Configuring Juniper Networks Firewall/IPSec VPN Products (CJFV)

( Duration: 3 Days )

The Configuring Juniper Networks Firewall/IPSec VPN Products (CJFV) training course focuses on configuration of the Juniper Networks firewall/VPN products in a variety of situations, including basic administrative access, routing, firewall policies and policy options, attack prevention features, address translation, and VPN implementations.

By attending Configuring Juniper Networks Firewall/IPSec VPN Products (CJFV) workshop, Participants will learn to:

  • Explain the Juniper Networks security architecture
  • Configure administrative access and options
  • Back up and restore configuration and ScreenOS files
  • Configure a Juniper Networks device in transparent, route, and NAT modes
  • Discuss the applications of multiple virtual routers
  • Configure the Juniper Networks firewall to permit and deny traffic based on user defined policies
  • Configure advanced policy options
  • Identify and configure network designs for various types of network address translation
  • Configure policy-based and route-based VPN tunnels

The Configuring Juniper Networks Firewall/IPSec VPN Products (CJFV) class assumes that Participants have basic networking knowledge and experience of the Internet, networking concepts, TCP/IP, bridging, switching and routing.

This class is intended for network engineers, support personnel, reseller support, and others responsible for implementing Juniper Networks firewall products.





ScreenOS Concepts, Terminology, and Platforms

  • Security Device Requirements
  • ScreenOS Security Architecture
  • Juniper Networks Platforms

Initial Connectivity

  • System Components
  • Establishing Connectivity
  • Verifying Connectivity

Device Management

  • Management
  • Recovery

Layer 3 Operations

  • Need for Routing
  • Configuring Layer 3
  • Verifying Layer 3
  • Loopback Interface
  • Interface-Based NAT

Basic Policy Configuration

  • Functionality
  • Policy Configuration
  • Common Problems
  • Global Policy
  • Verifying Policies

Policy Options

  • Overview
  • Logging
  • Counting
  • Scheduling
  • User Authentication

Address Translation

  • Scenarios
  • NAT-src
  • NAT-dst
  • VIP Addresses
  • MIP Addresses

VPN Concepts

  • Concepts and Terminology
  • IP Security

Policy-Based VPNs

  • Configuration
  • Verifying Operations

Route-Based VPNs

  • Concepts and Terminology
  • Configuring VPNs
  • Verifying Operations


  • IPv6 Concepts
  • Configuring IPv6
  • Verifying IPv6

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 3,500 Modules on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 20,000 corporate candidates across india and abroad
  • All our trainings are conducted in workshop mode with more focus on hands On

View our other course offerings by visiting www.encartalabs.com/course-catalogue

Contact us for delivering this course as a public/open-house workshop for a group of 10+ candidates at our venue