Juniper Enterprise Switching (JEX) – Lab Diagrams & Guides
Labs
Lab 1 : Implementing Layer 2 Switching
This lab demonstrates basic configuration and monitoring tasks when implementing Layer2 switching on EX Series Ethernet Switches. In this lab, you use the command-line interface (CLI) to configure and monitor Layer2 interfaces and basic bridging operations.
Completing this lab, you will perform the following tasks:
- Configure and verify proper operation of Layer2 network interfaces.
- Configure and monitor some Ethernet switching elements.
Lab 2 : Implementing Virtual Networks
This lab demonstrates basic configuration and monitoring tasks when implementing virtual networks on EX Series Ethernet Switches. In this lab, you use the command-line interface (CLI) to configure and monitor VLANs and inter-VLAN routing operations.
Completing this lab, you will perform the following tasks:
- Update the existing configuration done in Lab 1 to support VLAN trunking
- Configure and monitor VLANs
- Configure and monitor inter-VLAN routing
Lab 3 : Implementing Spanning Tree
This lab demonstrates basic configuration and monitoring tasks when implementing spanning tree and some related protection features on EX Series Ethernet Switches. In this lab, you will use the command-line interface (CLI) to configure and monitor RSTP as well as bridge protocol data unit (BPDU) and loop protection.
Completing this lab, you will perform the following tasks:
- Update the existing configuration done in Lab 2.
- Configure and monitor RSTP (Rapid Spanning Tree)
- Configure and monitor BPDU protection
Lab 4 : Implementing Port Security
This lab demonstrates basic configuration and monitoring tasks when implementing port security features on EX Series Ethernet Switches. In this lab, you will use the command-line interface (CLI) to configure and monitor various port security features.
Completing this lab, you will perform the following tasks:
- Update the existing configuration done in Lab 3.
- Configure and monitor MAC limiting
- Configure and monitor DHCP snooping and IP source guard
Lab 5 : Implementing Storm Control and Firewall Filters
Lab 6 : Implementing LAGs and RTG