Juniper CJFV - Configuring Juniper Networks Firewall/IPSec VPN Products

In Bangalore

Price on request
You can also call the Study Centre
80421... More

Important information

Typology Course
Location Bangalore
Duration 3 Days
  • Course
  • Bangalore
  • Duration:
    3 Days

Suitable for: Network engineers, support personnel, reseller support, and others responsible for implementing NetScreen products utilizing the advanced features covered in this class.


Where and when

Starts Location
On request
#70/1, 2nd Floor, Dr.Brownamma Towers 2nd Cross, Mission Road, CSI Compund, Opp: HCG Hospital, 560027, Karnataka, India
See map
Starts On request
#70/1, 2nd Floor, Dr.Brownamma Towers 2nd Cross, Mission Road, CSI Compund, Opp: HCG Hospital, 560027, Karnataka, India
See map

Frequent Asked Questions

· Requirements

This course assumes that students have basic networking knowledge and experience in the following areas: * Ethernet * Transparent Bridging * TCP/IP Operations * IP Addressing * Routing

Course programme

Juniper Networks intrusion detection in addition to prevention products provide comprehensive inline network security from worms, Trojans, spy ware, key loggers, in addition to other malwaare.

Course includes

ScreenOS Concepts, Terminology, in addition to Platforms
o Explain the necessities of a security apparatus
o Explain the Screens Security structural design
o Explain the run of a pack from side to side a ScreenOS device
o Select ScreenOS-based devices based on deployment requirement
* Initial Connectivity
o Explain the functions performed by dissimilar system components
o Choose a user border based on dealing in addition to assignment requirements
o Institute connectivity to the Screen- OS apparatus by means of best-practice suggestions
* Device administration
o Join to peripheral managing devices
o control license keys
o control configuration in addition to software image files
o Perform disaster recovery procedures
Layer 3 Operations
o Layer 3 Operations
o Explain the fundamental router structural design
o Configure stationary routes
o Explain the use of a loopback interface
o Configure a loopback interface
o Configure interfaces for NAT or route mode
o Verify in addition to troubleshoot Layer 3 operation
* Basic Policy Configuration
o Evaluation security strategy functionality
o Construct a basic safekeeping policy with the following elements
+ Address book entries in addition to groups
+ Custom services in addition to service groups
+ Multi-cell policies>
Transparant Mode
o Explain the advantages of see-through Mode operation
o Distinguish stuck between crystal clear mode zones in addition to interfaces in addition to Layer 3 mode zones in addition to interfaces
o Use the V LAN 1 interface to manage the Screen-OS device in Transparent Mode
* V P N Concepts
o Define fundamental private complex
o List three security concerns in addition to Explain how to address them
o List the components of the IP Sec protocol suite
o Explain the IKE protocol process for tunnel establishment
* Policy Based VPNs
o Define the term policy-based VPN
o Identify the minimum components needed to configure a Policy-based VPN
o Configure a IKE based Virtual Private Networks binding to Policies with:
+ Phase 1 Gateways
+ Phase 2 Auto Key IKE
+ Address in addition to Service book
o Verify operations
* Route Based Virtual Private Networks
o Explain the concepts of a route-based VPN
Configure route-based VPNs with the following options:
+ Fixed IP v Unnumbered IP
+ Substitute ID Settings
+ Virtual Private Network screen
o Confirm operation
Configuring networks for highly developed routing
utilize advanced reporting in addition to monitoring features
Identifying in addition to tracking network intrusions
Assessing security acceleration supplies
Auditing in addition to approving Security strategy changes
Troubleshoot with advanced debugging techniques
* Configure networks for advanced routing
* * Put together security strategy
* Protect email in addition to messaging content
Secure communications across the internet
* Look after alongside network intimidation
* Put together protection policy
* Shield email in addition to messaging material

Students that were interested in this course also looked at...
See all