Books & Videos

Table of Contents

  1. Chapter 1 LAN and Internetworking Overview

    1. What Is a Network?

    2. Ethernet Technologies

    3. The TCP/IP Suite

    4. LAN Interconnection

    5. Conclusion

    6. Chapter Review Questions

    7. Chapter Review Answers

  2. Chapter 2 EX Platform Overview

    1. EX Hardware Overview

    2. EX Series Architecture

    3. JUNOS Software Overview

    4. CLI Overview

    5. Advanced CLI and Other Cool Stuff

    6. Conclusion

    7. Chapter Review Questions

    8. Chapter Review Answers

  3. Chapter 3 Initial Configuration and Maintenance

    1. The Factory-Default Configuration and EZSetup

    2. Initial Configuration Using the CLI

    3. Secondary Configuration

    4. EX Interfaces

    5. Basic Switch Maintenance

    6. Conclusion

    7. Chapter Review Questions

    8. Chapter Review Answers

  4. Chapter 4 EX Virtual Chassis

    1. The EX Virtual Chassis

    2. Configuration, Operation, and Maintenance

    3. Virtual Chassis Case Study

    4. Conclusion

    5. Chapter Review Questions

    6. Chapter Review Answers

  5. Chapter 5 Virtual LANs and Trunking

    1. Virtual LANs and Trunking

    2. EX to Catalyst VLAN Integration

    3. Conclusion

    4. Chapter Review Questions

    5. Chapter Review Answers

  6. Chapter 6 Spanning Tree Protocol

    1. Feeling a Little Loopy

    2. Spanning Tree Protocol

    3. Rapid Spanning Tree Protocol

    4. Spanning Tree Configuration

    5. Multiple Spanning Tree Protocol

    6. Redundant Trunk Groups

    7. Conclusion

    8. Chapter Review Questions

    9. Chapter Review Answers

  7. Chapter 7 Routing on the EX

    1. EX Routing Overview

    2. Inter-VLAN Routing

    3. Static Routing

    4. RIP Routing

    5. Conclusion

    6. Chapter Review Questions

    7. Chapter Review Answers

  8. Chapter 8 Routing Policy and Firewall Filters

    1. Routing Policy

    2. Firewall Filters

    3. Conclusion

    4. Chapter Review Questions

    5. Chapter Review Answers

  9. Chapter 9 Port Security and Access Control

    1. Layer 2 Security Overview

    2. MAC Limiting, DHCP, and ARP

    3. IEEE 802.1X Port-Based Authentication

    4. Conclusion

    5. Chapter Review Questions

    6. Chapter Review Answers

  10. Chapter 10 IP Telephony

    1. Deployment Scenarios

    2. Power over Ethernet

    3. Link Layer Discovery Protocol

    4. LLDP with Media Endpoint Discovery

    5. Voice VLAN

    6. Case Studies

    7. Conclusion

    8. Chapter Review Questions

    9. Chapter Review Answers

  11. Chapter 11 High Availability

    1. Hardware Redundancy

    2. VRRP

    3. In-Service Software Upgrades

    4. Aggregated Ethernet

    5. Bidirectional Forwarding Detection (BFD)

    6. Conclusion

    7. Chapter Review Questions

    8. Chapter Review Answers

  1. Glossary

  2. Colophon