Firewall Filters |
Describe the concepts, operation, or functionality of firewall filters.
- Selective packet processing
- Troubleshooting with firewall filters
- Filter-based forwarding
Given a scenario, demonstrate how to configure, troubleshoot, or monitor firewall filters. |
Troubleshooting Security Policy and Zones |
Given a scenario, demonstrate how to troubleshoot or monitor security policies or security zones.
- Tools
- Logging/tracing
- Other outputs
|
Advanced Threat Protection |
Describe the concepts, operation, or functionality of Juniper Advanced Threat Prevention (on-premises appliance or Cloudbased service).
- Collectors
- Custom rules
- Mitigation
Given a scenario, demonstrate how to configure or monitor Juniper Advanced Threat Prevention. |
Edge Security |
Describe the concepts, operation, or functionality of edge security features.
- Hardware support
- Security Intelligence (SecIntel)
- Intrusion prevention system (IPS)
- Corero DDoS Mitigation
- Advanced threat prevention (ATP)
|
Compliance |
Describe the concepts or operation of security compliance.
- Role-based access control (RBAC)
- Junos Space® Security Director
- Authentication, Authorization, and Accounting (AAA) and Security Assertion Markup Language (SAML) integration
|
Threat Mitigation |
Describe the concepts, operation, or functionality of threat mitigation.
- Malware identification or mitigation
- Malicious lateral traffic identification or mitigation
- Zero trust microsegmentation
Given a scenario, demonstrate how to configure or monitor threat mitigation. |
Logical and Tenant Systems |
Describe the concepts, operation, or functionality of the logical systems.
- Administrative roles
- Security profiles
- Logical systems (LSYS) communication
Describe the concepts, operation, or functionality of the tenant systems.
- Master and tenant admins
- Tenant systems (TSYS) capacity
|
Layer 2 Security |
Describe the concepts, operation, or functionality of Layer 2 security.
- Transparent mode
- Mixed mode
- Secure wire
- Media Access Control Security (MACsec)
Given a scenario, demonstrate how to configure or monitor Layer 2 security. |
Advanced Network Address Translation (NAT) |
Describe the concepts, operation, or functionality of advanced NAT functionality.
- Persistent NAT
- Domain name system (DNS) doctoring
- IPv6 NAT
Given a scenario, demonstrate how to configure, troubleshoot, or monitor advanced NAT scenarios. |
Advanced IPsec |
Describe the concepts, operation, or functionality of advanced IPsec applications.
- Remote access VPNs
- Hub-and-spoke VPNs
- Public Key Infrastructure (PKI)
- Auto Discovery VPNs (ADVPNs)
- Routing with IPsec
- Overlapping IP addresses
- Dynamic gateways
- IPsec class of service (CoS)
Given a scenario, demonstrate how to configure, troubleshoot, or monitor advanced IPsec functionality. |
Official Information |
https://www.juniper.net/us/en/training/certification/tracks/security/jncip-sec.html |