DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES
|
|
|
- Della Blair
- 10 years ago
- Views:
Transcription
1 APPLICATION NOTE DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES Optimizing Applications with Juniper Networks Access Switches Copyright 2011, Juniper Networks, Inc. 1
2 Table of Contents Introduction Scope Description and Deployment Scenario Method 1: Phones and End Hosts Sharing Ports Phones with LLDP-MED Support Phones with LLDP-MED Support Vendor and Model List Avaya LLDP-MED phone models: Cisco Systems LLDP-MED phone models: Nortel LLDP-MED phone models: Phones without LLDP-MED Support Using Access Port with Voice VLAN Feature (but without LLDP-MED) Using Access Port with the Same VLAN ID for Both Voice and Using Trunk Port with Native-VLAN Option Description and Deployment Scenario Method 2: Separate Ports for Phone and Endpoint Device Assigning Each Port as Access Port for Different VLAN Assigning Both Ports as Access Ports for VLAN with Voice VLAN Feature Conclusion Table of Figures Figure 1: phone and end-host machine sharing a switch port Figure 2: LLDP and LLDP-MED interaction between Ethernet Switch and phone Figure 3: An Ethernet Switch sending out LLDP data unit Figure 4: LLDP-MED-capable phone sending LLDP-MED data unit Figure 5: Ethernet Switch sending LLDP-MED data unit upon receiving LLDP-MED-Capable endpoint Figure 6: LLDP-MED-capable phone in a shared switch-port physical layout Figure 7: LLDP data unit advertised by Ethernet Switch Figure 8: LLDP-MED-capable phone advertising its capabilities Figure 9: Ethernet Switch advertising network policy for phone via LLDP-MED Figure 10: LLDP-MED-capable phone advertising changed network policy per the Ethernet Switch Figure 11: Access port with voice VLAN feature Figure 12: Both phone and endpoint device in the same VLAN Figure 13: Trunk port with Native-VLAN option Figure 14: Separate ports for and endpoint device Figure 15: Each port as access port for different VLAN Figure 16: Both ports as access ports of data VLAN with voice VLAN feature Copyright 2011, Juniper Networks, Inc.
3 Introduction Juniper Networks Ethernet Switches offer a number of features for optimizing IP telephony deployments. This application note describes how voice over IP () phones can be deployed in conjunction with endpoint hosts such as desktop or laptop computers; provides background information on Link Layer Discovery Protocol (LLDP) and LLDP-Media Endpoint Discovery (LLDP-MED); and describes the interaction between phones and Ethernet Switches. Scope While this document can t cover all of the physical configurations that are possible on the, it does present configuration examples for the most common applications seen today. In particular, this document addresses configurations relating to: phones and endpoint hosts sharing the same switch port Using separate ports for phones and an endpoint host This application note applies to the Juniper Networks EX2200, EX3200, EX3300, EX4200, EX6200 and EX8200 Ethernet Switches as solutions for existing and new enterprise IP telephony deployments. Description and Deployment Scenario Method 1: Phones and End Hosts Sharing Ports The most common enterprise edge deployment consists of phones and end-host machines connected in series and attached to a single switch port. This physical layout reduces switch port requirements by allowing multiple end user devices to share a connection rather than occupy their own individual switch ports, thereby reducing the total number of switches deployed, as well as capital and operational expenses. However, when phones and end hosts share a switch port, sound quality on an IP phone call will suffer when large bursts of data traffic create network congestion that leads to packet loss or delay. To overcome this problem, it is desirable to provide voice traffic with a higher level of service due to its susceptibility to jitter, delay and packet loss. Figure 1: phone and end-host machine sharing a switch port This is accomplished by separating voice and data traffic into separate broadcast domains or VLANs an essential capability for any robust solution. The offers a Voice VLAN feature that enables otherwise standard access ports to accept both untagged (data) and tagged (voice) traffic from directly connected phones, and separate these traffic streams into separate VLANs (namely data-vlan and voip-vlan). The can separate data and voice traffic on the switch port where Voice VLAN is implemented. However, the phone is still vulnerable to large bursts of data from the attached end host on its own phone port, depending on the phone s ability to prioritize its own voice traffic over the end-host data traffic before forwarding both streams to the switch. To solve this problem, the user can take the separate port approach in which the phone and the end host are connected to separate ports on the switch. This solution is covered in the Method 2 section of this paper. Phones with LLDP-MED Support Before exploring the actual interaction between phones and the, it s important to understand the fundamentals of two industry-standard protocols: Link Layer Discovery Protocol (LLDP) and LLDP-Media Endpoint Discovery (LLDP-MED). This section will provide a brief overview covering the basics of these two protocols. Copyright 2011, Juniper Networks, Inc. 3
4 LLDP, also known as IEEE 802.1AB, is a standards-based Layer 2 protocol that allows network devices to advertise and receive their identity and capabilities on a LAN segment, most of them directly connected. This protocol, developed as an open standard, was modeled after various vendor-specific proprietary discovery protocols such as Cisco Discovery Protocol (CDP), Extreme Discovery Protocol (EDP), Nortel Discovery Protocol (NDP) and others. The has embraced the open, standards-based LLDP as their Layer 2 discovery protocol. LLDP-MED is an extension to the IEEE 802.1AB standard published by the Telecommunications Industry Association (TIA). This standard, ANSI/TIA-1057, is designed to support interoperability between endpoint devices and other networking end-devices, focusing mainly on discovery to facilitate information sharing between endpoints and network infrastructure devices. Some of the benefits of LLDP-MED include: Network policy discovery that allows endpoints and switches to advertise their VLAN IDs (for example, voip-vlan), Layer 2 Priority and Differentiated Services Code Point (DSCP) Power over Ethernet (PoE) management that allows endpoint devices to advertise their actual PoE levels and enables power sourcing equipment (like switches) to budget their power allocation accordingly Inventory management discovery that stores endpoint device information such as vendor, model firmware and serial number on the switch and makes it accessible to network management systems for inventory reporting purposes Phones with LLDP-MED Support Vendor and Model List Some phone vendors and their respective LLDP-MED-compatible phones are listed below. The information in this section, current as of May 2008, has been gathered from publicly available sources such as vendor websites. To confirm the latest phones with LLDP-MED support, consult each vendor s product documentation. Avaya LLDP-MED phone models: 9600 Series with firmware release Series with firmware release 2.6 Cisco Systems LLDP-MED phone models: 7906G 7911G 7931G 7941G/7941G-GE 7942G 7945G 7961G/7961G-GE 7962G 7965G 7970G/ 7971G-GE 7975G Nortel LLDP-MED phone models: While LLDP and LLDP-MED help simplify IP telephony deployments, it is important to understand how they interact with the phones and switches specifically with the, which will not advertise their capabilities via LLDP- MED when a port is first brought online. 4 Copyright 2011, Juniper Networks, Inc.
5 Figure 2 provides an overview of the LLDP/LLDP-MED message exchange sequence when an LLDP-MED-enabled phone is first connected to a switch port on an Ethernet Switch. Interface will start advertising Base LLDP 1 2 LLDP-MED advertisement sent by neighbor Ethernet Switch will toggle to LLDP-MED 3 Figure 2: LLDP and LLDP-MED interaction between Ethernet Switch and phone Figure 3: An Ethernet Switch sending out LLDP data unit This interaction can be seen in detail in the highlighted section of the packet capture shown in Figure 3. Note that LLDP, as defined in IEEE 802.1AB, sends the data unit to a well-known IEEE multicast address (01:80:c2:00:00:0e). This address is defined within a range of addresses reserved by the IEEE for protocols that are to be confined to an individual LAN segment. Copyright 2011, Juniper Networks, Inc. 5
6 On the other hand, LLDP-MED-capable phones will advertise their capabilities using LLDP-MED from the start. Note that the fields within the section named TIA indicate LLDP-MED (Figure 4). Figure 4: LLDP-MED-capable phone sending LLDP-MED data unit Upon receiving the LLDP-MED data units from the neighboring end device ( phone), the will start advertising its capabilities using LLDP-MED (Figure 5). Figure 5: Ethernet Switch sending LLDP-MED data unit upon receiving LLDP-MED-Capable endpoint 6 Copyright 2011, Juniper Networks, Inc.
7 Using Voice VLAN Support with LLDP-MED As mentioned earlier, the Voice VLAN feature enables switches to accept both untagged (data) and tagged (voice) traffic from directly connected phones, and split these traffic streams into different VLANs. This feature delivers its greatest benefit when connected to a phone capable of advertising and receiving LLDP-MED data units, including VLAN ID assignments, because it essentially enables the to deliver a plug-and-play IP telephony solution (Figure 6). LLDP-MED Access Port with Voice VLAN feature VLAN 10 Voice VLAN 99 Figure 6: LLDP-MED-capable phone in a shared switch-port physical layout The following section details the implementation shown in Figure 6. The configuration of switches with the Voice VLAN feature in a typical shared switch-port implementation with LLDP-MED-capable phones is as follows: user@switch# set protocols lldp interface all user@switch# set protocols lldp-med interface all user@switch# set vlans voip-only vlan-id 99 user@switch# set vlans data-only vlan-id 10 user@switch# set interfaces ge-0/0/1 unit 0 family ethernet-switching port-mode access user@switch# set interfaces ge-0/0/1 unit 0 family ethernet-switching vlan member data-only user@switch# set ethernet-switching-options voip interface ge-0/0/1.0 vlan voiponly user@switch# set ethernet-switching-options voip interface ge-0/0/1.0 forwardingclass expedited-forwarding user@switch# commit Although these strings of data may appear overwhelming to someone who is unfamiliar with Juniper Networks Junos operating system, the configuration semantics are actually very straightforward. A closer inspection of the individual functional blocks will help explain what is happening and clarify the benefit of the Voice VLAN feature. In the first functional block (below), the protocols to be used LLDP and LLDP-MED are turned on. Although these protocols are turned on by default on any switch, it is specifically called out here for clarification. user@switch# set protocols lldp interface all user@switch# set protocols lldp-med interface all Copyright 2011, Juniper Networks, Inc. 7
8 In the second functional block (below), two VLANs are defined: one for voice and one for data. The actual VLAN IDs used on this example are arbitrary; the allows VLAN ID configurations up to set vlans voip-only vlan-id 99 set vlans data-only vlan-id 10 In the third functional block (below), the interface ge-0/0/1 has been configured as an access port belonging to the data VLAN ( data-only ). Notice that there is no configuration needed for the voice VLAN, which is covered in the next section. user@switch# set interfaces ge-0/0/1 unit 0 family ethernet-switching port-mode access user@switch# set interfaces ge-0/0/1 unit 0 family ethernet-switching vlan member data-only In the fourth functional block (below), the Voice VLAN feature is configured under the Ethernet-switching-options stanza with the voip option (see the ethernet-switching-options voip command below). Here the actual VLAN to be used for voice will be defined, as well as the level of service that will be provided for traffic received on that VLAN in this example, expedited-forwarding. user@switch# set ethernet-switching-options voip interface ge-0/0/1.0 vlan voiponly user@switch# set ethernet-switching-options voip interface ge-0/0/1.0 forwardingclass expedited-forwarding In the fifth functional block (below), the configuration is committed in Junos OS, making it active. user@switch# commit Upon completion, the LLDP-MED configuration can be verified on the, as shown below. user@switch> show lldp LLDP Advertisement interval Transmit delay Hold timer Config Trap Interval Connection Hold timer LLDP MED MED fast start count : Enabled : 30 seconds : 2 seconds : 4 seconds : 60 seconds : 300 seconds : Enabled : 3 Packets Interface LLDP LLDP-MED all Enabled Enabled 8 Copyright 2011, Juniper Networks, Inc.
9 Advertisements sent by neighboring phones can also be viewed. A Cisco phone was used for the following example: user@switch> show lldp neighbors interface ge-0/0/1.0 LLDP Neighbor Information: Index: 1 Time to live: 180 Time mark: Thu Mar 6 22:35: Age: 28 secs Local interface : ge-0/0/1.0 Chassis type : Network address Chassis ID : Port type : Locally assigned Port ID : xxxxxxxxxxxx:p1 Port description : SW PORT System name : SEPxxxxxxxxxx System description : Cisco IP Phone CP-7945G,V1, SIP SR2S System capabilities Supported: Bridge Telephone Enabled : Bridge Telephone Management address Type : IPv4 Address : Media endpoint class: Class III Device MED Hardware revision : 1 MED Firmware revision : tnp bin MED Software revision : SIP SR2Sbin MED Serial number : xxxxxxxxxxxxxxxx MED Manufacturer name : Cisco Systems, Inc. MED Model name : CP-7945Gstem MED Asset id : CP-7 By using a packet capture tool, the details of the actual interaction between the and LLDP-MED-capable device can be viewed (see Figures 7 through 10). Figure 7: LLDP data unit advertised by Ethernet Switch Copyright 2011, Juniper Networks, Inc. 9
10 As discussed previously regarding the interaction between LLDP and LLDP-MED, the will initially advertise its capabilities using LLDP only, as shown in Figure 7. The LLDP-MED-capable phone will advertise its capabilities using LLDP-MED, as shown in Figure 8. A Cisco IP phone 7945G was used in the following example. Figure 8: LLDP-MED-capable phone advertising its capabilities Sections preceded with a TIA heading show that the phone is LLDP-MED-capable; its media capabilities and network policy can also be viewed. Note that the VLAN ID sent by the phone shows the voice VLAN ID as 0 with a Layer 2 (802.1p) priority of 5 for voice traffic and a VLAN ID of 0 with a Layer 2 (802.1p) priority of 4 for voice-signaling traffic. 10 Copyright 2011, Juniper Networks, Inc.
11 Figure 9: Ethernet Switch advertising network policy for phone via LLDP-MED Once the Ethernet Switch determines that the connected device is LLDP-MED-capable, it will advertise its capabilities and defined network policy via LLDP-MED. In Figure 10, the VLAN ID used for voice is set at 99 as configured. Figure 10: LLDP-MED-capable phone advertising changed network policy per the Ethernet Switch Copyright 2011, Juniper Networks, Inc. 11
12 The LLDP-MED-capable phone now sets VLAN ID 99 for both voice and voice-signaling traffic in its LLDP-MED network policy in response to the LLDP data unit it received previously. Phones without LLDP-MED Support While organizations can derive great benefits by using LLDP-MED-capable phones, the fact is that most existing deployments don t support the protocol, and businesses are unlikely to incur the cost required to upgrade these devices. In such cases, there are several other IP telephony methods available that the can support. Each of these solutions, however, has some unique requirements. Using Access Port with Voice VLAN Feature (but without LLDP-MED) Although the Voice VLAN feature delivers the greatest benefit when coupled with LLDP-MED-capable phones, it is flexible enough that non-lldp-med-capable phones can also use it effectively. However, such a configuration requires that the Voice VLAN feature be set manually on the phones themselves, since LLDP-MED is not available to accomplish this dynamically. Non-LLDP-MED Access Port with Voice VLAN feature VLAN 10 VLAN 99 Figure 11: Access port with voice VLAN feature Once the Voice VLAN ID and other relevant parameters have been manually set on the phone to match the settings configured on the, the feature behaves the same as it does when configured with LLDP-MEDcapable phones. Using Access Port with the Same VLAN ID for Both Voice and Another way to deploy an IP telephony solution is to assign both the phone and the end-host machine to a single VLAN. This is the simplest configuration among the methods discussed in this document. Non-LLDP-MED VLAN 100 VLAN 100 Figure 12: Both phone and endpoint device in the same VLAN 12 Copyright 2011, Juniper Networks, Inc.
13 The configuration is performed as follows: set vlans voice-and-data vlan-id 100 set interfaces ge-0/0/1 unit 0 family ethernet-switching port-mode access user@switch# set interfaces ge-0/0/1 unit 0 family ethernet-switching vlan member voice-and-data user@switch# commit Although this method is technically feasible, it is not a recommended configuration because placing both data and voice traffic on the same VLAN leaves the voice traffic prone to potential jitter, delay and packet loss conditions that are introduced by bursty data traffic. Using Trunk Port with Native-VLAN Option Using a switch trunk port where the phone and endpoint host are connected will create the desired separation between voice and data traffic, but it requires some additional configuration on both the switch and the phone. Non-LLDP-MED Trunk Port with Native VLAN- VLAN Untagged VLAN 99 A sample trunk configuration is provided below: Figure 13: Trunk port with Native-VLAN option user@switch# set vlans voip-only vlan-id 99 user@switch# set vlans data-only vlan-id 10 user@switch# set interfaces ge-0/0/1 unit 0 family ethernet-switching port-mode trunk user@switch# set interfaces ge-0/0/1 unit 0 family ethernet-switching vlan member [ voip-only ] user@switch# set interfaces ge-0/0/1 unit 0 family Ethernet-switching nativevlan-id data-only user@switch# commit Let s look at this particular configuration in greater detail. Similar to the Voice VLAN feature, two VLANs are configured here: voip-only and data-only. user@switch# set interfaces ge-0/0/1 unit 0 family ethernet-switching port-mode trunk user@switch# set interfaces ge-0/0/1 unit 0 family ethernet-switching vlan member [ voip-only ] Copyright 2011, Juniper Networks, Inc. 13
14 However, in this case the interface is configured as a trunk that includes only the voice VLAN. In order to separate the voice and data traffic, the trunk port will transmit and receive only tagged traffic on the trunk VLAN member list, which in this case is the voip-only VLAN. Since a typical endpoint host such as a desktop or laptop will send its packets untagged (which will subsequently be relayed by the phone), the corresponding switch trunk port must be configured with the native-vlan-id option in order to transmit and receive untagged traffic belonging to the native VLAN, which in this case is the data-only VLAN. Otherwise, untagged packets sent from the endpoint host and relayed by the phone would be dropped on the switch trunk port by default, since the packets are untagged. user@switch# set interfaces ge-0/0/1 unit 0 family Ethernet-switching nativevlan-id data-only Description and Deployment Scenario Method 2: Separate Ports for Phone and Endpoint Device Figure 14: Separate ports for and endpoint device In contrast to the shared switch-port configuration discussed earlier, phones (LLDP-MED-capable and noncapable) and endpoint hosts can also occupy their own ports. This is not a typical IP telephony deployment in the enterprise today, where cost reduction is a priority, but there are cases where endpoint devices would occupy their own ports, mainly for management, troubleshooting and maintenance purposes. Assigning Each Port as Access Port for Different VLAN When attaching phones and endpoint devices to their own ports, one approach is to assign each port to different VLANs, so that the port connected to the phone is configured for voice traffic and the port connected to the endpoint host is configured for data traffic. VLAN 99 VLAN 10 Figure 15: Each port as access port for different VLAN 14 Copyright 2011, Juniper Networks, Inc.
15 APPLICATION NOTE -Deploying IP Telephony with Ethernet Switches This configuration is very straightforward; examples discussed previously in this document can be used as reference. Furthermore, this method does not require any manual settings on either the phone or the endpoint host, as they already belong to the correct domain as soon as they are physically connected. Assigning Both Ports as Access Ports for VLAN with Voice VLAN Feature Another two-port option is to assign both ports (where the phone and endpoint host are connected) into the data VLAN and then configure the Voice VLAN feature. Manual configuration may be required if the phone is not LLDP-MEDcapable. The actual configuration is very similar to the configuration shown in the Access Port with Voice VLAN section. VLAN 99 Access Port with Voice VLAN feature VLAN 10 Figure 16: Both ports as access ports of data VLAN with voice VLAN feature Conclusion When implementing an IP telephony solution, there are a number of options to consider before committing to the actual deployment. This application note has discussed a variety of methods for implementing an IP telephone solution, including the physical layout of phones and endpoint devices, the Voice VLAN feature of the, LLDP and LLDP-MED, and more. These methods and technologies can and will make a difference in the successful implementation of an IP telephony solution. About Juniper Networks Juniper Networks is in the business of network innovation. From devices to data centers, from consumers to cloud providers, Juniper Networks delivers the software, silicon and systems that transform the experience and economics of networking. The company serves customers and partners worldwide. Additional information can be found at Corporate and Sales Headquarters APAC Headquarters EMEA Headquarters To purchase Juniper Networks solutions, Juniper Networks, Inc North Mathilda Avenue Sunnyvale, CA USA Phone: 888.JUNIPER ( ) or Fax: Juniper Networks (Hong Kong) 26/F, Cityplaza One 1111 King s Road Taikoo Shing, Hong Kong Phone: Fax: Juniper Networks Ireland Airside Business Park Swords, County Dublin, Ireland Phone: EMEA Sales: Fax: please contact your Juniper Networks representative at or authorized reseller. Copyright 2011 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice EN Sept 2011 Printed on recycled paper Copyright 2011, Juniper Networks, Inc. 15
Optimizing VoIP Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches
APPLICATION NOTE Deploying IP Telephony with JUNIPER NETWORKS ETHERNET Switches Optimizing Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches Copyright 2009, Juniper Networks,
Deploying IP Telephony with EX-Series Switches
Application Note Deploying IP Telephony with EX-Series Switches Optimizing VoIP Applications with EX 3200 and EX 4200 Series Ethernet Switches Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,
Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication
Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication Requirements You can configure voice over IP (VoIP) on an EX Series switch to support IP telephones. To configure
Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY
APPLICATION NOTE PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY Copyright 2010, Juniper Networks, Inc. Table of Contents Introduction........................................................................................
Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches
APPLICATION NOTE Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches Exporting sflow to Collectors Through a Separate Virtual Routing Instance Copyright 2009, Juniper Networks,
MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES
APPLICATION NOTE MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES Exporting sflow to Collectors Through a Separate Virtual Routing Instance Copyright 2010, Juniper Networks,
How To Configure Voice Vlan On An Ip Phone
1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices
IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL
IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL An illustrated Guide to Configuring a Simple IF-MAP Federated Network Juniper Networks, Inc. 1 Table of Contents Introduction...3 Scope...3
Demonstrating the high performance and feature richness of the compact MX Series
WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
J-Flow on J Series Services Routers and Branch SRX Series Services Gateways
APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring
Network Configuration Example
Network Configuration Example Configuring Multiple Port Mirroring Sessions on EX4200 Switches Published: 2014-04-09 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
SECURE ACCESS TO THE VIRTUAL DATA CENTER
SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need
WHITE PAPER. Copyright 2011, Juniper Networks, Inc. 1
WHITE PAPER Network Simplification with Juniper Networks Technology Copyright 2011, Juniper Networks, Inc. 1 WHITE PAPER - Network Simplification with Juniper Networks Technology Table of Contents Executive
Voice Modules for the CTP Series
DATASHEET Voice Modules for the CTP Series Product Overview Enterprise organizations are leveraging the cost savings associated with IP transport for a variety of new packet based multimedia services.
VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES
APPLICATION NOTE VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES Configuring Secure SSL VPN Access in a VMware Virtual Desktop Environment Copyright 2010, Juniper Networks, Inc. 1 Table
Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation
White Paper Securing Multi-Tenancy and Cloud Computing Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation Copyright 2012, Juniper Networks,
Abstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Sample Configuration for using Link Layer Discovery Protocol (LLDP) with Cisco Catalyst 4500 or 3750 Switches for VLAN assignment to Avaya 4600 Series IP Telephones
Abstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Sample Configuration for using Link Layer Discovery Protocol (LLDP) with Cisco Catalyst 4500 or 3750 Switches for VLAN Assignment for Avaya 9600 and 1600 Series
ENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS
SOLUTION BRIEF ENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS IT Organizations Can Reduce Costly TDM Leased Line Fees Challenge IP networks were not designed to transport bit-synchronous
MIGRATING IPS SECURITY POLICY TO JUNIPER NETWORKS SRX SERIES SERVICES GATEWAYS
APPLICATION NOTE MIGRATING IPS SECURITY POLICY TO JUNIPER NETWORKS SRX SERIES SERVICES GATEWAYS Migrating Advanced Security Policies to SRX Series Services Gateways Copyright 2009, Juniper Networks, Inc.
SoLuTIoN guide. CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork
SoLuTIoN guide CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork Contents BENEfITS of ThE CLoud-rEAdy data CENTEr NETWork............................3 getting ready......................................................................3
Reasons Enterprises. Prefer Juniper Wireless
Reasons Enterprises Prefer Juniper Wireless Juniper s WLAN solution meets the mobility needs of today s enterprises by delivering the highest levels of reliability, scalability, management, and security.
Juniper Networks QFX3500
Implementation Guide Juniper Networks QFX3500 Switch and QLogic Converged Network Implementation Guide Copyright 2012, Juniper Networks, Inc. 1 Table of Contents Introduction...3 Implementing Converged
Configuring LLDP, LLDP-MED, and Location Service
27 CHAPTER Configuring LLDP, LLDP-MED, and Location Service This chapter describes how to configure the Link Layer Discovery Protocol (LLDP), LLDP Media Endpoint Discovery (LLDP-MED), and Location Service
Simplifying the Data Center Network to Reduce Complexity and Improve Performance
SOLUTION BRIEF Juniper Networks 3-2-1 Data Center Network Simplifying the Data Center Network to Reduce Complexity and Improve Performance Challenge Escalating traffic levels, increasing numbers of applications,
Understanding Fundamental Issues with TRILL
WHITE PAPER TRILL in the Data Center: Look Before You Leap Understanding Fundamental Issues with TRILL Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Executive Summary........................................................................................................
802.1X Authentication, Link Layer Discovery Protocol (LLDP), and Avaya IP Telephones
802.1X Authentication, Link Layer Discovery Protocol (LLDP), and Avaya IP Telephones Abstract The purpose of this document is to discuss 802.1X Authentication and Link Layer Discovery Protocol (LLDP) in
Configuring and Implementing A10
IMPLEMENTATION GUIDE Configuring and Implementing A10 Networks Load Balancing Solution with Juniper s SSL VPN Appliances Although Juniper Networks has attempted to provide accurate information in this
Identity-Based Traffic Logging and Reporting
Application Note Identity-Based Traffic Logging and Reporting Using UAC in Conjunction with NSM and Infranet Enforcers to Give Additional, User-Identified Visibility into Network Traffic Juniper Networks,
MS Series: VolP Deployment Guide
Solution Guide MS Series: VolP Deployment Guide JULY 2013 How to deploy a distributed VoIP infrastructure with Meraki MS switches. Table of Contents Introduction 3 Getting Started 4 Setting up VoIP using
Juniper Networks EX Series Ethernet Switches/ Cisco VoIP Interoperability Test Results. September 25, 2009
Juniper Networks EX Series Ethernet Switches/ Cisco VoIP Interoperability Test Results September 25, 2009 Executive Summary Juniper Networks commissioned Network Test to assess interoperability between
PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series
PRODUCT CATEGORY BROCHURE Juniper Networks SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations
Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET
DATASHEET Network and Security Manager Product Overview Network and Security Manager provides unparalleled capability for device and security policy configuration, comprehensive monitoring, reporting tools,
Network Configuration Example
Network Configuration Example Configuring Link Aggregation Between EX Series Switches and Ruckus Wireless Access Points Modified: 2015-10-01 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California
PRODUCT CATEGORY BROCHURE
PRODUCT CATEGORY BROCHURE SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations of Every Size
CONFIGURATION OPTIONS FOR HARDWARE RULE SEARCH (RMS) AND SOFTWARE RULE SEARCH (SWRS)
APPLICATION NOTE CONFIGURATION OPTIONS FOR HARDWARE RULE SEARCH (RMS) AND SOFTWARE RULE SEARCH (SWRS) Discover Which Juniper Networks ScreenOS Rule Search Works for Your Network Copyright 2010, Juniper
POWERING UNIFIED COMMUNICATIONS WITH BRANCH SRX SERIES SERVICES GATEWAYS
WHITE PAPER POWERING UNIFIED COMMUNICATIONS WITH BRANCH SRX SERIES SERVICES GATEWAYS Analysis of the Optimal Branch Network Architecture for Successful Unified Communications in the Enterprise Copyright
Analysis of the Optimal Branch Network Architecture for Successful Unified Communications in the Enterprise
White Paper Powering Unified Communications with Branch SRX Series Services Gateways Analysis of the Optimal Branch Network Architecture for Successful Unified Communications in the Enterprise Copyright
Junos Pulse Secure Access Service Enables Service Providers to Deliver Scalable and On-Demand, Cloud-Based Deployments with Simplicity and Agility
White Paper Transitioning Enterprise Customers to the Cloud with Junos Pulse Junos Pulse Secure Access Service Enables Service Providers to Deliver Scalable and On-Demand, Cloud-Based Deployments with
Enabling Carrier-Class Unified Communications with Juniper Networks
WHITE PAPER Enabling Carrier-Class Unified Communications with Juniper Networks EX Series Ethernet Switches Expediting Business Processes and Boosting Corporate Responsiveness Copyright 2009, Juniper Networks,
NETWORK AND SECURITY MANAGER APPLIANCES (NSMXPRESS AND NSM3000)
DATASHEET NETWORK AND SECURITY MANAGER APPLIANCES ( AND ) Product Overview Now more than ever, network operators need the ability to easily manage security policies and to have visibility into potential
Using Link Layer Discovery Protocol in Multivendor Networks
Using Link Layer Discovery Protocol in Multivendor Networks Link Layer Discovery Protocol (LLDP), standardized by the IEEE as part of 802.1ab, enables standardized discovery of nodes, which in turn facilitates
Introduction to Automatic Multicast Tunneling as a Transition Strategy for Local Service Providers
WHITE PAPER Unlocking Video Over the Internet with MX Series Routers Introduction to Automatic Multicast Tunneling as a Transition Strategy for Local Service Providers Copyright 2011, Juniper Networks,
Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources
APPLICATION NOTE Juniper NETWORKS SSL VPN and Windows Mobile Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources Table of Contents Introduction.........................................................................................
VOIP Guide Using ZyXEL Switch
VOIP Guide Using ZyXEL Switch 2015/8/10 ZyXEL Communications Corporation Barney Gregorio Overview: This article will contain solutions on how to configure Voice over IP (VOIP). Two methods will be discussed:
White Paper. Protect Your Virtual. Realizing the Benefits of Virtualization Without Sacrificing Security. Copyright 2012, Juniper Networks, Inc.
White Paper Five Best Practices to Protect Your Virtual Environment Realizing the Benefits of Virtualization Without Sacrificing Security Copyright 2012, Juniper Networks, Inc. 1 Table of Contents Executive
Juniper Networks WX Series Large. Integration on Cisco
APPLICATION NOTE Juniper Networks WX Series Large Deployment with WCCP Off-Path Integration on Cisco Integrating Multiple Juniper Networks WX Series Application Acceleration Platforms into a Cisco Infrastructure
Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009
Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results May 1, 2009 Executive Summary Juniper Networks commissioned Network Test to assess interoperability between its EX4200 and EX8208
Implementing Firewalls inside the Core Data Center Network
IMPLEMENTATION GUIDE Implementing Firewalls inside the Core Data Center Network Best Practices for Implementing Juniper Networks Firewall Devices in the Data Center Core Copyright 2010, Juniper Networks,
Interoperability Test Results for Juniper Networks EX Series Ethernet Switches and NetApp Storage Systems
APPLICATION NOTE Network Attached Storage Interoperability Testing Interoperability Test Results for Juniper Networks EX Series Ethernet Switches and Storage Systems Copyright 2012, Juniper Networks, Inc.
Interoperability between Avaya IP phones and ProCurve switches
An HP ProCurve Networking Application Note Interoperability between Avaya IP phones and ProCurve switches Contents 1. Introduction... 3 2. Architecture... 3 3. Checking PoE compatibility... 3 4. Configuring
Juniper Networks Solution Portfolio for Public Sector Network Security
SOLUTION BROCHURE Juniper Networks Solution Portfolio for Public Sector Network Security Protect against Network Downtime, Control Access to Critical Resources, and Provide Information Assurance Juniper
Juniper / Cisco Interoperability Tests. August 2014
Juniper / Cisco Interoperability Tests August 2014 Executive Summary Juniper Networks commissioned Network Test to assess interoperability, with an emphasis on data center connectivity, between Juniper
Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
Network Configuration Example
Network Configuration Example Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California
White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.
White Paper Juniper Networks Solutions for VMware NSX Enabling Businesses to Deploy Virtualized Data Center Environments Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3
Introduction...3. Scope...3. Design Considerations...3. Hardware Requirements...3. Software Requirements...3. Description and Deployment Scenario...
APPLICATION NOTE Securing Virtualization in the Cloud-Ready Data Center Integrating vgw Virtual Gateway with SRX Series Services Gateways and STRM Series Security Threat Response Manager for Data Center
Network Configuration Example
Network Configuration Example Configuring DCBX Application Protocol TLV Exchange Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more
The dramatic growth in mobile device malware continues to escalate at an ever-accelerating pace. These threats continue to become more sophisticated while the barrier to entry remains low. As specific
WEB FILTERING FOR BRANCH SRX SERIES AND J SERIES
APPLICATION NOTE WEB FILTERING FOR BRANCH SRX SERIES AND J SERIES Configuring Web Filtering on Branch SRX Series Services Gateways and J Series Services Routers Copyright 2010, Juniper Networks, Inc. 1
Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example
Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example Document ID: 69632 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure
Voice over IP (VoIP) Deployment with Aruba Mobility Access Switch. Version 1.0
Voice over IP (VoIP) Deployment with Aruba Mobility Access Switch Version 1.0 Copyright 2012 Aruba Networks, Inc. AirWave, Aruba Networks, Aruba Mobility Management System, Bluescanner, For Wireless That
LLDP-MED and Cisco Discovery Protocol
White Paper LLDP-MED and Cisco Discovery Protocol DEVICE DISCOVERY PROTOCOLS Device discovery protocols enable directly connected devices to discover information about each other. They advertise information
Abstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for Configuring a Small to Medium Size Business VoIP and Data Network Solution Consisting of HP ProCurve Networking Switches and an Avaya Telephony
JUNOS Cheat-Sheet Quick Reference www.cciezone.com
JUNOS Cheat-Sheet Active /config/juniper.conf.gz Rollbacks n = 1-3 n = 4-49 Stored in /config/juniper.conf.n.gz Stored in /config/db/config/juniper.conf.n.gz Rescue /config/rescue.conf.gz JUNOS Images
Identity-Based Application and Network Profiling
Application Note Identity-Based Application and Network Profiling Using UAC in Conjunction with NSM, IDP and Infranet Enforcers Permits User-Identified Application and Network Profiling Juniper Networks,
Web Filtering For Branch SRX Series and J Series
APPLICATION NOTE Web Filtering For Branch SRX Series and J Series Configuring Web Filtering on Branch SRX Series Services Gateways and J Series Services Routers Copyright 2009, Juniper Networks, Inc. Table
JUNIPER CARE PLUS ADVANCED SERVICES CREDITS
DATASHEET JUNIPER CARE PLUS ADVANCED SERVICES CREDITS Service Overview Today s organizations are under constant pressure to meet dynamic market demands while increasing their return on investment. IT departments
Key Strategies for Long-Term Success
WHITE PAPER Security in the Next- Generation Data Center Key Strategies for Long-Term Success Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Executive Summary........................................................................................................
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
Product Description. Product Overview
DATASHEET vgw Gateway Product Overview The vgw Gateway provides a best-in-class virtual firewall to meet the unique security challenges of virtual data centers and clouds. IT teams can now secure their
VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port
1. VLAN Overview 2. VLAN Trunk 3. Why use VLANs? 4. LAN to LAN communication 5. Management port 6. Applications 6.1. Application 1 6.2. Application 2 6.3. Application 3 6.4. Application 4 6.5. Application
Configuring and Deploying the Dynamic VPN Feature Using SRX Series Services Gateways
APPLICATION NOTE Dynamic VPN Configuring and Deploying the Dynamic VPN Feature Using SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Introduction.....................................................................................................3
Link Layer Discovery Protocol (LLDP)
Extreme etworks Technical Brief Link Layer Discovery Protocol () A ew Standard for Discovering and Managing Converged etwork Devices If there is any certainty in the access layer of a network, it is that
VOICE VLAN SUPPORT IN THE DELL POWERCONNECT 6200
VOICE VLAN SUPPORT IN THE DELL POWERCONNECT 6200 CONTENTS INTRODUCTION 3 REQUIREMENTS 3 USING VOICE VLAN 3 INTERACTION WITH LLDP-MED 4 VOICE VLAN CONFIGURATION 4 CLI CONFIGURATION 4 WEB CONFIGURATION 8
JUNIPER NETWORKS WIRELESS LAN SOLUTION
SOLUTION BROCHURE JUNIPER NETWORKS WIRELESS LAN SOLUTION Deliver Secure, Scalable, and Reliable Campus Mobility While Maximizing Performance and Minimizing Cost of Ownership Wireless LAN Solution Overview
NETWORK AND SECURITY MANAGER
DATASHEET NETWORK AND SECURITY MANAGER Product Overview Juniper Networks Network and Security Manager (NSM) is a unified device management solution for Juniper s network infrastructure of routing, switching
Junos OS for EX Series Ethernet Switches
Junos OS for EX Series Ethernet Switches Analyzers for EX9200 Switches Release 13.3 Published: 2014-08-07 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
Limitation of Riverbed s Quality of Service (QoS)
Application Note Limitation of Riverbed s Quality of Service (QoS) Riverbed s Quality of Service (QoS) configuration and limitations Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California
Configuring STP with Juniper Networks EX Series Ethernet Switches
IMPLEMENTATION GUIDE Spanning Tree Protocol in Layer2/Layer 3 Environments Configuring STP with Juniper Networks EX Series Ethernet Switches Copyright 2012, Juniper Networks, Inc. 1 Table of Contents Introduction...3
LANs and VLANs A Simplified Tutorial
Application Note LANs and VLANs A Simplified Tutorial Version 3.0 May 2002 COMPAS ID 90947 Avaya Labs 1 Companion document IP Addressing: A Simplified Tutorial COMPAS ID 92962 2 Introduction As the name
New Data Centers Require a New Network
WHITE PAPER Network Fabrics for the Modern Data Center New Data Centers Require a New Network Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Executive Summary........................................................................................................
SRX High Availability Design Guide
SRX High Availability Design Guide Introduction The purpose of this design guide is to lay out the different high availability deployment scenarios and provide sample configurations for the different scenarios.
Enabling Carrier-class Unified Communications with Juniper EX-series Ethernet Switches
White Paper Enabling Carrier-class Unified Communications with Juniper EX-series Ethernet Switches Expediting Business Processes and Boosting Corporate Responsiveness Juniper Networks, Inc. 1194 North
Juniper Networks J-series Services Routers Quality of Service (QoS)
Application Note Juniper Networks J-series Services Routers Quality of Service (QoS) Implementing QoS in Mixed Scenarios Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA
EX SERIES ETHERNET SWITCHES: QOS-ENABLING THE ENTERPRISE
WHITE PAPER EX SERIES ETHERNET SWITCHES: QOS-ENABLING THE ENTERPRISE Assuring End-to-End Application Performance Copyright 2012, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3
Abstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for HP ProCurve Switches connected to an Avaya Telephony Infrastructure using Avaya IP Office in a Converged VoIP and Data Network - Issue 1.0
This topic lists the key mechanisms use to implement QoS in an IP network.
IP QoS Mechanisms QoS Mechanisms This topic lists the key mechanisms use to implement QoS in an IP network. QoS Mechanisms Classification: Each class-oriented QoS mechanism has to support some type of
Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved.
Configuring Single Instance Rapid Spanning Tree Protocol (RSTP) between an Avaya C360 Converged Switch and HP ProCurve Networking Switches to support Avaya IP Telephony Issue 1.0 Abstract These Application
JUNOS PULSE APPCONNECT
White Paper JUNOS PULSE APPCONNECT A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway Copyright 2014, Juniper Networks, Inc. 1 Table of
