Junos Intermediate Routing (JIR)

Gain intermediate routing skills through hands-on experience with protocol-independent routing, OSPF, BGP, IP tunneling, and high availability features on Junos OS, using Juniper Networks vSRX Series Services Gateways in lab demonstrations.

Junos Intermediate Routing (JIR)

Overview

Overview

This course covers advanced routing configurations within Junos OS, focusing on static, aggregate, and generated routes, along with Martian routes. It includes detailed instruction on OSPF and BGP operations, peering, and route selection, as well as Layer 3 load balancing and filter-based forwarding. Participants will also learn to configure IP tunneling with GRE and IP-IP and explore high availability features, equipping them to enhance and troubleshoot network efficiency.

Prerequisites

Participants in this course are expected to possess basic networking knowledge, including familiarity with the Open Systems Interconnection (OSI) reference model and the TCP/IP protocol suite. It is also recommended that students complete the Introduction to the Junos Operating System (IJOS) course before enrolling in this class to ensure a solid foundational understanding.

Scope

N/A

Target Audience

This course benefits individuals responsible for configuring and monitoring devices running the Junos OS.

Best Practices

Datacipher, a premier Authorized Training Partner, is celebrated for its exceptional educational programs and unwavering dedication to training excellence. Our instructors, who are passionate and deeply experienced, are also active security consultants and seasoned professionals. They bring invaluable real-world insights to each training session, significantly enhancing the learning experience for all participants.

Certification

N/A

FAQs

Can the JIR course be taken online?

Yes, the course is available online, featuring live demonstrations and personal lab access, all under the guidance of expert instructors.

Is in-person classroom training available?

Indeed, in-person training is offered at our facilities, with options for customized on-site sessions. For scheduling and more information, please check our “Price and Dates” section or contact us directly.

Will I receive official course materials?

Participants will receive official course materials in both electronic and printed formats. To ensure receipt of printed materials, please confirm your booking at least ten days in advance.

Can the electronic coursebook be printed?

Yes, the electronic coursebook is printable, offering flexibility in how you choose to study.

Do participants receive a certificate of completion?

Upon completion of the course, participants will receive an official certificate, recognizing their mastery of the content covered.

Exam Resources

Description

Blueprint

Study guide

Sample Questions

Course Outline

Module 1 – Course Introduction
Module 2 – Protocol-Independent Routing
Module 3 – LAB 1: Protocol-Independent Routing
Module 4 – Load Balancing and Filter-Based Forwarding
Module 5 – LAB 2: Load Balancing and Filter-Based Forwarding
Module 6 – Open Shortest Path First (OSPF)
Module 7 – LAB 3: Open Shortest Path First (OSPF)
Module 8 – Border Gateway Protocol (BGP)
Module 9 – LAB 4: Border Gateway Protocol (BGP)
Module 10 – IP Tunneling
Module 11 – LAB 5: IP Tunneling
Module 12 – High Availability
Module 13 – LAB 6: High Availability
  • Select Time Zone
    Americas Date and Time
    Asia Date and Time
    Europe Date and Time
    Format
    Language/Location
Payment Methods

We accept all common payment methods in both the Euro and US Dollar as well as Palo Alto Networks training credits and vouchers for this Firewall: Troubleshooting (EDU-330) training course.

  • Training Credits and Vouchers from Palo Alto Networks – We accept both training credits and training vouchers issued by Palo Alto Networks. To sign-up for a course and pay using training credits or vouchers, please use the Register button above. You can select training credits at the end of the registration form.
  • Purchase Order “PO” – If your company wants to raise a purchase order to book a training course, please sign-up using the register button above. At the end of the form, please answer the questions “How would you like to pay for the course?” with “My company will pay for it, please send me an invoice with the payment details”. Our training team will then send you an official quote which your company can use to issue the PO. Our training team will also be able to provide any additional information that might be required by your accounts department.
  • Bank Transfer – Consigas has a bank account both in the US and in Europe. Our banks support all common bank transfer methods like IBAN/BIC, Swift, ACH or wire transfer. To sign-up for a course and pay per bank transfer, please use the Register button above.
  • Credit Card – We can accept credit card payment from all major credit card companies like Mastercard, VISA, American Express, Discover & Diners or Cartes Bancaires. You can pay per credit card either directly through the registration link above, or we can issue an invoice with a web link to pay online. All credit card transactions are secured by Stripe and Consigas is not storing any credit card details.

Status

Guaranteed to Run Training Courses
Guaranteed to Run – Consigas guarantees to run this Firewall Configuration and Management (EDU-210) class, exempt in unexpected circumstances of force majeure, like an accident or illness of the instructor, which prevents the course from being conducted.

Guaranteed on next Course Booking
Guaranteed on next Booking – Consigas guarantees to run this Firewall Configuration and Management (EDU-210) class if one more student registers for the training course.

Guaranteed on next Course Booking
Scheduled Class – Consigas has scheduled this Firewall Configuration and Management (EDU-210) training course and booked an instructor. We rarely cancel any classes because of low inscriptions and provide a “Cancel no more than Once” guarantee. This means that in the rare case that we cannot run a class because of low inscriptions, we guarantee running the next course regardless of the number of attendees.

Training Course Sold Out
Sold Out – This class is fully booked. Please contact us using this form and we will put you on the waiting list or let you know in case we schedule an additional class.

Half and Full-Day Training
We are offering training courses both in the classical full-day as well as in a half-day format. The half-day classes are specially tailored for IT professionals who cannot afford to leave the office for several days in a row. This format allows students to attend and fully focus on the course for a couple of hours and then catch up with their day-to-day job.The training content of both schedule formats is exactly the same. The only difference is that half-day classes distribute the course over a longer period of time. Consigas is running training courses in a half-day format for many years, and we have received very positive feedback from customers. Students tell us that besides being more flexible, it also enables them to learn more effectively as it gives them more time to process all information resulting in a better understanding.

Upon completing this course, participants will have a solid understanding of the key concepts covered, equipped with practical skills gained through hands-on demonstrations and lab exercises. They will be proficient in the relevant security protocols and configurations discussed throughout the training. This course prepares individuals to implement and manage security effectively using their new knowledge, and successful participants will be recognized with a certificate of completion that validates their expertise in the course content.

REQUEST CUSTOM DELIVERY

REQUEST a Quote

Become An Expert By Practice – Get Your Hands On Labs

Don’t let your tech outpace the skills of your people

TRUSTED BY TOP COMPANIES LIKE IBM, DELOITTE, ERICSSON, AND MORE.
DISCOVER OUR CUSTOMER PORTFOLIO.

Dedicated to excellence, we cultivate strong partnerships with worldwide technology innovators.

Testimonials

What Our Clients Say