Juniper Advanced Junos Security
Starting dates and places
Description
Overview
This course benefits individuals responsible for implementing, monitoring, and troubleshooting Junos security components.
This three-day course, which is designed to build off of the current Junos Security (JSEC) offering, delves deeper into Junos security with advanced coverage of IPsec deployments, virtualization, highavailability, advanced Network Address Translation (NAT) deployments, and Layer 2 security with SRX Services Gateway devices. Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring advanced security features of the Junos operating system.
Prerequisites
Students should have a strong level of TCP/IP networking and secur…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Overview
This course benefits individuals responsible for implementing,
monitoring, and troubleshooting Junos security components.
This three-day course, which is designed to build off of the
current Junos Security (JSEC) offering, delves deeper into Junos
security with advanced coverage of IPsec deployments,
virtualization, highavailability, advanced Network Address
Translation (NAT) deployments, and Layer 2 security with SRX
Services Gateway devices. Through demonstrations and hands-on labs,
students will gain experience in configuring and monitoring
advanced security features of the Junos operating system.
Prerequisites
Students should have a strong level of TCP/IP networking and
security knowledge. Students should also attend the Introduction to
the Junos Operating System (IJOS), Junos Routing Essentials (JRE),
and~Junos Security (JSEC) courses prior to attending this
class.
Course Outline.
Objectives
•After successfully completing this course, you should be able
to:
•Recall and solidify concepts covered in the prerequisite JSEC
course
•Understand the various forms of security supported by the Junos
OS.
•Have a clear understanding of the fundamentals of session-based
Junos OS.
•Understand Junos security handling at Layer 2 versus Layer 3.
•Give an overview of the SRX Series Services Gateways product
lines.
•Understand the placement and traffic distribution of the various
components of SRX Series devices.
•Configure, utilize, and monitor the various interface types
available to the SRX Series product line.
•Understand Junos OS processing of Application Layer Gateways
(ALG).
•Alter the Junos default behavior of ALG and application
processing.
•Implement address books with dynamic addressing.
•Compose security policies utilizing ALGs, custom applications, and
dynamic addressing for various scenarios.
•Use Junos debugging tools to analyze traffic flows and identify
traffic processing patterns and problems.
•Describe Junos routing instance types used for virtualization.
•Implement virtual routing-instances.
•Selectively forward traffic between virtual routing-instances.
•Implement policy-based routing.
•Describe and implement static, source, destination, and dual
Network Address Translation (NAT).
•Describe and implement variations of cone NAT.
•Describe the interaction between NAT and security policy.
•Implement NAT traversal.
•Implement and monitor optimized chassis clustering.
•Understand IPv6 support for chassis clusters.
•Implement graceful restart and nonstop routing with SRX Series
devices.
•Describe the Junos server load-balancing feature.
•Differentiate and configure standard point-to-point virtual
private network (VPN) tunnels, hub-and-spoke VPNs, and group
VPNs.
•Monitor the operations of the various IP Security (IPsec) VPN
implementations.
•Describe public key cryptography for certificates.
•Describe, implement, and monitor Group VPNs in an enterprise
environment.
•Describe, implement, and monitor Dynamic VPNs in an enterprise
environment.
•Utilize IPsec VPN tunnels with OSPF.
•Implement dynamic VPNs.
•Describe some IPsec VPN best practices for the Enterprise.
•Understand and utilize Junos tools for troubleshooting Junos
security implementations.
•Utilize a sound methodology for troubleshooting Junos security
issues.
•Be familiar with the successful troubleshooting of some common
Junos security issues.
QA reserves the right to improve the specification and format of
its courses for the benefit of its customers without notice to the
customer.
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.