Junos Pulse Secure Access Training (JPSA)

Print Friendly, PDF & Email
Introduction

Junos Pulse Secure Access Training (JPSA) Course by ENO

This four-day Junos Pulse Secure Access Training (JPSA) course discusses the configuration of the Junos Pulse Secure Access Service in a typical network environment. Key topics include Secure Sockets Layer (SSL) access technologies, basic implementation, and configuration and management options. Through demonstrations and hands-on labs, students will gain experience in configuring, testing, and troubleshooting basic and advanced facets of the Junos Pulse Secure Access Service. This Junos Pulse Secure Access Training (JPSA) course uses the MAG6611 Junos Pulse Gateway using MAG-SM160 Service Modules. The course also supports the SA Series SSL VPN Virtual Appliance Demonstration and Training Edition (DTE). This Junos Pulse Secure Access Training (JPSA) course is based on the Junos Pulse Secure Access Service release 8.0R3.2.

Duration: 4 days

Junos Pulse Secure Access Training (JPSA) Related Courses

 
Customize It

• If you are familiar with some aspects of this Junos Pulse Secure Access Training (JPSA) course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the Junos Pulse Secure Access Training (JPSA) course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Junos Pulse Secure Access Training (JPSA) course in manner understandable to lay audiences.

Audience / Target Group

This Junos Pulse Secure Access Training (JPSA) course benefits network engineers, support personnel, reseller support, and individuals responsible for implementing the Junos Pulse Secure Access Service

Junos Pulse Secure Access Training (JPSA) - Objectives:

After completing this Junos Pulse Secure Access Training (JPSA) course, attendees will be able to:

• Host Checker
• Introduction to the Junos Pulse Secure Access Service:
• Typical deployment scenarios.
• Terminology.
• Secure Access protocols and operations.
• Junos Pulse Secure Access Service initial configuration.
• Junos Pulse Secure Access Service configuration elements:
• Roles.
• Authentication realms.
• Authentication servers.
• Resource policies.
• Sign-in policies.
• Client access methods:
• SAM.
• VPN tunneling.
• Junos Pulse.
• Junos Pulse collaboration:
• Configuring and scheduling meetings.
• Conducting meetings.
• Endpoint security:
• Host Checker.
• Enhanced Endpoint Security.
• Secure Virtual Workspace.
• Cache Cleaner.
• Administration and troubleshooting.
• Virtualization.
• Clustering.

Junos Pulse Secure Access Training (JPSA) - Course Content:

Day 1

Chapter 1: Course Introduction

Chapter 2: The Junos Pulse Secure Access Service

•Secure Remote Access Overview
•Junos Pulse Secure Access Series Deployment Options
•MAG Series Platforms and Feature Sets
•Integration Options

Chapter 3: Initial Configuration

•Console Configuration
•Administrative UI
•Lab 1: Initial Configuration

Chapter 4: Technology and Terminology

•SSL and TLS Overview
•Junos Pulse Secure Access Service Access Methods
•Junos Pulse Secure Access Service Architecture
•Access Management Framework Elements

Chapter 5: User Roles

•Configuring User Roles
•Role Mapping
•Customizing the User Experience
•Lab 2: User Roles

Day 2

Chapter 6: Resource Policies and Profiles

•What Is a Resource Policy?
•Resource Policy Configuration
•Resource Policy Options
•Resource Profile Configuration
•Lab 3: Resource Policies and Profiles

Chapter 7: Complex Policies

•Resource Policies
•Specialized Web Resource Policies
•Lab 4: Complex Policies

Chapter 8: Authentication

•The Authentication Process
•Configuring Authentication
•Lab 5: Authentication Servers and Realms

Chapter 9: Advanced Authentication Options

•Custom Sign-In URLs
•Multiple Sign-In Credentials
•Configuring SSO
•Additional Authentication Servers
•Lab 6: Advanced Authentication Options

Chapter 10: Certificates

•Certificates
•Configuring the Junos Pulse Secure Access Service for Certificates
•Configuring Multiple Server Certificates
•Lab 7: Using Certificates

Day 3

Chapter 11: Client and Server Applications

•The Need for Client/Server Support
•Secure Application Manager
•VPN Tunneling
•Installers
•Lab 8: Client and Server Support

Chapter 12: Junos Pulse

•What Is Junos Pulse?
•Junos Pulse Features and Components
•Junos Pulse Configuration
•Lab 9: Junos Pulse

Chapter 13: Junos Pulse Collaboration

•Junos Pulse Collaboration Overview
•Configuring Junos Pulse Collaboration
•Junos Pulse Collaboration Client
•Lab 10: Junos Pulse Collaboration (Optional)

Chapter 14: Endpoint Security

•The TNC Architecture
•Configuring Host Checker
•Configuring Enhanced Endpoint Security
•Configuring Secure Virtual Workspace
•Configuring Cache Cleaner
•Enforcing Endpoint Security
•Lab 11: Endpoint Security

Day 4

Chapter 15: Administration and Troubleshooting

•Logs
•Troubleshooting
•Management Operations
•Delegated Administration
•Lab 12: Administration

Chapter 16: Advanced Troubleshooting

•Troubleshooting Concepts
•Content Intermediation Engine
•Troubleshooting VPN Tunneling
•General Troubleshooting
•Lab 13: Troubleshooting

Chapter 17: Virtualization

•Describing Virtualization
•Configuring Virtual Appliance Licensing
•Configuring Virtual Desktops

Chapter 18: Clustering

•Clustering Overview
•Clustering Configuration
•Multi-Unit Clustering
•Upgrading a Cluster
•Lab 14: Active-Passive Cluster Configuration

Appendix A: Junos Pulse Gateway Chassis Management

•Chassis Management Card Features
•Configuration of Chassis Management Card

Appendix B: Additional Client Applications and Features

•Telnet and SSH
•Terminal Services
•Scriptable Launchers
•Lab 15: Client and Server Options

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment

0