We offer this course in co-operation with our partner Westcon Security. Westcon Security is Juniper Networks Authorized Education Center.
This course provides students with intermediate switching knowledge and configuration examples. This course includes an overview of switching concepts and operations, virtual LANs (VLANs), the Spanning Tree Protocol (STP), port and device security features, and high availability (HA) features.
Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos operating system and in monitoring device operations. This course uses Juniper Networks EX Series Ethernet Switches for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS. This course is based on the Junos OS Release 12.2R1.8.
- Course Contents
• Layer 2 Switching
• Virtual Networks
• Spanning Tree
• Port Security
• Device Security and Firewall Filters
• High AvailabilityEach participant will receive the original course documentation as a Juniper E-Book.
- Target Group
This course benefits individuals responsible for configuring and monitoring EX Series switches.
- Knowledge Prerequisites
Students should have basic networking knowledge and an understanding of the OSI model and the TCP/IP protocol suite. Students should also attend the IJOS course prior to attending this class.
|Chapter 1: Course Introduction|
|Chapter 2: Layer 2 Switching|
|• Ethernet Bridging Basics|
|• Terminology and Design Considerations|
|• Overview of Enterprise Switching Platforms|
|• Enabling and Monitoring Layer 2 Switching Operations|
|• Lab 1: Implementing Layer 2 Switching|
|Chapter 3: Virtual Networks|
|• Overview of VLANs|
|• Configuring and Monitoring VLANs|
|• Voice VLAN|
|• Native VLAN|
|• Routed VLAN Interfaces|
|• Lab 2: Implementing Virtual Networks|
|Chapter 4: Spanning Tree|
|• Spanning Tree Protocol|
|• Rapid Spanning Tree Protocol|
|• Configuring and Monitoring STP and RSTP|
|• Protection Features: BPDU Protection|
|• Protection Features: Loop Protection|
|• Protection Features: Root Protection|
|• Lab 3: Implementing Spanning Tree|
|Chapter 5: Port Security|
|• MAC Limiting|
|• DHCP Snooping|
|• Dynamic ARP Inspection (DAI)|
|• IP Source Guard|
|• Lab 4: Implementing Port Security|
|Chapter 6: Device Security and Firewall Filters|
|• Storm Control|
|• Firewall Filters|
|• Lab 5: Implementing Storm Control and Firewall Filters|
|Chapter 7: High Availability|
|• Overview of High Availability Networks|
|• Link Aggregation Groups|
|• Redundant Trunk Groups|
|• Lab 6: Configuring LAGs and RTG|
|• Overview of Virtual Chassis|
|• Configuring and Monitoring a Virtual Chassis|
|• Lab 7: Implementing a Virtual Chassis System|
Certification as JNCIS-ENT
- Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
- Tailor-made courses
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request for customized courses