New Training: Explore and Configure Junos Tunneling Technologies
In this 10-video skill, CBT Nuggets trainer Knox Hutchinson explores how to describe and configure tunneling technologies such as IP-IP and GRE on Junos devices. Watch this new Juniper training.
Learn with one of these courses:
This training includes:
1.3 hours of training
You’ll learn these topics in this skill:
The Point of Tunnels
Enable Tunneling on MX Routers
Configure an IP-IP Tunnel
The GRE Protocol Explored
Configure GRE Tunnels
Enable an IGP Over GRE
Tunnel IPv6 Over IPv4 Using GRE
Tunnel Frames Over GRE
Tunnel MPLS Over GRE
How Does Tunneling Working Within The Juniper Networks Solutions
When sending data between network-connected devices or between locations, ensuring the data is transmitted in a safe and secure manner is extremely important. Tunneling is one primary method to assure data security in transmitting data through establishing a secure private path through otherwise private networks. These "tunnels" connect arbitrary private networks in creating an encrypted channel for data to transmit through.
This tunneling strategy is the foundation of a secure location to location data transmission so it’s only reasonable that end-to-end IT solutions such as Juniper Networks design their solutions with security strategies in mind. For instance, within the Juniper SRX Services devices, Juniper provides various tunnel interface types that are supported when looking to establish secure data transmission. With Juniper Networks, organizations not only benefit from a holistic end-to-end IT infrastructure but also one that’s designed with secure data transfer in mind.
delivered to your inbox.