Advanced Juniper Networks Secure Access (AJSA)

2 Day Course
Hands On
Official Juniper Curriculum

Book Now - 1 Delivery Method Available:

Scheduled Online Onsite


This two-day course discusses the advanced configuration of Secure Access (SA) products. Key topics include PKI support, additional authentication/authorization servers, complex policies, customization, high availability and Secure meeting. Through demonstrations and hands on labs, students will gain experience in configuring, testing, and troubleshooting advanced features of the SA products.

By the end of this course, you will understand the implementation of the following advanced SA product features:

  • Advanced Access Management 
  • Certificate Revocation Lists (CRL) 
  • Single Sign On (SSO)
  • Certificate
  • Netegrity
  • Advanced Policies
  • Authentication Policies
  • Resource Policies
  • Administrative Delegation
  • Public Key Infrastructure (PKI) support
  • Virtual Hosting
  • Advanced Authentication
  • Anonymous
  • SAML
  • Rewriting Policies
  • Role Mapping
  • Password Management
  • Custom User Interface (UI)
  • Clustering

This course helps delegates prepare for JNCIS-SSL Juniper certification exam.

Who Should Attend?

Network engineers, support personnel, reseller support, and anyone responsible for implementing the advanced SA product features covered in this course.

Training Partners

We work with the following best of breed training partners using our bulk buying power to bring you a wider range of dates, locations and prices.


Hide all

Authentication Options (5 topics)

  • Creating Sign-In URLs
  • Organizing Sign-In URLs
  • Multiple Sign-In Credentials
  • Configuring SSO
  • Lab 1: Configuration Review and Authentication Options

Certificates (4 topics)

  • Certificates
  • Configuring Certificate Authentication Server
  • Configuring Multiple Server Certificates
  • Lab 2: Using Certificates

Complex Policies (5 topics)

  • Resource Policies
  • Role Mapping Rules
  • Resource Profile Templates
  • Specialized Web Resource Policies
  • Lab 3: Complex Policies

Client and Server (6 topics)

  • Describe Network Connect
  • Integrated WAN Optimization
  • Federation of Users with IF-MAP
  • Describe Installers
  • Describe Launchers
  • Lab 4: Client and Server

Administration (4 topics)

  • Administration
  • Delegated Administration
  • System Logs
  • Lab 5: Administration

Endpoint Security (5 topics)

  • Describing Endpoint Security
  • Configuring Host Checker
  • Describing Advanced Endpoint Defense
  • Configuring Endpoint Solutions
  • Lab 6: Host Checker (Demo)

Instant Virtual Systems (3 topics)

  • Describing the Instant Virtual System
  • Configuring the Instant Virtual System
  • Lab 7: Virtual Systems

Troubleshooting (5 topics)

  • Troubleshooting Concepts
  • Content Intermediation Engine
  • Troubleshooting Network Connect
  • General Troubleshooting
  • Lab 8: Troubleshooting

Clustering (3 topics)

  • Describing Clustering
  • Configuring Clustering
  • Lab 9: Active/Passive Clustering

Secure Meeting (5 topics)

  • Describing Secure Meeting
  • Configuring Secure Meeting
  • Meetings
  • Secure Meeting Client
  • Lab 10: Secure Meeting


This course assumes that students have successfully attended the Configuring NetScreen Secure Access (CNSA) course or have equivalent experience with the Juniper Networks NetScreen Secure Access products. Specifically, students need to be familiar with the configuration of:
  • Roles
  • Realms
  • Resource Policies
  • Authentication Servers

Additional Learning

The courses below may help you meet the knowledge level required to take this course. If you are unsure please ask a training advisor .

  • Configuring Juniper Networks Secure Access (CJSA)

    Configuring Juniper Networks Secure Access (CJSA) is a 2-day training course discussing the configuration of SA products in a network environment

    2 Day Course Hands On Training Official Curriculum Course Code JUN-CJSA
    Scheduled Online Onsite

Relevant Certifications

or call:408-759-5074

Course PDF


Share this Course


Recommend this Course