User Role Firewall Policy

Size: px
Start display at page:

Download "User Role Firewall Policy"

Transcription

1 User Role Firewall Policy An SRX Series device can act as an Infranet Enforcer in a UAC network where it acts as a Layer 3 enforcement point, controlling access by using IP-based policies pushed down from the IC Series appliance. When deployed in a UAC network, an SRX Series device is called a Junos OS Enforcer. When implementing a User Role Firewall Policy, however, the SRX Series device uses the UAC network for user role authentication, but controls resource access with user role-based policies. Combining authentication with firewall services provides greater threat mitigation, more informative forensic resources, improved record archiving for regulatory compliance, and enhanced access provisioning than a firewall policy alone. This topic includes the following sections: Dynamic Authentication Provisioning on page 1 Authentication and Policy Lookup on page 2 Using Application Services on page 2 Using Resource Access Policy on page 3 Dynamic Authentication Provisioning An IC Series or MAG Series device acts as a relay of authentication information for the SRX Series device. The configuration is similar to an Infranet Enforcer. An authentication table contains entries with the source IP address and user roles of all users who have already successfully established a UAC session. (For details about setting up user roles, authentication and authorization servers, and authentication realms on the IC Series or MAG Series device, see the Unified Access Control Administration Guide.) Upon connection with the SRX Series device, the authentication table is pushed to the SRX where a mapping file is created from the table input. Whenever data is added, deleted, or changed, or when a new user is authenticated, the IC Series or MAG Series device refreshes its authentication table and pushes it to the SRX Series device again. The SRX Series device updates its file with the new content. If the SRX Series device drops a packet due to a missing authentication table entry, the device sends a message to the IC Series or MAG Series device, which in turn may provision a new authentication table entry and send it to the Junos OS Enforcer. This process is called dynamic authentication provisioning. A local authentication table is available on the SRX device for testing purposes and can be used to demonstrate how a user role firewall works without a live IC Series or MAG Series device. It can also be used as a backup solution when the IC Series or MAG Series device is not available. Third-party software is available to read IP/user/role mapping data from authentication source. It can be propagated to the SRX device using CLI commands. For authentication sources operating on users and groups, group is treated as role. 1

2 Authentication and Policy Lookup User role firewall policies authenticate the user role before policy lookup occurs. Authentication compares the source IP address to the authentication information received from the IC Series or MAG Series device. If the IP address is in the table, the user role is considered authenticated. The user role information associated with the IP address is then used for policy lookup. Policies are grouped by zone pair (from-zone and to-zone). Typically, a five-tuple match (source-ip, source-port, destination-ip, destination-port, and application) identifies the action to be taken for the matching traffic. A sixth tuple, source-identity, signifies a user role firewall policy. If the source-identity is specified for user role firewall policy within the zone pair, authentication is done before policy look up occurs. The source-identity is optional and is assumed to be if it is not configured in a policy. NOTE: For compatibility and increased performance, if none of the firewall policies within the zone-pair have the source-identity specified, only the first 5 tuples are matched. Possible match criteria for the source-identity are: Any user or role, as well as the keywords authenticated-user, unauthenticated-user, and unknown-user. authenticated-user All users and roles that have been authenticated. unauthenticated-user Any user or role that does not have an IP-address mapped to it and the authentication source is up and running (while the IC Series or MAG Series device is connected). unknown-user Any user or role that does not have an IP-address mapped to it and the authentication source is disconnected from the SRX device (if the IC Series or MAG Series device is disconnected). Using Application Services As with five-tuple matches, after a six-tuple match, policy lookup is terminal. This means that once a policy match is found, lookup ends. Matches are based on the order of the policy configuration. Therefore, the sequence of policies influences the resulting action. The following table shows a sequence of user role policy configurations for a single zone pair. Rule Name Source IP Dest IP Source Identity Application Action Services 2

3 Rule1 unauthenticated-user http permit UAC captive-portal Rule role2 http permit IDP Rule3 net2 authenticated-user http permit UTM Rule4 unknown-user permit Rule5 deny Rule1 matches HTTP traffic that does not have a matching entry in the authentication table. The action redirects the traffic to a captive portal on the IC Series or MAG Series device for authentication. The authentication table will be updated with the new authentication and further traffic from this IP address will be authenticated. Rule3 matches HTTP traffic that has been authenticated but is not role2. The configured UTM service will be provided. Rule 4 permits traffic that has not been able to be authenticated because of an IC Series or MAG Series device disconnect. An unauthenticated-user policy should be positioned before a policy for user. In the following table, Rule1 shadows Rule2. With this policy, an unauthenticated-user with a destination IP of will not be redirected for authentication. Instead, they will be permitted access to the network. Rule 2 should be moved before Rule1. Rule Name Source IP Dest IP Source Identity Application Action Services Rule http permit Rule2 unauthenticated-user http permit UAC captive-portal Using Resource Access Policy Resource access policies from the IC Series or MAG Series device are pushed to the SRX device, as in an Infranet Controller implementation. Access decisions, however, are based on policy services indicated in the matching rule. A UAC service must be specified in the user role firewall rule to follow the resource access policies pushed from the IC Series or MAG Series device. Rule Name Source IP Dest IP Source Identity Application Action Services Rule http permit UTM Rule2 net2 http permit IDP 3

4 Rule3 http permit UAC Related Documentation Junos OS Feature Support Reference for SRX Series and J Series Devices Junos OS CLI Reference for SRX Series and J Series Devices Published:

5 Example: Configuring a User Role AppFW Policy on an SRX Device This example implements user role authentication before an AppFW, UAC, or IDP policy is implemented. This implementation configures a MAG Series device to provide authentication. After authentication, the example demonstrates how application detection is used to identify a packet s origin, and to determine whether to permit or deny access to protected devices and networks. Requirements on page 1 Overview on page 1 Configuration on page 1 Verification on page 4 Requirements This example uses the following hardware and software components: MAG Series Junos Pulse Gateway device with software release 4.2 or greater An SRX Series device with Junos OS Release 12.1 or later Before you begin: Ensure that the SRX Series device has been configured and initialized. Configure the MAG Series device in a standard UAC deployment as specified in the Junos Pulse Access Control Service Administration Guide. Overview The following example configures the SRX device in four tasks: Connect the MAG Series device (MAG123). Set up the MAG Series device as the captive portal for unauthenticated users. Define an AppFW rule that allows specific users to access particular web sites while denying access to others. Create policies to apply the AppFW rule to specific authenticated users. Configuration To configure access to the SRX Series device from the MAG Series device, refer to Junos Pulse Access Control Service Administration Guide. Step-by-Step Procedure The following example requires you to navigate various levels in the configuration hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration Mode in the Junos OS CLI User Guide. Follow these steps to create a user role AppFW policy: 1. Configure the IP address and interface for the MAG Series device: 1

6 [edit] set services unified-access-control infranet-controller MAG123 address set services unified-access-control infranet-controller MAG123 interface fxp Specify the password for securing interaction between the MAG Series device and the SRX device: [edit] set services unified-access-control infranet-controller MAG123 password Srxandmag123 NOTE: The same password, in this case Srxandmag123, must be configured on the Access Control Service device to allow interaction between the devices. 3. If you are done configuring the SRX Series device, commit the configuration from configuration mode: [edit] commit 4. Verify that the Access Control Service device is connected. [edit] run show services unified-access-control status Host Address Port Interface State MAG fxp0.0 connected 5. Verify that the user roles have been pushed from the Access Control Service device to the SRX at connection time: show services unified-access-control roles Identifier Name users ftp-accessible http-mgmt-accessible peter ceo dev-abc 6. Set up the Access Control Service as a captive portal where unauthenticated traffic is to be redirected: [edit] user@host# set services unified-access-control captive-portal acs-device redirect-traffic unauthenticated-user 2

7 7. Enter the URL for the Access Control Service device or the default URL to be used as the captive portal. The following command specifies the default URL. [edit] set services unified-access-control captive-portal acs-device redirect-url MAG Configure the AppFW rule set rs1: [edit] set security application-firewall rule-sets rs1 [edit application-firewall rule-sets rs1] set rule r1 match dynamic-application [junos:facebook-access junos:google-talk junos:meebo] set rule r1 then permit set default-rule deny 9. Configure a policy to apply the rs1 application firewall rule set to authenticated user roles dev-abc, http-mgmt-accessible, and ftp-accessible: [edit] user@host# set security policies from-zone untrust to-zone trust policy user-role-fw1 match source-address user@host# set security policies from-zone untrust to-zone trust policy user-role-fw1 match destination-address user@host# set security policies from-zone untrust to-zone trust policy user-role-fw1 match application http user@host# set security policies from-zone untrust to-zone trust policy user-role-fw1 match source-identity [dev-abc http-mgmt-accessible ftp-accessible] user@host# set security policies from-zone untrust to-zone trust policy user-role-fw1 then permit application-services application-firewall rule-set rs1 NOTE: The source and destination ports in this example are inferred from the application http. Any standard HTTP port will match the port criteria. 10. Configure a policy to redirect all unauthenticated users to the MAG Series device for authentication: [edit] user@host# set security policies from-zone untrust to-zone trust policy user-role-fw2 match source-address user@host# set security policies from-zone untrust to-zone trust policy user-role-fw2 match destination-address user@host# set security policies from-zone untrust to-zone trust policy user-role-fw2 match application http user@host# set security policies from-zone untrust to-zone trust policy user-role-fw2 match source-identity unauthenticated-user user@host# set security policies from-zone untrust to-zone trust policy user-role-fw2 then permit application-services uac-policy captive-portal acs-device 3

8 NOTE: It is important to position the redirection policy for unauthenticated users before a policy for user so that the UAC authentication is not shadowed by a policy intended for users that cannot be authenticated. 11. Configure a policy to deny all other user roles. [edit] user@host# set security policies from-zone untrust to-zone trust policy user-role-fw3 match source-address user@host# set security policies from-zone untrust to-zone trust policy user-role-fw3 match destination-address user@host# set security policies from-zone untrust to-zone trust policy user-role-fw3 match application http user@host# set security policies from-zone untrust to-zone trust policy user-role-fw3 match source-identity user@host# set security policies from-zone untrust to-zone trust policy user-role-fw3 then deny Results Because the source-identity field has been defined for this policy, all traffic from the untrust zone to the trust zone matching the specified five tuples (source-address, source-port, destination-address, destination-port, and application) will be subject to user authentication before firewall policy lookup is conducted. Incoming traffic for the zone pair match is first compared against the local authentication table and the UIT pushed from the Access Control Service device. If the role is mapped to the user and source IP in one of the UITs, the traffic is specified as an authenticated-user. If the role is not mapped to the user role and IP in one of the tables, the traffic is specified as an unauthenticated-user. After UIT authentication, policy lookup begins. In this example, users with the role dev-abc, http-mgmt-accessible, or ftp-accessible match policy user-role-fw1 and the AppFW policy rs1 is applied. For an unauthenticated-user, policy user-role-fw2 is matched and traffic is redirected to the Access Control Service device for further authentication. All other user roles match policy user-role-fw3 and are denied access. Verification The following commands confirm the policy configuration, the sequence in which user role policies will be applied, as well as the configuration for the UAC captive portal and for the AppFW policy. Verifying the AppFW Rule Set Configuration on page 5 Verifying the Captive Portal Configuration on page 5 Verifying the User Role Policy Configurations on page 5 4

9 Verifying the AppFW Rule Set Configuration Purpose From the operational mode, enter the following command to verify that the AppFW rule set has been configured properly. Action [edit] show security application-firewall... rule-sets rs1 { rule r1 { match { dynamic-application [junos:facebook-access junos:google-talk junos:meebo] then { permit; default-rule { deny; Meaning The output shows that HTTP traffic from junos:facebook-access, junos:google-talk, and junos:meebo is permitted and all other traffic is denied. Verifying the Captive Portal Configuration Purpose From the operational mode, enter the following command to verify that the captive portal has been configured properly. Action [edit] user@host# show services... unified-access-control { captive-portal acs-device { redirect-traffic unauthenticated; Meaning The output shows that traffic with an unauthenticated user role will be redirected to the captive portal named acs-device for user role authentication. Verifying the User Role Policy Configurations Purpose Enter the following command to verify the content and sequence of the user role policies. Action [edit] user@host# show security policies... from-zone untrust to-zone trust { policy user-role-fw1 { match { 5

10 source-address ; destination-address ; application http; source-identity [dev-abc http-juniper-accessible ftp-accessible] then { permit { application-services { application-firewall { rule-set rs1 from-zone untrust to-zone trust { policy user-role-fw2 { match { source-address ; destination-address ; application http; source-identity unauthenticated then { permit { application-services uac-policy { captive-portal acs-device from-zone untrust to-zone trust { policy user-role-fw3 { match { source-address ; destination-address ; application http; source-identity then { deny Meaning In the output of the show security policies command, user role policies will be applied in the sequence displayed to all traffic matching the specified zone pair and the six tuples (source-address, source-port, destination-address, destination-port, application, and source-identity). Related Documentation Published:

11 source-identity Syntax source-identity [ role-name role-name ] Hierarchy Level [edit security from-zone zone-name to-zone zone-name policy policy-name match] Release Information Description Statement introduced in Release 12.1 of Junos OS. Identifies the user role match criteria for a policy. This option is used in user role authentication before policy lookup occurs. The source-identity is found in the local authentication table or in a UIT pushed to the SRX Series device from an authentication device. The source-identity and associated user and IP address in the table are compared to the values in the packet. A match signifies that the user has been authenticated. Required Privilege Level Related Documentation security To view this statement in the configuration. security-control To add this statement to the configuration. Junos OS Security Configuration Guide Published:

12 user-identification Syntax user-identification { authentication-source { local-authentication-table { disable; priority value; authentication-source unified-access-control { disable; priority value; Hierarchy Level [edit security] Release Information Description Statement introduced in Release 12.1 of Junos OS. Identifies one or more tables to be used as the source for user role authentication. Options local-authentication-table An authentication table created on the SRX Series device using the request security user-identification local-authentication-table add command. unified-access-control An authentication table pushed from a configured authentication device, such as the MAG Series Junos Pulse Gateway device. priority value A unique value between 1 and that determines the sequence for searching multiple tables to authenticate a user role. Each table is given a unique priority value. The lower the value, the higher the priority. A table with priority 120 is searched before a table with priority 200. The default priority value of the local-authentication-table is 100. The default priority value of the unified-access-control table is 200. disable Keyword used to disable a local authentication table or a unified access control table. Remove the keyword to re-enable the table. Required Privilege Level Related Documentation security To view this statement in the configuration. security-control To add this statement to the configuration. Junos OS Security Configuration Guide Published:

13 request security user-identification local-authorization-table add Syntax request security user-identification local-authorization-table add user user-name ip-address ip-address roles [role-name role-name] Release Information Command introduced in Junos OS Release Description In user role authentication, a user s role is first authenticated by entries in the local authentication table. If a user s role cannot be authenticated with this table, then secondary sources, such as a UIT device, can be used. A match of a user with a particular IP address and an acceptable role authenticates the user, verifying that the user is who he says he is. The user still must meet firewall policy authorization to obtain access to the protected device or network. Each authentication entry in the local authentication table specifies the user name, IP address, and a list of acceptable user roles. To add an authentication entry, enter the user name, the IP address, and up to 40 roles to be associated with this user. Subsequent commands for the same user and IP address aggregates new roles with the existing list. An authentication entry can contain up to 200 roles. NOTE: To change the user name of an entry or to remove or change entries in a role list, you must delete the existing entry and create a new one. An IP address can be associated with only one user. If a second request is made to add a different user using the same IP address, the second authentication entry overwrites the existing entry. Options user user-name Specify the name of the user to be added to the table. ip-address ip-address Specify the IP address of the user. roles role-name-list Specify the role or list of roles to be added to the table. If the specified user and IP address already exist, roles specified in the command are added to the existing role list. Required Privilege Level Related Documentation maintenance List of Sample Output request security user-identification local-authentication-table add on page 2 Output Fields When you enter this command, an entry is added to the local authentication table or the roles of an existing entry are aggregated with additional roles. 1

14 Sample Output request security user-identification local-authentication-table add request security user-identification local-authentication-table add user user1 ip-address roles role1 request security user-identification local-authentication-table add user user2 ip-address roles [role2 role3] request security user-identification local-authentication-table add user user2 ip-address roles role1 show security user-identification local-authentication-table all Total entries: 2 Ip-address: Username: user1 Roles: role1 Ip-address: Username: user2 Roles: role2, role3, role1 Published:

15 request security user-identification local-authentication-table delete Syntax request security user-identification local-authentication-table delete ip-address user-name Release Information Command introduced in Junos OS Release Description Remove an entry from the local authentication table. You can identify the entry by IP address or user-name. To change the user name of an entry or to remove or change entries in a role list, you must delete the existing entry and create a new one. Options ip-address The IP address of the entry to be deleted. user-name The user name of the entry to be deleted. To change the user name of an entry or to remove or change entries in a role list, you must delete the old entry and create a new one. Required Privilege Level Related Documentation maintenance Output Fields The specified show command verifies the table content before and after an entry has been deleted from the local authentication table. Sample Output user@host> show security user-identification local-authentication-table all Total entries: 2 Ip-address: Username: user1 Roles: role1 Ip-address: Username: user2 Roles: role2, role3, role1 user@host> request security user-identification local-authentication-table delete user@host> show security user-identification local-authentication-table all Total entries: 1 Ip-address: Username: user1 Roles: role1 Published:

16 clear security user-identification local-authentication-table Syntax clear security user-identification local-authentication-table Release Information Description Command introduced in release 12.1 of Junos OS. Remove all existing local authentication table entries. Required Privilege Level Related Documentation clear List of Sample Output clear security user-identification local-authentication-table on page 1 Output Fields When you enter this command, all entries are cleared from the local authentication table. Sample Output clear security user-identification local-authentication-table user@host> clear security user-identification local-authentication-table user@host> show security user-identification local-authentication-table all Total entries: 0 Published:

17 show security user-identification local-authentication-table Syntax show security user-identification local-authentication-table [ all ip-address ip-address role role-name start value count value user user-name] Release Information Description Command introduced in release 12.1 of Junos OS. Display the content of the local authentication table. all (Optional) All entries displayed from the beginning of the table or from the specified starting entry. count value (Optional) The total number of entries to display. ip-address ip-address (Optional) The IP address of the entry to display. role role-name (Optional) The role name of the entries to display. start value (Optional) The first entry to display. user user-name (Optional) The user name of the entry to display. Required Privilege Level Related Documentation view List of Sample Output show security user-identification local-authentication-table all on page 2 show security user-identification local-authentication-table ip-address on page 2 show security user-identification local-authentication-table start on page 2 show security user-identification local-authentication-table role on page 2 Output Fields Table 1 lists the output fields for the show security user-identification local-authentication-table command. Output fields are listed in the approximate order in which they appear. Table 1: show security user-identification local-authentication-table Output Fields Field Name Field Description Total entries The number of entries in the table. IP address IP address of the associated user. NOTE: Only one user can be associated with an IP address. Username User associated with the specified IP address. Roles A comma-separated list of all roles associated with this IP address and user. 1

18 Sample Output show security user-identification local-authentication-table all show security user-identification local-authentication-table all Total entries: 4 Ip-address: Username: user1 Roles: role1 Ip-address: Username: user2 Roles: role2, role3, role1 Ip-address: Username: user3 Roles: role2, role3 Ip-address: Username: user2 Roles: role2, role3 Sample Output show security user-identification local-authentication-table ip-address user@host> show security user-identification local-authentication-table ip-address Ip-address: Username: user2 Roles: role2, role3, role1 Sample Output show security user-identification local-authentication-table start user@host> show security user-identification local-authentication-table start 2 count 2 Total entries: 2 Ip-address: Username: user2 Roles: role2, role3, role1 Ip-address: Username: user3 Roles: role2, role3 show security user-identification local-authentication-table role user@host> show security user-identification local-authentication-table role qa3456 Total entries: 3 Ip-address: Username: dev-grp-3 Roles: qa432, qa3456, qa84, qa794 Ip-address: Username: dev-qa Roles: qa3456, qa3985, qa23 Ip-address: Username: brandall Roles: qa3456 Published:

19 show services user-access-control roles Syntax Release Information Description show services user-access-control roles Command introduced in release 12.1 of Junos OS. When implementing user role firewall policies, display a summary of the roles that have been pushed to the SRX Series device from the MAG Series device. Required Privilege Level Related Documentation view List of Sample Output show services user-access-control roles on page 1 Output Fields Table 1 lists the output fields for the show security user-identification local-authentication-table command. Output fields are listed in the approximate order in which they appear. Table 1: show security user-identification local-authentication-table Output Fields Field Name Field Description Identifier Unique identifier for a user role. Name Name of the associated user role. Total Total number of user roles specified in the table. Sample Output show services user-access-control roles user@host> show services user-access-control roles Identifier Name Users Employees Total: 2 Published:

20 show security match-policies Syntax show security match-policies from-zone zone-name to-zone zone-name source-ip ip-address destination-ip ip-address source-identity role-name source-port port-number destination-port port-number protocol protocol-name protocol-number result-count number Release Information Description Command introduced in Release 10.3 of Junos OS. Command updated in Release 10.4 of Junos OS. Updated with source-identity in Release 12.1 of Junos OS. The show security match-policies command allows you to troubleshoot traffic problems using the match criteria: source port, destination port, source IP address, destination IP address, and protocol. For example, if your traffic is not passing because either an appropriate policy is not configured or the match criteria is incorrect, then the show security match-policies command allows you to work offline and identify where the problem actually exists. It uses the search engine to identify the problem and thus enables you to use the appropriate match policy for the traffic. The result-count option specifies how m policies to display. The first enabled policy in the list is the policy that is applied to all matching traffic. Other policies below it are shadowed by the first and are never encountered by matching traffic. NOTE: The show security match-policies command is applicable only to security policies; IDP policies are not supported. Options from-zone from-zone Name or ID of the source zone of the traffic. to-zone to-zone Name or ID of the destination zone of the traffic. source-ip source-ip Source IP address of the traffic destination-ip destination-ip Destination IP address of the traffic. source-identity role-name Source role name of the traffic. Only one role can be specified. source-port source-port Source port number of the traffic. Range is 1 through 65,535. destination-port destination-port Destination port number of the traffic. Range is 1 through 65,535 protocol protocol-name protocol-number Protocol name or numeric value of the traffic. 1

21 ah or 51 egp or 8 esp or 50 gre or 47 icmp or 1 igmp or 2 igp or 9 ipip or 94 ipv6 or 41 ospf or 89 pgm or 113 pim or 103 rdp or 27 rsvp or 46 sctp or 132 tcp or 6 udp or 17 vrrp or 112 result-count number (Optional) The number of policy matches to display. Valid range is from 1 through 16. The default value is 1. Required Privilege Level Related Documentation view clear security policies statistics List of Sample Output Example 1: show security match-policies on page 4 Example 2: show security match policies... result-count on page 4 Example 3: show security match policies... source-identity on page 4 Output Fields Table 1 lists the output fields for the show security match-policies command. Output fields are listed in the approximate order in which they appear. 2

22 Table 1: show security match-policies Output Fields Field Name Field Description Policy: Name of the applicable policy. Action or Action-type: The action to be taken for traffic that matches the policy s match criteria. Actions include the following: permit firewall-authentication tunnel ipsec-vpn vpn-name pair-policy pair-policy-name source-nat pool pool-name pool-set pool-set-name interface destination-nat name deny reject State: Status of the policy: enabled: The policy can be used in the policy lookup process, which determines access rights for a packet and the action taken in regard to it. disabled: The policy cannot be used in the policy lookup process, and therefore it is not available for access control. Index: An internal number associated with the policy. Sequence number: Number of the policy within a given context. For example, three policies that are applicable in a from-zonea-to-zoneb context might be ordered with sequence numbers 1, 2, and 3. Also, in a from-zonec-to-zoned context, four policies might have sequence numbers 1, 2, 3, and 4. From zone: Name of the source zone. To zone: Name of the destination zone. Source addresses: The names and corresponding IP addresses of the source addresses for a policy. Address sets are resolved to their individual address name-ip address pairs. Destination addresses: The names and corresponding IP addresses of the destination addresses (or address sets) for a policy as entered in the destination zone s address book. A packet s destination address must match one of these addresses for the policy to apply to it. Application Name of a preconfigured or custom application, or if no application is specified. IP protocol: Numeric value for the IP protocol used by the application, such as 6 for TCP or 1 for ICMP. ALG: If an ALG is associated with the session, the name of the ALG. Otherwise, 0. Inactivity timeout: Elapsed time without activity after which the application is terminated. 3

23 Table 1: show security match-policies Output Fields (continued) Field Name Field Description Source-port range: Range of matching source ports defined in the policy. Destination-port range: Range of matching destination ports defined in the policy. Source identities Rules defined in the matching policy. Sample Output Example 1: show security match-policies show security match-policies from-zone z1 to-zone z2 source-ip destination-ip source-port 1 destination-port 21 protocol tcp Policy: p1, action-type: permit, State: enabled, Index: 4 Sequence number: 1 From zone: z1, To zone: z2 Source addresses: a2: /16 a3: /32 Destination addresses: d2: /16 d3: /32 Application: junos-ftp IP protocol: tcp, ALG: ftp, Inactivity timeout: 1800 Source port range: [0-0] Destination port range: [21-21] Example 2: show security match policies... result-count user@host> show security match-policies source-ip destination-ip source_port 1004 destination_port 80 protocol tcp result_count 5 Policy: p1, action-type: permit, State: enabled, Index: 4 Sequence number: 1 From zone: zone-a, To zone: zone-b Source addresses: sa1: /16 Destination addresses: da5: /16 Application: IP protocol: 1, ALG: 0, Inactivity timeout: 0 Source port range: [ ] Destination port range: [80-80] Policy: p15, action-type: deny, State: enabled, Index: 18 Sequence number: 15 From zone: zone-a, To zone: zone-b Source addresses: sa11: /32 Destination addresses: da15: /32 Application: IP protocol: 1, ALG: 0, Inactivity timeout: 0 Source port range: [ ] Destination port range: [80-80] Example 3: show security match policies... source-identity user@host> show security match-policies from-zone untrust to-zone trust source-ip destination-ip destination_port 21 protocol 6 source-port 1234 source-identity role1 4

24 Policy: p1, action-type: permit, State: enabled, Index: 40 Policy Type: Configured Sequence number: 1 From zone: untrust, To zone: trust Source addresses: a1: /8 Destination addresses: d1: /8 Application: junos-ftp IP protocol: tcp, ALG: ftp, Inactivity timeout: 1800 Source port range: [0-0] Destination port range: [21-21] Source identities: role1 role2 role3 role4 Per policy TCP Options: SYN check: No, SEQ check: No Published:

25 Security Configuration Statement Hierarchy Use the statements in the security configuration hierarchy to configure actions, certificates, dynamic virtual private networks (VPNs), firewall authentication, flow, forwarding options, group VPNs, Intrusion Detection Prevention (IDP), Internet Key Exchange (IKE), Internet Protocol Security (IPsec), logging, Network Address Translation (NAT), public key infrastructure (PKI), policies, resource manager, rules, screens, secure shell known hosts, trace options, Unified Threat Management (UTM), and zones. Statement descriptions that are exclusive to the Juniper Networks devices running Junos OS are described in this section. security { address-book [book-name global] { address address-name (ip-prefix dns-name dns-address-name wildcard-address ipv4 address/wildcard-mask); address-set address-set-name { address address-name; address-set address-set-name; attach { zone zone-name ; alarms { audible; potential-violation { authentication failures; cryptographic-self-test; encryption-failures{ threshold failures; key-generation-self-test; non-cryptographic-self-test; idp; decryption-failures { threshold failures; encryption-failures { threshold failures; ike-phase1-failures { threshold failures; ike-phase2-failures { threshold failures; policy { source-ip { threshold failure; duration interval; size count; destination-ip { 1

26 ca-profile ca-profile-name { administrator { -address -address; ca-identity ca-identity; routing-instance routing-instance-name; enrollment { retry number; retry-interval seconds ; url url-name; revocation-check { crl { disable { on-download-failure; refresh-interval hours; url url-name; disable; traceoptions { file filename <files number> <match regular-expression> <size maximum-file-size> <world-readable no-world-readable>; flag flag; policies { default-policy { (deny-all permit-all); from-zone zone-name to-zone zone-name { policy policy-name { match { application [application-name-or-set]; destination-address { address-name ; source-address { address-name ; source-identity role-name; scheduler-name scheduler-name; source-identity [source-name source-name]; then { count { alarm { per-minute-threshold number; per-second-threshold number; (deny reject); 30

27 permit { application-services { application-firewall { rule-set rule-set-name; application-traffic-control { rule-set ruleset-name; uac-policy { captive-portal url-name; destination-address { drop-translated; drop-untranslated; firewall-authentication { pass-through { access-profile profile-name; client-match match-name; web-redirect; web-authentication { client-match user-or-group; tcp-options { sequence-check-required; syn-check-required; tunnel { ipsec-group-vpn group-vpn; ipsec-vpn vpn-name; pair-policy pair-policy; log { session-close; session-init; policy-rematch; traceoptions { file filename <files number> <match regular-express> <size maximum-file-size> <world-readable no-world-readable>; flag flag; screen { ids-option screen-name{ alarm-without-drop; icmp { flood { threshold number; 31

28 fragment; ip-sweep { threshold number; large; ping-death; ip { bad-option; block-frag; loose-source-route-option; record-route-option; security-option; source-route-option; spoofing; stream-option; strict-source-route-option; tear-drop; timestamp-option; unknown-protocol; limit-session { destination-ip-based number; source-ip-based number; tcp { fin-no-ack; land; port-scan { threshold number; syn-ack-ack-proxy { threshold number; syn-fin; syn-flood { alarm-thresholdnumber; attack-thresholdnumber; destination-threshold number; source-threshold number; timeout seconds; syn-frag; tcp-no-flag; tcp-sweep { threshold number; winnuke; udp { flood { threshold number; udp-sweep { threshold number; 32

29 traceoptions { file filename <files number> <match regular-expression> <size maximum-file-size> <world-readable no-world-readable>; flag flag; ssh-known-hosts { fetch-from-server fetch-from-server; host hostname { dsa-key base64-encoded-dsa-key; rsa-key base64-encoded-dsa-key; rsa1-key base64-encoded-dsa-key; load-key-file key-file; traceoptions { file filename { <files number>; <match regular-expression>; <size maximum-file-size>; <world-readable no-world-readable>; flag flag; no-remote-trace; rate-limit rate; user-identification { authentication-source { local-authentication-table (disable priority value); unified-access-control (disable priority value); traceoptions { file filename; flag all; utm { custom-objects { filename-extension { value [list]; mime-pattern { value [list]; custom-url-category { value [list]; protocol-command { value [list]; url-pattern { value [list]; 33

Junos Security. Chapter 4: Security Policies Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Junos Security. Chapter 4: Security Policies Juniper Networks, Inc. All rights reserved.  Worldwide Education Services Junos Security Chapter 4: Security Policies 2012 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services Chapter Objectives After successfully completing this chapter,

More information

Juniper Exam JN0-696 Security Support, Professional (JNCSP-SEC) Version: 9.0 [ Total Questions: 71 ]

Juniper Exam JN0-696 Security Support, Professional (JNCSP-SEC) Version: 9.0 [ Total Questions: 71 ] s@lm@n Juniper Exam JN0-696 Security Support, Professional (JNCSP-SEC) Version: 9.0 [ Total Questions: 71 ] Question No : 1 Click the Exhibit button. 2 A customer has a problem connecting to an SRX Series

More information

Junos Security. Chapter 3: Zones Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Junos Security. Chapter 3: Zones Juniper Networks, Inc. All rights reserved.   Worldwide Education Services Junos Security Chapter 3: Zones 2012 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services Chapter Objectives After successfully completing this chapter, you will be

More information

This article explains how to configure NSRP-Lite for a NS50 firewall to a single WAN.

This article explains how to configure NSRP-Lite for a NS50 firewall to a single WAN. This article explains how to configure NSRP-Lite for a NS50 firewall to a single WAN. Requirements: When configuring NSRP-Lite for the NS-50, confirm the following necessary requirements: The NS-25 or

More information

Pulse Policy Secure. Getting Started Guide. Product Release 5.1. Document Revision 1.0 Published:

Pulse Policy Secure. Getting Started Guide. Product Release 5.1. Document Revision 1.0 Published: Pulse Policy Secure Getting Started Guide Product Release 5.1 Document Revision 1.0 Published: 2014-12-15 2014 by Pulse Secure, LLC. All rights reserved Pulse Secure, LLC 2700 Zanker Road, Suite 200 San

More information

SRX als NGFW. Michel Tepper Consultant

SRX als NGFW. Michel Tepper Consultant SRX als NGFW Michel Tepper Consultant Firewall Security Challenges Organizations are looking for ways to protect their assets amidst today s ever-increasing threat landscape. The latest generation of web-based

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

Configuring Dynamic VPN v2.0 Junos 10.4 and above

Configuring Dynamic VPN v2.0 Junos 10.4 and above Configuring Dynamic VPN v2.0 Junos 10.4 and above Configuring and deploying Dynamic VPNs (remote access VPNs) using SRX service gateways Juniper Networks, Inc. 1 Introduction Remote access VPNs, sometimes

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0 BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web

More information

Juniper Exam JN0-314 Junos Pulse Access Control, Specialist (JNCIS-AC) Version: 7.0 [ Total Questions: 222 ]

Juniper Exam JN0-314 Junos Pulse Access Control, Specialist (JNCIS-AC) Version: 7.0 [ Total Questions: 222 ] s@lm@n Juniper Exam JN0-314 Junos Pulse Access Control, Specialist (JNCIS-AC) Version: 7.0 [ Total Questions: 222 ] Topic 1, Volume A Question No : 1 - (Topic 1) A customer wants to create a custom Junos

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Attack Protection Configuration Guide Part number: 5998-2650 Software version: F1000-A-EI&F1000-S-EI: R3721 F5000: F3210 F1000-E: F3171 Firewall module: F3171 Document version: 6PW101-20120719

More information

A. Verify that the IKE gateway proposals on the initiator and responder are the same.

A. Verify that the IKE gateway proposals on the initiator and responder are the same. Volume: 64 Questions Question: 1 You need to configure an IPsec tunnel between a remote site and a hub site. The SRX Series device at the remote site receives a dynamic IP address on the external interface

More information

version 10.2R3.10; Configuring Basic System Information system { domain-name foo.bar; time-zone America/New_York;

version 10.2R3.10; Configuring Basic System Information system { domain-name foo.bar; time-zone America/New_York; version 10.2R3.10; Configuring Cluster Groups groups { node0 { system { host-name hh-node0; interfaces { fxp0 { unit 0 { family inet { address 1.1.1.1/24; node1 { system { host-name th-node1; interfaces

More information

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version ACE Exam Question 1 of 50. Traffic going to a public IP address is being translated by your Palo Alto Networks firewall to your

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Authentication and Enforcement Using SRX Series Services Gateways and Aruba ClearPass Policy Manager Modified: 2016-08-01 Juniper Networks, Inc. 1133 Innovation

More information

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 27. Firewalls and Virtual Private Networks Paul Krzyzanowski Rutgers University Fall 2013 November 25, 2013 2013 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive

More information

High Availability Synchronization PAN-OS 5.0.3

High Availability Synchronization PAN-OS 5.0.3 High Availability Synchronization PAN-OS 5.0.3 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Device Configuration... 4 Network Configuration... 9 Objects Configuration...

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

SecBlade Firewall Cards Attack Protection Configuration Example

SecBlade Firewall Cards Attack Protection Configuration Example SecBlade Firewall Cards Attack Protection Configuration Example Keywords: Attack protection, scanning, blacklist Abstract: This document describes the attack protection functions of the SecBlade firewall

More information

Junos Security (JSEC)

Junos Security (JSEC) Junos Security (JSEC) Course No: EDU-JUN-JSEC Length: 5 days Schedule and Registration Course Overview This five-day course covers the configuration, operation, and implementation of SRX Series Services

More information

Junos OS Release 12.1X47 Feature Guide

Junos OS Release 12.1X47 Feature Guide Junos OS Release 12.1X47 Feature Guide Junos OS Release 12.1X47-D15 19 November 2014 Revision 1 This feature guide accompanies Junos OS Release 12.1X47-D15. This guide contains detailed information about

More information

Junos Security. Rob Cameron, Brad Woodberg, Patricio Giecco, O'REILLY. Tim Eberhard, andjames Quinn INFORMATIQNSBIBLIOTHEK UNIVERSITATSBIBLIOTHEK

Junos Security. Rob Cameron, Brad Woodberg, Patricio Giecco, O'REILLY. Tim Eberhard, andjames Quinn INFORMATIQNSBIBLIOTHEK UNIVERSITATSBIBLIOTHEK Junos Security Rob Cameron, Brad Woodberg, Patricio Giecco, Tim Eberhard, andjames Quinn TECHNISCHE INFORMATIQNSBIBLIOTHEK UNIVERSITATSBIBLIOTHEK HANNOVER O'REILLY Beijing Cambridge Farnham Kiiln Sebastopol

More information

Configuring Virtual Servers

Configuring Virtual Servers 3 CHAPTER This section provides an overview of server load balancing and procedures for configuring virtual servers for load balancing on an ACE appliance. Note When you use the ACE CLI to configure named

More information

Fundamentals of Network Security v1.1 Scope and Sequence

Fundamentals of Network Security v1.1 Scope and Sequence Fundamentals of Network Security v1.1 Scope and Sequence Last Updated: September 9, 2003 This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document

More information

Chapter 8 roadmap. Network Security

Chapter 8 roadmap. Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing

More information

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces. 2015 Cisco and/or its affiliates. All rights

More information

Remote Access VPN. Remote Access VPN Overview. Licensing Requirements for Remote Access VPN

Remote Access VPN. Remote Access VPN Overview. Licensing Requirements for Remote Access VPN Remote Access virtual private network (VPN) allows individual users to connect to your network from a remote location using a laptop or desktop computer connected to the Internet. This allows mobile workers

More information

Applied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr.

Applied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr. Applied IT Security System Security Dr. Stephan Spitz Stephan.Spitz@de.gi-de.com Overview & Basics System Security Network Protocols and the Internet Operating Systems and Applications Operating System

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Access Control Configuration Guide Part number: 5998-2648 Software version: F1000-A-EI&F1000-S-EI: R3721 F5000: F3210 F1000-E: F3171 Firewall module: F3171 Document version: 6PW101-20120719

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

More information

QUICKSTART GUIDE FOR BRANCH SRX SERIES SERVICES GATEWAYS

QUICKSTART GUIDE FOR BRANCH SRX SERIES SERVICES GATEWAYS APPLICATION NOTE QUICKSTART GUIDE FOR BRANCH SRX SERIES SERVICES GATEWAYS Configuring Basic Security and Connectivity on Branch SRX Series Services Gateways Copyright 2009, Juniper Networks, Inc. Table

More information

Firepower Threat Defense Site-to-site VPNs

Firepower Threat Defense Site-to-site VPNs About, on page 1 Managing, on page 3 Configuring, on page 3 Monitoring Firepower Threat Defense VPNs, on page 11 About Firepower Threat Defense site-to-site VPN supports the following features: Both IPsec

More information

Junos OS. Unified Access Control Solution Guide for SRX Series Services Gateways. Release Junos Pulse Access Control Service 4.2/Junos OS 12.

Junos OS. Unified Access Control Solution Guide for SRX Series Services Gateways. Release Junos Pulse Access Control Service 4.2/Junos OS 12. Junos OS Unified Access Control Solution Guide for SRX Series Services Gateways Release Junos Pulse Access Control Service 4.2/Junos OS 12.1 Published: 2012-04-03 Juniper Networks, Inc. 1194 North Mathilda

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring a Single SRX Series Device in a Branch Office Modified: 2017-01-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Juniper Sky ATP Getting Started

Juniper Sky ATP Getting Started Juniper Sky ATP Getting Started Ready. Set. Let s go! Configure your SRX Series device, log into the Juniper Sky ATP web portal, and begin using Juniper Sky ATP. Configure the SRX Series Device to Begin

More information

User Manual. SSV Remote Access Gateway. Web ConfigTool

User Manual. SSV Remote Access Gateway. Web ConfigTool SSV Remote Access Gateway Web ConfigTool User Manual SSV Software Systems GmbH Dünenweg 5 D-30419 Hannover Phone: +49 (0)511/40 000-0 Fax: +49 (0)511/40 000-40 E-mail: sales@ssv-embedded.de Document Revision:

More information

History Page. Barracuda NextGen Firewall F

History Page. Barracuda NextGen Firewall F The Firewall > History page is very useful for troubleshooting. It provides information for all traffic that has passed through the Barracuda NG Firewall. It also provides messages that state why traffic

More information

How to Configure a Remote Management Tunnel for an F-Series Firewall

How to Configure a Remote Management Tunnel for an F-Series Firewall How to Configure a Remote Management Tunnel for an F-Series Firewall If the managed NextGen Firewall F-Series cannot directly reach the NextGen Control Center, it must connect via a remote management tunnel.

More information

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Int ernet w orking Internet Security Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Internet Security Internet security is difficult Internet protocols were not originally designed for security The

More information

User Identity Sources

User Identity Sources The following topics describe Firepower System user identity sources, which are sources for user awareness. These users can be controlled with identity and access control policies: About, on page 1 The

More information

Connect the Appliance to a Cisco Cloud Web Security Proxy

Connect the Appliance to a Cisco Cloud Web Security Proxy Connect the Appliance to a Cisco Cloud Web Security Proxy This chapter contains the following sections: How to Configure and Use Features in Cloud Connector Mode, on page 1 Deployment in Cloud Connector

More information

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Fireware-Essentials.  Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7. Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which

More information

CONFIGURING AND DEPLOYING THE AX411 WIRELESS ACCESS POINT

CONFIGURING AND DEPLOYING THE AX411 WIRELESS ACCESS POINT APPLICATION NOTE CONFIGURING AND DEPLOYING THE AX411 WIRELESS ACCESS POINT Copyright 2009, Juniper Networks, Inc. 1 Table of Contents Introduction......................................................................................................3

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring SRX Chassis Clusters for High Availability Modified: 2018-09-26 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved.  Worldwide Education Services Junos Security Chapter 8: IPsec VPNs 2012 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services Chapter Objectives After successfully completing this chapter, you will

More information

Numerics I N D E X. 3DES (Triple Data Encryption Standard), 48

Numerics I N D E X. 3DES (Triple Data Encryption Standard), 48 I N D E X Numerics A 3DES (Triple Data Encryption Standard), 48 Access Rights screen (VPN 3000 Series Concentrator), administration, 316 322 Action options, applying to filter rules, 273 adding filter

More information

H3C SecPath Series High-End Firewalls

H3C SecPath Series High-End Firewalls H3C SecPath Series High-End Firewalls Attack Protection Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: SECPATHF1000SAI&F1000AEI&F1000ESI-CMW520-R3721 SECPATH5000FA-CMW520-F3210

More information

Table of Contents 1 IKE 1-1

Table of Contents 1 IKE 1-1 Table of Contents 1 IKE 1-1 IKE Overview 1-1 Security Mechanism of IKE 1-1 Operation of IKE 1-1 Functions of IKE in IPsec 1-2 Relationship Between IKE and IPsec 1-3 Protocols 1-3 Configuring IKE 1-3 Configuration

More information

Configuring Security with CLI

Configuring Security with CLI Security Configuring Security with CLI This section provides information to configure security using the command line interface. Topics in this section include: Setting Up Security Attributes on page 62

More information

Request for Proposal (RFP) for Supply and Implementation of Firewall for Internet Access (RFP Ref )

Request for Proposal (RFP) for Supply and Implementation of Firewall for Internet Access (RFP Ref ) Appendix 1 1st Tier Firewall The Solution shall be rack-mountable into standard 19-inch (482.6-mm) EIA rack. The firewall shall minimally support the following technologies and features: (a) Stateful inspection;

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module Security Configuration Guide Part number: 5998-2686 Document version: 6PW101-20120217 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part

More information

Unit 4: Firewalls (I)

Unit 4: Firewalls (I) Unit 4: Firewalls (I) What is a firewall? Types of firewalls Packet Filtering Statefull Application and Circuit Proxy Firewall services and limitations Writing firewall rules Example 1 Example 2 What is

More information

Systrome Next Gen Firewalls

Systrome Next Gen Firewalls N E T K S Systrome Next Gen Firewalls Systrome s Next Generation Firewalls provides comprehensive security protection from layer 2 to layer 7 for the mobile Internet era. The new next generation security

More information

Juniper Networks Access Control Release Notes

Juniper Networks Access Control Release Notes Juniper Networks Access Control Release Notes Unified Access Control 4.4R8 UAC Build # 23799 OAC Version 5.60.23799 This is an incremental release notes describing the changes made from C4.4R1 release

More information

Vendor: Juniper. Exam Code: JN Exam Name: Junos Pulse Access Control, Specialist (JNCIS-AC) Version: Demo

Vendor: Juniper. Exam Code: JN Exam Name: Junos Pulse Access Control, Specialist (JNCIS-AC) Version: Demo Vendor: Juniper Exam Code: JN0-314 Exam Name: Junos Pulse Access Control, Specialist (JNCIS-AC) Version: Demo QUESTION: 1 A user signs into the Junos Pulse Access Control Service on a wired network. The

More information

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

ASA/PIX Security Appliance

ASA/PIX Security Appliance I N D E X A AAA, implementing, 27 28 access to ASA/PIX Security Appliance monitoring, 150 151 securing, 147 150 to websites, blocking, 153 155 access control, 30 access policies, creating for web and mail

More information

Examcollection.

Examcollection. Examcollection http://www.ipass4sure.com/examcollection.htm http://www.ipass4sure.com JN0-332 Juniper Juniper Networks Certified Internet Specialist SEC http://www.ipass4sure.com/exams.asp?examcode=jn0-332

More information

Junos Pulse Access Control Service

Junos Pulse Access Control Service Junos Pulse Access Control Service Odyssey Access Client Feature Guide Release 5.0 Published: 2013-11-18 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Network Address Translation (NAT)

Network Address Translation (NAT) The following topics explain and how to configure it. Why Use NAT?, page 1 NAT Basics, page 2 Guidelines for NAT, page 7 Dynamic NAT, page 12 Dynamic PAT, page 21 Static NAT, page 40 Identity NAT, page

More information

CCNA Security PT Practice SBA

CCNA Security PT Practice SBA A few things to keep in mind while completing this activity: 1. Do not use the browser Back button or close or reload any Exam windows during the exam. 2. Do not close Packet Tracer when you are done.

More information

How to Configure a Remote Management Tunnel for Barracuda NG Firewalls

How to Configure a Remote Management Tunnel for Barracuda NG Firewalls How to Configure a Remote Management Tunnel for Barracuda NG Firewalls If the managed NG Firewall can not directly reach the NG Control Center it must connect via a remote management tunnel. The remote

More information

Cisco Passguide Exam Questions & Answers

Cisco Passguide Exam Questions & Answers Cisco Passguide 642-648 Exam Questions & Answers Number: 642-648 Passing Score: 800 Time Limit: 120 min File Version: 61.8 http://www.gratisexam.com/ Cisco 642-648 Exam Questions & Answers Exam Name: Deploying

More information

ipro-04n Security Configuration Guide

ipro-04n Security Configuration Guide Disclaimer: The contents of these notes does not specifically relate to any release of Firmware and may change without notice Status: uncontrolled 1 Introduction...5 2 Security package...6 2.1 Basic network

More information

Infoblox Authenticated DHCP

Infoblox Authenticated DHCP Infoblox Authenticated DHCP Unified Visitor Management amigopod Technical Note Revision 1.1 5 July 2010 United States of America +1 (888) 590-0882 Europe, Middle East & Asia +34 91 766 57 22 Australia

More information

Monitoring Remote Access VPN Services

Monitoring Remote Access VPN Services CHAPTER 5 A remote access service (RAS) VPN secures connections for remote users, such as mobile users or telecommuters. RAS VPN monitoring provides all of the most important indicators of cluster, concentrator,

More information

AccessEnforcer Version 4.0 Features List

AccessEnforcer Version 4.0 Features List AccessEnforcer Version 4.0 Features List AccessEnforcer UTM Firewall is the simple way to secure and manage your small business network. You can choose from six hardware models, each designed to protect

More information

Sample excerpt. Virtual Private Networks. Contents

Sample excerpt. Virtual Private Networks. Contents Contents Overview...................................................... 7-3.................................................... 7-5 Overview of...................................... 7-5 IPsec Headers...........................................

More information

HP FlexFabric 5700 Switch Series

HP FlexFabric 5700 Switch Series HP FlexFabric 5700 Switch Series Security Command Reference Part number: 5998-6695 Software version: Release 2416 Document version: 6W100-20150130 Legal and notice information Copyright 2015 Hewlett-Packard

More information

Implementing AutoVPN Network Design Using the SRX Series with ibgp as the Dynamic Routing Protocol

Implementing AutoVPN Network Design Using the SRX Series with ibgp as the Dynamic Routing Protocol APPLICATION NOTE Introduction to AutoVPN Implementing AutoVPN Network Design Using the SRX Series with ibgp as the Dynamic Routing Protocol Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Introduction...3

More information

CSC 4900 Computer Networks: Security Protocols (2)

CSC 4900 Computer Networks: Security Protocols (2) CSC 4900 Computer Networks: Security Protocols (2) Professor Henry Carter Fall 2017 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message Integrity 8.4 End point Authentication

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS CISCO 642-618 EXAM QUESTIONS & ANSWERS Number: 642-618 Passing Score: 800 Time Limit: 120 min File Version: 39.6 http://www.gratisexam.com/ CISCO 642-618 EXAM QUESTIONS & ANSWERS Exam Name: Deploying Cisco

More information

Detecting Specific Threats

Detecting Specific Threats The following topics explain how to use preprocessors in a network analysis policy to detect specific threats: Introduction to Specific Threat Detection, page 1 Back Orifice Detection, page 1 Portscan

More information

tcp-map through type echo Commands

tcp-map through type echo Commands CHAPTER 31 31-1 tcp-map Chapter 31 tcp-map To define a set of TCP normalization actions, use the tcp-map command in global configuration mode. The TCP normalization feature lets you specify criteria that

More information

Introduction p. 1 The Need for Security p. 2 Public Network Threats p. 2 Private Network Threats p. 4 The Role of Routers p. 5 Other Security Devices

Introduction p. 1 The Need for Security p. 2 Public Network Threats p. 2 Private Network Threats p. 4 The Role of Routers p. 5 Other Security Devices Preface p. xv Acknowledgments p. xvii Introduction p. 1 The Need for Security p. 2 Public Network Threats p. 2 Private Network Threats p. 4 The Role of Routers p. 5 Other Security Devices p. 6 Firewall

More information

vcloud Director Tenant Portal Guide vcloud Director 8.20

vcloud Director Tenant Portal Guide vcloud Director 8.20 vcloud Director Tenant Portal Guide vcloud Director 8.20 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

HP Unified Wired-WLAN Products

HP Unified Wired-WLAN Products HP Unified Wired-WLAN Products Security Configuration Guide HP 830 Unified Wired-WLAN PoE+ Switch Series HP 850 Unified Wired-WLAN Appliance HP 870 Unified Wired-WLAN Appliance HP 11900/10500/7500 20G

More information

Pulse Policy Secure. UAC Interoperability with the ScreenOS Enforcer. Product Release 5.1. Document Revision 1.0 Published:

Pulse Policy Secure. UAC Interoperability with the ScreenOS Enforcer. Product Release 5.1. Document Revision 1.0 Published: Pulse Policy Secure UAC Interoperability with the ScreenOS Enforcer Product Release 5.1 Document Revision 1.0 Published: 2015-02-10 2015 by Pulse Secure, LLC. All rights reserved Pulse Secure, LLC 2700

More information

New Features for ASA Version 9.0(2)

New Features for ASA Version 9.0(2) FIREWALL Features New Features for ASA Version 9.0(2) Cisco Adaptive Security Appliance (ASA) Software Release 9.0 is the latest release of the software that powers the Cisco ASA family. The same core

More information

Example: Configuring a Hub-and-Spoke VPN between 3 SRXs using J-Web

Example: Configuring a Hub-and-Spoke VPN between 3 SRXs using J-Web Example: Configuring a Hub-and-Spoke VPN between 3 SRXs using J-Web Last updated: 7/2013 This configuration example shows how to configure a route-based multi-point VPN, with a next-hop tunnel binding,

More information

IPv6 over IPv4 GRE Tunnel Protection

IPv6 over IPv4 GRE Tunnel Protection The feature allows both IPv6 unicast and multicast traffic to pass through a protected generic routing encapsulation (GRE) tunnel. Finding Feature Information, page 1 Prerequisites for, page 1 Restrictions

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Attack Protection Configuration Guide Part number: 5998-2630 Software version: F1000-E/Firewall module: R3166 F5000-A5: R3206 Document version: 6PW101-20120706 Legal and notice information

More information

CSC Network Security

CSC Network Security CSC 474 -- Security Topic 9. Firewalls CSC 474 Dr. Peng Ning 1 Outline Overview of Firewalls Filtering Firewalls Proxy Servers CSC 474 Dr. Peng Ning 2 Overview of Firewalls CSC 474 Dr. Peng Ning 3 1 Internet

More information

AWS Reference Architecture - CloudGen Firewall Auto Scaling Cluster

AWS Reference Architecture - CloudGen Firewall Auto Scaling Cluster AWS Reference Architecture - CloudGen Firewall Auto Scaling Cluster Protecting highly dynamic AWS resources with a static firewall setup is neither efficient nor economical. A CloudGen Firewall Auto Scaling

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-4218 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Cisco Exam Implementing Cisco Network Security Version: 12.0 [ Total Questions: 186 ]

Cisco Exam Implementing Cisco Network Security Version: 12.0 [ Total Questions: 186 ] s@lm@n Cisco Exam 210-260 Implementing Cisco Network Security Version: 12.0 [ Total Questions: 186 ] Cisco 210-260 : Practice Test Question No : 1 When an IPS detects an attack, which action can the IPS

More information

Advanced Security and Mobile Networks

Advanced Security and Mobile Networks WJ Buchanan. ASMN (1) Advanced Security and Mobile Networks Unit 1: Network Security Application Presentation Session Transport Network Data Link Physical OSI Application Transport Internet Internet model

More information

Pulse Policy Secure. Guest Access Solution Configuration Guide. Product Release 5.2. Document Revision 1.0 Published:

Pulse Policy Secure. Guest Access Solution Configuration Guide. Product Release 5.2. Document Revision 1.0 Published: Pulse Policy Secure Guest Access Solution Configuration Guide Product Release 5.2 Document Revision 1.0 Published: 2015-03-31 2015 by Pulse Secure, LLC. All rights reserved Guest Access Solution Configuration

More information

Firepower Threat Defense Remote Access VPNs

Firepower Threat Defense Remote Access VPNs About, page 1 Firepower Threat Defense Remote Access VPN Features, page 3 Firepower Threat Defense Remote Access VPN Guidelines and Limitations, page 4 Managing, page 6 Editing Firepower Threat Defense

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Validated Reference - Business Edge Solution - Device R-10 Release 1.0 Published: 2014-03-31 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089

More information

IP Access List Overview

IP Access List Overview Access control lists (ACLs) perform packet filtering to control which packets move through a network and to where. The packet filtering provides security by helping to limit the network traffic, restrict

More information

Configuring Dynamic VPN

Configuring Dynamic VPN Configuring Dynamic VPN Version 1.0 October 2009 JUNIPER NETWORKS Page 1 of 15 Table of Contents Introduction...3 Feature License...3 Platform support...3 Limitations...3 Dynamic VPN Example...3 Topology...4

More information

File Reputation Filtering and File Analysis

File Reputation Filtering and File Analysis This chapter contains the following sections: Overview of, page 1 Configuring File Reputation and Analysis Features, page 5 File Reputation and File Analysis Reporting and Tracking, page 14 Taking Action

More information

Example: Configuring a Policy-Based Site-to-Site VPN using J-Web

Example: Configuring a Policy-Based Site-to-Site VPN using J-Web Example: Configuring a Policy-Based Site-to-Site VPN using J-Web Last updated: 7/2013 This configuration example shows how to configure a policy-based IPsec VPN to allow data to be securely transferred

More information

Personal Stateful Firewall Configuration

Personal Stateful Firewall Configuration This chapter describes how to the Personal Stateful Firewall in-line service feature. Important In release 8.x, Stateful Firewall for CDMA and early UMTS releases used rulebase-based configurations, whereas

More information

Create Decryption Policies to Control HTTPS Traffic

Create Decryption Policies to Control HTTPS Traffic Create Decryption Policies to Control HTTPS Traffic This chapter contains the following sections: Overview of Create Decryption Policies to Control HTTPS Traffic, page 1 Managing HTTPS Traffic through

More information

Presenter John Baker

Presenter John Baker Presenter John Baker docs@ilikeit.co.uk Training Objectives and Overview Training Assumptions Why? Network design & Information Collation Endpoint Setup Troubleshooting Things to watch out for Review Q&A

More information

Configuring Management Access

Configuring Management Access 37 CHAPTER This chapter describes how to access the ASA for system management through Telnet, SSH, and HTTPS (using ASDM), how to authenticate and authorize users, how to create login banners, and how

More information

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0 DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any

More information