From the course: Juniper Security Policies Fundamentals

Scenario

From the course: Juniper Security Policies Fundamentals

Start my 1-month free trial

Scenario

- Throughout the rest of the course we'll be working with a real-world scenario. This will help us understand how concepts are applied to a real-world configuration. We've got an XRS device which has been divided into three zones. The first one is called Trust. This is where all the internal devices will be connected. The second one is called DMZ. This is where servers will be connected and the third one is called Untrust. This represents the internet. In the upcoming movies we'll understand how to create address objects that represent devices connected to the firewall and how to write security policies to allow the flow of traffic through the SRX device.

Contents