Advanced Juniper Networks IPSec VPN Implementations (AJVI) – Outline

Outline detalhado do curso

<h3> <em>Day 1</em> </h3>

<p><strong>Chapter 1: Course Introduction</strong> </p>

<p><strong>Chapter 2: ScreenOS VPN Basics Review</strong> </p>

<ul> <li>VPN Review</li> <li>Verifying Operations</li> <li>VPN Monitor</li> <li>Lab 1: VPN Review</li> </ul>

<p><strong>Chapter 3: VPN Variations</strong> </p>

<ul> <li>Dynamic Peers</li> <li>Transparent Mode</li> <li>Overlapping Addresses</li> <li>Lab 2: VPN Variations</li> </ul>

<p><strong>Chapter 4: Hub-and-Spoke VPNs</strong> </p>

<ul> <li>Concepts</li> <li>Policy-Based Hub-and-Spoke</li> <li>Route-Based Hub-and-Spoke VPNs with No Policy and NHTB</li> <li>Route-Based Hub-and-Spoke VPNs with Policy</li> <li>Centralized Control Hub-and-Spoke VPNs</li> <li>ACVPNs</li> <li>Lab 3: Hub-and-Spoke VPNs</li> </ul>

<p><strong>Chapter 5: Routing over VPNs</strong> </p>

<ul> <li>Routing Overview</li> <li>Configuring RIP</li> <li>Configuring OSPF</li> <li>Case Studies</li> <li>Lab 4: Dynamic Routing</li> </ul>

<h3> <em>Day 2</em> </h3>

<p><strong>Chapter 6: Using Certificates</strong> </p>

<ul> <li>Concepts and Terminology</li> <li>Configuring Certificates and Certificate Support</li> <li>Configuring VPNs with Certificates</li> <li>Lab 5: Using Certificates</li> </ul>

<p><strong>Chapter 7: Redundant VPN Gateways (Optional)</strong> </p>

<ul> <li>Redundant VPN Gateways</li> <li>Other Options</li> </ul>

<p><strong>Chapter 8: Generic Routing Encapsulation (Optional)</strong> </p>

<ul> <li>Configuring GRE</li> </ul>

<p><strong>Chapter 9: Dial-Up IPsec VPNs (Optional)</strong> </p>

<ul> <li>Basic Dial-up Configuration</li> <li>Group IKE ID</li> <li>XAUTH and Shared IKE ID</li> </ul>