Home

Juniper SRX100

image

Contents

1. 192 168 1 10 24 with a default gateway of 192 168 1 1 To access an SRX Series device with the JUNOS CLI Connect one end of the console cable to the serial port adapter plug the adapter into a serial port on the PC or laptop and plug the other end of the cable into the console port on the SRX Series device Start the terminal emulation program on the PC or laptop select the COM port and configure the following port settings 9600 bits per second 8 data bits none parity 1 stop bits and none flow control Press the POWER button on the router and verify that the POWER LED turns green e Log in as root and press Enter at the Password prompt When booting the factory default configuration you do not need to enter a password Enter the UNIX shell after you are authenticated through the CLI Amnesiac ttyu0 login root Password JUNOS 9 4B3 built 2008 12 19 00 28 15 UTC roots e Type cli at the prompt to start the CLI and press Enter The prompt changes to an angle bracket gt when you enter CLI operational mode root s cli root Type configure at the gt prompt and press Enter The prompt changes from gt to when you enter configuration mode 2 Copyright O 2009 Juniper Networks Inc APPLICATION NOTE Quickstart Guide for Branch SRX Series Services Gateways root configure Entering configuration mode edit root Next the SRX Series device will be configured
2. ipsec policy ipsec policy 1 perfect forward secrecy keys group2 set security ipsec vpn vpnl ike gateway gwl set security ipsec vpn vpnl ike ipsec policy ipsec policy 1 set security ipsec vpn vpnl establish tunnels immediately Set security ipsec vpn vpnl bind interface st0 0 6 Copyright O 2009 Juniper Networks Inc APPLICATION NOTE Quickstart Guide for Branch SRX Series Services Gateways UTM Configuration The example continues with the addition of several common unified threat management UTM features to the configuration Before configuring any UTM features the UTM feature license must be installed on the device The license keys can be installed using one of the two following methods These commands are operational mode commands 1 Download from LMS server directly This method is recommended but Internet access is required You can now verify that the license was installed using the operational mode command show system license Antivirus Configuration Having an SRX Series Services Gateway use the express antivirus engine to scan HTTP traffic is also very easy 1 Configure the SRX Series device to use the express antivirus engine set security policies from zone trust to zone untrust policy default permit then permit application services utm policy custom utm policy Note The predefined profile junos eav defaults is preconfigured with antivirus engine fallback options scanning options and notification messa
3. searches the var db scripts commit directory for scripts and runs the script against the candidate configuration database to ensure the configuration conforms to the rules dictated by the scripts Note A predefined IDP policy is recommended To view the list of IDP policies use set security idp active policy 6 Enable IDP detection on the existing firewall security policy from trust zone to untrust zone set security policies from zone trust to zone untrust policy default permit then permit application services idp 8 Copyright O 2009 Juniper Networks Inc APPLICATION NOTE Quickstart Guide for Branch SRX Series Services Gateways Summary Juniper Networks SRX Series Services Gateways provide all the features required to securely connect modern remote and branch offices in a one box solution JUNOS Software offers users unparalleled flexibility designed to meet the most demanding network requirements After reading this document you will be able to configure a branch SRX Series device to securely pass traffic With a little practice you will be able to create advanced configurations required for more complex deployments About Juniper Networks Juniper Networks Inc is the leader in high performance networking Juniper offers a high performance network infrastructure that creates a responsive and trusted environment for accelerating the deployment of services and applications over a single network This fuels high performan
4. APPLICATION NOTE QUICKSTART GUIDE FOR BRANCH SRX SERIES SERVICES GATEWAYS Configuring Basic Security and Connectivity on Branch SRX Series Services Gateways Copyright O 2009 Juniper Networks Inc APPLICATION NOTE Quickstart Guide for Branch SRX Series Services Gateways Table of Contents Table of Figures Introduction amp iia need men A KORR A PORK De ORG IRURE RUE RR e Rs 1 CpoDI IER 1 Design Considerations 2 4ii9jzeh4keeikRRr y xk d he then ARR RRERREDERRSERUPRESE XE ee a ERE ede DE E 1 Hardware Requirements lssssssllsllslls sse hs 1 Software Requirements s heap a pe E Pe Re E quA KAR un E RU Ap b 1 Description and Deployment Scenario 2 5 42 2 2 o ur e EE Ru REPE X p 4 abitan ea di e a a 1 Default Firewall Configuration 42 2 zer eem Re ua RR Ren A A E EORR ARG Wand Ea Rn 1 Configuration AO duit gece ean 2 Firewall Configuration for Outbound Access Using IRB 0oocoocccccocccr eene 4 SONNEI GU et OMe PEE TITTE TTE ESTEE DOTT 4 IPsec VPN Configuration 22 23 sas icem e ml n eb e edes a IURE ED idad baw dee dn 5 Configuration ove baw deeds tine ae ed MAT db RH COE RE Ded EH e GbR eee daa UP Fe pP n E REFS 6 UTM Configuration 30 30 02 0200 eR Ee A REACH uS EX CI nO MER ODER AE PEE ER V we 7 AntiVirus CohflguratlOm s e uite maturo p uec usd emos Pee diee uh DRE ottenuta die 7 Web Filtering Configuratlon isissieseke hee Rex rr RR eee E E EEE E RUPEE RRUP E ERE TREES 8 ID P EORfIGUESb OM oe scere R
5. U Rx Ie perse tds ts io ona 8 SUMMALY cR CIMA 9 About Juniper Networks mosk caida tensed e A a a a eee ERA 9 Figure 1 Corporate and branch office network infrastructure 0 0c cece eee eee 2 Figure 2 Corporate and branch office network infrastructure 00 2 cece eee ete eee 5 Copyright 2009 Juniper Networks Inc APPLICATION NOTE Quickstart Guide for Branch SRX Series Services Gateways Introduction Scope The purpose of this application note is to walk the reader through the steps necessary to configure Juniper Networks SRX Series Services Gateways out of the box to provide secure connectivity to the Internet and remote sites The example configurations can be leveraged to build more complicated configurations that will meet the security requirements of modern branch and remote offices After reading this document you should be able to configure branch SRX Series Services Gateways to pass traffic and provide several common security services This paper introduces the Juniper Networks JUNOS Software CLI and will help the reader configure SRX Series Services Gateways for the first time and provide a building block for more advanced configurations It does not include advanced security configuration examples or network design guidelines Additional Juniper Networks documentation is available for readers at www juniper net techpubs software junos index html srx Design Considerations Hardware Requir
6. ated to route traffic between switch ports and the routed interface fe 0 0 7 Configuration 1 Remove the factory default IP address from the interface ge 0 0 0 set interfaces ge 0 0 0 unit 0 family ethernet switching set interfaces ge 0 0 1 unit 0 family ethernet switching set interfaces fe 0 0 2 unit 0 family ethernet switching set interfaces fe 0 0 3 unit 0 family ethernet switching 4 Copyright O 2009 Juniper Networks Inc APPLICATION NOTE Quickstart Guide for Branch SRX Series Services Gateways 4 Assign VLAN interface to the default VLAN Note SRX Series Services Gateways are preconfigured with a system defined VLAN with name default and VLAN ID 1 5 Assign the VLAN interface to trust security zone IPsec VPN Configuration To illustrate the configuration of a site to site IPsec tunnel VPN configuration details will be added to the first example according to the following design assumptions e Aroute based IPsec VPN with preshared keys is specified between sites e The protected network is connected to interface ge 0 0 0 in the trust zone e Connectivity to the Internet is through fe 0 0 7 in the untrust zone The remote IPsec endpoint IP address is 1 1 1 2 and the protected subnet at the remote site is 10 1 1 0 24 All traffic to the subnet 10 1 1 0 24 is encrypted UNTRUST ZONE fe 0 0 7 Ime 1 1 1 1 30 1 1 1 2 30 TRUST ZONE 10 1 1 0 24 Ll Ll m Figure 2 Corporate and branch office n
7. ce businesses Additional information can be found at www juniper net Corporate and Sales Headquarters APAC Headquarters EMEA Headquarters Copyright 2009 Juniper Networks Inc All rights reserved Juniper Networks the Juniper Networks Inc Juniper Networks Hong Kong Juniper Networks Ireland Juniper Networks logo JUNGS NetScreen 1194 North Mathilda Avenue 26 F Cityplaza One Airside Business Park and ScreenOS are registered trademarks of Sunnyvale CA 94089 USA 1111 King s Road Swords County Dublin Juniper Networks Inc in the United States Phone 888 JUNIPER Taikoo Shing Hong Kong Ireland and other countries JUNOSe is a trademark of 888 586 4737 Phone 852 2332 3636 Phone 35 31 8903 600 Pl SSI Gault Ine ci esa service marks registered marks or registered or 408 745 2000 Fax 852 2574 7803 Fax 35 31 8903 601 service marks are the property of their Fax 408 745 2100 respective owners Juniper Networks assumes no responsibility for any inaccuracies in this f E document Juniper Networks reserves the right To purchase Juniper Networks solutions please to change modify transfer or otherwise revise contact your Juniper Networks representative this publication without notice at 1 866 298 6428 or authorized reseller 3500153 001 EN Apr 2009 fs Printed on recycled paper
8. ements Juniper Networks SRX Series Services Gateways Certain features described in this document are not available across the entire SRX Series product line Readers should consult Juniper Networks product specific literature for more details Software Requirements JUNOS Release 9 5 or later for all branch SRX Series Services Gateways Description and Deployment Scenario The included examples are not intended to be Juniper recommended configurations as they only meet the security requirements of the simplest deployments such as a small home office However with some modification they can be used to connect and secure larger remote and branch offices to a larger central site The approach of this document is to begin with an SRX Series as it ships from the factory and progressively work through the steps necessary to build a usable base configuration Default Firewall Configuration The first configuration is often associated with default firewall behavior All outbound traffic from a private network is allowed and uses source NAT while inbound traffic from the Internet not matching an established session is blocked The first time that branch SRX Series Services Gateways are powered on they will boot using the factory default configuration as follows Atrust and untrust zone will be created e Interface ge 0 0 0 will be assigned the IP address 192 168 1 1 and will be bound to the trust zone e A DHCP server instance will be enabled o
9. etwork infrastructure ge 0 0 0 192 168 1 0 24 Untrust Zone Trust Zone Copyright 2009 Juniper Networks Inc 5 APPLICATION NOTE Quickstart Guide for Branch SRX Series Services Gateways Configuration To illustrate the simplicity of setting up IPsec tunnels the command sequence is divided into four repeatable steps Readers should refer to standard Juniper Networks documentation to further understand the various IKE IPsec configuration options 1 Create a secure tunnel interface set interfaces st0 unit 0 family inet set security zones security zone trust interfaces st0 0 set security ike proposal P1 AES authentication method pre shared keys set security ike proposal P1 AES dh group group2 set security ike proposal P1 AES authentication algorithm shal set security ike proposal P1 AES encryption algorithm aes 128 cbc set security ike policy ike policy 1 mode main set security ike policy ike policy 1 proposals P1 AES set security ike policy ike policy 1 pre shared key ascii text juniper set security ike gateway gwl address 1 1 1 2 set security ike gateway gwl external interface fe 0 0 7 0 Set security ike gateway gwl ike policy ike policy 1 Set security ipsec proposal P2 AES protocol esp set security ipsec proposal P2 AES authentication algorithm hmac shal 96 set security ipsec proposal P2 AES encryption algorithm aes 128 cbc set security ipsec policy ipsec policy 1 proposals P2 AES set security
10. ges The defaults can be viewed by using the operational mode command show configuration groups junos defaults security utm feature profile anti virus juniper express engine profile junos eav defaults Copyright O 2009 Juniper Networks Inc 7 APPLICATION NOTE Quickstart Guide for Branch SRX Series Services Gateways Web Filtering Configuration Using the SRX Series Services Gateways to filter Web traffic is also very straightforward 1 Configure the SRX Series device to use the integrated Web filtering engine Note The predefined profile junos wf cpa default is configured to use the SurfControl CPA URL category database hosted by Websense that contains over 26 million Web sites classified into 40 easy to use categories IDP Configuration The SRX Series Services Gateways offer the same set of IDP signatures that are available on Juniper Networks IDP Series Intrusion Detection and Prevention Appliances to secure networks against attacks In this example configuration the SRX Series device is configured to use a predefined IDP policy to secure the network 1 Download and install the latest security package request security idp security package download request security idp security package install request security idp security package download policy templates request security idp security package install policy templates 3 Enable the templates xsl scripts file At commit time the JUNOS management process mgd
11. n be configured to provide switching and routing simultaneously An SRX Series device uses virtual L3 interfaces to support integrated routing and bridging IRB or equivalently routing between a set of switched and routed interfaces Today this design is widely adopted on enterprise switches Implementing route bridging in a security device is more challenging than in a switch because security policies are applied to both inter zone and intra zone traffic JUNOS implements IRB with the help of VLANs combined with interfaces A VLAN is a collection of interfaces that can be grouped together into a broadcast domain JUNOS switches Ethernet frames within a VLAN rather than routing IP packets A virtual interface called VLAN is used to route traffic between the switched ports and routed ports This architectural approach is very similar to connecting a standalone switch to a port on the firewall Note Readers may want to skip this configuration and try it at the end as subsequent examples build upon the first example UNTRUST ZONE fe 0 0 7 1 1 1 1 30 vlan i f 192 168 1 1 24 trust zone Untrust Zone Pe Ol Trust Zone To illustrate this firewall configuration the following design assumptions are made Interface fe 0 0 7 provides connection to the Internet Grouping the following interfaces creates a VLAN ge 0 0 0 ge 0 0 1 fe 0 0 2 fe 0 0 3 VLAN interface with an IP address 192 168 1 1 24 is cre
12. n interface ge 0 0 0 Three security policies one inter zone and two intra zone will be created trust zone to trust zone intra zone default permit policy trust zone to untrust zone inter zone default permit policy untrust zone to trust zone inter zone default deny policy To illustrate a common default firewall configuration a Juniper Networks SRX210 Services Gateway will be used and the following design assumptions will be made e The protected network is connected to interface ge 0 0 0 in the trust zone e Connectivity to the Internet is through interface fe 0 0 7 in the untrust zone The IP address of interface fe 0 0 7 is either statically configured or assigned via DHCP Copyright O 2009 Juniper Networks Inc 1 APPLICATION NOTE Quickstart Guide for Branch SRX Series Services Gateways UNTRUST ZONE fe 0 0 7 1 1 1 1 30 ge 0 0 0 192 168 1 0 24 m Untrust Zone Trust Zone Figure 1 Corporate and branch office network infrastructure Configuration SRX Series Services Gateways can be configured from the command line interface CLI or through the Juniper Networks J Web Software GUI To use J Web connect a management PC to interface ge 0 0 0 The IP address of the PC can be statically configured or assigned by the factory default DHCP server enabled on ge 0 0 0 For this example an SRX210 will be configured using the CLI and the management PC will be assigned a static IP address of
13. to allow secure management access and NAT will be applied to all outbound traffic 1 Create an administrative user to manage the SRX Series device set system login user johndoe class super user set system login user johndoe authentication plain text password will prompt for password set system services ssh Set security zones security zone untrust host inbound traffic system services ssh 6 Set fe 0 0 7 IP address and default route configuration a To assign the IP address and gateway statically set interfaces fe 0 0 7 unit 0 family inet address 1 1 1 1 30 set routing options static route 0 0 0 0 0 next hop ip address of the upstream router set interfaces fe 0 0 7 unit 0 family inet dhcp Set security zones security zone untrust interfaces fe 0 0 7 0 host inbound traffic system services dhcp set security nat source rule set interface nat from zone trust set security nat source rule set interface nat to zone untrust Set security nat source rule set interface nat rule rulel match source address 0 0 0 0 0 destination address 0 0 0 0 0 set security nat source rule set interface nat rule rulel then source nat interface Copyright O 2009 Juniper Networks Inc 3 APPLICATION NOTE Quickstart Guide for Branch SRX Series Services Gateways Firewall Configuration for Outbound Access Using IRB To eliminate the need for an external switch if the SRX Series device has enough available ports SRX Series Services Gateways ca

Download Pdf Manuals

image

Related Search

Related Contents

  Z 5000 / Z 5002 Barella cucchiaio  Liberator G4 Manual Nov 07 12.qxp:G4 Liberator  Classic S127 Bedienungsanleitung Mode d`emploi Istruzioni per l`uso  取扱説明書ダウンロード  MÁQUINA DE ALGODÓN DE AZÚCAR    Samsung RSA1NTPE manual de utilizador  SIDEKICK PC BENUTZERHANDBUCH  

Copyright © All rights reserved.
Failed to retrieve file