Junos Layer 2 VPNs

  • Duration: 3 Days (24 Hours)
  • Certified Trainers
  • Practice Labs
  • Digital Courseware
  • Access to the Recordings
  • Experience 24*7 Learner Support.

Download Course Brochure

Please enable JavaScript in your browser to complete this form.

Junos Layer 2 VPNs Training Course Overview

This intensive three-day course is tailored to equip students with the skills to configure and troubleshoot MPLS-based Layer 2 virtual private networks (VPN). Delving into MPLS Layer 2 VPN concepts, the curriculum covers BGP Layer 2 VPNs, LDP Layer 2 circuits, forwarding equivalence class (FEC) 129, virtual private LAN service (VPLS), Ethernet VPN (EVPN), and Inter-AS MPLS VPNs. With a focus on Junos OS-specific implementations, including Layer 2 VPN instances, VPLS, and EVPNs, the course ensures a comprehensive understanding. Leveraging Junos OS Release 21.4R1.12, participants engage in hands-on labs for extensive CLI configuration practice, encountering common errors and mastering troubleshooting steps.

Intended Audience For Junos Layer 2 VPNs Training

  • Network Engineers and Administrators
  • Network Architects
  • Service Provider Personnel
  • Telecommunications Professionals
  • System Integrators
  • Network Designers
  • IT Managers and Decision-Makers
  • Network Security Professionals

Learning objectives for the Junos Layer 2 VPNs training course

  • Describe some of the different kinds of VPNs, their mechanics, and their use cases.
  • Describe the types of MPLS VPN that operate at layer 2.
  • Describe the mechanics of BGP-signaled pseudowires, also known as L2VPNs.
  • Configure BGP-signaled L2VPNs with Ethernet and Ethernet-VLAN encapsulations.
  • Demonstrate how to troubleshoot some of the most common BGP-signaled L2VPN
    configuration problems.
  • Describe how BGP-signaled L2VPNs use a block of labels to bring efficiency to
    huband-spoke advertisements.
  • Configure advanced BGP-signaled L2VPN features, such as multihoming, VLAN
    normalization, and route target constraint.
  • Describe the mechanics of LDP-signaled pseudowires, also known as Layer 2
    Circuits.
  • Describe the causes and solutions of some of the most common L2Circuit
    configuration problems.
  • Configure advanced LDP-signaled L2Circuit features, such as multihoming and local
    switching.
  • Explain how the FEC 129 pseudowire method combines BGP for autodiscovery and
    LDP for signaling.
  • Describe the purpose and mechanics of a VPLS.
  • Create a VPLS instance that is signaled using BGP and demonstrate the commands
    that verify its status.
  • Create VPLS instances that are signaled using LDP and FEC 129 and demonstrate
    the commands available to verify their status.
  • Describe how mismatched VLAN tags are handled in a default VPLS configuration.
  • Configure a VPLS to swap mismatched VLAN tags automatically, and to create
    multiple bridge domains inside a single VPLS instance.
  • Configure the most important VPLS traffic management features, including flood
    protection, MAC limiting, IRB interfaces, and automated Site IDs.
  • Configure hub-and-spoke VPLS topologies.
  • Configure multihomed sites in a VPLS.
  • Describe the features of Ethernet VPN, and the enhancements that EVPN brings
    over VPLS.
  • Explain how EVPNs advertise MAC addresses, and how they request to receive
    flooded traffic within a bridge domain.
  • Configure and verify a single-homed VLAN-based EVPN instance.
  • Configure and verify a single-homed VLAN-aware bundle EVI.
  • Configure a multihomed EVPN and explain the purpose of the EVPN Type 4 route.
  • Describe the features provided by EVPN Type 1 routes.
  • Describe how to use MAC Mobility and IRB interfaces in an EVPN.
  • Explain how EVPNs can tightly integrate themselves into MPLS Layer 3 VPNs to
    provide highly efficient forwarding.

Enquire Now

Please enable JavaScript in your browser to complete this form.

Benefits of taaking the Junos Layer 2 VPNs training

  • Comprehensive Understanding:
    • Gain a comprehensive understanding of Layer 2 VPN concepts, protocols, and configurations within the Junos operating system.
  • Practical Configuration Skills:
    • Develop practical skills in configuring and managing Layer 2 VPNs using Juniper devices, including routers and switches.
  • Troubleshooting Expertise:
    • Acquire troubleshooting skills specific to Layer 2 VPNs, enabling effective identification and resolution of issues in real-world scenarios.
  • Optimized Network Performance:
    • Learn techniques for optimizing and scaling Layer 2 VPN deployments, ensuring efficient and reliable network performance.
  • Junos OS-Specific Implementations:
    • Understand the nuances of Junos OS implementations related to Layer 2 VPNs, ensuring alignment with Juniper’s networking ecosystem.
  • Hands-On Labs:
    • Engage in hands-on labs and practical exercises that reinforce theoretical concepts, providing valuable experience in configuring and managing Layer 2 VPNs.
  • Interconnected Site Solutions:
    • Explore solutions for connecting geographically dispersed sites using Layer 2 VPNs, facilitating seamless communication.
  • Multiple Layer 2 VPN Types:
    • Gain knowledge of various Layer 2 VPN types, such as Virtual Private LAN Service (VPLS) and Ethernet VPN (EVPN), expanding the scope of application scenarios.
  • Security Considerations:
    • Understand security considerations and best practices for Layer 2 VPN deployments, ensuring the integrity and confidentiality of transmitted data.
  • Stay Current with Juniper Technologies:
    • Stay informed about the latest advancements in Juniper networking technologies, ensuring that skills remain relevant in evolving networking environments.
  • Preparation for Certifications:
    • The training may serve as excellent preparation for relevant Juniper certifications, validating expertise in Layer 2 VPNs.

Junos Layer 2 VPNs Training Course Modules

Module 1: Course Introduction

  • Overview of the course and its objectives.

Module 2: Refresher—VPNs and MPLS

  • Explanation of the basic function and purpose of a VPN.
  • Description of how MPLS uses labels to forward traffic.
  • Explanation of the differences between MPLS layer 3 VPNs and MPLS layer 2 VPNs.

Module 3: The Different Flavors of Layer 2 VPN

  • Description of the purpose and creation of pseudowires.
  • Definition of different technical terms relating to pseudowires.
  • Description of the purpose and creation of VPLS.
  • Description of the purpose, creation, and advantages of EVPN.

Module 4: L2VPN, aka BGP-Signaled Pseudowires

  • Definition of the concept of an attachment circuit, and pseudowire encapsulation.
  • Explanation of the importance of route targets, route distinguishers, and Site IDs.
  • Explanation of the control plane and data plane of an L2VPN.
  • Description of the contents of an L2VPN BGP packet capture.

Module 5: L2VPN—Configuration

  • Configuration of an L2VPN that accepts all Ethernet traffic.
  • Configuration of an L2VPN that accepts specific VLAN tags.

Module 6: L2VPN—Troubleshooting

  • Diagnosis and fixing of L2VPN problems caused by missing LSPs, mismatched site information, and incorrect configuration.

Module 7: L2VPN—Site IDs, the Label Base, and Overprovisioning

  • Explanation of the purpose of the Site ID and the VPN label base.
  • Configuration of an overprovisioned L2VPN with explicit remote Site IDs.
  • Configuration of an overprovisioned L2VPN with implicit remote Site IDs.
  • Lab 1: BGP-Signaled Layer 2 VPNs.

Module 8: L2VPN—Advanced Concepts

  • Configuration and verification of L2VPN multihoming.
  • Explanation of the purpose of Martini encapsulation.
  • Configuration of VLAN normalization in an L2VPN.
  • Configuration of out-of-band route reflection and route target constraint.
  • Lab 2: L2VPNs—Advanced Concepts.

Module 9: L2Circuit—LDP-Signaled Pseudowires

  • Explanation of the concept of targeted LDP sessions and elements common with L2VPNs.
  • Configuration and verification of an L2Circuit.
  • Description of the contents of an LDP advertisement packet capture.

Module 10: L2Circuit—Troubleshooting

  • Configuration of the Pseudowire Status TLV.
  • Explanation of the meaning of the most frequent L2Circuit error codes.

Module 11: L2Circuit—Advanced Concepts

  • Description of the purpose and benefits of virtual circuit connectivity verification.
  • Configuration of multihoming, local switching, and interworking.
  • Lab 3: LDP-Signaled L2Circuits.

Module 12: FEC 129 Pseudowires

  • Explanation of how FEC 129 autodiscovers remote PEs and signals pseudowires.
  • Configuration and verification of a FEC 129 pseudowire.
  • Lab 4: FEC 129 Pseudowires (Optional).

Module 13: Virtual Private LAN Service—Introduction

  • Description of how a VPLS is built and how it compares to a regular pseudowire.
  • Explanation of how VPLS forwards traffic between multiple sites.
  • Description of the BGP and LDP methods of signaling a VPLS.

Module 14: VPLS—BGP Configuration and Verification

  • Configuration of a BGP-signaled VPLS.
  • Verification of a BGP-signaled VPLS.

Module 15: VPLS—LDP and FEC 129 Configuration and Verification

  • Configuration and verification of an LDP-signaled VPLS.
  • Configuration and verification of a FEC 129 VPLS.

Module 16: VPLS—The Default VLAN Mode

  • Definition of the four VLAN modes for VPLS.
  • Definition of the concept of a bridge domain and verification of the default VPLS VLAN mode.

Module 17: VPLS—VLAN Normalization, VLAN-Aware Instances, and Dual-Stacked VLANs

  • Configuration and verification of VLAN-Aware mode.
  • Configuration and verification of VLAN-Normalizing mode and NoVLAN mode.
  • Configuration and verification of dual-stacked VLAN tags in VPLS.

Module 18: VPLS—Advanced Features and Troubleshooting

  • Deployment of automated BGP VPLS Site IDs.
  • Configuration of flood protection, MAC flap protection, and MAC limiting.
  • Explanation of adding IRB interfaces to a VPLS and configuring efficient traffic flooding using multicast LSPs.
  • Description of the most important VPLS-specific troubleshooting techniques.
  • Lab 5: VPLS.

Module 19: VPLS—Multihoming

  • Configuration of multihomed sites in a BGP-signaled VPLS.
  • Configuration of multihomed sites and single sites on the same PE in a BGP-signaled VPLS.
  • Configuration of best-site multihoming in a BGP-signaled VPLS.
  • Configuration of multihomed sites in an LDP-signaled VPLS.
  • Lab 6: EVPN.

Module 20: EVPN—Introduction

  • Explanation of the main disadvantages of a VPLS solution.
  • Explanation of how EVPN overcomes these disadvantages and enables extra features.

Module 21: EVPN—Using BGP to Advertise MACs and to Flood Traffic

  • Explanation of the meaning of an EVPN Instance.
  • Description of how EVPN Type 2 routes advertise MAC addresses and MAC/IP bindings.
  • Description of how EVPN Type 3 routes request to receive flooded traffic within a bridge domain.

Module 22: EVPN—Configuring a Single-Homed VLAN-Based EVI

  • Configuration of a service provider network to host EVPN services.
  • Configuration of a single-homed VLAN-based EVI.
  • Verification of a VLAN-based EVI.

Module 23: EVPN—Configuring a Single-Homed VLAN-Aware Bundle EVI

  • Configuration of a VLAN-aware bundle EVI.
  • Verification of a VLAN-aware bundle EVI.

Module 24: EVPN—Multihoming Configuration and Type 4 Routes

  • Configuration of a CE and two PEs to take part in a multihomed EVPN.
  • Description of the contents of the Type 4 Ethernet Segment route.
  • Explanation of how the Type 4 route prevents layer 2 loops, using the designated forwarder election.

Module 25: EVPN—Multihoming Features Using Type 1 Routes

  • Description of Type 1 Ethernet Auto-Discovery Per-Ethernet Segment routes.
  • Explanation of how Type 1 Per-Ethernet Segment routes prevent layer 2 loops.
  • Description of how Type 1 Per-EVI routes are different from Per-ES routes.

Module 26: EVPN—MAC Mobility and IRB Interfaces

  • Configuration and verification of the EVPN MAC Mobility feature.
  • Configuration and verification of Automatic Gateway MAC-IP Synchronization.
  • Configuration and verification of Manual Gateway MAC-IP Synchronization.
  • Configuration and verification of EVPN Virtual Gateway Addresses.
  • Lab 6: EVPN.

Module A: EVPN—Integration with L3VPNs

  • Description of the basic functionality of an L3VPN.
  • Explanation of how EVPNs and L3VPNs integrate for optimal routing.
  • Description of how chained composite next hop brings efficiency to EVPN in the Packet Forwarding Engine.

Module B: Inter-AS MPLS VPNs

  • Description of the functionality of Interprovider Options A, B, and C.
  • Configuration and verification of the Interprovider Option C method.
  • Description and configuration of carrier-of-carriers VPNs.

Module C: Circuit Cross-Connect

  • Use of circuit cross-connect to stitch pseudowires together and to signal pseudowires that have their own pair of dedicated RSVP LSPs.

Module D: Multisegment Pseudowires

  • Explanation of how a multisegment pseudowire is signaled.
  • Configuration and verification of a multisegment pseudowire.
  • Lab 7: Inter-AS L2VPNs.

Module E: VPLS—Hub-and-Spoke Topologies

  • Configuration of a hub-and-spoke BGP VPLS using route targets.
  • Configuration of a hub-and-spoke BGP VPLS using site ranges.
  • Configuration of a hub-and-spoke LDP VPLS using hierarchical VPLS.

Junos Layer 2 VPNs Training Course Prerequisites

  • Intermediate-level networking knowledge;
  • An understanding of OSPF, IS-IS, BGP, and
    Junos routing policy;
  • Experience configuring MPLS label-switched
    paths using Junos;
  • Completion of the following courses, or
    equivalent knowledge
    o Introduction to the Junos Operating System
    o Junos Service Provider Switching
    o Junos Intermediate Routing
    o Junos MPLS Fundamentals

Discover the perfect fit for your learning journey

Choose Learning Modality For Junos Layer 2 VPNs Training

Live Online

  • Convenience
  • Cost-effective
  • Self-paced learning
  • Scalability

Classroom

  • Interaction and collaboration
  • Networking opportunities
  • Real-time feedback
  • Personal attention

Onsite

  • Familiar environment
  • Confidentiality
  • Team building
  • Immediate application

Don’t Just Take Our Word for It

Read what our satisfied clients have to say about their transformative experiences

Got more questions? We’re all ears and ready to assist!

Request More Details About Junos Layer 2 VPNs Training

Please enable JavaScript in your browser to complete this form.

Subscribe to our Newsletter

Please enable JavaScript in your browser to complete this form.
×