Juniper Advanced Junos Security

Level

Juniper Advanced Junos Security

Aikona
Logo Aikona

Need more information? Get more details on the site of the provider.

Starting dates and places

There are no known starting dates for this product.

Description

Overview

This course benefits individuals responsible for implementing, monitoring, and troubleshooting Junos security components.

This three-day course, which is designed to build off of the current Junos Security (JSEC) offering, delves deeper into Junos security with advanced coverage of IPsec deployments, virtualization, highavailability, advanced Network Address Translation (NAT) deployments, and Layer 2 security with SRX Services Gateway devices. Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring advanced security features of the Junos operating system.

Prerequisites

Students should have a strong level of TCP/IP networking and secur…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: Junos, Security, Internet Security, CompTIA A+ / Network+ / Security+, and IT Security.

Overview

This course benefits individuals responsible for implementing, monitoring, and troubleshooting Junos security components.

This three-day course, which is designed to build off of the current Junos Security (JSEC) offering, delves deeper into Junos security with advanced coverage of IPsec deployments, virtualization, highavailability, advanced Network Address Translation (NAT) deployments, and Layer 2 security with SRX Services Gateway devices. Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring advanced security features of the Junos operating system.

Prerequisites

Students should have a strong level of TCP/IP networking and security knowledge. Students should also attend the Introduction to the Junos Operating System (IJOS), Junos Routing Essentials (JRE), and~Junos Security (JSEC) courses prior to attending this class.

Course Outline.

Objectives
•After successfully completing this course, you should be able to:
•Recall and solidify concepts covered in the prerequisite JSEC course
•Understand the various forms of security supported by the Junos OS.
•Have a clear understanding of the fundamentals of session-based Junos OS.
•Understand Junos security handling at Layer 2 versus Layer 3.
•Give an overview of the SRX Series Services Gateways product lines.
•Understand the placement and traffic distribution of the various components of SRX Series devices.
•Configure, utilize, and monitor the various interface types available to the SRX Series product line.
•Understand Junos OS processing of Application Layer Gateways (ALG).
•Alter the Junos default behavior of ALG and application processing.
•Implement address books with dynamic addressing.
•Compose security policies utilizing ALGs, custom applications, and dynamic addressing for various scenarios.
•Use Junos debugging tools to analyze traffic flows and identify traffic processing patterns and problems.
•Describe Junos routing instance types used for virtualization.
•Implement virtual routing-instances.
•Selectively forward traffic between virtual routing-instances.
•Implement policy-based routing.
•Describe and implement static, source, destination, and dual Network Address Translation (NAT).
•Describe and implement variations of cone NAT.
•Describe the interaction between NAT and security policy.
•Implement NAT traversal.
•Implement and monitor optimized chassis clustering.
•Understand IPv6 support for chassis clusters.
•Implement graceful restart and nonstop routing with SRX Series devices.
•Describe the Junos server load-balancing feature.
•Differentiate and configure standard point-to-point virtual private network (VPN) tunnels, hub-and-spoke VPNs, and group VPNs.
•Monitor the operations of the various IP Security (IPsec) VPN implementations.
•Describe public key cryptography for certificates.
•Describe, implement, and monitor Group VPNs in an enterprise environment.
•Describe, implement, and monitor Dynamic VPNs in an enterprise environment.
•Utilize IPsec VPN tunnels with OSPF.
•Implement dynamic VPNs.
•Describe some IPsec VPN best practices for the Enterprise.
•Understand and utilize Junos tools for troubleshooting Junos security implementations.
•Utilize a sound methodology for troubleshooting Junos security issues.
•Be familiar with the successful troubleshooting of some common Junos security issues.

QA reserves the right to improve the specification and format of its courses for the benefit of its customers without notice to the customer.

There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.