This three-day course discusses edge security concepts for the service provider network. It discusses security for 5G networks on the main GPRS interfaces. Key topics include deploying an SRX Series device in different parts of the service provider network, implementing CGNAT, DDoS, malware inspection, command-and-control prevention, IPsec tunnels, 5G security, control plane hardening, and BGP hardening.Students will gain experience in configuring, testing, and troubleshooting the Junos OS through demonstrations and hands-on labs. This course is based on Junos OS 21.1R1.11.The Juniper Service Provider Edge Security (JSPES) is an intermediate-level course.Relevant Juniper Product• Junos OS • SRX Series
TARGET AUDIENCE:
This course benefits those responsible for implementing, monitoring, and troubleshooting Juniper security components.
COURSE PREREQUISITES:
• Intermediate level of TCP/IP networking and security knowledge.• Attend the Introduction to Juniper Security (IJSEC) course before attending this class.
COURSE CONTENT:
Day 1Course IntroductionSecurity Challenges for Service Providers• Describe limitations of security devices• Describe DDoS attack threats• Describe BGP security threats• Explain IP address depletion challenges• Describe 5G security challengesJuniper Networks Solutions for Service Providers• Describe Juniper Networks' security solutions for the service provider challengesStateful Firewalls• Describe stateless firewall filters• Describe stateful firewall policies• Describe screens and ALGs• Explain asymmetrical routingLab 1: Configure Stateful Firewalls5G Architecture using SRX Series Devices• Describe security insertion points• Describe 5G network evolutionDDoS Protection• Explain DDoS history and common protections• Describe SRX DDoS protection• Describe BGP FlowSpec• Describe Corero with MX DDoS protectionLab 2: DDoS ProtectionDay 2Carrier-Grade NAT• Explain IPv4 address exhaustion• Describe Source NAT• Describe CGNAT• Describe NAT64Lab 3: CGNATJuniper Connected Security for Service Providers• Explain Juniper Connected Security• Describe SecIntel feeds• Describe a use case for IoT protectionLab 4: Implementing Juniper Connected SecurityIPsec Overview• Describe the IPsec and IKE protocols• Configure site-to-site IPsec VPNs• Describe and configure Proxy IDs and Traffic selectors• Monitor site-to-site IPsec VPNs• Describe IPsec use with gNodeB devicesLab 5: Site-to-Site IPsec VPNScaling IPsec • Describe and implement PKI certificates in Junos OS• Describe AutoVPN• Describe SecGW firewall use case for scaling IPsecLab 6: Configuring AutoVPNDay 3GPRS and GTP• Describe how to secure GTP tunnels• Describe the GPRS protocol• Describe the GTP• Explain how Roaming Firewall secures GTPSCTP • Describe the SCTPLab 7: Video about Implementing the Roaming Firewall (Demo)Securing the Control Plane• Explain how to secure the control plane on Junos devices• Describe how the loopback filter works to secure the control plane• Explain how to protect the control plane from DDoS attacks• Describe how to secure the IGP against attacksLab 8: Configure Control Plane ProtectionsSecuring the BGP• Describe how to secure the BGP• Describe BGP security features• Describe BGP dampeningLab 9: Configure BGP protections
COURSE OBJECTIVE:
• Define the general security architecture for 4G and 5G networks.• Configure data plane security protections.• Explain DoS and DDoS attacks.• Describe BGP Flowspec in protecting against DDoS attacks.• Explain the Corero solution for DDoS attacks.• Describe the use of stateful firewalls.• Explain the use of ALGs in stateful security firewalls.• Explain how to secure BGP on Junos devices.• Describe how to use IPsec to secure traffic.• Explain the new IoT threat to networks.• Describe AutoVPN IPsec architectures.• Explain the use and configuration of CGNAT on SRX Series devices.
FOLLOW ON COURSES:
Not available. Please contact.