Author Archives: Coding Packets Blog
Author Archives: Coding Packets Blog
Firewall filters are similar to access control lists (ACLs). Firewall filters are stateless and inspect each packet individually. Because they are stateless traffic must be allowed in both directions. Configuration Routing policies and firewall filters have a common structure. ...continue reading
Junos routing policy allows an administrator to alter the default behaviour of a routing protocol. All routing protocols try to determine the best path to a destination based on the protocols definition of the best "metric". The Junos routing policy framework allows an...continue reading
Junos is the name of the operating system that is used to manage Juniper network devices. Fun fact Junos is built on a base of FreeBSD and is designed to be modular and secure while providing a uniform user interface across all platforms. Junos Features Common Code Base The...continue reading
Juniper protocol-independent routing covers IP routing components such as static routes and the various route tables within Junos that are not particular to any dynamic routing protocol. Routing Table The RE holds a copy of all routes from all protocols in its routing table....continue reading
Trace options are similar to running a debug in other vendors. Enable Tracing When tracing is enabled the results are stored in a trace file in the /var/log/ directory or sent to a remote syslog server. Remote logging is configured under the system > tracing ...continue reading
Junos has a robust authentication, authorization and accounting (AAA) system ensuring authenticated users have access to only the things their permissions allow. Authentication Junos supports two categories of user authentication. Local - On box user database Remote -...continue reading