Introduction to Junos Security


This course is designed to provide students with the foundational knowledge required to work with SRX Series devices.


This course will use the J-Web user interface to introduce students to the Junos operating system.


The course provides a brief overview of security problems and how Juniper Networks approaches a complete security solution with Juniper Connected Security.


Key topics include configuration tasks for initial system configuration, interface configuration, security object configuration, security policy configuration, IPsec VPN configuration, and NAT configuration.


The course then delves into Layer 7 security using UTM, IDP, and AppSecure to provide students with the understanding of application level security to block advanced threats.


An overview of Sky ATP is included for students to understand zero-day network protection technologies.


Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations.


This course is based on Junos OS Release 19.1R1.6.


IJSEC is an introductory-level course.


 


The primary audiences for this course are the following:
 
• Operators ...

Vis mere

... of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers.


 


The following are the prerequisites for this course:


• Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/ IP protocol suite.


 


Day 1


Course Introduction


Juniper Security Concepts
• Security Challenges
• Security Design Overview
• Juniper Connected Security
 
 Juniper Connected Security – SRX Series Devices
• Connected Security
• Interfaces
• Initial Configuration
 
 LAB 1: Initial Configuration
 
 Security Objects
• Security Zone Objects
• Security Screen Objects
• Security Address Objects
• Security Services Objects
 
 LAB 2: Creating Security Objects with J-Web


Security Policies
• Security Policy Overview
• Zone-Based Policies
• Global Security Policies
• Application Firewall with Unified Security Policies
 
 LAB 3: Creating Security Policies with J-Web


Day 2


Security Services – IDP and User Firewall
• IDP Security Services
• Integrated User Firewall
 
 LAB 4: Adding IDP and User Firewall Security Services to Security Policies
 
 Security Services – UTM
• Content Filtering
• Web Filtering
• Antivirus
• Antispam
 
 LAB 5: Adding UTM Security Services to Security Policies 


Juniper Connected Security – Sky ATP
• Sky ATP Overview
• Blocking Threats


Lab 6: Demonstrating Sky ATP
 
 Network Address Translation
• NAT Overview
• Source NAT
• Destination NAT
• Static NAT


Lab 7: Implementing Network Address Translation


Day 3


IPsec VPN Concepts
• VPN Types
• Secure VPN Requirements
• IPsec Tunnel Establishment
• IPsec Traffic Processing
 
 Site-to-Site VPNs
• IPsec Configuration
• IPsec Site-to-Site Tunnel
 
 Lab 8: Implementing Site-to-Site IPsec VPNs
 
 Monitoring and Reporting
• J-Web monitoring options
• J-Web Reporting options


Lab 9: Using Monitoring and Reporting


Please note that the following Appendices are not covered as standard during the training course unless requested by the customer, and agreed with Arrow, upon booking:


Appendix A: SRX Series Hardware
 Appendix B: Virtual SRX
 Appendix C: CLI Primer
 Appendix D: Sky Enterprise Services
 Appendix E: Junos Space Security Director

Introduction to Junos Security

Eksklusiv moms.

Efter aftale / Kontakt for pris

Hvis du har valgt Efter aftale, kan du udfylde formularen nedenfor og så vender vi tilbage til dig og aftaler nærmere.

Har du spørgsmål?

Hvis du har yderligere spørgsmål til dette produkt eller ønsker at få fremsendt materiale i forbindelse med produktet, er du velkommen til at benytte kontaktformularen herunder.