IMPLEMENTANTION OF SECURITY SYSTEMS BASED ON JUNIPER NETWORK DEVICES Cover Image

Implementacja systemów zabezpieczeń sieciowych opartych na rozwiązaniach firmy juniper
IMPLEMENTANTION OF SECURITY SYSTEMS BASED ON JUNIPER NETWORK DEVICES

Author(s): Tomasz Binkowski, Bogdan Kwiatkowski
Subject(s): Education, ICT Information and Communications Technologies
Published by: Wyższa Szkoła Biznesu i Przedsiębiorczości w Ostrowcu Świętokrzyskim
Keywords: network system;router;routing;

Summary/Abstract: The main assumption of the following article is to create instructions to support management of Juniper network devices. The main subjects of the article are security issues. In the first chapter, theoretical subjects related to security adjustment were explained. It includes basic configuration rules, security and functional zones, polities, characterization of a firewall or a description of protocol 802.1X protocol. The practical part included in the second chapter was presented on examples of security configurations, which were divided according to difficulty level. The implementation of these security systems was conducted on Juniper devices. Its final result are instructions for beginning administrators of Juniper devices. The implementation included was performed on virtual equipment which fully corresponds with the physical one.

  • Issue Year: 9/2017
  • Issue No: 1
  • Page Range: 237-246
  • Page Count: 10
  • Language: Polish