JUNOS OS For Dummies - Walter J. Goralski - E-Book

JUNOS OS For Dummies E-Book

Walter J. Goralski

4,6
20,99 €

oder
-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

Learn to use JUNOS to make your network reliable! Providing network administrators with a reliable network operating system, JUNOS software is an award-winning network operating system that focuses on security and the avoidance of down time. This easy-to-understand book starts with the basics of JUNOS and walks you through its features so that you can quickly learn how to set up, operate, and add key services. Since the various JUNOS features are constantly being updated to provide your network with the best security possible, this new edition shares must-know information, helpful advice, handy tips, and essential cautions for working with JUNOS. Plus, you'll find out how to set up a routing protocol that automates configuration of routing tables for greater efficiency and how you can set up individual or group user accounts locally on the route, or on remote centralized authentication servers. * Starts with the basics and introduces you to JUNOS * Explains how to connect, manage, and troubleshoot routers and other Juniper appliances * Offers tips for making your network more efficient and reveals essential cautions * Walks you through setting up, operating, and adding key services * Details ways to configure JUNOS default security features as well as restricted physical access to protect routers * Breaks down advanced concepts into easy-to-understand segments so you can build your knowledge gradually This new edition gets you started using the sophisticated features and techniques of JUNOS today.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 506

Veröffentlichungsjahr: 2011

Bewertungen
4,6 (16 Bewertungen)
11
4
1
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Junos® OS For Dummies®, 2nd Edition

Visit www.dummies.com/cheatsheet/junos to view this book's cheat sheet.

Table of Contents

Introduction
About This Book
Conventions Used in This Book
Foolish Assumptions
How This Book Is Organized
Part I: Discovering Junos OS
Part II: Setting Up Junos OS
Part III: Deploying a Device
Part IV: Running a Junos Network
Part V: The Part of Tens
Icons Used in the Book
Where to Go from Here
Part I: Discovering Junos OS
Chapter 1: Junos Is Everywhere You Need to Be
Functions of a Network OS
Control functions
Service functions
Forwarding functions
Taking Advantage of One Network OS
Taking a Peek Inside the Junos OS
World-class architecture
Plain smart: The planes of Junos OS
That’s not a problem: The many benefits of modular architecture
Developing Junos OS
Beyond the OS
Junos Space
Junos Pulse
Chapter 2: Jumping Into Junos
Jumpstart Instructions
Command-Line Essentials
A tale of two command modes
Knowing your location in the CLI
Saving time with typing shortcuts
Getting help
Defining How You Want Devices to Work
Understanding the configuration process
Creating and editing the configuration
Committing your configuration
Going Back to a Prior Configuration
Rolling back to a past configuration
Verifying the restored configuration
This Way to the Exit
Chapter 3: Operating Your Network with Junos
Exploring Operational Mode
Understanding the command hierarchy
Recognizing common utility commands
Displaying Output
Choosing your format
Tell me more
Using the pipe command tool
Using Onboard Instrumentation Tools
Monitoring the operations of your network
Logging and tracing events
Applying onboard automation
Exploring Junos Space
Service Now
Service Insight
Route Insight
Using the System Software
Restarting and requesting system-wide functions
Upgrading to new releases
Chapter 4: Migrating to Junos
Collapsing Switching Layers
Mountains of gear
Collapsing to a two-layer network
Virtual Chassis technology for collapsing layers
Scaling the Access Switching Layer
Top or end of row
Best of both design options
Virtual Chassis technology for scaling data center networks
Speeding Up the Data Center Network
A need for speed
Collapsing to a single layer network
QFabric as a one layer backbone
Securing the Infrastructure
Inbound and outbound threats
Meeting new security needs
Juniper security solutions
About the Devices Running Junos
Routers
Switches
Security Devices
Part II: Setting Up Junos OS
Chapter 5: Configuring the Device with the CLI and J-Web
Installing the Hardware and Software
Installing hardware for the MX80
Installing hardware for the MX960
Installing software for your network
Connecting to the Junos OS
Console connection
CLI interface
J-Web interface
Configuring Junos OS Devices with the CLI
Getting the configuration information
Configuring the device
Displaying set Commands
Making Changes to the Junos OS Configuration . . . Faster
Renaming a section of the configuration
Copying parts of the configuration
Replacing a part of the configuration
Inserting a configuration statement
Archiving Configurations
Using the rollback command
Restoring the full archive
Archiving manually from a server
Creating and saving configurations
Configuring Junos OS Devices with J-Web
Chapter 6: Setting Up Junos Devices
Understanding the Initial Configuration
Setting Up System Options
Configuring syslogs
Tracing routing events
Configuring User Accounts
Local user configuration
Authentication server user configuration
User configuration and permissions
Configuring the Management and Loopback Interfaces
Knowing the physical and logical interface properties
Configuring the management interface
Configuring the loopback interface
Configuring Network Interfaces
Configuring other Gigabit Ethernet properties
Configuring Other Options
Configuring a banner for login
Setting the time and time zone
Logging Out
Chapter 7: Managing Your Network with Junos OS
Choosing a Management Interface
Setting Up Out-of-Band Management
Setting Up In-Band Management
Accessing the Device
Accessing your device with Telnet
Accessing your device with SSH
Managing Devices with Simple Network Management Protocol
Monitoring a Device with System Logging
Digging into syslog messages
Mood music: Turning on logging
Viewing syslog messages
Filtering syslog to different files
Refining your access to events
Managing your log files
Monitoring a Device Using Trace Logging
Chapter 8: Monitoring Junos
Checking Host-to-Host
Tracerouting the Network
Using Diagnostic Commands
Monitoring your interfaces
Monitoring your routing information
Keeping an Eye on Latency
Real-time performance monitoring
Configuring RPM
Monitoring RPM tests
Chapter 9: Securing Your Junos OS Devices
Stop! Physical Security
Go! Junos Default Security Features
Encryption and hashing algorithms
Tighten the root login account
Checking Who’s on the Router
Knowing who’s logged in
Figuring out who’s configuring
Logging Out
Controlling SSH and Telnet Access to the Router
Limiting Traffic on Router Interfaces
Protecting the Routing Engine: A More Complete Strategy
Securing Routing Protocols
Securing RIP
Securing IS-IS and OSPF
Securing OSPF
Authenticating BGP peers
Enabling authentication on MPLS signaling protocols
Part III: Deploying a Device
Chapter 10: Deploying a Router
Understanding Network Routing
Dynamic routing protocols
Routing tables
Choosing the best route
Choosing the Next Hop
Routing, Bridging, and Switching
Layer 2: Bridging
Layer 3: Routing
(Layer 2) Switching
Running RIPv2
Running OSPF
Dividing an OSPF network into areas
Configuring and monitoring OSPF
Running IS-IS
Using IS-IS addresses only when needed
Minding your IS-IS areas
Configuring and monitoring IS-IS
Chapter 11: Deploying an EX Switch
Ethernet, VLANs, and Juniper EX-Series Switches
Understanding Ethernet
Understanding VLANs
Understanding LAN Switches
Setting Up the Switch
Racking the switch
Configuring the switch initially
Plugging devices into the switch
Connecting switches
Segmenting a LAN with VLANs
Configuring the default VLAN
Configuring more VLANs
Trunking together VLANs
Controlling access to VLANs
Interconnecting Switches with Virtual Chassis
Going virtual
Providing redundancy with Virtual Chassis
Using the Switch as a Router
Connecting to the Internet
Connecting to a router in your LAN
Chapter 12: Deploying Security with the SRX
Setting Up the SRX
Accessing the services gateway
Using the Network and Security Manager
Initial SRX console access
Understanding Flow Processing
Managing the System
Security zones
Security zones and interfaces
Writing Basic Security Policies
Multiple security policies
Configuring address books
Configuring services
Configuring the security policies
Verifying the policies
Configuring NAT Source Address Translation
Major NAT options
NAT configuration
Part IV: Running a Junos Network
Chapter 13: Working with Border Gateway Control
An Island of Their Own: Autonomous Systems
Making AS Connections
Configuring BGP
Monitoring BGP
Knowing why you can’t ping
Configuring routing policies that advertise routes
Using next-hop self
Pinging to the loopbacks
Configuring Route Reflection
Route reflectors on large networks
Route reflector configuration
Dual route reflectors for backup
Chapter 14: Working with Router Policies
Constructing Routing Policies
Working with terms
Match conditions
Match actions
Default actions
Application of policies
Evaluation of routing policies
Configuring Route Filters
Prefixes and prefix lengths
Match types
Match actions
Configuring an Aggregate Route
Chapter 15: Enabling Class of Service
Knowing What Pieces a C0S Configuration Requires
Classifying Inbound Traffic
Differentiated Services Code Points (DSCP)
Configuring BA classifiers
Controlling Outbound Traffic
Scheduler configuration
Shaping outbound traffic
Setting up outbound buffers
Configuring priority scheduling
Massaging BA Classifiers for Core Transit
Matching traffic based on the source address
Matching traffic based on destination port
Setting DSCP values for transit
Chapter 16: Using Multi-Protocol Level Switching
Packet-Switched Networking
Label switching
Label-switched paths
Label-switching routers
Labels
Label operations
Establishing Label-Switched Paths
Signaling Protocols
Configuring RSVP-Signaled LSPs
Enabling MPLS and RSVP
Enabling MPLS on your transit interfaces
Configuring an LSP
Verifying the LSPs
Placing Constraints on Packet Forwarding
Reserving bandwidth on an LSP
Verifying traffic using the LSP
Chapter 17: Operating and Troubleshooting Your Network
Identifying the Cause of Problems
System logging
SNMP polling
SNMP traps
CLI show commands
Implementing Controlled Change
Understanding Traffic Engineering
Troubleshooting Your Network
Issues at Layer 1 and Layer 2
Issues at Layer 3
End-to-end considerations
Part V: The Part of Tens
Chapter 18: Ten Most Used Junos Commands
Show Me the Version and Version Detail
Show Me the Chassis Hardware and Chassis Hardware Detail
Show Me and Confirm My Configuration
Back Up and Roll Back My Configurations
Show Me the Interfaces in the Device
Give Me More Detail About the Interfaces
Show Me Something About Routing
Give Me More Detail About Routing
Show Me Something About Switching
Show Me Details for Maintenance
Chapter 19: Ten Migration Tools
Junosphere Labs
Juniper Documents
Juniper Networks Books
Translators
Installation Guides and Training
J-Web
Junos Space Applications
Custom Commands
Professional Services
Chapter 20: Ten Help Resources
Using the Command-Line Interface Help Commands
Using Juniper Networks Technical Publications
Joining J-Net Forums
Finding Videos and Webcasts
Finding Books
Using the Knowledge Base
Taking Certification Courses
Getting Support
Contacting Customer Care
Contacting JTAC
Cheat Sheet

Junos® OS For Dummies®, 2nd Edition

by Walter Goralski, Cathy Gadecki, and Michael Bushong

Junos® OS For Dummies®, 2nd Edition

Published byJohn Wiley & Sons, Inc.111 River St.Hoboken, NJ 07030-5774

www.wiley.com

Copyright © 2011 by John Wiley & Sons, Inc.

Published by John Wiley & Sons, Inc., Hoboken, NJ

Published simultaneously in Canada

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Trademarks: Wiley, the John Wiley & Sons, Inc. logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc., and/or its affiliates in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book.

Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Website is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Website may provide or recommendations it may make. Further, readers should be aware that Internet Websites listed in this work may have changed or disappeared between when this work was written and when it is read.

For general information on our other products and services, please contact our Customer Care Department within the U.S. at 877-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002.

For technical support, please visit www.wiley.com/techsupport.

Wiley also publishes its books in a variety of electronic formats and by print-on-demand. Not all content that is available in standard print versions of this book may appear or be packaged in all book formats. If you have purchased a version of this book that did not include media that is referenced by or accompanies a standard print version, you may request this media by visiting http://booksupport.wiley.com. For more information about Wiley products, visit us at www.wiley.com.

Library of Congress Control Number: 2011937920

ISBN 978-0-470-89189-6 (pbk); ISBN 978-1-118-17373-2 (ebk); ISBN 978-1-118-17372-5 (ebk); ISBN 978-1-118-17374-9 (ebk)

Manufactured in the United States of America

10 9 8 7 6 5 4 3 2 1

About the Authors

Walter Goralski: Walter Goralski is a Senior Staff Engineer and Technical Writer at Juniper Networks, Inc. He has been involved in the networking field for more than forty years. His career has also included fifteen years as an Adjunct Professor at Pace University Graduate School of CS&IS. He is the author of more than ten books on networking topics, including a bestselling book on SONET/SDH. He is currently documenting Juniper Networks’ MobileNext line of products.

Cathy Gadecki: Supporting Junos product marketing for over four years at Juniper Networks, Ms. Gadecki has more than 20 years in marketing and product management positions with a focus on creating new markets for network equipment and services, for both startup and established firms. Ms. Gadecki is the co-author of ATM For Dummies (John Wiley & Sons, Inc.), which has been reprinted seven times and published in multiple languages. She earned her master’s degree in electrical engineering from the Georgia Institute of Technology with a focus on data communications.

Michael Bushong: A Senior Product Manager at Juniper Networks, Michael is tasked with managing Junos software. Michael has spent the past seven years working at Juniper Networks in several capacities. Originally hired to train Junos engineers on architectural, design, and application principles, Michael developed detailed materials covering everything from software architecture to broader applications deployed using Junos software. Michael has since transitioned to product management, where he has focused on the constant evolution of the operating system, spearheading major infrastructure efforts designed to scale the operating system to meet tomorrow’s needs. Having majored in mechanical engineering with a specialized focus on advanced fluid mechanics and heat transfer, Michael began his professional career working on research in aerodynamics. He has since spent time with databases at Sybase and, more recently, in ASIC design tools at both Synopsis and Magma Design Automation.

Dedication

Walter Goralski: To my wife Camille, the backbone of support in all my accomplishments.

Cathy Gadecki: To Steve and our five children.

Michael Bushong: To Stacy Prager, now Stacy Bushong, but not when I began writing the book. Thank you, Patrick Ames. And to Chloe and, of course, to Steve and Linda Bushong.

Authors’ Acknowledgments

The authors wish to thank the many people who helped bring about this book. Our in-house editor for both editions, Patrick Ames encouraged, guided, and coached us in so many different ways. Jonathan Looney helped with many suggestions and edits for our first edition. Our lead technical editor to the first edition, Mario Puras, tested and confirmed our configurations and output. A large group of Juniper field engineers reviewed the first edition and made invaluable suggestions for improvement: Pedro Cutillas, Christian Graf, Joe Green, Imran Khan, Stefan Lager, and Michael Pergament. On security matters, insight from Barney Sanchez helped us in how to present the new security topics included in the second edition, while Monear Jalal reviewed the first edition. On matters of switching, Yong Kim and David Nguyen helped us in how to present the new switching topics; Kishore Inampudi assisted in the Q-Fabric content; and Lenny Bonsall, Bobby Guhasarkar, Joseph Li, and Michael Peachy shared their expertise for our first edition. Other key subject matter experts checked our work and took our phone calls: Daniel Backman, David Boland, Atif Khan, Kannan Kothandaram, Mike Marshall, Ananth Nagarajan, Brian Pavane, Naren Prabhu, Doug Radcliff, Alan Sardella, and Don Wheeler.

We also wish to thank our John Wiley & Sons, Inc. editors, Katie Feltman, Colleen Totz Diamond, and Melba Hopper.

Publisher’s Acknowledgments

We’re proud of this book; please send us your comments at http://dummies.custhelp.com. For other comments, please contact our Customer Care Department within the U.S. at 877-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002.

Some of the people who helped bring this book to market include the following:

Acquisitions, Editorial

Project Editor: Colleen Totz Diamond

Sr. Acquisitions Editor: Katie Feltman

Copy Editor: Melba Hopper

Technical Editor: Juniper Networks

Editorial Manager: Jodi Jensen

Editorial Assistant: Amanda Graham

Sr. Editorial Assistant: Cherie Case

Cover Photo: © iStockphoto.com / Cary Westfall

Cartoons: Rich Tennant (www.the5thwave.com)

Composition Services

Project Coordinator: Nikki Gee

Layout and Graphics: Corrie Socolovitch

Proofreaders: Melissa Cossell, Evelyn Wellborn

Indexer: BIM Indexing & Proofreading Services

Publishing and Editorial for Technology Dummies

Richard Swadley, Vice President and Executive Group Publisher

Andy Cummings, Vice President and Publisher

Mary Bednarek, Executive Acquisitions Director

Mary C. Corder, Editorial Director

Publishing for Consumer Dummies

Kathy Nebenhaus, Vice President and Executive Publisher

Composition Services

Debbie Stailey, Director of Composition Services

Introduction

Welcome to Junos OS For Dummies. This book provides you with a handy reference for configuring and running Junos software on Juniper Networks products. (We won’t bore you with how Junos got here, but you can discover more about Juniper Networks and the evolution of Junos software at www.juniper.net/company.)

More and more, Junos software is being deployed throughout the world running on Juniper Networks platforms designed for switching, routing, and security. You can find it in both the largest and the smallest service provider networks and in the networks at tens of thousands of offices, regional campuses, and data centers of enterprise organizations, as well as in the public sector and on educational campuses.

See whether you can identify with any of the following scenarios:

In your branch offices: You may be updating your branch gateway with an integrated platform, Voice over IP (VoIP), supporting new users, or upgrading older switching, routing, or security infrastructure.

In your headquarters or regional office campuses: You may be adding new users or deploying new or deploying VoIP, new web or upgrading older switching and routing infrastructures, or merging or migrating from other operating systems.

In your metropolitan or wide area networks: You may be transitioning to new optical, Ethernet, or MPLS carrier services; building a new core for your metro, wide area, or data center backbone network; rolling out MPLS; or upgrading an older switching, routing, or security infrastructure.

In your data centers: You may be looking for ways to reduce the power usage of your data center, collapse networking tiers and infrastructure, converge your data centers into fewer sites, deploy networking fabric, scale existing sites, or build out new data centers.

This book can help you with all these scenarios and a whole lot more. We offer this book as a fast and easy way to understand and use the Junos operating system (OS) for all your network needs.

About This Book

We wrote this book thinking that you’re probably a lot like us: too many projects, with too little uninterrupted time. So, we created this book to help you do the following:

Understand what Junos can do for you and how you can use it in your own network.

Quickly use the CLI so that you can configure and change your network using the Junos OS.

Deploy any networking device out of the box and onto your network in an hour or two. If it runs Junos, you’ll be able to do it.

Run, operate, and maintain the Junos OS with high uptime, performance, and security over the long haul.

Find easy access to a set of references about the many features and uses of Junos in your network.

Conventions Used in This Book

Junos device output and configuration samples are printed in a monospace font. A bold monospace font within an output snippet indicates something that you, the user, key into the command-line interface (CLI) to launch the command and receive the subsequent output, such as this:

user@junos-router> show route

By the way, we don’t bold configuration samples, however, as the entire configuration would be a bolded series of lines.

This book is based on Junos 11.1. While newer software versions of Junos are always in the works, subsequent release versions don’t negate what you find out in this book; they extend the functionality of what you have learned.

Foolish Assumptions

When we wrote this book, we made a few assumptions about you. In essence, we assume that you do, or will, operate or administer a Junos device and need to configure, deploy, maintain, or troubleshoot it. And that means you probably fit within the following:

You are a network professional, although you don’t have to be one. Our objective is to get you up and running, so we don’t discuss the operations of the protocols in detail.

You may design or operate networks with devices running Junos software — or are about to, are considering it, or are just curious about what the Junos OS is all about.

You may be coming from another network operating system, such as Cisco IOS, in which case, you’ve found a really good introduction to Junos and the day-to-day administration of the Juniper devices that run it.

You may be a student entering the networking profession.

If you are any of these people, or a hybrid of them all, welcome. You’ve found the right book.

How This Book Is Organized

This book is divided into five parts with very practical names.

Part I: Discovering Junos OS

This part introduces the Junos OS that is used for switching, routing, MPLS, and security. It also includes a section on migrating from other platforms.

Part II: Setting Up Junos OS

This part helps you set up the basics of your network. You find out how to work with the command-line interface and discover the basic commands for routing, switching, and securing your device.

Part III: Deploying a Device

In this part, we help you set up your router, switch, or security device to your network.

Part IV: Running a Junos Network

In this part, we help you set up additional functionality, including remote management, interfaces, peering, policy, class-of-service, MPLS, and VPNs.

Part V: The Part of Tens

This part offers a quick reference of the ten most helpful commands, the keys to migrating from one network to a Junos network, and other places you can go for more information.

Icons Used in the Book

We use icons throughout this book to key you into time-saving tips, things you really need to know, and the occasional warning or interesting backgrounder. Look for them throughout these pages.

This icon highlights helpful hints that save you time and make your life easier.

Be careful when you see this icon. It marks information that can keep you out of trouble.

Whenever you see this icon, you know that it highlights key information you’ll use often.

We mark text that is interesting but that you don’t have to read as Technical Stuff. You can skip these items if you’re in a hurry or don’t want to lose your train of thought. Return to them later or browse through the book some day during lunch and read them at your leisure.

Where to Go from Here

You can go anywhere within your network and deploy or fine-tune the Junos OS with this book in your hands and its content in your head. That’s the whole point. We happen to teach and train hundreds of network administrators and engineers about Junos each month, and we work with people just like you who are improving their network response time, traffic handling, or expanding services. We see it all the time — that light bulb that goes off midway through the class or training seminar and the administrators can see their network in a whole new way. That’s because there’s only one Junos, not variants, and once you learn Junos, you can take that knowledge anywhere on your network and apply it.

Browse through the Table of Contents and consider a starting point and then just dip in. Ramble around a little. Get a feel for the book and then dive in. Remember, you can’t get lost with Junos. You can only get better.

Note that we occasionally have updates to our technology books. If this book does have technical updates, they will be posted at

dummies.com/go/junosfdupdates

Please note that some special symbols used in this eBook may not display properly on all eReader devices. If you have trouble determining any symbol, please call Wiley Product Technical Support at 800-762-2974. Outside of the United States, please call 317-572-3993. You can also contact Wiley Product Technical Support at www.wiley.com/techsupport.

Part I

Discovering Junos OS

In this part . . .

You know that nuclear reactor thingy that Robert Downey in the Iron Man movie put in this chest to power his rocket books and extraordinary powers? Well, that’s what Junos is to Juniper Networks devices.

This part introduces the Junos OS that is used for switching, routing, MPLS, and security. It also includes a section on migrating from other platforms. You find out all about Junos and how you can power your network at speeds way past the sound barrier.

Chapter 1

Junos Is Everywhere You Need to Be

In This Chapter

Understanding the functions of a network operating system

Discovering how Junos OS is different

Looking beyond the operating system to the Junos Platform

The Junos operating system (Junos OS) is the software that runs networking and security devices from Juniper Networks. Administrators use Junos OS to set up devices and connect them together in a network, and dictate how the devices move, service, and secure traffic across the network. They also use it to monitor and, when necessary, restore the network.

Note: In this book, we use both Junos OS and Junos as one and the same.

This chapter introduces Junos OS by describing the functions of a network operating system and then discussing how they work in Junos. The chapter also explores key differences in how Juniper develops Junos software versus how other vendors create their network operating systems, and introduces additional components of the Junos portfolio.

Functions of a Network OS

Networks consist of specialized devices that pass along traffic from one to another. Each device must know what to do with each arriving bundle of traffic, or packet, so that the packet can continue its journey to its destination. The devices perform three primary functions to process each packet:

Controls where the device sends the packets.

Applies services such as prioritization or security.

Forwards the packet to the next connecting device.

These actions are the primary functions of the network operating system that runs on the device. In simplest terms, the of the network operating system is the brain of the device with the providing the brawn to quickly move packets through the system. Depending on the type of packet, the may also provide packet services such as address translation, prioritization, and security.

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!