JNCIP-SP

Network Faculty badge
We recommend you to obtain...
Access to all courses

Using an ANUAL subscription

Duration.

¡+40 Hours!

Authors.

Jose Leitao

This JNCIP-SP training course is designed so you can approve the Juniper JN0-660 certification exam.

This written exam requires in-depth knowledge on protocols and technologies as well as solid abilities on JUNOS and the CLI. Hands on practice or experience is always recommended.

The JNCIP-SP certification is designed to evaluate and certify that candidates have a high level knowledge on protocols and JUNOS operations. JNCIP-SP candidates should be fluent on routing, multicast, cos, MPLS and IPv6.

We currently have the most important topics and videos  to prepare you for this certification, and we are working hard to bring you the rest of the exam blueprint. Missing categories under development:

CoS
Layer 2 VPN
IP Multicast
Loading video...

Playlist

You can watch all videos in this course in sequence, using the playlist. It will place you automatically on the last video you watched.

Go to playlist

IS-IS - JNCIP-SP

IS-IS videos for the Juniper JNCIP-SP JN0-660 certification exam

  • IS-IS - INTRODUCTION (34:47)

    ISIS protocol overview, introduction to the CLNS addressing, routing levels and general operation of the ISIS routing

  • IS-IS - CLNS ADDRESSING (36:40)

    CLNS addressing structure, how a NET addresses is built for integrated ISIS and the two most common ways to structure a NET address (using loopbacks and mac)

  • IS-IS - CLNS ROUTING (22:00)

    In this video we explore how routing is done following the ISO CLNS routing model and how it is done today with integrated IS-IS, general intra area routing and the implementation of the backbone


  • IS-IS - MESSAGES (28:39)

    In this video we are going to analyze the ISIS messages - PDU (Hello, LSP, PSNP and CSNP), what is their function and when are they sent

  • IS-IS - ADJACENCIES AND DB SYNCHRONIZATION (38:31)

    In this video we go into the detail behind the formation of ISIS adjacencies in both broadcast and point-to-point network types, the steps the protocol go through, database synchronization and general state knowledge for troubleshooting

  • IS-IS - JUNIPER BASIC CONFIGURATION (29:55)

    Basic verification and configuration procedures for ISIS in JUNOS Juniper devices.

  • IS-IS - NETWORK TYPES (18:12)

    IS-IS handles two types of networks: broadcast and point-to-point. In this video we will see how the protocol works with this two different types and their implications

  • IS-IS - JUNIPER BROADCAST AND POINT-TO-POINT NETWORK TYPES (20:01)

    In this video we explore how to configure, verify and troubleshooting the broadcast and point-to-point network types on Juniper JUNOS devices

  • IS-IS - JUNIPER DIS SELECTION (15:43)

    In this video we show you how to alter the DIS election on ISIS Juniper JUNOS devices, how to verify the selection and how the ISIS database look like when the DIS role is used

  • IS-IS - JUNIPER DIS SELECTION (15:43)

    In this video we show you how to alter the DIS election on ISIS Juniper JUNOS devices, how to verify the selection and how the ISIS database look like when the DIS role is used

  • IS-IS - TIMERS (23:05)

    In this video we are going to explore how the ISIS basic timers work: hello interval, hold time and the CSNP interval, but also we are going to attack timers related to the SPF calculation (LSP timers)

  • IS-IS - JUNIPER TIMERS (27:02)

    How to configure and verify the basic ISIS timers (hello, hold and CSNP) and LSP related timers on Juniper JUNOS devices

  • IS-IS - JUNIPER SPF TIMERS (16:38)

    In this time we go into the details behind the modification of ISIS SPF timers on Juniper JUNOS devices

  • IS-IS - JUNIPER MULTI AREA (17:37)

    In this video we are going to see the configuration and verification procedures for integrated IS-IS in a multi area topology, we are going to analyze how inter area routing is done and the different elements that interact in this kind of setup

  • IS-IS - JUNIPER AUTHENTICATION (25:18)

    In this session we show you how to configure authentication for ISIS on Juniper JUNOS devices, using multiple combination of parameters, like authentication type, level vs interface configuration, etc

  • IS-IS - JUNIPER BFD (20:14)

    In this video we'll see how you can configure "Bidirectional Forward Detection" (BFD) for ISIS on Juniper JUNOS devices

  • IS-IS - JUNIPER SUMMARIZATION AND ROUTE LEAKING (20:53)

    In this video we show you how to advertise a network summarization and how to leak and advertise one or more of the specific routes after creating a summary on Juniper JUNOS devices

  • IS-IS - TRAFFIC ENGINEERING (14:35)

    In this video we explore the standard ISIS metric and what kind of information contain versus the extended metrics (wide metrics) used and needed for traffic engineering

OSPF - JNCIP-SP

OSPF videos for the Juniper JNCIP-SP JN0-660 certification exam

  • OSPF - INTRODUCTION (19:06)

    Introduction to Link State protocols and how they compare with distance vector, general overview on the OSPF routing protocol, its performance, metric and the mechanisms that allows OSPF to scale

  • OSPF - ROUTER ID (10:53)

    In this video we analyze the function of the router-id in OSPF, why is a key element in the SPF calculations, its role on the LSA advertisements and what may happen if we found the same router-id on two devices not directly connected

  • OSPF - INTRODUCTION TO AREAS (12:54)

    In this video we the function of the areas, how the protocol behaves when dealing with multiple areas, and a high level overview on how the protocol advertises information between areas

  • OSPF - ROUTER CLASSIFICATION (09:00)

    In this session we define what are the: Internal Routers, Area Border Routers (ABR), Backbone Routers and AS Boundary Routers (ASBR)

  • OSPF - ADJACENCY ESTABLISHMENT (18:25)

    Description of how OSPF adjacencies are formed, the OSPF FSM, analysis on the parameters that must match or be equal for two devices to reach the FULL state

  • OSPF - BEHAVIOUR ON MULTIACCESS SEGMENTS (08:48)

    Introduction to OSPF behaviour in multi-access segments. We will provide an overview on how the DR/BDR work and why OSPF uses this kind of mechanisms

  • OSPF - INTRODUCTION TO LSA (24:54)

    Function, structure and types of LSA used by OSPF for the exchange of information

  • OSPF - JUNIPER BASIC CONFIGURATION (51:32)

    Basic configuration of OSPF on Juniper JUNOS devices on a multi-area topology, including the most common verification and troubleshooting methods.

  • OSPF - HELLO AND DEAD INTERVALS (11:00)

    Operation Hello and Dead interval. How they behave in different types of networks and their influence on the formation of adjacencies.

  • OSPF - JUNIPER HELLO AND DEAD INTERVALS (24:40)

    In this video we configure, verify and troubleshoot the OSPF hello and dead timers on Juniper JUNOS devices, we go through all the consideration you should have in mind when working with them and the most common problems

  • OSPF - POINT-TO-POINT AND POINT-TO-MULTIPOINT NETWORK TYPES (14:32)

    OSPF point-to-point and point-to-multipoint Network types. How they behave, implications and default timers

  • OSPF - BROADCAST AND NON-BROADCAST NETWORK TYPES (26:59)

    Operation of the OSPF broadcast and non-broadcast network types, selection of the DR / BDR roles and overall operation.

  • OSPF - LSA TYPE 1 AND 2 (21:44)

    In this video we go into the operation details of the OSPF LSA 1 (router LSA) and LSA 2 (network LSA), what information they represent and contain and their impact on the general performance of the OSPF routing protocol

  • OSPF - JUNIPER LSA TYPE 1 AND 2 (20:48)

    In this session we work in depth on the OSPF database of Juniper JUNOS devices, we focus on the interpretation of the LSA type 1 and LSA type 2, and how to manually build a topology just by looking at the database

  • OSPF - LSA TYPE 3 (12:01)

    In this session we explore in detail the operation of the Summary LSA (Type 3), what information they represent and contain, together with the details of how OSPF routers calculate the metric.

  • OSPF - JUNIPER LSA TYPE 3 (10:49)

    In this video we focus on the OSPF LSA type 3, how to interpret the database on Juniper JUNOS devices and how to "manually" build the total cost for inter-area prefixes

  • OSPF - LSA TYPE 4 AND 5 (26:17)

    Details on how the OSPF LSA 4 (ASBR-Summary) and LSA 5 (External) operate and what information they contain. We'll take special attention into how the calculations are made to reach external routes.

  • OSPF - JUNIPER LSA TYPE 4 AND 5 (19:03)

    How to interpret the OSPF database on Juniper JUNOS devices focusing on the LSA type 4 and LSA type 5, how the metric calculation is done and the impact of using both OSPF metric types (type 1 and type 2)

  • OSPF - LSA TYPE 7 (10:54)

    Operation of LSA Type 7 on NSSA areas. How translation is performed by the ABR's from a LSA Type 7 to a LSA type 5 and the calculations performed with the forward address to get the metric to any specific route

  • OSPF - JUNIPER LSA TYPE 7 (15:07)

    In this video we focus on database interpretation for OSPF LSA type 7, the metric calculations using the forward address, metric types and LSA translation when going out of the NSSA

  • OSPF - BACKBONE AND REGULAR AREAS (11:23)

    In this session we analyze the operation of the area 0 (backbone) and regular areas, what optimization they provide and the benefit of using multiple areas

  • OSPF - STUB AND STUB NO SUMMARY AREAS (18:02)

    In this video we explore how stub and totally stub areas (stub no-summary) work, what OSPF LSA they filter and how OSPF provide connectivity to the routes that are lost with this LSA filtering

  • OSPF - NSSA AND NSSA NO SUMMARY AREAS (16:22)

    We explore in this session the operation of NSSA and totally NSSA areas (NSSA no-summary) what LSA types they filter, how Type 7 LSA are translated to Type 5 LSA and how routing is done within these areas

  • OSPF - JUNIPER STUB AREAS (51:12)

    In this video we go through all the configuration and verification process of all area types in OSPF on Juniper JUNOS devices. You'll see all the LSA and database details when working with stub, totally stub (stub no-summary), NSSA and totally NSSA (NSSA no-summary) areas

  • OSPF - JUNIPER COST MODIFICATION (25:53)

    In this video we are going to see how we can change and verify the cost of a link on a router running Juniper JUNOS

  • OSPF - AUTHENTICATION (11:23)

    In this video we go deep into the details behind the operation of the OSPF authentication, authentication types and their implications

  • OSPF - JUNIPER AUTHENTICATION (25:45)

    Configuration, verification and troubleshooting of OSPF authentication in Juniper JUNOS devices

  • OSPF - VIRTUAL LINKS (10:50)

    In this session we explore the details behind the operation of virtual links, why they exist, the most common uses and the implications of using them

  • OSPF - JUNIPER VIRTUAL LINKS (21:07)

    In this video we show how to create a virtual link in Juniper JUNOS devices, the most common cases that call for this feature, and all the verification and troubleshooting tool you have in had

  • OSPF - JUNIPER DEFAULT ROUTE (15:32)

    In this video we explore how to create a default route for OSPF on Juniper JUNOS devices, and how to verify that our configuration is performing correctly

  • OSPF - JUNIPER ROUTE FILTER (29:23)

    In this video we will explore how we can filter routes on the ABR and ASBR routers of an OSPF topology on Juniper JUNOS devices.

BGP - JNCIP-SP

BGP videos for the Juniper JNCIP-SP JN0-660 certification exam

  • BGP - INTRODUCTION (34:14)

    In this video we will provide an introduction to BGP, its philosophy and operation at a very high level. We'll see concepts like the mechanics of Path vector protocols, BGP conceptual differences with IGP's and an introduction to the use of attributes for routing.

  • BGP - MESSAGES (29:11)

    In this session we explore the different messages used by BGP to establish sessions, warn of possible errors, exchange information and keep up sessions. These messages are: OPEN, NOTICE, UPDATE and KEEPALIVE.

  • BGP - SESSIONS AND FSM (24:01)

    In this video we will see how sessions are established between two endpoints running BGP. Analyze the implications of using TCP as the transport protocol and the BGP Finite State Machine.

  • BGP - CAPABILITIES (11:34)

    This video will show you what are the capabilities of BGP, how they are negotiated and represented in the BGP OPEN message. We will pay special attention to one of the most important capability: Multiprotocol Extension.

  • BGP - ATTRIBUTES (11:36)

    In this session we will explore the different types of attributes that BGP uses, we will see what are the characteristics and scope of each of them, along with some examples.

  • BGP - AS PATH (20:52)

    In this video we will look at how the autonomous systems numbers are structure, the operation of the AS-Path attribute, introduction to using private autonomous system number and the numbers of 4 bytes

  • BGP - 4 BYTE ASN SUPPORT (27:09)

    We will see in detail how the 4 bytes (32 bits) autonomous system numbers work, how this new numbering interact with systems that only support 2 bytes ASN and the operation of new capabilities, attributes, etc.

  • BGP - BEST PATH SELECTION ALGORITHM (22:32)

    In this video we explain the BGP decision algorithm. We will go through each of the path selection steps that the protocol takes to select which of the different paths received is the best.

  • BGP - JUNIPER IPV4 NLRI ADVERTISEMENTS (47:32)

    Video dedicated to show you how to advertise Network Layer Reachability Information of IPv4 networks using Juniper JUNOS devices.

  • BGP - EBGP SESSIONS (31:48)

    In this video we will explore eBGP sessions, the controls that the protocols implements for session establishment, TTL considerations and Next-Hop management.

  • BGP - JUNIPER EBGP SESSIONS (29:43)

    In this video we explore the configuration and verification procedures for eBGP sessions on Juniper JUNOS devices.

  • BGP - IBGP SESSIONS (34:09)

    In this video we will explore how iBGP sessions work. We will focus on the implications of these sessions in terms of next-hop, the advertisements between iBGP sessions, the AS-Path management and synchronization.

  • BGP - JUNIPER IBGP SESSIONS (44:04)

    This session focus on the configuration and verification procedures of iBGP sessions for Juniper JUNOS devices, we take special care of characteristics like Next-Hop management and the prefix advertisements between iBGP neighbors.

  • BGP - ROUTE REFLECTORS (24:45)

    In this video you'll see how route reflectors operate. We will also analyze in depth the function of the attributes that this functionality introduces, which are the Originator-ID and the Cluster-ID as well as some design implications.

  • BGP - JUNIPER ROUTE REFLECTORS (37:29)

    Configuration and verification procedures for route reflectors on Juniper JUNOS devices. We go into the details behind the operation of the Originator-ID and Cluster-ID used to stop any possible feedback loops.

  • BGP - CONFEDERATIONS (30:48)

    In this session we discuss in depth the operation of Confederations, which introduce attributes (focusing on the AS Confederation Set) and the different implications of using these mechanisms.

  • BGP - JUNIPER CONFEDERATIONS (36:33)

    Video dedicated to explore the configuration of BGP confederations on Juniper JUNOS devices and verification procedures.

  • BGP - AUTHENTICATION (14:41)

    In this video we will explore the different BGP authentication methods, concentrating on the authentication provided by the transport layer (TCP) using MD5 and its implications.

  • BGP - JUNIPER AUTHENTICATION (27:00)

    This session is dedicated to the configuration of TCP MD5 authentication on Juniper JUNOS devices and the verification / troubleshooting procedures of this security method

  • BGP - JUNIPER TTL SECURITY (23:21)

    Session dedicated to show you how to implement TTL security on Juniper JUNOS devices. On this platform you have to manually build a firewall filter to implement this security feature, here we discuss how to do it and how to verify its operation

MPLS - JNCIP-SP

MPLS videos for the Juniper JNCIP-SP JN0-660 certification exam (work in progress, more videos coming soon)

  • MPLS - INTRODUCTION (27:25)

    Introduction to MPLS, what are the most common problems solved with this technology and general overview on how MPLS labels are structured and used to switch traffic

  • MPLS - CONVERGENCE (16:37)

    How convergence is achieved in a MPLS network and what are the elements that are involved. We'll describe how the IGP, LDP, different router tables, work together to provide us forwarding, among other topics.

  • MPLS - LABEL FORMAT (22:10)

    In this video we go through the details behind the MPLS labels structure, the functions behind each field on the header, numbering used in the labels and details on the meaning of a few reserved label numbers

  • MPLS - LABEL SPACE AND ALLOCATION (15:23)

    In this video we go through the details behind the label space and label allocation. We'll explore concepts like: per-platform, per-interface, cell mode and frame mode

  • MPLS - LABEL DISTRIBUTION (17:28)

    In this video we detail the MPLS label exchange process for LDP, how labels are communicated and processed for the different destinations in our MPLS network and messages used

  • MPLS - LABEL SWITCHING (31:30)

    In this video we explore how label switching is done in a MPLS network and how packets are handled and processed by each hop. We will also introduce most of the naming conventions used to describe the elements and process involved

  • MPLS - JUNIPER BASIC CONFIGURATION (28:00)

    Details on how Juniper approaches MPLS, label assignment and the different tables (special focus on inet.3). Basic MPLS Configuration and verification methods on Juniper JUNOS devices.

  • MPLS - JUNIPER LDP ROUTER-ID (10:46)

    How Juniper selects a LDP router-id when no manual configuration is done. Configuration and verification methods to manuallt modify the router-id on Juniper JUNOS devices

  • MPLS - JUNIPER EXPLICIT NULL (09:01)

    In this session we show you how to change the default behavior of Juniper JUNOS of sending Implicit null labels for directly connected routes (PHP), to Explicit Null.

  • MPLS - JUNIPER LDP TIMERS (18:19)

    How to change and verify the basic LDP timers on Juniper JUNOS devices

  • MPLS - LDP SESSION PROTECTION (11:12)

    In this video we describe how what is LDP session protection, how does it work and why is needed and used in some MPLS network setups

  • MPLS - JUNIPER LDP SESSION PROTECTION (09:58)

    Session protection is a LDP feature that allow our MPLS network to be more resilience, when some failures occur (depending on the topology). In this video we show you how to configure and verify this feature on Juniper JUNOS devices

  • MPLS - JUNIPER TTL PROPAGATION (20:54)

    In this video we show you how the TTL is propagated inside an MPLS network running Juniper JUNOS, and how we can change the default behavior of the OS

  • MPLS - LDP IGP SYNCHRONIZATION (11:21)

    What is LDP - IGP synchronization, how does it work and operate, and situations where having this feature enable can solve some potential issues and improve our MPLS network convergence.

  • MPLS - JUNIPER LDP IGP SYNCHRONIZATION (11:33)

    LDP - IGP synchronization allow us to improve the convergence of our MPLS network, in this video we show you how to configure and verify this feature on Juniper JUNOS devices

  • MPLS - JUNIPER LDP AUTHENTICATION (07:49)

    Configuration and verification methods for LDP authentication on Juniper JUNOS devices

  • MPLS - QOS MODELS (22:40)

    In this video you will see how the different models of QOS in MPLS networks are implemented. We'll go through concepts like: Uniform, Pipe, pipe short and long pipe.

MPLS VPN - JNCIP-SP

MPLS VPN videos for the Juniper JNCIP-SP JN0-660 certification exam  (work in progress, more videos coming soon)

  • MPLS VPN - INTRODUCTION (23:34)

    Introduction to MPLS VPN, the problems that solves, the elements that conform it and how to build this service over a MPLS backbone to provide connectivity to different customers and branches

  • MPLS VPN - ARCHITECTURE (17:42)

    Description of the elements involved in an MPLS VPN and how they interact. We are going to focus in this video on concepts like: Tables, protocols, types of routers (nomenclature), MPLS control plane and data plane (forwarding).

  • MPLS VPN - ROUTE DISTINGUISHER (10:19)

    Detailed description on what is the route distinguisher (RD), its function and why is so important on MPLS VPN's. We are also going to describe its structure, nomenclature and the best practice for the assignment of this number

  • MPLS VPN - ROUTE TARGET (15:10)

    In this video we explore the function of the route target BGP extended community, its role on the MPLS VPN's networks, structure, nomenclature and two identification assigment best practices

  • MPLS VPN - JUNIPER VRF (22:00)

    In this session we will explore the configuration and verification steps to build VRFs into a Juniper JUNOS router. The VRF setup will allow us to have independent routing tables for the different MPLS VPNs we have with our customers.

  • MPLS VPN - JUNIPER MP-BGP (27:05)

    MP-BGP is a key element when working with MPLS VPN. In this video we show you how to configure and verify MP-BGP on Juniper JUNOS devices.

  • MPLS VPN - JUNIPER PE-CE COMMUNICATION USING STATIC ROUTES (21:51)

    In this session we describe the necessary steps to configure and verify static routes in a MPLS VPN environment to achieve communication between the PE-CE devices in all the customer branches routes.

  • MPLS VPN - JUNIPER RIP AS A PE-CE PROTOCOL (19:40)

    In this video we show you how to configure and verify RIP as a PE-CE protocol on Juniper JUNOS, providing connectivity between the CE devices of a MPLS VPN service.

  • MPLS VPN - JUNIPER OSPF AS A PE-CE PROTOCOL BASICS (30:06)

    In this video we describe some of the implications of running OSPF as PE-CE protocol, including the effect on LSAs when the MPLS backbone comes into play. We will also see the OSPF configuration and verification procedures on Juniper JUNOS devices when OSPF is working as the PE-CE routing protocol.

  • MPLS VPN - JUNIPER BGP AS A PE-CE PROTOCOL BASICS (21:01)

    In this video we explore the basics steps to configure and verify MP-BGP when working as a PE-CE protocol on Juniper JUNOS devices, we will focus on elements such as address-families, VRF, RT and RD.

MPLS TE - JNCIP-SP

MPLS TE videos for the Juniper JNCIP-SP JN0-660 certification exam (work in progress, more videos coming soon)

  • MPLS TE - INTRODUCTION TO TRAFFIC ENGINEERING (23:20)

    Introduction to MPLS Traffic Engineering, general objectives, what problems it solves, how does it works and how its implemented (Introduction to TE tunnels)

  • MPLS TE - CBR (22:13)

    How shortest path calculations are performed based on Constraint-Based Routing (CBR) when additional flow requirements needs to be satisfied. How the Constrained Shortest Path First (CSPF) algorithm works and operates.

  • MPLS TE - RSVP (32:39)

    In this video we explore how Resource Reservation Protocol (RSVP) works and operate, its messages and structure and how it fits inside the MPLS traffic engineering model

  • MPLS TE - JUNIPER STATIC ERO LIST LSP (18:41)

    In this video we explore how to configure and verify static traffic engineering tunnels using ERO lists on Juniper JUNOS devices

  • MPLS TE - JUNIPER FLAG BASED LSP (28:17)

    The usage of flags or colors in our MPLS network core provides a lot of flexibility when building traffic engineering tunnels. In this section we go through the steps needed to configure and verify flag based TE LSP.

  • MPLS TE - JUNIPER BANDWIDTH BASED LSP (31:07)

    Bandwidth based traffic engineering tunnels are probably one of the most common TE configuration currently in use by service providers and large networks. In this video we show you how to build bandwidth based LSP and the verification procedures using Juniper JUNOS devices.

  • MPLS TE - JUNIPER LSP WITH BACKUP PATHS (29:11)

    If a traffic engineering tunnel fails the network may be heavily affected. In this video we show you how to configure and verify the operation of TE tunnels with backup paths on Juniper JUNOS devices.

  • MPLS TE - JUNIPER FAST REROUTE LSP (17:32)

    Fast reroute provides automatic link protection to a LSP, allowing us to reroute traffic around a failure (detour). In this video we show you how to configure and verify this feature on Juniper JUNOS devices.

  • MPLS TE - JUNIPER LINK PROTECTION LSP (16:49)

    This video is dedicated to the traffic engineering link protection feature on Juniper JUNOS devices. We go through all the configuration and verification steps to use this characteristic.

  • MPLS TE - JUNIPER LDP SESSION OVER A TE TUNNEL (08:45)

    In this video we describe how to build a LDP session over a RSVP TE tunnel. We will describe all the step needed to configure and verify this feature on Juniper JUNOS devices.

  • MPLS TE - JUNIPER LSP PREEMPTION (32:45)

    When using MPLS TE, the setup and reservation priorities are critical when working with more than one LSP, in this video we show you how they work, and the configuration and verification procedure on Juniper JUNOS devices.

  • MPLS TE - JUNIPER PREFIX MAPPING TO A LSP (14:39)

    By default in Juniper JUNOS the LSPs build in our network are only used to resolve the next-hop of BGP sessions, if we want a particular traffic to use an LSP we need to map the prefix, in this video we show you how to achieve this goal.

  • MPLS TE - JUNIPER PREFIX MAPPING USING MPLS FORWARDING (17:53)

    In this video we describe how the MPLS forwarding feature can be used so that the information put into the inet.3 table can be used to reach prefixes using the LSP and not only for BGP next-hop resolution. We will go through all the configuration and verification steps to use the mpls-forwarding feature on Juniper JUNOS.

  • MPLS TE - JUNIPER PREFIX MAPPING USING BGP-IGP (11:28)

    When a LSP is built on Juniper JUNOS, a route is installed pointing to the egress router, and this route is normally used by BGP next-hop resolution, BGP-IGP is a feature that allow us to alter this behavior, in this video we show you how to configure and verify this characteristic.