Juniper Networks
We believe the network is the single greatest vehicle for knowledge, collaboration, and human advancement that the world has ever known. Now more than ever, the world relies on high-performance networks. And now more than ever, the world needs network innovation to unleash our full potential.
Every day, Juniper Networks is helping our customers build the best networks on the planet. Every innovation we envision, every technology we create is informed by our desire to help solve our customers’ toughest challenges so they can compete and thrive today and into the future.
For more information, visit our website www.juniper.net
-
16:05 Popular
QFabric Solution Revenue Port Layout
Added 208 Views / 0 LikesThe QFabric Solution Revenue Port Layout Learning Byte briefly describes the supported interface types and speeds on the QFX3600 switch and shows you how to configure them, both in standalone and Fabric mode. Presenter: Gerben Camp, Technical Instructor R
-
08:41 Popular
Basic OSPFv2 Configuration
Added 364 Views / 0 LikesThe Basic OSPFv2 Configuration Learning Byte explains the initial steps to enable OSPFv2 on devices running the Junos OS. With a short lecture followed by a demonstration, this Byte is appropriate for new users, or anyone looking to learn about enabling O
Featured -
11:59 Popular
OSPFv2 Authentication
Added 251 Views / 0 LikesThe OSPFv2 Authentication Learning Byte explains the options and functionality of OSPFv2 authentication for devices running the Junos OS. With a short lecture followed by a demonstration, this Byte is appropriate for new users, or anyone looking to enable
-
13:14 Popular
OSPFv2 Adjacency Formation
Added 242 Views / 0 LikesThe OSPFv2 Adjacency Formation Learning Byte explains the fundamentals of how OSPF adjacencies are formed, in particular on devices running the Junos OS. With a short lecture followed by a demonstration, this Byte is appropriate for new users, or anyone l
-
12:09 Popular
Junos Space: Policy Versioning In Security Director
Added 286 Views / 0 LikesThe Junos Space: Policy Versioning in Security Director Learning Byte covers how to work with policy snapshots in the Security Director application. This byte is most appropriate for users who have intermediate experience working with Security Director or
-
11:46 Popular
Junos Space Network Director Image Management
Added 307 Views / 0 LikesThe Junos Space Network Director Image Management Learning Byte covers how to stage and upgrade Junos devices in the Junos Space Network Director application. This byte is most appropriate for users who are new to working with Network Director or anyone l
Featured -
13:49 Popular
Configuring Route-Based Site-to-Site IPSec VPN On The SRX
Added 464 Views / 0 LikesThe Configuring Route-Based Site-to-Site IPsec VPN on the SRX Series Learning Byte discusses the configuration of a secure VPN tunnel between two Juniper Networks SRX-series devices. The concept of route-based VPN is briefly discussed and the commands nee
Featured -
12:57 Popular
AS-Path Regular Expressions
Added 318 Views / 0 LikesThe AS-Path Regular Expressions Learning Byte demonstrates configuration examples of AS-Path regular expressions, which are pattern matching variables that can be referenced in a routing policy. Presenter: David Williams, Technical Instructor Relevance to
Featured -
02:46 Popular
Juniper Security Ecosystem Introduction
Added 441 Views / 0 LikesThis video series describes different threat, attack, and secure access scenarios, and suggests ways that Juniper security technology can solve them.
Featured -
03:48 Popular
Access
Added 294 Views / 0 LikesThis video series describes different threat, attack, and secure access scenarios, and suggests ways that Juniper security technology can solve them.
-
00:47 Popular
Zero Day
Added 179 Views / 0 LikesThis video series describes different threat, attack, and secure access scenarios, and suggests ways that Juniper security technology can solve them.
-
02:01 Popular
Device Spoofing
Added 197 Views / 0 LikesThis video series describes different threat, attack, and secure access scenarios, and suggests ways that Juniper security technology can solve them.
-
02:21 Popular
Credential Theft
Added 202 Views / 0 LikesThis video series describes different threat, attack, and secure access scenarios, and suggests ways that Juniper security technology can solve them.
-
01:49 Popular
Compromised Device
Added 175 Views / 0 LikesThis video series describes different threat, attack, and secure access scenarios, and suggests ways that Juniper security technology can solve them.
-
02:53 Popular
Virtual Machine Security
Added 333 Views / 0 LikesThis video series describes different threat, attack, and secure access scenarios, and suggests ways that Juniper security technology can solve them.
Featured -
02:11 Popular
Web App Attack
Added 224 Views / 0 LikesThis video series describes different threat, attack, and secure access scenarios, and suggests ways that Juniper security technology can solve them.
-
03:34 Popular
DDoS Attack
Added 285 Views / 0 LikesThis video series describes different threat, attack, and secure access scenarios, and suggests ways that Juniper security technology can solve them.
-
01:55 Popular
New Exploit
Added 158 Views / 0 LikesThis video series describes different threat, attack, and secure access scenarios, and suggests ways that Juniper security technology can solve them.
-
14:50 Popular
Mobile Backhaul Solution
Added 367 Views / 0 LikesDavid Noguer Bau describes the mobile network operator environment as the perfect storm: the smart network meets the smart device. He talks about the challenges faced by operators in their backhaul networks and positions Junipers solutions in this context
Featured -
18:13 Popular
Mobile Network Security Solutions
Added 352 Views / 0 LikesThe mobile experience is now at the front line of brand management of which security is a huge part. This video highlights some of the challenges for mobile operators and proposes some solutions. It takes the form of a 20 minute presentation delivered by
Featured