16.03.2014 Views

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

Policy Framework Configuration Guide - Juniper Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CHAPTER 8<br />

Introduction to Firewall Filters<br />

Firewall Filter Overview<br />

This chapter describes the following topics:<br />

• Firewall Filter Overview on page 183<br />

• Firewall Filter Components on page 184<br />

• Firewall Filter Types on page 190<br />

• Supported Standards on page 190<br />

The basic purpose of a firewall filter is to enhance security through the use of packet<br />

filtering. The rules you define in a firewall filter are used to determine whether to accept,<br />

deny, or forward specific types of traffic. Firewall filters are stateless; they cannot statefully<br />

inspect traffic, that is keep track of the state of network connections.<br />

The Junos OS firewall filters support a rich set of packet-matching criteria that you can<br />

use to match on specific traffic and perform specific actions, such as forwarding or<br />

dropping packets that match the criteria you specify. You can configure firewall filters<br />

to protect the local router or to protect another device that is either directly or indirectly<br />

connected to the local router. For example, you can use the filters to restrict the local<br />

packets that pass from the router’s physical interfaces to the Routing Engine (RE). Such<br />

filters are useful in protecting the IP services that run on the RE, such as Telnet, SSH, and<br />

BGP, from denial-of-service attacks.<br />

NOTE: If you configured targeted broadcast for virtual routing and forwarding<br />

(VRF) by including the forward-and-send-to-re statement, any firewall filter<br />

that is configured on the RE loopback interface (lo0) cannot be applied to<br />

the targeted broadcast packets that are forwarded to the RE. This is because<br />

broadcast packets are forwarded as flood next hop and not as local next hop<br />

traffic, and you can only apply a firewall filter to local next hop routes for<br />

traffic directed towards the RE.<br />

You can also use firewall filters to perform multifield classification, counting, and policing.<br />

Multifield classification is used to perform specialized packet handling, including<br />

filter-based forwarding, or policy-based routing. Counting enables you to gather usage<br />

statistics. Policing is used to enforce bandwidth restrictions. Firewall filters that perform<br />

Copyright © 2010, <strong>Juniper</strong> <strong>Networks</strong>, Inc.<br />

183

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!