Advanced Junos Enterprise Switching (AJEX) Training in Sweden

  • Learn via: Classroom
  • Duration: 2 Days
  • Level: Intermediate
  • Price: From €1,943+VAT
We can host this training at your preferred location. Contact us!

This two-day course provides detailed coverage of virtual LAN (VLAN) operations, Multiple Spanning Tree Protocol (MSTP) and VLAN Spanning Tree Protocol (VSTP), authentication and access control for Layer 2 networks, IP telephony features, class of service (CoS), and monitoring and troubleshooting tools and features supported on the EX Series Ethernet Switches.

Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos operating system and in monitoring device and protocol operations. This course uses Juniper Networks EX Series Ethernet Switches for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos operating system. This course is based on the Junos OS Release 12.2R1.8.

Participants

This course benefits individuals responsible for configuring and monitoring EX Series switches.

AJEX is an advanced-level course.

Prerequisites

Students should have an intermediate-level of networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/IP protocol suite. Students should also attend the Introduction to the Junos Operating System (IJOS) course, the Junos Routing Essentials (JRE) course, and the Junos Enterprise Switching (JEX) course prior to attending this class.

After successfully completing this course, you should be able to:

  • Implement filter-based VLAN assignments.
  • Restrict traffic flow within a VLAN.
  • Manage dynamic VLAN registration.
  • Tunnel Layer 2 traffic through Ethernet networks.
  • Implement multiple spanning-tree instances in a network.
  • Implement one or more spanning-tree instances for a VLAN.
  • List the benefits of implementing end-user authentication.
  • Explain the operations of various access control features.
  • Configure and monitor various access control features.
  • Describe processing considerations when multiple authentication and access control features are enabled.
  • Describe some common IP telephony deployment scenarios.
  • Describe features that facilitate IP telephony deployments.
  • Configure and monitor features used in IP telephony deployments.
  • Explain the purpose and basic operations of CoS.
  • Describe CoS features used in Layer 2 networks.
  • Configure and monitor CoS in a Layer 2 network .
  • Describe a basic troubleshooting method.
  • List common issues that disrupt network operations.
  • Identify tools used in network troubleshooting.
  • Use available tools to resolve network issues.

Day 1

Chapter 1: Course Introduction

Chapter 2: Advanced Ethernet Switching

  • Virtual Local Area Networks
  • Automating VLAN Administration
  • Tunneling Layer 2 Traffic
  • Lab 1: Advanced Ethernet Switching

Chapter 3: Advanced Spanning Tree

  • Spanning Tree Review
  • MSTP
  • VSTP
  • Lab 2: Advanced Spanning Tree

Chapter 4: Authentication and Access Control

  • · Authentication Overview
  • · Access Control Features
  • · Overview of Authentication Processing
  • · Lab 3: Authentication and Access Control

Day 2

Chapter 5: Deploying IP Telephony Features

  • · Deployment Scenarios
  • · IP Telephony Features
  • · Case Study: Deploying IP Telephony Features
  • · Lab 4: Deploying IP Telephony Features

Chapter 6: Class of Service

  • Class of Service Review
  • Processing and Feature Overview
  • Case Study: Implementing Class of Service
  • Lab 5: Class of Service

Chapter 7: Monitoring and Troubleshooting Layer 2 Networks

  • Introduction to Monitoring and Troubleshooting
  • Monitoring and Troubleshooting Tools
  • Case Studies
  • Lab 6: Monitoring and Troubleshooting


Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our Sweden facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

Classroom / Virtual Classroom
06 borgemánnu 2024
Stockholm, Malmö, Göteborg
2 Days
Classroom / Virtual Classroom
11 borgemánnu 2024
Stockholm, Malmö, Göteborg
2 Days
Classroom / Virtual Classroom
16 borgemánnu 2024
Stockholm, Malmö, Göteborg
2 Days
Classroom / Virtual Classroom
09 čakčamánnu 2024
Stockholm, Malmö, Göteborg
2 Days
Classroom / Virtual Classroom
16 čakčamánnu 2024
Stockholm, Malmö, Göteborg
€1,943 +VAT Book Now
Classroom / Virtual Classroom
20 čakčamánnu 2024
Stockholm, Malmö, Göteborg
2 Days
Classroom / Virtual Classroom
02 golggotmánnu 2024
Stockholm, Malmö, Göteborg
2 Days
Classroom / Virtual Classroom
18 golggotmánnu 2024
Stockholm, Malmö, Göteborg
2 Days
Advanced Junos Enterprise Switching (AJEX) Training Course in Sweden

Sweden is a Nordic country that borders Norway, Finland and Denmark. The name "Sweden" originated from the "Svear", a people mentioned by the Roman author Tacitus. While being the largest Nordic country, Sweden is the fifth-largest country in Europe. Sweden has a total population of 10.4 million. The capital and largest city is Stockholm. About 15 percent of the country lies within the Arctic Circle, so that's why from May until mid-July, sunlight lasts all day in the north of the Arctic Circle. On the other hand, during December, the capital citt experiences only about 5.5 hours of daylight.

When in Sweden, visiting Stockholm's Old Town Gamla Stan, Sweden's most popular museum Vasa Museum and a UNESCO World Heritage Site; Drottningholm Palace is highly recommended.

Empower yourself with our extensive selection of IT courses, covering programming, data analytics, software development, business skills, cloud computing, cybersecurity, project management. Experience personalized training and expert guidance from our instructors, who will come to your chosen training venue anywhere in Sweden.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.