Junos OS Release 12.1X47 Feature Guide

Size: px
Start display at page:

Download "Junos OS Release 12.1X47 Feature Guide"

Transcription

1 Junos OS Release 12.1X47 Feature Guide Junos OS Release 12.1X47-D15 19 November 2014 Revision 1 This feature guide accompanies Junos OS Release 12.1X47-D15. This guide contains detailed information about new or enhanced functionality introduced in Junos OS Release 12.1X47-D15 that is summarized in the Release Notes. Contents New Features in Junos OS Release 12.1X47-D Application Identification and Tracking Customizing Application Groups for Junos OS Application Identification SSL Proxy Authentication, Authorization, and Accounting (AAA) (RADIUS) Configuring RADIUS Server Authentication Configuring RADIUS System Accounting destination (Accounting) radius-options radius-server Chassis Cluster Encrypted Control Link Flow-Based and Packet-Based Processing Data Path Debugging for SRX Series Devices Interfaces and Chassis Next-Generation Switch Control Board II (SRX5K-SCBE) and Routing Engine (SRX5K-RE-1800X4) for SRX5400, SRX5600, and SRX5800 Devices IPv Establishing an Outbound SSH Connection Network Address Translation (NAT) Understanding Source NAT Pools Understanding NAT64 IPv6 Prefix to IPv4 Address-Persistent Translation [edit security nat] Hierarchy Level source (Security Source NAT) pool (Security Source NAT)

2 Junos OS Release 12.1X47 Feature Guide address-persistent (Security Source NAT Pool) Example: Configuring Address Persistent NAT64 Pools show security nat source pool Management Network Management and Monitoring TCP/TLS Support for Real-Time Logging System Log Messages Documentation Feedback Requesting Technical Support Self-Help Online Tools and Resources Opening a Case with JTAC Revision History

3 Application Identification and Tracking New Features in Junos OS Release 12.1X47-D15 Junos OS Release 12.1X47-D15 introduces the following features: Application Identification and Tracking on page 3 Authentication, Authorization, and Accounting (AAA) (RADIUS) on page 14 Chassis Cluster on page 24 Flow-Based and Packet-Based Processing on page 49 Interfaces and Chassis on page 54 IPv6 on page 94 Network Address Translation (NAT) on page 97 Management on page 116 Application Identification and Tracking Customizing Application Groups for Junos OS Application Identification on page 3 SSL Proxy on page 8 Customizing Application Groups for Junos OS Application Identification Customizing Application Groups for Junos OS Application Identification on page 3 Enabling Application Groups in Junos OS Application Identification on page 4 Example: Configuring a Custom Application Group for Junos OS Application Identification for Simplified Management on page 4 application-group (Services) on page 8 Customizing Application Groups for Junos OS Application Identification The hierarchy of application groups resembles a tree structure with associated applications as the leaf nodes. The group any refers to the root node. The group unassigned is always situated one level from the root and initially contains all applications. When a group is defined, applications are assigned from the unassigned group to the new group. When a group is deleted, its applications are moved back to the unassigned group. All predefined application groups have the prefix junos in the application group name to prevent naming conflicts with custom application groups. You cannot modify the list of applications within a predefined application group. However, you can copy a predefined application group to use it as a template for creating a custom application group. To customize a predefined application group, you must first disable the predefined group. Note that a disabled predefined application group remains disabled after an application database update. You can then use the operational command request services application-identification group to copy the disabled predefined application group. The copied group is placed in the configuration file, and the prefix junos is changed to my. At this point, you can modify the list of applications in my application group and rename the group with a unique name. 3

4 Junos OS Release 12.1X47 Feature Guide To reassign an application from one custom group to another, you must remove the application from its current custom application group, and then reassign it to the other. Enabling Application Groups in Junos OS Application Identification All application groups are enabled by default. Predefined application groups are enabled at installation. For predefined application groups, you can disable and reenable a group using the request services application-identification group command. You cannot delete a predefined signature or signature group. To disable a predefined application group: user@host> request services application-identification group disable predefined-application-group-name To reenable a disabled predefined application group: user@host> request services application-identification group enable predefined-application-group-name Example: Configuring a Custom Application Group for Junos OS Application Identification for Simplified Management This example shows how to configure custom application groups for Junos OS application identification for consistent reuse when defining policies. Requirements on page 4 Overview on page 4 Configuration on page 5 Requirements Before you begin, install an entire signature database from an IDP or an application identification security package. Overview In this example, you define applications for an application group, delete an application from an application group, and include an application group within another application group. In Junos OS, application identification allows you to group applications in policies. Applications can be grouped under predefined and custom application groups. The entire predefined application group can be downloaded as part of the IDP or application identification security package. You can create custom application groups with a set of similar applications for consistent reuse when defining policies. 4

5 Configuration NOTE: You cannot modify the applications defined in a predefined application group. However, you can copy a predefined application group using the operational command request services application-identification group group-name copy to create a custom application group and modify the list of applications. For more information, see request services application-identification group. Configuration Configuring Junos OS Application Identification User-Defined Application Groups on page 5 Deleting an Application from a User-Defined Application Group on page 6 Creating Child Application Groups for an Application Group on page 7 Configuring Junos OS Application Identification User-Defined Application Groups CLI Quick Configuration To quickly configure this section of the example, copy the following commands, paste them into a text file, remove any line breaks, change any details necessary to match your network configuration, copy and paste the commands into the CLI at the [edit] hierarchy level, and then enter commit from configuration mode. set services application-identification application-group my_web set services application-identification application-group my_web applications junos:http set services application-identification application-group my_web applications junos:ftp set services application-identification application-group my_web applications junos:gopher set services application-identification application-group my_web applications junos:amazon set services application-identification application-group my_peer set services application-identification application-group my_peer applications junos:bittorrent set services application-identification application-group my_peer applications junos:bittorrent-dht set services application-identification application-group my_peer applications junos:bittorrent-udp set services application-identification application-group my_peer applications junos:bittracker Step-by-Step Procedure The following example requires you to navigate various levels in the configuration hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration Mode in the CLI User Guide. To configure a custom application group for application identification: 1. Set the name of your custom application group. [edit services application-identification] user@host# set application-group my_web 2. Add the list of applications that you want to include in your custom application group. [edit services application-identification] 5

6 Junos OS Release 12.1X47 Feature Guide set application-group my_web applications junos:http set application-group my_web applications junos:ftp set application-group my_web applications junos:gopher set application-group my_web applications junos:amazon 3. Set the name of a second custom application group. [edit services application-identification] user@host# set application-group my_peer 4. Add the list of applications that you want to include in the group. [edit services application-identification] user@host# set application-group my_peer applications junos:bittorrent user@host# set application-group my_peer applications junos:bittorrent-dht user@host# set application-group my_peer applications junos:bittorrent-udp user@host# set application-group my_peer applications junos:bittracker Results From configuration mode, confirm your configuration by entering the show services application-identification group command. If the output does not display the intended configuration, repeat the configuration instructions in this example to correct it. [edit] user@host# show services application-identification application-group my_web applications { junos:http; junos:ftp; junos:gopher; junos:amazon user@host# show services application-identification application-group my_peer applications { junos:bittorrent; junos:bittorrent-dht; junos:bittorrent-udp; junos:bittracker; If you are done configuring the device, enter commit from configuration mode. Deleting an Application from a User-Defined Application Group CLI Quick Configuration To quickly configure this section of the example, copy the following command, paste it into a text file, remove any line breaks, change any details necessary to match your network configuration, copy and paste the command into the CLI at the [edit] hierarchy level, and then enter commit from configuration mode. [edit] delete services application-identification application-group my_web applications junos:amazon Step-by-Step Procedure To delete an application from a custom application group: [edit services application-identification] user@host# delete application-group my_web applications junos:amazon 6

7 Creating Child Application Groups for an Application Group Results From configuration mode, confirm your configuration by entering the show services application-identification application group detail command. If the output does not display the intended configuration, repeat the configuration instructions in this example to correct it. [edit] show services application-identification group detail application group my_web { junos:http; junos:ftp; junos:gopher; If you are done configuring the device, enter commit from configuration mode. Creating Child Application Groups for an Application Group CLI Quick Configuration To quickly configure this section of the example, copy the following commands, paste them into a text file, remove any line breaks, change any details necessary to match your network configuration, copy and paste the commands into the CLI at the [edit] hierarchy level, and then enter commit from configuration mode. set services application-identification application-group p2p set services application-identification application-group p2p application-groups my_web set services application-identification application-group p2p application-groups my_peer Step-by-Step Procedure To configure child application groups for a custom application group: 1. Set the name of the custom application group in which you are configuring the child application groups. [edit services application-identification] user@host# set application-group p2p 2. Add the child application groups. [edit services application-identification] user@host# set application-group p2p application-groups my_web uer@host# set application-group p2p application-groups my_peer Results From configuration mode, confirm your configuration by entering the show services application-identification application-group application-group-name command. If the output does not display the intended configuration, repeat the configuration instructions in this example to correct it. [edit] user@host# show services application-identification application-group p2p applications-groups { my_web; my_peer; If you are done configuring the device, enter commit from configuration mode. 7

8 Junos OS Release 12.1X47 Feature Guide application-group (Services) Syntax application-group group-name { application-groups application-group-name; applications application-name; Hierarchy Level [edit services application-identification] Release Information Statement introduced in Junos OS Release Description Specify any number of associated predefined applications, user-defined applications, and other groups for ease of use in configuring application-based policies. An application group is hierarchical: a tree structure of groups with applications as the leaf nodes. Options group-name Name of the group. This name is used in policy configuration statements in place of multiple predefined applications, user-defined applications, or other groups. application-groups application-group-name Name of an application group to be assigned to this group. There is no maximum number of groups that can be assigned to a group. Use multiple commands to assign multiple groups. applications application-name Name of an application to be assigned to this group. An application can remain unassigned or be assigned to a group, but it cannot be assigned to more than one group. There is no maximum number of applications that can be assigned to a group. Use multiple commands to assign multiple groups. Required Privilege Level security To view this statement in the configuration. security-control To add this statement to the configuration. SSL Proxy show services application-identification counter (AppSecure) show services application-identification application-system-cache (View) clear services application-identification counter (Values) 8

9 show services application-identification counter (AppSecure) show services application-identification counter (AppSecure) Syntax show services application-identification counter <ssl-encrypted-sessions> Release Information Description Command introduced in Junos OS Release Output updated in Junos OS Release 12.1X47-D10. Command and output updated in Junos OS Release 12.1X47-D15. Display the status of all Junos OS application identification counter values per SPU. Options ssl-encrypted-sessions Display counters for SSL encrypted sessions. Required Privilege Level Related Documentation view Application Identification Feature Guide for Security Devices clear services application-identification counter (Values) List of Sample Output show services application-identification counter on page 10 show services application-identification counter ssl-encrypted-sessions on page 11 Output Fields Table 1 on page 9 lists the output fields for the show services application-identification counter command. Output fields are listed in an approximate order in which they appear. Table 1: show services application-identification counter Output Fields Field Name Field Description PIC PIC number of the accumulated statistics. NOTE: The PIC number is always displayed as 0 for branch SRX Series devices. Unknown applications Number of unknown applications. Encrypted unknown applications Number of encrypted unknown applications. Cache hits Number of sessions that matched the application in the AI cache. Cache misses Number of sessions that did not find the application in the AI cache. Client-to-server packets processed Number of client-to-server packets processed. Server-to-client packets processed Number of server-to-client packets processed. Client-to-server bytes processed Number of client-to-server payload bytes processed. Server-to-client layer bytes processed Number of server-to-client payload bytes processed. Client-to-server packets processed Number of client-to-server packets processed. 9

10 Junos OS Release 12.1X47 Feature Guide Table 1: show services application-identification counter Output Fields (continued) Field Name Field Description Server-to-client packets processed Number of server-to-client packets processed. Client-to-server bytes processed Number of client-to-server payload bytes processed. Server-to-client layer bytes processed Number of server-to-client payload bytes processed. Client-to-server encrypted packets processed Number of client-to-server encrypted packets processed. Server-to-client encrypted packets processed Number of server-to-client encrypted packets processed. Client-to-server encrypted bytes processed Number of client-to-server encrypted payload bytes processed. Server-to-client layer encrypted bytes processed Number of server-to-client encrypted payload bytes processed. Sessions bypassed due to resource allocation failure Number of sessions bypassed due to resource allocation failure. Segment case 1 - New segment to left TCP segments contained before the previous segment. Segment case 2 - New segment overlap right TCP segments that start before the previous segment and are contained in it. Segment case 3 - Old segment overlapped TCP segments that start before the previous segment and extend beyond it. Segment case 4 - New segment overlapped TCP segments that start and end within the previous segment. Segment case 5 - New segment overlap left TCP segments that start within the previous segments and extend beyond it. Segment case 6 - New segment overlap left TCP segments that start after the previous segment. This is the normal case. Sample Output show services application-identification counter user@host> show services application-identification counter pic: 6/0 Counter type Value Unknown applications 5 Encrpted unknown applications 0 Cache hits 0 10

11 show services application-identification counter (AppSecure) Cache misses 8 Client-to-server packets processed 678 Server-to-client packets processed 0 Client-to-server bytes processed Server-to-client bytes processed 0 Client-to-server encrypted packets processed 0 Server-to-client encrypted packets processed 0 Client-to-server encrypted bytes processed 0 Server-to-client encrypted bytes processed 0 Sessions bypassed due to resource allocation failure 0 Segment case 1 - New segment to left 0 Segment case 2 - New segment overlap right 0 Segment case 3 - Old segment overlapped 0 Segment case 4 - New segment overlapped 0 Segment case 5 - New segment overlap left 0 Segment case 6 - New segment to right 0 Sample Output show services application-identification counter ssl-encrypted-sessions user@host> show services application-identification counter ssl-encrypted-sessions pic: 1/0 Counter type Value AI cache hits 0 AI cache hits by nested application 0 AI cache misses 0 AI matches 0 AI uni-matches 0 AI no-matches 0 AI partial matches 0 AI no-partial matches 0 Sessions that triggered Appid create session API 0 Sessions that do not incur signature match or decoding 0 Sessions that incur signature match or decoding 0 Client-to-server packets processed 0 Server-to-client packets processed 0 Client-to-server layer-7 bytes processed 0 Server-to-client layer-7 bytes processed 0 Terminal first data packets on both direction 0 pic: 1/1 Counter type Value AI cache hits 0 AI cache hits by nested application 0 AI cache misses 0 AI matches 0 AI uni-matches 0 AI no-matches 0 AI partial matches 0 AI no-partial matches 0 Sessions that triggered Appid create session API 0 Sessions that do not incur signature match or decoding 0 Sessions that incur signature match or decoding 0 Client-to-server packets processed 0 Server-to-client packets processed 0 Client-to-server layer-7 bytes processed 0 Server-to-client layer-7 bytes processed 0 Terminal first data packets on both direction 0 11

12 Junos OS Release 12.1X47 Feature Guide show services application-identification application-system-cache (View) Syntax show services application-identification application-system-cache Release Information Description Command introduced in Junos OS Release Command updated in Junos OS Release 12.1X47-D10. Output updated in Junos OS Release 12.1X47-D15. Display application ID from default port/protocol binding or from the application system cache. Required Privilege Level Related Documentation view Application Identification Feature Guide for Security Devices clear services application-identification application-system-cache (Junos OS) List of Sample Output show services application-identification application-system-cache on page 13 Output Fields Table 2 on page 12 lists the output fields for the show services application-identification application-system-cache command. Output fields are listed in the approximate order in which they appear. Table 2: show services application-identification application-system-cache Output Fields Field Name Field Description application-cache On or Off status of the application cache. nested-application-cache On or Off status of the nested application cache. cache-unknown-result On or Off status for caching unknown results. cache-entry-timeout The number of seconds the mapping information is saved. pic PIC number of the accumulated statistics. NOTE: The PIC number is always displayed as 0 for branch SRX Series devices. Logical system name Name of a specific logical system. IP address IP address. Port Port number. Protocol Type of protocol. Application Name of the application. Encrypted Yes or No to identify the traffic as encrypted or not. 12

13 show services application-identification application-system-cache (View) Sample Output show services application-identification application-system-cache show services application-identification application-system-cache Application System Cache Configurations: application-cache: on nested-application-cache: on cache-unknown-result: on cache-entry-timeout: 3600 seconds pic: 1/0 Logical system name: root-logical-system IP address: Port: 443 Protocol: TCP Application: SSL Encrypted: Yes pic: 1/1 Logical system name: root-logical-system IP address: Port: 80 Protocol: TCP Application: HTTP Encrypted: No 13

14 Junos OS Release 12.1X47 Feature Guide clear services application-identification counter (Values) Syntax clear services application-identification counter <ssl-encrypted-sessions> Release Information Description Command introduced in Junos OS Release Command updated in Junos OS Release 12.1-X47-D15. Reset all the Junos OS application identification counter values. Options ssl-encrypted-sessions Reset application identification counter values for SSL encrypted sessions. Required Privilege Level Related Documentation clear Application Identification Feature Guide for Security Devices show services application-identification counter (AppSecure) List of Sample Output clear services application-identification counter on page 14 Output Fields When you enter this command, you are provided feedback on the status of your request. Sample Output clear services application-identification counter clear services application-identification counter clear_counter_class: counters cleared, status = 0 Authentication, Authorization, and Accounting (AAA) (RADIUS) Configuring RADIUS Server Authentication on page 14 Configuring RADIUS System Accounting on page 18 destination (Accounting) on page 21 radius-options on page 22 radius-server on page 23 Configuring RADIUS Server Authentication RADIUS authentication is a method of authenticating users who attempt to access the router or switch. The Junos OS supports two protocols for central authentication of users on multiple routers: RADIUS and TACACS+. We recommend RADIUS because it is a multivendor IETF standard, and its features are more widely accepted than those of TACACS+ or other proprietary systems. In addition, we recommend using a one-time-password system for increased security, and that all vendors of these systems support RADIUS. 14

15 Configuring RADIUS Server Authentication You should use RADIUS when your priorities are interoperability and performance: Interoperability RADIUS is more interoperable than TACACS+, primarily because of the proprietary nature of TACACS+. While TACACS+ supports more protocols, RADIUS is universally supported. Performance RADIUS is much lighter on your routers and switches and for this reason, network engineers generally prefer RADIUS over TACACS+. To use RADIUS authentication on the device, configure information about one or more RADIUS servers on the network by including one radius-server statement at the [edit system] hierarchy level for each RADIUS server. Because remote authentication is configured on multiple devices, it is commonly configured inside of a configuration group. As such, the steps shown here are in a configuration group called global. Using a configuration group is optional. To configure authentication by a RADIUS server: 1. Add an IPv4 or IPv6 server address. Configure an IPv4 source address and server address: [edit groups global] user@host# set system radius-server server-address source-address source-address For example: [edit groups global] user@host# set system radius-server source-address Configure an IPv6 source address and server address: [edit groups global system radius-server server-address] user@host# set server-address secret secretkey source-address source-address For example: [edit groups global system radius-server :: ] user@host# set secret $9$lPOv87ZGiH.5JGn/AtOB7-dVgo source-address :: The source address is a valid IPv4 or IPv6 address configured on one of the router or switch interfaces. This configuration sets a fixed address as the source address for locally generated IP packets. Server address is a unique IPv4 or IPv6 address that is assigned to a particular server and used to route information to the server. If the Junos OS device has several interfaces that can reach the RADIUS server, assign an IP address that Junos OS can use for all its communication with the RADIUS server. 2. Include a shared secret password. You must specify a password in the secret password statement. If the password contains spaces, enclose it in quotation marks. The secret password used by the local router or switch must match that used by the server. The secret password configures the password that the Junos OS device uses to access the RADIUS server. [edit groups global system radius-server server-address] 15

16 Junos OS Release 12.1X47 Feature Guide set secret password For example: [edit groups global system radius-server ] set secret $9$gQ4UHf5F36CiH.5Tz9CuO1hreM8xw2oIENVwgZG 3. If necessary, specify a port on which to contact the RADIUS server. By default, port number 1812 is used (as specified in RFC 2865). NOTE: You can also specify an accounting port to send accounting packets with the accounting-port statement. The default is 1813 (as specified in RFC 2866). [edit groups global system radius-server server-address] user@host# set port port-number For example: [edit groups global system radius-server ] user@host# set port Specify the order in which Junos OS attempts authentication. You must include the authentication-order statement in your remote authentication configuration. The example assumes your network includes both RADIUS and TACACS+ servers. In this example, whenever a user attempts to log in, Junos OS begins by querying the RADIUS server for authentication. If it fails, it next attempts authentication with locally configured user accounts. Finally the TACACS+ server is tried. [edit groups global system] user@host# set authentication-order [ authentication-methods ] For example: [edit groups global system] user@host# set authentication-order [ radius password tacplus ] 5. Assign a login class to RADIUS-authenticated users. You can assign different user templates and login classes to RADIUS-authenticated users. This allows RADIUS-authenticated users to be granted different administrative permissions on the Junos OS device. By default, RADIUS-authenticated users use the remote user template and are assigned to the associated class, which is specified in the remote user template, if the remote user template is configured. The username remote is a special case in Junos OS. It acts as a template for users who are authenticated by a remote server, but do not have a locally-configured user account on the device. In this method, Junos OS applies the permissions of the remote template to those authenticated users without a locally defined account. All users mapped to the remote template are of the same login class. 16

17 Configuring RADIUS Server Authentication In the Junos OS configuration, a user template is configured in the same way as a regular local user account, except that no local authentication password is configured because the authentication is remotely performed on the RADIUS server. To use the same permissions for all RADIUS-authenticated users: [edit groups global system login] user@host# set user remote class class For example: [edit groups global system login] user@host# set user remote class super-user To have different login classes be used for different RADIUS-authenticated users, granting them different permissions: a. Create multiple user templates in the Junos OS configuration. Every user template can be assigned a different login class. For example: [edit groups global system login] set user RO class read-only set user OP class operator set user SU class super-user set user remote full-name "default remote access user template" set user remote class read-only b. Have the RADIUS server specify the name of the user template to be applied to the authenticated user. For a RADIUS server to indicate which user template is to be applied, it needs to include the Juniper-Local-User-Name attribute (Vendor 2636, type 1, string) Juniper VSA (vendor-specific attribute) in the RADIUS Access-Accept message. The string value in the Juniper-Local-User-Name must correspond to the name of a configured user template on the device. For a list of relevant Juniper RADIUS VSAs, see Juniper Networks Vendor-Specific RADIUS Attributes. If the Juniper-Local-User-Name is not included in the Access-Accept message or the string contains a user template name that does not exist on the device, the user is assigned to the remote user template, if configured. If it is not configured, authentication fails for the user. After logging in, the remotely authenticated user retains the same username that was used to log in. However, the user inherits the user class from the assigned user template. In a RADIUS server, users can be assigned a Juniper-Local-User-Name string, which indicates the user template to be used in the Junos OS device. From the previous example, the string would be RO, OP, or SU. Configuration of the RADIUS server depends on the server being used. For instructions for the Juniper Steel-Belted Radius server, see Steel-Belted Radius (SBR) Enterprise. For information on using FreeRADIUS, see 17

18 Junos OS Release 12.1X47 Feature Guide Configuring RADIUS System Accounting With RADIUS accounting enabled, Juniper Networks routers or switches, acting as RADIUS clients, can notify the RADIUS server about user activities such as software logins, configuration changes, and interactive commands. The framework for RADIUS accounting is described in RFC Tasks for configuring RADIUS system accounting are: 1. Configuring Auditing of User Events on a RADIUS Server on page Specifying RADIUS Server Accounting and Auditing Events on page Configuring RADIUS Server Accounting on page 18 Configuring Auditing of User Events on a RADIUS Server To audit user events, include the following statements at the [edit system accounting] hierarchy level: [edit system accounting] destination { radius { server { server-address { accounting-port port-number; max-outstanding-requests value; port port-number; retry value; secret password; source-address address; timeout seconds; Specifying RADIUS Server Accounting and Auditing Events To specify the events you want to audit when using a RADIUS server for authentication, include the events statement at the [edit system accounting] hierarchy level: [edit system accounting] events [ events ]; events is one or more of the following: login Audit logins change-log Audit configuration changes interactive-commands Audit interactive commands (any command-line input) Configuring RADIUS Server Accounting To configure RADIUS server accounting, include the server statement at the [edit system accounting destination radius] hierarchy level: 18

19 Configuring RADIUS Server Accounting server { server-address { accounting-port port-number; max-outstanding-requests value; port port-number; retry value; secret password; source-address address; timeout seconds; server-address specifies the address of the RADIUS server. To configure multiple RADIUS servers, include multiple server statements. NOTE: If no RADIUS servers are configured at the [edit system accounting destination radius] statement hierarchy level, the Junos OS uses the RADIUS servers configured at the [edit system radius-server] hierarchy level. accounting-port port-number specifies the RADIUS server accounting port number. The default port number is NOTE: If you enable RADIUS accounting at the [edit access profile profile-name accounting-order] hierarchy level, accounting is triggered on the default port of 1813 even if you do not specify a value for the accounting-port statement. You must specify a secret (password) that the local router or switch passes to the RADIUS client by including the secret statement. If the password contains spaces, enclose the entire password in quotation marks ( ). In the source-address statement, specify a source address for the RADIUS server. Each RADIUS request sent to a RADIUS server uses the specified source address. The source address is a valid IPv4 or IPv6 address configured on one of the router or switch interfaces. Optionally, you can specify the number of times that the router or switch attempts to contact a RADIUS authentication server by including the retry statement. By default, the router or switch retries three times. You can configure the router or switch to retry from 1 through 10 times. Optionally, you can specify the length of time that the local router or switch waits to receive a response from a RADIUS server by including the timeout statement. By default, the router or switch waits 3 seconds. You can configure the timeout to be from 1 through 90 seconds. If you use the enhanced-accounting statement at the [edit system radius-options] hierarchy level, the RADIUS attributes such as access method, remote port, and access privileges can be audited. You can limit the number of attribute values to be displayed for auditing 19

20 Junos OS Release 12.1X47 Feature Guide by using the enhanced-avs-max <number> statement at the [edit system accounting] hierarchy level. [edit system radius-options] enhanced-accounting; [edit system accounting] enhanced-avs-max <number>; When a Juniper Networks router or switch is configured with RADIUS accounting, it sends Accounting-Start and Accounting-Stop messages to the RADIUS server. These messages contain information about user activities such as software logins, configuration changes, and interactive commands. This information is typically used for monitoring a network, collecting usage statistics, and ensuring that users are billed properly. The following example shows three servers ( , , and ) configured for RADIUS accounting: system { accounting { events [ login change-log interactive-commands ]; destination { radius { server { { accounting-port 3333; secret $9$dkafeqwrew; source-address ; retry 3; timeout 3; secret $9$fe3erqwrez; secret $9$f34929ftby; 20

21 destination (Accounting) destination (Accounting) Syntax destination { radius { server { server-address { accounting-port port-number; max-outstanding-requests value; port port-number; retry value; secret password; source-address source-address; timeout seconds; tacplus { server { server-address { port port-number; secret password; single-connection; timeout seconds; Hierarchy Level [edit system accounting] Release Information Statement introduced before Junos OS Release 7.4. radius statement added in Junos OS Release 7.4. Support for IPv6 source address added in Junos OS Release 12.1X47-D15. Description Configure the authentication server. Options The remaining statements are explained separately. See CLI Explorer. Required Privilege Level system To view this statement in the configuration. system-control To add this statement to the configuration. 21

22 Junos OS Release 12.1X47 Feature Guide radius-options Syntax radius-options { attributes { nas-ip-address nas-ip-address; password-protocol mschap-v2; Hierarchy Level [edit system] Release Information Description Statement introduced in Junos OS Release 8.5. Support for network access server (NAS) IPv6 address added in Junos OS Release 12.1X47-D15. Configure RADIUS options for the NAS-IP address for outgoing RADIUS packets and password protocol used in RADIUS packets. Options attributes Configure RADIUS attributes. nas-ip-address nas-ip-address Valid IPv4 or IPv6 address of the NAS requesting user authentication. password-protocol mschap-v2 Protocol MS-CHAPv2, used for password authentication and password changing. Required Privilege Level system To view this statement in the configuration. system-control To add this statement to the configuration. 22

23 radius-server radius-server Syntax radius-server server-address { accounting-port port-number; max-outstanding-requests value; port port-number; retry value; secret password; source-address source-address; timeout seconds; Hierarchy Level [edit system] Release Information Description Statement introduced in Junos OS Release 8.5. Support for IPv6 source address added in Junos OS Release 12.1X47-D15. Configure RADIUS server address for subscriber access management, Layer 2 Tunnelling Protocol (L2TP), or (Point-to-Point Protocol (PPP). To configure multiple RADIUS servers, include multiple radius-server statements. The servers are tried in order and in a round-robin fashion until a valid response is received from one of the servers or until all the configured retry limits are reached. Options server-address Address of the RADIUS server. accounting-port port-number RADIUS server accounting port number. Range: 1 through 65,335 files Default: 1813 port port-number RADIUS server authentication port number. Range: 1 through 65,335 files Default: 1812 retry value Number of times that the router is allowed to attempt to contact a RADIUS server. Range: 1 through 10 Default: 3 secret password Password to use; it can include spaces if the character string is enclosed in quotation marks. max-outstanding-requests value Maximum number of outstanding requests in flight to server. Range: 1 through 65,335 files source-address source-address Valid IPv4 or IPv6 address configured on one of the router or switch interfaces. timeout seconds Amount of time to wait. 23

24 Junos OS Release 12.1X47 Feature Guide Range: 1 through 90 seconds Default: 3 seconds Required Privilege Level system To view this statement in the configuration. system-control To add this statement to the configuration. Chassis Cluster Encrypted Control Link on page 24 Encrypted Control Link Example: Configuring an SRX Series Services Gateway for the High-End as a Chassis Cluster on page 24 Understanding the Low-Impact ISSU Process on Devices in a Chassis Cluster on page 39 internal (Security IPsec) on page 43 request security internal-security-association refresh show chassis cluster interfaces show security internal-security-association Example: Configuring an SRX Series Services Gateway for the High-End as a Chassis Cluster This example shows how to set up basic active/passive chassis clustering on a high-end SRX Series device. Requirements on page 24 Overview on page 26 Configuration on page 28 Verification on page 36 Requirements Before you begin: You need two SRX5800 Services Gateways with identical hardware configurations, one MX240 edge router, and one EX8208 Ethernet Switch. Physically connect the two devices (back-to-back for the fabric and control ports) and ensure that they are the same models. Before the cluster is formed, you must configure control ports for each device, as well as assign a cluster ID and node ID to each device, and then reboot. When the system boots, both the nodes come up as a cluster. NOTE: Control port configuration is required for SRX5400, SRX5600, and SRX5800 devices. No control port configuration is needed for SRX1400, SRX3400, or SRX3600 devices. 24

25 Requirements To ensure secure login, configure the internal IPsec SA. When the internal IPsec is configured, IPsec-based rlogin and remote command (rcmd) are enforced, so an attacker cannot gain privileged access or observe traffic containing administrator commands and outputs. You do not need to configure the internal IPsec on both the nodes. When you commit the configuration, both nodes are synchronized. Only 3des-cbc encryption algorithm is supported. You must ensure that the manual encryption key is ASCII text and 24 bytes long; otherwise, the configuration will result in a commit failure. You have the option to enable the iked-encryption. The device must be rebooted after this option is configured. Enable the iked-encryption: user@host# set security ipsec internal security-association manual encryption ike-ha-link-encryption enable Enable the 3des-cbc encryption algorithm: user@host# set security ipsec internal security-association manual encryption algorithm 3des-cbc Configure the encryption key: user@host# set security ipsec internal security-association manual encryption key ascii-text "$9$x.CNwgDi.Qz6HqORhy8LjHqm5FREyrK8QFSeKMN- 24aUjqF39tu1mftOIhvMjHqf5FApBREy" NOTE: The existing control link access is enhanced to prevent hackers from logging in to the system without authentication through the control link because Telnet access is disabled. Using IPsec for internal communication between devices, the configuration information that passes through the chassis cluster link from the primary node to the secondary node is encrypted. Activate internal IPsec: user@host> request security internal-security-association refresh Use the show chassis cluster interfaces CLI command to verify that internal SA is enabled: user@host> show chassis cluster interfaces Control link status: Up Control interfaces: Index Interface Status Internal SA <- new column 0 em0 Up enabled 1 em1 Down enabled Configure the control port for each device, and commit the configuration. Select FPC 1/13, because the central point is always on the lowest SPC/SPU in the cluster (for this example, it is slot 0). For maximum reliability, place the control ports on a separate SPC from the central point (for this example, use the SPC in slot 1). You must enter the operational mode commands on both devices. For example: 25

26 Junos OS Release 12.1X47 Feature Guide On node 0: set chassis cluster control-ports fpc 1 port 0 user@host# set chassis cluster control-ports fpc 13 port 0 user@host# commit On node 1: user@host# set chassis cluster control-ports fpc 1 port 0 user@host# set chassis cluster control-ports fpc 13 port 0 user@host# commit Set the two devices to cluster mode. A reboot is required to enter into cluster mode after the cluster ID and node ID are set. You can cause the system to boot automatically by including the reboot parameter in the CLI command line. You must enter the operational mode commands on both devices. For example: On node 0: user@host> set chassis cluster cluster-id 1 node 0 reboot On node 1: user@host> set chassis cluster cluster-id 1 node 1 reboot The cluster ID is the same on both devices, but the node ID must be different because one device is node 0 and the other device is node 1. The range for the cluster ID is 1 through 255. Setting a cluster ID to 0 is equivalent to disabling a cluster. Cluster ID greater than 15 can only be set when the fabric and control link interfaces are connected back-to-back. Now the devices are a pair. From this point forward, configuration of the cluster is synchronized between the node members, and the two separate devices function as one device. Overview This example shows how to set up basic active/passive chassis clustering on a high-end SRX Series device. The basic active/passive example is the most common type of chassis cluster. The following high-end SRX Series devices are supported: SRX1400 SRX3400 SRX3600 SRX5400 SRX5600 SRX5800 The basic active/passive chassis cluster consists of two devices: One device actively provides routing, firewall, NAT, VPN, and security services, along with maintaining control of the chassis cluster. 26

27 Overview The other device passively maintains its state for cluster failover capabilities should the active device become inactive. NOTE: This active/passive mode example for the SRX5800 Services Gateway does not describe in detail miscellaneous configurations such as how to configure NAT, security policies, or VPNs. They are essentially the same as they would be for standalone configurations. See NAT Overview, Security Policies Overview, and VPN Overview. However, if you are performing proxy ARP in chassis cluster configurations, you must apply the proxy ARP configurations to the reth interfaces rather than the member interfaces because the RETH interfaces hold the logical configurations. See Configuring Proxy ARP (CLI Procedure). You can also configure separate logical interface configurations using VLANs and trunked interfaces in the SRX5800 Services Gateway. These configurations are similar to the standalone implementations using VLANs and trunked interfaces. Figure 1 on page 28 shows the topology used in this example. 27

28 Junos OS Release 12.1X47 Feature Guide Figure 1: Basic Active/Passive Chassis Clustering on a High-End SRX Series Device Topology Example Configuration CLI Quick Configuration To quickly configure this example, copy the following commands, paste them into a text file, remove any line breaks, change any details necessary to match your network configuration, copy and paste the commands into the CLI at the [edit] hierarchy level, and then enter commit from configuration mode. On {primary:node0 [edit] set interfaces fab0 fabric-options member-interfaces ge-11/3/0 set interfaces fab1 fabric-options member-interfaces ge-23/3/0 set groups node0 system host-name SRX set groups node0 interfaces fxp0 unit 0 family inet address /24 set groups node0 system backup-router destination /16 set groups node1 system host-name SRX set groups node1 interfaces fxp0 unit 0 family inet address /24 set groups node1 system backup-router destination /16 set apply-groups ${node 28

29 Configuration set chassis cluster reth-count 2 set chassis cluster redundancy-group 0 node 0 priority 129 set chassis cluster redundancy-group 0 node 1 priority 128 set chassis cluster redundancy-group 1 node 0 priority 129 set chassis cluster redundancy-group 1 node 1 priority 128 set interfaces xe-6/0/0 gigether-options redundant-parent reth0 set interfaces xe-6/1/0 gigether-options redundant-parent reth1 set interfaces xe-18/0/0 gigether-options redundant-parent reth0 set interfaces xe-18/1/0 gigether-options redundant-parent reth1 set interfaces reth0 redundant-ether-options redundancy-group 1 set interfaces reth0 unit 0 family inet address /24 set interfaces reth1 redundant-ether-options redundancy-group 1 set interfaces reth1 unit 0 family inet address /24 set chassis cluster redundancy-group 1 interface-monitor xe-6/0/0 weight 255 set chassis cluster redundancy-group 1 interface-monitor xe-6/1/0 weight 255 set chassis cluster redundancy-group 1 interface-monitor xe-18/0/0 weight 255 set chassis cluster redundancy-group 1 interface-monitor xe-18/1/0 weight 255 set chassis cluster control-link-recovery set security zones security-zone untrust interfaces reth0.0 set security zones security-zone trust interfaces reth1.0 set routing-options static route /0 next-hop set routing-options static route /8 next-hop To quickly configure an EX8208 Core Switch, copy the following commands and paste them into the CLI at the [edit] hierarchy level, and then enter commit from configuration mode. On {primary:node0 [edit] set interfaces xe-1/0/0 unit 0 family ethernet-switching port-mode access vlan members SRX5800 set interfaces xe-2/0/0 unit 0 family ethernet-switching port-mode access vlan members SRX5800 set interfaces vlan unit 50 family inet address /24 set vlans SRX5800 vlan-id 50 set vlans SRX5800 l3-interface vlan.50 set routing-options static route /0 next-hop /24 To quickly configure an MX240 edge router, copy the following commands and paste them into the CLI at the [edit] hierarchy level, and then enter commit from configuration mode. On {primary:node0 [edit] set interfaces xe-1/0/0 encapsulation ethernet-bridge unit 0 family bridge set interfaces xe-2/0/0 encapsulation ethernet-bridge unit 0 family bridge set interfaces irb unit 0 family inet address /24 set routing-options static route /8 next-hop set routing-options static route /0 next-hop (upstream router) set bridge-domains SRX5800 vlan-id X (could be set to none ) set bridge-domains SRX5800 domain-type bridge routing-interface irb.0 set bridge-domains SRX5800 domain-type bridge interface xe-1/0/0 set bridge-domains SRX5800 domain-type bridge interface xe-2/0/0 29

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring SRX Chassis Clusters for High Availability Modified: 2018-09-26 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Deployment Guide for SRX Series Services Gateways in Chassis Cluster Configuration

Deployment Guide for SRX Series Services Gateways in Chassis Cluster Configuration Deployment Guide for SRX Series Services Gateways in Chassis Cluster Configuration Version 1.2 June 2013 Juniper Networks, 2013 Contents Introduction... 3 Chassis Cluster Concepts... 4 Scenarios for Chassis

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks Release NCE 33 Modified: 2016-08-01 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring a Single SRX Series Device in a Branch Office Modified: 2017-01-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Junos Security. Chapter 11: High Availability Clustering Implementation

Junos Security. Chapter 11: High Availability Clustering Implementation Junos Security Chapter 11: High Availability Clustering Implementation 2012 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services Chapter Objectives After successfully

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Deploying Secure Multicast Market Data Services for Financial Services Environments Modified: 2016-07-29 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089

More information

A. Verify that the IKE gateway proposals on the initiator and responder are the same.

A. Verify that the IKE gateway proposals on the initiator and responder are the same. Volume: 64 Questions Question: 1 You need to configure an IPsec tunnel between a remote site and a hub site. The SRX Series device at the remote site receives a dynamic IP address on the external interface

More information

Configuring Dynamic VPN v2.0 Junos 10.4 and above

Configuring Dynamic VPN v2.0 Junos 10.4 and above Configuring Dynamic VPN v2.0 Junos 10.4 and above Configuring and deploying Dynamic VPNs (remote access VPNs) using SRX service gateways Juniper Networks, Inc. 1 Introduction Remote access VPNs, sometimes

More information

Junos Security. Chapter 4: Security Policies Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Junos Security. Chapter 4: Security Policies Juniper Networks, Inc. All rights reserved.  Worldwide Education Services Junos Security Chapter 4: Security Policies 2012 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services Chapter Objectives After successfully completing this chapter,

More information

QUICKSTART GUIDE FOR BRANCH SRX SERIES SERVICES GATEWAYS

QUICKSTART GUIDE FOR BRANCH SRX SERIES SERVICES GATEWAYS APPLICATION NOTE QUICKSTART GUIDE FOR BRANCH SRX SERIES SERVICES GATEWAYS Configuring Basic Security and Connectivity on Branch SRX Series Services Gateways Copyright 2009, Juniper Networks, Inc. Table

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Adding a New Routing Device to Your Network Modified: 2017-01-17 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

BRANCH SRX SERIES AND J SERIES CHASSIS CLUSTERING

BRANCH SRX SERIES AND J SERIES CHASSIS CLUSTERING APPLICATION NOTE BRANCH SRX SERIES AND J SERIES CHASSIS CLUSTERING Configuring Chassis Clusters on Branch SRX Series Services Gateways and J Series Services Routers Copyright 2012, Juniper Networks, Inc.

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Validated Reference - Business Edge Solution - Device R-10 Release 1.0 Published: 2014-03-31 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Deploying Scalable Services on an MX Series Router Acting as a Broadband Network Gateway Release NCE0062 Modified: 2017-01-24 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale,

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Dual-Stack Lite for IPv6 Access Release NCE0025 Modified: 2016-10-12 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Authentication and Enforcement Using SRX Series Services Gateways and Aruba ClearPass Policy Manager Modified: 2016-08-01 Juniper Networks, Inc. 1133 Innovation

More information

Configuring Security for the ML-Series Card

Configuring Security for the ML-Series Card 19 CHAPTER Configuring Security for the ML-Series Card This chapter describes the security features of the ML-Series card. This chapter includes the following major sections: Understanding Security, page

More information

Configuring Switch-Based Authentication

Configuring Switch-Based Authentication CHAPTER 7 This chapter describes how to configure switch-based authentication on the switch. Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack. This chapter consists

More information

User Role Firewall Policy

User Role Firewall Policy User Role Firewall Policy An SRX Series device can act as an Infranet Enforcer in a UAC network where it acts as a Layer 3 enforcement point, controlling access by using IP-based policies pushed down from

More information

version 10.2R3.10; Configuring Basic System Information system { domain-name foo.bar; time-zone America/New_York;

version 10.2R3.10; Configuring Basic System Information system { domain-name foo.bar; time-zone America/New_York; version 10.2R3.10; Configuring Cluster Groups groups { node0 { system { host-name hh-node0; interfaces { fxp0 { unit 0 { family inet { address 1.1.1.1/24; node1 { system { host-name th-node1; interfaces

More information

Juniper Exam JN0-696 Security Support, Professional (JNCSP-SEC) Version: 9.0 [ Total Questions: 71 ]

Juniper Exam JN0-696 Security Support, Professional (JNCSP-SEC) Version: 9.0 [ Total Questions: 71 ] s@lm@n Juniper Exam JN0-696 Security Support, Professional (JNCSP-SEC) Version: 9.0 [ Total Questions: 71 ] Question No : 1 Click the Exhibit button. 2 A customer has a problem connecting to an SRX Series

More information

Implementing Traffic Filters for IPv6 Security

Implementing Traffic Filters for IPv6 Security Implementing Traffic Filters for IPv6 Security Last Updated: November 14, 2011 This module describes how to configure Cisco IOS XE IPv6 traffic filter and firewall features for your Cisco networking devices.

More information

Junos Security. Chapter 3: Zones Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Junos Security. Chapter 3: Zones Juniper Networks, Inc. All rights reserved.   Worldwide Education Services Junos Security Chapter 3: Zones 2012 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services Chapter Objectives After successfully completing this chapter, you will be

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : JN0-633 Title : Security, Professional (JNCIP- SEC) Exam Vendor : Juniper Version : DEMO Get Latest & Valid JN0-633

More information

Implementing AutoVPN Network Design Using the SRX Series with ibgp as the Dynamic Routing Protocol

Implementing AutoVPN Network Design Using the SRX Series with ibgp as the Dynamic Routing Protocol APPLICATION NOTE Introduction to AutoVPN Implementing AutoVPN Network Design Using the SRX Series with ibgp as the Dynamic Routing Protocol Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Introduction...3

More information

JUNIPER JN0-342 EXAM QUESTIONS & ANSWERS

JUNIPER JN0-342 EXAM QUESTIONS & ANSWERS JUNIPER JN0-342 EXAM QUESTIONS & ANSWERS Number: JN0-342 Passing Score: 900 Time Limit: 120 min File Version: 43.4 http://www.gratisexam.com/ JUNIPER JN0-342 EXAM QUESTIONS & ANSWERS Exam Name: ER, Associate(JNCIA-ER)

More information

Configuring TACACS+ Finding Feature Information. Prerequisites for TACACS+

Configuring TACACS+ Finding Feature Information. Prerequisites for TACACS+ Finding Feature Information, page 1 Prerequisites for TACACS+, page 1 Information About TACACS+, page 3 How to Configure TACACS+, page 7 Monitoring TACACS+, page 16 Finding Feature Information Your software

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Active Flow Monitoring Version 9 Modified: 2017-01-18 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

Identity Firewall. About the Identity Firewall

Identity Firewall. About the Identity Firewall This chapter describes how to configure the ASA for the. About the, on page 1 Guidelines for the, on page 7 Prerequisites for the, on page 9 Configure the, on page 10 Monitoring the, on page 16 History

More information

Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+)

Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+) Finding Feature Information, page 1 Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), page 1 Information About TACACS+, page 3 How to Configure

More information

High Availability Synchronization PAN-OS 5.0.3

High Availability Synchronization PAN-OS 5.0.3 High Availability Synchronization PAN-OS 5.0.3 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Device Configuration... 4 Network Configuration... 9 Objects Configuration...

More information

Exam Questions JN0-633

Exam Questions JN0-633 Exam Questions JN0-633 Security, Professional (JNCIP-SEC) https://www.2passeasy.com/dumps/jn0-633/ 1.What are two network scanning methods? (Choose two.) A. SYN flood B. ping of death C. ping sweep D.

More information

How to configure IPSec VPN between a Cradlepoint router and a SRX or J Series Juniper router

How to configure IPSec VPN between a Cradlepoint router and a SRX or J Series Juniper router How to configure IPSec VPN between a Cradlepoint router and a SRX or J Series Juniper router Summary This article presents an example configuration of a Policy-Based site-to-site IPSec VPN tunnel between

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Managing Unintended Traffic Black-Hole Conditions in a T Series Router Modified: 2017-01-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000

More information

Configuring the JUNOS Software the First Time on a Router with a Single Routing Engine

Configuring the JUNOS Software the First Time on a Router with a Single Routing Engine Configuring the JUNOS Software the First Time on a Router with a Single Routing Engine When you turn on a router the first time, the JUNOS Software automatically boots and starts. You must enter basic

More information

Configuring Web-Based Authentication

Configuring Web-Based Authentication CHAPTER 42 This chapter describes how to configure web-based authentication. It consists of these sections: About Web-Based Authentication, page 42-1, page 42-5 Displaying Web-Based Authentication Status,

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0 BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web

More information

CONFIGURING AND DEPLOYING THE AX411 WIRELESS ACCESS POINT

CONFIGURING AND DEPLOYING THE AX411 WIRELESS ACCESS POINT APPLICATION NOTE CONFIGURING AND DEPLOYING THE AX411 WIRELESS ACCESS POINT Copyright 2009, Juniper Networks, Inc. 1 Table of Contents Introduction......................................................................................................3

More information

Configuring Authentication, Authorization, and Accounting

Configuring Authentication, Authorization, and Accounting Configuring Authentication, Authorization, and Accounting This chapter contains the following sections: Information About AAA, page 1 Prerequisites for Remote AAA, page 5 Guidelines and Limitations for

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring a Routing Matrix with a TX Matrix Plus Router in Mixed Mode Modified: 2016-12-13 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000

More information

Multiple Context Mode

Multiple Context Mode This chapter describes how to configure multiple security contexts on the Cisco ASA. About Security Contexts, page 1 Licensing for, page 12 Prerequisites for, page 13 Guidelines for, page 14 Defaults for,

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring RSVP-Signaled Point-to-Multipoint LSPs on Logical Systems Modified: 2017-01-18 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000

More information

DHCP Server RADIUS Proxy

DHCP Server RADIUS Proxy The Dynamic Host Configuration Protocol (DHCP) Server RADIUS Proxy is a RADIUS-based address assignment mechanism in which a DHCP server authorizes remote clients and allocates addresses based on replies

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Interconnecting a Layer 2 Circuit with a Layer 3 VPN Modified: 2017-01-19 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Fundamentals of Network Security v1.1 Scope and Sequence

Fundamentals of Network Security v1.1 Scope and Sequence Fundamentals of Network Security v1.1 Scope and Sequence Last Updated: September 9, 2003 This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document

More information

SRX als NGFW. Michel Tepper Consultant

SRX als NGFW. Michel Tepper Consultant SRX als NGFW Michel Tepper Consultant Firewall Security Challenges Organizations are looking for ways to protect their assets amidst today s ever-increasing threat landscape. The latest generation of web-based

More information

Configuring Web-Based Authentication

Configuring Web-Based Authentication CHAPTER 61 This chapter describes how to configure web-based authentication. Cisco IOS Release 12.2(33)SXH and later releases support web-based authentication. Note For complete syntax and usage information

More information

Configuring Dynamic VPN

Configuring Dynamic VPN Configuring Dynamic VPN Version 1.0 October 2009 JUNIPER NETWORKS Page 1 of 15 Table of Contents Introduction...3 Feature License...3 Platform support...3 Limitations...3 Dynamic VPN Example...3 Topology...4

More information

Junos Security (JSEC)

Junos Security (JSEC) Junos Security (JSEC) Course No: EDU-JUN-JSEC Length: 5 days Schedule and Registration Course Overview This five-day course covers the configuration, operation, and implementation of SRX Series Services

More information

Vendor: Juniper. Exam Code: JN Exam Name: JNCIA-JUNOS EXAM OBJECTIVES. Version: Demo

Vendor: Juniper. Exam Code: JN Exam Name: JNCIA-JUNOS EXAM OBJECTIVES. Version: Demo Vendor: Juniper Exam Code: JN0-101 Exam Name: JNCIA-JUNOS EXAM OBJECTIVES Version: Demo QUESTION 1 Which command is used to enable access to J-Web using HTTPS? A. set system remote-access profile https

More information

Table of Contents 1 AAA Overview AAA Configuration 2-1

Table of Contents 1 AAA Overview AAA Configuration 2-1 Table of Contents 1 AAA Overview 1-1 Introduction to AAA 1-1 Authentication 1-1 Authorization 1-1 Accounting 1-2 Introduction to ISP Domain 1-2 Introduction to AAA Services 1-3 Introduction to RADIUS 1-3

More information

J-series High Availability

J-series High Availability Application Note J-series High Availability Configuring and Deploying the J-series Chassis Cluster Feature Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408.745.2000

More information

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide SonicWALL 6.2.0.0 Addendum A Supplement to the SonicWALL Internet Security Appliance User's Guide Contents SonicWALL Addendum 6.2.0.0... 3 New Network Features... 3 NAT with L2TP Client... 3 New Tools

More information

EXAM - JN ACX, Specialist (JNCIS-ACX) Buy Full Product.

EXAM - JN ACX, Specialist (JNCIS-ACX) Buy Full Product. Juniper EXAM - JN0-740 ACX, Specialist (JNCIS-ACX) Buy Full Product http://www.examskey.com/jn0-740.html Examskey Juniper JN0-740 exam demo product is here for you to test the quality of the product. This

More information

SRX Chassis Cluster Upgrade with Minimal Downtime (v0.7)

SRX Chassis Cluster Upgrade with Minimal Downtime (v0.7) SRX Chassis Cluster Upgrade with Minimal Downtime (v0.7) Assume that node0 is the primary for control plane (RG0) and data plane (RG1+) and configured with high priority than the secondary node. On the

More information

Identity Firewall. About the Identity Firewall. This chapter describes how to configure the ASA for the Identity Firewall.

Identity Firewall. About the Identity Firewall. This chapter describes how to configure the ASA for the Identity Firewall. This chapter describes how to configure the ASA for the. About the, page 1 Guidelines for the, page 7 Prerequisites for the, page 9 Configure the, page 10 Collect User Statistics, page 19 Examples for

More information

L2TP Configuration. L2TP Overview. Introduction. Typical L2TP Networking Application

L2TP Configuration. L2TP Overview. Introduction. Typical L2TP Networking Application Table of Contents L2TP Configuration 1 L2TP Overview 1 Introduction 1 Typical L2TP Networking Application 1 Basic Concepts of L2TP 2 L2TP Tunneling Modes and Tunnel Establishment Process 4 L2TP Features

More information

Configuring Web-Based Authentication

Configuring Web-Based Authentication This chapter describes how to configure web-based authentication on the switch. It contains these sections: Finding Feature Information, page 1 Web-Based Authentication Overview, page 1 How to Configure

More information

Cisco Nexus 1000V for KVM Security Configuration Guide, Release 5.x

Cisco Nexus 1000V for KVM Security Configuration Guide, Release 5.x Cisco Nexus 1000V for KVM Security Configuration Guide, Release 5.x First Published: August 01, 2014 Last Modified: November 13, 2015 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Stateful NAT64 for Handling IPv4 Address Depletion Release NCE0030 Modified: 2017-01-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089

More information

Configuring TACACS+ About TACACS+

Configuring TACACS+ About TACACS+ This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on Cisco NX-OS devices. This chapter includes the following sections: About TACACS+,

More information

Flow Monitoring Feature Guide for EX9200 Switches

Flow Monitoring Feature Guide for EX9200 Switches Flow Monitoring Feature Guide for EX9200 Switches Modified: 2017-01-24 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, Junos, Steel-Belted

More information

Junos Security. Rob Cameron, Brad Woodberg, Patricio Giecco, O'REILLY. Tim Eberhard, andjames Quinn INFORMATIQNSBIBLIOTHEK UNIVERSITATSBIBLIOTHEK

Junos Security. Rob Cameron, Brad Woodberg, Patricio Giecco, O'REILLY. Tim Eberhard, andjames Quinn INFORMATIQNSBIBLIOTHEK UNIVERSITATSBIBLIOTHEK Junos Security Rob Cameron, Brad Woodberg, Patricio Giecco, Tim Eberhard, andjames Quinn TECHNISCHE INFORMATIQNSBIBLIOTHEK UNIVERSITATSBIBLIOTHEK HANNOVER O'REILLY Beijing Cambridge Farnham Kiiln Sebastopol

More information

Table of Contents 1 AAA Overview AAA Configuration 2-1

Table of Contents 1 AAA Overview AAA Configuration 2-1 Table of Contents 1 AAA Overview 1-1 Introduction to AAA 1-1 Authentication 1-1 Authorization 1-1 Accounting 1-2 Introduction to ISP Domain 1-2 Introduction to AAA Services 1-2 Introduction to RADIUS 1-2

More information

Maintenance Tasks CHAPTER

Maintenance Tasks CHAPTER CHAPTER 5 These topics describe the Maintenance tasks of Element Manager: Viewing Basic System Information, page 5-2 Configuring Basic System Information, page 5-3 Configuring Date and Time Properties,

More information

CBA850 3G/4G/LTE Wireless WAN Bridge Application Guide

CBA850 3G/4G/LTE Wireless WAN Bridge Application Guide CBA850 3G/4G/LTE Wireless WAN Bridge Application Guide Modified: 2016-06-06 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved.

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Access Control Configuration Guide Part number: 5998-2648 Software version: F1000-A-EI&F1000-S-EI: R3721 F5000: F3210 F1000-E: F3171 Firewall module: F3171 Document version: 6PW101-20120719

More information

CCNA Security 1.0 Student Packet Tracer Manual

CCNA Security 1.0 Student Packet Tracer Manual 1.0 Student Packet Tracer Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

VPN Auto Provisioning

VPN Auto Provisioning VPN Auto Provisioning You can configure various types of IPsec VPN policies, such as site-to-site policies, including GroupVPN, and route-based policies. For specific details on the setting for these kinds

More information

Junos Security Bundle, JSEC & AJSEC

Junos Security Bundle, JSEC & AJSEC Junos Security Bundle, JSEC & AJSEC COURSE OVERVIEW: This bundle combines JSEC & AJSEC at a discounted rate. Please Contact SLI to purchase this bundle. This five-day course covers the configuration, operation,

More information

ppp accounting through quit

ppp accounting through quit ppp accounting through quit ppp accounting, page 3 ppp authentication, page 5 ppp authentication ms-chap-v2, page 9 ppp authorization, page 11 ppp chap hostname, page 13 ppp chap password, page 15 ppp

More information

HP FlexFabric 5700 Switch Series

HP FlexFabric 5700 Switch Series HP FlexFabric 5700 Switch Series Security Command Reference Part number: 5998-6695 Software version: Release 2416 Document version: 6W100-20150130 Legal and notice information Copyright 2015 Hewlett-Packard

More information

Access Rules. Controlling Network Access

Access Rules. Controlling Network Access This chapter describes how to control network access through or to the ASA using access rules. You use access rules to control network access in both routed and transparent firewall modes. In transparent

More information

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version ACE Exam Question 1 of 50. Traffic going to a public IP address is being translated by your Palo Alto Networks firewall to your

More information

Managing External Identity Sources

Managing External Identity Sources CHAPTER 5 The Cisco Identity Services Engine (Cisco ISE) integrates with external identity sources to validate credentials in user authentication functions, and to retrieve group information and other

More information

Configuring RADIUS. Finding Feature Information. Prerequisites for RADIUS

Configuring RADIUS. Finding Feature Information. Prerequisites for RADIUS The RADIUS security system is a distributed client/server system that secures networks against unauthorized access. In the Cisco implementation, RADIUS clients run on Cisco devices and send authentication

More information

WiNG 5.x How-To Guide

WiNG 5.x How-To Guide WiNG 5.x How-To Guide Tunneling Remote Traffic using L2TPv3 Part No. TME-08-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola

More information

Configuring RADIUS Servers

Configuring RADIUS Servers CHAPTER 7 This chapter describes how to enable and configure the Remote Authentication Dial-In User Service (RADIUS), that provides detailed accounting information and flexible administrative control over

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Multichassis Link Aggregation on a QFX Series Switch Release NCE 64 Modified: 2016-08-01 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089

More information

Setting Up the Sensor

Setting Up the Sensor CHAPTER 4 This chapter provides information for setting up the sensor. This chapter contains the following sections: Understanding Initialization, page 4-1 Configuring Network Settings, page 4-1 Configuring

More information

DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0

DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0 DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any help,

More information

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet Interfaces. 2016 Cisco and/or its affiliates. All

More information

STRM Log Manager Administration Guide

STRM Log Manager Administration Guide Security Threat Response Manager STRM Log Manager Administration Guide Release 2010.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2011-10-10

More information

QoS: Per-Session Shaping and Queuing on LNS

QoS: Per-Session Shaping and Queuing on LNS QoS: Per-Session Shaping and Queuing on LNS First Published: February 28, 2006 The QoS: Per-Session Shaping and Queuing on LNS feature provides the ability to shape (for example, transmit or drop) or queue

More information

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager DEPLOYMENT GUIDE Version 1.1 DNS Traffic Management using the BIG-IP Local Traffic Manager Table of Contents Table of Contents Introducing DNS server traffic management with the BIG-IP LTM Prerequisites

More information

upgrade-mp through xlate-bypass Commands

upgrade-mp through xlate-bypass Commands CHAPTER 33 upgrade-mp To upgrade the maintenance partition software, use the upgrade-mp command. upgrade-mp {http[s]://[user:password@]server[:port]/pathname tftp[://server/pathname]} tftp http[s] server

More information

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide. Figure 9-1 Port Security Global Settings window

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide. Figure 9-1 Port Security Global Settings window 9. Security DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide Port Security 802.1X AAA RADIUS TACACS IMPB DHCP Server Screening ARP Spoofing Prevention MAC Authentication Web-based

More information

Operation Manual AAA RADIUS HWTACACS H3C S5500-EI Series Ethernet Switches. Table of Contents

Operation Manual AAA RADIUS HWTACACS H3C S5500-EI Series Ethernet Switches. Table of Contents Table of Contents Table of Contents... 1-1 1.1 AAA/RADIUS/HWTACACS Over... 1-1 1.1.1 Introduction to AAA... 1-1 1.1.2 Introduction to RADIUS... 1-3 1.1.3 Introduction to HWTACACS... 1-9 1.1.4 Protocols

More information

Configuring Web-Based Authentication

Configuring Web-Based Authentication This chapter describes how to configure web-based authentication on the switch. It contains these sections: Finding Feature Information, page 1 Web-Based Authentication Overview, page 1 How to Configure

More information

L2TP Network Server. LNS Service Operation

L2TP Network Server. LNS Service Operation This chapter describes the support for Layer 2 Tunneling Protocol (L2TP) Network Server (LNS) functionality on Cisco ASR 5500 chassis and explains how it is configured. The product Administration Guides

More information

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces. 2015 Cisco and/or its affiliates. All rights

More information

Example: Configuring a Policy-Based Site-to-Site VPN using J-Web

Example: Configuring a Policy-Based Site-to-Site VPN using J-Web Example: Configuring a Policy-Based Site-to-Site VPN using J-Web Last updated: 7/2013 This configuration example shows how to configure a policy-based IPsec VPN to allow data to be securely transferred

More information

Junos OS. IDP Series Appliance to SRX Series Services Gateway Migration Guide. Modified: Copyright 2017, Juniper Networks, Inc.

Junos OS. IDP Series Appliance to SRX Series Services Gateway Migration Guide. Modified: Copyright 2017, Juniper Networks, Inc. Junos OS IDP Series Appliance to SRX Series Services Gateway Migration Guide Modified: 2017-11-15 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Configuring NAT for IP Address Conservation

Configuring NAT for IP Address Conservation This module describes how to configure Network Address Translation (NAT) for IP address conservation and how to configure inside and outside source addresses. This module also provides information about

More information

Configuring RADIUS and TACACS+

Configuring RADIUS and TACACS+ 28 CHAPTER The authentication, authorization, and accounting (AAA) mechanism verifies the identity of, grants access to, and tracks the actions of users managing a switch. All Cisco MDS 9000 Family switches

More information

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved.  Worldwide Education Services Junos Security Chapter 8: IPsec VPNs 2012 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services Chapter Objectives After successfully completing this chapter, you will

More information

Configuring Security Features on an External AAA Server

Configuring Security Features on an External AAA Server CHAPTER 3 Configuring Security Features on an External AAA Server The authentication, authorization, and accounting (AAA) feature verifies the identity of, grants access to, and tracks the actions of users

More information

Finding Feature Information

Finding Feature Information This module describes how to configure Network Address Translation (NAT) for IP address conservation and how to configure inside and outside source addresses. This module also provides information about

More information

Test Accredited Configuration Engineer (ACE) Exam PAN OS 6.0 Version

Test Accredited Configuration Engineer (ACE) Exam PAN OS 6.0 Version Test Accredited Configuration Engineer (ACE) Exam PAN OS 6.0 Version ACE Exam Question 1 of 50. Which of the following statements is NOT True regarding a Decryption Mirror interface? Supports SSL outbound

More information

F5 BIG-IQ Centralized Management: Local Traffic & Network. Version 5.2

F5 BIG-IQ Centralized Management: Local Traffic & Network. Version 5.2 F5 BIG-IQ Centralized Management: Local Traffic & Network Version 5.2 Table of Contents Table of Contents BIG-IQ Local Traffic & Network: Overview... 5 What is Local Traffic & Network?... 5 Understanding

More information