JEX - Junos Enterprise Switching (JEX)

The 2-day Junos Enterprise Switching course that provides students with intermediate switching knowledge and configuration examplesThis course includes an overview of switching concepts and operations, virtual LANs (VLANs), the Spanning Tree Protocol (STP), port and device security features, and high availability (HA) features.

Students will gain experience in configuring and monitoring the Junos operating system and in monitoring device operationsThis course uses Juniper Networks EX-4200 Series Ethernet Switches for the hands-on component.

Student Testimonials

Instructor did a great job, from experience this subject can be a bit dry to teach but he was able to keep it very engaging and made it much easier to focus. Student
Excellent presentation skills, subject matter knowledge, and command of the environment. Student
Instructor was outstanding. Knowledgeable, presented well, and class timing was perfect. Student

Click here to print this page »


Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/IP protocol suite. Students should also attend the Introduction to the Junos Operating System (IJOS) and the Junos Routing Essentials (JRE) courses prior to attending this class.

Detailed Class Syllabus

Chapter 1: Course Introduction

Course Introduction

Chapter 2: Layer 2 Switching

Ethernet Bridging Basics
Terminology and Design Considerations
Overview of Enterprise Switching Platforms
Enabling and Monitoring Layer 2 Switching Operations
Lab 1: Implementing Layer 2 Switching

Chapter 3: Virtual Networks

Overview of VLANs
Configuring and Monitoring VLANs
Voice VLAN
Native VLAN
Routed VLAN Interfaces
Lab 2: Implementing Virtual Networks

Chapter 4: Spanning Tree

Spanning Tree Protocol
Rapid Spanning Tree Protocol
Configuring and Monitoring STP and RSTP
Protection Features: BPDU Protection
Protection Features: Loop Protection
Protection Features: Root Protection
Lab 3: Implementing Spanning Tree

Chapter 5: Port Security

MAC Limiting
DHCP Snooping
Dynamic ARP Inspection (DAI)
IP Source Guard
Lab 4: Implementing Port Security

Chapter 6: Device Security and Firewall Filters

Storm Control
Firewall Filters
Lab 5: Implementing Storm Control and Firewall Filters

Chapter 7: Virtual Chassis

Overview of Virtual Chassis
Configuring and Monitoring a Virtual Chassis
Lab 6: Implementing Virtual Chassis Systems

Chapter 8: High Availability Features

Overview of High Availability Networks
Link Aggregation Groups
Redundant Trunk Groups
Lab 7: Implementing High Availability Features