Page 2
Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785.
Page 3
REGARDING LICENSE TERMS. 1. The Parties. The parties to this Agreement are (i) Juniper Networks, Inc. (if the Customer’s principal office is located in the Americas) or Juniper Networks (Cayman) Limited (if the Customer’s principal office is located outside the Americas) (such applicable entity being referred to herein as “Juniper”), and (ii) the person or organization that originally purchased from Juniper or an authorized Juniper reseller the applicable...
Page 5
(including Juniper modifications, as appropriate) available upon request for a period of up to three years from the date of distribution. Such request can be made in writing to Juniper Networks, Inc., 1194 N. Mathilda Ave., Sunnyvale, CA http://www.gnu.org/licenses/gpl.html...
Requesting Technical Support on page xxii Objectives The Network and Security Manager (NSM) is a software application that centralizes control and management of your Juniper Networks devices. With NSM, Juniper Networks delivers integrated, policy-based security and network management for all security devices.
7 days a week, 365 days a year. Self-Help Online Tools and Resources For quick and easy problem resolution, Juniper Networks has designed an online self-service portal called the Customer Support Center (CSC) that provides you with the following features: Find CSC offerings: http://www.juniper.net/customers/support/...
Page 23
About This Guide Search technical bulletins for relevant hardware and software notifications: https://www.juniper.net/alerts/ Join and participate in the Juniper Networks Community Forum: http://www.juniper.net/company/communities/ Open a case online in the CSC Case Manager: http://www.juniper.net/cm/ To verify service entitlement by product serial number, use our Serial Number Entitlement (SNE) Tool located at https://tools.juniper.net/SerialNumberEntitlementSearch/...
Management Features Juniper Network and Security Manager (NSM) provides IT departments with an easy-to-use solution that controls all aspects of the Juniper Networks firewall, VPN, and IDP devices including device configuration, network settings, and security policy. NSM enables IT departments to control the entire device lifecycle with a single, centralized solution.
Migration Tools If you have existing security devices deployed on your network or are using a previous Juniper Networks management system, you can use the NSM migration tools to quickly import your existing security devices and their configurations, address books, service objects, policies, VPNs, and administrator privileges.
CHAPTER 2 Device Configuration Security devices are the Juniper Networks security components that you use to enable access to your network components and to protect your network against malicious traffic. When you use NSM to manage your security devices, you are creating a virtual network that represents your physical network.
Network Settings The Device Manager module in Network and Security Manager (NSM) enables you to configure the managed Juniper Networks security devices in your network. You can edit configurations after you add or import a managed device, or create configurations when you model a device.
Chapter 4: Advanced Network Settings Configuring NSGP Overview NetScreen Gatekeeper Protocol (NSGP) is a Juniper Networks proprietary peer-to-peer protocol that enables a security device to act as a server for voice-over-IP (VoIP) traffic: NetScreen-500 security devices running ScreenOS 5.0 GPRS can be both the NSGP server and client.
Use this option when storing accounts on a SecurID or LDAP server, or when using a RADIUS server that does not contain the Juniper Networks dictionary file. By default, the external device administrator privilege level is set to Read-Only.
Web UI, Telnet, or SSH connections for the root device administrator. This setting overrides the management options enabled on the ingress interface. NOTE: This option does not appear for the Juniper Networks NSMXpress, which does not contain a console port.
Protocol (SSLRP), which provides basic security services to higher level protocols such as HTTP. Using certificates, SSL authenticates the server (the security device), and then encrypts the traffic sent during the session. Juniper Networks supports authentication only of the server (the security device), not the client (the device administrator); the device authenticates itself to the device administrator, but the device administrator does not use SSL to authenticate to the device.
Setting ScreenOS Authentication Options Using Banners Overview on page 166 Setting ScreenOS Authentication Options Using Infranet Settings Overview If you have deployed Juniper Networks Infranet Controllers as part of your network security infrastructure, you can use the Infranet Settings screen on devices running ScreenOS 5.3 and later to configure the properties as described in Table 37 on page 167.
General Report Settings for ScreenOS Devices Overview on page 168 Configuring SNMPv3 in ScreenOS Devices (NSM Procedure) The Simple Network Management Protocol (SNMP) agent for a Juniper Networks security device provides network administrators with a way to view statistical data about the network and the devices on it and to receive notification of system events of interest.
Some malicious viruses erase files or lock up systems, while other viruses merely infect files and can overwhelm the target host or network with bogus data. Juniper Networks supports internal and external antivirus (AV) scanning on select security devices. Use the antivirus (AV) option to configure AV scanning. Security devices may provide one or more of the following antivirus scanning methods: External AV scanning—Uses an external Trend Micro device for scanning.
NOTE: Deep inspection is only available on standalone devices. It cannot be used to disable attacks when the device is in a cluster. The Juniper Networks Security team provides multiple DI signature packs for different security needs. Packs are covered by license keys. You must get a license key to enable a signature pack.
Database option to configure a database that contains all the predefined attack objects, organized into attack object groups by protocol and severity level. Juniper Networks stores the attack object database on the attack object update server at https://services.netscreen.com/restricted/sigupdates. To gain access to the attack object update server, you must first obtain an attack object update subscription for your security device.
If it does not match a local list, it then attempts to match the e-mail against the list on the Juniper Networks server. Table 44 on page 187 lists the match criteria for the local whitelist, local blacklist, Juniper Networks blacklist, and corresponding actions.
System-Level and Device-Level VPN Using NSM Overview With Network and Security Manager (NSM), you can use basic networking principles and your Juniper Networks security devices to create VPNs that connect your headquarters with your branch offices and your remote users with your protected networks.
(cannot exceed the maximum number of allowed Phase 1 SAs or the maximum number of VPN tunnels allowed on the Juniper Networks security device platform). For details on group IKE IDs, see the ScreenOS 5.x Concepts and Examples Guide.
To create a static route, you must manually create a route for each tunnel on each device. For VPNs with more than just a few devices, Juniper Networks highly recommends using a dynamic routing protocol to automatically determine the best route for VPN traffic.
Page 249
IKE IDs work, see, Configuring Group IKE IDS section in“Policy-Based VPN Creation Using Remote Access Server Users Overview” on page 213. For details on determining the ASN1-DN container and wildcard values for group IKE IDs, see the Juniper Networks ScreenOS 5.x Concepts and Examples Guide.
For more information about vsys, refer to the Concepts & Examples ScreenOS Reference Guide: Virtual Systems. For more information about how to configure transparent vsys, refer to the Juniper Networks New Features Guide for ScreenOS 5.0-L2V software. Related Virtual Router Configurations for Root and Vsys Overview on page 251...
Such sessions might include conferencing, telephony, or multimedia, with features such as instant messaging and application-level mobility in network environments. Juniper Networks security devices support SIP as a service and can screen SIP traffic, allowing and denying it based on a policy that you configure. SIP is a predefined service in ScreenOS and uses port 5060 as the destination port.
Page 309
Global Failure (600 to 699)—Request cannot be fulfilled at any server. Table 71 on page 285 provides a complete list of current SIP responses, all of which are supported on Juniper Networks security devices. Table 71: SIP Responses Response Code-Reason...
The SIP ALG monitors SIP transactions and dynamically creates and manages pinholes based on the information it extracts from these transactions. The Juniper Networks SIP ALG supports all SIP methods and responses (see “SIP Request Methods Supported in ScreenOS Devices” on page 282 and “Types of SIP Response Classes Supported in ScreenOS Devices”...
NOTE: Juniper Networks security devices do not support encrypted SDP. If a security device receives a SIP message in which SDP is encrypted, the SIP ALG permits it through the firewall but generates a log message informing the user that it cannot process the packet.
CHAPTER 11 Virtual Systems You can logically partition a single Juniper Networks security system into multiple virtual systems to provide multi-tenant services. Each virtual system (vsys) is a unique security domain and can have its own administrators (called virtual system administrators or vsys admins) who can individualize their security domain by setting their own address books, user lists, custom services, VPNs, and policies.
High availability (HA) provides a way to minimize the potential for device failure within a network. Because all of your network traffic passes through a Juniper Networks security device, you need to remove as many points of failure as possible from your network by ensuring that the device has a backup in case it fails.
CHAPTER 14 WAN, ADSL, Dial, and Wireless Juniper Networks wireless devices and systems provide wireless local area network (WLAN) connections with integrated IP Security virtual private network (IPsec VPN) and firewall services for wireless clients, such as telecommuters, branch offices, or retail outlets.
Page 418
(RADIUS dynamically creates and distributes a different key per session for each wireless client). An encryption key length specifies the length of the key in bits. Juniper Networks supports two WEP key lengths: 40 and 104 bits. Because the keys are concatenated with a 24-bit initialization vector (IV), the resulting lengths are 64 and 128 bits.
Implementing Internet Protocol Security (IPsec) for connections between roaming partners, setting traffic rate limits, and using stateful inspection can eliminate a majority of the GTP’s security risks. Juniper Networks security devices mitigate a wide variety of attacks on the Gp, Gn, and Gi interfaces.
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 and is the answer not in the manual?
Questions and answers