JUNOS Pulse Access Control (JPAC)

Course

Online

Price on request

Description

  • Type

    Course

  • Methodology

    Online

This three-day course provides detailed coverage of the configuration of the Junos Pulse Access Control Service offered by Juniper Networks.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Access
  • IT
  • Access Control

Course programme

Course IntroductionThe Junos Pulse Access Control Service

  • The Need for Access Control
  • Junos Pulse Access Control Service Components
  • Junos Pulse Access Control Service Component Interaction
  • Sample Junos Pulse Access Control Service Deployments

Initial Configuration

  • Junos Pulse Access Control Service Initial Configuration: Console
  • Junos Pulse Access Control Service Initial Configuration: Admin UI
  • Firewall Enforcer Initial Configuration
  • Verification and Troubleshooting
  • Lab 1: Initial Configuration

The Access Management Framework

  • Access Management Framework Elements

Roles

  • Configuring User Roles
  • Role Mapping
  • Configuring Sign-In Policies
  • Lab 2: Roles

Client Access Methods

  • Client Access Methods
  • Configure Agent Access
  • Configure Agentless Access
  • Lab 3: Client Access

Firewall Enforcement

  • Resource Policy Overview
  • Firewall Enforcement Overview
  • Configure Firewall Enforcement
  • Captive Portal
  • Lab 4: Firewall Enforcement

Layer 2 Enforcement

  • 802.1X Operations
  • RADIUS Elements
  • MAC Authentication

Configuring Layer 2 Enforcement

  • Configuring an 802.1X Authenticator
  • Configuring 802.1X Support on the Junos Pulse Access Control Service
  • Configure MAC Authentication
  • Lab 5: Policy Configuration Using 802.1X

Endpoint Defense

  • What Is Host Checker?
  • Host Checker Configuration
  • Enhanced Endpoint Security (EES) Configuration
  • Enforcing Policies
  • Lab 6: Endpoint Security

Authentication Options

  • Authentication Process Review
  • Configuring Authentication Servers
  • Configuring Authentication Realms
  • Lab 7: Authentication Options

Management and Troubleshooting

  • Logging
  • System Monitoring
  • Troubleshooting Component Communications
  • Troubleshooting User Interactions
  • Configuration File Management
  • Working with JTAC
  • Lab 8: Logging and Troubleshooting

High Availability

  • Describe High Availability
  • Junos Pulse Access Control Service Clustering
  • Firewall Options
  • Lab 9: Junos Pulse Access Control Service Clustering

Junos Pulse Access Control Service Integration

  • IF-MAP Federation
  • NSM Integration
  • STRM Integration
  • IDP Integration

Appendix A: Junos Pulse Gateway Chassis Management

  • CMC Benefits
  • Configure CMC

Appendix B: ScreenOS Enforcers

  • ScreenOS Policies
  • Configure Firewall Enforcement
  • Verify Operations

JUNOS Pulse Access Control (JPAC)

Price on request