Juniper Advanced Junos Security Training | Juniper AJSEC Training
Juniper Advanced Junos Security Training | Juniper AJSEC Training with real world hands-on labs
This three-day Juniper Advanced Junos Security Training | Juniper AJSEC Training course, which is designed to build off of the current Junos Security (JSEC) offering, delves deeper into Junos security.
Through demonstrations and hands-on labs, you will gain experience in configuring and monitoring the advanced Junos operating system security features with advanced coverage of IPsec deployments, virtualization, AppSecure, advanced Network Address Translation (NAT) deployments, and Layer 2 security. This Juniper Advanced Junos Security Training | Juniper AJSEC Training course uses Juniper Networks SRX Series Services Gateways for the hands-on component, but the lab environment does not preclude the Juniper Advanced Junos Security Training | Juniper AJSEC Training course from being applicable to other Juniper hardware platforms running the Junos OS. This Juniper Advanced Junos Security Training | Juniper AJSEC Training course is based on Junos OS Release 12.1R1.9.
With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.
• This course benefits individuals responsible for implementing, monitoring, and troubleshooting Junos security components.
Duration: 5 days
• Demonstrate understanding of concepts covered in the prerequisite Junos Security course.
• Describe the various forms of security supported by the Junos OS.
• Implement features of the AppSecure suite, including AppID, AppFW, and AppTrack.
• Configure custom application signatures.
• Describe Junos security handling at Layer 2 versus Layer 3.
• Implement Layer 2 transparent mode security features.
• Demonstrate understanding of Logical Systems (LSYS).
• Implement address books with dynamic addressing.
• Compose security policies utilizing ALGs, custom applications, and dynamic addressing for various scenarios.
• Use Junos debugging tools to analyze traffic flows and identify traffic processing patterns and problems.
• Describe Junos routing instance types used for virtualization.
• Implement virtual routing instances.
• Describe and configure route sharing between routing instances using logical tunnel interfaces.
• Describe and implement static, source, destination, and dual NAT in complex LAN environments.
• Describe and implement variations of persistent NAT.
• Describe and implement Carrier Grade NAT (CGN) solutions for IPv6 NAT, such as NAT64, NAT46, and DS-Lite.
• Describe the interaction between NAT and security policy.
• Demonstrate understanding of DNS doctoring.
• Differentiate and configure standard point-to-point IP Security (IPsec) virtual private network (VPN) tunnels, hub-and-spoke VPNs, dynamic VPNs, and group VPNs.
• Implement IPsec tunnels using virtual routers.
• Implement OSPF over IPsec tunnels and utilize generic routing encapsulation (GRE) to interconnect to legacy firewalls.
• Monitor the operations of the various IPsec VPN implementations.
• Describe public key cryptography for certificates.
• Utilize Junos tools for troubleshooting Junos security implementations.
• Perform successful troubleshooting of some common Junos security issues.
Junos Layer 2 Packet Handling and Security Features
Transparent Mode Security
Layer 2 Ethernet Switching
Lab 3: Implementing Junos Virtual Routing
Advanced NAT Concepts
NAT: Beyond Layer 3 and Layer 4 Headers
Advanced NAT Scenarios
Standard VPN Implementations Review
Public Key Infrastructure
Enterprise IPsec Technologies: Group and Dynamic VPNs
Group VPN Overview
Group VPN Configuration and Monitoring
Dynamic VPN Overview
Dynamic VPN Implementation
IPsec VPN Case Studies and Solutions
Routing over VPNs
IPsec with Overlapping Addresses
Dynamic Gateway IP Addresses
Enterprise VPN Deployment Tips and Tricks
Troubleshooting Junos Security
Identifying IPsec Issues
Request More Information