Got a Question?     Call 1800-8892-877

Introduction to Juniper Security (IJSEC)

This three-day course provides students with the foundational knowledge required to work with the Junos operating system and to configure
Junos security devices. The course provides a brief overview of the Juniper security products and discusses the key architectural components of
the Junos software. Key topics include UI options with a heavy focus on CLI, configuration tasks typically associated with the initial setup of
devices, interface configuration basics with configuration examples, secondary system configuration, and the basics of operational monitoring and
maintenance of Junos Security devices.
The course then delves into foundational knowledge of security objects, security policies, and configuration examples including types of security
objects, security policies, security services NAT, site-to-site IPsec VPN, and Juniper Secure Connect VPN.
Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring Junos OS and monitoring basic device
operations on the SRX Series device. This course is based on Junos OS Release 21.2R1.10.

Show More

Virtual Classroom Live

Prerequisites

The following are the prerequisites for this course: • Basic networking knowledge • Basic understanding of the Open Systems Interconnection (OSI) reference model • Basic understanding of the TCP/ IP protocol suite

Target Audience

  • This course benefits individuals responsible for configuring and monitoring Juniper Security devices
What You’ll Learn
  • After successfully completing this course, you should be able to:
  • Identify high-level security challenges in today’s networks.
  • Identify products that are incorporated into the Juniper Connected Security solution.
  • Explain the value of implementing security solutions.
  • Explain how Juniper Connected Security solves the cyber security challenges of the future.
  • Explain the SRX Series devices and the added capabilities that next-generation firewalls provide.
  • Explain traffic flows through the SRX Series devices.
  • List the different security objects and how to create them.
  • Describe interface types and perform basic interface configuration tasks.
  • Describe the initial configuration for an SRX Series device.
  • Explain security zones.
  • Describe screens and their use.
  • Explain address objects.
  • Describe services and their use.
  • Describe the purpose for security policies on an SRX Series device.
  • Describe zone-based policies.
  • Describe global policies and their use.
  • Explain unified security policies.
  • Configure unified security policies with the J-Web user interface.
  • Describe IDP signatures.
  • Configure an IDP policy using predefined templates with the J-Web user interface.
  • Describe the use and configuration of the integrated user firewall feature.
  • Describe the UTM security services
  • List the available UTM services on the SRX Series device.
  • Configure UTM filtering on a security policy with the J-Web user interface.
  • Explain Sky ATP’s use in security.
  • Describe how Sky ATP and SRX Series devices operate together in blocking threats.
  • Describe NAT and why it is used.
  • Explain source NAT and when to use it.
  • Explain destination NAT and when to use it.
  • Explain static NAT and its uses.
  • Describe the operation and configuration the different types of NAT.
  • Identify various types of VPNs.
  • Describe IPsec VPNs and their functionality.
  • Describe how IPsec VPNs are established.
  • Describe IPsec traffic processing.
  • Configure IPsec VPNs with the J-Web user interface.
  • Describe and configure proxy IDs and traffic selectors with the J-Web user interface.
  • Monitor IPsec VPNs with the J-Web user interface.
  • Describe the J-Web monitoring features.
  • Explain the J-Web reporting features.
  • Describe the Sky Enterprise service and how it can save resources.
  • Explain the functionality of Junos Space Security Director.
Course Outline
Labs Outline
Prerequisites
Related Certifications

• Describe Juniper Networks connected security device framework
• Describe SRX Series device features
• Describe initial and basic configuration
• Describe and demonstrate the Junos CLI options
• Configure security zone and screen objects
• Configure address and service objects
• Implement security policies
• Describe IPS and implement IPS policies
• Describe user-based firewall and implement integrated user-based firewall
• Describe UTM—antivirus and antispam
• Describe UTM—content filtering and Web filtering
• Describe JATP Cloud features
• Implement Source NAT
• Implement Destination and Static NAT
• Implement site-to-site IPsec VPN
• Describe SSL VPN by using Juniper Secure Connect
• Administer and troubleshoot security services on an SRX Series device
• Describe monitoring and reporting features on the SRX Series device