workbook:jno-332:332_policies
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
workbook:jno-332:332_policies [2017/05/16 16:43] – k | workbook:jno-332:332_policies [2021/08/12 08:35] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ===== 332 Security Policies ===== | + | ===== JN0-332: Junos Security Policies ===== |
** Необходимые знания по Security Policies: ** | ** Необходимые знания по Security Policies: ** | ||
*Identify the concepts, benefits and operation of security policies | *Identify the concepts, benefits and operation of security policies | ||
Line 11: | Line 11: | ||
*ALGs :!: | *ALGs :!: | ||
*Address books :!: | *Address books :!: | ||
- | *Applications | + | *Applications |
*Demonstrate knowledge of how to configure, monitor and troubleshoot security policies | *Demonstrate knowledge of how to configure, monitor and troubleshoot security policies | ||
*Policies | *Policies | ||
Line 38: | Line 38: | ||
=== Действия политики === | === Действия политики === | ||
* permit - разрешаем трафик и создаем сессии. | * permit - разрешаем трафик и создаем сессии. | ||
- | * Firewall | + | * **firewall-authenication** - прикручиваем авторизацию для доступа к какому-либо сервису ([[workbook: |
- | * ipsec tunnel - заворачиваем попавший под политику трафик в ipsec туннель (policy based ipsec). | + | [edit security policies from-zone TRUST to-zone UNTRUST] |
- | * IDP - передаем трафик на анализ системе предотвращения вторжений. | + | root@bluebox# |
- | * UTM - заворачиваем трафик в антивирус, | + | Possible completions: |
+ | + apply-groups | ||
+ | + apply-groups-except | ||
+ | > pass-through | ||
+ | > web-authentication | ||
+ | </ | ||
+ | * **tunnel** - заворачиваем попавший под политику трафик в ipsec туннель (policy based ipsec).< | ||
+ | [edit security policies from-zone TRUST to-zone UNTRUST] | ||
+ | root@bluebox# | ||
+ | Possible completions: | ||
+ | + apply-groups | ||
+ | + apply-groups-except | ||
+ | ipsec-group-vpn | ||
+ | ipsec-vpn | ||
+ | pair-policy | ||
+ | </ | ||
+ | * **destination-address** < | ||
+ | [edit security policies from-zone TRUST to-zone UNTRUST] | ||
+ | root@bluebox# | ||
+ | Possible completions: | ||
+ | < | ||
+ | + apply-groups | ||
+ | + apply-groups-except | ||
+ | drop-translated | ||
+ | drop-untranslated | ||
+ | | Pipe through a command | ||
+ | </ | ||
+ | * **application-services** | ||
+ | [edit security policies from-zone TRUST to-zone UNTRUST] | ||
+ | root@bluebox# | ||
+ | Possible completions: | ||
+ | > application-firewall | ||
+ | + apply-groups | ||
+ | + apply-groups-except | ||
+ | gprs-gtp-profile | ||
+ | gprs-sctp-profile | ||
+ | idp Intrusion detection and prevention | ||
+ | redirect-wx | ||
+ | reverse-redirect-wx | ||
+ | > uac-policy | ||
+ | utm-policy | ||
+ | </ | ||
* reject - дропаем трафик и отправляем icmp unrechable для UPD трафика и RST для TCP трафика. | * reject - дропаем трафик и отправляем icmp unrechable для UPD трафика и RST для TCP трафика. | ||
* deny - тихо дропаем трафик. | * deny - тихо дропаем трафик. | ||
Line 261: | Line 302: | ||
==== Applications ==== | ==== Applications ==== | ||
+ | Application это один из критериев политики безопасности с помощью которого описываются порты и протоколы по которым бегает трафик. Есть пачка предустановленных приложений, | ||
+ | |||
+ | Вывод: | ||
+ | < | ||
+ | admin@kem-01-srx2> | ||
+ | # | ||
+ | # File Transfer Protocol | ||
+ | # | ||
+ | application junos-ftp { | ||
+ | application-protocol ftp; | ||
+ | protocol tcp; | ||
+ | destination-port 21; | ||
+ | } | ||
+ | # | ||
+ | # Trivial File Transfer Protocol | ||
+ | # | ||
+ | application junos-tftp { | ||
+ | application-protocol tftp; | ||
+ | protocol udp; | ||
+ | destination-port 69; | ||
+ | } | ||
+ | # | ||
+ | # Real Time Streaming Protocol | ||
+ | # | ||
+ | application junos-rtsp { | ||
+ | application-protocol rtsp; | ||
+ | protocol tcp; | ||
+ | destination-port 554; | ||
+ | } | ||
+ | ... etc ... | ||
+ | </ | ||
+ | |||
+ | В таком же стиле можно писать свои application, | ||
+ | < | ||
+ | admin@kem-01-srx2> | ||
+ | application VIPNET-PORT { | ||
+ | term t1 protocol udp destination-port 55777; | ||
+ | } | ||
+ | application TCP-6810-6820 { | ||
+ | term t1 protocol tcp destination-port 6810-6820; | ||
+ | } | ||
+ | application TCP-7000-7030 { | ||
+ | term t1 protocol tcp destination-port 7000-7030; | ||
+ | } | ||
+ | application junos-syslog inactivity-timeout 6; | ||
+ | application TCP-9443 { | ||
+ | term t1 protocol tcp destination-port 9443; | ||
+ | } | ||
+ | application TCP-48999 { | ||
+ | protocol tcp; | ||
+ | destination-port 48999; | ||
+ | } | ||
+ | application-set SET-ZENIT-POS-PORTS { | ||
+ | application TCP-7000-7030; | ||
+ | application TCP-6810-6820; | ||
+ | } | ||
+ | </ | ||
---- | ---- | ||
- | ===== Список используемых материалов ===== | + | ===== Полезные материалов ===== |
* [[http:// | * [[http:// | ||
+ | |||
+ | {{tag> |
workbook/jno-332/332_policies.1494942226.txt.gz · Last modified: (external edit)