Lane ESD Technology Services Core Firewall Overview Districts - - PowerPoint PPT Presentation

lane esd technology services core firewall overview
SMART_READER_LITE
LIVE PREVIEW

Lane ESD Technology Services Core Firewall Overview Districts - - PowerPoint PPT Presentation

Lane ESD Technology Services Core Firewall Overview Districts Behind Firewall Blachly Creswell Crow-Applegate-Lorane Fern Ridge Junction City Lowell Mapleton Screened, but exempt from policies Marcola


slide-1
SLIDE 1

Lane ESD Technology Services Core Firewall Overview

slide-2
SLIDE 2

Districts Behind Firewall

  • Blachly
  • Creswell
  • Crow-Applegate-Lorane
  • Fern Ridge
  • Junction City
  • Lowell
  • Mapleton
  • Marcola
  • McKenzie
  • Oakridge
  • Pleasant Hill
  • Siuslaw
  • South Lane

Screened, but exempt from policies

  • Bethel
  • Lane Community College
  • Lane ESD
slide-3
SLIDE 3

Netscreen-1000 ISG

slide-4
SLIDE 4
slide-5
SLIDE 5
slide-6
SLIDE 6
slide-7
SLIDE 7

Reports

  • Lane ESD sent a report to districts with

their respective policies earlier October.

  • Any comments or questions around the

reports?

  • Are you okay with the method of transfer

and format?

slide-8
SLIDE 8

What to include when submitting a policy request?

  • Short description
  • Source address or source address group
  • Destination address or destination address group
  • Service (what protocol or port #) or service group
  • Action (accept, deny, reject)
slide-9
SLIDE 9

To Deny or Reject?

Deny – simply drops packet Reject – drops the packet and sends a TCP reset (RST) segment to the source host for TCP traffic and an ICMP “destination unreachable, port unreachable” message (type 3, code 3) for UDP traffic.

slide-10
SLIDE 10
  • Do you require a traffic counter or policy log?
  • Do you require policy scheduling? Do you need a one time

exception?

Troubleshooting and Monitoring

slide-11
SLIDE 11

Traffic Counters

The total number of bytes of traffic to which this policy applies and records the information in historical graphs.

slide-12
SLIDE 12

Policy Logs

slide-13
SLIDE 13

Device and Support

  • Juniper has not issued any notices regarding hardware EOL.
  • Juniper has announced the end of engineering and support for

ScreenOS 6.3 on 01/23/2020.

  • LESD maintains a support contract with Juniper and keeps up with

firmware upgrades.

  • LESD backs up configuration three times a week.
  • We send all security level notices to our syslog. Daily log sizes range

from 1.8GB to 2.8GB.

slide-14
SLIDE 14

Syslog

  • 2014-10-07 09:00:46

Local5.Alert 163.41.62.249 core1-fw: NetScreen device_id=core1-fw [Root]system-alert-00012: UDP flood! From 163.41.125.10:1060 to 163.41.62.5:514, proto UDP (zone netsrvs-untrust int ethernet1/3). Occurred 1 times. (2014-10-07 09:00:54)<000>

  • 2014-10-07 09:00:46

Local5.Alert 163.41.62.249 core1-fw: NetScreen device_id=core1-fw [Root]system-alert-00008: IP spoofing! From 59.156.126.171:6881 to 163.41.117.203:45433, proto UDP (zone inet-trust int ethernet1/2). Occurred 2 times. (2014-10-07 09:00:54)<000>

  • 2014-10-07 09:00:46

Local5.Alert 163.41.62.249 core1-fw: NetScreen device_id=core1-fw [Root]system-alert-00008: IP spoofing! From 93.180.5.26:42378 to 163.41.116.98:53, proto UDP (zone inet-trust int ethernet1/2). Occurred 1 times. (2014-10-07 09:00:54)<000>

  • 2014-1
  • 2014-10-07 09:00:56" duration=0 policy_id=226 service=udp/port:62563 proto=17 src zone=Global dst zone=Global action=Deny sent=0 rcvd=28

src=1.234.228.119 dst=163.41.3.174 src_port=28247 dst_port=62563 session_id=0 reason=Traffic Denied<000>

  • 2014-10-07 09:00:48

Local5.Alert 163.41.62.249 core1-fw: NetScreen device_id=core1-fw [Root]system-alert-00008: IP spoofing! From 202.107.198.250 to 163.41.118.109, proto 1 (zone inet-trust int ethernet1/2). Occurred 1 times. (2014-10-07 09:00:56)<000>

  • 2014-10-07 09:00:48

Local5.Alert 163.41.62.249 core1-fw: NetScreen device_id=core1-fw [Root]system-alert-00008: IP spoofing! From 202.107.198.250:1681 to 163.41.118.109:49153, proto UDP (zone inet-trust int ethernet1/2). Occurred 1 times. (2014-10-07 09:00:56)<000>

  • 2014-10-07 09:00:48

Local5.Alert 163.41.62.249 core1-fw: NetScreen device_id=core1-fw [Root]system-alert-00008: IP spoofing! From 118.209.38.14:57398 to 163.41.117.151:46342, proto UDP (zone inet-trust int ethernet1/2). Occurred 1 times. (2014-10-07 09:00:56)<000>

slide-15
SLIDE 15