See how Insoft Services is responding to COVID-19

JPAC – Junos Pulse Access Control


Contact Us

We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.


I'd like to receive emails with the latest updates and promotions from Insoft.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.

Upcoming Dates

Oct 12 - Oct 14, 2021
09:00 - 17:00

Nov 17 - Nov 19, 2021
09:00 - 17:00

Dec 13 - Dec 15, 2021
09:00 - 17:00

Jan 12 - Jan 14, 2022
09:00 - 17:00

  Feb 16 - Feb 18, 2022
09:00 - 17:00

JPAC – Junos Pulse Access Control
3 days  (Instructor Led Online)  |  Junos Security

Course Details

The JPAC – Junos Pulse Access Control is a three-day course that provides detailed coverage of the configuration of the Junos Pulse Access Control Service offered by Juniper Networks. Students will work with the solution elements—the Junos Pulse Access Control Service, the SRX Series Services Gateway as a firewall enforcer, and Junos Pulse—to configure secure access to network resources. Key topics include Junos Pulse Access Control Service deployment, basic implementation, and element configuration. Students will have the opportunity to apply their knowledge in several hands-on labs. This course is based on Junos Pulse Access Control Service Release 5.0R2.


Course Level: Junos Pulse Access Control is an intermediate-level course.


See other Juniper courses


After successfully completing this course, you should be able to deploy the Junos Pulse Access Control Service and firewall enforcer to support common environments. Specific topics include:

  • Introduction to the Junos Pulse Access Control Service
  • Typical deployment scenarios
  • Terminology
  • Junos Pulse Access Control Service Access Management Framework elements
  • Firewall enforcer configuration elements
  • Junos Pulse configuration elements
  • Odyssey Access Client configuration elements
  • Troubleshooting


Day 1

Chapter 1: Course Introduction

Chapter 2: The Junos Pulse Access Control Service

  • The Need for Access Control
  • Junos Pulse Access Control Service Components
  • Junos Pulse Access Control Service Component Interaction
  • Sample Junos Pulse Access Control Service Deployments

Chapter 3: Initial Configuration

  • Junos Pulse Access Control Service Initial Configuration: Console
  • Junos Pulse Access Control Service Initial Configuration: Admin UI
  • Firewall Enforcer Initial Configuration
  • Verification and Troubleshooting
  • Initial Configuration Lab

Chapter 4: The Access Management Framework

  • Access Management Framework Elements

Chapter 5: Roles

  • Configuring User Roles
  • Role Mapping
  • Configuring Sign-In Policies
  • Roles Lab

Chapter 6: Client Access Methods

  • Client Access Methods
  • Configuring Junos Pulse
  • Configuring Agentless Access
  • Client Access Lab


Day 2

Chapter 7: Firewall Enforcement

  • Resource Policy Overview
  • Firewall Enforcement Overview
  • Configure Firewall Enforcement
  • Captive Portal
  • Firewall Enforcement Lab

Chapter 8: Layer 2 Enforcement

  • 802.1X Operations
  • RADIUS Elements
  • MAC Authentication
  • Configuring an 802.1X Authenticator
  • Configuring 802.1X Support on the Junos Pulse Access Control Service
  • Configuring MAC Authentication
  • Layer 2 Enforcement Lab

Chapter 9: Endpoint Defense

  • What Is Host Checker?
  • Host Checker Configuration
  • Remediation Options
  • Endpoint Security Lab


Day 3

Chapter 10: Authentication Options

  • The Authentication Process
  • Configuring Authentication Servers
  • Configuring Authentication Realms
  • User-Role Firewall Policies
  • Authentication Options Lab

Chapter 11: Management and Troubleshooting

  • Logging
  • System Monitoring
  • Troubleshooting Component Communications
  • Troubleshooting User Interactions
  • Configuration File Management
  • Working with JTAC
  • Logging and Troubleshooting Lab

Chapter 12: High Availability

  • Describe High Availability
  • Junos Pulse Access Control Service Clustering
  • Enforcer Options
  • Junos Pulse Access Control Service Clustering Lab

Chapter 13: Virtualization

  • Describe Virtualization
  • Configuring Virtual Appliance Licensing
  • STRM Integration
  • IDP Integration

Chapter 14: Junos Pulse Access Control Service Integration

  • IF-MAP Federation
  • Mobile Device Management
  • Guest User Access Management
  • NSM Integration
  • JSA Integration
  • IDP Integration

Appendix A: Junos Pulse Gateway Chassis Management

  • CMC Benefits
  • Configuring CMC

Appendix B: ScreenOS Enforcers

  • ScreenOS Policies
  • Configuring Firewall Enforcement
  • Verify Operations

Target Audience

The intended audience for this course includes network engineers, support personnel, reseller support, and individuals responsible for implementing the Junos Pulse Access Control Service.


  • Students should have experience with the TCP/IP protocol suite, including addressing and routing, and Ethernet experience, including addressing, basic switching operations, and virtual LANs (VLANs).
  • In addition, students should have knowledge of basic security and access management concepts, including 802.1X and RADIUS.
  • Attendance of the Introduction to the Junos Operating System (IJOS) and Junos Security (JSEC) courses, or equivalent experience with Junos devices and SRX Series firewalls, is recommended but not required.