...

JUNIPER IJSEC

د.إ500.00

“This lab offers foundational knowledge for working with the Junos operating system and configuring Junos security devices. It covers an overview of Juniper security products, key components of Junos software architecture, and emphasizes CLI as the primary UI. Topics include initial device setup, basic interface configuration with examples, secondary system configuration, and operational monitoring. Additionally, the lab explores security objects, policies, and configuration examples such as security services NAT, site-to-site IPsec VPN, and Juniper Secure Connect VPN. Participants gain practical experience through demonstrations and hands-on labs configuring and monitoring Junos OS on SRX Series devices.”

Enquire Now
Category:

This lab provides students with the foundational knowledge required to work with the Junos operating system and to configure Junos security devices. This provides a brief overview of the Juniper security products and discusses the key architectural components of the Junos software. Key topics include UI options with a heavy focus on CLI, configuration tasks typically associated with the initial setup of devices, interface configuration basics with configuration examples, secondary system configuration, and the basics of operational monitoring and maintenance of Junos Security devices. This lab then delves into foundational knowledge of security objects, security policies, and configuration examples including types of security
objects, security policies, security services NAT, site-to-site IPsec VPN, and Juniper Secure Connect VPN. Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring Junos OS and monitoring basic device operations on the SRX Series device.

 

Course modules:

  1. Deploying Juniper SRX Series Overview
  2. Access Junos J-Web UI and its features
  3. Juniper SRX Initial Configuration
  4. initial configuration tasks
  5. Perform basic interface configuration
  6. Perform Junos CLI basics
  7. Junos operational mode
  8. Junos configuration mode
  9. Configure security zones objects
  10. Configure screen objects
  11. Configure address objects
  12. Configure service objects
  13. Creating security Policies
  14. Configure an application firewall with unified security policies
  15. Define the IPS policy components
  16. Configure IPS policies
  17. Integrate Active Directory
  18. Configure integrated user-based firewall
  19. Configure UTM—Antivirus and Antispam
  20. Configure Content filtering
  21. Configure Web filtering
  22. Configure JATP
  23. Monitor JATP
  24. Configure and monitor source NAT
  25. Configure and monitor destination NAT
  26. Configure and monitor static NAT
  27. Implement IPsec VPN for a given use case
  28. Monitor site-to-site IPsec VPN
  29. Configure Juniper Secure Connect UI options
  30. Deploy Juniper Secure Connect
  31. Monitor Juniper Secure Connect
  32. Packet capture
  33. Trace options on the SRX Series device
  34. verify Content Security policy usage
  35. Monitoring
  36. Syslog configuration
  37. Troubleshooting

Reviews

There are no reviews yet.

Be the first to review “JUNIPER IJSEC”

Your email address will not be published. Required fields are marked *

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.