Friday, 10 October 2014

How to create VLAN interfaces in Gaia Clish




How to create VLAN interfaces in Gaia Clish


To create VLANs on Gaia, one can use either the Gaia Portal, or the Clish shell.

When creating VLAN interfaces via Clish, the following commands should be used:
  1. Bringing on the the Physical interface, on which the VLAN interfaces will be created:

    Note: This command may be skipped, if the interface's state is already on.

    HostName> set interface <Name_of_Physical_Interface> state on
  2. Adding a VLAN interface:

    HostName> add interface <Name_of_Physical_Interface> vlan <VLAN_ID>
  3. Assigning an IP address to newly created VLAN interface:

    HostName> set interface <Name_of_VLAN_Interface> ipv4-address <IP_Address> mask-length <Subnet_Mask_Length>
  4. Saving the configuration (so it survives reboot):

    HostName> save config

Tuesday, 16 September 2014

Juniper User Authentication Configuration


Juniper User Authentication Configuration

Following are the command line configuration for Juniper User authentication on SRX boxes:


To configure the device for pass-through firewall authentication
  1. set access profile FWAUTH client yogesh firewall-user password abc@123
  2. set access firewall-authentication pass-through default-profile FWAUTH
  3. set security policies from-zone Internal to-zone External policy NewPol match source-address HQ-LOCAL  destination-address any application http  
  4. set security policies from-zone Internal to-zone External policy NewPol  then permit firewall authentication pass-through client-match yogesh

By default access allowed for 10 min in case of idle session to change the settings
            #set access profile FWAUTH session-options client-idle-timeout "TIME IN MIN"


To view the current authentication table
            >show security firewall-authentication users
            >show security firewall-authentication history


To configure the device for Web firewall authentication

  1. set access profile WEBAUTH client yogesh firewall-user password abc@123
  2. set access firewall-authentication web-authentication default-profile WEBAUTH
  3. set system services web-management http interface fe-0/0/5.0
  4. set interfaces fe-0/0/5.0 family inet set address 192.168.1.250/24 web-authentication http
  5. set security policies from-zone Internal to-zone External policy NewPol match source-address HQ-LOCAL  destination-address any application http 
set security policies from-zone Internal to-zone External policy NewPol  then permit firewall authentication web-authentication client-match yogesh


To configure the Client group
  1. set access profile WEBAUTH client C-NAME client-group G-NAME firewall-user password abc@123

Wednesday, 10 September 2014

Firewall- Basics



Firewall-Basics


In last few years, security threats to organisations have grown with lots of new techniques and that why we need defense mechanism more stronger than before.

Firewall is one of strong pillar of network defense mechanism.

Firewall - A Defense Mechanism
A firewall is a system designed to prevent unauthorized access to or from a private computer network. Firewalls are frequently used to prevent unauthorized users from accessing the important data. 

All messages entering or leaving an intranet pass through a firewall, which examines each message and blocks those that do not meet specific security criteria.

A firewall is necessary to protect an organization’s confidential information from those not authorized to access it and to protect against malicious users and incidents that originate outside its network. One of the most important elements of a firewall is its access control features, which distinguish between good and bad traffic. The various types of firewalls are :
  • Packet Filter Firewall
  • Statefull Firewall
  • Application Intelligent 
  • Application Proxy 
W'll see the explanation for these firewall types in next blog.  

In the real world, threats have evolved over the years, and firewalls have evolved to deal with them. While it is still possible to buy packet-only firewalls, they are not adequate for business use. Protection against blended threats is best provided by firewalls that combine all of the prior elements.

Traditional firewalls were not the best suited for current threats and cannot protect against a number of new threats.

At last only remember:-

"We have many Firewalls, Network security products and a lots of technological advancements to fight with threats, but the number one thing is our SECURITY AWARENESS PROGRAM"