New Training: Explore and Configure Junos Tunneling Technologies
In this 10-video skill, CBT Nuggets trainer Knox Hutchinson explores how to describe and configure tunneling technologies such as IP-IP and GRE on Junos devices. Watch this new Juniper training.
Learn with one of these courses:
This training includes:
- 10 videos
- 1.3 hours of training
You’ll learn these topics in this skill:
- The Point of Tunnels
- Enable Tunneling on MX Routers
- Configure an IP-IP Tunnel
- The GRE Protocol Explored
- Configure GRE Tunnels
- Enable an IGP Over GRE
- Tunnel IPv6 Over IPv4 Using GRE
- Tunnel Frames Over GRE
- Tunnel MPLS Over GRE
- Summarizing Tunnels
How Does Tunneling Working Within The Juniper Networks Solutions
When sending data between network-connected devices or between locations, ensuring the data is transmitted in a safe and secure manner is extremely important. Tunneling is one primary method to assure data security in transmitting data through establishing a secure private path through otherwise private networks. These "tunnels" connect arbitrary private networks in creating an encrypted channel for data to transmit through.
This tunneling strategy is the foundation of a secure location to location data transmission so it’s only reasonable that end-to-end IT solutions such as Juniper Networks design their solutions with security strategies in mind. For instance, within the Juniper SRX Services devices, Juniper provides various tunnel interface types that are supported when looking to establish secure data transmission. With Juniper Networks, organizations not only benefit from a holistic end-to-end IT infrastructure but also one that’s designed with secure data transfer in mind.