From the course: Juniper Security Policies Fundamentals

Learn to secure your network with Juniper security policies

From the course: Juniper Security Policies Fundamentals

Learn to secure your network with Juniper security policies

- [Shyamraj] Hi I'm Shyarm and I'd like to welcome you to this course on Juniper policies. I'm a technical instructor and industry specialist in networking, cloud computing, and security. Juniper Networks is a market leader in networking technology and has a variety of devices ranging from firewalls, routers, switches, wireless, and cloud products. To secure their networks, businesses must control access to their LAN and critical resources. Security policies, also known as access control lists or firewall rules, are used for this purpose. Juniper security policies allow you to define what source, destination, and application to match and how to trade matching traffic. This course will walk you through the configuration of host inbound traffic and transit traffic and the various components of security policies along with configuration examples. We'll also talk about real world examples, configuration best practices, monitoring, and troubleshooting. Let's get started.

Contents