Print To File - Global Knowledge

6 downloads 448 Views 330KB Size Report
JNCIS Security Certification Boot Camp (JSEC, JUTM) ... (JNCIS-SEC) exam, and you will gain hands-on experience configuring and monitoring the Junos OS  ...
JNCIS Security Certification Boot Camp (JSEC, JUTM) Duración: 4 Días

Código del Curso: JSEC-JUTM

Temario: Learn to configure and monitor SRX Series devices while preparing for the JNCIS-SEC exam in this accelerated Boot Camp. In this accelerated Boot Camp, you will gain the knowledge needed to succeed on the Juniper Networks Certified Internet Specialist - Security (JNCIS-SEC) exam, and you will gain hands-on experience configuring and monitoring the Junos OS for SRX Series devices. During the first half of class, you will review SRX Series Services Gateway configuration, operation, and implementation in a typical network environment. Key topics include security zones, security policies, intrusion detection and prevention (IDP), Network Address Translation (NAT), High Availability (HA) clusters, and basic implementation, configuration, and management. In the second half, you will cover web filtering, antivirus (AV), anti-spam, and content filtering. Also, through demonstrations and hands-on labs, you will gain experience configuring and monitoring the Unified Threat Management (UTM) features of the Junos OS.

Dirigido a: Network engineers, administrators, support personnel, and reseller support personnel using SRX Series devices Anyone seeking JNCIS-SEC certification.

Objetivos: After successfully completing this course, you should be able to: Describe traditional routing and security and the current trends in internetworking.

List the SRX Series Services Gateways hardware devices on which UTM is available.

Provide an overview of SRX Series devices and software architecture.

Describe the UTM features that require specific licenses.

Describe the logical packet flow and session creation performed by SRX Series devices.

Define terms used in the creation of effective antispam UTM policies.

Describe the process by which UTM examines traffic for spam. Describe, configure, and monitor zones.

Describe the overall process of configuring an antispam UTM policy. Describe, configure, and monitor security policies.

Describe, configure, and monitor firewall user authentication.

Describe the kinds of information available from the device when it has detected spam.

Describe various types of network attacks.

Describe how the AV process examines traffic.

Configure and monitor SCREEN options to prevent network attacks.

Describe the differences between full file-based AV versus express AV.

Explain, implement, and monitor NAT on Junos security

Describe the settings that are required for configuring AV protection.

JSEC-JUTM

www.globalknowledge.es

[email protected]

(34) 91 425 06 60

platforms.

Explain the purpose and mechanics of IP Security (IPsec) virtual private networks (VPNs).

Explain how these settings affect scanning performance and effectiveness.

Describe options available for scanning supported protocols. Implement and monitor policy-based and route-based IPsec VPNs. List the general steps required to configure AV. Utilize and update the IDP signature database. Describe the statistical information available to verify AV functionality. Configure and monitor IDP policy with policy templates.

Describe content and Web filtering and their purpose. Describe, configure, and monitor high availability chassis clusters. List and describe each of the parameters used when configuring Web and content filtering. Describe the challenges that branch offices present to network managers. Describe in general terms the steps necessary to configure web and content filtering. List the major features that UTM offers.

Monitor Web and content filtering. Explain how each major feature addresses the challenges of the branch office.

Prerequisitos:

Exámenes y certificación

Attendees should meet the following prerequisites:

This course is part of the following programs or tracks:

Introduction to the Junos Operating System (IJOS) Junos Routing Essentials (JRE) Or

Juniper Networks Certified Internet Specialist Security (JNCIS-SEC)

Junos Foundations: JNCIA-Junos Boot Camp (IJOS, JRE)

JSEC-JUTM

www.globalknowledge.es

[email protected]

(34) 91 425 06 60

Contenido: Introduction to Junos security platforms line Traditional Routing

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps

JSEC-JUTM

www.globalknowledge.es

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy

[email protected]

(34) 91 425 06 60

Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration

JSEC-JUTM

www.globalknowledge.es

Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering UTM Overview line Branch Office Challenges

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration

[email protected]

(34) 91 425 06 60

Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation

JSEC-JUTM

Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering Network Address Translation line NAT Overview

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation

www.globalknowledge.es

Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs

[email protected]

(34) 91 425 06 60

Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering Zones line The Definition of Zones

Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack

JSEC-JUTM

www.globalknowledge.es

IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration

[email protected]

(34) 91 425 06 60

IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups

JSEC-JUTM

www.globalknowledge.es

Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of

[email protected]

(34) 91 425 06 60

Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling

line Traditional Security Breaking the Tradition The Junos OS Architecture

JSEC-JUTM

www.globalknowledge.es

Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication

[email protected]

(34) 91 425 06 60

Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering Security Policies line Overview of Security Policy

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups

JSEC-JUTM

Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV

www.globalknowledge.es

Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering Antispam line Antispam Terminology

line

[email protected]

(34) 91 425 06 60

Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment

JSEC-JUTM

www.globalknowledge.es

Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration

[email protected]

(34) 91 425 06 60

Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation

JSEC-JUTM

www.globalknowledge.es

Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity

[email protected]

(34) 91 425 06 60

The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring

JSEC-JUTM

Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering IPsec VPNs line VPN Types

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration

www.globalknowledge.es

Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation

[email protected]

(34) 91 425 06 60

Lab: Configuring Content and Web Filtering

Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling

JSEC-JUTM

www.globalknowledge.es

Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring

[email protected]

(34) 91 425 06 60

Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study

JSEC-JUTM

www.globalknowledge.es

Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and

[email protected]

(34) 91 425 06 60

UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering Firewall User Authentication line Firewall User Authentication Overview

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation

JSEC-JUTM

Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

www.globalknowledge.es

Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering Full File-Based and Express Antivirus line Antivirus Terminology

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication

[email protected]

(34) 91 425 06 60

Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process

JSEC-JUTM

www.globalknowledge.es

Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation

[email protected]

(34) 91 425 06 60

Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview

JSEC-JUTM

www.globalknowledge.es

Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

[email protected]

(34) 91 425 06 60

IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering Introduction to Intrusion Detection and Prevention line Introduction to Junos IDP

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details

JSEC-JUTM

www.globalknowledge.es

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration

[email protected]

(34) 91 425 06 60

Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN

JSEC-JUTM

www.globalknowledge.es

Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and

[email protected]

(34) 91 425 06 60

Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication

JSEC-JUTM

www.globalknowledge.es

Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components

[email protected]

(34) 91 425 06 60

Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering SCREEN Options line Multilayer Network Protection

Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones

JSEC-JUTM

www.globalknowledge.es

Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs

[email protected]

(34) 91 425 06 60

Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line

JSEC-JUTM

Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration

www.globalknowledge.es

IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering Content and Web Filtering line Overview and Terminology

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack

[email protected]

(34) 91 425 06 60

Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing

JSEC-JUTM

Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process

www.globalknowledge.es

Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication

[email protected]

(34) 91 425 06 60

Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy

JSEC-JUTM

UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering High Availability Clustering line High Availability Overview

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended

www.globalknowledge.es

Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components

[email protected]

(34) 91 425 06 60

Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP

JSEC-JUTM

www.globalknowledge.es

Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

[email protected]

(34) 91 425 06 60

Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling

JSEC-JUTM

www.globalknowledge.es

[email protected]

(34) 91 425 06 60

Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

line Traditional Security Breaking the Tradition The Junos OS Architecture Zone Configuration Monitoring Security Zones Lab: Configuring and Monitoring Zones Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab: Security Policies Pass-Through Authentication

JSEC-JUTM

www.globalknowledge.es

[email protected]

(34) 91 425 06 60

Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab: Configuring Firewall Authentication Stages and Types of Attacks Using Junos SCREEN Options—Reconnaissance Attack Handling Using Junos SCREEN Options—Denial of Service Attack Handling Using Junos SCREEN Options—Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab: Implementing SCREEN Options Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab: Network Address Translation Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab: Implementing IPsec VPNs IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab: Implementing IDP Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab: Implementing Chassis Clusters UTM Feature Overview Design Basics Hardware Support Licensing of Features Lab: Connecting to the Lab Equipment and Testing Connectivity Overview of Antispam Process UTM Policy Overview Configuration Steps Monitoring Antispam Lab: Configuring an Antispam Policy Overview of Antivirus Process AV Operation Full File-based AV Configuration Express AV Configuration Monitoring AV Lab: Antivirus Configuration and Testing Configuration Verification and Monitoring Lab: Configuring Content and Web Filtering

JSEC-JUTM

www.globalknowledge.es

[email protected]

(34) 91 425 06 60

Más información: Para más información o para reservar tu plaza llámanos al (34) 91 425 06 60 [email protected] www.globalknowledge.es Global Knowledge Network Spain, C/ Retama 7, 6ª planta, 28045 Madrid

JSEC-JUTM

www.globalknowledge.es

[email protected]

(34) 91 425 06 60