<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="2880" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/juniper-ajvi" lastchanged="2025-09-10T08:50:33+02:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>Advanced Juniper Networks IPSec VPN Implementations</title><productcode>AJVI</productcode><vendorcode>JP</vendorcode><vendorname>Juniper Networks</vendorname><fullproductcode>JP-AJVI</fullproductcode><version>6.c</version><objective>&lt;p&gt;After successfully completing this course, you should be able to:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Configure LAN-to-LAN IP Security (IPsec) VPNs in various configurations.&lt;/li&gt;&lt;li&gt;Configure VPN redundancy.&lt;/li&gt;&lt;li&gt;Configure dynamic routing using IPsec VPNs.&lt;/li&gt;&lt;li&gt;Configure remote access IPsec connectivity including group Internet Key Exchange (IKE) and shared IKE.&lt;/li&gt;&lt;li&gt;Configure generic routing encapsulation (GRE) tunnels.&lt;/li&gt;&lt;/ul&gt;</objective><contents>&lt;p&gt;This two-day, intermediate-level course focuses on the wide range of options available when configuring virtual private networks (VPNs) using Juniper Networks firewall/VPN products. Students attending the course will learn these various deployments through detailed lectures and hands-on lab exercises. This course has been updated to Revision 6.c.&lt;/p&gt;</contents><outline>&lt;p&gt;&amp;lt;h3&amp;gt; &amp;lt;em&amp;gt;Day 1&amp;lt;/em&amp;gt; &amp;lt;/h3&amp;gt;&lt;/p&gt;
&lt;p&gt;&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Chapter 1: Course Introduction&amp;lt;/strong&amp;gt; &amp;lt;/p&amp;gt;&lt;/p&gt;
&lt;p&gt;&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Chapter 2: ScreenOS VPN Basics Review&amp;lt;/strong&amp;gt; &amp;lt;/p&amp;gt;&lt;/p&gt;
&lt;p&gt;&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;VPN Review&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Verifying Operations&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;VPN Monitor&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Lab 1: VPN Review&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;&lt;/p&gt;
&lt;p&gt;&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Chapter 3: VPN Variations&amp;lt;/strong&amp;gt; &amp;lt;/p&amp;gt;&lt;/p&gt;
&lt;p&gt;&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Dynamic Peers&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Transparent Mode&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Overlapping Addresses&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Lab 2: VPN Variations&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;&lt;/p&gt;
&lt;p&gt;&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Chapter 4: Hub-and-Spoke VPNs&amp;lt;/strong&amp;gt; &amp;lt;/p&amp;gt;&lt;/p&gt;
&lt;p&gt;&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Concepts&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Policy-Based Hub-and-Spoke&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Route-Based Hub-and-Spoke VPNs with No Policy and NHTB&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Route-Based Hub-and-Spoke VPNs with Policy&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Centralized Control Hub-and-Spoke VPNs&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;ACVPNs&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Lab 3: Hub-and-Spoke VPNs&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;&lt;/p&gt;
&lt;p&gt;&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Chapter 5: Routing over VPNs&amp;lt;/strong&amp;gt; &amp;lt;/p&amp;gt;&lt;/p&gt;
&lt;p&gt;&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Routing Overview&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Configuring RIP&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Configuring OSPF&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Case Studies&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Lab 4: Dynamic Routing&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;&lt;/p&gt;
&lt;p&gt;&amp;lt;h3&amp;gt; &amp;lt;em&amp;gt;Day 2&amp;lt;/em&amp;gt; &amp;lt;/h3&amp;gt;&lt;/p&gt;
&lt;p&gt;&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Chapter 6: Using Certificates&amp;lt;/strong&amp;gt; &amp;lt;/p&amp;gt;&lt;/p&gt;
&lt;p&gt;&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Concepts and Terminology&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Configuring Certificates and Certificate Support&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Configuring VPNs with Certificates&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Lab 5: Using Certificates&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;&lt;/p&gt;
&lt;p&gt;&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Chapter 7: Redundant VPN Gateways (Optional)&amp;lt;/strong&amp;gt; &amp;lt;/p&amp;gt;&lt;/p&gt;
&lt;p&gt;&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Redundant VPN Gateways&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Other Options&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;&lt;/p&gt;
&lt;p&gt;&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Chapter 8: Generic Routing Encapsulation (Optional)&amp;lt;/strong&amp;gt; &amp;lt;/p&amp;gt;&lt;/p&gt;
&lt;p&gt;&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Configuring GRE&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;&lt;/p&gt;
&lt;p&gt;&amp;lt;p&amp;gt;&amp;lt;strong&amp;gt;Chapter 9: Dial-Up IPsec VPNs (Optional)&amp;lt;/strong&amp;gt; &amp;lt;/p&amp;gt;&lt;/p&gt;
&lt;p&gt;&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Basic Dial-up Configuration&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Group IKE ID&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;XAUTH and Shared IKE ID&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;&lt;/p&gt;</outline><objective_plain>After successfully completing this course, you should be able to:



- Configure LAN-to-LAN IP Security (IPsec) VPNs in various configurations.
- Configure VPN redundancy.
- Configure dynamic routing using IPsec VPNs.
- Configure remote access IPsec connectivity including group Internet Key Exchange (IKE) and shared IKE.
- Configure generic routing encapsulation (GRE) tunnels.</objective_plain><contents_plain>This two-day, intermediate-level course focuses on the wide range of options available when configuring virtual private networks (VPNs) using Juniper Networks firewall/VPN products. Students attending the course will learn these various deployments through detailed lectures and hands-on lab exercises. This course has been updated to Revision 6.c.</contents_plain><outline_plain> Day 1 

Chapter 1: Course Introduction 


Chapter 2: ScreenOS VPN Basics Review 



VPN Review
Verifying Operations
VPN Monitor
Lab 1: VPN Review


Chapter 3: VPN Variations 



Dynamic Peers
Transparent Mode
Overlapping Addresses
Lab 2: VPN Variations


Chapter 4: Hub-and-Spoke VPNs 



Concepts
Policy-Based Hub-and-Spoke
Route-Based Hub-and-Spoke VPNs with No Policy and NHTB
Route-Based Hub-and-Spoke VPNs with Policy
Centralized Control Hub-and-Spoke VPNs
ACVPNs
Lab 3: Hub-and-Spoke VPNs


Chapter 5: Routing over VPNs 



Routing Overview
Configuring RIP
Configuring OSPF
Case Studies
Lab 4: Dynamic Routing


 Day 2 

Chapter 6: Using Certificates 



Concepts and Terminology
Configuring Certificates and Certificate Support
Configuring VPNs with Certificates
Lab 5: Using Certificates


Chapter 7: Redundant VPN Gateways (Optional) 



Redundant VPN Gateways
Other Options


Chapter 8: Generic Routing Encapsulation (Optional) 



Configuring GRE


Chapter 9: Dial-Up IPsec VPNs (Optional) 



Basic Dial-up Configuration
Group IKE ID
XAUTH and Shared IKE ID
</outline_plain><duration unit="d" days="2">2 days</duration><pricelist><price country="FR" currency="EUR">1400.00</price><price country="PL" currency="EUR">1500.00</price><price country="JP" currency="JPY">200000.00</price><price country="IE" currency="EUR">1400.00</price><price country="NL" currency="EUR">1200.00</price><price country="PA" currency="USD">2000.00</price><price country="VE" currency="USD">2000.00</price><price country="P3" currency="USD">2000.00</price><price country="CR" currency="USD">2200.00</price><price country="DE" currency="USD">1600.00</price><price country="CH" currency="USD">1600.00</price><price country="IL" currency="USD">1600.00</price><price country="SK" currency="USD">1600.00</price></pricelist><miles/></course>