Introduction to Juniper Security (IJSEC) – Outline

Detailed Course Outline

DAY 1

Course Introduction

Juniper Connected Security

  • Identify the high-level security challenges in today’s network
  • Describe basic network security design
  • Identify the key factors in Juniper Networks security focus

Juniper SRX Overview

  • Describe the Junos architecture and SRX feature
  • Explain the traffic processing and logical packet flow on an SRX Series device
  • Describe the Junos J-Web UI and its features

Juniper SRX Initial Configuration

  • List and perform initial configuration tasks
  • Perform basic interface configuration tasks

Lab 1: Initial System Configuration

UI Options – The Junos CLI

  • Perform Junos CLI basics
  • Describe Junos operational mode
  • Describe Junos configuration mode

Security Zones and Screen Objects

  • Describe and configure security zones objects
  • Describe and configure screen objects

Address Objects and Service Objects

  • Describe and configure address objects
  • Describe and configure service objects

Lab 2: Creating Security Objects

DAY 2

Security Policies

  • Describe the purpose and types of security policies
  • Define the security policy components
  • Configure an application firewall with unified security policies
  • Implement security policy for a given use case

Lab 3: Creating Security Policies

Security Services—IPS

  • Explain the purpose of IPS
  • Define the IPS policy components
  • Configure IPS policies

Security Services—Integrated User-Based Firewall

  • Explain the purpose of user-based firewall
  • Configure integrated user-based firewall

Lab 4: Security Services—IPS Integrated User Firewall

UTM—Antivirus and Antispam

  • Describe the purpose of UTM services
  • Explain antispam and its functionality

UTM—Content Filtering and Web Filtering

  • Explain the functionality of Content filtering
  • Explain the functionality of Web filtering

Lab 5: Implementing UTM Virtual SRX

Juniper Connected Security—JATP Cloud

  • Explain the purpose of JATP
  • Describe the features of JATP
  • Describe the process to enroll devices with JATP cloud
  • Monitor JATP

Lab 6: JATP Overview

DAY 3

Source Network Address Translation

  • Describe the purpose and functionality of NAT and PAT
  • Configure and monitor source NAT
  • Explain the purpose of proxy ARP

Destination Network Address Translation and Static Network Address Translation

  • Configure and monitor destination NAT
  • Configure and monitor static NAT

Lab 7: Implementing NAT

Site-to-Site IPsec VP

  • Describe the high-level overview and configuration options for IPsec VPN
  • Implement IPsec VPN for a given use case
  • Describe the functionality of proxy-id and traffic selectors
  • Monitor site-to-site IPsec VPN

Lab 8: Implementing IPsec VPN

Juniper Secure Connect

  • Describe Juniper Secure Connect features
  • Explain Juniper Secure Connect UI options
  • Deploy Juniper Secure Connect
  • Monitor Juniper Secure Connect

Lab 9: Implementing Juniper Secure Connect

SRX Troubleshooting

  • Discuss SRX and vSRX licensing
  • Describe how to use packet capture
  • Describe the traceoptions on the SRX Series device
  • Discuss how to verify Content Security policy usage

Monitoring and Reporting

  • Explain the basic monitoring features
  • Explain the use of network utility tools on the SRX Series device
  • Describe the procedure of maintaining Junos OS
  • Identify the various reports available on SRX J-Web interface

Lab 10: Monitoring and Reporting

The following appendices can be covered - time permitting - if requested by the delegate/s at the time of booking the course:

  • SRX Series Hardware and Interfaces
  • Virtual SRX
  • Juniper Sky Enterprise
  • IPsec VPN Concepts