JEX 11.a C6 DeviceSecurity and FirewallFilters PDF
JEX 11.a C6 DeviceSecurity and FirewallFilters PDF
JEX 11.a C6 DeviceSecurity and FirewallFilters PDF
2011 Juniper Networks, Inc. All rights reserved. | www.juniper.net | Worldwide Education Services
Chapter Objectives
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-2
Agenda: Device Security and Firewall Filters
Storm Control
Firewall Filters
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-3
Traffic Storms
User A User C
Switch-1 Switch-2
MAC: 00:26:88:02:74:86 MAC: 00:26:88:02:74:88
Switch-3
Flood
User E User F
MAC: 00:26:88:02:74:90 MAC: 00:26:88:02:74:91
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-4
Introducing Storm Control
Traffic
Storm
The storm control feature ensures traffic storms do not degrade LAN performance
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-5
Storm Control Configuration
{master:0}[edit]
user@Switch-1# show ethernet-switching-options
storm-control {
interface all;
}
Note: Using the default configuration, all broadcast , multicast, and unknown unicast traffic in excess of 80 percent is dropped.
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-6
Changing the Default Configuration
Is too low?
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-8
Storm Control Actions
{master:0}[edit ethernet-switching-options]
user@Switch-1# show
storm-control {
action-shutdown;
interface all;
} Interface is disabled
Use the action-shutdown
option to alter the default behavior
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-9
Automatic Error Condition Recovery
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-10
Monitoring Automatic Recovery
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-11
Clearing Violations Manually
{master:0}
user@Switch-1> clear ethernet-switching port-error interface ge-0/0/9
{master:0}
user@Switch-1> show ethernet-switching interfaces
Interface State VLAN members Tag Tagging Blocking
ge-0/0/6.0 up v11 11 untagged unblocked
ge-0/0/8.0 up v11 11 tagged unblocked
ge-0/0/9.0 up v11 11 tagged unblocked
me0.0 up mgmt untagged unblocked
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-12
Agenda: Device Security and Firewall Filters
Storm Control
Firewall Filters
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-13
Firewall Filters: A Review
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-14
Firewall Filter Types
Port-based and VLAN-based filters use family ethernet-switching option while router-
based filters use family inet or family inet6 depending on the traffic type
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-15
Processing Order of Firewall Filters
Rx Packet Tx Packet
Input Output
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-16
Building Blocks of Firewall Filters
term firstterm
from then
match
no match
term secondterm then statements describe the
from statements describe
from then actions to take if a match with the
match conditions from statement occurs
match
no match
term Default
Default action for packets not
discard explicitly allowed
Note: Ordering matters! If you must reorder terms within a filter, consider using the insert CLI command.
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-17
Common Match Criteria
term firstterm
The from statements
describe match conditions
from then
match
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-18
Firewall Filter Actions
Objectives:
Implement filters on the access ports so that only frames
using the expected source MAC addresses are permitted
Discard and count frames sourced from any other MAC addresses
Implement a filter on both VLANs to block frames destined
to MAC address 01:80:c2:00:00:00
Discard and count frames destined to the referenced MAC address
Access ports
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-21
Case Study: Configuring the Filters (1 of 2)
{master:0}[edit firewall family ethernet-switching] {master:0}[edit firewall family ethernet-switching]
user@Switch-1# show filter limit-MAC-ge006 user@Switch-1# show filter limit-MAC-ge007
term 1 { term 1 {
from { from {
source-mac-address { source-mac-address {
00:26:88:02:74:86; 00:26:88:02:74:87;
} }
} }
then accept; then accept;
} }
term 2 { term 2 {
then { then {
discard; discard;
count ge006-invalid-MAC; count ge007-invalid-MAC;
} }
} }
Access ports
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-22
Case Study: Configuring the Filters (2 of 2)
{master:0}[edit firewall family ethernet-switching]
user@Switch-1# show filter block-dest-MAC-01:80:c2:00:00:00
term 1 {
from {
destination-mac-address {
01:80:c2:00:00:00;
}
}
then {
discard;
count block-stp-bpdus;
}
}
term 2 {
then accept;
}
Access ports
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-23
Case Study: Applying the Filters (1 of 2)
{master:0}[edit interfaces] {master:0}[edit interfaces]
user@Switch-1# show ge-0/0/6 user@Switch-1# show ge-0/0/7
unit 0 { unit 0 {
family ethernet-switching { family ethernet-switching {
vlan { vlan {
members v11; members v12;
} }
filter { filter {
input limit-MAC-ge006; input limit-MAC-ge007;
} }
} }
} }
Access ports
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-24
Case Study: Applying the Filters (2 of 2)
{master:0}[edit vlans]
user@Switch-1# show
v11 {
vlan-id 11;
filter {
input block-dest-MAC-01:80:c2:00:00:00;
}
l3-interface vlan.11;
}
v12 {
vlan-id 12;
filter {
input block-dest-MAC-01:80:c2:00:00:00;
}
l3-interface vlan.12;
}
Access ports
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-25
Case Study: Monitoring Firewall Filters
{master:0}
user@Switch-1> show firewall
Filter: block-dest-MAC-01:80:c2:00:00:00
Counters:
Name Bytes Packets
block-stp-bpdus 472 7
Filter: limit-MAC-ge006
Counters:
Name Bytes Packets
ge006-invalid-MAC 1148 12
Filter: limit-MAC-ge007
Counters:
Name Bytes Packets
ge007-invalid-MAC 842 9
Access ports
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-26
Summary
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-27
Review Questions
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-28
Lab 5: Storm Control and Firewall Filters
2011 Juniper Networks, Inc. All rights reserved. Worldwide Education Services www.juniper.net | 6-29
Worldwide Education Services