Advanced Junos Service Provider Routing (AJSPR)

This five-day course is designed to provide students with detailed coverage of OSPF, IS- IS, BGP, and routing policy. Through demonstrations and hands-on labs, students will gain experience in configuring, monitoring, and troubleshooting the Junos operating system and in monitoring device and protocol operations.

This course uses Juniper Networks vMX Series Routers for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS. This course is based on the Junos OS Release 19.3.

• Describe the various OSPF link-state advertisement (LSA) types.
• Explain the flooding of LSAs in an OSPF network.
• Describe the shortest-path-first (SPF) algorithm.
• Explain OSPF link metrics
• Describe the various OSPF authentication methods.
• Explain the key differences between OSPFv2 and OSPFv3.
• Describe OSPF area types and operations.
• Configure various OSPF area types.
• Summarize and restrict routes.
• Configure OSPF multi-area adjacencies
• Configure OSPF virtual links.
• Explain OSPF external reachability.
• List useful commands that are used to troubleshoot and verify OSPF.
• Isolate different OSPF issues.
• Explain the concepts and operation of IS-IS.
• Describe various IS-IS link-state protocol data unit (LSP) types.
• List IS-IS adjacency rules and troubleshoot common adjacency issues.
• Configure and monitor IS-IS.
• Display and interpret the link-state database (LSDB).
• Perform advanced IS-IS configuration options.
• Implement IS-IS routing policy.
• Explain the default operation in multilevel IS-IS.
• Describe address summarization methods used in IS-IS.
• Configure and monitor a multilevel IS-IS network.
• List useful commands to troubleshoot and verify IS-IS problems.
• Troubleshoot and isolate different IS-IS issues.
• Describe basic BGP operation.
• List common BGP attributes.
• Explain the route selection process for BGP.
• Describe how to alter the route selection process.
• Configure some advanced options for BGP peers.
• Explain how policies function in BGP.
• Describe BGP attributes and explain how these attributes can be used to manipulate traffic.
• Show how Regex can be used in policies to manipulate AS-path.
• Describe the BGP attributes Origin, MED and communities in detail and explain the operation of those attributes.
• Manipulate these BGP attributes using routing policy.
• Describe the operation of BGP route reflection.
• Configure a route reflector.
• Describe the virtual route reflector.
• Describe the operation of optimal route reflection.
• Describe the operation of a BGP confederation.
• Configure confederations.
• Describe peering relationships in a confederation.
• Describe DDoS attacks.
• Describe DDoS mitigation techniques.
• Describe FlowSpec Operations.
• Configure and Monitor FlowSpec.
• Review common BGP troubleshooting procedures.
• List common BGP troubleshooting commands.
• Identify issues with BGP peering.
• Isolate problems on routing policy structure and configuration.
• Identify common commands for troubleshooting routing policy.
• Explain the causes for route instability.
• Describe the effect of damping on BGP routing.
• Explain the default behavior of damping on links.
• Control damping using routing policy.
• View damped routes using command-line interface (CLI) commands.

Show More

Virtual Classroom Live

Prerequisites

  • Intermediate-level networking knowledge
  • Understanding of the Open Systems Interconnection (OSI) model and the TCP/IP protocol suite
  • Attendance of the Introduction to the Junos Operating System (IJOS) course
  • Attendance of the Junos Intermediate Routing (JIR) course

Target Audience

  • This course benefits individuals responsible for implementing, monitoring, and troubleshooting
  • Layer 3 components of a service provider’s network.
What You’ll Learn
  • After successfully completing this course, you should be able to:
  • Describe the various OSPF link-state advertisement (LSA) types.
  • Explain the flooding of LSAs in an OSPF network.
  • Describe the shortest-path-first (SPF) algorithm.
  • List key differences between OSPFv2 and OSPFv3.
  • Describe OSPF area types and operations.
  • Configure various OSPF area types.
  • Summarize and restrict routes.
  • Identify some scenarios in a service provider network that can be solved using routing policy or specific configuration options.
  • Use routing policy and specific configuration options to implement solutions for various scenarios.
  • Describe how to troubleshoot OSPF.
  • Explain the concepts and operation of IS-IS.
  • Describe various IS-IS link-state protocol data unit (LSP) types.
  • List IS-IS adjacency rules and troubleshoot common adjacency issues.
  • Configure and monitor IS-IS.
  • Display and interpret the link-state database (LSDB).
  • Perform advanced IS-IS configuration options.
  • Implement IS-IS routing policy.
  • Explain the default operation in multiarea IS-IS.
  • Describe IS-IS address summarization methods.
  • Configure and monitor a multiarea IS-IS network.
  • Describe how to troubleshoot IS-IS.
  • Describe basic BGP operation.
  • List common BGP attributes.
  • Explain the route selection process for BGP.
  • Describe how to alter the route selection process.
  • Configure some advanced options for BGP peers.
  • Describe various BGP attributes in detail and explain the operation of those attributes.
  • Manipulate BGP attributes using routing policy.
  • Explain the causes for route instability.
  • Describe the effect of damping on BGP routing.
  • Explain the default behavior of damping on links.
  • Control damping using routing policy.
  • View damped routes using command-line interface (CLI) commands.
  • Describe the operation of BGP route reflection.
  • Configure a route reflector.
  • Describe the operation of a BGP confederation.
  • Configure confederations.
  • Describe peering relationships in a confederation.
  • Describe how to troubleshoot BGP.
  • Describe how to troubleshoot routing policy.
Course Outline
Labs Outline
  • Describe the various OSPF link-state advertisement (LSA) types.
  • Explain the flooding of LSAs in an OSPF network.
  • Describe the shortest-path-first (SPF) algorithm.
  • Explain OSPF link metrics.
  • Describe the various OSPF authentication methods.
  • Explain the key differences between OSPFv2 and OSPFv3.
  • Describe OSPF area types and operations.
  • Configure various OSPF area types.
  • Summarize and restrict routes.
  • Configure OSPF multi-area adjacencies.
  • Configure OSPF virtual links.
  • Explain OSPF external reachability.
  • List useful commands that are used to troubleshoot and verify OSPF.
  • Isolate different OSPF issues.
  • Explain the concepts and operation of IS-IS.
  • Describe various IS-IS link-state protocol data unit (LSP) types.
  • List IS-IS adjacency rules and troubleshoot common adjacency issues.
  • Configure and monitor IS-IS.
  • Display and interpret the link-state database (LSDB).
  • Perform advanced IS-IS configuration options.
  • Implement IS-IS routing policy.
  • Explain the default operation in multilevel IS-IS.
  • Describe address summarization methods used in IS-IS.
  • Configure and monitor a multilevel IS-IS network.
  • List useful commands to troubleshoot and verify IS-IS problems.
  • Troubleshoot and isolate different IS-IS issues.
  • Describe basic BGP operation.
  • List common BGP attributes.
  • Explain the route selection process for BGP.
  • Describe how to alter the route selection process.
  • Configure some advanced options for BGP peers.
  • Explain how policies function in BGP.
  • Describe BGP attributes and explain how these attributes can be used to manipulate traffic.
  • Show how Regex can be used in policies to manipulate AS-path.
  • Describe the BGP attributes Origin, MED and communities in detail and explain the operation of those attributes.
  • Manipulate these BGP attributes using routing policy.
  • Describe the operation of BGP route reflection.
  • Configure a route reflector.
  • Describe the virtual route reflector.
  • Describe the operation of optimal route reflection.
  • Describe the operation of a BGP confederation.
  • Configure confederations.
  • Describe peering relationships in a confederation.
  • Describe DDoS attacks.
  • Describe DDoS mitigation techniques.
  • Describe FlowSpec Operations.
  • Configure and Monitor FlowSpec.
  • Review common BGP troubleshooting procedures.
  • List common BGP troubleshooting commands.
  • Identify issues with BGP peering.
  • Isolate problems on routing policy structure and configuration.
  • Identify common commands for troubleshooting routing policy.
  • Explain the causes for route instability.
  • Describe the effect of damping on BGP routing.
  • Explain the default behavior of damping on links.
  • Control damping using routing policy.
  • View damped routes using command-line interface (CLI) commands.