Junos Layer 2 VPNs (JL2V)

This course is an intensive program focused on MPLS-based Layer 2 VPN technologies, including BGP Layer 2 VPNs, LDP circuits, VPLS, EVPN, and more. Through comprehensive lectures and extensive hands-on labs, participants will learn to configure and monitor Layer 2 VPNs on Junos OS devices.

Junos Layer 2 VPNs (JL2V)

Overview

Overview

This course provides a comprehensive overview of MPLS-based Layer 2 VPNs, detailing the distinctions between Layer 2 and Layer 3 VPNs and their business applications. It covers the roles and configurations of CE, PE, and P routers in BGP Layer 2 VPNs, including setup, management, and troubleshooting practices for various VPN types like BGP, LDP, and VPLS.

Participants will also explore advanced VPN features and configurations in Junos OS, such as Ethernet VPN setups and Carrier-of-Carriers options, enhancing their skills in VPN scaling, route reflection, and network troubleshooting.

Prerequisites

This course requires participants to have intermediate-level networking knowledge and experience with OSPF, IS-IS, BGP, and Junos policy configurations, specifically in setting up MPLS label-switched paths using Junos. Prior completion of foundational courses such as Introduction to the Junos Operating System (IJOS), Junos Service Provider Switching (JSPX), Junos Intermediate Routing (JIR), and Junos MPLS Fundamentals (JMF) is also essential to ensure readiness for the advanced topics covered.

Scope

N/A

Target Audience

This course is ideal for professionals tasked with configuring and monitoring devices that operate on the Junos OS.

Best Practices

Datacipher, a distinguished Authorized Training Partner, is celebrated for its exceptional educational programs and dedication to training excellence. Our instructors are recognized for their deep expertise and passion. As experienced professionals and active security consultants, they bring crucial real-world insights to each training session, greatly enriching the learning experience.

Certification

N/A

FAQs

Can the JL2V course be taken online?

Yes, the JL2V course is available online, featuring expert-led live demonstrations and access to personal labs to ensure a comprehensive learning experience.

Is in-person classroom training available?

Yes, we provide in-person training at our training centers or through customized on-site sessions. Check our “Price and Dates” section or contact us directly for more details.

Will I receive official course materials?

Participants in the JL2V course will receive official course materials in both electronic and printed forms. Ensure your booking is confirmed at least ten days in advance for printed materials.

Can the electronic coursebook be printed?

Yes, the electronic coursebook for the JL2V course is printable, offering flexibility in how you study.

Do participants receive a certificate of completion?

Upon successfully completing the course, participants will receive an official certificate, validating their expertise in the course content.

Course Outline

Module 1 – Course Introduction
Module 2 – MPLS VPNs
Module 3 – BGP Layer 2 VPNs
Module 4 – Layer 2 VPN Scaling and CoS
Module 5 – LDP Layer 2 Circuits
Module 6 – Virtual Private LAN Services (VPLS)
Module 7 – VPLS Configuration
Module 8 – Ethernet VPN (EVPN)
Module 9 – Appendix A: Interprovider Backbones for Layer 2 VPNs
Module 10 – Appendix B: Circuit Cross-Connect
  • Select Time Zone
    Americas Date and Time
    Asia Date and Time
    Europe Date and Time
    Format
    Language/Location
Payment Methods

At DataCipher, we offer a variety of payment options for our Juniper courses. Here are the methods available:

Purchase Order (PO) – If your organization prefers to use a purchase order, you can start the registration process by clicking the Register button. At the end of the registration form, select the option “My company will pay for it, please send an invoice with the payment details.” Our training team will provide an official quote and any additional information your accounts department may require to process the PO.

Bank Transfer – DataCipher has bank accounts in both the US and Europe, supporting all standard bank transfer methods such as IBAN/BIC, Swift, ACH, or wire transfer. To pay via bank transfer, please use the Register button to sign up for your chosen course.

Credit Card Payments – We accept payments from all major credit cards, including Mastercard, VISA, American Express, Discover & Diners, and Cartes Bancaires. You can make a payment directly through the registration link or request an invoice with a web link for online payment. All transactions are secured, and no credit card information is stored by DataCipher.

These options ensure a smooth and flexible registration process for all participants.

Status

Guaranteed to Run – DataCipher is committed to running this class unless unforeseen events such as an instructor’s accident or illness occur.

Guaranteed on Next Booking – The course will proceed once an additional student registers.

Scheduled Class – We have scheduled this course and rarely cancel due to low enrollment. We offer a “Cancel No More Than Once” guarantee, ensuring that if a class is canceled due to insufficient enrollment, the next session will run regardless of the number of attendees.

Sold Out – If the class is fully booked, please use our contact form to join the waiting list or to inquire about additional sessions. We’re here to accommodate your training needs and keep you informed of new opportunities.

Half and Full-Day Training

Upon completing this course, participants will master MPLS-based Layer 2 VPNs, learning to configure, monitor, and troubleshoot various VPN types, including BGP and LDP circuits, VPLS, and Ethernet VPNs. They will understand the roles of network devices in VPNs, manage traffic flows, and apply advanced configurations like interprovider VPNs and VPN scaling. This comprehensive training ensures proficiency in using Junos OS for effective VPN management and optimization in professional settings.

REQUEST CUSTOM DELIVERY

REQUEST a Quote

Become An Expert By Practice – Get Your Hands On Labs

Don’t let your tech outpace the skills of your people

TRUSTED BY TOP COMPANIES LIKE IBM, DELOITTE, ERICSSON, AND MORE.
DISCOVER OUR CUSTOMER PORTFOLIO.

Dedicated to excellence, we cultivate strong partnerships with worldwide technology innovators.

Testimonials

What Our Clients Say