
Junos OS Security Configuration Guide
Copyright and Trademark Information
Table of Contents
About This Guide
Introduction to Junos OS
Introducing Junos OS for SRX Series Services Gateways
SRX Series Services Gateways Processing Overview
Sessions for SRX Series Services Gateways
Session Characteristics for SRX Series Services Gateways
Understanding Session Characteristics for SRX Series Services
Gateways
Example: Controlling Session Termination for SRX Series Services
Gateways
Example: Disabling TCP Packet Security Checks for SRX Series
Services Gateways
Example: Setting the Maximum Segment Size for All TCP Sessions
for SRX Series Services Gateways
Monitoring Sessions for SRX Series Services Gateways
Understanding How to Obtain Session Information for SRX Series
Services Gateways
Displaying Global Session Parameters for All SRX Series Services
Gateways
Displaying a Summary of Sessions for SRX Series Services Gateways
Displaying Session and Flow Information About Sessions for
SRX Series Services Gateways
Displaying Session and Flow Information About a Specific Session
for SRX Series Services Gateways
Using Filters to Display Session and Flow Information for SRX
Series Services Gateways
Information Provided in Session Log Entries for SRX Series
Services Gateways
Clearing Sessions for SRX Series Services Gateways
Debugging for SRX Series Services Gateways 
Understanding SRX Series Services Gateways Central Point Architecture
SRX5600 and SRX5800 Services Gateways Processing Overview
Understanding First-Packet Processing
Understanding Fast-Path Processing
Understanding the Data Path for Unicast Sessions
Session Lookup and Packet Match Criteria
Understanding Session Creation: First-Packet Processing
Step 1. A Packet Arrives at an Interface on the Device
and the NPU Processes It.
Step 2. The Central Point (CP) Creates a
Session with a "Pending” State.
Step 3. The SPU Sets Up the Session.
Step 4. The CP Installs the Session.
Step 5. The SPU Sets Up the Session on the
Ingress and Egress NPUs.
Step 6. Fast-Path Processing Takes Place.
Understanding Fast-Path Processing
Step 1. A Packet Arrives at the Device and the NPU
Processes It.
Step 2. The SPU for the Session Processes
the Packet.
Step 3. The SPU Forwards the Packet to the
NPU.
Step 4. The Interface Transmits the Packet
From the Device.
Step 5. A Reverse Traffic Packet Arrives
at the Egress Interface and the NPU Processes It.
Step 6. The SPU for the Session Processes
the Reverse Traffic Packet.
Step 7. The SPU Forwards the Reverse Traffic
Packet to the NPU.
8. The Interface Transmits the Packet From
the Device.
Understanding Packet Processing
Understanding Services Processing Units
Understanding Scheduler Characteristics
Understanding Network Processor Bundling
SRX3400 and SRX3600 Services Gateways Processing Overview
SRX210 Services Gateway Processing Overview
Limitations of Flow and Processing
Understanding IPv6 Flow-Based Processing
Understanding IP Version 6 (IPv6)
About the IPv6 Address Space, Addressing, and Address Types
About IPv6 Address Types and How Junos OS for SRX Series Services
Gateway and J-series Devices Use Them
About the IPv6 Address Format
The IPv6 Packet Header and SRX Series and J-series Devices
Overview
About the IPv6 Basic Packet Header
Understanding IPv6 Packet Header Extensions
About IPv6 Packet Header Verification Performed by the Flow
Module for SRX Series and J-series Devices
Understanding How SRX Series and J-series Devices Handle ICMPv6
Packets
Understanding Path MTU Messages for IPv6 Packets
Understanding How SRX Series and J-series Devices Handle Packet
Fragmentation for IPv6 Flows
Understanding Sessions for IPv6 Flows
Understanding SRX5600 and SRX5800 Architecture and Flow Processing
Limitations of IPv6
Enabling Flow-Based Processing for IPv6 Traffic
Using Filters to Display IPv6 Session and Flow Information
for SRX Series Services Gateways
Introducing Junos OS for J Series Services Routers
Security Zones and Interfaces
Security Policies
Security Policies
Security Policies Overview
Understanding Security Policy Rules
Understanding Security Policy Elements
Security Policies Configuration Overview
Example: Configuring a Security Policy to Permit or Deny All
Traffic
Example: Configuring a Security Policy to Permit or Deny Selected
Traffic
Understanding Security Policy Ordering
Example: Reordering the Policies
Troubleshooting Security Policies
Monitoring Policy Statistics
Matching Security Policies
Security Policy Schedulers
Security Policy Applications
Security Policy Applications Overview
Policy Application Sets Overview
Example: Configuring Applications and Application Sets
Custom Policy Applications
Policy Application Timeouts
Understanding the ICMP Predefined Policy Application
Default Behaviour of ICMP Unreachable Errors
Understanding Internet-Related Predefined Policy Applications
Understanding Microsoft Predefined Policy Applications
Understanding Dynamic Routing Protocols Predefined Policy Applications
Understanding Streaming Video Predefined Policy Applications
Understanding Sun RPC Predefined Policy Applications
Understanding Security and Tunnel Predefined Policy Applications
Understanding IP-Related Predefined Policy Applications
Understanding Instant Messaging Predefined Policy Applications
Understanding Management Predefined Policy Applications
Understanding Mail Predefined Policy Applications
Understanding UNIX Predefined Policy Applications
Understanding Miscellaneous Predefined Policy Applications
Application Layer Gateways
ALGs
H.323 ALGs
Understanding H.323 ALGs
Understanding the Avaya H.323 ALG
H.323 ALG Configuration Overview
H.323 ALG Endpoint Registration Timeouts
H.323 ALG Media Source Port Ranges
H.323 ALG DoS Attack Protection
H.323 ALG Unknown Message Types
Example: Passing H.323 ALG Traffic to a Gatekeeper in the Internal
Zone
Example: Passing H.323 ALG Traffic to a Gatekeeper in the External
Zone
Example: Using NAT and the H.323 ALG to Enable Incoming Calls
(CLI)
Example: Using NAT and the H.323 ALG to Enable Outgoing Calls
(CLI)
ALG for IKE and ESP
SIP ALGs
Understanding SIP ALGs
Understanding SIP ALG Request Methods
SIP ALG Configuration Overview
SIP ALG Call Duration and Timeouts
SIP ALG DoS Attack Protection
SIP ALG Unknown Message Types
SIP ALG Hold Resources
SIP ALGs and NAT
Understanding SIP ALGs and NAT
Understanding Incoming SIP ALG Call Support Using the SIP Registrar
and NAT
Example: Configuring Interface Source NAT for Incoming SIP
Calls (CLI)
Example: Configuring a Source NAT Pool for Incoming SIP Calls
(CLI)
Example: Configuring Static NAT for Incoming SIP Calls (CLI)
Example: Configuring the SIP Proxy in the Private Zone and
NAT in the Public Zone (CLI)
Example: Configuring the SIP Proxy and NAT in the Public Zone
(CLI)
Example: Configuring a Three-Zone SIP ALG and NAT Scenario
(CLI)
Verifying SIP ALG Configurations
SCCP ALGs
MGCP ALGs
Understanding MGCP ALGs
MGCP ALG Configuration Overview
MGCP ALG Call Duration and Timeouts
MGCP ALG DoS Attack Protection
MGCP ALG Unknown Message Types
Example: Configuring Media Gateways in Subscriber Homes Using
MGCP ALGs
Example: Configuring Three-Zone ISP-Hosted Service Using MGCP
ALGs and NAT (CLI)
RPC ALGs
User Authentication
Firewall User Authentication
Infranet Authentication
UAC and Junos OS
Junos OS Enforcer and Infranet Controller Communications
Junos OS Enforcer Policy Enforcement
Junos OS Enforcer and IPsec
Junos OS Enforcer and Infranet Agent Endpoint Security
Junos OS Enforcer and Captive Portal
Understanding the Captive Portal on the Junos OS Enforcer
Understanding Captive Portal Configuration on the Junos OS
Enforcer
Example: Creating a Captive Portal Policy on the Junos OS Enforcer
(CLI)
Understanding the Captive Portal Redirect URL Options
Example: Configuring a Redirect URL for Captive Portal (CLI)
Junos OS Enforcer and Infranet Controller Cluster Failover
Virtual Private Networks
Internet Protocol Security
Public Key Cryptography for Certificates
Understanding Public Key Infrastructure
Certificates and Certificate Authority
Understanding Certificates
Digital Certificates Configuration Overview
Public-Private Key Pairs
Certificate Authority Profiles
Certificate Enrollment
Example: Generating a Local Certificate Request Manually (CLI)
Example: Loading CA and Local Certificates Manually (CLI)
Example: Reenrolling Local Certificates Automatically (CLI)
Deleting Certificates (CLI Procedure)
Self-Signed Certificates
Certificate Revocation Lists
Dynamic VPNs
Group VPNs
Group VPN Overview
Understanding the GDOI Protocol
Understanding Group Servers and Members
Understanding Dynamic Policies
Group Key Operations
Group VPN Configuration Overview
Example: Configuring Group VPN (CLI)
Understanding Colocation Mode
Example: Configuring Group VPN with Server-Member Colocation
(CLI)
Understanding IKE Phase 1 Configuration for Group VPN
Understanding IPsec SA Configuration for Group VPN
Understanding VPN Group Configuration
Understanding Antireplay
Understanding Server-Member Communication
Example: Configuring Server-Member Communication for Unicast
Rekey Messages
Example: Configuring Server-Member Communication for Multicast
Rekey Messages
Understanding Heartbeat Messages
Understanding Group VPN Limitations
Understanding Interoperability with Cisco GET VPN
Intrusion Detection and Prevention
IDP Policies
Application-Level Distributed Denial of Service 
IDP Signature Database
Understanding the IDP Signature Database
Example: Adding a Detector Sensor Configuration (J-Web)
Predefined IDP Policy Templates
IDP Signature Databases
Understanding Predefined IDP Attack Objects and Object Groups
Understanding the IDP Signature Database Version
Updating the IDP Signature Database Overview
Updating the IDP Signature Database Manually Overview
Example: Updating the IDP Signature Database Manually (CLI)
Example: Updating the Signature Database Automatically (CLI)
Verifying the Signature Database
IDP Application Identification
Understanding IDP Application Identification
Understanding IDP Service and Application Bindings by Attack
Objects
Example: Configuring IDP Policies for Application Identification
(CLI)
Disabling Application Identification for an IDP Policy (CLI
Procedure)
IDP Application Identification for Nested Applications
IDP Application System Cache
IDP Memory and Session Limits
Verifying IDP Counters for Application Identification Processes
IDP SSL Inspection
IDP SSL Overview
Supported IDP SSL Ciphers
Understanding IDP Internet Key Exchange
Understanding IDP SSL Server Key Management and Policy Configuration
Displaying IDP SSL Keys and Associated Servers
Adding IDP SSL Keys and Associated Servers
Deleting IDP SSL Keys and Associated Servers
Configuring an IDP SSL Inspection (CLI Procedure)
IDP Performance and Capacity Tuning
IDP Logging
Unified Threat Management
Unified Threat Management Overview
Antispam Filtering
Full Antivirus Protection
Full Antivirus Protection Overview
Full Antivirus Scanner Pattern Database
Understanding Full Antivirus Pattern Updates
Full Antivirus Pattern Update Configuration Overview
Example: Specifying the Full Antivirus Pattern Update Server
(CLI)
Example: Automatically Updating Full Antivirus Patterns (J-Web)
Example: Automatically Updating Full Antivirus Patterns (CLI)
Manually Updating, Reloading, and Deleting Full Antivirus Patterns
(CLI Procedure)
Full Antivirus File Scanning
Understanding the Full Antivirus Internal Scan Engine
Global, Profile-Based, and Policy-Based Full Antivirus Scan
Settings
Full Antivirus Scan Modes
Full Antivirus Intelligent Prescreening 
Full Antivirus Content Size Limits
Full Antivirus Decompression Layer Limit
Full Antivirus Scanning Timeout
Full Antivirus Scan Session Throttling
Full Antivirus Application Protocol Scanning
Understanding Full Antivirus Application Protocol Scanning
HTTP Full Antivirus Scanning
Understanding HTTP Scanning
Enabling HTTP Scanning (CLI Procedure)
Understanding HTTP Trickling
Configuring HTTP Trickling to Prevent Timeouts During Antivirus
Scanning (CLI Procedure)
Understanding MIME Whitelists
Example: Configuring MIME Whitelists to Bypass Antivirus Scanning
(CLI)
Understanding URL Whitelists
Configuring URL Whitelists to Bypass Antivirus
Scanning (CLI Procedure)
FTP Full Antivirus Scanning
SMTP Full Antivirus Scanning
POP3 Full Antivirus Scanning
IMAP Full Antivirus Scanning
Full Antivirus Scan Results and Notification Options
Full Antivirus Configuration Overview
Configuring Full Antivirus (J-Web Procedure)
Example: Configuring Full Antivirus (CLI)
Monitoring Antivirus Sessions and Scan Results
Express Antivirus Protection
Content Filtering
Web Filtering
Attack Detection and Prevention
Application Identification
Junos OS Application Identification
Understanding Junos OS Application Identification Services
Application Identification Application Package
Understanding Junos OS Application Identification Application
Package
Updating Junos OS Application Identification Extracted Application
Package Overview
Updating Junos OS Application Identification Extracted Application
Package Manually Overview
Example: Updating Junos OS Application Identification Extracted
Application Package Manually (CLI)
Example: Updating Junos OS Application Identification Extracted
Application Package Automatically (CLI)
Example: Verifying Junos OS Application Identification Extracted
Application Package
Disabling Junos OS Application Identification (CLI Procedure)
Junos OS Application Identification for Nested Applications
Junos OS Application Identification Custom Application Signature
Definitions
Application System Cache
Understanding the Application System Cache
Deactivating Application System Cache Information for Application
Identification (CLI Procedure)
Understanding Application System Cache Information for Nested
Application Identification
Deactivating Application System Cache Information for Nested
Application Identification (CLI Procedure)
Verifying Application System Cache Statistics
Memory and Session Limits
AppTrack Application Tracking
Chassis Cluster
Chassis Cluster
Chassis Cluster Overview
Understanding Chassis Cluster Formation
Chassis Cluster Redundancy Groups
Understanding Chassis Cluster Redundancy Groups
Chassis Cluster Redundancy Groups 0 Through 128
Chassis Cluster Redundancy Group Interface Monitoring
Chassis Cluster Redundancy Group IP Address Monitoring
Understanding Chassis Cluster Monitoring of Global-Level Objects
Chassis Cluster Redundancy Group Failover
Understanding Chassis Cluster Redundancy Group Failover
Understanding Chassis Cluster Redundancy Group Manual Failover
Initiating a Chassis Cluster Manual Redundancy Group Failover
Example: Configuring Chassis Cluster with a Dampening Time
Between Back-to-Back Redundancy Group Failovers (CLI)
Understanding SNMP Failover Traps for Chassis Cluster Redundancy
Group Failover
Chassis Cluster Redundant Ethernet Interfaces
Conditional Route Advertising in a Chassis Cluster
Chassis Cluster Control Plane
Understanding the Chassis Cluster Control Plane
Understanding Chassis Cluster Control Links
Example: Configuring Chassis Cluster Control Ports (CLI)
Understanding Chassis Cluster Dual Control Links
Connecting Dual Control Links for SRX Series Devices in a Chassis
Cluster
Upgrading the Second Routing Engine When Using Chassis Cluster
Dual Control Links on SRX5600 and SRX5800 Devices
Understanding Chassis Cluster Control Link Heartbeats
Understanding Chassis Cluster Control Link Failure and Recovery
Example: Configuring Chassis Cluster Control Link Recovery
(CLI)
Verifying Chassis Cluster Control Plane Statistics
Clearing Chassis Cluster Control Plane Statistics
Chassis Cluster Data Plane
Understanding the Chassis Cluster Data Plane
Understanding Chassis Cluster Fabric Links
Understanding Chassis Cluster Dual Fabric Links
Example: Configuring the Chassis Cluster Fabric (CLI)
Verifying Chassis Cluster Data Plane Interfaces
Verifying Chassis Cluster Data Plane Statistics
Clearing Chassis Cluster Data Plane Statistics
Consequences of Enabling Chassis Cluster
Understanding
What Happens When Chassis Cluster Is Enabled
Node Interfaces on Active SRX Series Chassis Clusters
Node Interfaces on Active J Series Chassis Clusters
Management Interface on an Active Chassis Cluster
Fabric Interface on an Active Chassis Cluster
Control Interface on an Active Chassis Cluster
Building a Chassis Cluster
Connecting SRX Series Hardware to Create a Chassis Cluster
Disabling Switching on SRX100, SRX210, and SRX240 Devices Before
Enabling Chassis Clustering
SRX Series Chassis Cluster Configuration Overview
Connecting J Series Hardware to Create a Chassis Cluster
J Series Chassis Cluster Configuration Overview
Example: Setting the Chassis Cluster Node ID and Cluster ID
(CLI)
Example: Configuring the Chassis Cluster Management Interface
(CLI)
Example: Configuring the Number of Redundant Ethernet Interfaces
in a Chassis Cluster (CLI)
Verifying a Chassis Cluster Configuration
Verifying Chassis Cluster Statistics
Clearing Chassis Cluster Statistics
Verifying Chassis Cluster Failover Status
Clearing Chassis Cluster Failover Status
Chassis Cluster Upgrades
Upgrading Each Device in a Chassis Cluster Separately
Upgrading Both Devices in a Chassis Cluster Using a Low-Impact
ISSU
Upgrading Both Devices in a Chassis Cluster Using an ISSU
Rolling Back Devices in a Chassis Cluster After an ISSU
Guarding Against Service Failure in a Chassis Cluster ISSU
Enabling an Automatic Chassis Cluster Node Failback After an
ISSU
Troubleshooting Chassis Cluster ISSU Failures
Deciphering Mismatched Control Link Statistics During a Chassis
Cluster ISSU
Disabling Chassis Cluster
Understanding Multicast Routing on a Chassis Cluster
Asymmetric Chassis Cluster Deployment
Active/Passive Chassis Cluster Deployment (J Series Devices)
Active/Passive Chassis Cluster Deployment (SRX Series Devices)
Active/Passive Chassis Cluster Deployment with an IPsec Tunnel
Limitations of Chassis Clustering
Network Address Translation
Network Address Translation
NAT Overview
Understanding NAT Rule Sets and Rules
Static NAT
Destination NAT
Source NAT
Understanding Source NAT
Source NAT Pools
Understanding Source NAT Rules
Source NAT Configuration Overview
Source NAT Configuration Examples
Example: Configuring Source NAT for Egress Interface Translation
Example: Configuring Source NAT for Single Address Translation
Example: Configuring Source NAT for Multiple Addresses with
PAT
Example: Configuring Source NAT for Multiple Addresses without
PAT
Example: Configuring Source NAT with Address Shifting
Example: Configuring Source NAT with Multiple Rules
Example: Configuring Source and Destination NAT Translations
Disabling Port Randomization for Source NAT (CLI Procedure)
Persistent NAT
Configuring Proxy ARP (CLI Procedure)
Verifying NAT Configuration
GPRS
IndexSymbols
A
- AAA 1
- Access Manager
- Access Point Name See APN
- access profile
- configuring
- dynamic VPN 1
- accommodating end-to-end TCP communication
- end-to-end TCP communication 1
- address sweep 1
- Advanced Encryption Standard (AES) 1
- AES 1
- agentless access See UAC, Infranet agent
- agents, zombie 1
- aggressive mode 1
- AH (authentication header) protocol
- overview 1
- ALGs
- allowing
- unknown SIP ALG message types 1
- antireplay
- group VPN 1
- antispam filtering 1
- antivirus
- verifying 1
- antivirus, express 1
- antivirus, full 1
- APN
- appDDoS
- application-level DDoS protection overview 1
- AppDDoS
- understanding logging 1
- AppDDoS Protection
- enabling example 1
- application binding 1, 2
- application identification 1, 2, See also IDP
- application binding 1
- application package manual download 1
- configuring policies (IDP) 1
- custom application definitions 1
- disable 1, 2
- memory limit 1
- nested applications 1, 2
- overview 1
- service binding 1
- session limit 1
- system cache 1, 2
- system caching for nested application identification 1, 2
- understanding application package 1
- verifying application package 1
- verifying cache statistics 1, 2
- verifying counters 1
- application identification (Junos)
- overview 1
- application identification services
- application package
- application sets
- application system cache 1, 2
- application tracking
- AppTrack 1
- application-level DDoS 1
- Application-Level DDoS
- understanding logging 1
- application-level DDoS protection
- configuration 1
- applications
- IDP, configuring 1
- AppTrack
- application tracking 1
- associating policy to schedulers 1
- attack detection
- overview 1
- attack object groups 1
- predefined 1
- attack objects
- predefined 1
- attacks
- auth users
- groups 1
- authenticating users
- pass-through authentication 1
- authentication
- authentication tables See UAC, authentication tables
- authentication, authorization, and accounting servers 1, 2
- AutoKey IKE VPN 1
- management 1
B
C
- CA certificates 1
- captive portal
- certificates 1
- changing session characteristics 1, 2
- chassis cluster
- ISSU upgrading 1
- chassis clusters
- about 1
- control interfaces 1
- creating a J Series cluster 1
- creating an SRX Series cluster 1
- disabling 1
- enabling 1
- fabric interfaces 1
- formation 1
- hardware setup for J Series devices 1
- hardware setup for SRX Series devices 1
- management interfaces on J Series devices 1
- management interfaces on SRX Series devices 1
- node interfaces on J Series devices 1
- node interfaces on SRX Series devices 1
- redundancy groups 1
- setting node and cluster IDs 1
- verifying 1
- verifying interfaces 1
- verifying redundancy group status 1
- verifying statistics 1
- verifying status 1
- client groups for firewall authentication 1
- cold sync
- monitoring 1
- colocation mode 1
- comments, in configuration statements 1
- compiling IDP policy 1
- compound attack sample 1
- conditional route advertising configuration 1
- configuring
- anomaly attack objects 1
- application identification services, memory limit 1
- application identification services, session limit 1
- application identification, memory limit 1
- application identification, session limit 1
- AutoKey IKE 1
- chassis cluster information 1
- conditional route advertising 1
- control link recovery 1
- control ports 1
- dampening time between back-to-back redundancy group failovers 1
- DSCP in IDP policy 1
- dynamic VPN client configurations 1
- dynamic VPN global settings 1
- exempt rulebase 1
- external authentication servers 1
- fabric 1
- group VPN 1
- group VPN colocation mode 1
- group VPN multicast rekey 1
- group VPN unicast rekey 1
- group VPNs 1
- host inbound traffic 1
- protocols 1
- IDP application sets 1
- IDP applications 1
- IDP in security policy 1
- IDP policy, application identification 1
- IDP services 1
- IKE gateway and peer authentication 1
- IKE policy, authentication, and proposal 1
- interface monitoring 1
- interface source NAT for incoming SIP calls 1
- interface source NAT pool for incoming SIP calls 1
- IPS rulebase 1
- IPsec policy 1
- IPsec tunnel overview 1
- log suppression 1
- management interfaces 1
- Phase 2 proposals 1
- redundancy groups 1
- redundant Ethernet interfaces 1
- SCCP DoS attack protection 1, 2
- signature attack objects 1
- signature database automatic download 1
- signature database manual download 1
- SIP DoS attack protection 1, 2
- SIP proxy
- static NAT for incoming SIP calls 1
- TCP-reset parameter 1
- terminal rules 1
- three-zone SIP scenario 1
- VPN global settings 1
- Content Filtering 1
- control link 1
- failure and recovery 1
- control link recovery
- configuring 1
- control plane
- overview 1
- control ports
- configuring 1
- controlling session termination 1
- conventions
- cookies, SYN 1
- CoS features 1, 2
- counters, verifying
- for application identification 1
- creating a J Series chassis cluster 1
- creating an SRX Series chassis cluster 1
- curly braces, in configuration statements 1
- custom attacks
- customer support 1
- contacting JTAC 1
D
- data
- Data Encryption Standard (DES) 1
- data path 1
- data processing, stateful and stateless 1, 2
- DDoS 1
- application-level 1
- defining
- DES 1
- destination NAT 1
- Diffie-Hellman 1, 2
- Diffserv
- configuring in IDP policy 1
- digital signature 1
- disabling
- chassis clusters 1
- disabling TCP packet security checks 1
- documentation
- comments on 1
- DoS
- DoS attacks 1
- download
- dual control links
- dynamic auth table provisioning See UAC, dynamic auth table provisioning
- dynamic packet filtering 1
- dynamic policies See group VPNs
- dynamic VPNs
E
F
- fabric configuration 1
- fabric data link 1
- fabric data link (dual) 1
- fabric data-link failure 1
- fabric interfaces 1
- fast-path processing 1
- filters, stateless firewall 1, 2
- FIN scans 1
- FIN without ACK flag attack detection
- overview 1
- firewall users, pass-through
- authentication process 1
- floods
- flow-based packet processing
- defined 1
- flow-based processing
- enabling 1
- flowd
- monitoring 1
- font conventions 1
- forward processing 1
- forwarding features 1
G
- gatekeeper devices 1
- GDOI protocol See group VPNs
- Gi interface 1, 2
- glossary
- IDP policy 1
- Gp interface 1
- gprs
- group keys
- group policies See group VPNs
- group VPNs
- antireplay 1
- colocation configuration 1
- colocation mode 1
- configuration 1
- configuration overview 1
- dynamic policies 1
- GDOI protocol 1
- group keys 1
- group policies 1
- heartbeat messages 1
- IKE Phase 1 configuration 1
- interoperability with GET VPN 1
- IPsec SA configuration 1
- key activation 1
- limitations 1
- member 1
- member reregistration 1
- multicast rekey configuration 1
- overview 1
- rekey messages 1
- scope policies 1
- server 1
- server-member communication 1
- unicast rekey configuration 1
- VPN group configuration 1
- GTP
- GTP messages 1
H
I
- ICMP
- ICMP header flags 1
- IDP
- application and services 1
- application identification 1
- application sets 1
- application sets, configuring 1
- custom attacks, properties 1, 2, 3
- deactivating rules 1
- defining exempt rulebase 1
- defining IPS rulebase 1
- detector 1
- DSCP 1
- enabling IDP 1
- inserting rule 1
- log suppression 1
- logging, overview 1
- maximize-idp-sessions 1
- packet capture 1
- performance and capacity tuning 1
- policy 1
- policy, manage 1
- policy, overview 1
- protocol decoder 1
- rulebase, application-level DDoS 1
- rulebase, DDoS 1
- rulebase, exempt 1
- rulebase, IPS 1
- rulebase, overview 1
- rules, actions 1
- rules, IP actions 1
- rules, match conditions 1
- rules, objects 1
- rules, overview 1
- send attack logs to the IC 1
- setting terminal rules 1
- signature database 1
- terminal rules, overview 1
- verify load status 1
- verify policy compilation 1
- verify signature database version 1
- IDP application-level DDoS
- IDP policy
- IDP, inline tap mode
- IKE 1
- IMSI prefix filtering 1
- in-service upgrade
- chassis cluster 1
- Infranet agent See UAC, Infranet agent
- Infranet Controller See UAC, Infranet Controller
- Infranet Enforcer See UAC, Junos OS Enforcer
- initiating manual redundancy group failover 1
- inline tap mode
- overview 1
- inspections 1
- interface monitoring configuration 1
- interfaces 1
- interfaces on J Series devices
- interfaces on SRX Series devices
- intrusion detection and prevention See IDP
- IP options
- IP packet fragments 1
- IP protocol header 1
- IP spoofing 1, 2
- IPS rulebase
- configuring 1
- IPsec
- IPv6
- address examples 1
- address format 1
- address space 1
- address types 1, 2
- addressing 1
- anycast addresses 1
- basic packet header fields 1
- enabling 1
- features 1
- flow module sanity checks 1
- host-inbound traffic 1
- ICMP overview 1
- multicast addresses 1
- overview 1
- packet fragmentation 1
- packet header extension fields 1
- packet header overview 1
- Path MTU 1
- sessions 1
- SRX Series high-end devices 1
- unicast addresses 1
J
- JUEP See UAC, device authentication
- Junos OS Enforcer See UAC, Junos OS Enforcer
K
- KEK See group VPNs
- key activation
- group VPN 1
L
M
- main mode 1
- management interfaces 1, 2
- configuring 1
- manual key management
- overview 1
- manuals
- comments on 1
- MD5 1, 2
- Message Digest version 5 (MD5) 1
- MGCP ALG 1
- MGCP timeouts
- inactivity 1
- Mobile Station (MS) mode 1
- modes
- modes, operational
- modes, selection
- modulus 1
- MS RPC ALG, defined 1
- multimedia sessions, SIP 1
N
- NAT 1
- address shifting 1
- destination 1
- destination NAT address pools 1
- destination NAT configuration 1
- destination NAT configuration examples 1
- destination NAT overview 1
- destination NAT rules 1
- disabling port randomization 1
- overview 1
- persistent addresses 1
- persistent NAT 1
- persistent NAT configuration overview 1
- persistent NAT overview 1
- port address translation 1
- proxy ARP 1
- rule sets and rules 1
- source 1
- source NAT address pools 1
- source NAT configuration 1
- source NAT configuration examples 1
- source NAT overview 1
- source NAT rules 1
- static 1
- static NAT configuration 1
- static NAT configuration examples 1
- static NAT overview 1
- static NAT rules 1
- STUN protocol 1
- verify configuration 1
- without port address translation 1
- NAT mode 1
- Network Address Translation See NAT
- network mode 1
- node interfaces on J Series devices 1
- node interfaces on SRX Series devices 1
- notice icons 1
O
P
- packet capture
- IDP 1
- packet filtering 1, 2, 3, 4
- packet fragmentation
- IPv6 1
- packet processing 1, 2
- packet-based processing 1, 2
- parentheses, in syntax descriptions 1
- pass-through authentication 1
- Path MTU
- Path MTU 1
- Perfect Forward Secrecy See PFS
- PFS 1
- Phase 1 1
- Phase 2 1
- ping of death attack protection
- pinholes 1
- PKI 1
- using SCEP 1
- policies 1
- policies, configuring 1
- policy
- IDP See IDP
- policy templates
- predefined 1
- port scan attack protection
- overview 1
- predefined attack objects 1
- predefined policy templates 1
- overview 1
- preshared key 1
- probes
- processing
- proposals
- protocol anomaly 1
- protocol anomaly attack 1
- protocol anomaly attack sample 1
- protocol binding 1
- sample format 1
- proxy IDs 1
- public/private key pair 1
R
- rate limiting, GTP-C messages 1
- reconnaissance
- reconnaissance deterrence
- record route IP option 1, 2
- redundancy group
- redundancy group configuration 1
- redundancy groups
- redundant Ethernet interface LAG 1
- configuration 1
- redundant Ethernet interfaces
- registry changes, Access Manager 1
- rekey messages 1, See also group VPNs
- Remote Access Management Solution See dynamic VPNs
- remote access server
- replay protection 1
- reregistration
- group member 1
- resource access policies See UAC, resource access policies
- reth
- RFCs
- roles See UAC, user roles
- route mode 1
- RPC
- Sun RPC 1
- rulebase
- rules
S
- SA parameters 1
- SAs 1, 2, See also group VPNs
- SCCP
- SCEP 1, 2, 3
- scope policies See group VPNs
- screen
- address sweep 1
- bad IP options, drop 1
- FIN with no ACK 1
- FIN without ACK flag, drop 1
- ICMP
- fragments, block 1
- ICMP floods 1, 2
- IP options 1
- IP packet fragments, block 1
- IP spoofing 1, 2
- Land attacks 1, 2
- large ICMP packets, block 1
- loose source route IP option, detect 1
- Ping of Death 1
- port scan 1
- source route IP option, deny 1
- strict source route IP option, detect 1
- SYN and FIN flags set 1
- SYN floods 1, 2
- SYN fragments, detect 1
- SYN-ACK-ACK proxy floods 1, 2
- TCP packet without flags, detect 1
- Teardrop 1, 2
- UDP floods 1, 2
- unknown protocols, drop 1
- WinNuke attacks 1, 2
- Secure Hash Algorithm-1 1
- SecurID 1
- security checks, disabling TCP packet 1
- security IP option 1, 2
- security policy
- enabling IDP 1
- security zones 1
- selection modes
- self-signed certificates
- sequence-number validation 1
- service binding 1, 2
- services
- session
- session limits 1
- session lookup 1
- session table floods 1, 2
- session-based processing 1
- setting the node and cluster IDs 1
- SHA-1 1, 2
- signature attack sample 1
- signature custom attack 1
- signature database 1, See also IDP
- SIP
- SIP ALG 1
- call duration and timeouts 1
- SIP NAT
- SIP timeouts
- SNMP failover traps 1
- source IP route attack protection
- overview 1
- source NAT 1
- address pools 1
- address shifting 1
- address shifting configuration example 1
- addresses with PAT configuration example 1
- addresses without PAT configuration example 1
- configuration overview 1
- disabling port randomization 1
- egress interface translation configuration example 1
- multiple rules configuration example 1
- overview 1
- persistent addresses 1
- persistent NAT 1
- persistent NAT configuration overview 1
- persistent NAT overview 1
- port address translation 1
- rules 1
- single address translation configuration example 1
- STUN protocol 1
- with destination NAT configuration example 1
- without port address translation 1
- SPUs
- monitoring 1
- stateful 1
- stateful and stateless data processing 1, 2
- stateful inspection 1
- stateful packet processing 1, 2
- stateless firewall filters 1, 2
- stateless packet processing 1, 2
- static NAT 1
- statistics
- statistics, verifying
- stream ID IP option 1, 2
- strict source route IP option 1
- Sun RPC ALG 1
- support, technical See technical support
- SYN and FIN flags protection
- overview 1
- SYN checking 1
- SYN cookies 1
- SYN floods 1, 2
- SYN fragment protection
- overview 1
- SYN-ACK-ACK proxy floods 1
- SYN-ACK-ACK-proxy flood protection
- configuration 1
- syntax conventions 1
T
U
- UAC
- authentication tables
- captive portal 1, 2, See also captive portal
- certificates See UAC, device authentication
- clustering See UAC, failover processing
- device authentication
- dynamic auth table provisioning 1
- failover processing
- Host Checker policy enforcement 1
- Infranet agent
- Infranet Controller
- IPsec support 1
- JUEP See UAC, device authentication
- Junos OS Enforcer
- logging 1
- overview 1
- policies
- resource access policies
- show commands 1
- test-only mode 1
- timeout actions See UAC, failover processing
- user roles 1
- UDP header attack protection
- configuration 1
- Unified Access Control See UAC
- Unified Threat Management
- unknown protocol attack protection
- overview 1
- upgrading
- chassis cluster ISSU 1
- user roles See UAC, user roles
- UTM
- WELF support for log files 1
V
W
Z