<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="26300" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/juniper-jspes" lastchanged="2026-01-13T14:28:40+01:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>Juniper Service Provider Edge Security</title><productcode>JSPES</productcode><vendorcode>JP</vendorcode><vendorname>Juniper Networks</vendorname><fullproductcode>JP-JSPES</fullproductcode><version>21.1R1.11</version><objective>&lt;ul&gt;
&lt;li&gt;Define the general security architecture for 4G and 5G networks.&lt;/li&gt;&lt;li&gt;Configure data plane security protections.&lt;/li&gt;&lt;li&gt;Explain DoS and DDoS attacks.&lt;/li&gt;&lt;li&gt;Describe BGP Flowspec in protecting against DDoS attacks.&lt;/li&gt;&lt;li&gt;Explain the Corero solution for DDoS attacks.&lt;/li&gt;&lt;li&gt;Describe the use of stateful firewalls.&lt;/li&gt;&lt;li&gt;Explain the use of ALGs in stateful security firewalls.&lt;/li&gt;&lt;li&gt;Explain how to secure BGP on Junos devices.&lt;/li&gt;&lt;li&gt;Describe how to use IPsec to secure traffic.&lt;/li&gt;&lt;li&gt;Explain the new IoT threat to networks.&lt;/li&gt;&lt;li&gt;Describe AutoVPN IPsec architectures.&lt;/li&gt;&lt;li&gt;Explain the use and configuration of CGNAT on SRX Series devices&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;ul&gt;
&lt;li&gt;Intermediate level of TCP/IP networking and security knowledge&lt;/li&gt;&lt;li&gt;Attend the Introduction to Juniper Security (IJSEC) course before attending this class&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;This course benefits those responsible for
implementing, monitoring, and troubleshooting Juniper
security components.&lt;/p&gt;</audience><outline>&lt;p&gt;&lt;strong&gt;DAY 1&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1 Course Introduction&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2 Security Challenges for Service Providers&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe limitations of security devices&lt;/li&gt;&lt;li&gt;Describe DDoS attack threats&lt;/li&gt;&lt;li&gt;Describe BGP security threats&lt;/li&gt;&lt;li&gt;Explain IP address depletion challenges&lt;/li&gt;&lt;li&gt;Describe 5G security challenges&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;3 Juniper Networks Solutions for Service Providers&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe Juniper Networks&amp;rsquo; security solutions for the service provider challenges&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;4 Stateful Firewalls&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe stateless firewall filters&lt;/li&gt;&lt;li&gt;Describe stateful firewall policies&lt;/li&gt;&lt;li&gt;Describe screens and ALGs&lt;/li&gt;&lt;li&gt;Explain asymmetrical routing&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Lab 1: Configure Stateful Firewalls&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5G Architecture using SRX Series Devices&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe security insertion points&lt;/li&gt;&lt;li&gt;Describe 5G network evolution&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;6 DDoS Protection&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Explain DDoS history and common protections&lt;/li&gt;&lt;li&gt;Describe SRX DDoS protection&lt;/li&gt;&lt;li&gt;Describe BGP FlowSpec&lt;/li&gt;&lt;li&gt;Describe Corero with MX DDoS protection&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Lab 2: DDoS Protection&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;DAY 2&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;7 Carrier-Grade NAT&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Explain IPv4 address exhaustion&lt;/li&gt;&lt;li&gt;Describe Source NAT&lt;/li&gt;&lt;li&gt;Describe CGNAT&lt;/li&gt;&lt;li&gt;Describe NAT64&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Lab 3: CGNAT&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;8 Juniper Connected Security for Service Providers&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Explain Juniper Connected Security&lt;/li&gt;&lt;li&gt;Describe SecIntel feeds&lt;/li&gt;&lt;li&gt;Describe a use case for IoT protection&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Lab 4: Implementing Juniper Connected Security&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;9 IPsec Overview&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe the IPsec and IKE protocols&lt;/li&gt;&lt;li&gt;Configure site-to-site IPsec VPNs&lt;/li&gt;&lt;li&gt;Describe and configure Proxy IDs and Traffic selectors&lt;/li&gt;&lt;li&gt;Monitor site-to-site IPsec VPNs&lt;/li&gt;&lt;li&gt;Describe IPsec use with gNodeB devices&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Lab 5: Site-to-Site IPsec VPN&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
&lt;strong&gt;10 Scaling IPsec&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe and implement PKI certificates in Junos OS&lt;/li&gt;&lt;li&gt;Describe AutoVPN&lt;/li&gt;&lt;li&gt;Describe SecGW firewall use case for scaling IPsec&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Lab 6: Configuring AutoVPN&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;DAY 3&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;11 GPRS and GTP&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe how to secure GTP tunnels&lt;/li&gt;&lt;li&gt;Describe the GPRS protocol&lt;/li&gt;&lt;li&gt;Describe the GTP&lt;/li&gt;&lt;li&gt;Explain how Roaming Firewall secures GTP&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;12 SCTP&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe the SCTP&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Lab 7: Video about Implementing the Roaming Firewall (Demo)&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;13 Securing the Control Plane&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Explain how to secure the control plane on Junos devices&lt;/li&gt;&lt;li&gt;Describe how the loopback filter works to secure the control plane&lt;/li&gt;&lt;li&gt;Explain how to protect the control plane from DDoS attacks&lt;/li&gt;&lt;li&gt;Describe how to secure the IGP against attacks&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Lab 8: Configure Control Plane Protections&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;14 Securing the BGP&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe how to secure the BGP&lt;/li&gt;&lt;li&gt;Describe BGP security features&lt;/li&gt;&lt;li&gt;Describe BGP dampening&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Lab 9: Configure BGP protections&lt;/strong&gt;&lt;/p&gt;</outline><objective_plain>- Define the general security architecture for 4G and 5G networks.
- Configure data plane security protections.
- Explain DoS and DDoS attacks.
- Describe BGP Flowspec in protecting against DDoS attacks.
- Explain the Corero solution for DDoS attacks.
- Describe the use of stateful firewalls.
- Explain the use of ALGs in stateful security firewalls.
- Explain how to secure BGP on Junos devices.
- Describe how to use IPsec to secure traffic.
- Explain the new IoT threat to networks.
- Describe AutoVPN IPsec architectures.
- Explain the use and configuration of CGNAT on SRX Series devices</objective_plain><essentials_plain>- Intermediate level of TCP/IP networking and security knowledge
- Attend the Introduction to Juniper Security (IJSEC) course before attending this class</essentials_plain><audience_plain>This course benefits those responsible for
implementing, monitoring, and troubleshooting Juniper
security components.</audience_plain><outline_plain>DAY 1

1 Course Introduction

2 Security Challenges for Service Providers



- Describe limitations of security devices
- Describe DDoS attack threats
- Describe BGP security threats
- Explain IP address depletion challenges
- Describe 5G security challenges
3 Juniper Networks Solutions for Service Providers



- Describe Juniper Networks’ security solutions for the service provider challenges
4 Stateful Firewalls



- Describe stateless firewall filters
- Describe stateful firewall policies
- Describe screens and ALGs
- Explain asymmetrical routing
Lab 1: Configure Stateful Firewalls

5G Architecture using SRX Series Devices



- Describe security insertion points
- Describe 5G network evolution

6 DDoS Protection



- Explain DDoS history and common protections
- Describe SRX DDoS protection
- Describe BGP FlowSpec
- Describe Corero with MX DDoS protection
Lab 2: DDoS Protection

DAY 2

7 Carrier-Grade NAT



- Explain IPv4 address exhaustion
- Describe Source NAT
- Describe CGNAT
- Describe NAT64
Lab 3: CGNAT

8 Juniper Connected Security for Service Providers



- Explain Juniper Connected Security
- Describe SecIntel feeds
- Describe a use case for IoT protection
Lab 4: Implementing Juniper Connected Security

9 IPsec Overview



- Describe the IPsec and IKE protocols
- Configure site-to-site IPsec VPNs
- Describe and configure Proxy IDs and Traffic selectors
- Monitor site-to-site IPsec VPNs
- Describe IPsec use with gNodeB devices

Lab 5: Site-to-Site IPsec VPN


10 Scaling IPsec



- Describe and implement PKI certificates in Junos OS
- Describe AutoVPN
- Describe SecGW firewall use case for scaling IPsec

Lab 6: Configuring AutoVPN

DAY 3

11 GPRS and GTP



- Describe how to secure GTP tunnels
- Describe the GPRS protocol
- Describe the GTP
- Explain how Roaming Firewall secures GTP

12 SCTP



- Describe the SCTP
Lab 7: Video about Implementing the Roaming Firewall (Demo)

13 Securing the Control Plane



- Explain how to secure the control plane on Junos devices
- Describe how the loopback filter works to secure the control plane
- Explain how to protect the control plane from DDoS attacks
- Describe how to secure the IGP against attacks
Lab 8: Configure Control Plane Protections

14 Securing the BGP



- Describe how to secure the BGP
- Describe BGP security features
- Describe BGP dampening
Lab 9: Configure BGP protections</outline_plain><duration unit="d" days="3">3 jours</duration><pricelist><price country="DE" currency="USD">2850.00</price><price country="IL" currency="USD">2850.00</price><price country="UA" currency="USD">2850.00</price><price country="CH" currency="CHF">2850.00</price><price country="AT" currency="EUR">2850.00</price></pricelist><miles/></course>