Junos Enterprise Switching Skills Camp (JEX, AJEX)
Course ID
913520
Course Description
We combined two authorized Juniper courses, Juniper Enterprise Switching (JEX) and Advanced Juniper Enterprise Switching (AJEX), to create this convenient, four-day course in which you will build your intermediate and advanced Junos enterprise switching skills. You will gain hands-on experience with the features of EX Series Ethernet switches, including:
Virtual LANs (VLANs)
Spanning Tree Protocol (STP), Multiple Spanning Tree Protocol (MSTP), and VLAN Spanning Tree Protocol (VSTP)
Authentication and access control for Layer 2 networks
Port and device security features
High availability (HA) features
IP telephony features
Class of Service (CoS)
Monitoring and troubleshooting
Prerequisites
Introduction to the Junos Operating System (IJOS)
Junos Routing Essentials (JRE)
Junos Foundations: JNCIA-Junos Boot Camp (IJOS,JRE)
Audience
Network technicians responsible for configuring and monitoring EX Series switches
Course Content
Benefits of implementing switched LANs
Transparent bridging concepts and operations
Terms and design considerations for switched LANs
Enterprise platforms that support Layer 2 switching
Configure interfaces for Layer 2 switching operations
Display and interpret the Ethernet switching table
VLAN concepts, including Voice and native VLANs
Access and trunk port modes
Configure and monitor VLANs
Inter-VLAN routing operation, configuration, and monitoring
Implement filter-based VLAN assignments and restrict traffic flow within a VLAN
Manage dynamic VLAN registration
Purpose and operations of a spanning tree
Configure and monitor STP and Rapid STP (RSTP) operations
Bridge protocol data unit (BPDU), Loop, and Root protection features configuration
Configure and monitor port security features and storm control
Implement multiple spanning-tree instances in a network
Implement one or more spanning-tree instances for a VLAN
Firewall filter support for EX Series Ethernet switches
Implement and monitor the effects of a firewall filter
Configure and monitor HA features
Implement and operate a virtual chassis with multiple EX4200 switches
Tunnel Layer 2 traffic through Ethernet networks
Benefits of implementing end-user authentication
Configure and monitor access control features
Processing considerations when multiple authentication and access control features are enabled
Configure and monitor features used in IP telephony deployments
Configure and monitor CoS in a Layer 2 network
Basic troubleshooting methods and tools
Common issues that disrupt network operations