SRX Quick Start June 2013
June 4, 2016 | Author: wandrel | Category: N/A
Short Description
SRX Quick Start June 2013...
Description
SRX QUICK START TRAINING George Kaminski Systems Engineer Tech Lead
SRX QUICK START TRAINING Chapter 1: Course Introduction
INTRODUCTIONS Before we get started… What is your name? Where do you work? What is your primary role in your
organization? What kind of network experience do you have? What is the most important thing for you to learn in this training session?
3
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
COURSE CONTENTS Contents: Chapter 1: Course Introduction Chapter 2: Junos OS Overview Chapter 3: Branch SRX Series Overview Chapter 4: High-End SRX Series Overview Chapter 5: SRX Concepts and Features Chapter 6: Junos OS Command Line Interface (CLI) Introduction Chapter 7: Other Security Products of Interest Complete Hands on Labs 1 - 4
4
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
PREREQUISITES The prerequisites for this course are the following: Basic networking knowledge Understanding of the OSI model and TCP/IP Basic familiarity with the use and deployment of Firewalls, IPSec
Virtual Private Networks and Network Address Translation (NAT)
5
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
COURSE ADMINISTRATION The basics: Sign-in sheet Schedule Class times Breaks
Lunch
Break and restroom facilities Fire and safety procedures Communications Telephones and wireless devices Internet access
6
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
EDUCATION MATERIALS Available materials for classroom-based and instructor-led online classes: Lecture material Lab guide Lab equipment
Self-paced online courses also available http://www.juniper.net/training/technical_education/
7
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
ADDITIONAL RESOURCES For those who want more: Juniper Networks Technical Assistance Center (JTAC) http://www.juniper.net/support/requesting-support.html
Juniper Networks books http://www.juniper.net/training/jnbooks/
Hardware and software technical
documentation Online: http://www.juniper.net/techpubs/ Image files for offline viewing: http://www.juniper.net/techpubs/resources/cdrom.html
Certification resources http://www.juniper.net/training/certification/resources.html
8
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
SATISFACTION FEEDBACK Class Feedback
To receive your certificate, you must complete the survey Either you will receive a survey to complete at the end of class, or we
will e-mail it to you within two weeks Completed surveys help us serve you better!
9
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
JUNIPER NETWORKS EDUCATION SERVICES CURRICULUM Formats: Classroom-based instructor-led technical courses Online instructor-led technical courses Hardware installation eLearning courses as well as technical
eLearning courses
Courses: http://www.juniper.net/training/technical_education/
10
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
JUNIPER NETWORKS CERTIFICATION PROGRAM Why earn a Juniper Networks certification? Juniper Networks certification makes you stand out Unleash your creativity across the entire network Set yourself apart from your peers
Capitalize on the promise of the New Network Develop and deploy the services you need Lead the way and increase your value
Unique benefits for certified individuals
11
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
JUNIPER NETWORKS CERTIFICATION PATH
12
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
CERTIFICATION PREPARATION Training and study resources: Juniper Networks Certification Program website:
www.juniper.net/certification Education Services training classes: www.juniper.net/training Juniper Networks documentation and white papers: www.juniper.net/techpubs
Community: J-Net: http://forums.juniper.net/t5/Training-Certification-and/
bd-p/Training_and_Certification Twitter: @JuniperCertify
13
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
FIND US ONLINE
http://www.juniper.net/jnet http://www.juniper.net/facebook http://www.juniper.net/youtube
http://www.juniper.net/twitter
14
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
SRX QUICK START TRAINING Chapter 2: Junos OS Overview
MOVING FROM CISCO IOS TO JUNOS OS Moving checklist: Call realtor Change address Change utilities Gas Electric Garbage Find movers Pack
No matter the cause of the move, once the move is complete, what a difference the new place makes in your life! 16
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
JUNOS OS: THE POWER OF ONE OPERATING SYSTEM Deployed since 1998
First high-performance network operating system 14+ years of innovation and development Runs routing, switching, and security platforms Reduces complexity, achieves operational excellence Evolutionary architecture expands to new services and extends to new platforms for tomorrow
It is time for a new network Top 130 global service providers 96 of the Global Fortune 100 Hundreds of federal, state, and local government agencies and higher
education organizations throughout the world
17
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
THE POWER OF ONE JUNOS T Series EX Series
SRX Series
MX Series QFX Series
M Series J Series
SECURITY
One OS Reduces time/effort
to operate network infrastructure
ROUTERS
SWITCHES
One Release Train Delivers new
Ensures available &
functionality stably Reduces OPEX
Simplifies management 18
One Architecture scalable software for growing needs Reduces TCO
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
JUNOS OS MODULAR ARCHITECTURE Independent modules Protected memory for stability No overwrites
Kernel Controls the modules
between the modules and to the PFE
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
Module n
Interfaces
Routing
...
Kernel
Manages communication
19
Management
rapid isolation Well-defined interfaces for expansion of functions/ platforms
Control Plane
Contain faults and enable
JUNOS OS SEPARATE CONTROL AND FORWARDING Supports scale for high-performance
Assures performance of each plane Enhances resiliency
Data Plane
Control Plane
Provides options for redundancy
20
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
Routing Engine
Packet Forwarding Engine
JUNOS OS: THE FOUNDATION OF HIGH-PERFORMANCE NETWORKS Data center
routing
Headquarters
switching
Branch
security
Campus services 21
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
SRX QUICK START TRAINING Chapter 3: Branch SRX Overview
BRANCH SRX SOLVES CUSTOMER CHALLENGES All-in-One
Unified Management
Best Price/ Performance
Next Gen Firewall VPN UTM
IPS, AppSecure Anti-Virus
Anti-Spam Web filtering Routing / WAN WLAN, LAN, Switching
Easy to activate new security service in UTM when needed to address new concerns
23
Easy to manage all aspects with Junos, a single OS platform
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
Lower TCO and high performance allows IT to do more with less
BRANCH SRX SERIES GATEWAYS
Delivering “No-Compromise” Services with Scale & Performance Hardware Platforms Scale from 1G to 10G Junos Software across Security, Routing and Switching 12.1 2mPIM+6GPIM WAN slots, 10 x GigE, PoE, Dual P/S 2 GB DRAM + 4 WAN slots, 16 x GigE, PoE 2 GB DRAM + 2 WAN slots, 8 x GigE, PoE 1 GB DRAM
Fixed Config 8 x FE1 1 GB DRAM
Fixed Config VDSL2 WAN 8 x FE1 1 GB DRAM
WAN slot, 2 x GigE, PoE, 1 GB DRAM
+ More LAN slots, Dual P/S, + Hot Swap I/O 2 GB DRAM
SRX650
SRX550
SRX240
SRX220
SRX210
SRX110
SRX100
Small Office 24
Small to Medium Office Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
Large Branch/ Regional Office
BRANCH SRX: SERVING MULTIPLE CUSTOMER NEEDS Multi-services Gateway Secure Router
Routing and WAN Interfaces Firewall, VPN, NAT In-line IPS High availability Transparent mode
NGFW
UTM
Next generation firewall (AppSecure) In-line IPS Application visibility, tracking and enforcement User-role based policies
Ease of use Best-of-breed Anti-Virus, Anti-Spam, Web filtering Cloud based AV - Sophos In-line IPS AppSecure
Branch SRX 25
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
BRANCH SRX SERVICES GATEWAYS Highly configurable
Highly configurable
• Fixed and modular form factors Fixedof&WAN modular factors • Choice – DSL, form T1 / E1, DS3 • Wireless WAN and LAN WAN, WLAN, and LAN interfaces • On-board modular switching
Extensive integration Extensive integration Routing and switching capabilities
SRX100/ SRX110
Fixed
No
700/60 Mbps
Magnitude greater performance
SRX210E
1 mini PIM slot
Optional
850/85 Mbps
performance and availability Exceptional HW Content Security Acceleration
SRX220
2 mini PIM slots
Standard
950/100 Mbps
Security Acceleration Hardware-assisted Control & data Content plane separation,
SRX240
Optional
1800/230 Mbps
Exceptional performance
(CSA) for ExpressAV and IPS redundant processing and power Control & data plane separation, redundant processing and power
Model
SRX550 SRX650
26
Content SEC H/W FW/IPS Configuration Acceleration Performance
Full suite of JUNOS routing and switching capabilities Unmatched core and UTM security Unmatched security, including FW, VPN, UTM, AppSecure, UAC, and full IPS
Copyright © 2013 Juniper Networks, Inc.
4 mini PIM slots 2 mini PIM, 6 GPIM slots 8 GPIM slots
www.juniper.net
Standard 5500/800 Mbps Standard 7000/900 Mbps
BRANCH SRX PHYSICAL INTERFACES MPIMs
Wireless LAN
GPIMs
T1/E1
AX411 dual-radio AP
16XGE
Serial
WLA
24XGE
1XGE SFP
WLC2
4XT1E1
ADSL G.SHDSL
VDSL2 Docsis3.0
2XT1E1 Wireless WAN
2x10GE
SFP+/Copper EVDO/HSPA/WI
MAX/LTE
1xDS3 8xSFP 8xSerial
Supported on SRX210/220/240/550
27
Supported across all Branch SRX platforms
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
Supported on SRX550/650
JAN 2013
MAY 2012
NEW PIMS FOR SRX550 AND SRX650 8 Port Serial GPIM (12.1R2)
8 Port SFP XPIM (1Q2013)
• Synchronous speeds of 8 Mbps
• Line rate switching between ports
• Interface types supported
• Supported SFPs
• V.35, X.21, EIA/TIA-449
• LX, SX, BX
• EIA/TIA-232, EIA/TIA-530
• T or Copper SFPs • Full set of L2 switching features
• EIA/TIA-530A • Line Coding : NRZ, NRZI
• Jumbo frame support – 9192B
• Uses 8 port smart connector
28
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
BRANCH SRX FEATURES MATRIX Security
Wireless LAN and 3G/4G WAN
Firewall VPN IPS AppSecure Antivirus Enhanced Web filtering Antispam
802.11n 3G/4G WiMax & LTE
Routing & Switching RIP, OSPF, BGP, Multicast, IPv6 MPLS; Full BGP table J Flow, RPM L2 Switching POE Options
29
Physical Interfaces
T1/E1, Serial, DS3/E3 VDSL, ADSL, G.SHDSL DOCSIS Cable Modem Ethernet 10/100/1000 & 10G, Copper or Fiber
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
SRX100 Ideal for small sites and managed telecommuters Full security features Firewall and VPN UTM: IPS, AppSecure, antivirus,
web-filtering, and anti-spam UTM requires high memory version
Features On-board Ethernet
8 x FE
Power over Ethernet (802.3af, 802.3at)
None
WAN slots
None
USB ports
1
Content Security Accelerator—ExpressAV and Intrusion Detection and Prevention JUNOS Software version support
No JUNOS 11.1
Firewall performance (Large Packets)
700 Mbps
Firewall performance (IMIX)
200 Mbps
Firewall performance (Firewall + Routing PPS 64byte)
70 Kpps
VPN Performance—AES256+SHA-1 3DES+SHA 1
65 Mbps
IPS performance
60 Mbps
Connections Per Second (CPS)
2K CPS
Maximum Concurrent Sessions (512MB/1GB RAM)
16 K / 32K
Antivirus performance
25Mbps
AppSecure Throughput (HTTP)
90Mbps
High Availability
30
SRX100
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
N/A
SRX110 – IDEAL SOLUTION FOR SMALL BRANCH Designed for flexibility, investment protection, and lowest total cost of ownership (TCO). Features Additional USB port
Front Backup 3G WAN
Back
Primary WAN VDSL
On-board Ethernet
8 x FE
Primary WAN
VDSL2 with ADSL2 Fallback
Backup WAN
USB Port for 3G/4G Modem
Additional USB ports Content Security Accelerator—ExpressAV and Intrusion Detection and Prevention
One (total 2) No
Firewall performance (Large Packets)
700 Mbps
Firewall performance (IMIX)
200 Mbps
Firewall performance (Firewall + Routing PPS 64byte)
65 Kpps
VPN Performance (AES256+SHA1 / 3DES+SHA1)
65 Mbps
IPS performance
60 Mbps
Connections Per Second (CPS)
2K CPS
Maximum Concurrent Sessions
16 K / 32K
Antivirus performance
25Mbps
AppSecure Throughput (HTTP)
90 Mbps
High Availability
31
SRX 110
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
N/A
SRX210E Ideal for small branches
On-board Ethernet Power over Ethernet (802.3af, 802.3at)
Full security features
WAN slots
Firewall and VPN
USB ports (flash)
UTM: IPS, AppSecure, antivirus,
Content Security Accelerator—ExpressAV and Intrusion Detection and Prevention
web-filtering, and anti-spam UTM requires high memory version
32
Features
JUNOS Software version support
SRX210E 2 x GE + 6 x FE 4 ports, 50 W total 1 x mini PIM 2 Yes JUNOS 11.1
Firewall performance (Large Packets)
850 Mbps
Firewall performance (IMIX)
250 Mbps
Firewall performance (Firewall + Routing PPS 64byte)
95 Kpps
IPSec VPN Throughput
85 Mbps
IPS performance
85 Mbps
Connections Per Second (CPS)
2,200 CPS
Maximum Concurrent Sessions (512MB/1GB RAM)
32K / 64K
Antivirus performance
25 Mbps
AppSecure Throughput (HTTP)
250 Mbps
High Availability
A/A or A/P
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
SRX220 Ideal for small and medium branches
Features On-board Ethernet Power over Ethernet (802.3af, 802.3at) WAN slots
Full security features
USB ports (flash)
Firewall and VPN
Content Security Accelerator—ExpressAV and Intrusion Detection and Prevention
UTM: IPS, AppSecure,
JUNOS Software version support
antivirus, web-filtering, and anti-spam
33
SRX220 18x GE 8 ports GE, 120 W 2 x mini PIM 2 Yes JUNOS 11.1
Firewall performance (Large Packets)
950 Gbps
Firewall performance (IMIX)
300 Mbps
Firewall performance (Firewall + Routing PPS 64byte)
125 Kpps
VPN Performance—AES256+SHA-1 3DES+SHA-1
100 Mbps
IPS Performance
100 Mbps
Connections Per Second (CPS)
3K CPS
Maximum Concurrent Sessions (512MB/1GB RAM)
96K
Antivirus performance
34 Mbps
AppSecure Throughput (HTTP)
300 Mbps
High Availability
A/A or A/P
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
SEPT 2012
SRX240 - NOW WITH 2G MEMORY New SKUs for SRX240 provide additional memory SRX240B2 – 1GB DRAM, 2GB
Flash SRX240H2 – 2GB DRAM, 2GB Flash
Features On-board Ethernet Power over Ethernet (802.3af, 802.3at) WAN slots USB ports (flash)
Content Security Accelerator—ExpressAV and Intrusion Detection and Prevention JUNOS Software version support
SRX240 16 x GE 16 ports GE, 150 W 4 x mini PIM 2
Yes JUNOS 11.4R5
Firewall performance (Large Packets)
1.8 Gbps
No changes in price, hardware architecture or security services
Firewall performance (IMIX)
600 Mbps
Firewall performance (Firewall + Routing PPS 64byte)
200 Kpps
Improved scalability for services
VPN Performance—AES256+SHA-1 3DES+SHA-1
300 Mbps
IPS Performance
230 Mbps
Connections Per Second (CPS) Maximum Concurrent Sessions (1GB RAM/2GB RAM)
34
9K CPS 128K / 256K
Antivirus performance
85 Mbps
AppSecure Throughput (HTTP)
750 Mbps
High Availability
A/A or A/P
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
FRS 12.1
SRX550 SERVICES GATEWAY - NEW “No-Compromise Services” with scale and performance for the medium to large branch Advanced Security
•
Comprehensive Routing
Firewall and VPN
UTM: IPS, antivirus, enhanced web-filtering, anti-spam
Application visibility, tracking & enforcement
High Density Switching
Wide range of WAN options: 3G/LTE, T1/E1/DS3/E3, xDSL, Nx1GE, 10 GE L2/L3 VPN, MPLS, VPLS, IPv6, v4
Business Continuity, Resiliency
HA cluster (A/A or A/P)
10 x GE on board (6 Copper, 4 SFP)
WAN backup and redundancy
Modular switching with POE
Control plane, data plane separation
GPIM Online-Insertion-Removal*
Optional redundant power supplies (AC and DC)
Routing Performance
700 Kpps
Firewall Performance
1.7 Gbps (IMIX) 5.5 Gbps (Large packets)
AV & IDP HW Acceleration
Yes
IPSec Performance
1 Gbps
35
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
12.1
SRX550 Ideal for enterprise medium to large branch Ideal office-in-a-box solution for managed services or commercial business
Features On-board Ethernet
10 x GE (6 Copper, 4SFP)
Power over Ethernet (802.3af, 802.3at)
40 ports GE, 500 W
WAN slots USB ports (flash) Content Security Accelerator—ExpressAV and Intrusion Detection and Prevention
SRX550 offers: Comprehensive Routing and Security
Services High density on-board and modular
switch ports, Copper and SFP Application Awareness and Control Business Continuity and Resiliency
JUNOS Software version support
2 mPIM, 6 x GPIM 2 Yes
JUNOS 12.1
Firewall performance (Large Packets)
5.5 Gbps
Firewall performance (IMIX)
1.7 Gbps
Firewall performance (Firewall + Routing PPS 64byte)
700 Kpps
VPN Performance—AES256+SHA-1 3DES+SHA-1
1.0 Gbps
IPS Performance
800 Mbps
Connections Per Second (CPS)
27K CPS
Maximum Concurrent Sessions (2 GB RAM)
375 K
Antivirus performance
300 Mbps
AppSecure Throughput (HTTP)
1.5 Gbps
High Availability
36
SRX550
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
A/A or A/P
SRX650 Features
Ideal for regional sites and large branches
On-board Ethernet
Full security features
WAN slots
Power over Ethernet (802.3af, 802.3at)
Firewall and VPN
USB ports (flash)
UTM: IPS, AppSecure, antivirus, web-
Content Security Accelerator—ExpressAV and Intrusion Detection and Prevention
filtering, and anti-spam
JUNOS Software version support
Modular LAN switching Services Routing Processors with
optional redundancy Power supplies with optional
redundancy (at FRS)
4 x GE 48 ports GE, 250W or 500 W 8 x GPIM
2 per processor Yes JUNOS 11.1
Firewall performance (Large Packets)
7.0 Gbps
Firewall performance (IMIX)
2.5 Gbps
Firewall performance (Firewall + Routing PPS 64byte)
850 Kpps
VPN Performance—AES256+SHA-1 3DES+SHA-1
1.5 Gbps
IPS Performance
1 Gbps
Connections Per Second (CPS)
35K CPS
Maximum Concurrent Sessions (512MB/1GB RAM)
512 K
Antivirus performance
350 Mbps
AppSecure Throughput (HTTP)
1.9 Gbps
High Availability
37
SRX650
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
A/A or A/P Hot swap GPIMs, Dual power
BRANCH SRX SERIES SPECIFICATIONS
38
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
JUNIPER’S WIRELESS WAN SOLUTION – CX111 Best signal Bridge
Get the 3G antenna out
of the wiring closet to optimize reception*
More choices Choose 3G/LTE USB modem
or standalone 3G bridge Choose from 90+ modems from every major manufacturer* Tightly coupled system speeds
wired to wireless failover Redundant radio hardware and provider diversity*
Direct Plug-in USB Modem support
Higher reliability
Carrier’s 3G/4G LTE Network
* Requires bridge solution 39
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
3G/4G WIRELESS WAN UPDATE Integrated Small Package for 3G: Now with USB modem support
CX111 Bridge
Direct plug-in USB Modem Support for SRX100, 110 and 210E
CX111 3G/4G Bridge for **all** SRX, other platforms
ExpressCards form factor obsolete GSM/HSPA+ Modem supported now Secure Modem / Modem Cap 1H 2012 4G LTE modem support Mid 2012 No USB 3G support on 220/240/550/650 40
Worldwide 90+ Modems supported LTE supported now CX111 supports SNMP based mgmt Junos CLI based management in 11.4R2 Q1 2012
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
BRANCH SRX ADVANCED SECURITY PLATFORM INTERNET
External Threats
Internal Threats
IPS
IDP detects/stops Worms, Trojans, DoS (L4 & L7), Scans
AppSecure with User Role FW
Application level visibility and classification Application security policies tied to user roles
Enhanced Web Filtering
Block access to unapproved sites Real time threat score for each URL
Antivirus
Stops viruses, file-based trojans or spread of spyware, adware, keyloggers
Antispam
Stops Spam/Phishing
Content Filtering
SRX Series blocks transmission of files for Data Loss Prevention
Core Security
Firewall, VPN, Unified Access Control
41
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
J-WEB WIZARDS
Configuration Wizards 1
2
3
4
Initial Device Setup
Firewall
NAT
VPN
JavaScript and XML based with all activity executed by browser
Provides a responsive user experience Complete Wizard UI is loaded after hitting launch button Single commit
Reduces configuration time 42
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
JAN 2013
NEW STARTUP WIZARD New Startup Wizard that simplifies user configuration and reduces time to setup device Guided setup (step by step) ‘Basic’ & ‘Expert’ Modes Security topology (zones),
security policy and license configuration NAT Remote/Dynamic VPN Confirm and Apply (Commit, Import, Export)
Available on all Branch SRX platforms 43
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
BRANCH SRX CERTIFICATIONS - UPDATE
Branch SRX leading the industry in most stringest certifications for enterprise firewall Key certifications added this year: Common Criteria CC EAL4 Department of Defense (DoD) certification Testing and certification by DoD JITC for interoperability with DoD networks Addition to Unified Capabilities Approved Product List (UC APL) Branch SRX certified as both router and firewall – this is a first for any vendor!
ICSA – Corporate Firewall and IPSec 1.3 USGv6 – Firewall Profile
44
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
SRX QUICK START TRAINING Chapter 4: High-End SRX Overview
High End SRX Platforms
DYNAMIC SERVICES ARCHITECTURE™ (DSA) Scales performance, capacity and service density World’s fastest firewall and IPS
SRX Services Gateways
High-Speed Fabric Technology
46
Expandable chassis Linear scalability Processing and I/O pools Industry’s top performance
Carrier-Class Reliability The power of one OS, one release train
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
Separation of control and data planes Redundant everything Proven operating system
SRX / HE DATA CENTER SERVICES PLATFORMS SRX5800
Next-Gen Security Systems
16U, 12 slot, 2RE*, 2+1 SCB,
Scalable Performance Rich Standard Services • Firewall • VPN • IPS • Full Routing • QoS • Application Security • Role Based Firewall • Extensible Security Services Integrated Networking Services
2+2 AC, 3+1 DC, 120/30/30G, 10M sess, 350kcps
8U, 6 slot, 2RE*, 1+1 SCB, 2+2 PS, 60/15/15G, 9M sess, 350kcps
NS-5400
SRX5600
SRX3600 5U, 6+6 CFM, 8+4 GE, 2RE*, 2+2 PS, 30/10/10G, 2M sess, 175kcps
SRX3400
3U, 4+3 CFM, 8+4 GE, 2RE*, 1+1 PS, 20/8/8G, 2M sess, 175kcps
SRX1400 ISG2000
3U, 3 CFM, 12GE or 3XGE+9GE , 1+1 PS, 10/2/2G, .5M sess [at FRS], 45kcps
ISG1000 47
NS-5200 Copyright © 2013 Juniper Networks, Inc.
Note *: Redundant REs not currently supported
www.juniper.net
HIGH-END SRX COMPONENTS I/O Cards (IOC) Provide Ethernet interfaces that connect the services gateway to
your network
Network Processing Unit (NPC) Network Processing Cards (NPCs) receive inbound traffic from I/O
cards (IOCs) and direct it to the appropriate Services Processing Card (SPC) for processing In simple terms, think of it as a session load balancer
Services Processing Card (SPC) Provide the processing capacity to run integrated services such as
firewall, IPsec, and IDP
48
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
HIGH-END COMPONENTS CONTINUED Routing Engine (RE) Runs the Junos operating system (Junos OS) Including software processes that maintain the routing tables, manage the routing protocols used on the services gateway, control the services gateway interfaces, control some chassis components, and provide the interface for system management and user access to the services gateway
Switch Fabric Board (SFB) Powers on and powers off IOCs and SPCs Controls clocking, system resets, and booting Monitors and controls system functions, including fan speed, board
power status, and the system front panel Provides interconnections to all the IOCs within the chassis through the switch fabrics integrated into the SCB 49
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
HIGH-END COMPONENTS CONTINUED Network Processing I/O Cards (NP-IOCs) Special IOCs designed specifically for low-latency applications Each NP-IOC has its own network processing unit (NPU), so that
traffic traversing the NP-IOC does not have to traverse the services gateway bus to a remote network processing card (NPC)
50
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
DYNAMIC SERVICES ARCHITECTURE SRX SERIES FULLY INTEGRATED PACKET FLOW 1.5
Flow Lookup Classification DoS/DDoS Policing
I/O Card
Network Processing Card
Egress Packet Integrated in SRX5000 IOC
QoS/Shaping
51
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
Fabric
Ingress Packet
Fabric
Oversubscription Control
Services FW/VPN/IDP NAT/Routing
Services Processing Cards
HIGH-END SRX SCALING AND PLANNING The number of NPC and SPC resources dictates the High-End SRX throughput and performance, i.e. number of IPSec tunnels, IDP performance, number of FW sessions, etc. Generally speaking it is the SPC’s that make the real difference in
terms of performance
Juniper Networks Systems Engineers and Partner SE’s can assist with sizing guidelines for a given desired performance profile and application
52
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
SRX1400 12 on-board ports:
3 RU Modular chassis – 3 expansion slots Compact form factor modules shared with SRX3000 – Junos Software
Fan tray
Expansion Slots
1400GE: 6+4+2 GE
(rear)
(NSPC or SPC+NPC)
1400XGE: 3 XGE plus 6+1+2 GE
Massive scale – Up to 45,000 new, sustained connections per second (CPS) – Up to .5 million sessions [at FRS]
High performance – Up to 10 Gbps firewall – Up to 2 Gbps IPS – Up to 2 Gbps IPSec VPN
Expansion Slot Slot
Management Module (RE)
(IOC)
guide
Redundant power and fans Chassis Clustering (Q2 2011) Modular Junos Software Shared HA-control ports High availability
SRX3000 technology – Common sparing possible 53
Copyright © 2013 Juniper Networks, Inc.
Redundant
FRU
power supply (optional)
High availability – – – – –
Power supply
www.juniper.net
SRX 3400 SRX3400 Front View 2 x 10 GigE I/O card
12 on-board GbE ports
USB
Switch Fabric Board (SFB)
Fan tray
16 x GbE SFP I/O card
Front slot guide
16 x 10/100/1000 I/O card
Expansion Slot (SPC/NPC)
– 7 expansion slots (4 front and 3 rear) – Compact form factor modules for I/O and service processing – Dual, hot swappable management modules – Junos Software
Massive scale
Expansion Slot (IOC/SPC)
SRX3400 Rear View
3 RU Modular chassis
Redundant Routing Engine (future) or SCM
– Up to 175,000 new, sustained connections per second (CPS) – Up to 2.25 million sessions
High performance – Up to 20 Gbps firewall – Up to 6 Gbps IPS – Up to 6 Gbps IPSec VPN
Routing Engine
High availability Fan tray door Power supply FRU
54
Redundant power supply (optional)
Expansion Slot (SPC/NPC)
Rear slot guide
Copyright © 2013 Juniper Networks, Inc.
– Redundant power and fans – Redundant management – Modular Junos Software
www.juniper.net
SRX3600: FRONT AND REAR VIEWS SRX3600 Front View 12 on-board GigE ports
USB
Switch Fabric Board (SFB)
2 x 10 GigE I/O card 16 x GbE SFP I/O card
Fan tray
Front slot guide
Expansion slot (IOC/SPC)
SRX3600 Rear View Power supplies FRU
– Up to 175,000 new, sustained connections per second (CPS) – Up to 2.25 million sessions
Redundant power supplies (optional) Fan tray door
Expansion slot (SPC)
55
– 12 expansion slots (6 front and 6 rear) – Compact form factor modules for I/O and service processing – Dual, hot swappable management modules – Junos Software
Massive scale
16 x 10/100/1000 I/O card
Expansion slot (SPC/NPC)
Routing Engine
5 RU Modular chassis
Redundant Routing Engine (future) or SCM
Rear slot guide
Copyright © 2013 Juniper Networks, Inc.
High performance – Up to 30 Gbps firewall – Up to 10 Gbps IPS – Up to 10 Gbps IPSec VPN
High availability – Redundant power and fans – Redundant management – Modular Junos Software
www.juniper.net
3600 COMPONENT REVIEW Dual-height SFB option cover (SRX3600 only / future)
Switch Fabric Board (SFB)
Air Intake
IOC 16xSFP
IOC 2x10GE IOC 16xCopper
Services Processing Card (SPC)
Front Slot guide Fan tray door Services Processing Cards (SPC)
Network Processing Cards (NPC) [or SPCs]
Routing Engine (RE) 56
Rear Slot guide Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
SRX3000 CARDS Switch Fabric Board (SFB)
High speed switch fabric (320Gbps) Includes virtual IOC (8x10/100/1000 + 4xSFP), HA-control (2xSFP: SX, LX, LH, T) and system interface (CRAFT)
Network Processing Card (NPC)
Single Network Processor (NP) subsystem - 10Gig throughput
Services Processing Card (SPC)
Single HD-CPU subsystem (SPU) / 10Gig throughput
Routing Engine (RE)
1.2Ghz processor /w 1GB memory Complete separation of control / data planes Includes CPP (central PFE controller) and CB (control board)
Clustering Module (SCM)
Independent control-plane GigE switch to enable second HA-control link Requires Junos 10.2
I/O Cards (IOC)
3 versions:
57
2-port 10GE-XFP (SR, LR, ER) 16-port GE-SFP (SX, LX, LH, T [10/100/1000]) 16-port 10/100/1000 Copper 10Gig full-duplex throughput (oversubscribed) Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
SRX5600: PRODUCT OVERVIEW SRX5600 Front View
8 RU Modular chassis
Upper fan tray
– Horizontal design – 6 expansion slots – Modules for flexible I/O and service processing – Junos software
Control Panel
Services Processing Card
Expansion slot (fits any module)
Massive scale – Up to 350,000 new & sustained connections per second (CPS) – Up to 9 million sessions
40 x GbE IOC
High performance
Switch Control Boards (SCBs)
– Up to 60 Gbps firewall – Up to 15 Gbps IPS – Up to 15 Gbps IPSec VPN
Management Module
Power supplies FRU
High availability – Redundant management modules – Redundant switching fabrics – Redundant fans & power supplies – Modular Junos Software
SRX5600 Rear View
58
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
SRX5800: PRODUCT OVERVIEW SRX5800 Front View Control Panel
16 RU Modular chassis
Upper fan tray
– Vertical design – 12 expansion slots – Modules for flexible I/O and service processing – Junos software
Switch Control Boards (SCBs)
Massive Scale
Services Processing Card
40 x GbE I/O Card
Power supplies FRU
4 x 10GbE I/O Card
– Up to 350,000 new & sustained connections per second (CPS) – Up to 10 million sessions
High performance
Management module
– Up to 120 Gbps firewall – Up to 30 Gbps IPS – Up to 30 Gbps IPSec VPN
High availability – Redundant management modules – Redundant switching fabrics – Redundant fans & power supplies – Modular Junos Software
Lower fan tray
Air intake
Expansion slots (fits any module)
SRX5800 Rear View 59
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
SRX QUICK START TRAINING Chapter 5: SRX Concepts and Features
SRX SERIES—FIREWALL, ZONES, AND POLICIES ZONE “UNTRUST” Originating Zone
INTERNET
Default Policy—Deny All
Default Policy—Allow All
SRX
Originating Zone
ZONE “TRUST” 61
Copyright © 2013 Juniper Networks, Inc.
ZONE “TRUST2” www.juniper.net
NEXTGEN DATA PLANE (FLOW THREAD) Forwarding Lookup
Screens
Static NAT
NO
Per Packet Policer
Per Packet Filter
Dest NAT
Route
Zones
Policy
Reverse Static NAT
YES
Match Session?
Source NAT
Services ALG
Session
YES
Screens
TCP
NAT
Services ALG
Per Packet Filter
JUNOS Flow Module 1) Pull Packet from Queue 2) Police Packet 3) Filter Packet 4) Session Lookup
62
5a) No Existing Session • FW Screen Check • Static & Destination NAT • Route Lookup • Destination Zone Lookup • Policy Lookup • Reverse Static & Source NAT • Setup ALG Vector • Install Session
5b) Established Session • FW Screen Check • TCP Checks • NAT Translation • ALG Processing
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
6) Filter Packet 7) Shape Packet 8) Transmit Packet
Per Packet Shaper
FIREWALL FILTERS Stateless Filters SRC 10.1.20.1 ANY SSH
Applied to interfaces, can mitigate known un-wanted traffic before policy lookup INTERNET
Common to MX, EE, SRX Junos edit firewall filter SRX_Protection juniper@SRX5800# set term in-ssh from source-address 10.1.20.1/24 juniper@SRX5800# set term in-ssh from protocol tcp juniper@SRX5800# set term in-ssh from destination-port ssh juniper@SRX5800# set term in-ssh then accept
Retail
63
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
Branch
Small Office
Regional
APPLICATION LAYER GATEWAYS (ALG) Advanced inspection of dynamic applications
FTP
PASV
TCP 21
PORT
FTP TCP 14599
Can detect negotiated ports and perform statefull inspection on dynamic applications (FTP, SIP, SCCP, H323,MGCP etc)
Automatically utilized when application is referenced within the security policy Retail
64
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
Branch
Small Office
Regional
SCREENS Screens are used to mitigate known malicious activities such as DOS, DDOS, Reconnaissance Applied on Zone basis, default screen can be applied to “untrust” interface Uses thresholds and parameters to determine traffic flows into zone Can Drop Traffic or act as a Proxy for TCP Connections
TCP SYN TCP SYN TCP SYN
INTERNET
Retail
65
Copyright © 2013 Juniper Networks, Inc.
ICMP Sweep
www.juniper.net
Branch
Small Office
Regional
SCREENS juniper@SRX5800# show security screen ids-option untrusted-internet icmp { ip-sweep threshold 1000000; fragment; large; } ip bad-option; record-route-option; timestamp-option; security-option; stream-option; spoofing; source-route-option; Loose-source-route-option; strict-source-route-option; unknown-protocol; } tcp { syn-fin; fin-no-ack; tcp-no-flag; syn-frag; port-scan threshold 1000000;
66
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
TCP SYN TCP SYN TCP SYN
ICMP Sweep
INTERNET
Regional
FROM THE OVERALL ARCHITECTURE PERSPECTIVE BEST PRACTICES STEPS Assures legitimate traffic is not impacted
Step1 - Establish a baseline
Step 2- Build the First Line of Defense Police traffic close to source or at ingress into aggregation network elements, e.g. ingress into a FW
Step 3 – Build the Second Line of Defense SCREENs IDP Application-level IDP Application Firewall Step 4 – Build the Third Line of Defense Traffic shape at the egress of a FW 67
Throttles all the traffic, minimizing the impact of attacks on intermediate network elements Eliminates all the recognized “bad” traffic
Throttles the remainder of the traffic, which includes legitimate and nonrecognized “bad” traffic
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
CONTRASTING SCREENS AND IDP SCREENs Protect from the outer layer perspective Are executed prior to any route look up or security policy look up
IDP Provides deeper packet examination Detects protocol anomaly
Evoked after route and/or security policy look up
68
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
PROTECTING FROM A FIREWALL PERSPECTIVE
SRX FW Traffic Entering SRX FW
Ingress Policers & Firewall filters
SCREENs
L4-7 StatefullL3/L4/L5 IDP IPS FW
Steps 2, 3, & 4 69
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
Egress Traffic Shaping
Traffic Exiting SRX FW
ROUTING & SWITCHING SRX can act as a full router, supporting IPV4, IPV6, L2/L3 MPLS Supports IPV4 RIP, OSPF, IS-IS & BGP
Layer 2 switching supported on Branch SRX, not supported on HE SRX Onboard Ethernet ports on the SRX100, SRX210, and SRX240 devices Multiport Gigabit Ethernet XPIM on the SRX650 device
Support of Virtual Routers and Logical Tunnel Interfaces Supports full Junos COS – 8 Queues per port Can also run in Transparent FW mode, supporting Layer2 bridged FW security
70
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
Regional
SRX PACKET FLOW Branch SRX has 2 modes of Operation Packet Mode: Can be run in packet mode to operate like a traditional router, mode used to support MPLS, VPLS Flow Mode: Flow mode ensure Fast-Path Lookup, default action of Branch SRX devices. Mixed Mode: Brach SRX can also act in Mixed Mode supporting both Flow and Branch based connections
71
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
SRX HIGH AVAILABILITY Features Stateful fail-over Active/Backup Control Plane
Active/Active Data Plane Single System View
Benefits Maintains connection
persistence & improves system resiliency for services Load sharing across systems Optimized for complex routing environments
72
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
TWO CHASSIS CONNECTED TOGETHER Control Plane (fxp1) Fe-0/0/7
Data Plane (fab1) IOC to IOC
Control Plane (fxp1) Connection SPC-to-SPC Data Plane (fab1) Connection IOC to IOC 73
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
INTERFACE NUMBERING Interfaces are numbered “Hobson” style Node1 (12-23)
Node0 (0-11)
slot 12
slot 0
ge-13/0/0 ge-1/0/0
RE 0 RE 1
slot 23 74
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
CHASSIS CLUSTER INTERFACES Fxp1 -
Control Plane interface Dedicated Interface dependant on Model Dual Control Plane support on HE Synchronizes Configuration & Keepalives
Fab0/1 -
- Data fabric interface Can be 1G or 10G dependant on Model Synchronizes Session information over RTO’s Can be used for forward “Z” path traffic
Redundancy Group (RG) Logical Grouping of Interfaces. SRX with Highest Metric (255) is master for each RG. Failure of interfaces decrements total RETH redundant Ethernet, virtual IP and MAC for associated VLAN, member of redundancy group 75
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
CHASSIS CLUSTER DEPLOYMENTS ACTIVE/PASSIVE Active Control Plane Active Redundancy Group 1 Active Redundancy Group 2
76
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
CHASSIS CLUSTER DEPLOYMENTS ACTIVE/ACTIVE Active Control Plane Active Redundancy Group 1 Active Redundancy Group 2
77
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
APPLICATION VISIBILITY AND CONTROL IS EASY WITH APPSECURE Application Enforcement by User Role
Application View
Threat Mitigation
IPS
Application Awareness and Classification Engine What application? What user? User location? User device?
78
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
12.1
….NOW WITH USER ROLE FIREWALL
Allows different users to have different application policies based on their role and group
MAG/UAC P2P apps blocked
Marketing
Youtube allowed Anti-virus applied WF profile A
Branch SRX
Sales
P2P, Youtube blocked Anti-virus applied
WF profile B No apps blocked
CEO
Anti-virus applied
WF profile C 79
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
USER-ROLE FIREWALL FOR ACTIVE DIRECTORY Windows ADs
1
1
Doman user logins into domain from domain member device
Data
2
Unauthenticated Client tries to access resource through SRX, and dropped
Finance
3
SRX redirects client to IC for authentication process using Kerberos
4
Upon successful authentication and identification of user, IC gets AD group membership using LDAP and maps to Roles and sends info to SRX
5
Client device passes traffic through SRX per corresponding policy enforcement controls based on User/Role
Junos Pulse MAG/IC Series
3 4 SRX Series
Client
2
5
Video
Internet
Apps Corporate Data Center
80
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
COMPREHENSIVE USER POLICY ENFORCEMENT
Standard Server Hardware
Flexibility Agent-based deployment can provide advanced functionalities Agentless access can be used for unintrusive, transparent user experience Local web portal can be used for guest access or as a fallback mechanism 81
Rich OS Support Windows XP, Windows Vista and Windows 7 MacOS support Linux/Solaris support Thin clients can be supported using the local web portal Broad range of Smartphone OS – iOS, Android, others
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
Advanced Services Host checker Coordinated Threat Control SSL tunneling End-to-End Security Policy enforcement by user role and group
APPLICATION VISIBILITY FOR INFORMED RISK ANALYSIS Monitor & Track Applications
AppTrack
View application by protocol, Web application, and utilization Analyze usage and trends
Web 2.0 application visibility
Customize application monitoring Application usage monitoring Scalable, flexible logging & reporting 82
Log and report across security solutions and systems
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
APPSECURE: BEYOND JUST FIREWALL OR APPLICATION CONTROL Control & Enforce Web 2.0 Apps
AppFW
Inspect ports and protocols Uncover tunneled apps
HTTP
Stop multiple threat types
Dynamic application security
Control nested apps, chat, file sharing and other Web 2.0 activities
Web 2.0 policy enforcement
Threat detection & prevention
83
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
IPS FOR CUSTOMIZABLE PROTECTION Monitor & Mitigate Custom Attacks
IPS AppSecure IPS
Detect and monitor suspicious behavior
VULNERABILITY
Tune open signatures to detect and mitigate tailored attacks
Exploits Other IPS’s
On-going threat protection
Mobile traffic monitoring
Custom attack mitigation
84
Uncover attacks exploiting encrypted methods
Address vulnerabilities instead of ever-changing exploits of the vulnerability
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
ENHANCED WEB FILTERING
Internet
“In the Cloud” Categorization Server
Productivity Performance Security
SRX
Internal network
85
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
Continuous updates Large number of URLs Category granularity Real time threat score
CUSTOMER CHOICE FOR ANTIVIRUS
Cloud-based option: Sophos
On-box option: Kaspersky
Juniper is the only vendor offering customers a choice between two market proven antivirus solutions. 86
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
CLOUD BASED AV SERVICE: SOPHOS LIVE PROTECTION ANTI-MALWARE FOR JUNIPER SRX Cloud-based intelligence
delivers high performance malware protection Effective, instant protection
SRX
against malware and infected web sites Target customers that want
the performance and ease of a cloud-based antivirus solution
87
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
ANTI-SPAM 3
SRX tags email as ***SPAM*** or is allowed through. Email server can then use tag to make supplementary decisions
DMZ
2 Email Server
Web Proxy
Service checks host address against constantly updated list and returns a block, permit or log-and permit message to the SRX
Internet (UNTRUST)
Host
TRUST
1
88
SRX receives email destined for email server in DMZ or TRUST zone and looks up local white/black list to check local entries. Finds no entry and sends address of remote email server or source to in-the-cloud anti-spam service
Copyright © 2013 Juniper Networks, Inc.
Remote Email Server
www.juniper.net
REMOTE ACCESS VPN Dynamic VPN Service – Access Manager Client Clientless – dynamic IPSEC client
automatically downloaded Simultaneous tunnel enforcement Automatic client upgrade capabilities Self-provisioning IPSec with TCP-based fallback for NAT traversal Windows platform support—XP, Vista, Win 2000, and Windows 7, Windows 10
Wireless
Wired
3G/4G Wireless
INTERNET
SRX210
89
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
JUNIPER WIRELESS - COMPLETE WLAN SOLUTION WLA/WLC PRODUCTS SUITE WLM – Management and Access Tools Plan Report
Trouble shoot
RingMaster
Config
Monitor
SmartPass
WLM - Appliance
Simple - Secure - Mobile WLA – Access Points
90
Copyright © 2013 Juniper Networks, Inc.
WLC – Controllers
www.juniper.net
APPSECURE SOFTWARE SERVICE SUITE Application Intelligence and Security In Branch
AppTrack
AppFW
AppQoS
AppDoS
IPS
Understand security risks
Block access to risky apps
Prioritize important apps
Protect apps from bot attacks
Remediate security threats
Address new user behaviors
Allows user tailored policies
Rate limit less important apps
Allow legitimate user traffic
Stay current with daily signatures
Subscription service includes all modules and updates Juniper Security Lab provides 900+ application signatures 91
Copyright © 2013 Juniper Networks, Inc.
2H 2013
www.juniper.net
APPLICATION SECURITY AVAILABILITY
92
High End SRX
Branch SRX
AppTrack
AppFW
AppQoS
AppDoS
IPS
Copyright © 2013 Juniper Networks, Inc.
2H2013
www.juniper.net
LOGICAL SYSTEMS (LSYS) HIGH-END SRX ONLY Virtualization of many aspects of Junos, especially security policies and enforcement options within a single HE SRX “Complete” separation of a single device into unique virtual instances, including: Administrative separation – users in one LSYS have no visibility
into or knowledge of any other LSYS instances that may be running on the box Traffic Separation – network traffic for a given LSYS cannot cross into another LSYS unless security and routing policies are configured to allow it Resource separation – resources such as sessions, policies, zones, and virtual routers can be budgeted between the various LSYS instances
An evolution of ScreenOS’s VSYS concept 93
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
SERVICES OFFLOAD: A.K.A. LOW LATENCY FIREWALL HIGH-END SRX ONLY Allows both latency-sensitive and normal traffic to be mixed on the same platform When configured with ‘services offload’, SPC will push policy to NPC, and further processing is handled directly by NPC Available as of Junos 11.4
PHY
NP NPC
SPC
PHY
NPC
SPC
PHY
NP NPC
SPC
PHY
NP NPC
SPC
Supports FW, NAT, NPU screens, and QoS No support for services that require an SPC Fragmented packets IPS Inter-LSYS traffic
94
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
JUNOS SPACE Open Network Application Platform Network Application Platform Open, extensible, standardsbased (SOA) Abstractions for generic service definitions
Network Activate, ● Transport Activate ● QoS Design ● Ethernet
OSS ● BSS ● Green/Energy ● End-user Forensics Security Director Adapters (MTOSI, OneAPI) ● … others
Juniper Applications
3rd Party Applications
Design ● Security Design ● Virtual Control ● Service Now
APPLICATIONS
Purpose-built for network orchestration and automation
RESTful Web Service API
Carrier-grade scale Transparent communication with all Junos devices (any device, any OS version) – total management of Juniper infrastructure Easy integration with OSS via NBI/SDK
Network Widgets
Infrastructure Widgets
JUNOS SPACE PLATFORM Device Management Interface (DMI)
95
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
SECURITY THREAT RESPONSE MANAGER (STRM)
STRM supports SRX Series Intrusion Prevention System (IPS) and AppSecure 220+ out-of-the box report templates Fully customizable reporting engine:
creating, branding and scheduling delivery of reports Compliance reporting packages for PCI, SOX, FISMA, GLBA, and HIPAA Reports based on control frameworks: NIST, ISO and CoBIT 96
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
JUNOS SCRIPTS Configuration Automation - Instructs Junos during the commit process Options to provide warnings, post log messages, automatically fail the commit, or change the configuration Operations Automation - Instructs Junos as prompted by the command-line and other scripts: Create custom operational commands for specific user and environment needs Event Automation - Instructs Junos of actions to take in response to events: Gather relevant troubleshooting information and correlate events from the first leading indicators
97
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
JUNOS SCRIPTS
98
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
SRX QUICK START TRAINING Chapter 6: Junos OS Command Line Interface (CLI) Introduction
MULTIPLE WAYS TO MANAGE! JUNOS CLI Telnet, SSH Commit model JUNOScript: Automated Configuration, Operations
J-Web Quick Setup with Templates Dashboard View Performance Monitoring
Security Director Manage multiple devices Global, group and device level configuration
100
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
CONFIGURATION HISTORY commit Candidate Configuration
configure
Active Configuration
0 rollback n
1 Active configuration stored in /config/juniper.conf.gz Rollback files stored in /config/juniper.conf.n.gz (n=1–3) /var/db/config/juniper.conf.n.gz (n=4–49) 101
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
2
...
49
JUNOS OS CONFIGURATION PROCESS Separation of configuration edit and activation Validation checks Version control
Automated rollback
Convenient deployment of standard configurations and policy language across the network
commit candidate Load configuration
102
commit confirmed
validated configuration commit scripts
commit validations
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
active configuration
JUNOS OS CONFIGURATION PROCESS (CONT’D)
1
2
3
commit configuration
commit confirmed commit scripts
1
commit validations
49
Basic steps in the configuration process 1. 2. 3.
103
Enter changes in the candidate Commit the candidate Candidate becomes active Copyright © 2013 Juniper Networks, Inc.
active configuration
www.juniper.net
rollback
validated configuration
candidate
Load
THE RESCUE CONFIGURATION A rescue configuration is designed to restore basic connectivity in the event of configuration problems
Contents are user defined
Include a root password!
By default, there is no rescue configuration Can be saved using J-Web or the CLI Once saved, the rescue configuration can be activated with the CLI or a momentary push of the recessed CONFIG button
CONFIG button
104
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
CLI MODES AND FEATURE OVERVIEW CLI operational mode:
Editing command lines Command completion and history Context-sensitive and documentation-based help UNIX-style pipes
CLI configuration mode:
105
Object-oriented hierarchy Jumping between levels Candidate configuration with sanity checking Automatic rollback capability Showing portions of configuration while configuring Saving, loading, and deleting configuration files Running operational-mode commands from within configuration
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
CLI MODES Operational mode: Monitor and troubleshoot the software, network connectivity, and
router hardware user@host>
The > character identifies operational mode
Configuration mode: Configure the router, including interfaces, general routing
information, routing protocols, user access, and system hardware properties
[edit] user@host# 106
The # character identifies configuration mode Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
LOGGING IN When logging in:
– Nonroot users are placed into the CLI automatically
host (ttyd0) login: user Password: --- JUNOS 8.3R2.8 built 2007-07-07 00:21:56 UTC user@host>
– The root user must start the CLI from the shell Do not forget to exit root shell after logging out of the CLI! host (ttyd0)
Shell Prompt
login: root Password: --- JUNOS 8.3R2.8 built 2007-07-07 00:21:56 UTC root@host% cli root@host> 107
Copyright © 2013 Juniper Networks, Inc.
CLI Prompt www.juniper.net
CLI OPERATIONAL MODE
Execute commands (mainly) from the default CLI level (user@host>) – Can execute from configuration mode with the run command – Hierarchy of commands – Example: show ospf neighbor
Less Specific clear configure file help monitor set show
etc.
bgp chassis configuration ospf rip route version etc.
database interface neighbor route statistics etc. 108
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
More Specific
EDITING COMMAND LINES
EMACS-style editing sequences are supported user@host> show interfaces
Keyboard sequence •
•
•
•
Ctrl+b user@host> show interfaces Ctrl+a user@host> show interfaces Ctrl+f user@host> show interfaces
Cursor position
Ctrl+e user@host> show interfaces
The default VT100 terminal type also supports cursor positioning with the arrow keys
109
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
COMMAND AND VARIABLE COMPLETION Spacebar completes a command user@host> show 'i' is ambiguous. Possible completions: igmp ike interfaces ipsec isis
i
Show Show Show Show Show
Enter a space to complete a command
Internet Group Management Protocol... Internet Key Exchange information interface information IP Security information Intermediate System-to-Intermediate...
user@host> show i
Use the Tab key to complete an assigned variable [edit policy-options] user@host# show policy-statement this-is-my-policy then accept; [edit policy-options] user@host#
110
Use Tab to complete assigned variables
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
CONTEXT-SENSITIVE HELP Type ? anywhere on the command line user@host> ? Possible completions: clear configure information file help . . . user@host> clear ? Possible completions: arp bfd Detection bgp information firewall . . . 111
Clear information in the system Manipulate software configuration Perform file operations Provide help information
Clear address resolution information Clear Bidirectional Forwarding information Clear Border Gateway Protocol Clear firewall counters
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
TOPICAL HELP The help topic command provides information on general concepts user@host> help topic interfaces ? Possible completions: accept-data Accept packets destined for virtual IP... accept-source-mac Policers for specific source MAC addresses access-profile Mapping peer name and secrets for CHAP accounting-profile Accounting profile acknowledge-timer Maximum time to wait for link... address Interface address and destination prefix ... user@host> help topic interfaces address Configuring the Interface Address
You assign an address to an interface by specifying the address when configuring the protocol family. For the inet family, you configure the interface's IP address. For the iso family, you configure one or more addresses for the loopback interface. For the ccc, tcc, mpls, tnp, and vpls families, you never configure an address. ...
112
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
CONFIGURATION SYNTAX HELP Use help reference for assistance with configuration syntax user@host> help reference interfaces address address Syntax address address { arp ip-address (mac | multicast-mac) mac-address ; broadcast address; destination address; destination-profile name; eui-64; multipoint-destination address dlci dlci-identifier; ... Hierarchy Level [edit interfaces interface-name unit logical-unit-number family family], [edit logical-routers logical-router-name interfaces interface-name unit logical-unit-number family family] Description
Configure the interface address. ... 113
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
USING | (PIPE) The pipe function allows you to filter and manipulate command output Available in all modes and contexts user@host> show route | ? Possible completions: count Count occurrences display Show additional kinds of information except Show only text that does not match a pattern find Search for first occurrence of pattern hold Hold text without exiting the --More-- prompt last Display end of output only match Show only text that matches a pattern no-more Don't paginate output request Make system-level requests resolve Resolve IP addresses save Save output text to file trim Trim specified number of columns from start of line user@host> show route |
114
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
ACTIVE AND CANDIDATE CONFIGURAITONS Batch configuration model: – Must commit configuration changes
Active configuration: – Current operational configuration – Boot-up configuration
Candidate configuration: – A working copy for configuration changes – Initialized with the active configuration – Becomes active configuration upon commit
115
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
CONFIGURE PRIVATE, CONFIGURE EXCLUSIVE Use configure private for your own copy of the candidate configuration mike@jnpr1> configure private warning: uncommitted changes will be discarded on exit Entering configuration mode
Use configure exclusive when you want to prohibit others from also making changes while you are in configuration mode
mike@jnpr1> configure exclusive warning: uncommitted changes will be discarded on exit Entering configuration mode 116
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
SHOW COMMAND List the complete candidate from the top of configuration mode [edit] mike@juniper1# show version "9.2R1.3"; groups { re0 { system { jnpr1-name jnpr1; } } } … 117
List a specific subset of the candidate configuration from a deeper level of the hierarchy
[edit interfaces ge-5/0/0] mike@jnpr# show gigether-options { flow-control; auto-negotiation; } unit 0 { family inet { address 1.2.3.4/28; } }
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
SET COMMAND From the top of configuration mode
[edit] mike@jnpr1# set system services finger mike@jnpr1# set system services ftp mike@jnpr1# set system services ssh mike@jnpr1# set system services telnet
From a sublevel
Either adds
[edit system services] mike@jnpr1# set finger mike@jnpr1# set ftp mike@jnpr1# set ssh mike@jnpr1# set telnet 118
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
[edit] system { services { finger; ftp; ssh; telnet; } }
DELETE COMMAND Remove a statement along with any subordinate statements Deleting a statement effectively returns the affected device, protocol,
or service to an unconfigured state Deleting a container statement removes everything under that level of the hierarchy
[edit] mike@jnpr1# delete system services
Now
119
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
[edit] system { }
COMPARE CONFIGURATIONS Display the differences between the candidate and active configuration Options to show any two configurations
[edit system services] mike@jnpr1# show | compare - ssh; + telnet; - web-management { http { port 8080; } -}
120
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
COMMIT CHECK Check that the device will accept your candidate Validates the logic and completeness of the candidate without
activating the changes [edit] mike@jnpr1# commit check [edit interfaces lo0 unit 0 family inet] 'address 192.168.69.1/24' Loopback addresses' prefix must be 32 bits error: configuration check-out failed
121
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
COMMIT Activates the candidate to become the running configuration of the device If the validation checks find any errors, you must fix these before the
candidate can become the active file [edit] Bullets •Add mike@jnpr1# commit error: Policy error: Policy my-policy referenced but not defined error: BGP: export list not applied The commit complete message tells you that error: configuration check-out failed
configuration is now active
[edit] mike@jnpr1# commit commit complete 122
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
the new
COMMIT CONFIRMED Automate rollback in remote devices Commit a candidate configuration for a limited time
[edit] mike@jnpr1# commit confirmed commit confirmed will be automatically rolled back in 10 unless complete minutes Finalize theconfirmed commit,commit by entering a 2nd commit
[edit] mike@jnpr1# commit Or, wait for rollback commit complete
123
command
to your previous configuration
Broadcast Message from root@jnpr1 (no tty) at 08:10:17 UTC Commit was not confirmed;Copyright automatic rollback complete. © 2013 Juniper Networks, Inc. www.juniper.net
ROLLBACK
Use rollback (or rollback 0 ) to reset the candidate configuration to the currently active configuration rollback 1 loads the previously active configuration rollback n loads the nth previous active configuration
rollback rescue loads the previously created rescue file
rollback only modifies the candidate configuration Don’t forget to commit the changes!
[edit] mike@host# rollback load complete [edit] mike@host# commit commit complete 124
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
SAVING A RESCUE CONFIGURATION
Use request system configuration rescue [save | delete] CLI command View with the show system configuration rescue CLI
command
125
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
CONFIGURATION STATEMENT HIERARCHY [edit] user@host# edit protocols ospf area 51 stub [edit protocols ospf area 0.0.0.51 stub] user@host# top
Less Specific chassis interfaces protocols services system etc.
bgp
isis
mpls
ospf
pim
rip
rsvp
vrrp
etc.
area area_id graceful-restart overload traffic-engineering etc.
area-range area_range 126
interface
nssa
stub
Copyright © 2013 Juniper Networks, Inc.
etc.
www.juniper.net
More Specific
CONFIGURATION FILE IS HIERARCHICAL CLI commands are entered without curly brackets [edit system] user@host# set services web-management http port 8080
The result is a hierarchical configuration file, complete with curly
brackets [edit system] user@host# show services web-management { http { port 8080; } } [edit system] user@host#
127
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
CONFIGURATION FILE DIFFERENCES Change the candidate configuration: [edit system] user@host# set services telnet [edit system] user@host# delete services web-management [edit system] user@host# delete services ssh
Display differences between the candidate and active configurations: user@host# show | compare [edit system services] - ssh; + telnet; - web-management { http { port 8080; } - }
128
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
RUN IS COOL Use the run command to execute operational-mode CLI commands from within configuration Can be a real time-saver when testing the effect of a recent change [edit interfaces fe-0/0/0] lab@HongKong# set unit 0 family inet address 10.250.0.141/16
[edit interfaces fe-0/0/0] lab@HongKong# commit commit complete [edit interfaces fe-0/0/0] lab@HongKong# run ping 10.250.0.149 count 1 PING 10.250.0.149 (10.250.0.149): 56 data bytes 64 bytes from 10.250.0.149: icmp_seq=0 ttl=255 time=0.967 ms --- 10.250.0.149 ping statistics --1 packets transmitted, 1 packets received, 0% packet loss round-trip min/avg/max/stddev = 0.967/0.967/0.967/0.000 ms
129
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
USING RENAME User-defined variables can be changed with the rename command Can change policy names, filter names, IP addresses, etc. [edit interfaces fe-0/0/0] lab@HongKong# set unit 0 family inet address 10.250.0.141/16 [edit interfaces fe-0/0/0] lab@HongKong# show unit 0 { family inet { address 10.250.0.141/16; } } [edit interfaces fe-0/0/0] lab@HongKong# rename unit 0 family inet address 10.250.0.141/16 to address 10.250.0.241/16 [edit interfaces fe-0/0/0] lab@HongKong# show unit 0 { family inet { address 10.250.0.241/16; }
} 130
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
USING REPLACE In configuration mode [edit] lab@HongKong# replace pattern 10.1.1.1 with 10.2.2.2
131
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
SRX QUICK START TRAINING Chapter X: Other Security Products of Interest
COMMITTED TO INNOVATION AND INVESTMENT Security is core to our business at Juniper Market Leader
#
1
High-End Firewalls
1
Remote Access SSL VPN
#
#
3
Network Security
133 Infonetics Research 2012
Global Powerhouse
$1B global revenue
Serving customers in over 47 countries, with a worldwide community of over 1000 Reseller Partners
Dedicated Innovator Juniper R&D is $1.027B, or 23% of revenues – a figure no one else in the industry comes close to on a percentage basis – 2011 Annual Report New in 2013: A differentiated approach to security with our Intrusion Deception and DDoS protection capabilities Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
OTHER SECURITY PRODUCTS OF INTEREST Virtualized Firewall Solution Junos V Firefly
Securing Web Portals Junos WebApp Secure
Securing Virtual Machines and ESX Hosts vGW Virtual Gateway
134
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
JUNOS V FIREFLY 135
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
INTRODUCING JUNOSV FIREFLY Virtualized Environment VM
VM
VM
Firefly
JunosV Firefly
Enterprise/Tenant A
Hypervisor
Physical SRX & Junos
Juniper is delivering its industry-leading Junos OS and SRX features as a software appliance for deployment in virtualized environments 136
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
JUNOSV FIREFLY VISION: ADVANCED PROTECTION IN VIRTUALIZED ENVIRONMENTS Security & Routing functionality delivered as a virtual machine
Junos Routing Protocols and SDK
Junos delivered as a virtual Junos Rich & Extensible Security Stack
appliance on a choice of Hypervisors Runs on standard x86 hardware
Full, proven Junos security and routing protocol suite
Perimeter
Content
Firewall
Anti-Virus
VPN
IPS Full IDP Feature Set
NAT
Web Filtering
Leverages proven SRX & VJX
technology
Network Admission Control
flowd over multiple vCPUs
Supports Hypervisor VM functionality
Anti-Spam
CLI, JWeb, SNMP, JSpace- SD, Hypervisor Mgmt, HA/FT
Example: vMotion, snapshots,
HA/FT, Cloning, Management etc.
137
Application Awareness
Identity Awareness
Performance optimized SMP kernel & multi-threaded
Application
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
JUNOSV FIREFLY MANAGEMENT JUNOSV FIREFLY DEVICE MANAGEMENT Centralized management
Junos Space /Security Design
JUNOS SPACE VIRTUAL DIRECTOR A Junos Space platform application that offers complete “Lifecycle” management for JunosV Firefly.
Security Insight STRM (logging and reporting), Syslog, Traceroute Local management CLI JWeb Junos Scripts SNMP
138
Firefly
Copyright © 2013 Juniper Networks, Inc.
Virtual Director
www.juniper.net
JUNOS WEBAPP SECURE 139
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
HACKER THREATS Scripts & Too, Exploits
IP Scan
Targeted Scan
Generic scripts and tools against one site.
Script run against multiple sites seeking a specific vulnerability.
Targets a specific site for any vulnerability.
Botnet
Human Hacker
Script loaded onto a bot network to carry out attack.
Sophisticated, targeted attack (APT). Low and slow to avoid detection.
Jan
140
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
June
Dec
WEB APP SECURITY TECHNOLOGY
Detection
Signatures
Web Application Firewall
Web Intrusion Prevention System
Q1 2012
Tar Traps
Tracking
IP address
Browser, software and scripts Profiling
IP address
Block IP
141
Section 6.6 Copyright © 2013 Juniper Networks, Inc.
Block, warn and deceive attacker PCI
Browser, software and scripts Responses
www.juniper.net
THE JUNOS WEBAPP SECURE ADVANTAGE DECEPTION-BASED SECURITY
Detect
Track
Profile
Respond
“Tar Traps” detect threats without false positives.
Track IPs, browsers, software and scripts.
Understand attacker’s capabilities and intents.
Adaptive responses, including block, warn and deceive.
142
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
THE ANATOMY OF A WEB ATTACK
Phase 1
Phase 2
Phase 3
Phase 4
Phase 5
Reconnaissance
Attack Vector Establishment
Implementation
Automation
Maintenance
Weeks or months
Weeks or months
Days or weeks
Months or years
Web App Firewall
143
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
Years
DETECTION BY DECEPTION
Tar Traps Query String Parameters
Network Perimeter Hidden Input Fields
Client
Firewall
App Server
Server Configuration
144
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
Database
TRACK ATTACKERS BEYOND THE IP Track IP Address
145
Track Browser Attacks
Track Software and Script Attacks
Persistent Token
Fingerprinting
Capacity to persist in all browsers including various privacy control features.
HTTP communications.
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
SMART PROFILE OF ATTACKER Every attacker assigned a name
Incident history
Attacker threat level
146
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
RESPOND AND DECEIVE
Junos WebApp Secure Responses
Human Hacker
Botnet
Targeted Scan
IP Scan
Scripts &Tools Exploits
Warn attacker
Block user
Force CAPTCHA
Slow connection
Simulate broken application
Force log-out
All responses are available for any type of threat. Highlighted responses are most appropriate for each type of threat.
147
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
UNIFIED PROTECTION ACROSS PLATFORMS
Internal App Server Database
Virtualized
Cloud
148
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
VGW VIRTUAL GATEWAY 149
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
MEGA TREND – SERVER VIRTUALIZATION Physical Server Installed Base (Millions) Logical Server Installed Base (Millions)
Millions Installed Servers
80
60 Capital Savings
40
20
0 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 Source: IDC 150
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
SECURITY IMPLICATION OF VIRTUALIZATION Physical Network
Virtual Network VM1
VM2
VM3
ESX/ESXi Host
Virtual Switch
HYPERVISOR
Firewall/IDS Sees/Protects All Traffic between Servers
151
Physical Security Is “Blind” to Traffic between Virtual Machines
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
APPROACHES TO SECURING VIRTUAL NETWORKS 1
VLANs & Physical Segmentation
VM1
VM2
VM3
VM1
VM2
3
VM2
VM3
Virtual Security Layer
VS HYPERVISOR
HYPERVISOR
HYPERVISOR
Regular Thick Agent for FW & AV
152
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
ESX/ESXi Host
VS
Integrated Virtual Security
VM1
VM3
ESX/ESXi Host
ESX/ESXi Host
VS
Traditional Security Agents
2
THE VGW ARCHITECTURE OVERVIEW Service Provider & Enterprise Grade Three Tiered Model
1
VMware Certified (signed binaries!)
Protects each VM and the hypervisor
Virtual Center
2
Security Design for vGW
VM
Fault-tolerant architecture (i.e., HA)
VM1
VM2
VM3
ESX or ESXi Host
Virtualization-aware Secure VMotion “Auto Secure” detects/protects
Partner Server (IDS, SIM, Syslog, Netflow)
3
Packet Data
VMWARE API’s
Granular, Tiered Defense
Any vSwitch (Standard, DVS, 3rd Party)
Stateful firewall, integrated IDS,
and AV Flexible Policy Enforcement – zone, VM group, VM, individual vNIC 153
Copyright © 2013 Juniper Networks, Inc.
HYPERVISOR
www.juniper.net
VMware Kernel
new VMs
THE vGW ENGINE
VGW MODULES
Main Dashboard view of the virtual system threats (including VM quarantine view)
7 Functional Modules Network – Visibility of inter-VM traffic flows Firewall – Firewall Policy Management and Logs IDS – Centralized view of IDS alerts and ability to drill-down on attacks AntiVirus – Full AV protection for virtual machines Introspection – Centralized view of the software loaded in a VM including OS, Apps,
HotFixes. Ability to track & control changes in loaded software via Image Enforcer Compliance – Out-of-box & custom rules engine to alert on VM & Host config changes Reports – Automated reports for all the functional modules
154
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
SRX SERIES INTEGRATION Firewall zones integration (zone synchronization between SRX Series and vGW)
Benefits:
Guarantee integrity of zones on hypervisor
Automate and verify no “policy violation” of VMs Empower SRX Series with VM awareness
155
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
RESOURCES TO HELP YOU LEARN MORE Resource
URL
Pathfinder
http://pathfinder.juniper.net
Content Explorer
http://www.juniper.net/techpubs/content-applications/contentexplorer
Feature Explorer
http://pathfinder.juniper.net/feature-explorer
Learning Bytes
www.juniper.net/learningbytes
Installation and configuration courses
www.juniper.net/courses
J-Net Forum
http://forums.juniper.net/t5/Training-Certification-and/bdp/ Training_and_Certification
Certification program
www.juniper.net/certification
Courses
http://www.juniper.net/training/technical_education
Translation tools
http://www.juniper.net/customers/support/#task
156
Copyright © 2013 Juniper Networks, Inc.
www.juniper.net
View more...
Comments