Phone : +91 9582 90 7788 | Email : sales@itmonteur.net

Register & Request Quote | Submit Support Ticket

Home » Firewall Training » Juniper Enterprise Routing and Switching Professional (JNCIP-ENT)

Juniper Enterprise Routing and Switching Professional (JNCIP-ENT)

Juniper Enterprise Routing and Switching Professional (JNCIP-ENT)

You can demonstrate your familiarity with Juniper Networks’ enterprise routing and switching products as well as networking technology in general on the Enterprise Routing and Switching track. The professional-level certification in this course, the JNCIP-ENT, is created for networking experts who have a thorough understanding of the Juniper Networks Junos OS. Your knowledge of cutting-edge routing technologies, together with your platform configuration and troubleshooting abilities, are validated by the written test.

This track includes four certifications:

  • JNCIA-Junos: Junos, Associate. For details, see JNCIA-Junos.
  • JNCIS-ENT: Enterprise Routing and Switching, Specialist. For details, see JNCIS-ENT.
  • JNCIP-ENT: Enterprise Routing and Switching, Professional. For details, see the sections below.
  • JNCIE-ENT: Enterprise Routing and Switching, Expert. For details, see JNCIE-ENT.

Juniper Enterprise Routing and Switching Professional (JNCIP-ENT)

Exam Preparation

We recommend the following resources to help you prepare for your exam. However, these resources aren’t required, and using them doesn’t guarantee you’ll pass the exam.

Recommended Training

Exam Resources

Additional Preparation

  • Advanced Junos Enterprise Routing (AJER)
  • Advanced Junos Enterprise Switching (AJEX)
  • Industry/product knowledge
  • Juniper TechLibrary
  • Juniper Learning Portal

Exam Objectives

Here’s a high-level view of the skillset required to successfully complete the JNCIP-ENT certification exam.

Exam Objective

Description

Interior Gateway Protocols (IGPs)

Describe the concepts, operation, or functionality of IGPs

  • IS-IS
  • OSPFv2 and OSPFv3
  • Routing Policy
  • Given a scenario, demonstrate knowledge of how to configure, troubleshoot, or monitor IGPs

BGP

Describe the concepts, operation, or functionality of BGP

  • BGP route selection process
  • Next hop resolution
  • BGP attributes: concept and operation
  • BGP communities
  • Load balancing – multipath, multihop, forwarding table
  • NLRI families: inet and inet6
  • Advanced BGP options

Given a scenario, demonstrate knowledge of how to configure, troubleshoot, or monitor BGP

  • Implement BGP routing policy

IP Multicast

Describe the concepts, operation, or functionality of IP multicast

  • Components of IP multicast, including multicast addressing IP multicast traffic flow
  • Any-Source Multicast (ASM) vs. Source-Specific Multicast (SSM)
  • RPF – concept and operation
  • IGMP, IGMP snooping
  • PIM sparse-mode
  • Rendezvous point (RP) – concept, operation, discovery,
  • election
  • Anycast RP
  • MSDP
  • Routing policy and scoping

Given a scenario, demonstrate knowledge of how to configure, troubleshoot, or monitor IP multicast

  • IGMP, PIM-SM (including SSM)
  • Implement IP multicast routing policy

Ethernet Switching and Spanning Tree

Describe the concepts, operation or functionality of advanced Ethernet switching

  • Filter-based VLANs
  • Private VLANs
  • Dynamic VLAN registration using MVRP
  • Tunnel Layer 2 traffic through Ethernet networks
  • Layer 2 tunneling using Q-in-Q and L2PT

Given a scenario, demonstrate knowledge of how to configure, troubleshoot, or monitor advanced Ethernet switching

  • Filter-based VLANs
  • Dynamic VLAN registration using MVRP
  • Tunnel Layer 2 traffic through Ethernet networks
  • Layer 2 tunneling using Q-in-Q and L2PT

Describe the concepts, operation, or functionality of advanced spanning tree protocols, including MSTP or VSTP.

Given a scenario, demonstrate knowledge of how to configure, troubleshoot, or monitor MSTP or VSTP.

Layer 2 Authentication and Access Control

Describe the operation of various Layer 2 authentication or access control features

  • Authentication process flow
  • 802.1x – concepts and functionality
  • MAC RADIUS
  • Captive portal
  • Server fail fallback
  • Guest VLAN
  • Considerations when using multiple authentication/access control methods

Given a scenario, demonstrate how to configure, troubleshoot, or monitor Layer 2 authentication or access control.

IP Telephony Features

Describe the concepts, operation or functionality of features that facilitate IP telephony deployments

  • Power over Ethernet (PoE)
  • LLDP and LLDP-MED
  • Voice VLAN

Given a scenario, demonstrate how to configure, troubleshoot, or monitor features used to support IP telephony deployments.

Class of service (CoS)

Describe the concepts, operation, or functionality of Junos CoS for Layer 2/3 networks

  • CoS processing on Junos devices
  • CoS header fields
  • Forwarding classes
  • Classification
  • Packet loss priority
  • Policers
  • Schedulers
  • Drop profiles
  • Shaping
  • Rewrite rules

Given a scenario, demonstrate knowledge of how to configure, troubleshoot, or monitor CoS for Layer 2 or 3 networks.

EVPN

Describe the concepts, operation, or functionality of Junos EVPN

  • Route types (e.g., Type 1, 2 3)
  • VXLAN
  • Multi-homing (e.g., active route types)

Given a scenario, demonstrate knowledge of how to configure, troubleshoot, or monitor EVPN.

Sales Number : +91 9582 90 7788
Support Number : +91-9654016484
Sales Email : sales@itmonteur.net
Support Email : support@itmonteur.net

Register & Request Quote
Submit Support Ticket

 

Information Security - InfoSec - Cyber Security - Firewall Providers Company in India

 

What is Firewall? A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.

 

Secure your network at the gateway against threats such as intrusions, Viruses, Spyware, Worms, Trojans, Adware, Keyloggers, Malicious Mobile Code (MMC), and other dangerous applications for total protection in a convenient, affordable subscription-based service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services. Stateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols.

 

Firewall Firm is an IT Monteur Firewall Company provides Managed Firewall Support, Firewall providers , Firewall Security Service Provider, Network Security Services, Firewall Solutions India , New Delhi - India's capital territory , Mumbai - Bombay , Kolkata - Calcutta , Chennai - Madras , Bangaluru - Bangalore , Bhubaneswar, Ahmedabad, Hyderabad, Pune, Surat, Jaipur, Firewall Service Providers in India

Sales Number : +91 9582 90 7788 | Support Number : +91-9654016484
Sales Email : sales@itmonteur.net | Support Email : support@itmonteur.net

Register & Request Quote | Submit Support Ticket