Advanced Junos Enterprise Switching Using Enhanced Layer 2 Software (AJEX)
Schedule
- T86625
- 2 days
- 03/03/2025 - 03/04/2025*
- 8:00 AM
- (GMT -07:00) Mountain Standard Time
- Presented via WebEx
- VC
Virtual Classroom
Attend any of our instructor-led classes virtually regardless of your physical location.
- VC
- T86626
- 2 days
- 05/27/2025 - 05/28/2025*
- 7:00 AM
- (GMT -06:00) Mountain Daylight Time
- Presented via WebEx
- VC
Virtual Classroom
Attend any of our instructor-led classes virtually regardless of your physical location.
- VC
- PC
Private Class
Privately train a group of your employees at your facility, virtually, or any of our locations.
- PC
- LCLive Classroom
Live Classroom
Learn and interact with your instructor and peers in-person in our classrooms. - VCVirtual Classroom
Virtual Classroom
Attend any of our instructor-led classes virtually regardless of your physical location. - PCPrivate Class
Private Class
Privately train a group of your employees at your facility, virtually, or any of our locations. - GTRGuaranteed to Run
Guaranteed to Run
GTR classes are guaranteed to run as promised and delivered.
*event may not be applicable to special offers or promotions.
Course Summary
Show All
Description
Objectives
After successfully completing this course, you should be able to:
- Restrict traffic flow within a VLAN.
- Manage dynamic VLAN registration.
- Tunnel Layer 2 traffic through Ethernet networks.
- Review the purpose and operations of a spanning tree.
- Implement multiple spanning-tree instances in a network.
- Implement one or more spanning-tree instances for a VLAN.
- List the benefits of implementing end-user authentication.
- Explain the operations of various access control features.
- Configure and monitor various access control features.
- Describe processing considerations when multiple authentication and access control features are enabled.
- Describe some common IP telephony deployment scenarios.
- Describe features that facilitate IP telephony deployments.
- Configure and monitor features used in IP telephony deployments.
- Explain the purpose and basic operations of CoS.
- Describe CoS features used in Layer 2 networks.
- Configure and monitor CoS in a Layer 2 network.
- Describe a basic troubleshooting method.
- List common issues that disrupt network operations.
- Identify tools used in network troubleshooting.
- Use available tools to resolve network issues.
Prerequisites
Students should have an intermediate-level of networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/IP protocol suite. Students should also attend the Introduction to the Junos Operating System (IJOS) course and the Junos Enterprise Switching (JEX) course prior to attending this class.
Who Should Attend
This course benefits individuals responsible for configuring and monitoring EX Series switches using Junos ELS.
Outline
Day 1 Chapter 1: Course Introduction Chapter 2: Advanced Ethernet Switching
- Virtual Local Area Networks
- Automating VLAN Administration
- Tunneling Layer 2 Traffic
- Lab 1: Advanced Ethernet Switching
- Spanning Tree Review
- MSTP
- VSTP
- Lab 2: Advanced Spanning Tree
- Authentication Overview
- Access Control Features
- Overview of Authentication Processing
- Lab 3: Authentication and Access Control
- Deployment Scenarios
- IP Telephony Features
- Case Study: Deploying IP Telephony Features
- Lab 4: Deploying IP Telephony Features
- Class of Service Review
- Processing and Feature Overview
- Case Study: Implementing Class of Service
- Lab 5: Class of Service
- Introduction to Monitoring and Troubleshooting
- Monitoring and Troubleshooting Tools
- Case Studies
- Lab 6: Monitoring and Troubleshooting