JNCIS Security Certification Boot Camp (JSEC, JUTM) ... (JNCIS-SEC) exam,
and you will gain hands-on experience configuring and monitoring the Junos OS
...
JNCIS Security Certification Boot Camp (JSEC, JUTM) Duración: 4 Días
Código del Curso: JSEC-JUTM
Temario: Learn to configure and monitor SRX Series devices while preparing for the JNCIS-SEC exam in this accelerated Boot Camp. In this accelerated Boot Camp, you will gain the knowledge needed to succeed on the Juniper Networks Certified Internet Specialist - Security (JNCIS-SEC) exam, and you will gain hands-on experience configuring and monitoring the Junos OS for SRX Series devices. During the first half of class, you will review SRX Series Services Gateway configuration, operation, and implementation in a typical network environment. Key topics include security zones, security policies, intrusion detection and prevention (IDP), Network Address Translation (NAT), High Availability (HA) clusters, and basic implementation, configuration, and management. In the second half, you will cover web filtering, antivirus (AV), anti-spam, and content filtering. Also, through demonstrations and hands-on labs, you will gain experience configuring and monitoring the Unified Threat Management (UTM) features of the Junos OS.
Dirigido a: Network engineers, administrators, support personnel, and reseller support personnel using SRX Series devices Anyone seeking JNCIS-SEC certification.
Objetivos: After successfully completing this course, you should be able to: Describe traditional routing and security and the current trends in internetworking.
List the SRX Series Services Gateways hardware devices on which UTM is available.
Provide an overview of SRX Series devices and software architecture.
Describe the UTM features that require specific licenses.
Describe the logical packet flow and session creation performed by SRX Series devices.
Define terms used in the creation of effective antispam UTM policies.
Describe the process by which UTM examines traffic for spam. Describe, configure, and monitor zones.
Describe the overall process of configuring an antispam UTM policy. Describe, configure, and monitor security policies.
Describe, configure, and monitor firewall user authentication.
Describe the kinds of information available from the device when it has detected spam.
Describe various types of network attacks.
Describe how the AV process examines traffic.
Configure and monitor SCREEN options to prevent network attacks.
Describe the differences between full file-based AV versus express AV.
Explain, implement, and monitor NAT on Junos security
Describe the settings that are required for configuring AV protection.
JSEC-JUTM
www.globalknowledge.es
[email protected]
(34) 91 425 06 60
platforms.
Explain the purpose and mechanics of IP Security (IPsec) virtual private networks (VPNs).
Explain how these settings affect scanning performance and effectiveness.
Describe options available for scanning supported protocols. Implement and monitor policy-based and route-based IPsec VPNs. List the general steps required to configure AV. Utilize and update the IDP signature database. Describe the statistical information available to verify AV functionality. Configure and monitor IDP policy with policy templates.
Describe content and Web filtering and their purpose. Describe, configure, and monitor high availability chassis clusters. List and describe each of the parameters used when configuring Web and content filtering. Describe the challenges that branch offices present to network managers. Describe in general terms the steps necessary to configure web and content filtering. List the major features that UTM offers.
Monitor Web and content filtering. Explain how each major feature addresses the challenges of the branch office.
Prerequisitos:
Exámenes y certificación
Attendees should meet the following prerequisites:
This course is part of the following programs or tracks:
Introduction to the Junos Operating System (IJOS) Junos Routing Essentials (JRE) Or
Juniper Networks Certified Internet Specialist Security (JNCIS-SEC)
Junos Foundations: JNCIA-Junos Boot Camp (IJOS, JRE)
JSEC-JUTM
www.globalknowledge.es
[email protected]
(34) 91 425 06 60
Contenido: Introduction to Junos security platforms line Traditional Routing
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps
JSEC-JUTM
www.globalknowledge.es
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy
[email protected]
(34) 91 425 06 60
Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration
JSEC-JUTM
www.globalknowledge.es
Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering UTM Overview line Branch Office Challenges
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration
[email protected]
(34) 91 425 06 60
Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation
JSEC-JUTM
Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering Network Address Translation line NAT Overview
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation
www.globalknowledge.es
Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs
[email protected]
(34) 91 425 06 60
Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering Zones line The Definition of Zones
Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack
JSEC-JUTM
www.globalknowledge.es
IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration
[email protected]
(34) 91 425 06 60
IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups
JSEC-JUTM
www.globalknowledge.es
Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of
[email protected]
(34) 91 425 06 60
Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling
line Traditional Security Breaking the Tradition The Junos OS Architecture
JSEC-JUTM
www.globalknowledge.es
Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication
[email protected]
(34) 91 425 06 60
Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering Security Policies line Overview of Security Policy
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups
JSEC-JUTM
Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV
www.globalknowledge.es
Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering Antispam line Antispam Terminology
line
[email protected]
(34) 91 425 06 60
Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment
JSEC-JUTM
www.globalknowledge.es
Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration
[email protected]
(34) 91 425 06 60
Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation
JSEC-JUTM
www.globalknowledge.es
Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity
[email protected]
(34) 91 425 06 60
The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring
JSEC-JUTM
Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering IPsec VPNs line VPN Types
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration
www.globalknowledge.es
Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation
[email protected]
(34) 91 425 06 60
Lab: Configuring Content and Web Filtering
Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling
JSEC-JUTM
www.globalknowledge.es
Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring
[email protected]
(34) 91 425 06 60
Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study
JSEC-JUTM
www.globalknowledge.es
Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and
[email protected]
(34) 91 425 06 60
UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering Firewall User Authentication line Firewall User Authentication Overview
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation
JSEC-JUTM
Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
www.globalknowledge.es
Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering Full File-Based and Express Antivirus line Antivirus Terminology
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication
[email protected]
(34) 91 425 06 60
Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process
JSEC-JUTM
www.globalknowledge.es
Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation
[email protected]
(34) 91 425 06 60
Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview
JSEC-JUTM
www.globalknowledge.es
Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
[email protected]
(34) 91 425 06 60
IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering Introduction to Intrusion Detection and Prevention line Introduction to Junos IDP
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details
JSEC-JUTM
www.globalknowledge.es
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration
[email protected]
(34) 91 425 06 60
Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN
JSEC-JUTM
www.globalknowledge.es
Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and
[email protected]
(34) 91 425 06 60
Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication
JSEC-JUTM
www.globalknowledge.es
Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components
[email protected]
(34) 91 425 06 60
Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering SCREEN Options line Multilayer Network Protection
Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones
JSEC-JUTM
www.globalknowledge.es
Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs
[email protected]
(34) 91 425 06 60
Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line
JSEC-JUTM
Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration
www.globalknowledge.es
IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering Content and Web Filtering line Overview and Terminology
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack
[email protected]
(34) 91 425 06 60
Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing
JSEC-JUTM
Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process
www.globalknowledge.es
Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication
[email protected]
(34) 91 425 06 60
Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy
JSEC-JUTM
UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering High Availability Clustering line High Availability Overview
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended
www.globalknowledge.es
Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components
[email protected]
(34) 91 425 06 60
Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP
JSEC-JUTM
www.globalknowledge.es
Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
[email protected]
(34) 91 425 06 60
Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling
JSEC-JUTM
www.globalknowledge.es
[email protected]
(34) 91 425 06 60
Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication
JSEC-JUTM
www.globalknowledge.es
[email protected]
(34) 91 425 06 60
Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering
JSEC-JUTM
www.globalknowledge.es
[email protected]
(34) 91 425 06 60
Más información: Para más información o para reservar tu plaza llámanos al (34) 91 425 06 60
[email protected] www.globalknowledge.es Global Knowledge Network Spain, C/ Retama 7, 6ª planta, 28045 Madrid
JSEC-JUTM
www.globalknowledge.es
[email protected]
(34) 91 425 06 60