JEX - Junos Enterprise Switching using Enhanced Layer 2 Software

4.6 out of 5 rating

Jump to dates

Duration

2 Days

12 CPD hours

This course is intended for

This program is designed for students who have attended successfully the IJOS and JRE courses (prior to April 1, 2017) or the IJOS course (since April 3, 2017) and are working toward JNCIA-JUNOS certification.

Overview

The objectives for this course follow the requirements for the current JNCIA-JUNOS. At the end of this course, the successful student will be able to:
Identify the concepts and functionality of various fundamental elements of networking
Identify the concepts, benefits and functionality of the core elements of the Junos OS
Identify the concepts, operation and functionality of the Junos user interfaces
Identify the main elements for configuring Junos devices
Describe how to configure basic components of a Junos device
Identify methods of monitoring and maintaining Junos devices
Describe monitoring and maintenance procedures for a Junos device
Identify basic routing concepts and functionality for Junos devices
Describe how to configure and monitor basic routing elements for a Junos device
Identify the concepts and functionality of routing policy and firewall filters on Junos devices
Describe how to configure and monitor routing policies and firewall filters on a Junos device
Apply knowledge of Junos operating system configuration, operations, and functionality to real-world scenarios

Description

This two-day course provides students with intermediate switching knowledge and configuration examples using Junos Enhanced Layer 2 Software.

Chapter 1: Course Introduction
  • Course Introduction
Chapter 2: Layer 2 Switching
  • Ethernet Bridging Basics
  • Terminology and Design Considerations
  • Overview of Enterprise Switching Platforms
  • Enabling and Monitoring Layer 2 Switching Operations
  • Lab 1: Implementing Layer 2 Switching
Chapter 3: Virtual Networks
  • Overview of VLANs
  • Configuring and Monitoring VLANs
  • Voice VLAN
  • Native VLAN
  • Routed VLAN Interfaces
  • Lab 2: Implementing Virtual Networks
Chapter 4: Routing Instances
  • Routing Instances Overview
  • Configuring and Monitoring Virtual Switches
Chapter 5: Spanning Tree
  • Spanning Tree Protocol
  • Rapid Spanning Tree Protocol
  • Configuring and Monitoring STP and RSTP
  • Protection Features: BPDU Protection
  • Protection Features: Loop Protection
  • Protection Features: Root Protection
  • Lab 3: Implementing Spanning Tree
Chapter 6: Port Security
  • MAC Limiting
  • Persistent MAC Learning
  • DHCP Snooping
  • Dynamic ARP Inspection (DAI)
  • IP Source Guard
  • Lab 4: Implementing Port Security
Chapter 7: Device Security and Firewall Filters
  • Storm Control
  • Firewall Filters
  • Lab 5: Implementing Storm Control and Firewall Filters
Chapter 8: Virtual Chassis
  • Overview of Virtual Chassis
  • Configuring and Monitoring a Virtual Chassis
  • Lab 6: Implementing a Virtual Chassis System
Chapter 9: High Availability Features
  • Overview of High Availability Networks
  • Link Aggregation Groups
  • Redundant Trunk Groups
  • Graceful Routing Engine Switchover (GRES)
  • Nonstop Active Routing (NSR)
  • Nonstop Bridging (NSB)
  • Lab 7: Implementing High Availability Features
Training Insurance Included!

When you organise training, we understand that there is a risk that some people may fall ill, become unavailable. To mitigate the risk we include training insurance for each delegate enrolled on our public schedule, they are welcome to sit on the same Public class within 6 months at no charge, if the case arises.

What people say about us


Find out more about this course

Interested in alternative dates? Would like to book a private session of this course for your company? Or for any other queries please simply fill out the form below.