Advanced Junos Enterprise Switching Using Enhanced Layer 2 Software
Advanced Junos Enterprise Switching Using Enhanced Layer 2 Software Course Details:
Through demonstrations and hands-on labs, you will gain experience configuring and monitoring the Juniper Networks Junos operating system as well as monitoring device and protocol operations. You will cover, in detail, virtual LAN (VLAN) operations, Multiple Spanning Tree Protocol (MSTP) and VLAN Spanning Tree Protocol (VSTP), authentication and access control for Layer 2 networks, IP telephony features, Class of Service (CoS), monitoring and troubleshooting tools, and features supported on the EX Series Ethernet Switches.
Call (919) 283-1674 to get a class scheduled online or in your area!
- Advanced Ethernet Switching
- Virtual Local Area Networks
- Assigning User Traffic to VLANs
- Restricting Traffic within a VLAN
- Automating VLAN Administration
- Tunneling Layer 2 Traffic
- Virtual Local Area Networks
- Advanced Spanning Tree
- Spanning Tree
- Multiple Spanning Tree Protocol (MSTP)
- VLAN Spanning Tree Protocol (VSTP)
- Authentication and Access Control
- Authentication
- Access Control Features
- 802.1X
- MAC RADIUS
- Captive Portal
- Authentication Processing
- Deploying IP Telephony Features
- Deployment Scenarios
- IP Telephony Features
- Power over Ethernet
- Neighbor Discovery
- Voice VLAN
- Case Study: Deploying IP Telephony Features
- Class of Service
- Implementing Class of Service
- Case Study
- Monitoring and Troubleshooting
- Monitoring and Troubleshooting Tools
- Troubleshooting Case Studies
- Reachability Issues
- Network Congestion
*Please Note: Course Outline is subject to change without notice. Exact course outline will be provided at time of registration.
- Implement filter-based VLAN assignments
- Restrict traffic flow within a VLAN
- Manage dynamic VLAN registration
- Tunnel Layer 2 traffic through Ethernet networks
- Purpose and operations of a spanning tree
- Implement multiple spanning-tree instances in a network
- Implement one or more spanning-tree instances for a VLAN
- Benefits of implementing end-user authentication
- Operations of various access control features
- Configure and monitor various access control features
- Processing considerations when multiple authentication and access control features are enabled
- Common IP telephony deployment scenarios
- Features that facilitate IP telephony deployments
- Configure and monitor features used in IP telephony deployments
- Purpose and basic operations of CoS
- CoS features used in Layer 2 networks
- Configure and monitor CoS in a Layer 2 network
- Basic troubleshooting method
- Common issues that disrupt network operations
- Tools used to troubleshoot and resolve network issues
Lab 1: Advanced Ethernet Switching
Lab 2: Implement MSTP and VSTP
Lab 3: Authentication and Access Control
Lab 4: Deploy IP Telephony Features
Lab 5: Class of Service
Lab 6: Monitoring and Troubleshooting
Individuals responsible for configuring and monitoring EX Series switches