This three-day course provides students with the foundational knowledge required to work with the Junos operating system and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software.
Key topics include user interface options with a heavy focus on the command-line interface (CLI), configuration tasks typically associated with the initial setup of devices, interface configuration basics with configuration examples, secondary system configuration, and the basics of operational monitoring and maintenance of Junos devices.
The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters.
Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations.
After successfully completing this course, you should be able to:
Describe the basic design architecture of the Junos OS.
Identify and provide a brief overview of Junos devices.
Navigate within the Junos CLI.
Perform tasks within the CLI operational and configuration modes.
Restore a Junos device to its factory-default state.
Perform initial configuration tasks.
Configure and monitor network interfaces.
Describe user configuration and authentication options.
Perform secondary configuration tasks for features and services such as system logging (syslog) and tracing, Network Time Protocol (NTP), configuration archival, and SNMP.
Monitor basic operation for the Junos OS and devices.
Identify and use network utilities.
Upgrade the Junos OS.
Perform file system maintenance and password recovery on a Junos device.
Navigate within the Junos J-Web interface.
Explain basic routing operations and concepts.
View and describe routing and forwarding tables.
Configure and monitor static routing.
Configure and monitor OSPF.
Describe the framework for routing policy and firewall filters.
Explain the evaluation of routing policy and firewall filters.
Identify instances where you might use routing policy.
Write and apply a routing policy.
Identify instances where you might use firewall filters.
Write and apply a firewall filter.
Describe the operation and configuration for unicast reverse path forwarding (RPF).
Follow recommended procedure to open a JTAC support case.
Access support resources.
Use the customer support Website.
Access and use customer support tools.
Use FTP to transfer large files to JTAC.
Identify high-level security challenges in todays networks.
Explain the value of implementing security solutions.
Identify key factors in Juniper Networks security focus.
Describe some differences between IPv4 and IPv6.
List IPv6 address types and describe the IPv6 addressing format.
Enable an interface for IPv6 operation.
Configure and monitor routing for IPv6 environments.
Tunnel IPv6 traffic over and IPv4 network.
Who Can Benefit
This course benefits individuals responsible for configuring and monitoring devices running the Junos OS.
Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/IP protocol suite.
Classes begin promptly at 9:00 am, and typically end at 5:00 pm.
Does the course schedule include a Lunchbreak?
Lunch is normally an hour long and begins at noon. Coffee, tea, hot chocolate and juice are available all day in the kitchen. Fruit, muffins and bagels are served each morning. There are numerous restaurants near each of our centers, and some popular ones are indicated on the Area Map in the Student Welcome Handbooks - these can be picked up in the lobby or requested from one of our ExitCertified staff.
How can someone reach me during class?
If someone should need to contact you while you are in class, please have them call the center telephone number and leave a message with the receptionist.
What languages are used to deliver training?
Most courses are conducted in English, unless otherwise specified. Some courses will have the word "FRENCH" marked in red beside the scheduled date(s) indicating the language of instruction.
What does GTR stand for?
GTR stands for Guaranteed to Run; if you see a course with this status, it means this event is confirmed to run. View our GTR page to see our full list of Guaranteed to Run courses.
Yes, we provide training for groups, individuals and private on sites. View our group training page for more information.
Does ExitCertified deliver group training?
Yes, we provide training for groups, individuals, and private on sites. View our group training page for more information.
What does vendor-authorized training mean?
As a vendor-authorized training partner, we offer a curriculum that our partners have vetted. We use the same course materials and facilitate the same labs as our vendor-delivered training. These courses are considered the gold standard and, as such, are priced accordingly.
Is the training too basic, or will you go deep into technology?
It depends on your requirements, your role in your company, and your depth of knowledge. The good news about many of our learning paths, you can start from the fundamentals to highly specialized training.
How up-to-date are your courses and support materials?
We continuously work with our vendors to evaluate and refresh course material to reflect the latest training courses and best practices.
Are your instructors seasoned trainers who have deep knowledge of the training topic?
ExitCertified instructors have an average of 27 years of practical IT experience. They have also served as consultants for an average of 15 years. To stay up to date, instructors will at least spend 25 percent of their time learning new emerging technologies and courses.
Do you provide hands-on training and exercises in an actual lab environment?
Lab access is dependent on the vendor and the type of training you sign up for. However, many of our top vendors will provide lab access to students to test and practice. The course description will specify lab access.
Will you customize the training for our company’s specific needs and goals?
We will work with you to identify training needs and areas of growth. We offer a variety of training methods, such as private group training, on-site of your choice, and virtually. We provide courses and certifications that are aligned with your business goals.
How do I get started with certification?
Getting started on a certification pathway depends on your goals and the vendor you choose to get certified in. Many vendors offer entry-level IT certification to advanced IT certification that can boost your career. To get access to certification vouchers and discounts, please contact email@example.com.
Will I get access to content after I complete a course?
You will get access to the PDF of course books and guides, but access to the recording and slides will depend on the vendor and type of training you receive.
The class was very vast paced however the teacher was very good at checking in on us while giving us time to complete the labs.
Very interactive and in-depth course that really got me ready for the industry
had a good time with the course, however some topics were left out due to the compact amount of time for training.
Instructor was great, course was mostly very good except for too much focus on pricing
I registered a day before class and am happy that I received all the materials and links in time for the class. Thanks.