This exam is a requirement mainly for Juniper partners however it is valuable in configuring and
maintaining any corporate VPN set up.
Alright, I have ordered the course materials still have to wait for them.
So let's prep by looking at the Exam information.
Overview
- Describe the concepts, operation, and functionality of the Junos Pulse Access Control Service
- Components
- Component functions and interaction
- Identify the components of the access management framework
- Interrelationship between realms, roles and policies
Initial Configuration
- Configure the basic elements of a Junos Pulse Access Control Service environment
- Initial Junos Pulse Access Control Service configuration
- SRX Series device configuration (as a firewall enforcer)
- Configure authentication servers
- Connectivity verification
Roles
- Describe the concepts, operation and functionality of roles
- Purpose of roles
- Role mapping
- Customization of the end-user experience
- Configure roles
- Roles and role options
End User Access
- Describe the Junos Pulse Access Control Service client access options
- Junos Pulse
- Odyssey Access Client (OAC)
- Machine authentication and third party supplicant
- Agentless access
- Configure Junos Pulse Access Control Service clients
- Junos Pulse
- Odyssey Access Client (OAC)
- Agentless access
Firewall Enforcement
- Describe the concepts, operation and functionality of firewall enforcement
- Purpose of resource policies
- Resource policies for firewall enforcement
- Captive portal
- Configure firewall enforcement
- Junos Pulse Access Control Service configuration
- SRX Series device configuration
- ScreenOS device configuration
- Captive portal
Layer 2 Enforcement
- Describe the concepts, operation and functionality of Layer 2 enforcement techniques
- 802.1X security
- RADIUS (related to 802.1X)
- MAC authentication
- Multiple supplicant authentication
- Configure Layer 2 enforcement
- Junos Pulse Access Control Service configuration
- SRX Series device configuration
Endpoint Defense
- Describe the concepts, operation and functionality of endpoint defense
- Host Checker
- Enhanced Endpoint Security (EES)
- Authentication policies and role restrictions
- Configure endpoint defense
- Host Checker
- Enhanced Endpoint Security (EES)
- Authentication policies and role restrictions
Authentication Options
- Describe the concepts, operation and functionality of user authentication
- Authentication process
- Authentication options
- Configure authentication
- Authentication servers including LDAP, RADIUS, AD/NT, anonymous
- Authentication realms
Management and Troubleshooting
- Demonstrate knowledge of how to manage and troubleshoot a Junos Pulse Access Control Service environment, including the Junos Pulse Access Control Service and SRX Series devices
- Logging
- System Monitoring
- File Management
- Information collection
- Component connectivity
- End user connectivity and enforcement
High Availability
- Describe the concepts and requirements for high availability in a Junos Pulse Access Control Service environment
- Clustering
- Deployment options and considerations
- Configure high availability
- Junos Pulse Access Control Service configuration
- ScreenOS device configuration
- SRX Series device configuration
Integration
- Describe the concepts and requirements for Junos Pulse Access Control Service integration with other components
- Integration with IF-MAP client
- Integration with STRM
- Integration with IDP
- Configure integration
- IF-MAP federation
- Syslog
- Sensors
No comments:
Post a Comment