Juniper CJFV - Configuring Juniper Networks Firewall/IPSec VPN Products

Course

In Bangalore

Price on request

Description

  • Type

    Course

  • Location

    Bangalore

  • Duration

    3 Days

Suitable for: Network engineers, support personnel, reseller support, and others responsible for implementing NetScreen products utilizing the advanced features covered in this class.

Facilities

Location

Start date

Bangalore (Karnātaka)
See map
#70/1, 2nd Floor, Dr.Brownamma Towers 2nd Cross, Mission Road, CSI Compund, Opp: HCG Hospital, 560027

Start date

On request

About this course

This course assumes that students have basic networking knowledge and experience in the following areas:

* Ethernet
* Transparent Bridging
* TCP/IP Operations
* IP Addressing
* Routing

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Course programme

Juniper Networks intrusion detection in addition to prevention products provide comprehensive inline network security from worms, Trojans, spy ware, key loggers, in addition to other malwaare.

Course includes

ScreenOS Concepts, Terminology, in addition to Platforms
o Explain the necessities of a security apparatus
o Explain the Screens Security structural design
o Explain the run of a pack from side to side a ScreenOS device
o Select ScreenOS-based devices based on deployment requirement
* Initial Connectivity
o Explain the functions performed by dissimilar system components
o Choose a user border based on dealing in addition to assignment requirements
o Institute connectivity to the Screen- OS apparatus by means of best-practice suggestions
* Device administration
o Join to peripheral managing devices
o control license keys
o control configuration in addition to software image files
o Perform disaster recovery procedures
Layer 3 Operations
o Layer 3 Operations
o Explain the fundamental router structural design
o Configure stationary routes
o Explain the use of a loopback interface
o Configure a loopback interface
o Configure interfaces for NAT or route mode
o Verify in addition to troubleshoot Layer 3 operation
* Basic Policy Configuration
o Evaluation security strategy functionality
o Construct a basic safekeeping policy with the following elements
+ Address book entries in addition to groups
+ Custom services in addition to service groups
+ Multi-cell policies>
Transparant Mode
o Explain the advantages of see-through Mode operation
o Distinguish stuck between crystal clear mode zones in addition to interfaces in addition to Layer 3 mode zones in addition to interfaces
o Use the V LAN 1 interface to manage the Screen-OS device in Transparent Mode
* V P N Concepts
o Define fundamental private complex
o List three security concerns in addition to Explain how to address them
o List the components of the IP Sec protocol suite
o Explain the IKE protocol process for tunnel establishment
* Policy Based VPNs
o Define the term policy-based VPN
o Identify the minimum components needed to configure a Policy-based VPN
o Configure a IKE based Virtual Private Networks binding to Policies with:
+ Phase 1 Gateways
+ Phase 2 Auto Key IKE
+ Address in addition to Service book
o Verify operations
* Route Based Virtual Private Networks
o Explain the concepts of a route-based VPN
Configure route-based VPNs with the following options:
+ Fixed IP v Unnumbered IP
+ Substitute ID Settings
+ Virtual Private Network screen
o Confirm operation
Configuring networks for highly developed routing
utilize advanced reporting in addition to monitoring features
Identifying in addition to tracking network intrusions
Assessing security acceleration supplies
Auditing in addition to approving Security strategy changes
Troubleshoot with advanced debugging techniques
* Configure networks for advanced routing
* * Put together security strategy
* Protect email in addition to messaging content
Secure communications across the internet
* Look after alongside network intimidation
* Put together protection policy
* Shield email in addition to messaging material












Juniper CJFV - Configuring Juniper Networks Firewall/IPSec VPN Products

Price on request