Juniper Enterprise Switching (JEX) – Lab Diagrams & Guides

Labs

Lab 1 : Implementing Layer 2 Switching

This lab demonstrates basic configuration and monitoring tasks when implementing Layer2 switching on EX Series Ethernet Switches.  In this lab, you use the command-line interface (CLI) to configure and monitor Layer2 interfaces and basic bridging operations.

Completing this lab, you will perform the following tasks:

  • Configure and verify proper operation of Layer2 network interfaces.
  • Configure and monitor some Ethernet switching elements.

Lab 2 : Implementing Virtual Networks

This lab demonstrates basic configuration and monitoring tasks when implementing virtual networks on EX Series Ethernet Switches. In this lab, you use the command-line interface (CLI) to configure and monitor VLANs and inter-VLAN routing operations.

Completing this lab, you will perform the following tasks:

  • Update the existing configuration done in Lab 1 to support VLAN trunking
  • Configure and monitor VLANs
  • Configure and monitor inter-VLAN routing

Lab 3 : Implementing Spanning Tree

This lab demonstrates basic configuration and monitoring tasks when implementing spanning tree and some related protection features on EX Series Ethernet Switches.  In this lab, you will use the command-line interface (CLI) to configure and monitor RSTP as well as bridge protocol data unit (BPDU) and loop protection.

Completing this lab, you will perform the following tasks:

  • Update the existing configuration done in Lab 2.
  • Configure and monitor RSTP (Rapid Spanning Tree)
  • Configure and monitor BPDU protection

Lab 4 : Implementing Port Security

This lab demonstrates basic configuration and monitoring tasks when implementing port security features on EX Series Ethernet Switches.  In this lab, you will use the command-line interface (CLI) to configure and monitor various port security features.

Completing this lab, you will perform the following tasks:

  • Update the existing configuration done in Lab 3.
  • Configure and monitor MAC limiting
  • Configure and monitor DHCP snooping and IP source guard

Lab 5 : Implementing Storm Control and Firewall Filters

 

Lab 6 : Implementing LAGs and RTG

 

Lab 7 : Implementing Virtual Chassis Systems