After successfully completing this course, you should be able to: • Identify high-level security challenges in today’s networks.
• Identify products that are incorporated into the Juniper Connected Security solution.
• Explain the value of implementing security solutions.
• Explain how Juniper Connected Security solves the cyber security challenges of the future.
• Explain the SRX Series devices and the added capabilities that next-generation firewalls provide.
• Explain traffic flows through the SRX Series devices.
• List the different security objects and how to create them.
• Describe interface types and perform basic interface configuration tasks.
• Describe the initial configuration for an SRX Series device.
• Explain security zones.
• Describe screens and their use.
• Explain address objects. • Describe services and their use.
• Describe the purpose for security policies on an SRX Series device.
• Describe zone-based policies.
• Describe global policies and their use.
• Explain unified security policies.
• Configure unified security policies with the J-Web user interface.
• Describe IDP signatures.
• Configure an IDP policy using predefined templates with the J-Web user interface.
• Describe the use and configuration of the integrated user firewall feature.
• Describe the UTM security services.
• List the available UTM services on the SRX Series device.
• Configure UTM filtering on a security policy with the J-Web user interface.
• Explain Sky ATP’s use in security.
• Describe how Sky ATP and SRX Series devices operate together in blocking threats.
• Describe NAT and why it is used.
• Explain source NAT and when to use it.
• Explain destination NAT and when to use it.
• Explain static NAT and its uses.
• Describe the operation and configuration the different types of NAT.
• Identify various types of VPNs.
• Describe IPsec VPNs and their functionality.
• Describe how IPsec VPNs are established.
• Describe IPsec traffic processing.
• Configure IPsec VPNs with the J-Web user interface.
• Describe and configure proxy IDs and traffic selectors with the J-Web user interface.
• Monitor IPsec VPNs with the J-Web user interface.
• Describe the J-Web monitoring features.
• Explain the J-Web reporting features.
• Describe the Sky Enterprise service and how it can save resources.
• Explain the functionality of Junos Space Security Director.
Chapter 1: Course Introduction
Chapter 2: Juniper Security Concepts
- Security Challenges
- Security Design Overview
- Juniper Connected Security
Chapter 3: Juniper Connected Security – SRX Series Devices
- SRX Architectural Overview
- Traffic Processing
- J-Web Overview
- Initial Configuration
- Interface Configuration
- Lab 1: Initial Configuration
Chapter 4: Security Objects
- Security Zone Objects
- Security Screen Objects
- Security Address Objects
- Security Services Objects
- Lab 2: Creating Security Objects with J-Web
Chapter 5: Security Policies
- Security Policy Overview
- Security Policy Components
- Application Firewall with Unified Security Policies
- Security Policy Case Study
- Lab 3: Implementing Security Policies
Chapter 6: Security Services – IDP and User Firewall
- Introduction to IPS
- IPS Policy Components
- Configuring IPS Policies
- User Firewall Overview
- Configuring Integrated User Firewall
- Lab 4: Implementing Security Services
Chapter 7: Security Services - UTM
- Content Filtering
- Web Filtering
- Antivirus
- Antispam
- Lab 5: Implementing UTM
Chapter 8: Juniper Connected Security – Sky ATP
- Sky ATP Overview
- Sky ATP Features
- Sky ATP Setup
- Monitor Sky ATP
- Lab 6: Demonstrating Sky ATP
Chapter 9: Network Address Translation
- NAT Overview
- Source NAT
- Destination NAT
- Static NAT
- Lab 7: Implementing Network Address Translation
Chapter 10: Site-to-Site VPNs
- IPsec Site-to-Site VPN Configuration
- IPsec Site-to-Site VPN Case Study
- Proxy IDs and Traffic Selectors
- Monitoring Site-to-Site IPsec VPNs
- Lab 8: Implementing Site-to-Site IPsec VPNs
Chapter 11: Monitoring and Reporting
- Monitor Platform and Interface Operations
- J-Web Reporting options
- Lab 9: Using Monitoring and Reporting