Skip to content

thomaxxl/juniper-sec

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

83 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

jncis-sec

Detailed Objectives

##Junos Security Overview alt text

[edit firewall family inet]
root# show
filter packet-mode {
    interface-specific;
    term 1 {
        then {
            count packets;
            packet-mode;
            accept;
        }
    }
}

session based forwarding

SRX Series Hardware (1)

  • IOC
  • SPC
  • FPC
  • number of interfaces

##Zones (4)

# show security zones security-zone trust
tcp-rst;
address-book {
    address lan 10.32.32.0/24;
    address company {
        dns-name company.com;
    }
}
screen myscreen;
host-inbound-traffic {
    system-services {
        all;
        telnet {
            except;
        }
    }
}
interfaces {
    ge-0/0/0.0;
}

##Security Policies (5)

# set security forwarding-options family inet6 mode flow-based
> show security flow session [ extensive ]
> show security flow status
> show security policies from-zone trust to-zone untrust detail

#show groups junos-defaults [ applications ]

[edit applications]
root# show
application junos-ftp {
    application-protocol ignore;
    protocol tcp;
    destination-port 6021;
    inactivity-timeout never;
}

troubleshooting:
http://inetzeroblog.com/troubleshooting-security-policies/#more-622

# set schedulers scheduler working-hours [ monday daily ... ] [ time ]

root# show security policies from-zone trust to-zone untrust
policy default-permit {
    match {
        source-address any;
        destination-address any;
        application any;
    }
    then {
        permit {
            firewall-authentication {
                web-authentication {
                    client-match contractors;
                }
            }
        }
        log {
            session-init;
        }
    }
    scheduler-name working-hours;
}

# set security policies policy-rematch
# insert policy

policy is only applied to first packet in flow

##Firewall User Authentication (1)

web / passthrough

# set access profile admin-access session-options client-idle-timeout 120
# set access profile contractors client ext1 client-group C1 firewall-user password blah
> show security firewall-authentication [ history users ]

types only one type can be used simultaneously

client groups: list of groups associated with a client

timeout : 10 min authentication order

##Screen Options (3)

# show security screen
ids-option untrust-screen {
    alarm-without-drop;
    icmp {
        ip-sweep;
        fragment;
        large;
        flood;
        ping-death;
    }
    ip {
        bad-option;
        record-route-option;
        timestamp-option;
        security-option;
        stream-option;
        spoofing;
        source-route-option;
        loose-source-route-option;
        strict-source-route-option;
        unknown-protocol;
        block-frag;
        tear-drop;
    }
    tcp {
        syn-fin;
        fin-no-ack;
        tcp-no-flag;
        syn-frag;
        port-scan;
        syn-ack-ack-proxy;
        syn-flood {
            alarm-threshold 1024;
            attack-threshold 200;
            source-threshold 1024;
            destination-threshold 2048;
            queue-size 2000; ## Warning: 'queue-size' is deprecated
            timeout 20;
        }
        land;
        winnuke;
    }
    udp {
        flood;
    }
    limit-session {
        source-ip-based 1000;
        destination-ip-based 1000;
    }
}

> show security screen ids-option untrust-screen
> show security screen statistics zone trust


##NAT (4)

  • Source NAT
# set security nat source address-persistent

pool A {
    address {
        1.1.1.1/32 to 1.1.1.100/32;
    }
    host-address-base 10.1.1.1/32;
    port no-translation
    overflow-pool interface
}
pool-utilization-alarm raise-threshold 50 clear-threshold 40;

source-nat off

nat pools should never overlap

  • Destination NAT

static source pool...

sec policy: drop-untranslated

proxy arp

show security nat source rule rulename show security nat source pool poolname show security nat source summary

##IPsec VPNs (3)

ike {
    proposal ike-phase1-proposal {
        authentication-method pre-shared-keys;
        dh-group group2;
        authentication-algorithm sha1;
        encryption-algorithm 3des-cbc;
        lifetime-seconds 86400;
    }
    policy ike-phase1-policy {
        mode main;
        proposals ike-phase1-proposal;
        pre-shared-key ascii-text "$9$6qsMAtOrlMXNbp0MX"; ## SECRET-DATA
    }
    gateway gw-chicago {
        ike-policy ike-phase1-policy;
        address 100.1.1.1;
        external-interface ge-0/0/0.0;
    }
}
ipsec {
    proposal phase-2 {
        protocol esp;
        authentication-algorithm hmac-md5-96;
        encryption-algorithm des-cbc;
        lifetime-seconds 28800;
    }
    policy phase2-policy {
        perfect-forward-secrecy {
            keys group2;
        }
        proposals phase-2;
    }
    vpn ike-vpn-chicago {
        bind-interface st0.0;
        ike {
            gateway gw-chicago;
            proxy-identity {
                local 192.168.2.0/24;
                remote 192.168.1.0/24;
                service any;
            }
            ipsec-policy phase2-policy;
        }
        establish-tunnels immediately;
    }
}

Dynamic vpn

Static vpn

Debug single vpn: request security ike debug-enable local 81.246.13.226 remote 91.176.128.1

Error codes:

  • No proposal chosen :

    • proposal mismatch
    • tunnel interface not in security zone

How to analyze the IKE Phase 1 messages in the Kmd Log for a J Series or SRX Series device : http://kb.juniper.net/InfoCenter/index?page=content&id=KB10101

How to analyze IKE Phase 2 Messages in the Kmd Log for a J Series or SRX Series device : http://kb.juniper.net/InfoCenter/index?page=content&id=KB10099

  • Policy based vpn
set security policies from-zone trust to-zone vpnD policy trust-vpnD then permit tunnel ipsec-vpn myvpn

##High Availability (HA) Clustering (3)

> set chassis cluster cluster-id <0-15> node <0-1> reboot

# set groups node0 system host-name SRX-node0
# set groups node0 interfaces fxp0 unit 0 family inet address 10.32.1.21/24
# set groups node1 system host-name SRX-node1
# set groups node1 interfaces fxp0 unit 0 family inet address 10.32.1.22/24
# set apply-groups "${node}"
# set chassis cluster control-link-recovery
# set chassis cluster reth-count 16
# set chassis cluster redundancy-group 0 node 0 priority 200
# set chassis cluster redundancy-group 0 node 1 priority 100
# set chassis cluster redundancy-group 1 node 1 priority 100
# set chassis cluster redundancy-group 1 node 0 priority 200

# set chassis cluster cluster-id 1 node 0 reboot
# set chassis cluster cluster-id 1 node 1 reboot

# set interfaces fab0 fabric-options member-interfaces ge-X/X/X
# set interfaces fab1 fabric-options member-interfaces ge-X/X/X

http://kb.juniper.net/InfoCenter/index?page=content&id=KB15504

##IDP (1) Install IDP license

> start shell
% cd /var/tmp
% scp user@server:dir1/licensefile.txt .
% cd /var/db/idpd
% scp user@server:/dir1/idp.tar.tgz
% tar xzvf idp.tar.tgz
% exit

> request system license add /var/tmp/licensefile.txt
> show system license (look for installed license)
> request security idp security-package install
> request security idp security-package install status (repeat until you get a “done”)
> request security idp security-package install policy-templates (templates from juniper)
> configure
# set system scripts commit file templates.xsl
# commit
# set security idp active-policy ? (to view available policies)

Custom signature : http://kb.juniper.net/InfoCenter/index?page=content&id=KB21338

[edit security]
root@srx# show idp 
idp-policy testidp {
    rulebase-ips {
        rule 1 {
            match {
                from-zone trust;
                source-address any;
                to-zone untrust;
                destination-address any;
                application default;
                attacks {
                    custom-attacks myattack;
                }
            }
            then {
                action {
                    drop-connection;
                }
                notification {
                    log-attacks;
                }
            }
        }
    }
}                                       
active-policy testidp;
custom-attack myattack {
    severity major;
    attack-type {
        signature {
            context ftp-get-filename;
            pattern ".*\.\[exe\]";
            direction client-to-server;
        }
    }
}

Enable Policies

# edit security idp
# delete idp-policy DMZ_Services
# delete idp-policy DNS_Services
# delete idp-policy File_Server
# delete idp-policy Getting_Started
# delete idp-policy IDP_Default
# delete idp-policy Web_Server
# show idp-policy Recommended (only template left after deletes above)
# delete idp-policy Recommended rulebase-ips rule 1 (or any rule you do not want 1 – 9 )
# set active-policy Recommended (sets the IPS policy)

apply ips policy to a security policy

top edit security policies from-zone untrust to-zone zone_name
set policy webservers then permit application-services idp (choose your then stmt and put in idp)
delete system scripts (delete the templates.xsl script from above)

terminal rules

rulebase-ips / rulebase-exempt close-client-and-server

##Unified Threat Management (UTM) (1)

anti-spam, anti-virus, web-filtering

set security policy from-zone untrust to-zone trust policy test then permit application-services utm-policy <policy name>

> show security utm content-filtering statistics
> show security utm anti-virus status

then {
  permit {
    application-services {
      utm-policy ftp-inspect;
    }
  }
}

http://www.trapezenetworks.com/us/en/local/pdf/app-notes/3500149-en.pdf

http://jncie-sec.exactnetworks.net/2012/11/srx-utm-web-filtering.html

http://www.aiotestking.com/juniper/what-are-two-pattern-lists-that-can-be-configured-in-the-junos-os-4/

http://www.juniper.net/techpubs/en_US/junos12.1/topics/concept/utm-content-filtering-overview.html

> request security utm anti-virus juniper-express-engine patern-delete

# set content-filtering profile myprofile block-mime

Web Content Filtering Configuration Example: http://kb.juniper.net/InfoCenter/index?page=content&id=KB17285 http://www.juniper.net/documentation/en_US/junos12.1/topics/example/utm-antivirus-express-feature-profile-configuring-cli.html full/express av how is traffic evaluated when the av update is in progress? :: forwarded without inspection + log message

configure antispam : http://www.juniper.net/techpubs/en_US/junos12.1x46/topics/example/utm-antispam-filter-server-based-configuring-cli.html ##Anti Virus (2) http://kb.juniper.net/InfoCenter/index?page=content&id=TN13 trickling

layers of decompression... ##Web Filtering (1)

http://www.juniper.net/techpubs/en_US/junos12.1/information-products/pathway-pages/security/security-utm-web-filtering.pdf

types : enhanced, redirect, local, integrated...

Local : urls and associated actions in local db https://www.juniper.net/documentation/en_US/junos11.4/topics/example/utm-web-filtering-local-custom-object-configuring-cli.html

Integrated web filtering : http://kb.juniper.net/InfoCenter/index?page=content&id=KB16334 http://kb.juniper.net/InfoCenter/index?page=content&id=KB17287

Enhanced Web Filtering : http://kb.juniper.net/InfoCenter/index?page=content&id=KB22483

http://www.aiotestking.com/juniper/which-type-of-web-filtering-by-default-builds-a-cache-of-server-actions-associated-with-each-url-it-has-checked-4/

##Var

detailed objectives: http://www.juniper.net/us/en/training/certification/resources_jno_332.page

http://rtoodtoo.net/category/jncip-sec/ http://exam.test4actual.com/JN0-632.pdf

http://quizlet.com/12835799/juniper-jncis-jsec-jn0-332-flash-cards/

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages