Chapter 9

Securing Your Junos OS Devices

In This Chapter

  • Ensuring the physical security of your network
  • Getting the rundown on Junos OS default security settings
  • Knowing who's logged on
  • Logging out
  • Creating a firewall filter to control SSH and Telnet access
  • Limiting traffic on router interfaces by using policers
  • Using the loopback (lo0) interface to protect the routing engine
  • Enabling authentication to secure routing protocols

This chapter is about taking security measures using Junos on your switches, routers, and gateways. Security is critical today because you can move traffic, both wanted and unwanted, very quickly across a network. A hacker can take control of an unsecured or an improperly secured device and wreak havoc on your network, using the compromised device as a launching pad for denial-of-service and other types of attacks — faster than you can make a sandwich and eat it (maybe even before you can toast the bread).

In this chapter, we cover several security features and practices you can take advantage of that are built into the Junos OS. After you finish this chapter, you will be able to protect your device with basic security measures that can stop all sorts of attacks. (See Chapter 12 for information about implementing special security services on your network using the SRX Services Gateway.)

Note: In this chapter, we're assuming that you've installed and done the initial configuration (refer to Chapter 6) and have set up management and monitoring (refer to ...

Get Junos® OS For Dummies®, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.