Junos Security (JSEC)

( Duration: 3 Days )

The Juniper JUNOS Security (JSEC) Training course provides Participants with the skills for configuration, operation, and implementation of JUNOS security platforms in a typical network environment. Through demonstrations and hands-on labs, Participants will gain experience in configuring and monitoring JUNOS Software for JUNOS security platforms.

By attending Juniper JUNOS Security (JSEC) workshop, Participants will learn to:

  • Describe traditional routing and security and the current trends in internetworking
  • Provide an overview of the JUNOS security platforms and software architecture
  • Describe the logical packet flow and session creation performed by JUNOS security platforms
  • Describe, configure and monitor zones
  • Describe, configure and monitor security policies
  • Describe configure and monitor firewall user authentication
  • Describe various types of network attacks
  • Configure and monitor SCREEN options to prevent network attacks
  • Explain, implement, and monitor NAT as implemented on JUNOS security platforms
  • Explain the purpose and mechanics of IPsec VPNs
  • Implement and monitor policy-based and route-based IPsec VPNs
  • Utilize and update the IDP signature database on JUNOS security platforms
  • Configure and monitor IDP policy with policy templates
  • Describe, configure and monitor high availability chassis clusters

Participants should have basic networking knowledge and an understanding of the OSI model and the TCP/IP protocol suite. They should also attend the Introduction to the JUNOS Operating System (IJOS) and the JUNOS Routing Essentials (JRE) courses or have equivalent knowledge.

Juniper JUNOS Security (JSEC) class is intended for operators of JUNOS security platforms, including network engineers, administrators, support personnel and reseller support personnel.





Introduction to JUNOS security platforms

  • Traditional Routing
  • Traditional Security
  • The Junos OS Architecture


  • The Definition of Zones
  • Zone Configuration
  • Monitoring Security Zones

Security Policies

  • Security Policy Overview
  • Junos ALGs
  • Policy Components
  • Verifying Policy Operation
  • Policy Scheduling and Rematching

Firewall User Authentication

  • Firewall User Authentication Overview
  • Pass-Through Authentication
  • Web Authentication
  • Client Groups
  • Using External Authentication Servers
  • Verifying Firewall User Authentication

Screen Options

  • Multilayer Network Protection
  • Stages and Types of Attacks
  • Using Junos Screen Options-Reconnaissance Attack Handling
  • Using Junos Screen Options-Denial of Service Attack Handling
  • Using Junos Screen Options-Suspicious Packets Attack Handling
  • Applying and Monitoring Screen Options

Network Address Translation

  • NAT Overview
  • Source NAT Operation and Configuration
  • Destination NAT Operation and Configuration
  • Static NAT Operation and Configuration
  • Proxy ARP
  • Monitoring and Verifying NAT Operation

IPsec VPNs

  • VPN Types
  • Secure VPN Requirements
  • IPsec Details
  • Configuration of IPsec VPNs
  • IPsec VPN Monitoring

Introduction to Intrusion Detection and Prevention

  • Introduction to Junos IDP
  • IDP Policy Components and Configuration
  • Signature Database
  • Monitoring IDP Operation

High Availability Clustering Theory

  • High Availability Overview
  • Chassis Cluster Components
  • Advanced Chassis Cluster Topics

High Availability Clustering Implementation

  • Chassis Cluster Operation
  • Chassis Cluster Configuration
  • Chassis Cluster Monitoring

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 3,500 Modules on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 20,000 corporate candidates across india and abroad
  • All our trainings are conducted in workshop mode with more focus on hands On

View our other course offerings by visiting www.encartalabs.com/course-catalogue

Contact us for delivering this course as a public/open-house workshop for a group of 10+ candidates at our venue