cisco enterprise firewalls
Firewall rules, or security policies, are methods of filtering and logging network traffic. Juniper firewalls are able to filter traffic based on source / destination IP address and port numbers. Juniper SRX firewall products provide firewall solutions from SOHO to large enterprise networks. The SRX firewall checks all packets passing through the device. You can configure a firewall rule in Juniper SRX using the command line or the GUI. Here I will show how to create a firewall rule using the command line.

Before configuring firewall rules, you need to understand some basic terminology. The elements of Juniper firewall rules are: -

Security zones : Security zones are logical boundaries. Each interface is assigned to a security zone. The interface connected to the Internet is usually called the Untrust Zone ??, the interface connected to the internal network is usually called the Trust Zone ??. These zones are user defined. Can you create a zone name as an accounting zone ?? for the firewall interface connected to the accounting switch, etc. Firewall policies (rules) require a source and destination zone to be defined before a firewall rule can be defined.
Policy : This is the name of the policy that is used to define the firewall rule (policy). For example, if I want to allow traffic from a Distrust Zone to a Trusted Zone then would I name my policy as an Internet rule ?? or internet policy ??. Note: - Cisco calls a firewall rule, Juniper calls a security policy, which is basically the same thing.
IP address : The IP address defines the source network or hosts of the target network or hosts. This source address and destination address are used to meet the conditions. For example, a policy named My Policy ?? corresponds to the source address xxxx / x and the destination address yyyy / y, then we define the condition for allowing or blocking traffic. The directory is created in the zones to match the address in the rule.
application : This is the protocol or service that is allowed / denied by the rule. For example, http, https, FTP, etc. can be defined as a match condition. The source address, destination address, and application are mandatory match conditions.
Status: The condition is whether to enable / disable operation. Various conditions can be defined, such as permission, denial, log, denial, and number. For example, if the policy is named My Policy ?? corresponds to the source address xxxx / x and the destination address yyyy / y and the FTP application, then we can define a condition for enabling and logging traffic.

Read More: cisco enterprise firewalls

Maecenas aliquet accumsan

Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Class aptent taciti sociosqu ad litora torquent per conubia nostra, per inceptos hymenaeos. Etiam dictum tincidunt diam. Aliquam id dolor. Suspendisse sagittis ultrices augue. Maecenas fermentum, sem in pharetra pellentesque, velit turpis volutpat ante, in pharetra metus odio a lectus. Maecenas aliquet
Or visit this link or this one