VMworld 2014 – Juniper at the Hands-on Lab

This is an exciting year for me. I joined Juniper Networks and my first week, I submitted a lab proposal representing Juniper for the VMworld 2014 Hands-on Lab. Weeks later, it was approved and two weeks ago, I finalized the lab and document. I am so incredibly excited that for the first time ever, Juniper Networks is represented in the VMworld Hands-on Lab.

What will be covered in the lab you ask? The lab of course covers some, but not all, of our Security virtualized products. If you would like a complete listing of these products, please review my previous blog post 

VMware-Hands-On-Labs

The Hands-on lab for 2014 is lab

HOL-PRT-1472 : Juniper Virtual Security for the Enterprise and Service Provider Environment

covers Juniper Junos Space with Security Director and Virtual Director, Firefly Perimeter, and DDoS Secure. The agenda for the lab is:

  • Lab Overview
  • Juniper Junos Space 101
    • Introduction to Space
    • Introduction to Virtual Director
    • Introduction to Security Director
  •  Managing Your Physical and Virtual Infrastructure with Juniper Junos Space
    • Use Cases for Juniper Junos Space and Firefly Perimeter
    • Deploying Firefly Perimeter
    • Virtual Director – Greater Detail
    • Security Director – Greater Detail
    • Why Juniper for Your Physical and Virtual Infrastructure
  • Juniper DDoS Secure
    • Why Juniper DDoS Secure
    • Introduction to Juniper DDoS Secure
    • Introduction to Juniper DDoS Secure UI
    • Configuration of Testing Environment
    • Low and Slow Attack

If you are interested in taking the lab, the hours are:

  • Sunday, August 24: 9:00 am – 7:00 pm
  • Monday, August 25: 10:30 am – 7:00 pm
  • Tuesday, August 26: 10:30 am – 6:00 pm
  • Wednesday, August 27: 8:00 am – 5:00 pm
  • Thursday, August 28: 8:00 am – 3:00 pm

Information on the Hands-on Labs

Please stop by and say hi! I would love to meet you!!!

  1. Leave a comment

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from common denial

Subscribe now to keep reading and get access to the full archive.

Continue reading