Solved

new to networking configuration

Posted on 2015-02-05
6
27 Views
Last Modified: 2016-11-18
Hi,
I m new to networking configuration / implementation. I was doing cisco router / switches configuration about 7 years ago so i know fundamental concepts and can also recall commands quickly for routing and switching.  But recently did not touch the console  for the last 7 years and the technology has changed a lot,
Now i am also going to be involved not only in R & S , but also security , wireless , IPT , Data Center ,  cisco + other vendors like juniper , F5 , bluecoat etc..... i need help for below...
1) i have portable command ref. guide for Routers and switches and i like them, are these available for other areas also ? please send links for the same , i am looking in electronic formats.
2) For the implementation documents like LLD , etc.... is there any guide which could help with examples
3) other tools (open source) that can make life easier for config /troubleshooting or LLD purposes ?
4) any other open suggestions are also welcomed......

Thanx
0
Comment
Question by:Pra shant
  • 3
  • 2
6 Comments
 
LVL 32

Expert Comment

by:Kamran Arshad
Comment Utility
Hi,

Since you have already worked on Cisco so you must be familiar with CLI on switches and routers. For firewalls and UTM you can start with the below links;

http://www.juniper.net/techpubs/software/screenos/screenos6.0.0/ce_v3.pdf
http://www.juniper.net/techpubs/hardware/netscreen-certifications/ScreenOS_6_2_ST.pdf
http://www.juniper.net/techpubs/hardware/netscreen-systems/translated/ug_ns-5000.pdf

For data center, uptime and other sites have good materials/articles;

http://www.idc-a.org/
http://uptimeinstitute.com/TierCertification/
www.datacenterknowledge.com
www.sapdatacenter.com/article/data_center_functionality

Let me know what else you want to know so that I can send you something specific for you.
0
 

Author Comment

by:Pra shant
Comment Utility
Yes,

Actually i should have mentioned that i am basically concerned with Active devices only and that to only configuring / testing active devices.

Appreciate to provide specific to above.
0
 
LVL 32

Expert Comment

by:Kamran Arshad
Comment Utility
Let us know the devices and we can provide you relevant documentations on the products
0
What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

 

Author Comment

by:Pra shant
Comment Utility
Hi,
Actually I am not looking for long documents , would be great if i can get something which is focused on useful information on normal  day to day configuration tasks only. I can download all the documentation myself as we are cisco gold and we have many Adv Tech certs also.
0
 
LVL 5

Accepted Solution

by:
Rakesh Madupu JNCIE-SP #02079 CCIE-SP#47613 earned 500 total points
Comment Utility
-> any vendor has configuration guides (be it be juniper or cisco ) - for cisco configuration guides and command references are good place to start, it would be impossible to mention them here as they are per protocol and per IOS platform.

-> For Juniper they have KB section which is good and also path finder and Dayone books library .

-> I would suggest not to worry too much on commands, they are mostly the same, but for your handson sake you can give them a try a lot of simulators are available (cisco - gns3,iou) , juniper (vmx,oilve,vsrx)

Suggestion:

Spend a day or two installing these devices (one end juniper and one end cisco) and configure basic protocols, in this way you would be proficient with both the vendors. Let me know if you require any help

Thanks
PERFECT GAME
0
 

Author Comment

by:Pra shant
Comment Utility
Thanx
 Good idea , I have gns3 , but did not hear of iou....I would search on google. Well regard to cisco RnS and security , do you suggest any compact guide (really compact) for troubleshooting ?
0

Featured Post

Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Decrypting SSL traffic in wireshark 7 21
Monitor bandwidth 3 30
Copy a file to a share on a Domain 3 53
Printer Settings 3 57
Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now