Start with 7 free days of training.

Gain instant access to our entire IT training library, free for your first week.
Train anytime on your desktop, tablet, or mobile devices.

Enterprise Routing and Switching, Specialist

This CBT Nuggets course is the second of seven courses designed to fully prepare you for the JNCIS-ENT(JN0-343) exam. These courses are:...
This CBT Nuggets course is the second of seven courses designed to fully prepare you for the JNCIS-ENT(JN0-343) exam. These courses are: This JNCIS-ENT(JN0-343) - Layer 2 course completely prepares you for the following topics:
  • Identify the concepts, operation, and benefits of many different Layer 2 security functions
  • Identify the concepts, benefits, and operation of Layer 2 firewall filters
  • Demonstrate knowledge of how to configure, monitor and troubleshoot Layer 2 security features
NOTE: This course is also valuable for those interested in learning Layer 2 security topics that are using other vendor equipment. Juniper-specific Nuggets are clearly labeled as such.

Recommended Experience
  • Students interested in taking this certification exam must have passed their JNCIA-Junos certification
Recommended Equipment
  • Junosphere or other virtual Juniper training equipment
  • Juniper rental rack access
  • Juniper lab routers and switches
Related Certifications
  • JNCIS-ENT Enterprise Routing and Switching, Specialist
Related Job Functions
  • Enterprise Network Engineer
  • Enterprise Network Administrator
Anthony Sequeira has been a CBT Nuggets trainer since 2012 and holds a variety of Juniper, Cisco, and Microsoft certifications, including CCIE R&S. His JNCIA-Junos course remains one of the top-rated courses in the CBT Nuggets library.
 show less
1. Course Introduction (4 min)
2. How to Master this Material (5 min)
3. STP Protections (12 min)
4. Hands-on Lab: STP Protections (13 min)
5. MAC Limiting and Persistent MAC Learning (8 min)
6. Hands-on Lab: MAC Limiting (8 min)
7. DHCP Snooping (8 min)
8. Hands-on Lab: DHCP Snooping (8 min)
9. DAI and IP Source Guard (4 min)
10. Hands-on Lab: DAI and IP Source Guard (5 min)
11. Storm Control (3 min)
12. Hands-on Lab: Storm Control (5 min)
13. Layer 2 Firewall Features (12 min)
14. Hands-on Lab: Layer 2 Firewall Filters (14 min)
15. Using Juniper Website Tools (5 min)
16. Using the Junosphere Cloud Lab Tools (8 min)

Course Introduction


When it comes to network security, so many threats from so many potential individuals, so little time. We need to engage in what I like to call a defense in depth strategy. And others like to call it that, too. And one great way to do that is to add, obviously, tons of physical security Layer 1.


But then when we move up to Layer 2 of the OSI model, let's go ahead and make sure we do a ton of security mechanisms, as well. That's what this course is all about. And let me give you more information about what's inside this course for you. Now I'm sure you know this, but just a quick reminder, this course right here that we're working with is actually part of a larger body of courses all mapping to the JNCIS-ENT that's, the JN zero-343 3 exam from Juniper.


But of course the beauty of this is, if you have no interest in certification, maybe you don't even have an interest in Juniper, really and how they implement things, you can go through the theory Nuggets for all of these courses and make sure you know these protocols and processes that we'll be discussing.


By the way, that's protocol independent routing in that section. And this grouping of topics is so hugely important, as you can clearly see, when it comes to making networks operate very efficiently and effectively today. This is core routing and switching knowledge that all network engineers should possess, in my opinion.


So perhaps you enjoyed the 20 Nuggets that we did together on Layer 2. But we didn't elaborate on Layer 2 security mechanisms. That's what we'll do together here. So when we look at security functions at Layer 2, we talked a lot about Spanning Tree Protocol and Rapid Spanning Tree Protocol in our section called Layer 2, that Layer 2 course.


But what about security mechanisms for such things? They exist. They're hugely powerful. And we'll examine them. We'll examine things like storm control, and port security, and Mac limiting, and all kinds of incredible tools that can be used at Layer 2, of course.


Well then take a look at Layer 2 firewall filters and notice for all of the topics that we discuss, we will have hands on labs so that we can demonstrate our knowledge of configuring, monitoring, and troubleshooting these various Layer 2 security functions that we can implement.


So it's worth emphasizing there will be distinct hands on Nuggets, which focus, of course, on Juniper configurations. These will be separate and distinct from what I like to call theory Nuggets, because they apply to any discipline. When you look at something like port security, many vendors offer this.


So we can discuss it from a theoretical perspective and then a hands on Nugget will implement this in the Juniper environment. So theory and hands on are going to combine to make this awesome. You have told me how much you love two extra ingredients that I've been including and courses, and that is electronic flash cards.


In the next Nugget, I will show you how you use them if you don't know. And you've also told me how you love how I throw in those occasional pop quizzes. In fact, I always hear feedback of more pop quizzes, more pop quizzes. So that's always on my mind.


I'm always trying to give you more of those as time will allow. We'll do that together in this course. For those of you interested in certification, I try and mirror, as closely as possible, how you would see things phrased and worked in the certification exam.


For those of you that aren't interested in certification at all, you're going to love the pop quizzes just to really solidify that you're mastering the content as we go through it. Well I sure hope you're excited like I am to jump into this content. We're going to be learning mechanisms, security mechanisms specifically, for Layer 2 specifically, that could save your entire day, week, year, you name it.


And could prevent attacks that could potentially cost our enterprise millions or even billions of dollars. Well I sure hope this course introduction was informative for you, and I'd like to thank you for viewing.

How to Master this Material

STP Protections

Hands-on Lab: STP Protections

MAC Limiting and Persistent MAC Learning

Hands-on Lab: MAC Limiting

DHCP Snooping

Hands-on Lab: DHCP Snooping

DAI and IP Source Guard

Hands-on Lab: DAI and IP Source Guard

Storm Control

Hands-on Lab: Storm Control

Layer 2 Firewall Features

Hands-on Lab: Layer 2 Firewall Filters

Using Juniper Website Tools

Using the Junosphere Cloud Lab Tools

Please help us improve by sharing your feedback on training courses and videos. For customer service questions, please contact our support team. The views expressed in comments reflect those of the author and not of CBT Nuggets. We reserve the right to remove comments that do not adhere to our community standards.

comments powered by Disqus
Intermediate 2 hrs 16 videos


Training Features

Practice Exams
These practice tests help you review your knowledge and prepare you for exams.

Virtual Lab
Use a virtual environment to reinforce what you are learning and get hands-on experience.

Offline Training
Our iOS and Android mobile apps offer the ability to download videos and train anytime, anywhere offline.

Accountability Coaching
Develop and maintain a study plan with one-to-one assistance from coaches.

Supplemental Files
Files/materials that supplement the video training.

Speed Control
Play videos at a faster or slower pace.

Included in this course
Pick up where you left off watching a video.

Included in this course
Jot down information to refer back to at a later time.

Closed Captions
Follow what the trainers are saying with ease.
Anthony Sequeira
Nugget trainer since 2012