Gain intermediate routing skills through hands-on experience with protocol-independent routing, OSPF, BGP, IP tunneling, and high availability features on Junos OS, using Juniper Networks vSRX Series Services Gateways in lab demonstrations.
This course covers advanced routing configurations within Junos OS, focusing on static, aggregate, and generated routes, along with Martian routes. It includes detailed instruction on OSPF and BGP operations, peering, and route selection, as well as Layer 3 load balancing and filter-based forwarding. Participants will also learn to configure IP tunneling with GRE and IP-IP and explore high availability features, equipping them to enhance and troubleshoot network efficiency.
Participants in this course are expected to possess basic networking knowledge, including familiarity with the Open Systems Interconnection (OSI) reference model and the TCP/IP protocol suite. It is also recommended that students complete the Introduction to the Junos Operating System (IJOS) course before enrolling in this class to ensure a solid foundational understanding.
N/A
This course benefits individuals responsible for configuring and monitoring devices running the Junos OS.
Datacipher, a premier Authorized Training Partner, is celebrated for its exceptional educational programs and unwavering dedication to training excellence. Our instructors, who are passionate and deeply experienced, are also active security consultants and seasoned professionals. They bring invaluable real-world insights to each training session, significantly enhancing the learning experience for all participants.
N/A
Can the JIR course be taken online?
Yes, the course is available online, featuring live demonstrations and personal lab access, all under the guidance of expert instructors.
Is in-person classroom training available?
Indeed, in-person training is offered at our facilities, with options for customized on-site sessions. For scheduling and more information, please check our “Price and Dates” section or contact us directly.
Will I receive official course materials?
Participants will receive official course materials in both electronic and printed formats. To ensure receipt of printed materials, please confirm your booking at least ten days in advance.
Can the electronic coursebook be printed?
Yes, the electronic coursebook is printable, offering flexibility in how you choose to study.
Do participants receive a certificate of completion?
Upon completion of the course, participants will receive an official certificate, recognizing their mastery of the content covered.
We accept all common payment methods in both the Euro and US Dollar as well as Palo Alto Networks training credits and vouchers for this Firewall: Troubleshooting (EDU-330) training course.
Guaranteed to Run Training Courses
Guaranteed to Run – Consigas guarantees to run this Firewall Configuration and Management (EDU-210) class, exempt in unexpected circumstances of force majeure, like an accident or illness of the instructor, which prevents the course from being conducted.
Guaranteed on next Course Booking
Guaranteed on next Booking – Consigas guarantees to run this Firewall Configuration and Management (EDU-210) class if one more student registers for the training course.
Guaranteed on next Course Booking
Scheduled Class – Consigas has scheduled this Firewall Configuration and Management (EDU-210) training course and booked an instructor. We rarely cancel any classes because of low inscriptions and provide a “Cancel no more than Once” guarantee. This means that in the rare case that we cannot run a class because of low inscriptions, we guarantee running the next course regardless of the number of attendees.
Training Course Sold Out
Sold Out – This class is fully booked. Please contact us using this form and we will put you on the waiting list or let you know in case we schedule an additional class.
Upon completing this course, participants will have a solid understanding of the key concepts covered, equipped with practical skills gained through hands-on demonstrations and lab exercises. They will be proficient in the relevant security protocols and configurations discussed throughout the training. This course prepares individuals to implement and manage security effectively using their new knowledge, and successful participants will be recognized with a certificate of completion that validates their expertise in the course content.
Testimonials