Kursangebot
- Upcoming Events
- Garantietermine
- Neue Kurse
- iTLS Academy»
- iTLS LIVE E-Learning
-
iTLS IT Workshops»
- IT-Training by iTLS
- Garantietermine
- Themen im Fokus
- Professional Services
- Hersteller im Fokus
- Amazon Web Services»
- Aruba»
- Barracuda
- Check Point
- Cisco»
- Ethical Hacking
- F5 Networks
- Fortinet»
- Google Cloud»
- ITIL® und Cobit
- Microsoft»
- NetApp»
- Palo Alto Networks»
- VMware»
- Weitere Hersteller»
- Themen/Technologien im Fokus
- Artificial Intelligence (AI)»
- Cloud Computing»
- Cyber Security»
- Data Center»
- Kubernetes / Container»
- Linux»
- Network Analysis / Wireshark»
- Projektmanagement
- Python»
- Software Development»
- Wireless & Mobility»
- Home
- Training
- Juniper Networks
- CJFV Detaillierte Beschreibung

Configuring Juniper Networks Firewall/IPSec VPN Products (CJFV)
Detaillierter Kursinhalt
Day 1
Chapter 1: Course Introduction
Chapter 2: ScreenOS Concepts, Terminology, and Platforms
- Security Device Requirements
- ScreenOS Security Architecture
- Juniper Networks Platforms
Chapter 3: Initial Connectivity
- System Components
- Establishing Connectivity
- Verifying Connectivity
- Lab 1: Initial Configuration
Chapter 4: Device Management
- Management
- Recovery
- Lab 2: Device Administration
Day 2
Chapter 5: Layer 3 Operations
- Need for Routing
- Configuring Layer 3
- Verifying Layer 3
- Loopback Interface
- Interface-Based NAT
- Lab 3: Layer 3 Operations
Chapter 6: Basic Policy Configuration
- Functionality
- Policy Configuration
- Common Problems
- Global Policy
- Verifying Policies
- Lab 4: Basic Policy Configuration
Chapter 7: Policy Options
- Overview
- Logging
- Counting
- Scheduling
- User Authentication
- Lab 5: Policy Options
Chapter 8: Address Translation
- Scenarios
- NAT-src
- NAT-dst
- VIP Addresses
- MIP Addresses
- Lab 6: Address Translation
Day 3
Chapter 9: Transparent Mode (Optional)
- Description
- Configuration
- Verifying Operations
- Lab 7: Transparent Mode
Chapter 10: VPN Concepts
- Concepts and Terminology
- IP Security
Chapter 11: Policy-Based VPNs
- Configuration
- Verifying Operations
- Lab 8: Route-Based VPNs
Chapter 12: Route-Based VPNs
- Concepts and Terminology
- Configuring VPNs
- Verifying IPv6 Operations
- Lab 9: Route-Based VPNs
Appendix A: Additional Features
- Hardware