SlideShare a Scribd company logo
1 of 35
Download to read offline
APPLICATION NOTE
Copyright © 2009, Juniper Networks, Inc.	
IPS Security Policy Creation for Juniper
Networks SRX Series Services Gateways
Enabling Advanced Security on SRX Series Services Gateways
ii	 Copyright © 2009, Juniper Networks, Inc.
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Table of Contents
Introduction. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 1
Scope. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 1
FAQs  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Basic Configuration Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
System Licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
SRX Series and CLI Security Policy Configuration . .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
Basic Network Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Initial Configuration Assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Configure Networking and Basic Security. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 4
Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Security Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
IPS Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Firewall Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
IPS Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
IPS Security-Package Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Verify Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Log Sample . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
SRX Series and NSM Security Policy Configuration. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 12
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Import SRX Series Device into NSM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Configuring Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Inventory Reconciliation  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
IDP Detector Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Configuring from Central Management Policy Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Firewall Rule Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Configure Firewall Zones  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Configuring from In-Device Management Policy Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Access Configuration Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Configure Interfaces  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Configure Security Zones  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Assign Interfaces to Security Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Create Firewall Policy and Associate IPS Services  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Select Default Firewall Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Configure IPS Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Set Traceoptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Set Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Update Device  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Copyright © 2009, Juniper Networks, Inc.	 iii
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
SRX Series and J-Web Security Policy Configuration. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 26
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Configure Device  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Network Interfaces  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Security Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Configure Security Policy  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
IPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Set Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Activate Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Install and Configure Security Package Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Configure Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
About Juniper Networks. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 32
Copyright © 2009, Juniper Networks, Inc.	 1
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Introduction
Juniper Networks®
SRX Series Services Gateways are next-generation devices based on revolutionary new
architecture that provides market-leading scalability and service integration.
The SRX Series comes equipped with full security and networking capabilities and represents the highest performing
firewalls in the market with natively integrated full Intrusion Prevention System (IPS) technology from Juniper
Networks IDP Series Intrusion Detection and Prevention Appliances, providing inline protection against current and
emerging threats throughout the network.
IPS security policies can be configured either via Juniper Networks Network and Security Manager, Juniper
Networks J-Web Software, or the SRX Series command-line interface (CLI). NSM is the sole means for configuring
and managing the IDP security policy on Juniper Networks ISG Series Integrated Security Gateways with IDP
security module and standalone IDP Series sensors running IDP 4.x and above.
Scope
Although SRX Series IPS policy can be configured entirely from within J-Web, this document focuses primarily on
CLI and NSM configuration steps, to provide an easy transition and learning path for both system engineers new to
IPS policy creation as well as those already familiar with managing standalone IDP Series, and ISG Series with IDP
solutions. That said, brief J-Web configuration steps are also provided towards the end of this document.
This document is not intended to discuss particular hardware and software architectural details related to the
SRX Series Services Gateways. For more information on hardware and software details, please refer to the relevant
SRX Series Technical Documentation.
Also, the intention of this document is not to discuss best practices in terms of policy rules configuration. Its sole purpose
is to describe the different ways in which a security policy can be configured on the SRX Series Services Gateways.
FAQs
The following notes are listed here to immediately address some of the more frequently asked questions:
	In comparison with Deep Inspection on ScreenOS, the fundamental IPS detection capabilities on the SRX Series do1.	
not differ from that available on standalone IDP Series or ISG Series with IDP security module.
Although full feature parity is intended between different IPS platforms, not all features are available in the2.	
current version of Juniper Networks JUNOS®
Software. Due to the significant engineering efforts required,
some features might not become available until future version releases later down the road. For this reason, we
recommend that you familiarize yourself with documentation that details those differences.
SRX Series is an inline device and, unlike standalone IDP Series or ISG Series with IDP (tap mode), it cannot be3.	
configured in transparent mode.
IPS does not need a separate license to run as a service on the SRX Series, however a license is required for4.	
IPS updates.
A base firewall policy is required and needs to include IPS application-service statement to enable5.	
IPS inspection
Enabling all attacks is not supported. If policy does not load, check service log files for policy size and load results.6.	
NSM 2008.2 requires 2 gigabytes of RAM7.	
In order to push policy from NSM successfully, both NSM and the SRX Series have to be at the same detector8.	
version level, and any device mismatch information has to be reconciled (more details in following sections).
A syslog server is required to collect security event-related messages as they get identified on the SRX Series9.	
data plane.
Basic Configuration Steps
Enabling a fully functional IPS service on SRX Series Services Gateways includes the following basic
configuration steps:
Configure basic networking/security/access (in most cases this will already be configured).1.	
Configure and activate IPS policy.2.
2	 Copyright © 2009, Juniper Networks, Inc.
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Configure firewall policy to associate specific rules with IPS3.	
Configure logging.4.	
Update security-package.5.	
Verify configuration and test functionality.6.	
System Licensing
Access the SRX Series Services Gateways console via either serial cable plugged into the console port on the device
or by using a terminal session such as SSH.
Check for an IPS license (required for IPS updates).
mxb@Perth> show system license
License usage: none
Licenses installed: none
If there is no license installed, obtain the chassis serial number by issuing the following command:
mxb@Perth> show chassis hardware
A serial number is needed to generate the IPS license. Once you obtain your license file, you can install it by adding it
from the file or simply by copying and pasting the license to the terminal by doing the following:
mxb@Perth> request system license add terminal
Paste the license string from the clipboard as in the following example:
mxb@Perth> request system license add terminal
[Type ^D at a new line to end input, enter blank line between each license key]
JUNOS204171 aeaqea qmifat injqhb auimbq ga4aqb qcdw3z
voika4 udefun hquffd l4lpx3 h3fc5p 5at7z4
v32i4f traifg fwhkop 4ymgbv 3r53mm ohelsq
fby
Press the Enter key and Ctrl-D in sequence which will return the following message when the license is valid:
JUNOS204171: successfully added
add license complete (no errors)
Verify the system licenses by doing the following:
mxb@Perth> show system license
License usage:
	 Feature	 Licenses	 Licenses	 Licenses	 Expiry
	 name 	 used 	 installed 	 needed
	 idp-sig	 0 	 1 	 0 	 2009-12-24
00:00:00 UTC
	 Licenses installed:
		 License identifier: JUNOS204171
		 Valid for device: AA4508AD0008
		 Features:
			 idp-sig - IDP Signature
			 date-based, 2008-12-21 00:00:00 UTC - 2009-12-24 00:00:00 UTC
Copyright © 2009, Juniper Networks, Inc.	 3
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
SRX Series and CLI Security Policy Configuration
Basic Network Configuration
The following diagram depicts a logical configuration of the sample network which is used throughout this document
to demonstrate security policy configuration.
Figure 1: Demo network
Initial Configuration Assumptions
Before starting the IPS policy configuration, this document assumes that an initial networking configuration exists and
that an admin user has full access to the SRX Series. Initial device configuration on our sample system is as follows:
mxb@Perth> show configuration | display set
set system root-authentication encrypted-password “$1$9FpmDriB$HtuvrU5RXCC2SDaUQDY53/”
set system name-server 1.2.3.4
set system login user mxb uid 2000
set system login user mxb class super-user
set system login user mxb authentication encrypted-password “$1$nvmwu6vH$EGlHl06vrm.0sq3uhG6Eo1”
set system syslog user * any emergency
set system syslog file messages any notice
set system syslog file messages authorization info
set system syslog file interactive-commands interactive-commands any
set system license autoupdate url https://ae1.juniper.net/junos/key_retrieval
set interfaces fxp0 unit 0 family inet address 192.168.1.221/24
set routing-options static route 0.0.0.0/0 next-hop 192.168.1.1
set security idp security-package url https://services.netscreen.com/cgi-bin/index.cgi
Note: Throughout this document we provide commands required to configure specific features; however, in order
to activate associated functionality, configuration changes need to be successfully committed (using the commit
command).
fxp0 ge-0/0/7
192.168.2.211192.168.1.211
33.3.3.1 44.4.4.1
33.3.3. 33 44.4.4. 44
abc-trust abc-untrust
SRX Series
Traffic/Attack Generator
192.168.1.118
NSM
192.168.1.139
SYSLOG
192.168.2.212
GUI
192.168.1.240
ge-0/0/3ge-0/0/2
4	 Copyright © 2009, Juniper Networks, Inc.
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Configure Networking and Basic Security
Interfaces
Display current interfaces (assumption is interfaces have been properly cabled).1.	
mxb@Perth# configure
mxb@Perth# show interfaces
fxp0 {
unit 0 {
family inet {
address 192.168.1.221/24;
}
}
}
[edit]
mxb@Perth# run show interfaces | match ge-0/0
Physical interface: ge-0/0/0, Enabled, Physical link is Down
Physical interface: ge-0/0/1, Enabled, Physical link is Down
Physical interface: ge-0/0/2, Enabled, Physical link is Up
Physical interface: ge-0/0/3, Enabled, Physical link is Up
Physical interface: ge-0/0/4, Enabled, Physical link is Down
Physical interface: ge-0/0/5, Enabled, Physical link is Down
Physical interface: ge-0/0/6, Enabled, Physical link is Down
Physical interface: ge-0/0/7, Enabled, Physical link is Up
Physical interface: ge-0/0/8, Enabled, Physical link is Down
Physical interface: ge-0/0/9, Enabled, Physical link is Down
Physical interface: ge-0/0/10, Enabled, Physical link is Down
Physical interface: ge-0/0/11, Enabled, Physical link is Down
Configure forwarding interfaces as per network diagram in Figure 1.2.	
mxb@Perth# set interfaces ge-0/0/2 unit 0 family inet address 33.3.3.1/24
mxb@Perth# set interfaces ge-0/0/3 unit 0 family inet address 44.4.4.1/24
Verify configuration.3.	
mxb@Perth# run show interfaces terse | match /24
ge-0/0/2.0		 up	 up	 inet	 33.3.3.1/24
ge-0/0/3.0		 up	 up	 inet	 44.4.4.1/24
ge-0/0/7.0		 up	 up	 inet	 192.168.2.222/24
fxp0.0		 up	 up	 inet	 192.168.1.221/24
Security Zones
Display existing zones.1.	
mxb@Perth> show security zones
Security zone: junos-global
Send reset for non-SYN session TCP packets: Off
Policy configurable: Yes
Interfaces bound: 0
Interfaces:
Copyright © 2009, Juniper Networks, Inc.	 5
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Configure zones abc-trust and abc-untrust and assign interfaces accordingly.2.	
mxb@Perth# set security zones security-zone abc-trust interfaces ge-0/0/2
mxb@Perth# set security zones security-zone abc-untrust interfaces ge-0/0/3
Verify configuration.3.	
mxb@Perth# run show security zones
Security zone: abc-trust
Send reset for non-SYN session TCP packets: Off
Policy configurable: Yes
Interfaces bound: 1
Interfaces:
ge-0/0/2.0
Security zone: abc-untrust
Send reset for non-SYN session TCP packets: Off
Policy configurable: Yes
Interfaces bound: 1
Interfaces:
ge-0/0/3.0
Security zone: junos-global
Send reset for non-SYN session TCP packets: Off
Policy configurable: Yes
Interfaces bound: 0
Interfaces:
Security Policies
IPS Security Policy
Configure IPS policy abc-idp-policy.1.	
Simple configuration in this example involves setting up one rule looking for all “critical attacks” and, in case a
match is found, dropping the associated connection, setting that event as critical and logging it with an alert. The
second rule is configured to look for “major attacks” and to perform a “recommended action” upon detecting a
severe attack, as well as logging the event. (Note: Logging means sending a syslog message to an appropriate,
preconfigured syslog server. Logging configuration steps are provided in subsequent sections.)
Configuration steps are as follows:
mxb@Perth# set security idp idp-policy abc-idp-policy rulebase-ips rule 1 match from-zone any
to-zone any source-address any destination-address any application any attacks predefined-
attack-groups Critical
mxb@Perth# set security idp idp-policy abc-idp-policy rulebase-ips rule 1 then action drop-
connection
mxb@Perth# set security idp idp-policy abc-idp-policy rulebase-ips rule 1 then severity
critical notification log-attacks alert
mxb@Perth# set security idp idp-policy abc-idp-policy rulebase-ips rule 2 match from-zone any
to-zone any source-address any destination-address any application any attacks predefined-
attack-groups Major
6	 Copyright © 2009, Juniper Networks, Inc.
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
mxb@Perth# set security idp idp-policy abc-idp-policy rulebase-ips rule 2 then action
recommended
mxb@Perth# set security idp idp-policy abc-idp-policy rulebase-ips rule 2 then severity major
notification log-attacks
Verify IPS policy2.	 abc-idp-policy.
	 mxb@Perth# show security idp idp-policy abc-idp-policy
	 rulebase-ips {
	 rule 1 {
	 match {
	 from-zone any;
	 source-address any;
	 to-zone any;
	 destination-address any;
	 attacks {
	 predefined-attack-groups Critical;
	 }
	 }
	 then {
	 action {
	 drop-connection;
	 }
	 notification {
	 log-attacks {
	 alert;
	 }
	 }
	 severity critical;
	 }
	 }
	 rule 2 {
	 match {
	 from-zone any;
	 source-address any;
	 to-zone any;
	 destination-address any;
	 attacks {
	 predefined-attack-groups Major;
	 }
	 }
	 then {
	 action {
	 recommended;
	 }
	 notification {
	 log-attacks;
	 }
	 severity major;
	 }
	 }
	 }
Copyright © 2009, Juniper Networks, Inc.	 7
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Set trace options.3.	
To provide detailed IPS process event information (policy compilation result, policy loading results, dfa matches,
and so on) which allows for further system analysis, tuning, and easier troubleshooting, it is highly recommended
to enable trace options. The following is an example setting which configures trace to write all security events
encompassing all debug levels (error, info, notice, verbose, and warning). The trace file name is not specified trace if
it is not written into the file named after the process being traced, which is the case with IDP/var/log/idpd):
mxb@Perth# set security idp traceoptions flag all
mxb@Perth# set security idp traceoptions level all
For this example, let’s also limit the file size to 100 MB. This means that the process will write this file and once it
reaches 100 MB, it will rename it to idpd.0 and continue with a new idpd. The default number of files is 3 and if file
numbers are exhausted, the oldest file (idpd.2) gets overwritten.
mxb@Perth# set security idp traceoptions file size 100M
Verify trace options settings.4.	
mxb@Perth# show security idp traceoptions
file size 100m;
flag all;
level all;
Activate IPS Series policy.5.	
mxb@Perth# set security idp active-policy abc-idp-policy
Verify active IPS policy.6.	
mxb@Perth# show security idp active-policy
active-policy abc-idp-policy;
Note: In order to deploy IPS policy on the SRX Series Services Gateways, one more step is required—configuring
firewall security policy to identify which traffic is to be processed by the IPS service. This is described in the
following section.
Firewall Security Policy
For traffic entering the SRX Series gateway in order to be processed by IPS security policy firewall, the security policy
needs to be configured accordingly.
Following are steps required to configure firewall security policy and finalize Intrusion Prevention System
configuration on the SRX Series gateway. This will result in traffic between security zones abc-untrust and abc-trust
being inspected by IPS security policy abc-idp-policy.
Make sure that the system is configured with the default policy denying all traffic. This basically means traffic will1.	
be denied throughout the gateway unless specifically allowed to by firewall security policy.
mxb@Perth> show security policies
Default policy: deny-all
8	 Copyright © 2009, Juniper Networks, Inc.
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Configure policy.2.	
mxb@Perth# set security policies from-zone abc-untrust to-zone abc-trust policy abc match
source-address any destination-address any application any
mxb@Perth# set security policies from-zone abc-untrust to-zone abc-trust policy abc then permit
application-services idp
mxb@Perth# set security policies from-zone abc-trust to-zone abc-untrust policy abc match
source-address any destination-address any application any
mxb@Perth# set security policies from-zone abc-trust to-zone abc-untrust policy abc then permit
application-services idp
Verify configuration.3.	
mxb@Perth# show security policies
from-zone abc-untrust to-zone abc-trust {
policy abc {
match {
source-address any;
destination-address any;
application any;
}
then {
permit {
application-services {
idp;
}
}
}
}
}
from-zone abc-trust to-zone abc-untrust {
policy abc {
match {
source-address any;
destination-address any;
application any;
}
then {
permit {
application-services {
idp;
}
}
}
}
}
Copyright © 2009, Juniper Networks, Inc.	 9
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
IPS Logging
IPS generates event logs when an event matches an IPS policy rule in which logging is enabled. When you configure
a rule for logging, the device creates a log entry for each event that matches that rule.
When configured to do so, an IPS service will send events that match policy entry to the logging server directly from
the data plane via emulated IP address, encapsulated in 514/udp.
Configuration steps.1.	
Configure interface data plane to send syslog messages from:a.	
mxb@Perth# set interfaces ge-0/0/7 unit 0 family inet address 192.168.2.1/24
Format (standard or structured format).b.	
mxb@Perth# set security log format syslog
Emulated source IP address (interface cannot be fxp0).c.	
mxb@Perth# set security log source-address 192.168.2.211
Severity.d.	
mxb@Perth# set security log stream jet severity debug
Syslog server IP address (to which logs are sent via 514/udp).e.	
mxb@Perth# set security log stream jet host 192.168.2.212
Verify log configuration.2.	
mxb@Perth# show security log
format syslog;
source-address 192.168.2.211;
stream jet {
severity debug;
host {
192.168.2.212;
}
IPS Security-Package Update
The following steps update SRX Series Services Gateways with the most recent security updates.
Note: In order to be able to push a policy from the Network and Security Manager detector to the SRX Series,
versions on the SRX Series device and NSM must match.
Make sure device is properly configured with download URL:1.	
mxb@Perth> configure
Entering configuration mode
[edit]
mxb@Perth# show security idp security-package
url https://services.netscreen.com/cgi-bin/index.cgi;
10	 Copyright © 2009, Juniper Networks, Inc.
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Verify the current version installed on the device. The following example shows version of detector provided with2.	
version of the installed JUNOS package with no attack database nor policy templates.
mxb@Perth> show security idp security-package-version
Attack database version:N/A(N/A)
Detector version :9.2.140080919
Policy template version :N/A
Compare results with the most recent versions available at the Juniper Networks download URL.3.	
Note: DNS server and default gateway information must be configured in order to successfully resolve and access
the URL.
mxb@Perth> request security idp security-package download check-server
Successfully retrieved from(https://services.netscreen.com/cgi-bin/index.cgi).
Version info:1342(Detector=9.2.140081105, Templates=1)
Download the updates.4.	
mxb@Perth> request security idp security-package download full-update
Will be processed in async mode. Check the status using the status checking CLI
mxb@Perth> request security idp security-package download status
Done;Successfully downloaded from(https://services.netscreen.com/cgi-bin/index.cgi).
Version info:1342(Fri Jan 9 12:53:43 2008, Detector=9.2.140081105)
Install security-package.5.	
mxb@Perth> request security idp security-package install
Will be processed in async mode. Check the status using the status checking CLI
mxb@Perth> request security idp security-package install status
Done;Attack DB update : successful - [UpdateNumber=1342,ExportDate=Fri Jan 9 13:27:58
2009,Detector=9.2.140081105]
Updating control-plane with new detector : successful
Updating data-plane with new attack or detector : successful
Install policy templates.6.	
mxb@Perth> request security idp security-package install policy-templates
			
Will be processed in async mode. Check the status using the status checking CLI
			 mxb@Perth> request security idp security-package install status
			 Done;policy-templates has been successfully updated into internal repository
			 (=>/var/db/scripts/commit/templates.xsl)!
			 mxb@Perth> show security idp security-package-version
			 Attack database version:1342(Fri Jan 9 13:28:58 2009)
			 Detector version :9.2.140081105
			 Policy template version :1
Copyright © 2009, Juniper Networks, Inc.	 11
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Verify Configuration
At this time, the basic configuration for our example network is complete. It is configured so that if traffic traversing
the SRX Series gateway is flowing between zones abc-trust and abc-untrust, it is inspected by the IPS service and
matched for:
Criticala.	 attacks: If match is found—connection is dropped and notification is sent to syslog server.
Majorb.	 attacks: If match is found—recommended action is applied and notification is sent to syslog server.
Log Sample
The following is a sample of some security events as identified by the SRX Series device and presented via syslog:
Jan 9 14:20:27 RT_IDP: IDP_ATTACK_LOG_EVENT: IDP: at 552579626, SIG Attack log
<33.3.3.33:6312->44.4.4.44:80> for TCP protocol and service SERVICE_IDP by rule 1 of
rulebase IPS in policy abc-idp-policy. attack: repeat=0, action=DROP, severity=CRITICAL,
name=HTTP:PKG:CART32-ADM-PW-CHG, NAT <0.0.0.0:0->0.0.0.0:0>, time-elapsed=0, inbytes=0,
outbytes=0, inpackets=0, outpackets=0, intf:abc-trust:ge-0/0/2.0->abc-untrust:ge-0/0/3.0,
and misc-message
Jan 9 14:20:24 RT_IDP: IDP_ATTACK_LOG_EVENT: IDP: at 552579624, SIG Attack log <33.3.3.33:3
0770->44.4.4.44:6080> for TCP protocol and service SERVICE_IDP by rule 1 of rulebase IPS in
policy abc-idp-policy. attack: repeat=0, action=DROP, severity=CRITICAL, name=HTTP:MISC:NOOP-
SLIDE-REQ-OF, NAT <0.0.0.0:0->0.0.0.0:0>, time-elapsed=0, inbytes=0, outbytes=0, inpackets=0,
outpackets=0, intf:abc-trust:ge-0/0/2.0->abc-untrust:ge-0/0/3.0, and misc-message –
Jan 9 14:20:24 RT_IDP: IDP_ATTACK_LOG_EVENT: IDP: at 552579624, SIG Attack log <33.3.3.33:30770
->44.4.4.44:6080> for TCP protocol and service SERVICE_IDP by rule 2 of rulebase IPS in policy
abc-idp-policy. attack: repeat=0, action=NONE, severity=HIGH, name=SHELLCODE:X86:NOOP-TCP,
NAT <0.0.0.0:0->0.0.0.0:0>, time-elapsed=0, inbytes=0, outbytes=0, inpackets=0, outpackets=0,
intf:abc-trust:ge-0/0/2.0->abc-untrust:ge-0/0/3.0, and misc-message
Jan 9 14:20:24 RT_IDP: IDP_ATTACK_LOG_EVENT: IDP: at 552579624, SIG Attack log
<33.3.3.33:51835->44.4.4.44:80> for TCP protocol and service SERVICE_IDP by rule 2 of
rulebase IPS in policy abc-idp-policy. attack: repeat=0, action=DROP, severity=HIGH,
name=HTTP:PHP:UPLOAD-LOCATION, NAT <0.0.0.0:0->0.0.0.0:0>, time-elapsed=0, inbytes=0,
outbytes=0, inpackets=0, outpackets=0, intf:abc-trust:ge-0/0/2.0->abc-untrust:ge-0/0/3.0,
and misc-message
Jan 9 14:20:23 RT_IDP: IDP_ATTACK_LOG_EVENT: IDP: at 552579618, SIG Attack log
<33.3.3.33:48123->44.4.4.44:80> for TCP protocol and service SERVICE_IDP by rule 1 of
rulebase IPS in policy abc-idp-policy. attack: repeat=3, action=DROP, severity=CRITICAL,
name=HTTP:MISC:NOOP-SLIDE-REQ-OF, NAT <0.0.0.0:0->0.0.0.0:0>, time-elapsed=0, inbytes=0,
outbytes=0, inpackets=0, outpackets=0, intf:abc-trust:ge-0/0/2.0->abc-untrust:ge-0/0/3.0,
and misc-message
Jan 9 14:20:23 RT_IDP: IDP_ATTACK_LOG_EVENT: IDP: at 552579618, SIG Attack log
<33.3.3.33:63286->44.4.4.44:80> for TCP protocol and service SERVICE_IDP by rule 2 of
rulebase IPS in policy abc-idp-policy. attack: repeat=11, action=NONE, severity=HIGH,
name=SHELLCODE:X86:NOOP-TCP, NAT <0.0.0.0:0->0.0.0.0:0>, time-elapsed=0, inbytes=0, outbytes=0,
inpackets=0, outpackets=0, intf:abc-trust:ge-0/0/2.0->abc-untrust:ge-0/0/3.0, and misc-message
Jan 9 14:20:23 RT_IDP: IDP_ATTACK_LOG_EVENT: IDP: at 552579622, SIG Attack log
<33.3.3.33:48835->44.4.4.44:80> for TCP protocol and service SERVICE_IDP by rule 1 of
rulebase IPS in policy abc-idp-policy. attack: repeat=0, action=DROP, severity=CRITICAL,
name=SCAN:METASPLOIT:APACHE-CHUNK-OF, NAT <0.0.0.0:0->0.0.0.0:0>, time-elapsed=0, inbytes=0,
outbytes=0, inpackets=0, outpackets=0, intf:abc-trust:ge-0/0/2.0->abc-untrust:ge-0/0/3.0,
and misc-message
12	 Copyright © 2009, Juniper Networks, Inc.
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
SRX Series and NSM Security Policy Configuration
Overview	
This section covers basic SRX Series with IPS policy configuration involving the same network setup, same IPS, and
same firewall security policies as described in the previous section.
There are two possible approaches for configuring SRX Series IPS security policy with NSM.
Configure basic setup through the CLI and import the device with policy into NSM.1.	
Configure both firewall and IPS security policy from NSM entirely from within one of the following device policy2.	
management modes:
Central Mode (Policy at NSM level applicable to any selected device. This is the default mode.)a.	
In-Device Mode (Policy at device level and applicable to the actual device that is accessed and edited throughb.	
the configuration details.)
For the purpose of this document, we will import the SRX Series device into NSM with a CLI-based configuration as
described in the previous section.
Note: When updating the SRX Series device in Central Mode, the security policy from Policy Manager is pushed.
When in In-Device Mode, the security policy as configured under the Security->idp->idp Policy is pushed.
Copyright © 2009, Juniper Networks, Inc.	 13
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Import SRX Series Device into NSM
Add new device: Device needs to be selected as1.	 Existing and Not Reachable.
Select device specifications.2.
14	 Copyright © 2009, Juniper Networks, Inc.
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Configure device to connect to NSM.3.	
Console into the SRX Series device and enter the following commands:4.	
	 mxb@Perth# set system services outbound-ssh client nsm device-id EEC4B8
	 mxb@Perth# set system services outbound-ssh client nsm secret <one-time-password>
	 mxb@Perth# set system services outbound-ssh client nsm 192.168.1.139 port 7804
	 mxb@Perth# set system services outbound-ssh client nsm services netconf
Import the device.5.	
Note: Importing the device by default imports it in the Central Policy Mode and, as a part of the process, imports
currently configured security policy on that device into the NSM policy tree.
Copyright © 2009, Juniper Networks, Inc.	 15
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Note: If a security policy with the same name already exists in the NSM database (from a previous import), a new,
incrementally numbered policy will be created at each import (SRX-Perth-abc-idp-policy_1, SRX-Perth-abc-idp-
policy_2, and so on).
If there is no security policy configured on the SRX Series device, no policy will be imported and the administrator
will have to configure a security policy either using the CLI (importing it as described in the previous section), or will
need to configure it from NSM as described in the following sections.
16	 Copyright © 2009, Juniper Networks, Inc.
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Configuring Security Policy
After successfully importing the device, the administrator can create a new security policy or tune/change the
existing policy and then deploy changes and/or updates by the following standard Update Device procedures.
This section describes security policy configuration and deployment through Central Policy Mode. Policy
SRX-Recommended will be created (based on Recommended security policy template) and applied to the
SRX Series device.
Note: If the device being imported does not match the Inventory or Detector information in the NSM database,
security policy update will fail.
Inventory Reconciliation
When importing a new device or performing any changes to configuration which result in a hardware or software
mismatch between information stored in NSM and the device itself, you will have to reconcile inventory. Updating
policy on the device that is out of sync results in the following failure:
To bring a device in sync from the Device Manager, right-click on the device and select View/Reconcile Inventory.
Copyright © 2009, Juniper Networks, Inc.	 17
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
The following window appears:
You can select Refresh which will open a new window and present any mismatched items (highlighted).
Or you can select Reconcile to update the database information. Once successful, selecting Reconcile again will show
the inventory without any highlighted items.
18	 Copyright © 2009, Juniper Networks, Inc.
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
IDP Detector Update
If the SRX IDP Detector on the device does not match the detector on the NSM prior to pushing the policy, this will
need to be brought in line.
To check the Detector version installed on NSM, start Attack Update Manager and check the IDP-SRX Detector
Engine version.
If the Detector version does not match, a failure message similar to the following is reported when attempting to
update the device:
mxb@Perth> show security idp security-package-version
Attack database version:N/A(N/A)
Detector version :9.2.140080919
Policy template version :N/A
In order to fix this, it is required to bring both NSM and SRX Series devices into sync. Although it is possible to roll
back a couple of versions on the NSM, it is recommended to download and install the most recent security package
from the SRX Series CLI. For more details on how to update security packages, please see “IPS Security-Package
Update” in previous Section describing the CLI-based policy configuration.
Copyright © 2009, Juniper Networks, Inc.	 19
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Configuring from Central Management Policy Mode
Select “Firewall/VPN Devices with IDP” as device model.1.	
Select “Recommended (predefined)” policy as a template.2.	
Assign policy to a device.3.	
The following security policy with firewall and IPS rule bases is automatically created and associated with the SRX
Series device.
20	 Copyright © 2009, Juniper Networks, Inc.
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Firewall Rule Base
Configure Firewall Zones
You can configure policy for traffic between existing zones on the device.
Once satisfied with the configuration, push your policy by right-clicking the device and selecting Update Device.
Copyright © 2009, Juniper Networks, Inc.	 21
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Configuring from In-Device Management Policy Mode
When in In-Device Policy mode, an administrator is able to configure a device-level configuration as described in the
CLI Security Policy Configuration Section.
Security policy and other configuration setting changes performed through Device Manager apply to that device only
and are applied only when in In-Device Policy Mode. If the device is in Central Mode, these changes are not applied.
Note: Switching from one mode to another imports the device configuration from the device into the NSM.
The following section provides a quick overview of setting the security policy through the Device Manager in In-
Device Policy Management Mode.
Access Configuration Details
Configure Interfaces
22	 Copyright © 2009, Juniper Networks, Inc.
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Configure Security Zones
Assign Interfaces to Security Zones
Copyright © 2009, Juniper Networks, Inc.	 23
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Create Firewall Policy and Associate IPS Services
Select Default Firewall Policy
24	 Copyright © 2009, Juniper Networks, Inc.
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Configure IPS Policy
Set Traceoptions
Copyright © 2009, Juniper Networks, Inc.	 25
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Set Logging
Update Device
26	 Copyright © 2009, Juniper Networks, Inc.
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
SRX Series and J-Web Security Policy Configuration
Overview
This section reviews Quick Configuration steps required to set up security policy on SRX Series Services Gateways
from within the J-Web interface.
Configure Device
Network Interfaces
Use the same steps to configure all other interfaces.
Copyright © 2009, Juniper Networks, Inc.	 27
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Security Zone
Use same steps to configure other security zones
28	 Copyright © 2009, Juniper Networks, Inc.
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Configure Security Policy
Firewall
Copyright © 2009, Juniper Networks, Inc.	 29
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
IPS
30	 Copyright © 2009, Juniper Networks, Inc.
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Set Notification
	
Activate Policy
Copyright © 2009, Juniper Networks, Inc.	 31
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
Install and Configure Security Package Update
Configure Logging
This step and any other more detailed tasks are done through Edit Configuration (not Quick Configuration)
APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways
32
Corporate and Sales Headquarters
Juniper Networks, Inc.
1194 North Mathilda Avenue
Sunnyvale, CA 94089 USA
Phone: 888.JUNIPER
(888.586.4737)
or 408.745.2000
Fax: 408.745.2100
APAC Headquarters
Juniper Networks (Hong Kong)
26/F, Cityplaza One
1111 King’s Road
Taikoo Shing, Hong Kong
Phone: 852.2332.3636
Fax: 852.2574.7803
EMEA Headquarters
Juniper Networks Ireland
Airside Business Park
Swords, County Dublin,
Ireland
Phone: 35.31.8903.600
Fax: 35.31.8903.601
Copyright 2009 Juniper Networks, Inc.
All rights reserved. Juniper Networks, the
Juniper Networks logo, JUNOS, NetScreen,
and ScreenOS are registered trademarks of
Juniper Networks, Inc. in the United States and
other countries. JUNOSe is a trademark of
Juniper Networks, Inc. All other trademarks,
service marks, registered marks, or registered
service marks are the property of their
respective owners. Juniper Networks assumes
no responsibility for any inaccuracies in this
document. Juniper Networks reserves the right
to change, modify, transfer, or otherwise revise
this publication without notice.
3500146-001-EN Mar 2009 Printed on recycled paper.
To purchase Juniper Networks solutions, please
contact your Juniper Networks representative
at 1-866-298-6428 or authorized reseller.
About Juniper Networks
Juniper Networks, Inc. is the leader in high-performance networking. Juniper offers a high-performance network
infrastructure that creates a responsive and trusted environment for accelerating the deployment of services and
applications over a single network. This fuels high-performance businesses. Additional information can be found at
www.juniper.net.

More Related Content

What's hot

Smart dsp os_user_guide
Smart dsp os_user_guideSmart dsp os_user_guide
Smart dsp os_user_guideeng_basemm
 
Os linux complete notes
Os linux complete notesOs linux complete notes
Os linux complete notesDreams Design
 
Book VMWARE VMware ESXServer Advanced Technical Design Guide
Book VMWARE VMware ESXServer  Advanced Technical Design Guide Book VMWARE VMware ESXServer  Advanced Technical Design Guide
Book VMWARE VMware ESXServer Advanced Technical Design Guide aktivfinger
 
Plesk 8.0 for Linux/UNIX
Plesk 8.0 for Linux/UNIXPlesk 8.0 for Linux/UNIX
Plesk 8.0 for Linux/UNIXwebhostingguy
 
Sonic os standard_3_9_administrators_guide
Sonic os standard_3_9_administrators_guideSonic os standard_3_9_administrators_guide
Sonic os standard_3_9_administrators_guideAshwani Singh
 
Introduction to system_administration
Introduction to system_administrationIntroduction to system_administration
Introduction to system_administrationmeoconhs2612
 
Ibm power vc version 1.2.3 introduction and configuration
Ibm power vc version 1.2.3 introduction and configurationIbm power vc version 1.2.3 introduction and configuration
Ibm power vc version 1.2.3 introduction and configurationgagbada
 
Load runner controller
Load runner controllerLoad runner controller
Load runner controllerAshwin Mane
 
Plesk 8.1 for Linux/UNIX
Plesk 8.1 for Linux/UNIXPlesk 8.1 for Linux/UNIX
Plesk 8.1 for Linux/UNIXwebhostingguy
 
Ibm virtualization engine ts7500 planning, implementation, and usage guide sg...
Ibm virtualization engine ts7500 planning, implementation, and usage guide sg...Ibm virtualization engine ts7500 planning, implementation, and usage guide sg...
Ibm virtualization engine ts7500 planning, implementation, and usage guide sg...Banking at Ho Chi Minh city
 
TechBook: DB2 for z/OS Using EMC Symmetrix Storage Systems
TechBook: DB2 for z/OS Using EMC Symmetrix Storage Systems  TechBook: DB2 for z/OS Using EMC Symmetrix Storage Systems
TechBook: DB2 for z/OS Using EMC Symmetrix Storage Systems EMC
 
System administration guide
System administration guideSystem administration guide
System administration guidemeoconhs2612
 
CONTINUOUS SYSTEMS, NONSTOP OPERATIONS WITH JUNOS
CONTINUOUS SYSTEMS, NONSTOP OPERATIONS WITH JUNOSCONTINUOUS SYSTEMS, NONSTOP OPERATIONS WITH JUNOS
CONTINUOUS SYSTEMS, NONSTOP OPERATIONS WITH JUNOSJohnson Liu
 
Mongo db security guide
Mongo db security guideMongo db security guide
Mongo db security guideDeysi Gmarra
 
Faronics Deep Freeze Enterprise User Guide
Faronics Deep Freeze Enterprise User GuideFaronics Deep Freeze Enterprise User Guide
Faronics Deep Freeze Enterprise User GuideFaronics
 

What's hot (19)

Netgear User Manual
Netgear User ManualNetgear User Manual
Netgear User Manual
 
Smart dsp os_user_guide
Smart dsp os_user_guideSmart dsp os_user_guide
Smart dsp os_user_guide
 
Os linux complete notes
Os linux complete notesOs linux complete notes
Os linux complete notes
 
Book VMWARE VMware ESXServer Advanced Technical Design Guide
Book VMWARE VMware ESXServer  Advanced Technical Design Guide Book VMWARE VMware ESXServer  Advanced Technical Design Guide
Book VMWARE VMware ESXServer Advanced Technical Design Guide
 
Plesk 8.0 for Linux/UNIX
Plesk 8.0 for Linux/UNIXPlesk 8.0 for Linux/UNIX
Plesk 8.0 for Linux/UNIX
 
Sonic os standard_3_9_administrators_guide
Sonic os standard_3_9_administrators_guideSonic os standard_3_9_administrators_guide
Sonic os standard_3_9_administrators_guide
 
Reseller's Guide
Reseller's GuideReseller's Guide
Reseller's Guide
 
Introduction to system_administration
Introduction to system_administrationIntroduction to system_administration
Introduction to system_administration
 
Ibm power vc version 1.2.3 introduction and configuration
Ibm power vc version 1.2.3 introduction and configurationIbm power vc version 1.2.3 introduction and configuration
Ibm power vc version 1.2.3 introduction and configuration
 
Load runner controller
Load runner controllerLoad runner controller
Load runner controller
 
C01631241
C01631241C01631241
C01631241
 
Plesk 8.1 for Linux/UNIX
Plesk 8.1 for Linux/UNIXPlesk 8.1 for Linux/UNIX
Plesk 8.1 for Linux/UNIX
 
Ibm virtualization engine ts7500 planning, implementation, and usage guide sg...
Ibm virtualization engine ts7500 planning, implementation, and usage guide sg...Ibm virtualization engine ts7500 planning, implementation, and usage guide sg...
Ibm virtualization engine ts7500 planning, implementation, and usage guide sg...
 
TechBook: DB2 for z/OS Using EMC Symmetrix Storage Systems
TechBook: DB2 for z/OS Using EMC Symmetrix Storage Systems  TechBook: DB2 for z/OS Using EMC Symmetrix Storage Systems
TechBook: DB2 for z/OS Using EMC Symmetrix Storage Systems
 
System administration guide
System administration guideSystem administration guide
System administration guide
 
CONTINUOUS SYSTEMS, NONSTOP OPERATIONS WITH JUNOS
CONTINUOUS SYSTEMS, NONSTOP OPERATIONS WITH JUNOSCONTINUOUS SYSTEMS, NONSTOP OPERATIONS WITH JUNOS
CONTINUOUS SYSTEMS, NONSTOP OPERATIONS WITH JUNOS
 
Mongo db security guide
Mongo db security guideMongo db security guide
Mongo db security guide
 
Ls9208 prg
Ls9208 prgLs9208 prg
Ls9208 prg
 
Faronics Deep Freeze Enterprise User Guide
Faronics Deep Freeze Enterprise User GuideFaronics Deep Freeze Enterprise User Guide
Faronics Deep Freeze Enterprise User Guide
 

Similar to ScreenOS Idp policy creation en

Palo alto-3.1 administrators-guide
Palo alto-3.1 administrators-guidePalo alto-3.1 administrators-guide
Palo alto-3.1 administrators-guideSornchai Saen
 
PANOS 4.1 Administrators Guide
PANOS 4.1 Administrators GuidePANOS 4.1 Administrators Guide
PANOS 4.1 Administrators GuideAltaware, Inc.
 
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...Juniper Networks
 
19100011989 tl wr945-n_v1_user guide
19100011989 tl wr945-n_v1_user guide19100011989 tl wr945-n_v1_user guide
19100011989 tl wr945-n_v1_user guideAnaclet Rafiki
 
Ngen mvpn with pim implementation guide 8010027-002-en
Ngen mvpn with pim implementation guide   8010027-002-enNgen mvpn with pim implementation guide   8010027-002-en
Ngen mvpn with pim implementation guide 8010027-002-enNgoc Nguyen Dang
 
Creating a VMware Software-Defined Data Center Reference Architecture
Creating a VMware Software-Defined Data Center Reference Architecture Creating a VMware Software-Defined Data Center Reference Architecture
Creating a VMware Software-Defined Data Center Reference Architecture EMC
 
TRU_v29_Reference_Manual_EN_20140325.pdf
TRU_v29_Reference_Manual_EN_20140325.pdfTRU_v29_Reference_Manual_EN_20140325.pdf
TRU_v29_Reference_Manual_EN_20140325.pdfPEDRO MORALES HERNANDEZ
 
37274377 6260-manual
37274377 6260-manual37274377 6260-manual
37274377 6260-manualDavid Reyes
 
Configuring Microsoft Windows IP Security to Operate with HP ...
Configuring Microsoft Windows IP Security to Operate with HP ...Configuring Microsoft Windows IP Security to Operate with HP ...
Configuring Microsoft Windows IP Security to Operate with HP ...webhostingguy
 
Dns320 manual 100
Dns320 manual 100Dns320 manual 100
Dns320 manual 100markvw3
 
Mongo db security-guide
Mongo db security-guideMongo db security-guide
Mongo db security-guideDan Llimpe
 
Ap 51xx access point product reference guide (part no. 72 e-113664-01 rev. b)
Ap 51xx access point product reference guide (part no. 72 e-113664-01 rev. b)Ap 51xx access point product reference guide (part no. 72 e-113664-01 rev. b)
Ap 51xx access point product reference guide (part no. 72 e-113664-01 rev. b)Advantec Distribution
 
White Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy PracticesWhite Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy PracticesGigya
 
software-eng.pdf
software-eng.pdfsoftware-eng.pdf
software-eng.pdffellahi1
 

Similar to ScreenOS Idp policy creation en (20)

Palo alto-3.1 administrators-guide
Palo alto-3.1 administrators-guidePalo alto-3.1 administrators-guide
Palo alto-3.1 administrators-guide
 
Air fiber af5_af5u_ug
Air fiber af5_af5u_ugAir fiber af5_af5u_ug
Air fiber af5_af5u_ug
 
PANOS 4.1 Administrators Guide
PANOS 4.1 Administrators GuidePANOS 4.1 Administrators Guide
PANOS 4.1 Administrators Guide
 
Air os ug_v80
Air os ug_v80Air os ug_v80
Air os ug_v80
 
Air cam ug
Air cam ugAir cam ug
Air cam ug
 
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...
 
19100011989 tl wr945-n_v1_user guide
19100011989 tl wr945-n_v1_user guide19100011989 tl wr945-n_v1_user guide
19100011989 tl wr945-n_v1_user guide
 
Ngen mvpn with pim implementation guide 8010027-002-en
Ngen mvpn with pim implementation guide   8010027-002-enNgen mvpn with pim implementation guide   8010027-002-en
Ngen mvpn with pim implementation guide 8010027-002-en
 
Creating a VMware Software-Defined Data Center Reference Architecture
Creating a VMware Software-Defined Data Center Reference Architecture Creating a VMware Software-Defined Data Center Reference Architecture
Creating a VMware Software-Defined Data Center Reference Architecture
 
TRU_v29_Reference_Manual_EN_20140325.pdf
TRU_v29_Reference_Manual_EN_20140325.pdfTRU_v29_Reference_Manual_EN_20140325.pdf
TRU_v29_Reference_Manual_EN_20140325.pdf
 
Amdin iws7 817-2179-10
Amdin iws7 817-2179-10Amdin iws7 817-2179-10
Amdin iws7 817-2179-10
 
37274377 6260-manual
37274377 6260-manual37274377 6260-manual
37274377 6260-manual
 
Manual Cn51, catalogo Cn51
Manual Cn51, catalogo Cn51Manual Cn51, catalogo Cn51
Manual Cn51, catalogo Cn51
 
Configuring Microsoft Windows IP Security to Operate with HP ...
Configuring Microsoft Windows IP Security to Operate with HP ...Configuring Microsoft Windows IP Security to Operate with HP ...
Configuring Microsoft Windows IP Security to Operate with HP ...
 
Dns320 manual 100
Dns320 manual 100Dns320 manual 100
Dns320 manual 100
 
Vrs User Guide
Vrs User GuideVrs User Guide
Vrs User Guide
 
Mongo db security-guide
Mongo db security-guideMongo db security-guide
Mongo db security-guide
 
Ap 51xx access point product reference guide (part no. 72 e-113664-01 rev. b)
Ap 51xx access point product reference guide (part no. 72 e-113664-01 rev. b)Ap 51xx access point product reference guide (part no. 72 e-113664-01 rev. b)
Ap 51xx access point product reference guide (part no. 72 e-113664-01 rev. b)
 
White Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy PracticesWhite Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy Practices
 
software-eng.pdf
software-eng.pdfsoftware-eng.pdf
software-eng.pdf
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

ScreenOS Idp policy creation en

  • 1. APPLICATION NOTE Copyright © 2009, Juniper Networks, Inc. IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Enabling Advanced Security on SRX Series Services Gateways
  • 2. ii Copyright © 2009, Juniper Networks, Inc. APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Table of Contents Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Scope. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 FAQs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Basic Configuration Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 System Licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 SRX Series and CLI Security Policy Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Basic Network Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Initial Configuration Assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Configure Networking and Basic Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Security Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 IPS Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Firewall Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 IPS Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 IPS Security-Package Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Verify Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Log Sample . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 SRX Series and NSM Security Policy Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Import SRX Series Device into NSM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Configuring Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Inventory Reconciliation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 IDP Detector Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Configuring from Central Management Policy Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Firewall Rule Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Configure Firewall Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Configuring from In-Device Management Policy Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Access Configuration Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Configure Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Configure Security Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Assign Interfaces to Security Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Create Firewall Policy and Associate IPS Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Select Default Firewall Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Configure IPS Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Set Traceoptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Set Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Update Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
  • 3. Copyright © 2009, Juniper Networks, Inc. iii APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways SRX Series and J-Web Security Policy Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Configure Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Network Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Security Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Configure Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 IPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Set Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Activate Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Install and Configure Security Package Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Configure Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 About Juniper Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
  • 4. Copyright © 2009, Juniper Networks, Inc. 1 APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Introduction Juniper Networks® SRX Series Services Gateways are next-generation devices based on revolutionary new architecture that provides market-leading scalability and service integration. The SRX Series comes equipped with full security and networking capabilities and represents the highest performing firewalls in the market with natively integrated full Intrusion Prevention System (IPS) technology from Juniper Networks IDP Series Intrusion Detection and Prevention Appliances, providing inline protection against current and emerging threats throughout the network. IPS security policies can be configured either via Juniper Networks Network and Security Manager, Juniper Networks J-Web Software, or the SRX Series command-line interface (CLI). NSM is the sole means for configuring and managing the IDP security policy on Juniper Networks ISG Series Integrated Security Gateways with IDP security module and standalone IDP Series sensors running IDP 4.x and above. Scope Although SRX Series IPS policy can be configured entirely from within J-Web, this document focuses primarily on CLI and NSM configuration steps, to provide an easy transition and learning path for both system engineers new to IPS policy creation as well as those already familiar with managing standalone IDP Series, and ISG Series with IDP solutions. That said, brief J-Web configuration steps are also provided towards the end of this document. This document is not intended to discuss particular hardware and software architectural details related to the SRX Series Services Gateways. For more information on hardware and software details, please refer to the relevant SRX Series Technical Documentation. Also, the intention of this document is not to discuss best practices in terms of policy rules configuration. Its sole purpose is to describe the different ways in which a security policy can be configured on the SRX Series Services Gateways. FAQs The following notes are listed here to immediately address some of the more frequently asked questions: In comparison with Deep Inspection on ScreenOS, the fundamental IPS detection capabilities on the SRX Series do1. not differ from that available on standalone IDP Series or ISG Series with IDP security module. Although full feature parity is intended between different IPS platforms, not all features are available in the2. current version of Juniper Networks JUNOS® Software. Due to the significant engineering efforts required, some features might not become available until future version releases later down the road. For this reason, we recommend that you familiarize yourself with documentation that details those differences. SRX Series is an inline device and, unlike standalone IDP Series or ISG Series with IDP (tap mode), it cannot be3. configured in transparent mode. IPS does not need a separate license to run as a service on the SRX Series, however a license is required for4. IPS updates. A base firewall policy is required and needs to include IPS application-service statement to enable5. IPS inspection Enabling all attacks is not supported. If policy does not load, check service log files for policy size and load results.6. NSM 2008.2 requires 2 gigabytes of RAM7. In order to push policy from NSM successfully, both NSM and the SRX Series have to be at the same detector8. version level, and any device mismatch information has to be reconciled (more details in following sections). A syslog server is required to collect security event-related messages as they get identified on the SRX Series9. data plane. Basic Configuration Steps Enabling a fully functional IPS service on SRX Series Services Gateways includes the following basic configuration steps: Configure basic networking/security/access (in most cases this will already be configured).1. Configure and activate IPS policy.2.
  • 5. 2 Copyright © 2009, Juniper Networks, Inc. APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Configure firewall policy to associate specific rules with IPS3. Configure logging.4. Update security-package.5. Verify configuration and test functionality.6. System Licensing Access the SRX Series Services Gateways console via either serial cable plugged into the console port on the device or by using a terminal session such as SSH. Check for an IPS license (required for IPS updates). mxb@Perth> show system license License usage: none Licenses installed: none If there is no license installed, obtain the chassis serial number by issuing the following command: mxb@Perth> show chassis hardware A serial number is needed to generate the IPS license. Once you obtain your license file, you can install it by adding it from the file or simply by copying and pasting the license to the terminal by doing the following: mxb@Perth> request system license add terminal Paste the license string from the clipboard as in the following example: mxb@Perth> request system license add terminal [Type ^D at a new line to end input, enter blank line between each license key] JUNOS204171 aeaqea qmifat injqhb auimbq ga4aqb qcdw3z voika4 udefun hquffd l4lpx3 h3fc5p 5at7z4 v32i4f traifg fwhkop 4ymgbv 3r53mm ohelsq fby Press the Enter key and Ctrl-D in sequence which will return the following message when the license is valid: JUNOS204171: successfully added add license complete (no errors) Verify the system licenses by doing the following: mxb@Perth> show system license License usage: Feature Licenses Licenses Licenses Expiry name used installed needed idp-sig 0 1 0 2009-12-24 00:00:00 UTC Licenses installed: License identifier: JUNOS204171 Valid for device: AA4508AD0008 Features: idp-sig - IDP Signature date-based, 2008-12-21 00:00:00 UTC - 2009-12-24 00:00:00 UTC
  • 6. Copyright © 2009, Juniper Networks, Inc. 3 APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways SRX Series and CLI Security Policy Configuration Basic Network Configuration The following diagram depicts a logical configuration of the sample network which is used throughout this document to demonstrate security policy configuration. Figure 1: Demo network Initial Configuration Assumptions Before starting the IPS policy configuration, this document assumes that an initial networking configuration exists and that an admin user has full access to the SRX Series. Initial device configuration on our sample system is as follows: mxb@Perth> show configuration | display set set system root-authentication encrypted-password “$1$9FpmDriB$HtuvrU5RXCC2SDaUQDY53/” set system name-server 1.2.3.4 set system login user mxb uid 2000 set system login user mxb class super-user set system login user mxb authentication encrypted-password “$1$nvmwu6vH$EGlHl06vrm.0sq3uhG6Eo1” set system syslog user * any emergency set system syslog file messages any notice set system syslog file messages authorization info set system syslog file interactive-commands interactive-commands any set system license autoupdate url https://ae1.juniper.net/junos/key_retrieval set interfaces fxp0 unit 0 family inet address 192.168.1.221/24 set routing-options static route 0.0.0.0/0 next-hop 192.168.1.1 set security idp security-package url https://services.netscreen.com/cgi-bin/index.cgi Note: Throughout this document we provide commands required to configure specific features; however, in order to activate associated functionality, configuration changes need to be successfully committed (using the commit command). fxp0 ge-0/0/7 192.168.2.211192.168.1.211 33.3.3.1 44.4.4.1 33.3.3. 33 44.4.4. 44 abc-trust abc-untrust SRX Series Traffic/Attack Generator 192.168.1.118 NSM 192.168.1.139 SYSLOG 192.168.2.212 GUI 192.168.1.240 ge-0/0/3ge-0/0/2
  • 7. 4 Copyright © 2009, Juniper Networks, Inc. APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Configure Networking and Basic Security Interfaces Display current interfaces (assumption is interfaces have been properly cabled).1. mxb@Perth# configure mxb@Perth# show interfaces fxp0 { unit 0 { family inet { address 192.168.1.221/24; } } } [edit] mxb@Perth# run show interfaces | match ge-0/0 Physical interface: ge-0/0/0, Enabled, Physical link is Down Physical interface: ge-0/0/1, Enabled, Physical link is Down Physical interface: ge-0/0/2, Enabled, Physical link is Up Physical interface: ge-0/0/3, Enabled, Physical link is Up Physical interface: ge-0/0/4, Enabled, Physical link is Down Physical interface: ge-0/0/5, Enabled, Physical link is Down Physical interface: ge-0/0/6, Enabled, Physical link is Down Physical interface: ge-0/0/7, Enabled, Physical link is Up Physical interface: ge-0/0/8, Enabled, Physical link is Down Physical interface: ge-0/0/9, Enabled, Physical link is Down Physical interface: ge-0/0/10, Enabled, Physical link is Down Physical interface: ge-0/0/11, Enabled, Physical link is Down Configure forwarding interfaces as per network diagram in Figure 1.2. mxb@Perth# set interfaces ge-0/0/2 unit 0 family inet address 33.3.3.1/24 mxb@Perth# set interfaces ge-0/0/3 unit 0 family inet address 44.4.4.1/24 Verify configuration.3. mxb@Perth# run show interfaces terse | match /24 ge-0/0/2.0 up up inet 33.3.3.1/24 ge-0/0/3.0 up up inet 44.4.4.1/24 ge-0/0/7.0 up up inet 192.168.2.222/24 fxp0.0 up up inet 192.168.1.221/24 Security Zones Display existing zones.1. mxb@Perth> show security zones Security zone: junos-global Send reset for non-SYN session TCP packets: Off Policy configurable: Yes Interfaces bound: 0 Interfaces:
  • 8. Copyright © 2009, Juniper Networks, Inc. 5 APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Configure zones abc-trust and abc-untrust and assign interfaces accordingly.2. mxb@Perth# set security zones security-zone abc-trust interfaces ge-0/0/2 mxb@Perth# set security zones security-zone abc-untrust interfaces ge-0/0/3 Verify configuration.3. mxb@Perth# run show security zones Security zone: abc-trust Send reset for non-SYN session TCP packets: Off Policy configurable: Yes Interfaces bound: 1 Interfaces: ge-0/0/2.0 Security zone: abc-untrust Send reset for non-SYN session TCP packets: Off Policy configurable: Yes Interfaces bound: 1 Interfaces: ge-0/0/3.0 Security zone: junos-global Send reset for non-SYN session TCP packets: Off Policy configurable: Yes Interfaces bound: 0 Interfaces: Security Policies IPS Security Policy Configure IPS policy abc-idp-policy.1. Simple configuration in this example involves setting up one rule looking for all “critical attacks” and, in case a match is found, dropping the associated connection, setting that event as critical and logging it with an alert. The second rule is configured to look for “major attacks” and to perform a “recommended action” upon detecting a severe attack, as well as logging the event. (Note: Logging means sending a syslog message to an appropriate, preconfigured syslog server. Logging configuration steps are provided in subsequent sections.) Configuration steps are as follows: mxb@Perth# set security idp idp-policy abc-idp-policy rulebase-ips rule 1 match from-zone any to-zone any source-address any destination-address any application any attacks predefined- attack-groups Critical mxb@Perth# set security idp idp-policy abc-idp-policy rulebase-ips rule 1 then action drop- connection mxb@Perth# set security idp idp-policy abc-idp-policy rulebase-ips rule 1 then severity critical notification log-attacks alert mxb@Perth# set security idp idp-policy abc-idp-policy rulebase-ips rule 2 match from-zone any to-zone any source-address any destination-address any application any attacks predefined- attack-groups Major
  • 9. 6 Copyright © 2009, Juniper Networks, Inc. APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways mxb@Perth# set security idp idp-policy abc-idp-policy rulebase-ips rule 2 then action recommended mxb@Perth# set security idp idp-policy abc-idp-policy rulebase-ips rule 2 then severity major notification log-attacks Verify IPS policy2. abc-idp-policy. mxb@Perth# show security idp idp-policy abc-idp-policy rulebase-ips { rule 1 { match { from-zone any; source-address any; to-zone any; destination-address any; attacks { predefined-attack-groups Critical; } } then { action { drop-connection; } notification { log-attacks { alert; } } severity critical; } } rule 2 { match { from-zone any; source-address any; to-zone any; destination-address any; attacks { predefined-attack-groups Major; } } then { action { recommended; } notification { log-attacks; } severity major; } } }
  • 10. Copyright © 2009, Juniper Networks, Inc. 7 APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Set trace options.3. To provide detailed IPS process event information (policy compilation result, policy loading results, dfa matches, and so on) which allows for further system analysis, tuning, and easier troubleshooting, it is highly recommended to enable trace options. The following is an example setting which configures trace to write all security events encompassing all debug levels (error, info, notice, verbose, and warning). The trace file name is not specified trace if it is not written into the file named after the process being traced, which is the case with IDP/var/log/idpd): mxb@Perth# set security idp traceoptions flag all mxb@Perth# set security idp traceoptions level all For this example, let’s also limit the file size to 100 MB. This means that the process will write this file and once it reaches 100 MB, it will rename it to idpd.0 and continue with a new idpd. The default number of files is 3 and if file numbers are exhausted, the oldest file (idpd.2) gets overwritten. mxb@Perth# set security idp traceoptions file size 100M Verify trace options settings.4. mxb@Perth# show security idp traceoptions file size 100m; flag all; level all; Activate IPS Series policy.5. mxb@Perth# set security idp active-policy abc-idp-policy Verify active IPS policy.6. mxb@Perth# show security idp active-policy active-policy abc-idp-policy; Note: In order to deploy IPS policy on the SRX Series Services Gateways, one more step is required—configuring firewall security policy to identify which traffic is to be processed by the IPS service. This is described in the following section. Firewall Security Policy For traffic entering the SRX Series gateway in order to be processed by IPS security policy firewall, the security policy needs to be configured accordingly. Following are steps required to configure firewall security policy and finalize Intrusion Prevention System configuration on the SRX Series gateway. This will result in traffic between security zones abc-untrust and abc-trust being inspected by IPS security policy abc-idp-policy. Make sure that the system is configured with the default policy denying all traffic. This basically means traffic will1. be denied throughout the gateway unless specifically allowed to by firewall security policy. mxb@Perth> show security policies Default policy: deny-all
  • 11. 8 Copyright © 2009, Juniper Networks, Inc. APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Configure policy.2. mxb@Perth# set security policies from-zone abc-untrust to-zone abc-trust policy abc match source-address any destination-address any application any mxb@Perth# set security policies from-zone abc-untrust to-zone abc-trust policy abc then permit application-services idp mxb@Perth# set security policies from-zone abc-trust to-zone abc-untrust policy abc match source-address any destination-address any application any mxb@Perth# set security policies from-zone abc-trust to-zone abc-untrust policy abc then permit application-services idp Verify configuration.3. mxb@Perth# show security policies from-zone abc-untrust to-zone abc-trust { policy abc { match { source-address any; destination-address any; application any; } then { permit { application-services { idp; } } } } } from-zone abc-trust to-zone abc-untrust { policy abc { match { source-address any; destination-address any; application any; } then { permit { application-services { idp; } } } } }
  • 12. Copyright © 2009, Juniper Networks, Inc. 9 APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways IPS Logging IPS generates event logs when an event matches an IPS policy rule in which logging is enabled. When you configure a rule for logging, the device creates a log entry for each event that matches that rule. When configured to do so, an IPS service will send events that match policy entry to the logging server directly from the data plane via emulated IP address, encapsulated in 514/udp. Configuration steps.1. Configure interface data plane to send syslog messages from:a. mxb@Perth# set interfaces ge-0/0/7 unit 0 family inet address 192.168.2.1/24 Format (standard or structured format).b. mxb@Perth# set security log format syslog Emulated source IP address (interface cannot be fxp0).c. mxb@Perth# set security log source-address 192.168.2.211 Severity.d. mxb@Perth# set security log stream jet severity debug Syslog server IP address (to which logs are sent via 514/udp).e. mxb@Perth# set security log stream jet host 192.168.2.212 Verify log configuration.2. mxb@Perth# show security log format syslog; source-address 192.168.2.211; stream jet { severity debug; host { 192.168.2.212; } IPS Security-Package Update The following steps update SRX Series Services Gateways with the most recent security updates. Note: In order to be able to push a policy from the Network and Security Manager detector to the SRX Series, versions on the SRX Series device and NSM must match. Make sure device is properly configured with download URL:1. mxb@Perth> configure Entering configuration mode [edit] mxb@Perth# show security idp security-package url https://services.netscreen.com/cgi-bin/index.cgi;
  • 13. 10 Copyright © 2009, Juniper Networks, Inc. APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Verify the current version installed on the device. The following example shows version of detector provided with2. version of the installed JUNOS package with no attack database nor policy templates. mxb@Perth> show security idp security-package-version Attack database version:N/A(N/A) Detector version :9.2.140080919 Policy template version :N/A Compare results with the most recent versions available at the Juniper Networks download URL.3. Note: DNS server and default gateway information must be configured in order to successfully resolve and access the URL. mxb@Perth> request security idp security-package download check-server Successfully retrieved from(https://services.netscreen.com/cgi-bin/index.cgi). Version info:1342(Detector=9.2.140081105, Templates=1) Download the updates.4. mxb@Perth> request security idp security-package download full-update Will be processed in async mode. Check the status using the status checking CLI mxb@Perth> request security idp security-package download status Done;Successfully downloaded from(https://services.netscreen.com/cgi-bin/index.cgi). Version info:1342(Fri Jan 9 12:53:43 2008, Detector=9.2.140081105) Install security-package.5. mxb@Perth> request security idp security-package install Will be processed in async mode. Check the status using the status checking CLI mxb@Perth> request security idp security-package install status Done;Attack DB update : successful - [UpdateNumber=1342,ExportDate=Fri Jan 9 13:27:58 2009,Detector=9.2.140081105] Updating control-plane with new detector : successful Updating data-plane with new attack or detector : successful Install policy templates.6. mxb@Perth> request security idp security-package install policy-templates Will be processed in async mode. Check the status using the status checking CLI mxb@Perth> request security idp security-package install status Done;policy-templates has been successfully updated into internal repository (=>/var/db/scripts/commit/templates.xsl)! mxb@Perth> show security idp security-package-version Attack database version:1342(Fri Jan 9 13:28:58 2009) Detector version :9.2.140081105 Policy template version :1
  • 14. Copyright © 2009, Juniper Networks, Inc. 11 APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Verify Configuration At this time, the basic configuration for our example network is complete. It is configured so that if traffic traversing the SRX Series gateway is flowing between zones abc-trust and abc-untrust, it is inspected by the IPS service and matched for: Criticala. attacks: If match is found—connection is dropped and notification is sent to syslog server. Majorb. attacks: If match is found—recommended action is applied and notification is sent to syslog server. Log Sample The following is a sample of some security events as identified by the SRX Series device and presented via syslog: Jan 9 14:20:27 RT_IDP: IDP_ATTACK_LOG_EVENT: IDP: at 552579626, SIG Attack log <33.3.3.33:6312->44.4.4.44:80> for TCP protocol and service SERVICE_IDP by rule 1 of rulebase IPS in policy abc-idp-policy. attack: repeat=0, action=DROP, severity=CRITICAL, name=HTTP:PKG:CART32-ADM-PW-CHG, NAT <0.0.0.0:0->0.0.0.0:0>, time-elapsed=0, inbytes=0, outbytes=0, inpackets=0, outpackets=0, intf:abc-trust:ge-0/0/2.0->abc-untrust:ge-0/0/3.0, and misc-message Jan 9 14:20:24 RT_IDP: IDP_ATTACK_LOG_EVENT: IDP: at 552579624, SIG Attack log <33.3.3.33:3 0770->44.4.4.44:6080> for TCP protocol and service SERVICE_IDP by rule 1 of rulebase IPS in policy abc-idp-policy. attack: repeat=0, action=DROP, severity=CRITICAL, name=HTTP:MISC:NOOP- SLIDE-REQ-OF, NAT <0.0.0.0:0->0.0.0.0:0>, time-elapsed=0, inbytes=0, outbytes=0, inpackets=0, outpackets=0, intf:abc-trust:ge-0/0/2.0->abc-untrust:ge-0/0/3.0, and misc-message – Jan 9 14:20:24 RT_IDP: IDP_ATTACK_LOG_EVENT: IDP: at 552579624, SIG Attack log <33.3.3.33:30770 ->44.4.4.44:6080> for TCP protocol and service SERVICE_IDP by rule 2 of rulebase IPS in policy abc-idp-policy. attack: repeat=0, action=NONE, severity=HIGH, name=SHELLCODE:X86:NOOP-TCP, NAT <0.0.0.0:0->0.0.0.0:0>, time-elapsed=0, inbytes=0, outbytes=0, inpackets=0, outpackets=0, intf:abc-trust:ge-0/0/2.0->abc-untrust:ge-0/0/3.0, and misc-message Jan 9 14:20:24 RT_IDP: IDP_ATTACK_LOG_EVENT: IDP: at 552579624, SIG Attack log <33.3.3.33:51835->44.4.4.44:80> for TCP protocol and service SERVICE_IDP by rule 2 of rulebase IPS in policy abc-idp-policy. attack: repeat=0, action=DROP, severity=HIGH, name=HTTP:PHP:UPLOAD-LOCATION, NAT <0.0.0.0:0->0.0.0.0:0>, time-elapsed=0, inbytes=0, outbytes=0, inpackets=0, outpackets=0, intf:abc-trust:ge-0/0/2.0->abc-untrust:ge-0/0/3.0, and misc-message Jan 9 14:20:23 RT_IDP: IDP_ATTACK_LOG_EVENT: IDP: at 552579618, SIG Attack log <33.3.3.33:48123->44.4.4.44:80> for TCP protocol and service SERVICE_IDP by rule 1 of rulebase IPS in policy abc-idp-policy. attack: repeat=3, action=DROP, severity=CRITICAL, name=HTTP:MISC:NOOP-SLIDE-REQ-OF, NAT <0.0.0.0:0->0.0.0.0:0>, time-elapsed=0, inbytes=0, outbytes=0, inpackets=0, outpackets=0, intf:abc-trust:ge-0/0/2.0->abc-untrust:ge-0/0/3.0, and misc-message Jan 9 14:20:23 RT_IDP: IDP_ATTACK_LOG_EVENT: IDP: at 552579618, SIG Attack log <33.3.3.33:63286->44.4.4.44:80> for TCP protocol and service SERVICE_IDP by rule 2 of rulebase IPS in policy abc-idp-policy. attack: repeat=11, action=NONE, severity=HIGH, name=SHELLCODE:X86:NOOP-TCP, NAT <0.0.0.0:0->0.0.0.0:0>, time-elapsed=0, inbytes=0, outbytes=0, inpackets=0, outpackets=0, intf:abc-trust:ge-0/0/2.0->abc-untrust:ge-0/0/3.0, and misc-message Jan 9 14:20:23 RT_IDP: IDP_ATTACK_LOG_EVENT: IDP: at 552579622, SIG Attack log <33.3.3.33:48835->44.4.4.44:80> for TCP protocol and service SERVICE_IDP by rule 1 of rulebase IPS in policy abc-idp-policy. attack: repeat=0, action=DROP, severity=CRITICAL, name=SCAN:METASPLOIT:APACHE-CHUNK-OF, NAT <0.0.0.0:0->0.0.0.0:0>, time-elapsed=0, inbytes=0, outbytes=0, inpackets=0, outpackets=0, intf:abc-trust:ge-0/0/2.0->abc-untrust:ge-0/0/3.0, and misc-message
  • 15. 12 Copyright © 2009, Juniper Networks, Inc. APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways SRX Series and NSM Security Policy Configuration Overview This section covers basic SRX Series with IPS policy configuration involving the same network setup, same IPS, and same firewall security policies as described in the previous section. There are two possible approaches for configuring SRX Series IPS security policy with NSM. Configure basic setup through the CLI and import the device with policy into NSM.1. Configure both firewall and IPS security policy from NSM entirely from within one of the following device policy2. management modes: Central Mode (Policy at NSM level applicable to any selected device. This is the default mode.)a. In-Device Mode (Policy at device level and applicable to the actual device that is accessed and edited throughb. the configuration details.) For the purpose of this document, we will import the SRX Series device into NSM with a CLI-based configuration as described in the previous section. Note: When updating the SRX Series device in Central Mode, the security policy from Policy Manager is pushed. When in In-Device Mode, the security policy as configured under the Security->idp->idp Policy is pushed.
  • 16. Copyright © 2009, Juniper Networks, Inc. 13 APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Import SRX Series Device into NSM Add new device: Device needs to be selected as1. Existing and Not Reachable. Select device specifications.2.
  • 17. 14 Copyright © 2009, Juniper Networks, Inc. APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Configure device to connect to NSM.3. Console into the SRX Series device and enter the following commands:4. mxb@Perth# set system services outbound-ssh client nsm device-id EEC4B8 mxb@Perth# set system services outbound-ssh client nsm secret <one-time-password> mxb@Perth# set system services outbound-ssh client nsm 192.168.1.139 port 7804 mxb@Perth# set system services outbound-ssh client nsm services netconf Import the device.5. Note: Importing the device by default imports it in the Central Policy Mode and, as a part of the process, imports currently configured security policy on that device into the NSM policy tree.
  • 18. Copyright © 2009, Juniper Networks, Inc. 15 APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Note: If a security policy with the same name already exists in the NSM database (from a previous import), a new, incrementally numbered policy will be created at each import (SRX-Perth-abc-idp-policy_1, SRX-Perth-abc-idp- policy_2, and so on). If there is no security policy configured on the SRX Series device, no policy will be imported and the administrator will have to configure a security policy either using the CLI (importing it as described in the previous section), or will need to configure it from NSM as described in the following sections.
  • 19. 16 Copyright © 2009, Juniper Networks, Inc. APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Configuring Security Policy After successfully importing the device, the administrator can create a new security policy or tune/change the existing policy and then deploy changes and/or updates by the following standard Update Device procedures. This section describes security policy configuration and deployment through Central Policy Mode. Policy SRX-Recommended will be created (based on Recommended security policy template) and applied to the SRX Series device. Note: If the device being imported does not match the Inventory or Detector information in the NSM database, security policy update will fail. Inventory Reconciliation When importing a new device or performing any changes to configuration which result in a hardware or software mismatch between information stored in NSM and the device itself, you will have to reconcile inventory. Updating policy on the device that is out of sync results in the following failure: To bring a device in sync from the Device Manager, right-click on the device and select View/Reconcile Inventory.
  • 20. Copyright © 2009, Juniper Networks, Inc. 17 APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways The following window appears: You can select Refresh which will open a new window and present any mismatched items (highlighted). Or you can select Reconcile to update the database information. Once successful, selecting Reconcile again will show the inventory without any highlighted items.
  • 21. 18 Copyright © 2009, Juniper Networks, Inc. APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways IDP Detector Update If the SRX IDP Detector on the device does not match the detector on the NSM prior to pushing the policy, this will need to be brought in line. To check the Detector version installed on NSM, start Attack Update Manager and check the IDP-SRX Detector Engine version. If the Detector version does not match, a failure message similar to the following is reported when attempting to update the device: mxb@Perth> show security idp security-package-version Attack database version:N/A(N/A) Detector version :9.2.140080919 Policy template version :N/A In order to fix this, it is required to bring both NSM and SRX Series devices into sync. Although it is possible to roll back a couple of versions on the NSM, it is recommended to download and install the most recent security package from the SRX Series CLI. For more details on how to update security packages, please see “IPS Security-Package Update” in previous Section describing the CLI-based policy configuration.
  • 22. Copyright © 2009, Juniper Networks, Inc. 19 APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Configuring from Central Management Policy Mode Select “Firewall/VPN Devices with IDP” as device model.1. Select “Recommended (predefined)” policy as a template.2. Assign policy to a device.3. The following security policy with firewall and IPS rule bases is automatically created and associated with the SRX Series device.
  • 23. 20 Copyright © 2009, Juniper Networks, Inc. APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Firewall Rule Base Configure Firewall Zones You can configure policy for traffic between existing zones on the device. Once satisfied with the configuration, push your policy by right-clicking the device and selecting Update Device.
  • 24. Copyright © 2009, Juniper Networks, Inc. 21 APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Configuring from In-Device Management Policy Mode When in In-Device Policy mode, an administrator is able to configure a device-level configuration as described in the CLI Security Policy Configuration Section. Security policy and other configuration setting changes performed through Device Manager apply to that device only and are applied only when in In-Device Policy Mode. If the device is in Central Mode, these changes are not applied. Note: Switching from one mode to another imports the device configuration from the device into the NSM. The following section provides a quick overview of setting the security policy through the Device Manager in In- Device Policy Management Mode. Access Configuration Details Configure Interfaces
  • 25. 22 Copyright © 2009, Juniper Networks, Inc. APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Configure Security Zones Assign Interfaces to Security Zones
  • 26. Copyright © 2009, Juniper Networks, Inc. 23 APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Create Firewall Policy and Associate IPS Services Select Default Firewall Policy
  • 27. 24 Copyright © 2009, Juniper Networks, Inc. APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Configure IPS Policy Set Traceoptions
  • 28. Copyright © 2009, Juniper Networks, Inc. 25 APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Set Logging Update Device
  • 29. 26 Copyright © 2009, Juniper Networks, Inc. APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways SRX Series and J-Web Security Policy Configuration Overview This section reviews Quick Configuration steps required to set up security policy on SRX Series Services Gateways from within the J-Web interface. Configure Device Network Interfaces Use the same steps to configure all other interfaces.
  • 30. Copyright © 2009, Juniper Networks, Inc. 27 APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Security Zone Use same steps to configure other security zones
  • 31. 28 Copyright © 2009, Juniper Networks, Inc. APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Configure Security Policy Firewall
  • 32. Copyright © 2009, Juniper Networks, Inc. 29 APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways IPS
  • 33. 30 Copyright © 2009, Juniper Networks, Inc. APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Set Notification Activate Policy
  • 34. Copyright © 2009, Juniper Networks, Inc. 31 APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways Install and Configure Security Package Update Configure Logging This step and any other more detailed tasks are done through Edit Configuration (not Quick Configuration)
  • 35. APPLICATION NOTE - IPS Security Policy Creation for Juniper Networks SRX Series Services Gateways 32 Corporate and Sales Headquarters Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA Phone: 888.JUNIPER (888.586.4737) or 408.745.2000 Fax: 408.745.2100 APAC Headquarters Juniper Networks (Hong Kong) 26/F, Cityplaza One 1111 King’s Road Taikoo Shing, Hong Kong Phone: 852.2332.3636 Fax: 852.2574.7803 EMEA Headquarters Juniper Networks Ireland Airside Business Park Swords, County Dublin, Ireland Phone: 35.31.8903.600 Fax: 35.31.8903.601 Copyright 2009 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, JUNOS, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. JUNOSe is a trademark of Juniper Networks, Inc. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. 3500146-001-EN Mar 2009 Printed on recycled paper. To purchase Juniper Networks solutions, please contact your Juniper Networks representative at 1-866-298-6428 or authorized reseller. About Juniper Networks Juniper Networks, Inc. is the leader in high-performance networking. Juniper offers a high-performance network infrastructure that creates a responsive and trusted environment for accelerating the deployment of services and applications over a single network. This fuels high-performance businesses. Additional information can be found at www.juniper.net.