Detailed Course Outline
Junos Layer 2 Packet Handling and Security Features
- Explain transparent mode security operations
 - Define secure wire implementation
 - Describe MACsec uses
 
Lab 1: Implementing Layer 2 Security
Packet-Based Security
- Explain routing instances
 - Describe filter-based forwarding
 
Lab 2: Implementing Packet-Based Security
Troubleshooting Zones and Policies
- Describe troubleshooting tools available in Junos OS
 - Discuss troubleshooting of security zones and security policies
 - Examine troubleshooting case studies
 
Lab 3: Troubleshooting Zones and Policies
Hub-and-Spoke VPN
- Describe the hub-and-spoke VPN topology
 - Configure hub-and-spoke VPNs
 
Lab 4: Implementing Hub-and-Spoke VPNs
Advanced NAT
- Explain the difference between address persistence and persistent NAT
 - Describe DNS doctoring
 - Describe advanced NAT scenarios
 - Discuss NAT troubleshooting
 
Lab 5: Implementing Advanced NAT
Logical and Tenant Systems
- Describe logical systems
 - Describe tenant systems
 
Lab 6: Implementing Tenant Systems
PKI and ADVPNs
- Describe PKI
 - Configure PKI for Junos security devices
 - Describe how ADVPNs function
 - Configure and monitor ADVPNs
 
Lab 7: Implementing ADVPNs
Advanced IPsec
- Explain NAT interoperability with IPsec
 - Describe the CoS feature with IPsec VPNs
 - Explain IPsec best practices
 - Configure OSPF over IPsec
 - Configure IPsec with overlapping addresses
 - Configure IPsec with dynamic gateway IP addresses
 
Lab 8: Implementing Advanced IPsec Solutions
Troubleshooting IPsec
- Describe general troubleshooting for IPsec VPNs
 - Discuss how to troubleshoot IKE Phase 1 and Phase 2
 - Configure and analyze logging for IPsec VPNs
 - Examine IPsec troubleshooting case studies
 
Lab 9: Troubleshooting IPsec VPNs
Advanced Policy-Based Routing
- Define advanced policy-based routing
 - Configure advanced policy-based routing
 - Explain application quality of experience
 
Lab 10: Implementing APBR
EVPN-VXLAN Security
- Describe the EVPN-VXLAN protocols
 - Explain VXLAN tunnel security
 - Configure security on VXLAN tunnels
 
Lab 11: Securing Traffic Between Data Centers
Multinode High Availability
- Identify the benefits of high availability and security
 - Explain the use of multinode high availability
 - Identify multinode high availability modes
 - Discuss services redundancy groups
 
Lab 12: Implementing Multinode HA
Automated Threat Mitigation
- Explain Automated Threat Mitigation
 - Discuss Juniper Connected Security third-party integrations
 - Discuss Juniper Connected Security multicloud integrations
 - Discuss the Secure Enterprise use case