International Site


Junos Security

We offer this course in co-operation with our partner Westcon Security. Westcon Security is Juniper Networks Authorized Education Center.

This three-day course covers the configuration, operation, and implementation of SRX Series Services Gateways in a typical network environment. Key topics within this course include security technologies such as security zones, security policies, intrusion detection and prevention (IDP), Network Address Translation (NAT), and high availability clusters, as well as details pertaining to basic implementation, configuration, and management.  Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring device operations. This course uses Juniper Networks SRX Series Services Gateways for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS. This course is based on Junos OS Release 12.1X47-D30.

Course Contents

Chapter 1: Course Introduction
Chapter 2: Introduction to Junos Security
Chapter 3: Zones
Chapter 4: Security Policies
Chapter 5: Advanced Policy Options
Chapter 6: Firewall User Authentication
Chapter 7: Network Address Translation
Chapter 8: IPsec VPN Concepts
Chapter 9: IPsec VPN Implementation
Chapter 10: Introduction to Intrusion Detection and Prevention
Chapter 11: High Availability Clustering Theory
Chapter 12: High Availability Clustering Implementation
Chapter 13: vSRX Virtual Firewall

 Each participant will receive the original course documentation as a Juniper E-Book.

 Detailed table of contents

 Request your tailor-made course.

Target Group

This course benefits operators of SRX Series Services Gateways. These operators include network engineers, administrators, support personnel, and reseller support personnel.

Knowledge Prerequisites

Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/IP protocol suite.

Course Objective

After successfully completing this course, you should be able to:
• Describe traditional routing and security and the current trends in internetworking;
• Provide an overview of Junos security platforms and software architecture;
• Describe the logical packet flow and session creation performed by Junos security platforms;
• Describe, configure, and monitor zones;
• Describe, configure, and monitor security policies;
• Describe, configure, and monitor firewall user authentication;
• Describe various types of network attacks;
• Configure and monitor SCREEN options to prevent network attacks;
• Explain, implement, and monitor NAT on Junos security platforms;
• Explain the purpose and mechanics of IPsec VPNs;
• Implement and monitor policy-based and route-based IPsec VPNs;
• Utilize and update the IDP signature database on Junos security platforms;
• Configure and monitor IDP policy with policy templates; and
• Describe, configure, and monitor high availability chassis clusters.