Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United
States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other
trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.
Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are
owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312,
6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785.
Network and Security Manager Configuring ScreenOS Devices Guide
The information in this document is current as of the date listed in the revision history.
YEAR 2000 NOTICE
Juniper Networks hardware and software products are Year 2000 compliant. The Junos OS has no known time-related limitations through
the year 2038. However, the NTP application is known to have some difficulty in the year 2036.
READ THIS END USER LICENSE AGREEMENT (“AGREEMENT”) BEFORE DOWNLOADING, INSTALLING, OR USING THE SOFTWARE.
BY DOWNLOADING, INSTALLING, OR USING THE SOFTWARE OR OTHERWISE EXPRESSING YOUR AGREEMENT TO THE TERMS
CONTAINED HEREIN, YOU (AS CUSTOMER OR IF YOU ARE NOT THE CUSTOMER, AS A REPRESENTATIVE/AGENT AUTHORIZED TO
BIND THE CUSTOMER)CONSENT TO BE BOUNDBY THIS AGREEMENT.IF YOUDO NOTOR CANNOT AGREE TO THE TERMS CONTAINED
HEREIN, THEN (A) DO NOT DOWNLOAD, INSTALL, OR USE THE SOFTWARE, AND (B) YOU MAY CONTACT JUNIPER NETWORKS
REGARDING LICENSE TERMS.
1. The Parties. The parties to this Agreement are (i) Juniper Networks, Inc. (if the Customer’s principal office is located in the Americas) or
Juniper Networks (Cayman) Limited (ifthe Customer’sprincipal officeis located outsidethe Americas) (such applicable entitybeing referred
to herein as“Juniper”),and (ii) the person or organization thatoriginally purchased from Juniperor an authorized Juniperreseller the applicable
license(s) for use of the Software (“Customer”) (collectively, the “Parties”).
2. The Software. In this Agreement, “Software” means the program modules and features of the Juniper or Juniper-supplied software, for
which Customer has paid the applicable license or support fees to Juniper or an authorized Juniper reseller, or which was embedded by
Juniper in equipment which Customer purchased from Juniper or an authorized Juniper reseller. “Software” also includes updates, upgrades
and new releases of such software. “Embedded Software” means Software which Juniper has embedded in or loaded onto the Juniper
equipment and any updates, upgrades, additions or replacements which are subsequently embedded in or loaded onto the equipment.
3. License Grant. Subject to payment of the applicable fees and thelimitations andrestrictions setforth herein,Juniper grantsto Customer
a non-exclusive and non-transferable license, without right to sublicense, to use the Software, in executable form only, subject to the
following use restrictions:
a. Customer shall use Embedded Software solely as embedded in, and for execution on, Juniper equipment originally purchased by
Customer from Juniper or an authorized Juniper reseller.
b. Customer shall use the Software on a single hardware chassis having a single processing unit, or as many chassis or processing units
for which Customer has paid the applicable license fees; provided, however, with respect to the Steel-Belted Radius or Odyssey Access
Client software only, Customer shall use such Software on a single computer containing a single physical random access memory space
and containing any number of processors. Use of the Steel-Belted Radius or IMS AAA software on multiple computers or virtual machines
(e.g., Solaris zones) requires multiple licenses, regardless of whether such computers or virtualizations are physically contained on a single
chassis.
c. Product purchase documents, paper or electronic user documentation, and/or the particular licenses purchased by Customer may
specify limitsto Customer’s useof the Software. Suchlimits may restrictuse to amaximum numberof seats, registered endpoints, concurrent
users, sessions, calls, connections, subscribers, clusters, nodes, realms, devices, links, ports or transactions, or require the purchase of
separate licenses to use particular features, functionalities, services, applications, operations, or capabilities, or provide throughput,
performance, configuration, bandwidth, interface, processing, temporal, or geographical limits. In addition, such limits may restrict the use
of the Software to managing certain kinds of networks or require the Software to be used only in conjunction with other specific Software.
Customer’s use of the Software shall be subject to all such limitations and purchase of all applicable licenses.
d. For any trial copy of the Software, Customer’s right to use the Software expires 30 days after download, installation or use of the
Software. Customer may operate the Software after the 30-day trial period only if Customer pays for a license to do so. Customer may not
extend or create an additional trial period by re-installing the Software after the 30-day trial period.
e. The Global Enterprise Edition of the Steel-Belted Radius software may be used by Customer only to manage access to Customer’s
enterprise network. Specifically, service provider customers are expressly prohibited from using the Global Enterprise Edition of the
Steel-Belted Radius software to support any commercial network access services.
The foregoing license is not transferable or assignable by Customer. No license is granted herein to any user who did not originally purchase
the applicable license(s) for the Software from Juniper or an authorized Juniper reseller.
4. Use Prohibitions. Notwithstanding the foregoing, the license provided herein does not permit the Customer to, and Customer agrees
not to and shall not: (a) modify, unbundle, reverse engineer, or create derivative works based on the Software; (b) make unauthorized
copies of the Software (except as necessary for backup purposes); (c) rent, sell, transfer, or grant any rights in and to any copy of the
Software,in any form, toany thirdparty; (d)remove any proprietarynotices, labels,or marks on orin any copy of the Softwareor any product
in which the Software is embedded; (e) distribute any copy of the Software to any third party, including as may be embedded in Juniper
equipment sold inthe secondhand market; (f)use any ‘locked’ orkey-restricted feature,function, service, application, operation, orcapability
without first purchasing the applicable license(s) and obtaining a valid key from Juniper, even if such feature, function, service, application,
operation, or capability is enabled without a key; (g) distribute any key for the Software provided by Juniper to any third party; (h) use the
Software in any manner that extends or is broader than the uses purchased by Customer from Juniper or an authorized Juniper reseller; (i)
use Embedded Software on non-Juniper equipment; (j) use Embedded Software (or make it available for use) on Juniper equipment that
the Customer did not originally purchase from Juniper or an authorized Juniper reseller; (k) disclose the results of testing or benchmarking
of the Software to any third party without the prior written consent of Juniper; or (l) use the Software in any manner other than as expressly
provided herein.
5. Audit. Customer shall maintain accurate records as necessary to verify compliance with this Agreement. Upon request by Juniper,
Customer shall furnish such records to Juniper and certify its compliance with this Agreement.
6. Confidentiality. The Parties agree that aspects of the Software and associated documentation are the confidential property of Juniper.
As such, Customer shall exercise all reasonable commercial efforts to maintain the Software and associated documentation in confidence,
which at a minimum includes restricting access to the Software to Customer employees and contractors having a need to use the Software
for Customer’s internal business purposes.
7. Ownership. Juniper and Juniper’s licensors, respectively, retain ownership of all right, title, and interest (including copyright) in and to
the Software, associated documentation, and all copies of the Software. Nothing in this Agreement constitutes a transfer or conveyance
of any right, title, or interest in the Software or associated documentation, or a sale of the Software, associated documentation, or copies
of the Software.
8. Warranty, Limitation of Liability, Disclaimer of Warranty. The warranty applicable to the Software shall be as set forth in the warranty
statementthat accompaniesthe Software (the“Warranty Statement”).Nothing inthis Agreement shallgive riseto any obligation to support
the Software. Support services may be purchased separately. Any such support shall be governed by a separate, written support services
agreement. TO THE MAXIMUM EXTENT PERMITTED BY LAW, JUNIPER SHALL NOT BE LIABLE FOR ANY LOST PROFITS, LOSS OF DATA,
OR COSTSOR PROCUREMENTOF SUBSTITUTEGOODS ORSERVICES,OR FOR ANY SPECIAL,INDIRECT,OR CONSEQUENTIALDAMAGES
ARISING OUTOF THIS AGREEMENT,THE SOFTWARE,OR ANY JUNIPEROR JUNIPER-SUPPLIEDSOFTWARE. INNO EVENT SHALLJUNIPER
BE LIABLE FOR DAMAGES ARISING FROM UNAUTHORIZED OR IMPROPER USE OF ANY JUNIPER OR JUNIPER-SUPPLIED SOFTWARE.
EXCEPT AS EXPRESSLY PROVIDED IN THE WARRANTY STATEMENT TO THE EXTENT PERMITTED BY LAW, JUNIPER DISCLAIMS ANY
AND ALL WARRANTIES IN AND TO THE SOFTWARE (WHETHER EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE), INCLUDING ANY
IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT DOES
JUNIPER WARRANT THAT THE SOFTWARE, OR ANY EQUIPMENT OR NETWORK RUNNING THE SOFTWARE, WILL OPERATE WITHOUT
ERROR OR INTERRUPTION, OR WILL BE FREE OF VULNERABILITY TO INTRUSION OR ATTACK. In no event shall Juniper’s or its suppliers’
or licensors’ liability to Customer, whether in contract, tort (including negligence), breach of warranty, or otherwise, exceed the price paid
by Customer for the Software that gave rise to the claim, or if the Software is embedded in another Juniper product, the price paid by
Customer for such other product. Customer acknowledges and agrees that Juniper has set its prices and entered into this Agreement in
reliance upon the disclaimers of warranty and the limitations of liability set forth herein, that the same reflect an allocation of risk between
the Parties (including the risk that a contract remedy may fail of its essential purpose and cause consequential loss), and that the same
form an essential basis of the bargain between the Parties.
9. Termination. Any breach of this Agreement or failure by Customer to pay any applicable fees due shall result in automatic termination
of the license granted herein. Upon such termination, Customer shall destroy or return to Juniper all copies of the Software and related
documentation in Customer’s possession or control.
10. Taxes. All license fees payable under this agreement are exclusive of tax. Customer shall be responsible for paying Taxes arising from
the purchase of the license, or importation or use of the Software. If applicable, valid exemption documentation for each taxing jurisdiction
shall be provided to Juniper prior to invoicing, and Customer shall promptly notify Juniper if their exemption is revoked or modified. All
payments made by Customer shall be net of any applicable withholding tax. Customer will provide reasonable assistance to Juniper in
connection with such withholding taxes by promptly: providing Juniper with valid tax receipts and other required documentation showing
Customer’s payment of any withholding taxes; completing appropriate applications that would reduce the amount of withholding tax to
be paid; and notifying and assisting Juniper in any audit or tax proceeding related to transactions hereunder. Customer shall comply with
all applicable tax laws and regulations, and Customer will promptly pay or reimburse Juniper for all costs and damages related to any
liability incurred by Juniper as a result of Customer’s non-compliance or delay with its responsibilities herein. Customer’s obligations under
this Section shall survive termination or expiration of this Agreement.
11. Export. Customer agrees to comply with all applicable export laws and restrictions and regulations of any United States and any
applicable foreign agency or authority, and not to export or re-export the Software or any direct product thereof in violation of any such
restrictions, laws or regulations, or without all necessary approvals. Customer shall be liable for any such violations. The version of the
Software supplied to Customer may contain encryption or other capabilities restricting Customer’s ability to export the Software without
an export license.
12. Commercial Computer Software. The Software is “commercial computer software” and is provided with restricted rights. Use,
duplication, or disclosure by the United States government is subject to restrictions set forth in this Agreement and as provided in DFARS
227.7201 through 227.7202-4, FAR 12.212, FAR 27.405(b)(2), FAR 52.227-19, or FAR 52.227-14(ALT III) as applicable.
13. Interface Information. To the extent required by applicable law, and at Customer's written request, Juniper shall provide Customer
with the interface information needed to achieve interoperability between the Software and another independently created program, on
payment of applicable fee, if any. Customer shall observe strict obligations of confidentiality with respect to such information and shall use
such information in compliance with any applicable terms and conditions upon which Juniper makes such information available.
14. Third Party Software. Any licensor of Juniper whose software is embeddedin the Software and anysupplier of Juniper whoseproducts
or technology are embedded in (or services are accessed by) the Software shall be a third party beneficiary with respect to this Agreement,
and such licensor or vendor shall have the right to enforce this Agreement in itsown name asif it were Juniper. In addition, certain third party
software may be provided with the Software and is subject to the accompanying license(s), if any, of its respective owner(s). To the extent
portions of the Software are distributed under and subject to open source licenses obligating Juniper to make the source code for such
portions publicly available (such as the GNU General Public License (“GPL”) or the GNU Library General Public License (“LGPL”)), Juniper
will make such source code portions (including Juniper modifications, as appropriate) available upon request for a period of up to three
years from the date of distribution. Such request can be made in writing to Juniper Networks, Inc., 1194 N. Mathilda Ave., Sunnyvale, CA
94089, ATTN: General Counsel. You may obtain a copy of the GPL at http://www.gnu.org/licenses/gpl.html, and a copy of the LGPL
at http://www.gnu.org/licenses/lgpl.html .
15. Miscellaneous. This Agreement shall be governed by the laws of the State of California without reference to its conflicts of laws
principles. The provisions of the U.N. Convention for the International Sale of Goods shall not apply to this Agreement. For any disputes
arising under this Agreement, the Parties hereby consent to the personal and exclusive jurisdiction of, and venue in, the state and federal
courts within Santa Clara County, California. This Agreement constitutes the entire and sole agreement between Juniper and the Customer
with respect to the Software, and supersedes all prior and contemporaneous agreements relating to the Software, whether oral or written
(including any inconsistent terms contained in a purchase order), except that the terms of a separate written agreement executed by an
authorized Juniper representative and Customer shall govern to the extent such terms are inconsistent or conflict with terms contained
herein. No modification to this Agreement nor any waiver of any rights hereunder shall be effective unless expressly assented to in writing
by the party to be charged. If any portion of this Agreement is held invalid, the Parties agree that such invalidity shall not affect the validity
of the remainder of this Agreement. This Agreement and associated documentation has been written in the English language, and the
Parties agree that the English version will govern. (For Canada: Les parties aux présentés confirment leur volonté que cette convention de
même que tous les documents y compris tout avis qui s'y rattaché, soient redigés en langue anglaise. (Translation: The parties confirm that
this Agreement and all related documentation is and will be in the English language)).
Backup Connection Using the Untrusted Ethernet Port in ScreenOS Devices . . . 92
Example: Configuring NetScreen5GT Devices to Permit Internal Hosts (NSM
The Network and Security Manager (NSM) is a software application that centralizes
control andmanagement of your Juniper Networks devices. With NSM, Juniper Networks
delivers integrated, policy-based security and network management for all security
devices.
NSM uses the technology developed for Juniper Networks ScreenOS to enable and
simplify management support forprevious and future versions of ScreenOS. By integrating
management of all JuniperNetworks security devices, NSMenhances theoverall security
of the Internet gateway.
This guide explainshow toconfigure NSM ScreenOSdevices. For detailedNSM IDP device
configuration, see the Configuring Intrusion Detection and Prevention Devices Guide. Use
this guide in conjunction with the Network and Security Manager Administration Guide,
Network and Security Manager Installation Guide, and Network and Security Manager
Online Help.
Audience
This guide is intended for system administrators responsible for the securityinfrastructure
of their organization. Specifically, this book discusses concepts of interest to firewall and
VPN administrators, network/security operations center administrators; and system
administrators responsible for user permissions on the network.
Conventions
The sample screens used throughout this guide are representations of the screens that
appear when you install and configure the NSM software. The actual screens may differ.
All examples show default file paths. If you do not accept the installation defaults, your
paths will vary from the examples.
terminal lengthRepresent keywordsWords in plain text
mask, accessListNameRepresent variablesWords in italics
Words separated by the pipe ( | )
symbol
Words enclosed in brackets followed
by and asterisk ( [ ]*)
Documentation
Table 4 on page xxi describes documentation for the NSM.
Table 4: Network and Security Manager Publications
Network and Security
Manager Installation Guide
variable to the left or right of this symbol. The
keywordor variable canbe optional or required.
can be entered more than once.
Represent required keywords or variables.Words enclosed in braces ( { } )
DescriptionBook
Details the stepsto installthe NSMmanagement system on asingle
server or on separate servers. It also includes information on how
to install and run the NSM user interface. This guide is intended for
IT administrators responsible for the installation and/or upgrade
to NSM.
diagnostic | lineRepresent a choice to select one keyword or
[ internal | external ]Represent optional keywords or variables.Words enclosed in brackets ( [ ] )
[ level1 | level2 | 11 ]*Represent optional keywords or variables that
Network and Security
Manager ScreenOS and IDP
Devices Guide
describes how to use and configure key management features in
the NSM. Itprovides conceptual information, suggested workflows,
and examples where applicable. This guide is best used in
conjunction with the Network and Security Manager Online Help,
which provides step-by-step instructions for performing
management tasks in the NSM UI.
This guide is intended for application administrators or those
individuals responsible for owning the server and security
infrastructure and configuring the product for multi-user systems.
It is also intended for device configuration administrators, firewall
and VPN administrators, and network security operation center
administrators.
Describes NSM features that relate to device configuration and
management. It also explains how to configure basic andadvanced
NSM functionality, including deploying new device configurations,
managing Security Policies and VPNs, and general device
administration.
Table 4: Network and Security Manager Publications (continued)
DescriptionBook
Network and Security
Manager Online Help
Network and Security
Manager API Guide
Network and Security
Manager Release Notes
Requesting Technical Support
Technical productsupport is availablethrough theJuniper Networks Technical Assistance
Center (JTAC). If you are a customer with an active J-Care or JNASC support contract,
or are covered under warranty, and need postsales technical support, you can access
our tools and resources online or open a case with JTAC.
•
JTAC policies—For a complete understanding of our JTAC procedures and policies,
review the JTAC User Guide located at
Provides task-oriented procedures describing how to perform basic
tasks in the NSM user interface. It also includes a brief overview of
the NSM system and a description of the GUI elements.
Provides complete syntax and description of the SOAP messaging
interface to the Network and Security Manager.
Provides the latest information about features, changes, known
problems, resolved problems, and system maximum values. If the
information in the Release Notesdiffers from the information found
in the documentation set, follow the Release Notes.
Release notes are included on the corresponding software CD and
are available onthe Juniper Networks Website. The documentation
is also available on the Internet. You can order a set of printed
documents from your Juniper Networks sales representative.
JTAC Hours of Operation —The JTAC centers have resources available 24 hours a day,
7 days a week, 365 days a year.
Self-Help Online Tools and Resources
For quick and easy problem resolution, Juniper Networks has designed an online
self-service portal called the Customer Support Center (CSC) that provides you with the
following features:
Search technical bulletins for relevant hardware and software notifications:
https://www.juniper.net/alerts/
•
Join and participate in the Juniper Networks Community Forum:
http://www.juniper.net/company/communities/
•
Open a case online in the CSC Case Manager: http://www.juniper.net/cm/
To verifyservice entitlement byproduct serial number,use our Serial Number Entitlement
(SNE) Tool located at https://tools.juniper.net/SerialNumberEntitlementSearch/.
Opening a Case with JTAC
You can open a case with JTAC on the Web or by telephone.
•
Use the Case Manager tool in the CSC at http://www.juniper.net/cm/ .
•
Call 1-888-314-JTAC (1-888-314-5822 toll-free in the USA, Canada, and Mexico).
For international or direct-dial options in countries without toll-free numbers, visit us at
NSM User Interface and NSM Key
Management Features
Juniper Network and Security Manager (NSM) provides IT departments with an
easy-to-use solution that controls all aspects of the Juniper Networks firewall, VPN, and
IDP devices including device configuration, network settings, and security policy. NSM
enables IT departments to control the entire device lifecycle with a single, centralized
solution. Using NSM, you can configure all your Juniper Networks security devices from
one location, at one time.
For details on ScreenOS functionality, see the Concepts & Examples ScreenOS ReferenceGuide.
This chapter contains the following topics:
•
NSM Overview on page 4
•
Security Integration Management Using NSM Overview on page 4
•
Managing Devices in a Virtual Environment Using NSM on page 6
•
Error Prevention, Recovery, and Audit Management Using NSM on page 8
•
AdministeringScreenOS Devices UsingNSM Complete System Managementon page 10
•
NSM User Interface Overview on page 12
•
Understanding NSM User Interface Menus and Toolbars on page 12
•
Working with Multiple NSM Administrators Overview on page 13
•
NSM Modules Overview on page 13
•
Investigate Task Modules in the NSM User Interface Overview on page 14
•
Configure Task Modules in the NSM User Interface Overview on page 16
•
Administer Task Modules in the NSM User Interface Overview on page 20
•
Understanding Validation Icons and Validation Data in the NSM User
Interface on page 21
•
Understanding the Search Function in the NSM User Interface on page 22
At its foundation, a management system integrates your individual security devices into
a single, effective security system that you control from a central location. With NSM,
you can manage your network at the system level, using policy-based central
management, as well as at the device level, managing all device parameters for devices.
NSM is designed to work with networks of all sizes and complexity. You can add a single
device, or create device templates to help you deploy multiple devices; you can create
new policies, or edit existing policies forsecurity devices. The managementsystem tracks
and logs each administrative change in real-time, providing you with a complete
administrative record and helping you perform fault management.
NSM also simplifies control of your network with an intuitive UI. Making all changes to
your devices from a single, easy-to-use interface can reduce deployment costs, simplify
network complexity, speed configuration, and minimize troubleshooting time.
Related
Documentation
NSM User Interface Overview on page 12•
• NSM Modules Overview on page 13
• Understanding NSM User Interface Menus and Toolbars on page 12
Security Integration Management Using NSM Overview
True security integration occurs when you can control every security device on your
network and see every security event in real-time from one location. In NSM, this location
is the NSM GUI, a graphical user interface that contains a virtual representation of every
security device on your network. The idea behind this virtual-physical abstraction is that
you can access your entire network from one location—use this console to view your
network, the devices runningon it, the policies controlling access to it, and the traffic that
is flowing through it.
The following topics are the security integration management features of NSM:
•
Complete Support on page 4
•
Network Organization on page 5
•
Role-Based Administration on page 5
•
Centralized Device Configuration on page 5
•
Migration Tools on page 6
Complete Support
You can create and manage device configurations for security devices or systems. NSM
provides support for ScreenOS configuration commands, so you can retain complete
control over your devices when using system-level management features like VPNs.
With NSM, you can use domains to segment your network functionally or geographically
to define specific network areas that multiple administrators can manage easily.
A domain logically groups devices, their policies, and their access privileges. Use a single
domain for small networks with a few security administrators, or use multiple domains
for enterprise networks to separate large, geographically distant or functionally distinct
systems, control administrative access to individual systems, or obfuscate systems for
service provider deployments.
With multiple domains, you can create objects, policies, and templates in the global
domain, and then create subdomains that automatically inherit these definitions from
the global domain.
Role-Based Administration
Control access to management with NSM—define strategicroles for your administrators,
delegate management tasks, and enhance existing permission structures with new
task-based functionality.
Chapter 1: NSM User Interface and NSM Key Management Features
Use NSM to create a security environment that reflects your current offline administrator
roles and responsibilities. Because management is centralized, it’s easy to configure
multiple administrators for multiple domains. By specifying the exact tasks your NSM
administrators can perform within a domain, you minimize the probability of errors and
security violations, and enable a clear audit trail for every management event.
Initially, when you log in to NSM as the super administrator, you have full access to all
functionality within the global domain.From theglobal domain,you canadd thefollowing
NSM administrators, configure their roles, and specify the subdomains to which they
have access:
•
Activities and Roles—An activity is a predefined task performed in the NSM system,
and a role is a collection of activities that defines an administrative function. Use
activities to create custom roles for your NSM administrators.
•
Administrators—An administrator is a user of NSM or IDP; each administrator has a
specific level of permissions. Create multiple administrators with specific roles to
control access to the devices in each domain.
•
Default Roles—Use the predefined roles System Administrator, Read-Only System
Administrator, Domain Administrator, Read-Only Domain Administrator, IDP
Administrator, or Read-Only IDP Administrator to quickly create permissions for your
administrators.
Centralized Device Configuration
No network is too large—because you manage your security devices from one location,
you can use the following system management mechanisms to help you quickly and
efficiently create or modify multiple device configurations at one time:
Templates—A template is a predefined device configuration that helps you reuse
specific information. Create a device template that defines specific configuration
values, and then apply that template to devices to quickly configure multiple devices
at one time. For more flexibility, you can combine and apply multiple device templates
to a single device configuration(63 maximum).In addition,you canmake global-domain
templates available for reference in subdomains.
Shared Objects—An object is an NSM definition that is valid in the global domain and
all subdomains. Any object created in the global domain is a shared object that is
shared by all subdomains; the subdomain automatically inherits any shared objects
defined in the global domain. You will not see global objects in the Object Manager of
a subdomain. Although, you can use the objects when selecting objects in a policy.
The global domain is a good location for security devices and systems that are used
throughout your organization, address book entries for commonly used network
components, or other frequently used objects.A subdomain, alternatively, enables you
to separate firewalls, systems, and address objects from the global domain and other
subdomains, creating a private area to which you can restrict access.
Grouping—A group is a collection of similar devices or objects. Use device groups and
object groups to update multiple devices simultaneously, simplify rule creation and
deployment, and enablegroup-specific reporting.You can even link groupsusing Group
Expressions to create a custom group.
Migration Tools
If you have existing security devices deployed on your network or are using a previous
Juniper Networks management system, you can use the NSM migration tools to quickly
import your existing security devices and their configurations, address books, service
objects, policies, VPNs, andadministrator privileges. As NSM importsyour existingdevice
configurations, it automatically creates your virtual network based on the configuration
information.
You can import device configurations directly from your security device, or from your
Juniper Networks Global PRO or Global PRO Express system. Import all your security
devices at one time, or, if your network is large, import one domain at a time. When
importing from Global PRO or Global PRO Express, NSM automatically transfers your
existing domain structure.
For details on migrating from a previous management system, see the NSM MigrationGuide.
Related
Documentation
AdministeringScreenOS Devices UsingNSM Complete System Managementon page 10•
• Managing Devices in a Virtual Environment Using NSM on page 6
• Error Prevention, Recovery, and Audit Management Using NSM on page 8
Managing Devices in a Virtual Environment Using NSM
A production network is a living entity, constantly evolving to adapt to the needs of your
organization. As your network grows, you might need to add new devices, reconfigure
Chapter 1: NSM User Interface and NSM Key Management Features
existing devices, update software versions on older devices, or integrate a new network
to work with your existing network. NSM helps you take control of your network by
providing a virtual environment in which to first model, verify, and then update your
managed devices with changes.
The following topics are the device management features in NSM:
•
Device Modeling on page 7
•
Rapid Deployment (RD) on page 7
•
Policy-Based Management on page 7
Using your virtual network to change, review, and test your network configuration before
deploying it to your physical network can help you discover problems like routing issues,
IP conflicts, and version mismatches across your entire network before they actually
occur. NSM includes configuration validation to help you identify device configuration
errors and missing information, andthen points you tothe troublespot so you can quickly
fix the problem. Whenyou have designeda virtual configuration that works, you can push
this configuration to your devices with a single update.
With NSM, you can implement a new routing protocol across your network, design and
deploy a new security policy with traffic shaping, or create a VPN tunnel that connects
a branch office to your corporate network—then deploy all changes with a single click.
Rapid Deployment (RD)
Rapid Deployment enables deployment of multiple security devices in a large networked
environment with minimal user involvement. Rapid Deployment is designed to simplify
the staging and configuration of security devices in non-technical environments, enabling
the secure and efficient deployment of a large number of devices.
To use Rapid Deployment, the NSM administrator creates a small file (called a configlet)
in NSM, and then sends that configlet to an onsite administrator that has local access
to the security device. With the help of the Rapid Deployment wizard, the onsite
administrator installs the configlet on the device, which automatically contacts NSM
and establishes a secure connection for device management.
Rapid Deployment is ideal for quickly bringing new security devices under NSM
management for initial configuration. You can model and verify your deviceconfigurations
for undeployed devices, and then install the completed device configuration when the
device contacts NSM.
Policy-Based Management
You can create simplified and efficient security policies for your managed devices using
the Policy-Based Management feature. Table 5 on page 8 describes the different
policy-based management features:
Group yourdevices byplatform,ScreenOS version, location, or function, and then add them to your
security policies.
Simplify your rules, by defining a common To Zone and From Zone for all devices in the rule, and
then specifyzone exceptionsto change the To andFrom zones for specific devices.Zone exceptions
add flexibility to your firewall rules, enabling you to manage more devices in a single rule.
Filter on From and To Zones to see rules between zones.Filtering
Schedule a period during which a securitypolicy is ineffect onthe devices in a rule. Create schedule
objects as one-time, recurring, or both; you can even select multiple schedule objects in a firewall
rule.
Configure a rule to look for attacks, viruses, or specific URLs (devices running ScreenOS 5.x only).Security and Protection
Use your firewall rules to control the amount of traffic permitted through your security devices.Traffic Shaping
Device Configuration Settings Overview on page 25•
• Working with Multiple NSM Administrators Overview on page 13
• Administering ScreenOS Devices Using NSM Complete System Management onpage 10
Error Prevention, Recovery, and Audit Management Using NSM
Persistent management control is essential when managing large networks. You need
to be sure that configuration and policies you send to your managed devices are correct
before you install them on your devices.
Using NSM’s error prevention and recovery features, you can ensure that you are
consistently sending stable configurations to your devices, and that your device remains
connected to NSM. Additionally, you can track each change made by an NSM
administrator to help you identify when, how, and what changes were made to your
managed devices.
The following topics are the error prevention, recovery, and audit management features
in NSM:
NSM automatically alerts you to configuration errors while you work in the UI. Each field
that has incorrect or incomplete data displays a icon— move your mouse cursor over the
icon to getdetails on the missing data.For moredetails on validation,see “Understanding
Validation Icons and Validation Data in the NSM User Interface” on page 21.
Policy Validation
The policy validation tool checksyour security policiesand alertsyou to possible problems
before you install that policy on your managed devices.
Atomic Configuration and Updating
On devices running ScreenOS 5.x, if the configuration deployment fails for any reason,
the device automatically uses the last installed stable configuration. Additionally, if the
configurationdeploymentsucceeds, but the device loses connectivity to the management
system, the device restores the last installed configuration. This minimizes downtime
and ensures that NSM always maintains a stable connection to the managed device.
Chapter 1: NSM User Interface and NSM Key Management Features
Device Image Updates
Auditing
Devices running ScreenOS 5.1 and later also support atomic updating, which enables the
device to receive the entire modeled configuration (all commands) before executing
those commands (instead of executing commands as they are received from the
management system). Because the device no longer needs to maintain a constant
connection to the management system during updating, you can configure changes to
the management connection from the NSM UI.
You can update the software that runs on your devices by installing a new ScreenOS
image on all your security devices. The image updates are as follows:
•
NSM updates—Use NSM to upload the new image file to multiple security devices with
a single click.
•
RMA updates—Replace failed devices, by setting the device to the RMA state, which
enables NSM to retain the device configuration without a serial number or connection
statistics. When you install the replacement device, activate the device with the serial
number of the replacement unit.
Use the Audit Log Viewer to track administrative actions so you will always know exactly
when andwhat changes weremade usingthe management system. The Audit LogViewer
displays log entries in the order generated, and it includes:
The detail view of the Audit Log Viewer displays changes from the previous version.
Domain (global or a subdomain) in which the action occurred
Object type and name
Related
Documentation
AdministeringScreenOS Devices UsingNSM Complete System Managementon page 10•
• Security Integration Management Using NSM Overview on page 4
• Managing Devices in a Virtual Environment Using NSM on page 6
Administering ScreenOS Devices Using NSM Complete System Management
NSM provides the tools and features you need to manage your devices as a complete
system, as well as individual networks and devices. The following features are supported
in administering ScreenOS devices:
•
To manage an individual device, create a single device configuration, define a security
policy for that device, and monitor the device status.
•
To manage a network, create multiple device configurations,define and install policies
for multiple devices, and view the status of all devices in the same UI.
•
To manage at the system level, create templates and use them to quickly configure
multiple policies and VPNs that control the flow of traffic through your network, view
system-wide log information for network security events, and monitor the status of
NetScreen Redundancy Protocol (NSRP).
The following topics describe about how to administer ScreenOS devices using the
complete system management feature in NSM:
VPN Abstraction
•
VPN Abstraction on page 10
•
Integrated Logging and Reporting on page 11
•
Monitoring Status on page 11
•
Job Management on page 11
Use VPNManager to design a systemlevelVPN and automaticallyset upall connections,
tunnels, and rules for all devices in the VPN. Instead of configuring each device as a VPN
member and then creating the VPN, start from a system perspective: Determine which
users and networks need access to each other, and then add those components to the
VPN.
Using AutoKey IKE, you can create the following VPNs with VPN Manager:
•
Dynamic, route-based VPNs—Provide resilient, always-on access across your network.
Add firewall rules on top of route-based VPNs to control traffic flow.
•
Policy-based VPNs—Connect devices, remote access server (RAS) users, and control
traffic flow (traffic flow can also be controlled using L2TP VPNs).
Mixed-mode VPNs—Connect route-based VPNs with policy-based VPNs, giving you
flexibility.
Integrated Logging and Reporting
You use the security devices on your network for multiple reasons: to control access to
and from your network, to detect and prevent intrusions, and to record security events
so you can monitor the important activities occurring on your network. You can use NSM
to monitor, log, and report on network activity in real-time to help you understand what
is happening on your network. For example, you can:
•
View traffic log entries generated by network traffic events, configuration log entries
generated by administrativechanges, orcreatecustom views to see specific information
in the Log Viewer.
•
Create detailed reports from traffic log information in the Report Manager.
•
Inspect suspicious events by correlating log information in the Log Investigator.
Monitoring Status
Chapter 1: NSM User Interface and NSM Key Management Features
Job Management
NSM keeps you up-to-date on the health of your network. You can view the following
monitoring statuses on your network:
•
View critical information about your devices and IDP sensors in the Device Monitor:
•
Configuration and connection status of your security devices
•
Individual device details, such as memory usage and active sessions
•
Device statistics
•
View the status of each individual VPN tunnel in the VPN Monitor.
•
View redundant devices status in the NSRP Monitor.
•
View the status of your IDP clusters in the IDP Cluster Monitor.
•
View the health of the NSM system itself, including CPU utilization, memory usage,
and swap status in the Server Monitor.
You canview theprogress of communication to and fromyour devices inthe JobManager.
NSM sends commands to managed devices at your request, typically to import, update,
or reboot devices, and view configuration and delta configuration summaries. When you
send a command to a device or group of devices, NSM creates a job for that command
and displays information about that job in the Job Manager module.
Job Manager tracks the progress of the command as it travels to the device and back to
the management system. Each job contains the following:
Completion status for each device that received the command
Detailed description of command progress
Command output, such as a configuration list or CLI changes on the device
NOTE: Job Manager configuration summaries and job information details
do not display passwords in the list of CLI commands for administrators
that do not have the assigned activity “View Device Passwords”. By default,
only the super administrator has this assigned activity.
Related
Documentation
NSM Modules Overview on page 13•
• Error Prevention, Recovery, and Audit Management Using NSM on page 8
• Device Configuration Settings Overview on page 25
NSM User Interface Overview
The NSM user interface (UI) is used to control the NSM system. Using the UI, you can
configure NSM administrators, add devices, edit policies, and view reports—access the
full functionality of the NSM system.
NOTE: For step-by-step instructions on using the User Interface, click the
Help icon in the menu bar of the UI to accessthe Network and Security Manager
Online Help.
Configuring UI Preferences
You can configure preferences for UI behavior, such as appearance, external tool use,
polling statistics, and UI timeout. For details on configuring these settings, see the topics
under “NSM User Interface” in the Network and Security Manager Online Help.
Related
Documentation
NSM Modules Overview on page 13•
• Understanding NSM User Interface Menus and Toolbars on page 12
• Understanding the Search Function in the NSM User Interface on page 22
Understanding NSM User Interface Menus and Toolbars
The NSM user interface (UI) appears after you log in, and it displays a set of menus and
toolbar icons at the top of the UI window. Depending on the component displayed,
right-click menus are available to perform various tasks.
Related
Documentation
NSM Modules Overview on page 13•
• Understanding the Search Function in the NSM User Interface on page 22
Chapter 1: NSM User Interface and NSM Key Management Features
• Understanding Validation Icons and Validation Data in the NSM User Interface on
page 21
Working with Multiple NSM Administrators Overview
When multiple NSM administrators are accessing the NSM system at the same time,
NSM ensures that all edits are synchronized by locking an active object. Only one
administrator at a time can edit existing values for an object, but multiple administrators
can still view the existing values for that object.
NSM administrators must know the following guidelines:
•
When anNSM administrator begins editing an object, the UI locks that object to prevent
other administrators from editing the object’s value.
•
During lockout, NSM makes “lazy” saves of all edits made and stores them in an
in-memory database. If NSM crashes during a lazy save, edits made since the last lazy
save are lost, and NSM prompts the NSM administrator to roll back to the last lazy
save.
•
When the NSM administrator completes and saves the edit, that object is unlocked,
enabling other administrators to edit it.However, because theUI does notimmediately
refresh the object values, you must manually refresh the UI to view the most recent
versions.
When you attempt to open a locked object, a warning message appears indicating that
the object is locked and can be opened only as a read-only object. The warning message
also contains the name of the NSM administrator who is currently editing the object.
Depending on your administrator privileges, you can locate contact information for the
administrator in the Manage Administrators and Domains area of the UI (from the File
menu, select Tools > Manage Administrators and Domains). For details on working with
administrators anddomains, seethe Network and Security Manager Administration Guide.
For example, let’s say Bob and Carol are both NSM administrators with the same roles.
If both administrators view the same object, but Bob also edits and saves the object,
NSM does not notify Carol that a newer version of the object exists. To see the newest
version, Carol must first close, and then open the object again or refresh the console.
Related
Documentation
NSM Modules Overview on page 13•
• Device Configuration Settings Overview on page 25
NSM Modules Overview
The navigation tree contains11 top-levelmodules that containspecific NSM functionality,
as detailed in the following topics. There are three containers in the left UI pane that
contains the 11 modules. They are Investigate, Configure, and Administer.
The navigation tree displays the 11 NSM modules in the left pane of the NSM window.
Double-click a module to display its contents in a hierarchical tree format. For details
about each module, see the “NSM Modules Overview” on page 13.
Main Display Area
The main display area displays content for the selected module or module contents.
They are as follows:
•
•
•
Menu Bar—The menu bar contains clickable commands. You can access many menu
bar commands using keyboard shortcuts such as add, edit, delete. For a complete list
of keyboards shortcuts, see the Network and Security Manager Online Help.
ToolBar—The toolbar contains buttons for common tasks. The buttons displayed in
the toolbar are determined by the selected module.
Status Bar—The status bar displays additional information for a selected module.
Related
Documentation
NSM User Interface Overview on page 12•
• Understanding NSM User Interface Menus and Toolbars on page 12
• Working with Multiple NSM Administrators Overview on page 13
Investigate Task Modules in the NSM User Interface Overview
The Investigate task includes the following top-level modules:
•
Log Viewer on page 14
•
Report Manager on page 15
•
Log Investigator on page 15
•
Realtime Monitor on page 15
•
Security Monitor on page 16
•
Audit Log Viewer on page 16
Log Viewer
The Log Viewer displays log entries that your security devices generate based on criteria
that you defined in your security policies, on the GUI server, and in the device configuration.
Log entries appear in table format; each row contains a single log entry, and each column
defines specific information for a log entry.
You can customize the view (which log entries and what log information is shown) using
log filters or by changing the column settings.
Chapter 1: NSM User Interface and NSM Key Management Features
•
View summarized information about security events and alarms
•
View information about a specific log entry
•
Show, hide, or move columns to customize the Log Viewer
•
Filter log entries by column headings
•
Create and save custom views that display your filters/column settings
•
Set flags on Log Viewer entries to indicate a specific priority or action
For more details on using the Log Viewer, see the Network and Security ManagerAdministration Guide.
The Report Manager contains summary, graphs, and charts that detail specific security
events that occur on your network. NSM generates reports to visually represent the
information contained in your log entries. You can use reports to quickly summarize
security threats to your network, analyze traffic behavior, and determine the efficiency
of NSM. To share reports or to use report information in other application, you can print
or export report data.
Log Investigator
The Log Investigator contains tools for analyzing your log entries in depth. Use the Log
Investigator to:
•
Manipulate and change constraints on log information
•
Correlate log entries visually and rapidly
•
Filter log entries while maintaining the broader picture
Realtime Monitor
Realtime Monitor provides a graphical view of the current status of all devices managed
by NSM.Table 6 onpage 15describes the monitoring statusof all NSM managed devices.
Table 6: Monitoring Status of NSM Managed Devices
Monitoring StatusNSM Managed Devices
Device Monitor
Tracks the connection state and configuration state of your security devices
and IDP sensors. You can also view device details to see CPU utilization and
memory usage for each device, or check device statistics.
Tracks the status of all VPN tunnels.VPN Monitor
Tracks the status of security devices in clusters.NSRP Monitor
You can customize Realtime Monitor to display only the information you want to see, as
well as update information at specified time periods. You can also set alarm criteria for
Tracks the status of IDP clusters.IDP Cluster Monitor
a device or process. For more details on Realtime Monitor, see “Realtime Monitoring“ in
the Network and Security Manager Administration Guide.
Security Monitor
Security Monitor provides access to the Dashboard, Profiler, and Security Explorer. These
tools enable you to track, correlate, and visualize aspects about your internal network,
enabling you to create more effective security policies and minimize unnecessary log
records. For more details, refer to “Analyzing Your Network” in the Network and SecurityManager Administration Guide.
Audit Log Viewer
The Audit Log Viewer contains a log entryfor every change made by anNSM administrator.
For more details on Audit Log Viewer, see “Using the Audit Log Viewer” in the Networkand Security Manager Administration Guide.
Related
Documentation
Configure Task Modules in the NSM User Interface Overview on page 16•
• Administer Task Modules in the NSM User Interface Overview on page 20
• NSM Modules Overview on page 13
Configure Task Modules in the NSM User Interface Overview
The Configure task includes the following top-level modules:
•
Device Manager on page 16
•
Security Policies on page 17
•
VPN Manager on page 17
•
Object Manager on page 18
Device Manager
The Device Manager contains the device objects that represent your security devices.
Table 7 on page 16 describes the objects that you can create in Device Manger.
Table 7: Device Objects in Device Manager
DescriptionDevice Object
Security devices and systems
The devices you use to enable access to your network and to protect your network against
malicious traffic.
A vsys is a virtual device that exists within a physical security device.Vsys devices
Clusters
A cluster is two security devices joined together in a high availability configuration to ensure
continued network uptime.
A vsys cluster device is a vsys device that has a cluster as its root device.Vsys cluster
Firewalls or VPN devices that are not Juniper Networks security devices.Extranet devices
Chapter 1: NSM User Interface and NSM Key Management Features
Table 7: Device Objects in Device Manager (continued)
DescriptionDevice Object
Templates
Security Policies
A template is apartial device configuration that you can define once and then use for multiple
devices.
A device group is a user-defined collection of devices.Device Groups
Security policies contain the firewall, multicast, and VPN rules that control traffic on your
network. Using a graphical, easy-to-use rule building platform, you can quickly create
and deploy new policies to your security devices.
Use security policies to:
•
Add or modify existing security policies
•
Add or modify existing VPN rules
•
Add or modify existing IDP rules
•
Create policies based on existing policies
•
Install policies on one or multiple security devices
•
Delete policies
NOTE: Devices running ScreenOS 6.3, support IPv6 in policy rulebases, IDP,
address objects, and attack objects. You can also configure IPv6 host,
network, and multicast addresses. For more information on IPv6 support,
see the Network and Security Manager Administration Guide..
If the device configurations that you imported from your security devices contained
policies, security policies display those imported policies. For details on editing those
imported polices or creating policies, see Chapter 9, “Configuring Security Policies”, or
Chapter 10, “Configuring VPNs”, of the Network and Security Manager AdministrationGuide.
VPN Manager
The VPN Manager contains the VPN abstractions that control the VPN tunnels between
your managed devices andremote users. Using VPN objects, such as protected resources
and IKE Pproposals, you can create multiple VPNs for use in your security policies.
Use the VPN Manager to:
•
Define the protected resources on your network. Protected resources represent the
network resources you want to protect in a VPN.
The Object Manager contains objects, which are reusable, basic NSM building blocks
that contain specific information. You useobjects tocreatedevice configurations, policies,
and VPNs. All objects are shared, meaning they can be shared by all devices and policies
in the domain.
NOTE: In ScreenOS 6.1 or later, users can set “group 14” for phase 1 and 2
proposals.
Configure AutoKey IKE, L2TP, and L2TP-over-AutoKey IKE VPNs in policy-based or
route-based modes. You can also create an AutoKey IKE mixed mode VPN to connect
policy-based VPN members with route-based VPNs members.
Configure AutoKey IKE and L2TP policy-based VPNs for remote access server (RAS)
and include multiple users.
NOTE: In ScreenOS 6.1 or later, AutoKey IKE VPN and AutoKey IKE RAS
VPN are supported in IKEv2 parameters.
Table 8 on page 18 describes the objects that you can create in NSM.
Table 8: Objects in Object Manager
DescriptionObjects
Address Objects
QoS Profiles
Schedule Objects
DI Objects
Represent components of your network (hosts, networks, servers). On devices running
ScreenOS 6.3, he new policy appears in the security policy list and supports IPv6 in policy
rule bases, IDP, address and attack objects. After you have created a security policy, you can
add rules to the new policy. Rules include IPv4, IPv6, VPN, and also VPN link. For more
information, see the IDP Concepts & Examples guide. A rule with combination of IPv4 or IPv6
address objects is not allowed.
Represent the resource reservation control mechanisms rather than the achieved service
quality. You can provide different priority to different applications, users, or data flows, or to
guarantee a certain level of performance to a data flow. You can configure QoS into a policy
role, using role options. There are two types of QoS profiles and they are DSCP and IP
precedence.
Represent specific dates and times. You can use schedule objects in firewall rules to specify
a time or time period that the rule is in effect.
Define the attack signature patterns, protocol anomalies, and the action you want a security
device to take against matching traffic. On devices running ScreenOS 6.3, you can also set
IPv6 version signature information while editing IP settings and header matches of a custom
attack.
Chapter 1: NSM User Interface and NSM Key Management Features
IDP Attack Objects
ICAP Objects
Web Filtering Objects (Web
Profiles)
Service Objects
SCTP Objects
User Objects
Represent attack patterns that detect known and unknown attacks. You use IDP attack
objects within IDP rules. On devices running ScreenOS 6.3, you can also set IPv6 version
signature information while editing IP settings andheader matches of a custom attack. When
you select the IPv6 option, the Protocol tab displays the ICMP6 Packet Header Fields value,
and then you can also modify the respective configurable parameters.
Represent the AV servers, software, and profiles available to devices managed by NSM.AV Objects
Represent the Internet Content Adaptation Protocol (ICAP) servers and server groups used
in ICAP AV objects.
Define theURLs, the Web categories, and the actionyou want asecurity device to take against
matching traffic.
Represent services running on your network, such as FTP, HTTP, and Telnet. NSM contains
a database of Service Objects for well-known services; you can also create Service Objects
to represent the custom services you are running on your network.
Providea reliabletransport service that supports datatransferacross thenetwork, in sequence
and without errors. s of ScreenOS 6.3, the existing SCTP stateful firewall supports protocol
filtering.
NOTE: You can configure the security device to perform stateful inspection on all SCTP
traffic without performing deep inspection (DI). If you enable stateful inspection of SCTP
traffic, the SCTP ALG drops any anomalous SCTP packets.
Represent the remote users that access the network protected by the security device. To
provide remote users with access, create a user object for each user, and then create a VPN
that includes those user objects.
IP Pools
Authentication Servers
Remote Settings
Represent a range of IP addresses. You use IP pools when you configure a DHCP server for
your managed devices.
Represent external authentication servers, such as RADIUS and SecureID servers. You can
use an authentication server object to authenticate NSM administrators (RADIUS only),
XAuth users, IKE RAS users, L2TP users, and IKEv2 EAP users. NSM provides configuration
support for Authentication Manager version 5 or later. This provision has introduced the
concept of a primary server with up to 10 replica servers. In the Primary/Replica version, each
server can process authentication requests. The more current agents will send to the server,
the faster the responder.
Are OR, AND, and NOT statements that set conditions for authentication requirements.Group Expressions
Represent DNS and WINS servers. You use remote settings object when configuring XAuth
or L2TP authentication in a VPN.
Represent MIPs, VIPs, and DIPs.NAT Objects
Represent GTP client connections.GTP Objects
Represent the certificate authority’s certificate.CA Objects
Represent the certificate authority’s certificate revocation list.CRL Objects
You can use the object Manager to:
•
View and/or edit the object properties
•
Create, edit, or delete objects
•
Create custom groups of Objects
For more details on objects, see Chapter 8, “Configuring Objects,” of the Network andSecurity Manager Administration Guide.
Related
Documentation
Investigate Task Modules in the NSM User Interface Overview on page 14•
• Administer Task Modules in the NSM User Interface Overview on page 20
• NSM Modules Overview on page 13
Administer Task Modules in the NSM User Interface Overview
The Administer task includes the following top-level modules:
•
Server Manager on page 20
•
Job Manager on page 20
•
Action Manager on page 20
Server Manager
Server Manager contains server objects that represent your management system
components. Use Server Manager tomanage and monitorthe individualserver processes
that comprise your NSM system.
Job Manager
Job Manager contains the status of commands (also called directives) that NSM sends
to your managed devices. You can view summaries or details for active jobs and
completed jobs. For more details on Job Manager, refer to “Tracking Device Updates” in
the Network and Security Manager Administration Guide.
Action Manager
The Action Manager enables you to forward logs on a per domain basis. For more details
on using the Action Manager, refer to “Using the Action Manager to Forward Logs by
Domain” in the Network and Security Manager Administration Guide.
Related
Documentation
Investigate Task Modules in the NSM User Interface Overview on page 14•
• Configure Task Modules in the NSM User Interface Overview on page 16
Chapter 1: NSM User Interface and NSM Key Management Features
• NSM Modules Overview on page 13
Understanding Validation Icons and Validation Data in the NSM User Interface
NSM uses automatic validation to help you identify the integrity of a configuration or
specific parameter ata glance. Validation anddata origination icons show the user where
field data originates. These are implemented as additional types of validation messages
(beyond the current error and warning messages), including Template Value, Override,
and From Object messages. Each has its own icon and text color in the tool tips.Table 9
on page 21 lists the validation signs and validation and data origination icons that may
appear as you work in the UI.
From Object messages only appear when viewing template objects to help find fields
set in the template.
When more thanone typeof icon appears within a panel, the highestpriority icon appears
next to the icon in the tree and the panel title bar.
Table 9: Validation Status, Validation, and Data Origination Icons for ScreenOS Devices
Validation Status and
Icons
Validation Status
Error
Warning
Needs Validation
Validation and Data Origination Icons
Override
Description
Indicates that a configuration or parameter is not configured correctly in the NSM UI. Updating a
device with this modeled configuration causes problems on the device. This is the highest priority
validation icon.
Indicates that a configuration or parameter is not configured correctly in the NSM UI. Updating a
device with this modeled configuration might cause problems on the device.
Indicates that a configuration or parameter has not been validated. Although NSM automatically
validates all parameters when entered, this icon might appear for a template-driven value after you
have changed a template. We highly recommend that you validate all parameters before updating
a device.
Indicates that a configuration or parameter is configured correctly in the NSM UI.Valid
Indicates that the displayed value was set manually and that the value overrides whatever value
might come from a template. The icon can also indicate an override of a VPN-provided value or a
cluster-provided value.
Template Value
From Object
Indicates that the displayed value was set manually. Changes to the same field in the template will
be applied to the device when it is updated.
Indicates that the displayed value came from the device when the device was imported. Changes
to a template will not change this value unless you selected Remove conflicted device values in
the template Operations dialog box. This is the lowest priority validation and data origination icon.
Understanding NSM User Interface Menus and Toolbars on page 12•
• Understanding the Search Function in the NSM User Interface on page 22
• NSM Modules Overview on page 13
Understanding the Search Function in the NSM User Interface
You can use the integrated search feature in NSM to quickly locate a specific setting
within a UI screen or dialog box.
To locate a word, begin entering the word and the search window automatically appears
in the top left of the selected screen or dialog box. The UI attempts to match your entry
to an existing value; as you enter more characters, the UIcontinues to search for a match.
Use the arrow keys to move between each matching value. If your entry appears in red,
no matching value was found within the selected screen or dialog box.
To locate a different datatype, suchas anIP address, change thesearch mode. To display
all availablesearch modes, press the backslash key (\). The search modewindow appears.
Press the key that represents the search mode you want to use, and then begin entering
the search criteria. Switching to another view or pressing the ESC key ends the search
operation and closes the tool window. Table 10 on page 22 describes the detail sections
in each search mode.
Table 10: Search Functions in the NSM UI
Contains String [C]
Search Mode
Starts with [S]
Search Mode
Use to locate a pattern
anywhere in a string.
Use to locate a pattern at the
beginning of a string.
Your ActionFunctionSearch Mode
For example, to locate the pattern “RPC” in service objects:
1. Inthe NSM navigation tree, select Object Manager > Service Objects
> Predefined Service Objects, and then select the Service Object
icon at the top of the Service Tree tab.
2. Enter C, andthen enter RPC. The UI automatically highlights the first
match, MS-RPC-ANY.
For example, to locate the pattern “OR” in security devices:
1. In the NSM navigation tree, select Device Manager > Devices >
Predefined Service Objects, then select the Service Object icon at
the top of the Device Tree tab.
2. Enter S, then enter OR. The UI automatically highlights the first
match, OR_EU_208.
Chapter 1: NSM User Interface and NSM Key Management Features
Table 10: Search Functions in the NSM UI (continued)
Your ActionFunctionSearch Mode
Regular Expression
[R] Search Mode
Use to locate a value using a
regular expression.
Use to locate an IP address.IP [I] Search Mode
For example, to locate all attack objects that detect denial-of-service
attacks:
1. Inthe NSM navigationtree, select Object Manager > Attack Objects,
and then select the Predefined Attacks tab.
2. Select the first entry in the Name column, and then press the
backslash key (\) to display the search mode window.
3. Enter R, and then enter the following characters: DoS|.enial.
The UI automatically highlights the first match; click the Down Arrow
key to highlight the next match.
NOTE: The regular expression searchmode supportsall commonregular
expressions. For more information about regular expressions, refer to a
dedicated resource, such as Mastering Regular Expressions, 2nd Edition,
by Jeffrey E. F. Friedl.
For example, to locate the IP address 5.5.5.50 and 5.5.5.51 in Address
Objects:
1. In the NSM navigation tree, select Object Manager > AddressObjects, and then select the Address Table tab.
2. Select the first entry in the Name columnIP/Domain, and then press
the backslash key (\) to display the search mode window.
3. Enter I, and then enter 5.5.5.*. The UI automatically highlights the
first match, 5.5.5.50. Click the Down Arrow key to highlight the next
match, 5.5.5.51.
Related
Documentation
When searching in a table, your search criteria is applied only to the selected column. If
you select a different column, such as Name, and perform the same search, your results
differ.
• Understanding Validation Icons and Validation Data in the NSM User Interface on
Security devices are the Juniper Networks security components that you use to enable
accessto yournetwork components and to protect your network against malicious traffic.
When you use NSM to manage your security devices, you are creating a virtual network
that represents your physical network. Using this virtual network, you can create, control,
and maintain the security of your physical network at a system-level.
This chapter provides a brief overview on how best to create your virtual network and
simplify management tasks. For detailed information, see the Network and SecurityManager Administration Guide.
This chapter contains the following topics:
•
Device Configuration Settings Overview on page 25
•
Configuring Advanced Properties for ScreenOS Device Details on page 26
•
Configuring a Blacklisted Entry (NSM Procedure) on page 27
•
Enabling ALGs (NSM Procedure) on page 28
•
Understanding Device Configurations Running ScreenOS 5.4 FIPS and Later
Overview on page 29
•
Configuring Extranet Devices Overview on page 30
•
Configuring Extranet Devices Details (NSM Procedure) on page 30
•
Understanding Templates and Groups on page 32
•
Configuring Network Settings Options and Descriptions on page 34
Device Configuration Settings Overview
Device configuration contains the configuration settings for a managed device, such as
interface, routing, and authentication settings. You can edit configurations after you add
or import a managed device, or create configurations when you model a device. When
you are satisfied with your changes, you can then update the managed device with the
modeled device configuration to make your changes take effect.
NOTE: When you open a device for viewing or editing, the NSM UI loads the
entire device configuration into memory to enhance UI performance while
configuring the device. When you close a device to which you made changes,
the UI unloads some of the device configuration from the client memory.
Althoughthis memory optimization occurs quickly,you might see the following
message appear: “Optimizing client memory usage for device.”
NSM does not support all device configuration settings. You may need to make some
changes to the device directly using a Web UI or CLI. Additionally, some changes can
affect the management connection between the NSM device server and the managed
device.
About Configuring Security Devices
A security device provides perimeter and boundary protection using data encryption,
authentication, access control, and some attack detection and prevention. Firewalls and
virtual private networks (VPNs) are designed for high speed operation at the Network
Layer.
While firewalls provide protection, there are attacks contained within the allowed traffic
that firewalls are not designed to detect.
About Configuring Extranet Devices
NSM also enables you to configure an existing extranet device (that is, a third-party
router). Youcan do this by creating ascript toperform the required actions onthe extranet
device.
Add the extranetdevice in the Device Manager, and thenconfigure the requiredmetadata
in a shared object in the Object Manager under “Extranet Policies.” This data may include:
credential information (user/password), IP address, interface list, comments, action
script, and other additional data. When you update the device, the specified script is
invoked. The device update job displays the XML output.
Related
Documentation
Configuring Advanced Properties for ScreenOS Device Details on page 26•
• Understanding Device Configurations Running ScreenOS 5.4 FIPS and Later Overview
on page 29
• Understanding Templates and Groups on page 32
• Configuring Extranet Devices Details (NSM Procedure) on page 30
Configuring Advanced Properties for ScreenOS Device Details
When a denial-of-service (DoS) attack occurs, the CPU recognizes the attack and drops
the traffic. A DoS attack can cause high CPU utilization and cause the security device to
drop all packets. To prevent high CPU utilization during a DoS attack,the packet dropping
feature was moved to the application-specific integrated circuit (ASIC) in ScreenOS 6.0.
Network traffic is categorized as critical and noncritical. Critical traffic includes
management traffic such as Telnet and SSH. When a DoS attack occurs, CPU usage
increasesand when it reachesthe throttlingthreshold,it triggersthe droppingof noncritical
traffic, which is not blacklisted. To prevent this, you can configure the security device to
drop malicious packets within the device that processed them. In this mechanism, you
create a blacklist with source and destination network addresses from which malicious
traffic reaches the security device.
When a packet reaches the security device, the packets are checked against a list of
configured blacklisted entries. If a match occurs, the device drops that packet. If the
packet does not match the blacklisted entry, the device passes the packet to the next
stage that prioritizes the packet. For each entry in the blacklist, the security device
maintains a drop counter to record the number of packets dropped against that entry.
Related
Documentation
Device Configuration Settings Overview on page 25•
• Enabling ALGs (NSM Procedure) on page 28
• Understanding Device Configurations Running ScreenOS 5.4 FIPS and Later Overview
on page 29
Configuring a Blacklisted Entry (NSM Procedure)
To configure a blacklisted entry:
1. In the NSM navigation tree, click Device Manager > Devices.
2. Select an ISG1000, ISG2000, NetScreen–5200, or NetScreen–5400 device.
3. Click the Edit icon to edit the device. The Device dialog box for the selected device
appears.
4. In the device navigation tree, click Advanced > CPU > Blacklist/ThrottlingThreshold.
Click the Add icon. The New Blacklist Entry dialog box appears.
5. Modify the settings as described in Table 11 on page 27. Click OK.
Table 11: Blacklist Configuration Fields
DescriptionField
Source Port
Destination Port
The ID of the blacklist is generated automatically.ID
The source IP address from which the DoS attack traffic originated.Source IP
The destination IP address.Destination IP
The source port in a TCP or UDP session. Set this to 0 to match all
ports.
The destination port in a TCP or UDP session. Set this to 0 to match
all ports.
• Configuring Extranet Devices Details (NSM Procedure) on page 30
• Configuring Network Settings Options and Descriptions on page 34
Enabling ALGs (NSM Procedure)
In ScreenOS 6.0, the following modifications were made to prevent high CPU utilization.
•
Some existing Application Layer Gateways (ALGs) are disabled by default onhigh-end
platforms (ISG1000, ISG2000, NetScreen 2000line, andNetScreen line). The affected
ALGs are H.323, SIP, MGCP, SCCP, MSRPC, SunRPC, and SQL. ALGs included in
ScreenOS 6.1 are PAT for PPTP, SCTP, and Apple iChat. As of ScreenOS 6.3, the DNS
Inhibit AAAA (IPv6) ALG is supported but disabled by default.
The source port and destination port are valid only when you have set
the protocol as UDP or TCP. Setthis value to0 to match any protocol.
The range is 0-32. Set this field to 0 to match all source IP addresses.Source IP Net Mask
The range is 0-32. Set this field to 0 to match all destination IP
addresses.
•
ALGs included in ScreenOS 6.0 or later are enabled by default. They are FTP, DNS,
Real, Rlogin, RSH, TALK, TFTP, and XING.
For efficient CPU utilization, you can enable or disable the ALGs.
To enable or disable the ALGs:
1. In the NSM navigation tree, click Device Manager > Devices.
2. Select a device or a model device
3. Click the Edit icon to edit the device. The relevant device dialog box appears.
4. In the device navigation tree, click Advanced > ALGs.
5. ALGs are listed depending on the type of device you selected and the OS version.
ALGs can be enabled or disabled by checking or clearing their check boxes. See Table
12 on page 29.
Disabled by default on ISG1000, ISG2000,
NetScreen–2000 line, and NetScreen–5000
line running ScreenOS 6.0 or later.
Enabled by default ona device runningScreenOS
6.0 or later.
Related
Documentation
H.323, SIP, MGCP, SCCP, MSRPC, SunRPC,
SQL, PPTP, and DNS Inhibit AAAA(IPv6).
FTP, DNS, Real, Rlogin, RSH, TALK, TFTP,
XING, and SCTP
Configuring Advanced Properties for ScreenOS Device Details on page 26•
• Configuring a Blacklisted Entry (NSM Procedure) on page 27
• Device Configuration Settings Overview on page 25
Understanding Device Configurations Running ScreenOS 5.4 FIPS and Later Overview
The following features are disabled on security devices running the Federal Information
Processing Standards (FIPS) certified release of ScreenOS (ScreenOS 5.4 FIPS):
•
SNMP management
•
MD5 algorithm
•
Group 5 Phase 2 IKE proposals
For more information about FIPS-enabled security devices, refer to the ScreenOS 5.0
FIPS Reference Note.
NOTE: To configure and manage security devices running ScreenOS5.0 FIPS
using NSM, you must first configure a VPN tunnel between the device and
the NSM GUI server. After establishing this tunnel, you cannot reconfigure
tunnel parameters in NSM.
About Configuring Devices Running Future Releases of ScreenOS
You can use NSM to configure security devices running future releases of ScreenOS in
one of three levels of support:
•
Forward Support (Basic)—When a new version of ScreenOS is available, you can
download a schema patch that includes changes to the DCF and schema files, as well
as the firmware tables, enabling you to manage devices using a previously known
version of ScreenOS.
•
Forward Support (Blended)—When a new version of ScreenOS is available, you can
download a schema patch, enabling you to manage devices using the new ScreenOS
version. You cannot, however, manage the new features in ScreenOS with this level
of support.
The support level is indicated in the Information screen for the device in the Device
Manager.
Full Support—When a new version of ScreenOS is available, you can download a
schema patch, enabling you to manage devices using the new ScreenOS version. In
addition, you can manage all the new features in that version of ScreenOS.
Related
Documentation
Device Configuration Settings Overview on page 25•
• Configuring Network Settings Options and Descriptions on page 34
• Configuring Zones and Zone Properties in ScreenOS Devices Overview on page 39
Configuring Extranet Devices Overview
NSM also enables you to configure an existing extranet device (a third-party router). You
can do this by creating a script to perform the required actions on the extranet device.
These scripts are saved by default on the GUI Server at:
GuiSvr/var/scripts
Add the extranetdevice in the Device Manager, and thenconfigure the requiredmetadata
in a shared object in the Object Manager under Extranet Policies. This data might include:
credential information (user/password), IP address, interface list, comments, action
script and other additional data. When you update the device, the specified script is
invoked. The device update job displays the XML output.
Related
Documentation
Configuring Extranet Devices Details (NSM Procedure) on page 30•
• Configuring Network Settings Options and Descriptions on page 34
This example shows how to update an existing ruleon a third-party router to deny certain
HTTP traffic with integer fields matching 1-10.
This process involves first creating a script that updates the policy on the router. For
example, the script can contain certain validation instructions for the policy. It can also
include instructions on sending alerts or messages in the event that the policy update
succeeds or fails. When you are done creating the script, save it in the appropriate
directory.
Next, use the Object Manager to create a custom policy field object that contains the
specific integer fields that you are referencing in the extranet policy (for example, integer
fields matching 1-10).
To create a custom policy field:
1. In the NSM navigation tree, click Object Manager > Custom Policy Fields.
2. Select the Field Definition tab, and then click New. The New Custom Policy Fields
Click OK. A folder for the ID custom policy field object appears.
•
In the Objects tab, click on the ID folder. Click New. The New Custom Policy Fields
Data window appears.
•
Enter a value in the Data Value field: enter 1. Click OK. The new value appears in the
ID folder.
•
Repeat this step for all ten integer values.
In the Object Manager, create the Extranet Policy object with the appropriate rules.
To create an Extranet Policy object:
1. In the NSM navigation tree, click Object Manager > Extranet Policies. Then click Add
Policy and the New ExtranetPolicyObject window appears.
2. Enter the name of the Extranet Policy: enter Extranet Policy1. Add a comment in the
Comments field.
3. Configure the Extranet Policy object:
•
Click Add Rule. The New - Rule window appears.
•
Specify an ID for the rule.
•
Add a comment for the rule.
•
Click Deny in the Action field.
•
Select a source address in the Source tab.
•
Select a destination address in the Destination tab.
•
Select services in the Service tab.
•
Select the integer IDs that you created in the Custom Policy Field object in the
Options tab.
4. Click OK.
Create the router as an extranet device in the Device Manager. You will need to configure
the IP address of the device, any interfaces, and then bind the extranet policy to the
appropriate interface.
1. In the NSM navigation tree, click Device Manager > Devices.
2. Click New, and select Extranet Device. The New Extranet Device window appears.
3. Configure the extranet device:
•
Enter a name for the device: enter Cisco Router1.
•
Select a color to represent the device.
•
Enter the IP address for the device.
•
Click Show in the Supplemental Data area. Additional fields appear, allowing you
to configure supplemental information for the device, including the netmask,
interfaces, and device root administrator.
•
Click the Add icon in the Interfaces field. The New Extranet Device Interface window
appears.
•
Configure the interface. Enter a name for the interface, and add an IP address, and
an interface mask. Then assign an extranet policy to it: for example, assign the
Extranet Policy1 object you configured previously. Click OK.
•
Configure the device root administrator. Enter the administrator user name, and
password, and specify the script you created previously in the Action field. Click OK.
When you update the device,NSM invokes the scriptyou created. Any XMLoutput appears
in the Job Information window.
Related
Documentation
Device Configuration Settings Overview on page 25•
• Configuring Advanced Properties for ScreenOS Device Details on page 26
Understanding Templates and Groups
Use templates to definea commondevice configuration andthen reusethat configuration
informationacross multiple devices. In a template, you can define onlythose configuration
parameters that you want to set; you do not need to specify a complete device
configuration. Templates provide two benefits:
•
You can configure parameter values for a device by referring to one or more templates
when configuring the device.
•
When you change a parameter value in a template and save the template, the value
also changes for all device configurations that refer to that template.
When you apply a template to a device, NSM applies the template settings to the device.
For example, you can create a template that specifies the IP address of the NTP server
to which all managed security devices synchronize their clocks. You can apply this
template to the configuration of each device in your domain so that all devices use the
same NTP server. You can apply the same template to different types of security devices,
from NetScreen-5XT appliances to NetScreen-5200 systems.
A template contains all possible fields for all possible devices. Not all devices have all
fields. You can apply a template to any device. NSM will ignore any fields that do not
apply to the given device.
A template can refer to other templates, enabling you to combine multiple templates
into a single template. When you make changes to any of the referenced templates,
those changes are propagated through the combined template.
NOTE: For more information on using templates, template limitations, and
exporting and importing devicetemplates,see Networkand SecurityManager
Administration Guide. For instructions on creating and applying templates,
see the Network and Security Manager Online Help topics “Adding Device
Templates” and “Applying Templates.”
•
Using Global Device Templates on page 33
•
Using Device Groups on page 33
Using Global Device Templates
In NSM, you can make global-domain templates available for reference in subdomains.
However, if an administrator disables the Allow use of global templates in subdomains
flag in the preferences, the administrator must also identify and remove all uses of the
global templates in the subdomains. You can do this by removing the template from
subdomain devices with the template operations directive in each relevant subdomain.
Using Device Groups
Use device groups to organize your managed devices, makingit easierfor you to configure
and manage devices within a domain. You can group devices by type (such as all the
NetScreen-5GTs in a domain), by physical location (such as all the security devices in
the SanJose office),or logically (such asall the security devices insales offices throughout
western Europe).
Groups enable you to execute certain NSM operations on multiple security devices at
the same time. For example, if you have a group of the same type of devices running
similar ScreenOS versions, you can upload the firmware on all devices in the group at
the same time. You can also add devices to the NSM UI, place the devices in a group, and
then import the device configurations for all devices in the group at one time.
The devices that you add to a group must exist; that is, you must have previously added
or modeled the devices in the domain. You can group devices before configuring them.
You can add a device to more thanone group. You can also add a group to another group.
NOTE: You cannot apply a template to a group. You must apply templates
to individual devices in a group. If you need to apply the same set of templates
to multiple devices, you can create a single template that includes all the
templates that are to be applied to a device, and then apply the combined
template to each device. For examples on creating a device group or
configuring device information, see Network and Security ManagerAdministration Guide.
Related
Documentation
Device Configuration Settings Overview on page 25•
• Configuring Advanced Properties for ScreenOS Device Details on page 26
• NSM User Interface Overview on page 12
• Understanding NSM User Interface Menus and Toolbars on page 12
Configuring Network Settings Options and Descriptions
The Network screenscontain theoptions that enable thedevice to connect to and operate
in the network. In the NSM navigation tree, click Device Manager > Devices, and then
select a device. In the Device navigation tree, select Network to see the network settings
options.
Table 13 on page 34 describes the detailed configuration methods available for network
settings.
Table 13: Network Settings Options
DescriptionNetwork Settings Options
“Vsys DHCP Enhancement
Overview” on page 355
This optionis available onlyfor NetScreen-5GT Wireless security devices running ScreenOS
5.0.0-WLAN; this device can act as a wireless access point (WAP). The wireless settings
specify how the WAP connects multiple wireless networks or a wireless network to a wired
network.
“Network, Interface, and Security
Modules Supported in Security
Devices” on page 397 (Slot and
Chassis)
“Configuring Virtual Routers
Overview” on page 294
“Configuring Zones and Zone
Properties in ScreenOS Devices
Overview” on page 39
This option is only available for security device systems, such as the NetScreen 5000 line,
ISG1000, ISG2000, SSG520M, and SSG550M, that contain a motherboard or physical
slots in which you can install optional modules. You can view or edit the type of network
module installed in each available slot in the physical device.
A virtual router (VR) supports static routes, dynamic routing protocols, and multicast
protocols. The virtual router configuration includes the configuration for dynamic routing
protocols and multicast protocols. As of ScreenOS 6.2, on high-end platforms you can
change the management zone virtual router to an existing virtual router that is no longer
bound to the trust-vr. The management zone virtual router supports out-of-band
management and segregates firewall management traffic away from production traffic.
A security zone is a specific network segment for which you can control inbound and
outbound traffic. You can configure predefined zones orcreate user-defined security zones.
You can also create a tunnel zone, which is a logical segment to which a VPN tunnel
interface is bound.
“Interface Types in ScreenOS
Devices Overview” on page 50
“Example: Configuring DIPGroups
(NSM Procedure)” on page 100
“About Configuring PPPoE” on
page 135
“Using the PPP Option to
Configure Point-To-Point Protocol
Connections” on page 134
“Configuring a PPPoA Client
Instance” on page 141
“Configuring aNetScreen Address
Change Notification” on page 141
“Interface Failover in ScreenOS
Devices” on page 142
You bind interfaces to predefined or user-defined security zones or to tunnel zones to
permit traffic to pass into or out of the zone. For an interface in Route or NAT mode, you
assign an IP address to the interface.
You can configure a range of IP addresses from which security device can take addresses
when performing NAT on the source IP address of outgoing or incoming IP packets.
This option is only available for some security devices. You can configure PPPoE to enable
the security device to connect to remote sites.
This option is only available for some security devices. You can configure PPP to enable
the security device to connect to remote sites.
On the ADSL interface (available on the NetScreen-5GT ADSL security device), you can
configure a PPPoA client instance with a username, password, and other parameters, and
then bind the instance to the ADSL interface (or subinterface) to enable Internet access
for an internal network.
This option is only available for security devices running ScreenOS 5.x. You configure
NetScreen Address Change Notification to enable the security device to alert NSM of any
change in the IP address assigned by a DHCP or PPPoE server.
This option is only available for some security devices. When there are both primary and
backup interfaces to the Untrust zone, you can configure failover traffic from the primary
to the backup interface, and from the backup to the primary interface.
“Example: Configuring Modem
Connections (NSM Procedure)”
on page 142
“DNS Server Configuration Using
DNS Settings” on page 103
Overview” on page 108
Related
Documentation
• Configuring Zones and Zone Properties in ScreenOS Devices Overview on page 39
• Interface Types in ScreenOS Devices Overview on page 50
• Configuring Physical and Function Zone Interfaces in ScreenOS Devices Overview on
• Interface Network Address Translation Using DIPs on page 67
This option is only available for some security devices. You can connect and configure an
external modem to the RS-232 serial port as a backup dialup interface for traffic to the
Untrust zone.
Before the security device can use DNS for domain name andaddress resolution, you must
configure the addresses for the primary and secondary DNS servers.
This option contains additional network settings you can configure.“Advanced Network Settings
The Device Manager module in Network and Security Manager (NSM) enables you to
configure the managed Juniper Networks security devices in your network. You can edit
configurations after you add or import a managed device, or create configurations when
you model a device. For details about adding, importing, or modeling a device, see the
Network and Security Manager Administration Guide.
This chapter details the device configuration parameters, and provides configuration
examples when possible. For instructions on configuring specific device settings, see the
Network and Security Manager Online Help.
After you edit or create a configuration for a device, you must update the configuration
on the managed device for your changes to take effect. For details on updating devices,
see the Network and Security Manager Administration Guide.
Use security policies to configure firewall and VPN rules that control traffic on your
network. Use the VPN Manager to configure VPNs.
•
Configuring Zones and Zone Properties in ScreenOS Devices Overview on page 39
•
Predefined Screen Options Overview on page 40
•
Configuring Flood Defense Settings for Preventing Attacks on page 41
•
Example: Configuring UDP Flooding Protection (NSM Procedure) on page 43
•
HTTP Components and MS-Windows Defense Method on page 43
•
Protection Against Scans, Spoofs, and Sweeps on page 44
•
IP and TCP/IP Anomaly Detection on page 45
•
Prevention of Security Zones Using Denial of Service Attacks on page 47
•
Malicious URL Protection on page 49
•
Example: Enabling the Malicious URL Blocking Option (NSM Procedure) on page 50
•
Interface Types in ScreenOS Devices Overview on page 50
•
Configuring Physical and Function Zone Interfaces in ScreenOS Devices
Overview on page 52
•
Setting Interface Properties Using the General Properties Screen on page 53
•
Setting WAN Properties Using the WAN Properties Screen on page 54
•
Setting Port Properties Using the Port Properties Screen on page 54
Example: Configuring NetScreen5GT Devices to Permit Internal Hosts (NSM
Procedure) on page 93
•
Example: Configuring NetScreen5GT Devices to Connect to the Web Using the PPPoA
and ADSL Interfaces (NSM Procedure) on page 94
•
Example: Configuring NetScreen5GT Devices as a Firewall Using the PPPoE and ADSL
Interfaces (NSM Procedure) on page 96
•
Wireless Interface on ScreenOS Devices Overview on page 99
•
Configuring DSCP Options Overview on page 99
•
Example: Configuring DIP Groups (NSM Procedure) on page 100
•
DNS Server Configuration Using DNS Settings on page 103
•
Example: Configuring DNS Proxy Entries (NSM Procedure) on page 105
•
Example: Configuring DDNS Settings (NSM Procedure) on page 106
•
Advanced Network Settings Overview on page 108
Configuring Zones and Zone Properties in ScreenOS Devices Overview
The Zone screen is where you can configure predefined zones or create user-defined
security zones. You can also create a tunnel zone, which is a logical segment to which a
VPN tunnel interface is bound.
A security device supports two types of zones:
•
Security zone—A Layer 3 security zone binds to NAT or Route mode interfaces; a Layer
2 security zone binds to Transparent mode interfaces.
NOTE: When you add a device and configure it to operate in Transparent
mode, the L2 zone names appear in the NSM UI without the “ V1-” prefix.
When you update the configuration on the device from the UI, the correct
L2 zone names are configured.
•
Tunnel zone—A zone that binds to a carrier zone.
To add a zone to a security device, in the device navigation tree, select Network > Zone
and add the desired zone. For Security Zones, you might define the name of the zone and
the virtual router in which you want to place the zone; For tunnel zones, you must also
specify the carrier zone, which is the security zone with which the tunnel zone is logically
associated. A carrier zone provides firewall protection to the encapsulated traffic.
For more information about zones on security devices, refer to the Concepts & ExamplesScreenOS Reference Guide: Fundamentals.
You can configure general properties and SCREEN attack protection for predefined or
custom Security Zones.
For predefined zones, some general properties are already configured for you, such as
the Name and Virtual Router settings. For custom security zones, you can enter a name
and select the virtual router that handles traffic to and from the new zone.
For both predefined and custom zones, you can configure the settings as described in
Table 14 on page 40.
Table 14: Zone General Properties
DescriptionCustom Zone Settings
TCP/IP Reassembly for ALG
TCP-RST
Asymmetric VPN
Related
Documentation
Predefined Screen Options Overview on page 40•
• Interface Types in ScreenOS Devices Overview on page 50
• Setting Interface Properties Using the General Properties Screen on page 53
Select this option when using Application Layer Gateway (ALG) filtering on the
security device. By reassembling fragmented IP packets and TCP segments, the
security device can accurately filter traffic.
Select this option to block traffic between hosts within the security zone.Block Intrazone Traffic
Select this option to return a TCP segment with the RESET flag set to 1 when a TCP
segment with a flag other than SYN is received.
In asymmetrical encryption, one key in a pair is used to encrypt and the other to
decrypt VPNtraffic. When configuringmultiple VPN tunnels to enabletunnel failover,
enable this option for the Trust zones on each security device in the VPN so that if
an existing session established on one VPN tunnel transfers to another, the security
device at the other end of the tunnel does not reject it.
Predefined Screen Options Overview
Typically, a network forwarding device such as a router or switch does not reassemble
fragmented packets that it receives. It is the responsibility of the destination host to
reconstruct the fragmented packets when they all arrive. Because the purpose of
forwarding devices is the efficient delivery of traffic, queuing fragmented packets,
reassembling them, refragmenting them, and then forwarding them is unnecessary and
inefficient. However, passing fragmented packets through a firewall is insecure. An
attacker can intentionally break up packets to conceal traffic strings that the firewall
otherwise would detect and block.
You can enable predefined screen options that detect and block various kinds of traffic
that the security device determines to be potentially harmful. To secure all connection
attempts, security devices use a dynamic packet filtering method known as stateful
inspection. Using this method, the device notes various components in a packet header,
such as source and destination IP addresses, source and destination port numbers, and
packet sequence numbers. The device uses this information to maintain the state of
each session traversing the firewall.
A security device uses stateful inspection to secure a zone by inspecting, and then
permitting or denying, all connection attempts that require crossing an interface from
and to that zone. To protect against attacks from other zones, you can enable defense
mechanisms known as screen attack protections, which detect and deflect TCP, UDP,
IP, and ICMP packet attacks. Common screen attacks are SYN floods, packet fragments,
and SYN and FIN bits set. When screen attack protections are enabled, the device
generates a screen alarm log entry for each violation.
To configure Screen attack protections, open a device configuration and select Network> Zone to display the Zone configuration. Double-click a zone to display the Predefined
Zone dialog box and select SCREEN.
NOTE: For instructions for configuring the SCREEN options, see the Network
and Security Manager Online Help topic “ Configuring SCREEN Options.” For
information about the SCREEN alarm log entries that enabling these options
can generate, see the Network and Security Manager Administration Guide.
Related
Documentation
Configuring Flood Defense Settings for Preventing Attacks on page 41•
• HTTP Components and MS-Windows Defense Method on page 43
Configuring Flood Defense Settings for Preventing Attacks
Configure flood defense settings to prevent denial-of-service (DoS) attacks from
overwhelming the security device with large numbers or floods of certain packet types.
You can protect targets in the security zone from ICMP, SYN, and UDP floods.
•
Configuring ICMP Flooding Protection on page 41
•
Configuring SYN Flooding Protection on page 41
•
Configuring UDP Flooding Protection on page 42
Configuring ICMP Flooding Protection
An ICMP flood occurs when incoming ICMP echo requests overload a target system with
so many requests that the system expends all its resources responding until it can no
longer process valid network traffic. You can protect targets in the security zone from
ICMP floods by setting apacket-per-secondthreshold for ICMPrequests (default setting:
1000 packets per second). When the ICMP packet flow exceeds the defined threshold,
the security device ignores further ICMP echo requests for the remainder of that second
and the next second.
Configuring SYN Flooding Protection
A SYN flood occurs when a target becomes so overwhelmed by SYN segments initiating
invalid connection requests that it can no longer process legitimate connection
requests.You can configure thresholds for the zone that, when exceeded, prompt the
security device to begin acknowledging incoming SYNsegments andqueuing incomplete
connection requests. Incomplete connection requests remain in the queue until the
connection completes or the request times out.
To protect targets in the security zone from SYN floods, enable SYN Flood Protection
and configure the thresholds for SYN segments passing through the zone as described
in Table 15 on page 42.
Table 15: Thresholds for SYN segments
Your ActionThreshold Types
Threshold
Alarm Threshold
Source Threshold
Destination Threshold
Timeout Value
Queue Size
Configure the number of SYN packets (TCP segments with the SYN flag set) per second
required for the security device to begin SYN proxy. This threshold is the total number of
packets passing through the zone, from all sources to all destinations.
Configure the number of proxied TCP connection requests required to generate an alarm
in an alarm log entry for the event.
Configure the number of SYN packets per second from a single IP address required for
the security device to begin rejecting new connection requests from that source.
Configure the number of SYN packets per second to a single IP address required for the
security device to begin rejecting new connection requests to that destination.
Configure the number ofseconds the securitydevice holds an incomplete TCP connection
attempt in the proxied connection queue.
Configure the number of proxied TCP connection requests held in the proxied connection
queue before the security device begins rejecting new connection requests.
Configuring UDP Flooding Protection
Security devices currently support UDP for incoming SIP calls. To protect targets in the
security zone against UDP flooding by incoming SIP traffic, enable UDP Flooding
Protection.The securitydevice canlimit the number of UDP packets that can be received
by an IP address, preventing incoming SIP calls from overwhelming a target.
SIP signalingtraffic consists of request and response messages between client and server
and uses transport protocols such as UDP or TCP. The media stream carries the data
(for example, audio data), and uses Application Layerprotocols such as RTP(Real-Time
Transport Protocol) over UDP.
Related
Documentation
Predefined Screen Options Overview on page 40•
• HTTP Components and MS-Windows Defense Method on page 43
• Protection Against Scans, Spoofs, and Sweeps on page 44
NOTE: UDP Flood Protection appears only for devices running ScreenOS 5.1
and later.
In this example, enable UDP Flooding Protection and set a threshold of 80,000 per
second for the number of UDP packets that can be received on IP address 1.1.1.5 in the
Untrust zone. When this limit is reached, the device generates an alarm and drops
subsequent packets for the remainder of that second.
1. Add a NetScreen-208 security device. Choose Model when adding the device and
configure the device as running ScreenOS 5.1 or later.
2. In the device navigation tree, select Network > Zone. Double-click the Untrust zone.
The General Properties screen appears.
3. In the zone navigation tree, select Screen > Flood Defense, and then click the UDP
Flood Defense tab.
4. Select UDP Flood Protection and ensure that the threshold is set to 1000.
5. Click OK.
Chapter 3: Network Settings
6. Click the Add icon to display the New Destination IP based UDP Flood Protection
dialog box. Configure the following options, and then click OK:
•
For Destination IP, enter 1.1.1.5.
•
For Threshold, enter 80000.
•
Click OKto save your changesto the zone,and thenclick OKagain to save your changes
to the device.
Related
Documentation
Configuring Flood Defense Settings for Preventing Attacks on page 41•
• Predefined Screen Options Overview on page 40
• Interface Types in ScreenOS Devices Overview on page 50
HTTP Components and MS-Windows Defense Method
Attackers might use HTTP to send ActiveX controls, Java applets, .zip files, or .exe files
to a targetsystem, enabling them to loadand control applications on hosts in a protected
network. You can configure the security device to block the components (the device
monitors incoming HTTP headers for blocked content types) as described in Table 16
on page 43.
Table 16: HTTP Components
DescriptionHTTP Components
Java
Java applets enable Web pages to interact with other programs. The applet runs by
downloading itself to the Java Virtual Machine (VM) on a target system. Because attackers
can program Java applets to operate outside the VM you might want to block them from
passing through the security device.
Microsoft’s ActiveX enables differentprograms to interact with each other and might contain
Java applets, .exe files, or .zip files. Web designers use ActiveX to create dynamic and
interactiveWeb pagesthat function similarly across different operating systems andplatforms.
However, attackers might use ActiveX to gain control over a target computer system. When
blocking ActiveX components, the security devicealso blocks Java applets, .exe files, and .zip
files whether they are contained within an ActiveX control or not.
Files with .zip extensions contain one or more compressed files, some of which might be .exe
files or other potentially malicious files. You can configure the security device to block all .zip
files from passing through the zone.
Files with .exeextensions might containmalicious code.You canconfigure the security device
to block all .exe files from passing through the zone.
MS-Windows Defense
Microsoft Windows contains the WinNuke vulnerability, which can be exploited using a
DoS attack targeting any computer on the Internet running MicrosoftWindows. Attackers
can send a TCP segment (usually to NetBIOS port 139 with the urgent (URG) flag set to
a host with an established connection; this packet causes a NetBIOS fragment overlap
that can crash Windows systems.
To protect targets in the security zone from WinNuke attacks, configure the security
device to scan incoming Microsoft NetBIOS session service (port 139) packets for set
URG flags. If such a packet is detected, the security device unsets the URG flag, clears
the URG pointer, forwards the modified packet, and generates a log entry for the event.
Related
Documentation
Protection Against Scans, Spoofs, and Sweeps on page 44•
• IP and TCP/IP Anomaly Detection on page 45
• Prevention of Security Zones Using Denial of Service Attacks on page 47
Protection Against Scans, Spoofs, and Sweeps
Attackers often perform address sweeps and/or port scans to gain targeted information
about a network. After they have identified trusted addresses or ports, they might launch
an attack against the network by spoofing a trusted IP address. To protect targets in the
zone from sweeps, scans, and spoofing attempts, configure the detection and blocking
settings as described in Table 17 on page 45.
Attackers can insert a bogus source address in a packet header to make the packet
appear to come from a trusted source. When the interfaces in the zone operate in
Route or NAT mode, the security device relies on route table entries to identify IP
spoofing attempts. When the interfaces in the zone operate in Transparent mode,
the security device relies on address book entries to identify IP spoofing attempts.
•
To enable interface-based IP spoofing protection, configure the security device
to drop packets that have source IP addresses that do not appear in the route
table.
•
To enable zone-based IP spoofing protection (supported on devices running
ScreenOS 5.2), configure the security device to drop packets whose source IP
addresses do not appear in the selected zone. If you are routing traffic between
two interfaces in the same zone, you should leave this option disabled
(unchecked).
An address sweep occurs when one source IP address sends 10 ICMP packets to
different hosts within a defined interval. If a host responds with an echo request,
attackers have successfully discovered a target IP address. You can configure the
security device to monitor ICMP packets from one remote source to multiple
addresses. For example, ifa remotehost sends ICMP traffic to 10 addressesin 0.005
seconds (5000 microseconds), the security device rejects the 11th and all further
ICMP packets from that host for the remainder of that second.
A port scan occurs when one source IP address sends IP packets containing TCP
SYN segments to 10 different ports at the same destination IP address within a
defined interval (5000 microseconds is the default). If a port responds with an
available service, attackers have discovered a service to target. You can configure
the securitydevice to monitor TCP SYN segments fromone remote source to multiple
addresses. For example, if a remote host scans 10 ports in 0.005 seconds (5000
microseconds),the securitydevice rejects allfurther packets from the remotesource
for the remainder of that second.
Related
Documentation
Configuring Flood Defense Settings for Preventing Attacks on page 41•
• IP and TCP/IP Anomaly Detection on page 45
• Prevention of Security Zones Using Denial of Service Attacks on page 47
IP and TCP/IP Anomaly Detection
The Internet Protocol standard RFC 791, Internet Protocol specifies a set of eight options
that provide special routing controls, diagnostic tools, and security. Attackers can
misconfigure IP options toevade detection mechanisms and/or performreconnaissance
on a network.
To detect (and block) anomalous IP fragments as they pass through the zone, configure
the settings as described in Table 18 on page 46.
Select this option to block packets with an IP datagram header that contains an incomplete
or malformed list of IP options.
Select this option to block packets in which the IP option list includes option 4 (Internet
Timestamp). The timestamp option records the time when each network device receives the
packet during its trip from the point of origin to its destination, as well as the IP address of
each network device and the transmission duration of each one. If the destination host has
been compromised, attackers can discover the network topology and addressing scheme
through which the packet passed.
Select this option for hosts to send security, compartmentation, TCC (closed user group)
parameters, and Handling Restriction Codes compatible with U.S. Department of Defense
requirements.
Select this option to block packets in which the IP option is 8 (Stream ID). Packets must use
the 16-bit SATNET stream identifier to be carried through networks that do not support the
stream concept.
Select this option to block packets in which the IP option is 7 (Record Route). Attackers might
use this option to record the series of Internet addresses through which a packet passes,
enabling them to discover network addressing schemes and topologies.
Select this option to block packets in which the IP option is 3 (Loose Source Routing). The
Loose Source Routing option enables the packet to supply routing information used by the
gateways when forwarding the packet to the destination; the gateway or host IP can use any
number of routes from other intermediate gateways to reach the next address in the route.
Strict Source IP Option
Detection
Source Route IP Option Filter
Select this option to block packets in which the IP option is 9 (Strict Source Routing). The
Strict Source Routing enables the packet to supply routing information used by the gateways
when forwarding the packet tothe destination; thegateway or hostIP mustsend the datagram
directly to the next address in the source route, and only through the directly connected
network indicated in the next address to reach the next gateway or host specified in the route.
Select this option to block all IP traffic that contains the Source Route option. The Source
Route option enables the IP header to contain routing information that specifies a different
source than the header source. Attackers can use the Source Route option to send a packet
with a phony source IP address; all responses to the packet are sent to the attacker’s real IP
address.
Attackers can craft malicious packets (and packet fragments) that contain anomalies
designed to bypassdetection mechanisms andgain targeted information about anetwork.
Because different operating systems (OS) respond differently to anomalous packets,
attackers can determine the OS running on a target by examining the target’s response
to the packet. To protect targetsin the security zonefrom thesereconnaissance attempts,
you can configure the settings as described in Table 19 on page 47.
Selectthis optionto detect TCPfragments that containa SYN flag. A SYNflag in TCPsegment
initiates a connection but does not usually contain a payload. Because the packet is small, it
should not be fragmented.
Select this option to detect TCP segment headers that do not have at least one flag control
set.
Select this option to detect packets in which both the SYN and FIN flags are set. The SYN flag
synchronizes sequence numbers to initiate a TCP connection and the FIN flag indicates the
end of data transmission to finish a TCP connection, so both flags should never be set in the
same packet.
Select this option to detect packets in which the FIN flag is set, but the ACK flag is not. The
FIN flag signals the conclusion of a session and terminates the connection; normally the ACK
flag is also set to acknowledge the previous packet received.
Select this option to drop packets in which the protocol field is set to 101 or greater. Protocol
types 101 and higher are currently reserved and undefined.
Prevention of Security Zones Using Denial of Service Attacks on page 47•
• Malicious URL Protection on page 49
• Example: Enabling the Malicious URL Blocking Option (NSM Procedure) on page 50
Prevention of Security Zones Using Denial of Service Attacks
Attackers use denial-of-service (DoS) attacks to overwhelm a target with traffic from a
single source IP, preventing the target from processing legitimate traffic. A more advance
version of a DoSattack is a distributed DoS (DDoS)attack, in which attackersuse multiple
source addresses. Typically, attackers use a spoofed IP address or a previously
compromised IP address as the source address to avoid detection.
To protecttargets in the security zone fromDoS and DDoS attacks, configure thesettings
as described in Table 20 on page 47.
Table 20: Security Zones Prevention using DoS
Security Zones Setting
Options
Ping of Death Attack Protection
Your Action
Select this option to reject oversized and irregular ICMP packets. Attackers might send a
maliciously crafted ping (ICMP packet) that is larger than the allowed size of 65,507 bytes
to cause a DoS.
Table 20: Security Zones Prevention using DoS (continued)
Security Zones Setting
Options
Your Action
Teardrop Attack Protection
Block ICMP Fragments
Block Large ICMP Packets
Block IP Packet Fragments
Land Attack Protection
Select this option to send teardrop attack packets, designed to exploit vulnerabilities in the
reassembly of fragmented IP packets. In the IP header, the fragment offset field indicates
the starting position, or “offset,” of the data contained in a fragmented packet relative to
the data of the original unfragmented packet. When the sum of the offset and size of one
fragmented packet differ from that of the next fragmented packet, the packets overlap,
and the server attempting to reassemble the packet can crash.
Select this option to block ICMP packets with the More Fragments flag set or with an offset
value in the offset field. ICMP packets are typically very short messages containing error
reports or network probe information. Because ICMP packets do not carry large payloads,
they should not be fragmented.
Select this option to block ICMP packets larger than 1024 bytes. ICMP packets are typically
very short messages containing error reports or network probe information; a large ICMP
packet is suspicious.
Select this option to block IP fragments destined for interfaces in the security zone. As
packetstraversedifferent networks, it is sometimes necessary to break apacketinto smaller
pieces (fragments) based upon the maximum transmission unit (MTU) of each network.
Attackers can use IP fragments to exploit vulnerabilities in the packet reassembly code of
specific IP stack implementations.
Select this option to block SYN floods and IP spoofing combinations. Attackers can initiate
a land attack by sending spoofed SYN packets that contain the IP address of the target as
both the destination and source IP address. The target responds by sending the SYN-ACK
packet to itself, creating an empty connection that lasts until the idle timeout value is
reached; in time, these empty connections overwhelm the system.
SYN-ACK-ACK Proxy Protection
Source IP-Based Session Limit
Destination IP-Based Session
Limit
Related
Documentation
• Protection Against Scans, Spoofs, and Sweeps on page 44
• Predefined Screen Options Overview on page 40
Selectthis optionand configure athreshold to prevent SYN-ACK-ACKsessions from flooding
the securitydevice session table. After successfully receiving alogin prompt fromthe security
device, attackerscan continueinitiating SYN-ACK-ACK sessions,flooding thesecurity device
session table and causing the device to reject legitimate connection requests. When proxy
protection is enabled and the number of connections from the same IP address reaches
the SYN-ACK-ACK proxy threshold, the security device rejects further connection requests
from that IP address. By default, the thresholdis 512 connections fromany singleIP address;
you can customize this threshold (1 to 250,000) to meet your networking requirements.
Select this option andconfigure athreshold to limit thenumber of concurrent sessions from
the same source IP address. The default threshold is 128 sessions; you can customize this
threshold to meet your networking requirements.
Select this option and configure a threshold to limit the number of concurrent sessions to
the same destination IP address. The default threshold is 128 sessions; you can customize
this threshold to meet your networking requirements.
Enable malicious URL protection on a security device to drop incoming HTTP packets
that reference URLs with specificuser-defined patterns. You can define up to 48 malicious
URL stringpatterns per zone, each of which can be up to 64 characters long, for malicious
URL protection at the zone level. When the malicious URL blocking feature is selected,
the security device examines the data payload of all HTTP packets. If it locates a URL
and detects that the beginning of its string—up to a specified number of
characters—matches the pattern you defined,the device blocks that packetfrom passing
the firewall.
A resourceful attacker, realizing that the string is known and might be guarded against,
can deliberately fragment the IP packets or TCP segments to make the pattern
unrecognizable during a packet-by-packet inspection. However, security devices use
Fragment Reassembly to buffer fragments in a queue, reassemble them into a complete
packet, and then inspect that packet for a malicious URL. Depending on the results of
this reassembly process and subsequent inspection, the device performs one of the
following steps:
Chapter 3: Network Settings
•
If the device discovers a malicious URL, it drops the packet and enters the event in the
log.
•
If the device cannot complete the reassembly process, a time limit is imposed to age
out and discard fragments.
•
If the device determines that the URL is not malicious but the reassembled packet is
too big to forward, thedevice fragments that packet into multiple packets and forwards
them.
•
If the device determines that the URL is not malicious and does not need to fragment
it, it then forwards the packet.
To configure a malicious URL string, you must specify the following properties:
•
Malicious URL ID—Enter the ID that you want to use to identify the URL string.
•
HTTP Header Pattern—Enter the malicious URL string (also called a pattern) that you
want the security device to match.
•
Minimum Length Before CRLF—Enter the number of characters in the URL string
(pattern)that mustbe presentin a URL—starting fromthe firstcharacter—fora positive
match (not every character is required for a match). CRLF represents “carriage
return/line feed” ; HTTP uses a CR or LF character to mark the end of a code segment.
For more information about malicious URLs on security devices, refer to the Concepts &Examples ScreenOS Reference Guide: Attack Detection and Defense Mechanisms.
Related
Documentation
Example: Enabling the Malicious URL Blocking Option (NSM Procedure) on page 50•
• Predefined Screen Options Overview on page 40
• Interface Types in ScreenOS Devices Overview on page 50
Example: Enabling the Malicious URL Blocking Option (NSM Procedure)
In this example, you define three malicious URL strings and enable the malicious URL
blocking option. Then, enable fragment reassembly for the detection of the URLs in
fragmented HTTP traffic arriving at an Untrust zone interface.
1. Add a NetScreen-5GT security device. Choose Model when adding the device and
configure the device as running ScreenOS 5.x.
2. In the device navigation tree, select Network > Zone. Double-click the Untrust zone.
The General Properties screen appears.
3. Select TCP/IP Reassembly for ALG.
4. In the Zone navigation tree, select Mal-URL. Configure three malicious URL strings:
a. Click the Add icon to display the new Malicious URL ID dialog box. Configure the
following and click OK:
•
For Malicious URL ID, enter Perl.
Related
Documentation
•
For HTTP Header Pattern, enter scripts/perl.exe.
•
For Minimum Length Before CRLF, enter 14.
b. Click the Add icon to display the new Malicious URL ID dialog box. Configure the
following options, and then click OK:
•
For Malicious URL ID, enter CMF.
•
For HTTP Header Pattern, enter cgi-bin/phf.
•
For Minimum Length Before CRLF, enter 11.
c. Click the Add icon to display the new Malicious URL ID dialog box. Configure the
following options, and then click OK:
•
For Malicious URL ID, enter DLL.
•
For HTTP Header Pattern, enter 210.1.1.5/msadcs.dll.
•
For Minimum Length Before CRLF, enter 18.
•
Click OK to save your changes to the zone, and then click OK again to save the
device configuration.
Predefined Screen Options Overview on page 40•
• Malicious URL Protection on page 49
Interface Types in ScreenOS Devices Overview
The Interface screen displays the physical interfaces available on the security device.
Some security devices support functional zone interfaces, which are either a separate
physical MGMT interface for management traffic or a high availability (HA) interface
used to link two devices together to form a redundant group or cluster.
Interfaces and subinterfaces enable traffic to enter and exit a security zone. To enable
network traffic to flow in and out of a security zone, you must bind an interface to that
zone and, if it is a Layer 3 zone, assign it an IP address. You can assign multiple interfaces
to a zone, but you cannot assign a single interface to multiple zones.
NOTE: Not all devices support all features described in this guide. For
device-specific datasheets that include an updated feature list for each
device, go to: http://www.juniper.net/products/integrated/dsheet/. This link
is provided for your convenience and may change without notice. You can
also find this information by going to the Juniper website
(http://www.juniper.net/).
Interface Types
You can add the interfaces on a security device as described in Table 21 on page 51.
Table 21: Interface Types
Aggregate interface
Multilink interface
Virtual security interfaces (VSIs)
Redundant interface
Subinterface
Tunnel interface
DescriptionInterface Types
A logical interface that combines two or more physical interfaces on the device, for the
purpose of sharing the traffic load to a single IP address. This type of interface is only
supported on certain security device systems.
On available devices, you configure and access multiple serial links called a bundle,
through a virtual interface called a multilink interface. The multilink interface emulates
a physical interface for the transport of frames.
A logical interface that emulates a physical interface and is always in the up state.Loopback interface
The virtual interfaces that two security devices share when forming a virtual security
device (VSD) in a high availability cluster.
Two physical interfaces bound to the same security zone. One of the two physical
interfaces acts as the primary interface and handles all the traffic directed to the
redundant interface; the other physical interface acts as a backup.
A logicaldivision of a physical interface. A subinterface borrows the bandwidth it needs
from the physical interface.
Acts as a doorway to a VPN tunnel. Traffic enters and exits a VPN tunnel through a
tunnel interface. When you configure a tunnel interface, you can also encapsulate IP
multicast packets in GREv1 unicast packets.
ADSL interface
A NetScreen-5GT ADSL security device uses ATM as its Transport Layer. The interface
can support multiple permanent virtual circuits (PVCs) on a single physical line. Before
you can configure theadsl1 interface,however, you mustobtain the DSLAMconfiguration
details for the ADSL connection from the service provider.
A logical division of a physical WAN interface. This type of interface is only supported
on available devices.
Integrated Services Digital Network (ISDN) is an internationalcommunicationsstandard
for sending voice, video, and data over digital telephone lines. ISDN in NSM supports
Basic Rate Interface (BRI).
A NetScreen-5GT Wireless security device interface handles wireless traffic to and
from that wireless access point (WAP).
For information about configuring specific interface types, see “Example: Configuring an
Aggregate Interface (NSM Procedure)” on page 77.
Related
Documentation
Configuring Physical and Function Zone Interfaces in ScreenOS Devices Overview on
•
page 52
• Setting Interface Properties Using the General Properties Screen on page 53
• Setting Physical Link Attributes for Interfaces on page 55
Configuring Physical and Function Zone Interfaces in ScreenOS Devices Overview
In the Interface screens, you can configure the physical interfaces and, if available, the
function zone interfaces. Double-click the interface in the Interface screen. For physical
and function zone interfaces, you can configure the following settings:
•
Interface General Properties
•
WAN Properties
•
Port Properties
•
Interface Advanced Properties
•
Interface Service Options
•
Dynamic Host Configuration Protocol
•
Interface Protocol
•
For information about configuring dynamic routing protocols (BGP, RIP, OSPF,
OSPFv3) inthe virtual router andon the interfaces, see “OSPF Protocol Configuration
Overview” on page 313.
•
For information about configuring multicast routing protocols (PIM-SIM, IGMP,
IGMP-Proxy) andmulticastroute entries,see “Multicast Route Overview” onpage 337.
For more information about interfaces on security devices, see the “ Fundamentals”
volume in the Concepts & Examples ScreenOS Reference Guide.
Related
Documentation
Interface Types in ScreenOS Devices Overview on page 50•
• Setting Physical Link Attributes for Interfaces on page 55
• Setting Interface Properties Using the General Properties Screen on page 53
Setting Interface Properties Using the General Properties Screen
Use the General Properties screen to configure the following properties on an interface:
•
Name of the interface.
•
Subinterface type.
•
Zone to which the interface is bound
•
VLAN tag
•
Bundle into—Configures virtual interfaces on a Multilink Frame Relay (MLFR) for a
user-to-network iterface (UNI) on available devices.
•
Encapsulation Type—Configures the following encapsulation protocols on WAN
interfaces: Frame Relay, Multilink Frame Relay (MLFR), Point-to-Point Protocol (PPP),
Multilink PPP (MLPPP), and Cisco High-Level Data Link Control (HDLC) on available
devices.
•
Loopback interface group to which the interface belongs.
•
Redundant interface group to which the interface belongs.
•
IP address, netmask, and gateway of the interface.
NOTE: NSM does not permit you to unset the management IP aAddress.
You can, however, still do this on each separate device out of band, using
the CLI, the Web UI, or the supplemental CLI . See “Configuring Features
Unsupported in NSM Using Supplemental CLI Options Overview” on
page 129.
•
Mode of the interface (NAT or route)
•
Full support of IPv6 features for VLAN and loopback interfaces on ISG Series devices.
See the Concepts & Examples ScreenOS Reference Guide: IPv6 Configuration.
•
DNS proxy (for details, see“DNS ServerConfigurationUsing DNSSettings” on page 103).
On ADSL interfaces, you can configure ADSL options such as VPI and VCI, multiplexing
mode as part of the General Properties. See “ADSL Interface in ScreenOS Devices” on
page 88.
On wireless interfaces, you also shut down the interface by selecting the ShutdownInterface option.
Some interfaces, such as the VLAN1 or serial interface, accept service option settings as
part of the General Properties for the interface. For information about service options,
see “Enabling Management Service Options for Interfaces” on page 56.
Deny routing to this interface.
Routing to ACVPN-dynamic.
Related
Documentation
Configuring Physical and Function Zone Interfaces in ScreenOS Devices Overview on
•
page 52
• Setting Physical Link Attributes for Interfaces on page 55
Setting WAN Properties Using the WAN Properties Screen
Use the WAN Properties screen to configure the following WAN properties for port cards
on available devices:
•
Clocking
•
Hold time (Up)
•
Hold time (Down)
For more information about configuring WAN properties for port cards, refer to the
ScreenOS Wide Area Network Interfaces and Protocols Reference.
Related
Documentation
Setting Interface Properties Using the General Properties Screen on page 53•
• Setting Port Properties Using the Port Properties Screen on page 54
• Using MLFR and MLPPP Options on page 55
Setting Port Properties Using the Port Properties Screen
Use the Port Properties screen to configure the following properties for port cards on
available devices:
For more information about configuring properties, refer to the ScreenOS Wide AreaNetwork Interfaces and Protocols Reference.
Related
Documentation
Using MLFR and MLPPP Options on page 55•
• Setting Interface Properties Using the General Properties Screen on page 53
• Setting Physical Link Attributes for Interfaces on page 55
Using MLFR and MLPPP Options
Use theMLFR andMLPPP screens to change thedefault Frame Relay andPPP properties
on a multilink interface. For more information about configuring Frame Relay properties,
refer to the ScreenOS Wide Area Network Interfaces and Protocols Reference.
Related
Documentation
Setting Port Properties Using the Port Properties Screen on page 54•
• Setting Physical Link Attributes for Interfaces on page 55
Setting Physical Link Attributes for Interfaces
Set attributes of the physical link for the interface:
•
Physical Settings.
•
ExtendedBandwidth Settings—Use theEgress Bandwidth options to setthe minimum
(or guaranteed) and maximum bandwidth allowed to pass through the security
device. Be careful not to allocate more bandwidth than the interface can support
because you might lose data if the guaranteed bandwidth on contending policies
surpasses the traffic bandwidth set on the interface.
For security devices running ScreenOS 5.3, you canalso manage the flow oftraffic through
the security device by limitingbandwidth atthe pointof ingress.To configure the maximum
amount of traffic allowed at the point of ingress interface, set the number of kilobits per
second (kbps) using the Ingress Minimum Bandwidth field.
For more information about configuring traffic shaping parameters, see “Allocating
Network Bandwidth Using Traffic Shaping Options” on page 119.
•
Holddown Time—Use this option to configure the amount of time (in milliseconds)
that the security device uses to bring the interface up or down after detecting a change
in the link status.
•
Bring Down Link—Select this option to bring down the physical link to the interface.
Enable Webauth—Select thisoption toenable device administrators to authenticate
management connections to the device using WebAuth.
•
WebAuth IP—Enter the IP address of the WebAuth service on the interface.
•
Allow Webauth via SSL only (ScreenOS 5.1 and later only)—Select this option to
require WebAuth users to use SSL when connecting to the WebAuth IP address on
a device running ScreenOS 5.1 and later. When this option is disabled, device
administrators can access the WebAuth IP address of the interface using clear text.
NOTE: When you enable WebAuth, you must also enable SSL as a service
option for the interface. For details, see “Enabling Management Service
Options for Interfaces” on page 56.
•
Gratuitous ARP—To avoid G-ARP attacks by allowing users to enable or disable
G-ARP on devices running on ScreenOS 6.1 or later.
Deny Routing.
•
Port Settings.
•
Proxy ARP Entry—Import ARP traffic to the correct VSI by allowing the administrator
to set the proxy ARP entry with lower and upper IP addresses. By adding a proxy ARP
entry onan interface, ScreenOS imports thetraffic that is destined to the IP range using
this interface.
Related
Documentation
Interface Network Address Translation Using VIPs on page 65•
• Interface Network Address Translation Using DIPs on page 67
Enabling Management Service Options for Interfaces
Enable management serviceoptions forthe interface as described in Table 22on page56.
Table 22: Management Service Options
Your ActionService Options
Web
Telnet
Select this option to enable the interface to receive HTTP traffic for management from
the Web UI.
Select this option to enable Telnet manageability. A terminal emulation program for
TCP/IP networks such as the Internet, Telnet is a common way to remotely control
network devices.
SSH
Administer the security device from an Ethernet connection or a dial-in modem using
SSH. You musthave anSSH client thatis compatible SSHv1.5. These clients areavailable
for Windows 95 and later, Windows NT, Linux, and UNIX. The security device
communicates withthe SSHclient throughits built-inSSH server,which provides device
configuration and management services. Selecting this option enables SSH
manageability.
Select this option to enable SNMP manageability. The security device supports both
SNMPv1 andSNMPv2c, andall relevant Management Information Base II(MIB II)groups,
as defined in RFC1213.
Select this option to enable the interface to receive HTTPS traffic for secure
management of the security device using the Web UI. Additionally, when this option is
enabled, you can also require WebAuth users to use SSL when connecting to the
WebAuth IP address on a device running ScreenOS 5.1 and later.
Select this option to enable the interface to receive NSM traffic.Global Pro (Security Manager)
Select this option to enable the interface to respond to an ICMP echo request, or ping,
which determines whether a specific IP address is accessible over the network.
Select this option to restore access that has been blocked by an unacknowledged
identification request. Services like Mail and FTP send identification requests. If they
receive no acknowledgement, they send the request again. While the request is
processing, there is no user access. The Ident-reset option sends a TCP reset
announcement in response to an IDENT request to port 113.
Select this option to enable the interface to handle NSGP traffic. When enabled, you
can also select to enforce IPsec authentication for NSGP traffic.
Setting Interface Properties Using the General Properties Screen on page 53•
• Setting Physical Link Attributes for Interfaces on page 55
Setting DHCPv6 Overview
An IPv6 router can only be a DHCPv6 server and an IPv6 host can only be a DHCP client.
As a DHCPv6 client, the interface can makethe following requestsfrom a DHCPv6 server:
•
Delegation of long-lived prefixes across an administrative boundary—The server does
not have to know the topology of the targeted local network. For example, an ISP can
use DHCPv6 to assign prefixes to downstream networks through downstream DHCP
clients. To speed up the client/server interaction, the client can request rapid commit
(if enabled). Rapid commit reduces the number of messages from four to two.
•
IP addresses of available DNS servers—The interface can also request DNS search-list
information. This list contains partial domain names, which assist DNS searches by
concatenating entered usernames to the domain names.
As a DHCPv6 server, the interface can provide both of these services to a DHCPv6 client.
To speed up prefix delegation, an IPv6 router configured to be a DHCPv6 server can
support a rapid commit option. You can also set a server preference option.
In the DHCPv6 screen, you can configure options such as a device-unique identification
(DUID), an identity association for prefix delegation identification (IAPD-ID), prefix
features, a server preference, a DHCPv6 server, a DHCPv6 client, and a DHCPv6 relay
agent
Related
Documentation
Configuring Custom DHCP Options (NSM Procedure) on page 59•
• Using Interface Protocol on page 61
Example: Assigning TCP/IP Settings for Hosts Using DHCP (NSM Procedure)
The Dynamic Host Configuration Protocol (DHCP) automatically assigns TCP/IP settings
for the hosts on the network. Different security devices support different DHCP roles:
•
DHCP clients receive a dynamically assigned IP address.
•
DHCP servers allocate dynamic IP addresses to clients.
•
DHCP relay agents receive information from a DHCP server and relay that information
to clients.
Some devices can simultaneously act as a DHCP client, server, and relay agent.
To assign TCP/IP settings to hosts using DHCP:
1. In the NSM navigation tree, select Device Manager > Devices.
2. Select a security device and then double-click the device on which you want to define
forced timeout. The device configuration appears.
3. In the device navigation tree, select Network > Interface.
4. Double-click a trust interface. The General Properties screen appears.
5. Select DHCP in the navigation tree, and for the DHCP Mode, select Server.
6. Configure the server settings as follows:
•
For DHCP Server Auto Processing, select Enable DHCP Server.
•
For DNS #1, #2, and #3, enter 1.1.1.1.
•
For Domain Name, enter acme.com.
•
For Client Gateway, enter 1.1.1.1.
•
For Lease Time (Minutes), the default is 4320 minutes.
•
For Netmask, the default is 0.
•
For NetInfo Server #1 and Server #2, enter 1.1.1.1.
Setting Interface Properties Using the General Properties Screen on page 53•
• Interface Types in ScreenOS Devices Overview on page 50
• Configuring Custom DHCP Options (NSM Procedure) on page 59
Configuring Custom DHCP Options (NSM Procedure)
When configuring a DHCP server, you can also configure custom DHCP options to handle
address assignment for voice-over-IP (VoIP) phones.
NOTE: Custom DHCP options are not supported on the NetScreen-500, the
NetScreen-5200, the NetScreen-5400, the ISG1000 and the ISG2000.
A custom DHCP option contains:
•
Option Name—A user-defined, unique name that identifies the custom option.
•
Code—An arbitrary integer that represents the option type. Use the option code to
represent the custom option you want to configure. For each DHCP server, you can
configure an unlimited number of custom DHCP options; however, the option code for
each custom option must be unique, and cannot match the option code fora predefined
option (DHCP contains several predefined option codes). Table 23 on page 59 lists
the predefined option codes and associated RFC 2132 terms:
Your network recently added support for VoIP, and you now need to support DHCP for
VoIP phones. You edit the existing DHCP server configuration to send the following
custom options to IP phones acting as DHCP clients:
•
•
•
The example assumes that you have already configured a security device to act as a
DHCP server.
In addition to predefined option codes, the codes 0, 255, and 53 cannot be used to
create a custom DHCP option. All other integers between 2 and 254 are valid.
Data Type—The type of data required for the option code. Available data types are
string, IP address, and integer.
Value—The value of the option code. When the data type is string, the acceptable
length is 1-128 characters.
You can enable and configure dynamicrouting protocol and multicast protocol operations
on the interface:
•
For information about dynamic routing protocols (BGP, RIP, OSPF) in the virtual router
and on the interfaces, see “OSPF Protocol Configuration Overview” on page 313.
•
For information about multicast routing protocols (PIM-SIM, IGMP, IGMP-Proxy) and
multicast route entries, see “Multicast Route Overview” on page 337.
•
You can also configure RIPng protocol to the interface protocol list. For more
information, see the Concepts & Examples ScreenOS Reference Guide.
Chapter 3: Network Settings
Related
Documentation
Using Interface Secondary IP on page 61•
• Enabling ScreenOS Devices for Interface Monitoring on page 61
• Setting Interface Properties Using the General Properties Screen on page 53
Using Interface Secondary IP
This option is not available for interfaces in the Untrust zone. Each interface has a single,
unique primary IP address. You can also set one or more secondary IP addresses for the
interface.
Related
Documentation
Setting Interface Properties Using the General Properties Screen on page 53•
Enabling ScreenOS Devices for Interface Monitoring
You can enable the security device to monitor the reachability of certain IP addresses
through the interface to determine interface failure. For each IP address to be tracked,
specify the following:
•
Interval at which pings are sent to the tracked address
•
Number of consecutive unsuccessful ping attempts before the connection to the
address is considered failed
•
Weight of the failed IP connection
•
Timeout for the track IP
The Failover Threshold is compared to the sum of the weights of failed IP connections.
Instead of tracking specific IP addresses, you can alternatively set the device to track the
interface’s default gateway.
• Setting Interface Properties Using the General Properties Screen on page 53
Supporting Generic Routing Encapsulation Using Tunnel Interfaces
You can configure a tunnel interface to support Generic Routing Encapsulation version
1 (GREv1) encapsulation. When enabled, the interface encapsulates IP packets in the
tunnel in IPv4 packets using GREv1. You must specify the key parameter to append the
value to outgoing packets (incoming packets must have this value too).
You can use GRE to forward multicast packets through non-multicast aware routers and
devices.
Related
Documentation
Setting Interface Properties Using the General Properties Screen on page 53•
• Configuring Physical and Function Zone Interfaces in ScreenOS Devices Overview on
page 52
Interface Network Address Translation Methods
You can configure the following address translation methods on the security device:
•
MIPs
•
VIPs
•
Mapping services and ports
•
DIPs
•
Port Address Translation
•
DIP with extended Interface
•
Incoming DIP for SIP traffic
Related
Documentation
Interface Network Address Translation Using MIPs on page 62•
• Interface Network Address Translation Using VIPs on page 65
• Interface Network Address Translation Using DIPs on page 67
Interface Network Address Translation Using MIPs
A mapped IP (MIP) is a direct one-to-one mapping of one IP address to another. The
security device forwards incoming traffic destined for a MIP to the host with the address
to which the MIP points. A MIP is a static destination address translation that maps the
destination IP address in an IP packet header to another static IP address, enabling
inbound traffic to reach private addresses in a zone whose interface is in NAT mode.
When a MIP host initiates outbound traffic, the security device translates the source IP
address of the host to that of the MIP address. You can map an address-to-address or
subnet-to-subnet relationship (the netmask applies to both the mapped IP subnet and
the original IP subnet).
You can also use a MIP to handle overlapping address spaces at two sites connected by
a VPNtunnel (an overlapping address spaceis when the IP address range in two networks
are partially or completely the same).
However, devices running ScreenOS 6.1 or later remove the overlap restriction between
the MIP and the VIP.
The zone you configure the MIP in determines the subnet of IP address that you can
assign the MIP:
•
When defining a MIP in a tunnel zone or security zone other than untrust, you must use
the same subnet as a tunnel interface with an IP address and netmask, or in the same
subnet as the IP address and netmask of an interface bound to a Layer 3 (L3) security
zone.
•
When defining a MIP in an interface in the Untrust zone, you can use a different subnet
than the Untrust zone interface IP address. However, you must add a route on the
external router pointing to an Untrust zone interface so that incoming traffic can reach
the MIP. You must also define a static route that associates the MIP with the interface
that hosts it.
•
With devices running ScreenOS 6.1 or later, you can assign a MIP the same address as
an interface on any platform. However, you cannot use that MIP address in a DIP pool.
You can use a MIP as the destination addresses in rules between any two zones or in a
Global rule. For the destination zone, use either the Global zone or the zone with the
address to which the MIP points.
Related
Documentation
Interface Network Address Translation Methods on page 62•
• Example: Configuring MIPs (NSM Procedure) on page 63
• Interface Network Address Translation Using VIPs on page 65
Example: Configuring MIPs (NSM Procedure)
In this example, you create a MIP to handle inbound traffic to your Web server. After
configuring the MIP, you create a Global MIP to represent the MIP you created for the
device, and then use the Global MIP object in a Security Policy rule that permits HTTP
traffic from any address in the Untrust zone to the MIP—and to the host with the address
to which the MIP points—in the Trust zone. All security zones are in the trust-vr routing
domain.
To configure a MIP:
1. Add a NetScreen-50 security device. Choose Model when adding the device and
4. Configure the IP address as 1.1.1.1 and the netmask as 24. Leave all other settings as
5. In the interface navigation tree, select NAT > MIP to display the MIP screen.
•
In the device navigation tree, select Network > Interface.
•
Double-click ethernet1 (trust interface). The General Properties screen appears.
•
Configure the IP address as 10.1.1.1 and the Netmask as 24. Leave all other settings
as default.
•
Click OK to save your changes.
•
In the device navigation tree, select Network > Interface.
•
Double-click ethernet2 (untrust interface). The General Properties screen appears.
default.
•
Click OK to save your changes.
Related
Documentation
6. Click the Add icon and configure the following:
•
For Mapped IP, enter 1.1.1.5.
•
For Netmask, enter 32.
•
For Host IP, enter 10.1.1.5.
•
For virtual router, select trust-vr.
•
Click OK to save the MIP.
7. Click OK to saveyour changesto the interface, and then click OK to saveyour changes
to the device.
8. Create a Global MIP to reference the MIP you created for the device. You use a Global
MIP when configuring NAT in a Security Policy rule; the Global MIP references the MIP
for an individual device, enabling you to use one object (the Global MIP object) to
represent multiple MIPs in a single rule.
9. In the navigation tree, select Object Manager > NAT Objects > MIP.
10. Click the Add icon to display the new Global MIP dialog box.
11. Configure the Global MIP.
12. Configure a firewall rule to route inbound HTTP traffic to the MIP address.
Interface Network Address Translation Using MIPs on page 62•
• Interface Network Address Translation Using DIPs on page 67
• Interface Network Address Translation Methods on page 62
A virtual IP (VIP) address maps traffic received at one IP address to another address
based on the destination port number in theTCP or UDP segment header. The destination
IP addresses are the same, and the destination port numbers determine the host that
receives the traffic. The security device forwards incoming traffic destined for a VIP to
the host with the address to which the VIP points. When a VIP host initiates outbound
traffic, the security device translates the source IP address of the host to that of the VIP
address.
You can set a VIP only on an interface in the Untrust zone, and you must assign the VIP
an IP address that is in the same subnet as an interface in the Untrust zone. However, in
devices running ScreenOS 6.1 or later, you can set an interface in a Layer 3 security zone,
removing the restriction of setting an Untrust zone interface. Some security devices also
support:
•
Assigning the VIP the exactsame address as the interface. However, in devices running
ScreenOS 6.1 or later, you can set a VIP as you would an interface IP in any platform,
removing the restriction of some devices.
Chapter 3: Network Settings
•
Assigning the VIP to a dynamic IP address. When using a VIP with an interface in the
Untrust zone that receives its IP address dynamically through DHCP or PPPoE, select
Same as the untrusted interface IP address when setting up the VIP.
Additionally, the host to which the security device maps VIP traffic must be reachable
from the trust-vr. If the host is in a routing domain other than that of the trust-vr, you
must define a route to reach it.
You can use a VIP as the destination address in rules between any two zones or in a
Global rule. For the destination zone, use either the Global zone or the zone with the
address to which the VIP points.
Related
Documentation
Mapping Predefined and Custom Services in a VIP on page 65•
• Interface Network Address Translation Methods on page 62
Mapping Predefined and Custom Services in a VIP
You can use virtual port numbers for well-known services when running multiple server
processes on a single machine. For example, you can run two FTP servers on the same
machine, one server onport 21 and the otheron port 2121. Only users who know the virtual
port number can append it to the IP address in the packet header to gain access to the
second FTP server.
You can map predefined and custom services in a VIP. A single VIP can support custom
services with:
•
The same source and destination port numbers but different transports.
Multiple port entries, when creating multiple service entries under a VIP (one service
entry in the VIP for each port entry in the service).
Any destination port number or number range from 1 to 65,535, not just from 1024 to
65,535.
Related
Documentation
Interface Network Address Translation Using VIPs on page 65•
• Example: Configuring VIPs (NSM Procedure) on page 66
• Interface Network Address Translation Methods on page 62
Example: Configuring VIPs (NSM Procedure)
In this example, you create a VIP to handle inbound traffic to your Web server. After
configuring the VIP, you create a Global VIP to represent the VIP you created for the
device, and then use the Global VIP object in a Security Policy rule that permits HTTP
traffic on port 80 from any address in the Untrust zone to the MIP—and to the host with
the address and port to which the MIP points—in the Trust zone. All security zones are in
the trust-vr routing domain.
Because the VIP is in the same subnet as the Untrust zone interface, you do not need to
define a route for traffic from the Untrust zone to reach it. (To route HTTP traffic from a
security zone other than the Untrust zone to the VIP, you must set a route for 1.1.1.10 on
the router in the other zone to point to an interface bound to that zone.)
1. Add a NetScreen-204 security device. Choose Model when adding the device and
configure the device as running ScreenOS 5.x.
2. Configure the Trust interface for ethernet1.
3. In the device navigation tree, select Network > Interface.
4. Double-click ethernet1 (trust interface). The General Properties screen appears.
5. Configure the IP address as 10.1.1.1 and the netmask as 24. Leave all other settings as
default.
6. Click OK to save your changes.
7. Configure the Untrust interface for ethernet3.
8. In the device navigation tree, select Network > Interface.
9. Double-click ethernet3 (untrust interface). The General Properties screen appears.
10. Configure the IP address as 1.1.1.1 and the netmask as 24. Leave all other settings as
default.
11. Click OK to save your changes.
12. Configure the VIP for ethernet3:
•
Double-click ethernet3. The General Properties screen appears.
•
In the interface navigation tree, select NAT > VIP to display the VIP screen.
Click the Add icon to display the Virtual IP dialog box. Enter the Virtual IP as 1.1.1.10.
13. Click the Add icon to display the VIP mapping dialog box. Configure the following
options:
•
For Virtual Port, enter 80.
•
For Mapped IP, enter 10.1.1.10.
•
For Mapped Service, enter HTTP.
•
Click OK to save the VIP mapping, and then click OK to save the VIP.
•
Click OK to save your changes to the interface, and then click OK to save your
changes to the device.
14. In the navigation tree, select Object Manager > NAT Objects > VIP.
15. Click the Add icon to display the new Global VIP dialog box.
16. Configure the Global VIP.
17. Configure a firewall rule to route inbound HTTP traffic on port 80 to the VIP address.
Related
Documentation
Interface Network Address Translation Using VIPs on page 65•
• Interface Network Address Translation Methods on page 62
• Mapping Predefined and Custom Services in a VIP on page 65
Interface Network Address Translation Using DIPs
A dynamic IP (DIP) pool is a range of IP addresses. The security device can dynamically
or deterministicallyuse theseIP addresses when performing network address translation
on the source IP address (NAT-src) in IP packet headers.
•
If the range of addresses in a DIP poolis in the same subnet as the interface IP address,
the pool must exclude the interface IP address, router IP addresses, and any mapped
IP (MIP) or virtual IP (VIP) addresses that might also be in that subnet.
•
If therange ofaddresses is in thesubnet of an extended interface, the pool must exclude
the extended interface IP address.
You can assign DIP pools to physical interfaces and subinterfaces for network and VPN
traffic, and tunnel interfaces for VPN tunnels only.
Dip pools can now be defined on VLAN interface when the device running on ScreenOS
6.2 is in Transparent mode.
Related
Documentation
Example: Enabling Multiple Hosts Using Port Address Translation (NSM Procedure)
•
on page 68
• Example: Translating Source IP Addresses into a Different Subnet (NSM Procedure)
• Enabling Managed Devices Using Incoming DIP on page 73
Example: Enabling Multiple Hosts Using Port Address Translation (NSM Procedure)
Use Port Address Translation (PAT) to enable multiple hosts (up to 64,500) to share
the same IP address. The security device maintains a list of assigned port numbers to
distinguish which session belongs to which host. Use PAT in conjunction with a MIP and
a DIP pool to resolve the problem of overlapping address spaces.
Some applications, such as NetBIOS Extended User Interface (NetBEUI) and Windows
Internet Naming Service (WINS), require specific port numbers and do not work with
PAT. For these applications, you cannot use PAT; you must configure the DIP pool to use
a fixed port (numbered IP). For fixed-port DIP, the security device hashes and saves the
original host IP address in its host hash table, enabling the device to associate the right
session with each host.
In this example, you want to create a VPN tunnel for users at one site to reach an FTP
server at another site. However, the internal networks at both sites use the same private
address space of 10.1.1.0/24.
On the first device, an NetScreen-HSC, you create a tunnel interface in the Untrust zone
with IP address 10.10.1.1/24, and associate it with a DIP pool containing the IP address
range 10.10.1.2–10.10.1.2 (addresses in the neutral address space of 10.10.1.0/24). You
enable port address translation for the DIP pool. Onthe seconddevice, an NetScreen-208,
you create a tunnel interface with an IP address in a neutral address space and set up a
mapped IP (MIP) address to its FTP server. This example provides details on configuring
the NetScreen-HSC to use a DIP pool with PAT; details on configuring the second device
in the VPN are not provided.
1. Add a NetScreen-HSC security device. Choose Model when adding the device and
configure the device as running ScreenOS5.x and ScreenOS 6.2 in Transparent mode.
2. Configure the tunnel/vlan interface:
•
In the device navigation tree, select Network > Interface.
•
Click theAdd icon and select New > Tunnelor VlanInterface.The General Properties
screen appears.
3. Configure the DIP pool:
•
In the interface navigation tree, select NAT > DIP to display the DIP screen.
•
Click the Add icon to display the New Dynamic IP dialog box.
4. Enter the DIP ID.
5. Add multiple DIP ranges for a particular DIP ID as follows:
•
Select the Multiple DIP Range check box.
•
Click the Add icon. The New Dynamic IP dialog box appears.
9. Click OK to save your changes to the interface, and then click OK to saveyour changes
to the device.
Related
Documentation
Example: Translating Source IP Addresses into a Different Subnet (NSM Procedure)
•
on page 69
• Enabling Managed Devices Using Incoming DIP on page 73
• Interface Network Address Translation Using DIPs on page 67
Example: Translating Source IP Addresses into a Different Subnet (NSM Procedure)
If circumstances require that the source IP address in outbound firewall traffic be
translated to an address in a different subnet from that of egress interface, you can use
the extended interface option. This option enables you to graft a second IP address and
an accompanying DIP pool onto an interface that is in a different subnet. You can then
enable NAT ona per-policy basis andspecify the DIPpool built on the extended interface
for the translation.
In this example, two branch offices have leased lines to a central office. The central office
requires them to use only the authorized IP addresses it has assigned them. However,
the offices receive different IP addresses from their ISPs for Internet traffic. For
communicationwith the central office, youuse theextended interface option to configure
the security device in each branch office to translate the source IP address in packets it
sends to the central office to the authorized address. Table 24 on page 69 lists the
authorized and assigned IP addresses for branch offices A and B.
Table 24: Sample Branch Office Addresses
Office A
Office B
The security devices at both sites have a Trust zone and an Untrust zone. All security
zones are in the trust-vr routing domain. You bind ethernet1 to the Trust zone and assign
it IP address 10.1.1.1/24. You bind ethernet3 to the Untrust zone and give it the IP address
assigned by the ISPs: 195.1.1.1/24 for Office A and 201.1.1.1/24 for Office B. You then create
an extended interface with a DIP pool containing theauthorized IP address on ethernet3:
•
Office A—extended interface IP 211.10.1.10/24; DIP pool 211.10.1.1 – 211.10.1.1;PAT enabled
•
Office B—extended interface IP 211.20.1.10/24; DIP pool211.20.1.1– 211.20.1.1; PAT enabled
You set the Trust zoneinterfacein NAT mode. It uses theUntrust zoneinterface IPaddress
as its source address in all outbound traffic except for traffic sent to the central office.
You configure a policy to the central office that translates the source address to an
address in the DIP pool inthe extended interface. (The DIP pool ID number is 5.It contains
one IP address, which, with port address translation, can handle sessions for ~64,500
hosts.) The MIP address that the central office uses for inbound traffic is 200.1.1.1, which
you enter as “ HQ” in the Untrust zone address book on each security device.
Each ISP must set up a route for traffic destined to a site at the end of a leased line to
use that leased line. The ISPs route any other traffic they receive from a local security
device to the Internet.
1. Add the devices:
2. Configure ethernet1 (Trust Zone) for Office A:
•
For Office A, add a NetScreen-208 security device.
•
For Office B, add a NetScreen-204 security device.
•
Double-click Office A device toopen the device configuration. In thedevice navigation
tree, select Network > Interface.
•
Double-click ethernet1. The General Properties screen appears.
3. Configure IP address/netmask as 10.1.1.1/24 and Interface Mode as NAT.
4. Click OK to save your changes.
5. Configure ethernet3 (Untrust Zone) for Office A:
•
In the device navigation tree, select Network > Interface.
•
Double-click ethernet3. The General Properties screen appears.
•
Configure IP address/netmask as 195.1.1.1/24 and Interface Mode as Route.
6. In the interface navigation tree, select NAT > DIP. Click the Add icon to display the
New Dynamic IP dialog box. Configure the DIP, and then click OK:
7. Enter the DIP ID.
8. Add multiple DIP ranges for a particular DIP ID as follows:
•
Select the Multiple DIP Range check box.
•
Click the Add icon. The New MultiRange of DIP dialog box appears.
37. Create a Global DIP to reference the DIP pool on each device. You use a Global DIP
when configuring NAT in a firewall rule; the Global DIP references the DIP pool for an
individual device, enabling you to use one object (the Global DIP object) to represent
multiple DIP pools in a single rule.
•
In the navigation tree, select Object Manager > NAT Objects > DIP.
•
Click the Add icon to display the new Global DIP dialog box. Configure the Global
DIP and then click OK:
38. Configure two firewall rules, one which uses the Global DIP object for NAT translation.
Related
Documentation
Example: Enabling Multiple Hosts Using Port Address Translation (NSM Procedure)
•
on page 68
• Interface Network Address Translation Using DIPs on page 67
Enabling Managed Devices Using Incoming DIP
Use anincoming DIP to enable the managed device tohandle incoming SessionInitiation
Protocol (SIP) calls. SIP is an Internet Engineering Task Force (IETF)-standard protocol
for initiating, modifying, and terminating multimedia sessions (such as conferencing,
telephony, or multimedia) over the Internet. SIP is used to distribute the session
description, to negotiate and modify the parameters of an existing session, and to
terminate a multimedia session.
NOTE: SIP is a predefined service that uses port 5060 as the destination
port. To specify the SIP service in the Service column of a firewall rule, you
must select the predefined service group VoIP, which includes the H.323 and
SIP service objects.
To use SIP, a caller must register with the registrar before SIP proxies and location servers
can identify where the caller wants to be contacted. A caller can register one or more
contact locations by sending a REGISTER message to the registrar. The REGISTER
message contains the address-of-record URI and one or more contact URIs. When the
registrar receives the message, it creates bindings in a location service that associates
the address-of-record with the contact addresses.
The security device monitors outgoing REGISTER messages from SIP users, performs
NAT on these addresses, and stores the information in an incoming DIP table. When the
device receives an INVITE message from the external network, it uses the incoming DIP
table to identify which internal host to route the INVITE message to.
To enable the device to perform NAT on incoming SIP calls, you must configure an
interface DIP or DIP pool on the egress interface of the device. A single interface DIP is
adequate for handling incoming calls in a small office; a DIP pool is recommended for
larger networks or an enterprise environment.
NOTE: SIP uses UDP as its transport protocol. When using your managed
device to handle SIP traffic, you might also want to enable UDP Flood
Protection.For details on configuring UDP Flood Protection, see “Configuring
Flood Defense Settings for Preventing Attacks” on page 41.
Related
Documentation
Example: Translating Source IP Addresses into a Different Subnet (NSM Procedure)
•
on page 69
• Example: Enabling Multiple Hosts Using Port Address Translation (NSM Procedure)
on page 68
• Interface Network Address Translation Using DIPs on page 67
In this example, you configure an interface-based DIP on the Untrust interface of the
security device, and then configurea firewall rule that permits SIPtraffic from the Untrust
zone to the Trust zone and references the interface DIP. You also configure a rule that
permits SIP traffic from the Trust to the Untrust zone using NAT source, which enables
hosts in the Trust zone to register with the proxy in the Untrust zone.
1. Add a NetScreen-208 device namedOffice A.Choose Modelwhen addingeach device
and configure as running ScreenOS 5.1.
2. Configure ethernet1 (Trust Zone) for Office A:
•
Double-click Office A device to open the device configuration. In the device
navigation tree, select Network > Interface.
•
Double-click ethernet1. The General Properties screen appears.
•
Configure IP address/netmask as 10.1.1.1/24 and Interface mode as NAT.
•
Click OK to save your changes.
3. Configure ethernet3 (Untrust Zone) for Office A:
•
Double-click ethernet3. The General Properties screen appears.
•
Configure IP address/netmask as 1.1.1.1/24.
•
In the interface navigation tree, select NAT > DIP, and then click the Interface DIP
tab.
•
Select Incoming NAT.
4. Click OK to save your changes to the interface, and then click OK again to save your
changes to the device.
5. Create a Global DIP to reference the Interface DIP on Office A. You use a Global DIP
when configuring NAT in a firewall rule; the Global DIP references the Interface DIP
for an individual device.
6. In the navigation tree, select Object Manager > NAT Objects > DIP.
7. Click the Add icon to display the new Global DIP dialog box.
8. Configure the Global DIP.
9. Configure firewall rules:
•
Rule 1 handles outgoing SIP traffic, and uses the outgoing interface to perform NAT.
•
Rule 2 handles incoming SIP traffic, and uses the Interface DIP as the destination
to perform NAT.
NOTE: SIP is a predefined service that uses port 5060 as the destination
port. To specify the SIP service in the Service column of a firewall rule, you
must select the predefined service group VoIP, which includes the H.323 and
SIP service objects.
Related
Documentation
Enabling Managed Devices Using Incoming DIP on page 73•
• Example: Translating Source IP Addresses into a Different Subnet (NSM Procedure)
on page 69
• Interface Network Address Translation Using DIPs on page 67
Example: Configuring DIP Pools on the Untrust Interface (NSM Procedure)
In this example, you configure a DIP pool on the Untrust interface to perform NAT on
incoming SIP calls. After creating the DIP pool and Global DIP object, you configure a
firewall rule to permit SIP traffic from the Untrust zone to the Trust zone and reference
the DIP pool. You also configure a rule to permit SIP traffic from the Trust to the Untrust
zone, which enables hosts in the Trust zone to register with the proxy in the Untrust zone.
1. Add a NetScreen-204 device namedOffice B.Choose Modelwhen addingeach device
and configure as running ScreenOS 5.1.
2. Configure ethernet1 (Trust Zone) for Office B:
•
Double-click Office B device to open the device configuration. In the device
navigation tree, select Network > Interface.
•
Double-click ethernet1. The General Properties screen appears.
•
Configure IP address/netmask as 10.1.1.1/24 and Interface mode as NAT.
•
Click OK to save your changes.
3. Configure ethernet3 (Untrust Zone) for Office B:
•
Double-click ethernet3. The General Properties screen appears.