Introduction to Juniper Networks Wireless LANs (IJWL) Course No: EDU-JUN-IJWL Length: Four Days Cost: $2800 (US) Schedule and Registration Course Overview This course is a four-day technical training course on the Juniper Networks Wireless LAN Services (WLS) system. The course includes an overview of the full range of hardware and software products and their capabilities and features. The course describes the WLS system architecture and a project framework for planning a WLS system deployment. It covers the Radio Frequency (RF) planning capabilities of the RingMaster software and basic wireless LAN controller (WLC) configuration through the command-line interface (CLI). The course then moves on to describe system and service configuration using RingMaster. The course also describes a secure, enterprisegrade employee service in detail and introduces other service options (such as a Web portal login). Integration issues with the back-end authentication, authorization, and accounting (AAA), Domain Name System (DNS), and Dynamic Host Configuration Protocol (DHCP) servers are examined, and the monitoring, management and reporting capabilities of the RingMaster software are also described. The course uses a combination of lecture as well as practical and group exercises to ensure a high level of hands-on experience with the Juniper Networks WLS system components. The course is based on the Juniper Networks wireless LAN system (WLS) software release 7.5. Objectives After successfully completing this course, you should be able to: Identify the various hardware and software components of the WLS system and describe the system capabilities and architecture. Effectively use the RingMaster management console to plan, deploy, configure, manage, monitor, and report on a WLS system. Describe the requirements for a secure, Enterprise-grade wireless LAN system and configure secure services.
Work with domains and clusters to ensure campus-wide seamless roaming on the wireless LAN and provide industry-leading system resilience. Effectively troubleshoot a WLS system deployment and user connectivity to the wireless LAN segment. Scale the management of the system using the RingMaster console and its policy configuration capabilities. Navigate the CLI and be familiar with some important command line utilities. Describe integration issues with the corporate AAA, DHCP, and DNS environments. Intended Audience The course is designed to give field and support engineers a high level of technical competence with the Juniper Networks WLS products. Course Level IJWL is an intermediate-level course. Prerequisites Students should have intermediate-level networking knowledge and an understanding of the Open Systems Interconnection (OSI) model and the TCP/IP protocol suite. Students should also have a good understanding of 802.11 wireless LAN fundamentals and be familiar with AAA concepts and RADIUS. Students should also attend both the Juniper Networks Networking Fundamentals and the Juniper Networks WLAN Fundamentals courses (or possess equivalent knowledge) prior to attending this class. Course Contents Day 1 Chapter 1: Chapter 2: Chapter 3: Course Introduction Juniper Networks Wireless LAN System Overview Wireless LAN Overview WLS Hardware and Software WLS licensing Complementary Products Lab 1: Wireless LAN System Web QuickStart WLS Basic Architecture Juniper Networks WLS Overview WLS Fundamentals
Mobility Domain Overview Clustering Overview Network Domain Overview The AP Boot Process The RingMaster Architecture The SmartPass Architecture Advanced Architecture Preview Chapter 4: Day 2 Chapter 5: Chapter 6: Chapter 7: WLS Software Installation and Overview WLS Hardware and Software Requirements WLS Software Licenses RingMaster Server and Client Installation RingMaster Web Launch Client Installation RingMaster Client Connection Licensing a RingMaster Server RingMaster Network Plan and Graphical User Interface RingMaster Services, Directory Structure, and Help Uninstalling RingMaster Installing and Licensing SmartPass Lab 2: WLS Software Basic Skills Reverse Planning Customize RF Obstacles Create and Configure Sites, Buildings, and Floors Upload and Prepare Floor Plans Define RF Obstacles Create and Configure Indoor Coverage Areas Add Origin Point and Wiring Closet Reverse Planning Lab 3: Indoor Coverage Area Creation Lab 4: Reverse Planning WLS Hardware Setup and Configuration Hardware Installation Controller CLI Access CLI QuickStart Controller CLI Management Web QuickStart Lab 5: CLI QuickStart WLS Service Configuration
Services Overview The WLC System Setup Wizard Deploying Local Changes Connect a Windows XP SP2 Client Lab 6: Service Configuration I Lab 7: Client Configuration Day 3 Chapter 8: Chapter 9: Chapter 10: Day 4 Chapter 11: Troubleshooting the Wireless LAN System Troubleshooting Processes and Flow Configuration Management Troubleshooting Tools Useful MSS Commands System Recovery Raising a Support Case Lab 8: Service Configuration II WLS Network Integration RADIUS Overview Integration with Microsoft IAS RADIUS Troubleshooting IAS DHCP Options DNS Hosts Lab 9: Infrastructure APs WLS Domains and Clusters Working with Mobility Domains Working with Clusters Working with Network Domains Lab 10: Roaming and Cluster WLS Advanced Architecture Advanced Voice Support Wireless Mesh Services Spectrum Analysis Remote AP Automatic Client Load Balancing Bandwidth Control RADIUS Functionalities Intrusion Protection
Location Lab 11: Local Switching Lab 12: AP Tunneling Chapter 12: Chapter 13: WLS Monitoring Configure for Monitoring The Monitoring Dashboard Monitoring Status Monitoring Clients Monitoring Traffic Monitoring Alarms Monitoring Security Server Events Log Lab 13: Monitoring WLS Management and Reporting Device Management RingMaster Server Management RingMaster Client Tools Reporting Lab 14: Management and Reporting Lab 15: Employee and Guest Services (optional) Lab 16: SmartPass and Web Portal Authentication (optional) Appendix A: Tracing an 802.1X Authentication 802.1X Certificate Issues Tracing an 802.1X Authentication Microsoft Tracing Capability Appendix B: Example Trace Messages Good News Trace Messages Bad News Trace Messages