Advanced Juniper Security (AJSEC) – Perfil

Esquema Detallado del Curso

Junos Layer 2 Packet Handling and Security Features
  • Explain transparent mode security operations
  • Define secure wire implementation
  • Describe MACsec uses

Lab 1: Implementing Layer 2 Security

Packet-Based Security
  • Explain routing instances
  • Describe filter-based forwarding

Lab 2: Implementing Packet-Based Security

Troubleshooting Zones and Policies
  • Describe troubleshooting tools available in Junos OS
  • Discuss troubleshooting of security zones and security policies
  • Examine troubleshooting case studies

Lab 3: Troubleshooting Zones and Policies

Hub-and-Spoke VPN
  • Describe the hub-and-spoke VPN topology
  • Configure hub-and-spoke VPNs

Lab 4: Implementing Hub-and-Spoke VPNs

Advanced NAT
  • Explain the difference between address persistence and persistent NAT
  • Describe DNS doctoring
  • Describe advanced NAT scenarios
  • Discuss NAT troubleshooting

Lab 5: Implementing Advanced NAT

Logical and Tenant Systems
  • Describe logical systems
  • Describe tenant systems

Lab 6: Implementing Tenant Systems

PKI and ADVPNs
  • Describe PKI
  • Configure PKI for Junos security devices
  • Describe how ADVPNs function
  • Configure and monitor ADVPNs

Lab 7: Implementing ADVPNs

Advanced IPsec
  • Explain NAT interoperability with IPsec
  • Describe the CoS feature with IPsec VPNs
  • Explain IPsec best practices
  • Configure OSPF over IPsec
  • Configure IPsec with overlapping addresses
  • Configure IPsec with dynamic gateway IP addresses

Lab 8: Implementing Advanced IPsec Solutions

Troubleshooting IPsec
  • Describe general troubleshooting for IPsec VPNs
  • Discuss how to troubleshoot IKE Phase 1 and Phase 2
  • Configure and analyze logging for IPsec VPNs
  • Examine IPsec troubleshooting case studies

Lab 9: Troubleshooting IPsec VPNs

Advanced Policy-Based Routing
  • Define advanced policy-based routing
  • Configure advanced policy-based routing
  • Explain application quality of experience

Lab 10: Implementing APBR

EVPN-VXLAN Security
  • Describe the EVPN-VXLAN protocols
  • Explain VXLAN tunnel security
  • Configure security on VXLAN tunnels

Lab 11: Securing Traffic Between Data Centers

Multinode High Availability
  • Identify the benefits of high availability and security
  • Explain the use of multinode high availability
  • Identify multinode high availability modes
  • Discuss services redundancy groups

Lab 12: Implementing Multinode HA

Automated Threat Mitigation
  • Explain Automated Threat Mitigation
  • Discuss Juniper Connected Security third-party integrations
  • Discuss Juniper Connected Security multicloud integrations
  • Discuss the Secure Enterprise use case