Duration 5 Days 30 CPD hours This course is intended for This course benefits individuals responsible for implementing, monitoring, and troubleshooting Layer 3 components of a service provider's network. Overview Describe the various OSPF link-state advertisement (LSA) types. Explain the flooding of LSAs in an OSPF network. Describe the shortest-path-first (SPF) algorithm. List key differences between OSPFv2 and OSPFv3. Describe OSPF area types and operations. Configure various OSPF area types. Summarize and restrict routes. Identify some scenarios in a service provider network that can be solved using routing policy or specific configuration options. Use routing policy and specific configuration options to implement solutions for various scenarios. Describe how to troubleshoot OSPF. Explain the concepts and operation of IS-IS. Describe various IS-IS link-state protocol data unit (LSP) types. List IS-IS adjacency rules and troubleshoot common adjacency issues. Configure and monitor IS-IS. Display and interpret the link-state database (LSDB). Perform advanced IS-IS configuration options. Implement IS-IS routing policy. Explain the default operation in multiarea IS-IS. Describe IS-IS address summarization methods. Configure and monitor a multiarea IS-IS network. Describe how to troubleshoot IS-IS. Describe basic BGP operation. List common BGP attributes. Explain the route selection process for BGP. Describe how to alter the route selection process. Configure some advanced options for BGP peers. Describe various BGP attributes in detail and explain the operation of those attributes. Manipulate BGP attributes using routing policy. Explain the causes for route instability. Describe the effect of damping on BGP routing. Explain the default behavior of damping on links. Control damping using routing policy. View damped routes using command-line interface (CLI) commands. Describe the operation of BGP route reflection. Configure a route reflector. Describe the operation of a BGP confederation. Configure confederations. Describe peering relationships in a confederation. Describe how to troubleshoot BGP. Describe how to troubleshoot routing policy. This five-day course is designed to provide students with detailed coverage of OSPF, IS-IS, BGP, and routing policy. Course Outline Course Introduction OSPF OSPFv2 Review Link-State Advertisements Protocol Operations OSPF Authentication OSPF Areas Review of OSPF Areas Stub Area Operation Stub Area Configuration NSSA Operation NSSA Configuration Route Summarization OSPF Case Studies and Solutions Virtual Links OSPF Multiarea Adjacencies External Reachability Troubleshooting OSPF Troubleshooting OSPF IS-IS Overview of IS-IS IS-IS PDUs Neighbors and Adjacencies Configuring and Monitoring IS-IS Advanced IS-IS Operations and Configuration Options IS-IS Operations IS-IS Configuration Options IS-IS Routing Policy Multilevel IS-IS Networks Level 1 and Level 2 Operations Multilevel Configuration Troubleshooting IS-IS Troubleshooting IS-IS BGP Review of BGP BGP Operations BGP Path Selection Options Configuration Options BGP Attributes and Policy?Part 1 BGP Policy Next Hop Origin and MED AS Path BGP Attributes and Policy?Part 2 Local Preference Communities Route Reflection and Confederations Route Reflection Operation Configuration and Routing Knowledge BGP Confederations BGP Route Damping Route Flap and Damping Overview Route Damping Parameters Configuring and Monitoring Route Damping Troubleshooting BGP Troubleshooting BGP Troubleshooting Policy Troubleshooting Policy
Duration 4 Days 24 CPD hours This course is intended for This course is designed for network and software engineers and hold job roles such as: Network administrator Network engineer Network manager System engineer Project manager Network designer Overview After taking this course, you should be able to: Describe mobile network architecture basics List enabling technologies for 5G and describe 5G key use cases Perform basic operations on a Cisco 5G NSA mobile packet core Describe the Cisco 5G Converged SDN Transport Architecture Describe Cisco NFVI and perform basic operations using Cisco ESC and Cisco Virtualized Infrastructure Manager (VIM) Describe Cisco service provider automation and orchestration solutions to deploy and manage 5G network functions Describe the Cisco Ultra Cloud Core architecture and deploy the Cisco SMI Explain the 5G ready distributed Telco DC with Cisco ACI solution Describe the Cisco 5G security architecture The Cisco Service Provider 5G Technologies Foundations (SPMBL100) v1.0 course introduces mobile network components, basic 5G concepts, and features of 5G technology including faster data speeds, higher device capacity, and improved user experience. You will examine the mobile packet core solutions, 5G transport architecture, and Cisco© automation and orchestration tools used in 5G networks. You will also learn about the Cisco 5G Non-standalone (NSA) and the Cisco Ultra Cloud Core 5G standalone (SA) platform solutions, the Cisco 5G converged Software-Defined Networking (SDN) transport architecture, and Cisco edge computing solutions. You will study the Cisco Network Function Virtualization (NFVI) architecture, Cisco Network Services Orchestrator (NSO), and Cisco Elastic Services Controller (ESC). You will learn how 5G is distributed with Telco Data Center (DC) with Cisco Application Centric Infrastructure (Cisco ACI©). And finally, Zero-Touch Provisioning (ZTP), Cisco Crosswork?, and the Cisco 5G security architecture will also be presented. Mobile Network Fundamentals 5G Key Use Cases Examining Mobile Network Components Enabling Technologies for 5G Introduction to 5G NR Characteristics Cloud Radio Access network (RAN) Cisco 5G NSA Solution 5G NSA Basics 5G NSA StarOS Configurations Cisco 5G Converged SDN Transport Architecture Cisco 5G Transport Ready Devices Application Awareness and Network Slicing with Segment Routing Cisco NFV Infrastructure, Cisco Virtualized Network Functions (VNFs), Cisco VIM, and Cisco ESC NFVI and SDN Architecture Overview Cisco VIM Pod Configurations Cisco Service Provider Automation and Orchestration Telemetry Basics ZTP Fundamentals Cisco Ultra Cloud Core Cisco Ultra Cloud Core Basics Kubernetes and Docker Fundamentals 5G Ready Distributed DC with Cisco ACI Cisco ACI in Telco Data Centers 5GC Deployment Mitigating Threats in 5G Introduction to 5G Cybersecurity Risks Mitigating 5G Cybersecurity Risks
Duration 5 Days 30 CPD hours This course is intended for Enterprise network engineers System engineers System administrators Network administrators Overview After taking this course, you should be able to: Configure classic Enhanced Interior Gateway Routing Protocol (EIGRP) and named EIGRP for IPv4 and IPv6 Optimize classic EIGRP and named EIGRP for IPv4 and IPv6 Troubleshoot classic EIGRP and named EIGRP for IPv4 and IPv6 Configure Open Shortest Path First (OSPF)v2 and OSPFv3 in IPv4 and IPv6 environments Optimize OSPFv2 and OSPFv3 behavior Troubleshoot OSPFv2 for IPv4 and OSPFv3 for IPv4 and IPv6 Implement route redistribution using filtering mechanisms Troubleshoot redistribution Implement path control using Policy-Based Routing (PBR) and IP service level agreement (SLA) Configure Multiprotocol-Border Gateway Protocol (MP-BGP) in IPv4 and IPv6 environments Optimize MP-BGP in IPv4 and IPv6 environments Troubleshoot MP-BGP for IPv4 and IPv6 Describe the features of Multiprotocol Label Switching (MPLS) Describe the major architectural components of an MPLS VPN Identify the routing and packet forwarding functionalities for MPLS VPNs Explain how packets are forwarded in an MPLS VPN environment Implement Cisco Internetwork Operating System (IOS) Dynamic Multipoint VPNs (DMVPNs) Implement Dynamic Host Configuration Protocol (DHCP) Describe the tools available to secure the IPV6 first hop Troubleshoot Cisco router security features Troubleshoot infrastructure security and services The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) v1.0 gives you the knowledge you need to install, configure, operate, and troubleshoot an enterprise network. This course covers advanced routing and infrastructure technologies, expanding on the topics covered in the Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 course. This course may earn a Credly Badge Course Outline Implementing EIGRP Optimizing EIGRP Troubleshooting EIGRP Implementing OSPF Optimizing OSPF Troubleshooting OSPF Implementing Internal Border Gateway Protocol (IBGP) Optimizing BGP Implementing MP-BGP Troubleshooting BGP Configuring Redistribution Troubleshooting Redistribution Implementing Path Control Exploring MPLS Introducing MPLS L3 VPN Architecture Introducing MPLS L3 VPN Routing Configuring Virtual Routing and Forwarding (VRF)-Lite Implementing DMVPN Implementing DHCP Troubleshooting DHCP Introducing IPv6 First Hop Security Securing Cisco Routers Troubleshooting Infrastructure Security and Services Lab Outline Configure EIGRP Using Classic Mode and Named Mode for IPv4 and IPv6 Verify the EIGRP Topology Table Configure EIGRP Stub Routing, Summarization, and Default Routing Configure EIGRP Load Balancing and Authentication LAB: Troubleshoot EIGRP Issues Configure OSPFv3 for IPv4 and IPv6 Verify the Link-State Database Configure OSPF Stub Areas and Summarization Configure OSPF Authentication Troubleshoot OSPF Implement Routing Protocol Redistribution Manipulate Redistribution Manipulate Redistribution Using Route Maps Troubleshoot Redistribution Issues Implement PBR Configure IBGP and External Border Gateway Protocol (EBGP) Implement BGP Path Selection Configure BGP Advanced Features Configure BGP Route Reflectors Configure MP-BGP for IPv4 and IPv6 Troubleshoot BGP Issues Implement PBR Configure Routing with VRF-Lite Implement Cisco IOS DMVPN Obtain IPv6 Addresses Dynamically Troubleshoot DHCPv4 and DHCPv6 Issues Troubleshoot IPv4 and IPv6 Access Control List (ACL) Issues Configure and Verify Control Plane Policing Configure and Verify Unicast Reverse Path Forwarding (uRPF) Troubleshoot Network Management Protocol Issues: Lab 1 Troubleshoot Network Management Protocol Issues: Lab 2
Duration 2 Days 12 CPD hours This course is intended for Data Protection OfficersData Protection ManagersAuditorsLegal Compliance OfficersSecurity ManagerInformation ManagersAnyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they?ve gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure their place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Common Principles and Approaches to Privacy This unit includes a brief discussion about the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles. Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors. Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards, and threats/ vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM). Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit focuses on the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children?s online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices. Canadian Legal Framework This unit provides an introduction to the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Private-sector Privacy Laws This unit focuses on the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Public-sector Privacy Laws This unit highlights key concepts and practices related to the collection, retention, use, disclosure and disposal of personal information by federal, provincial and territorial governments. Health Information Privacy Laws This unit touches on the applicability and purpose of health information privacy laws. Private-sector Compliance Practices This unit delves into the components that make up compliance regulations, including Generally Accepted Privacy Principals and security breach notification, and also examines compliance track records and Federal Commissioner Findings. Public-sector Compliance Practices This unit presents the various methods that can be implemented for compliance in the public sector, such as privacy impact assessments and data sharing agreements. In addition, it discusses the challenges presented by digital information exchanges, as well as non-legislative considerations. Health-sector Compliance Practices This unit covers the issues presented with digital compliance in the health sector. Additional course details: Nexus Humans Certified Information Privacy Professional (CIPP/CAN) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/CAN) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Enterprise network system installers System integrators System administrators Network administrators Solutions designers Overview After taking this course, you should be able to: Identify the various network elements of the Cisco SD-WAN solution. Deploy WAN Edge routers. Create templates to aid in the deployment and operation of the Cisco SD-WAN network. Configure and verify Cisco SD-WAN overlay routing. Create simple policies to control traffic flow through the Cisco SD-WAN fabric. The Cisco SD-WAN Operation and Deployment (SDWFND) v2.0 course provides a comprehensive overview of the Cisco© Software-Defined WAN (SD-WAN) solution and Cisco SD-WAN components such as vManage, vSmart and vBond.You will learn how to deploy, manage, and operate a secure, programmable, and scalable SD-WAN fabric using IOS XE Cisco SD-WAN products. The course also covers how to configure, operate, and monitor overlay routing across the Cisco SD-WAN network. In addition, you will learn about data and control policies, and how to deploy Quality of Service (QoS) and Direct Internet Access (DIA) in the SD-WAN overlay network.The course will allow you to earn 16 Continuing Education (CE) credits toward recertification. Course Outline Cisco SD-WAN Solution Components Cisco SD-WAN Network Deployment Cisco SD-WAN Configuration Management Cisco SD-WAN Overlay Routing Cisco SD-WAN Policies
Duration 3 Days 18 CPD hours This course is intended for Typical candidates for this course are IT Professionals who deploy small-to-medium scale enterprise network solutions based on Aruba products and technologies. Overview After you successfully complete this course, expect to be able to: Explain how Aruba's wireless networking solutions meet customers' requirements Explain fundamental WLAN technologies, RF concepts, and 802.11 Standards Learn to configure the Mobility Conductor and Mobility Controller to control access to the Employee and Guest WLAN Control secure access to the WLAN using Aruba Firewall Policies and Roles Recognize and explain Radio Frequency Bands and channels, and the standards used to regulate them Describe the concept of radio frequency coverage and interference and successful implementation and diagnosis of WLAN systems Identify and differentiate antenna technology options to ensure optimal coverage in various deployment scenarios Describe RF power technology including, signal strength, how it is measured and why it is critical in designing wireless networks Learn to configure and optimize Aruba ARM and Client Match and Client Insight features Learn how to perform network monitoring functions and troubleshooting This course teaches the knowledge, skills and practical experience required to set up and configure a basic Aruba WLAN utilizing the AOS 8.X architecture and features. Using lecture and labs, this course provides the technical understanding and hands-on experience of configuring a single Mobility Conductor with one controller and AP Aruba WLAN. Participants will learn how to use Aruba hardware and AOS8 to install and build a complete, secure controller network with multiple SSIDs. WLAN Fundamentals Describes the fundamentals of 802.11, RF frequencies and channels Explain RF Patterns and coverage including SNR Roaming Standards and QOS requirements Mobile First Architecture An introduction to Aruba Products including controller types and modes OS 8.X Architecture and features License types and distribution Mobility Conductor Mobility Controller Configuration Understanding Groups and Subgroups Different methods to join Mobility Controller with Mobility Conductor Understanding Hierarchical Configuration Secure WLAN configuration Identifying WLAN requirements such as SSID name, encryption, authentication Explain AP groups structure and profiles Configuration of WLAN using the Mobility Conductor GUI AP Provisioning Describes the communication between AP and Mobility controller Explain the AP booting sequence and requirements Explores the APs controller discovery mechanisms Explains how to secure AP to controller communication using CPSec Describes AP provisioning and operations WLAN Security Describes the 802.11 discovery, authentication and association Explores the various authentication methods, 802.1x with WPA/WPA2, Mac auth Describes the authentication server communication Explains symmetric vs asymmetric Keys, encryption methods WIPS is described along with rogue discovery and protection Firewall Roles and Policies An introduction into Firewall Roles and policies Explains Aruba?s Identity based Firewall Configuration of Policies and Rules including aliases Explains how to assign Roles to users Dynamic RF Management Explain how ARM calibrates the network selecting channels and power settings Explores OS 8.X Airmatch to calibrate the network How Client Match and Client Insight match steers clients to better APs Guest Access Introduces Aruba?s solutions for Guest Access and the Captive portal process Configuration of secure guest access using the internal Captive portal The configuration of Captive portal using Clearpass and its benefits Creating a guest provisioning account Troubleshooting guest access Network Monitoring and Troubleshooting Using the Mobility Conductor dashboard to monitor and diagnose client, WLAN and AP issues Traffic analysis using APPrf with filtering capabilities A view of AirWave's capabilities for monitoring and diagnosing client, WLAN and AP issues
Duration 5 Days 30 CPD hours This course is intended for For those seeing to prepare for CCIE Enterprise Infrastructure certification Overview This course will help prepare for CCIE Enterprise Infrastructure certification The new CCIE Enterprise Infrastructure certification program prepares you for today?s expert-level job roles in enterprise infrastructure technologies. CCIE Enterprise Infrastructure now includes automation and programmability to help you scale your enterprise infrastructure. VTP VTP and different versions Pruning EtherChannel LACP Layer 2 and Layer 3 Spanning Protocol 1d, 802.1w, and 802.1s SPAN, RSPAN, and ERSPAN DMVPN All Phases Redundancy: Two Clouds One Hub Two Hubs one Cloud Two hubs two Clouds Running Routing Protocols DMVPN over MPLS EIGRP RD, CD, S, FC, FS, and FD Configuration, and hidden debugging Authentications: MD5, and SHA, Summarization Load Balancing:Equal Cost, Unequal Cost, Add-Path, Filtering, Default Route Injection Optimization: Query Propagation Boundary, IP FRR, STUB routing (All Options) Metric: Classic, Wide Metric Route Tags: Decimal and Dotted-Decimal Notations, OTP OSPFv2 Overview and special cases GRE or Virtual-Links LSAs, FA, and RFCs (1583, 1587, 2328, 3101, 5185 and many more) Best Path Selection Network Types Area Types Optimization: GTSM, LFA, Default Route Injection Authentication: RFC 2328, RFC 5709, Summarization, Filtering BGP States Establishing a Peer Session: Regular method,Peer-Groups,Templates,Best Path Selection Attributes: Weight, AS-Path, Origin, Next-Hop, Local-Preference, Atomic-Aggregate Communities, Aggregator, and MED Load Balancing: Equal Cost,Unequal Cost,Conditional Advertisement,Out/In Bound Route Filtering and the order,ORF,Multihoming Scenarios AS-Path Manipulation: Regexp,Local-as,Allow-as,Remove-Private-as Convergence and Scalability: Route Reflectors,Confederation,Aggregation (All Options) Other BGP Features: MultiPath,Add-Path,Route-Refresh,Soft Reconfiguration IPv6 Acquiring an IPv6 Address: IPv6 General Prefix SLAAC DHCPv6 Rapid-Commit Relay Prefix Delegation IPv6 and DMVPN EIGRPv6 OSPFv3: Both flavors, LSAs, RFCs BGP for IPv6: IPv6 transport, and IPv4 route exchange Transitional Solutions: NAT-PT,6VPE,Multicast,MLD,Static RP,BSR,Embedded RP,IPv6 Traffic Filters,RA Guard,ND Inspection MPLS LDP, VRFs, RD, and RT L3VPNs Route Leaking PE to CE Routing Security Control Plane Policing VACLs Storm Control DHCP Snooping IP Source Guard DAI Private VLANs Port Security Access-lists uRPF Device Tracking IPsec Identity Use Case For FlexVPN: Site-to-Site, IKEv1, and IKEv2 Using Preshared Keys 1x Port Base Authentication : Device Roles,Port States,Authentication Process,Host Modes Network Services FHRP: HSRP, VRRP, and GLBP NAT: Static NAT, and PAT,Dynamic NAT,Policy-Base NAT,VRF-Aware NAT,VASI NAT Software Defined Infrastructure Cisco SD Access: Design a Cisco SD Access solution Underlay network (IS-IS, manual/PnP) Overlay fabric design (LISP, VXLAN, Cisco TrustSec) Fabric domains (single-site and multi-site using SD-WAN transit) Cisco SD Access deployment: Cisco DNA Center device discovery and device management Add fabric node devices to an existing fabric Host onboarding (wired endpoints only) Fabric border handoff Segmentation Macro-level segmentation using VNs Micro-level segmentation using SGTs (using Cisco ISE) Assurance Network and client health (360) Monitoring and troubleshooting Cisco SD-WAN: Design a Cisco SD-WAN solution Orchestration plane (vBond, NAT) Management Plane (vManage) Control Plane (vSmart, OMP) Data Plane (vEdge/cEdge) WAN edge deployment Onboarding new edge routers Orchestration with zero-touch provisioning/PnP OMP TLOC Configuration templates Localized policies (only QoS) Centralized policies Application aware Routing Topologies
Duration 3 Days 18 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview After successfully completing this course, you should be able to: Describe the basic design architecture of the Junos OS. Identify and provide a brief overview of Junos devices. Navigate within the Junos CLI. Perform tasks within the CLI operational and configuration modes. Restore a Junos device to its factory-default state. Perform initial configuration tasks. Configure and monitor network interfaces. Describe user configuration and authentication options. Perform secondary configuration tasks for features and services such as system logging (syslog) and tracing, Network Time Protocol (NTP), configuration archival, and SNMP. Monitor basic operation for the Junos OS and devices. Identify and use network utilities. Upgrade the Junos OS. Perform file system maintenance and password recovery on a Junos device. Navigate within the Junos J-Web interface. Explain basic routing operations and concepts. View and describe routing and forwarding tables. Configure and monitor static routing. Configure and monitor OSPF. Describe the framework for routing policy and firewall filters. Explain the evaluation of routing policy and firewall filters. Identify instances where you might use routing policy. Write and apply a routing policy. Identify instances where you might use firewall filters. Write and apply a firewall filter. Describe the operation and configuration for unicast reverse path forwarding (RPF). This three-day course provides students with the foundational knowledge required to work with the Juniper Networks Junos operating system and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. Key topics include user interface options with a heavy focus on the command-line interface (CLI), configuration tasks typically associated with the initial setup of devices, interface configuration basics with configuration examples, secondary system configuration, and the basics of operational monitoring and maintenance of Junos devices. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Course Outline COURSE INTRODUCTION Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices User Interface Options: The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode User Interface Options: The J-Web Interface User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Routing Policy Routing Policy Overview Case Study: Routing Policy Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC Juniper Security Concepts Security Challenges Juniper Networks? Security Focus A IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration Additional course details: Nexus Humans Juniper - Introduction to the Junos Operating System (IJOS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Juniper - Introduction to the Junos Operating System (IJOS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring EX Series switches running Junos ELS. Overview After successfully completing this course, you should be able to: List the benefits of implementing switched LANs. Describe transparent bridging concepts and operations. Describe terms and design considerations for switched LANs. List enterprise platforms that support Layer 2 switching. Configure interfaces for Layer 2 switching operations. Display and interpret the Ethernet switching table. Explain the concept of a VLAN. Describe access and trunk port modes. Configure and monitor VLANs. Describe voice VLAN and native VLAN concepts. Explain inter-VLAN routing operations. Configure and monitor inter-VLAN routing. Explain when a spanning tree is required. Describe STP and Rapid Spanning Tree Protocol (RSTP) operations. List some advantages of using RSTP over STP. Configure and monitor RSTP. Describe the bridge protocol data unit (BPDU), loop, and root protection features. Configure and monitor the BPDU, loop, and root protection features. List and describe various port security features. Configure and monitor port security features. Describe the storm control feature. Configure and monitor storm control. Describe firewall filter support for EX Series Ethernet Switches. Implement and monitor the effects of a firewall filter. List and describe some features that promote high availability. Configure and monitor high availability features. Describe the basic concepts and operational details of a virtual chassis. Implement a virtual chassis with multiple EX4300 switches. Explain the concepts of Ethernet Ring Protection Switching (ERPS). Configure and monitor ERPS. Explain the concepts of Multiple Spanning Tree Protocol (MSTP). Configure and monitor MSTP. This 4-day program includes an overview of protocol independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, switching concepts and operations, virtual LANs (VLANs), the Spanning Tree Protocol (STP), and more. Chapter 1: Course Introduction Course Introduction Chapter 2: Layer 2 Switching Ethernet Bridging Basics Terminology and Design Considerations Overview of Enterprise Switching Platforms Enabling and Monitoring Layer 2 Switching Operations Lab 1: Implementing Layer 2 Switching Chapter 3: Virtual Networks Overview of VLANs Configuring and Monitoring VLANs Voice VLAN Native VLAN Routed VLAN Interfaces Lab 2: Implementing Virtual Networks Chapter 4: Routing Instances Routing Instances Overview Configuring and Monitoring Virtual Switches Chapter 5: Spanning Tree Spanning Tree Protocol Rapid Spanning Tree Protocol Configuring and Monitoring STP and RSTP Protection Features: BPDU Protection Protection Features: Loop Protection Protection Features: Root Protection Lab 3: Implementing Spanning Tree Chapter 6: Port Security MAC Limiting Persistent MAC Learning DHCP Snooping Dynamic ARP Inspection (DAI) IP Source Guard Lab 4: Implementing Port Security Chapter 7: Device Security and Firewall Filters Storm Control Firewall Filters Lab 5: Implementing Storm Control and Firewall Filters Chapter 8: Virtual Chassis Overview of Virtual Chassis Configuring and Monitoring a Virtual Chassis Lab 6: Implementing a Virtual Chassis System Chapter 9: High Availability Features Overview of High Availability Networks Link Aggregation Groups Redundant Trunk Groups Graceful Routing Engine Switchover (GRES) Nonstop Active Routing (NSR) Nonstop Bridging (NSB) Lab 7: Implementing High Availability Features
Duration 2 Days 12 CPD hours This course is intended for This program is designed for students who have attended successfully the IJOS and JRE courses (prior to April 1, 2017) or the IJOS course (since April 3, 2017) and are working toward JNCIA-JUNOS certification. Overview The objectives for this course follow the requirements for the current JNCIA-JUNOS. At the end of this course, the successful student will be able to: Identify the concepts and functionality of various fundamental elements of networking Identify the concepts, benefits and functionality of the core elements of the Junos OS Identify the concepts, operation and functionality of the Junos user interfaces Identify the main elements for configuring Junos devices Describe how to configure basic components of a Junos device Identify methods of monitoring and maintaining Junos devices Describe monitoring and maintenance procedures for a Junos device Identify basic routing concepts and functionality for Junos devices Describe how to configure and monitor basic routing elements for a Junos device Identify the concepts and functionality of routing policy and firewall filters on Junos devices Describe how to configure and monitor routing policies and firewall filters on a Junos device Apply knowledge of Junos operating system configuration, operations, and functionality to real-world scenarios This intense, two-day program is designed to prepare attendees who have previously taken the Introduction to the Junos Operating System (IJOS) course for taking the certification exam while simultaneously gaining insight into real-world applications Session 1: Practice Labs Guided practice labs to reintroduce the lab environment Session 2: Real-World Scenario Labs Labs that emulate real-world application of JNCIA-level knowledge, configurations, operations, and functionality. These labs will challenge students to complete scenario-based problems to accomplish specific network goals. Session 3: Networking Fundamentals Collision domains and broadcast domains Function of routers and switches Optical network fundamentals ? SONET/SDH, OTN Ethernet networks Layer 2 addressing, including address resolution IPv4 and IPv6 fundamentals Layer 3 / IP addressing, including subnet masks Subnetting and supernetting Decimal to binary conversion Longest match routing Connection-oriented vs. connectionless protocols Session 4: Junos OS Fundamentals Junos device portfolio ? product families, general functionality Software architecture Control and forwarding planes Routing Engine and Packet Forwarding Engine Protocol daemons Transit traffic processing Exception traffic Session 5: User Interfaces CLI functionality CLI modes CLI navigation CLI Help Filtering output Active vs. candidate configuration Reverting to previous configurations Modifying, managing, and saving configuration files Viewing, comparing, and loading configuration files J-Web ? core/common functionality Session 6: Junos Configuration Basics Initial configuration User accounts Login classes User authentication methods Interface types and properties Configuration groups Additional initial configuration elements ? NTP, SNMP, syslog, etc. Configuration archival Logging and tracing Rescue configuration Session 7: Operational Monitoring and Maintenance Show commands Monitor commands Interface statistics and errors Network tools ? ping, traceroute, telnet, SSH, etc. Real-time performance monitoring (RPM) Junos OS installation Software upgrades Powering on and shutting down Junos devices Root password recovery Session 8: Routing Fundamentals Packet forwarding concepts Routing tables Routing vs. forwarding tables Route preference Routing instances Static routing Advantages of / use cases for dynamic routing protocols Session 9: Routing Policy and Firewall Filters Default routing policies Import and export policies Routing policy flow Effect of policies on routes and routing tables Policy structure and terms Policy match criteria, match types, and actions Firewall filter concepts Firewall filter concepts Filter match criteria and actions Effect of filters on packets Unicast reverse-path-forwarding (RPF) Session 10: JNCIA-JUNOS Certification Exam The exam voucher is included in the price of the course DWWTC is a certified PearsonVUE Testing Center' Additional course details: Nexus Humans JNCIA Practicum and Exam Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JNCIA Practicum and Exam Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.