In this activity, you will complete the following objectives.
|
|
|
- Maude Fowler
- 10 years ago
- Views:
Transcription
1 Lab 3-1: JIR Lab Guide Load Balancing and Filter-Based Forwarding In this activity, you will complete the following objectives. Part 1: Configure load balancing. Part 2: Configure filter based forwarding. Page 1
2 Part 1: Configure load balancing Step 1.1 Reload the LAB2-1 configuration. This will remove all configured routes from your device. load override JIR.LAB21 load complete Step 1.2 Go to your DMZ-P, add an additional IP addresses to NIC (Local Area Connection): Leave the original address unchanged. IP address: P Default gateway: P.1 Add additional IP as below: P Open an IE browser and browser to the newly added address to make sure you see the DMZ-P web page displayed. Step 1.3 Configure equal cost static routes for both RA and Master routing instances. edit routing-instances RA routing-options [edit routing-instances RA routing-options] set static route /24 next-hop P.1 [edit routing-instances RA routing-options] set static route /24 next-hop P.10 [edit routing-instances RA routing-options] Page 2
3 set static route 10.0.P.0/24 next-hop P.1 JIR Lab Guide [edit routing-instances RA routing-options] set static route 10.0.P.0/24 next-hop P.1 [edit routing-instances RA routing-options] edit routing-options set static route /0 next-hop P.2 set static route /0 next-hop P.2 run show route protocol static table RA.inet.0 RA.inet.0: 11 destinations, 11 routes (11 active, 0 holddown, 0 hidden) + = Active Route, - = Last Active, * = Both 10.0.P.0/24 *[Static/5] 00:01:14 > to P.1 via lt-0/0/0.2 to P.1 via lt-0/0/ /24 *[Static/5] 00:01:14 to P.1 via ge-0/0/2.0 > to P.10 via ge-0/0/3.0 admin@srxp# run show route protocol static table inet.0 inet.0: 8 destinations, 8 routes (8 active, 0 holddown, 0 hidden) + = Active Route, - = Last Active, * = Both /0 *[Static/5] 00:01:23 to P.2 via lt-0/0/0.1 > to P.2 via lt-0/0/0.3 Page 3
4 Step 1.4 Configure policy statement and enable load-balancing to subnet. edit policy-options policy-statement POLICY:LB [edit policy-options policy-statement POLICY:LB] set term 1 from protocol static route-filter /24 exact [edit policy-options policy-statement POLICY:LB] admin@srxp# set term 1 then load-balance per-packet [edit policy-options policy-statement POLICY:LB] admin@srxp# show term 1 { from { protocol static; route-filter /24 exact; then { load-balance per-packet; [edit policy-options policy-statement POLICY:LB] admin@srxp# edit routing-options forwarding-table [edit routing-options forwarding-table] admin@srxp# set export POLICY:LB [edit routing-options forwarding-table] Step 1.4 Verify and test the load balancing static route. Page 4
5 How to verify the load balancing from the forwarding-table? [edit routing-options forwarding-table] run show route table RA.inet.0 find /24 *[Static/5] 00:09:08 to P.1 via ge-0/0/2.0 > to P.10 via ge-0/0/ P.0/24 *[Direct/0] 1d 03:30:18 > via ge-0/0/ P.2/32 *[Local/0] 1d 03:30:18 Local via ge-0/0/2.0 [edit routing-options forwarding-table] run show route forwarding-table find /24 user 0 ulst P.1 ucst ge-0/0/ P.10 ucst ge-0/0/ P.0/24 intf 0 rslv ge-0/0/ P.0/32 dest P.0 recv ge-0/0/ P.1/32 dest 0 0:1e:13:35:dc:a8 ucst ge-0/0/ P.2/32 intf P.2 locl P.2/32 dest P.2 locl P.255/32 dest P.255 bcst ge-0/0/ /4 perm 0 mdsc /32 perm mcst /32 perm 0 bcst Go to your INSIDE-PA. Open 4~5 of your IE browser and make each of them browse to P Can you see different web page displayed on each browser window? What it the cause for this result? Step 1.5 Enable load-balancing the traffic flow based on both layer-3 and layer-4 information. [edit routing-options forwarding-table] admin@srxp# edit forwarding-options [edit forwarding-options] Page 5
6 set hash-key family inet layer-3 [edit forwarding-options] set hash-key family inet layer-4 [edit forwarding-options] Go to your INSIDE-PA. Do the same test as in previous step. Can you see different web page displayed on each browser window? What is the cause for this result? Part 2: Configure Filter-Based Forwarding Step 2.1 Create two additional routing-instances and static routes as below: 1. Routing Instance PATH1 -> Takes P.2 as next-hop to subnet. 2. Routing Instance PATH2 -> Takes P.2 as next-hop to subnet. 3. Create rib-group GROUP-FBF [edit forwarding-options] edit routing-instances PATH1 [edit routing-instances PATH1] set instance-type forwarding routing-options static route P/32 next-hop P.2 [edit routing-instances PATH1] edit routing-instances PATH2 [edit routing-instances PATH2] set instance-type forwarding routing-options static route P/32 next-hop P.2 [edit routing-instances PATH2] Page 6
7 edit routing-options JIR Lab Guide set interface-routes rib-group GROUP-FBF set rib-groups GROUP-FBF import-rib [inet.0 PATH1.inet.0 PATH2.inet.0] Step 2.2 Verify the interface routes in the newly created routing instance. By checking routing instance PATH1, which next-hop and interface will be taken to forward traffic to P? By checking routing instance PATH2, which next-hop and interface will be taken to forward traffic to P? run show route P table PATH1.inet.0 PATH1.inet.0: 8 destinations, 8 routes (8 active, 0 holddown, 0 hidden) + = Active Route, - = Last Active, * = Both P/32 *[Static/5] 00:03:14 > to P.2 via lt-0/0/0.1 admin@srxp# run show route P table PATH2.inet.0 PATH2.inet.0: 8 destinations, 8 routes (8 active, 0 holddown, 0 hidden) + = Active Route, - = Last Active, * = Both P/32 *[Static/5] 00:03:28 > to P.2 via lt-0/0/0.3 Step 2.3 Page 7
8 Create a firewall policy to match and forward traffic based on objectives as below: 1. Traffic from INSIDE-PA(10.0.P.10), forward using PATH1 routing instance. 2. Traffic from INSIDE-PB(10.0.P.11), forward using PATH2 routing instance. 3. Apply the firewall policy in the interface receiving traffics. admin@srxp# edit firewall family inet filter FILTER:FBF admin@srxp# set term 1 from source-address 10.0.P.10/32 admin@srxp# set term 1 then routing-instance PATH1 admin@srxp# set term 2 from source-address 10.0.P.11/32 admin@srxp# set term 2 then routing-instance PATH2 edit interfaces ge-0/0/5 unit 0 family inet [edit interfaces ge-0/0/5 unit 0 family inet] admin@srxp# set filter input FILTER:FBF [edit interfaces ge-0/0/5 unit 0 family inet] Step 2.5 Go to your INSIDE-PA and INSIDE-PB, verify the routing path by using command tracert d P. INSIDE-PA should take the two paths in turn as following: P P Or Page 8
9 P P P JIR Lab Guide INSIDE-PB should take the two paths in turn as following: P P Or P P P Go to your INSIDE-PB. Change the IP address from 10.0.P.11 to 10.0.P.20. Leave the default gateway as 10.0.P.1 unchanged. Open a new browser windows and access to You should not see any web page displayed Why can t you browse to P? How to fix the problem? Step 2.6 Modify the firewall policy to accept traffic with other source address. [edit interfaces ge-0/0/5 unit 0 family inet] admin@srxp# edit firewall family inet filter FILTER:FBF admin@srxp# show term 1 { from { source-address { 10.0.P.10/32; then { Page 9
10 routing-instance PATH1; term 2 { from { source-address { 10.0.P.11/32; then { routing-instance PATH2; admin@srxp# set term 3 then accept Your INSIDE-PB should be able to browse to P. After the testing, change the IP address to the original address (10.0.P ) Step 2.6 Save the current configuration to admin s home directory. admin@srxp# save JIR.LAB31 Wrote 30 lines of configuration to 'JIR.LAB31' admin@srxp# run file list /cf/var/home/admin/:.ssh/ JIR.LAB21 JIR.LAB22 JIR.LAB23 JIR.LAB31 By saving your current configuration, you are able to rollback at anytime. For Example: Page 10
11 load override JIR.LAB31 load complete JIR Lab Guide Tell your instructor that you have completed this lab. Page 11
Network Configuration Example
Network Configuration Example Load Balancing Layer 3 VPN Traffic While Simultaneously Using IP Header Filtering Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California
Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches
APPLICATION NOTE Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches Exporting sflow to Collectors Through a Separate Virtual Routing Instance Copyright 2009, Juniper Networks,
MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES
APPLICATION NOTE MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES Exporting sflow to Collectors Through a Separate Virtual Routing Instance Copyright 2010, Juniper Networks,
Network Configuration Example
Network Configuration Example Virtual Router Use Case for Educational Networks Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
JNCIA-Junos Study Guide Part 2
Worldwide Education Services 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net This document is produced by Juniper Networks, Inc. This document or any part thereof may not
Implementation Guide. Juniper Networks SRX Series Services Gateways/ Websense V10000 G2 appliance. v7.6
Juniper Networks SRX Series Services Gateways/ Websense V10000 G2 appliance v7.6 Juniper Networks SRX Series Services Gateways/Websense V10000 G2 appliance Copyright 1996-2011 Websense, Inc. All rights
ProteusElite:HowTo. 2011 Proteus Networks Proteus Elite:HowTo Page 1
Setting up an Out of Band Management Network on an SRX In this guide I describe one of the many methods of creating an out-of-band management network for the SRX Series Services Gateways. Background In
Tutorial: Options for Blackhole and Discard Routing. Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia
Tutorial: Options for Blackhole and Discard Routing Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia Caveats and Assumptions The views presented here are those of the authors and they do not
JUNOS Secure BGP Template
JUNOS Secure BGP Template Version 1.92, 03/30/2005 Stephen Gill E-mail: [email protected] Published: 04/25/2001 Contents Credits... 2 Introduction... 2 Template... 4 References... 10 Credits Rob Thomas
Network Configuration Example
Network Configuration Example Configuring a Single SRX Series Device in a Branch Office Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
Network Configuration Example
Network Configuration Example Configuring IP Monitoring on an SRX Series Device for the Branch Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
CLOS IP FABRICS WITH QFX5100 SWITCHES
White Paper CLOS IP FABRICS WITH QFX5100 SWITCHES Building Flexible, Programmable Data Center Networks Using Layer 3 Protocols and Overlay Networking Copyright 2014, Juniper Networks, Inc. 1 Table of Contents
Implementing L3 at the Data Center Access Layer on Juniper Networks Infrastructure
Implementation Guide Implementing L3 at the Data Center Access Layer on Juniper Networks Infrastructure Copyright 2009, Juniper Networks, Inc. Table of Contents Introduction...4 Scope...5 Target Audience...
USING MX SERIES AS A SERVER LOAD BALANCER
APPLICATION NOTE USING MX SERIES AS A SERVER LOAD BALANCER Leveraging ECMP and the Trio 3D Chipset to Integrate Functionality Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Introduction.....................................................................................................3
How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface
How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface How To Configure load sharing and redirect mail server traffic over preferred Gateway
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
Application Note: Securing BGP on Juniper Routers
Application Note: Securing BGP on Juniper Routers Version 1.92, 03/30/2005 Stephen Gill E-mail: [email protected] Published: 06/16/2002 Contents Introduction Introduction... 2 Assumptions... 3 Topology...
Junos OS. Traffic Sampling, Forwarding, and Monitoring Feature Guide for Routing Devices. Release 13.3. Published: 2014-01-10
Junos OS Traffic Sampling, Forwarding, and Monitoring Feature Guide for Routing Devices Release 13.3 Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089
s@lm@n Juniper Exam JN0-343 Juniper Networks Certified Internet Specialist (JNCIS-ENT) Version: 10.1 [ Total Questions: 498 ]
s@lm@n Juniper Exam JN0-343 Juniper Networks Certified Internet Specialist (JNCIS-ENT) Version: 10.1 [ Total Questions: 498 ] Topic 1, Volume A Question No : 1 - (Topic 1) How much overhead does the GRE
I've applied for a goipv6 account and received my password via email but I cannot log into my account. What should I do?
goipv6 FAQ goipv6 Account I've applied for a goipv6 account and received my password via email but I cannot log into my account. What should I do? I would like to change my current password. What should
Network Configuration Example
Network Configuration Example Configuring Branch SRX Series for MPLS over IPsec (1500-byte MTU) Published: 2014-12-17 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
Lab 7.2.9 Load Balancing Across Multiple Paths
Lab 7.2.9 Load Balancing Across Multiple Paths Objective Configure Load balance across multiple paths. Observe the load balancing process. Background/Preparation Cable a network similar to the one in the
Application Note: Securing BGP on Juniper Routers
Application Note: Securing BGP on Juniper Routers Version 1.8, 02/13/2003 Stephen Gill E-mail: [email protected] Published: 06/16/2002 qorbit Technologies Contents Introduction Introduction... 2 Assumptions...
Network Configuration Example
Network Configuration Example Configuring Multiple Port Mirroring Sessions on EX4200 Switches Published: 2014-04-09 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch
Vocia MS-1 Network Considerations for VoIP Vocia software rev. 1.4 or higher required Vocia MS-1 and Network Port Configuration The Vocia Message Server 1 (MS-1) has a number of roles in a Vocia Paging
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Document No. FO1101 Issue Date: Work Group: FibreOP Technical Team October 31, 2013 FINAL:
Document No. FO1101 Issue Date: Work Group: FibreOP Technical Team October 31, 2013 FINAL: Title: FibreOP Business Internet 5 Static IP Customer Configuration Version 1.1 Summary: This document provides
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC
CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC 1 Introduction Release date: 11/12/2003 This application note details the steps for creating an IKE IPSec VPN tunnel
JNCIE Juniper Networks Certified Internet Expert
JNCIE Juniper Networks Certified Internet Expert Study Guide - Chapter 1 by Harry Reynolds This book was originally developed by Juniper Networks Inc. in conjunction with Sybex Inc. It is being offered
Lab 4.5.4 Diagramming External Traffic Flows
Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1
CheckPoint Software Technologies LTD. How to Configure Firewall-1 With Connect Control
CheckPoint Software Technologies LTD. How to Configure Firewall-1 With Connect Control (Load-Balance across multiple servers) Event: Partner Exchange Conference Date: October 10, 1999 Revision 1.0 Author:
Layer 3 Redundancy with HSRP By Sunset Learning Instructor Andrew Stibbards
Layer 3 Redundancy with HSRP By Sunset Learning Instructor Andrew Stibbards Hot Standby Router Protocol (HSRP) is a Cisco proprietary protocol which allows several routers or multilayer switches to appear
DSL-G604T Install Guides
Internet connection with NAT...2 Internet connection with No NAT, IP Un-number...6 Port Forwarding...12 Filtering & Firewall Setup...20 Access Control... 21 DMZ Setup... 26 Allow Incoming Ping... 27 How
Load Balancing. Published: 2013-12-09. Copyright 2013, Juniper Networks, Inc.
Load Balancing Published: 2013-12-09 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, Junos, Steel-Belted Radius, NetScreen,
Chapter 33 BGP Configuration Guidelines
Chapter 33 BGP Configuration Guidelines To configure the Border Gateway Protocol (BGP), you can include the following statements. Three portions of the bgp statement those in which you configure global
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
Configuring a customer owned router to function as a switch with Ultra TV
Configuring a customer owned router to function as a switch with Ultra TV This method will turn the customer router into a wireless switch and allow the Ultra Gateway to perform routing functions and allow
ΕΠΛ 674: Εργαστήριο 5 Firewalls
ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized
Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network
Introduction p. xix Assessment Test p. xxxviii Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network Components
Anycast Rou,ng: Local Delivery. Tom Daly, CTO h<p://dyn.com Up,me is the Bo<om Line
Anycast Rou,ng: Local Delivery Tom Daly, CTO h
Network Configuration Example
Network Configuration Example Configuring Security Options for BGP with TCP Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
Basic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
Junos Switching Basics
Lab Guide Worldwide Education Services 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Course Number: SSEX03 This document is produced by Juniper Networks, Inc. This document
Lab PC Network TCP/IP Configuration
Lab PC Network TCP/IP Configuration Objective Identify tools used to discover a computer network configuration with various operating systems. Gather information including connection, host name, Layer
REAL-TIME PERFORMANCE MONITORING ON JUNIPER NETWORKS DEVICES
APPLICATION NOTE REAL-TIME PERFORMANCE MONITORING ON JUNIPER NETWORKS DEVICES Tips and Tools for Assessing and Analyzing Network Efficiency Copyright 2010, Juniper Networks, Inc. Table of Contents Table
Network Configuration Example
Network Configuration Example Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California
Solution Guide. Software as a Service. Modified: 2015-12-18. Copyright 2015, Juniper Networks, Inc.
Solution Guide Software as a Service Modified: 2015-12-18 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks,
Hosting more than one FortiOS instance on. VLANs. 1. Network topology
Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of
Basic Configuration Examples for BGP
Application Note Basic Configuration Examples for BGP Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net Part Number: :350008-001 04/02
Part A:Background/Preparation
Lab no 1 PC Network TCP/IP Configuration In this lab we will learn about Computer Networks Configuration Introduction to IP addressing Identify tools used for discovering a computer s network configuration
Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure
Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure August 2015 Table of Contents 1 Introduction... 3 Purpose... 3 Products... 3
Load Balancing. Published: 2014-05-02. Copyright 2014, Juniper Networks, Inc.
Load Balancing Published: 2014-05-02 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, Junos, Steel-Belted Radius, NetScreen,
Creating a VPN with overlapping subnets
Creating a VPN with overlapping subnets This recipe describes how to construct a VPN connection between two networks with overlapping IP addresses in such a way that traffic will be directed to the correct
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized Internet users
Cloud CPE Centralized Deployment Model
Cloud CPE Centralized Deployment Model Deployment Guide Release 1.0 Modified: 2015-12-21 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights
Using VDOMs to host two FortiOS instances on a single FortiGate unit
Using VDOMs to host two FortiOS instances on a single FortiGate unit Virtual Domains (VDOMs) can be used to divide a single FortiGate unit into two or more virtual instances of FortiOS that function as
Implementation Guide NEW NETWORK PLATFORM ARCHITECTURE: WAN. Internet Edge
Implementation Guide NEW NETWORK PLATFORM ARCHITECTURE: WAN Internet Edge Implementation Guide Table of Contents Introduction... 4 Scope... 4 Target Audience... 4 Key Assumptions... 5 Design Considerations...
Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.
Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A
Application Note. Stateful Firewall, IPS or IDS Load- Balancing
Application Note Stateful Firewall, IPS or IDS Load- Balancing Document version: v1.0 Last update: 8th November 2013 Purpose Improve scallability of the security layer Limitations when Load-Balancing firewalls
Network Probe User Guide
Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5
Introduction...3. Scope...3. Design Considerations...3. Hardware Requirements...3. Software Requirements...3. Description and Deployment Scenario...
APPLICATION NOTE Securing Virtualization in the Cloud-Ready Data Center Integrating vgw Virtual Gateway with SRX Series Services Gateways and STRM Series Security Threat Response Manager for Data Center
CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab
CET442L Lab #2 IP Configuration and Network Traffic Analysis Lab Goals: In this lab you will plan and implement the IP configuration for the Windows server computers on your group s network. You will use
Firewall Examples. Using a firewall to control traffic in networks
Using a firewall to control traffic in networks 1 1 Example Network 1 2 1.0/24 1.2.0/24.4 1.0.0/16 Rc 5.6 4.0/24 2 Consider this example internet which has: 6 subnets (blue ovals), each with unique network
Monitoring and Troubleshooting BGP Neighbor Sessions
Application Note Monitoring and Troubleshooting BGP Neighbor Sessions Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net Part Number:
Configuring MassTransit Server to listen on ports less than 1024 using WaterRoof on Macintosh Workstations
Configuring MassTransit Server to listen on ports less than 1024 using WaterRoof on Macintosh Workstations Summary This article explains how to configure MassTransit to listen on ports less than 1024 without
FSM73xx GSM73xx GMS72xxR Shared access to the Internet across Multiple routing VLANs using a Prosafe Firewall
FSM73xx GSM73xx GMS72xxR Shared access to the Internet across Multiple routing VLANs using a Prosafe Firewall This document describes how to: - Create multiple routing VLANs - Obtain Internet access on
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
Laboratory Exercises VII: Network Firewalls
Laboratory Exercises VII: Network Firewalls Dr. sc. Mario Cagalj FESB, University of Split, Croatia January 26, 2010 Our goal in this exercise is to experiment with the basic network firewall architectures.
This chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
How To Create A Virtual Private Cloud In A Lab On Ec2 (Vpn)
Virtual Private Cloud - Lab Hands-On Lab: AWS Virtual Private Cloud (VPC) 1 Overview In this lab we will create and prepare a Virtual Private Cloud (VPC) so that we can launch multiple EC2 web servers
Junos OS for EX Series Ethernet Switches
Junos OS for EX Series Ethernet Switches Services Feature Guide for EX4600 Switches Release 14.1X53 Modified: 2015-08-26 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000
Cisco To Juniper. Thomas Mangin Exa Networks LINX 51
Cisco To Juniper Thomas Mangin Exa Networks LINX 51 Scope This presentation is not about : Juniper vs Cisco A line per line conversion analysis It is about Giving you an overview how hard/easy integrating
J-Flow on J Series Services Routers and Branch SRX Series Services Gateways
APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring
Teldat Router. ARP Proxy
Teldat Router ARP Proxy Doc. DM734-I Rev. 10.00 November, 2002 INDEX Chapter 1 Introduction...1 1. ARP Proxy... 2 Chapter 2 Configuration...4 1. ARP Proxy Configuration... 5 1.1. Enabling ARP Proxy...
Juniper Networks EVPN Implementation for Next-Generation Data Center Architectures
Juniper Networks EVPN Implementation for Next-Generation Data Center Architectures Using Ethernet VPN to Address Evolving Data Center Requirements 1 Table of Contents Executive Summary... 3 Introduction...
Lab 2 - Basic Router Configuration
CS326 Fall 2001 Room: PAI 5.48 Name: Lab 2 - Basic Router Configuration In this lab you will learn: the various configuration modes of Cisco 2621 routers how to set up IP addresses for such routers how
Passive Flow Monitoring
Passive Flow Monitoring Published: 2013-08-29 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product includes the Envoy SNMP Engine,
Understanding Route Redistribution & Filtering
Understanding Route Redistribution & Filtering When to Redistribute and Filter PAN-OS 5.0 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Route Redistribution......
Setting up Scan to Email
Setting up Scan to Email Basic information provided from the end user or the customer s IT staff: Static IP for the copier Subnet Mask (use IPCONFIG Command if not provided) Gateway (use IPCONFIG Command
Lab 7.2.9 Load Balancing Across Multiple Paths Instructor Version 2500
Lab 7.2.9 Load Balancing Across Multiple Paths Instructor Version 2500 Objective onfigure Load balance across multiple paths. Observe the load balancing process. Background/Preparation able a network similar
Skills Assessment Student Training Exam
Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure
Chapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
Lab 4.5.2 Diagramming Intranet Traffic Flows
Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1
Real-Time Performance Monitoring on
APPLICATION NOTE Real-Time Performance Monitoring on Juniper Networks Devices Tips and Tools for Assessing and Analyzing Network Efficiency Copyright 2009, Juniper Networks, Inc. Table of Contents Table
Configuration of a Load-Balanced and Fail-Over Merak Cluster using Windows Server 2003 Network Load Balancing
Configuration of a Load-Balanced and Fail-Over Merak Cluster using Windows Server 2003 Network Load Balancing Author: Gerrit Schunk Last Modified: 2005-07-08 Copyright SolWeb Informática S.L. All rights
BASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
10.3.1.8 Lab - Configure a Windows 7 Firewall
5.0 10.3.1.8 Lab - Configure a Windows 7 Firewall Print and complete this lab. In this lab, you will explore the Windows 7 Firewall and configure some advanced settings. Recommended Equipment Step 1 Two
ASA/PIX: Load balancing between two ISP - options
ASA/PIX: Load balancing between two ISP - options Is it possible to load balance between two ISP links? on page 1 Does the ASA support PBR (Policy Based Routing)? on page 1 What other options do we have?
Smart Management for Robust Carrier Network Health & Reduced TCO. Colby Barth, Distinguished Engineer, Juniper Networks
Smart Management for Robust Carrier Network Health & Reduced TCO Colby Barth, Distinguished Engineer, Juniper Networks PHILOSOPHICALLY SPEAKING Only you know your network! Enable smart network management
Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks Firewalls Intrusion Detection
VXOA AMI on Amazon Web Services
2013 Silver Peak Systems, Inc. QUICK START GUIDE VXOA AMI on Amazon Web Services A Silver Peak Virtual Appliance (VX) can be deployed within an Amazon Web Services (AWS) cloud environment to accelerate
Step-by-Step Guide for Setting Up IPv6 in a Test Lab
Step-by-Step Guide for Setting Up IPv6 in a Test Lab Microsoft Corporation Published: July, 2006 Author: Microsoft Corporation Abstract This guide describes how to configure Internet Protocol version 6
Extending the range of a wireless network by using mesh topology
Extending the range of a wireless network by using mesh topology This example demonstrates how to configure a FortiGate and two FortiAP wireless access point units to extend the reach and availability
SSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
Advanced BGP Policy. Advanced Topics
Advanced BGP Policy George Wu TCOM690 Advanced Topics Route redundancy Load balancing Routing Symmetry 1 Route Optimization Issues Redundancy provide multiple alternate paths usually multiple connections
Chapter 2 Lab 2-2, Configuring EtherChannel Instructor Version
Chapter 2 Lab 2-2, Configuring EtherChannel Instructor Version Topology Objective Background Configure EtherChannel. Four switches have just been installed. The distribution layer switches are Catalyst
