telecomvideos.com
Welcome
Login / Register

Juniper Networks


We believe the network is the single greatest vehicle for knowledge, collaboration, and human advancement that the world has ever known. Now more than ever, the world relies on high-performance networks. And now more than ever, the world needs network innovation to unleash our full potential.

Every day, Juniper Networks is helping our customers build the best networks on the planet. Every innovation we envision, every technology we create is informed by our desire to help solve our customers’ toughest challenges so they can compete and thrive today and into the future.

For more information, visit our website www.juniper.net

  • 16:05 Popular QFabric Solution Revenue Port Layout

    QFabric Solution Revenue Port Layout

    by Juniper Channel Added 208 Views / 0 Likes

    The QFabric Solution Revenue Port Layout Learning Byte briefly describes the supported interface types and speeds on the QFX3600 switch and shows you how to configure them, both in standalone and Fabric mode. Presenter: Gerben Camp, Technical Instructor R

  • 08:41 Popular Basic OSPFv2 Configuration

    Basic OSPFv2 Configuration

    by Juniper Channel Added 364 Views / 0 Likes

    The Basic OSPFv2 Configuration Learning Byte explains the initial steps to enable OSPFv2 on devices running the Junos OS. With a short lecture followed by a demonstration, this Byte is appropriate for new users, or anyone looking to learn about enabling O

    Featured
  • 11:59 Popular OSPFv2 Authentication

    OSPFv2 Authentication

    by Juniper Channel Added 251 Views / 0 Likes

    The OSPFv2 Authentication Learning Byte explains the options and functionality of OSPFv2 authentication for devices running the Junos OS. With a short lecture followed by a demonstration, this Byte is appropriate for new users, or anyone looking to enable

  • 13:14 Popular OSPFv2 Adjacency Formation

    OSPFv2 Adjacency Formation

    by Juniper Channel Added 242 Views / 0 Likes

    The OSPFv2 Adjacency Formation Learning Byte explains the fundamentals of how OSPF adjacencies are formed, in particular on devices running the Junos OS. With a short lecture followed by a demonstration, this Byte is appropriate for new users, or anyone l

  • 12:09 Popular Junos Space: Policy Versioning In Security Director

    Junos Space: Policy Versioning In Security Director

    by Juniper Channel Added 286 Views / 0 Likes

    The Junos Space: Policy Versioning in Security Director Learning Byte covers how to work with policy snapshots in the Security Director application. This byte is most appropriate for users who have intermediate experience working with Security Director or

  • 11:46 Popular Junos Space Network Director Image Management

    Junos Space Network Director Image Management

    by Juniper Channel Added 307 Views / 0 Likes

    The Junos Space Network Director Image Management Learning Byte covers how to stage and upgrade Junos devices in the Junos Space Network Director application. This byte is most appropriate for users who are new to working with Network Director or anyone l

    Featured
  • 13:49 Popular Configuring Route-Based Site-to-Site IPSec VPN On The SRX

    Configuring Route-Based Site-to-Site IPSec VPN On The SRX

    by Juniper Channel Added 464 Views / 0 Likes

    The Configuring Route-Based Site-to-Site IPsec VPN on the SRX Series Learning Byte discusses the configuration of a secure VPN tunnel between two Juniper Networks SRX-series devices. The concept of route-based VPN is briefly discussed and the commands nee

    Featured
  • 12:57 Popular AS-Path Regular Expressions

    AS-Path Regular Expressions

    by Juniper Channel Added 318 Views / 0 Likes

    The AS-Path Regular Expressions Learning Byte demonstrates configuration examples of AS-Path regular expressions, which are pattern matching variables that can be referenced in a routing policy. Presenter: David Williams, Technical Instructor Relevance to

    Featured
  • 02:46 Popular Juniper Security Ecosystem Introduction

    Juniper Security Ecosystem Introduction

    by Juniper Channel Added 441 Views / 0 Likes

    This video series describes different threat, attack, and secure access scenarios, and suggests ways that Juniper security technology can solve them.

    Featured
  • 03:48 Popular Access

    Access

    by Juniper Channel Added 294 Views / 0 Likes

    This video series describes different threat, attack, and secure access scenarios, and suggests ways that Juniper security technology can solve them.

  • 00:47 Popular Zero Day

    Zero Day

    by Juniper Channel Added 179 Views / 0 Likes

    This video series describes different threat, attack, and secure access scenarios, and suggests ways that Juniper security technology can solve them.

  • 02:01 Popular Device Spoofing

    Device Spoofing

    by Juniper Channel Added 197 Views / 0 Likes

    This video series describes different threat, attack, and secure access scenarios, and suggests ways that Juniper security technology can solve them.

  • 02:21 Popular Credential Theft

    Credential Theft

    by Juniper Channel Added 202 Views / 0 Likes

    This video series describes different threat, attack, and secure access scenarios, and suggests ways that Juniper security technology can solve them.

  • 01:49 Popular Compromised Device

    Compromised Device

    by Juniper Channel Added 175 Views / 0 Likes

    This video series describes different threat, attack, and secure access scenarios, and suggests ways that Juniper security technology can solve them.

  • 02:53 Popular Virtual Machine Security

    Virtual Machine Security

    by Juniper Channel Added 333 Views / 0 Likes

    This video series describes different threat, attack, and secure access scenarios, and suggests ways that Juniper security technology can solve them.

    Featured
  • 02:11 Popular Web App Attack

    Web App Attack

    by Juniper Channel Added 224 Views / 0 Likes

    This video series describes different threat, attack, and secure access scenarios, and suggests ways that Juniper security technology can solve them.

  • 03:34 Popular DDoS Attack

    DDoS Attack

    by Juniper Channel Added 285 Views / 0 Likes

    This video series describes different threat, attack, and secure access scenarios, and suggests ways that Juniper security technology can solve them.

  • 01:55 Popular New Exploit

    New Exploit

    by Juniper Channel Added 158 Views / 0 Likes

    This video series describes different threat, attack, and secure access scenarios, and suggests ways that Juniper security technology can solve them.

  • 14:50 Popular Mobile Backhaul Solution

    Mobile Backhaul Solution

    by Juniper Channel Added 367 Views / 0 Likes

    David Noguer Bau describes the mobile network operator environment as the perfect storm: the smart network meets the smart device. He talks about the challenges faced by operators in their backhaul networks and positions Junipers solutions in this context

    Featured
  • 18:13 Popular Mobile Network Security Solutions

    Mobile Network Security Solutions

    by Juniper Channel Added 352 Views / 0 Likes

    The mobile experience is now at the front line of brand management of which security is a huge part. This video highlights some of the challenges for mobile operators and proposes some solutions. It takes the form of a 20 minute presentation delivered by

    Featured
RSS