Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Supported System Services for Host Inbound Traffic

    This topic describes the supported system services for host inbound traffic on the specified zone or interface.

    For example, suppose a user whose system was connected to interface 1.3.1.4 in zone ABC wanted to telnet into interface 2.1.2.4 in zone ABC. For this action to be allowed, the Telnet application must be configured as an allowed inbound service on both interfaces and a policy must permit the traffic transmission.

    Table 1 shows the system services that can be used for host inbound traffic.

    Table 1: System Services for Host Inbound Traffic

    Host Inbound System Services

     

    all

    any-service

    dns

    finger

    ftp

    http

    https

    indent-reset

    ike

    netconf

    ntp

    ping

    reverse-ssh

    reverse-telnet

    rlogin

    rpm

    rsh

    sip

    snmp

    snmp-trap

    ssh

    telnet

    tftp

    traceroute

    xnm-clear-text

    xnm-ssl

    Note: On the SRX Series Services Gateways, the xnm-clear-text field is enabled in the factory default configuration. This setting enables incoming Junos XML protocol traffic in the trust zone for the device when the device is operating with factory default settings. We recommend you to replace the factory default settings with user-defined configuration which provides additional security once the box is configured. You must delete the xnm-clear-text field manually by using the CLI command delete system services xnm-clear-text.

    Table 2 shows the supported protocols that can be used for host inbound traffic.

    Table 2: Protocols for Host Inbound Traffic

    Protocols

    all

    bfd

    bgp

    dvmrp

    igmp

    msdp

    ospf

    nhrp

    pgm

    ospf3

    rip

    pim

    sap

    ripng

     

    vrrp

    Note: All services (except DHCP and BOOTP) can be configured either per zone or per interface. A DHCP server is configured only per interface because the incoming interface must be known by the server to be able to send out DHCP replies.

    Note: You do not need to configure Neighbor Discovery Protocol (NDP) on host-inbound traffic, because the NDP is enabled by default.

    Configuration option for IPv6 Neighbor Discovery Protocol (NDP) is available. The configuration option is set protocol neighbor-discovery onlink-subnet-only command. This option will prevent the device from responding to a Neighbor Solicitation (NS) from a prefix which was not included as one of the device interface prefixes.

    Note: The Routing Engine needs to be rebooted after setting this option to remove any possibility of a previous IPv6 entry from remaining in the forwarding-table.

    Published: 2014-05-08