[j-nsp] Stateful Firewall Q

Harry Reynolds harry at juniper.net
Tue Oct 10 12:19:39 EDT 2006


I think the answer is "yes". We call them application level gateways,
ALGs.

To see a list of currently supported ALGs:

[edit]
harry at vpn11# show groups junos-defaults    
#
# Make vt100 the default for the console port
# 
system {
    ports {
        console type vt100;
    }
    login {
        password {
            minimum-length 6;
            change-type set-transitions;
            minimum-changes 1;
            format md5;
        }
    }
    compress-configuration-files;
}
applications {
    #
    # File Transfer Protocol 
    #
    application junos-ftp {
        application-protocol ftp;
        protocol tcp;
        destination-port 21;
    }

Regards
 

> -----Original Message-----
> From: juniper-nsp-bounces at puck.nether.net 
> [mailto:juniper-nsp-bounces at puck.nether.net] On Behalf Of 
> Jerry Gardner
> Sent: Tuesday, October 10, 2006 8:50 AM
> To: juniper-nsp at puck.nether.net
> Subject: Re: [j-nsp] Stateful Firewall Q
> 
> On 10/9/06, Jerry Gardner <sodaant at gmail.com> wrote:
> >
> > Does the stateful firewall in the J-series routers support hard to 
> > firewall protocols such as FTP?
> 
> 
> Resending this because I received several replies where I 
> don't think the responder understood exactly what I was asking.
> 
> What I'd like to know is if the J-series stateful firewall 
> code supports layer 7 inspection for some common applications 
> such as FTP and SIP. What I mean by this is as follows 
> (assume this is from a client machine's perspective from 
> behind the firewall):
> 
> 1. Client initiates an FTP connection to a server:  
> 192.168.1.1:12345 ->
> 202.12.41.132:21
> 
> 2. Client starts a data transfer (get or put) operation. The 
> FTP application on the client allocates a free port >= 1024, 
> let's say 43210, sends this port number to the server on the 
> existing connection, and listens on that port.
> 
> 3. The server receives the data transfer command along with 
> the port number the client is listening on and tries to open 
> a TCP session to that port:
> 202.12.41.132:20 -> 192.168.1.1:43210.
> 
> 4. The client and server transfer the data on the new connection.
> 
> 
> The problem for the firewall comes at step 3 when the server 
> tries to open a connection back to the client on an arbitrary 
> port number assigned by the client's OS. Unless there's a 
> firewall rule in place to allow a connection to all ports >= 
> 1024 on the client coming from any arbitrary external IP on 
> port 20, this will not work.
> 
> Forgive me for mentioning that "other" router company, but 
> the Cisco IOS Firewall software supports this via the 
> "inspect ftp" command that instructs the firewall to monitor 
> FTP sessions.
> When it sees the client send a Port command to the server, it 
> extracts the port number from the packet (layer 7) and 
> creates a temporary ACL to open a hole in the firewall for 
> the data transfer.
> 
> So my questions are:
> 
> 1. Does the Junos stateful firewall on the J-series support this?
> 
> 2. If so, where is it documented?
> 
> 3. Are there any configuration examples available?
> 
> 
> Tnx.
> _______________________________________________
> juniper-nsp mailing list juniper-nsp at puck.nether.net 
> https://puck.nether.net/mailman/listinfo/juniper-nsp
> 



More information about the juniper-nsp mailing list