JNCIP-ENT Bundle (Certification Course)

Course Number:

N/A

Audience:

Network engineers, technical support personnel, reseller support engineers, and others responsible for implementing and/or maintaining the Juniper Networks products covered in this course.
Course Duration:
5 days

Prerequisites:

Students should have a strong level of TCP/IP networking and security knowledge. It is recommend participants also attend the Introduction to the Junos Operating System (IJOS), Junos Routing Essentials (JRE), Junos Intermediate Routing (JIR) and the Junos Enterprise Switching (JEX) courses prior to attending this class.

Course Objectives:
  • Configure various OSPF area types
  • Describe basic BGP operation
  • Explain the route selection process for BGP
  • Configure advanced options for BGP peers
  • Manipulate BGP attributes using routing policy
  • Implement a routing policy for inbound and outbound traffic using BGP
  • Describe the various CoS components and their respective functions
  • Explain the CoS processing along with CoS defaults
  • Implement some CoS features in an enterprise environment
  • Identify the components of IP multicast
  • Describe the need for reverse path forwarding (RPF) in multi-cast
  • Configure and monitor Internet Group Management Protocol (IGMP)
  • Identify common multicast routing protocols
  • Describe rendezvous point (RP) discovery options
  • Configure and monitor Protocol Independent Multicast-Sparse Mode (PIM-SM)
  • Configure and monitor RP discovery mechanisms
  • Describe the basic requirements, benefits and caveats of source-specific multicast (SSM)
  • Configure and monitor SSM
  • Implement filter-based VLAN assignments
  • Manage dynamic VLAN registration
  • Tunnel Layer 2 traffic through Ethernet networks
  • Implement multiple spanning tree instances in a network
  • Implement one or more spanning tree instances for a VLAN
  • Use available tools to resolve network issues
  • List the benefits of implementing end-user authentication
  • Explain the operations of various access control features
  • Configure and monitor various access control features
  • Describe features that facilitate IP telephony deployments
  • Configure and monitor features used in IP telephony deployments
  • Explain the purpose and basic operations of class of service
  • Describe class of service features used in Layer 2 networks
  • Configure and monitor class of service in a Layer 2 network
Course Outline:
  • Course Introduction (AJER)

 

  • OSPF
    • OSPFv2 Review
    • Link State Advertisements
    • Protocol Operations
    • OSPF Authentication

 

  • OSPF Areas
    • Review of OSPF Areas
    • Stub Area Operation
    • Stub Area Configuration
    • NSSA Operation
    • NSSA Configuration
    • Route Summarization

 

  • OSPF Case Studies and Solutions
    • Transitioning to OSPF from a Different IGP
    • External Reachability
    • Virtual Links
    • Multiarea Adjacency

 

Day Two

 

  • BGP
    • Review of BGP
    • BGP Operations
    • BGP Path Selection and Options
    • Configuration Options

 

  • BGP Attributes and Policy
    • BGP Policy
    • Next Hop
    • Origin and MED
    • AS Path
    • Local Preference
    • Communities

 

  • Enterprise Routing Policies
    • Topology-Driven Routing Policy
    • Primary/Secondary Routing Policy
    • Load-Shared Per Prefix Routing Policy

 

Day Three

 

  • Class of Service
    • Review of CoS Components
    • CoS Processing and Feature Overview
    • Policing
    • Virtual Channels

 

  • Introduction to Multi-cast
    • Overview of Multi-cast
    • Multi-cast Addresses
    • Reverse Path Forwarding
    • Internet Group Management Protocol

 

  • Multicast Routing Protocols and SSM
    • Overview of Multicast Routing Protocols
    • PIM-SM
    • Source-Specific Multicast

 

Day Four

 

  • Course Introduction (AJER)

 

  • Advanced Ethernet Switching
    • Virtual Local Area Networks
    • Automating VLAN Administration
    • Tunneling Layer 2 Traffic

 

  • Advanced Spanning Tree
    • Spanning Tree Review
    • MSTP
    • VSTP

 

  • Monitoring and Troubleshooting Layer 2 Networks
    • Introduction to Monitoring and Troubleshooting
    • Monitoring and Troubleshooting Tools
    • Case Studies

 

  • Authentication and Access Control
    • Authentication Overview
    • Access Control Features
    • Overview of Authentication Processing

 

  • Deploying IP Telephony Features
    • Deployment Scenarios
    • IP Telephony Features
    • Case Study: Deploying IP Telephony Features

 

  • Class of Service
    • Class of Service Review
    • Processing and Feature Overview
    • Case Study: Implementing Class of Servic
Share on facebook
Share on twitter
Share on linkedin
Share on email

Related Posts

About Us

IT Training, Agile Ways of Working and High Impact Talent Development Strategies

Let Us Come to You!

Classes recently delivered in: Atlanta, Boston, Chicago, Columbus, Dallas, Detroit, Indianapolis, Jerusalem, London, Milan, New York, Palo Alto, Phoenix, Pittsburgh, Portland, Raleigh, San Antonio, San Diego, San Francisco, San Jose, Seattle, Springfield, Mass., St. Louis, Tampa and more!