About this course

Course code TPJUN_JPAC
Duration 3 Days

This three-day course provides detailed coverage of the configuration of the Junos Pulse Access Control Service offered by Juniper Networks. Students will work with the solution elements—the Junos Pulse Access Control Service, the SRX Series Services Gateway as a firewall enforcer, Junos Pulse, and the Odyssey Access Client (OAC)—to configure secured access to network resources. Key topics include Junos Pulse Access Control Service deployment, basic implementation, and element configuration. Students will have the opportunity to apply their knowledge in several hands-on labs. This course is based on Junos Pulse Access Control Service Release 4.1R3.

Junos Pulse Access Control is an intermediate-level course.

Prerequisites

Students should have experience with the TCP/IP protocol suite, including addressing and routing, and Ethernet experience, including addressing, basic switching operations, and virtual LANs (VLANs). In addition, students should have knowledge of basic security and access management concepts, including 802.1x and RADIUS.

Attendance of the Introduction to Junos Operating System (IJOS) course and Junos Security (JSEC) courses, or equivalent experience with Junos devices and SRX Series firewalls, is recommended but not required.

Participants

The intended audience for this course includes network engineers, support personnel, reseller support, and individuals responsible for implementing the Junos Pulse Access Control Service.

Delegates will learn how to

After successfully completing this course, you should be able to deploy the Junos Pulse Access Control Service and firewall enforcer to support common environments. Specific topics include:

  • Introduction to the Junos Pulse Access Control Service
  • Typical deployment scenarios
  • Terminology
  • Junos Pulse Access Control Service configuration elements
  • Roles
  • Authentication realms
  • Authentication servers
  • Resource policies
  • Sign-in policies
  • Firewall enforcer configuration elements
  • Infranet policies
  • Junos Pulse configuration elements
  • Connections
  • Location Awareness
  • Host Checker Integration
  • Odyssey Access Client configuration elements
  • Host Checker Integration
  • Host Enforcer
  • Troubleshooting

Outline

Day 1

Chapter 1: Course Introduction

Chapter 2: The Junos Pulse Access Control Service

  • The Need for Access Control
  • Junos Pulse Access Control Service Components
  • Junos Pulse Access Control Service Component Interaction
  • Sample Junos Pulse Access Control Service Deployments

Chapter 3: Initial Configuration

  • Junos Pulse Access Control Service Initial Configuration: Console
  • Junos Pulse Access Control Service Initial Configuration: Admin UI
  • Firewall Enforcer Initial Configuration
  • Verification and Troubleshooting
  • Lab 1: Initial Configuration

Chapter 4: The Access Management Framework

  • Access Management Framework Elements
  • Chapter 5: Roles
  • Configuring User Roles
  • Role Mapping
  • Configuring Sign-In Policies
  • Lab 2: Roles

Chapter 6: Client Access Methods

  • Client Access Methods
  • Configure Agent Access
  • Configure Agentless Access
  • Lab 3: Client Access

Day 2

Chapter 7: Firewall Enforcement

  • Resource Policy Overview
  • Firewall Enforcement Overview
  • Configure Firewall Enforcement
  • Captive Portal
  • Lab 4: Firewall Enforcement

Chapter 8: Layer 2 Enforcement

  • 802.1X Operations
  • RADIUS Elements
  • MAC Authentication

Chapter 9: Configuring Layer 2 Enforcement

  • Configuring an 802.1X Authenticator
  • Configuring 802.1X Support on the Junos Pulse Access Control Service
  • Configure MAC Authentication
  • Lab 5: Policy Configuration Using 802.1X

Chapter 10: Endpoint Defense

  • What Is Host Checker?
  • Host Checker Configuration
  • Enhanced Endpoint Security (EES) Configuration
  • Enforcing Policies
  • Lab 6: Endpoint Security

Day 3

Chapter 11: Authentication Options

  • Authentication Process Review
  • Configuring Authentication Servers
  • Configuring Authentication Realms
  • Lab 7: Authentication Options

Chapter 12: Management and Troubleshooting

  • Logging
  • System Monitoring
  • Troubleshooting Component Communications
  • Troubleshooting User Interactions
  • Configuration File Management
  • Working with JTAC
  • Lab 8: Logging and Troubleshooting

Chapter 13: High Availability

  • Describe High Availability
  • Junos Pulse Access Control Service Clustering
  • Firewall Options
  • Lab 9: Junos Pulse Access Control Service Clustering

Chapter 14: Junos Pulse Access Control Service Integration

  1. IF-MAP Federation
  2. NSM Integration
  3. STRM Integration
  4. IDP Integration

Appendix A: Junos Pulse Gateway Chassis Management

  • CMC Benefits
  • Configure CMC

Appendix B: ScreenOS Enforcers

  • ScreenOS Policies
  • Configure Firewall Enforcement
  • Verify Operations

3 Days

Duration

This is a QA approved partner course

Delivery Method

Delivery method

Classroom

Face-to-face learning in the comfort of our quality nationwide centres, with free refreshments and Wi-Fi.

Find dates and prices

Online booking is currently not available for this course, to find out more please call us on 0345 074 7998 or email us at info@qa.com to discuss how we can help.

Trusted, awarded and accredited

Fully accredited to ensure we provide the highest possible standards in learning

All third party trademark rights acknowledged.