Course Offering
- Upcoming Schedule
- Guaranteed to Run Schedule
- New Courses
- iTLS LIVE E-Learning
- Digital Learning Solutions
- iTLS Academy»
- Hack Academy
-
iTLS IT Workshops»
- IT Training by iTLS
- Guaranteed Dates
- Featured Topics
- Professional Services
- Featured Vendors
- Amazon Web Services»
- Aruba»
- Barracuda
- Cisco»
- Citrix»
- EC-Council»
- Ethical Hacking
- Fortinet»
- Google Cloud»
- Linux
- Microsoft»
- NetApp»
- Palo Alto Networks»
- VMware»
- Additional Vendors»
- IT & Project Management»
- ITIL®»
- PRINCE2®»
- Scaled Agile»
- Scrum»
- Atlassian»
- Featured Topics/Technologies
- Artificial Intelligence (AI)»
- Cloud Computing»
- Cyber Security»
- Data Center»
- Internet of Things (IoT)»
- Network Analysis / Wireshark»
- Software Development»
- Wireless & Mobility»
- Home
- Training
- Juniper Networks
- JSPES Detailed outline

Juniper Service Provider Edge Security (JSPES) (JSPES)
Detailed Course Outline
DAY 1
1 Course Introduction
2 Security Challenges for Service Providers
- Describe limitations of security devices
- Describe DDoS attack threats
- Describe BGP security threats
- Explain IP address depletion challenges
- Describe 5G security challenges
3 Juniper Networks Solutions for Service Providers
- Describe Juniper Networks’ security solutions for the service provider challenges
4 Stateful Firewalls
- Describe stateless firewall filters
- Describe stateful firewall policies
- Describe screens and ALGs
- Explain asymmetrical routing
Lab 1: Configure Stateful Firewalls
5G Architecture using SRX Series Devices
- Describe security insertion points
- Describe 5G network evolution
6 DDoS Protection
- Explain DDoS history and common protections
- Describe SRX DDoS protection
- Describe BGP FlowSpec
- Describe Corero with MX DDoS protection
Lab 2: DDoS Protection
DAY 2
7 Carrier-Grade NAT
- Explain IPv4 address exhaustion
- Describe Source NAT
- Describe CGNAT
- Describe NAT64
Lab 3: CGNAT
8 Juniper Connected Security for Service Providers
- Explain Juniper Connected Security
- Describe SecIntel feeds
- Describe a use case for IoT protection
Lab 4: Implementing Juniper Connected Security
9 IPsec Overview
- Describe the IPsec and IKE protocols
- Configure site-to-site IPsec VPNs
- Describe and configure Proxy IDs and Traffic selectors
- Monitor site-to-site IPsec VPNs
- Describe IPsec use with gNodeB devices
Lab 5: Site-to-Site IPsec VPN
10 Scaling IPsec
- Describe and implement PKI certificates in Junos OS
- Describe AutoVPN
- Describe SecGW firewall use case for scaling IPsec
Lab 6: Configuring AutoVPN
DAY 3
11 GPRS and GTP
- Describe how to secure GTP tunnels
- Describe the GPRS protocol
- Describe the GTP
- Explain how Roaming Firewall secures GTP
12 SCTP
- Describe the SCTP
Lab 7: Video about Implementing the Roaming Firewall (Demo)
13 Securing the Control Plane
- Explain how to secure the control plane on Junos devices
- Describe how the loopback filter works to secure the control plane
- Explain how to protect the control plane from DDoS attacks
- Describe how to secure the IGP against attacks
Lab 8: Configure Control Plane Protections
14 Securing the BGP
- Describe how to secure the BGP
- Describe BGP security features
- Describe BGP dampening
Lab 9: Configure BGP protections