Atjaunināt sīkdatņu piekrišanu

Juniper MX Series 2e [Mīkstie vāki]

4.33/5 (11 ratings by Goodreads)
  • Formāts: Paperback / softback, 1140 pages, height x width x depth: 236x179x59 mm, weight: 1906 g
  • Izdošanas datums: 18-Oct-2016
  • Izdevniecība: O'Reilly Media
  • ISBN-10: 1491932724
  • ISBN-13: 9781491932728
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 62,54 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 73,58 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 1140 pages, height x width x depth: 236x179x59 mm, weight: 1906 g
  • Izdošanas datums: 18-Oct-2016
  • Izdevniecība: O'Reilly Media
  • ISBN-10: 1491932724
  • ISBN-13: 9781491932728
Citas grāmatas par šo tēmu:
Discover why routers in the Juniper MX Series-with their advanced feature sets and record-breaking scale-are so popular among enterprises and network service providers. This revised and expanded edition shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using advanced firewall filters, redundant inline services, powerful CoS tool sets, and many other Juniper MX features. This second edition was written by a Senior NOC Engineer, whose vast experience with the MX Series is well documented. Each chapter covers a specific Juniper MX vertical and includes review questions to help you test what you've learned. This edition includes new chapters on load balancing and vMX-Juniper MX's virtual instance. Discover Junos architecture, MX chassis, and Trio Linecards Work with Juniper MX's bridging, VLAN VXLAN, and virtual switches Create a firewall filter framework and discover the latest flexible filtering options Secure your router and add an extra layer of security with Junos DDOS protection and SCFD feature Discover the advantages of hierarchical scheduling, ingress queuing, and flexible remarking Combine Juniper MX routers, using a virtual chassis or MC-LAG Understand and use classical and advanced Trio Chipset's load balancing features Dive into Trio inline services such as inline NAT, redundant logical tunnel, or filter-based GRE tunnel Discover vMX internal architecture and explore the benefits and typical use case of a virtual router
Preface xv
1 Juniper MX Architecture 1(90)
Junos OS
3(17)
One Junos
3(1)
Software Releases
3(1)
Junos Continuity-JAM
4(2)
Software Architecture
6(9)
Routing Sockets
15(2)
Junos OS Modernization
17(3)
Juniper MX Chassis
20(19)
vMX
21(1)
MX80
22(2)
Midrange
24(1)
MX104
25(2)
MX240
27(1)
MX480
28(2)
MX960
30(3)
MX2010 and MX2020
33(6)
Trio
39(10)
Trio Architecture
40(1)
Trio Generations
41(1)
Buffering Block
42(1)
Lookup Block
43(3)
Interfaces Block
46(3)
Dense Queuing Block
49(1)
Line Cards and Modules
49(22)
Dense Port Concentrator
50(1)
Modular Port Concentrator
51(14)
Packet Walkthrough
65(4)
Modular Interface Card
69(1)
Network Services
69(2)
Switch and Control Board
71(15)
Ethernet Switch
73(3)
Switch Fabric
76(1)
MX Switch Control Board
77(5)
Enhanced MX Switch Control Board
82(2)
J-Cell
84(2)
Summary
86(2)
Chapter Review Questions
88(2)
Chapter Review Answers
90(1)
2 Bridging, VLAN Mapping, IRB, and Virtual Switches 91(102)
Isn't the MX a Router?
91(2)
Layer 2 Networking
93(5)
Ethernet II
93(2)
IEEE 802.1Q
95(1)
IEEE 802.1QinQ
96(2)
Junos Interfaces
98(2)
Interface Bridge Configuration
100(3)
Basic Comparison of Service Provider Versus Enterprise Style
100(3)
Service Provider Interface Bridge Configuration
103(12)
Tagging
104(4)
Encapsulation
108(4)
Service Provider Bridge Domain Configuration
112(3)
Enterprise Interface Bridge Configuration
115(6)
Interface Mode
115(4)
VLAN Rewrite
119(2)
Service Provider VLAN Mapping
121(12)
Stack Data Structure
121(1)
Stack Operations
122(3)
Stack Operations Map
125(2)
Tag Count
127(1)
Bridge Domain Requirements
128(1)
Example: Push and Pop
129(1)
Example: Swap-Push and Pop-Swap
130(3)
Bridge Domains
133(34)
Learning Domain
134(3)
Bridge Domain Modes
137(16)
VLAN Normalization and Rewrite Operations
153(1)
Bridge Domain Options
154(7)
Show Bridge Domain Commands
161(2)
Clear MAC Addresses
163(2)
MAC Accounting
165(2)
Integrated Routing and Bridging
167(4)
IRB Attributes
168(3)
Virtual Switch
171(5)
Configuration
171(5)
VXLAN
176(12)
VXLAN as a Layer 2 Overlay
176(4)
VXLAN on MX Series
180(8)
Summary
188(1)
Chapter Review Questions
189(2)
Chapter Review Answers
191(2)
3 Stateless Filters, Hierarchical Policing, and Tri-Color Marking 193(112)
Firewall Filter and Policer Overview
194(16)
Stateless Versus Stateful
194(2)
Stateless Filter Components
196(8)
Filters Versus Routing Policy
204(1)
Filter Scaling
205(4)
Filtering Differences for MPC Versus DPC
209(1)
Filter Operation
210(7)
Stateless Filter Processing
210(7)
Policing
217(23)
Rate Limiting: Shaping or Policing?
217(5)
Junos Policer Operation
222(4)
Cascaded Policers
226(2)
Single and Two-Rate Three-Color Policers
228(8)
Hierarchical Policers
236(4)
Applying Filters and Policers
240(23)
Filter Application Points
240(6)
Applying Policers
246(16)
Policer Context Summary
262(1)
Policer Application Restrictions
263(1)
Advanced Filtering Features
263(12)
Enhanced Filter Mode
263(1)
flexible-match Filter
264(5)
Fast Lookup Filter
269(6)
Advanced Filtering Summary
275(1)
Bridge Filtering Case Study
275(19)
Filter Processing in Bridged and Routed Environments
275(2)
Monitor and Troubleshoot Filters and Policers
277(7)
Bridge Family Filter and Policing Case Study
284(10)
Bridge Filtering Summary
294(1)
Service Provider DDOS Filtering Case Study
294(6)
Summary
300(1)
Chapter Review Questions
301(2)
Chapter Review Answers
303(2)
4 Routing Engine Protection and DDoS Prevention 305(108)
RE Protection Case Study
305(41)
IPv4 RE Protection Filter
306(26)
IPv6 RE Protection Filter
332(14)
DDoS Protection Case Study
346(21)
The Issue of Control Plane Depletion
347(1)
DDoS Operational Overview
347(11)
DDoS Configuration and Operational Verification
358(9)
DDoS Case Study
367(7)
The Attack Has Begun!
368(6)
Suspicious Control Flow Detection
374(14)
SCFD Vocabulary
376(1)
Configure Flow Detection
377(2)
Case Study: Suspicious Flow Detection
379(8)
Suspicious Control Flow Detection Summary
387(1)
Mitigate DDoS Attacks
388(7)
BGP Flow-Specification to the Rescue
388(6)
What's New in the World of Flow-Spec?
394(1)
BGP Flow-Specification Case Study
395(13)
Let the Attack Begin!
399(9)
Summary
408(1)
Chapter Review Questions
409(1)
Chapter Review Answers
410(3)
5 Trio Class of Service 413(250)
MX CoS Capabilities
414(14)
Port Versus Hierarchical Queuing MPCs
415(4)
CoS Capabilities and Scale
419(9)
Trio CoS Flow
428(19)
Intelligent Oversubscription
429(2)
The Remaining CoS Packet Flow
431(1)
CoS Processing: Port- and Queue-Based MPCs
431(11)
Key Aspects of the Trio CoS Model
442(4)
Trio CoS Processing Summary
446(1)
Hierarchical CoS
447(45)
The H-CoS Reference Model
448(1)
Level 4: Queues
449(3)
Level 3: IFL
452(4)
Level 2: IFL-Sets
456(4)
Level 1: IFD
460(1)
Remaining
460(6)
Interface Modes and Excess Bandwidth Sharing
466(17)
Priority-Based Shaping
483(2)
Fabric CoS
485(2)
Control CoS on Host-Generated Traffic
487(4)
H-CoS Summary
491(1)
Per-VLAN Queuing for Non-Queuing MPCs
492(9)
Per-Unit Scheduler Case Study on MPC4e
494(7)
Per-Unit Scheduling for Non-Q MPC Summary
501(1)
Trio Scheduling and Queuing
501(40)
Scheduling Discipline
502(2)
Scheduler Priority Levels
504(8)
Scheduler Modes
512(19)
H-CoS and Aggregated Ethernet Interfaces
531(3)
Schedulers, Scheduler Maps, and TCPs
534(7)
Trio Scheduling and Priority Summary
541(1)
MX Trio CoS Defaults
541(4)
Four Forwarding Classes, but Only Two Queues
541(2)
Default BA and Rewrite Marker Templates
543(2)
MX Trio CoS Defaults Summary
545(1)
Flexible Packet Rewrite
545(8)
Policy Map Summary
553(1)
Predicting Queue Throughput
553(19)
Where to Start?
554(3)
Trio CoS Proof-of-Concept Test Lab
557(15)
Predicting Queue Throughput Summary
572(1)
CoS Lab
572(60)
Configure Unidirectional CoS
573(22)
Verify Unidirectional CoS
595(23)
Confirm Scheduling Behavior
618(14)
Add H-CoS for Subscriber Access
632(23)
Configure H-CoS
637(4)
Verify H-CoS
641(13)
Trio CoS Summary
654(1)
Chapter Review Questions
655(4)
Chapter Review Answers
659(4)
6 MX Virtual Chassis 663(56)
What Is Virtual Chassis?
663(28)
MX-VC Terminology
665(1)
MX-VC Use Case
666(2)
MX-VC Requirements
668(1)
MX-VC Architecture
669(12)
MX-VC Interface Numbering
681(2)
MX-VC Packet Walkthrough
683(2)
Virtual Chassis Topology
685(1)
Mastership Election
686(1)
Preserving VCP Bandwidth
687(3)
Summary
690(1)
MX-VC Configuration
691(13)
Chassis Serial Number
691(1)
Member ID
692(1)
R1 VCP Interface
693(1)
Routing Engine Groups
694(2)
Virtual Chassis Configuration
696(2)
R2 VCP Interface
698(2)
Virtual Chassis Verification
700(2)
Revert to Standalone
702(1)
Summary
703(1)
VCP Interface Class of Service
704(11)
VCP Traffic Encapsulation
704(1)
VCP Class of Service Walkthrough
704(2)
Forwarding Classes
706(1)
Schedulers
707(2)
Classifiers
709(1)
Rewrite Rules
710(1)
Final Configuration
711(3)
Verification
714(1)
Summary
715(1)
Chapter Review Questions
716(1)
Chapter Review Answers
717(2)
7 Trio Load Balancing 719(42)
Junos Load Balancing Overview
719(7)
Per-Prefix Versus Per-Flow Load Balancing
720(1)
Hashing
721(1)
Hash Computation
721(1)
The Next-Hop
722(4)
Junos Load Balancing Summary
726(1)
Trio Load Balancing and Backward Compatibility
726(14)
Host Outbound Load Balancing
727(1)
Configure Per-Family Load Balancing
727(11)
Family and Enhanced Hash Field Summary
738(1)
What About Multicast?
738(2)
Advanced Load Balancing
740(17)
The Problem of Polarization
740(2)
Symmetric Load Balancing
742(2)
Consistent Hashing
744(4)
Adaptive Load Balancing
748(9)
Summary
757(1)
Chapter Review Questions
758(2)
Chapter Review Answers
760(1)
8 Trio Inline Services 761(80)
What Are Trio Inline Services?
761(1)
J-Flow
762(15)
J-Flow Evolution
763(1)
Inline IPFIX Performance
763(1)
Inline IPFIX Software Architecture
764(2)
Inline IPFIX Configuration
766(9)
Inline IPFIX Verification
775(2)
IPFIX Summary
777(1)
Network Address Translation
777(20)
Types of NAT
777(2)
Services Inline Interface
779(1)
Service Sets
780(15)
Destination NAT Configuration
795(2)
Network Address Translation Summary
797(1)
Tunnel Services
797(27)
Enabling Tunnel Services
798(3)
A Tunneled Packet Walkthrough
801(2)
Tunnel Services Redundancy
803(6)
Inline GRE with Filter-Based Tunnel
809(2)
Case Study: Traffic Mitigation Based on GRE Filter-Based Tunnel
811(4)
Case Study: Interconnect Logical and Physical Routers
815(9)
Tunnel Services Summary
824(1)
Port Mirroring
824(9)
Port Mirror Supported Families
826(1)
Port Mirroring Case Study
827(5)
Port Mirroring Summary
832(1)
Layer 2 Analyzer
833(5)
Layer 2 Analyzer Configuration
833(3)
Layer 2 Analyzer Case Study
836(2)
Layer 2 Analyzer Summary
838(1)
Summary
838(1)
Chapter Review Questions
838(2)
Chapter Review Answers
840(1)
9 Multi-Chassis Link Aggregation 841(80)
Multi-Chassis Link Aggregation
841(6)
MC-LAG State Overview
843(1)
MC-LAG Family Support
844(1)
Multi-Chassis Link Aggregation Versus MX Virtual Chassis
845(2)
MC-LAG Summary
847(1)
Inter-Chassis Control Protocol
847(17)
ICCP Hierarchy
848(2)
ICCP Topology Guidelines
850(1)
How to Configure ICCP
851(6)
ICCP Configuration Guidelines
857(6)
ICCP Split Brain
863(1)
ICCP Summary
864(1)
MC-LAG Modes
864(9)
Active-Standby
865(2)
Active-Active
867(5)
MC-LAG Modes Summary
872(1)
Case Study
873(44)
Logical Interfaces and Loopback Addressing
874(1)
Layer 2
875(14)
Layer 3
889(6)
MC-LAG Configuration
895(13)
Connectivity Verification
908(9)
Case Study Summary
917(1)
Summary
917(1)
Chapter Review Questions
918(1)
Chapter Review Answers
919(2)
10 Junos High Availability on MX Routers 921(120)
Junos High-Availability Feature Overview
921(2)
Graceful Routing Engine Switchover
923(19)
The GRES Process
924(4)
Configure GRES
928(13)
GRES Summary
941(1)
Graceful Restart
942(21)
GR Shortcomings
942(1)
Graceful Restart Operation: OSPF
943(5)
Graceful Restart and Other Routing Protocols
948(5)
Configure and Verify OSPF GR
953(10)
Graceful Restart Summary
963(1)
Nonstop Routing and Bridging
963(52)
Replication, the Magic That Keeps Protocols Running
964(6)
Nonstop Bridging
970(2)
Current NSR/NSB Support
972(6)
This NSR Thing Sounds Cool: So What Can Go Wrong?
978(6)
Configure NSR and NSB
984(2)
Verify NSR and NSB
986(28)
NSR Summary
1014(1)
In-Service Software Upgrades
1015(9)
ISSU Operation
1015(5)
ISSU Layer 3 Protocol Support
1020(1)
ISSU Layer 2 Support
1021(1)
ISSU: A Double-Edged Knife
1021(3)
ISSU Summary
1024(1)
ISSU Lab
1024(11)
Verify ISSU Readiness
1026(2)
Perform an ISSU
1028(7)
Summary
1035(1)
Chapter Review Questions
1036(2)
Chapter Review Answers
1038(3)
11 The Virtual MX 1041(44)
Why Use vMX and for What Purpose?
1041(9)
Physical or Virtual
1042(1)
Benefits of Using vMX
1043(2)
Deployments to Use with vMX
1045(5)
A Technical Overview of vMX
1050(5)
Several vMX Instances per Server
1051(2)
Network Virtualization Techniques for vMX
1053(1)
vMX Licensing
1053(2)
Summary
1055(1)
vMX and the Virtual World
1055(10)
Virtualization Concepts
1057(8)
Summary
1065(1)
Resources for Installing vMX for Lab Simulation
1065(3)
vMX Initial Configuration
1066(2)
Technical Details of the vMX
1068(13)
VCP/VFP Architecture
1069(7)
vMX Packet Walkthrough
1076(3)
The vMX QoS Model
1079(2)
Summary
1081(1)
Chapter Review Questions
1082(1)
Chapter Review Answers
1083(2)
Index 1085
Douglas Richard Hanks Jr. is a Data Center Architect with Juniper Networks and focuses on solution architecture. Previously he was a Senior Systems Engineer with Juniper Networks supporting large enterprise accounts such as Chevron, HP, and Zynga. He is certified with Juniper Networks as JNCIE-ENT #213 and JNCIE-SP #875. Douglas' interests are network engineering and architecture for enterprise and service provider technologies. He is the author of several Day One books published by Juniper Networks Books. Douglas is also the co-founder of the Bay Area Juniper Users Group (BAJUG). When he isn't busy with networking, Douglas enjoys computer programming, photography, and Arduino hacking. Douglas can be reached at doug@juniper.net or on Twitter @douglashanksjr. Harry Reynolds has over thirty years experience in the networking industry, with the last 20 years focused on LANs and LAN interconnection. He is CCIE # 4977, and JNCIE # 3, and also holds various other industry and teaching certifications. Harry was a contributing author to Juniper Network Complete Reference (McGraw-Hill, 2002), and wrote the JNCIE and JNCIP Study Guides (Sybex Books, 2003). As a co-author he wrote Junos Enterprise Routing and Junos Enterprise Switching (O'Reilly, 2007 and 2009 respectively). Prior to joining Juniper, Harry served in the US Navy as an Avionics Technician, worked for equipment manufacturer Micom Systems, and spent much time developing and presenting hands-on technical training curriculums targeted to both enterprise and service provider needs. Harry has developed and presented internetworking classes for organizations such as American Institute, American Research Group, Hill Associates, and Data Training Resources. Currently Harry performs Customer Specific Testing that simulates one of the nation's largest private IP backbones at multi-dimensional scale. When the testing and writing is done, a rare event to be sure, Harry can be found in his backyard metal shop trying to make Japanese style blades. David Roy is a French network engineer who works for one of the major Service Provider in Europe. He works in a multivendor environment (Juniper, Cisco, Alcatel-Lucent) with a focus on Juniper equipment (he holds 3 JNCIE). He contributed to Day one books and wrote a This week book regarding MX.