<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="2893" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/juniper-ajsec" lastchanged="2025-09-05T10:45:24+02:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>Advanced Juniper Security</title><productcode>AJSEC</productcode><vendorcode>JP</vendorcode><vendorname>Juniper Networks</vendorname><fullproductcode>JP-AJSEC</fullproductcode><version>23.a</version><objective>&lt;p&gt;After successfully completing this course, you should be able to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe Layer 2 security features.&lt;/li&gt;&lt;li&gt;Discuss ways to use packet-based security.&lt;/li&gt;&lt;li&gt;Describe how to troubleshoot zones and policies.&lt;/li&gt;&lt;li&gt;Describe how to implement a hub-and-spoke VPN.&lt;/li&gt;&lt;li&gt;Discuss advanced NAT capabilities.&lt;/li&gt;&lt;li&gt;List the ways that the SRX Series firewall may be virtualized.&lt;/li&gt;&lt;li&gt;Describe how to implement an Auto Discovery VPN (ADVPN) setup.&lt;/li&gt;&lt;li&gt;List options using IPsec to accomplish advanced configurations.&lt;/li&gt;&lt;li&gt;Discuss how to troubleshoot IPsec VPNs.&lt;/li&gt;&lt;li&gt;Describe how to route traffic based on the application.&lt;/li&gt;&lt;li&gt;Describe how to secure VXLAN traffic within the network.&lt;/li&gt;&lt;li&gt;Implement multinode high availability.&lt;/li&gt;&lt;li&gt;Discuss how to mitigate network threats automatically.&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;ul&gt;
&lt;li&gt;Strong skill level in TCP/IP, Layer 2 Ethernet, security policies, and security concepts&lt;/li&gt;&lt;li&gt;General understanding of stateful firewalls, NAT, and IPsec&lt;/li&gt;&lt;li&gt;Recommended, but not required:
&lt;ul&gt;
&lt;li&gt;Completion of the &lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/en/course/juniper-ijos&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Introduction to the Junos Operating System &lt;span class=&quot;fl-prod-pcode&quot;&gt;(IJOS)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt; and &lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/en/course/juniper-jsec&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Juniper Security &lt;span class=&quot;fl-prod-pcode&quot;&gt;(JSEC)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt; courses&lt;/li&gt;&lt;li&gt;Experience with packet captures&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;Individuals responsible for implementing, monitoring, and troubleshooting Juniper security components. This course also helps you prepare for the JNCIP-SEC certification&lt;/p&gt;</audience><contents>&lt;ul&gt;
&lt;li&gt;Junos Layer 2 Packet Handling and Security Features&lt;/li&gt;&lt;li&gt;Packet-Based Security&lt;/li&gt;&lt;li&gt;Troubleshooting Zones and Policies&lt;/li&gt;&lt;li&gt;Hub-and-Spoke VPN&lt;/li&gt;&lt;li&gt;Advanced NAT&lt;/li&gt;&lt;li&gt;Logical and Tenant Systems&lt;/li&gt;&lt;li&gt;PKI and ADVPNs&lt;/li&gt;&lt;li&gt;Advanced IPsec&lt;/li&gt;&lt;li&gt;Troubleshooting IPsec&lt;/li&gt;&lt;li&gt;Advanced Policy-Based Routing&lt;/li&gt;&lt;li&gt;EVPN-VXLAN Security&lt;/li&gt;&lt;li&gt;Multinode High Availability&lt;/li&gt;&lt;li&gt;Automated Threat Mitigation&lt;/li&gt;&lt;/ul&gt;</contents><outline>&lt;h5&gt;Junos Layer 2 Packet Handling and Security Features&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain transparent mode security operations&lt;/li&gt;&lt;li&gt;Define secure wire implementation&lt;/li&gt;&lt;li&gt;Describe MACsec uses&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 1: Implementing Layer 2 Security&lt;/p&gt;
&lt;h5&gt;Packet-Based Security&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain routing instances&lt;/li&gt;&lt;li&gt;Describe filter-based forwarding&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 2: Implementing Packet-Based Security&lt;/p&gt;
&lt;h5&gt;Troubleshooting Zones and Policies&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe troubleshooting tools available in Junos OS&lt;/li&gt;&lt;li&gt;Discuss troubleshooting of security zones and security policies&lt;/li&gt;&lt;li&gt;Examine troubleshooting case studies&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 3: Troubleshooting Zones and Policies&lt;/p&gt;
&lt;h5&gt;Hub-and-Spoke VPN&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe the hub-and-spoke VPN topology&lt;/li&gt;&lt;li&gt;Configure hub-and-spoke VPNs&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 4: Implementing Hub-and-Spoke VPNs&lt;/p&gt;
&lt;h5&gt;Advanced NAT&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain the difference between address persistence and persistent NAT&lt;/li&gt;&lt;li&gt;Describe DNS doctoring&lt;/li&gt;&lt;li&gt;Describe advanced NAT scenarios&lt;/li&gt;&lt;li&gt;Discuss NAT troubleshooting&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 5: Implementing Advanced NAT&lt;/p&gt;
&lt;h5&gt;Logical and Tenant Systems&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe logical systems&lt;/li&gt;&lt;li&gt;Describe tenant systems&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 6: Implementing Tenant Systems&lt;/p&gt;
&lt;h5&gt;PKI and ADVPNs&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe PKI&lt;/li&gt;&lt;li&gt;Configure PKI for Junos security devices&lt;/li&gt;&lt;li&gt;Describe how ADVPNs function&lt;/li&gt;&lt;li&gt;Configure and monitor ADVPNs&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 7: Implementing ADVPNs&lt;/p&gt;
&lt;h5&gt;Advanced IPsec&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain NAT interoperability with IPsec&lt;/li&gt;&lt;li&gt;Describe the CoS feature with IPsec VPNs&lt;/li&gt;&lt;li&gt;Explain IPsec best practices&lt;/li&gt;&lt;li&gt;Configure OSPF over IPsec&lt;/li&gt;&lt;li&gt;Configure IPsec with overlapping addresses&lt;/li&gt;&lt;li&gt;Configure IPsec with dynamic gateway IP addresses&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 8: Implementing Advanced IPsec Solutions&lt;/p&gt;
&lt;h5&gt;Troubleshooting IPsec&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe general troubleshooting for IPsec VPNs&lt;/li&gt;&lt;li&gt;Discuss how to troubleshoot IKE Phase 1 and Phase 2&lt;/li&gt;&lt;li&gt;Configure and analyze logging for IPsec VPNs&lt;/li&gt;&lt;li&gt;Examine IPsec troubleshooting case studies&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 9: Troubleshooting IPsec VPNs&lt;/p&gt;
&lt;h5&gt;Advanced Policy-Based Routing&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Define advanced policy-based routing&lt;/li&gt;&lt;li&gt;Configure advanced policy-based routing&lt;/li&gt;&lt;li&gt;Explain application quality of experience&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 10: Implementing APBR&lt;/p&gt;
&lt;h5&gt;EVPN-VXLAN Security&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe the EVPN-VXLAN protocols&lt;/li&gt;&lt;li&gt;Explain VXLAN tunnel security&lt;/li&gt;&lt;li&gt;Configure security on VXLAN tunnels&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 11: Securing Traffic Between Data Centers&lt;/p&gt;
&lt;h5&gt;Multinode High Availability&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Identify the benefits of high availability and security&lt;/li&gt;&lt;li&gt;Explain the use of multinode high availability&lt;/li&gt;&lt;li&gt;Identify multinode high availability modes&lt;/li&gt;&lt;li&gt;Discuss services redundancy groups&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 12: Implementing Multinode HA&lt;/p&gt;
&lt;h5&gt;Automated Threat Mitigation&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain Automated Threat Mitigation&lt;/li&gt;&lt;li&gt;Discuss Juniper Connected Security third-party integrations&lt;/li&gt;&lt;li&gt;Discuss Juniper Connected Security multicloud integrations&lt;/li&gt;&lt;li&gt;Discuss the Secure Enterprise use case&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>After successfully completing this course, you should be able to:


- Describe Layer 2 security features.
- Discuss ways to use packet-based security.
- Describe how to troubleshoot zones and policies.
- Describe how to implement a hub-and-spoke VPN.
- Discuss advanced NAT capabilities.
- List the ways that the SRX Series firewall may be virtualized.
- Describe how to implement an Auto Discovery VPN (ADVPN) setup.
- List options using IPsec to accomplish advanced configurations.
- Discuss how to troubleshoot IPsec VPNs.
- Describe how to route traffic based on the application.
- Describe how to secure VXLAN traffic within the network.
- Implement multinode high availability.
- Discuss how to mitigate network threats automatically.</objective_plain><essentials_plain>- Strong skill level in TCP/IP, Layer 2 Ethernet, security policies, and security concepts
- General understanding of stateful firewalls, NAT, and IPsec
- Recommended, but not required:

- Completion of the Introduction to the Junos Operating System (IJOS) and Juniper Security (JSEC) courses
- Experience with packet captures</essentials_plain><audience_plain>Individuals responsible for implementing, monitoring, and troubleshooting Juniper security components. This course also helps you prepare for the JNCIP-SEC certification</audience_plain><contents_plain>- Junos Layer 2 Packet Handling and Security Features
- Packet-Based Security
- Troubleshooting Zones and Policies
- Hub-and-Spoke VPN
- Advanced NAT
- Logical and Tenant Systems
- PKI and ADVPNs
- Advanced IPsec
- Troubleshooting IPsec
- Advanced Policy-Based Routing
- EVPN-VXLAN Security
- Multinode High Availability
- Automated Threat Mitigation</contents_plain><outline_plain>Junos Layer 2 Packet Handling and Security Features


- Explain transparent mode security operations
- Define secure wire implementation
- Describe MACsec uses
Lab 1: Implementing Layer 2 Security

Packet-Based Security


- Explain routing instances
- Describe filter-based forwarding
Lab 2: Implementing Packet-Based Security

Troubleshooting Zones and Policies


- Describe troubleshooting tools available in Junos OS
- Discuss troubleshooting of security zones and security policies
- Examine troubleshooting case studies
Lab 3: Troubleshooting Zones and Policies

Hub-and-Spoke VPN


- Describe the hub-and-spoke VPN topology
- Configure hub-and-spoke VPNs
Lab 4: Implementing Hub-and-Spoke VPNs

Advanced NAT


- Explain the difference between address persistence and persistent NAT
- Describe DNS doctoring
- Describe advanced NAT scenarios
- Discuss NAT troubleshooting
Lab 5: Implementing Advanced NAT

Logical and Tenant Systems


- Describe logical systems
- Describe tenant systems
Lab 6: Implementing Tenant Systems

PKI and ADVPNs


- Describe PKI
- Configure PKI for Junos security devices
- Describe how ADVPNs function
- Configure and monitor ADVPNs
Lab 7: Implementing ADVPNs

Advanced IPsec


- Explain NAT interoperability with IPsec
- Describe the CoS feature with IPsec VPNs
- Explain IPsec best practices
- Configure OSPF over IPsec
- Configure IPsec with overlapping addresses
- Configure IPsec with dynamic gateway IP addresses
Lab 8: Implementing Advanced IPsec Solutions

Troubleshooting IPsec


- Describe general troubleshooting for IPsec VPNs
- Discuss how to troubleshoot IKE Phase 1 and Phase 2
- Configure and analyze logging for IPsec VPNs
- Examine IPsec troubleshooting case studies
Lab 9: Troubleshooting IPsec VPNs

Advanced Policy-Based Routing


- Define advanced policy-based routing
- Configure advanced policy-based routing
- Explain application quality of experience
Lab 10: Implementing APBR

EVPN-VXLAN Security


- Describe the EVPN-VXLAN protocols
- Explain VXLAN tunnel security
- Configure security on VXLAN tunnels
Lab 11: Securing Traffic Between Data Centers

Multinode High Availability


- Identify the benefits of high availability and security
- Explain the use of multinode high availability
- Identify multinode high availability modes
- Discuss services redundancy groups
Lab 12: Implementing Multinode HA

Automated Threat Mitigation


- Explain Automated Threat Mitigation
- Discuss Juniper Connected Security third-party integrations
- Discuss Juniper Connected Security multicloud integrations
- Discuss the Secure Enterprise use case</outline_plain><duration unit="d" days="4">4 days</duration><pricelist><price country="CH" currency="CHF">5250.00</price><price country="DE" currency="EUR">4000.00</price><price country="AT" currency="EUR">4000.00</price><price country="IL" currency="ILS">13880.00</price><price country="GR" currency="EUR">2500.00</price><price country="MK" currency="EUR">2500.00</price><price country="HU" currency="EUR">2500.00</price><price country="UA" currency="EUR">4000.00</price><price country="SI" currency="EUR">4000.00</price><price country="SK" currency="EUR">4000.00</price></pricelist><miles><milesvalue country="DE" vendorcurrency="JTC" vendorcurrencyname="Juniper Training Credits">4750.00</milesvalue></miles></course>