Yes, you can mine through the 5,000 pages of documentation or take a two-thousand-dollar training course, but JUNOS's interprocess sophistication can be baffling unless you know the shortcuts and tricks, as well as those rays of illuminating comprehension that can come only from those who live with it. JUNOS Cookbook is the first comprehensive book about JUNOS software and it provides over 200 time-saving step-by-step techniques including discussions about the processes and alternative ways to perform the same task. It's been tested and tech-reviewed by field engineers who know how to take JUNOS out for a spin and it's applicable to the entire line of M-, T-, and J-series routers. JUNOS Cookbook will not only pay for itself the first few times you use it, it will make your network easier to manage and update.
"Aviva Garrett has done a tremendous job of distilling the features of JUNOS software in a form that will be useful for a wide audience-students, field engineers, network architects, and other networking professionals alike will benefit from this book. For many people, this is the only book on JUNOS they will need."Pradeep Sindhu, CTO and Founder, Juniper Networks
"This cookbook is superb. Aviva Garrett has masterfully assembled a complete set of practical real-world examples with step-by-step instructions. Security, management, routing: it's all here!"Stephen Gill, Research Fellow, Team Cymru
"A technical time-saver for any NOC or SOC working with JUNOS. It's clear, concise, and informative recipes are are an invaluable resource. "Scott A. McIntyre, Security Officer, XS4ALL Internet B.V
Juniper Networks Certified Internet Associate (JNCIA-ER)Juniper Networks Certified Internet Specialist (JNCIS-ER)Juniper Networks Certified Internet Expert (JNCIE-ER)
With more services such as voice, conference, and multicast on the IP router platform, the market for enterprise routers is growing exponentially, and the need for certified engineers to keep up with network developments in protocols and security is paramount. For everyone who works with Juniper enterprise and edge routing environments, this is a must-have book.
Two experts from Puppet Labs explain the concepts behind these APIs, and provide instructions and examples to help you write your own fully functional types and providers. You’ll also delve into Puppet’s source code to get a better understanding of how types and providers are implemented internally. If you’re familiar with basic Puppet concepts, you’re ready to get started.Learn the fundamental concepts behind resources, and become familiar with the structure of Puppet’s Resource ModelDiscover how the type API is used to create new resource types that Puppet can manageUnderstand how providers interact with the system to achieve the desired state of a declared resourceExplore advanced features to get a more complete understanding of how Puppet worksSimplify the troubleshooting process when developing types and providers
No distribution can provide a Linux kernel that meets all users'needs. Computers big and small have special requirements that requirereconfiguring and rebuilding the kernel. Whether you are trying toget sound, wireless support, and power management working on a laptopor incorporating enterprise features such as logical volume managementon a large server, you can benefit from the insights in this book.
Linux Kernel in a Nutshell covers the entirerange of kernel tasks, starting with downloading the source and makingsure that the kernel is in sync with the versions of the tools youneed. In addition to configuration and installation steps, the bookoffers reference material and discussions of related topics such ascontrol of kernel options at runtime.
A key benefit of the book is a chapter on determining exactly what drivers are needed for your hardware. Also included are recipes thatlist what you need to do to accomplish a wide range of popular tasks.
While their earlier book, Junos Security, covered the SRX platform, this book focuses on the SRX Series devices themselves. You'll learn how to use SRX gateways to address an array of network requirements—including IP routing, intrusion detection, attack mitigation, unified threat management, and WAN acceleration. Along with case studies and troubleshooting tips, each chapter provides study questions and lots of useful illustrations.Explore SRX components, platforms, and various deployment scenariosLearn best practices for configuring SRX’s core networking featuresLeverage SRX system services to attain the best operational stateDeploy SRX in transparent mode to act as a Layer 2 bridgeConfigure, troubleshoot, and deploy SRX in a highly available mannerDesign and configure an effective security policy in your networkImplement and configure network address translation (NAT) typesProvide security against deep threats with AppSecure, intrusion protection services, and unified threat management tools