• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

32 Juniper courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Juniper JNCIA-Junos JN0-104 with Ben Jacobson

By Packt

This course prepares you for the JN0-104 exam and gives you an introduction to Junos OS and the functionality of Juniper devices. You will not only master the basics but also learn how to configure routing policies and maintain networking devices with the help of interesting activities.

Juniper JNCIA-Junos JN0-104 with Ben Jacobson
Delivered Online On Demand
£41.99

IJSEC - Introduction to Juniper Security

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview Identify high-level security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain the SRX Series devices and the added capabilities that next-generation firewalls provide. Explain traffic flows through the SRX Series devices. List the different security objects and how to create them. Describe interface types and perform basic interface configuration tasks. Describe the initial configuration for an SRX Series device. Explain security zones. Describe screens and their use. Explain address objects. Describe services and their use. Describe the purpose for security policies on an SRX Series device. Describe zone-based policies. Describe global policies and their use. Explain unified security policies. Configure unified security policies with the J-Web user interface. Describe IDP signatures. Configure an IDP policy using predefined templates with the J-Web user interface. Describe the use and configuration of the integrated user firewall feature. Describe the UTM security services List the available UTM services on the SRX Series device. Configure UTM filtering on a security policy with the J-Web user interface. Explain Sky ATP's use in security. Describe how Sky ATP and SRX Series devices operate together in blocking threats. Describe NAT and why it is used. Explain source NAT and when to use it. Explain destination NAT and when to use it. Explain static NAT and its uses. Describe the operation and configuration the different types of NAT. Identify various types of VPNs. Describe IPsec VPNs and their functionality. Describe how IPsec VPNs are established. Describe IPsec traffic processing. Configure IPsec VPNs with the J-Web user interface. Describe and configure proxy IDs and traffic selectors with the J-Web user interface. Monitor IPsec VPNs with the J-Web user interface. Describe the J-Web monitoring features. Explain the J-Web reporting features. Describe the Sky Enterprise service and how it can save resources. Explain the functionality of Junos Space Security Director. This course is designed to provide students with the foundational knowledge required to work with SRX Series devices. This course will use the J-Web user interface to introduce students to the Junos operating system. MODULE 1: COURSE INTRODUCTION * COURSE INTRODUCTION MODULE 2: JUNIPER SECURITY CONCEPT * Security Challenges * Security Design Overview * Juniper Connected Security MODULE 3: JUNIPER CONNECTED SECURITY ? SRX SERIES DEVICES * Connected Security * Interfaces * Initial Configuration * LAB 1: Initial Configuration MODULE 4: SECURITY OBJECTS * Security Zone Objects * Security Screen Objects * Security Address Objects * Security Services Objects * LAB 2: Creating Security Objects with J-Web MODULE 5: SECURITY POLICIES * Security Policy Overview * Zone-Based Policies * Global Security Policies * Application Firewall with Unified Security Policies * LAB 3: Creating Security Policies with J-Web MODULE 6: SECURITY SERVICES ? IDP AND USER FIREWALL * IDP Security Services * Integrated User Firewall * LAB 4: Adding IDP and User Firewall Security Services to Security Policies MODULE 7: SECURITY SERVICES ? UTM * Content Filtering * Web Filtering * Antivirus * Antispam * LAB 5: Adding UTM Security Services to Security Policies MODULE 8: JUNIPER CONNECTED SECURITY ? SKY AT * Sky ATP Overview * Blocking Threats * Lab 6: Demonstrating Sky ATP MODULE 9: NETWORK ADDRESS TRANSLATION * NAT Overview * Source NAT * Destination NAT * Static NAT * Lab 7: Implementing Network Address Translation MODULE 10: IPSEC VPN CONCEPTS * VPN Types * Secure VPN Requirements * IPsec Tunnel Establishment * IPsec Traffic Processing MODULE 11: SITE-TO-SITE VPNS * IPsec Configuration * IPsec Site-to-Site Tunne * Lab 8: Implementing Site-to-Site IPsec VPNs MODULE 12: MONITORING AND REPORTING * J-Web monitoring options * J-Web Reporting options * Lab 9: Using Monitoring and Reporting * Appendix A: SRX Series Hardware * Appendix D: Sky Enterprise Services * Appendix B: Virtual SRX * Appendix EJunos Space Security Director * Appendix CCLI Prime

IJSEC - Introduction to Juniper Security
Delivered on-request, onlineDelivered Online
Price on Enquiry

Configuring Juniper Networks Firewall/IPSec VPN Products

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for network engineers, support personnel, reseller support, and others responsible for implementing Juniper Networks ScreenOS firewall products. Overview After successfully completing this course, you should be able to:Explain the Juniper Networks security architecture.Configure administrative access and options.Back up and restore configuration and ScreenOS files.Configure a ScreenOS device in transparent, route, Network Address Translation (NAT), and IP version 6 (IPv6) modes.Discuss the applications of multiple virtual routers.Configure the Juniper Networks firewall to permit and deny traffic based on user defined policies.Configure advanced policy options.Identify and configure network designs for various types of network address translation.Configure policy-based and route-based VPN tunnels. This course is the first in the ScreenOS curriculum. It is a course that focuses on configuration of the ScreenOS firewall/virtual private network (VPN) products in a variety of situations, including basic administrative access, routing, firewall policies and policy options, address translation, and VPN implementations. The course combines both lecture and labs, with significant time allocated for hands-on experience. Students completing this course should be confident in their ability to configure Juniper Networks firewall/VPN products in a wide range of installations. CHAPTER 1: COURSE INTRODUCTION CHAPTER 2: SCREENOS CONCEPTS, TERMINOLOGY, AND PLATFORMS CHAPTER 3: INITIAL CONNECTIVITY * Lab 1: Initial Configuration CHAPTER 4: DEVICE MANAGEMENT * Lab 2: Device Administration CHAPTER 5: LAYER 3 OPERATIONS * Lab 3: Layer 3 Operations CHAPTER 6: BASIC POLICY CONFIGURATION * Lab 4: Basic Policy Configuration CHAPTER 7: POLICY OPTIONS * Lab 5: Policy Options CHAPTER 8: ADDRESS TRANSLATION * Lab 6: Address Translation CHAPTER 9: VPN CONCEPTS CHAPTER 10: POLICY-BASED VPNS * Lab 7: Policy-Based VPNs CHAPTER 11: ROUTE-BASED VPNS * Lab 8: Route-Based VPNs CHAPTER 12: IPV6 * Lab 9: IPv6 APPENDIX A: ADDITIONAL FEATURES APPENDIX B: TRANSPARENT MODE * Lab 10: Transparent Mode (Optional) ADDITIONAL COURSE DETAILS: Nexus Humans Configuring Juniper Networks Firewall/IPSec VPN Products training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Configuring Juniper Networks Firewall/IPSec VPN Products course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Configuring Juniper Networks Firewall/IPSec VPN Products
Delivered on-request, onlineDelivered Online
Price on Enquiry

Advanced Juniper Networks VPN Implementations

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for network engineers, network support personnel, and reseller support. Overview After successfully completing this course, you should be able to:Configure LAN-to-LAN IP Security (IPsec) VPNs in various configurations. Configure VPN redundancy. Configure dynamic routing using IPsec VPNs. Configure remote access IPsec connectivity including group Internet Key Exchange (IKE) and shared IKE. Configure generic routing encapsulation (GRE) tunnels. This intermediate-level course focuses on the wide range of options available when configuring virtual private networks (VPNs) using Juniper Networks firewall/VPN products. Students attending the course will learn these various deployments through detailed lectures and hands-on lab exercises. CHAPTER 1: COURSE INTRODUCTION CHAPTER 2: SCREENOS VPN BASICS REVIEW * VPN Review * Verifying Operations * VPN Monitor * Lab: VPN Review CHAPTER 3: VPN VARIATIONS * Dynamic Peers * Transparent Mode * Overlapping Addresses * Lab: VPN Variations CHAPTER 4: HUB-AND-SPOKE VPNS * Concepts * Policy-Based Hub-and-Spoke VPNs * Route-Based Hub-and-Spoke VPNs with No Policy and NHTB * Route-Based Hub-and_Spoke VPNS with Policy * Centralized Control Hub-and-Spoke VPNs * ACVPNs * Lab: Hub-and-Spoke VPNs CHAPTER 5: ROUTING OVER VPNS * Routing Overview * Configuring RIP * Configuring OSPF * Case Studies * Lab: Dynamic Routing CHAPTER 6: USING CERTIFICATES * Concepts and Terminology * Configuring Certificates and Certificate Support * Configuring VPNs with Certificates * Lab: Using Certificates CHAPTER 7: REDUNDANT VPN GATEWAYS (OPTIONAL) * Redundant VPN Gateways * Other Options * Demonstration: Redundant VPN Gateways CHAPTER 8: GENERIC ROUTING ENCAPSULATION (OPTIONAL) * Configuring GRE CHAPTER 9: DIAL-UP IPSEC VPNS (OPTIONAL) * Basic Dial-Up Configuration * Group IKE ID * XAUTH and Shared IKE ID ADDITIONAL COURSE DETAILS: Nexus Humans Advanced Juniper Networks VPN Implementations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced Juniper Networks VPN Implementations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Advanced Juniper Networks VPN Implementations
Delivered on-request, onlineDelivered Online
Price on Enquiry

Juniper Networks Design Fundamentals (JNDF)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is targeted for Juniper Networks system engineers, partner sales engineers (including Champions), and services partners who are interested in learning network design introductory concepts. However, the course is also applicable to a general audience of Juniper customers with a desire to learn more about network design. Overview Provide an overview of network design needs and common business requirements.Describe key product groups related to campus, WAN, data center, and security architectures.Analyze and interpret common RFP requirements.Scope a network design by gathering data and working with key stakeholders.Describe ways of processing customer data and design requests.Identify boundaries and scope for the design proposal.List some considerations when creating a design proposal.Provide an overview of network security design principles and common vulnerabilities.List high-level design considerations and best practices for securing the network.List the components of the campus network design.Describe best practices and design considerations for the campus.Describe architectural design options for the campus.List the components of the WAN.Describe best practices and design considerations for the WAN.Describe design options for the WAN.List the components of the data center design.Describe best practices and design considerations for the data center.Describe architectural design options for the data center.Define business continuity and its importance in a network design.Describe high availability design considerations and best practices.Provide an overview of high availability offerings and solutions.Describe Class of Service design considerations.Provide an overview of environmental considerations in network design.List design considerations and best practices for managing the network.Provide an overview of Juniper Networks and third party options for network management.List design considerations and best practices for network automation.Provide an overview of automation tools.Explain the foundational topics that have been taught throughout the course.Create a network design proposal that satisfies customer requirements and business needs.Provide an overview of the steps involved in migrating a network.Describe best practices used in network migration.List the various campus network topographies.Describe sample design options for the campus. This three-day course is designed to cover best practices, theory, and design principles for overall network design and will serve as the prerequisite course for other design subject areas ƒ?? data center, security, and WAN. COURSE INTRODUCTION NETWORK DESIGN FUNDAMENTALS * A Need for Design * Knowledge is King * A Proposed Design Methodology * A Reference Network UNDERSTANDING CUSTOMER REQUIREMENTS * RFP Requirements * Scoping the Design Project * Analyzing the Data * Lab: Understanding Customer Requirements ORGANIZING THE DATA * Processing the Data and Requests * Understanding Boundaries and Scope * Design Proposal Considerations SECURING THE NETWORK * Why Secure the Network? * Security Design Considerations CREATING THE DESIGN CAMPUS * The Campus Network: An Overview * Best Practices and Considerations * Architectural Design Options * Lab: Creating the Design Campus CREATING THE DESIGN WIDE AREA NETWORK * The WAN: An Overview * Best Practices and Considerations * WAN Design Examples * Lab: Creating the Design WAN CREATING THE DESIGN DATA CENTER * The Data Center: An Overview * Best Practices and Considerations * Data Center Design Examples * Lab: Creating the Design Data Center BUSINESS CONTINUITY & NETWORK ENHANCEMENTS * Business Continuity Planning * High Availability Design Considerations and Best Practices * Offerings and Solutions * CoS and Traffic Engineering Considerations * Environmental Design NETWORK MANAGEMENT * Designing for Network Management AUTOMATION * Designing for Network Automation * Lab: Enhancing the Design PUTTING NETWORK DESIGN INTO PRACTICE * Network Design Recap * Responding to the RFP * Final Lab Introduction * Lab: Putting Network Design into Practice

Juniper Networks Design Fundamentals (JNDF)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Juniper - Introduction to the Junos Operating System (IJOS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview After successfully completing this course, you should be able to: Describe the basic design architecture of the Junos OS. Identify and provide a brief overview of Junos devices. Navigate within the Junos CLI. Perform tasks within the CLI operational and configuration modes. Restore a Junos device to its factory-default state. Perform initial configuration tasks. Configure and monitor network interfaces. Describe user configuration and authentication options. Perform secondary configuration tasks for features and services such as system logging (syslog) and tracing, Network Time Protocol (NTP), configuration archival, and SNMP. Monitor basic operation for the Junos OS and devices. Identify and use network utilities. Upgrade the Junos OS. Perform file system maintenance and password recovery on a Junos device. Navigate within the Junos J-Web interface. Explain basic routing operations and concepts. View and describe routing and forwarding tables. Configure and monitor static routing. Configure and monitor OSPF. Describe the framework for routing policy and firewall filters. Explain the evaluation of routing policy and firewall filters. Identify instances where you might use routing policy. Write and apply a routing policy. Identify instances where you might use firewall filters. Write and apply a firewall filter. Describe the operation and configuration for unicast reverse path forwarding (RPF). This three-day course provides students with the foundational knowledge required to work with the Juniper Networks Junos operating system and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. Key topics include user interface options with a heavy focus on the command-line interface (CLI), configuration tasks typically associated with the initial setup of devices, interface configuration basics with configuration examples, secondary system configuration, and the basics of operational monitoring and maintenance of Junos devices. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. COURSE OUTLINE * COURSE INTRODUCTION JUNOS OPERATING SYSTEM FUNDAMENTALS * The Junos OS * Traffic Processing * Overview of Junos Devices USER INTERFACE OPTIONS: THE JUNOS CLI * User Interface Options * The Junos CLI: CLI Basics * The Junos CLI: Operational Mode * The Junos CLI: Configuration Mode USER INTERFACE OPTIONS: THE J-WEB INTERFACE * User Interface Options * The Junos CLI: CLI Basics * The Junos CLI: Operational Mode * The Junos CLI: Configuration Mode INITIAL CONFIGURATION * Factory-Default Configuration * Initial Configuration * Interface Configuration SECONDARY SYSTEM CONFIGURATION * User Configuration and Authentication * System Logging and Tracing * Network Time Protocol * Archiving Configurations * SNMP OPERATIONAL MONITORING AND MAINTENANCE * Monitoring Platform and Interface Operation * Network Utilities * Maintaining the Junos OS * Password Recovery * System Clean-Up INTERFACE CONFIGURATION EXAMPLES * Review of the Interface Configuration Hierarchy * Interface Configuration Examples * Using Configuration Groups ROUTING FUNDAMENTALS * Routing Concepts: Overview of Routing * Routing Concepts: The Routing Table * Routing Concepts: Routing Instances * Static Routing * Dynamic Routing ROUTING POLICY * Routing Policy Overview * Case Study: Routing Policy FIREWALL FILTERS * Firewall Filters Overview * Case Study: Firewall Filters * Unicast Reverse-Path-Forwarding Checks CLASS OF SERVICE * CoS Overview * Traffic Classification * Traffic Queueing * Traffic Scheduling * Case Study: CoS JTAC PROCEDURES * Opening a Support Case * Customer Support Tools * Transferring Files to JTAC JUNIPER SECURITY CONCEPTS * Security Challenges * Juniper Networks? Security Focus * A IPv6 Fundamentals * IPv6 Addressing * Protocols and Services * Configuration ADDITIONAL COURSE DETAILS: Nexus Humans Juniper - Introduction to the Junos Operating System (IJOS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Juniper - Introduction to the Junos Operating System (IJOS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Juniper - Introduction to the Junos Operating System (IJOS)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Attack Prevention with Juniper Networks Firewalls

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for network engineers, support personnel, reseller support, and others responsible for implementing ScreenOS products. Overview After successfully completing this course, you should be able to: Configure attack prevention features, including: ?SCREEN options; Deep Inspection (DI); and Antivirus (AV) scanning. Configure URL filtering. Configure antispam filters. This course meets the business needs of customers who are deploying the attack prevention features of ScreenOS software. The course focuses specifically on the attack-related features and assumes familiarity with ScreenOS software. Upon completing this course, you should be able to return to work and successfully configure and verify the desired attack prevention features. CHAPTER 1: COURSE INTRODUCTION CHAPTER 2: SCREENOS BASICS REVIEW * Concepts Review * Configuration Review * Lab: ScreenOS Basics Review CHAPTER 3: SCREEN OPTIONS * Multilayer Network Protection * Types of Attacks * SCREEN Options Configuration * SCREEN Best Practices * Lab: SCREEN Options Configuration CHAPTER 4: DEEP INSPECTION * Deep Inspection Overview * Attack Database Configuration * Policy Configuration * Logging and Monitoring * Lab: Deep Inspection Configuration CHAPTER 5: ANTIVIRUS * Antivirus Operations * Antivirus Configuration?Kaspersky * Antivirus Configuration?ICAP * Verifying Operations * Lab: Antivirus Configuration CHAPTER 6: WEB FILTERING * Web-Filtering Options * Web-Filtering Configuration * Verifying Operations * Lab: Configuring Web Filtering CHAPTER 7: ANTISPAM * Antispam Concepts * Antispam Configuration * Verifying Operations * Lab: Antispam Configuration ADDITIONAL COURSE DETAILS: Nexus Humans Attack Prevention with Juniper Networks Firewalls training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Attack Prevention with Juniper Networks Firewalls course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Attack Prevention with Juniper Networks Firewalls
Delivered on-request, onlineDelivered Online
Price on Enquiry

Network automation for engineers

5.0(3)

By Systems & Network Training

NETWORK AUTOMATION COURSE DESCRIPTION This course is not a soft skills course covering the concepts of DevOps but instead concentrates on the technical side of tools and languages for network DevOps. Particular technologies focussed on are ansible, git and Python enabling delegates to leave the course ready to starting automating their network. Hands on sessions follow all major sections. More detailed courses on individual aspects of this course are available. WHAT WILL YOU LEARN * Evaluate network automation tools. * Automate tasks with ansible. * Use git for version control. * Use Python to manage network devices. * Use Python libraries for network devices. NETWORK AUTOMATION COURSE DETAILS * Who will benefit: Network engineers. * Prerequisites: TCP/IP foundation for engineers. * Duration 5 days NETWORK AUTOMATION COURSE CONTENTS * What is DevOps Programming and automating networks, networks and clouds, AWS, OpenStack, SDN, DevOps for network operations. * Initial configuration Configuring SSH, ZTP, POAP. Hands on Initial lab configuration. * Getting started with ansible The language, the engine, the framework. Uses of ansible, orchestration. The architecture, Controlling machines, nodes, Agentless, SSH, modules. Configuration management, inventories, playbooks, modules, roles. Hands on Installing ansible, running ad hoc commands. * Ansible playbooks ansible-playbook, YAML, plays, tasks, handlers, modules. Playbook variables. Register module, debug module. Hands on Running playbooks. * Ansible Inventories /etc/ansible/hosts, hosts, groups, static inventories, dynamic inventories. Inventory variables, external variables. Limiting hosts. Hands on Static inventories, variables in inventory files. * Ansible modules for networking Built in modules, custom modules, return values. Core modules for network operations. Cisco and/ or Juniper modules. ansible_connection. Ansible 2.6 CLI. Hands on Using modules. * Ansible templating and roles Configuration management, full configurations, partial configurations. The template module, the assemble module, connection: local, Jinja2 templates, variables, if, for, roles. Hands on Generating multiple configurations from a template. * Network programming and modules Why use Python? Why use ansible? alternatives, ansible tower, Linux network devices. * Programming with Python Scripting versus application development, Python interactive mode, Python scripts, Python 2.7 vs Python 3. A simple Python script. Variables, loops, control statements, operators. PEP style guide. Python IDEs. Hands on Simple Python programs. * More Python programming Functions. Classes, objects and instances, modules, libraries, packages. Python strings, Python file handling, pip list, pip install, Hands on Python programming with pyping. * Git Distributed version control, repositories, Git and GitHub, Alternatives to GitHub, Installing git, git workflows, creating repositories, adding and editing files, branching and merging, merge conflicts. Hands on working with Git. * Python and networking APIs, Sockets, Telnetlib, pysnmp, ncclient, ciscoconfparse. * Paramiko SSH and Netmiko Integrating Python and network devices using SSH. Netmiko, Netmiko methods. Hands on Netmiko. * PyEZ Juniper, NETCONF, installing PyEZ, a first pyEZ script, pyEZ configuration management. Hands on Juniper configuration management with pyEZ. * NAPALM What is NAPALM, NAPALM operations, getters, Replace, merge, compare, commit, discard. Hands on Configuration with NAPALM. Integrating ansible and NAPALM. * Python and REST REST APIs, enabling the REST API. Accessing the REST API with a browser, cURL, Python and REST, the request library. Hands on Using a REST API with network devices.

Network automation for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Advanced Junos Service Provider Routing

5.0(3)

By Systems & Network Training

ADVANCED JUNOS SP ROUTING COURSE DESCRIPTION This is designed to provide students with detailed coverage of OSPF, IS-IS, BGP, and routing policy. Students will gain experience in configuring, monitoring, and troubleshooting the Junos operating system and in monitoring device and protocol operations. This course uses Juniper Networks vMX Series Routers for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS. WHAT WILL YOU LEARN * Describe and configure OSPF area types and operations. * Configure and monitor IS-IS. * Describe basic BGP operation. * Explain the causes for route instability. * Describe how to troubleshoot routing policy. * Explain the default behaviour of damping on links. ADVANCED JUNOS SP ROUTING COURSE DETAILS * Who will benefit: Network staff working with Junos at layer 3. * Prerequisites: Junos Intermediate Routing * Duration 5 days ADVANCED JUNOS SP ROUTING COURSE CONTENTS * OSPF OSPFv2 Review Link-State Advertisements Protocol Operations OSPF Authentication Lab: OSPF Multi-Area Networks Chapter 3: OSPF Areas Review of OSPF Areas Stub Area Operation and Configuration NSSA Operation and Configuration Route Summarization Lab: OSPF Route Summarization * OSPF Case Studies and Solutions Virtual Links OSPF Multiarea Adjacencies External Reachability Lab: Advanced OSPF Options and Routing Policy * Troubleshooting OSPF Troubleshooting OSPF Lab: OSPF Troubleshooting * IS-IS Overview of IS-IS IS-IS PDUs Neighbors and Adjacencies Configuring and Monitoring IS-IS Lab: IS-IS Configuration and Monitoring * Advanced IS-IS Operations and Configuration Options IS-IS Operations IS-IS Configuration Options IS-IS Routing Policy Lab: Advanced IS-IS Configuration Options and Routing Policy * Multilevel IS-IS Networks Level 1 and Level 2 Operations Multilevel Configuration Lab: Configuring a Multilevel IS-IS Network * Troubleshooting IS-IS Troubleshooting IS-IS Lab: IS-IS Troubleshooting * BGP Review of BGP BGP Operations BGP Path Selection Options Configuration Options Lab: BGP and BGP Attributes * BGP Attributes and Policy - Part1 BGP Policy Next Hop Origin and MED AS Path Lab: BGP Attributes - Next Hop, Origin, MED, and AS Path * Attributes and Policy - Part2 Local Preference Communities Lab: BGP Attributes - Local Preference and Communities * Route Reflection and Confederations Route Reflection Operation Configuration and Routing Knowledge BGP Confederations Lab: Scaling BGP * BGP Route Damping Route Flap and Damping Overview Route Damping Parameters Configuring and Monitoring Route Damping Lab: BGP Route Damping * Troubleshooting BGP Troubleshooting BGP Lab: BGP Troubleshooting * Troubleshooting Policy Troubleshooting Policy Lab: Policy Troubleshooting

Advanced Junos Service Provider Routing
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Introduction to the Junos Operating System

5.0(3)

By Systems & Network Training

JUNOS OPERATING SYSTEM TRAINING COURSE DESCRIPTION This course provides students with the foundational knowledge required to work with the Junos OS and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Delegates will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 15.1X49. WHAT WILL YOU LEARN * Describe the design architecture of the Junos OS. * Navigate within the Junos CLI and perform tasks within the CLI operational and configuration modes. * Configure and monitor network interfaces. * Navigate within the Junos J-Web interface. * Identify where you might use firewall filters. * Explain basic routing operations and concepts. * Identify key factors in Juniper Networks' security. JUNOS OPERATING SYSTEM TRAINING COURSE DETAILS * Who will benefit: This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. * Prerequisites: TCP/IP foundation for engineers * Duration 3 days JUNOS OPERATING SYSTEM TRAINING COURSE CONTENTS * Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices * User Interface Options-The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode * User Interface Options-The J-Web Interface The J-Web GUI Configuration Lab 1: User Interface Options * Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Lab 2: Initial System Configuration * Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Lab 3: Secondary System Configuration * Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Lab 4: Operational Monitoring and Maintenance * Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups * Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Lab 5: Routing Fundamentals * Routing Policy Routing Policy Overview Case Study: Routing Policy Lab 6: Routing Policy * Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Lab 7: Firewall Filters * Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS Lab 8: Class of Service * JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC * Juniper Security Concepts Security Challenges Juniper's Security Focus * Appendix A: IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration

Introduction to the Junos Operating System
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2367

Educators matching "Juniper"

Show all 21