The following tables list security features that are supported on SRX 5600 and SRX 5800 services gateways.
Table 4: Support Information: Zones
|
Feature |
More Information |
|---|---|
|
Security zone | |
|
Functional zone | |
|
For information about the interfaces that are supported on your device, see the JUNOS Software Interfaces and Routing Configuration Guide. |
|
Table 5: Support Information: Security Policy
|
Feature |
More Information |
|---|---|
|
Address books | |
|
Policy application sets | |
|
Schedulers | |
|
Policy applications |
Understanding Internet-Related Predefined Policy Applications |
|
Internet Control Message Protocol (ICMP) predefined policy application | |
|
Internet-related predefined policy applications |
Understanding Internet-Related Predefined Policy Applications |
|
Microsoft predefined policy applications | |
|
Dynamic routing protocols predefined policy applications |
Understanding Dynamic Routing Protocols Predefined Policy Applications |
|
Streaming video predefined policy applications |
Understanding Streaming Video Predefined Policy Applications |
|
Sun remote procedure protocol (RPC) predefined policy applications | |
|
Security and tunnel predefined policy applications |
Understanding Security and Tunnel Predefined Policy Applications |
|
IP-related predefined policy applications | |
|
Instant messaging predefined policy applications |
Understanding Instant Messaging Predefined Policy Applications |
|
Management predefined policy applications | |
|
Mail predefined policy applications | |
|
UNIX predefined policy applications | |
|
Miscellaneous predefined policy applications | |
|
Custom policy Applications | |
|
Policy application timeouts | |
|
Policy verification |
Table 6: Support Information: Firewall Authentication
|
Feature |
More Information |
|---|---|
|
Web authentication | |
|
Pass-through authentication | |
|
Local authentication server | |
|
RADIUS authentication server | |
|
LDAP authentication server | |
|
SecurID authentication server |
Table 7: Support Information: Attack Detection and Prevention
|
Feature |
More Information |
|---|---|
|
Bad IP option | |
|
Block fragment traffic | |
|
FIN flag without ACK flag set protection | |
|
ICMP flood protection | |
|
ICMP fragment protection | |
|
Large size ICMP packet protection | |
|
Loose source route option |
Blocking Packets with Either a Loose or Strict Source Route Option Set |
|
IP record route option |
SCREEN Options for Detecting IP Options Used For Reconnaissance |
|
IP security option |
SCREEN Options for Detecting IP Options Used For Reconnaissance |
|
IP address spoof | |
|
IP stream option |
SCREEN Options for Detecting IP Options Used For Reconnaissance |
|
IP strict source route option |
Blocking Packets with Either a Loose or Strict Source Route Option Set |
|
IP address sweep | |
|
IP timestamp option |
SCREEN Options for Detecting IP Options Used For Reconnaissance |
|
Land attack protection | |
|
Ping of death attack protection | |
|
Port scan | |
|
Source IP based session limit | |
|
SYN-ACK-ACK proxy protection | |
|
SYN and FIN flags set protection | |
|
SYN flood protection | |
|
SYN fragment protection | |
|
Teardrop attack protection | |
|
TCP packet without flag set protection | |
|
Unknown protocol protection | |
|
UDP flood protection | |
|
WinNuke attack protection |
Table 8: Support Information: Network Address Translation
|
Feature |
More Information |
|---|---|
|
Destination IP address translation | |
|
Static Network Address Translation (NAT) | |
|
Rule-based NAT |
Understanding Rule-Based Destination NAT on SRX-series Services Gateways |
|
Source IP address translation | |
|
NAT interface source pools | |
|
Configuring proxy Address Resolution Protocol (ARP) |
Table 9: Support Information: Chassis Cluster
Table 10: Support Information: IPsec
Table 11: Support Information: PKI
Table 12: Support Information: ALGs
Table 13: Support Information: IDP Policy
|
Feature |
More Information |
|---|---|
|
Intrusion Detection and Prevention (IDP) Policy | |
|
Intrusion prevention system (IPS) rulebase | |
|
Exempt rulebase | |
|
Custom attacks | |
|
Differentiated Services code point (DSCP) marking |
Table 14: Support Information: IDP Signature Database
|
Feature |
More Information |
|---|---|
|
IDP signature database | |
|
Predefined policy templates | |
|
Signature database—manual download | |
|
Signature database—automatic download | |
|
Signature database version |
Table 15: Support Information: IDP Application Identification
|
Feature |
More Information |
|---|---|
|
Application identification | |
|
Service and application bindings | |
|
Application system cache |
Table 16: Support Information: IDP Logging
|
Feature |
More Information |
|---|---|
|
IDP logging |
|
Table 17: Support Information: IDP SSL Inspectioon
|
Feature |
More Information |
|---|---|
|
IDP SSL Inspection |