See how Insoft Services is responding to COVID-19

Junos Pulse Access Control (JPAC)


Student Registration Form

Thank you for being interested in our training! Fill out this form to pre-book or request information about the delivery options.

* Required

Course Schedule

I'd like to receive emails with the latest updates and promotions from Insoft.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.

  • 3 Days Course
    Junos Security

    Classroom + Online

    Course Details


    This three-day course provides detailed coverage of the configuration of the Junos Pulse Access Control Service offered by Juniper Networks. Students will work with the solution elements—the Junos Pulse Access Control Service, the SRX Series Services Gateway as a firewall enforcer, and Junos Pulse—to configure secured access to network resources. Key topics include Junos Pulse Access Control Service deployment, basic implementation, and element configuration. Students will have the opportunity to apply their knowledge in several hands-on labs. This course is based on Junos Pulse Access Control Service Release 5.0R2.


    Course Level:

    Junos Pulse Access Control is an intermediate-level course.


    After successfully completing this course, you should be able to deploy the Junos Pulse Access Control Service and firewall enforcer to support common environments. Specific topics include:

    • Introduction to the Junos Pulse Access Control Service
    • Typical deployment scenarios
    • Terminology
    • Junos Pulse Access Control Service Access Management Framework elements
    • Firewall enforcer configuration elements
    • Junos Pulse configuration elements
    • Odyssey Access Client configuration elements
    • Troubleshooting


    Day 1

    Chapter 1: Course Introduction

    Chapter 2: The Junos Pulse Access Control Service

    • The Need for Access Control
    • Junos Pulse Access Control Service Components
    • Junos Pulse Access Control Service Component Interaction
    • Sample Junos Pulse Access Control Service Deployments

    Chapter 3: Initial Configuration

    • Junos Pulse Access Control Service Initial Configuration: Console
    • Junos Pulse Access Control Service Initial Configuration: Admin UI
    • Firewall Enforcer Initial Configuration
    • Verification and Troubleshooting
    • Initial Configuration Lab

    Chapter 4: The Access Management Framework

    • Access Management Framework Elements

    Chapter 5: Roles

    • Configuring User Roles
    • Role Mapping
    • Configuring Sign-In Policies
    • Roles Lab

    Chapter 6: Client Access Methods

    • Client Access Methods
    • Configuring Junos Pulse
    • Configuring Agentless Access
    • Client Access Lab

    Day 2

    Chapter 7: Firewall Enforcement

    • Resource Policy Overview
    • Firewall Enforcement Overview
    • Configure Firewall Enforcement
    • Captive Portal
    • Firewall Enforcement Lab

    Chapter 8: Layer 2 Enforcement

    • 802.1X Operations
    • RADIUS Elements
    • MAC Authentication
    • Configuring an 802.1X Authenticator
    • Configuring 802.1X Support on the Junos Pulse Access Control Service
    • Configuring MAC Authentication
    • Layer 2 Enforcement Lab

    Chapter 9: Endpoint Defense

    • What Is Host Checker?
    • Host Checker Configuration
    • Remediation Options
    • Endpoint Security Lab

    Day 3

    Chapter 10: Authentication Options

    • The Authentication Process
    • Configuring Authentication Servers
    • Configuring Authentication Realms
    • User-Role Firewall Policies
    • Authentication Options Lab

    Chapter 11: Management and Troubleshooting

    • Logging
    • System Monitoring
    • Troubleshooting Component Communications
    • Troubleshooting User Interactions
    • Configuration File Management
    • Working with JTAC
    • Logging and Troubleshooting Lab

    Chapter 12: High Availability

    • Describe High Availability
    • Junos Pulse Access Control Service Clustering
    • Enforcer Options
    • Junos Pulse Access Control Service Clustering Lab

    Chapter 13: Virtualization

    • Describe Virtualization
    • Configuring Virtual Appliance Licensing
    • STRM Integration
    • IDP Integration

    Chapter 14: Junos Pulse Access Control Service Integration

    • IF-MAP Federation
    • Mobile Device Management
    • Guest User Access Management
    • NSM Integration
    • JSA Integration
    • IDP Integration

    Appendix A: Junos Pulse Gateway Chassis Management

    • CMC Benefits
    • Configuring CMC

    Appendix B: ScreenOS Enforcers

    • ScreenOS Policies
    • Configuring Firewall Enforcement
    • Verify Operations

    Target Audience

    • The intended audience for this course includes network engineers, support personnel, reseller support, and individuals responsible for implementing the Junos Pulse Access Control Service.


    Students should have experience with the TCP/IP protocol suite, including addressing and routing, and Ethernet experience, including addressing, basic switching operations, and virtual LANs (VLANs). In addition, students should have knowledge of basic security and access management concepts, including 802.1X and RADIUS.


    Attendance of the Introduction to the Junos Operating System (IJOS) and Junos Security (JSEC) courses, or equivalent experience with Junos devices and SRX Series firewalls, is recommended but not required.