Examens: Juniper Enterprise Routing and Switching Professional (JNCIP-ENT) (JN0-648)
- Prix: EUR570,00
- Réf.: JN0-648
Descriptif
TopBon à savoir
TopJNCIP-ENT exam topics are based on the content of the recommended instructor-led training courses, as well as additional resources.
- Exam code: JN0-648
- Written exam
- Administered by Pearson VUE
- Exam length: 120 minutes
- Exam type: 65 multiple-choice questions
- Pass/fail status is available immediately
- Software Release:
- Junos Software: 19.3
Objectifs
TopProgramme
TopDescribe the concepts, operation, or functionality of Interior Gateway Protocols (IGPs)
- IS-IS
- OSPFv2 and OSPFv3
- Routing Policy
- Given a scenario, demonstrate knowledge of how to configure, troubleshoot, or monitor IGPs
Describe the concepts, operation, or functionality of BGP
- BGP route selection process
- Next hop resolution
- BGP attributes: concept and operation
- BGP communities
- Regular expressions
- Load balancing - multipath, multihop, forwarding table
- NLRI families: inet and inet6
- Advanced BGP options
- Given a scenario, demonstrate knowledge of how to configure, troubleshoot, or monitor BGP
- Implement BGP routing policy
Describe the concepts, operation, or functionality of IP multicast
- Components of IP multicast, including multicast addressing
- IP multicast traffic flow
- Any-Source Multicast (ASM) vs. Source-Specific Multicast (SSM)
- RPF: concept and operation
- IGMP and IGMP snooping
- PIM dense-mode and sparse-mode
- Rendezvous point (RP): concept, operation, discovery, and election
- SSM: requirements, benefits, address ranges
- Anycast RP
- MSDP
- Routing policy and scopingGiven a scenario, demonstrate knowledge of how to configure, troubleshoot, or monitor IP multicast
- IGMP, PIM-DM, or PIM-SM (including SSM)
- Implement IP multicast routing policy
Describe the concepts, operation, or functionality of advanced Ethernet switching
- Filter-based VLANs
- Private VLANs
- Dynamic VLAN registration using MVRP
- Tunnel Layer 2 traffic through Ethernet networks
- Junos Fusion Enterprise
- Layer 2 tunneling using Q-in-Q and L2PT
- Given a scenario, demonstrate knowledge of how to configure, troubleshoot, or monitor advanced Ethernet switching
- Filter-based VLANs
- Private VLANs
- Dynamic VLAN registration using MVRP
- Tunnel Layer 2 traffic through Ethernet networks
- Junos Fusion Enterprise
- Layer 2 tunneling using Q-in-Q and L2PT
- Describe the concepts, operation, or functionality of advanced spanning tree protocols, including MSTP or VSTP
- Given a scenario, demonstrate knowledge of how to configure, troubleshoot, or monitor MSTP or VSTP
Describe the operation of various Layer 2 authentication or access control features
- Authentication process flow
- 802.1x: concepts and functionality
- MAC RADIUS
- Captive portal
- Server fail fallback
- Guest VLAN
- Considerations when using multiple authentication/access control methods
- Given a scenario, demonstrate how to configure, troubleshoot, or monitor Layer 2 authentication or access control
Describe the concepts, operation, or functionality of features that facilitate IP telephony deployments
- Power over Ethernet (PoE)
- LLDP and LLDP-MED
- Voice VLAN
- Given a scenario, demonstrate how to configure, troubleshoot, or monitor features used to support IP telephony deployments
Describe the concepts, operation, or functionality of Junos CoS for Layer 2 or 3 networks
- CoS processing on Junos devices
- CoS header fields
- Forwarding classes
- Classification
- Packet loss priority
- Policers
- Schedulers
- Drop profiles
- Shaping
- Rewrite rules
- Given a scenario, demonstrate knowledge of how to configure, troubleshoot, or monitor CoS for Layer 2 or 3 networks
Describe the concepts, operation, or functionality of Junos EVPN
- VXLAN
- Multi-homing (for example, active route types)
- Given a scenario, demonstrate knowledge of how to configure, troubleshoot, or monitor EVPN
Formations associées
Haut de page- /fr-fr/-/media/global-knowledge/merchandising/right-side-column/fr/reviews/review-juniper.png #000000
- <table style="width: 100%; border-collapse: collapse; border-style: solid; border-color: #141c36; float: left;" border="3" cellspacing="2" cellpadding="5" data-mce-style="width: 100%; border-collapse: collapse; border-style: solid; border-color: #141c36; float: left;"><tbody><tr><td style="width: 100%;" data-mce-style="width: 100%;"><p style="text-align: left;" data-mce-style="text-align: left;"><strong><span style="color: #141c36;" data-mce-style="color: #141c36;">Délais d’inscription</span></strong></p><hr /><p style="text-align: left;" data-mce-style="text-align: left;">Avant le début de la formation <strong>jusqu’à 5 jours ouvrés sous réserve de disponibilité </strong>sauf dans le cas d'un financement <a title="compte CPF" href="https://www.globalknowledge.com/fr-fr/formations/compte-personnel-de-formation-cpf" data-mce-href="https://www.globalknowledge.com/fr-fr/formations/compte-personnel-de-formation-cpf">CPF,</a> jusqu'à 11 jours ouvrés. <a rel="noopener noreferrer" title="formations éligibles CPF" href="mailto:cpf@globalknowledge.fr" target="_blank" rel="noopener noreferrer" data-mce-href="mailto:cpf@globalknowledge.fr">Contactez-nous</a> pour connaître les formations éligibles.</p></td></tr></tbody></table><p><br /></p>
- #000000
- /fr-fr/-/media/global-knowledge/merchandising/right-side-column/emea/gk-polaris/gk-polaris-accelerate-cybersecurity.png https://www.globalknowledge.com/fr-fr/products/abonnement/pl-accelerate #000000
- /fr-fr/-/media/global-knowledge/merchandising/right-side-column/emea/gk-polaris/gk-polaris-accelerate-cloud.png https://www.globalknowledge.com/fr-fr/products/abonnement/pl-accelerate #000000
- /fr-fr/-/media/global-knowledge/merchandising/right-side-column/fr/federacion-francaise-de-la-cybersecurite.png #000000
- #000000