Flylib.com
List of Figures
Previous page
Table of content
Next page
Introduction
Figure I.1: JNTCP M-series Routers & T-series Routing Platforms certification track
Chapter 1: Initial Configuration and Platform Troubleshooting
Figure 1.1: The Out of Band (OoB) management network
Figure 1.2: SSH session settings for the root account
Figure 1.3: Accepting a new host key
Chapter 2: Interface Configuration and Testing
Figure 2.1: POS interface connecting r3 and r4
Figure 2.2: Multipoint Frame Relay connections
Figure 2.3: PPP topology
Figure 2.4: ATM interface topology
Figure 2.5: Multipoint ATM connections
Figure 2.6: Ethernet configuration topology
Figure 2.7: Aggregated Ethernet
Figure 2.8: Aggregated SONET
Figure 2.9: Leaky bucket rate limiting
Figure 2.10: Deactivated leaky buckets
Figure 2.11: Leaky buckets activated
Figure 2.12: Unnumbered interfaces
Figure 2.13: Interface case study topology
Chapter 3: OSPF Configuration and Testing
Figure 3.1: Multi-area OSPF
Figure 3.2: Multipoint OSPF network
Figure 3.3: NBMA OSPF topology
Figure 3.4: Incorrect OSPF network types
Figure 3.5: OSPF stub areas
Figure 3.6: OSPF virtual links
Figure 3.7: OSPF policy and redistribution
Figure 3.8: Single redistribution point.1
Figure 3.9: Two redistribution points
Figure 3.10: OSPF case study topology
Chapter 4: IS-IS Configuration and Testing
Figure 4.1: Multi-level IS-IS
Figure 4.2: Route leaking and summarization
Figure 4.3: IS-IS route redistribution
Figure 4.4: IS-IS case study topology
Chapter 5: IBGP Configuration and Testing
Figure 5.1: IBGP full mesh peering
Figure 5.2: Suggested route reflection topology
Figure 5.3: An alternative route reflection topology
Figure 5.4: Suggested confederation topology
Figure 5.5: An alternative confederation topology
Figure 5.6: Miscellaneous IBGP timers and knobs
Figure 5.7: OSPF case study topology
Figure 5.8: IBGP case study topology
Figure 5.9: Suggested IBGP design
Chapter 6: EBGP Configuration and Testing
Figure 6.1: IBGP case study topology
Figure 6.2: EBGP topology
Figure 6.3: Incorrect use of a next hop self policy
Figure 6.4: Multi-Level IS-IS topology from Chapter 4 case study
Figure 6.5: IBGP confederation topology from Chapter 5
Figure 6.6: EBGP case study topology
Previous page
Table of content
Next page
JNCIP: Juniper Networks Certified Internet Professional Study Guide
ISBN: 0782140734
EAN: 2147483647
Year: 2003
Pages: 132
Authors:
Harry Reynolds
BUY ON AMAZON
Beginning Cryptography with Java
The JCA and the JCE
Symmetric Key Cryptography
Distinguished Names and Certificates
Certificate Revocation and Path Validation
Key and Certificate Management Using Keystores
Strategies for Information Technology Governance
An Emerging Strategy for E-Business IT Governance
Linking the IT Balanced Scorecard to the Business Objectives at a Major Canadian Financial Group
A View on Knowledge Management: Utilizing a Balanced Scorecard Methodology for Analyzing Knowledge Metrics
Measuring ROI in E-Commerce Applications: Analysis to Action
Managing IT Functions
The .NET Developers Guide to Directory Services Programming
Reading and Writing LDAP Attributes
Schema Extension Best Practices
Modeling One-to-Many and Many-to-Many Relationships
Summary
InvalidOperationException from DirectorySearcher
Documenting Software Architectures: Views and Beyond
P.8. Discussion Questions
Examples of Interface Documentation
Making the Choice
Other Views and Beyond
Module Uses View
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity II
IDS and IPS Architecture
IDS and IPS Internals
Internet Security Systems RealSecure
Snort
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Running Quartz with JobStoreTX
Implementing a Listener
Creating a Quartz RMI Server
Running the Quartz Cluster Nodes
Conclusion
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies