JUNOS High Availability. Best Practices for High Network Uptime
- Autorzy:
- James Sonderegger, Orin Blomberg, Kieran Milne
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 690
- Dostępne formaty:
-
ePubMobi
Opis ebooka: JUNOS High Availability. Best Practices for High Network Uptime
Whether your network is a complex carrier or just a few machines supporting a small enterprise, JUNOS High Availability will help you build reliable and resilient networks that include Juniper Networks devices. With this book's valuable advice on software upgrades, scalability, remote network monitoring and management, high-availability protocols such as VRRP, and more, you'll have your network uptime at the five, six, or even seven nines -- or 99.99999% of the time.
Rather than focus on "greenfield" designs, the authors explain how to intelligently modify multi-vendor networks. You'll learn to adapt new devices to existing protocols and platforms, and deploy continuous systems even when reporting scheduled downtime. JUNOS High Availability will help you save time and money.
- Manage network equipment with Best Common Practices
- Enhance scalability by adjusting network designs and protocols
- Combine the IGP and BGP networks of two merging companies
- Perform network audits
- Identify JUNOScripting techniques to maintain high availability
- Secure network equipment against breaches, and contain DoS attacks
- Automate network configuration through specific strategies and tools
This book is a core part of the Juniper Networks Technical Library™.
Wybrane bestsellery
-
W książce Head First. Sieci komputerowe. Edycja polska znajdziesz nie tylko odpowiedzi na nurtujące Cię pytania dotyczące sieci komputerowych, ale także ich klarowne i szczegółowe objaśnienie. Wyróżniającą cechą tego bogato ilustrowanego podręcznika jest przełożenie wiadomości teoretycznych na pr...(24.90 zł najniższa cena z 30 dni)
39.50 zł
79.00 zł(-50%) -
The book will cover the practical guide to becoming a network architect, helping you build expertise in networking engineering skills, fabric layout design, collaboration with stakeholders, and essential certifications for success in the field.
Network Architect's Handbook. An expert-led journey to building a successful career as a network architect Network Architect's Handbook. An expert-led journey to building a successful career as a network architect
-
This advanced guide takes you through the well-architected delivery landscape for Salesforce projects, offering strategic insights and practical solutions. It empowers architects to accelerate deployments with automation and measure success.
Salesforce DevOps for Architects. Discover tools and techniques to optimize the delivery of your Salesforce projects Salesforce DevOps for Architects. Discover tools and techniques to optimize the delivery of your Salesforce projects
-
This practical guide enables you to implement DevOps best practices while building systems with automation and reusability in mind. You’ll learn the modern-day infrastructure design best practices needed to create an impact on data-persistent technologies.
DevOps for Databases. A practical guide to applying DevOps best practices to data-persistent technologies DevOps for Databases. A practical guide to applying DevOps best practices to data-persistent technologies
-
Implementing CI/CD Using Azure Pipelines contains everything you need to automate your CI/CD pipelines using Microsoft Azure. You’ll learn how to efficiently manage your CI/CD pipelines, deploy your apps, and set up workflow pipelines on Azure DevOps portal.
Implementing CI/CD Using Azure Pipelines. Manage and automate the secure flexible deployment of applications using real-world use cases Implementing CI/CD Using Azure Pipelines. Manage and automate the secure flexible deployment of applications using real-world use cases
-
This book is for software and IT professionals seeking knowledge on Linux systems and DevOps practices. This book will provide you with guidance and tools to learn and gain proficiency in managing Linux-based infrastructures and knowledge of DevOps.
The Linux DevOps Handbook. Customize and scale your Linux distributions to accelerate your DevOps workflow The Linux DevOps Handbook. Customize and scale your Linux distributions to accelerate your DevOps workflow
-
This practical guide helps you explore the pentesting of Microsoft infrastructure in detail, and enhances your offensive skillset by showing you the different ways to perform security assessment. This book will help blue teamers and IT engineers get up to speed with possible security issues they ...
Pentesting Active Directory and Windows-based Infrastructure. A comprehensive practical guide to penetration testing Microsoft infrastructure Pentesting Active Directory and Windows-based Infrastructure. A comprehensive practical guide to penetration testing Microsoft infrastructure
Ebooka "JUNOS High Availability. Best Practices for High Network Uptime" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "JUNOS High Availability. Best Practices for High Network Uptime" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "JUNOS High Availability. Best Practices for High Network Uptime" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-14-493-7944-5, 9781449379445
- Data wydania ebooka:
- 2009-08-18 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 9.3MB
- Rozmiar pliku Mobi:
- 9.3MB
Spis treści ebooka
- JUNOS High Availability
- SPECIAL OFFER: Upgrade this ebook with OReilly
- Preface
- What Is High Availability?
- How to Use This Book
- Whats in This Book?
- Part I
- Part II
- Part III
- Part IV
- Conventions Used in This Book
- Using Code Examples
- Safari Books Online
- Comments and Questions
- Acknowledgments
- I. JUNOS HA Concepts
- 1. High Availability Network Design Considerations
- Why Mention Cost in a Technical Book?
- A Simple Enterprise Network
- Redundancy and the Layered Model
- Redundant Site Architectures
- Redundant Component Architectures
- Combined Component and Site-Redundant Architectures
- Redundant System Architectures
- Combined System- and Site-Redundant Architectures
- Combined System- and Component-Redundant Architectures
- Combined System-, Component-, and Site-Redundant Architectures
- What Does It All Mean?
- 1. High Availability Network Design Considerations
- 2. Hardware High Availability
- Divide and Conquer
- The Brains: The Routing Engine
- RE comparison
- M Series
- MX Series
- T Series
- EX Series
- SRX Series
- J Series
- RE comparison
- The Brains: The Routing Engine
- The Brawn: The Packet Forwarding Engine
- Hardware components
- Model comparison
- M Series
- MX Series
- T Series
- EX Series
- SRX Series
- J Series
- Divide and Conquer
- Packet Flows
- M Series
- MX Series
- T Series
- EX Series
- SRX Series
- J Series
- Redundancy and Resiliency
- M Series
- MX Series
- T Series
- J Series
- SRX Series
- EX Series
- 3. Software High Availability
- Software Architecture
- Stable Foundations
- Modular Design
- Daemons
- Software Architecture
- One OS to Rule Them
- Single OS
- Forks and trains
- No reeducation through labor
- Single OS
- One Release Architecture
- Automation of Operations
- Configuration Management
- Application Programming Interfaces
- Scripting
- Commit scripts
- Operation scripts
- Event policy scripts
- 4. Control Plane High Availability
- Under the Hood of the Routing Engine
- Routing Update Process
- Step 1: Verify that the RE and PFEs are up
- Step 2: Verify that the socket is built
- Step 3: Verify that there is a valid TNP communication
- Step 4: Verify that BGP adjacencies are established
- Step 5: Verify that BGP updates are being received
- Step 6: Verify that route updates are processed correctly
- Step 7: Verify that the correct next hop is being selected
- Step 8: Verify that the correct copy of the route is being selected for kernel update
- Step 9: Verify that the correct copy of the route is being sent to the forwarding plane
- Step 10: Verify that the correct copy of the route is being installed into the forwarding plane on the PFE complex
- Routing Update Process
- Under the Hood of the Routing Engine
- Graceful Routing Engine Switchover
- Implementation and Configuration
- Configuration examples
- Troubleshooting GRES
- Implementation and Configuration
- Graceful Restart
- Graceful Restart in OSPF
- Configuration
- Immunizing against topology change
- Graceful Restart in OSPF
- Graceful Restart in IS-IS
- Configuration
- Graceful Restart in BGP
- Restarting the node
- Peers
- Configuration
- MPLS Support for Graceful Restart
- Graceful Restart in RSVP
- Configuration
- Graceful Restart in RSVP
- Graceful Restart in LDP
- Configuration
- Graceful Restart in MPLS-Based VPNs
- Configuration
- Graceful Restart in Multicast Protocols, PIM, and MSDP
- Non-Stop Active Routing
- Implementation Details and Configs
- Non-Stop Bridging
- Implementation Details and Configurations
- Choosing Your High Availability Control Plane Solution
- 5. Virtualization for High Availability
- Virtual Chassis in the Switching Control Plane
- VC Roles
- IDs for VCs
- Priorities and the Election Process
- How to rig an election
- Basic VC Setup and Configuration
- Eliminating Loops Within the VC
- Highly Available Designs for VCs
- Manipulating a split VC
- Server resilience with VCs
- Virtual Chassis in the Switching Control Plane
- Control System Chassis
- Requirements and Implementation
- Consolidation Example and Configuration
- Taking Consolidation to the Next Level: Scalable Route Reflection
- II. JUNOS HA Techniques
- 6. JUNOS Pre-Upgrade Procedures
- JUNOS Package Overview
- Software Package Naming Conventions
- When to Upgrade JUNOS in a High Availability Environment
- The Right Target Release for a High Availability Environment
- High Availability Upgrade Strategy
- Conduct a lab trial
- Choose the device to upgrade
- Ensure router steady state
- Save the working configuration
- System-archive a copy of the working configuration
- Establish a quarantine period
- JUNOS Package Overview
- 6. JUNOS Pre-Upgrade Procedures
- Pre-Upgrade Verifications
- Filesystems and Logs
- Checklist
- Moving Services Away from a Router
- Interface Configuration
- Switching Ownership of a VRRP Virtual IP
- IGP Traffic Control Tweaks
- OSPF and the overload bit
- Moving the designated router
- The overload bit and IS-IS
- Moving the DIS
- Label-Switched Paths
- RSVP-signaled LSPs
- 7. Painless Software Upgrades
- Snapshots
- Software Upgrades with Unified ISSU
- How It Works
- Implementation Details
- Configuration dependencies
- GRES configuration
- NSR configuration
- Configuration dependencies
- Software Upgrades Without Unified ISSU
- Loading a JUNOS Image
- Snapshots Redux
- Image Upgrade Tweaks and Options
- J Series Considerations
- Cleanup
- Backup Images
- Rescue Configuration
- 8. JUNOS Post-Upgrade Verifications
- Post-Upgrade Verification
- Device State
- Verify chassis hardware
- Check for alarms
- Verify interfaces
- Verify memory
- Device State
- Network State (Routes, Peering Relationships, and Databases)
- Verify routing
- Routing table consistency
- Post-Upgrade Verification
- State of Existing Services
- Filesystems and Logs
- Install logfiles
- Messages file
- Syslog settings
- Removal of Configuration Workarounds
- Fallback Procedures
- Applicability
- 9. Monitoring for High Availability
- I Love Logs
- Syslog Overview
- Facilities
- Severity
- Header and MSG parts
- Syslog Overview
- Syslog Planning
- Pitfalls
- I Love Logs
- Implementing Syslog
- Sample configuration
- Monitoring syslog
- Simple Network Management Protocol
- SNMP Overview
- Notification categories
- RMON alarms
- Health monitoring
- SNMP Overview
- SNMP Planning
- Implementing SNMP
- SNMPv3
- RMON
- Health monitoring
- Pitfalls
- Traffic Monitoring
- Traffic Monitoring Overview
- Traffic Monitoring Planning
- Implementing Traffic Monitoring
- Packet sampling
- Port mirroring
- Counters
- Route Monitoring
- Route Views
- Cyclops
- BGPlayer
- Pitfalls
- 10. Management Interfaces
- A GUI for Junior Techs
- Using J-Web
- J-Web for High Availability
- A GUI for Junior Techs
- Mid-Level Techs and the CLI
- Event Policy Planning
- Sample event policy configuration
- Event Policy Planning
- Event Policies for High Availability
- Deep Magic for Advanced Techs
- JUNOS APIs
- XSLT
- SLAX
- JUNOS APIs
- Automation Scripts
- Operation scripts
- Event scripts
- Working with Scripts
- Planning scripts
- Loading and calling scripts
- Refreshing scripts
- 11. Management Tools
- JUNOScope
- Overview
- JUNOScope and High Availability
- Looking Glass
- Configuration Manager
- Inventory Management System
- Software Manager
- Using JUNOScope
- JUNOScope installation
- JUNOScope
- Juniper AIS
- Overview
- AIS for High Availability
- Installation
- AIS planning
- Partner Tools
- Open IP Service Development Platform (OSDP)
- Partner Solution Development Platform (PSDP)
- 12. Managing Intradomain Routing Table Growth
- Address Allocation
- Interface Addressing
- JUNOS interface addressing syntax
- Interface Addressing
- Infrastructure Routes
- Customer Routes
- Virtual Router Redundancy Protocol
- Address Allocation
- Network Virtualization and Service Overlays
- Routing instances
- Logical routers
- Enable VLAN tagging in the primary logical router
- Configuring the service overlay
- Address Aggregation
- What Is Aggregation?
- Practical aggregation for a large domain
- Is there a risk?
- What Is Aggregation?
- Use of the Private Address Space
- Private addressing and internal services
- Private addressing and customer services
- Private addressing, NAT, and MIP
- Use of Public Address Space
- Static Routes
- When to configure static routes
- Using Protocol Tweaks to Control Routing Table Size
- IS-IS areas and levels
- OSPF areas
- 13. Managing an Interdomain Routing Table
- Enterprise Size and Effective Management
- Small to Medium-Size Enterprise Perspective
- Large Enterprises and Service Providers
- AS Number
- Enterprise Size and Effective Management
- Border Gateway Protocol (BGP)
- EBGP Loop Prevention
- IBGP Loop Prevention
- IBGP full-mesh requirements
- Implications of full mesh for high availability
- Alternatives to full mesh
- Route Reflection
- Route reflection basics
- High availability design considerations for route reflection
- Turning it on
- Route reflectors and policy configuration
- Route reflection and next-hop self: What not to do
- What is wrong with this picture?
- Be terrific; be specific
- Confederation
- Confederation syntax
- Implications of confederation for high availability
- Configuration for redundancy
- How does multihop affect my routing table?
- Common High Availability Routing Policies
- Local address filters
- Prefix-length enforcement
- Default routes: To block or not to block?
- Route damping
- A damp policy
- Implications of damping
- BGP Tweak: Prefix Limit
- Implications of route and prefix limits
- III. Network Availability
- 14. Fast High Availability Protocols
- Protocols for Optical Networks
- Ethernet Operations, Administration, and Maintenance (OAM)
- IEEE 802.1ah and 802.1ag
- Ethernet Operations, Administration, and Maintenance (OAM)
- SONET/SDH Automatic Protection Switching
- Protocols for Optical Networks
- 14. Fast High Availability Protocols
- Rapid Spanning Tree Protocol
- Interior Gateway Protocols
- Bidirectional Forwarding Detection
- Setting the Interval for BFD Control Packets
- Virtual Router Redundancy Protocol
- MPLS Path Protection
- Fast Reroute
- Node and Link Protection
- 15. Transitioning Routing and Switching to a Multivendor Environment
- Industry Standards
- Multivendor Architecture for High Availability
- Two Sensible Approaches
- Layered approach to multivendor networks
- CDA model
- PE-CE model
- Layered approach to multivendor networks
- Site-based approach to multivendor networks
- Two Sensible Approaches
- Multivendor As a Transition State
- Layered transitions
- Site-based transitions
- Routing Protocol Interoperability
- Interface Connectivity
- OSPF Adjacencies Between Cisco and Juniper Equipment
- OSPF authentication keys
- IBGP Peering
- EBGP Peering
- The BGP next hop issue
- The other issue
- Success
- 16. Transitioning MPLS to a Multivendor Environment
- Multivendor Reality Check
- Cost Concerns
- Multivendor Reality Check
- MPLS Signaling for High Availability
- A Simple Multivendor Topology
- RSVP Signaling
- Traffic engineering
- JuniperCisco RSVP
- Router r5 configuration
- LDP Signaling
- A few LDP implementation differences
- MPLS Transition Case Studies
- Case Study 1: Transitioning Provider Devices
- Phase 1: P router transition
- Phase 2: P router transition
- Phase 3: P router transition
- Final state: P router transition
- Case Study 1: Transitioning Provider Devices
- Case Study 2: Transitioning Provider Edge Devices
- Phase 1: PE router transition
- Phase 2: PE router transition
- Phase 3: PE router transition
- Phase 4: PE router transition
- Final state: PE router transition
- 17. Monitoring Multivendor Networks
- Are You In or Out?
- In-Band Management
- Out-of-Band Management
- OoB and fxp0
- Configuration groups for high availability
- Are You In or Out?
- SNMP Configuration
- JUNOS SNMP Configuration
- IOS SNMP Configuration
- SNMP and MRTG
- Syslog Configuration
- Syslog in JUNOS
- Syslog in IOS
- Syslog and Kiwi
- Configuration Management
- Configuration for AAA
- TACACS+
- JUNOS authentication
- IOS authentication
- JUNOS locally defined accounts and authorization
- IOS authorization
- JUNOS accounting (activity tracking)
- IOS accounting (activity tracking)
- TACACS+
- JUNOS GUI Support
- What IS Normal?
- 18. Network Scalability
- Hardware Capacity
- Device Resources to Monitor
- Control plane capacity best practices
- Data plane specifications
- Device Resources to Monitor
- Hardware Capacity
- Network Scalability by Design
- Scaling BGP for High Availability
- Route reflectors and clusters
- Whats the point?
- Scaling BGP for High Availability
- MPLS for Network Scalability and High Availability
- Basic LSP configuration syntax
- Secondary LSPs
- Hot standby
- Fast reroute
- Link and node-link protection
- Traffic Engineering Case Study
- 19. Choosing, Migrating, and Merging Interior Gateway Protocols
- Choosing Between IS-IS and OSPF
- OSPF
- Advantages
- Disadvantages
- High availability features for OSPF in JUNOS Software
- Link and node failure detection
- Authenticating packets
- Designated routers
- Graceful Restart
- Non-Stop Active Routing
- Overload
- Prefix limits
- Bidirectional Forwarding Detection
- OSPF
- IS-IS
- Advantages
- Disadvantages
- High availability features for IS-IS in JUNOS Software
- Link and node failure detection
- Authenticating packets
- Graceful Restart
- Non-Stop Active Routing
- Overload
- Prefix limits
- Bidirectional Forwarding Detection
- Choosing Between IS-IS and OSPF
- Which Protocol Is Better?
- A final thought
- Migrating from One IGP to Another
- Migrating from OSPF to IS-IS
- Step 1: Plan for the migration
- Step 2: Add IS-IS to the network
- Step 3: Make IS-IS the preferred IGP
- Step 4: Verify the success of the migration
- Step 5: Remove OSPF from the network
- Migrating from OSPF to IS-IS
- Migrating from IS-IS to OSPF
- Step 1: Plan for the migration
- Step 2: Add OSPF to the network
- Step 3: Make OSPF the preferred IGP
- Step 4: Verify the success of the migration
- Step 5: Remove IS-IS from the network
- Merging Networks Using a Common IGP
- Considerations
- Area design
- Matching configuration parameters
- Tunneling
- Considerations
- Other Options for Merging IGPs
- BGP
- Routing instances
- 20. Merging BGP Autonomous Systems
- Planning the Merge
- Architecture
- Making the choice
- Pitfalls
- External peering
- Route reflector 1
- Route reflector 2
- Oscillation commences
- Architecture
- Outcomes
- BGP Migration Features in JUNOS
- Graceful Restart
- Non-Stop Active Routing
- Full mesh made easy (well, easier)
- Zen and the art of AS numbers
- Sometimes loopy is OK
- Planning the Merge
- Merging Our ASs Off
- Merge with Full Mesh
- IBGP
- Bring in the EBGP peer
- Merge with Full Mesh
- Merge with Route Reflectors
- Cluster 1
- Cluster 2
- Merge with Confederations
- Monitoring the Merge
- Neighbor Peering
- Persistent route oscillation
- Neighbor Peering
- 21. Making Configuration Audits Painless
- Why Audit Configurations?
- Knowledge Is Power
- JUNOS: Configuration Auditing Made Easy
- Why Audit Configurations?
- Configuration Auditing 101
- Organizing the Audit
- Configuration modules
- Functional network areas
- Organization involvement
- Organizing the Audit
- Auditing Configurations
- Baseline Configurations
- Saving a baseline
- Baseline configuration with JUNOS groups
- Baseline configuration with commit scripts
- Baseline Configurations
- Manually Auditing Configurations
- Manual auditing through the GUI
- Manual auditing through the CLI
- Automating Configuration Audits
- Event policies
- JUNOScope
- Advanced Insight Solution
- Performing and Updating Audits
- Auditing Intervals
- Analyzing Updates
- Auditing Changes
- 22. Securing Your Network Equipment Against Security Breaches
- Authentication Methods
- Local Password Authentication
- RADIUS and TACACS+ Authentication
- Authentication Order
- Authentication Methods
- Hardening the Device
- Use a Strong Password, and Encrypt It
- Disable Unused Access Methods
- Control Physical Access to the Device
- Control Network Access to the Device
- Control and Authenticate Protocol Traffic
- Define Access Policies
- Firewall Filters
- Firewall Filter Syntax
- Match conditions
- Actions
- Evaluating filters
- Implicit discard
- Firewall Filter Syntax
- Applying Firewall Filters
- Using Firewall Filters to Protect the Network
- Spoof prevention
- Securing a web/FTP server
- The options are endless
- Using Firewall Filters to Protect the Routing Engine
- Stateful Firewalls
- 23. Monitoring and Containing DoS Attacks in Your Network
- Attack Detection
- Using Filtering to Detect Ping Attacks
- Using Filtering to Detect TCP SYN Attacks
- Attack Detection
- Taking Action When a DoS Attack Occurs
- Using Filtering to Block DoS Attacks
- Filter some, filter all
- Using Filtering to Block DoS Attacks
- Request Help from Your Upstream Provider
- Attack Prevention
- Eliminate Unused Services
- Enable Reverse Path Forwarding
- Use Firewall Filters
- Use Rate Limiting
- Deploy Products Specifically to Address DoS Attacks
- Gathering Evidence
- Firewall Logs and Counters
- Port Mirroring
- Sampling
- cflowd
- 24. Goals of Configuration Automation
- CLI Configuration Automation
- Hierarchical Configuration
- Protections for Manual Configuration
- User access
- Exclusive configuration
- Private configuration
- Transaction-Based Provisioning
- Standard commits
- Commit with scripts
- Persistent changes
- Transient changes
- Script processing
- CLI Configuration Automation
- Archives and Rollback
- Configuration stores
- Automating Remote Configuration
- 25. Automated Configuration Strategies
- Configuration Change Types
- Deployment
- Network equipment
- Services
- Deployment
- Infrastructure
- Ad Hoc Changes
- Workarounds
- One-off configurations
- Configuration Change Types
- Automation Strategies
- Global Strategies
- Deployment
- Hardware deployment
- Interfaces
- Routing engines
- Hardware deployment
- Service deployment
- Infrastructure
- Interfaces
- Routing
- Ad Hoc Changes
- Workarounds
- JUNOS issues
- External device issues
- Workarounds
- One-off workarounds
- IV. Appendixes
- A. System Test Plan
- Physical Inspection and Power On
- Check General System Status
- Check for Any Active Alarms
- Save the System Hardware Configuration for Future Reference
- Check Voltages and Temperatures
- Check the Status of the Individual Components
- Check Routing Engine and Storage Media
- Check Routing Engine Status
- Check Storage Media on Each Routing Engine
- A. System Test Plan
- Test Optical Interfaces
- Configure a Private IP Address and Run Ping Tests
- Run a loopback test on SONET/SDH interfaces
- Run a loopback test on Fast Ethernet and Gigabit Ethernet interfaces
- Configure a Private IP Address and Run Ping Tests
- Failover and Redundancy Tests
- Routing Engine Redundancy
- SFM Redundancy (M40e Platform Only)
- Final Burn-In Check
- Power Down the Router
- Power On the Router/Burn-In Test
- Final Checks and Power Down
- B. Configuration Audit
- Audit Responsibilities
- Audit Response Key
- Audit Checklist
- Audit Interval
- C. High Availability Configuration Statements
- Routing Engine and Switching Control Board
- cfeb
- description
- failover on-disk-failure
- failover on-loss-of-keepalives
- failover other-routing-engine
- feb (Creating a Redundancy Group)
- feb (Assigning a FEB to a Redundancy Group)
- keepalive-time
- no-auto-failover
- redundancy
- redundancy-group
- routing-engine
- sfm
- ssb
- Routing Engine and Switching Control Board
- Graceful Routing Engine Switchover
- graceful-switchover
- Nonstop Bridging Statements
- nonstop-bridging
- Nonstop Active Routing
- commit synchronize
- nonstop-routing
- traceoptions
- Graceful Restart
- disable
- graceful-restart
- helper-disable
- maximum-helper-recovery-time
- maximum-helper-restart-time
- maximum-neighbor-reconnect-time
- maximum-neighbor-recovery-time
- no-strict-lsa-checking
- notify-duration
- reconnect-time
- recovery-time
- restart-duration
- restart-time
- stale-routes-time
- traceoptions
- VRRP
- accept-data
- advertise-interval
- authentication-key
- authentication-type
- bandwidth-threshold
- fast-interval
- hold-time
- inet6-advertise-interval
- interface
- preempt
- priority
- priority-cost
- priority-hold-time
- route
- startup-silent-period
- traceoptions
- track
- virtual-address
- virtual-inet6-address
- virtual-link-local-address
- vrrp-group
- vrrp-inet6-group
- Unified In-Service Software Upgrade (ISSU)
- no-issu-timer-negotiation
- traceoptions
- Index
- About the Authors
- Colophon
- SPECIAL OFFER: Upgrade this ebook with OReilly
O'Reilly Media - inne książki
-
JavaScript gives web developers great power to create rich interactive browser experiences, and much of that power is provided by the browser itself. Modern web APIs enable web-based applications to come to life like never before, supporting actions that once required browser plug-ins. Some are s...(186.15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
How will software development and operations have to change to meet the sustainability and green needs of the planet? And what does that imply for development organizations? In this eye-opening book, sustainable software advocates Anne Currie, Sarah Hsu, and Sara Bergman provide a unique overview...(160.65 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
OpenTelemetry is a revolution in observability data. Instead of running multiple uncoordinated pipelines, OpenTelemetry provides users with a single integrated stream of data, providing multiple sources of high-quality telemetry data: tracing, metrics, logs, RUM, eBPF, and more. This practical gu...(143.65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
Interested in developing embedded systems? Since they don't tolerate inefficiency, these systems require a disciplined approach to programming. This easy-to-read guide helps you cultivate good development practices based on classic software design patterns and new patterns unique to embedded prog...(152.15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
If you use Linux in your day-to-day work, then Linux Pocket Guide is the perfect on-the-job reference. This thoroughly updated 20th anniversary edition explains more than 200 Linux commands, including new commands for file handling, package management, version control, file format conversions, an...(92.65 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Gain the valuable skills and techniques you need to accelerate the delivery of machine learning solutions. With this practical guide, data scientists, ML engineers, and their leaders will learn how to bridge the gap between data science and Lean product delivery in a practical and simple way. Dav...(245.65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł(-15%) -
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition off...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Decentralized finance (DeFi) is a rapidly growing field in fintech, having grown from $700 million to $100 billion over the past three years alone. But the lack of reliable information makes this area both risky and murky. In this practical book, experienced securities attorney Alexandra Damsker ...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Whether you're a startup founder trying to disrupt an industry or an entrepreneur trying to provoke change from within, your biggest challenge is creating a product people actually want. Lean Analytics steers you in the right direction.This book shows you how to validate your initial idea, find t...(126.65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
When it comes to building user interfaces on the web, React enables web developers to unlock a new world of possibilities. This practical book helps you take a deep dive into fundamental concepts of this JavaScript library, including JSX syntax and advanced patterns, the virtual DOM, React reconc...(194.65 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: JUNOS High Availability. Best Practices for High Network Uptime James Sonderegger, Orin Blomberg, Kieran Milne (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.