課程名稱:Juniper Networks JNCIS-SEC (SRX 實物防火牆及 vSRX 雲端防火牆) 國際認可證書課程 - 簡稱:Juniper Networks JNCIS-SEC Training Course |
1. Introduction to SRX Series Services Gateways
1.1 Evolving into the SRX
1.2 ScreenOS to Junos
1.3 Inherited ScreenOS features
1.4 The SRX Series Platform
1.5 Deployment Solutions
1.6 Small Branch
1.7 Medium Branch
1.8 Large Branch
1.9 Data Center
1.10 Data Center Edge
1.11 Data Center Services Tier
1.12 Data Center SRX-Specific Features
1.13 Service Processing Card and Service Processing Unit in Data Center SRX
1.14 Network Processing Unit in Data Center SRX
1.15 Service Provider
1.16 Mobile Carriers
2. Firewalling Principle of Junos SRX
2.1 Session Characteristics for SRX Series Services Gateways
2.2 Per Policy TCP Session Check
2.3 Principal of First-Packet Processing
2.4 Principal and Components of Fast-Path Processing
3. Initial Connectivity
3.1 Accessing the Device using a Console Connection
3.2 Accessing the Device using a WebUI
3.3 Accessing the Device using TELNET
3.4 Accessing the Device using SSH
3.5 Default Device Configuration
3.6 Interfaces available on SRX series firewall
4. Security Policy
4.1 Introduction to SRX Security Policy
4.2 SRX Flow Processing
4.3 Creating Custom Security Zone
4.4 Inter-zone Security Policies
4.5 SRX Policy Processing
4.6 SRX Policy Statistics
4.7 Reviewing Session Flows
4.8 Application/Service Configuration in SRX Security Policy
4.9 Blocking Unwanted User Traffic
4.10 Policy Logging
4.11 Troubleshooting Security Policy and Traffic Flows
5. Advanced Security Policy features
5.1 Application Layer Gateway Services
5.2 Configuring ALG
5.3 Policy Schedulers
5.4 Web and Proxy Authentication
5.5 Pass-Through Authentication
6. Network Address Translation
6.1 The SRX NAT Process
6.2 Source NAT – Interface NAT
6.3 Address Pools Source NAT
6.4 Overflow Pool
6.5 Persistent Source NAT
6.6 Destination NAT
6.7 Implementing Destination NAT
6.8 Static NAT
7. IKE/IPSec VPN Concepts
7.1 Introduction to Virtual Private Networks
7.2 IPSec concepts
7.3 Modes
7.4 Protocols
7.5 Key Management
7.6 Security Associations (SA)
7.7 Tunnel Negotiation
7.8 IKE and IPSec Packets
8. Implementing VPN
8.1 Understanding and Implementing Policy-Based Site-to-Site VPN
8.2 IKE Configuration for Phase 1
8.3 Configuring Phase 1 Proposals
8.4 Configuring Phase 1 Policy
8.5 Configuring Phase 1 Gateways
8.6 IKE Configuration for Phase 2
8.7 More about IPSec Protocols used in Phase 2
8.8 Configuring Phase 2 Proposals
8.9 Configure Phase 2 IPSec Policy
8.10 Configuring IPSec VPN
8.11 Configuring Security Policy-based VPN
8.12 Verifying VPN configuration
8.13 VPN Troubleshooting Essentials
8.14 Understanding and Implementing Route-Based Site-to-Site VPN
9. Attack Mitigation
9.1 Introduction to Five Major Attack Types
9.2 SRX Firewall Filters
9.3 Firewall Screen
9.4 Deal with Basic IP Attacks
9.5 ICMP Protection
9.6 TCP Protections
9.7 Basic Denial-of-Service Screen Protections
9.8 ICMP Flood Protection
9.9 UDP Flood Protection
9.10 Session Limitation
10. Unified Threat Management
10.1 UTM Functions
10.2 Application Proxy
10.3 Web Filtering
10.4 Configuring SurfControl Web Filtering
10.5 Configuring Websense Redirect Web Filtering
10.6 Using Custom Category List
10.7 Using Local Classification only (Optional Knowledge)
10.8 UTM Antivirus
10.9 UTM Fallback Options
11. Virtual SRX
11.1 Overview of vSRX
11.2 Installation to on-premises hypervisors
11.3 Initial configurations and distinctive aspects of vSRX
12. vSRX High Availability (HA) Clustering
12.1 HA features and characteristics
12.2 Deployment requirements and considerations
12.3 Chassis cluster characteristics and operation
12.4 Cluster modes
12.5 Cluster and node IDs
12.6 Cluster interfaces
12.7 Redundancy groups
12.8 Manual Failover
12.9 Chassis Cluster Redundant Ethernet Interface
12.10 Configuring LACP on Chassis Cluster
12.11 Redundancy Group Interface Monitoring
12.12 IPSec considerations in HA mode
12.13 In-Service Software Upgrade (ISSU) for Chassis Cluster
|