This five-day course is designed to provide students with detailed coverage of OSPF, ISIS, BGP, and routing policy. Through demonstrations and hands-on labs, students will gain experience in configuring, monitoring, and troubleshooting the Junos operating system and in monitoring device and protocol operations.
This course uses Juniper Networks vMX Series Routers for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS.
This course is based on the Junos OS Release 19.3.
Who should attend
Students should have intermediate-level networking knowledge and an understanding of the Open Systems Interconnection (OSI) model and the TCP/IP protocol suite. Students should also attend the Introduction to the Junos Operating System (IJOS) and Junos Intermediate Routing (JIR) courses prior to attending this class.
What you will learn
• Describe the various OSPF link-state advertisement (LSA) types.
• Explain the flooding of LSAs in an OSPF network.
• Describe the shortest-path-first (SPF) algorithm.
• Explain OSPF link metrics
• Describe the various OSPF authentication methods.
• Explain the key differences between OSPFv2 and OSPFv3.
• Describe OSPF area types and operations.
• Configure various OSPF area types.
• Summarize and restrict routes.
• Configure OSPF multi-area adjacencies
• Configure OSPF virtual links.
• Explain OSPF external reachability.
• List useful commands that are used to troubleshoot and verify OSPF.
• Isolate different OSPF issues.
• Explain the concepts and operation of IS-IS.
• Describe various IS-IS link-state protocol data unit (LSP) types.
• List IS-IS adjacency rules and troubleshoot common adjacency issues.
• Configure and monitor IS-IS.
• Display and interpret the link-state database (LSDB).
• Perform advanced IS-IS configuration options.
• Implement IS-IS routing policy.
• Explain the default operation in multilevel IS-IS.
• Describe address summarization methods used in IS-IS.
• Configure and monitor a multilevel IS-IS network.
• List useful commands to troubleshoot and verify IS-IS problems.
• Troubleshoot and isolate different IS-IS issues.
• Describe basic BGP operation.
• List common BGP attributes.
• Explain the route selection process for BGP.
• Describe how to alter the route selection process.
• Configure some advanced options for BGP peers.
• Explain how policies function in BGP.
• Show how Regex can be used in policies to manipulate AS-path.
• Manipulate these BGP attributes using routing policy.
• Configure a route reflector.
• Describe the virtual route reflector.
• Describe the operation of optimal route reflection.
• Describe the operation of a BGP confederation.
• Configure confederations.
• Describe peering relationships in a confederation.
• Describe DDoS attacks.
• Describe DDoS mitigation techniques.
• Describe FlowSpec Operations.
• Configure and Monitor FlowSpec.
• Review common BGP troubleshooting procedures.
• List common BGP troubleshooting commands.
• Identify issues with BGP peering.
• Isolate problems on routing policy structure and configuration.
• Identify common commands for troubleshooting routing policy.
• Explain the causes for route instability.
• Describe the effect of damping on BGP routing.
• Explain the default behavior of damping on links.
• Control damping using routing policy.
• View damped routes using command-line interface (CLI) commands.
It can take up to 48 hours (working days) before this course can be made available.