Juniper Overview SSG500
Juniper Overview SSG500
Juniper Overview SSG500
Volume 1:
Overview
www.juniper.net
Part Number: 530-017767-01, Revision 02
Copyright Notice
Copyright 2007 Juniper Networks, Inc. All rights reserved.
Juniper Networks and the Juniper Networks logo are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other
trademarks, service marks, registered trademarks, or registered service marks in this document are the property of Juniper Networks or their respective
owners. All specifications are subject to change without notice. Juniper Networks assumes no responsibility for any inaccuracies in this document or for
any obligation to update information in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication
without notice.
FCC Statement
The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A
digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the
equipment is operated in a commercial environment. The equipment generates, uses, and can radiate radio-frequency energy and, if not installed and
used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential
area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense.
The following information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequency
energy. If it is not installed in accordance with Juniper Networks installation instructions, it may cause interference with radio and television reception.
This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC
rules. These specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no
guarantee that interference will not occur in a particular installation.
If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user
is encouraged to try to correct the interference by one or more of the following measures:
Connect the equipment to an outlet on a circuit different from that to which the receiver is connected.
Caution: Changes or modifications to this product could void the user's warranty and authority to operate this device.
Disclaimer
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED
WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED
WARRANTY, CONTACT YOUR JUNIPER NETWORKS REPRESENTATIVE FOR A COPY.
ii
Table of Contents
Volume 1:
Overview
About the Concepts & Examples ScreenOS Reference Guide
xlv
Volume 2:
Fundamentals
About This Volume
ix
Document Conventions.................................................................................... x
Web User Interface Conventions ............................................................... x
Command Line Interface Conventions....................................................... x
Naming Conventions and Character Types ............................................... xi
Illustration Conventions........................................................................... xii
Technical Documentation and Support ......................................................... xiii
Chapter 1
ScreenOS Architecture
Table of Contents
iii
Chapter 2
Zones
25
Interfaces
35
iv
Table of Contents
Table of Contents
Interface Modes
79
Transparent Mode.......................................................................................... 80
Zone Settings........................................................................................... 81
VLAN Zone........................................................................................ 81
Predefined Layer 2 Zones .................................................................81
Traffic Forwarding ................................................................................... 81
Unknown Unicast Options ....................................................................... 82
Flood Method.................................................................................... 83
ARP/Trace-Route Method .................................................................. 84
Configuring VLAN1 Interface for Management .................................. 87
Configuring Transparent Mode.......................................................... 89
NAT Mode...................................................................................................... 92
Inbound and Outbound NAT Traffic ........................................................ 94
Interface Settings..................................................................................... 95
Configuring NAT Mode ............................................................................ 95
Route Mode.................................................................................................... 98
Interface Settings..................................................................................... 99
Configuring Route Mode .......................................................................... 99
Chapter 5
103
Addresses ....................................................................................................103
Address Entries .....................................................................................104
Adding an Address ..........................................................................104
Modifying an Address .....................................................................105
Deleting an Address ........................................................................105
Address Groups .....................................................................................105
Creating an Address Group .............................................................107
Editing an Address Group Entry ......................................................108
Removing a Member and a Group...................................................108
Services........................................................................................................109
Predefined Services ...............................................................................109
Internet Control Messaging Protocol ...............................................110
Handling ICMP Unreachable Errors .................................................113
Internet-Related Predefined Services...............................................114
Microsoft Remote Procedure Call Services ......................................115
Dynamic Routing Protocols.............................................................117
Streaming Video..............................................................................117
Sun Remote Procedure Call Services ...............................................118
Security and Tunnel Services ..........................................................118
IP-Related Services..........................................................................119
Instant Messaging Services..............................................................119
Management Services .....................................................................119
Mail Services ...................................................................................120
UNIX Services .................................................................................120
Miscellaneous Services ....................................................................121
Table of Contents
Policies
159
Basic Elements.............................................................................................160
Three Types of Policies ................................................................................161
Interzone Policies ..................................................................................161
Intrazone Policies ..................................................................................161
Global Policies .......................................................................................162
Policy Set Lists .............................................................................................163
Policies Defined ...........................................................................................164
Policies and Rules..................................................................................164
Anatomy of a Policy ..............................................................................165
ID....................................................................................................166
Zones ..............................................................................................166
Addresses .......................................................................................166
Services...........................................................................................166
Action .............................................................................................167
Application......................................................................................167
Name ..............................................................................................168
VPN Tunneling ................................................................................168
L2TP Tunneling ...............................................................................168
Deep Inspection ..............................................................................169
Placement at the Top of the Policy List ...........................................169
Source Address Translation.............................................................169
vi
Table of Contents
Table of Contents
Traffic Shaping
193
System Parameters
217
Table of Contents
vii
Volume 3:
Administration
About This Volume
vii
Administration
Table of Contents
Table of Contents
Session ID.................................................................................................. 4
Secure Sockets Layer ................................................................................. 5
SSL Configuration................................................................................ 7
Redirecting HTTP to SSL ..................................................................... 8
Management via the Command Line Interface................................................. 9
Telnet ........................................................................................................ 9
Securing Telnet Connections ................................................................... 10
Secure Shell ............................................................................................. 11
Client Requirements.......................................................................... 12
Basic SSH Configuration on the Device ............................................. 13
Authentication .................................................................................. 14
SSH and Vsys .................................................................................... 16
Host Key ........................................................................................... 16
Example: SSHv1 with PKA for Automated Logins ............................. 17
Secure Copy ............................................................................................ 18
Serial Console.......................................................................................... 19
Remote Console ...................................................................................... 20
Remote Console Using V.92 Modem Port.......................................... 20
Remote Console Using an AUX Port.................................................. 21
Modem Port ............................................................................................ 22
Management via NetScreen-Security Manager ............................................... 22
Initiating Connectivity Between NSM Agent and the MGT System ........... 23
Enabling, Disabling, and Unsetting NSM Agent........................................ 24
Setting the Primary Server IP Address of the Management System ......... 25
Setting Alarm and Statistics Reporting..................................................... 25
Configuration Synchronization ................................................................ 26
Example: Viewing the Configuration State ........................................ 27
Example: Retrieving the Configuration Hash..................................... 27
Retrieving the Configuration Timestamp ................................................. 27
Controlling Administrative Traffic .................................................................. 28
MGT and VLAN1 Interfaces...................................................................... 29
Example: Administration Through the MGT Interface .......................29
Example: Administration Through the VLAN1 Interface .................... 29
Setting Administrative Interface Options ................................................. 30
Setting Manage IPs for Multiple Interfaces ............................................... 31
Levels of Administration ................................................................................ 33
Root Administrator .................................................................................. 33
Read/Write Administrator........................................................................ 34
Read-Only Administrator......................................................................... 34
Virtual System Administrator................................................................... 34
Virtual System Read-Only Administrator ................................................. 35
Defining Admin Users .................................................................................... 35
Example: Adding a Read-Only Admin ..................................................... 35
Example: Modifying an Admin ................................................................ 35
Example: Deleting an Admin ................................................................... 36
Example: Configuring Admin Accounts for Dialup Connections............... 36
Example: Clearing an Admins Sessions .................................................. 37
Securing Administrative Traffic ...................................................................... 37
Changing the Port Number ...................................................................... 38
Changing the Admin Login Name and Password ..................................... 39
Example: Changing an Admin Users Login Name and Password ..... 40
Example: Changing Your Own Password .......................................... 40
Setting the Minimum Length of the Root Admin Password ............... 41
Resetting the Device to the Factory Default Settings................................ 41
Table of Contents
ix
55
Table of Contents
Table of Contents
Index..........................................................................................................................IX-I
Volume 4:
Attack Detection and Defense Mechanisms
About This Volume
ix
Document Conventions.................................................................................... x
Web User Interface Conventions ............................................................... x
Command Line Interface Conventions....................................................... x
Naming Conventions and Character Types ............................................... xi
Illustration Conventions........................................................................... xii
Technical Documentation and Support ......................................................... xiii
Chapter 1
Protecting a Network
Stages of an Attack........................................................................................... 2
Detection and Defense Mechanisms ................................................................ 2
Exploit Monitoring ........................................................................................... 5
Example: Monitoring Attacks from the Untrust Zone................................. 5
Chapter 2
Reconnaissance Deterrence
27
xi
Ping of Death........................................................................................... 49
Teardrop Attack....................................................................................... 50
WinNuke ................................................................................................. 51
Chapter 4
53
Fragment Reassembly.................................................................................... 54
Malicious URL Protection......................................................................... 54
Application Layer Gateway ...................................................................... 55
Example: Blocking Malicious URLs in Packet Fragments ................... 56
Antivirus Scanning ......................................................................................... 58
External AV Scanning .............................................................................. 58
Scanning Modes................................................................................ 60
Load-Balancing ICAP Scan Servers ....................................................60
Internal AV Scanning ............................................................................... 61
AV Scanning of IM Traffic ........................................................................ 63
IM Clients.......................................................................................... 63
IM Server .......................................................................................... 64
IM Protocols ...................................................................................... 64
Instant Messaging Security Issues ..................................................... 65
IM Security Issues ............................................................................. 65
Scanning Chat Messages ................................................................... 65
Scanning File Transfers ..................................................................... 66
AV Scanning Results ................................................................................ 67
Policy-Based AV Scanning ....................................................................... 68
Scanning Application Protocols................................................................ 69
Scanning FTP Traffic ......................................................................... 70
Scanning HTTP Traffic ...................................................................... 71
Scanning IMAP and POP3 Traffic ...................................................... 73
Scanning SMTP Traffic ...................................................................... 74
Redirecting Traffic to ICAP AV Scan Servers...................................... 76
Updating the AV Pattern Files for the Embedded Scanner .......................78
Subscribing to the AV Signature Service ............................................ 78
Updating AV Patterns........................................................................ 79
AV Scanner Global Settings...................................................................... 80
AV Resource Allotment ..................................................................... 81
Fail-Mode Behavior ........................................................................... 81
Maximum Content Size and Maximum Messages (Internal AV Only) 82
HTTP Keep-Alive ............................................................................... 83
HTTP Trickling (Internal AV Only) ..................................................... 84
AV Profiles............................................................................................... 86
Assigning an AV Profile to a Firewall Policy....................................... 87
Initiating an AV Profile for Internal AV .............................................. 87
Example: (Internal AV) Scanning for All Traffic Types .......................88
Example: AV Scanning for SMTP and HTTP Traffic Only................... 88
AV Profile Settings............................................................................. 89
Anti-Spam Filtering ........................................................................................ 93
Black Lists and White Lists ...................................................................... 93
Basic Configuration.................................................................................. 94
Filtering Spam Traffic........................................................................ 94
Dropping Spam Messages .................................................................94
Defining a Black List ................................................................................ 95
Defining a White List ............................................................................... 95
Defining a Default Action......................................................................... 95
Enabling a Spam-Blocking List Server ...................................................... 96
xii
Table of Contents
Table of Contents
Deep Inspection
115
Overview .....................................................................................................116
Attack Object Database Server .....................................................................120
Predefined Signature Packs ...................................................................120
Updating Signature Packs ......................................................................121
Before You Start Updating Attack Objects .......................................122
Immediate Update ..........................................................................122
Automatic Update ...........................................................................123
Automatic Notification and Immediate Update ...............................124
Manual Update................................................................................125
Attack Objects and Groups ...........................................................................127
Supported Protocols ..............................................................................129
Stateful Signatures .................................................................................132
TCP Stream Signatures ..........................................................................133
Protocol Anomalies................................................................................133
Attack Object Groups.............................................................................134
Changing Severity Levels.................................................................134
Example: Deep Inspection for P2P..................................................135
Disabling Attack Objects........................................................................137
Attack Actions..............................................................................................138
Example: Attack ActionsClose Server, Close, Close Client ............139
Brute Force Attack Actions ....................................................................146
Brute Force Attack Objects..............................................................146
Brute Force Attack Target................................................................147
Brute Force Attack Timeout.............................................................147
Example 1.......................................................................................148
Example 2.......................................................................................148
Example 3.......................................................................................149
Attack Logging .............................................................................................149
Example: Disabling Logging per Attack Group.................................149
Mapping Custom Services to Applications ....................................................152
Example: Mapping an Application to a Custom Service...................153
Example: Application-to-Service Mapping for HTTP Attacks ............155
Customized Attack Objects and Groups........................................................156
User-Defined Stateful Signature Attack Objects......................................156
Regular Expressions........................................................................157
Example: User-Defined Stateful Signature Attack Objects ...............158
TCP Stream Signature Attack Objects ....................................................160
Example: User-Defined Stream Signature Attack Object..................161
Configurable Protocol Anomaly Parameters ..........................................162
Example: Modifying Parameters .....................................................162
Table of Contents
xiii
Negation ......................................................................................................163
Example: Attack Object Negation....................................................163
Granular Blocking of HTTP Components ......................................................167
ActiveX Controls....................................................................................168
Java Applets...........................................................................................168
EXE Files ...............................................................................................168
ZIP Files.................................................................................................168
Example: Blocking Java Applets and .exe Files................................169
Chapter 6
171
Table of Contents
Table of Contents
Table of Contents
xv
Enabling IDP..........................................................................................227
Example: Configuring a Firewall Rule for Standalone IDP ...............228
Configuring Role-Based Administration .................................................228
Example: Configuring an IDP-Only Administrator ...........................229
Managing IDP ..............................................................................................230
About Attack Database Updates.............................................................230
Downloading Attack Database Updates .................................................230
Using Updated Attack Objects .........................................................231
Updating the IDP Engine.................................................................231
Viewing IDP Logs...................................................................................233
Chapter 7
235
A-I
Index..........................................................................................................................IX-I
Volume 5:
Virtual Private Networks
About This Volume
vii
Table of Contents
Table of Contents
19
47
79
xvii
159
Dialup ..........................................................................................................160
Policy-Based Dialup VPN, AutoKey IKE..................................................160
Route-Based Dialup VPN, Dynamic Peer................................................166
Policy-Based Dialup VPN, Dynamic Peer ...............................................173
Bidirectional Policies for Dialup VPN Users............................................178
Group IKE ID................................................................................................183
Group IKE ID with Certificates ...............................................................183
Wildcard and Container ASN1-DN IKE ID Types....................................185
Creating a Group IKE ID (Certificates) ....................................................187
Setting a Group IKE ID with Preshared Keys..........................................192
Shared IKE ID ..............................................................................................198
Chapter 6
205
231
NAT-Traversal ..............................................................................................232
Probing for NAT.....................................................................................233
Traversing a NAT Device .......................................................................235
UDP Checksum......................................................................................237
Keepalive Packets..................................................................................237
Initiator/Responder Symmetry ..............................................................237
Enabling NAT-Traversal .........................................................................239
Using IKE IDs with NAT-Traversal..........................................................239
VPN Monitoring ...........................................................................................241
Rekey and Optimization Options...........................................................242
Source Interface and Destination Address .............................................243
Policy Considerations ............................................................................244
Configuring the VPN Monitoring Feature ...............................................244
SNMP VPN Monitoring Objects and Traps .............................................252
Multiple Tunnels per Tunnel Interface ..........................................................254
Route-to-Tunnel Mapping ......................................................................255
Remote Peers Addresses ......................................................................256
Manual and Automatic Table Entries .....................................................257
Manual Table Entries.......................................................................257
Automatic Table Entries ..................................................................257
Setting VPNs on a Tunnel Interface to Overlapping Subnets............259
Binding Automatic Route and NHTB Table Entries ..........................278
xviii
Table of Contents
Table of Contents
321
Overview .....................................................................................................321
How It Works...............................................................................................321
NHRP Messages.....................................................................................322
AC-VPN Tunnel Initiation .......................................................................323
Configuring AC-VPN ..............................................................................324
Network Address Translation ..........................................................324
Configuration on the Hub................................................................324
Configuration on each Spoke ..........................................................325
Example ................................................................................................326
Index..........................................................................................................................IX-I
Volume 6:
Voice-over-Internet Protocol
About This Volume
Document Conventions................................................................................... vi
Web User Interface Conventions .............................................................. vi
Command Line Interface Conventions...................................................... vi
Naming Conventions and Character Types .............................................. vii
Illustration Conventions.......................................................................... viii
Technical Documentation and Support ........................................................... ix
Chapter 1
Overview ......................................................................................................... 1
Examples ......................................................................................................... 2
Example: Gatekeeper in the Trust Zone ..................................................... 2
Example: Gatekeeper in the Untrust Zone ................................................. 3
Example: Outgoing Calls with NAT ............................................................ 4
Example: Incoming Calls with NAT............................................................ 7
Example: Gatekeeper in the Untrust Zone with NAT................................ 10
Chapter 2
13
Overview ....................................................................................................... 13
SIP Request Methods ............................................................................... 14
Classes of SIP Responses ......................................................................... 16
SIP Application Layer Gateway ................................................................ 17
Session Description Protocol Sessions ..................................................... 18
Pinhole Creation ...................................................................................... 19
Table of Contents
xix
65
Overview ....................................................................................................... 65
MGCP Security ............................................................................................... 66
About MGCP................................................................................................... 66
Entities in MGCP...................................................................................... 66
Endpoint ........................................................................................... 67
Connection ....................................................................................... 67
Call.................................................................................................... 67
Call Agent ......................................................................................... 67
Commands..............................................................................................68
Response Codes ...................................................................................... 70
Examples ....................................................................................................... 71
Media Gateway in Subscribers HomesCall Agent at the ISP ................. 71
ISP-Hosted Service................................................................................... 74
Chapter 4
79
Overview ....................................................................................................... 79
SCCP Security ................................................................................................ 80
About SCCP.................................................................................................... 81
SCCP Components................................................................................... 81
SCCP Client ....................................................................................... 81
xx
Table of Contents
Table of Contents
Volume 7:
Routing
About This Volume
ix
Document Conventions.................................................................................... x
Web User Interface Conventions ............................................................... x
Command Line Interface Conventions....................................................... x
Naming Conventions and Character Types ............................................... xi
Illustration Conventions........................................................................... xii
Technical Documentation and Support ......................................................... xiii
Chapter 1
Static Routing
Overview ......................................................................................................... 2
How Static Routing Works ......................................................................... 2
When to Configure Static Routes ............................................................... 3
Configuring Static Routes........................................................................... 5
Setting Static Routes ........................................................................... 5
Setting a Static Route for a Tunnel Interface ....................................... 9
Enabling Gateway Tracking ..................................................................... 10
Forwarding Traffic to the Null Interface ......................................................... 11
Preventing Route Lookup in Other Routing Tables .................................. 11
Preventing Tunnel Traffic from Being Sent on Non-Tunnel Interfaces...... 11
Preventing Loops Created by Summarized Routes................................... 11
Permanently Active Routes ............................................................................ 12
Changing Routing Preference with Equal Cost Multipath................................ 12
Chapter 2
Routing
13
Overview ....................................................................................................... 14
Virtual Router Routing Tables......................................................................... 15
Destination-Based Routing Table ............................................................. 16
Source-Based Routing Table .................................................................... 17
Source Interface-Based Routing Table...................................................... 19
Creating and Modifying Virtual Routers.......................................................... 21
Table of Contents
xxi
45
Overview ....................................................................................................... 46
Areas ....................................................................................................... 46
Router Classification ................................................................................ 47
Hello Protocol .......................................................................................... 47
Network Types ........................................................................................ 48
Broadcast Networks .......................................................................... 48
Point-to-Point Networks .................................................................... 48
Point-to-Multipoint Networks ............................................................ 48
Link-State Advertisements ....................................................................... 49
Basic OSPF Configuration .............................................................................. 49
Creating and Removing an OSPF Routing Instance ................................. 50
Creating an OSPF Instance................................................................ 50
Removing an OSPF Instance ............................................................. 51
Creating and Deleting an OSPF Area ....................................................... 51
Creating an OSPF Area...................................................................... 52
Deleting an OSPF Area...................................................................... 52
Assigning Interfaces to an OSPF Area ...................................................... 53
Assigning Interfaces to Areas ............................................................ 53
Configuring an Area Range ............................................................... 53
Enabling OSPF on Interfaces ................................................................... 54
Enabling OSPF on Interfaces............................................................. 54
Disabling OSPF on an Interface......................................................... 54
Verifying the Configuration...................................................................... 55
Redistributing Routes into Routing Protocols ................................................. 56
Summarizing Redistributed Routes ................................................................ 57
Summarizing Redistributed Routes.......................................................... 58
xxii
Table of Contents
Table of Contents
73
Overview ....................................................................................................... 74
Basic RIP Configuration.................................................................................. 75
Creating and Deleting a RIP Instance....................................................... 76
Creating a RIP Instance ..................................................................... 76
Deleting a RIP Instance ..................................................................... 76
Enabling and Disabling RIP on Interfaces ................................................ 77
Enabling RIP on an Interface............................................................. 77
Disabling RIP on an Interface............................................................ 77
Redistributing Routes .............................................................................. 77
Viewing RIP Information................................................................................ 79
Viewing the RIP Database........................................................................ 79
Viewing RIP Details ................................................................................. 80
Viewing RIP Neighbor Information .......................................................... 81
Viewing RIP Details for a Specific Interface ............................................. 82
Global RIP Parameters ................................................................................... 83
Advertising the Default Route ........................................................................ 84
Configuring RIP Interface Parameters ............................................................ 85
Security Configuration.................................................................................... 86
Authenticating Neighbors by Setting a Password ..................................... 86
Configuring Trusted Neighbors ................................................................ 87
Rejecting Default Routes.......................................................................... 88
Protecting Against Flooding ..................................................................... 88
Configuring an Update Threshold...................................................... 89
Enabling RIP on Tunnel Interfaces ....................................................89
Optional RIP Configurations........................................................................... 90
Setting the RIP Version ............................................................................ 90
Enabling and Disabling a Prefix Summary............................................... 92
Enabling a Prefix Summary............................................................... 92
Disabling a Prefix Summary.............................................................. 93
Setting Alternate Routes .......................................................................... 93
Demand Circuits on Tunnel Interfaces..................................................... 94
Table of Contents
xxiii
103
Overview .....................................................................................................104
Types of BGP Messages .........................................................................104
Path Attributes.......................................................................................105
External and Internal BGP .....................................................................105
Basic BGP Configuration...............................................................................106
Creating and Enabling a BGP Instance ...................................................107
Creating a BGP Routing Instance.....................................................107
Removing a BGP Instance ...............................................................108
Enabling and Disabling BGP on Interfaces .............................................108
Enabling BGP on Interfaces .............................................................108
Disabling BGP on Interfaces ............................................................108
Configuring BGP Peers and Peer Groups................................................109
Configuring a BGP Peer ...................................................................110
Configuring an IBGP Peer Group .....................................................110
Verifying the BGP Configuration ............................................................112
Security Configuration..................................................................................113
Authenticating BGP Neighbors ...............................................................113
Rejecting Default Routes........................................................................114
Optional BGP Configurations........................................................................115
Redistributing Routes into BGP ..............................................................116
Configuring an AS-Path Access List........................................................116
Adding Routes to BGP............................................................................117
Conditional Route Advertisement....................................................118
Setting the Route Weight.................................................................118
Setting Route Attributes ..................................................................119
Route-Refresh Capability .......................................................................119
Requesting an Inbound Routing Table Update ................................120
Requesting an Outbound Routing Table Update ..............................120
Configuring Route Reflection .................................................................120
Configuring a Confederation..................................................................122
BGP Communities .................................................................................124
Route Aggregation .................................................................................125
Aggregating Routes with Different AS-Paths ....................................125
Suppressing More-Specific Routes in Updates .................................126
Selecting Routes for Path Attribute..................................................127
Changing Attributes of an Aggregated Route ...................................128
Chapter 6
Policy-Based Routing
129
xxiv
Table of Contents
Table of Contents
Multicast Routing
147
Overview .....................................................................................................147
Multicast Addresses ...............................................................................148
Reverse Path Forwarding.......................................................................148
Multicast Routing on Security Devices..........................................................149
Multicast Routing Table .........................................................................149
Configuring a Static Multicast Route ......................................................150
Access Lists ...........................................................................................151
Configuring Generic Routing Encapsulation on Tunnel Interfaces ..........151
Multicast Policies..........................................................................................153
Chapter 8
155
Overview .....................................................................................................156
Hosts .....................................................................................................156
Multicast Routers ...................................................................................157
IGMP on Security Devices ............................................................................157
Enabling and Disabling IGMP on Interfaces ...........................................157
Enabling IGMP on an Interface........................................................158
Disabling IGMP on an Interface .......................................................158
Configuring an Access List for Accepted Groups ....................................158
Configuring IGMP ..................................................................................159
Verifying an IGMP Configuration ...........................................................161
IGMP Operational Parameters ...............................................................162
IGMP Proxy..................................................................................................163
Membership Reports Upstream to the Source........................................164
Multicast Data Downstream to Receivers...............................................165
Configuring IGMP Proxy ........................................................................166
Configuring IGMP Proxy on an Interface................................................166
Multicast Policies for IGMP and IGMP Proxy Configurations ..................168
Creating a Multicast Group Policy for IGMP .....................................168
Creating an IGMP Proxy Configuration............................................168
Setting Up an IGMP Sender Proxy .........................................................175
Table of Contents
xxv
Chapter 9
181
Overview .....................................................................................................182
PIM-SM ..................................................................................................183
Multicast Distribution Trees.............................................................183
Designated Router...........................................................................184
Mapping Rendezvous Points to Groups ...........................................184
Forwarding Traffic on the Distribution Tree ....................................185
PIM-SSM ................................................................................................187
Configuring PIM-SM on Security Devices......................................................187
Enabling and Deleting a PIM-SM Instance for a VR ................................188
Enabling PIM-SM Instance...............................................................188
Deleting a PIM-SM Instance.............................................................188
Enabling and Disabling PIM-SM on Interfaces........................................188
Enabling PIM-SM on an Interface ....................................................189
Disabling PIM-SM on an Interface ...................................................189
Multicast Group Policies.........................................................................189
Static-RP-BSR Messages ..................................................................189
Join-Prune Messages .......................................................................190
Defining a Multicast Group Policy for PIM-SM .................................190
Setting a Basic PIM-SM Configuration...........................................................191
Verifying the Configuration ..........................................................................195
Configuring Rendezvous Points....................................................................197
Configuring a Static Rendezvous Point ..................................................197
Configuring a Candidate Rendezvous Point ...........................................198
Security Considerations................................................................................199
Restricting Multicast Groups ..................................................................199
Restricting Multicast Sources .................................................................200
Restricting Rendezvous Points...............................................................201
PIM-SM Interface Parameters.......................................................................202
Defining a Neighbor Policy ....................................................................202
Defining a Bootstrap Border ..................................................................203
Configuring a Proxy Rendezvous Point ........................................................204
PIM-SM and IGMPv3 ....................................................................................213
Chapter 10
215
Overview .....................................................................................................215
Configuring ICMP Router Discovery Protocol ...............................................216
Enabling ICMP Router Discovery Protocol .............................................216
Configuring ICMP Router Discovery Protocol from the WebUI...............216
Configuring ICMP Router Discovery Protocol from the CLI ....................217
Advertising an Interface ..................................................................217
Broadcasting the Address................................................................217
Setting a Maximum Advertisement Interval ....................................217
Setting a Minimum Advertisement Interval .....................................217
Setting an Advertisement Lifetime Value.........................................218
Setting a Response Delay ................................................................218
Setting an Initial Advertisement Interval .........................................218
Setting a Number of Initial Advertisement Packets..........................218
Disabling IRDP .............................................................................................219
Viewing IRDP Settings..................................................................................219
xxvi
Table of Contents
Table of Contents
Index..........................................................................................................................IX-I
Volume 8:
Address Translation
About This Volume
Document Conventions................................................................................... vi
Web User Interface Conventions .............................................................. vi
Command Line Interface Conventions...................................................... vi
Naming Conventions and Character Types .............................................. vii
Illustration Conventions.......................................................................... viii
Technical Documentation and Support ........................................................... ix
Chapter 1
Address Translation
13
27
xxvii
63
Mapped IP Addresses..................................................................................... 63
MIP and the Global Zone ......................................................................... 64
Example: MIP on an Untrust Zone Interface...................................... 65
Example: Reaching a MIP from Different Zones................................ 67
Example: Adding a MIP to a Tunnel Interface ................................... 70
MIP-Same-as-Untrust ............................................................................... 70
Example: MIP on the Untrust Interface ............................................. 71
MIP and the Loopback Interface .............................................................. 73
Example: MIP for Two Tunnel Interfaces .......................................... 74
MIP Grouping .......................................................................................... 79
Example: MIP Grouping with Multi-Cell Policy................................... 79
Virtual IP Addresses ....................................................................................... 80
VIP and the Global Zone .......................................................................... 82
Example: Configuring Virtual IP Servers............................................ 82
Example: Editing a VIP Configuration ............................................... 84
Example: Removing a VIP Configuration........................................... 84
Example: VIP with Custom and Multiple-Port Services ...................... 85
Index..........................................................................................................................IX-I
Volume 9:
User Authentication
About This Guide
vii
Authentication
xxviii
Table of Contents
Table of Contents
Authentication Servers
13
Infranet Authentication
41
Authentication Users
45
Table of Contents
xxix
Chapter 5
65
89
Overview ....................................................................................................... 90
Supported EAP Types..................................................................................... 90
Enabling and Disabling 802.1X Authentication .............................................. 91
Ethernet Interfaces .................................................................................. 91
Wireless Interfaces .................................................................................. 91
Configuring 802.1X Settings........................................................................... 92
Configuring 802.1X Port Control ............................................................. 92
Configuring 802.1X Control Mode ........................................................... 93
Setting the Maximum Number of Simultaneous Users............................. 93
Configuring the Reauthentication Period ................................................. 94
Enabling EAP Retransmissions ................................................................ 94
Configuring EAP Retransmission Count ................................................... 95
Configuring EAP Retransmission Period .................................................. 95
Configuring the Silent (Quiet) Period ....................................................... 95
Configuring Authentication Server Options ....................................................96
Specifying an Authentication Server ........................................................ 96
Ethernet Interfaces............................................................................ 96
Wireless Interfaces............................................................................ 97
Setting the Account Type......................................................................... 97
Enabling Zone Verification....................................................................... 98
Viewing 802.1X Information .......................................................................... 98
Viewing 802.1X Global Configuration Information .................................. 98
Viewing 802.1X Information for an Interface .......................................... 99
Viewing 802.1X Statistics ........................................................................ 99
Viewing 802.1X Session Statistics..........................................................100
Viewing 802.1X Session Details.............................................................100
Configuration Examples ...............................................................................101
Configuring the Security Device with a Directly Connected Client and
RADIUS Server ................................................................................101
Configuring a Security Device with a Hub Between a Client and the Security
Device.............................................................................................102
Configuring the Authentication Server with a Wireless Interface ...........104
xxx
Table of Contents
Table of Contents
Index..........................................................................................................................IX-I
Volume 10:
Virtual Systems
About This Volume
Document Conventions.................................................................................... v
Web User Interface Conventions ............................................................... v
Command Line Interface Conventions...................................................... vi
Naming Conventions and Character Types ............................................... vi
Illustration Conventions.......................................................................... viii
Technical Documentation and Support ........................................................... ix
Chapter 1
Virtual Systems
Overview ......................................................................................................... 2
Vsys Objects .................................................................................................... 4
Creating a Vsys Object and Admin ............................................................ 4
Setting a Default Virtual Router for a Vsys ................................................. 6
Binding Zones to a Shared Virtual Router .................................................. 6
Logging In as a Vsys Admin ............................................................................. 7
Virtual System Profiles ..................................................................................... 8
Vsys Session Counters ............................................................................... 9
Vsys Session Information .......................................................................... 9
Behavior in High-Availability Pairs ........................................................... 10
Creating a Vsys Profile............................................................................. 10
Setting Resource Limits ........................................................................... 10
Adding Session Limits Through Vsys Profile Assignment ......................... 12
Setting a Session Override ....................................................................... 13
Overriding a Session Limit Reached Alarm ....................................... 13
Deleting a Vsys Profile ............................................................................. 13
Viewing Vsys Settings .............................................................................. 14
Viewing Overrides............................................................................. 14
Viewing a Profile ............................................................................... 15
Viewing Session Statistics.................................................................. 16
Sharing and Partitioning CPU Resources ........................................................ 16
Configuring CPU Weight .......................................................................... 17
Fair Mode Packet Flow ............................................................................ 18
Returning from Fair Mode to Shared Mode.............................................. 19
Enabling the CPU Limit Feature ............................................................... 19
Measuring CPU Use ................................................................................. 20
Setting the Shared to Fair Mode CPU Utilization Threshold...................... 22
Configuring a Method to Return to Shared Mode ..................................... 25
Setting a Fixed Root Vsys CPU Weight..................................................... 26
Vsys and Virtual Private Networks .................................................................26
Viewing Security Associations.................................................................. 27
Viewing IKE Cookies................................................................................ 27
Policy Scheduler............................................................................................. 28
Creating a Policy Scheduler ..................................................................... 28
Binding a Policy Schedule to a Policy....................................................... 29
Viewing Policy Schedules......................................................................... 29
Deleting a Policy Schedule....................................................................... 30
Table of Contents
xxxi
Chapter 2
Traffic Sorting
31
Overview ....................................................................................................... 31
Sorting Traffic.......................................................................................... 31
Sorting Through Traffic............................................................................ 32
Dedicated and Shared Interfaces ............................................................. 37
Dedicated Interfaces ......................................................................... 37
Shared Interfaces .............................................................................. 37
Importing and Exporting Physical Interfaces.................................................. 39
Importing a Physical Interface to a Virtual System................................... 39
Exporting a Physical Interface from a Virtual System .............................. 40
Chapter 3
41
Overview ....................................................................................................... 41
VLANs...................................................................................................... 42
VLANs with Vsys...................................................................................... 42
Configuring Layer 2 Virtual Systems .............................................................. 43
Example 1: Configuring a Single Port ................................................ 45
Example 2: Configuring Two 4-Port Aggregates with Separate Untrust
Zones ......................................................................................... 49
Example 3: Configuring Two 4-Port Aggregates that Share One
Untrusted Zone........................................................................... 55
Defining Subinterfaces and VLAN Tags .......................................................... 62
Communicating Between Virtual Systems...................................................... 65
VLAN Retagging ............................................................................................. 68
Example:........................................................................................... 69
Chapter 4
71
Overview ....................................................................................................... 71
Designating an IP Range to the Root System ................................................. 72
Configuring IP-Based Traffic Classification ..................................................... 73
Index..........................................................................................................................IX-I
Volume 11:
High Availability
About This Volume
Document Conventions................................................................................... vi
Web User Interface Conventions .............................................................. vi
Command Line Interface Conventions...................................................... vi
Naming Conventions and Character Types .............................................. vii
Illustration Conventions.......................................................................... viii
Technical Documentation and Support ........................................................... ix
Chapter 1
Table of Contents
Table of Contents
41
xxxiii
Volume 12:
WAN, DSL, Dial, and Wireless
About This Volume
ix
Document Conventions.................................................................................... x
Web User Interface Conventions ............................................................... x
Command Line Interface Conventions....................................................... x
Naming Conventions and Character Types ............................................... xi
Illustration Conventions........................................................................... xii
Technical Documentation and Support ......................................................... xiii
Chapter 1
Table of Contents
Table of Contents
Table of Contents
xxxv
65
Table of Contents
Table of Contents
109
115
Overview .....................................................................................................116
Wireless Product Interface Naming Differences.....................................117
Basic Wireless Network Feature Configuration.............................................117
Creating a Service Set Identifier.............................................................117
Suppressing SSID Broadcast............................................................118
Isolating a Client .............................................................................118
Setting the Operation Mode for a 2.4 GHz Radio Transceiver ................119
Setting the Operation Mode for a 5GHz Radio Transceiver ....................119
Configuring Minimum Data Transmit Rate ............................................120
Configuring Transmit Power..................................................................121
Reactivating a WLAN Configuration.......................................................121
Configuring Authentication and Encryption for SSIDs ..................................122
Configuring Wired Equivalent Privacy ...................................................122
Multiple WEP Keys..........................................................................123
Configuring Open Authentication ....................................................124
Configuring WEP Shared-Key Authentication ..................................126
Configuring Wi-Fi Protected Access .......................................................127
Configuring 802.1X Authentication for WPA and WPA2 .................128
Configuring Preshared Key Authentication for WPA and WPA2 ......128
Specifying Antenna Use ...............................................................................129
Setting the Country Code, Channel, and Frequency .....................................130
Using Extended Channels ............................................................................130
Performing a Site Survey..............................................................................131
Locating Available Channels.........................................................................131
Setting an Access Control List Entry .............................................................132
Configuring Super G .....................................................................................133
Configuring Atheros XR (Extended Range) ...................................................133
Configuring Wi-Fi Multimedia Quality of Service ..........................................134
Enabling WMM ......................................................................................134
Configuring WMM Quality of Service .....................................................134
Access Categories............................................................................135
WMM Default Settings.....................................................................135
Example..........................................................................................137
Configuring Advanced Wireless Parameters.................................................138
Configuring Aging Interval .....................................................................138
Configuring Beacon Interval ..................................................................139
Configuring Delivery Traffic Indication Message Period .........................140
Configuring Burst Threshold ..................................................................140
Configuring Fragment Threshold ...........................................................140
Configuring Request to Send Threshold .................................................141
Configuring Clear to Send Mode ............................................................141
Configuring Clear to Send Rate ..............................................................142
Configuring Clear to Send Type .............................................................142
Configuring Slot Time ............................................................................143
Configuring Preamble Length ................................................................143
Table of Contents
xxxvii
Wireless Information
A-I
Volume 13:
General Packet Radio Service
About This Volume
Document Conventions.................................................................................... v
Web User Interface Conventions ............................................................... v
Command Line Interface Conventions...................................................... vi
Naming Conventions and Character Types ............................................... vi
Illustration Conventions.......................................................................... viii
Technical Documentation and Support ........................................................... ix
Chapter 1
GPRS
xxxviii
Table of Contents
Table of Contents
IP Fragmentation..................................................................................... 13
GTP-in-GTP Packet Filtering ..................................................................... 13
Example: Enabling GTP-in-GTP Packet Filtering ................................ 13
Deep Inspection ...................................................................................... 14
Example: Enabling Deep Inspection on the TEID .............................. 14
GTP Information Elements ............................................................................. 14
Access Point Name Filtering .................................................................... 15
Example: Setting an APN and a Selection Mode ................................ 16
IMSI Prefix Filtering ................................................................................. 16
Example: Setting a Combined IMSI Prefix and APN Filter ................. 17
Radio Access Technology ........................................................................ 17
Example: Setting an RAT and APN Filter........................................... 17
Routing Area Identity and User Location Information.............................. 18
Example: Setting an RAI and APN Filter............................................ 18
Example: Setting a ULI and APN Filter .............................................. 18
APN Restriction ....................................................................................... 18
IMEI-SV.................................................................................................... 19
Example: Setting an IMEI-SV and APN Filter ..................................... 19
Protocol and Signaling Requirements ...................................................... 19
Combination Support for IE Filtering ....................................................... 20
Supported R6 Information Elements ....................................................... 20
3GPP R6 IE Removal ............................................................................... 22
Example: R6 Removal....................................................................... 23
GTP Tunnels................................................................................................... 23
GTP Tunnel Limiting ................................................................................ 23
Example: Setting GTP Tunnel Limits ................................................. 23
Stateful Inspection ................................................................................... 23
GTP Tunnel Establishment and Teardown......................................... 24
Inter SGSN Routing Area Update ....................................................... 24
Tunnel Failover for High Availability........................................................ 24
Hanging GTP Tunnel Cleanup .................................................................. 25
Example: Setting the Timeout for GTP Tunnels ................................. 25
SGSN and GGSN Redirection .......................................................................... 26
Overbilling-Attack Prevention ........................................................................ 26
Overbilling-Attack Description .................................................................26
Overbilling-Attack Solution ...................................................................... 28
Example: Configuring the Overbilling Attack Prevention Feature ...... 29
GTP Traffic Monitoring ................................................................................... 31
Traffic Logging......................................................................................... 31
Example: Enabling GTP Packet Logging ............................................ 32
Traffic Counting....................................................................................... 33
Example: Enabling GTP Traffic Counting........................................... 33
Lawful Interception.................................................................................. 34
Example: Enabling Lawful Interception ............................................. 34
Index..........................................................................................................................IX-I
Volume 14:
Dual-Stack Architecture with IPv6
About This Volume
vii
Table of Contents
xxxix
Overview ......................................................................................................... 2
IPv6 Addressing ............................................................................................... 2
Notation .................................................................................................... 2
Prefixes ..................................................................................................... 3
Address Types ........................................................................................... 3
Unicast Addresses ............................................................................... 3
Anycast Addresses .............................................................................. 4
Multicast Addresses............................................................................. 4
IPv6 Headers.................................................................................................... 4
Basic Header ............................................................................................. 4
Extension Headers..................................................................................... 5
IPv6 Packet Handling ....................................................................................... 6
IPv6 Router and Host Modes............................................................................ 7
IPv6 Tunneling Guidelines................................................................................ 8
Chapter 2
IPv6 Configuration
Overview ....................................................................................................... 11
Address Autoconfiguration ...................................................................... 11
Extended Unique Identifier ............................................................... 11
Router Advertisement Messages ....................................................... 12
Router Solicitation Messages ............................................................. 12
Prefix Lists ........................................................................................ 12
Neighbor Discovery ................................................................................. 13
Neighbor Cache Table ....................................................................... 13
Neighbor Unreachability Detection ................................................... 13
Neighbor Entry Categories ................................................................ 14
Neighbor Reachability States............................................................. 14
How Reachability State Transitions Occur......................................... 15
Enabling an IPv6 Environment ...................................................................... 18
Enabling IPv6 at the Device Level............................................................ 18
Disabling IPv6 at the Device Level ........................................................... 19
Configuring an IPv6 Host ............................................................................... 19
Binding the IPv6 Interface to a Zone........................................................ 20
Enabling IPv6 Host Mode ........................................................................ 20
Setting an Interface Identifier .................................................................. 20
Configuring Address Autoconfiguration ................................................... 21
Configuring Neighbor Discovery .............................................................. 21
Configuring an IPv6 Router ............................................................................ 22
Binding the IPv6 Interface to a Zone........................................................ 22
Enabling IPv6 Router Mode ..................................................................... 22
Setting an Interface Identifier .................................................................. 23
Setting Address Autoconfiguration........................................................... 23
Outgoing Router Advertisements Flag ............................................... 23
Managed Configuration Flag.............................................................. 24
Other Parameters Configuration Flag ................................................ 24
Disabling Address Autoconfiguration ....................................................... 24
xl
Table of Contents
Table of Contents
35
Overview ....................................................................................................... 36
Dynamic Host Configuration Protocol Version 6 ............................................ 36
Device-Unique Identification.................................................................... 36
Identity Association Prefix Delegation-Identification................................ 37
Prefix Features ........................................................................................ 37
Server Preference .................................................................................... 38
Configuring a DHCPv6 Server.................................................................. 38
Configuring a DHCPv6 Client................................................................... 40
Viewing DHCPv6 Settings ........................................................................ 41
Configuring Domain Name System Servers....................................................42
Requesting DNS and DNS Search List Information .................................. 43
Setting Proxy DNS Address Splitting ........................................................ 44
Configuring PPPoE ......................................................................................... 46
Setting Fragmentation.................................................................................... 47
Chapter 4
49
Overview ....................................................................................................... 50
Dual Routing Tables................................................................................. 50
Static and Dynamic Routing .................................................................... 51
Upstream and Downstream Prefix Delegation......................................... 51
Static Routing................................................................................................. 52
RIPng Configuration....................................................................................... 53
Creating and Deleting a RIPng Instance................................................... 54
Creating a RIPng Instance .................................................................54
Deleting a RIPng Instance .................................................................54
Table of Contents
xli
Address Translation
81
Overview ....................................................................................................... 82
Translating Source IP Addresses .............................................................. 83
DIP from IPv6 to IPv4 ....................................................................... 83
DIP from IPv4 to IPv6 ....................................................................... 83
Translating Destination IP Addresses....................................................... 84
MIP from IPv6 to IPv4....................................................................... 84
MIP from IPv4 to IPv6....................................................................... 85
Configuration Examples ................................................................................. 86
IPv6 Hosts to Multiple IPv4 Hosts ............................................................ 86
IPv6 Hosts to a Single IPv4 Host .............................................................. 88
IPv4 Hosts to Multiple IPv6 Hosts ............................................................ 90
IPv4 Hosts to a Single IPv6 Host .............................................................. 91
Translating Addresses for Domain Name System Servers........................ 93
Chapter 6
97
Overview ....................................................................................................... 98
Configuring Manual Tunneling ....................................................................... 99
Configuring 6to4 Tunneling..........................................................................102
6to4 Routers..........................................................................................102
6to4 Relay Routers ................................................................................103
Tunnels to Remote Native Hosts............................................................104
Tunnels to Remote 6to4 Hosts...............................................................107
xlii
Table of Contents
Table of Contents
Chapter 7
IPSec Tunneling
111
Overview .....................................................................................................112
IPSec 6in6 Tunneling ...................................................................................112
IPSec 4in6 Tunneling ...................................................................................115
IPSec 6in4 Tunneling ...................................................................................120
Manual Tunneling with Fragmentation Enabled ...........................................124
IPv6 to IPv6 Route-Based VPN Tunnel ...................................................125
IPv4 to IPv6 Route-Based VPN Tunnel ...................................................127
Chapter 8
131
Overview .....................................................................................................132
RADIUSv6..............................................................................................132
Single Client, Single Server..............................................................132
Multiple Clients, Single Server .........................................................132
Single Client, Multiple Servers .........................................................133
Multiple Hosts, Single Server ...........................................................133
IPSec Access Session Management........................................................134
IPSec Access Session.......................................................................134
Enabling and Disabling IAS Functionality ........................................136
Releasing an IAS Session.................................................................136
Limiting IAS Settings .......................................................................136
Dead Peer Detection..............................................................................137
Configuration Examples ...............................................................................138
XAuth with RADIUS ...............................................................................138
RADIUS with XAuth Route-Based VPN...................................................139
RADIUS with XAuth and Domain Name Stripping .................................143
IP Pool Range Assignment.....................................................................147
RADIUS Retries......................................................................................153
Calling-Station-Id ...................................................................................153
IPSec Access Session .............................................................................154
Dead Peer Detection..............................................................................163
Appendix A
Switching
A-I
Index..........................................................................................................................IX-I
Table of Contents
xliii
xliv
Table of Contents
Content Security: Protects users from malicious URLs and provides embedded
antivirus scanning and web filtering. In addition, works with third-party
products to provide external antivirus scanning, anti-spam, and web filtering.
xlv
NOTE:
Untrust Zone
LAN
LAN
Internet
Redundancy: The backup device
maintains identical configuration
and sessions as those on the
primary device to assume the place
of the primary device if necessary.
(Note: Interfaces, routing paths,
power supplies, and fans can also
be redundant.)
Dynamic Routing:
The routing table
automatically updates by
communicating with
dynamic routing peers.
Dst
Use
0.0.0.0/0
1.1.1.0/24
1.2.1.0/24
10.1.0.0/16
10.2.2.0/24
10.3.3.0/24
1.1.1.250
eth3
eth2
trust-vr
tunnel.1
tunnel.2
The ScreenOS system provides all the features needed to set up and manage any
security appliance or system. This document is a reference guide for configuring
and managing a Juniper Networks security device through ScreenOS.
xlvi
Volume Organization
The Concepts & Examples ScreenOS Reference Guide is a multi-volume manual. The
following information outlines and summarizes the material in each volume:
Volume 1: Overview
Table of Contents contains a master table of contents for all volumes in the
manual.
Volume 2: Fundamentals
Chapter 2, Zones, explains security zones, tunnel zones, and function zones.
Chapter 5, Building Blocks for Policies, discusses the elements used for
creating policies and virtual private networks (VPNs): addresses (including VIP
addresses), services, and DIP pools. It also presents several example
configurations support for the H.323 protocol.
Chapter 7, Traffic Shaping, explains how you can manage bandwidth at the
interface and policy levels and prioritize services.
Volume Organization
xlvii
Volume 3: Administration
xlviii
Volume Organization
Volume Organization
xlix
Volume 7: Routing
Chapter 1, Static Routing, describes the ScreenOS routing table, the basic
routing process on the security device, and how to configure static routes on
security devices.
Chapter 3, Open Shortest Path First, describes how to configure the OSPF
dynamic routing protocol on security devices.
Volume Organization
Chapter 5, IKE, XAuth, and L2TP Users, explains how to define IKE, XAuth,
and L2TP users. Although the XAuth section focusses primarily on using the
security device as an XAuth server, it also includes a subsection on configuring
select security devices to act as an XAuth client.
Volume Organization
li
Chapter 3, ISP Failover and Dial Recovery, describes how to set priority and
define conditions for ISP failover and how to configure a dialup recovery
solution.
lii
Volume Organization
Chapter 4, Static and Dynamic Routing, explains how to set up static and
dynamic routing. This chapter explains ScreenOS support for Routing
Information Protocol-Next Generation (RIPng).
Appendix A, Switching, lists options for using the security device as a switch
to pass IPv6 traffic.
Document Conventions
This document uses the conventions described in the following sections:
To open Online Help for configuration settings, click on the question mark (?) in the
upper left of the screen.
The navigation tree also provides a Help > Config Guide configuration page to help
you configure security policies and Internet Protocol Security (IPSec). Select an
option from the dropdown menu and follow the instructions on the page. Click
the ? character in the upper left for Online Help on the Config Guide.
Document Conventions
liii
If there is more than one choice, each choice is separated by a pipe ( | ). For
example:
set interface { ethernet1 | ethernet2 | ethernet3 } manage
In text, commands are in boldface type and variables are in italic type.
NOTE:
When entering a keyword, you only have to type enough letters to identify the
word uniquely. Typing set adm u whee j12fmt54 will enter the command set
admin user wheezer j12fmt54. However, all the commands documented here
are presented in their entirety.
If a name string includes one or more spaces, the entire string must be
enclosed within double quotes; for example:
set address trust local LAN 10.1.1.0/24
Any leading spaces or trailing text within a set of double quotes are trimmed;
for example, local LAN becomes local LAN.
NOTE:
liv
Document Conventions
A console connection only supports SBCS. The WebUI supports both SBCS and
MBCS, depending on the character sets that your browser supports.
Illustration Conventions
The following figure shows the basic set of images used in illustrations throughout
this volume.
Figure 2: Images in Illustrations
Autonomous System
or
Virtual Routing Domain
Internet
Policy Engine
Tunnel Interface
Server
VPN Tunnel
Router
Switch
Juniper Networks
Security Devices
Hub
Document Conventions
lv
lvi
Master Index
Numerics
3DES ............................................................................. 5-6
3DES encryption .................................................... 14-121
4in6 tunneling
basic setup ....................................................... 14-115
definition .......................................................... 14-115
6in4 tunneling ........................................................ 14-111
basic setup ....................................................... 14-120
over IPv4 WAN ................................................ 14-120
6over4 tunneling
addresses, handling .......................................... 14-99
definition ............................................................ 14-98
manual tunneling .............................................. 14-99
types ................................................................... 14-98
when to use ....................................................... 14-98
6to4
addresses .................................. 14-8, 14-102, 14-108
hosts ................................................................. 14-107
relay routers ........................................14-102, 14-103
routers .............................................................. 14-102
tunneling ...............................................14-98, 14-102
tunneling, description ..................................... 14-102
A
AAL5 encapsulations ............................................... 12-66
AAL5 multiplexing ................................................... 12-74
Access Concentrator (AC)........................................ 14-46
access control list
See ACL
access lists
for routes .............................................................. 7-40
IGMP ................................................................... 7-158
multicast routing ............................................... 7-151
PIM-SM ............................................................... 7-199
Access Point Name
See APN
access policies
See policies
ACL .......................................................................... 12-132
ActiveX controls, blocking ...................................... 4-168
address books
addresses
adding............................................................ 2-104
modifying ...................................................... 2-105
removing ....................................................... 2-108
IX-I
administration
CLI ........................................................................... 3-9
restricting ............................................................. 3-42
WebUI .................................................................... 3-2
administration, vsys .................................................. 10-7
administrative traffic ................................................. 3-29
admins ........................................................................ 10-2
changing passwords ..................................10-4, 10-7
types ..................................................................... 10-4
ADSL
configuring interface ........................................ 12-73
overview ............................................................. 12-73
VPN tunnel ......................................................... 12-97
Advanced Encryption Standard (AES) ....................... 5-6
AES ................................................................................ 5-6
AES128 encryption ............................................... 14-121
agents, zombie ..................................................4-27, 4-29
aggregate interfaces .......................................2-37, 11-43
aggressive aging ............................................4-30 to 4-32
Aggressive mode ....................................................... 5-10
AH ..........................................................................5-3, 5-5
AIM ............................................................................ 4-130
alarms
email alert ............................................................ 3-68
reporting to NetScreen-Security Manager ........ 3-25
thresholds ............................................................ 3-69
traffic ........................................................3-68 to 3-71
alarms, thresholds ................................................... 2-172
ALG .....................................................................4-55, 6-17
SIP ......................................................................... 6-13
SIP NAT ................................................................ 6-23
ALGs
for custom services ........................................... 2-167
MS RPC ............................................................... 2-129
RTSP ................................................................... 2-130
Sun RPC ............................................................. 2-127
America Online Instant Messaging
See AIM
anti-replay checking .........................................5-52, 5-59
APN
filtering ............................................................... 13-15
selection mode .................................................. 13-15
Application Layer Gateway
See ALG
application option, in policies ................................ 2-167
ARP ..................................................................2-82, 11-52
broadcasts .......................................................... 11-29
lookup ................................................................. 11-38
ARP, ingress IP address............................................. 2-84
asset recovery log ...................................................... 3-68
assigning priorities .................................................... 9-32
Asynchronous Transfer Mode
See ATM
ATM ........................................................................... 12-67
IX-II
Master Index
Master Index
Master Index
IX-III
POP3..................................................................... 4-73
SMTP .................................................................... 4-74
subscription ......................................................... 4-78
B
back store ................................................................... 3-94
backdoor rulebase
adding to Security Policy.................................. 4-205
overview ............................................................. 4-205
backdoor rules ...........................................4-205 to 4-209
configuring actions ........................................... 4-207
configuring Match columns ............................. 4-206
configuring operation ....................................... 4-207
configuring services .......................................... 4-207
configuring severity .......................................... 4-209
configuring source and destination ................ 4-207
configuring targets ............................................ 4-209
configuring zones .............................................. 4-206
bandwidth ................................................................ 2-173
guaranteed .................................. 2-173, 2-193, 2-199
managing ........................................................... 2-193
maximum ................................... 2-173, 2-193, 2-199
maximum, unlimited........................................ 2-194
priority
default ........................................................... 2-198
levels.............................................................. 2-198
queues ........................................................... 2-198
banners ....................................................................... 9-10
BGP
AS-path access list ............................................. 7-116
communities ...................................................... 7-124
confederations ................................................... 7-122
configurations, security .................................... 7-113
configurations, verifying .................................. 7-112
external .............................................................. 7-105
internal ............................................................... 7-105
load-balancing ..................................................... 7-36
message types ................................................... 7-104
neighbors, authenticating ................................ 7-113
parameters ......................................................... 7-115
path attributes ................................................... 7-105
protocol overview ............................................. 7-104
regular expressions ........................................... 7-116
virtual router, creating an instance in ............ 7-107
BGP routes
adding................................................................. 7-117
aggregation ........................................................ 7-125
attributes, setting .............................................. 7-119
conditional advertisement ............................... 7-118
default, rejecting ............................................... 7-114
redistributing ..................................................... 7-116
reflection ............................................................ 7-120
suppressing ........................................................ 7-126
weight, setting ................................................... 7-118
IX-IV
Master Index
C
CA certificates ...................................................5-22, 5-25
cables, serial ............................................................... 3-19
C-bit parity mode..................................................... 12-13
Certificate Revocation List ...............................5-23, 5-34
loading .................................................................. 5-23
certificates .................................................................... 5-7
CA.................................................................5-22, 5-25
loading .................................................................. 5-28
loading CRL .......................................................... 5-23
local....................................................................... 5-25
requesting ............................................................ 5-26
revocation ...................................................5-25, 5-34
via email ............................................................... 5-25
Challenge Handshake Authentication Protocol
See CHAP
channels, finding available ................................... 12-131
CHAP .................................................... 5-208, 5-211, 9-79
Chargen .................................................................... 4-129
CLI .......................................................... 3-9, 14-30, 14-32
CLI, set arp always-on-dest ..............................2-74, 2-77
CLI, set vip multi -port .............................................. 8-82
clock, system
See system clock
cluster names, NSRP ....................................11-11, 11-28
clusters ...........................................................11-11, 11-34
command line interface
See CLI
common names......................................................... 9-30
CompactFlash ............................................................ 3-56
compatibility-mode option
T3 interfaces ...................................................... 12-20
Master Index
configuration
ADSL 2/2+ PIM ................................................. 12-73
virtual circuits .................................................... 12-71
VPI/VCI pair........................................................ 12-71
configuration examples
6to4 host, tunneling to a ................................ 14-108
access lists and route maps ............................. 14-61
DNS server information, requesting ............... 14-43
IPv4 tunneling over IPv6 (autokey IKE) ....... 14-117
IPv6 requests to multiple IPv4 hosts .............. 14-87
IPv6 to an IPv4 network over IPv4 ............... 14-113
IPv6 tunneling over IPv4 (autokey IKE) ....... 14-121
manual tunneling ............................................ 14-100
native host, tunneling to ................................ 14-104
PPPoE instance, configuring ............................ 14-46
prefixes, delegating ................................14-38, 14-40
static route redistribution ................................. 14-61
configuration settings, browser requirements.......... 3-2
configurations
full-mesh............................................................. 11-56
connection policy for Infranet Enforcer, configuring.....
9-42
CRL
See Certificate Revocation List
cryptographic options ...................................5-48 to 5-61
anti-replay checking ...................................5-52, 5-59
authentication algorithms ..... 5-51, 5-54, 5-57, 5-61
authentication types ..................................5-50, 5-56
certificate bit lengths .................................5-50, 5-56
dialup ........................................................5-55 to 5-61
dialup VPN recommendations ........................... 5-61
encryption algorithms .................. 5-51 to 5-57, 5-61
ESP ...............................................................5-54, 5-60
IKE ID ................................ 5-51 to 5-52, 5-57 to 5-58
IPSec protocols ...........................................5-53, 5-60
key methods ........................................................ 5-49
PFS ...............................................................5-53, 5-59
Phase 1 modes ...........................................5-49, 5-56
site-to-site .................................................5-48 to 5-55
site-to-site VPN recommendations .................... 5-55
Transport mode ................................................... 5-60
Tunnel mode........................................................ 5-60
CSU compatibility, T3 interfaces ............................ 12-20
D
Data Encryption Standard (DES) ................................ 5-6
data messages ............................................................ 11-7
databases, local ............................................. 9-15 to 9-16
DDoS ........................................................................... 4-27
decompression, AV scanning ................................... 4-89
Deep Inspection (DI) ................................ 4-134 to 4-160
attack actions ...................................... 4-138 to 4-146
attack object database ....................... 4-120 to 4-127
attack object groups .......................................... 4-134
attack object negation....................................... 4-163
attack objects ..................................................... 4-117
changing severity .............................................. 4-134
context ..................................................................... 4-I
custom attack objects ....................................... 4-156
custom services .................................. 4-152 to 4-156
custom signatures .............................. 4-157 to 4-160
disabling attack objects .................................... 4-137
license keys ........................................................ 4-118
logging attack object groups ............................ 4-149
overview ............................................................. 4-116
protocol anomalies ............................................ 4-133
re-enabling attack objects ................................ 4-137
regular expressions ............................ 4-157 to 4-158
signature packs .................................................. 4-120
stateful signatures ............................................. 4-132
stream signatures .............................................. 4-133
demand circuits, RIP ................................................. 7-94
Denial-of-Service
See DoS
DES ................................................................................ 5-6
destination gateway................................................. 14-99
device failover .......................................................... 11-57
devices, resetting to factory defaults ....................... 3-41
Device-Unique Identification (DUID) ..................... 14-36
DHCP ........................................ 2-96, 2-100, 2-243, 4-129
client ................................................................... 2-225
HA ....................................................................... 2-231
PXE scenario ...................................................... 2-237
relay agent ......................................................... 2-225
server .................................................................. 2-225
DHCPv6
client and server ................................................ 14-36
delegated prefixes ............................................. 14-38
purposes ............................................................. 14-35
TLA and SLA....................................................... 14-37
dictionary file, RADIUS ............................................... 9-2
Diffie-Hellman ............................................................ 5-10
Diffie-Hellman groups ........................................... 14-121
DiffServ ..............................................2-173, 2-200, 2-214
Master Index
IX-V
IX-VI
Master Index
E
Echo .......................................................................... 4-129
ECMP..................................................................7-36, 7-59
email alert notification .....................................3-71, 3-73
Encapsulating Security Payload
See ESP
encapsulation .............................. 14-103, 14-111, 14-117
encryption .................................................14-112, 14-115
3DES ................................................................. 14-121
AES128 ............................................................. 14-121
algorithms .............................. 5-6, 5-51, 5-54 to 5-61
NSRP ................................................................... 11-28
NSRP-Lite ........................................................... 11-15
encryption, SecurID .................................................. 9-28
endpoint host state mode
Base Reachable Time ........................................ 14-30
Duplicate Address Detection (DAD) ................ 14-31
Probe Forever state ........................................... 14-31
Probe Time ........................................................ 14-31
Reachable Time ................................................. 14-30
Retransmission Time ........................................ 14-31
Stale mode ......................................................... 14-30
ESP ................................................................. 5-3, 5-5, 5-6
authenticate only................................................. 5-54
encrypt and authenticate ..........................5-54, 5-60
encrypt only ......................................................... 5-54
evasion ............................................................4-15 to 4-25
event log ..................................................................... 3-56
exe files, blocking .................................................... 4-168
exempt rulebase
adding to Security Policy .................................. 4-201
overview ............................................................. 4-200
exempt rules ..............................................4-200 to 4-204
configuring ......................................................... 4-201
configuring attacks ............................................ 4-203
configuring from the Log Viewer .................... 4-204
configuring Match columns ............................. 4-202
configuring source and destination ................ 4-202
configuring targets ............................................ 4-203
Master Index
F
factory defaults, resetting devices to ....................... 3-41
fail-mode ..................................................................... 4-81
failover
devices ................................................................ 11-57
dual Untrust interfaces ..........................11-44, 11-47
object monitoring .............................................. 11-50
virtual systems................................................... 11-56
VSD groups ........................................................ 11-56
fallback
assigning priorities .............................................. 9-32
file extensions, AV scanning ..................................... 4-90
filter source route ...................................................... 3-96
FIN scans .................................................................... 4-15
FIN without ACK flag ................................................. 4-13
Finger ........................................................................ 4-129
floods
ICMP ..................................................................... 4-46
session table ........................................................ 4-28
SYN ................................................. 4-34 to 4-39, 4-44
UDP ....................................................................... 4-47
fragment reassembly ....................................4-54 to 4-57
full-mesh configuration ........................................... 11-56
function zone interfaces ........................................... 2-38
HA ......................................................................... 2-38
management........................................................ 2-38
G
gatekeeper devices ...................................................... 6-1
Generic Routing Encapsulation (GRE) ................... 7-151
Gi interface ................................................................. 13-2
global unicast addresses ..........................14-102, 14-120
global zones................................................................ 8-82
Gn interface ................................................................ 13-2
Gopher ...................................................................... 4-129
Gp interface ................................................................ 13-2
GPRS Tunneling Protocol (GTP)
See GTP
graphs, historical...................................................... 2-172
group expressions..............................................9-5 to 9-9
operators ................................................................ 9-5
server support...................................................... 9-14
users ....................................................................... 9-5
group IKE ID
certificates ............................................5-183 to 5-192
preshared keys ....................................5-192 to 5-198
groups
addresses ........................................................... 2-105
services ............................................................... 2-138
GTP
Access Point Name (APN) filtering .................. 13-15
GTP-in-GTP packet filtering .............................. 13-13
IMSI prefix filtering ........................................... 13-16
inspection objects................................... 13-5 to 13-7
IP fragmentation................................................ 13-13
packet sanity check ............................................. 13-8
policy-based ......................................................... 13-5
protocol ................................................................ 13-2
standards .............................................................. 13-9
stateful inspection ............................................. 13-23
tunnel timeout ................................................... 13-25
GTP messages........................................................... 13-10
length, filtering by ............................................... 13-9
rate, limiting by ................................................. 13-12
type, filtering by ................................................ 13-10
types ................................................................... 13-10
versions 0 and 1 ................................................ 13-10
GTP traffic
counting .............................................................. 13-33
logging ................................................................ 13-31
GTP tunnels
failover ................................................................ 13-24
limiting................................................................ 13-23
timeout ............................................................... 13-25
H
HA
DHCP .................................................................. 2-231
interfaces, virtual HA .......................................... 2-39
See high availability
See also NSRP
hanging GTP tunnel ................................................. 13-25
hash-based message authentication code ................ 5-6
hashing, Secure Hashing Algorithm (SHA) ......... 14-121
heartbeats
HA physical link ................................................... 11-7
RTO ....................................................................... 11-7
Help files ....................................................................... 3-2
high availability
cabling ................................................. 11-25 to 11-28
data link ................................................................ 11-7
IP tracking .......................................................... 11-52
link probes ........................................................... 11-9
messages .............................................................. 11-7
virtual interfaces ................................................ 11-27
high availability (HA) ..................................... 13-4, 13-24
high availability failover
active/active ....................................................... 11-12
active/passive ..................................................... 11-11
high availability interfaces
aggregate ............................................................ 11-43
cabling network as HA links ............................ 11-27
redundant ........................................................... 11-42
Master Index
IX-VII
I
ICMP ......................................................................... 4-129
fragments ........................................................... 4-236
large packets ...................................................... 4-237
ICMP floods ................................................................ 4-46
ICMP services ........................................................... 2-126
message codes .................................................. 2-126
message types ................................................... 2-126
IDENT ....................................................................... 4-129
Identity Association Prefix Delegation Identification
(IAPD-ID).....................................................14-37, 14-39
Ident-Reset ................................................................. 3-28
idle session timeout .................................................. 9-18
IDP
basic configuration ........................................... 4-174
configuring device for standalone IDP ........... 4-227
configuring inline or inline tap mode ............. 4-186
enabling in firewall rule.................................... 4-185
IDP attack objects.................................................... 4-184
IDP engine
updating ............................................................. 4-231
IDP modes ................................................................ 4-186
IDP rulebase
adding to Security Policy.................................. 4-188
overview ............................................................. 4-187
IDP rulebases
role-based administration ................................ 4-184
types ................................................................... 4-183
IDP rules ................................................................... 4-187
configuring ......................................................... 4-189
configuring actions ........................................... 4-195
configuring address objects ............................. 4-184
configuring attack severity............................... 4-199
configuring attacks............................................ 4-196
configuring IDP attack objects......................... 4-184
configuring IP actions ....................................... 4-197
configuring Match columns ............................. 4-189
configuring notification .................................... 4-199
configuring service objects .............................. 4-184
configuring services .......................................... 4-190
configuring source and destination ................ 4-189
configuring targets ............................................ 4-200
IX-VIII
Master Index
Master Index
Master Index
IX-IX
J
Java applets, blocking ............................................. 4-168
K
keepalive
frequency, NAT-T .............................................. 5-237
L2TP .................................................................... 5-216
keys
IX-X
Master Index
manual.....................................................5-118, 5-124
preshared ........................................................... 5-160
keys, license ............................................................. 2-250
keys, vsys .................................................................. 10-37
L
L2TP .................................................. 5-205 to 5-230, 13-3
access concentrator: See LAC
address assignments .......................................... 9-84
bidirectional ....................................................... 5-208
compulsory configuration ................................ 5-205
decapsulation ..................................................... 5-209
default parameters ............................................ 5-211
encapsulation..................................................... 5-208
external auth server ............................................ 9-84
hello signal ..............................................5-216, 5-221
Keep Alive ...............................................5-216, 5-221
L2TP-only on Windows 2000 .......................... 5-207
local database ...................................................... 9-84
network server: See LNS
operational mode .............................................. 5-208
RADIUS server ................................................... 5-211
ScreenOS support ............................................. 5-207
SecurID server ................................................... 5-211
tunnel.................................................................. 5-213
user authentication ............................................. 9-84
voluntary configuration .................................... 5-205
Windows 2000 tunnel authentication .5-216, 5-221
L2TP policies ............................................................ 2-168
L2TP users .................................................................. 9-84
server support...................................................... 9-14
with XAuth ............................................................. 9-4
L2TP-over-IPSec .................................... 5-4, 5-213, 5-218
bidirectional ....................................................... 5-208
tunnel.................................................................. 5-213
LAC ............................................................................ 5-205
NetScreen-Remote 5.0...................................... 5-205
Windows 2000 .................................................. 5-205
Land attacks ............................................................... 4-48
lawful interception ................................................... 13-34
Layer 2 Tunneling Protocol
See L2TP
LDAP ................................................... 4-129, 9-29 to 9-30
common name identifiers.................................. 9-30
distinguished names ........................................... 9-30
server ports .......................................................... 9-30
structure ............................................................... 9-29
user types supported .......................................... 9-30
license keys .............................................................. 2-250
advanced mode ................................................. 4-118
attack pattern update ....................................... 4-118
Lightweight Directory Access Protocol
See LDAP
link-local addresses ......................................14-12, 14-14
Master Index
M
MAC addresses .................................. 14-13, 14-21, 14-29
Main mode ................................................................... 5-9
malicious URL protection .............................4-54 to 4-57
Manage IP ................................................................... 2-95
manage IP .................................................................. 3-31
manage IP, VSD group 0 ........................................... 11-3
management client IP addresses ............................. 3-42
Management information base II
See MIB II
management methods
CLI ........................................................................... 3-9
console ................................................................. 3-19
SSL .......................................................................... 3-5
Telnet ...................................................................... 3-9
WebUI ..................................................................... 3-2
management options
interfaces .............................................................. 3-28
manageable ......................................................... 3-31
MGT interface ...................................................... 3-29
NetScreen-Security Manager .............................. 3-28
Master Index
IX-XI
IX-XII
Master Index
N
NAT
definition ................................................................ 8-1
IPSec and NAT ................................................... 5-232
NAT servers........................................................ 5-232
NAT-src with NAT-dst .............................8-50 to 8-61
NAT mode ................................... 2-92 to 2-97, 11-3, 13-4
interface settings ................................................. 2-95
traffic to Untrust zone ...............................2-79, 2-94
NAT vector error......................................................... 3-95
NAT-dst ............................................................8-28 to 8-61
address shifting ..................................................... 8-5
packet flow...............................................8-29 to 8-31
port mapping ...................................... 8-4, 8-28, 8-47
route considerations ..................... 8-29, 8-32 to 8-34
unidirectional translation ............................8-6, 8-10
VPNs ................................................................... 5-140
with MIPs or VIPs .................................................. 8-3
NAT-dst, addresses
range to range ............................................8-10, 8-44
range to single IP .........................................8-9, 8-41
ranges ..................................................................... 8-4
shifting .........................................................8-28, 8-44
NAT-dst, single IP
with port mapping ................................................ 8-8
without port mapping ........................................... 8-9
NAT-dst, translation
one-to-many ........................................................ 8-38
one-to-one ............................................................ 8-35
native hosts ...............................................14-102, 14-104
NAT-PT ....................................................................... 14-81
NAT-PT, IPSec, when to use .................................. 14-112
NAT-src .................................................... 8-1, 8-13 to 8-25
egress interface ............................... 8-8, 8-24 to 8-25
fixed port........................................ 8-14, 8-18 to 8-19
interface-based ...................................................... 8-2
VPNs ................................................................... 5-142
NAT-src, addresses
shifting ......................................................8-20 to 8-24
shifting, range considerations ........................... 8-20
NAT-src, DIP pools ....................................................... 8-1
fixed port................................................................ 8-7
with address shifting............................................. 8-8
with PAT ........................................... 8-7, 8-15 to 8-17
NAT-src, Route mode ................................................. 2-98
NAT-src, translation
port addresses ....................................................... 8-2
Master Index
Master Index
IX-XIII
O
objects
attack objects ..................................................... 4-209
attack objects, creating custom ....................... 4-212
attack objects, protocol anomaly .................... 4-210
attack objects, signature .................................. 4-210
objects, monitoring ................................................. 11-50
OCSP (Online Certificate Status Protocol) .............. 5-34
IX-XIV
Master Index
P
P2P ............................................................................ 4-131
Master Index
physical interface
logical interface ................................................... 2-36
physical interfaces
C-bit parity mode .............................................. 12-13
CSU compatibility .............................................. 12-20
exporting from vsys .......................................... 10-40
importing to vsys............................................... 10-39
PIM-SM ...................................................................... 7-183
configuration steps ............................................ 7-187
configuring rendezvous points ........................ 7-197
designated router .............................................. 7-184
IGMPv3 ............................................................... 7-213
instances, creating ............................................ 7-188
interface parameters ......................................... 7-202
proxy RP ............................................................. 7-204
rendezvous points ............................................. 7-184
security configurations ..................................... 7-199
traffic, forwarding ............................................. 7-185
PIM-SSM .................................................................... 7-187
ping management options ....................................... 3-28
Ping of Death ............................................................. 4-49
pinholes ...................................................................... 6-19
PKI ............................................................................... 5-22
PKI keys ........................................................................ 3-6
point-to-multipoint configuration
OSPF ..................................................................... 7-68
Point-to-Point Protocol
See PPP
Point-to-Point Protocol (PPP) .................................. 14-46
Point-to-Point Protocol over ATM
See PPPoA
Point-to-Point Protocol over Ethernet
See PPPoE
Point-to-Point Protocol over Ethernet (PPPoE) ..... 14-46
Point-to-Point Tunneling Protocol (PPTP) ................ 3-94
policies ................................................................ 2-3, 13-5
actions ................................................................ 2-167
address groups................................................... 2-166
address negation ............................................... 2-186
addresses ............................................................ 2-166
addresses in ....................................................... 2-166
alarms ................................................................. 2-172
application, linking service to explicitly ......... 2-167
authentication .................................................... 2-170
bidirectional VPNs ................................. 2-168, 5-125
changing ............................................................. 2-189
context ................................................................ 4-120
core section .............................................. 4-17, 4-118
counting .............................................................. 2-172
Deep Inspection (DI) ......................................... 2-169
deny .................................................................... 2-167
DIP groups.......................................................... 2-154
disabling ............................................................. 2-189
editing ................................................................. 2-189
Master Index
IX-XV
enabling.............................................................. 2-189
functions of ........................................................ 2-159
global ........................................... 2-162, 2-174, 2-184
HA session backup ............................................ 2-171
ID ........................................................................ 2-166
internal rules...................................................... 2-164
interzone ..........................2-161, 2-174, 2-175, 2-178
intrazone ..................................... 2-161, 2-174, 2-182
L2TP .................................................................... 2-168
L2TP tunnels ...................................................... 2-168
lookup sequence ............................................... 2-163
management ..................................................... 2-174
managing bandwidth........................................ 2-193
maximum limit ................................................. 2-107
multicast............................................................. 7-153
multiple items per component ........................ 2-185
name .................................................................. 2-168
NAT-dst............................................................... 2-169
NAT-src ............................................................... 2-169
order ................................................................... 2-190
permit ................................................................. 2-167
policy context .................................................... 2-185
policy set lists .................................................... 2-163
position at top ........................................2-169, 2-190
reject ................................................................... 2-167
removing ............................................................ 2-191
reordering .......................................................... 2-190
required elements ............................................. 2-160
root system ........................................................ 2-164
schedules............................................................ 2-172
security zones .................................................... 2-166
service book....................................................... 2-109
service groups ................................................... 2-138
services............................................................... 2-166
services in ...............................................2-109, 2-166
shadowing ...............................................2-189, 2-190
traffic logging ..................................................... 2-172
traffic shaping.................................................... 2-173
tunnel ................................................................. 2-167
types .....................................................2-161 to 2-162
verifying ............................................................. 2-189
virtual systems .................................................. 2-164
VPN dialup user groups .................................... 2-166
VPNs ................................................................... 2-168
policies, configuring .................................................. 13-6
policy-based NAT
See NAT-dst and NAT-src
policy-based NAT, tunnel interfaces......................... 2-39
policy-based VPNs ..................................................... 5-62
Port Address Translation
See PAT
port scan ....................................................................... 4-9
Portmapper .............................................................. 4-130
ports
IX-XVI
Master Index
failover................................................................ 11-42
mapping ........................................................8-4, 8-28
numbers ............................................................... 8-87
primary trusted and untrusted ........................ 11-42
redundant............................................................. 11-3
secondary trusted and untrusted .................... 11-42
ports, modem ...................................................3-20, 3-22
ports, trunk ............................................................... 10-42
PPP .................................................................5-206, 12-66
PPPoA................................................. 12-66, 12-68, 12-74
PPPoE .............................................................12-66, 12-74
PPPoE - Point-to-Point Protocol over Ethernet ..... 14-46
preempt mode ......................................................... 11-21
prefix lists ................................................................. 14-12
preshared key............................................................... 5-7
preshared keys ......................................................... 5-160
priority queuing ....................................................... 2-198
private addresses ....................................................... 2-47
probe ......................................................................... 14-31
Probe Time ............................................................... 14-31
probes
network .................................................................. 4-8
open ports .............................................................. 4-9
operating systems ......................................4-12, 4-14
proposals
Phase 1 ..........................................................5-9, 5-69
Phase 2 ........................................................5-11, 5-69
protocol anomalies .................................................. 4-133
ALGs .................................................................... 4-131
basic network protocols ................................... 4-129
configuring parameters .................................... 4-162
Instant Messaging applications........................ 4-130
P2P applications ................................................ 4-131
supported protocols ............................4-129 to 4-132
protocol distribution, reporting to NetScreen-Security
Manager ................................................................... 3-25
Protocol Independent Multicast
See PIM
protocols
CHAP .................................................................. 5-208
IGP ...................................................................... 14-51
NRTP ................................................................... 11-19
NSRP ..................................................................... 11-1
PAP ..................................................................... 5-208
PPP ...........................................................5-206, 14-46
PPPoE ................................................................. 14-46
VRRP ................................................................... 11-53
protocols, CHAP ......................................................... 9-79
proxy IDs .................................................................... 5-11
matching .....................................................5-63, 5-69
VPNs and NAT .....................................5-140 to 5-141
public addresses ........................................................ 2-47
Public key infrastructure
See PKI
Master Index
RIP
R
RA - Router Advertisement ..................................... 14-12
RADIUS ..................................... 3-39, 4-130, 9-19 to 9-22
auth server objects .............................................. 9-33
dictionary file ......................................................... 9-2
dictionary files ..................................................... 9-21
L2TP .................................................................... 5-211
object properties ................................................. 9-20
ports ...................................................................... 9-20
retry timeout ........................................................ 9-20
shared secret ....................................................... 9-20
RADIUSv6 ............................................................... 14-132
rate limiting, GTP-C messages................................ 13-12
reachability states .................................................... 14-14
reachability states, transitions ................................ 14-15
reconnaissance ................................................4-7 to 4-25
address sweep ....................................................... 4-8
FIN scans .............................................................. 4-15
IP options ............................................................. 4-10
port scan ................................................................ 4-9
SYN and FIN flags set ......................................... 4-12
TCP packet without flags .................................... 4-14
record route IP option ............................................... 4-11
redundant gateways ..................................5-291 to 5-304
recovery procedure ........................................... 5-295
TCP SYN flag checking ..................................... 5-297
regular expressions ...................................4-157 to 4-158
rekey option, VPN monitoring ............................... 5-242
Remote Authentication Dial-in User Service
See RADIUS
remote termination point ........................14-104, 14-107
replay protection........................................................ 5-12
request packets, outgoing from IPv6 to IPv4 ....... 14-84
requirements, basic functional................................. 10-4
Retransmission Time .............................................. 14-31
rexec .......................................................................... 4-130
RFC 1777, Lightweight Directory Access Protocol.. 9-29
RFCs
0792, Internet Control Message Protocol ....... 2-126
1038, Revised IP Security Option .................... 4-10
1349, Type of Service in the Internet Protocol Suite ..
2-173
1918, Address Allocation for Private Internets . 2-47
2132, DHCP Options and BOOTP Vendor Extensions
2-230
2326, Real Time Streaming Protocol (RTSP) . 2-130,
2-134
Master Index
IX-XVII
S
SA policy ..................................................................... 3-96
SAs........................................................................5-8, 5-11
check in packet flow ........................................... 5-65
SCEP (Simple Certificate Enrollment Protocol) ...... 5-30
schedules .......................................................2-156, 2-172
SCP
enabling................................................................ 3-18
example client command .................................. 3-18
IX-XVIII
Master Index
SCREEN
address sweep ....................................................... 4-8
bad IP options, drop ......................................... 4-238
drop unknown MAC addresses.......................... 4-39
FIN with no ACK.................................................. 4-15
FIN without ACK flag, drop ................................ 4-13
ICMP
fragments, block .......................................... 4-236
ICMP floods .......................................................... 4-46
IP options ............................................................. 4-10
IP packet fragments, block .............................. 4-240
IP spoofing ...............................................4-18 to 4-23
Land attacks ......................................................... 4-48
large ICMP packets, block ................................ 4-237
loose source route IP option, detect ................. 4-25
Ping of Death ....................................................... 4-49
port scan ................................................................ 4-9
source route IP option, deny ............................. 4-25
strict source route IP option, detect .................. 4-25
SYN and FIN flags set ......................................... 4-12
SYN floods ................................................4-34 to 4-39
SYN fragments, detect ...................................... 4-241
SYN-ACK-ACK proxy floods ............................... 4-32
TCP packet without flags, detect ....................... 4-14
Teardrop ............................................................... 4-50
UDP floods ........................................................... 4-47
unknown protocols, drop ................................. 4-239
VLAN and MGT zones ........................................... 4-2
WinNuke attacks ................................................. 4-51
SCREEN, MGT zone ................................................... 2-28
ScreenOS
function zones ..................................................... 2-33
global zone ........................................................... 2-28
overview ................................................................. 2-1
packet flow...............................................2-10 to 2-12
policies.................................................................... 2-3
RADIUS vendor IDs ............................................. 9-22
security zones ...............................................2-2, 2-28
security zones, global ........................................... 2-2
security zones, predefined ................................... 2-2
tunnel zones ........................................................ 2-29
virtual systems ...................................................... 2-9
VRs ........................................................................ 10-6
zones .............................................. 2-25 to 2-33, 10-6
ScreenOS interfaces
security zones ........................................................ 2-3
subinterfaces.......................................................... 2-3
SDP ..................................................................6-17 to 6-18
secondary IP addresses ............................................ 2-51
secondary path ........................................................ 11-29
Secure Copy
See SCP
Secure Hash Algorithm-1
See SHA-1
Master Index
Secure Shell
See SSH
Secure Sockets Layer
See SSL
SecurID ....................................................................... 9-27
ACE servers .......................................................... 9-28
auth server object................................................ 9-35
authentication port ............................................. 9-28
authenticator........................................................ 9-27
encryption types ................................................. 9-28
L2TP .................................................................... 5-211
token codes .......................................................... 9-27
Use Duress option ............................................... 9-28
user type support ................................................ 9-28
SecurID clients
retries.................................................................... 9-28
timeout ................................................................. 9-28
security associations
See SAs
Security Associations (SA) ........................................ 3-95
security IP option .............................................4-10, 4-11
Security Policies ....................................................... 4-182
security policies
rulebase execution ............................................ 4-185
rulebases ............................................................ 4-182
rules .................................................................... 4-182
templates............................................................ 4-185
security zones .............................................................. 2-2
determination, destination zone ....................... 2-12
determination, source zone ............................... 2-10
global ...................................................................... 2-2
predefined .............................................................. 2-2
See zones
security zones, interfaces ........................................... 2-3
physical ................................................................ 2-36
selection modes
APN ..................................................................... 13-15
Mobile Station (MS) ........................................... 13-15
Network .............................................................. 13-15
Verified ............................................................... 13-15
self log ......................................................................... 3-66
sequence-number validation .................................. 13-13
serial cables ................................................................ 3-19
Server Message Block
See SMB
servers, auth
See auth servers
servers, SecurID ACE ................................................. 9-28
service book
entries, modifying (CLI) .................................... 2-123
entries, removing (CLI) ..................................... 2-123
service book, service groups (WebUI) ..................... 6-63
service book, services
adding ................................................................. 2-122
Master Index
IX-XIX
IX-XX
Master Index
Master Index
T
T3 interfaces
C-bit parity mode .............................................. 12-13
CSU compatibility.............................................. 12-20
TACACS+
auth server objects .............................................. 9-38
clients retries ....................................................... 9-32
clients timeout ..................................................... 9-32
object properties ................................................. 9-32
ports ...................................................................... 9-32
retry timeout ........................................................ 9-32
shared secret ....................................................... 9-32
tags, VLANs .................................................................. 2-3
TCP
packet without flags ............................................ 4-14
session timeouts .................................................. 4-31
stream signatures .............................................. 4-160
SYN flag checking ............................................. 5-297
TCP proxy ................................................................... 3-96
Teardrop attacks ........................................................ 4-50
Telnet .................................................................3-9, 4-130
Telnet management options .................................... 3-28
Telnet, logging in via ................................................. 3-10
templates
U
UDP
checksum ........................................................... 5-237
Master Index
IX-XXI
V
VC .............................................................................. 12-66
VCI............................................................................. 12-66
vendor IDs, VSA ......................................................... 9-22
vendor-specific attributes ......................................... 9-21
Verified mode........................................................... 13-15
Verisign ....................................................................... 5-34
VIP ............................................................................... 2-11
configuring ........................................................... 8-82
definition ................................................................ 8-6
editing .................................................................. 8-84
global zones ......................................................... 8-82
reachable from other zones ............................... 8-82
removing .............................................................. 8-84
required information .......................................... 8-81
VIP services
custom and multi-port ............................8-85 to 8-88
custom, low port numbers................................. 8-82
VIP, to zone with interface-based NAT .................... 2-94
virtual adapters .......................................................... 9-68
virtual channel identifier
See VCI
IX-XXII
Master Index
virtual circuit
See VC
virtual HA interfaces .......................................2-39, 11-27
virtual IP
See VIP
virtual path identifier
See VPI
Virtual Path Identifier/Virtual Channel Identifier
See VPI/VCI
virtual private networks
See VPNs
virtual routers ..............................................14-50, 14-102
See VRs
virtual routers, MIP default ....................................... 8-66
virtual routers, RIP .....................................14-53 to 14-70
virtual security device groups
See VSD groups
virtual security interface
See VSI
virtual system support .............................................. 13-5
virtual systems ............................................................. 2-9
admins .................................................................. 3-34
failover................................................................ 11-56
load sharing ....................................................... 11-82
manageability and security of ......................... 10-73
NSRP ................................................................... 11-56
read-only admins ................................................ 3-34
VIP....................................................................... 10-31
VLAN zone .................................................................. 2-81
VLAN1
interface ......................................................2-81, 2-87
zones .................................................................... 2-81
VLAN1, management options .................................. 3-29
VLAN-based traffic classification . 10-40, 10-41 to 10-68
VLANs
communicating with another VLAN 10-39, 10-65 to
10-68
creating.................................................10-43 to 10-64
subinterfaces...................................................... 10-62
tag ............................................................10-43, 10-62
Transparent mode .................................10-42, 10-43
trunking .............................................................. 10-42
VLAN-based traffic classification ......10-40, 10-41 to
10-68
Master Index
W
web browser requirements ......................................... 3-2
web filtering ...................................2-172, 4-107 to 4-114
applying profiles to policies ............................. 4-104
blocked URL message ....................................... 4-111
blocked URL message type .............................. 4-111
cache ..................................................................... 4-99
communication timeout ................................... 4-110
integrated ............................................................. 4-98
profiles ................................................................ 4-102
redirect ............................................................... 4-107
routing ................................................................ 4-112
server status ....................................................... 4-112
servers per vsys ................................................. 4-108
SurfControl CPA servers ..................................... 4-98
SurfControl SCFP ............................................... 4-109
SurfControl server name .................................. 4-110
SurfControl server port ..................................... 4-110
Master Index
IX-XXIII
IX-XXIV
Master Index
X
XAuth
authentication .................................................. 14-138
bypass-auth .......................................................... 9-69
client authentication ........................................... 9-83
defined ................................................................. 9-68
query remote settings ......................................... 9-69
ScreenOS as client .............................................. 9-83
TCP/IP assignments ............................................ 9-70
virtual adapters.................................................... 9-68
VPN idletime ........................................................ 9-71
VPN monitoring ................................................. 5-243
when to use ..................................................... 14-132
XAuth addresses
assignments ......................................................... 9-68
authentication, and ............................................. 9-79
IP address lifetime ..................................9-70 to 9-71
timeout ................................................................. 9-70
XAuth users ....................................................9-68 to 9-82
authentication ...................................................... 9-68
local authentication ............................................. 9-71
local group authentication.................................. 9-73
server support...................................................... 9-14
with L2TP ............................................................... 9-4
XAuth, external
auth server queries ............................................. 9-69
user authentication ............................................. 9-74
user group authentication .................................. 9-76
XR, configuring ...................................................... 12-133
Y
Yahoo! Messenger.................................................... 4-130
Master Index
Z
zip files, blocking ..................................................... 4-168
zombie agents ...................................................4-27, 4-29
zones ..................................................... 2-25 to 2-33, 10-6
defining ................................................................ 2-30
editing ................................................................... 2-31
function ................................................................ 2-33
function, MGT interface ...................................... 2-38
global .................................................................... 2-28
global security........................................................ 2-2
Layer 2 .................................................................. 2-81
shared ................................................................. 10-37
tunnel.................................................................... 2-29
VLAN ............................................................2-33, 2-81
vsys ....................................................................... 10-6
zones, global............................................................... 8-82
zones, ScreenOS ............................................2-25 to 2-33
predefined .............................................................. 2-2
security interfaces ................................................. 2-3
zones, security ....................................................2-2, 2-28
determination, destination zone ....................... 2-12
determination, source zone ............................... 2-10
global ...................................................................... 2-2
interfaces, monitoring ........................................ 2-73
interfaces, physical ............................................. 2-36
Master Index
IX-XXV
IX-XXVI
Master Index