Network Security Junos Pulse Secure Access

Junos Pulse Secure Access

Location:

Date of Class:

Instructor:

Last Day To Enroll:

3200.00 3,200.00
$3,200.00
PRICE PER USER
$
X
USERS


=
SUBTOTAL
$
  • Course Delivery: Virtual Classroom
  • Language: English
  • Audience: Network Engineers & Individuals

Chat Live | Contact Us | Toll Free: (888) 360-8764

 

Description

This four-day course discusses the configuration of the Junos Pulse Secure Access Service in a typical network environment. Key topics include Secure Sockets Layer (SSL) access technologies, basic implementation, and configuration and management options. Through demonstrations and hands-on labs, you will gain experience in configuring, testing, and troubleshooting basic and advanced facets of the Junos Pulse Secure Access Service. This course uses the MAG6611 Junos Pulse Gateway using MAG-SM160 Service Modules. The course also supports the SA Series SSL VPN Virtual Appliance Demonstration and Training Edition (DTE).This course is based on the Junos Pulse Secure Access Service release 7.2R1.

Audience

This course benefits network engineers, support personnel, reseller support, and individuals responsible for implementing the Junos Pulse Secure Access Service.
 

Course Objectives

After successfully completing this course, you should be able to deploy the Junos Pulse Secure Access Service and firewall enforcer to support common environments. Specific topics include the following:

  • Introduction to the Junos Pulse Secure Access Service:
  • Typical deployment scenarios.
  • Terminology.
  • Secure Access protocols and operations.
  • Junos Pulse Secure Access Service initial configuration.
  • Junos Pulse Secure Access Service configuration elements:
  • Roles.
  • Authentication realms.
  • Authentication servers.
  • Resource policies.
  • Sign-in policies.
  • Client access methods:
  • SAM.
  • VPN tunneling.
  • Junos Pulse.
  • Junos Pulse collaboration:
  • Configuring and scheduling meetings.
  • Conducting meetings.
  • Endpoint security:
  • Host Checker.
  • Enhanced Endpoint Security.
  • Secure Virtual Workspace.
  • Cache Cleaner.
  • Administration and troubleshooting.
  • Virtualization.
  • Clustering.
 

Topics Covered

Day 1

Chapter 1: Course Introduction

Chapter 2: The Junos Pulse Secure Access Service

  • Secure Remote Access Overview
  • Junos Pulse Secure Access Series Deployment Options
  • MAG Series Platforms and Feature Sets
  • Integration Options

Chapter 3: Initial Configuration

  • Console Configuration
  • Administrative UI

Lab 1: Initial Configuration

Chapter 4: Technology and Terminology

  • SSL and TLS Overview
  • Junos Pulse Secure Access Service Access Methods
  • Junos Pulse Secure Access Service Architecture
  • Access Management Framework Elements

Chapter 5: User Roles

  • Configuring User Roles
  • Role Mapping
  • Customizing the User Experience

Lab 2: User Roles

Day 2

Chapter 6: Resource Policies and Profiles

  • What Is a Resource Policy?
  • Resource Policy Configuration
  • Resource Policy Options
  • Resource Profile Configuration

Lab 3: Resource Policies and Profiles

Chapter 7: Complex Policies

  • Resource Policies
  • Specialized Web Resource Policies

Lab 4: Complex Policies

Chapter 8: Authentication

  • The Authentication Process
  • Configuring Authentication

Lab 5: Authentication Servers and Realms

Chapter 9: Advanced Authentication Options

  • Custom Sign-In URLs
  • Multiple Sign-In Credentials
  • Configuring SSO
  • Additional Authentication Servers

Lab 6: Advanced Authentication Options

Chapter 10: Certificates

  • Certificates
  • Configuring the Junos Pulse Secure Access Service for Certificates
  • Configuring Multiple Server Certificates

Lab 7: Using Certificates

Day 3

Chapter 11: Client and Server Applications

  • The Need for Client/Server Support
  • Secure Application Manager
  • VPN Tunneling
  • Installers

Lab 8: Client and Server Support

Chapter 12: Junos Pulse

  • What Is Junos Pulse?
  • Junos Pulse Features and Components
  • Junos Pulse Configuration

Lab 9: Junos Pulse

Chapter 13: Junos Pulse Collaboration

  • Junos Pulse Collaboration Overview
  • Configuring Junos Pulse Collaboration
  • Junos Pulse Collaboration Client

Lab 10: Junos Pulse Collaboration (Optional)

Chapter 14: Endpoint Security

  • The TNC Architecture
  • Configuring Host Checker
  • Configuring Enhanced Endpoint Security
  • Configuring Secure Virtual Workspace
  • Configuring Cache Cleaner
  • Enforcing Endpoint Security

Lab 11: Endpoint Security

Day 4

Chapter 15: Administration and Troubleshooting

  • Logs
  • Troubleshooting
  • Management Operations
  • Delegated Administration

Lab 12: Administration

Chapter 16: Advanced Troubleshooting

  • Troubleshooting Concepts
  • Content Intermediation Engine
  • Troubleshooting VPN Tunneling
  • General Troubleshooting

Lab 13: Troubleshooting

Chapter 17: Virtualization

  • Describing Virtualization
  • Configuring Virtual Appliance Licensing
  • Configuring Virtual Desktops

Chapter 18: Clustering

  • Clustering Overview
  • Clustering Configuration
  • Multi-Unit Clustering
  • Upgrading a Cluster

Lab 14: Active-Passive Cluster Configuration

Appendix A: Junos Pulse Gateway Chassis Management

  • Chassis Management Card Features
  • Configuration of Chassis Management Card

Appendix B: Additional Client Applications and Features

  • Telnet and SSH
  • Terminal Services
  • Scriptable Launchers

Lab 15: Client and Server Options
 

Prerequisites

This course assumes that you have moderate background in internetworking basics, basic security concepts, network administration, and application support.

Got questions? Contact us below or call 877-881-2235

Why Choose 360training.com?

  • Fast and easy courses completion
  • Get an education faster than at traditional colleges!
  • 100% online - No classroom attendance required.
  • Unlimited 24x7 online customer support
  • Over 500,000+ certified nationwide.