Juniper Firewall Basic Application Learning notes

Source: Internet
Author: User

Based on the TPC/IP 2-4 layer

Setup steps for Firewall devices:
1. Determine deployment mode (transparent, routing, NAT mode)
2, set the device's IP address (interface address, management address)
3. Set up Routing information
4. Determine IP address information (policy-based source, destination address)
5. Identify network applications
6. Configure the anti-Q control strategy

Default account password: NetScreen

Security zones for firewall three interfaces:
Ethernet1:trust
Ethernet2:dmz
Ethernet3:untrust
Ethernet4:null

Three application modes of firewall:
Transparent mode
Nat Mode
Route mode
Special mode: Two-tier mode and three-tier mode hybrid deployment (requires some condition support)

Transparent mode:
Only the administrative IP address does not have an interface IP address
IPSec VPN in unique transparent mode

Implementation of Transparent mode:
unset Interface Ethernet1 IP
Set interface Ethernet1 Zone V1-trust
Set interface Ethernet2 Zone V1-DMZ
Set interface Ethernet3 Zone V1-untrust
Set interface Vlan1 IP 192.168.1.1/24
Save

The implementation of NAT mode:
Set Interface Ethernet1 Zone Trust
Set interface Ethernet2 Zone DMZ
Set interface Ethernet3 Zone Untrust
Set interface Ethernet1 IP 192.168.1.1/24
Set interface Ethernet2 IP 172.16.1.1/24
Set interface Ethernet3 IP 10.10.1.1/24
Set Interface Ethernet3 Gateway 10.10.0.251
Set interface Ethernet1 NAT
Save

Implementation of the routing pattern
Set Interface Ethernet1 Zone Trust
Set interface Ethernet2 Zone DMZ
Set interface Ethernet3 Zone Untrust
Set interface Ethernet1 IP 192.168.1.1/24
Set interface Ethernet2 IP 172.16.1.1/24
Set interface Ethernet3 IP 10.10.1.1/24
Set Interface Ethernet3 Gateway 10.10.0.251
Set interface Ethernet1 route
Save

Web Login
Firewall default ip:192.168.1.1 transparent mode IP vlan1 IP address, Nat mode is the IP of the trust, the default on the Eth1 interface

Vlan1 IP address can be used as a gateway for remote VPN in transparent mode

Juniper Firewall must configure policies to forward packets

The access control policy contains the six most basic necessary information:
Direction of the policy
Source Address Information
Destination Address information
Network Service Information
Policy Action Information
Where the policy is arranged

Non-essential information:
Log, traffic control, authentication, real-time traffic recording

Arrange the policy sequence reasonably:
The concrete strategy is above, the non-concrete strategy is under;
The Deny policy is on, allowing the policy to be under;
VPN policy on, non-VPN policy in the next

Optimize policy content:
Make reasonable use of Address Group and service group function

Custom services:
Object-service-custom
Custom Service groups:
Objects-services-groups-configuartiong

Settings for the security domain
Most commonly used security domains: three-tier security domain trust, DMZ, Untrust, two-tier security domain: V1-trust, V1-DMZ, V1-untrust
Trust, DMZ, Untrust, V1-trust, V1-DMZ, v1-untrust the names above are reserved words for firewalls

Some special application MIP (IP address mapping)
MIP Mapping
Network>interface>ethernet3>edit>mip>new
General application: The main application is the one-to-a-map of public IP and internal IP
Policy direction: From Untrust to trust or DMZ
The source address is: any
Target Address: MIP
Service type: Optional on Demand

MIP Policy settings:

Dip applications (address pool mapping)
Dip dynamic address pool, similar to Cisco's IP pool feature
Address translation for internal address out-of-office access is primarily provided
Network users who have a large number of registered IP addresses and a large number of non-registered addresses are often used
Theoretically, a registered IP address can proxy more than 600,000 hosts out of the office
Location Network>interface>edit>dip

VIP Port Address Mapping
A registered IP address, a protocol-based port approach to an internal multiple server or compute Tribute address mapping
NETWORK>INTERFACE>EDIT>VIP/VIP Services
1. Add a registered IP address first
2. Increase the correspondence between the internal private address and the registered IP address, and provide the corresponding protocol port
3. Setting the Access control policy

Save the configuration file
Export of configuration files:
Configuration>update>config File>save to file> save to a specific location
Import of configuration files
Configuration>update>config file> Browse to find the configuration file >apply

Restore Factory Status:
Under the premise of knowing the firewall root username password: Enter unset all to confirm that the power will be restored to the factory state after the restart
Do not know the firewall root user name password, through the Super Terminal Connection Firewall console, with the firewall SN serial number as the user name password login, according to the prompt all the way yes, wait
After the firewall restarts, the factory status can be restored.

Juniper Firewall Basic Application Learning notes

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.