Course Overview
TOPThis course will use the J-Web user interface to introduce students to the Junos operating system. The course provides a brief overview of security problems and how Juniper Networks approaches a complete security solution with Juniper Connected Security. Key topics include configuration tasks for initial system configuration, interface configuration, security object configuration, security policy configuration, IPsec VPN configuration, and NAT configuration
The course then delves into Layer 7 security using UTM, IDP, and AppSecure to provide students with the understanding of application level security to block advanced threats. An overview of Sky ATP is included for students to understand zero-day network protection technologies
Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 19.1R1.6.
Scheduled Classes
TOPOutline
TOPDay 1
Module 1: COURSE INTRODUCTION
Module 2: Juniper Security Concept
- Security Challenges
- Security Design Overview
- Juniper Connected Security
Module 3: Juniper Connected Security SRX Series Devices
- Connected Security
- Interfaces
- Initial Configuration
Module 4: Security Objects
- Security Zone Objects
- Security Screen Objects
- Security Address Objects
- Security Services Objects
Module 5: Security Policies
- Security Policy Overview
- Zone-Based Policies
- Global Security Policies
- Application Firewall with Unified Security Policies
Module 6: Security Services IDP and User Firewall
- IDP Security Services
- Integrated User Firewall
Day 2
Module 7: Security Services UTM
- Content Filtering
- Web Filtering
- Antivirus
- Antispam
Module 8: Juniper Connected Security Sky AT
- Sky ATP Overview
- Blocking Threats
Module 9: Network Address Translation
- NAT Overview
- Source NAT
- Destination NAT
- Static NAT
Day 3
Module 10: IPsec VPN Concepts
- VPN Types
- Secure VPN Requirements
- IPsec Tunnel Establishment
- IPsec Traffic Processing
Module 11: Site-to-Site VPNs
- IPsec Configuration
- IPsec Site-to-Site Tunne
Module 12: Monitoring and Reporting
- J-Web monitoring options
- J-Web Reporting options
Appendix A: SRX Series Hardware
Appendix D: Sky Enterprise Services
Appendix B: Virtual SRX
Appendix EJunos Space Security Director
Appendix CCLI Prime
Prerequisites
TOPThe following are the prerequisites for this course:
- Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/ IP protocol suite.
Who Should Attend
TOPThe primary audiences for this course are the following:
- Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers.