博威---云架构决胜云计算

 找回密码
 注册

QQ登录

只需一步,快速开始

搜索
查看: 1741|回复: 1

较为完善的JNCIE实验室设计

[复制链接]
发表于 2007-12-18 17:36:08 | 显示全部楼层 |阅读模式
较为完善的JNCIE实验室设计
[ 录入者:admin | 时间:2007-10-06 18:37:09 | 作者:孟诗宇(Nigel Meng)WebLog | 来源: | 浏览:109次 ]





RACK 1

Juniper Networks J2300 Router
Juniper/Netscreen 208 Firewall
Juniper/Netscreen SA-1000 SSL VPN Device
Cobalt/Sun RAQ2+ for Web and DNS Services
Cobalt/Sun RAQ2+ for Web and DNS Services (yup, two)
Dell PowerEdge 650 (2 x P4-2GHz, 4GB RAM) running as new Web Server for clients
Dell PowerEdge 650 (2 x P4-2GHz, 2GB RAM) running as primary DNS for clients
Trend Micro Network VirusWall 2500
Cisco IDS-4210 Outside IDS Sensor
Cisco IDS-4210 Inside IDS Sensor (this is the way they SHOULD be deployed!)
Cisco VPN-3030 VPN Concentrator
Dell PowerEdge MC1655 Blade Server running a variety of applications such as my e-mail services, a Certificate Authority, CiscoACS server, CiscoWorks Management Centers and other things
Dell PowerEdge MC1655 Blade Server running a variety of applications
IOMega NAS - 320 GB Network Attached Storage
IOMega NAS - 500 GB Network Attached Storage
Dell 1U LCD Panel and Keyboard slide out.
Everything is connected into a Cisco Catalyst 6509.  The 6509 runs:

  • Dual Sup-2/MSFC2 Modules
  • WS-X6608-T1 T1/DSP blade
  • Four separate WS-X6348-PWR ethernet blades with inline power
  • WS-X6408-GBIC Gigabit Ethernet blade
  • WS-X6624-FXS Analog Telephony blade
  • Dual 1300W power supplies
The rack is run by an APC SmartUPS 3000 battery system.
Off to the side, from the bottom up:
Juniper Networks (Pacific Broadband) G10 CMTS for supplying connectivity to cable modems
Cisco PIX 520 Firewall (6 interfaces and all that jazz)
The server on top of that is a clone machine with a database server from an ISP I took over operations for, I haven't migrated that to a blade yet.
Juniper/Netscreen IDP-100 for Main Production
Juniper/Netscreen IDP-100 for DMZ1
Juniper/Netscreen IDP-100 for DMZ2
Juniper/Netscreen IDP-100 for Spare
Juniper/Netscreen ISG-2000 Firewall System
Juniper/Netscreen NS-204 Firewall
Juniper/Netscreen NS-204 Firewall
Juniper/Netscreen NS-50 Firewall
Juniper/Netscreen NS-25 Firewall
Cisco 3750 48-port Switch
Cisco 3750 48-port Switch
Cisco 2811-VSEC Voice Router with CCME
Juniper BRAS ERX-1410 with some OC-3 modules

Around back are four APC MasterSwitches to provide remote power.


RACK 2:

Juniper/NetScreen NS-208 Firewall #1
Juniper/NetScreen NS-208 Firewall #2
Juniper Networks M7i (2-port ATM OC-3 PIC, 4-port 10/100 Ethernet PIC, 4-port MMF SONET OC-3 PIC)
NetScreen SA-1000 SSL VPN Server
Netscreen IDP-100 Intrusion Detection
Juniper Networks M7i (4-port MMF SONET OC-3 PIC, 4-port T-1 PIC, 4-port 10/100 Ethernet PIC)
Juniper Networks M7i (1-port OC-12 ATM PIC, 4-port MMF SONET OC-3 PIC, 4-port 10/100 Ethernet PIC)
Juniper Networks M7i (4-port 10/100 Ethernet PIC, 4-port MMF SONET OC-3 PIC, 1-port OC-12 ATM PIC)
Cisco Catalyst 3750 - 48-port 10/100 Ethernet switch with 4 SX SFP Gigabit ports (For separate Juniper Lab usage)
Juniper Networks M5e (Gigabit Ethernet LX PIC, 4-port MMF SONET OC-3 PIC, 2-port ATM OC-3 PIC)
Juniper Networks M10 (4-port DS-3 PIC, Gigabit Ethernet SX PIC, OC-12 MMF SONET PIC, OC-12 MMF ATM PIC, 4-port T-1 PIC, 4-port Channelized DS-3 PIC, 4-port MMF SONET OC-3, Tunnel PIC)
24-port KVM with a SwitchView IP controller (KVMoIP)
Juniper Networks Dell Olive testing platform #1
Juniper Networks Dell Olive testing platform #2
Juniper Networks M10e (4-port T-1 PIC, 2-port ATM OC-3 PIC, 4-port OC-3 MMF SONET PIC, Adaptive Services Firewall PIC, Encryption Services PIC, Gigabit Ethernet LX PIC)
Juniper Networks M5e (Tunnel Services PIC, 2-port ATM OC-3 PIC, 4-port MMF SONET PIC, 4-port 10/100 Ethernet PIC)
Juniper Networks M10 (1-port OC-12 SONET PIC, 2-port ATM OC-3 PIC, 4-port 10/100 Ethernet PIC, 4-port MMF SONET PIC,  Encryption Services PIC, Tunnel Services PIC, Gigabit Ethernet LX PIC)This rack is run by four APC Smart UPS 3000 battery systems.


RACK 3:

Xyplex 1640 Terminal Server #1
Xyplex 1640 Terminal Server #2
Juniper Networks/NetScreen 50 Firewall
Cisco MCS-7825 Call Manager for Voice Lab
Cisco MCS-7825 Call Manager for Voice Lab
Cisco MCS-7847 Unity Server for Voice Lab
Cisco MCS-7835 Application Server for Voice Lab
Cisco Catalyst 3550 with Inline Power for Voice lab
Cisco VG-200 Voice Gateway (WIC-1DSU-T1, NM-2V, VIC-2EM, VIC-2DID)
Cisco 3620 (NM-1E1R2W, WIC-2T, WIC-1B-U, NM-2V, VIC-2FXO, VIC-2FXS)
Cisco 3620 (NM-1E2W, WIC-1B-U, WIT-1T, NM-2V, VIC-2FXO, VIC-2FXS)
Cisco 3620 (NM-1E2W, WIC-1DSU-T1, WIC-1T, NM-HDV, VWIC-2MFT-T1-DI)
Cisco Catalyst 3550 with Inline Power
Cisco 2611 (NM-2V, VIC2BRI-ST-TE, WIC-1T, WIC-1DSU-T1) providing 4 live voice lines
Compaq DL/320 running Call Manager Publisher (yes, you have to dial 9 to leave my house!)
Compaq DL/320 running Call Manager Subscriber
Cisco LS-1010 ATM Switch (capable of 20 OC-3 ATM ports + 2 OC-12 ATM ports)
Cisco 2610 (NM-16A) for Juniper Lab Terminal Server and Rentals
Juniper Networks M5e (ATM OC-12 MMF PIC, 4-port DS-3 PIC, 1-port Gigabit Ethernet SX PIC, 4-port MMF SONET PIC)
Juniper Networks J4300 (10 - 10/100 Ethernet ports, 4 - T-1 ports)
Juniper Networks M7i (4-port 10/100 Ethernet PIC, 4-port T-1 PIC, 4-port Channelized DS-3 PIC, Gigabit Ethernet SX PIC)
Cisco uBR-7223 Cable Modem Termination System (CMTS) with a uBR-MC14C (one downstream and four upstreams) and an OC-3 ATM blade
This rack is run by an APC SmartUPS 3000 battery system.
Around back:
(9) Cisco uBR-924 Cable Modems with voice capability
Cisco VPN-3002 VPN Device
Cisco 575 LRE Long Range Ethernet Modem
Cisco ATA-186 Analog Telephone Adapter/MTA
Wavecom Dual4040 Upconverter
Wavecom UC-4040C Upconverter
(6) APC MasterSwitches providing remote power access to Rack2 and Rack3


RACK 4:

This is where most of the routers lie.   
Up top:
Juniper/Netscreen RA-525 SSL VPN #1
Juniper/Netscreen RA-525 SSL VPN #2
Rack:
Juniper/NetScreen 25 Firewall
Cisco Catalyst 3550 switch with two SX GBIC's
Cisco Catalyst 3550 switch with two SX GBIC's
Cisco 3620 Frame Switch (NM-8A/S, NM-1E2W, WIC-1DSU-T1, WIC-1B-U)
Cisco 3620 ISDN Switch (NM-8B-U, NM-2E2W, WIC-1T, WIC-1DSU-T1)
Cisco Catalyst 3560 switch
Cisco Catalyst 3560 switch
R1 - Cisco 2811
R2 - Cisco 3825 (NM-16-ESW, WIC-1T, WIC-1T)
R4 - Cisco 2811 (WIC-1T, WIC-1T)
R5 - Cisco 2811 (WIC-1T, WIC-1T, NM-4B-U)
R6 - Cisco 2811 (WIC-1T, WIC-2T)
R7 - Cisco 2811 (WIC-1T)
R8 - Cisco 2811 (WIC-1T)
R9 - Cisco 2811 (WIC-2T)
BB1 - Cisco 2811
BB2 - Cisco 2811
BB3 - Cisco 2811
Spare - Cisco 2811 (NM-32A)
Cisco IDS-4215
Cisco ASA-5510
Cisco ASA-5510
Juniper Networks M5e (4-port E-1 PIC, 1-port OC-12 ATM MMF PIC, 4 port 10/100 Ethernet PIC)
Juniper Networks M5e (2-port DS-3 PIC, 1-port OC-12 ATM MMF PIC, 4 port 10/100 Ethernet PIC)
Juniper Networks M5e (4-port E-1 PIC, 1-port OC-12 ATM MMF PIC, 4 port 10/100 Ethernet PIC)
Juniper Networks M5e (2-port DS-3 PIC, 1-port OC-12 ATM MMF PIC, 4 port 10/100 Ethernet PIC)

This rack is run by one APC SmartUPS 3000 battery system and four APC SmartUPS 1000 battery systems.
Around Back:
Adtran Atlas 800Plus Telephony Switch (configured with 8 PRI/T-1 ports and 24 ISDN BRI ports)
Three APC MasterSwitch devices providing remote power access
Otherwise not pictured -
Cisco 1760V (VWIC-1MFT-T1, VIC-2FXS, WIC-1DSU-T1, WIC-4ESw)
About a dozen 7960 IP Telephones
Two 7935 IP Conference Phones
Cisco IDS-4210 (loaned out to a friend studying CCIE Security)
Cisco AP-1232 Wireless Access Point running 802.11 a/b/g simultaneously with both internal and external antennas (Yup, I'm a hooked-up kinda guy!)
Sun Microsystems SunFire V100 (Future broadband voice and PacketCable stuff)
Sun Microsystems SunFire V100 (A second future-use system)
IP/TV Archive Server
IP/TV Control Server
IP/TV Broadcast Server
Various laptops and other network pieces not related to the lab (yes, I run a business too!)
There are also a few different webcams set up at strategic places with various sensors to assist in providing security and environmental monitoring.  All sorts of fun!


Quadruple CCIE:
Cisco Certified Internetwork Expert -- CCIE #4713 (R&S)
Cisco Certified Internetwork Expert -- CCIE #4713 (ISP-Dial) --- 已作废
Cisco Certified Internetwork Expert -- CCIE #4713 (Security)
Cisco Certified Internetwork Expert -- CCIE #4713 (Service Provider)
- Specialization in Cable/RF
Cisco Certified Design Professional -- CCDP (R&S)
Cisco Certified Security Professional -- CCSP
Cisco Cable Communications Specialist
Cisco IP Telephony Support Specialist
Cisco IP Telephony Design Specialist
Cisco Certified Network Associate -- WAN Switching
Cisco Certified Systems Instructor -- CCSI #21903
Microsoft Certified Systems Engineer (NT 4.0)  #474812
Ortronics Certified Systems Installer +
Cisco Sales Expert - Enterprise
AVVID Certified SE/FE - IP Telephony
AVVID Certified SE/FE - Voice Access
Juniper Networks Certified Internet Specialist (JNCIS) #462
Juniper Networks Certified Internet Professional (JNCIP) #172
Juniper Networks Certified Internet Expert (JNCIE) #153
Juniper Networks Certified Internet Associate (JNCIA-J)
Juniper Networks Certified Instructor (JNCI) for M-Series and J-Series
NSA/CNSS INFOSEC Professional
TIA Convergence Technology Professional (CTP)
Certified Information Systems Security Professional -- CISSP #37445

CCIE Candidate - Design (passed written exam) <track killed>
CCIE Candidate - Voice (passed written exam) <Lab pending Spring '06>
Will finish up CCVP requirements (two exams left) early 2006

 楼主| 发表于 2007-12-18 17:36:48 | 显示全部楼层
Triple CCIEs的JNCIE考试  
[ 录入者:admin | 时间:2007-10-06 07:31:34 | 作者: | 来源: | 浏览:109次 ]  
JUNOS是一种毒,一旦接触过以后,便如魔鬼般付诸您的灵魂与身体之内 —— 以致您已对其它互联网操作系统软件失去兴趣。 不要妄想zzIE的版本原则能够在JNCIP/JCNIE的考试中实现;即便拓扑不变,每次您都需要面对新的挑战。诸如IGP,iBGP设计等。 JNCIP/JNCIE考试不单纯粹是一种技术性的测试,更倾重的是您的技术创新能力 —— 至今我一直认为当然双翼NSSA是我能一次通过JNCIIP的原因。 无论JNCIP/JNCIE考试,关键在于懂得如何在JUNIPER平台上完成复制/粘帖,我只有50%的配置是用键盘敲进去的。 下午3点,面对着15天更新的版本,我曾经考虑放弃 —— 作为一个Triple CCIE,作为一个财经顾问(嗬 —— 您们习惯叫我这样的人为“操盘手”);作为一个NLP团队激励教练;Google市场策略顾问 …… 我相信每天的收入亏损不会比其他人一个月的收入有多大的区别,那么 —— 我凭什么受这样的罪?—— 毒! 最后我坚持下来了,原因很多,不想细说,关于JNCIP/JNCIE的考试心得随便Google一下就可以了。最后奉上一句。 zzIE版本原则能让您得到那张连塑封都没有的“证书”;您需要证明自我技术价值,证明您的能力,接受JUNIPER的挑战。那是您的选择。 JNCIP/JNCIE的路没有您想像中那么艰难,需要的仅仅是您的决心,勇气,和坚持。
您需要登录后才可以回帖 登录 | 注册

本版积分规则

小黑屋|手机版|Archiver|boway Inc. ( 冀ICP备10011147号 )

GMT+8, 2024-11-24 06:21 , Processed in 0.110749 second(s), 16 queries .

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表