BKJUNOSC.RVW 20080418 "JUNOS Cookbook", Aviva Garrett, 2006, 0-596-10014-0, U$54.99/C$71.99 %A Aviva Garrett %C 103 Morris Street, Suite A, Sebastopol, CA 95472 %D 2006 %G 0-596-10014-0 978-0-596-10014-8 %I O'Reilly & Associates, Inc. %O U$54.99/C$71.99 800-998-9938 707-829-0515 nuts@ora.com %O http://www.amazon.com/exec/obidos/ASIN/0596100140/robsladesinterne http://www.amazon.co.uk/exec/obidos/ASIN/0596100140/robsladesinte-21 %O http://www.amazon.ca/exec/obidos/ASIN/0596100140/robsladesin03-20 %O Audience i- Tech 2 Writing 1 (see revfaq.htm for explanation) %P 657 p. %T "JUNOS Cookbook" The preface lists some sample configurations for installing Juniper routers using the JUNiper Operating System (JUNOS). There is some discussion of optimization, but the focus is on the components of network interfaces and routing protocols. The structure has problem statements followed by sample configurations and then some discussion. Chapter one introduces the basic command line interface, different modes, and saving configuration files. Rudimentary router security and access control principles are noted in chapter two, but the details are rather odd. For example, the reader is advised against telnet, but the commands to disable the service are not provided (although implied by other examples). The "discussion" of some commands merely restates the command in more extensive verbiage. The structure and order of the material is not always logical and therefore it is sometimes difficult to extract useful meaning from some explanations. Chapter three lists the commands related to IPSec, although the description of the protocol itself is simplistic enough to be incorrect in places. SNMP (Simple Network Management Protocol) is mentioned in chapter four. There is a lot of examination of alternate storage and redirection for logging and audit files, in chapter five, but little content related to the choice of the most important logging to enable. Network Time Protocol (NTP) is covered in chapter six. Chapter seven concentrates primarily on network and physical interfaces, and does not do a good job of reviewing the other types of interfaces. Routing is at the heart of networking, so chapter eight, while it does provide information about basic management commands, is not really enough for the full task. The material is backed up by that in subsequent chapters, but those concentrate on specific aspects, and we never get a solid overview. Chapter nine gives details on creating packet filtering firewalls. Chapters ten through fourteen deal with RIP (Routing Information Protocol), IS-IS (Intermediate System-to- Intermediate System protocol), OSPF (Open Shortest Path First), BGP (Border Gateway Protocol), and MPLS (MultiProtocol Label Switching). Chapter fifteen notes some commands related to requirements for virtual private networks (VPNs). Configuring for multicast routing is handled in chapter sixteen. This is a reasonable compilation of the commands for a Juniper router. But not much more. copyright Robert M. Slade, 2008 BKJUNOSC.RVW 20080418