Junos High Availability: Best Practices for High Network Uptime by Orin Blomberg

Page Updated:
Book Views: 7

Author
Orin Blomberg
Publisher
O'Reilly Media
Date of release
Pages
617
ISBN
9781306809443
Binding
ebook
Illustrations
Format
PDF, EPUB, MOBI, TXT, DOC
Rating
5
53

Advertising

Get eBOOK
Junos High Availability: Best Practices for High Network Uptime

Find and Download Book

Click one of share button to proceed download:
Choose server for download:
Download
Get It!
File size:5 mb
Estimated time:4 min
If not downloading or you getting an error:
  • Try another server.
  • Try to reload page — press F5 on keyboard.
  • Clear browser cache.
  • Clear browser cookies.
  • Try other browser.
  • If you still getting an error — please contact us and we will fix this error ASAP.
Sorry for inconvenience!
For authors or copyright holders
Amazon Affiliate

Go to Removal form

Leave a comment

Book review

Whether your network is a complex carrier or just a few machines supporting a small enterprise, JUNOS High Availability will help you build reliable and resilient networks that include Juniper Networks devices. With this book's valuable advice on software upgrades, scalability, remote network monitoring and management, high-availability protocols such as VRRP, and more, you'll have your network uptime at the five, six, or even seven nines -- or 99.99999% of the time.

Rather than focus on "greenfield" designs, the authors explain how to intelligently modify multi-vendor networks. You'll learn to adapt new devices to existing protocols and platforms, and deploy continuous systems even when reporting scheduled downtime. JUNOS High Availability will help you save time and money.

  • Manage network equipment with Best Common Practices
  • Enhance scalability by adjusting network designs and protocols
  • Combine the IGP and BGP networks of two merging companies
  • Perform network audits
  • Identify JUNOScripting techniques to maintain high availability
  • Secure network equipment against breaches, and contain DoS attacks
  • Automate network configuration through specific strategies and tools


This book is a core part of the Juniper Networks Technical Library™.


Readers reviews