Cisco-training

Insoft Services is een van de weinige aanbieders van opleidingen in EMEAR tot een volledige reeks van Cisco-certificering en gespecialiseerde technische opleiding aan te bieden.

Lees meer

Cisco-certificering

Ervaar een blended learning-aanpak die het beste van door een instructeur geleide training en e-learning in eigen tempo combineert om u te helpen zich voor te bereiden op uw certificeringsexamen.

Lees meer

Cisco Learning Credits

Cisco Learning Credits (CLCs) zijn prepaid trainingsvouchers die rechtstreeks bij Cisco worden ingewisseld en die het plannen van uw succes eenvoudiger maken bij de aankoop van Cisco-producten en -services.

Lees meer

Cisco Continuing Education

Het Cisco Continuing Education Program biedt alle actieve certificeringshouders flexibele opties om opnieuw te certificeren door een verscheidenheid aan in aanmerking komende trainingsitems te voltooien.

Lees meer

Cisco Digital Learning

Gecertificeerde medewerkers zijn GEWAARDEERDE activa. Verken de officiële Digital Learning Library van Cisco om uzelf te informeren via opgenomen sessies.

Lees meer

Cisco Business Enablement

Het Cisco Business Enablement Partner Program richt zich op het aanscherpen van de zakelijke vaardigheden van Cisco Channel Partners en klanten.

Lees meer

Cisco trainingscatalogus

Het Cisco Business Enablement Partner Program richt zich op het aanscherpen van de zakelijke vaardigheden van Cisco Channel Partners en klanten.

Lees meer

Fortinet-certificering

Het Fortinet Network Security Expert (NSE) -programma is een training- en certificeringsprogramma op acht niveaus om ingenieurs van hun netwerkbeveiliging te leren voor Fortinet FW-vaardigheden en -ervaring.

Technische trainingen

Fortinet-training

Insoft is erkend als Fortinet Authorized Training Center op geselecteerde locaties in EMEA.

Lees meer

Fortinet trainingscatalogus

Bekijk de volledige Fortinet trainingscatalogus. Het programma omvat een breed scala aan cursussen in eigen tempo en onder leiding van een instructeur.

Lees meer

ATC Status

Bekijk onze ATC-status in geselecteerde landen in Europa.

Lees meer

Fortinet Professionele Services

Wereldwijd erkend team van gecertificeerde experts helpt u een soepelere overgang te maken met onze vooraf gedefinieerde consultancy-, installatie- en migratiepakketten voor een breed scala aan Fortinet-producten.

Lees meer

Microsoft-training

Insoft Services biedt Microsoft-trainingen in EMEAR. We bieden technische trainingen en certificeringscursussen van Microsoft aan die worden geleid door instructeurs van wereldklasse.

Technische cursussen

Extreme-training

Find all the Extreme Networks online and instructor led class room based calendar here.

Technische cursussen

Technische-certificering

We provide comprehensive curriculum of technical competency skills on the certification accomplishment.

Lees meer

Extreme trainingscatalogus

Leer uitzonderlijke kennis en vaardigheden van Extreme Networks

Lees meer

ATP accreditatie

Als geautoriseerde trainingspartner (ATP) zorgt Insoft Services ervoor dat u de hoogste onderwijsnormen krijgt die beschikbaar zijn.

Lees meer

Services Oplossingen

Wij bieden innovatieve en geavanceerde ondersteuning bij het ontwerpen, implementeren en optimaliseren van IT-oplossingen.Ons klantenbestand omvat enkele van de grootste Telco's ter wereld.

Oplossingen

Wereldwijd erkend team van gecertificeerde experts helpt u een soepelere overgang te maken met onze vooraf gedefinieerde consultancy-, installatie- en migratiepakketten voor een breed scala aan Fortinet-producten.

Over ons

Insoft biedt geautoriseerde trainings- en consultancydiensten voor geselecteerde IP-leveranciers. Ontdek hoe we een revolutie teweegbrengen in de industrie.

Lees meer
  • +31 71 799 6230
  • You can unsubscribe from these communications at any time. For more information please review our Privacy Policy. By clicking 'Send Message' below, you consent to allow Insoft Services to store and process the personal information submitted above to provide you with the content requested.

    JL2V – Junos Layer 2 VPNs

    Duration
    3 Dagen
    Delivery
    (Online and onsite)
    Price
    Price Upon Request

    This three-day course is designed to provide students with the knowledge to configure and troubleshoot MPLS-based Layer 2 virtual private networks (VPN). The course includes an overview of MPLS Layer 2 VPN concepts, such as BGP Layer 2 VPNs, LDP Layer 2 circuits, forwarding equivalence class (FEC) 129, virtual private LAN service (VPLS), Ethernet VPN (EVPN), and Inter-AS MPLS VPNs.

     

    This course also covers Junos OSspecific implementations of Layer 2 VPN instances, VPLS, and EVPNs. This course is based on the Junos OS Release 21.4R1.12.

     

    Associated Certification:
    JNCIP-SP

    • Describe some of the different kinds of VPNs, their mechanics, and their use cases
    • Describe the types of MPLS VPN that operate at layer 2.
    • Describe the mechanics of BGP-signaled pseudowires, also known as L2VPNs.
    • Configure BGP-signaled L2VPNs with Ethernet and Ethernet-VLAN encapsulations.
    • Demonstrate how to troubleshoot some of the most common BGP-signaled L2VPN configuration problems.
    • Describe how BGP-signaled L2VPNs use a block of labels to bring efficiency tohuband-spoke advertisements.
    • Configure advanced BGP-signaled L2VPN features, such as multihoming, VLAN normalization, and route target constraint.
    • Describe the mechanics of LDP-signaled pseudowires, also known as Layer 2 Circuits.
    • Describe the causes and solutions of some of the most common L2Circuit configuration problems.
    • Configure advanced LDP-signaled L2Circuit features, such as multihoming and local switching.
    • Explain how the FEC 129 pseudowire method combines BGP for autodiscovery and LDP for signaling.
    • Describe the purpose and mechanics of a VPLS.
    • Create a VPLS instance that is signaled using BGP and demonstrate the commands that verify its status.
    • Create VPLS instances that are signaled using LDP and FEC 129 and demonstrate the commands available to verify their status.
    • Describe how mismatched VLAN tags are handled in a default VPLS configuration.
    • Configure a VPLS to swap mismatched VLAN tags automatically, and to create multiple bridge domains inside a single VPLS instance.
    • Configure the most important VPLS traffic management features, including flood protection, MAC limiting, IRB interfaces, and automated Site IDs.
    • Configure hub-and-spoke VPLS topologies.
    • Configure multihomed sites in a VPLS.
    • Describe the features of Ethernet VPN, and the enhancements that EVPN brings over VPLS.
    • Explain how EVPNs advertise MAC addresses, and how they request to receive flooded traffic within a bridge domain.
    • Configure and verify a single-homed VLAN-based EVPN instance.
    • Configure and verify a single-homed VLAN-aware bundle EVI.
    • Configure a multihomed EVPN and explain the purpose of the EVPN Type 4 route.
    • Describe the features provided by EVPN Type 1 routes.
    • Describe how to use MAC Mobility and IRB interfaces in an EVPN.
    • Explain how EVPNs can tightly integrate themselves into MPLS Layer 3 VPNs to provide highly efficient forwarding.
    • Describe and configure various solutions that create MPLS VPNs between service providers.
    • Describe the circuit-cross connect pseudowire method and explain how this old method can still have value in modern networks.
    • Describe how multisegment pseudowires can create layer 2 VPNs across autonomous system boundaries.

    DAY 1

    1. Course Introduction

     

    2. Refresher—VPNs and MPLS

    • Explain the basic function and purpose of a VPN
    • Describe how MPLS uses labels to forward traffic
    • Explain the differences between MPLS layer 3 VPNs and MPLS layer 2 VPNs

     

    3. The Different Flavors of Layer 2 VPN

    • Describe the purpose and creation of pseudowires
    • Define the different technical terms relating to pseudowires
    • Describe the purpose and creation of VPLS
    • Describe the purpose, creation, and advantages of EVPN

     

    4. L2VPN, aka BGP-Signaled Pseudowires

    • Define the concept of an attachment circuit, and of pseudowire encapsulation
    • Explain the importance of route targets, route distinguishers, and Site IDs
    • Explain the control plane and data plane of an L2VPN
    • Describe the contents of an L2VPN BGP packet capture

     

    5. L2VPN—Configuration

    • Configure an L2VPN that accepts all Ethernet traffic
    • Configure an L2VPN that accepts specific VLAN tags

     

    6. L2VPN—Troubleshooting

    • Diagnose and fix L2VPN problems caused by missing LSPs, mismatched site information, and incorrect configuration

     

    7. L2VPN—Site IDs, the Label Base, and Overprovisioning

    • Explain the purpose of the Site ID and the VPN label base
    • Configure an overprovisioned L2VPN with explicit remote Site IDs
    • Configure an overprovisioned L2VPN with implicit remote Site IDs

     

    Lab 1: BGP-Signaled Layer 2 VPNs

     

    8. L2VPN—Advanced Concepts

    • Configure and verify L2VPN multihoming
    • Explain the purpose of Martini encapsulation
    • Configure VLAN normalization in an L2VPN
    • Configure out-of-band route reflection and route target constraint

     

    Lab 2: L2VPNs—Advanced Concepts

     

    9. L2Circuit—LDP-Signaled Pseudowires

    • Explain the concept of targeted LDP sessions, and the elements that L2Circuits have in common with L2VPNs
    • Configure and verify an L2Circuit
    • Describe the contents of an LDP advertisement packet capture

     

    10. L2Circuit—Troubleshooting

    • Configure the Pseudowire Status TLV
    • Explain the meaning of the most frequent L2Circuit error codes

     

    DAY 2

    11. L2Circuit—Advanced Concepts

    • Describe the purpose and benefits of virtual circuit connectivity verification
    • Configure multihoming, local switching, and interworking

    Lab 3: LDP-Signaled L2Circuits

     

     

    12. FEC 129 Pseudowires

    • Explain the way that FEC 129 autodiscovers remote PEs and signals pseudowires
    • Configure and verify a FEC 129 pseudowire

     

    Lab 4: FEC 129 Pseudowires (Optional)

     

    13. Virtual Private LAN Service—Introduction

    • Describe how a VPLS is built, and how it compares to a regular pseudowire
    • Explain how VPLS forwards traffic between multiple sites
    • Describe the BGP and LDP methods of signaling a VPLS

     

    14. VPLS—BGP Configuration and Verification

    • Configure a BGP-signaled VPLS
    • Verify a BGP-signaled VPLS

     

    15. VPLS—LDP and FEC 129 Configuration and Verification

    • Configure and verify an LDP-signaled VPLS
    • Configure and verify a FEC 129 VPLS

     

    16. VPLS—The Default VLAN Mode

    • Define the four VLAN modes for VPLS
    • Define the concept of a bridge domain, and verify the default VPLS VLAN mode

     

    17. VPLS—VLAN Normalization, VLAN-Aware Instances, and Dual-Stacked VLANs

    • Configure and verify VLAN-Aware mode
    • Configure and verify VLAN-Normalizing mode and NoVLAN mode
    • Configure and verify dual-stacked VLAN tags in VPLS

     

    18. VPLS—Advanced Features and Troubleshooting

    • Deploy automated BGP VPLS Site IDs
    • Configure flood protection, MAC flap protection, and MAC limiting
    • Explain how to add IRB interfaces to a VPLS, and configure efficient traffic flooding using multicast LSPs
    • Describe the most important VPLS-specific troubleshooting techniques

     

    19. VPLS—Multihoming

    • Configure multihomed sites in a BGP-signaled VPLS
    • Configure multihomed sites and single sites on the same PE in a BGP-signaled VPLS
    • Configure best-site multihoming in a BGP-signaled VPLS
    • Configure multihomed sites in an LDP-signaled VPLS

     

    Lab 5: VPLs

     

    Days 3

    20. EVPN—Introduction

    • Explain the main disadvantages of a VPLS solution
    • Explain how EVPN overcomes these disadvantages, and enables extra features

     

    21. EVPN—Using BGP to Advertise MACs and to Flood Traffic

    • Explain the meaning of an EVPN Instance
    • Describe how EVPN Type 2 routes advertise MAC addresses and MAC/IP bindings
    • Describe how EVPN Type 3 routes request to receive flooded traffic within a bridge domain

     

    22. EVPN—Configuring a Single-Homed VLAN-Based EVI

    • Configure a service provider network to host EVPN services
    • Configure a single-homed VLAN-based EVI
    • Verify a VLAN-based EVI

     

    23. EVPN—Configuring a Single-Homed VLAN-Aware Bundle EVI

    • Configure a VLAN-aware bundle EVI
    • Verify a VLAN-aware bundle EVI

     

    24. EVPN—Multihoming Configuration and Type 4 Routes

    • Configure a CE and two PEs to take part in a multihomed EVPN
    • Describe the contents of the Type 4 Ethernet Segment route
    • Explain how the Type 4 route prevents layer 2 loops, using the designated forwarder election

     

    25. EVPN—Multihoming Features Using Type 1 Routes

    • Describe Type 1 Ethernet Auto-Discovery Per-Ethernet Segment routes
    • Explain how Type 1 Per-Ethernet Segment routes prevent layer 2 loops
    • Describe how Type 1 Per-EVI routes are different from Per-ES routes

     

    26 EVPN—MAC Mobility and IRB Interfaces

    • Configure and verify the EVPN MAC Mobility feature
    • Configure and verify Automatic Gateway MAC-IP Synchronization
    • Configure and verify Manual Gateway MAC-IP Synchronization
    • Configure and verify EVPN Virtual Gateway Addresses

     

    Lab 6: EVPN

     

    SELF-STUDY MATERIALS

    A EVPN—Integration with L3VPNs

    • Describe the basic functionality of an L3VPN
    • Explain how EVPNs and L3VPNs integrate for optimal routing
    • Describe how chained composite next hop brings efficiency to EVPN in the Packet Forwarding Engine B Inter-AS MPLS VPNs
    • Describe the functionality of Interprovider Options A, B, and C
    • Configure and verify the Interprovider Option C method
    • Describe and configure carrier-of-carriers VPNs C Circuit Cross-Connect
    • Use circuit cross-connect to stitch pseudowires together, and to signal pseudowires that have their own pair of dedicated RSVP LSPs D Multisegment Pseudowires
    • Explain how a multisegment pseudowire is signaled
    • Configure and verify a multisegment pseudowire

     

    Lab 7: Inter-AS L2VPNs

     

    E VPLS—Hub-and-Spoke Topologies

    • Configure a hub-and-spoke BGP VPLS using route targets
    • Configure a hub-and-spoke BGP VPLS using site ranges
    • Configure a hub-and-spoke LDP VPLS using hierarchical VPLs

    Benefits individuals responsible for configuring and monitoring devices running the Junos OS in a service provider environment, in MPLS-based data centers, and in larger enterprises

    • Intermediate-level networking knowledge;
    • An understanding of OSPF, IS-IS, BGP, and Junos routing policy;
    • Experience configuring MPLS label-switched paths using Junos;
    • Completion of the following courses, or equivalent knowledge
      • Introduction to the Junos Operating System
      • Junos Service Provider Switching
      • Junos Intermediate Routing
      • Junos MPLS Fundamentals

    This three-day course is designed to provide students with the knowledge to configure and troubleshoot MPLS-based Layer 2 virtual private networks (VPN). The course includes an overview of MPLS Layer 2 VPN concepts, such as BGP Layer 2 VPNs, LDP Layer 2 circuits, forwarding equivalence class (FEC) 129, virtual private LAN service (VPLS), Ethernet VPN (EVPN), and Inter-AS MPLS VPNs.

     

    This course also covers Junos OSspecific implementations of Layer 2 VPN instances, VPLS, and EVPNs. This course is based on the Junos OS Release 21.4R1.12.

     

    Associated Certification:
    JNCIP-SP

    • Describe some of the different kinds of VPNs, their mechanics, and their use cases
    • Describe the types of MPLS VPN that operate at layer 2.
    • Describe the mechanics of BGP-signaled pseudowires, also known as L2VPNs.
    • Configure BGP-signaled L2VPNs with Ethernet and Ethernet-VLAN encapsulations.
    • Demonstrate how to troubleshoot some of the most common BGP-signaled L2VPN configuration problems.
    • Describe how BGP-signaled L2VPNs use a block of labels to bring efficiency tohuband-spoke advertisements.
    • Configure advanced BGP-signaled L2VPN features, such as multihoming, VLAN normalization, and route target constraint.
    • Describe the mechanics of LDP-signaled pseudowires, also known as Layer 2 Circuits.
    • Describe the causes and solutions of some of the most common L2Circuit configuration problems.
    • Configure advanced LDP-signaled L2Circuit features, such as multihoming and local switching.
    • Explain how the FEC 129 pseudowire method combines BGP for autodiscovery and LDP for signaling.
    • Describe the purpose and mechanics of a VPLS.
    • Create a VPLS instance that is signaled using BGP and demonstrate the commands that verify its status.
    • Create VPLS instances that are signaled using LDP and FEC 129 and demonstrate the commands available to verify their status.
    • Describe how mismatched VLAN tags are handled in a default VPLS configuration.
    • Configure a VPLS to swap mismatched VLAN tags automatically, and to create multiple bridge domains inside a single VPLS instance.
    • Configure the most important VPLS traffic management features, including flood protection, MAC limiting, IRB interfaces, and automated Site IDs.
    • Configure hub-and-spoke VPLS topologies.
    • Configure multihomed sites in a VPLS.
    • Describe the features of Ethernet VPN, and the enhancements that EVPN brings over VPLS.
    • Explain how EVPNs advertise MAC addresses, and how they request to receive flooded traffic within a bridge domain.
    • Configure and verify a single-homed VLAN-based EVPN instance.
    • Configure and verify a single-homed VLAN-aware bundle EVI.
    • Configure a multihomed EVPN and explain the purpose of the EVPN Type 4 route.
    • Describe the features provided by EVPN Type 1 routes.
    • Describe how to use MAC Mobility and IRB interfaces in an EVPN.
    • Explain how EVPNs can tightly integrate themselves into MPLS Layer 3 VPNs to provide highly efficient forwarding.
    • Describe and configure various solutions that create MPLS VPNs between service providers.
    • Describe the circuit-cross connect pseudowire method and explain how this old method can still have value in modern networks.
    • Describe how multisegment pseudowires can create layer 2 VPNs across autonomous system boundaries.

    DAY 1

    1. Course Introduction

     

    2. Refresher—VPNs and MPLS

    • Explain the basic function and purpose of a VPN
    • Describe how MPLS uses labels to forward traffic
    • Explain the differences between MPLS layer 3 VPNs and MPLS layer 2 VPNs

     

    3. The Different Flavors of Layer 2 VPN

    • Describe the purpose and creation of pseudowires
    • Define the different technical terms relating to pseudowires
    • Describe the purpose and creation of VPLS
    • Describe the purpose, creation, and advantages of EVPN

     

    4. L2VPN, aka BGP-Signaled Pseudowires

    • Define the concept of an attachment circuit, and of pseudowire encapsulation
    • Explain the importance of route targets, route distinguishers, and Site IDs
    • Explain the control plane and data plane of an L2VPN
    • Describe the contents of an L2VPN BGP packet capture

     

    5. L2VPN—Configuration

    • Configure an L2VPN that accepts all Ethernet traffic
    • Configure an L2VPN that accepts specific VLAN tags

     

    6. L2VPN—Troubleshooting

    • Diagnose and fix L2VPN problems caused by missing LSPs, mismatched site information, and incorrect configuration

     

    7. L2VPN—Site IDs, the Label Base, and Overprovisioning

    • Explain the purpose of the Site ID and the VPN label base
    • Configure an overprovisioned L2VPN with explicit remote Site IDs
    • Configure an overprovisioned L2VPN with implicit remote Site IDs

     

    Lab 1: BGP-Signaled Layer 2 VPNs

     

    8. L2VPN—Advanced Concepts

    • Configure and verify L2VPN multihoming
    • Explain the purpose of Martini encapsulation
    • Configure VLAN normalization in an L2VPN
    • Configure out-of-band route reflection and route target constraint

     

    Lab 2: L2VPNs—Advanced Concepts

     

    9. L2Circuit—LDP-Signaled Pseudowires

    • Explain the concept of targeted LDP sessions, and the elements that L2Circuits have in common with L2VPNs
    • Configure and verify an L2Circuit
    • Describe the contents of an LDP advertisement packet capture

     

    10. L2Circuit—Troubleshooting

    • Configure the Pseudowire Status TLV
    • Explain the meaning of the most frequent L2Circuit error codes

     

    DAY 2

    11. L2Circuit—Advanced Concepts

    • Describe the purpose and benefits of virtual circuit connectivity verification
    • Configure multihoming, local switching, and interworking

    Lab 3: LDP-Signaled L2Circuits

     

     

    12. FEC 129 Pseudowires

    • Explain the way that FEC 129 autodiscovers remote PEs and signals pseudowires
    • Configure and verify a FEC 129 pseudowire

     

    Lab 4: FEC 129 Pseudowires (Optional)

     

    13. Virtual Private LAN Service—Introduction

    • Describe how a VPLS is built, and how it compares to a regular pseudowire
    • Explain how VPLS forwards traffic between multiple sites
    • Describe the BGP and LDP methods of signaling a VPLS

     

    14. VPLS—BGP Configuration and Verification

    • Configure a BGP-signaled VPLS
    • Verify a BGP-signaled VPLS

     

    15. VPLS—LDP and FEC 129 Configuration and Verification

    • Configure and verify an LDP-signaled VPLS
    • Configure and verify a FEC 129 VPLS

     

    16. VPLS—The Default VLAN Mode

    • Define the four VLAN modes for VPLS
    • Define the concept of a bridge domain, and verify the default VPLS VLAN mode

     

    17. VPLS—VLAN Normalization, VLAN-Aware Instances, and Dual-Stacked VLANs

    • Configure and verify VLAN-Aware mode
    • Configure and verify VLAN-Normalizing mode and NoVLAN mode
    • Configure and verify dual-stacked VLAN tags in VPLS

     

    18. VPLS—Advanced Features and Troubleshooting

    • Deploy automated BGP VPLS Site IDs
    • Configure flood protection, MAC flap protection, and MAC limiting
    • Explain how to add IRB interfaces to a VPLS, and configure efficient traffic flooding using multicast LSPs
    • Describe the most important VPLS-specific troubleshooting techniques

     

    19. VPLS—Multihoming

    • Configure multihomed sites in a BGP-signaled VPLS
    • Configure multihomed sites and single sites on the same PE in a BGP-signaled VPLS
    • Configure best-site multihoming in a BGP-signaled VPLS
    • Configure multihomed sites in an LDP-signaled VPLS

     

    Lab 5: VPLs

     

    Days 3

    20. EVPN—Introduction

    • Explain the main disadvantages of a VPLS solution
    • Explain how EVPN overcomes these disadvantages, and enables extra features

     

    21. EVPN—Using BGP to Advertise MACs and to Flood Traffic

    • Explain the meaning of an EVPN Instance
    • Describe how EVPN Type 2 routes advertise MAC addresses and MAC/IP bindings
    • Describe how EVPN Type 3 routes request to receive flooded traffic within a bridge domain

     

    22. EVPN—Configuring a Single-Homed VLAN-Based EVI

    • Configure a service provider network to host EVPN services
    • Configure a single-homed VLAN-based EVI
    • Verify a VLAN-based EVI

     

    23. EVPN—Configuring a Single-Homed VLAN-Aware Bundle EVI

    • Configure a VLAN-aware bundle EVI
    • Verify a VLAN-aware bundle EVI

     

    24. EVPN—Multihoming Configuration and Type 4 Routes

    • Configure a CE and two PEs to take part in a multihomed EVPN
    • Describe the contents of the Type 4 Ethernet Segment route
    • Explain how the Type 4 route prevents layer 2 loops, using the designated forwarder election

     

    25. EVPN—Multihoming Features Using Type 1 Routes

    • Describe Type 1 Ethernet Auto-Discovery Per-Ethernet Segment routes
    • Explain how Type 1 Per-Ethernet Segment routes prevent layer 2 loops
    • Describe how Type 1 Per-EVI routes are different from Per-ES routes

     

    26 EVPN—MAC Mobility and IRB Interfaces

    • Configure and verify the EVPN MAC Mobility feature
    • Configure and verify Automatic Gateway MAC-IP Synchronization
    • Configure and verify Manual Gateway MAC-IP Synchronization
    • Configure and verify EVPN Virtual Gateway Addresses

     

    Lab 6: EVPN

     

    SELF-STUDY MATERIALS

    A EVPN—Integration with L3VPNs

    • Describe the basic functionality of an L3VPN
    • Explain how EVPNs and L3VPNs integrate for optimal routing
    • Describe how chained composite next hop brings efficiency to EVPN in the Packet Forwarding Engine B Inter-AS MPLS VPNs
    • Describe the functionality of Interprovider Options A, B, and C
    • Configure and verify the Interprovider Option C method
    • Describe and configure carrier-of-carriers VPNs C Circuit Cross-Connect
    • Use circuit cross-connect to stitch pseudowires together, and to signal pseudowires that have their own pair of dedicated RSVP LSPs D Multisegment Pseudowires
    • Explain how a multisegment pseudowire is signaled
    • Configure and verify a multisegment pseudowire

     

    Lab 7: Inter-AS L2VPNs

     

    E VPLS—Hub-and-Spoke Topologies

    • Configure a hub-and-spoke BGP VPLS using route targets
    • Configure a hub-and-spoke BGP VPLS using site ranges
    • Configure a hub-and-spoke LDP VPLS using hierarchical VPLs

    Benefits individuals responsible for configuring and monitoring devices running the Junos OS in a service provider environment, in MPLS-based data centers, and in larger enterprises

    • Intermediate-level networking knowledge;
    • An understanding of OSPF, IS-IS, BGP, and Junos routing policy;
    • Experience configuring MPLS label-switched paths using Junos;
    • Completion of the following courses, or equivalent knowledge
      • Introduction to the Junos Operating System
      • Junos Service Provider Switching
      • Junos Intermediate Routing
      • Junos MPLS Fundamentals
      Datum op aanvraag

    Follow Up Courses

    Filter
    • 2 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 4 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 3 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 2 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 2 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 3 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 5 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 2 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 5 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 5 Dagen
      Datum op aanvraag
      Price on Request
      Book Now

    Know someone who´d be interested in this course?
    Let them know...

    Use the hashtag #InsoftLearning to talk about this course and find students like you on social media.