Juniper Networks JNCIA-Junos (JN0-102): Junos Configuration Basics

In this course, you’ll learn about the main configuration elements for Junos devices and how to configure the basic parameters required in order to get a Juniper network device up and running.
Course info
Rating
(10)
Level
Beginner
Updated
Jan 16, 2018
Duration
1h 58m
Table of contents
Description
Course info
Rating
(10)
Level
Beginner
Updated
Jan 16, 2018
Duration
1h 58m
Description

In order to get Junos network devices up and running you need to learn about the main configuration elements for Junos devices and how to configure the basic parameters of a Junos network. In this course, Juniper Networks JNCIA-Junos (JN0-102): Junos Configuration Basics, you will first learn about the default state and configuration that you will find on a Junos device when it has been powered on for the first time. Then, you'll look at how to get the device up and running with some initial configuration tasks. Next, you will explore user authentication and the types of user accounts and classes that can be set up on a Junos device and how to configure them. After that, you will learn about the different interface types, what their function is, and how to configure them, including using configuration groups. Finally, you will learn about the different types of log files that are generated on a Juniper device and how to access them. You will also look at how to enable trace options to help troubleshoot problems on a network. Throughout the course you will get hands-on and configure all of this in your lab environment. When you’re finished with this course, you will have taken another step towards gaining Juniper Networks JNCIA-Junos certification, one of the most sought after in the industry.

About the author
About the author

Rich Bibby is a Network Engineer with extensive experience in designing, deploying and supporting enterprise networks of varying size and scale. Areas of expertise include Campus LAN, WAN, Data Center, VPN, and Remote Access solutions from vendors including Juniper, Cisco, Arista, Checkpoint, and Pulse Secure.

More from the author
More courses by Rich Bibby