0845 450 6120

Junos Security (JSEC)

This three-day course provides students with the skills for configuration, operation, and implementation of JUNOS security platforms in a typical network environment.

Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring JUNOS Software for JUNOS security platforms.

We don't currently have any courses listed for Junos Security (JSEC), would you like to view all courses for Programming?

Learning Objectives

  • After successfully completing this course, you should be able to:
  • Describe traditional routing and security and the current trends in internetworking;
  • Provide an overview of JUNOS security platforms and software architecture;
  • Describe the logical packet flow and session creation performed by JUNOS security platforms;
  • Describe, configure, and monitor zones; Describe, configure, and monitor security policies;
  • Describe, configure, and monitor firewall user authentication;
  • Describe various types of network attacks;
  • Configure and monitor SCREEN options to prevent network attacks;
  • Explain, implement, and monitor NAT on JUNOS security platforms;
  • Explain the purpose and mechanics of IPsec VPNs;
  • Implement and monitor policy-based and route-based IPsec VPNs;
  • Utilize and update the IDP signature database on JUNOS security platforms;
  • Configure and monitor IDP policy with policy templates;
  • Describe, configure, and monitor high availability chassis clusters.


Students should have basic networking knowledge and an understanding of the OSI model and the TCP/IP protocol suite.

Students should also either attend the Introduction to JUNOS Software (IJS) and JUNOS Routing Essentials (JRE) courses prior to attending this class, or have equivalent experience with JUNOS Software.


  • This course benefits operators of SRX Series Services Gateways.
  • These operators include network engineers, administrators, support personnel, and reseller support personnel.

Course Content

Day 1

Chapter 1: Course Introduction

Chapter 2: Introduction to Junos Security

  • Traditional Routing
  • Traditional Security
  • The Junos OS Architecture

Chapter 3: Zones

  • The Definition of Zones
  • Zone Configuration
  • Monitoring Security Zones

Lab 1: Configuring and Monitoring Zones

Chapter 4: Security Policies

  • Security Policy Overview
  • Junos ALGs
  • Policy Components
  • Verifying Policy Operation
  • Policy Scheduling and Rematching
  • Policy Case Study

Lab 2: Security Policies

Day 2

Chapter 5: Firewall User Authentication

  • Firewall User Authentication Overview
  • Pass-Through Authentication
  • Web Authentication
  • Client Groups
  • Using External Authentication Servers
  • Verifying Firewall User Authentication

Lab 3: Configuring Firewall Authentication

Chapter 6: Screen Options

  • Multilayer Network Protection
  • Stages and Types of Attacks
  • Using Junos Screen Options—Reconnaissance Attack Handling
  • Using Junos Screen Options—Denial of Service Attack Handling
  • Using Junos Screen Options—Suspicious Packets Attack Handling
  • Applying and Monitoring Screen Options

Lab 4: Implementing Screen Options

Chapter 7: Network Address Translation

  • NAT Overview
  • Source NAT Operation and Configuration
  • Destination NAT Operation and Configuration
  • Static NAT Operation and Configuration
  • Proxy ARP
  • Monitoring and Verifying NAT Operation

Lab 5: Network Address Translation

Day 3

Chapter 8: IPsec VPNs

  • VPN Types
  • Secure VPN Requirements
  • IPsec Details
  • Configuration of IPsec VPNs
  • IPsec VPN Monitoring

Lab 6: Implementing IPsec VPNs

Chapter 9: Introduction to Intrusion Detection and Prevention

  • Introduction to Junos IDP
  • IDP Policy Components and Configuration
  • Signature Database

Case Study: Applying the Recommended IDP Policy
Monitoring IDP Operation

Lab 7: Implementing IDP

Chapter 10: High Availability Clustering Theory

  • High Availability Overview
  • Chassis Cluster Components
  • Advanced Chassis Cluster Topics

Chapter 11: High Availability Clustering Implementation

  • Chassis Cluster Operation
  • Chassis Cluster Configuration
  • Chassis Cluster Monitoring

Lab 8: Implementing High Availability Techniques

Appendix A: SRX Series Hardware and Interfaces
Branch SRX Platform Overview
High End SRX Platform Overview
SRX Traffic Flow and Distribution
SRX Interfaces

One Month
Two Months
Three Months
More than Three Months
PRINCE2 Foundation & Practitioner
MSP Foundation & Practitioner
APMP Certificate
ITIL Foundation
Scrum in One Day
Certified ScrumMaster
ISTQB Software Test Foundation
Microsoft Project
BCS Business Analysis Practice
Other - Please Specify Below

Online Courses

You may prefer an online course if you are looking for a flexible and cost-effective solution. Online courses allow you to study at your own pace, at a time that suits you.

We have the following eLearning options available:

Our Customers Include