Detailed Course Outline
DAY 1
Course Introduction
Juniper Connected Security
- Identify the high-level security challenges in today’s network
- Describe basic network security design
- Identify the key factors in Juniper Networks security focus
Juniper SRX Overview
- Describe the Junos architecture and SRX feature
- Explain the traffic processing and logical packet flow on an SRX Series device
- Describe the Junos J-Web UI and its features
Juniper SRX Initial Configuration
- List and perform initial configuration tasks
- Perform basic interface configuration tasks
Lab 1: Initial System Configuration
UI Options – The Junos CLI
- Perform Junos CLI basics
- Describe Junos operational mode
- Describe Junos configuration mode
Security Zones and Screen Objects
- Describe and configure security zones objects
- Describe and configure screen objects
Address Objects and Service Objects
- Describe and configure address objects
- Describe and configure service objects
Lab 2: Creating Security Objects
DAY 2
Security Policies
- Describe the purpose and types of security policies
- Define the security policy components
- Configure an application firewall with unified security policies
- Implement security policy for a given use case
Lab 3: Creating Security Policies
Security Services—IPS
- Explain the purpose of IPS
- Define the IPS policy components
- Configure IPS policies
Security Services—Integrated User-Based Firewall
- Explain the purpose of user-based firewall
- Configure integrated user-based firewall
Lab 4: Security Services—IPS Integrated User Firewall
UTM—Antivirus and Antispam
- Describe the purpose of UTM services
- Explain antispam and its functionality
UTM—Content Filtering and Web Filtering
- Explain the functionality of Content filtering
- Explain the functionality of Web filtering
Lab 5: Implementing UTM Virtual SRX
Juniper Connected Security—JATP Cloud
- Explain the purpose of JATP
- Describe the features of JATP
- Describe the process to enroll devices with JATP cloud
- Monitor JATP
Lab 6: JATP Overview
DAY 3
Source Network Address Translation
- Describe the purpose and functionality of NAT and PAT
- Configure and monitor source NAT
- Explain the purpose of proxy ARP
Destination Network Address Translation and Static Network Address Translation
- Configure and monitor destination NAT
- Configure and monitor static NAT
Lab 7: Implementing NAT
Site-to-Site IPsec VP
- Describe the high-level overview and configuration options for IPsec VPN
- Implement IPsec VPN for a given use case
- Describe the functionality of proxy-id and traffic selectors
- Monitor site-to-site IPsec VPN
Lab 8: Implementing IPsec VPN
Juniper Secure Connect
- Describe Juniper Secure Connect features
- Explain Juniper Secure Connect UI options
- Deploy Juniper Secure Connect
- Monitor Juniper Secure Connect
Lab 9: Implementing Juniper Secure Connect
SRX Troubleshooting
- Discuss SRX and vSRX licensing
- Describe how to use packet capture
- Describe the traceoptions on the SRX Series device
- Discuss how to verify Content Security policy usage
Monitoring and Reporting
- Explain the basic monitoring features
- Explain the use of network utility tools on the SRX Series device
- Describe the procedure of maintaining Junos OS
- Identify the various reports available on SRX J-Web interface
Lab 10: Monitoring and Reporting
The following appendices can be covered - time permitting - if requested by the delegate/s at the time of booking the course:
- SRX Series Hardware and Interfaces
- Virtual SRX
- Juniper Sky Enterprise
- IPsec VPN Concepts