Books & Videos

Table of Contents

  1. Chapter 1 Introduction to the SRX

    1. Evolving into the SRX

    2. The SRX Series Platform

    3. Deployment Solutions

    4. SRX Series Product Lines

    5. Branch SRX Series

    6. Data Center SRX Series

    7. Summary

    8. Chapter Review Questions

    9. Chapter Review Answers

  2. Chapter 2 What Makes Junos So Special?

    1. OS Basics

    2. Coming from Other Products

    3. Summary

    4. Chapter Review Questions

    5. Chapter Review Answers

  3. Chapter 3 Hands-On Junos

    1. Introduction

    2. Driving the Command Line

    3. Operational Mode

    4. Configuration Mode

    5. Commit Model

    6. Restarting Processes

    7. Junos Automation

    8. Junos Configuration Essentials

    9. Summary

    10. Chapter Review Questions

    11. Chapter Review Answers

  4. Chapter 4 Security Policy

    1. Security Policy Overview

    2. SRX Policy Processing

    3. Viewing SRX Policy Tables

    4. Viewing Policy Statistics

    5. Viewing Session Flows

    6. Policy Structure

    7. Policy Logging

    8. Troubleshooting Security Policy and Traffic Flows

    9. Application Layer Gateway Services

    10. Policy Schedulers

    11. Web and Proxy Authentication

    12. Case Study 4-1

    13. Case Study 4-2

    14. Converters and Scripts

    15. Summary

    16. Chapter Review Questions

    17. Chapter Review Answers

  5. Chapter 5 Network Address Translation

    1. How the SRX Processes NAT

    2. Source NAT

    3. Destination NAT

    4. Static NAT

    5. Summary

    6. Chapter Review Questions

    7. Chapter Review Answers

  6. Chapter 6 IPsec VPN

    1. VPN Architecture Overview

    2. IPsec VPN Concepts Overview

    3. Phase 1 IKE Negotiations

    4. Phase 2 IKE Negotiations

    5. Flow Processing and IPsec VPNs

    6. SRX VPN Types

    7. Other SRX VPN Components

    8. Selecting the Appropriate VPN Configuration

    9. IPsec VPN Configuration

    10. VPN Verification and Troubleshooting

    11. Case Studies

    12. Summary

    13. Chapter Review Questions

    14. Chapter Review Answers

  7. Chapter 7 High-Performance Attack Mitigation

    1. Network Protection Tools Overview

    2. Protecting Against Network Reconnaissance

    3. Protecting Against Basic IP Attacks

    4. Basic Denial-of-Service Screens

    5. Advanced Denial-of-Service and Distributed Denial-of-Service Protection

    6. ICMP Floods

    7. UDP Floods

    8. SYN/TCP Floods

    9. SYN Cookies

    10. Session Limitation

    11. AppDoS

    12. Application Protection

    13. Protecting the SRX

    14. Summary

    15. Chapter Review Questions

    16. Chapter Review Answers

  8. Chapter 8 Intrusion Prevention

    1. The Need for IPS

    2. Configuring IPS Features on the SRX

    3. Deploying and Tuning IPS

    4. Troubleshooting IPS

    5. Case Study 8-1

    6. Summary

    7. Chapter Review Questions

    8. Chapter Review Answers

  9. Chapter 9 Unified Threat Management

    1. What Is UTM?

    2. UTM Monitoring

    3. Case Study 9-1: Small Branch Office

    4. Summary

    5. Chapter Review Questions

    6. Chapter Review Answers

  10. Chapter 10 High Availability

    1. Understanding High Availability in the SRX

    2. Configuration

    3. Fault Monitoring

    4. Troubleshooting the Cluster

    5. Summary

    6. Chapter Review Questions

    7. Chapter Review Answers

  11. Chapter 11 Routing

    1. How the SRX “Routes” IP Packets

    2. Static Routing

    3. Dynamic Routing

    4. Routing Policy

    5. Internet Peering

    6. Routing Instances

    7. Filter-Based Forwarding

    8. Summary

    9. Chapter Review Questions

    10. Chapter Review Answers

  12. Chapter 12 Transparent Mode

    1. Transparent Mode Overview

    2. Configuring Transparent Mode

    3. Transparent Mode Commands and Troubleshooting

    4. Case Study 12-1

    5. Summary

    6. Chapter Review Questions

    7. Chapter Review Answers

  13. Chapter 13 SRX Management

    1. The Management Infrastructure

    2. J-Web

    3. NSM and Junos Space

    4. NETCONF

    5. Scripting and Automation

    6. Keeping Your Scripts Up-to-Date

    7. Case Studies

    8. Summary

    9. Chapter Review Questions

    10. Chapter Review Answers

  1. Colophon