Call : (+91) 968636 4243
Mail : info@EncartaLabs.com
EncartaLabs

Juniper Intrusion Detection and Prevention (IDP)

( Duration: 3 Days )

This Juniper Intrusion Detection and Prevention (IDP) training course discusses the configuration of Juniper Intrusion Detection and Prevention (IDP) sensors in a typical network environment. Key topics include sensor configuration, creating and fine-tuning security policies, managing attack objects, creating custom signatures, and troubleshooting.

By attending Juniper Intrusion Detection and Prevention (IDP) workshop, delegates will learn to:

  • Deploy an IDP sensor on the network
  • Monitor and understand IDP logs
  • Configure, install, and fine-tune IDP policies
  • Configure the Profiler
  • Troubleshoot sensor problems
  • Create custom signature attack objects
  • Configure sensors for high availability using third-party devices

Basic networking knowledge and experience in the following areas:

  • Internetworking basics
  • TCP/IP Operations
  • Network security concepts
  • Network administration
  • Application support

The Juniper Intrusion Detection and Prevention (IDP) class is ideal for:

  • Network Engineers, Support Personnel, Reseller Support, and others responsible for implementing Juniper Networks IDP products.

COURSE AGENDA

1

Intrusion Detection and Prevention Concepts

  • Network Attack Phases and Detection
  • Juniper Networks IDP Product Offerings
  • Juniper Networks IDP Three-Tier Architecture
  • Juniper IDP Deployment Modes
2

Initial Configuration of IDP Sensor

  • Overview of IDP Sensor Deployment Process
  • Initial Configuration Steps
  • IDP Standalone Device
  • Initial Configuration Steps
3

IDP Policy Basics

  • Attack Object Terminology
  • IDP Rule Components
  • IDP Rule-Matching Algorithm
  • Terminal rules
4

Fine-Tuning Policies

  • Tuning Process Overview
  • Step 1: Identifying Machines and Protocols to Monitor
  • Step 2: Identifying and Eliminating False Positives
  • Step 3: Identifying and Configuring Responses to Real Attacks
  • Step 4: Configuring Other Rulebases to Detect Attacks
5

Configuring Additional Rulebases

  • Overview of IDP-Related Rulebases
  • Exempt Rulebases
  • Traffic Anomalies Rulebase
  • Backdoor Rulebase
  • SYN Protector Rulebase
  • Network Honeypot Rulebase
  • Rulebase Processing Order
6

Profiler

  • Profiler Overview
  • How to Operate Profiler
  • Using Profiler for Network Discovery
  • Using Profiler to Discover Running Applications
  • Using Profiler to Detect New Devices and Ports
  • Using Profiler to Detect Policy Violations
7

Sensor Operation and Sensor Commands

  • Main Components of the Sensor
  • Description of Sensor Processes
  • Managing Policies with the scio Utility
  • Managing Sensor Configuration with the scio Utility
  • Monitoring with the sctop Utility
8

Troubleshooting

  • Review of Sensor Communication
  • Troubleshooting Tools
  • Troubleshooting Scenarios
  • Reimaging the Sensor
9

Managing Attack Objects

  • Examining Predefined Attack Objects
  • Examining Predefined Attack Object Groups
  • Creating New Custom Attack Object Groups
  • Updating the Attack Object Database
  • Searching the Attack Object Database
10

Creating Custom Signatures

  • IDP Packet Inspection
  • Obtaining Attack Information
  • Understanding Regular Expressions
  • Creating a Signature-Based Attack Object
  • Creating a Compound Attack Object
11

Configuring Sensors for External High Availability

  • External HA Operation
  • Configuring Sensors for External HA

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting https://www.encartalabs.com/course-catalogue-all.php

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.

Top
Notice
X