This CLASSROOM course is designed to provide advanced configuration and monitoring details pertaining to the WLS and its capabilities and features.
The course is designed to build on the skills learned in the IJWL course and take students to the next level of expertise as a Juniper Networks wireless design, implementation or management engineer.
The course describes best practice guidelines for planning an enterprise-wide Juniper Networks wireless LAN system with its flexible domain architecture. Best practices for advanced security are presented, as are the issues to be considered when deploying voice and mesh services. Centrally managed architectures are also presented. The course includes a look at some advanced troubleshooting techniques.
The course uses a combination of lecture and hands-on labs to gain experience with the Juniper Networks WLS.
The course is based on the Juniper Networks WLS software Release 126.96.36.199.
AJWL is an advanced-level course.
After successfully completing this course, you should be able to:
- List considerations when deploying a WLS.
- Describe key WLS operational details.
- Explain the operation of a Mobility Domain.
- Describe the operation of a Cluster.
- Explain the purpose of the Network Domain.
- Compute and place WLAs in an existing Coverage Area.
- Assign RF channels to the WLA radios.
- Use tools to review and adjust RF coverage areas.
- Configure and compute an RF Zone.
- Configure and compute outdoor RF coverage and mesh.
- Review mesh link connectivity.
- Describe WLC discovery methods used by WLAs.
- Explain the radio auto-tune capabilities.
- Describe configuration methods used for WLCs.
- Place WLCs under RingMaster management.
- Explain the administrator AAA authentication options.
- Describe SNMP management capabilities of the WLCs.
- Describe threats to WLANs.
- Explain steps to secure a WLAN.
- List WLAN authentication options.
- Explain 802.1X authentication process.
- Identify WLAN encryption types and recommendations.
- Describe PMK-caching method of secure fast hand-off between WLAs.
- Describe the SmartPass architecture.
- Explain how to configure and customize SmartPass.
- Use SmartPass for simple access control.
- Create dynamic authorization rules.
- Configure SmartPass as an external Web portal.
- Describe SmartPass administration tasks.
- Describe the troubleshooting process.
- List the possible locations where problems might occur.
- Use the tools available for effective troubleshooting.
- List the useful troubleshooting CLI commands.
- Describe how to perform a trace.
- Explain how to recover a system to factory defaults.
- Describe how to raise a support case.
- Describe the remote WLA functionalities.
- List the categories of centralized deployments.
- Configure domain and VLAN tunnel security.
- Describe the bandwidth required for WLA control and management traffic.
- Describe NAT and PAT scenarios for remote WLAs.
- List the WLS control traffic protocols and ports.
- Describe the centralization capabilities of the management, security and location system components.
- Identify the main categories of voice protocol.
- Emphasize value of providing adequate QoS for voice traffic.
- Describe high-level voice protocol exchanges for a SIP or SpectraLink call.
- List the possible impairments to voice.
- Describe methods for marking voice traffic for priority.
- Understand the main 802.11e QoS provisions.
- List the planning steps for a voice optimized service.
- Describe the possible mesh architectures.
- Identify the supported mesh ‘fan out’ and ‘hop count.’
- Understand mesh redundancy capabilities.
- Examine the RF link budget formulas.
- List the steps for configuring a mesh service.
- Understand how to stage a mesh AP.
- Understand multi-hop configuration options.
- List the steps for configuring a wireless bridging service.
- Describe how to troubleshoot RingMaster.
- Describe how to troubleshoot Cluster.
- Describe how to troubleshoot Mesh.
- Describe how to troubleshoot a Web Portal service.
Chapter 1: Course Introduction
Chapter 2: WLS Domain Planning
- WLAN Deployment Considerations
- WLS Architecture and Operations
- The Mobility Domain and Clustering
- The Network Domain
- Redundancy Planning
Chapter 3: RF Planning
- Compute and Place WLAs
- Assign Channels
- Review and Adjust Coverage
- RF Zone Planning
- Outdoor Coverage and Mesh Planning
- Mesh Link Visualization
- Lab: RF Planning
Chapter 4: Configuration and Deployment Options
- Deploying WLAs
- Configuring and Managing WLCs
- Management and Authentication Using AAA
- SNMP Management
- Lab: Configuration and Deployment Options
Chapter 5: Securing a WLAN
- Wireless LAN Threats
- Protecting Wireless LANs
- 802.1X and Other Key Features
- Lab: Securing a WLAN
Chapter 6: SmartPass
- SmartPass Review
- Configuring and Customizing SmartPass
- SmartPass for Simple Access Control
- SmartPass for Dynamic Authorizations
- SmartPass as an External Web Portal
- SmartPass Administration
- Lab: SmartPass
Chapter 7: Basic WLS Troubleshooting
- Troubleshooting Processes and Flow
- Configuration Management
- Troubleshooting Tools
- Useful MSS Commands
- System Recovery
- Interacting with JTAC
- Lab: Basic WLS Troubleshooting
Chapter 8: Branch Office Solutions
- Remote WLA Functionalities
- Branch Office Scenarios
- Enabling Remote WLA Options
- NAT/PAT Architectures
- Deployment Considerations
- Lab: Branch Office Solutions
Chapter 9: Supporting Voice Services
- Voice Overview
- Addressing the Challenge
- Planning for Voice in a WLAN
- Lab: Supporting Voice Services
Chapter 10: Mesh Services
- Mesh Overview
- Wireless Mesh Link Budgets
- Mesh APs
- Multi-Hop Mesh
- Point-to-Point Bridging
- Lab: Mesh Services
Chapter 11: Advanced WLS Troubleshooting
- Using Spectrum Analysis
- Troubleshooting Web Portal
- Troubleshooting RingMaster
- Troubleshooting Cluster
- Troubleshooting Mesh
- Lab: Advanced WLS Troubleshooting
Appendix A: Steps to Secure a WLAN
- Protecting Wireless LANs
Appendix B: Tracing an 802.1X Authentication
- 802.1X Certificate Issues
- Tracing an 802.1X Authentication
- Microsoft Tracing Capability
Appendix C: Example Trace Messages
- Good News Trace Message
- Bad News Trace Message
Students should have intermediate-level networking knowledge and an understanding of the Open Systems Interconnection (OSI) model and the TCP/IP protocol suite. Students should also be familiar with AAA concepts and RAIDUS and have an understanding of 802.11 wireless LAN fundamentals. In addition, students should attend the Introduction to Juniper Networks Wireless LANs (IJWL) course prior to attending this class.