface
IntroductiontoJUNOSSoftwareCLI
CLIArchitecture
CLIKeystrokes
CLIModes
CLIFeatures
AutomaticCommandCompletion
SimultaneousMultipleUserAccess
ConfigurationCommitModel
UsingOperationalModeCommands
inConfigurationMode
OnlineDocumentation
ScrollingLargeFilesFeature
CommandPipeOption
4 SystemManagementandServices
OperatingSystemandFileLocations
RootAccount
ManagingUserAccountsandAccess
UserAccounts
RADIUSandTACACS+
TACACS+
AuthenticationOrder
ServicesandProcesses
HostNamesandDNS
StaticHostTables
DNS
TeInet
SSH
Finger
FileTransferProtocol
SettingTimeandLocation
NTP
SNMP
DiagnosticTools
PING
Traceroute
Syslog
Traceoptions
5 InterfaceConfigurationandControl
Permanentvs.TransientInterfaces
SlotandPortNumberingonJuniperNetworksRouters
InterfaceandAddressCategories
Clocking
ConfiguringtheJuniperNetworksInterface
PhysicalLayerParameters
LogicalInterfaceConfiguration
ConfiguringSONETInterfaces
PhysicalInterfaceCardProperties
SONETOptions
AutomaticProtectionSwitching
FrameCheckSequence
Loopback
SONETPath-Trace
PayloadScrambling
RFC2615
MaximumTransmissionUnit
Interoperability
ConfiguringtheATMInterface
PhysicalInterfaceProperties
LogicalInterfaceProperties
ConfiguringthePlesiochronousDigitalHierarchy:T-1/E-1
FramingMethods
LinecodesandOnesDensity
DataInversion
SimpleTestPatterns
LineBuildout
Idle-CycleFlagandTransmissionEfficiency
SubrateandTimeslotConfiguration
FrameCheckSequence
Encapsulations
ConfiguringthePlesiochronousDigitalHierarchy:
T-3/E-3Interfaces
FramingMode
FCS
Idle-CycleFlagandTransmissionEfficiency
LineBuildout
CSUCompatibilityMode/Subrate
Encapsulations
ConfiguringEthernetInterfaces:GigabitEthernetand
FastEthernet
MACAddressSetting
VLANTagging
FastEthernet/GigabitEthernetOptions
SourceFiltering
LogicalInterfaceParameters
ConfiguringEncapsulations
ConfiguringTunnelInterfaces
MulticastingandTunnelPICs
GenericRouteEncapsulation/IP-IPandTunnelPICs
ManagementInterfaceConfiguration
Troubleshooting
ThemonitorinterfaceCommand
TheshowinterfacesextensiveCommand
Loopback
6 ProtocoMndependentRouting
RouteTypes
StaticRoutes
AggregateRoutes
GeneratedRoutes
MartianRoutes
RoutingTables
InterpretingtheOutput
ProtocolsandPreferences
AdditionalRouteTables
Rib-Groups
OtherFeatures
RouterID
AutonomousSystemNumber
AutonomousSystemConfederations
LoadBalancing
7 RoutingPolicy
BasicRoutingPolicy
AnExamplePolicyScenario
CreatingaRoutingPolicy
BasicRoutingPolicy
Definition
Parameters
Application
Results
Evaluation
TheJUNOSSoftwarePolicyFramework
PolicyComponents
SettingParameters
ApplyingPolicies
Evaluation..o...
PolicyFrameworkMechanics
FlowControlActions
DefaultPolicies
PolicyChains
User-DefinedPolicies
Terms
MatchConditions
Side-Effects
Expressions
Subroutines
Protocol-SpecificPolicy
Protocol-SpecificMatchConditions
RegularExpressions
TroubleshootingPolicy
TestPolicy
PolicyTracing
DebugCommunities
PolicyDesign
TacticsforImprovingPolicies
StrategiesforImplementingRoutingPolicies
DesigningSubroutinePolicies
SubroutinesandExpressions
Summary
8 RoutingInformationProtocol
DistanceVectorRoutingProtocols
WhatIsDistanceVector?
DistanceVectorProblemsandSolutions
IntroductiontoRIP
RIPv1
RIPv2Extensions
ConfiguringRIPv2
TroubleshootingRIPv2
9 OSPFTheory
OSPF:ALink-StateRoutingProtocol
ShortestPathFirstComputation
OSPFNetworkTypes
point-to-PointNetwork
BroadcastMulti-accessNetwork
Non-BroadcastMulti-accessNetwork
point-to-MultipointNetwork
ConsiderationsforMulti-accessNetworks
Multi-accessNetworkRules
AdjacencyEstablishment
HelloProtocol
OSPFAuthentication
OSPFAdjacencyStateMachine
OSPFPackets
DatabaseDescriptionPacket
Link-StateRequestPacket
Link-StateUpdatePacket
Link-StateAcknowledgementPacket
Flooding
FloodingProcedure
TheLink-StateDatabase
Router-LSA
Network-LSA
Summary-LSA
AS-External-LSA
TopologyMaintenance
OSPFHierarchy
OSPFRouterClassification
VirtuallyAttachedOSPFAreas
OSPFExtensions
10 OSPFConfiguration
OSPFMinimumConfigurationRequirements
CaseStudy1:Point-to-PointNetwork
withUnnumberedInterfaces
ViewingOSPFInterfaces
ViewingOSPFNeighbors
InterfacePriorityConfiguration
ViewingtheOSPFLink-StateDatabase
ViewingOSPFRoutes
CaseStudy2:P2PNetworkwithNumberedInterfaces
CaseStudy3:BMANetwork
CaseStudy4:HierarchicalRouting--
Multiple-AreaConfiguration
CaseStudy5:RouteRedistributionintoOSPF
CaseStudy6:StubAreaConfiguration
CaseStudy7:OSPFRouteSummarization
CaseStudy8:NSSAConfiguration
CaseStudy9:VirtualLinkConfiguration
CaseStudy10:OSPFMetricsandShortestPathCalculation
11 IS-IS
IntroductionandHistoricalBackground
HistoryofIS-IS
SampleNetwork
IS-ISTerminology
Link-StateProtocolFundamentalsandIntroductiontoIS-IS
DistributionbyFlooding,Aging,andReflooding
HierarchicalRouting
PseudonodesandDesignatedRoutersonBroadcastLANs
SPF-BasedRouteCalculation
ISOAddressing
FragmentationofLargeLSPs
OSIModelandtheIS-ISStack
IS-ISPacketTypes
IS-ISTLVTypes
TroubleshootingIS-IS
CaseStudy:BrokenIS-ISAdjacency
CaseStudy:UnintentionallyInjecting100,000Prefixes
intoIS-IS
CaseStudy:LeakingLevel2PrefixesintoLevel1
CaseStudy:LeakingExternalLevel1Prefixesintolevel2
12 InterdomainRoutingTheory
BGPOverview
HistoryofBGP
WhatIsDifferentAboutBGPv47
WhyUseTCPasaTransport?
Peering
BGPMessageTypes
Finite-StateMachine
RoutingInformationBases(RIBs)
IBGPandEBGPBasics
ProtocolDifferences
BGPDecisionProcess
BGPBasics
Attributes
AttributeClasses
Multihop
Multipath
Aggregation
Synchronization
CapabilitiesAdvertisement
ScalingBGP
TheIBGPFull-MeshProblem
RouteReflection
Confederations
ResolvingBGPNext-HopAddresses
Next-HopSelfPolicy
PassiveInterface
StaticRoutes
ExportDirect
Hot-PotatoRouting
Damping
FigureofMerit
SuppressThreshold
Half-LifeforExponentialDecay
ReuseThreshold
MaximumSuppress
InternalBGPTimers
NewBGPv4KnobsandFeatures
MultiprotocolExtensionsforBGPv4
ExtendedCommunities
RouteRefresh
CooperativeRoute-FilteringCapability
GracefulRestartMechanismforBGP
13 InterdomainRoutingCaseStudies
BasicBGPConfigurationandBestPractices
ISPDesignUsingRoutingPolicyforBGPControl
ExportingRoutes
ImportingRoutes
LoadBalancingwithBGP
LoadBalancingwithEBGPUsingMultipath
LoadBalancingwithIBGPUsingMultipath
LoadBalancingwithBGPUsingMultihop
RouteReflectionandPathSelectioninaMulti-VendorNetwork
IssueswithRouteReflectionandnext-hop-self
PersistentRouteOscillationwithRouteReflection
FirstUpdate
SecondUpdate
ThirdUpdate
FourthUpdate
FifthUpdate
PreventionofPersistentRouteOscillation
UsingConfederationsforBGPScalability
BGPintheEnterprise
ExistingNetworkConnectivity
NewNetworkDesign
DefaultRoutes
14 IntroductiontoMPLS
HistoryofMPLS
CellSwitchRouterandIPSwitch
ARIS
TagSwitching
MPLS
JUNOSSoftwareandMPLS
OverviewofMPLS
Multi-ProtocolLabelSwitchingTerminology
StructureoftheMPLSLabel
DistributionofLabels
StaticLSPs
SignaledLSPs
RSVPProtocol
RSVPSignaledLSPs
TrafficProtection
AdvancedRouteResolution
MPLSLoadBalancing
TheLabelDistributionProtocol
15 IntroductiontoMPLSVirtualPrivateNetworks
2547bisMPLSVirtualPrivateNetworks
2547bisMPLSVPNComponents
2547bisMPLSVPNOperation
AdditionalNoteson2547bisMPLSVPN
CircuitCross-Connect
MPLSTunnelCross-Connect
LSPStitchingCross-Connect
Layer2MPLSVirtualPrivateNetworks
Layer2MPLSVPNComponents
Layer2MPLSVPNOperation
16 InternetProcessorIIandFirewallFilters
OverviewofIP2FeaturesandCapabilities
“PerformanceWithoutCompromise”
OverviewofIP2FirewaUFeatures
RateLimitingwiththeIP2
FilterBasedForwarding
LoggingandStatisticalSampling
TheIP2andNon-InternetProtocols
IP1vs.IP2:FeaturesSummary
DeterminingWhetherYourRouterIsIP2Equipped
FirewallFilterSyntaxandOperation
StatefulInspectionvs.PacketFiltering
IP,TCP,andUDPStructuralandOperationalReview
JUNOSFirewallSyntaxandProcessingRules
TheNeedforMultipleTermsinaFirewallFilter
TheJUNOSFirewallfromStatement
TheJUNOSFirewallthenStatement
ResequencingandDeletingFirewaUTerms
ApplyingJUNOSFirewallFilters
CaseStudy1:RoutingEngineProtection
SecurityModels:Permissivevs.Prudent
WhatShouldBeAllowed?
FilterDirection
FilterConstructionandApplication
FilterVerification
CaseStudy2:TransitFiltering
FirewallRequirements
FilterAnalysisandVerification
IP2RateLimiting
Shapingvs.Policing
IP2RateLimitingSyntaxandProcessing
CaseStudy3:RateLimiting
PolicerRequirements
PolicerConfigurationandVerification
IP2StatisticalSampling
TheNeedforStatisticalSampling
SamplingConfiguration
CaseStudy4:StatisticalSampling
TheSamplingFilter
ForwardingOptions
SamplingVerificationandAnalysis
TheNeedforPostProcessing
CaseStudy5:TracingandMinimizingDoSAttacks
TheInitialFilter
LogAnalysisandFilterModification
Index