COURSE OBJECTIVE:
• Restrict traffic flow within a VLAN. • Manage dynamic VLAN registration. • Tunnel Layer 2 traffic through Ethernet networks. • Review the purpose and operations of a spanning tree. • Implement multiple spanning-tree instances in a network. • Implement one or more spanning-tree instances for a VLAN. • List the benefits of implementing end-user authentication. • Explain the operations of various access control features. • Configure and monitor various access control features. • Describe processing considerations when multiple authentication and access control features are enabled. • Describe some common IP telephony deployment scenarios. • Describe features that facilitate IP telephony deployments. • Configure and monitor features used in IP telephony deployments. • Explain the purpose and basic operations of CoS. • Describe CoS features used in Layer 2 networks. • Configure and monitor CoS in a Layer 2 network. • Describe a basic troubleshooting method. • List common issues that disrupt network operations. • Identify tools used in network troubleshooting. • Use available tools to resolve network issues.
TARGET AUDIENCE:
Individuals responsible for configuring and monitoring EX Series switches using Junos Enhanced Layer 2 Software (ELS)
COURSE PREREQUISITES:
• Basic networking knowledge and an understanding of the OSI reference model and the TCP/IP protocol suite • Completion of the Introduction to the Junos Operating System (IJOS) course, or equivalent knowledge • Completion of Junos Enterprise Switching (JEX) course, or equivalent knowledge
COURSE CONTENT:
Day 1Course Introduction VLAN Traffic Management • Assign user traffic to VLANs• Explain how to restrict traffic flows within a VLAN Advanced Ethernet Switching • Configure dynamic VLAN registration using MVRP • Implement Layer 2 tunnel traffic through Ethernet networks Lab 1: Advanced Ethernet SwitchingMSTP • Describe a spanning tree's purpose and operations • Implement multiple spanning tree instances in a network • Overview of Authentication Processing VSTP • Describe spanning tree instances for a VLAN • Implement spanning tree instances for a VLAN Lab 2: Advanced Spanning Tree Authentication and Access Control • List the benefits of implementing end-user authentication • Describe the operations of 802.1X access control features Access Control Features—MAC RADIUS and Captive Portal • Configure and monitor MAC radius access control features • Configure and monitor captive portal access control features • Describe processing considerations when multiple authentication and access control features are enabled Lab 3: Authentication and Access ControlDay 2IP Telephony Features—Power over Ethernet, Neighbor Discovery using LLDP • Describe some common IP telephony deployment scenarios • Explain power over Ethernet feature of IP telephony • Describe neighbor discovery feature of IP telephony IP Telephony Features—Voice LAN • Describe voice VLAN feature of IP telephony • Implement the IP telephony features Lab 4: Deploying IP Telephony FeaturesClass of Service Overview • Configure and monitor class of service in a Layer 2 network • Perform class of service troubleshooting Implement Class of Service • Configure and monitor class of service in a Layer 2 network • Perform class of service troubleshooting Lab 5: Class of Service Introduction to Monitoring and Troubleshooting Layer 2 Enterprise Networks • Explain basic troubleshooting flow • Evaluate troubleshooting steps Implement Monitoring and Troubleshooting Layer 2 Enterprise Networks • List common issues that disrupt network operations • Identify tools used in network troubleshooting • Use available tools to resolve network issues Lab 6: Monitoring and Troubleshooting Appendix A: Junos Space Network Director • Describe Junos Space Network Director • Configure Junos Space Network Director Appendix B: Introduction to Mist AI Integration • List the wired assurance options and the supported Juniper switching devices • Describe provisioning and deployment process Appendix C: Mist Wired Assurance • Describe the deployment options • Explain wired assurance SLE and their classifiers • Describe the role of Mist within campus and branch architecture Appendix D: ELS and Non-ELS Configuration Examples • Configure switch options • Describe IRB and VLAN Interfaces • Describe Q-in-Q Tagging
FOLLOW ON COURSES:
JNCIE-ENT Certification Self-Study Bundle