lane esd technology services core firewall overview
play

Lane ESD Technology Services Core Firewall Overview Districts - PowerPoint PPT Presentation

Lane ESD Technology Services Core Firewall Overview Districts Behind Firewall Blachly Creswell Crow-Applegate-Lorane Fern Ridge Junction City Lowell Mapleton Screened, but exempt from policies Marcola


  1. Lane ESD Technology Services Core Firewall Overview

  2. Districts Behind Firewall • Blachly • Creswell • Crow-Applegate-Lorane • Fern Ridge • Junction City • Lowell • Mapleton Screened, but exempt from policies • Marcola • Bethel • McKenzie • Lane Community College • Oakridge • Lane ESD • Pleasant Hill • Siuslaw • South Lane

  3. Netscreen-1000 ISG

  4. Reports • Lane ESD sent a report to districts with their respective policies earlier October. • Any comments or questions around the reports? • Are you okay with the method of transfer and format?

  5. What to include when submitting a policy request? • Short description • Source address or source address group • Destination address or destination address group • Service (what protocol or port #) or service group • Action (accept, deny, reject)

  6. To Deny or Reject? Deny – simply drops packet Reject – drops the packet and sends a TCP reset (RST) segment to the source host for TCP traffic and an ICMP “destination unreachable, port unreachable” message (type 3, code 3) for UDP traffic.

  7. Troubleshooting and Monitoring • Do you require a traffic counter or policy log? • Do you require policy scheduling? Do you need a one time exception?

  8. Traffic Counters The total number of bytes of traffic to which this policy applies and records the information in historical graphs.

  9. Policy Logs

  10. Device and Support • Juniper has not issued any notices regarding hardware EOL. • Juniper has announced the end of engineering and support for ScreenOS 6.3 on 01/23/2020. • LESD maintains a support contract with Juniper and keeps up with firmware upgrades. • LESD backs up configuration three times a week. • We send all security level notices to our syslog. Daily log sizes range from 1.8GB to 2.8GB.

  11. Syslog • 2014-10-07 09:00:46 Local5.Alert 163.41.62.249 core1-fw: NetScreen device_id=core1-fw [Root]system-alert-00012: UDP flood! From 163.41.125.10:1060 to 163.41.62.5:514, proto UDP (zone netsrvs-untrust int ethernet1/3). Occurred 1 times. (2014-10-07 09:00:54)<000> • 2014-10-07 09:00:46 Local5.Alert 163.41.62.249 core1-fw: NetScreen device_id=core1-fw [Root]system-alert-00008: IP spoofing! From 59.156.126.171:6881 to 163.41.117.203:45433, proto UDP (zone inet-trust int ethernet1/2). Occurred 2 times. (2014-10-07 09:00:54)<000> • 2014-10-07 09:00:46 Local5.Alert 163.41.62.249 core1-fw: NetScreen device_id=core1-fw [Root]system-alert-00008: IP spoofing! From 93.180.5.26:42378 to 163.41.116.98:53, proto UDP (zone inet-trust int ethernet1/2). Occurred 1 times. (2014-10-07 09:00:54)<000> • 2014-1 • 2014-10-07 09:00:56" duration=0 policy_id=226 service=udp/port:62563 proto=17 src zone=Global dst zone=Global action=Deny sent=0 rcvd=28 src=1.234.228.119 dst=163.41.3.174 src_port=28247 dst_port=62563 session_id=0 reason=Traffic Denied<000> • 2014-10-07 09:00:48 Local5.Alert 163.41.62.249 core1-fw: NetScreen device_id=core1-fw [Root]system-alert-00008: IP spoofing! From 202.107.198.250 to 163.41.118.109, proto 1 (zone inet-trust int ethernet1/2). Occurred 1 times. (2014-10-07 09:00:56)<000> • 2014-10-07 09:00:48 Local5.Alert 163.41.62.249 core1-fw: NetScreen device_id=core1-fw [Root]system-alert-00008: IP spoofing! From 202.107.198.250:1681 to 163.41.118.109:49153, proto UDP (zone inet-trust int ethernet1/2). Occurred 1 times. (2014-10-07 09:00:56)<000> • 2014-10-07 09:00:48 Local5.Alert 163.41.62.249 core1-fw: NetScreen device_id=core1-fw [Root]system-alert-00008: IP spoofing! From 118.209.38.14:57398 to 163.41.117.151:46342, proto UDP (zone inet-trust int ethernet1/2). Occurred 1 times. (2014-10-07 09:00:56)<000>

Recommend


More recommend