JNCIA Junos P1 - 2012 12 1900047

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

JNCIA-Junos Study Guide—Part 1

Identification Parameters

The graphic shows how to use the CLI to configure the hostname and a root password. As displayed on the graphic, a check is
made when the root password is entered to ensure that it has been entered correctly. In the event that both entered passwords
do not match, an error will be generated, the change is not made, and the password will need to be reentered.
The example on the graphic uses the plain-text authentication option. Unlike the software from some vendors, the Junos OS
never actually displays the password in its plain-text format but rather encrypts the password for you. You can see the encrypted
password by viewing the relevant configuration:
[edit system]
root# show root-authentication
encrypted-password "$1$ti58nUSg$8xnQtTJeA0dA/.eUjjZOq1"; ## SECRET-DATA
Because you cannot retrieve the passwords by looking at the configuration file, you should keep the configured passwords in a
secure location. If you do forget the password and cannot log in, you can always perform the password recovery process, which
we cover in a subsequent chapter.

Time Parameters
The graphic shows how to use the CLI to configure the
time settings. You can configure the current date and
time information along with the proper time zone for the
device. The default time zone on Junos devices is UTC
(Coordinated Universal Time, formerly known as
Greenwich Mean Time, or GMT). When you define the
local time on a Junos device, you must account for the
time difference between the defined time zone and the
default time zone. Once the time zone is changed and
committed, the local time is adjusted accordingly to
account for the difference. If you do not want to make the
necessary adjustments, you can simply set the system’s time after the defined time zone parameter has been committed.
Instead of setting the local time on each network device in your network, you might consider implementing the Network Time
Protocol (NTP). We cover NTP in detail in the “Secondary System Configuration” chapter.

© 2012 Juniper Networks, Inc. All rights reserved. Initial Configuration • Chapter 3–5

You might also like