Skip to content
[email protected]011 322 44 56Monday – Friday 10 AM – 8 PM
cart: 0,00 €0

View CartCheckout

  • No products in the cart.

Subtotal: 0,00 €

View CartCheckout

YouTube page opens in new windowLinkedin page opens in new window
RAYKA (DATA NETWORKING)
computer network, network security, data center solutions and network automation
RAYKA (DATA NETWORKING)RAYKA (DATA NETWORKING)
  • Courses
  • Video Courses
  • Shop
  • About
    • About Teachers
  • Contact Us
Search:
My-Account
Login
Register
  • Courses
  • Video Courses
  • Shop
  • About
    • About Teachers
  • Contact Us

You are here:
  1. Home
  2. Page

Junos Configuration Basics

8. Junos Rescue Configuration and Rollback
9. juniper initial configuration
Back to:

Juniper Junos Associate version 22.1R1.10 (JNCIA-Junos)

  • Previous
  • Next
Collapse
Expand
  • Junos OS Introduction

  • 1. JNCIA-Junos Introduction and Lab Preparation
  • Junos User Interfaces

  • 2. Junos CLI modes
  • 3. Junos Output Level and Filtering
  • 4. Juniper Junos Configuration types and "configure" commands
  • 5. Junos CLI Navigation Overview
  • 6. Junos commit and rollback commands
  • 7. Junos save and load commands
  • 8. Junos Rescue Configuration and Rollback
  • Junos Configuration Basics

  • 9. juniper initial configuration
  • 10. Junos SSH Public Key Authentication
  • 11. Junos interface types and naming convention
  • 12. Junos Primary and Preferred Address
  • 13. Junos Syslog Configuration
  • 14. junos traceoptions configuration
  • 15. Junos SNMPv3 Configuration (and SNMv2c)
  • Junos Routing Fundamentals

  • 16. Preparing Junos Routing laboratory
  • 17. Juniper Static Routing Fundamental
  • 18. juniper qualified-next-hop and route prefrence
  • 19. Juniper Dynamic Routing Fundamental
  • 20. Juniper Routing Instance Configuration
  • Junos Routing Policy and Firewall Filters

  • 21. Junos Routing Policy Fundamental
  • 22. Juniper Routing Policy Configuration Example
  • 23. Juniper Firewall Filter Configuration Example
  • 24. Juniper Traffic Policing Configuration Example
  • 25. Juniper Unicast Reverse-Path-Forwarding
  • Junos Operational Monitoring and Maintenance

  • 26. Junos Packet Capture Configuration Example
  • 27. Juniper Monitor Traffic Command

RAYKA

Cisco Networking BESIDE

RAYKA
YouTube Video VVVUcmdvbF9fbllTclFCaF9qMlBjTjRRLmkxZXdGeGtzd2tN Juniper SRX IDP (Intrusion Detection and Prevention) gives the capability to inspect network traffic to make sure that they are not malicious or intrusions.In this section we will learn how to download and install IDP signatures and how they are used in security policies.full text in :https://rayka-co.com/lesson/juniper-srx-idp-configuration/
Juniper SRX IDP (Intrusion Detection and Prevention) gives the capability to inspect network traffic to make sure that they are not malicious or intrusions.In this section we will learn how to download and install IDP signatures and how they are used in security policies.full text in :https://rayka-co.com/lesson/juniper-srx-idp-configuration/
Juniper SRX application firewall provides the capability to control traffic at application layer.In the traditional firewall that we have configured so far, we have had the ability to control traffic only at Layer 3 and Layer 4.Application layer traffic control is possible using application signatures prepared by Juniper.full content in:https://rayka-co.com/lesson/juniper-srx-application-firewall/
Juniper SRX global security policy gives the capability to write policies to control traffic but independent of the zone-pair. Global policy can be also used to be applied to multiple zone-pait at once. It is important to notice that global policy is processed after normal inter-zone policy and before default deny-all policy.full content in:https://rayka-co.com/lesson/juniper-srx-global-security-policy/
Monitoring and troubleshooting security policies on Juniper SRX device is critical especially when you have a problem in a connection through SRX device.In this section we will learn five practical commands, specific for the purpose of security policy monitoring and  troubleshooting.full content in:https://rayka-co.com/lesson/monitoring-and-troubleshooting-security-policies-in-juniper-srx/
Load More... Subscribe
COURSES
  • Juniper Security Associate (JNCIA-SEC) (in Progress)
    11 Lessons
  • Juniper Junos Associate version 22.1R1.10 (JNCIA-Junos)
    27 Lessons
  • Cisco FTD Design and Implementation
    29 Lessons
  • Implementing Cisco SD-WAN Solutions
    31 Lessons
  • VXLAN EVPN
    16 Lessons
LATEST LESSONS
  • 11. Juniper SRX IDP Configuration
    Part of: Juniper Security Associate (JNCIA-SEC) (in Progress)
  • 10. Juniper SRX Application Firewall
    Part of: Juniper Security Associate (JNCIA-SEC) (in Progress)
  • 9. Juniper SRX Global Security Policy
    Part of: Juniper Security Associate (JNCIA-SEC) (in Progress)
  • 8. Monitoring and Troubleshooting Security Policies in Juniper SRX
    Part of: Juniper Security Associate (JNCIA-SEC) (in Progress)
  • 7. Juniper SRX Policy Configuration
    Part of: Juniper Security Associate (JNCIA-SEC) (in Progress)
  • More Lessons
RAYKA (DATA NETWORKING)
RAYKA (DATA NETWORKING)
Go to Top