The JNCIP-SP (Juniper Networks Certified Internet Professional - Service Provider, JN0-664) certification from Juniper is an advanced-level credential designed to validate the skills and knowledge required for managing, troubleshooting, and optimizing complex Juniper Networks service provider infrastructure. This exam focuses on advanced networking topics like OSPF, BGP, MPLS, Layer 2 and Layer 3 VPNs, and multicast, which are essential for professionals managing large-scale networks in service provider environments. Why is JNCIP-SP (JN0-664) important?
Validates expertise in complex Juniper service provider networking environments.
Essential for professionals involved in the design and implementation of service provider networks.
Equips candidates with skills to troubleshoot and optimize large-scale network infrastructures.
Builds foundational knowledge for further Juniper certifications, enhancing career advancement.
Demonstrates proficiency in crucial networking protocols and Junos OS, valued across the industry.
Who should take the JNCIP-SP (JN0-664) Exam?
Network Engineers in Service Provider environments
Senior Network Administrators
Network Operations Engineers
Solutions Architects specializing in networking
Senior Network Technicians
Network Support Engineers
Skills Evaluated
Candidates taking the certification exam on the JNCIP-SP (JN0-664) is evaluated for the following skills:
Advanced knowledge of OSPF and BGP configurations and troubleshooting.
MPLS and its applications, including L2/L3 VPNs and traffic engineering.
Layer 2 and Layer 3 VPN setup, deployment, and optimization.
Understanding and implementing multicast in service provider networks.
Proficiency with Junos OS features for service provider networks.
JNCIP-SP (JN0-664) Certification Course Outline
The JNCIP-SP (JN0-664) Certification covers the following topics -
Module 1. OSPF
Describe the concepts, operation, or functionality of OSPFv2 and OSPFv3
Given a scenario, demonstrate knowledge of how to configure or monitor single-area or multi-area OSPF
Module 2. IS-IS
Describe the concepts, operation, or functionality of IS-IS
Given a scenario, demonstrate knowledge of how to configure or monitor single-area or multi-area IS-IS
Module 3. BGP
Describe the concepts, operation, or functionality of BGP
Describe the concepts, operation, or functionality of BGP scaling mechanisms
Given a scenario, demonstrate knowledge of how to configure or monitor BGP
Module 4. Class of Service (CoS)
Describe the concepts, operation, or functionality of Junos OS CoS
Given a scenario, demonstrate knowledge of how to configure or monitor CoS.
Module 5. IP Multicast
Describe the concepts, operation, or functionality of IP multicast
Given a scenario, demonstrate knowledge of how to configure or monitor IGMP, PIM dense mode, or PIM sparse mode (including SSM)
Module 6. Layer 3 VPNs
Describe the concepts, operation, or functionality of Layer 3 VPNs
Given a scenario, demonstrate knowledge of how to configure or monitor the components of Layer 3 VPNs.
Describe Junos OS support for carrier-of-carriers or inter-provider VPN models.
Module 7. Layer 2 VPNs
Describe the concepts, operation, or functionality of BGP Layer 2 VPNs
Describe the concepts, operation, or functionality of LDP Layer 2 circuits
Describe the concepts, operation, or functionality of virtual private LAN service (VPLS)
Describe the concepts, operation, or functionality of EVPN
Given a scenario, demonstrate knowledge of how to configure, monitor, or troubleshoot Layer 2 VPNs
Module 4. Application Deployment and Security 20%
Diagnose a CI/CD pipeline failure (such as missing dependency, incompatible versions of components, and failed tests)
Integrate an application into a prebuilt CD environment leveraging Docker and Kubernetes
Describe the benefits of continuous testing and static code analysis in a CI pipeline
Utilize Docker to containerize an application
Describe the tenets of the "12-factor app"
Describe an effective logging strategy for an application
Explain data privacy concerns related to storage and transmission of data
Identify the secret storage approach relevant to a given scenario
Configure application specific SSL certificates
Implement mitigation strategies for OWASP threats (such as XSS, CSRF, and SQL injection)
Describe how end-to-end encryption principles apply to APIs
Module 5. Infrastructure and Automation 20%
Explain considerations of model-driven telemetry (including data consumption and data storage)
Utilize RESTCONF to configure a network device including interfaces, static routes, and VLANs (IOS XE only)
Construct a workflow to configure network parameters with:
Identify a configuration management solution to achieve technical and business requirements
Describe how to host an application on a network device (including Catalyst 9000 and Cisco IOx-enabled devices)