Spaces
Apps
Templates
Create
Juniper Security
All content
Space settings
Content
Results will update as you type.
0- Getting started
1- Products & Hardware
diagram and google draw gliffy: Thinkpad Laptop
2a- SRX and Security configuration
Forwarding Mode : Flow-based mode Vs Packet-based mode : MPLS ( packet mode )
0- Installing vSRX and SRX
1- Security Zones
2- Security Policies or firewall policy in Jweb SD and CSO
3- SRX NAT
4- SRX IPsec VPN and SSL VPN
1- IPsec suite of protocols
•
Modem firewall setup for IPSec or ESP/AH and IKE UDP ports
Public Key Infrastructure or PKI for www
•
ca_cert to key_pair to vSRX certificate and fingerprint
PKI Public Key Infrastructure Vs Key server
•
Asymmetrical and symmetrical key
•
Simple Certificate Enrollment Protocol (SCEP)
HMAC to authenticate the source IKE-2
Diffie-Hellman key exchange process
Data Encryption
SA or Security Associations
•
NSA Suite B Cryptography and CNSA
•
authentication-method IKE phase1 SRX
•
Ethernet MTU and TCP MSS
2- Dynamic VPN or Remote Access VPN or IPsec VPN + Pulse Secure Client
3- Remote Access VPN or IPsec VPN with NCP-E client
5- Site-to-Site VPN IPsec Configuration between 2 firewall
•
Policy-based VPN Vs Route-based VPN
•
Traffic selector
•
ADVPN or Auto Discovery VPNs
•
VPN to Google
5- HA or High availability or SRX Chassis Cluster
•
6- VPLS on SRX
syslog and security log
Application Security
UTM or Unified Treat Management
802.1x / dot1x and Mac Authentication
•
alg or Application Layer Gateway
•
convert firewall configuration : lanooka
DHCP: Client or Server
firewall filter ( stateless filter ) DHCP on managment
•
SRX Series as Gi/SGi Firewall for Mobile Network Infrastructure Protection
SSL proxy and Reverse Proxy
•
ECMP and Load balancing in the SRX300
TCP Protocol
•
UDP Protocol
DDoS Distributed Deny of Server Attack
2b- Other Features
2c- OneConfig Features SKY Enterprise
•
2c- YAPT
2d- Security Director and documentation
2- Training Certification and JClab Demo
3- Connected Security or SDSN and Policy Enforcer
SKY ATP appliance SKUs JATP700
4a- Spotlight Secure Threat Intelligence Cloud Service / SecIntel ?????
5- Security on Routers and Switches
7- Penetration testing and red Team tools
8- Troubleshooting and Monitoring
JSA or Juniper Secure Analytics Juniper SIEM
128 Technology
9- Competition and use case or references
•
JA2500
password recovery of root account
Juniper Security
/
/
Public Key Infrastructure or PKI for www
/
Asymmetrical and symmetrical key
Summarize
Asymmetrical and symmetrical key
Jean-luc KRIKER
Owned by
Jean-luc KRIKER
Oct 16, 2023
1 min read
Loading data...
{"serverDuration": 11, "requestCorrelationId": "96a3c9e941644fb5a79501aaba5e22d9"}