From the course: Juniper Security Policies Fundamentals

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Best practices

Best practices

From the course: Juniper Security Policies Fundamentals

Start my 1-month free trial

Best practices

- [Instructor] Security policies are easy to configure. In a large enterprise over time as access requirements change, security policies keep building up and reaches a point where it becomes hard to manage them. These best practices will help you build a set of policies that are easy to manage and troubleshoot. Follow a good naming convention. Over time, as your security policies keep building up, it becomes difficult to track and identify them. Having a good naming convention will help you quickly identify the purpose of the policy. These are some ways to name your policies. ALLOW-ICMP-TRUST-UNTRUST, BLOCK-TELNET-EXTERNAL-INTERNAL, ALLOW-WEB-TRUST-UNTRUST. Using uppercase to name your policies will make it easier to spot them. Use least privilege. Design your firewall policies to be as tight as possible. Only permit traffic that is needed. This will ensure that the attack surface is minimum and you have tight control over the traffic that is flowing in your network. Place specific…

Contents