Giới thiệu đến người đọc các thiết bị mạng, cấu hình của juniper,....
Trang 1Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 1
JUNIPER NETWORK
Trang 2Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 2
Agenda
Juniper company and Juniper products
1 2 3 4
Juniper Operating System Junos Command Line, Init configuration Switching, Routing with Junos
5
5 Security, Monitoring, Operation
Trang 3Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 3
1.1: Juniper company and products
Trang 4Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 4
1.1: Juniper company and products
Trang 5Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 5
1.2: Juniper EX Switch
Juniper Branches IP Switch.
Designed for Branches Office, DC, Building Campus.
Products compatible with low-end (EX2200, EX3200), Distribution,
Core (EX4200, EX4500), Core (EX8200, EX9200).
Trang 6Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 6
1.3: Juniper EX2200
Juniper Branches IP Switch.
Designed for Branches Office, DC, Building Campus.
Products compatible with low-end (EX2200, EX3200), Distribution,
Core (EX4200, EX4500), Core (EX8200, EX9200).
Trang 7Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 7
1.3: Juniper EX2200 Switch
EX2200 designed for simple access network (branch Office,
concentrated Access Point, for access-user).
Not required L3 full Routing features.
Layer 2 protocol, static routing, RIP, OSPF (license).
Many branches (24T, 24F, 48T, 48F ).
4 fiber uplink.
Equal 2960G Cisco
Trang 8Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 8
1.3: Juniper EX2200 Switch vs Cisco 2960G
Trang 9Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 9
1.4: Juniper EX4200
Full Layer 2, Layer 3 Routing with OSPF, RIP, IS-IS
BGP with license
Trang 10Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 10
1.4: Juniper EX4200
Equal Cisco 3750 Series
EX4200 3750G 3750-E 3750-X
Trang 11Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 11
1.5: Juniper Virtual Chassis Technology
Trang 12Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 12
1.5: Juniper Virtual Chassis Technology
Trang 13Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 13
1.5: Juniper Virtual Chassis Deployment
Trang 14Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 14
1.5: Juniper Virtual Chassis Deployment
Trang 15Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 15
1.6: Juniper EX8200
Trang 16Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 16
1.6: Juniper EX8200
Trang 17Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 17
1.6: Juniper EX8200 vs Cisco 6509-E
Trang 18Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 18
1.6: Juniper J Routers
Trang 19Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 19
1.7: J Router-6350
Router designed for branch office, all-in-one device
(router+firewall).
Secure+routing device.
Support T`1, E1, ADSL2/ADSL2+,G.HDSL
4 fixed Gigabit Ethernet LAN ports, 2PIM slots.
Trang 20Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 20
• 7- slots: 4 front, 3 rear
• Common form factor modules
Trang 21Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 21
2.0 Junos Operating Systems
Juniper Network, Security products use one OS: Junos
Junos based FreeBSD (latest is 12.3R1.7).
Simple in manage, learning, and configuration.
Cứ 3 tháng, Junos phát triển bản cập nhật.
Every 3 months, Juniper update Junos OS.
Can be downloaded from Juniper.
Trang 22Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 22
2.1 Junos Operating Systems
Juniper and Juniper products.
Trang 23Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 23
2.2 Control and Forwarding Planes
Separate control and Forwarding Planes.
Routing Engine and Packet Forwarding Engine
Trang 24Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 24
2.3 Junos Architecture
Include 4 main daemons: Mgd, Rpd, Dcd, Chassisd.
Trang 25Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 25
3 Junos Command Line
CLI: Command Line Interface
Trang 26Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 26
3.1 Junos Command Line
CLI: Command Line Interface
Trang 27Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 27
3.2 Junos Command Line
Operational Mode
Trang 28Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 28
3.3Junos Command Line
Operational Mode CLI Tree
Trang 29Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 29
3.3 Junos Command Line
Hierarchical Command Structure.
Trang 30Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 30
3.4 Junos Command Line
Key operational mode capabilities includes the following.
Trang 31Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 31
3.4 Junos Command Line
Using Pipe
Trang 32Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 32
3.4 Junos Command Line
Configuration Mode
Trang 33Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 33
3.4 Junos Command Line
Configuration Mode
Trang 34Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 34
3.4 Junos Command Line
Configuration Mode
Trang 35Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 35
3.5 Batch Configuration Changes
Junos OS Configuration Process
Trang 36Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 36
3.5 Batch Configuration Changes
Junos OS Configuration Lock
Exclusive configuraiton: Allow only a single user to edit the
configuration.
Private configuration: Each user has private candidate
configuration.
Trang 37Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 37
3.5 Batch Configuration Changes
Junos OS Configuration Lock
Exclusive configuraiton: Allow only a single user to edit the
configuration.
Private configuration: Each user has private candidate
configuration.
Trang 38Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 38
3.6 Statement Hierachy
Edit
Trang 39Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 39
3.7 Adding Configuration
Use set commands in CLI mode to modify the candidate configuration
Trang 40Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 40
3.7 Adding Configuration
Can be added configuration from top of configuration mode or a
sublevel.
Trang 41Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 41
3.8 Removing Configuration
delete command to remove configuration
wildcard delete
Trang 42Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 42
3.9: Using Configuration Mode Efficiently
rename: rename a configuration statement
Replace pattern: of configuration statement
copy: copy a configuration statement to another statement
Trang 43Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 43
3.10: Using Configuration Mode Efficiently
Trang 44Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 44
3.11: Candidate Configuration
show to view candidate configuration
Trang 45Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 45
3.11: Candidate Configuration
compare to view the difference between active and candidate
configuration.
Trang 46Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 46
3.12: Apply configuration
commit to apply the configuration.
Trang 47Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 47
3.13: Restore configuration
rollback to restore the good configuration
Trang 48Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 48
3.14: Saving and Loading Configuration
Save: save the configuration into local, tfpt, ftp
load: to load the configuration
Trang 49Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 49
3.15: Summary CLI Junos
Trang 50Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 50
Trang 51Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 51
Trang 52Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 52
3.17: Interface Naming
hostname
Trang 53Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 53
3.18: Interface Naming
Physical Properties
Trang 54Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 54
3.19: Logical Interface
Unit
family
Trang 55Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 55
3.19: Logical Properties
Trang 56Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 56
3.20: Configuration Interface
Trang 57Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 57
3.20: Configuration Interface
Trang 58Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 58
3.21: Authorization Overview
Trang 59Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 59
3.21: Authorization Overview
Trang 60Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 60
3.21: Authorization Overview
Trang 61Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 61
3.22: System Logging
Trang 62Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 62
3.23: Tracing as Debuging
Trang 63Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 63
3.24: Viewing Log and Traces
Trang 64Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 64
3.24: Viewing Log and Traces
Trang 65Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 65
4 Juniper Switching
Trang 66Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 66
4 Juniper Switching
Trang 67Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 67
4.1 VLANs on Junos
Trang 68Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 68
Switch#set vlans <vlan_name> vlan-id <vlan_id>
show vlan brief VLAN 1: deafault on Cisco VLAN 0: Default on Juniper
Trang 69Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 69
4.2 Port Mode Layer 2
Cisco
Switch#
Switch(config)# interface <name>
Switch(config-if)#switchport mode <access>/trunk
Switch(config-if)#switchport access vlan <vlan_id>
Trang 70Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 70
4.3 Inter-vlan Routing
Cisco
Switch#
Switch(config)# interface <vlan_name>
Switch(config-if)#ip address <add> <mask>
Juniper set interfaces vlan unit <id> family inet address IP/mask set vlans <vlan_name> l3-interface <vlan.unit>
Trang 71Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 71
4.4 VLAN, Layer 2 Monitoring
Cisco
Switch# show vlans
Show interface <name> switchport
Show interface trunk
Show ip int brief
Juniper
show vlans
show ethernet-switching interface
show interface terse
show interface extensive
show interface details
Trang 72Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 72
4.4 VLAN, Layer 2 Monitoring
Trang 73Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 73
4.5 Spanning Tree Protocols
Cisco
Switch#
Switch(config)# spanning-tree mode pvst
Switch(config)# spanning-tree mode rapid-pvst
Switch(config)# spanning-tree mode mst
Juniper set protocols stp set protocol rstp set protocol vstp set protocol mstp
Trang 74Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 74
4.5 Spanning Tree Protocols
Trang 75Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 75
4.6 Multiple Spanning Tree Protocols
Trang 76Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 76
4.6 Multiple Spanning Tree Protocols
Trang 77Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 77
4.7 Port Security
Trang 78Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 78
4.8 DHCP Snooping
Trang 79Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 79
4.9 Junos Routing – Static Routes
Trang 80Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 80
4.9 Junos Routing – Configure
Trang 81Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 81
4.9 Junos Routing – Options
Prefence: Determine the priority of routes (from many
routing protocol)
Like Administrative Distance in Cisco
Some difference compared with Cisco value
No-readvertise: prohibits the reference route from being
redistributed through routing policy.
Retain: maintain the route in forwarding table in case of
failure of routing process.
Aggregate route: summary route before advertise to
another
Trang 82Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 82
4.9 Junos Routing – Configure
Trang 83Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 83
4.9 Junos – Routing Information Sources
Active Route Selection: Select the best route
Forwarding table: Determine outgoing interface
Trang 84Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 84
4.9 Junos – Routing Policy
Routing Policy: Control the flow of routing information to
and from the routing table.
Trang 85Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 85
4.9 Junos – Routing Policy
Import policies: Polices that control how the software
imports routes into the routing tables.
Export policies: Policies that control how the software
sends routes from the routing table.
Trang 86Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 86
5.0 Building Blocks of Routing Policy
Routing policies contain ordered groups of terms.
Give the correct name to identify
Trang 87Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 87
5.1 Route Filters
Routing policies contain ordered groups of terms.
Give the correct name to identify
Trang 88Copyright © 2007 Juniper Networks, Inc Proprietary and Confidential www.juniper.net 88
5.2 Match Types
Exact: Means that only routes match the given prefix
exactly
Orlonger: mach the specified prefix and mask exactly and
all routes that subsets of the prefix