Tuesday, January 29, 2013

Intro - Objectives

Intro

This exam is a requirement mainly for Juniper partners however it is valuable in configuring and
maintaining any corporate VPN set up.


Alright, I have ordered the course materials still have to wait for them.
So let's prep by looking at the Exam information.


Overview

  • Describe the concepts, operation, and functionality of the Junos Pulse Access Control Service
    • Components
    • Component functions and interaction
  • Identify the components of the access management framework
    • Interrelationship between realms, roles and policies

Initial Configuration

  • Configure the basic elements of a Junos Pulse Access Control Service environment
    • Initial Junos Pulse Access Control Service configuration
    • SRX Series device configuration (as a firewall enforcer)
    • Configure authentication servers
    • Connectivity verification
To Top

Roles

  • Describe the concepts, operation and functionality of roles
    • Purpose of roles
    • Role mapping
    • Customization of the end-user experience
  • Configure roles
    • Roles and role options

End User Access

  • Describe the Junos Pulse Access Control Service client access options
    • Junos Pulse
    • Odyssey Access Client (OAC)
    • Machine authentication and third party supplicant
    • Agentless access
  • Configure Junos Pulse Access Control Service clients
    • Junos Pulse
    • Odyssey Access Client (OAC)
    • Agentless access
To Top

Firewall Enforcement

  • Describe the concepts, operation and functionality of firewall enforcement
    • Purpose of resource policies
    • Resource policies for firewall enforcement
    • Captive portal
  • Configure firewall enforcement
    • Junos Pulse Access Control Service configuration
    • SRX Series device configuration
    • ScreenOS device configuration
    • Captive portal

Layer 2 Enforcement

  • Describe the concepts, operation and functionality of Layer 2 enforcement techniques
    • 802.1X security
    • RADIUS (related to 802.1X)
    • MAC authentication
    • Multiple supplicant authentication
  • Configure Layer 2 enforcement
    • Junos Pulse Access Control Service configuration
    • SRX Series device configuration
To Top

Endpoint Defense

  • Describe the concepts, operation and functionality of endpoint defense
    • Host Checker
    • Enhanced Endpoint Security (EES)
    • Authentication policies and role restrictions
  • Configure endpoint defense
    • Host Checker
    • Enhanced Endpoint Security (EES)
    • Authentication policies and role restrictions

Authentication Options

  • Describe the concepts, operation and functionality of user authentication
    • Authentication process
    • Authentication options
  • Configure authentication
    • Authentication servers including LDAP, RADIUS, AD/NT, anonymous
    • Authentication realms
To Top

Management and Troubleshooting

  • Demonstrate knowledge of how to manage and troubleshoot a Junos Pulse Access Control Service environment, including the Junos Pulse Access Control Service and SRX Series devices
    • Logging
    • System Monitoring
    • File Management
    • Information collection
    • Component connectivity
    • End user connectivity and enforcement

High Availability

  • Describe the concepts and requirements for high availability in a Junos Pulse Access Control Service environment
    • Clustering
    • Deployment options and considerations
  • Configure high availability
    • Junos Pulse Access Control Service configuration
    • ScreenOS device configuration
    • SRX Series device configuration
To Top

Integration

  • Describe the concepts and requirements for Junos Pulse Access Control Service integration with other components
    • Integration with IF-MAP client
    • Integration with STRM
    • Integration with IDP
  • Configure integration
    • IF-MAP federation
    • Syslog
    • Sensors

No comments:

Post a Comment