Introduction to the Junos Operating System Training (IJOS)
|Commitment||3 days, 7-8 hours a day.|
|How To Pass||Pass all graded assignments to complete the course.|
|User Ratings||Average User Rating 4.8 See what learners said|
|Delivery Options||Instructor-Led Onsite, Online, and Classroom Live|
Introduction to the Junos Operating System Training (IJOS) Course – Hands-on
This three-day Introduction to the Junos Operating System Training (IJOS) course provides students with the foundational knowledge required to work with the Juniper Networks Junos operating system and to configure Junos devices. The Introduction to the Junos Operating System Training (IJOS) course provides a brief overview of the Junos device families and discusses the key architectural components of the software. Key topics include user interface options with a heavy focus on the command-line interface (CLI), configuration tasks typically associated with the initial setup of devices, interface configuration basics with configuration examples, secondary system configuration, and the basics of operational monitoring and maintenance of Junos devices.
The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters.
Introduction to the Junos Operating System Training (IJOS) Course – Customize it
- We can adapt this Introduction to the Junos Operating System Training (IJOS) course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this training course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Introduction to the Junos Operating System Training (IJOS) around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the training course in manner understandable to lay audiences.
Introduction to the Junos Operating System Training (IJOS) Course – Audience/Target Group
The target audience for this training course:
- This course benefits individuals responsible for configuring and monitoring devices running the Junos OS.
Introduction to the Junos Operating System Training (IJOS) Course – Class Prerequisites
The knowledge and skills that a learner must have before attending this training course are:
- Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/IP protocol suite.
Introduction to the Junos Operating System Training (IJOS) Course – Objectives:
Upon completing this training course, learners will be able to meet these objectives:
- Describe the basic design architecture of the Juniper Networks Junos OS.
- Identify and provide a brief overview of Junos devices.
- Navigate within the Junos CLI.
- Perform tasks within the CLI operational and configuration modes.
- Restore a Junos device to its factory-default state.
- Perform initial configuration tasks.
- Configure and monitor network interfaces.
- Describe user configuration and authentication options.
- Perform secondary configuration tasks for features and services such as system logging (syslog) and tracing, Network Time Protocol (NTP), configuration archival, and SNMP.
- Monitor basic operation for the Junos OS and devices.
- Identify and use network utilities.
- Upgrade the Junos OS.
- Perform file system maintenance and password recovery on a Junos device.
- Navigate within the Junos J-Web interface.
- Explain basic routing operations and concepts.
- View and describe routing and forwarding tables.
- Configure and monitor static routing.
- Configure and monitor OSPF.
- Describe the framework for routing policy and firewall filters.
- Explain the evaluation of routing policy and firewall filters.
- Identify instances where you might use routing policy.
- Write and apply a routing policy.
- Identify instances where you might use firewall filters.
- Write and apply a firewall filter.
- Describe the operation and configuration for unicast reverse path forwarding (RPF).
Introduction to the Junos Operating System Training (IJOS) – Course Content
Chapter 1: Course Introduction
Chapter 2: Junos Operating System Fundamentals
- The Junos OS
- Traffic Processing
- Platforms Running the Junos OS
Chapter 3: User Interface Options – The Junos CLI
- User Interface Options
- The Junos CLI: CLI Basics
- The Junos CLI: Operational Mode
- The Junos CLI: Configuration Mode
Chapter 4: User Interface Options – The J-Web Interface
- The J-Web GUI
- Lab 1: The Junos CLI
Chapter 5: Initial Configuration
- Factory-Default Configuration
- Initial Configuration
- Interface Configuration
Lab 2: Initial System Configuration
Chapter 6: Secondary System Configuration
- User Configuration and Authentication
- System Logging and Tracing
- Network Time Protocol
- Archiving Configurations
Lab 3: Secondary System Configuration
Chapter 7: Operational Monitoring and Maintenance
- Monitoring Platform and Interface Operation
- Network Utilities
- Maintaining the Junos OS
- Password Recovery
- System Clean-up
Lab 4: Operational Monitoring and Maintenance
Chapter 8: Interface Configuration Examples
- Review of the Interface Configuration Hierarchy
- Interface Configuration Examples
- Using Configuration Groups
Chapter 9: Routing Fundamentals
- Routing Concepts: Overview of Routing
- Routing Concepts: The Routing Table
- Routing Concepts: Routing Instances
- Static Routing
- Dynamic Routing
Lab 5: Routing Fundamentals
Chapter 10: Routing Policy
Routing Policy Overview
- Case Study: Routing Policy
Lab 6: Routing Policy
Chapter 11: Firewall Filters.
- Firewall Filters Overview
- Case Study: Firewall Filters
- Unicast Reverse-Path-Forwarding Checks
Lab 7: Firewall Filters
Chapter 12: Class of Service
- CoS Overview
- Traffic Classification
- Traffic Queueing
- Traffic Scheduling
- Case Study: CoS
Lab 8: Class of Service
Chapter 13: JTAC Procedures
- Opening a Support Case
- Customer Support Tools
- Transferring Files to JTACT
Chapter 14: Juniper Security Concepts
- Security Challenges
- Juniper’s Security Focus
Appendix A: IPv6 Fundamentals
- IPv6 Addressing
- Protocols and Services