Introduction To SRX-series Services Gateways: Proprietary and Confidential
Introduction To SRX-series Services Gateways: Proprietary and Confidential
4-1
Copyright 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net
Routers
Traditionally, a router is used to forward packets based on a Layer 3 IP address
Uses some type of path determination mechanism
Packet processing is stateless and promiscuous Routers separate broadcast domains and provide WAN connectivity
[ge-0/0/0] 10.2.2.1/24
10.2.2.2/24
10.3.3.10
Routing Table
Network 10.1.1.0/24 10.2.2.0/24 10.3.3.0/24 10.3.3.10/32 10.4.4.0/24
2009 Juniper Networks, Inc. All rights reserved.
192.168.2.1
M-series Router
J-series Router
Firewalls
Traditionally, a standalone firewall adds enhanced security in the enterprise network Firewall must perform:
Stateful packet processing
Keeps a session or state table based on IP header and higher-level information (TCP/UDP and Application layers)
VPN establishment
Encapsulation, authentication, and encryption
Can also implement other security elements such as SSL, IDP, ALGs, and so forth
2009 Juniper Networks, Inc. All rights reserved.
Internet
200.5.5.5
ge-1/0/1.0
10.1.1.5
ge-0/0/0.0
SRC-IP 10.1.1.5
DST-IP 200.5.5.5
Protocol 6
SRC-Port 29218
DST-Port 80
Source Port
Session Table Destination Destination Protocol Interface Address Port 200.5.5.5 10.1.1.5 80 29218 6 6 ge-1/0/1.0 ge-0/0/0.0
29218
80
Session table is used by outgoing and incoming packets for bidirectional communication
2009 Juniper Networks, Inc. All rights reserved.
10.1.1.5
SRC-IP DST-IP
Public 201.1.8.1
SRC-IP DST-IP
Internet
10.1.1.5
221.1.8.5
36033
80
201.1.8.1
221.1.8.5
1025
80
10.1.20.3
Private 10.1.20.1
10.1.20.4
Public 2.2.2.1
IP Packet
Encrypted Packet
Private 10.0.0.254 10.0.0.5 10.0.0.6
IP Packet
Firewall Positioning
Typical firewall positioning:
Network edge for a small office
Marketing Zone Administrative Zone
Branch office
IPsec VPN
Internet
IPsec VPN
Engineering Zone
10
Current Trends
The current trends:
As boundaries of networks are virtualized, so are the requirements of network edge devices The functions of a router and a firewall are collapsing More protection required at the network edge
11
A New Perspective
SRX-series Services Gateways
Integrated security and network features with robust Dynamic Services Architecture
Marketing Zone Administrative Zone
Branch Office
IPsec VPN
Internet
IPsec VPN
Engineering Zone
Craft Interface
8 RU
SCB/RE
13
16 RU
SCB/RE
SPC
14
SPC - CP
1
IOC
6
3 Session
create
Session 4 install
Install 5 Ack
7
IOC
Outgoing packet
Terms:
SPC
IOC: Media connection to networks SPC: Contains flow module CP: Performs first path processing and load-balances sessions across SPCs
2009 Juniper Networks, Inc. All rights reserved.
15
SPC - CP
1 4
IOC
3
IOC SPC
2
Outgoing packet
16
Restrictive
Ideal
Vulnerable
Traditional router starts off as completely vulnerable All Traffic Permitted
2009 Juniper Networks, Inc. All rights reserved.
17
18
Packet-based features:
Control plane OS Routing protocols Forwarding features:
Per-packet stateless filters Policers CoS
J-Web
2009 Juniper Networks, Inc. All rights reserved.
19
20
Data Plane:
Implemented on the IOCs and SPCs Forwarding packets, session setup and maintenance, load-balancing, security policy, screen options, IDP, VPN
21
First Path
Yes SCREEN TCP Options NAT Services ALG
Fast Path
22
Session Management
Sessions are maintained in the session hash table for packet matching and processing When no traffic matches the session during the service timeout, the session is aged out Run-time changes during the lifetime of the session might be propagated into the session
Routing changes are always propagated into the session Security policy changes are propagated based on configuration
23
Private Zone
External Zone
.254
Web Server
Internet
10.1.10.5
10.1.1.0/24
200.5.5.5
1.1.8.0/24
10.1.20.0/24 Host-B
.1
10.1.2.0/24
1.1.7.0/24
.254
1.1.70.0/24
.1 B
.254
10.1.20.5
Public Zone
1.1.70.250
24
DST-IP
200.5.5.5
1. Existing session?
No
Source Address
Source Port
Protocol
Int
2. Destination reachable?
Yes
3. Interzone traffic?
Yes
Routing Table Network Interface 10.1.1.0/24 ge-0/0/0 10.1.2.0/24 ge-0/0/1 10.1.10.0/24 ge-0/0/0 10.1.20.0/24 ge-0/0/1 0.0.0.0/0 ge-1/0/0
...
Zone Table Interface Zone ge-0/0/1 ge-0/0/0 ge-0/0/3 ge-1/0/0 Private Private Public External
25
Session Table Destination Destination Protocol Interface Address Port 200.5.5.5 10.1.20.5 80 29218 6 6 ge-1/0/0.0 ge-0/0/1.0
SRC-IP
10.1.20.5
DST-IP
200.5.5.5
26