Gedetailleerde cursusinhoud
Day 1
Chapter 1: Course Introduction
Chapter 2: Junos Layer 2 Packet Handling and Security Features
- Transparent Mode Security
- Secure Wire
- Layer 2 Next Generation Ethernet Switching
- MACsec
- Lab 1: Implementing Layer 2 Security
Chapter 3: Firewall Filters
- Using Firewall Filters to Troubleshoot
- Routing Instances
- Filter-Based Forwarding
- Lab 2: Implementing Firewall Filters
Chapter 4: Troubleshooting Zones and Policies
- General Troubleshooting for Junos Devices
- Troubleshooting Tools
- Troubleshooting Zones and Policies
- Zone and Policy Case Studies
- Lab 3: Troubleshooting Zones and Policies
Day 2
Chapter 5: Hub-and-Spoke VPN
- Overview
- Configuration and Monitoring
- Lab 4: Implementing Hub-and-Spoke VPNs
Chapter 6: Advanced NAT
- Configuring Persistent NAT
- Demonstrate DNS doctoring
- Configure IPv6 NAT operations
- Troubleshooting NAT
- Lab 5: Implementing Advanced NAT Features
Chapter 7: Logical and Tenant Systems
- Overview
- Administrative Roles
- Differences Between LSYS and TSYS
- Configuring LSYS
- Configuring TSYS
- Lab 6: Implementing TSYS
Day 3
Chapter 8: PKI and ADVPNs
- PKI Overview
- PKI Configuration
- ADVPN Overview
- ADVPN Configuration and Monitoring
- Lab 7: Implementing ADVPNs
Chapter 9: Advanced IPsec
- NAT with IPsec
- Class of Service with IPsec
- Best Practices
- Routing OSPF over VPNs
- Lab 8: Implementing Advanced IPsec Solutions
Chapter 10: Troubleshooting IPsec
- IPsec Troubleshooting Overview
- Troubleshooting IKE Phase 1 and 2
- IPsec Logging
- IPsec Case Studies
- Lab 9: Troubleshooting IPsec
Day 4
Chapter 11: Juniper Connected Security
- Security Models
- Enforcement on Every Network Device
Chapter 12: Sectel
- Security Feed
- Encrypted Traffic Analysis
- Use Cases for Sectel
- Lab 10: Implementing Sectel
Chapter 13:Advanced Juniper ATP On-Prem
- Collectors
- Private Mode
- Incident Response
- Deployment Models
- Lab 11: Implementing Advanced ATP On-Prem
Chapter 14: Automated Threat Mitigation
- Identify and Mitigate Malware Threats
- Automate Security Mitigation
- Lab 12: Identifying and Mitigation of Threats
Appendix A: Group VPNs
- Overview
- Implementing Group VPNs