From the course: Juniper Security Policies Fundamentals

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

Example policy creation 2

Example policy creation 2

From the course: Juniper Security Policies Fundamentals

Start my 1-month free trial

Example policy creation 2

- [Narrator] Let's create another security policy that will allow ssh connections from the trust zone to the dmz zone. This security policy will use the custom ssh application that we created in a earlier movie. I'm at the JUNOS terminal right now and I'm going to enter the configuration mode with the edit command. I'll use the edit security policies command to enter the security policy configuration mode. I'll use the edit command and specify the from-zone as trust to-zone as dmz and then use the policy keyword to provide a policy name. Let's call it ALLOW-CUSTOM-SSH-TRUST-DMZ. Press enter, now I'm in the specific policy configuration mode. I'll use the set match command and specify the source-address as any. Next, I'll do set match destination-address and I'll start with a ?. I'm going to set the destination address as APP-SERVERS. APP-SERVERS is an address book entry containing the IP addresses of my application servers. In a later movie, we'll understand how to create an address…

Contents