Book description
This complete field guide, authorized by Juniper Networks, is the perfect hands-on reference for deploying, configuring, and operating Juniper’s SRX Series networking device. Authors Brad Woodberg and Rob Cameron provide field-tested best practices for getting the most out of SRX deployments, based on their extensive field experience.
While their earlier book, Junos Security, covered the SRX platform, this book focuses on the SRX Series devices themselves. You'll learn how to use SRX gateways to address an array of network requirements—including IP routing, intrusion detection, attack mitigation, unified threat management, and WAN acceleration. Along with case studies and troubleshooting tips, each chapter provides study questions and lots of useful illustrations.
- Explore SRX components, platforms, and various deployment scenarios
- Learn best practices for configuring SRX’s core networking features
- Leverage SRX system services to attain the best operational state
- Deploy SRX in transparent mode to act as a Layer 2 bridge
- Configure, troubleshoot, and deploy SRX in a highly available manner
- Design and configure an effective security policy in your network
- Implement and configure network address translation (NAT) types
- Provide security against deep threats with AppSecure, intrusion protection services, and unified threat management tools
Publisher resources
Table of contents
- Foreword
- Preface
- 1. Welcome to the SRX
- 2. SRX Series Product Lines
- 3. SRX GUI Management
- 4. SRX Networking Basics
-
5. System Services
- System Services Operation on the SRX
- Management Services
- SNMP Management
- Networking Services
- SRX Logging and Flow Records
- Best Practices
- Troubleshooting and Operation
- Summary
- Study Questions
-
6. Transparent Mode
-
Transparent Mode Overview
- When to Use Transparent Mode
- MAC Address Learning
- Transparent Mode and Bridge Loops, Spanning Tree Protocol
- Transparent Mode Limitations
- Transparent Mode Components
- Interface Modes in Transparent Mode
- Bridge Domains
- IRB Interfaces
- Transparent Mode Zones
- Transparent Mode Security Policy
- Transparent Mode Specific Options
- QoS in Transparent Mode
- VLAN Rewriting
- High Availability with Transparent Mode
- Transparent Mode Flow Process
- Configuring Transparent Mode
- Troubleshooting and Operation
- Sample Deployments
- Summary
- Study Questions
-
Transparent Mode Overview
-
7. High Availability
- Understanding High Availability in the SRX
- Getting Started with High Availability
- Deployment Concepts
- Preparing Devices for Deployment
- Integrating the Cluster into Your Network
- Fault Monitoring
- Troubleshooting and Operation
- Sample Deployments
- Summary
- Study Questions
-
8. Security Policies
- Packet Flow
- Security Policy Criteria and Precedence
- Security Policy Precedence
- Security Policy Components in Depth
- Best Practices
- Troubleshooting and Operation
- Sample Deployment
- Summary
- Study Questions
-
9. Network Address Translation
- The Need for NAT
- Junos NAT Fundamentals
- Junos NAT Components
- Junos NAT in Practice
- Best Practices
- Troubleshooting and Operation
- Sample Deployment
- Summary
- Study Questions
-
10. IPsec VPN
- VPN Architecture Overview
- IPsec VPN Concepts Overview
- IKE Negotiations
- Flow Processing and IPsec VPNs
- SRX VPN Types
- Other SRX VPN Components
- Selecting the Appropriate VPN Configuration
-
IPsec VPN Configuration
- Configuring NTP
- Certificate Preconfiguration Tasks
- Phase 1 IKE Configuration
- Phase 2 IKE Configuration
- IKEv1 Versus IKEv2 Configuration
- IPsec and SRX HA
- Dynamic VPN
- Best Practices
- Troubleshooting and Operation
- Sample Deployments
- Summary
- Study Questions
-
11. Screens and Flow Options
- A Brief Review of Denial-of-Service Attacks
-
Screen Theory and Examples
- How Screens Fit into the Packet Flow
- Screens in Hardware and Software
- Screen Profiles
- DoS Attacks with IP Protocols
- DoS Attacks with ICMP
- DoS Attacks with UDP
- DoS Attacks with TCP
- Session Limit Screens
- SRX Flow Options
- Best Practices
- Troubleshooting and Operation
- Sample Deployment
- Summary
- Study Questions
-
12. AppSecure Basics
- AppSecure Component Overview
-
Deploying AppSecure
- AppSecure Licensing
- Downloading and Installing Application Identification Sigpacks
- AppID Signature Operations
- Configuring and Deploying AppTrack
- Configuring and Deploying Application Firewall
- Configuring and Deploying Application Quality of Service
- Configuring and Deploying User Role Firewall
- Configuring and Deploying SSL Forward Proxy
- Best Practices
- Troubleshooting and Operation
- Sample Deployments
- Summary
- Study Questions
-
13. Intrusion Prevention
- The Need for IPS
-
How Does IPS Work?
- Licensing
- IPS and UTM
- What Is the Difference Between Full IPS and Deep Inspection/IPS Lite?
- Is It IDP or IPS?
- False Positives and False Negatives in IPS
- Management IPS Functionality on the SRX
- Stages of a System Compromise
- IPS Packet Processing on the SRX
- Attack Object Types
- IPS Policy Components
- Security Packages
- Sensor Attributes
- SSL Inspection (Reverse Proxy)
- Custom Attack Groups
- Configuring IPS Features on the SRX
- Deploying and Tuning IPS
- Best Practices
- Troubleshooting and Operation
- Sample Deployments
- Summary
- Study Questions
-
14. Unified Threat Management
- Shifting Threats
- UTM, IPS, or Both?
- UTM Licensing
-
UTM Components
- Feature Profiles
- Custom Objects
- UTM Policies
- Application Proxy
- Networking Requirements for UTM Features
- Antivirus
- Which AV to Choose?
- URL Filtering
- Antispam
- Content Filtering
- Logging UTM Messages
- Best Practices
- Troubleshooting and Operation
- Sample Deployments
- Summary
- Study Questions
- Index
- About the Authors
- Colophon
- Copyright
Product information
- Title: Juniper SRX Series
- Author(s):
- Release date: June 2013
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781449338961
You might also like
book
Juniper QFX5100 Series
Ideal for network engineers involved in building a data center, this practical guide provides a comprehensive …
book
Juniper MX Series
Discover why routers in the Juniper MX Series, with their advanced feature sets and record breaking …
video
Cisco Programmable Fabric with VXLAN, BGP EVPN
6+ Hours of video instruction More than 6 hours of video instruction on standards-based Data Center …
video
Cisco Certified DevNet Associate DEVASC 200-901
15+ Hours of Video Instruction The Cisco Certified DevNet Associate DEVASC 200-901 Complete Video Course correlates …