From the course: Juniper Security Policies Fundamentals
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Example policy creation 2
From the course: Juniper Security Policies Fundamentals
Example policy creation 2
- [Narrator] Let's create another security policy that will allow ssh connections from the trust zone to the dmz zone. This security policy will use the custom ssh application that we created in a earlier movie. I'm at the JUNOS terminal right now and I'm going to enter the configuration mode with the edit command. I'll use the edit security policies command to enter the security policy configuration mode. I'll use the edit command and specify the from-zone as trust to-zone as dmz and then use the policy keyword to provide a policy name. Let's call it ALLOW-CUSTOM-SSH-TRUST-DMZ. Press enter, now I'm in the specific policy configuration mode. I'll use the set match command and specify the source-address as any. Next, I'll do set match destination-address and I'll start with a ?. I'm going to set the destination address as APP-SERVERS. APP-SERVERS is an address book entry containing the IP addresses of my application servers. In a later movie, we'll understand how to create an address…
Contents
-
-
-
-
Policy components5m 15s
-
(Locked)
Example policy creation 16m 6s
-
(Locked)
Defining custom applications5m 31s
-
(Locked)
Example policy creation 22m 54s
-
(Locked)
Advanced permit settings2m 51s
-
(Locked)
Address books7m 54s
-
(Locked)
Global policies2m 46s
-
(Locked)
Verifying policy configuration4m 3s
-
-
-
-
-