Detailed Course Outline
DAY 1
1 Course Introduction
2 Security Challenges for Service Providers
- Describe limitations of security devices
 - Describe DDoS attack threats
 - Describe BGP security threats
 - Explain IP address depletion challenges
 - Describe 5G security challenges
 
3 Juniper Networks Solutions for Service Providers
- Describe Juniper Networks’ security solutions for the service provider challenges
 
4 Stateful Firewalls
- Describe stateless firewall filters
 - Describe stateful firewall policies
 - Describe screens and ALGs
 - Explain asymmetrical routing
 
Lab 1: Configure Stateful Firewalls
5G Architecture using SRX Series Devices
- Describe security insertion points
 - Describe 5G network evolution
 
6 DDoS Protection
- Explain DDoS history and common protections
 - Describe SRX DDoS protection
 - Describe BGP FlowSpec
 - Describe Corero with MX DDoS protection
 
Lab 2: DDoS Protection
DAY 2
7 Carrier-Grade NAT
- Explain IPv4 address exhaustion
 - Describe Source NAT
 - Describe CGNAT
 - Describe NAT64
 
Lab 3: CGNAT
8 Juniper Connected Security for Service Providers
- Explain Juniper Connected Security
 - Describe SecIntel feeds
 - Describe a use case for IoT protection
 
Lab 4: Implementing Juniper Connected Security
9 IPsec Overview
- Describe the IPsec and IKE protocols
 - Configure site-to-site IPsec VPNs
 - Describe and configure Proxy IDs and Traffic selectors
 - Monitor site-to-site IPsec VPNs
 - Describe IPsec use with gNodeB devices
 
Lab 5: Site-to-Site IPsec VPN
10 Scaling IPsec
- Describe and implement PKI certificates in Junos OS
 - Describe AutoVPN
 - Describe SecGW firewall use case for scaling IPsec
 
Lab 6: Configuring AutoVPN
DAY 3
11 GPRS and GTP
- Describe how to secure GTP tunnels
 - Describe the GPRS protocol
 - Describe the GTP
 - Explain how Roaming Firewall secures GTP
 
12 SCTP
- Describe the SCTP
 
Lab 7: Video about Implementing the Roaming Firewall (Demo)
13 Securing the Control Plane
- Explain how to secure the control plane on Junos devices
 - Describe how the loopback filter works to secure the control plane
 - Explain how to protect the control plane from DDoS attacks
 - Describe how to secure the IGP against attacks
 
Lab 8: Configure Control Plane Protections
14 Securing the BGP
- Describe how to secure the BGP
 - Describe BGP security features
 - Describe BGP dampening
 
Lab 9: Configure BGP protections