Advanced Juniper Networks Secure Access
This product does not have fixed starting dates and/or places.
Overview
Network engineers, support personnel, reseller support, and anyone responsible for implementing the advanced SA product features covered in this course.
This two-day course discusses the advanced configuration of Secure Access (SA) products. Key topics include; PKI support, additional authentication/authorisation servers, complex policies, customisation, virtual systems, high availability, and Secure Meeting. Through demonstrations and hands on-labs, students will gain experience in configuring, testing, and troubleshooting advanced features of the SA products.
Prerequisites
This course assumes that students have successfully attended the Configuring Juniper Networks Secure A…
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Overview
Network engineers, support personnel, reseller support, and anyone responsible for implementing the advanced SA product features covered in this course.
This two-day course discusses the advanced configuration of Secure Access (SA) products. Key topics include; PKI support, additional authentication/authorisation servers, complex policies, customisation, virtual systems, high availability, and Secure Meeting. Through demonstrations and hands on-labs, students will gain experience in configuring, testing, and troubleshooting advanced features of the SA products.
Prerequisites
This course assumes that students have successfully attended the Configuring Juniper Networks Secure Access (CJSA) course or have equivalent experience with the Juniper Networks Secure Access products. Specifically, students need to be familiar with the configuration of:
- Roles
- Realms
- Resource Policies
- Authentication Servers
Course Outline.
Objectives
By the end of this course, students will be able to deploy the SA products to support common environments.
Topics Covered
- Advanced Access Management
- Public Key Infrastructure support (PKI)
- Certificate Revocation Lists (CRL)
- Virtual Hosting
- Single Sign On (SSO)
- Advanced Authentication
- Certificate
- Anonymous
- Netegrity
- SAML
- Advanced Policies
- Rewriting Policies
- Authentication Policies
- Role Mapping
- Resource Policies
- Password Management
- Administrative Delegation
- Custom User Interface (UI)
- Clustering
- Instant Virtual System (IVS)
- Secure Meeting
Certification
A separate examination (not part of the course) is available for those wishing to obtain formal certification.
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
