Juniper/Advanced Junos Enterprise Switching (AJEX)


Advanced Junos Enterprise Switching (AJEX) Certification Training Course Overview

Advanced Junos Enterprise Switching (AJEX) course is designed to provide detailed coverage of virtual LAN (VLAN) operations, Multiple Spanning Tree Protocol (MSTP) and VLAN Spanning Tree Protocol (VSTP), authentication and access control for Layer 2 networks, IP telephony features, class of service (CoS) and monitoring and troubleshooting tools and features supported on the EX Series Ethernet Switches. Through demonstrations and hands-on labs,students will gain experience in configuring and monitoring the Junos operating system and in monitoring device and protocol operations. 
 
Audience: This course benefits individuals responsible for configuring and monitoring EX Series switches using Junos ELS.

Advanced Junos Enterprise Switching (AJEX) Course schedule & Prices

Schedule & Prices
Course Details Schedule
Live Virtual Classroom (Instructor-Led)
Duration : 2 Days (4 Days for 4 Hours/Day)
Fee : USD 600 (Includes Taxes)



June

8 Hours/Day
01-02
07-08
08-09
15-16
01-04
07-10
08-11
15-18
July

8 Hours/Day
06-07
12-13
13-14
20-21
06-09
12-15
13-16
20-23
August

8 Hours/Day
03-04
09-10
10-11
17-18
03-06
09-12
10-13
17-20
Fly-Me-a-Trainer
Duration : 2 Days
Fee : On Request
Client's Location
As per mutual convenience
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : 2 Days
Fee : On Request
On Request

Enquire Now




Input symbols

Course Prerequisites

  • An intermediate-level of networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/IP protocol suite. 
  • Introduction to the Junos Operating System (IJOS) course, and the Junos Enterprise Switching (JEX) course prior to attending this class.


Upon Completion of this Course, you will accomplish following:-

  • Restrict traffic flow within a VLAN.
  • Manage dynamic VLAN registration.
  • Tunnel Layer 2 traffic through Ethernet networks.
  • Review the purpose and operations of a spanning tree.
  • Implement multiple spanning-tree instances in a network.
  • Implement one or more spanning-tree instances for a VLAN.
  • List the benefits of implementing end-user authentication.
  • Explain the operations of various access control features.
  • Configure and monitor various access control features.
  • Describe processing considerations when multiple authentication and access control features are enabled.
  • Describe some common IP telephony deployment scenarios.
  • Describe features that facilitate IP telephony deployments.
  • Configure and monitor features used in IP telephony deployments.
  • Explain the purpose and basic operations of CoS.
  • Describe CoS features used in Layer 2 networks.