SRX. SRX Firewalls. Rasmus Elmholt V1.0



Similar documents
Network Configuration Example

How To Boot A Cisco Ip Phone From A Cnet Vlan To A Vlan On A Cpower Box On A Ip Phone On A Network With A Network Vlan (Cisco) On A Powerline (Ip Phone) On An

JUNIPER JN0-332 EXAM QUESTIONS & ANSWERS

APPLICATION NOTE. Copyright 2011, Juniper Networks, Inc. 1

1Juniper. 2How Logtrust. works with Juniper? a security network solution for enterprises and service providers.

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

Network Configuration Example

Deployment Guide for SRX Series Services Gateways in Chassis Cluster Configuration

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

ProteusElite:HowTo Proteus Networks Proteus Elite:HowTo Page 1

H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5)

WAN OPTIMIZATION AND IPSEC FOR THE BRANCH OFFICE

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways

Document No. FO1101 Issue Date: Work Group: FibreOP Technical Team October 31, 2013 FINAL:

Application Note: Junos NAT Configuration Examples

Configuring Dynamic VPN v2.1 (last updated 1/2011) Junos 10.4 and above

Network Configuration Example

Junos OS. Layer 2 Bridging and Transparent Mode for Security Devices. Release 12.1X44-D10. Published:

WiNG 5.X How To. Policy Based Routing Cache Redirection. Part No. TME Rev. A

SRX High Availability Design Guide

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Adding an Extended Access List

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Enabling NAT and Routing in DGW v2.0 June 6, 2012

Network Configuration Example

Load Balance Router R258V

Junos OS. Application Tracking Feature Guide for Security Devices. Release 12.1X46-D10. Published: Copyright 2014, Juniper Networks, Inc.

Knowledgebase Solution

Introduction...3. Scope...3. Design Considerations...3. Hardware Requirements...3. Software Requirements...3. Description and Deployment Scenario...

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

IP Filter/Firewall Setup

Network Configuration Example

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Chapter 3 LAN Configuration

MIGRATING IPS SECURITY POLICY TO JUNIPER NETWORKS SRX SERIES SERVICES GATEWAYS

Konfigurering Netværk Sikkerhed brugen af IPSec.

Multi-Homing Dual WAN Firewall Router

Implementation Guide. Juniper Networks SRX Series Services Gateways/ Websense V10000 G2 appliance. v7.6

Topic 7 DHCP and NAT. Networking BAsics.

Firewall Defaults and Some Basic Rules

Using a Sierra Wireless AirLink Raven X or Raven-E with a Cisco Router Application Note

Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Firewall. June 2011 Revision 1.0

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, :32 pm Pacific

Testing Network Security Using OPNET

Balance Model Comparison

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Gigabit Multi-Homing VPN Security Router

Network Configuration Example

INDIAN INSTITUTE OF TECHNOLOGY BOMBAY MATERIALS MANAGEMENT DIVISION : (+91 22) (DR)

Router configuration manual for I3 Micro Vood 322

Network Configuration Example

How To Configure Virtual Host with Load Balancing and Health Checking

INTEGRATING FIREWALL SERVICES IN THE DATA CENTER NETWORK ARCHITECTURE USING SRX SERIES SERVICES GATEWAY

Junos OS. Application Tracking. Release 12.1X44-D10. Published: Copyright 2014, Juniper Networks, Inc.

Gigabit Content Security Router

NetFlow/IPFIX Various Thoughts

Datasheet. Advanced Network Routers. Models: ERPro-8, ER-8, ERPoe-5, ERLite-3. Sophisticated Routing Features

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Implementation Guide NEW NETWORK PLATFORM ARCHITECTURE: WAN. Internet Edge

Firmware Release Notes

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

Multi-Homing Security Gateway

PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY

FAQs: MATRIX NAVAN CNX200. Q: How to configure port triggering?

Overview. Introduction

Session Title: Exploring Packet Tracer v5.3 IP Telephony & CME. Scenario

Configuring and Deploying the Dynamic VPN Feature Using SRX Series Services Gateways

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

I've applied for a goipv6 account and received my password via but I cannot log into my account. What should I do?

! encor en etworks TM

Quick Note 53. Ethernet to W-WAN failover with logical Ethernet interface.

Network Configuration Example

Juniper NetScreen 5GT

GS700TS FS700TS Access to the Internet on multiple VLANS using Multi- Homing

Chapter 8 Router and Network Management

IP Telefoni. DHCP Options VLANs

Chapter 8 Monitoring and Logging

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

EE Easy CramBible Lab DEMO ONLY VERSION EE F5 Big-Ip v9 Local Traffic Management

Sample Configuration Using the ip nat outside source static

Configuring Flexible NetFlow

Edgewater Routers User Guide

Prestige 623R-T. Quick Start Guide. ADSL Dual-link Router. Version 3.40

COMPUTER NETWORK TECHNOLOGY (300)

Interconnecting Cisco Networking Devices: Accelerated (CCNAX) 2.0(80 Hs) 1-Interconnecting Cisco Networking Devices Part 1 (40 Hs)

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Guideline for setting up a functional VPN

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

Data Sheet. DPtech Anti-DDoS Series. Overview

- Introduction to PIX/ASA Firewalls -

TotalCloud Phone System

VLAN und MPLS, Firewall und NAT,

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Lab Organizing CCENT Objectives by OSI Layer

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

SonicOS 5.9 / / 6.2 Log Events Reference Guide with Enhanced Logging

Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products

Transcription:

SRX SRX Firewalls Rasmus Elmholt V1.0

Deployment Branch SRX Series SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, SRX650 Fokus for dette kursus Data Center SRX Series SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800

Branch SRX SRX100 Eight 10/100 Ethernet LAN ports and 1 USB port (support for 3G USB) SRX100 Performance Firewall performance 700Mbps IPS Performance 75Mbps VPN Performance 65Mbps Maximum concurrent sessions 32.000 New sessions/second 1.800 Maximum security policies 384

Branch SRX SRX110 VDSL/ADSL2+ and Ethernet WAN interfaces Eight 10/100 Ethernet LAN ports and two USB port (support for 3G USB) SRX110 Firewall performance IPS Performance VPN Performance Performance 700Mbps 75Mbps 65Mbps Maximum concurrent sessions 32.000 New sessions/second 1.800 Maximum security policies 384

SRX210 Branch SRX Two 10/100/1000 Ethernet and 6 10/100 Ethernet LAN ports, 1 Mini- PIM slot, and 2 USB ports (support for 3G USB) Factory option of 4 dynamic Power over Ethernet (PoE) ports 802.3af Support for T1/E1, serial, ADSL/2/2+, VDSL, G.SHDSL, and Ethernet small form-factor pluggable transceiver (SFP) SRX210 Firewall performance IPS Performance VPN Performance Performance 850Mbps 65Mbps 85Mbps Maximum concurrent sessions 64.000 New sessions/second 2.200 Maximum security policies 512

SRX220 Branch SRX Eight 10/100/1000 Ethernet LAN ports, 2 Mini-PIM slots Factory option of 8 PoE ports; PoE+ 802.3at, backwards compatible with 802.3af Support for T1/E1, serial, ADSL/2/2+, VDSL, G.SHDSL, and Ethernet SFP SRX220 Firewall performance IPS Performance VPN Performance Performance 950Mbps 80Mbps 100Mbps Maximum concurrent sessions 96.000 New sessions/second 2.800 Maximum security policies 2.048

SRX240 Branch SRX 16 10/100/1000 Ethernet LAN ports, 4 Mini-PIM slots Factory option of 16 PoE ports; PoE+ 802.3at, backwards compatible with 802.3af Support for T1/E1, serial, ADSL2/2+, VDSL, G.SHDSL, and Ethernet SFP SRX240 Firewall performance IPS Performance VPN Performance Performance 1.8Gbps 230Mbps 300Mbps Maximum concurrent sessions 256.000 New sessions/second 8.500 Maximum security policies 4.096

SRX550 Branch SRX Ten fixed Ethernet ports (6 10/100/1000 Copper, 4 SFP), 2 Mini-PIM slots, 6 GPIM slots or multiple GPIM and XPIM combinations Support for T1/E1, serial, ADSL2/2+, VDSL, G.SHDSL, DS3/E3, Gigabit Ethernet ports; supports up to 52 Ethernet ports including SFP; 40 switch ports with optional PoE including 802.3at, PoE+, backwards compatible with 802.3af (or 50 non-poe 10/100/1000 Copper ports), 10GbE SRX550 Firewall performance IPS Performance VPN Performance Performance 5.5Gbps 800Mbps 1.0Gbps Maximum concurrent sessions 375.000 New sessions/second 27.000 Maximum security policies 7.256

SRX650 Branch SRX Four fixed ports 10/100/1000 Ethernet LAN ports, 8 GPIM slots or multiple GPIM and XPIM combinations Support for T1, E1, DS3/E3, Ethernet ports; supports up to 52 Ethernet ports including SFP; 48 switch ports with optional PoE including 802.3at, PoE+, backwards compatible with 802.3af (or 52 non-poe 10/100/1000 Copperports), 10GbE SRX650 Firewall performance IPS Performance VPN Performance Performance 7Gbps 3Gbps 1.5Gbps Maximum concurrent sessions 512.000 New sessions/second 35.000 Maximum security policies 8.192

Packet modes Alle branch SRX enheder arbejder i Flowbased forwarding Et flow valideres og retur trafik tillades Trafik skal tillades Gælder også til Routing Engine Juniper Routere kører Packet-based forwarding Hver pakke valideres for sig. Alt er tilladt med mindre det blokeres.

Konfiguration Packet modes Konfigureres under security forwarding-options stanza set security forwarding-options family mpls mode packet-based set security forwarding-options family iso mode packet-based set security forwarding-options family inet6 mode packet-based Kan også konfigureres pr. firewall filter(eksempel mangler) Default Flow based user1@srx07> show security flow status Flow forwarding mode: Inet forwarding mode: flow based Inet6 forwarding mode: drop MPLS forwarding mode: drop ISO forwarding mode: drop Flow trace status Flow tracing status: off Flow session distribution Distribution mode: RR-based

Zoner SRX enheder arbejder med zoner Security Zones Bruges til at adskille interfaces i forskellige sikkerheds zoner Flere porte kan være i samme zone Functional Zones [edit security zones] user1@srx07# show security-zone trust { host-inbound-traffic { system-services { all; protocols { all; interfaces { vlan.0; Bruges til management zoner(bliver ikke dækket her)

Zoner SRX enheder arbejder med zoner Host-inbound-traffic Definerer trafik til kassen og ikke transit trafik. Kan defineres på en zone eller på et interface Nogle services kan kun ligge på et interface(dhcp) [edit security zones] user1@srx07# show security-zone trust { host-inbound-traffic { system-services { all; protocols { all; interfaces { vlan.0;

Opgave!! Zoner

Packet Flow Pakker igennem en SRX Alt lookup sker i HW/PFE

Security Policy Evaluering af pakker igennem sikkerheds politikker Zoner Fra og til zoner Adresser Source og destinations adresser Application Applications Objects Actions Pakker der matcher en politik skal behandles

Security Policy Evaluering af pakker igennem sikkerheds politikker Fra top til bund. Match afbryder Implicit Deny [edit security policies from-zone trust to-zone untrust] user1@srx07# show policy trust-to-untrust-icmp { match { source-address any; destination-address any; application [ junos-icmp-all ]; then { drop; log { session-init; policy trust-to-untrust-http { match { source-address any; destination-address any; application [ junos-http junos-https ]; then { permit;

Security Policy Evaluering af pakker igennem sikkerheds politikker Fra top til bund. Match afbryder Implicit Deny user1@srx07# set? Possible completions: + apply-groups Groups from which to inherit configuration data + apply-groups-except Don't inherit configuration data from these groups > count Enable count deny Deny packets > log Enable log > permit Permit packets reject Reject packets

Opgave Security Policy

Address book Fra JunOS version 11.2 kan adresser defines globalt i security stanza en Før skulle de defineres under hver zone Skal bruges hvis man vil matche på adresser [edit security] rael@srx240# show address-book { global { address JServer-10.0.255.10 { description "Server with web server and so on"; 10.0.255.10/32; address SRX07-10.0.0.26 { description "SRX07 Firewall"; 10.0.0.26/32;

Address book Adresse objekter kan indeholde IPv4 adresser IPv6 adresser Netværk/Prefixer Bruges af en policy from-zone untrust to-zone trust { policy untrust-to-trust { match { source-address any; destination-address [ JServer-10.0.255.10 SRX07-10.0.0.26 ]; application [ junos-http junos-ssh ]; then { permit;

Address book DNS adresse objekter DNS Server skal være konfigureret Kan indeholde op til 32 IP lookups IPv4 & IPv6 Prefetcher men overholder DNS TTL [edit security] rael@srx240# show address-book global address www.bing.com { dns-name www.bing.com;

Lav en opgave Address book

Debug [edit security] rael@srx240# run show security policies hit-count Logical system: root-logical-system Index From zone To zone Name Policy count 1 trust trust trust-to-trust 12 2 trust untrust trust-to-untrust 10767 3 untrust trust untrust-to-trust 60 Number of policy: 3 rael@srx240> show security flow session Session ID: 19988, Policy name: untrust-to-trust/6, Timeout: 1422, Valid In: 192.168.146.103/58554 --> 192.168.146.100/2222;tcp, If: vlan.99, Pkts: 23, Bytes: 2970 Out: 10.0.255.10/22 --> 192.168.146.103/58554;tcp, If: vlan.10, Pkts: 26, Bytes: 5585 Session ID: 20072, Policy name: trust-to-untrust/4, Timeout: 58, Valid In: 10.0.0.26/123 --> 83.90.47.30/123;udp, If: ge-0/0/7.0, Pkts: 1, Bytes: 76 Out: 83.90.47.30/123 --> 192.168.146.100/4763;udp, If: vlan.99, Pkts: 1, Bytes: 76

Debug [edit security] rael@srx240# run show security policies hit-count Logical system: root-logical-system Index From zone To zone Name Policy count 1 trust trust trust-to-trust 12 2 trust untrust trust-to-untrust 10767 3 untrust trust untrust-to-trust 60 Number of policy: 3

Debug Her pinges der fra ydersiden til et inderside netværk. @ [edit] root@srx07# run show interfaces ge-0/0/0.0 extensive Logical interface ge-0/0/0.0 (Index 71) (SNMP ifindex 510) (Generation 136) Flags: SNMP-Traps 0x0 Encapsulation: ENET2 Security: Zone: untrust Allowed host-inbound traffic : dhcp tftp Flow Statistics : Flow Input statistics : Self packets : 171 ICMP packets : 21656 Flow error statistics (Packets dropped due to): No zone or NULL zone binding 0 Policy denied: 3 Security association not active: 0 Addresses, Flags: Is-Preferred Is-Primary Destination: 10.0.0.24/30, Local: 10.0.0.26, Broadcast: 10.0.0.27, Generation: 146 ICMP VLAN 10 10.10.10.0/24

Debug Opret en logfil med match på flows [edit] root@srx07# show system syslog file traffic-log any any; match RT_FLOW_SESSION; Konfigurer logging på policy Session-close når man tillader trafik, da den giver mere info Session-init når man blokerer trafik eller lange sessioner [edit security policies] root@srx07# show display set relative set from-zone trust to-zone untrust policy trust-to-untrust match source-address any set from-zone trust to-zone untrust policy trust-to-untrust match destination-address any set from-zone trust to-zone untrust policy trust-to-untrust match application any set from-zone trust to-zone untrust policy trust-to-untrust then permit set from-zone trust to-zone untrust policy trust-to-untrust then log session-close