Juniper Networks Certified Internet Specialist – Pulse SA Certification

Courses:   JPSA
Exams:   JNO-355
Certification:   JNCIS-SA

 

Target Audience

Designed for experienced networking professionals with beginner-intermediate knowledge of the Junos Pulse solution provides dynamic SSL VPN connectivity, network access control (NAC), security, and application acceleration through a simplified user experience. JNCIS-SA exam topics are based on the content of the Junos Pulse Secure Access training course.

Note: Effective October 26, 2012, the SSL, Associate (JNCIA-SSL) and SSL, Specialist (JNCIS-SSL) will became End of Life. The Juniper Networks Certified Associate SSL (JNCIA-SSL) and Juniper Networks Certified Specialist SSL (JNCIS-SSL) certification credentials and the SSL Track will also become inactive and unsupported.

Detailed ExamObjectives

Overview

  • Components and elements
  • Component functions, interaction and relationships
  • Junos Pulse Gateway and Virtual Appliance product lines
  • Licensing
  • Deployment considerations and integration options
  • SSL, TLS and digital certificates overview
  • Access methods

Initial Configuration

  • Configure the basic elements of a Junos Pulse Secure Access Service environment
  • Initial configuration via CLI
  • Initial configuration via admin UI

Roles

  • Describe the concepts, operation and functionality of roles
  • Purpose of roles
  • Role mapping and merging
  • Customization of the end-user experience
  • Configure roles
  • Roles and role options

Policies and Profiles

  • Describe the concepts, operation and functionality of policies and profiles
  • Purpose of policies; policy types and elements
  • Purpose of profiles and profile types
  • Interrelationship and usage guidelines
  • Configure policies and profiles
  • Policies and policy options
  • Profiles and profile options

Authentication

  • Describe the authentication process for the Junos Pulse Secure Access Service
  • Authentication elements
  • Sign-in process
  • Digital certificates
  • Certificate validation process
  • Advanced authentication options
  • Configure authentication
  • Authentication servers
  • Authentication realms
  • Role mapping
  • Sign-in policies
  • Certificates
  • Advanced options

Client/Server Communications

  • Identify and describe client/server applications
  • WSAM
  • JSAM
  • VPN tunneling
  • Configure client/server applications
  • SAM
  • VPN tunneling

Junos Pulse Client

  • Describe the features, benefits and functionality of the Junos Pulse client
  • Components and features
  • Configure the Junos Pulse client
  • WSAM application access
  • VPN tunneling

Junos Pulse Collaboration

  • Describe the features, benefits and functionality of Junos Pulse Collaboration
  • Components and features
  • Deployment
  • Collaboration client
  • Scheduling meetings
  • Monitoring meetings
  • Configure Junos Pulse Collaboration
  • Collaboration configuration
  • Meeting options
  • Pulse Connection

Endpoint Security

  • Describe the concepts, operation and functionality of endpoint security
  • TNC architecture
  • Host Checker
  • Enhanced Endpoint Security (EES)
  • Secure Virtual Workspace (SVW)
  • Cache Cleaner
  • Enforcement
  • Configure endpoint security
  • Host Checker
  • Enhanced Endpoint Security (EES)
  • Secure Virtual Workspace (SVW)
  • Cache Cleaner

Virtualization

  • Describe the concepts, operation and functionality of virtualization in a Junos Pulse Secure Access Service environment
  • Concepts and components
  • Virtual appliances
  • Virtual Desktop Infrastructure
  • Configure virtualization
  • Licensing
  • Virtual desktops

High Availability

  • Describe the concepts and requirements for high availability in a Junos Pulse Secure Access Service environment
  • Clustering
  • Deployment options and considerations
  • Licensing
  • Configure high availability
  • Clustering configuration
  • Upgrades

Administration, Management and Troubleshooting

  • Demonstrate knowledge of how to manage and troubleshoot a Junos Pulse Secure Access Service environment
  • Configuration file management
  • Backup and archiving
  • Logging
  • System monitoring
  • Statistics
  • Policy tracing
  • Packet capture tools
  • Connectivity testing tools
  • Session recording
  • System snapshot
  • Client connectivity