Introduction to Junos Security (IJSEC) – Outline

Detailed Course Outline

Day 1

1 COURSE INTRODUCTION
2 Juniper Security Concepts
  • Security Challenges
  • Security Design Overview
  • Juniper Connected Security
3 Juniper Connected Security – SRX Series Devices
  • Connected Security
  • Interfaces
  • Initial Configuration

LAB 1: Initial Configuration

4 Security Objects
  • Security Zone Objects
  • Security Screen Objects
  • Security Address Objects
  • Security Services Objects

LAB 2: Creating Security Objects with J-Web

5 Security Policies
  • Security Policy Overview
  • Zone-Based Policies
  • Global Security Policies
  • Application Firewall with Unified Security Policies

LAB 3: Creating Security Policies with J-Web

Day 2

6 Security Services – IDP and User Firewall
  • IDP Security Services
  • Integrated User Firewall

LAB 4: Adding IDP and User Firewall Security Services to Security Policies

7 Security Services – UTM
  • Content Filtering
  • Web Filtering
  • Antivirus
  • Antispam

LAB 5: Adding UTM Security Services to Security Policies

8 Juniper Connected Security – Sky ATP
  • Sky ATP Overview
  • Blocking Threats

Lab 6: Demonstrating Sky ATP

9 Network Address Translation
  • NAT Overview
  • Source NAT
  • Destination NAT
  • Static NAT

Lab 7: Implementing Network Address Translation

Day 3

10 IPsec VPN Concepts
  • VPN Types
  • Secure VPN Requirements
  • IPsec Tunnel Establishment
  • IPsec Traffic Processing
11 Site-to-Site VPNs
  • IPsec Configuration
  • IPsec Site-to-Site Tunnel

Lab 8: Implementing Site-to-Site IPsec VPNs

12 Monitoring and Reporting
  • J-Web monitoring options
  • J-Web Reporting options
Lab 9: Using Monitoring and Reporting
  • Appendix A: SRX Series Hardware
  • Appendix B: Virtual SRX
  • Appendix C: CLI Primer
  • Appendix D: Sky Enterprise Services
  • Appendix E: Junos Space Security Director