SRX BootCamp – IJOS, and JSEC

Duration:   5 Days
Price:   $3995.00
Test Level:   0
Certifications:   JNCIA-JUNOS, JNCIS-SEC
Exams:   JN0-101, JN0-332

 
Course Overview
The Juniper SRX BootCamp course is a 5-day leader-led event that covers all aspects of the SRX product, including a Junos Primer, Security and Routing principles and configuration methods using Junos CLI and WebUI.

The course provides the foundational knowledge required to configure Juniper SRX devices running Junos Software. Key topics include initial setup of devices, interface configuration basics with configuration examples, secondary system configuration, and the basics of operational monitoring and maintenance of devices running Junos Software. As the course continues, students will learn class of service (CoS).

Students will perform device configuration in labs that are interspersed throughout the 5-day course.

Course Objective

  • Junos Software Fundamentals
  • Junos Software CLI
  • J-Web GUI
  • Initial Configuration
  • Interface Configuration
  • Secondary System Configuration
  • User Configuration and Authentication
  • System Logging and Tracing
  • Network Time Protocol
  • Archiving Configurations
  • Simple Network Management Protocol
  • Network Utilities
  • Static/Dynamic Routing
  • Routing Policy and Firewall Filters
  • Class of Service
  • Traffic Queuing & Scheduling
  • Junos Software Architecture
  • Zone Configuration
  • Monitoring Security Zones
  • Security Policies
  • Policy Scheduling and Rematching
  • Firewall User Authentication
  • Pass-Through Authentication
  • Web Authentication
  • Client Groups
  • Using External Authentication Servers
  • SCREEN Options
  • Multilayer Network Protection
  • Network Address Translation
  • Source NAT Operation and Configuration
  • IPsec VPNs
  • Configuration of IPsec VPNs
  • Introduction to Junos Software IDP
  • IDP Policy Components and Configuration
  • Attack and Signature Database
  • Implementing IDP
  • High Availability Clustering
  • Chassis Cluster Configuration

Course Outline
Day 1 IJOS

Chapter 2: Junos Operating System Fundamentals

  • The Junos OS
  • Traffic Processing
  • Platforms Running the Junos OS

Chapter 3: User Interface Options

  • User Interface Options
  • The Junos CLI: CLI Basics
  • The Junos CLI: Operational Mode
  • The Junos CLI: Configuration Mode

Chapter 4: Initial Configuration

  • Factory-Default Configuration
  • Initial Configuration
  • Interface Configuration

Chapter 5: Secondary System Configuration

  • User Configuration and Authentication
  • System Logging and Tracing
  • Network Time Protocol
  • Archiving Configurations
  • SNMP

Chapter 6: Operational Monitoring and Maintenance

  • Monitoring Platform and Interface Operation
  • Network Utilities
  • Maintaining the Junos OS
  • Password Recovery

Appendix A: Interface Configuration Examples

  • Review of the Interface Configuration Hierarchy
  • Interface Configuration Examples
  • Using Configuration Groups

Appendix B: The J-Web Interface

  • The J-Web GUI
  • Configuration

Day Two JRE

Chapter 2: Routing Fundamentals

  • Routing Concepts: Overview of Routing
  • Routing Concepts: The Routing Table
  • Routing Concepts: Routing Instances
  • Static Routing
  • Dynamic Routing

Chapter 3: Routing Policy

  • Routing Policy Overview
  • Case Study: Routing Policy

Chapter 4: Firewall Filters

  • Firewall Filters Overview
  • Case Study: Firewall Filters
  • Unicast Reverse-Path-Forwarding Checks

Appendix A: Class of Service

  • CoS Overview
  • Traffic Classification
  • Traffic Queuing
  • Traffic Scheduling
  • Case Study: CoS

Day 3 JSEC

Chapter 2: Introduction to Junos security platforms

  • Traditional Routing
  • Traditional Security
  • The Junos OS Architecture

Chapter 3: Zones

  • The Definition of Zones
  • Zone Configuration
  • Monitoring Security Zones

Chapter 4: Security Policies

  • Security Policy Overview
  • Junos ALGs
  • Policy Components
  • Verifying Policy Operation
  • Policy Scheduling and Rematching
  • Policy Case Study

Day 4 JSEC

Chapter 5: Firewall User Authentication

  • Firewall User Authentication Overview
  • Pass-Through Authentication
  • Web Authentication
  • Client Groups
  • Using External Authentication Servers
  • Verifying Firewall User Authentication

Chapter 6: Screen Options

  • Multilayer Network Protection
  • Stages and Types of Attacks
  • Using Junos Screen Options—Reconnaissance Attack Handling
  • Using Junos Screen Options—Denial of Service Attack Handling
  • Using Junos Screen Options—Suspicious Packets Attack Handling
  • Applying and Monitoring Screen Options

Chapter 7: Network Address Translation

  • NAT Overview
  • Source NAT Operation and Configuration
  • Destination NAT Operation and Configuration
  • Static NAT Operation and Configuration
  • Proxy ARP
  • Monitoring and Verifying NAT Operation

Day 5 JSEC

Chapter 8: IPsec VPNs

  • VPN Types
  • Secure VPN Requirements
  • IPsec Details
  • Configuration of IPsec VPNs
  • IPsec VPN Monitoring

Chapter 9: Introduction to Intrusion Detection and Prevention

  • Introduction to Junos IDP
  • IDP Policy Components and Configuration
  • Signature Database
  • Case Study: Applying the Recommended IDP Policy
  • Monitoring IDP Operation

Chapter 10: High Availability Clustering

  • High Availability Overview
  • Chassis Cluster Components
  • Advanced Chassis Cluster Topics

Chapter 11: High Availability Clustering Implementation

  • Chassis Cluster Operation
  • Chassis Cluster Configuration
  • Chassis Cluster Monitoring

Appendix A: SRX Series Hardware and Interfaces

  • Branch SRX Platform Overview
  • High End SRX Platform Overview
  • SRX Traffic Flow and Distribution
  • SRX Interfaces

Prerequisites
Students should have basic networking knowledge and an understanding of the OSI model and the TCP/IP protocol suite.

This course is available as open-enrollment Classroom event, instructor-led Live Virtual Class, REAL-ILT™ or as part of a custom Onsite Training for up to 16 students.