Junos Enterprise Switching Skills Camp (JEX, AJEX)

COURSE OUTLINE:

Description

We combined two authorized Juniper courses, Juniper Enterprise Switching (JEX)and Advanced Juniper Enterprise Switching (AJEX), to create this convenient,four-day course in which you will build your intermediate and advanced Junosenterprise switching skills. You will gain hands-on experience with the featuresof EX Series Ethernet switches, including:

  • Virtual LANs (VLANs)
  • Spanning Tree Protocol (STP), Multiple Spanning Tree Protocol (MSTP), and VLAN Spanning Tree Protocol (VSTP)
  • Authentication and access control for Layer 2 networks
  • Port and device security features
  • High availability (HA) features
  • IP telephony features
  • Class of Service (CoS)
  • Monitoring and troubleshooting

Audience

Network technicians responsible for configuring and monitoring EX Series switches

Prerequisites

  • Introduction to the Junos Operating System (IJOS)
  • Junos Routing Essentials (JRE)

Or

Learning Objectives

  • Benefits of implementing switched LANs
  • Transparent bridging concepts and operations
  • Terms and design considerations for switched LANs
  • Enterprise platforms that support Layer 2 switching
  • Configure interfaces for Layer 2 switching operations
  • Display and interpret the Ethernet switching table
  • VLAN concepts, including Voice and native VLANs
  • Access and trunk port modes
  • Configure and monitor VLANs
  • Inter-VLAN routing operation, configuration, and monitoring
  • Implement filter-based VLAN assignments and restrict traffic flow withina VLAN
  • Manage dynamic VLAN registration
  • Purpose and operations of a spanning tree
  • Configure and monitor STP and Rapid STP (RSTP) operations
  • Bridge protocol data unit (BPDU), Loop, and Root protection featuresconfiguration
  • Configure and monitor port security features and storm control
  • Implement multiple spanning-tree instances in a network
  • Implement one or more spanning-tree instances for a VLAN
  • Firewall filter support for EX Series Ethernet switches
  • Implement and monitor the effects of a firewall filter
  • Configure and monitor HA features
  • Implement and operate a virtual chassis with multiple EX4200 switches
  • Tunnel Layer 2 traffic through Ethernet networks
  • Benefits of implementing end-user authentication
  • Configure and monitor access control features
  • Processing considerations when multiple authentication and access controlfeatures are enabled
  • Configure and monitor features used in IP telephony deployments
  • Configure and monitor CoS in a Layer 2 network
  • Basic troubleshooting methods and tools
  • Common issues that disrupt network operations

1. Layer 2 Switching

  • Ethernet Bridging Basics
  • Terminology and Design Considerations
  • Enterprise Switching Platforms
  • Enabling and Monitoring Layer 2 Switching Operations

2. Virtual Networks

  • VLANs
  • Configuring and Monitoring VLANs
  • Voice VLAN
  • Native VLAN
  • Routed VLAN Interfaces

3. Spanning Tree

  • Spanning Tree Protocol (STP)
  • Rapid Spanning Tree Protocol (RSTP)
  • Configuring and Monitoring STP and RSTP
  • Protection Features
    • BPDU Protection
    • Loop Protection
    • Root Protection

4. Port Security

  • MAC Limiting
  • Persistent MAC Learning
  • DHCP Snooping
  • Dynamic ARP Inspection
  • IP Source Guard

5. Device Security and Firewall Filters

  • Storm Control
  • Firewall Filters

6. Virtual Chassis

  • High Availability Networks
  • Configuring and Monitoring a Virtual Chassis

7. High Availability (HA) Features

  • HA Networks
  • Link Aggregation Groups
  • Redundant Trunk Groups
  • Graceful Routing Engine Switchover
  • Nonstop Active Routing
  • Nonstop Bridging

8. Advanced Ethernet Switching

  • VLANs
    • Assigning User Traffic to VLANs
    • Restricting User Traffic within a VLAN
  • Automating VLAN Administration
  • Tunneling Layer 2 Traffic
  • Advanced Spannin

9. Advanced Spanning Tree

  • Multiple Spanning Tree Protocol (MSTP)
  • VLAN Spanning Tree Protocol (VSTP)

10. Authentication and Access Control

  • Access Control Features
    • 802.1X
    • MAC RADIUS
    • Captive Portal
  • Authentication Processing

11. Deploying IP Telephony Features

  • Deployment Scenarios
  • IP Telephony Features
    • Power over Ethernet
    • Neighbor Discovery
    • Voice VLAN
  • Case Study

12. Class of Service

  • Implementing Class of Service
  • Case Study

13. Monitoring and Troubleshooting Layer 2 Networks

  • Monitoring and Troubleshooting Tools
  • Troubleshooting Case Studies
    • Reachability Issues
    • Network Congestion