Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Juniper Screenos concepts and terminology

2025-03-26 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Overview of 1.Netscreen Firewall:

a. Features: layer 2 and layer 3 forwarding

Basic packet filtering

NAT network address translation

The function of × ×

B. UTM Unified threat Management

Firewall, router, IPS,IDS, antivirus integration

(such as Tianrongxin, Lenovo domain)

Transparent bridging function of 2.Netscreen:

Configure the firewall to bridge transparently:

Transparent bridging:

A.Forward forwards data Fram

B.Flood flooding data Fram

C.Filter filters data frames (based on destination MAC address)

Layer 3 packet forwarding function of 3.Netscree

Layer 3 packet forwarding based on destination IP address

Based on three tables:

a. Static routing table (used more)

b. Dynamic routing table

c. Default routing tabl

Firewall function of 4.Netscreen

Packet filtering based on IP header

Protocol bits of a.IP source and destination address IP

Port number of b.TCP/UDP

c. Scheduled firewall policy

NAT conversion function of 5.Netscreen

Source NAT and destination NAT conversion

6. The × × function of Netscreen

a. Policy-based IPSEC (policy)

b. Routing-based xxxx

Juniper firewall architecture:

Firewall terminology and basic components of 1.Juniper

a. Interface

Zone

Virtual router

Virtual system

View the interface of the firewall:

Fire- > get interface

View the Zone of the firewall:

Fire- > get zone

View the virtual router of the firewall:

Fire- > get vrouter

Virtual multiple routing systems in physical firewall

View the virtual system of the firewall:

Fire- > get vsys

Virtual multiple firewalls are called virtual systems in physical firewalls.

b. Relationship of components:

IP belongs to the interface

The API belongs to Zone

Zone belongs to a virtual router

Virtual router belongs to virtual system

* Firewall policies are based on inter-Zone

à exec port-mode changes the port of 5GT, there are four modes; you can change the mode of the interface

* when configuring an IP address to an interface, the interface must be configured in a Zone

c. Interface definition of firewall

1. Physical interface

Eth0/0, serial Serial Interface, FastEthernet0/0, Gi0/0

two。 Virtual interface

VLAN interface, loopback interface, Tunnel (mainly used for × × ×), Multilink bundled interface

d. Advanced features of the firewall

1. State-based Firewall Detection

2.ALG Application layer Gateway

3. Defense

Prevent Ddos distributed denial of service * *

Virus scanning

IPS functionality (signature-based defense)

Protection and filtering of URL URL

8. Steps for data traffic to pass through the Juniper firewall:

a. Traffic enters the API and belongs to Source Zone

b. Through Screen Filter

C. Search for Session, whether there is a session at present

If the traffic can match Session, it goes directly into the internal process of the firewall.

If the traffic cannot match any Session, proceed to the next step

d. Check if the MIP/VIP is matched (if address mapping has been done)

e. Detect whether it matches the routing process

F check whether the policy matches the firewall

g. Detect whether to match NAT (NAT-src, / dst)

h. Establish the Session of the firewall

i. Enter the internal process of the firewall (forward packets)

Screen Filter > Session > MIP/VIP > Route lookup > Route Policy > normal NAT > establish session

9. Juniper's product line:

a. Application-based

Only one virtual system Root (small office, business, home users) is supported.

5GT/HSC / SSG-20 / SSG 140 / SSG 520 550

b. System-based

Support for multiple virtual systems (large enterprises or ISP)

ISG 1000 / 2000 NS 5400 / NS 5200 / NS 500

(ISG Integrated Services Gateway)

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report