Notas JNCDA
Notas JNCDA
txt
Tool Bag?Understand what Juniper can offer the customer is key to a successful design
Juniper's Lifecycle Service Approach: Plan (Assess,Design),Build (Deploy,Migrate) and Operate (Support,Optimize)
Plan Methodology
Assess->Requirements->Scope->Data Analysis
https://cld.pt/dl/download/790f61f8-146d-4af5-8424-11fae6c78601/Notas_JNCDA.txt 1/31
4/26/2019 https://cld.pt/dl/download/790f61f8-146d-4af5-8424-11fae6c78601/Notas_JNCDA.txt
Requirements:identify the technology shortfalls that need to be addressed
Scope:Determine the scope of the design project;upgrading a existing network or creating an entirely new network?
Data Analysis:Perform a data analysis to determine the condition of the current network and what improvements need to be made;How many
users access the network internally and externally?
Logical Design:High Level Design,protocols used,addressing,security, name conventions.It also might include WAN and service provider
access
Physical Design:Low Level Design,Physical devices, cabling, wiring considerations. Service Provider access should be determined by
this point
Solicitation from the customer for a network design that typically includes:
-A list of design requirements
-Types of solutions the design must provide
-Warranty requirements and legal terms
The customer will often send the RFP to multiple vendors and
-Use responses to compare competing proposals
-Eliminate vendors who cannot meet their requirements
In some cases, you might receive a Request for Information (RFI), rather than an RFP.RFI typically only covers the technical aspects
of the design request.
Business requirements
-Summary of what type of business the customer is in
-Vision for future growth
-Explanation of why a new design is required
Environmental requirements
-facility specifications
-Number of users and workstations requirements
-Server room specifications
Modular requirements
-Hierarchical design considerations
-Reduction of information within each module
-Functionality of each module within the design
Business continuity
-Network efficiency
-Quality of service requirements
-Load balanced and highly available networks
Always offer solutions by focusing on what your solution can do rather than what it does not support
Tips for a successful response:attention to the details,using the format of the customer, highlight benefits of your design
Understand the Corporate Structure:Management Hierarchy,Decision Makers, Corporate structure, Who has final say?
Asking the right People the Right Questions:Business goals,Technical goals, Existing network details, Technical requirements
Understanding Corporate Politics:Hidden agendas,Department relations, Personnel issues,Business policies
Gathering Data
Job Aids:Documentation and instructions allowing individuals to quickly access the information needed to perform a task
You must determine the limitations to the current network and what is required for the new network to be successful
Identifying Applications
Understanding Scope
Designing with modularity in mind will help you accommodate any network the customer has asked you to design
Identifying resources
-Creating equipment lists
--Bill of materials(BOM)
--can be modular or multilevel in nature
More complex BOMs can be multilevel-or nested-lists whose parent devices are listed with a set of a child devices nested in two or
more levels of detail.
The data you have collected can be sorted into three main categories:customer data, customer requirements, and project boundaries
Data analysis
-Organizing the data can be based on:Functional area (campus, WAN, data center)
-User groups (employees, guests, remote users)
-Customer requirements
Identifying the unknown boundaries that exist. This might include hidden agendas from employees, governmental laws or statues that
were not previously identified
Greenfield Deployments
-More options to make design module and scalable
-Very few restraints caused by existing network infrastructure
Brownfield Deployments
-More common and much more restrictive than Greenfields
-Often require integration with other vendors
Determine the types of users that will be accessing the network and what applications they use, enforcing security whilst maintaining
accessibility, ease of use, and performance benchmarks will be a top priority
You must identify the types of communication that happen-or will happen-on the network. Determining the traffic patterns currently in
sue-as well as calculating the data flow for future network
Three main functional areas in network design, including campus (and branch), WAN, and data center connections
Provide additional value:Make a proposal that goes beyond the know boundaries and stated customer requirements
Provide Options:Good;Better;Best
Incorporating Security
Every functional area of your network topology will require some level of security within it.
Security
Availability
Scalability
Manageability
Performance
Budget
You should be aware that each choice you make will include certain trade-offs.For example, implementing security can affect
performance
Capacity Planning
Remote access, wireless devices,virtual servers, external hard drives and USB sticks are attack vector
https://cld.pt/dl/download/790f61f8-146d-4af5-8424-11fae6c78601/Notas_JNCDA.txt 6/31
4/26/2019 https://cld.pt/dl/download/790f61f8-146d-4af5-8424-11fae6c78601/Notas_JNCDA.txt
Hackers,Spies,User authentication,Viruses, Worms, Trojans, Wired Users, BYOD, Guest users, SQL Injection, Password Cracking, DDoS
Authentication
-Wired and wireless authentication
--802.1x, EAP but other methods might be used
You should determine to which security policies you want to enable IDP
Antivirus
URL filtering
Antispam
Intrusion Prevention
URL filtering UTM policies:Typically enabled on outbound (to Internet) Web traffic only
PCI Compliance
Being able to demonstrate PCI compliance to the auditors is important for a yearly report on compliance (ROC)
WAN Security
Identify the untrusted domains and determine plan to monitor, manage, and mitigate all security risks
https://cld.pt/dl/download/790f61f8-146d-4af5-8424-11fae6c78601/Notas_JNCDA.txt 8/31
4/26/2019 https://cld.pt/dl/download/790f61f8-146d-4af5-8424-11fae6c78601/Notas_JNCDA.txt
Public Model
-Service Provider provides transparent MPLS service to the customer
-No management required by the customer
-Security through MPLS
Hybrid Model
-Customer manages CPE devices:traffic is again secured through MPLS
-Home users and remote sites are secured using IPsec tunnels
Requirements
-Scalable performance
-Interface flexibility:Scale the Firewall without re-architecting the network
-System and network resiliency:Carrier-class reliability;separation of data and control planes
-Network segmentation capabilities
-Flexible network integration
Considerations:
-Consolidation and virtualization
-Security versus performance tradeoffs
-On-demand resource allocation
-Polymorphic nature of new applications
-Evolving threat landscape
-Control over all the traffic client to server, server to server, and server to client
-High performance and security at scale
-Application Layer visibility and control
-Identity-aware dynamic security protection
-Consistent security posture in on-demand resource allocation environments
-Unified management and monitoring
Security should be incorporated at the perimeter of the data center for north and south traffic flows and between the servers for west
and east traffic flows
What is Junos Space? A next-generation application platform designed to managed next-generation networks
-Simplifies network operations
https://cld.pt/dl/download/790f61f8-146d-4af5-8424-11fae6c78601/Notas_JNCDA.txt 9/31
4/26/2019 https://cld.pt/dl/download/790f61f8-146d-4af5-8424-11fae6c78601/Notas_JNCDA.txt
-Scales services
-Automates support
Installable applications within Junos Space:Network Director,Edges Services Director,Security Director,Content Director,Virtual
Director,Services Activation Director, Service Insight, Service Now
Security Director - Deploy end-to-end security services on network elements (Firewall policy, IPS, NAT, VPN,...)
Campus Topologies
-Horizontal
-Vertical
-Metro Campus
-Widely distributed
-Hub and Satellite
-Complex
-Inefficient
-Costly
-Oversubscribed
Consolidating Security
Collapsing Layers
-Simplifies operations
-Reduces the number of devices
-Reduced number of uplinks
-Reduced latency
Place guest users and devices in an isolated VLAN, such as a guest VLAN, and ideally a unique routing instance
VLAN Connectivity
Create a standard VLAN schema used on all access switches
Subnet Design
Device Naming Conventions
Over subscription ratios identify the ingress to egress link bandwidth in a south to north direction in the network
Switches are generally categorized has having a non-blocking architecture or a blocking architectures.A non-blocking architecture
means that the switch's internal resources can accommodate ingress and egress traffic flows at their maximum rate.
Some Architects use a 20:1 ratio for the access:distribution uplink as a general starting point.
https://cld.pt/dl/download/790f61f8-146d-4af5-8424-11fae6c78601/Notas_JNCDA.txt 11/31
4/26/2019 https://cld.pt/dl/download/790f61f8-146d-4af5-8424-11fae6c78601/Notas_JNCDA.txt
Physical Topology No Virtual Chassis -all paths forwarding (OSPF ECMP), fast convergence, L3 license costs?
Logical Topology Virtual Chassis at Aggregation - all links forwarding (LAG)
Logical Topology Virtual Chassis at Aggregation and Access - Fewer unique access switch configurations
Spanning-tree protocols still required if access layer must interface with traditional tiered environment, for example migration or
brownfield expansion scenarios
A wide area network (WAN) is a network covering a broad and geographically disperse area that is used to interconnect business
locations and resources.
Internet Edge
The internet edge function is typically found in the campus, branch, and data center environments
WAN aggregation
The WAN aggregation function connects remote branch offices to the main campus network
Private WAN
The private WAN function connects all enterprise sites and server as the corporate-managed backbone
https://cld.pt/dl/download/790f61f8-146d-4af5-8424-11fae6c78601/Notas_JNCDA.txt 12/31
4/26/2019 https://cld.pt/dl/download/790f61f8-146d-4af5-8424-11fae6c78601/Notas_JNCDA.txt
Should be:
-Easy to deploy
-Flexible and Scalable
-Resilient and Secure
-Easy to Manage
-Service Ready
Connectivity Considerations
What WAN connectivity options are available?
Where will a backup WAN connection be required?
What type of WAN connectivity will be used?Private WAN (multiple classes of service);Public Internet;Provider-Managed MPLS Service (4
classes of service typically available)
WAN devices at the hub location perform on the three roles depending on the WAN requirements:
-WAN aggregation
-Internet Gateway
-VPN Termination
Among other things, the number of users and devices as well the applications and their associated traffic flows determine the
throughout requirements.
Performing Considerations
The speed and latency of the WAN are often the main bottleneck between sites in an enterprise network
Note that smaller packets such as voice and video will impact performance the most;therefore when evaluating a router's performance,
we recommend using internet mix (IMIX) which is a mix of packet sizes
Flexibility can come with higher capital expenditures (CapEx) initially. However, it provides both lower CapEx and operational
expenditures (OpEx) in the long term.
Enterprise WAN have the ability to configure multiple routing instances, which are also know as virtual routers (VRs)
Additional scenarios where traffic might have to be kept separate using routing instances include:
-Merging organizations
-Multi-tenant buildings
-Secure facilities
-College campuses
A WAN router at the remote branch location has two independent WAN connections to two distinct Layer 3 VPN service Providers. In this
case each WAN connection is active.
What is a Data Center? A closet, room, floor or entire facility that houses the computing resources and services used by a company
Most data center access switches are deployed at top-of-rack (TOR), bottom-of-rack (BOR), middle-of-row (MOR), or at end-of-row (EOR)
The switches required in the aggregation and core tiers are typically line-rate, nonblocking switches.
Using a traditional hierarchical network design in the data center has a number of challenges including:
-Limited scalability
-Inefficient resource usage
-Increased latency
Why do Traffic Patterns Matter? Determining the flow and patterns of traffic and the data center helps you identify capacity
requirements!
This logical switch is maintained through a single active configuration file. Juniper recommends that all switches in a Virtual
Chassis configuration be connected in a ring topology.
Design considerations:
-Architecture and protocol deployment options include Virtual Chassis, xSTP, LAG, and RTG
-Challenges include spanning-tree scaling, fault containment, loop prevention, and blocked spanning-tree links
Incorporating Security
Security should be incorporated at the perimeter of the data center for north and south traffic flows and between the servers for west
and east traffic flows
Which profile best matches the data center? Transactional, Mid-Tier,Enterprise IT, HPC and Content Services Hosting
The three key dimensions of a data center profile include:Functionality (routing,security and availability);Cost (capex,opex and TCO);
Performance (latency, throughput and oversubscription)
Risk Assessment
-What hazards might affect your business?
--IT failure/loss of data
--Flooding
--Power loss
--Fire
Resiliency
What are the uptime requirements?
-While the customer will typically say "no downtime", in reality there will always be some downtime
-Customers plan for known and unknown downtime and target availability
-99.9% availability tells them downtime cannot exceed 10 minutes per week average
Three Nines 99,9% availability means only 10 minutes of total downtime per week (planned and unplanned)
Link-Level Redundancy
Introducing VRRP
Chassis Clustering
Chassis clustering:
-Connects two identical SRX Series devices into a single logical device
-Uses a control link and a fabric link to connect the two devices
The goal of a cluster is to be able to move or failover traffic flow from one box to other when needed. To help accomplish this, a
special interface type is used:redundant ethernet (reth). A reth interface is a virtual interface.It is active on one of the two nodes
only and it has the ability to move or failover to the other node.
When a reth interface fails over to the other node, all its logical interfaces also failover and become active on the other node.
Multichassis link aggregation allows you avoid the single point of failure scenario when a switch fails
-LAG is split between two upstream switches appearing as a single switch to downstream device
You can configure a VC on the following MX Series with Trio Modular Port Concentrator (MPC) Modular Interface Controller (MIC)
interfaces (for configuration of VC ports) and dual Routing Engines:MX 240/480/960
-Two or more interconnected QFX Series, EX Series, or both switch types operating as a single VCF system
--Four or more (up to 20) switches can be member (Leaf or Spine) in a VCF
---QFX5100s can be placed in the Spine or Leaf location
---QFX3500s, QFX3600s, and EX43000s should only be wired as Leaf devices in a mixed scenario
CoS is recommended as a possible solution when users are experiencing the following:
-Timeouts or long delays from applications
-Voice or video quality issues
--Choppy or clipped voice transmissions
--Pixilation or constant buffering of video streams
https://cld.pt/dl/download/790f61f8-146d-4af5-8424-11fae6c78601/Notas_JNCDA.txt 21/31
4/26/2019 https://cld.pt/dl/download/790f61f8-146d-4af5-8424-11fae6c78601/Notas_JNCDA.txt
Junos CoS
Physical Layout
Multiple physical divisions:
-Referred to as segments, zones, cells, or pods
Physical Considerations:
-Placement of equipment
-Cabling requirements and restrictions
-Power and cooling requirements
Layout options:
-Top of rack (ToR)
-Bottom of rack (BoR)
-Middle of row (MoR)
-End of row (EoR)
Power Considerations
-Equipment selections now include space, power, and cooling efficiency metrics
-Equipment placement within data centers is often directly related to cooling patterns and power grid design
-Achieving these physical goals in conjunction with logical service delivery requirements is critical
-Real estate budgets limit data enter size (in ft2 or m2)
--Goal is to obtain maximum results from a defined footprint
--Use metrics such as ports per rack, servers per rack, workloads per data center
-Power costs are a major factor in a viable design
--Requires maximum efficiency in design and utilization
--Some new data centers are located close to cheaper, greener power
-Up to 50% of power costs are for cooling
--Design equipment and data center layouts for maximum cooling efficiency
FCAPS Model
F - Fault management
C - Configuration management
A - Accounting management
P - Performance management
S - Security management
https://cld.pt/dl/download/790f61f8-146d-4af5-8424-11fae6c78601/Notas_JNCDA.txt 23/31
4/26/2019 https://cld.pt/dl/download/790f61f8-146d-4af5-8424-11fae6c78601/Notas_JNCDA.txt
OAMP(T) Model
O - Operations
A - Administration
M - Maintenance
P - Provisioning
(T) - Troubleshooting
Configuration Management
Consistent approach for physical layout expedites deployment as well as diagnostics:
-Standardize rack layout
-Standardize device slot and module population
Configuration Management
Configuration Management
Backup
Tools are available to baseline:SNMP data collectors;Flow Collection and reporting tools;Topology-aware tools;DPI tools
The more detailed knowledge you have about your network's traffic and flows, the easier managing for optimum performance and
reliability becomes
Junos Space
https://cld.pt/dl/download/790f61f8-146d-4af5-8424-11fae6c78601/Notas_JNCDA.txt 25/31
4/26/2019 https://cld.pt/dl/download/790f61f8-146d-4af5-8424-11fae6c78601/Notas_JNCDA.txt
(described before)
Deploy end-to-end security services on network elements:Firewall, VPNs, NAT, UTM, Application Services, and IPS
Challenges:
-IT information overload
-Compliance mandates
-Evolving internal and external threats
Benefits:
-Converged network security management console
-Network, security, application, and identity awareness
-Advanced analytics and threat detection
-Compliance-driven capabilities
-Scalable distributed log collection and archival
Examples:
-Insist that each ATM interface does not have more than 1000 PVCs configured
-Insist that an IGP does not use an import policy that will import full routing table
-Insist that all LDP-enabled interfaces are configured for an IGP
-Insist that the re0 and re1 configuration groups are set up correctly and that nothing in the foreground configuration is blocking
their proper inheritance
Examples:
-Automatically build a protocols ospf group containing every Ethernet interface configured under [interfaces]
-Automatically configure family iso on any interface with family mpls
-Apply a configuration group for any SONET interface with a description string matching a particular regular expression
-Typically, fault diagnosis is performed by following a set of written procedure from a network operations center handbook or
something similar
-Most procedure can be automated
-Automating these repetive diagnostic tasks:
--Enforces consistency
---Allow operators and engineers to focus on problem analysis, not data collection
-Op scripts:
--Execute any Junos command
--Results can be captured, processed, and automatically delivered to the CLI or remote systems
-Event scripts
-Can execute Junos commands or scripts, in response to an event policy
--Occurrence of specific syslog messages or traps
--Very similar to op scripts but can also operate on data received from the Junos event subsystem
Junos PyEZ
Overview
-Python-based micro-framework to remotely manage to automate Junos OS devices
-Built for non-programmers and programmers alike
-Built on top of community provided ncclient library
SDN Overview
What is SDN?
-A different approach to designing, building, and managing networks
--Provision for flexible and dynamic networks
--Change how software works in a network
-A solution to the current challenges of the network
--Networks must adjust and respond dynamically
--Newly added feature must not disrupt the network
--Alleviate the need for manual configuration of individual devices
-Separates the control plane from the forwarding plane
https://cld.pt/dl/download/790f61f8-146d-4af5-8424-11fae6c78601/Notas_JNCDA.txt 28/31
4/26/2019 https://cld.pt/dl/download/790f61f8-146d-4af5-8424-11fae6c78601/Notas_JNCDA.txt
SDN Use Case
Contrail
What is Contrail?
-SDN Solution
--Automates and Orchestrates virtual networks
--NFV
--Big Data
--Visualization
-Two primary drivers
--Cloud networking
--NFV in service provider network
-Virtual Machines
--Cloud tenants
--Virtual Network Functions
-Virtual Networks
--Connect VMs
-Gateway Devices
--Technical specifications
-Golden Rules
1.Make it understandable to the customer
2. Focus on organizational issues
3. Keep it short and simple
4. Avoid canned responses
5. Avoid clichés
6. Avoid history lessons
-Recommended structure
1. Introduction of the customer's need or problem
2. Identification of business benefits
3. Overview of your proposal solution
4. Relevant supporting information outlining why the customer should choose your plan and Juniper Networks
-Closing Statement
--Ask for the business
--Treat the customer as an equal
(3 Phases)
Analysis-Desire state as apposed to current state
Migration Plan-Processes;People;Technology;Tools;Risk Mitigation;Execution Plan
Migration Execution-Plan Execution;Testing;Refining;Cutover
Analysis
1.1Stakeholder Engagement
1.2 Business& Technical Goals, design Analysis
1.3 Migration Constraints & Analysis
1.4 Migration Strategy
Migration Plan
2.1 Migration Plan
2.2 Migration Acceptance Test Plan
2.3 Migration Validation Testing
Migration Execution
3.1 Pre-Migration Readiness
3.2 Migration Cutover
3.3 Post-Migration Acceptance Testing
3.4 Migration Handover
https://cld.pt/dl/download/790f61f8-146d-4af5-8424-11fae6c78601/Notas_JNCDA.txt 31/31