Introduction Outline Preparation Set BIOS Passwords First Boot Procedures... 2

Size: px
Start display at page:

Download "Introduction Outline Preparation Set BIOS Passwords First Boot Procedures... 2"

Transcription

1 CTP Series Security Deployment Guide Release February 2012 TABLE OF CONTENTS Introduction... 2 Outline... 2 Preparation... 2 Set BIOS Passwords... 2 First Boot Procedures... 2 Configuration Actions While in Low Security Level Mode... 2 Periodic security actions... 3 Appendix B: Adding antivirus capability... 3 Appendix C: Installing Swatch... 4 UC APL Required Information... 8 Conditions Of Fielding... 8 Mitigation Strategies... 8 Juniper Networks, Inc. 1

2 Introduction This document outlines the procedure for configuring CTPOS 6.2 so that the system meets the JITC security specifications. The procedures outlined here assume that the system starts with a clean flash. Outline The procedures for configuring the CTP are as follows: Preparation Set BIOS passwords First boot procedures Configuration actions performed in low security mode Set the security level to high Configuration actions performed in high security mode Periodic actions during normal operation Preparation Gather the following information that will be needed for configuration: BIOS password Grub password Root password Network settings System administrator account name CTP administrator account name Auditor account name Set BIOS Passwords CTP2000 and CTP150 Series Systems 1. Connect a keyboard and monitor to the CTP150/CTP Reboot the CTP 3. Hit F2 on the CTP150/CTP2000 to access the BIOS 4. Hit Delete key on the CTP150/CTP2000 to access the BIOS 5. Go to the Security section 6. Set the Supervisor password 7. Set the User password 8. Save and Exit the BIOS First Boot Procedures When prompted, enter a password for root that meets JITC requirements (14 character with a minimum of 1 each upper case, lower case, numeral, and special character). Configure the network parameters. Configuration Actions While in Low Security Level Mode Log in as user ctp and, through menu >node operations > configure network settings. Then configure: Any additional IPv4 configurations. o A minimum of two Ethernet s are required, one for data traffic and one for management. Any required virtual IP addresses. Juniper Networks, Inc. 2

3 Any required VLAN s. Configure SNMP. Configure IP filtering to allow only the IP address of the CTPView web server(s). Enter the security profile menu [menu > node operations > Configure security profile]. Use root's password when prompted. Perform the following actions: 1. Set the password requirements. 14, 1, 1, 1, 1, 3 2. Add the system administrator, ctp administrator, and auditor accounts. Note, you will be prompted to setup a password for each user. 3. Configure remote logging if required. 4. Add the login banner as required. Example login banner: THIS IS A DEPARTMENT OF DEFENSE COMPUTER SYSTEM. THIS COMPUTER SYSTEM, INCLUDING ALL RELATED EQUIPMENT, NETWORKS, AND NETWORK DEVICES, SPECIFICALLY INCLUDING INTERNET ACCESS, ARE PROVIDED ONLY FOR AUTHORIZED US GOVERNMENT USE. DoD COMPUTER SYSTEMS MAY BE MONITORED FOR ALL LAWFUL PURPOSES, INCLUDING TO ENSURE THEIR USE IS AUTHORIZED, FOR MANAGEMENT OF THE SYSTEM, TO FACILITATE PROTECTION AGAINST UNAUTHORIZED ACCESS, AND TO VERIFY SECURITY PROCEDURES, SURVIVABILITY, AND OPERATIONAL SECURITY. MONITORING INCLUDES ACTIVE ATTACKS BY AUTHORIZED DoD ENTITIES TO TEST OR VERIFY THE SECURITY OF THIS SYSTEM. DURING MONITORING, INFORMATION MAY BE EXAMINED, RECORDED, COPIED, AND USED FOR AUTHORIZED PURPOSES. ALL INFORMATION, INCLUDING PERSONAL INFORMATION, PLACED ON OR SENT OVER THIS SYSTEM, MAY BE MONITORED. 5. Configure the management port to prohibit traffic forwarding between the management interface and all other interfaces. 6. Set the encrypted Grub password. As the user ctp, access the command line by typing ^C, then su to root. As user root: Add & configure the intrusion detection software (see appendix C). Add the antivirus software (see appendix B). Check /etc/sysconfig/iptables and make sure it s permissions are 644 if not then: o Changes the permissions: chmod 644 /etc/sysconfig/iptables o Verify it is changed o Backup the changes in Flash: Use backup command on CTP Box. As the system administrator, enter the security profile menu [menu > node operations > Configure security level] and perform the following actions: Set the security level to High Periodic security actions A system administrator must change the password for the ctp_cmd account at least once per year. Appendix B: Adding antivirus capability You can download the Vexira software at the following link: The procedure of installing the software on CTP is as following: Juniper Networks, Inc. 3

4 Prepare the CTP by making the /flash_local directory writable sudo mount LABEL=CTP_LOCAL -o remount -w sudo chmod 0777 /flash_local SCP package to the CTP scp vascan-for-ctp-ctpview-30aug2011.tgz Unpack the package into the directory "/" sudo tar -C / -xzvf /flash_local/vascan-for-ctp-ctpview-30aug2011.tgz Delete the package from the /flash_local directory [ctp_sa@n73]# sudo rm /flash_local/vascan-for-ctp-ctpview-30aug2011.tgz Restore the /flash_local directory to read-only again [ctp_sa@n73]# sudo chmod 0755 /flash_local [ctp_sa@n73]# sudo mount LABEL=CTP_LOCAL -o remount r Copying the package to flash [ctp_sa@n73]# backup Move to working directory [ctp_sa@n73]# cd /vascan linux-i386/ Execute scan [ctp_sa@n73]# sudo./vascan --quiet --thread=8 / Sample output vascan loader ( ) core ( ) vdb ( ) #sig: target was processed in 0:00:49 (hour:min:secs). Summary of completed scans files (total) 4926 in archives 213 mail parts 4 No virus has been found in the specified targets. Appendix C: Installing Swatch Obtain a copy of the Swatch software from Install Swatch on a LINUX Fedora Core 1 machine. To install, simply issue the following commands: perl Makefile.PL make make test make install make realclean Swatch installs just like a CPAN module. If you are not familiar with this process then you may want to read about it by issuing the command: man ExtUtils::MakeMaker Use the "perldoc" command if your "man" cannot find the document. Juniper Networks, Inc. 4

5 If you see messages like these: Warning: prerequisite Date::Calc 0 not found at (eval 1) line 219. Warning: prerequisite Date::Parse 0 not found at (eval 1) line 219. Warning: prerequisite File::Tail 0 not found at (eval 1) line 219. Warning: prerequisite Time::HiRes 1.12 not found at (eval 1) line 219. Then you need to install the CPAN module(s) that it doesn't find before you can use swatch. You can find these modules at search.cpan.org. Verify and/or set the permissions on the files listed below as shown: :46:42 etc/ :46:42 etc/rc.d/ :46:42 etc/rc.d/init.d/ -rwxr--r-- root/root :48:14 etc/rc.d/init.d/swatch :46:42 usr/ :46:42 usr/local/ :46:42 usr/local/etc/ -rw root/root :48:14 usr/local/etc/swatch.conf :46:42 usr/bin/ -rwx root/root :48:38 usr/bin/swatch :46:42 usr/lib/ :46:42 usr/lib/perl5/ :46:42 usr/lib/perl5/site_perl/ :46:42 usr/lib/perl5/site_perl/5.8.1/ :46:42 usr/lib/perl5/site_perl/5.8.1/auto/ :46:42 usr/lib/perl5/site_perl/5.8.1/auto/swatch/ :46:42 usr/lib/perl5/site_perl/5.8.1/auto/swatch/actions/ -r--r--r-- root/root :48:38 usr/lib/perl5/site_perl/5.8.1/auto/swatch/actions/autosplit.ix :46:42 usr/lib/perl5/site_perl/5.8.1/swatch/ -r--r--r-- root/root :53:22 usr/lib/perl5/site_perl/5.8.1/swatch/throttle.pm -r--r--r-- root/root :53:22 usr/lib/perl5/site_perl/5.8.1/swatch/threshold.pm -r--r--r-- root/root :53:22 usr/lib/perl5/site_perl/5.8.1/swatch/actions.pm README NOTE: Swatch is a third party application, and running swatch may adversely affect the operation of CTP functionality, including but not limited to circuits. This README only describes how to install & run Swatch, it does not imply that running Swatch has been fully tested by Juniper to ensure that Swatch does not impact CTP functionality, nor does it imply that the example Swatch configuration file is sufficient to detect an intrusion event. Because Swatch is a third party application, there is no support for configuring Swatch on a CTP. Support for Swatch is limited to this README. INTRODUCTION: The application Swatch is an intrusion detection system that watches log files for signature events. Which log messages trigger an event and what to do for each event are determined by the configuration file. See the Swatch man pages on-line for detailed information on the configuration file format. NOTE: CTPOS has no mail application. The example configuration file uses the command 'cmd L "swatch: $_"' to send the matched log entry to a remote syslog server (remote logging must be configured). Other commands that are useful include "echo" (echos the matched log entry to terminal- useful when debugging swatch.conf), "threshold" (useful for limiting the number of messages sent to syslog server), and "continue" (used to look for a second log entry before triggering an event). NOTE: Sending messages to a syslog server at a high rate may cause CTP circuit traffic interruptions. NOTE: There is no mechanism for Swatch to generate snmptraps. Juniper Networks, Inc. 5

6 The files listed must be included in the tar archive that they will copy to the CTP. The files must have the permissions & ownerships listed. Above are the files that must be included in the archive (archive named swatch tgz). Once installed on the FC1 machine you need to create a tar file from the files installed to install Swatch on the CTP. The archive can be named whatever you want. In this example the archive is swatch tgz: TYPE: tar czpvf swatch tgz <files listed above> PREPARE CTPOS for Swatch (see example below): copy the file swatch tgz to /tmp on the CTP. as root type: tar xzpvf /tmp/swatch tgz -C / backup EDIT CTP FILES: Edit the two CTP files below so they contain the information below. The two files specific to running on the CTP are etc/rc.d/init.d/swatch and usr/local/etc/swatch.conf. [builder@fc1 swatch]$ cat usr/local/etc/swatch.conf # Don't get into loop triggering on messages we generate... ignore /swatch:/ # Watch for users using su: watchfor /su\(pam_unix/ #echo exec /acorn/bin/cmd -L "swatch: $_" # watch for failed logins watchfor /PAM: Authentication failure/ #echo exec /acorn/bin/cmd -L "swatch: $_" # watch for attempted logins with unknown users watchfor /PAM: User not known/ #echo exec /acorn/bin/cmd -L "swatch: $_ [builder@fc1 swatch]$ cat etc/rc.d/init.d/swatch #!/bin/bash # # network Bring up/down swatch # # Source function library.. /etc/init.d/functions if [ $UID -ne 0 ]; then echo $" " echo $"You must be root to run this command" echo $" " exit 1 fi name="swatch" CONFIG_FILE="/usr/local/etc/swatch.conf" # Configuration file PROG="/usr/bin/swatch" # WATCH_FILES="/var/log/secure" # Which log files to watch PID_FILE="/var/run/swatch.pid" Juniper Networks, Inc. 6

7 SCRIPT_FILE="/root/.swatch" [ -f ${CONFIG_FILE} ] exit 0 [ -x ${PROG} ] exit 0 start() { if [ -f ${PID_FILE} ]; then echo "swatch is already running" exit 0 fi ${PROG} -c ${CONFIG_FILE} --daemon --use-cpan-file-tail -t ${WATCH_FILES} --pid-file ${PID_FILE} --dump-script ${SCRIPT_FILE} echo -n $"Starting $name: " /usr/bin/perl -- ${SCRIPT_FILE} & RETVAL=$? echo [ $RETVAL -eq 0 ] && touch /var/lock/subsys/$name return $RETVAL } stop() { echo -n $"Shutting down $name: " killproc ${PROG} RETVAL=$? echo [ -f /var/lock/subsys/$name ] && rm -f /var/lock/subsys/$name return $RETVAL } # See how we were called. case "$1" in start) start ;; stop) stop ;; restart) cd $CWD $0 stop $0 start ;; *) echo $"Usage: $0 {start stop restart}" exit 1 esac exit 0 MAKE INIT SCRIPTS: The last step is to make init script links (as root): cd /etc/rc.d/rc3.d && ln -s../init.d/swatch S98swatch cd /etc/rc.d/rc5.d && ln -s../init.d/swatch S98swatch cd /etc/rc.d/rc0.d && ln -s../init.d/swatch K04swatch cd /etc/rc.d/rc1.d && ln -s../init.d/swatch K04swatch cd /etc/rc.d/rc6.d && ln -s../init.d/swatch K04swatch backup OTHER: To start Swatch from the command line, as root: Juniper Networks, Inc. 7

8 /etc/init.d/swatch start To stop Swatch from the command line, as root: /etc/init.d/swatch stop To stop Swatch from running on startup: m cd /etc/rc.d/rc3.d && rm S98swatch cd /etc/rc.d/rc5.d && rm S98swatch backup UC APL Required Information Conditions Of Fielding When the system is deployed into an operational environment, the following security measures (at a minimum) must be implemented to ensure an acceptable level of risk for the site s Designated Accrediting Authority (DAA): a. The system must be incorporated in the site s PKI. If PKI is not incorporated, the following findings will be included in the site s architecture: DSN18.10 for CTPView Application (Juniper CTPView Network Management) NET0445 for CTPView Application (Juniper CTPView Network Management) b. The site must use a SysLog device for auditing purposes. c. IP forwarding is enabled between devices with a restrictive Access Control List (ACL). If the system is not deployed in this manner then the following findings will be included in the site s architecture: GEN for all CTP 150 s and CTP 2000 s d. The site must only use the web interface (CTPView platform) for management. If the solution is managed in any other way then the following findings will be applicable to the solution: DSN and DSN18.10 NET0445 e. The configuration must be in compliance with the Juniper CTP military-unique features deployment guide. f. The site must register the system in the Systems Networks Approval Process Database < as directed by the Defense IA/Security Accreditation Work Group (DSAWG) and Program Management Office. Mitigation Strategies None required. Juniper Networks, Inc. 8

9 Corporate and Sales Headquarters Juniper Networks, Inc North Mathilda Avenue Sunnyvale, CA USA Phone: 888.JUNIPER ( ) or Fax: APAC Headquarters Juniper Networks (Hong Kong) 26/F, Cityplaza One 1111 King s Road Taikoo Shing, Hong Kong Phone: Fax: EMEA Headquarters Juniper Networks Ireland Airside Business Park Swords, County Dublin, Ireland Phone: EMEA Sales: Fax: Copyright 2010 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Mon 2010 Juniper Networks, Inc. 9 CTPOS 6.2R1 Security Deployment Guide

Introduction Outline Preparation Set BIOS Passwords First Boot Procedures... 2

Introduction Outline Preparation Set BIOS Passwords First Boot Procedures... 2 CTP Series Security Deployment Guide Release 7.2R1 5 Feb 2016 TABLE OF CONTENTS Introduction... 2 Outline... 2 Preparation... 2 Set BIOS Passwords... 2 First Boot Procedures... 2 Configuration Actions

More information

Juniper Networks Certification Program

Juniper Networks Certification Program Juniper Networks Certification Program ecertificate Download and Print Instructions OVERVIEW Your JNCP ecertificates are now available in your user account on the Juniper Networks Learning Portal. Please

More information

QUICKSTART GUIDE FOR BRANCH SRX SERIES SERVICES GATEWAYS

QUICKSTART GUIDE FOR BRANCH SRX SERIES SERVICES GATEWAYS APPLICATION NOTE QUICKSTART GUIDE FOR BRANCH SRX SERIES SERVICES GATEWAYS Configuring Basic Security and Connectivity on Branch SRX Series Services Gateways Copyright 2009, Juniper Networks, Inc. Table

More information

JUNOS SCOPE SOFTWARE IP SERVICE MANAGER

JUNOS SCOPE SOFTWARE IP SERVICE MANAGER DATASHEET JUNOS SCOPE SOFTWARE IP SERVICE MANAGER Product Overview Product Description As service providers and enterprises evolve to meet the demands of their customer base, one key to success is the

More information

Secure Remote Access with Comprehensive Client Certificate Management

Secure Remote Access with Comprehensive Client Certificate Management APPLICATION NOTE SA Series SSL VPN Appliances and MultiFactor SecureAuth Solution Secure Remote Access with Comprehensive Client Certificate Management Copyright 2009, Juniper Networks, Inc. 1 Table of

More information

CONFIGURING THE CX111 FOR THE SSG SERIES

CONFIGURING THE CX111 FOR THE SSG SERIES APPLICATION NOTE CONFIGURING THE CX111 FOR THE SSG SERIES How to Configure the SSG Series for 3G Wireless WAN Termination Using the CX111 Cellular Broadband Data Bridge Copyright 2010, Juniper Networks,

More information

J-Care Agility Services Advanced Options

J-Care Agility Services Advanced Options J-Care Agility Services Advanced Options Focused Technical Support Services Description Table of Contents 1. Introduction...2 2. Eligibility and Purchasing...2 3. Service Features and Deliverable Description...2

More information

VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES

VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES APPLICATION NOTE VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES Configuring Secure SSL VPN Access in a VMware Virtual Desktop Environment Copyright 2010, Juniper Networks, Inc. 1 Table

More information

M120 Class-of-Service Behavior Analysis

M120 Class-of-Service Behavior Analysis Application Note M120 Class-of-Service Behavior Analysis An Overview of M120 Class-of-Service (CoS) Behavior with Notes on Best Practices and Design Considerations Juniper Networks, Inc. 1194 North Mathilda

More information

JUNOS SPACE ROUTE INSIGHT

JUNOS SPACE ROUTE INSIGHT DATASHEET JUNOS SPACE ROUTE INSIGHT Product Overview Junos Space Route Insight is designed for network engineers and operators who manage today s complex, mission critical enterprise and service provider

More information

WX CENTRAL MANAGEMENT SYSTEM

WX CENTRAL MANAGEMENT SYSTEM DATASHEET WX CENTRAL MANAGEMENT SYSTEM Product Overview When it comes to WAN optimization, visibility into the distributed enterprise is absolutely critical to understand how applications are performing,

More information

UPGRADING STRM TO R1 PATCH

UPGRADING STRM TO R1 PATCH UPGRADING STRM TO 2012.1.R1 PATCH RELEASE 2012.1 MARCH 2013 This Upgrade Guide provides information on the following: Before You Upgrade Clearing the Cache After You Upgrade Before You Upgrade Upgrade

More information

Coordinated Threat Control

Coordinated Threat Control Application Note Coordinated Threat Control Juniper Networks Intrusion Detection and Protection (IDP) and Secure Access SSL VPN Interoperability Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,

More information

CONFIGURING WEBAPP SECURE TO PROTECT AGAINST CREDENTIAL ATTACKS

CONFIGURING WEBAPP SECURE TO PROTECT AGAINST CREDENTIAL ATTACKS APPLICATION NOTE CONFIGURING WEBAPP SECURE TO PROTECT AGAINST CREDENTIAL ATTACKS Protect your Web Applications from Brute Force Credential Attacks Using WebApp Secure and Intrusion Deception Technology

More information

CTPView Management System

CTPView Management System CTPView Management System Security Deployment Guide Release 7.0R1 02 Dec 2014 TABLE OF CONTENTS Introduction... 5 Security Level... 6 Security Level Description for Web UI... 6 high... 6 Security Level

More information

Forwarding Logs Using Tail2Syslog. Release Security Threat Response Manager. Juniper Networks, Inc.

Forwarding Logs Using Tail2Syslog. Release Security Threat Response Manager. Juniper Networks, Inc. Security Threat Response Manager Release 2013.2 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2013-07-19 Copyright Notice Copyright 2013

More information

IMPLEMENTING A LAYER 2 ENTERPRISE INFRASTRUCTURE WITH VIRTUAL CHASSIS TECHNOLOGY

IMPLEMENTING A LAYER 2 ENTERPRISE INFRASTRUCTURE WITH VIRTUAL CHASSIS TECHNOLOGY IMPLEMENTATION GUIDE IMPLEMENTING A LAYER 2 ENTERPRISE INFRASTRUCTURE WITH VIRTUAL CHASSIS TECHNOLOGY Although Juniper Networks has attempted to provide accurate information in this guide, Juniper Networks

More information

Product Description. Product Overview DATASHEET

Product Description. Product Overview DATASHEET DATASHEET VGW Gateway Product Overview Juniper Networks vgw Gateway is a comprehensive virtualization security solution that includes integrated stateful inspection firewalling, intrusion detection, compliance

More information

Juniper Networks QFX3500

Juniper Networks QFX3500 Implementation Guide Juniper Networks QFX3500 Switch and QLogic Converged Network Implementation Guide Copyright 2012, Juniper Networks, Inc. 1 Table of Contents Introduction...3 Implementing Converged

More information

Juniper Networks CTPOS Release 7.0R1 Software Release Notes

Juniper Networks CTPOS Release 7.0R1 Software Release Notes Juniper Networks CTPOS Release 7.0R1 Software Release Notes Release 7.0R1 September 2014 Revision 2 These release notes accompany Release 7.0R1 of the CTPOS software. They describe device documentation

More information

Juniper Networks M Series and J Series Routers

Juniper Networks M Series and J Series Routers PRODUCT CATEGORY BROCHURE Juniper Networks M Series and J Series Routers Juniper Networks Enterprise Routers New Levels of Security, Availability, Predictable Performance, and Operations Agility for Today

More information

SOLUTION BROCHURE. Mobility Changes Everything

SOLUTION BROCHURE. Mobility Changes Everything SOLUTION BROCHURE Simply Connected The New Campus Network Mobility Changes Everything Simply Connected Vision The challenge of the new business network is expectations: Expectations of solving long-standing

More information

Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection.

Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection. TECHNICAL CONFIGURING iscsi AUGUST 2012 You can use a iscsi storage network in your STRM deployment. This document provides information on configuring and using iscsi devices with your deployment. Unless

More information

Cluster Upgrade. SRX Series Services Gateways for the Branch Upgrade Junos OS with Minimal Traffic Disruption and a Single Command APPLICATION NOTE

Cluster Upgrade. SRX Series Services Gateways for the Branch Upgrade Junos OS with Minimal Traffic Disruption and a Single Command APPLICATION NOTE APPLICATION NOTE Simple Chassis Cluster Upgrade SRX Series Services Gateways for the Branch Upgrade Junos OS with Minimal Traffic Disruption and a Single Command Copyright 2013, Juniper Networks, Inc.

More information

JUNIPER CARE SERVICES

JUNIPER CARE SERVICES DATASHEET SERVICES Product Overview Juniper Care Services provide rapid response from Juniper Networks technical service engineers and hardware replacement options that let you choose the right timing

More information

Product Description. Product Overview. Architecture and Key Components of the MAG Series Junos Pulse Gateways

Product Description. Product Overview. Architecture and Key Components of the MAG Series Junos Pulse Gateways DATASHEET MAG Series Junos Pulse Gateways Product Overview The challenge for today s technology leader is to build an infrastructure that provides easy, secure access to the corporate network for all workers

More information

Installing JSA Using a Bootable USB Flash Drive

Installing JSA Using a Bootable USB Flash Drive Juniper Secure Analytics Installing JSA Using a Bootable USB Flash Drive Release 2014.2 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published:

More information

IDP NetScreen-Security Manager Migration Guide

IDP NetScreen-Security Manager Migration Guide Intrusion Detection and Prevention IDP NetScreen-Security Manager Migration Guide Release 4.0r3 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Part

More information

Juniper Networks CTPOS Release 7.2R1 Software Release Notes

Juniper Networks CTPOS Release 7.2R1 Software Release Notes Juniper Networks CTPOS Release 7.2R1 Software Release Notes Release 7.2R1 5 February 2016 Revision 1 These release notes accompany Release 7.2R1 of the CTPOS software. They describe device documentation

More information

Intrusion Detection and Prevention Release Notes

Intrusion Detection and Prevention Release Notes Intrusion Detection and Prevention Release Notes Release 4.1r3 December 2008 Contents 1. Version Summary on page 2 2. New Features and Enhancements on page 2 3. Changes to Default Behavior on page 2 4.

More information

Intrusion Detection and Prevention Release Notes

Intrusion Detection and Prevention Release Notes Intrusion Detection and Prevention Release Notes Release 4.0r4 5-21-2007 Contents 1 Version Summary on page 2 2 New Features on page 2 3 Changes to Default Behavior on page 2 4 System Requirements on page

More information

EX2500 ETHERNET SWITCHES

EX2500 ETHERNET SWITCHES DATASHEET ETHERNET SWITCHES Product Overview The Juniper Networks line of Ethernet switches delivers a compact, powerful solution for high-density data center top-of-rack access switch deployments where

More information

Intrusion Detection and Prevention IDP 4.1r4 Release Notes

Intrusion Detection and Prevention IDP 4.1r4 Release Notes Intrusion Detection and Prevention IDP 4.1r4 Release Notes Build 4.1.134028 September 22, 2009 Revision 02 Contents Overview...2 Supported Hardware...2 Changed Features...2 IDP OS Directory Structure...2

More information

Course 55187B Linux System Administration

Course 55187B Linux System Administration Course Outline Module 1: System Startup and Shutdown This module explains how to manage startup and shutdown processes in Linux. Understanding the Boot Sequence The Grand Unified Boot Loader GRUB Configuration

More information

JUNIPER NETWORKS PRODUCT BULLETIN

JUNIPER NETWORKS PRODUCT BULLETIN PRODUCT BULLETIN JUNIPER NETWORKS PRODUCT BULLETIN Junos Pulse Mobile Security Suite 4.2 What s New for Enterprises and Service Providers Bulletin Date January 24, 2013 Bulletin Number 8000022 Applicable

More information

Product Description. Architecture and Key Components of the MAG Series Junos Pulse Gateways. Product Overview DATASHEET

Product Description. Architecture and Key Components of the MAG Series Junos Pulse Gateways. Product Overview DATASHEET DATASHEET MAG Series Junos Pulse Gateways Product Overview The challenge for today s technology leader is to build an infrastructure that provides accelerated, rolebased secure access to the corporate

More information

TRUSTED MOBILITY INDEX

TRUSTED MOBILITY INDEX TRUSTED MOBILITY INDEX Published May 2012 A GLOBAL STUDY INDEXING CONSUMER CONFIDENCE IN MOBILITY The mobile ecosystem of devices, services and networks is at a critical inflection point. While the mobile

More information

Restore Data. Release Juniper Secure Analytics. Juniper Networks, Inc.

Restore Data. Release Juniper Secure Analytics. Juniper Networks, Inc. Juniper Secure Analytics Release 2014.4 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2015-03-02 Copyright Notice Copyright 2015 Juniper

More information

Reconfigure Offboard Storage During a JSA Upgrade

Reconfigure Offboard Storage During a JSA Upgrade Juniper Secure Analytics Reconfigure Offboard Storage During a JSA Upgrade Release 2014.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published:

More information

System Architecture Overview for THE Juniper Networks SSG500 Line

System Architecture Overview for THE Juniper Networks SSG500 Line WHITE PAPER System Architecture Overview for THE Juniper Networks SSG500 Line Copyright 2009, Juniper Networks, Inc. Table of Contents Executive Summary...1 Introduction...1 The SSG500 Line...1 A Purpose-Built

More information

Linux Essentials Objectives Topics:

Linux Essentials Objectives Topics: Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives

More information

802.1X: Port-Based Authentication Standard for Network Access

802.1X: Port-Based Authentication Standard for Network Access WHITE PAPER 802.1X: Port-Based Authentication Standard for Network Access Control (NAC) A Secure, Strong and Flexible Framework for Network Access Control (NAC) Copyright 2010, Juniper Networks, Inc. Table

More information

Installation and Configuration Guide

Installation and Configuration Guide Installation and Configuration Guide h-series 800-782-3762 www.edgewave.com 2001 2011 EdgeWave Inc. (formerly St. Bernard Software). All rights reserved. The EdgeWave logo, iprism and iguard are trademarks

More information

Installation and Configuration Guide

Installation and Configuration Guide CYBERSECURITY, EVOLVED EdgeWave iprism Web Security Installation and Configuration Guide V8.0 15333 Avenue of Science, Suite 100 San Diego, CA 92128 Give us a call 1-855-881-2004 Send us an email: info@edgewave.com

More information

At course completion. Overview. Audience profile. Course Outline. : 55187B: Linux System Administration. Course Outline :: 55187B::

At course completion. Overview. Audience profile. Course Outline. : 55187B: Linux System Administration. Course Outline :: 55187B:: Module Title Duration : 55187B: Linux System Administration : 4 days Overview This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional

More information

Security Profiles for AMX Products

Security Profiles for AMX Products Security Profiles for AMX Products Configuring AMX devices for Installation Into a Secure Enviroment Version 1.2 AMX, LLC Document History Version Author(s) Description Date 1.0 Rick Gelling Initial distribution

More information

Exercise Sheet 2. (Classifications of Operating Systems)

Exercise Sheet 2. (Classifications of Operating Systems) Exercise Sheet 2 Exercise 1 (Classifications of Operating Systems) 1. At any given moment, only a single program can be executed. What is the technical term for this operation mode? 2. What are half multi-user

More information

"Charting the Course... MOC B: Linux System Administration. Course Summary

Charting the Course... MOC B: Linux System Administration. Course Summary Description Course Summary This four-day instructor-led course is designed to provide students with the necessary skills and abilities to work as a professional Linux system administrator. The course covers

More information

Technical Configuration Example

Technical Configuration Example Technical Configuration Example Feature Automation Script cpu-usage-60.slax View a chart of the CPU usage for the last 60 minutes Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA

More information

Network and Security Manager (NSM) Release Notes DMI Schema

Network and Security Manager (NSM) Release Notes DMI Schema Network and Security Manager (NSM) Release Notes DMI Schema Release version 233 ver 1.0, 09-06-2012 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net

More information

STRM Log Manager Administration Guide

STRM Log Manager Administration Guide Security Threat Response Manager STRM Log Manager Administration Guide Release 2010.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2011-10-10

More information

Product Description. Product Overview. Architecture and Key Components of the MAG Series Junos Pulse Gateways

Product Description. Product Overview. Architecture and Key Components of the MAG Series Junos Pulse Gateways DATASHEET MAG Series Junos Pulse Gateways Product Overview The challenge for today s technology leader is to build an infrastructure that provides easy, secure access to the corporate network for all workers

More information

CTPView Security Implementation Guide

CTPView Security Implementation Guide Table of Contents Introduction... 3 Configuring a New CTPView Server... 4 Default Password... 4 Change the BIOS Menu Password... 4 Change the Server s Root Account Password... 4 Change the GRUB Boot Loader

More information

Web Device Manager Guide

Web Device Manager Guide Juniper Networks EX2500 Ethernet Switch Web Device Manager Guide Release 3.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Part Number: 530-029704-01,

More information

NSM Plug-In Users Guide

NSM Plug-In Users Guide Security Threat Response Manager NSM Plug-In Users Guide Release 2010.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2010-11-16 Copyright

More information

J-series Advanced Switching Configuration

J-series Advanced Switching Configuration Application Note J-series Advanced Switching Configuration Configuring JUNOS Software Advanced Switching on J-series Services Routers Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California

More information

Network and Security Manager (NSM) Release Notes DMI Schema

Network and Security Manager (NSM) Release Notes DMI Schema Network and Security Manager (NSM) Release Notes DMI Schema Release version 223 ver 1.0, 3-1-2012 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Adding a New Routing Device to Your Network Modified: 2017-01-17 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

Industry Tested, Government-Certified

Industry Tested, Government-Certified DATASHEET Product Overview As the demand to enable users to work from anywhere, at anytime increases, so does the need for secure network accessibility and robust authentication. Mobility drives the need

More information

Please choose the best answer. More than one answer might be true, but choose the one that is best.

Please choose the best answer. More than one answer might be true, but choose the one that is best. Introduction to Linux and Unix - endterm Please choose the best answer. More than one answer might be true, but choose the one that is best. SYSTEM STARTUP 1. A hard disk master boot record is located:

More information

WHITE PAPER. Copyright 2010, Juniper Networks, Inc. 1

WHITE PAPER. Copyright 2010, Juniper Networks, Inc. 1 WHITE PAPER Virtual Chassis Technology on EX8200 Ethernet Switch Modular Platforms Copyright 2010, Juniper Networks, Inc. 1 Table of Contents Executive Summary........................................................................................................

More information

McAfee Network Security Platform Administration Course

McAfee Network Security Platform Administration Course McAfee Network Security Platform Administration Course Education Services administration course The McAfee Network Security Platform Administration course from McAfee Education Services is an essential

More information

. Fill in the Blank: A directory named mydir has just been... Points:10. Add Question Success: 64 questions added as a copy.

. Fill in the Blank: A directory named mydir has just been... Points:10. Add Question Success: 64 questions added as a copy. . Fill in the Blank: A directory named mydir has just been... Success: 64 questions added as a copy. A directory named mydir has just been created with the touch command. Nochmod commands have been issued

More information

Performing Administrative Tasks

Performing Administrative Tasks This chapter describes how to perform administrative tasks using Cisco CMX. Users who are assigned administration privileges can perform administrative tasks. Cisco CMX User Accounts, page 1 Backing Up

More information

OCTVQE Zaptel Echo Canceller (PRELIMINARY)

OCTVQE Zaptel Echo Canceller (PRELIMINARY) OCTVQE - Zaptel Echo Canceller User s Guide (Preliminary) OCTVQE Zaptel Echo Canceller (PRELIMINARY) User s Guide Revision 1.9 OctWare Inc. www.octware.net 4101, Molson St., Suite 300 Montreal Quebec H1Y

More information

7.3 Install on Linux and Initial Configurations

7.3 Install on Linux and Initial Configurations 7.3 Install on Linux and Initial Configurations This section describes how to install SoftEther VPN Server to a Linux operating system. This assumes that in the Linux operating system, no extra application

More information

Guest Access Made Easy

Guest Access Made Easy WHITE PAPER Guest Access Made Easy Juniper Networks Unified Access Control and EX Series Ethernet Switches Solve Today s NAC Problems Copyright 2009, Juniper Networks, Inc. Table of Contents Table of Figures

More information

Steel-Belted Radius Installation Instructions for EAP-FAST Security Patch

Steel-Belted Radius Installation Instructions for EAP-FAST Security Patch Security Patch Steel-Belted Radius Installation Instructions for EAP-FAST Security Patch Revision 0.5 22 September 2009 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA

More information

JUNOS SPACE. Product Description. Product Overview

JUNOS SPACE. Product Description. Product Overview DATASHEET JUNOS SPACE Product Overview Juniper Networks Junos Space is an open software platform designed for deploying and creating Juniperdeveloped, partner, and third-party applications. It consists

More information

Industry Tested, Government-Certified

Industry Tested, Government-Certified DATASHEET Product Overview As the demand to enable users to work from anywhere, at anytime increases, so does the need for secure network accessibility and robust authentication. Mobility drives the need

More information

WX Client. Product Description. Product Overview DATASHEET

WX Client. Product Description. Product Overview DATASHEET DATASHEET Client Product Overview The Client is a leading-edge, Windows-based WAN optimization software for mobile end users and small office/home office end users. The Client improves application response

More information

Deploying JSA in an IPV6 Environment

Deploying JSA in an IPV6 Environment Juniper Secure Analytics Deploying JSA in an IPV6 Environment Release 7.3.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2017-09-14

More information

NN Nortel Communication Server 1000 Linux Platform Base and Applications Installation and Commissioning

NN Nortel Communication Server 1000 Linux Platform Base and Applications Installation and Commissioning Linux Platform Base and Applications Installation and Commissioning Release: Release 5.5 Document Revision: 02.09 www.nortel.com NN43001-315. Release: Release 5.5 Publication: NN43001-315 Document release

More information

Partition Splitting. Release Juniper Secure Analytics. Juniper Networks, Inc.

Partition Splitting. Release Juniper Secure Analytics. Juniper Networks, Inc. Juniper Secure Analytics Release 2014.8 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2016-11-29 Copyright Notice Copyright 2016 Juniper

More information

Introduction to Linux

Introduction to Linux Introduction to Linux Mukesh Pund Principal Scientist, NISCAIR, New Delhi, India History In 1969, a team of developers developed a new operating system called Unix which was written using C Linus Torvalds,

More information

Clearswift SECURE Gateway Installation & Getting Started Guide. Version 4.3 Document Revision 1.0

Clearswift SECURE  Gateway Installation & Getting Started Guide. Version 4.3 Document Revision 1.0 Clearswift SECURE Email Gateway Installation & Getting Started Guide Version 4.3 Document Revision 1.0 Copyright Revision 1.1, March, 2016 Published by Clearswift Ltd. 1995 2016 Clearswift Ltd. All rights

More information

IBM SmartCloud Notes Security

IBM SmartCloud Notes Security IBM Software White Paper September 2014 IBM SmartCloud Notes Security 2 IBM SmartCloud Notes Security Contents 3 Introduction 3 Service Access 4 People, Processes, and Compliance 5 Service Security IBM

More information

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Review of the Linux File System and Linux Commands 1. Introduction Becoming adept at using the Linux OS requires gaining familiarity

More information

HPE Intelligent Management Center

HPE Intelligent Management Center HPE Intelligent Management Center EAD Security Policy Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with the TAM

More information

Installation Guide. Contents. Overview. Dell SonicWALL Advanced Reporting Installation Guide. Secure Remote Access. SonicOS

Installation Guide. Contents. Overview. Dell SonicWALL Advanced Reporting Installation Guide. Secure Remote Access. SonicOS Secure Remote Access SonicOS Contents Overview...1 Server Requirements...2 Licensing and Activation...2 Installing and Upgrading...4 Collecting Dell SonicWALL Aventail Access Logs...8 Initial Setup of

More information

Junos Pulse Mobile Security Dashboard

Junos Pulse Mobile Security Dashboard Junos Pulse Mobile Security Dashboard User Guide Release 4.1 October 2012 R1 Copyright 2012, Juniper Networks, Inc. . Junos Pulse Mobile Security Dashboard Juniper Networks, Inc. 1194 North Mathilda Avenue

More information

One Release. One Architecture. One OS. High-Performance Networking for the Enterprise with JUNOS Software

One Release. One Architecture. One OS. High-Performance Networking for the Enterprise with JUNOS Software Solution Brochure High-Performance Networking for the Enterprise with JUNOS Software Using the Network to Achieve Higher Availability, Lower OPEX and Improved Productivity for Your Business Core Branch

More information

Introduction to remote command line Linux. Research Computing Team University of Birmingham

Introduction to remote command line Linux. Research Computing Team University of Birmingham Introduction to remote command line Linux Research Computing Team University of Birmingham Linux/UNIX/BSD/OSX/what? v All different v UNIX is the oldest, mostly now commercial only in large environments

More information

MySQL Database Server Installation Guide for SAS Financial Management 5.3 SAS Human Capital Management 5.21 and SAS Strategy Management 5.

MySQL Database Server Installation Guide for SAS Financial Management 5.3 SAS Human Capital Management 5.21 and SAS Strategy Management 5. README MySQL Database Server Installation Guide for SAS Financial Management 5.3 SAS Human Capital Management 5.21 and SAS Strategy Management 5.4 MySQL Database Server 5.1.55 Enterprise Edition Installation

More information

Welcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions

Welcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions Welcome to getting started with Ubuntu 12.04 Server. This System Administrator Manual guide to be simple to follow, with step by step instructions with screenshots INDEX 1.Installation of Ubuntu 12.04

More information

CTPOS 6.6 Circuit Emulation Software Release Notes

CTPOS 6.6 Circuit Emulation Software Release Notes CTPOS 6.6 Circuit Emulation Software Release Notes Release 6.6R2 20 th June 2014 New Hardware: This release notes accompany Release 6.6R2 of the CTPOS Circuit Emulation software. This describe the enhancements,

More information

TECHNICAL WHITE PAPER. Using Stateless Linux with Veritas Cluster Server. Linux

TECHNICAL WHITE PAPER. Using Stateless Linux with Veritas Cluster Server. Linux TECHNICAL WHITE PAPER Using Stateless Linux with Veritas Cluster Server Linux Pranav Sarwate, Assoc SQA Engineer Server Availability and Management Group Symantec Technical Network White Paper Content

More information

Deploying STRM in an IPV6 Environment

Deploying STRM in an IPV6 Environment Security Threat Response Manager Release 2013.2 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2013-07-19 Copyright Notice Copyright 2013

More information

Wireless LAN. SmartPass Quick Start Guide. Release 9.0. Published: Copyright 2013, Juniper Networks, Inc.

Wireless LAN. SmartPass Quick Start Guide. Release 9.0. Published: Copyright 2013, Juniper Networks, Inc. Wireless LAN SmartPass Quick Start Guide Release 9.0 Published: 2013-07-14 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved.

More information

Course 144 Supplementary Materials. UNIX Fundamentals

Course 144 Supplementary Materials. UNIX Fundamentals Course 144 Supplementary Materials UNIX Fundamentals 1 Background to UNIX Command Fundamentals This appendix provides a overview of critical commands and concepts Prerequisite knowledge attendees should

More information

Getting Started with MySQL

Getting Started with MySQL A P P E N D I X B Getting Started with MySQL M ysql is probably the most popular open source database. It is available for Linux and you can download and install it on your Linux machine. The package is

More information

MULTISERVICE INTERFACE MICS FOR MX SERIES

MULTISERVICE INTERFACE MICS FOR MX SERIES DATASHEET MULTISERVICE INTERFACE MICS FOR MX SERIES Product Overview Juniper Networks MX Series 3D Universal Edge Routers provide industry-leading intelligence, flexibility and efficiency, and they are

More information

Juniper Secure Analytics Patch Release Notes

Juniper Secure Analytics Patch Release Notes Juniper Secure Analytics Patch Release Notes 2014.5 June 2015 2014.5.r1.20150605140117 patch resolves several known issues in Juniper Secure Analytics (JSA). Contents Installing 2014.5.r1 Patch..............................................

More information

Juniper Sky Enterprise

Juniper Sky Enterprise Juniper Sky Enterprise Product Overview Network complexity is growing exponentially. Traffic levels continue to rise thanks to the proliferation of mobile and Internet of Things (IoT) devices being connected

More information

SETTING UP A JSA SERVER

SETTING UP A JSA SERVER Juniper Secure Analytics SETTING UP A JSA SERVER Release 2014.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2014-03-14 Copyright Notice

More information

LPIC 102. be familiar with standard runlevels in a Linux system

LPIC 102. be familiar with standard runlevels in a Linux system LPIC 102 The boot process, init and runlevels 1 Aim After successfully working through this exercise, You will: be familiar with standard runlevels in a Linux system be able to rescue a system without

More information

Junos Pulse Mobile Security Dashboard

Junos Pulse Mobile Security Dashboard Junos Pulse Mobile Security Dashboard User Guide Release 3.2 March 2012 R1 Copyright 2012, Juniper Networks, Inc. . Junos Pulse Mobile Security Dashboard Juniper Networks, Inc. 1194 North Mathilda Avenue

More information

MITEL PERFORMANCE ANALYTICS

MITEL PERFORMANCE ANALYTICS MITEL PERFORMANCE ANALYTICS RELEASE 2.3 UPGRADE GUIDE NOTICE The information contained in this document is believed to be accurate in all respects but is not warranted by Mitel Networks Corporation (MITEL

More information

UNIFIED ACCESS CONTROL

UNIFIED ACCESS CONTROL PRODUCT CATEGORY BROCHURE UNIFIED ACCESS CONTROL Comprehensive Network Access Control Using the Network You Have Today Juniper Networks Unified Access Control is a comprehensive access control solution

More information

LING 408/508: Computational Techniques for Linguists. Lecture 5

LING 408/508: Computational Techniques for Linguists. Lecture 5 LING 408/508: Computational Techniques for Linguists Lecture 5 Last Time Installing Ubuntu 18.04 LTS on top of VirtualBox Your Homework 2: did everyone succeed? Ubuntu VirtualBox Host OS: MacOS or Windows

More information