Cisco To Juniper. Thomas Mangin Exa Networks LINX 51
|
|
|
- Vivien Potter
- 10 years ago
- Views:
Transcription
1 Cisco To Juniper Thomas Mangin Exa Networks LINX 51
2 Scope This presentation is not about : Juniper vs Cisco A line per line conversion analysis It is about Giving you an overview how hard/easy integrating Juniper in a Cisco network is.. Providing you pointers should you want to look into it Giving you a taste of the interesting feature of JunOS
3 Source of Information Secure Juniper BGP template Complete tested template Well documented Very good to learn from an example A little bit outdated No IGP at all Focused on security not features Remotely triggered black hole example
4 Source of Information Cisco Configuration Converter Good to get a base configuration and for IGP Horrible (but correct) ACL and BGP route-map conversion Access not open (you may have to ask your reseller to get your configuration converted) Documentation Cover clearly every section of the configuration Have lots of configuration snipsets Does not take you for a genius or a student of college Is good enough to allow you to write configs from it
5 Source of Information juniper.cluepon.net Wiki password recovery procedure Lots of unofficial information Lots more. nsp-juniper mailing-list Lots of good configuration and discussion on the archive Helpful juniper staff monitoring the list and answering hard questions.
6 The Routers Separation of the routing engine and forwarding plane BSD system on the background Use unix commands (if you want) ls, ps, top, tcpdump, compile your own Every protocol has a daemon Lots of HD space for logging Usual risk associated with having an HD Optional flash drive
7 Configuration Are loooooong Easily 2,000 lines for a EBGP routers But are very logical structure Divided in section From more generic to more specific With the concept or inheritance Friendly Everything can be commented Everything can be deactivated Easy to manipulate Merge/Replace/Overide from file/copy & paste/etc. Export part of it/save it all
8 Configuration Atomic changes No time constrain to change the configuration Automatic rollback if changes are not confirmed Automatic backup possibility to rollback to any previous configuration version Compare the current configuration with any stored backup Export to ftp on change Changes are syntax checked Can be a pain as it will not let you test a invalid configuration
9 Turn off the red light Juniper expect a management through the dedicated management internet interface. chassis { alarm { management-ethernet { link-down ignore;
10 Policies The JunOS route-map Used to Originate routes Filter route to learn / announce Are a succession of term (if then blocks) Every keyword (term, from, then) if optional terms can Accept a route Reject the route Let the next policy decide Policies be build from other policies
11 Policies - example community drop-ebgp members [ 30740: :65002 ]; community drop-ix members [ 30740: :65004 ]; policy-statement export-bgp { term remove-ebgp { from { protocol bgp; community drop-ebgp; then reject; term remove-ix { from { protocol bgp; community drop-ix; then reject;
12 Policies with BGP [edit protocol bgp] group linx { type external; import [ no-ix no-bogons no-small-prefixes tag-linx damping local-preferencepeer community-clear ]; export [ originate export-peering export-linx community-clear next-hop-self ]; neighbor { apply-groups bgp-limit-50; description "LINX / Route Collector"; authentication-key "$..."; peer-as 5459;
13 Originate a route Filter can normally be chained allowing to reuse the power of other filters and thus making the configuration easier to maintain and more readable. However, originated routes need to be accepted in the filter where they are injected
14 Originate a route routing-options { aggregate { route /16 community 30740:65400; policy-options { community originate members 30740:65400; policy-statement originate { term tag { from { protocol aggregate; community originate; then { community delete originate; accept; (static route can as well be used instead of aggregate)
15 Groups JunOS allows to define configuration template Can be used to define your interfaces common attribute (core, transit, peering, customers, ) Abuse it to define BGP prefix-limit Use display inheritance allow to see implicitly what is explicit otherwise
16 Groups groups { name { interfaces { <ge-*> { vlan-tagging; link-mode full-duplex; unit <*> { family inet { no-redirects; interfaces { apply-groups name; ge-0/3/0 { description core vlan unit 80 { apply-groups sub; vlan-id 18; family inet { /* Local comment */ address /28;
17 Using BGP to setup firewall rules BGP and JunOS SCU can be use to build firewall rules from BGP tagged routes The same thing may be better done using Juniper flows implementation using the latest JunOS release. if interested see :
18 Complain No easy way to see flow information Like show ip cache flow with cisco Need to capture the packet and pass them to the control plane which can then get overloaded and become unresponsive Same issue with netflow export, a DDOS may not take the forwarding plane off but may overload the netflow daemon, causing IGP/BGP update drop. Juniper sell some hardware accelaration cards to offload those tasks from the CPU Learning curve and all which goes with it.
19 Conclusion What problem did the introduction of Juniper caused? Full BGP table leak to one peer due to misconfiguration 5 minutes when the planned update to allow data flow collection obliged us to use out-ofband access to the router to rollback our changes All in one it went pretty well I would do it again
20 Thank you for faking interest all the way through ( or not ) Questions? ( If times allow )
JUNOS Secure BGP Template
JUNOS Secure BGP Template Version 1.92, 03/30/2005 Stephen Gill E-mail: [email protected] Published: 04/25/2001 Contents Credits... 2 Introduction... 2 Template... 4 References... 10 Credits Rob Thomas
Application Note: Securing BGP on Juniper Routers
Application Note: Securing BGP on Juniper Routers Version 1.92, 03/30/2005 Stephen Gill E-mail: [email protected] Published: 06/16/2002 Contents Introduction Introduction... 2 Assumptions... 3 Topology...
Application Note: Securing BGP on Juniper Routers
Application Note: Securing BGP on Juniper Routers Version 1.8, 02/13/2003 Stephen Gill E-mail: [email protected] Published: 06/16/2002 qorbit Technologies Contents Introduction Introduction... 2 Assumptions...
Tutorial: Options for Blackhole and Discard Routing. Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia
Tutorial: Options for Blackhole and Discard Routing Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia Caveats and Assumptions The views presented here are those of the authors and they do not
SRX High Availability Design Guide
SRX High Availability Design Guide Introduction The purpose of this design guide is to lay out the different high availability deployment scenarios and provide sample configurations for the different scenarios.
J-Flow on J Series Services Routers and Branch SRX Series Services Gateways
APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring
Network Configuration Example
Network Configuration Example Virtual Router Use Case for Educational Networks Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
Computer Networks Administration Help Manual Sana Saadaoui Jemai Oliver Wellnitz
Technische Universität Braunschweig Institut für Betriebssysteme und Rechnerverbund Computer Networks Administration Help Manual Sana Saadaoui Jemai Oliver Wellnitz Braunschweig, 27 th March 2007 Contents
Understanding Route Aggregation in BGP
Understanding Route Aggregation in BGP Document ID: 5441 Contents Introduction Prerequisites Requirements Components Used Conventions Network Diagram Aggregate Without the as set Argument Aggregate with
Juniper Networks Certified Internet Associate (JNCIA-Junos) Exam. http://www.examskey.com/jn0-101.html
Juniper JN0-101 Juniper Networks Certified Internet Associate (JNCIA-Junos) Exam TYPE: DEMO http://www.examskey.com/jn0-101.html Examskey Juniper JN0-101 exam demo product is here for you to test the quality
Network Configuration Example
Network Configuration Example Load Balancing Layer 3 VPN Traffic While Simultaneously Using IP Header Filtering Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California
Basic Configuration Examples for BGP
Application Note Basic Configuration Examples for BGP Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net Part Number: :350008-001 04/02
Cisco Network Foundation Protection Overview
Cisco Network Foundation Protection Overview June 2005 1 Security is about the ability to control the risk incurred from an interconnected global network. Cisco NFP provides the tools, technologies, and
DD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA
DD2491 p1 2008 Load balancing BGP Johan Nicklasson KTHNOC/NADA Dual home When do you need to be dual homed? How should you be dual homed? Same provider. Different providers. What do you need to have in
How To Understand Bg
Table of Contents BGP Case Studies...1 BGP4 Case Studies Section 1...3 Contents...3 Introduction...3 How Does BGP Work?...3 ebgp and ibgp...3 Enabling BGP Routing...4 Forming BGP Neighbors...4 BGP and
JUNOS Secure Template
JUNOS Secure Template Version 1.92, 03/30/2005 Stephen Gill E-mail: [email protected] Published: 04/25/2001 Contents Credits... 2 Introduction... 2 Template... 4 References... 17 Credits Rob Thomas [[email protected]]
DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC
DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:
Chapter 7 Configuring Trunk Groups and Dynamic Link Aggregation
Chapter 7 Configuring Trunk Groups and Dynamic Link Aggregation This chapter describes how to configure trunk groups and 802.3ad link aggregation. Trunk groups are manually-configured aggregate links containing
Configuring NetFlow Secure Event Logging (NSEL)
75 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide
AWS Direct Connect. User Guide API Version 2013-10-22
AWS Direct Connect User Guide AWS Direct Connect: User Guide AWS Direct Connect User Guide Table of Contents What is AWS Direct Connect?... 1 Requirements... 1 How Do I...?... 2 Getting Started... 3 Getting
A Systematic Approach to BGP Configuration Checking
A Systematic Approach to BGP Configuration Checking Nick Feamster and Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory {feamster,hari}@lcs.mit.edu http://nms.lcs.mit.edu/bgp/
Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches
APPLICATION NOTE Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches Exporting sflow to Collectors Through a Separate Virtual Routing Instance Copyright 2009, Juniper Networks,
MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES
APPLICATION NOTE MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES Exporting sflow to Collectors Through a Separate Virtual Routing Instance Copyright 2010, Juniper Networks,
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
Load balancing and traffic control in BGP
DD2491 p2 2009/2010 Load balancing and traffic control in BGP Olof Hagsand KTH /CSC 1 Issues in load balancing Load balancing: spread traffic on several paths instead of a single. Why? Use resources better
Implementing Firewalls inside the Core Data Center Network
IMPLEMENTATION GUIDE Implementing Firewalls inside the Core Data Center Network Best Practices for Implementing Juniper Networks Firewall Devices in the Data Center Core Copyright 2010, Juniper Networks,
Junos OS for EX Series Ethernet Switches
Junos OS for EX Series Ethernet Switches Analyzers for EX9200 Switches Release 13.3 Published: 2014-08-07 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
Implementing Firewalls inside the Core Data Center Network
Implementation Guide Implementing Firewalls inside the Core Data Center Network Best Practices for Implementing Juniper Networks Firewall Devices in the Data Center Core Juniper Networks, Inc. 1194 North
Network Configuration Example
Network Configuration Example Configuring Security Options for BGP with TCP Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
Enabling NetFlow and NetFlow Data Export (NDE) on Cisco Catalyst Switches
Enabling NetFlow and NetFlow Data Export (NDE) on Cisco Catalyst Switches Revised 2/1/2007 Introduction...2 Requirements...2 Catalyst 4500 Series...2 Enabling NetFlow...2 Configuring a NetFlow Destination...3
BGP1 Multihoming and Traffic Engineering
83950 Telecommunications Laboratory Course BGP1 BGP1 Multihoming and Traffic Engineering date & time student # name 1 2 bgp-tyo.tex,v 1.11 2005/04/18 14:09:14 ams Exp 1/17 Part I Home Assignment 1 General
Load balancing and traffic control in BGP
DD2491 p2 2011 Load balancing and traffic control in BGP Olof Hagsand KTH CSC 1 Issues in load balancing Load balancing: spread traffic on several paths instead of a single. Why? Use resources better Can
Network provider filter lab
Network provider filter lab Olof Hagsand Pehr Söderman KTH CSC Group Nr Name 1 Name 2 Name 3 Name 4 Date Instructor s Signature Table of Contents 1 Goals...3 2 Introduction...3 3 Preparations...3 4 Lab
Module 12 Multihoming to the Same ISP
Module 12 Multihoming to the Same ISP Objective: To investigate various methods for multihoming onto the same upstream s backbone Prerequisites: Module 11 and Multihoming Presentation The following will
Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines
Bell Aliant Business Internet Border Gateway Protocol Policy and Features Guidelines Effective 05/30/2006, Updated 1/30/2015 BGP Policy and Features Guidelines 1 Bell Aliant BGP Features Bell Aliant offers
Transitioning to BGP. ISP Workshops. Last updated 24 April 2013
Transitioning to BGP ISP Workshops Last updated 24 April 2013 1 Scaling the network How to get out of carrying all prefixes in IGP 2 Why use BGP rather than IGP? p IGP has Limitations: n The more routing
Why Is MPLS VPN Security Important?
MPLS VPN Security An Overview Monique Morrow Michael Behringer May 2 2007 Future-Net Conference New York Futurenet - MPLS Security 1 Why Is MPLS VPN Security Important? Customer buys Internet Service :
Introduction to the Junos Operating System
Introduction to the Junos Operating System Chapter 5: Secondary System Configuration 2012 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services Chapter Objectives After
Understanding Virtual Router and Virtual Systems
Understanding Virtual Router and Virtual Systems PAN- OS 6.0 Humair Ali Professional Services Content Table of Contents VIRTUAL ROUTER... 5 CONNECTED... 8 STATIC ROUTING... 9 OSPF... 11 BGP... 17 IMPORT
Using the Border Gateway Protocol for Interdomain Routing
CHAPTER 12 Using the Border Gateway Protocol for Interdomain Routing The Border Gateway Protocol (BGP), defined in RFC 1771, provides loop-free interdomain routing between autonomous systems. (An autonomous
Network Security Knowledge is Everything! Network Operations
Network Security Knowledge is Everything Network Operations Warrick Mitchell - Network Engineer [email protected] Agenda What is Network Security General Configuration Security Logging and
Overview. Why use netflow? What is a flow? Deploying Netflow Performance Impact
Netflow 6/12/07 1 Overview Why use netflow? What is a flow? Deploying Netflow Performance Impact 2 Caveats Netflow is a brand name like Kleenex. It was developed by Cisco Juniper uses the term cflowd for
MPLS. Cisco MPLS. Cisco Router Challenge 227. MPLS Introduction. The most up-to-date version of this test is at: http://networksims.com/i01.
MPLS Cisco MPLS MPLS Introduction The most up-to-date version of this test is at: http://networksims.com/i01.html Cisco Router Challenge 227 Outline This challenge involves basic frame-mode MPLS configuration.
Application Note. Failover through BGP route health injection
Application Note Document version: v1.2 Last update: 8th November 2013 Purpose This application note aims to describe how to build a high available platform using BGP routing protocol to choose the best
Chapter 33 BGP Configuration Guidelines
Chapter 33 BGP Configuration Guidelines To configure the Border Gateway Protocol (BGP), you can include the following statements. Three portions of the bgp statement those in which you configure global
Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio [email protected] May 2013
Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec Leonardo Serodio [email protected] May 2013 Distributed Denial of Service (DDoS) Attacks DDoS attack traffic consumes
Configuration and File Management Feature Guide for QFabric Systems
Configuration and File Management Feature Guide for QFabric Systems Release 14.1X53 Modified: 2015-08-20 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
ProteusElite:HowTo. 2011 Proteus Networks Proteus Elite:HowTo Page 1
Setting up an Out of Band Management Network on an SRX In this guide I describe one of the many methods of creating an out-of-band management network for the SRX Series Services Gateways. Background In
USING MX SERIES AS A SERVER LOAD BALANCER
APPLICATION NOTE USING MX SERIES AS A SERVER LOAD BALANCER Leveraging ECMP and the Trio 3D Chipset to Integrate Functionality Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Introduction.....................................................................................................3
NetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
s@lm@n Juniper Exam JN0-343 Juniper Networks Certified Internet Specialist (JNCIS-ENT) Version: 10.1 [ Total Questions: 498 ]
s@lm@n Juniper Exam JN0-343 Juniper Networks Certified Internet Specialist (JNCIS-ENT) Version: 10.1 [ Total Questions: 498 ] Topic 1, Volume A Question No : 1 - (Topic 1) How much overhead does the GRE
BGP configuration best practices
BGP configuration best practices Document produced by ANSSI (French National Security Agency of Information Systems), in collaboration with the following operators: Association Kazar ; France-IX ; Jaguar
Troubleshooting and Maintaining Cisco IP Networks Volume 1
Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training
DESTINATION BASED RTBH FILTERING AT ATTACK ORIGINATING INTERNET SERVICE PROVIDER
DESTINATION BASED RTBH FILTERING AT ATTACK ORIGINATING INTERNET SERVICE PROVIDER Sarita Sharma 1, Davender Saini 2 1 Student M. Tech. ECE (2013-2015) Gurgaon Institute of Technology Management (M.D.U)
Network Configuration Example
Network Configuration Example Configuring Multiple Port Mirroring Sessions on EX4200 Switches Published: 2014-04-09 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
APNIC elearning: BGP Attributes
APNIC elearning: BGP Attributes Contact: [email protected] erou04_v1.0 Overview BGP Attributes Well-known and Optional Attributes AS Path AS Loop Detection ibgp and ebgp Next Hop Next Hop Best Practice
Basic & Advanced Administration for Citrix NetScaler 9.2
Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios
Configuring DHCP Snooping and IP Source Guard
CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping and IP Source Guard on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration
Network Configuration Example
Network Configuration Example Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California
Testing Juniper Networks M40 Router MPLS Interoperability with Cisco Systems 7513 and 12008 Routers
Interoperability Test Paper Testing Juniper Networks M40 Router MPLS Interoperability with Cisco Systems 7513 and 12008 Routers Mark Anderson, Systems Engineer Annette Kay Donnell, Marketing Engineer Juniper
Configuring IP Load Sharing in AOS Quick Configuration Guide
Configuring IP Load Sharing in AOS Quick Configuration Guide ADTRAN Operating System (AOS) includes IP Load Sharing for balancing outbound IP traffic across multiple interfaces. This feature can be used
Chapter 49 Border Gateway Protocol version 4 (BGP-4)
Chapter 49 Border Gateway Protocol version 4 (BGP-4) Introduction... 1-3 Overview of BGP-4... 1-3 BGP Operation... 1-5 BGP Attributes... 1-6 BGP Route Selection... 1-8 Classless Inter-domain Routing (CIDR)
Smart Management for Robust Carrier Network Health & Reduced TCO. Colby Barth, Distinguished Engineer, Juniper Networks
Smart Management for Robust Carrier Network Health & Reduced TCO Colby Barth, Distinguished Engineer, Juniper Networks PHILOSOPHICALLY SPEAKING Only you know your network! Enable smart network management
Internet inter-as routing: BGP
Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means to: 1. Obtain subnet reachability information from neighboring ASs. 2. Propagate the reachability
Design, Implementation and Evolution of a DNS anycast resolving service in a country-wide ISP network
Design, Implementation and Evolution of a DNS anycast resolving service in a country-wide ISP network Kostas Zorbadelos OTE SA Senior Systems & Network Engineer GRNOG 1 June 5 2015 Presentation Outline
Junos Switching Basics
Lab Guide Worldwide Education Services 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Course Number: SSEX03 This document is produced by Juniper Networks, Inc. This document
How To Backup In Cisco Uk Central And Cisco Cusd (Cisco) Cusm (Custodian) (Cusd) (Uk) (Usd).Com) (Ucs) (Cyse
This chapter includes the following sections: Backup and Import in Cisco UCS Central, page 1 Backing up and Restoring Cisco UCS Central, page 4 Backing up and Restoring Cisco UCS Domains, page 8 Import
Network Configuration Example
Network Configuration Example Configuring Branch SRX Series for MPLS over IPsec (1500-byte MTU) Published: 2014-12-17 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
DNS Best Practices. Mike Jager Network Startup Resource Center [email protected]
DNS Best Practices Mike Jager Network Startup Resource Center [email protected] This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org). This document may be
netkit lab bgp: prefix-filtering Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab bgp: prefix-filtering Version Author(s) E-mail Web Description 2.1 G. Di Battista,
IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)
IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE) COURSE OVERVIEW: Implementing Cisco IP Routing (ROUTE) v2.0 is an instructor-led five day training course developed to help students prepare for Cisco CCNP _
Border Gateway Protocol Best Practices
Border Gateway Protocol Best Practices By Clifton Funakura The Internet has grown into a worldwide network supporting a wide range of business applications. Many companies depend on the Internet for day-to-day
How To Import Ipv4 From Global To Global On Cisco Vrf.Net (Vf) On A Vf-Net (Virtual Private Network) On Ipv2 (Vfs) On An Ipv3 (Vv
BGP Support for IP Prefix Import from Global Table into a VRF Table The BGP Support for IP Prefix Import from Global Table into a VRF Table feature introduces the capability to import IPv4 unicast prefixes
What network engineers can learn from web developers when thinking SDN.
What network engineers can learn from web developers when thinking SDN. NETNOD Meeting October 2015 Thomas Mangin Director at various shops ( Exa Networks, IXLeeds, LINX ) Also Developer, Network Engineer,
Configuring NetFlow Switching
Configuring NetFlow Switching This chapter describes how to configure NetFlow switching. For a complete description of NetFlow commands used in this chapter, refer to the Cisco IOS Switching s chapter
Configuring VIP and Virtual IP Interface Redundancy
CHAPTER 6 Configuring VIP and Virtual IP Interface Redundancy This chapter describes how to plan for and configure Virtual IP (VIP) and Virtual IP Interface Redundancy on the CSS. Information in this chapter
Anycast Rou,ng: Local Delivery. Tom Daly, CTO h<p://dyn.com Up,me is the Bo<om Line
Anycast Rou,ng: Local Delivery Tom Daly, CTO h
Solution Guide. Software as a Service. Modified: 2015-12-18. Copyright 2015, Juniper Networks, Inc.
Solution Guide Software as a Service Modified: 2015-12-18 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks,
BGP Support for Next-Hop Address Tracking
The feature is enabled by default when a supporting Cisco software image is installed. BGP next-hop address tracking is event driven. BGP prefixes are automatically tracked as peering sessions are established.
Hunting down a DDOS attack
2006-10-23 1 Hunting down a DDOS attack By Lars Axeland +46 70 5291530 [email protected] 2006-10-23 What we have seen so far What can an operator do to achieve core security What solution can
How To Set Up Bgg On A Network With A Network On A Pb Or Pb On A Pc Or Ipa On A Bg On Pc Or Pv On A Ipa (Netb) On A Router On A 2
61200860L1-29.4E March 2012 Configuration Guide Configuring Border Gateway Protocol in AOS for Releases Prior to 18.03.00/R10.1.0 This guide only addresses BGP in AOS data products using AOS firmware prior
Advanced BGP Policy. Advanced Topics
Advanced BGP Policy George Wu TCOM690 Advanced Topics Route redundancy Load balancing Routing Symmetry 1 Route Optimization Issues Redundancy provide multiple alternate paths usually multiple connections
HP Networking BGP and MPLS technology training
Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,
Monitoring and Troubleshooting BGP Neighbor Sessions
Application Note Monitoring and Troubleshooting BGP Neighbor Sessions Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net Part Number:
BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543)
BGP FORGOTTEN BUT USEFUL FEATURES Piotr Wojciechowski (CCIE #25543) ABOUT ME Senior Network Engineer MSO at VeriFone Inc. Previously Network Solutions Architect at one of top polish IT integrators CCIE
> Border Gateway Protocol (BGP-4) Technical Configuration Guide. Ethernet Routing Switch. Engineering
Ethernet Routing Switch 8600 Engineering > Border Gateway Protocol (BGP-4) Technical Configuration Guide Enterprise Solution Engineering Document Date: November, 2007 Document Number: NN48500-538 Document
Firewall-on-Demand. GRNET s approach to advanced network security services management via bgp flow-spec and NETCONF. Leonidas Poulopoulos
Firewall-on-Demand GRNET s approach to advanced network security services management via bgp flow-spec and NETCONF Leonidas Poulopoulos 1 leopoul@nocgrnetgr 1 NOC/Greek Research and Technology Network
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
APNIC elearning: BGP Basics. Contact: [email protected]. erou03_v1.0
erou03_v1.0 APNIC elearning: BGP Basics Contact: [email protected] Overview What is BGP? BGP Features Path Vector Routing Protocol Peering and Transit BGP General Operation BGP Terminology BGP Attributes
BGP Attributes and Path Selection
BGP Attributes and Path Selection ISP Workshops Last updated 29 th March 2015 1 BGP Attributes BGP s policy tool kit 2 What Is an Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes
NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes
NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to
Cisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
Appendix A Remote Network Monitoring
Appendix A Remote Network Monitoring This appendix describes the remote monitoring features available on HP products: Remote Monitoring (RMON) statistics All HP products support RMON statistics on the
JUNOS Command Line Interface. Copyright 2003 Juniper Networks, Inc. www.juniper.net 1
JUNOS Command Line Interface Copyright 2003 Juniper Networks, Inc. www.juniper.net 1 Agenda Command-Line Interface Logging-In & Editing Interpret Output & Getting Help CLI Configuration Moving around Hierarchy
JUNOScope IP Service Manager
Datasheet JUNOScope IP Service Manager Product Description As service providers and enterprises evolve to meet the demands of their customer base, one key to success is the enhancement of operational efficiencies
Understanding Route Redistribution & Filtering
Understanding Route Redistribution & Filtering When to Redistribute and Filter PAN-OS 5.0 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Route Redistribution......
DAY ONE: CONFIGURING JUNOS POLICY AND FIREWALL FILTERS
Junos Fundamentals Series DAY ONE: CONFIGURING JUNOS POLICY AND FIREWALL FILTERS Control routing information and influence packet flow through your Juniper Networks router or switch by mastering the primary
Juniper Secure Analytics
Juniper Secure Analytics Virtual Appliance Installation Guide Release 2014.1 Published: 2014-12-04 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
