Flylib.com
JNCIP: Juniper Networks Certified Internet Professional Study Guide
JNCIP: Juniper Networks Certified Internet Professional Study Guide
ISBN: 0782140734
EAN: 2147483647
Year: 2003
Pages: 132
Authors:
Harry Reynolds
BUY ON AMAZON
Table of Contents
BackCover
JNCIP-Juniper Networks Certified Internet Professional Study Guide
Introduction
M-series Routers T-series Routing Platforms
Juniper Networks Certified Internet Associate
Juniper Networks Certified Internet Specialist
Juniper Networks Certified Internet Professional
Juniper Networks Certified Internet Expert
Registration Procedures
Recertification Requirements
JNTCP Nondisclosure Agreement
Resources for JNTCP Participants
JNCIP Study Guide
Chapter 1: Initial Configuration and Platform Troubleshooting
Task 1: Access Routers Using a Terminal Server
Task 2: Configure the OoB Management Network
Task 3: Create User Accounts
Configuring the Lab Account
Configure the Ops Account
Task 4: Configure Syslog Parameters
Task 5: Configure Network Management and NTP
Task 6: Perform General Maintenance and Software Upgrade
Task 7: Configure Chassis Alarms and Redundancy
Your Initial System Configuration
Summary
Case Study: Initial System Configuration
Spot the Issues: Review Questions
Chapter 2: Interface Configuration and Testing
Loopback Interfaces
Configuring Your lo0 Interface
Verify Your lo0 Interface Configuration
POS Interfaces
ATM Interfaces
Ethernet Interfaces
Aggregated Interfaces
Leaky Bucket Rate Limiting
Unnumbered Interfaces
Summary
Case Study: Interface Configuration
Spot The Issues: Review Questions
Chapter 3: OSPF Configuration and Testing
Multi-Area Configuration
OSPF Network Types
OSPF Authentication
Stub and Not-So-Stubby Areas
Address Summarization
Virtual Links
OSPF Routing Policy
Metrics and Various Other Knobs
Summary
Case Study: OSPF
Spot the Issues: Review Questions
Spot the Issues: Answers
Chapter 4: IS-IS Configuration and Testing
Multi-Level IS-IS Configuration
IS-IS Network Types
IS-IS Authentication
IS-IS Policy
Miscellaneous IS-IS Knobs
Summary
Case Study: IS-IS
Spot the Issues: Review Questions
Chapter 5: IBGP Configuration and Testing
Initial IBGP Peering
IBGP Authentication
IBGP Route Reflection
IBGP Confederations
Miscellaneous IBGP Timers and Knobs
Summary
Case Study: IGBP
Spot the Issues: Review Questions
Chapter 6: EBGP Configuration and Testing
Initial EBGP Peering
EBGP and Policy
Miscellaneous EBGP Timers and Knobs
Summary
Case Study: EBGP
Spot the Issues: Review Questions
Glossary
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
List of Listings
List of Sidebars
JNCIP: Juniper Networks Certified Internet Professional Study Guide
ISBN: 0782140734
EAN: 2147483647
Year: 2003
Pages: 132
Authors:
Harry Reynolds
BUY ON AMAZON
Certified Ethical Hacker Exam Prep
Test PlansKeeping It Legal
Study Strategies
Apply Your Knowledge
Appendix A. Using the ExamGear Special Edition Software
Miscellaneous
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Administrator Features
Step 3: Initial Cisco CME System Setup
Summary
Troubleshooting the Cisco IPC Express GUI
Working with the Class of Restriction Feature
Competency-Based Human Resource Management
A Need for Implementing Competency-Based HR Management
Competency-Based Employee Training
The Transformation to Competency-Based HR Management
Competency-Based HR Management The Next Steps
Appendix B Further Suggestions on Employee Development
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
IDS and IPS Internals
Cisco Secure IDS
Laws, Standards, and Organizations
The Future of Intrusion Detection and Prevention
An Introduction to Design Patterns in C++ with Qt 4
QActions, QToolbars, and QActionGroups
Event-Driven Parsing
M-V-C: What about the Controller?
Declarations and Definitions
Qt References
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Attacking the TNS Listener and Dispatchers
Attacking the Authentication Process
Defeating Virtual Private Databases
Attacking Oracle PL/SQL Web Applications
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies