COURSE OBJECTIVE:
• Describe Juniper Networks connected security device framework• Describe SRX Series device features• Describe initial and basic configuration• Describe and demonstrate the Junos CLI options• Configure security zone and screen objects• Configure address and service objects• Implement security policies• Describe IPS and implement IPS policies• Describe user-based firewall and implement integrated user-based firewall• Describe UTM—Antivirus and Antispam• Describe UTM—Content Filtering and Web Filtering• Describe JATP Cloud Features• Implement Source NAT• Implement Destination and Static NAT• Implement Site-to-Site IPsec VPN• Describe SSL VPN by using Juniper Secure Connect• Administer and Troubleshoot Security Services on an SRX Series Device• Describe Monitoring and Reporting Features on the SRX Series Device
TARGET AUDIENCE:
This course benefits individuals responsible for configuring and monitoring Juniper Security devices.
COURSE PREREQUISITES:
• Basic networking knowledge• Basic understanding of the Open Systems Interconnection (OSI) reference model• Basic understanding of the TCP/ IP protocol suite
COURSE CONTENT:
DAY 1Course IntroductionJuniper Connected Security• Identify the high-level security challenges in today's network• Describe basic network security design• Identify the key factors in Juniper Networks security focusJuniper SRX Overview• Describe the Junos architecture and SRX features• Explain the traffic processing and logical packet flow on an SRX Series device• Describe the Junos J-Web UI and its featuresJuniper SRX Initial Configuration• List and perform initial configuration tasks• Perform basic interface configuration tasksLab 1: Initial System ConfigurationUI Options – The Junos CLI• Perform Junos CLI basics• Describe Junos operational mode• Describe Junos configuration mode Security Zones and Screen Objects• Describe and configure security zones objects• Describe and configure screen objectsAddress Objects and Service Objects• Describe and configure address objects• Describe and configure service objectsLab 2: Creating Security ObjectsDAY 2Security Policies• Describe the purpose and types of security policies• Define the security policy components• Configure an application firewall with unified security policies• Implement security policy for a given use caseLab 3: Creating Security PoliciesSecurity Services—IPS• Explain the purpose of IPS• Define the IPS policy components• Configure IPS policiesSecurity Services—Integrated User-Based Firewall• Explain the purpose of user-based firewall• Configure integrated user-based firewallLab 4: Security Services—IPS Integrated User FirewallUTM—Antivirus and Antispam• Describe the purpose of UTM services• Explain antispam and its functionalityUTM—Content Filtering and Web Filtering• Explain the functionality of Content filtering• Explain the functionality of Web filteringLab 5: Implementing UTM Virtual SRXJuniper Connected Security—JATP Cloud• Explain the purpose of JATP• Describe the features of JATP• Describe the process to enroll devices with JATP cloud• Monitor JATPLab 6: JATP OverviewDAY 3Source Network Address Translation• Describe the purpose and functionality of NAT and PAT• Configure and monitor source NAT• Explain the purpose of proxy ARPDestination Network Address Translation and Static Network Address Translation• Configure and monitor destination NAT• Configure and monitor static NATLab 7: Implementing NATSite-to-Site IPsec VP• Describe the high-level overview and configuration options for IPsec VPN• Implement IPsec VPN for a given use case• Describe the functionality of proxy-id and traffic selectors• Monitor site-to-site IPsec VPNLab 8: Implementing IPsec VPNJuniper Secure Connect• Describe Juniper Secure Connect features• Explain Juniper Secure Connect UI options• Deploy Juniper Secure Connect• Monitor Juniper Secure ConnectLab 9: Implementing Juniper Secure ConnectSRX Troubleshooting• Discuss SRX and vSRX licensing• Describe how to use packet capture• Describe the traceoptions on the SRX Series device• Discuss how to verify Content Security policy usageMonitoring and Reporting• Explain the basic monitoring features• Explain the use of network utility tools on the SRX Series device• Describe the procedure of maintaining Junos OS• Identify the various reports available on SRX J-Web interfaceLab 10: Monitoring and ReportingThe following appendices can be covered – time permitting – if requested by the delegate/s at the time of booking the course:SRX Series Hardware and InterfacesVirtual SRXJuniper Sky EnterpriseIPsec VPN Concepts
FOLLOW ON COURSES:
Juniper Security (JSEC)