Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
18Activity
0 of .
Results for:
No results containing your search query
P. 1
Fundamentals of Juniper SSG

Fundamentals of Juniper SSG

Ratings: (0)|Views: 2,517 |Likes:
Published by Naveed Shahid
learn juniper firewall SSG with concepts
learn juniper firewall SSG with concepts

More info:

Published by: Naveed Shahid on Jul 26, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

02/18/2013

pdf

text

original

 
Juniper Networks, Inc.
1194 North Mathilda AvenueSunnyvale, CA 94089USA408-745-2000
www.juniper.net
Part Number: 530-017768-01, Revision 03
Concepts & ExamplesScreenOS Reference Guide
Volume2:Fundamentals
 Release 6.0.0, Rev. 03
 
ii
Copyright Notice
Copyright © 2008 Juniper Networks, Inc. All rights reserved.Juniper Networks, the Juniper Networks logo, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States andother countries. All other trademarks, service marks, registered trademarks, or registered service marks in this document are the property of JuniperNetworks or their respective owners. All specifications are subject to change without notice. Juniper Networks assumes no responsibility for anyinaccuracies in this document or for any obligation to update information in this document. Juniper Networks reserves the right to change, modify,transfer, or otherwise revise this publication without notice.
FCC Statement
The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class Adigital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when theequipment is operated in a commercial environment. The equipment generates, uses, and can radiate radio-frequency energy and, if not installed andused in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residentialarea is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense.The following information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequencyenergy. If it is not installed in accordance with Juniper Networks’ installation instructions, it may cause interference with radio and television reception.This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCCrules. These specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is noguarantee that interference will not occur in a particular installation.If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the useris encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Consult the dealer or an experienced radio/TV technician for help.
Connect the equipment to an outlet on a circuit different from that to which the receiver is connected.
Caution:
Changes or modifications to this product could void the user's warranty and authority to operate this device.
Disclaimer
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPEDWITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITEDWARRANTY, CONTACT YOUR JUNIPER NETWORKS REPRESENTATIVE FOR A COPY.
 
Table of Contents
iii
Table of Contents
ix
1
Security Zones.................................................................................................2Security Zone Interfaces...................................................................................3Physical Interfaces.....................................................................................3Subinterfaces.............................................................................................3Virtual Routers.................................................................................................4Policies.............................................................................................................5Virtual Private Networks..................................................................................6Virtual Systems................................................................................................9Packet-Flow Sequence....................................................................................10Jumbo Frames................................................................................................13ScreenOS Architecture Example.....................................................................14Example: (Part 1) Enterprise with Six Zones............................................14Example: (Part 2) Interfaces for Six Zones...............................................16Example: (Part 3) Two Routing Domains.................................................18Example: (Part 4) Policies........................................................................20
25

Activity (18)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
jdr114 liked this
Lotus Perfaction liked this
vsnlabc liked this
Lotus Perfaction liked this
Lotus Perfaction liked this
Ian Bond liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->