REVIEW: "JUNOS Cookbook", Aviva Garrett
- BKJUNOSC.RVW 20080418
"JUNOS Cookbook", Aviva Garrett, 2006, 0-596-10014-0, U$54.99/C$71.99
%A Aviva Garrett
%C 103 Morris Street, Suite A, Sebastopol, CA 95472
%G 0-596-10014-0 978-0-596-10014-8
%I O'Reilly & Associates, Inc.
%O U$54.99/C$71.99 800-998-9938 707-829-0515 nuts@...
%O Audience i- Tech 2 Writing 1 (see revfaq.htm for explanation)
%P 657 p.
%T "JUNOS Cookbook"
The preface lists some sample configurations for installing Juniper
routers using the JUNiper Operating System (JUNOS). There is some
discussion of optimization, but the focus is on the components of
network interfaces and routing protocols. The structure has problem
statements followed by sample configurations and then some discussion.
Chapter one introduces the basic command line interface, different
modes, and saving configuration files. Rudimentary router security
and access control principles are noted in chapter two, but the
details are rather odd. For example, the reader is advised against
telnet, but the commands to disable the service are not provided
(although implied by other examples). The "discussion" of some
commands merely restates the command in more extensive verbiage. The
structure and order of the material is not always logical and
therefore it is sometimes difficult to extract useful meaning from
Chapter three lists the commands related to IPSec, although the
description of the protocol itself is simplistic enough to be
incorrect in places. SNMP (Simple Network Management Protocol) is
mentioned in chapter four. There is a lot of examination of alternate
storage and redirection for logging and audit files, in chapter five,
but little content related to the choice of the most important logging
to enable. Network Time Protocol (NTP) is covered in chapter six.
Chapter seven concentrates primarily on network and physical
interfaces, and does not do a good job of reviewing the other types of
Routing is at the heart of networking, so chapter eight, while it does
provide information about basic management commands, is not really
enough for the full task. The material is backed up by that in
subsequent chapters, but those concentrate on specific aspects, and we
never get a solid overview. Chapter nine gives details on creating
packet filtering firewalls. Chapters ten through fourteen deal with
RIP (Routing Information Protocol), IS-IS (Intermediate System-to-
Intermediate System protocol), OSPF (Open Shortest Path First), BGP
(Border Gateway Protocol), and MPLS (MultiProtocol Label Switching).
Chapter fifteen notes some commands related to requirements for
virtual private networks (VPNs). Configuring for multicast routing is
handled in chapter sixteen.
This is a reasonable compilation of the commands for a Juniper router.
But not much more.
copyright Robert M. Slade, 2008 BKJUNOSC.RVW 20080418
====================== (quote inserted randomly by Pegasus Mailer)
rslade@... slade@... rslade@...
Virtual reality is for those who can't handle the command line