Junos Unified Threat Management Training (JUTM) Course by ENO
This one-day Junos Unified Threat Management Training (JUTM) course includes detailed coverage of Web filtering, antivirus (AV), antispam, and content filtering. Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Unified Threat Management (UTM) features of the Junos operating system.
This Junos Unified Threat Management Training (JUTM) course is based on the Junos OS Release 12.1X46-D15.3.
● If you are familiar with some aspects of this Junos Unified Threat Management Training (JUTM) course, we can omit or shorten their discussion.
● We can adjust the emphasis placed on the various topics or build the course around the mix of technologies of interest to you (including technologies other than those included in this outline).
● If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the course in manner understandable to lay audiences.
Audience / Target Group
• This course benefits individuals responsible for configuring and monitoring devices running the Junos OS.
Duration: 1 day
After completing this course, attendees will be able to:
• Describe the challenges that branch offices present to network managers.
• List the major features that UTM offers.
• Explain how each major feature addresses the challenges of the branch office.
• List the SRX Series Services Gateways hardware devices on which UTM is available.
• Describe the UTM features that require specific licenses.
• Define terms used in the creation of effective antispam UTM policies.
• Describe the process by which UTM examines traffic for spam.
• Describe the overall process of configuring an antispam UTM policy.
• Describe the kinds of information available from the device when it has detected spam.
• Describe how the AV process examines traffic.
• Describe the differences between full file-based AV versus express AV.
• Describe the settings that are required for configuring AV protection.
• Explain how these settings affect scanning performance and effectiveness.
• Describe options available for scanning supported protocols.
• List the general steps required to configure AV.
• Describe the statistical information available to verify AV functionality.
• Describe content and Web filtering and their purpose.
• List and describe each of the parameters used when configuring Web and content filtering.
• Describe in general terms the steps necessary to configure web and content filtering.
• Monitor Web and content filtering.
Chapter 1: Course Introduction
Chapter 2: UTM Overview
•Branch Office Challenges
•UTM Feature Overview
•Licensing of Features
•Lab 1: Connecting to the Lab Equipment and Testing Connectivity
Chapter 3: Antispam
•Overview of Antispam Process
•UTM Policy Overview
•Lab 2: Configuring an Antispam Policy
Chapter 4: Full File-Based and Express Antivirus
•Overview of Antivirus Process
•Full File-based AV Configuration
•Express AV Configuration
•Lab 3: Antivirus Configuration and Testing
Chapter 5: Content and Web Filtering
•Overview and Terminology
•Verification and Monitoring
•Lab 4: Configuring Content and Web Filtering