Juniper INSM - Implementing NetScreen Security Manager Course

HBF IT EDUCATION SERVICES
In Bangalore

Price on request
You can also call the Study Centre
80421... More
Compare this course with other similar courses
See all

Important information

  • Course
  • Bangalore
  • Duration:
    2 Days
Description


Suitable for: Network engineers, support personnel, reseller support, and others responsible for implementing Juniper products utilizing the advanced features covered in this class.

Important information
Venues

Where and when

Starts Location
On request
Bangalore
#70/1, 2nd Floor, Dr.Brownamma Towers 2nd Cross, Mission Road, CSI Compund, Opp: HCG Hospital, 560027, Karnataka, India
See map

Frequent Asked Questions

· Requirements

This course assumes that students have successfully attended the INSG 5.1 course or have equivalent experience with NetScreen's ScreenOS. Specifically, students need to be familiar with configuration of: * Zones and Interfaces * Virtual routers and inter-VR routing * Policies * Address Translation * VPNs

Course programme

The program is of two days. The program covers the whole design about NSM, its functions furthermore management.

In day 1, students learn the subsequent points

Protection Administrator notion

* Elucidate Protection Administrator topics
* Elucidate Protection Administrator structural design module
* Elucidate Protection Administrator Communication

Server management

* List Protection Administrator daemons furthermore
* Elucidate Protection Administrator list design furthermore
* Elucidate H-A working furthermore options

Province furthermore Administrator

* Elucidate domain furthermore sub-province
* Elucidate role-based management
* Organize sub-domains furthermore custom administrator functions
* Organising management verification alternatives

Adding Devices

* Elucidate why/how to add a device to a domain
* List furthermore Elucidate methods to add devices
* Add devices to domain

Abstractions: Objects furthermore designs

* Elucidate the concept of objects
* List different types of objects available in Protection Administrator
* Configure commonly-used objects
* List the benefits of using templates
* List elements that should not be configured via templates
* Create furthermore apply templates
* Work with template overrides

In second day, they will go through the following

Policies

* Elucidate components of a Protection Administrator policy
* Create policies for firewall furthermore IDP devices
* Discuss best practices for policy import/merge/management

Managing Devices

* Manage configurations between Protection Administrator furthermore managed devices
* Perform routine device management tasks

* Logging furthermore Reporting

* Discuss the logging furthermore reporting capabilities of Protection Administrator
* Create custom log views
* Export log data for use in external reporting systems
* Use the Log Investigator to summarize attack information
* Run furthermore customize the built in reports
* Use Action Administrator

Statstical Report Server

* Elucidate the SRS architecture
* Configure admin console to converse with the Graphical user interface
Server furthermore Device Server
* Construct users furthermore user groups
* Construct devices furthermore device groups
* Web use for framing
* Handling catalog

Virtual Private Networks

* Elucidate Policy-based furthermore Route-based Virtual Private Networks
* Elucidate Protection Administrator VPN Concepts
* Elucidate 2 techniques with the purporse for Virtual Private Networks surrounded by Protection administrator









Compare this course with other similar courses
See all