Network Engineer Master Program
Network Engineer Master Program
Network Engineer Master Program
Master s Program
Become a Network Engineer - learn to design and work with network
www.nwkings.com | www.nw ix.com
con gurations, and network infrastructure, troubleshoot performance
problems, and con gure security systems.
Juniper JNCIA
CCNA
Security components
Firewall components
4. Determine if a User-ID agent or agentless should be
used
Compare and contrast User-ID agents
Panorama components
Methods of User-ID redistribution
PAN-OS subscriptions and the features they enable
Methods of group mapping
Plugin components
Server pro le and authentication pro le
Heatmap and BPA reports
Arti cial intelligence operations (AIOps)/Telemetry
IPv6
Internet of Things (IoT) Determine how and when to use the
Authentication policy
2. Layer 2 interfaces
Layer 3 interfaces
Fundamental functions
Virtual wire (vwire) interfaces
Tap interfaces
Subinterfaces
Tunnel interfaces
6. Differentiate between the fundamental functions
that reside on the management plane and data
plane
Aggregate interfaces
Loopback interfaces
Decrypt mirror interfaces
VLAN interfaces
De ne multiple virtual systems (multi-vsys)
environment
Decryption types
Decryption pro les and certi cates
Create a decryption policy in the rewall
Con gure SSH Proxy
2.
Custom con guration of different Security Pro les Redistribution Pro les
and Security Pro le Groups Static routes
Relationship between URL ltering and credential Route monitoring
theft prevention Policy-based forwarding
Use of username and domain name in HTTP header Virtual routers versus logical routers
insertion
DNS Security
How to tune or add exceptions to a Security Pro le
Compare and contrast threat prevention and
Con gure NAT
advanced threat prevention
NAT policy rules
Compare and contrast URL Filtering and Advanced
URL Filtering
8. Security rules
Source NAT
No-NAT Policies
Use session browser to nd NAT rule name
U-Turn NAT
Con gure zone protections, packet buffer
Check HIT counts
protection, and DoS protection
HA Pair
Zero-Touch Provisioning
Bootstrapping
Con gure service routes
Default
5.
destination routes
How to verify service routes
Role-based access control for authorization
Different methods used to authenticate
The Authentication Sequence
The device access method Con gure application-based QoS
Enablement requirements
1. Create security rules with App-ID 1. Components con gured in a template www.nwkings.com | www.learn.nwkings.com
Convert port and protocol rules to App-ID rules
How the order of templates in a stack affects the
Identify the impact of application override to
con guration push to a rewall
overall rewall functionality
Overriding a template value in a stack
Create custom apps and threats
Con gure variables in templates
Review App-ID dependencies
Relationship between Panorama and devices for
dynamic update versions, policy implementation, and
HA peers
6. Transparent proxy
Explicit proxy
Con gure
Manage and
App-ID
con gure log forwarding 181
Troubleshoot site-to-site tunnels
1. Identify
Create security
log types
rules
andwith
criticalities
App-ID 1. IPSec www.nwkings.com | www.learn.nwkings.com
Route-based versus policy-
Manage
Convert port
external
and services
protocol rules to App-ID rules
GRE based remote hosts
Create
Identifyand
themanage
impact of
tags
application override to
One-to-one and one-to- Tunnel monitoring
Log
overall
monitoring
rewall functionality
many tunnels
Customize
Create custom
logging
appsand
andreporting
threats settings
Review App-ID dependencies
Troubleshoot interfaces
2.
Settings
Alto Networks system
Aggregate interfaces, LACP
Single rewall
High availability pairs
Panorama push Troubleshoot Decryption
Dynamic updates
3. Inbound decryption Identity what cannot be
SSL forward proxy decrypted and con gure
SSH proxy exclusions and bypasses
Manage HA functions Certi cates
3. Link monitoring
Path monitoring
HA links Troubleshoot routing
Failover
Active/active and active/passive
HA interfaces
4. Dynamic routing
Redistribution pro les
Policy-based forwarding
Multicast routing
Static routes Service routes
Clustering
Route monitoring
General Troubleshooting
5. Logs Reports
Troubleshoot policies
8. NAT Decryption
Security Authentication
Troubleshoot HA functions
9. Monitor Failover triggers
5. From Panorama
From the rewall
Scheduling and staggering updates on an HA pair
8. of a virtual/logical router
Con gure
Develop the
App-ID
appropriate application-based
Compare and contrast different types of security
1. security policy
Create security rules with App-ID 1. pro les
www.nwkings.com | www.learn.nwkings.com
Convert
Rule port and protocol rules to App-ID rules
shadowing
Identify the by
impact Antivirus
Group rules tag of application override to
overall rewall functionality Anti-spyware
Potential impact of App-ID updates to existing
Create Vulnerability protection
securitycustom apps and threats
policy rules
Review App-ID dependencies URL ltering
Policy usage statistics
WildFire analysis
Differentiate speci c security rule types Create, modify, add and apply the appropriate
Intrazone
Antivirus
Universal
Anti-spyware
Vulnerability protection
URL ltering
Con gure security policy match conditions,
3.
Application lters and groups
Logging options Traf c
App-ID Threat
User-ID Data
Device-ID System logs
Application lter in policy
Application group in policy
EDLs
Enable DNS security to control traf c based
on domains
4. Destination
Apply DNS security in policy
Source
https://in.linkedin.com/company/networkkings
https://www.nwkings.com/
sales@nwkings.com
+918130537300
https://www.facebook.com/Networkkingss/
https://www.instagram.com/network.kings/