Contents • iii Overview Welcome to the JNCIS-SEC Study Guide—Part 2. The purpose of this guide is to help you prepare for your JN JNCIS-SEC Study Guide Chapter 1: Introduction to Junos Security Platforms This Chapter Discusses: • • • • • Traditional routing and security implementations. the front page of the internet. Become a Redditor. and subscribe to one of thousands of communities. ×. 1. 2. 3. JNCIS-SEC Study Guide (self.

Author: Zululkree Maut
Country: Timor Leste
Language: English (Spanish)
Genre: Spiritual
Published (Last): 6 September 2013
Pages: 392
PDF File Size: 10.86 Mb
ePub File Size: 17.70 Mb
ISBN: 313-3-12880-795-1
Downloads: 49050
Price: Free* [*Free Regsitration Required]
Uploader: Kajisho

The fallback options are taken when traffic is unable to be scanned, and all fallback options have an action guidsart either block or log-and-permit. We removed some content for brevity. What Is a Security Policy? The scan engine does a quick check on these first packets. We address this topic later. The Junos OS provides a pool utilization alarm for monitoring pool usage.

Remember the matching order of the entries: We highlight the default security policy in a subsequent graphic. You can jnics-sec assign one or more logical interfaces to a routing instance. Packet Flow The graphic reviews packet flow through the flow module of a Junos security platform.

Antispam is the ability to prevent spam before it enters sttudy network. This integer refers to the maximum allowed sessions from a single source. The packet traverses the switch fabric to the IOC associated with the egress interface and travels to the attached physical medium.


JNCIS-SEC: Chapter 1 – Intro

The forwarding table shows that the software detects how to reach the destination network. Due to resource constraints, a default device-dependent limit exists on the maximum content size for a file. The outgoing flow initiates a session table entry and the expected return flow for that packet. The fallback actions are to either block, or log-and-permit. Each feature profile determines the specific configuration for each feature antivirus, content filtering, Web filtering, and antispam.

The scan engine is initializing itself, for example, loading the signature database. The client group can consist of one or more groups.

Users attempting to access a network resource receive a prompt from the Junos operating system for a username and password even if a security policy is in place permitting the traffic. In the example, the UTM policy is named junos-wf-policy.

JNCIS-SEC Study Guide Part-1 – types and number of system-defined zones

Apply the UTM policy to the appropriate security policy using the application-services extended permit action, as demonstrated in the graphic. Teardrop attacks exploit the reassembly of fragmented IP packets.

In branch devices only, a policy can also associate traffic with UTM features such as antivirus, content filtering, and Web filtering. Only one type of scanning method can be applied at a time. The diagram on the graphic shows how the entire file is received and reconstructed before virus scanning begins.

The trend of working at home and using a work PC for personal use increases the possibility of dangerous and annoying attacks such as spyware, phishing, and spam. The URL pattern lists are applied to the custom-objects custom-url-category lists called custwhitelist and custblacklist.


To open all ports for all services, use the any-service keyword. The Attack An address sweep occurs when one source IP address sends a predefined number of ICMP packets to various hosts within a predefined interval of time.

For its control plane, the Junos Njcis-sec for security platforms deploys these features along with well-known, traditional Junos features. The Websense options are: The virus pattern and malware database is located on external servers maintained by Sophos Extensible List SXL servers, thus there is no need to download and maintain large pattern databases on the Juniper device.

These are not typical virus pattern files; they are a set of small files that help guide virus scanning logic. Encapsulate the original traffic in a packet that can be transported over the public network; Encrypt the original packet so that it cannot be easily decoded if it is intercepted on the public network; and Authenticate the originating device as a member of the VPN—not a random device operating on the public network.

The Websense server maintains a database of categories and Web filtering policies. The device prompts the end user for a username and password. The Websense redirect server features: You must specify all matching components.