SCN GmbH

Junos 22.2 Safety Complete Fast Track

Seminar / Training Junos Security Complete Fast-Track

Part 1

Introduction - Traditional Routing and Security - Architecture - Logical Packet Flow - Junos Space - Security Director Overview

Zones - Zone Configuration - Monitoring

Security Policies - Overview - Policy Components - Policy Case Study

Security Director Firewall Policies - Configuration - Processing - Deployment - Monitoring

Advanced Security Policies - Session Management - Junos ALGs - Policy Planning - Logging - Security Director

Troubleshooting - General Troubleshooting - Tools

Network Address Translation - NAT Overview - Source NAT - Destination NAT - Static NAT - Proxy ARP - Persistent NAT - IPv6 with NAT - Troubleshooting

IPsec VPN Concepts - VPN Types - VPN Requirements - IPsec Tunnel Setup

IPsec VPN Implementation - Configuration - Proxy IDs and Traffic Selectors - Monitoring

Hub-and-spoke VPNs - Overview - Configuration - Monitoring - Security Director

Group VPNs - Overview - Configuration - Monitoring

PKI and ADVPNs - Public Key Infrastructure - Overview - Configuration - Monitoring

Advanced IPsec - NAT with IPsec - Classes of Service with IPsec - Routing OSPF over IPsec - Overlapping Address - Dynamic Gateway IP Addresses - Troubleshooting IKE Phase 1 and 2 - Logging

Chassis Cluster - Concepts - Components - Operation - Implementation - Advanced Chassis Cluster Options - Troubleshooting

SRX Platform - Overview - SRX Traffic Flow and Distribution - Interfaces - Virtual SRX - Virtualization Overview - Network Virtualization and SDN - Deployment Scenarios - Integration with AWS

Part 2

Junos Layer 2 Packet Handling and Security Features - Transparent Mode Security - Layer 2 Next Generation Ethernet Switching - MACsec

Virtualization - Overview - Routing Instances - Logical Systems

AppSecure - Overview - AppTrack - AppFW - APBR - SSL Proxy

Sky ATP - Overview - Setup with Web Interface and Security Director - Troubleshooting - Monitoring Infected Hosts SDSN with Policy Enforcer - Overview - Configuring

UTM - Overview - AntiSpam - AntiVirus - Content and Web Filtering

IPS - Overview - Protecting Network Assets - Intrusion Attack Methods - Intrusion Prevention Systems - IPS Policies - SRX IPS Requirements - Operating Modes - IPS Rulebase Operations

SSL Proxy - Overview - Client Protection - Server Protection

User Authentication - User Role Firewall Overview - Firewall Implementation - Monitoring

Monitoring - Log Director Overview - Log Director Installation - Log Events - Alerts and Reports

We conduct this seminar online for you. You can book the training as a public seminar or as a company seminar. The practical exercises are carried out in our Remotelab and make up 40-50 percent of the seminar.

Your contacts

We offer seminars with a high practical relevance. The contents and exercises are geared to your daily tasks in the company and completely dispense with advertising references to other products of the software manufacturer.

All our training courses are manufacturer-independent. This enables us to offer critical considerations of the products themselves and comparisons with competitors of the manufacturer in the seminar. The course contents are our own and derived from the practical experience of our trainers in projects.

Of course, the contents of company seminars can be individually adapted to your needs. Please do not hesitate to contact us.

Oops, an error occurred! Code: 202411210956027efac0f2