عنوان کلاستوضیحات کلاسساعتشهریه دوره (تومان)زمان برگزاریرزروی ها
PACK (JNCIA-Junos + JNCIS-Sec)
استاد: مهندس احمد دستاویز
-501,200,000درصورت تقاضا اعلام می گردد
نامشخص
11ورود به سایت

Networking Fundamentals

    • Identify the concepts and functionality of various fundamental elements of networking
        • Collision domains and broadcast domains
        • Function of routers and switches
        • Optical network fundamentals – SONET/SDH, OTN
        • Ethernet networks
        • Layer 2 addressing, including address resolution
        • IPv4 and IPv6 fundamentals
        • Layer 3 / IP addressing, including subnet masks
        • Subnetting and supernetting
        • Decimal to binary conversion
        • Longest match routing
        • Connection-oriented vs. connectionless protocols

Junos OS Fundamentals

  • Identify the concepts, benefits and functionality of the core elements of the Junos OS
    • Junos device portfolio – product families, general functionality
    • Software architecture
    • Control and forwarding planes
    • Routing Engine and Packet Forwarding Engine
    • Protocol daemons
    • Transit traffic processing
    • Exception traffic

User Interfaces

    • Identify the concepts, operation and functionality of the Junos user interfaces
      • CLI functionality
      • CLI modes
      • CLI navigation
      • CLI Help
      • Filtering output
      • Active vs. candidate configuration
      • Reverting to previous configurations
      • Modifying, managing, and saving configuration files
      • Viewing, comparing, and loading configuration files
      • J-Web – core/common functionality

Junos Configuration Basics

    • Identify the main elements for configuring Junos devices Describe how to configure basic components of a Junos device
      • Factory-default state
      • Initial configuration
      • User accounts
      • Login classes
      • User authentication methods
      • Interface types and properties
      • Configuration groups
      • Additional initial configuration elements – NTP, SNMP, syslog, etc.
      • Configuration archival
      • Logging and tracing
      • Rescue configuration

Operational Monitoring and Maintenance

    • Identify methods of monitoring and maintaining Junos devices Describe monitoring and maintenance procedures for a Junos device
      • Show commands
      • Monitor commands
      • Interface statistics and errors
      • Network tools – ping, traceroute, telnet, SSH, etc.
      • Real-time performance monitoring (RPM)
      • Junos OS installation
      • Software upgrades
      • Powering on and shutting down Junos devices
      • Root password recovery

Routing Fundamentals

    • Identify basic routing concepts and functionality for Junos devices Describe how to configure and monitor basic routing elements for a Junos device
      • Packet forwarding concepts
      • Routing tables
      • Routing vs. forwarding tables
      • Route preference
      • Routing instances
      • Static routing
      • Advantages of / use cases for dynamic routing protocols

Routing Policy and Firewall Filters

    • Identify the concepts and functionality of routing policy and firewall filters on Junos devices Describe how to configure and monitor routing policies and firewall filters on a Junos device
      • Default routing policies
      • Import and export policies
      • Routing policy flow
      • Effect of policies on routes and routing tables
      • Policy structure and terms
      • Policy match criteria, match types, and actions
      • Firewall filter concepts
      • Firewall filter concepts
      • Filter match criteria and actions
      • Effect of filters on packets
      • Unicast reverse-path-forwarding (RPF)

Junos Security Overview

    • Identify concepts, general features and functionality of Junos OS security
      • Junos security architecture
      • Branch vs. high-end platforms
      • Major hardware components of SRX Series services gateways
      • Packet flow
      • Packet-based vs. session-based forwarding

Zones

    • Identify concepts, benefits and operation of zones
      • Zone types
      • Dependencies
      • Host inbound packet behavior
      • Transit packet behavior
    • Demonstrate knowledge of how to configure, monitor and troubleshoot zones
      • Zone configuration steps
      • Hierarchy priority (Inheritance)
      • Monitoring and troubleshooting

Security Policies

    • Identify the concepts, benefits and operation of security policies
      • Policy types (default policy)
      • Policy components
      • Policy ordering
      • Host inbound traffic examination
      • Transit traffic examination
      • Scheduling
      • Rematching
      • ALGs
      • Address books
      • Applications
    • Demonstrate knowledge of how to configure, monitor and troubleshoot security policies
      • Policies
      • ALGs
      • Address books
      • Custom applications
      • Monitoring and troubleshooting

Firewall User Authentication

    • Describe the concepts, benefits and operation of firewall user authentication
      • User Firewall
      • User authentication types
      • Authentication server support
      • Client groups

Screens

    • Identify the concepts, benefits and operation of Screens
      • Attack types and phases
      • Screen options
    • Demonstrate knowledge of how to configure, monitor and troubleshoot Screens
      • Screen configuration steps
      • Monitoring and troubleshooting

NAT

    • Identify the concepts, benefits and operation of NAT
      • NAT types
      • NAT/PAT processing
      • Address persistence
      • NAT proxy ARP
      • Configuration guidelines
    • Demonstrate knowledge of how to configure, monitor and troubleshoot NAT
      • NAT configuration steps
      • Monitoring and troubleshooting

IPSec VPNs

    • Identify the concepts, benefits and operation of IPSec VPNs
      • Secure VPN characteristics and components
      • IPSec tunnel establishment
      • IPSec traffic processing
      • Junos OS IPSec implementation options
    • Demonstrate knowledge of how to configure, monitor and troubleshoot IPSec VPNs
      • IPSec VPN configuration steps
      • Monitoring and troubleshooting

High Availability (HA) Clustering

    • Identify the concepts, benefits and operation of HA
      • HA features and characteristics
      • Deployment requirements and considerations
      • Chassis cluster characteristics and operation
      • Cluster modes
      • Cluster and node IDs
      • Redundancy groups
      • Cluster interfaces
      • Real-time objects
      • State synchronization
      • Ethernet switching considerations
      • IPSec considerations
      • Manual failover
    • Demonstrate knowledge of how to configure, monitor and troubleshoot clustering
      • Cluster preparation
      • Cluster configuration steps
      • Monitoring and troubleshooting

Unified Threat Management (UTM)

    • Identify concepts, general features and functionality of UTM
      • Packet flow and processing
      • Design considerations
      • Policy flow
      • Platform support
      • Licensing
  • Describe the purpose, configuration and operation of antispam filtering
      • Methods
      • Whitelists vs. blacklists
      • Order of operations
      • Traffic examination
      • Configuration steps using the CLI
      • Monitoring and troubleshooting
    • Describe the purpose, configuration and operation of antivirus protection
      • Scanning methods
      • Antivirus flow process
      • Scanning options and actions
      • Configuration steps using the CLI
      • Monitoring and troubleshooting
    • Describe the concepts, benefits and operation of content and Web filtering
      • Filtering features and solutions
      • Configuration steps using the CLI
      • Monitoring and troubleshooting