0% found this document useful (0 votes)
41 views31 pages

Jncia - Junos: Secondary System Configuration

This document covers secondary system configuration topics for the JNCIA - JUNOS certification including user authentication and authorization, system logging, NTP clock synchronization, archiving configuration files, and SNMP. It provides overviews, examples, and instructions for configuring features like authentication order, syslog, traceoptions, and SNMP as well as monitoring processes like system logging, NTP synchronization, and archival of configuration files. The document is broken into sections with objectives and agendas to structure the material for readers studying for the JNCIA - JUNOS exam.

Uploaded by

Gopi Venkatesan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views31 pages

Jncia - Junos: Secondary System Configuration

This document covers secondary system configuration topics for the JNCIA - JUNOS certification including user authentication and authorization, system logging, NTP clock synchronization, archiving configuration files, and SNMP. It provides overviews, examples, and instructions for configuring features like authentication order, syslog, traceoptions, and SNMP as well as monitoring processes like system logging, NTP synchronization, and archival of configuration files. The document is broken into sections with objectives and agendas to structure the material for readers studying for the JNCIA - JUNOS exam.

Uploaded by

Gopi Venkatesan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 31

JNCIA - JUNOS

Secondary System
Configuration

Objectives

Agenda

User Authentication

Authentication Order

Authentication Order Example(1 of


3)

Authentication Order Example(2 of


3)

Authentication Order Example(3 of


3)

Components of Authorization (1 of
2)

Components of Authorization (2 of
2)

Authorization - Sample

Agenda

System Logging - Overview

Syslog Configuration
Example

Interpreting Syslog Message

Traceoptions Overview

Traceoption Configuration
Example

Analysing Log and Trace


Files

Miscellaneous Log File


Commands

Agenda

NTP Clock Synchronization

Monitoring NTP
Synchronization

Agenda

Archiving Configuration Files

Monitoring Archival Process

Agenda

SNMP Overview (1 of 2)

SNMP Overview (2 of 2)

Example Configuring
SNMP

Monitoring SNMP Operation

Summary

You might also like