AJWL – Advanced Juniper Networks Wireless LANs


Contact Us

We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.


I'd like to receive emails with the latest updates and promotions from Insoft.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.

Upcoming Dates

Nov 15 - Nov 18, 2021
09:00 - 17:00

Dec 14 - Dec 17, 2021
09:00 - 17:00

Jan 11 - Jan 14, 2022
09:00 - 17:00

  Feb 15 - Feb 18, 2022
09:00 - 17:00

AJWL – Advanced Juniper Networks Wireless LANs
4 days  (Instructor Led Online)  |  Wireless / Mobility

Course Details

The AJWL – Advanced Juniper Networks Wireless LANs course provides advanced configuration and monitoring skills pertaining to the WLS and its capabilities and features. In this course, you will apply the skills learned in the IJWL course, and become a next-level expert of Juniper Networks wireless design, implementation or management engineer.

The course describes the best practice guidelines for planning an enterprise-wide Juniper Networks wireless LAN system with its flexible domain architecture. Best practices for advanced security are presented, as are the issues to be considered when deploying voice and mesh services. Centrally managed architectures are also presented. The course includes a look at some advanced troubleshooting techniques.

The course uses a combination of lecture and hands-on labs to gain experience with the Juniper Networks WLS. The course is based on the Juniper Networks WLS software Release


Course Level: AJWL is an advanced-level course.


See other Juniper courses


After successfully completing this course, you should be able to:

  • List considerations when deploying a WLS.
  • Describe key WLS operational details.
  • Explain the operation of a Mobility Domain.
  • Describe the operation of a Cluster.
  • Explain the purpose of the Network Domain.
  • Compute and place WLAs in an existing Coverage Area.
  • Assign RF channels to the WLA radios.
  • Use tools to review and adjust RF coverage areas.
  • Configure and compute an RF Zone.
  • Configure and compute outdoor RF coverage and mesh.
  • Review mesh link connectivity.
  • Describe WLC discovery methods used by WLAs.
  • Explain the radio auto-tune capabilities.
  • Describe configuration methods used for WLCs.
  • Place WLCs under RingMaster management.
  • Explain the administrator AAA authentication options.
  • Describe SNMP management capabilities of the WLCs.
  • Describe threats to WLANs.
  • Explain steps to secure a WLAN.
  • List WLAN authentication options.
  • Explain the 802.1X authentication process.
  • Identify WLAN encryption types and recommendations.
  • Describe PMK-caching method of secure fast hand-off between WLAs.
  • Describe the SmartPass architecture.
  • Explain how to configure and customize SmartPass.
  • Use SmartPass for simple access control.
  • Create dynamic authorization rules.
  • Configure SmartPass as an external Web portal.
  • Describe SmartPass administration tasks.
  • Describe the troubleshooting process.
  • List the possible locations where problems might occur.
  • Use the tools available for effective troubleshooting.
  • List the useful troubleshooting CLI commands.
  • Describe how to perform a trace.
  • Explain how to recover a system to factory defaults.
  • Describe how to raise a support case.
  • Describe the remote WLA functionalities.
  • List the categories of centralized deployments.
  • Configure domain and VLAN tunnel security.
  • Describe the bandwidth required for WLA control and management traffic.
  • Describe NAT and PAT scenarios for remote WLAs.
  • List the WLS control traffic protocols and ports.
  • Describe the centralization capabilities of the management, security and location system components.
  • Identify the main categories of voice protocol.
  • Emphasize the value of providing adequate QoS for voice traffic.
  • Describe high-level voice protocol exchanges for a SIP or SpectraLink call.
  • List the possible impairments to voice.
  • Describe methods for marking voice traffic for priority.
  • Understand the main 802.11e QoS provisions.
  • List the planning steps for a voice optimized service.
  • Describe the possible mesh architectures.
  • Identify the supported mesh ‘fan out’ and ‘hop count.’
  • Understand mesh redundancy capabilities.
  • Examine the RF link budget formulas.
  • List the steps for configuring a mesh service.
  • Understand how to stage a mesh AP.
  • Understand multi-hop configuration options.
  • List the steps for configuring a wireless bridging service.
  • Describe how to troubleshoot RingMaster.
  • Describe how to troubleshoot Cluster.
  • Describe how to troubleshoot Mesh.
  • Describe how to troubleshoot a Web Portal service.


Day 1

Chapter 1: Course Introduction

Chapter 2: WLS Domain Planning

  • WLAN Deployment Considerations
  • WLS Architecture and Operations
  • The Mobility Domain and Clustering
  • The Network Domain
  • Clustering
  • Redundancy Planning

Chapter 3: RF Planning

  • Compute and Place WLAs
  • Assign Channels
  • Review and Adjust Coverage
  • RF Zone Planning
  • Outdoor Coverage and Mesh Planning
  • Mesh Link Visualization
  • Lab: RF Planning

Chapter 4: Configuration and Deployment Options

  • Deploying WLAs
  • Configuring and Managing WLCs
  • Management and Authentication Using AAA
  • SNMP Management
  • Lab: Configuration and Deployment Options


Day 2

Chapter 5: Securing a WLAN

  • Wireless LAN Threats
  • Protecting Wireless LANs
  • 802.1X and Other Key Features
  • Lab: Securing a WLAN

Chapter 6: SmartPass

  • SmartPass Review
  • Configuring and Customizing SmartPass
  • SmartPass for Simple Access Control
  • SmartPass for Dynamic Authorizations
  • SmartPass as an External Web Portal
  • SmartPass Administration
  • Lab: SmartPass


Day 3

Chapter 7: Basic WLS Troubleshooting

  • Troubleshooting Processes and Flow
  • Configuration Management
  • Troubleshooting Tools
  • Useful MSS Commands
  • System Recovery
  • Interacting with JTAC
  • Lab: Basic WLS Troubleshooting

Chapter 8: Branch Office Solutions

  • Remote WLA Functionalities
  • Branch Office Scenarios
  • Enabling Remote WLA Options
  • NAT/PAT Architectures
  • Deployment Considerations
  • Lab: Branch Office Solutions

Chapter 9: Supporting Voice Services

  • Voice Overview
  • Addressing the Challenge
  • Planning for Voice in a WLAN
  • Lab: Supporting Voice Services


Day 4

Chapter 10: Mesh Services

  • Mesh Overview
  • Wireless Mesh Link Budgets
  • Mesh APs
  • Multi-Hop Mesh
  • Point-to-Point Bridging
  • Lab: Mesh Services

Chapter 11: Advanced WLS Troubleshooting

  • Using Spectrum Analysis
  • Troubleshooting Web Portal
  • Troubleshooting RingMaster
  • Troubleshooting Cluster
  • Troubleshooting Mesh
  • Lab: Advanced WLS Troubleshooting

Appendix A: Steps to Secure a WLAN

  • Protecting Wireless LANs

Appendix B: Tracing an 802.1X Authentication

  • 802.1X Certificate Issues
  • Tracing an 802.1X Authentication
  • Microsoft Tracing Capability

Appendix C: Example Trace Messages

  • Good News Trace Message
  • Bad News Trace Message

Target Audience

This course benefits network professionals who are responsible for deploying a Juniper Networks WLS and support professionals responsible for supporting a Juniper Networks WLS.


  • Students should have intermediate-level networking knowledge and an understanding of the Open Systems Interconnection (OSI) model and the TCP/IP protocol suite.
  • Students should also be familiar with AAA concepts and RADIUS and have an understanding of 802.11 wireless LAN fundamentals.
  • In addition, students should attend the Introduction to Juniper Networks Wireless LANs (IJWL) course prior to attending this class.