分享
 
 
 

JUNOS Secure Template

王朝other·作者佚名  2006-01-09
窄屏简体版  字體: |||超大  

/* ... begin template ... */

version 4.3R3;

system {

host-name secure-router-01;

/* Enable a backup router during boot for ntp. It will be used before

rpd has started or if it fails. */

backup-router 6.6.6.1 destination 7.7.7.0/24;

time-zone America/Chicago;

/* Do not send ICMP redirects */

no-redirects;

/* Use local password authentication if AAA fails */

authentication-order [ radius password ];

location country-code US;

/* Configure authentication passwords */

diag-port-authentication {

encrypted-password "<PASSWORD>"; # SECRET-DATA

}

root-authentication {

encrypted-password "<PASSWORD>"; # SECRET-DATA

}

/* Enable RADIUS authentication. Read ‘JUNOS RADIUS Authentication’ [4]

for further information on configuring and troubleshooting RADIUS */

radius-server {

7.7.7.5 {

/* Shared secret between client and server */

secret "<PASSWORD>"; # SECRET-DATA

/* Wait 5 seconds until timeout */

timeout 5;

}

}

login {

/* Same as MOTD banner in Cisco. Extend a stern introduction. */

message "********************************************************\n

* [WARNING] secure-router-01 *\n

* This system is owned by [COMPANY]. If you are not *\n

* authorized to access this system, exit immediately. *\n

* Unauthorized access to this system is forbidden by *\n

* company policies, national, and international laws. *\n

* Unauthorized users are subject to criminal and civil *\n

* penalties as well as company initiated disciplinary *\n

* proceedings. *\n

* *\n

* By entry into this system you acknowledge that you *\n

* are authorized access and the level of privilege you *\n

* subsequently execute on this system. You further *\n

* acknowledge that by entry into this system you *\n

* expect no privacy from monitoring. *\n

********************************************************\n";

/* Configure an account classes with specific privileges. We cannot

modify the predefined classes, so we must create our own. */

class tier1 {

/* Session will time out after 15 minutes of inactivity */

idle-timeout 15;

/* Provides basic read-only privileges */

permissions [ configure interface network routing snmp system

trace view firewall ];

}

class tier2 {

idle-timeout 15;

/* Provides a controlled subset of read-write privileges */

permissions [ admin clear configure interface interface-

control network reset routing routing-control

snmp snmp-control system system-control trace

trace-control view maintenance firewall

firewall-control secret rollback ];

}

class tier3 {

idle-timeout 15;

/* Provides unlimited access */

permissions all;

}

/* This is our local superuser account with a local password. */

user admin {

full-name Administrator;

uid 2000;

class tier3;

authentication {

encrypted-password "<PASSWORD>"; # SECRET-DATA

}

}

/* RADIUS template tier1 user. Read-only */

user tier1 {

uid 2001;

class tier1;

}

/* RADIUS template tier2 user. Read-write limited */

user tier2 {

uid 2002;

class tier2;

}

/* RADIUS template tier3 user. Read-write */

user tier3 {

uid 2003;

class tier3;

}

}

/* List of IPs and their hostnames */

static-host-mapping {

/* Put localhost entry for NTP to work */

localhost inet 127.0.0.1;

firewall-ext inet 6.6.6.1;

firewall-int inet 7.7.7.1;

upstream inet 5.5.5.1;

utility inet 7.7.7.5;

syslog inet 7.7.7.8;

}

/* Enable router services */

services {

/* Enable 5 ssh sessions. Max 10 connection attempts per minute. */

ssh connection-limit 5 rate-limit 10;

/* JUNOS 5.0 and above: disallow remote root logins */

root-login deny;

/* JUNOS 5.0 and above: use SSH version 2 only */

protocol-version v2;

}

syslog {

/* Archive old files up to 10mb total */

archive size 1m files 10;

user * {

any emergency;

}

/* Punt log data over to our syslog server */

host 7.7.7.8 {

any info;

}

file messages {

any notice;

authorization info;

}

}

/* Synchronize our clock with a trusted authenticated NTP server */

ntp {

authentication-key 6767 type md5 value "<PASSWORD>"; # SECRET-DATA

/* NTP will not sync if times are too distant. Set time at bootup */

boot-server 7.7.7.5;

server 7.7.7.5;

}

}

chassis {

/* Disable source routing */

no-source-route;

}

interfaces {

/* Log additional interface information to aid in troubleshooting. To

view, use 'show log log-interfaces' */

traceoptions {

/* Rotate through 5 files at 1mb each */

file log-interfaces size 1m files 5;

/* Trace changes that produce configuration events */

flag change-events;

}

ge-0/0/0 {

description "Upstream Interface - facing Internet";

/* Enable snmp-traps for this interface */

traps;

link-mode full-duplex;

unit 0 {

family inet {

/* Do not send ICMP redirects */

no-redirects;

/* Filter inbound packets from the Internet */

filter {

input inbound-filter;

}

address 5.5.5.254/24;

}

}

}

ge-0/1/0 {

description "Protected Interface - facing DMZ"

traps;

link-mode full-duplex;

unit 0 {

family inet {

no-redirects;

/* Filter outbound packets from the internal network */

filter {

input outbound-filter;

}

address 6.6.6.254/24;

}

}

}

/* Configure management interface. Can NOT route over this. */

fxp0 {

description "Management Interface – OOB management"

unit 0 {

family inet {

no-redirects;

address 10.10.11.11/24;

}

}

}

/* Configure loopback interface. Used for routing protocols and other

purposes. */

lo0 {

description "Loopback Interface – internal"

unit 0 {

family inet {

no-redirects;

/* Restrict connections coming to this router */

filter {

input router-protect;

}

address 10.10.10.10/32;

}

}

}

}

forwarding-options {

/* Enable packet sampling for CflowD */

sampling {

input {

family inet {

/* Sample 1 out of 100 packets + next 4 in sequence.

Total = 4/100 packets. You may want to just sample

the SYN/FIN packets instead. */

rate 100;

run-length 4;

/* This is a built-in max throttle, listed here for

completeness */

max-packets-per-second 7000;

}

}

/* Send our output to the designated CflowD collector using v 8 */

output {

cflowd 7.7.7.5 {

port 2055;

version 8;

no-local-dump;

autonomous-system-type origin;

aggregation {

autonomous-system;

}

}

}

}

}

snmp {

description secure-router-01;

location "Site, Row, Rack, Shelf";

contact "(555) 555-5555";

/* Restrict SNMP requests to a particular interface */

interface ge-0/1/0.0;

/* Configure our SNMP community. Replace COMMUNITY with your string */

community COMMUNITY {

authorization read-only;

/* Determine who is allowed access via SNMP */

clients {

default restrict;

/* Restrict access to ALL but the following */

7.7.7.5/32;

}

}

/* Send traps using v2 for all categories to designated trap server */

trap-group all {

version v2;

categories authentication chassis link routing startup;

targets {

7.7.7.5;

}

}

}

routing-options {

options {

/* Turn off DNS resolution */

no-resolve;

syslog {

level debug;

}

}

/* Configure static routes */

static {

/* Default out to the Internet */

route 0.0.0.0/0 next-hop 5.5.5.1;

/* Route to network on the other side of the Firewall */

route 7.7.7.0/24 next-hop 6.6.6.1;

/* Black-hole routes for traffic destined to these networks */

route 0.0.0.0/8 discard;

route 1.0.0.0/8 discard;

route 2.0.0.0/8 discard;

route 5.0.0.0/8 discard;

route 7.0.0.0/8 discard;

route 10.0.0.0/8 discard;

route 23.0.0.0/8 discard;

route 27.0.0.0/8 discard;

route 31.0.0.0/8 discard;

route 36.0.0.0/8 discard;

route 37.0.0.0/8 discard;

route 39.0.0.0/8 discard;

route 41.0.0.0/8 discard;

route 42.0.0.0/8 discard;

route 49.0.0.0/8 discard;

route 50.0.0.0/8 discard;

route 73.0.0.0/8 discard;

route 74.0.0.0/8 discard;

route 75.0.0.0/8 discard;

route 76.0.0.0/8 discard;

route 77.0.0.0/8 discard;

route 78.0.0.0/8 discard;

route 79.0.0.0/8 discard;

route 89.0.0.0/8 discard;

route 90.0.0.0/8 discard;

route 91.0.0.0/8 discard;

route 92.0.0.0/8 discard;

route 93.0.0.0/8 discard;

route 94.0.0.0/8 discard;

route 95.0.0.0/8 discard;

route 96.0.0.0/8 discard;

route 97.0.0.0/8 discard;

route 98.0.0.0/8 discard;

route 99.0.0.0/8 discard;

route 100.0.0.0/8 discard;

route 101.0.0.0/8 discard;

route 102.0.0.0/8 discard;

route 103.0.0.0/8 discard;

route 104.0.0.0/8 discard;

route 105.0.0.0/8 discard;

route 106.0.0.0/8 discard;

route 107.0.0.0/8 discard;

route 108.0.0.0/8 discard;

route 109.0.0.0/8 discard;

route 110.0.0.0/8 discard;

route 111.0.0.0/8 discard;

route 112.0.0.0/8 discard;

route 113.0.0.0/8 discard;

route 114.0.0.0/8 discard;

route 115.0.0.0/8 discard;

route 116.0.0.0/8 discard;

route 117.0.0.0/8 discard;

route 118.0.0.0/8 discard;

route 119.0.0.0/8 discard;

route 120.0.0.0/8 discard;

route 121.0.0.0/8 discard;

route 122.0.0.0/8 discard;

route 123.0.0.0/8 discard;

route 127.0.0.0/8 discard;

route 128.0.0.0/16 discard;

route 169.254.0.0/16 discard;

route 172.16.0.0/12 discard;

route 173.0.0.0/8 discard;

route 174.0.0.0/8 discard;

route 175.0.0.0/8 discard;

route 176.0.0.0/8 discard;

route 177.0.0.0/8 discard;

route 178.0.0.0/8 discard;

route 179.0.0.0/8 discard;

route 180.0.0.0/8 discard;

route 181.0.0.0/8 discard;

route 182.0.0.0/8 discard;

route 183.0.0.0/8 discard;

route 184.0.0.0/8 discard;

route 185.0.0.0/8 discard;

route 186.0.0.0/8 discard;

route 187.0.0.0/8 discard;

route 189.0.0.0/8 discard;

route 190.0.0.0/8 discard;

route 192.0.2.0/24 discard;

route 192.168.0.0/16 discard;

route 197.0.0.0/8 discard;

route 198.18.0.0/15 discard;

route 223.0.0.0/8 discard;

route 240.0.0.0/4 discard;

}

}

policy-options {

prefix-list iana-reserved {

/* IANA reserved */

0.0.0.0/8;

1.0.0.0/8;

2.0.0.0/8;

5.0.0.0/8;

7.0.0.0/8;

23.0.0.0/8;

27.0.0.0/8;

31.0.0.0/8;

36.0.0.0/8;

37.0.0.0/8;

39.0.0.0/8;

41.0.0.0/8;

42.0.0.0/8;

49.0.0.0/8;

50.0.0.0/8;

73.0.0.0/8;

74.0.0.0/8;

75.0.0.0/8;

76.0.0.0/8;

77.0.0.0/8;

78.0.0.0/8;

79.0.0.0/8;

89.0.0.0/8;

90.0.0.0/8;

91.0.0.0/8;

92.0.0.0/8;

93.0.0.0/8;

94.0.0.0/8;

95.0.0.0/8;

96.0.0.0/8;

97.0.0.0/8;

98.0.0.0/8;

99.0.0.0/8;

100.0.0.0/8;

101.0.0.0/8;

102.0.0.0/8;

103.0.0.0/8;

104.0.0.0/8;

105.0.0.0/8;

106.0.0.0/8;

107.0.0.0/8;

108.0.0.0/8;

109.0.0.0/8;

110.0.0.0/8;

111.0.0.0/8;

112.0.0.0/8;

113.0.0.0/8;

114.0.0.0/8;

115.0.0.0/8;

116.0.0.0/8;

117.0.0.0/8;

118.0.0.0/8;

119.0.0.0/8;

120.0.0.0/8;

121.0.0.0/8;

122.0.0.0/8;

123.0.0.0/8;

127.0.0.0/8;

128.0.0.0/16;

169.254.0.0/16;

173.0.0.0/8;

174.0.0.0/8;

175.0.0.0/8;

176.0.0.0/8;

177.0.0.0/8;

178.0.0.0/8;

179.0.0.0/8;

180.0.0.0/8;

181.0.0.0/8;

182.0.0.0/8;

183.0.0.0/8;

184.0.0.0/8;

185.0.0.0/8;

186.0.0.0/8;

187.0.0.0/8;

189.0.0.0/8;

190.0.0.0/8;

192.0.2.0/24;

197.0.0.0/8;

198.18.0.0/15;

223.0.0.0/8;

/* Multicast and Experimental */

224.0.0.0/3;

}

prefix-list rfc1918 {

/* RFC 1918 addresses */

10.0.0.0/8;

192.168.0.0/16;

172.16.0.0/12;

}

/* Addresses to be used in router-protect-hardcore filter */

prefix-list ssh-connect {

6.6.6.1/32;

7.7.7.5/32;

7.7.7.8/32;

}

/* No BGP is used in this topology, but we allow it for future use */

prefix-list bgp-connect {

5.5.5.1/32;

}

prefix-list utility-connect {

7.7.7.5/32;

}

}

firewall {

filter inbound-filter {

/* Rate-limit for 5m/s used for multicast */

policer udp-5m {

if-exceeding {

bandwidth-limit 5m;

burst-size-limit 375k;

}

then discard;

}

/* Rate-limit for 500k/s used for ICMP */

policer icmp-500k {

if-exceeding {

bandwidth-limit 500k;

burst-size-limit 62k;

}

then discard;

}

/* Rate-limit for 2m/s used for UDP */

policer udp-2m {

if-exceeding {

bandwidth-limit 2m;

burst-size-limit 250k;

}

then discard;

}

/* The first three terms have been separated for accounting only */

term 1 {

from {

source-address {

/* Spoof of inside networks */

6.6.6.0/24;

7.7.7.0/24;

}

}

then {

/* Count spoofed traffic. Type 'show firewall' to view */

count spoof-inbound-internal;

discard;

}

}

/* The following prefix-list can be divided for finer granularity */

term 2 {

from {

prefix-list {

iana-reserved;

}

}

then {

count spoof-inbound-iana;

discard;

}

}

term 3 {

from {

prefix-list {

rfc1918;

}

}

then {

count spoof-inbound-rfc1918;

discard;

}

}

/* Discard all ICMP fragments */

term 4 {

from {

is-fragment;

protocol icmp;

}

then {

count icmp-fragments;

discard;

}

}

/* Rate-limit ICMP traffic to 500k/s */

term 5 {

from {

protocol icmp;

}

then {

count policer-icmp-500k;

policer icmp-500k;

}

}

/* Rate-limit Multicast traffic to 5m/s */

term 6 {

from {

destination-address {

224.0.0.0/4;

}

protocol udp;

}

then {

count policer-multicast-5m;

policer udp-5m;

accept;

}

}

/* Rate-limit other UDP traffic to 2m/s */

term 7 {

from {

protocol udp;

}

then {

count policer-udp-2m;

policer udp-2m;

}

}

/* Allow access to Intranet (Firewall filters specific ports) */

term 8 {

from {

destination-address {

7.7.7.0/24;

}

}

then accept;

}

/* Our explicit (read: logged) drop all rule */

term 9 {

then {

discard;

}

}

}

/* Be a good netizen by preventing spoofing from within our network.

You may wish to add further 'terms' if more access is required. */

filter outbound-filter {

term 1 {

from {

source-address {

7.7.7.0/24;

6.6.6.1/32;

}

}

then accept;

}

term 2 {

then {

count spoof-outbound;

discard;

}

}

}

/* You may apply this filter outbound on lo0 to count and compare

SYN, RST, FIN, and other TCP traffic. This can be used to detect a

packet flood if you suspect you are under attack. As an example, a

high 'packets-syn' to 'packets-tcp' ratio could be a good indicator.

TCP-intercept is not supported. */

filter tcp-flood-detect {

term 1 {

from {

protocol tcp;

tcp-flags syn;

}

then {

count packets-syn;

log;

accept;

}

}

term 2 {

from {

protocol tcp;

tcp-flags rst;

}

then {

count packets-rst;

log;

accept;

}

}

term 3 {

from {

protocol tcp;

tcp-flags fin;

}

then {

count packets-fin;

log;

accept;

}

}

term 4 {

from {

protocol tcp;

}

then {

count packets-tcp;

accept;

}

}

}

/* Two filters are supplied for protecting the RE: router-protect and

router-protect-hardcore. The first is easier to manage, but does

not rate limit traffic to the RE and allows exception traffic by

default. The second is more secure but much more difficult to manage.

Customize and apply only one of the router-protect filters inbound on

lo0. You may wish to add entries for FTP, VRRP, TACACS, DNS, etc... */

filter router-protect {

/* Allow SSH from firewall, syslog, and utility server */

term 1 {

from {

source-address {

0.0.0.0/0;

6.6.6.1/32 except;

7.7.7.5/32 except;

7.7.7.8/32 except;

}

protocol tcp;

destination-port ssh;

}

then {

count manage-discard-tcp;

discard;

}

}

/* Allow access from designated SNMP, NTP, and RADIUS */

term 2 {

from {

source-address {

0.0.0.0/0;

7.7.7.5/32 except;

}

protocol udp;

port [ snmp ntp radius ];

}

then {

count manage-discard-udp;

discard;

}

}

/* We only like the ICMP traffic listed below. All other types are

logged, counted, and discarded */

term 3 {

from {

protocol icmp;

icmp-type-except [ echo-request echo-reply unreachable

time-exceeded source-quench ];

}

then {

count manage-discard-icmp;

discard;

}

}

/* We are not running BGP here but reserve this for future use */

term 4 {

from {

address {

0.0.0.0/0;

5.5.5.1/32 except;

}

protocol tcp;

port bgp;

}

then {

count manage-discard-bgp;

discard;

}

}

term 5 {

then {

/* Allow all other traffic */

count manage-accept-other;

accept;

}

}

}

/* Now for a more secure, but tedious RE filter. Remember to apply one

of the router-protect filters inbound on lo0. May need to account

for traffic such as VRRP, FTP, OSPF, ISIS, or DNS here as well */

filter router-protect-hardcore {

policer ssh-1m {

if-exceeding {

bandwidth-limit 1m;

burst-size-limit 100k;

}

then discard;

}

policer icmp-1m {

if-exceeding {

bandwidth-limit 1m;

burst-size-limit 100k;

}

then discard;

}

policer utility-3m {

if-exceeding {

bandwidth-limit 3m;

burst-size-limit 300k;

}

then discard;

}

policer tcp-control-1m {

if-exceeding {

bandwidth-limit 1m;

burst-size-limit 100k;

}

then discard;

}

/* Rate limit TCP control traffic from trusted sources */

term 1 {

from {

source-prefix-list {

ssh-connect;

bgp-connect;

}

protocol tcp;

tcp-flags "(syn & !ack) | fin | rst";

}

then {

policer tcp-control-1m;

accept;

}

}

/* We are not running BGP here but reserve this for future use.

Do NOT police this! */

term 2 {

from {

source-prefix-list {

bgp-connect;

}

protocol tcp;

port bgp;

}

then {

accept;

}

}

/* SSH is allowed from trusted servers only */

term 3 {

from {

source-prefix-list {

ssh-connect;

}

protocol tcp;

destination-port ssh;

}

then {

policer ssh-1m;

accept;

}

}

/* SNMP, NTP, and RADIUS from trusted servers only */

term 4 {

from {

source-prefix-list {

utility-connect;

}

protocol udp;

port [ snmp ntp radius ];

}

then {

policer utility-3m;

accept;

}

}

/* Block unwanted ICMP traffic, and rate-limit the rest */

term 5 {

from {

protocol icmp;

icmp-type [ echo-request echo-reply unreachable time-exceeded

source-quench ];

}

then {

policer icmp-1m;

accept;

}

}

/* Deny and log all other traffic */

term 6 {

then {

count manage-discard-other;

discard;

}

}

}

}

/* ... end template ... */

 
 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
2023年上半年GDP全球前十五强
 百态   2023-10-24
美众议院议长启动对拜登的弹劾调查
 百态   2023-09-13
上海、济南、武汉等多地出现不明坠落物
 探索   2023-09-06
印度或要将国名改为“巴拉特”
 百态   2023-09-06
男子为女友送行,买票不登机被捕
 百态   2023-08-20
手机地震预警功能怎么开?
 干货   2023-08-06
女子4年卖2套房花700多万做美容:不但没变美脸,面部还出现变形
 百态   2023-08-04
住户一楼被水淹 还冲来8头猪
 百态   2023-07-31
女子体内爬出大量瓜子状活虫
 百态   2023-07-25
地球连续35年收到神秘规律性信号,网友:不要回答!
 探索   2023-07-21
全球镓价格本周大涨27%
 探索   2023-07-09
钱都流向了那些不缺钱的人,苦都留给了能吃苦的人
 探索   2023-07-02
倩女手游刀客魅者强控制(强混乱强眩晕强睡眠)和对应控制抗性的关系
 百态   2020-08-20
美国5月9日最新疫情:美国确诊人数突破131万
 百态   2020-05-09
荷兰政府宣布将集体辞职
 干货   2020-04-30
倩女幽魂手游师徒任务情义春秋猜成语答案逍遥观:鹏程万里
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案神机营:射石饮羽
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案昆仑山:拔刀相助
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案天工阁:鬼斧神工
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案丝路古道:单枪匹马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:与虎谋皮
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:李代桃僵
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:指鹿为马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:小鸟依人
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:千金买邻
 干货   2019-11-12
 
推荐阅读
 
 
 
>>返回首頁<<
 
靜靜地坐在廢墟上,四周的荒凉一望無際,忽然覺得,淒涼也很美
© 2005- 王朝網路 版權所有