Kursangebot
- Upcoming Events
- Neue Kurse
- Garantietermine
- Training nach Technologie
- Cloud Computing»
- Cyber Security»
- Data Center»
- Internet of Things (IoT)»
- Kubernetes / Container»
- Linux»
- Network Analysis / Wireshark»
- Projektmanagement
- Python»
- Software Development»
- Wireless & Mobility»
- Training nach Hersteller
- Aruba»
- Microsoft»
- Cisco»
- NetApp»
- VMware»
- Fortinet»
- Palo Alto Networks»
- Red Hat»
- Barracuda
- Check Point
- F5 Networks
- Ethical Hacking
- CISSP
- Amazon Web Services»
- Google Cloud»
- IT-Training by iTLS
- ITIL® und Cobit
- Citrix»
- Pivotal / Spring»
- Kaspersky Lab
- Symantec»
- Oracle»
- Brocade
- Juniper
- IBM
- Veritas
CJFV
Online Training
Dauer 3 Tage
Preis (exkl. MwSt.)
- 2.250,- €
Sprache der Kursunterlagen: Englisch
Derzeit gibt es keine Online-Termine für diesen Kurs.
Classroom Training
Dauer 3 Tage
Preis (exkl. MwSt.)
- Österreich: 2.250,- €
- Deutschland: 2.250,- €
- Schweiz: CHF 2.700,-
- Nespresso Kaffee, Tee, Säfte und Mineral
- Kuchen, frisches Obst und Snacks
- Mittagessen in einem der direkt erreichbaren Partnerrestaurants
Gilt nur bei Durchführung durch iTLS. Termine, die von unseren Partnern durchgeführt werden, beinhalten ggf. ein abweichendes Verpflegungsangebot.
Sprache der Kursunterlagen: Englisch
Derzeit gibt es keine Klassenraum-Termine für diesen Kurs.
Termin anfragen- Home
- Training
- Juniper Networks
- CJFV Detaillierte Beschreibung

Configuring Juniper Networks Firewall/IPSec VPN Products (CJFV)
Detaillierter Kursinhalt
Day 1
Chapter 1: Course Introduction
Chapter 2: ScreenOS Concepts, Terminology, and Platforms
- Security Device Requirements
- ScreenOS Security Architecture
- Juniper Networks Platforms
Chapter 3: Initial Connectivity
- System Components
- Establishing Connectivity
- Verifying Connectivity
- Lab 1: Initial Configuration
Chapter 4: Device Management
- Management
- Recovery
- Lab 2: Device Administration
Day 2
Chapter 5: Layer 3 Operations
- Need for Routing
- Configuring Layer 3
- Verifying Layer 3
- Loopback Interface
- Interface-Based NAT
- Lab 3: Layer 3 Operations
Chapter 6: Basic Policy Configuration
- Functionality
- Policy Configuration
- Common Problems
- Global Policy
- Verifying Policies
- Lab 4: Basic Policy Configuration
Chapter 7: Policy Options
- Overview
- Logging
- Counting
- Scheduling
- User Authentication
- Lab 5: Policy Options
Chapter 8: Address Translation
- Scenarios
- NAT-src
- NAT-dst
- VIP Addresses
- MIP Addresses
- Lab 6: Address Translation
Day 3
Chapter 9: Transparent Mode (Optional)
- Description
- Configuration
- Verifying Operations
- Lab 7: Transparent Mode
Chapter 10: VPN Concepts
- Concepts and Terminology
- IP Security
Chapter 11: Policy-Based VPNs
- Configuration
- Verifying Operations
- Lab 8: Route-Based VPNs
Chapter 12: Route-Based VPNs
- Concepts and Terminology
- Configuring VPNs
- Verifying IPv6 Operations
- Lab 9: Route-Based VPNs
Appendix A: Additional Features
- Hardware