产品展示

全力为中小企业提供网页设计、网站建设等店铺详情装修设计、平面设计、品牌推广等高度定制服务

课程推荐

课程描述

 

JUNIPER网络公司路由器操作和故障排除(OTJNR)是一门由教师指导的中级课程,主要介绍JUNIPER网络公司M-系列和T-系列平台的操作和故障排除。该课程向学员讲授故障分析步骤和 故障排除技巧以帮助他们迅速确定并排除故障。讲授的这些技能和JUNIPER网络公司技术援助中 心(JTAC)工程师在日常工作中使用的技能非常相似。请注意,这一课程的重点不是配置或路由协议的运行/理论。 该课程分配大量时间来进行各种故障排除亲手实验操作。这些实验操作的重点是M-系列和T-系 列硬件、JUNOS软件、接口和传输线路、路由协议及转发平面的故障隔离和纠正措施。该课程还介绍有助于完成故障隔离的JTAC流程和建议的最佳实践方法。

 

 

Junos Security (JSEC) 面向安全平台的Junos
 

This three-day course covers the configuration, operation, and implementation of SRX Series Services Gateways in a typical network environment. Key topics within this course include security technologies such as security zones, security policies, intrusion detection and prevention (IDP), Network Address Translation (NAT), and high availability clusters, as well as details pertaining to basic implementation, configuration, and management. Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring device operations. This course uses Juniper Networks SRX Series Services Gateways for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS. This course is based on Junos OS Release 12.1R1.9.
 

 

课程目标
 

After successfully completing this course, you should be able to:

· Describe traditional routing and security and the current trends in internetworking.

·Provide an overview of SRX Series devices and software architecture.

·Describe the logical packet flow and session creation performed by SRX Series devices.

·Describe, configure, and monitor zones.

·Describe, configure, and monitor security policies.

·Describe, configure, and monitor firewall user authentication.

·Describe various types of network attacks.

·Configure and monitor Screen options to prevent network attacks.

· Explain, implement, and monitor NAT, as implemented on Junos security platforms.

·Explain the purpose and mechanics of IP Security (IPsec) virtual private networks (VPNs).

·Implement and monitor policy-based and route-based IPsec VPNs.

·Utilize and update the IDP signature database.

·Configure and monitor IDP policy with policy templates.

·Describe, configure, and monitor high availability chassis clusters.
 

 

培训对象
 

This course benefits operators of SRX Series devices. These operators include network engineers, administrators, support personnel, and reseller support personnel.
 

 

课程内容
 

Day 1

 

Chapter 1: Course Introduction

 

Chapter 2: Introduction to Junos Security

·Traditional Routing

·Traditional Security

·The Junos OS Architecture
 

Chapter 3: Zones
·The Definition of Zones

·Zone Configuration

·Monitoring Security Zones

·Lab 1: Configuring and Monitoring Zones
 

Chapter 4: Security Policies
·Security Policy Overview

·Junos ALGs

·Policy Components

·Verifying Policy Operation

·Policy Scheduling and Rematching

·Policy Case Study

·Lab 2: Security Policies
 

Day 2

 

Chapter 5: Firewall User Authentication
·Firewall User Authentication Overview

·Pass-Through Authentication

·Web Authentication

·Client Groups

·Using External Authentication Servers

·Verifying Firewall User Authentication

·Lab 3: Configuring Firewall Authentication
 

Chapter 6: Screen Options
·Multilayer Network Protection

·Stages and Types of Attacks

·Using Junos Screen OptionsReconnaissance Attack Handling

·Using Junos Screen OptionsDenial of Service Attack Handling

·Using Junos Screen OptionsSuspicious Packets Attack Handling

·Applying and Monitoring Screen Options

·Lab 4: Implementing Screen Options
 

Chapter 7: Network Address Translation
·NAT Overview ·Source NAT Operation and Configuration

·Destination NAT Operation and Configuration

·Static NAT Operation and Configuration

·Proxy ARP

·Monitoring and Verifying NAT Operation

·Lab 5: Network Address Translation
 

Day 3

 

Chapter 8: IPsec VPNs
·VPN Types

·Secure VPN Requirements

·IPsec Details

·Configuration of IPsec VPNs

·IPsec VPN Monitoring

·Lab 6: Implementing IPsec VPNs
 

Chapter 9: Introduction to Intrusion Detection and Prevention
·Introduction to Junos IDP

·IDP Policy Components and Configuration

·Signature Database

·Case Study: Applying the Recommended IDP Policy

·Monitoring IDP Operation

·Lab 7: Implementing IDP
 

Chapter 10: High Availability Clustering Theory
·High Availability Overview

·Chassis Cluster Components

·Advanced Chassis Cluster Topics
 

Chapter 11: High Availability Clustering Implementation
·Chassis Cluster Operation

·Chassis Cluster Configuration

·Chassis Cluster Monitoring

·Lab 8: Implementing High Availability Techniques
 

Appendix A: SRX Series Hardware and Interfaces
·Branch SRX PlatformOverview

·High End SRX PlatformOverview

·SRX Traffic Flow and Distribution

·SRX Interfaces

 

 

Junos Unified Threat Management (JUTM) Junos统一威胁管理
 

This one-day course includes detailed coverage of Web filtering, antivirus (AV), antispam, and content filtering. Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Unified Threat Management (UTM) features of the Junos operating system. This course is based on the Junos OS Release 11.4R1.6.
 

 

课程目标
 

After successfully completing this course, you should be able to:

· Describe the challenges that branch offices present to network managers.

·List the major features that UTMoffers.

·Explain how each major feature addresses the challenges of the branch office.

·List the SRX Series Services Gateways hardware devices on which UTM is available.

·Describe the UTM features that require specific licenses.

·Define terms used in the creation of effective antispam UTMpolicies.

·Describe the process by which UTM examines traffic for spam.

·Describe the overall process of configuring an antispamUTMpolicy.

·Describe the kinds of information available from the device when it has detected spam.

·Describe how the AV process examines traffic.

·Describe the differences between full file-based AV versus express AV.

·Describe the settings that are required for configuring AV protection.

· Explain how these settings affect scanning performance and effectiveness.

·Describe options available for scanning supported protocols.

·List the general steps required to configure AV.

·Describe the statistical information available to verify AV functionality.

·Describe content and Web filtering and their purpose.

·List and describe each of the parameters used when configuring Web and content filtering.

·Describe in general terms the steps necessary to configure web and content filtering.

·Monitor Web and content filtering.
 

 

培训对象
 

This course benefits individuals responsible for implementing and monitoring the UTM features available on branch SRX Services Gateways and J Series Services Routers.
 

 

课程内容
 

Chapter 1: Course Introduction

 

Chapter 2: UTMOverview
·Branch Office Challenges

·UTMFeature Overview

·Design Basics

·Hardware Support

·Licensing of Features

·Lab 1: Connecting to the Lab Equipment and Testing Connectivity
 

Chapter 3: Antispam
·Antispam Terminology

·Overview of Antispam Process

·UTMPolicy Overview

·Configuration Steps

·Monitoring Antispam

·Lab 2: Configuring an Antispam Policy
 

Chapter 4: Full File-Based and Express Antivirus
·Antivirus Terminology

·Overview of Antivirus Process

·AV Operation

·Full File-based AV Configuration

·Express AV Configuration

·Monitoring AV

·Lab 3: Antivirus Configuration and Testing
 

Chapter 5: Content and Web Filtering
·Overview and Terminology

·Configuration

·Verification and Monitoring

·Lab 4: Configuring Content and Web Filtering

首页    全部课程    网络专题    瞻博网络认证互联网初级专家 JNCIS-SEC