We may earn an affiliate commission when you visit our partners.
Martin Brown

Intermediate System to Intermediate System is the routing protocol of choice for most large service providers. This course teaches you the basics of IS-IS, the CLNS routed protocol, and how to configure IS-IS on Junos OS based network devices.

Read more

Intermediate System to Intermediate System is the routing protocol of choice for most large service providers. This course teaches you the basics of IS-IS, the CLNS routed protocol, and how to configure IS-IS on Junos OS based network devices.

Most corporate networks prefer to use OSPF to advertise subnets to other routers on the network. Service providers and ISPs however, prefer to use a routing protocol that can scale beyond OSPF. In this course, Junos OS and the IS-IS Routing Protocol, you’ll learn foundational knowledge of the routing protocol known as Intermediate System to Intermediate System or IS-IS. First, you'll explore the basics of IS-IS. Next, you’ll delve into the underlying CLNS routed protocol. Finally, you’ll learn how IS-IS enabled routers share data. When you’re finished with this course, you'll have the skills and knowledge of the Intermediate System to Intermediate System routing protocol needed to support and configure the routing protocol preferred by service providers the world over. Software required: Junos OS version 12.1 or higher.

Enroll now

What's inside

Syllabus

Course Overview
Understanding the Basics of IS-IS
How IS-IS Communicates
Forming Adjacencies
Read more
Choosing the Best Path
Configuring IS-IS Basics
Customizing IS-IS to Your Requirements
Configuring Route Optimization and Troubleshooting IS-IS

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Builds a strong foundation for beginners in IS-IS fundamentals
Develops core skills in Intermediate System to Intermediate System routing protocol to configure and support it, which is preferred by service providers
Taught by Martin Brown, a recognized expert on IS-IS routing
Requires the use of Junos OS version 12.1 or higher, which may not be the latest version and could represent a potential software update
Assumes a foundational knowledge of networking and routing concepts, including OSPF

Save this course

Save Junos OS and the IS-IS Routing Protocol to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Junos OS and the IS-IS Routing Protocol with these activities:
Organize and review course materials
Prepare for the course by structuring and reviewing the provided learning resources.
Show steps
  • Gather all course materials, including lecture notes, slides, videos, and assignments.
  • Organize the materials into logical sections or folders.
  • Review the materials thoroughly, focusing on key concepts and technical details.
Refresh Networking fundamentals
Review core networking concepts to create a strong foundation for Intermediate System to Intermediate System routing.
Browse courses on Computer Networking
Show steps
  • Revisit basic networking concepts like OSI model, TCP/IP suite, and network topologies.
  • Practice configuring IP addresses, subnet masks, and default gateways on network devices.
  • Review different types of network cables and connectors used in networking.
Organize Course Materials
Stay organized by compiling and reviewing course resources.
Show steps
  • Gather lecture notes, slides, and assignments.
  • Organize materials into folders or a notebook.
  • Review materials periodically to reinforce understanding.
Nine other activities
Expand to see all activities and additional details
Show all 12 activities
Review Basic Networking Commands
Refresh your knowledge of basic networking commands to prepare for IS-IS configuration.
Show steps
  • Review commands for verifying IP configurations and routing tables.
  • Practice using commands to troubleshoot network connectivity issues.
Review Networking Basics
Prepare for this course by reviewing basic networking concepts such as OSI model, TCP/IP, and subnetting.
Browse courses on Networking
Show steps
  • Revisit OSI model layers and protocols.
  • Brush up on TCP/IP fundamentals, including IP addresses, subnetting, and routing.
  • Review basic network configurations, such as setting up static routes.
Follow online tutorials on IS-IS
Enhance understanding of IS-IS concepts and gain practical implementation experience.
Show steps
  • Search for online tutorials or courses on Intermediate System to Intermediate System (IS-IS).
  • Choose a tutorial that covers topics relevant to the course, such as IS-IS basics, adjacency formation, and routing table maintenance.
  • Follow the tutorial instructions and implement the concepts in a lab environment or network simulator.
Explore Intermediate System to Intermediate System (IS-IS)
Supplement your understanding of IS-IS by following online tutorials and resources.
Show steps
  • Find tutorials on IS-IS concepts, such as levels, areas, and adjacencies.
  • Explore online videos and articles to gain a practical perspective on IS-IS implementation.
  • Practice configuring basic IS-IS settings in a lab environment.
Attend webinars or conferences on IS-IS
Engage with industry experts and gain insights into the latest developments in IS-IS routing.
Show steps
  • Search for upcoming webinars or conferences related to IS-IS routing.
  • Register for the events and attend them virtually or in person.
  • Actively participate in discussions and Q&A sessions.
Configure IS-IS on Junos OS Devices
Apply your understanding of IS-IS by practicing configuration tasks in a lab setting.
Browse courses on Junos OS
Show steps
  • Set up a lab environment with Junos OS devices.
  • Configure basic IS-IS settings, such as router ID, area ID, and network interfaces.
  • Troubleshoot common IS-IS configuration issues.
Join a Study Group
Connect with peers and enhance your learning through discussions and collaboration.
Show steps
  • Find or create a study group with other course participants.
  • Set regular meeting times for group discussions.
  • Share notes, ask questions, and engage in peer-to-peer teaching.
Create a diagram of IS-IS routing
Reinforce understanding of IS-IS routing by creating a visual representation of its operation.
Show steps
  • Identify the key components of IS-IS routing, such as routers, links, areas, and levels.
  • Use a drawing tool or software to create a diagram that illustrates the relationships between these components.
  • Label the diagram with appropriate terminology and descriptions.
Design and Document an IS-IS Network
Deepen your understanding of IS-IS by designing and documenting a network topology.
Browse courses on Documentation
Show steps
  • Create a network diagram that includes routers, links, and IS-IS configurations.
  • Write a detailed document describing the network design, IS-IS configuration, and routing behavior.
  • Review and optimize the network design for scalability and resilience.

Career center

Learners who complete Junos OS and the IS-IS Routing Protocol will develop knowledge and skills that may be useful to these careers:
Network Engineer
Network Engineers design, implement, and maintain computer networks. They ensure that networks are reliable, secure, and efficient. This course provides a strong foundation in the IS-IS routing protocol, which is used by many large service providers and ISPs. By understanding how IS-IS works, you can troubleshoot network issues and configure IS-IS to meet your specific requirements.
Network Architect
Network Architects design and build large-scale networks. They must have a deep understanding of routing protocols, network security, and network performance. This course provides a solid understanding of the IS-IS routing protocol, which is used by many large service providers and ISPs. By understanding how IS-IS works, you can design and implement networks that are scalable, reliable, and secure.
Network Administrator
Network Administrators manage and maintain computer networks. They are responsible for ensuring that networks are up and running, and that they are secure from attack. This course provides a good overview of the IS-IS routing protocol, which is used by many large service providers and ISPs. By understanding how IS-IS works, you can troubleshoot network issues and configure IS-IS to meet your specific requirements.
Network Security Engineer
Network Security Engineers design and implement security measures to protect networks from attack. They must have a deep understanding of routing protocols, network security, and network performance. This course provides a good overview of the IS-IS routing protocol, which is used by many large service providers and ISPs. By understanding how IS-IS works, you can design and implement security measures that are effective and efficient.
Data Center Technician
Data Center Technicians maintain and repair computer networks in data centers. They must have a good understanding of routing protocols, network security, and network performance. This course provides a good overview of the IS-IS routing protocol, which is used by many large service providers and ISPs. By understanding how IS-IS works, you can troubleshoot network issues and configure IS-IS to meet your specific requirements.
IT Manager
IT Managers oversee the IT operations of an organization. They are responsible for ensuring that the organization's IT systems are reliable, secure, and efficient. This course may be useful for IT Managers who want to learn more about the IS-IS routing protocol, which is used by many large service providers and ISPs. By understanding how IS-IS works, you can make informed decisions about how to use it in your own organization.
Cloud Network Engineer
Cloud Network Engineers design and implement networks in cloud computing environments. They must have a deep understanding of routing protocols, network security, and network performance. This course may be useful for Cloud Network Engineers who want to learn more about the IS-IS routing protocol, which is used by many large service providers and ISPs. By understanding how IS-IS works, you can design and implement networks that are scalable, reliable, and secure.
Network Operations Engineer
Network Operations Engineers monitor and maintain computer networks. They are responsible for ensuring that networks are up and running, and that they are secure from attack. This course may be useful for Network Operations Engineers who want to learn more about the IS-IS routing protocol, which is used by many large service providers and ISPs. By understanding how IS-IS works, you can troubleshoot network issues and configure IS-IS to meet your specific requirements.
Information Security Analyst
Information Security Analysts design and implement security measures to protect networks from attack. They must have a deep understanding of routing protocols, network security, and network performance. This course may be useful for Information Security Analysts who want to learn more about the IS-IS routing protocol, which is used by many large service providers and ISPs. By understanding how IS-IS works, you can design and implement security measures that are effective and efficient.
Software Engineer
Software Engineers design, develop, and maintain software applications. They must have a deep understanding of programming languages, data structures, and algorithms. This course may be useful for Software Engineers who want to learn more about the IS-IS routing protocol, which is used by many large service providers and ISPs. By understanding how IS-IS works, you can develop software applications that are scalable, reliable, and secure.
Web Developer
Web Developers design and develop websites. They must have a deep understanding of HTML, CSS, and JavaScript. This course may be useful for Web Developers who want to learn more about the IS-IS routing protocol, which is used by many large service providers and ISPs. By understanding how IS-IS works, you can develop websites that are scalable, reliable, and secure.
Database Administrator
Database Administrators design and maintain databases. They must have a deep understanding of database management systems, data structures, and algorithms. This course may be useful for Database Administrators who want to learn more about the IS-IS routing protocol, which is used by many large service providers and ISPs. By understanding how IS-IS works, you can design and maintain databases that are scalable, reliable, and secure.
Systems Analyst
Systems Analysts design, develop, and maintain computer systems. They must have a deep understanding of hardware, software, and networks. This course may be useful for Systems Analysts who want to learn more about the IS-IS routing protocol, which is used by many large service providers and ISPs. By understanding how IS-IS works, you can design and maintain systems that are scalable, reliable, and secure.
Help Desk Technician
Help Desk Technicians provide technical support to users. They must have a good understanding of hardware, software, and networks. This course may be useful for Help Desk Technicians who want to learn more about the IS-IS routing protocol, which is used by many large service providers and ISPs. By understanding how IS-IS works, you can troubleshoot network issues and provide better support to users.
Technical Writer
Technical Writers create documentation for software and hardware products. They must have a good understanding of the products they are writing about. This course may be useful for Technical Writers who want to learn more about the IS-IS routing protocol, which is used by many large service providers and ISPs. By understanding how IS-IS works, you can create documentation that is accurate and easy to understand.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Junos OS and the IS-IS Routing Protocol.
Provides a comprehensive overview of cryptography and network security and valuable resource for those seeking to protect their networks from cyber threats.
This comprehensive guide to the TCP/IP protocol suite valuable resource for network engineers and architects.
Provides a comprehensive overview of network security essentials and valuable resource for those seeking to protect their networks from cyber threats.
This comprehensive textbook covers the fundamentals of computer networking and useful reference for those seeking a deeper understanding of the subject.
Provides a comprehensive overview of routing protocols and concepts and valuable resource for those seeking a deeper understanding of the subject.
This comprehensive textbook on data communications and networking useful reference for those seeking a deeper understanding of the subject.
Provides a comprehensive overview of network penetration testing techniques and valuable resource for those seeking to protect their networks from cyber threats.
This classic textbook on computer networks useful reference for those seeking a deeper understanding of the subject.
Provides a comprehensive overview of the BGP routing protocol and valuable resource for network engineers and architects.
Provides a beginner-friendly overview of network security and valuable resource for those seeking to protect their networks from cyber threats.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Junos OS and the IS-IS Routing Protocol.
Protocol Independent Routing in Junos OS
Most relevant
Cisco Advanced Routing: Tier 3 Service Providers
Most relevant
Juniper Networks Junos Automation Basics and XML
Most relevant
Data Forwarding Across Computer Networks
Most relevant
Getting Started with Junos Operating System
Most relevant
Juniper Networks JNCIA-Junos: Routing Fundamentals
Most relevant
Junos Routing, Operations, and Maintenance
Most relevant
Juniper Networks JNCIA-Junos: Routing Policy and Firewall...
Most relevant
MPLS Layer 3 VPN
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser