Juniper Firewall Terms Flashcards
__________ is a web-based graphical user interface (GUI) provided by Juniper Networks for managing and configuring Juniper SRX Series Firewalls. It allows network administrators to perform various tasks, such as setting up security policies, managing interfaces, monitoring network traffic, and generating reports, using a web browser instead of the command-line interface (CLI).
J-Web
The __________ are Juniper Network’s line of security devices that provide robust and scalable security solutions for enterprises, data centers, and service providers. These firewalls offer a wide range of features, including firewalling, routing, VPN (Virtual Private Network), IPS (Intrusion Prevention System), UTM (Unified Threat Management), application visibility and control, and advanced threat protection.
SRX Series Firewalls
The __________ is the starting point for accessing the J-Web GUI. It provides a simplified and organized dashboard with quick links to commonly used features and sections within the J-Web interface.
J-Web Launch Pad
The __________ is the upper section of the J-Web interface. It typically contains the main menu, which includes various tabs or options for navigating to different configuration and monitoring sections.
J-Web Top Pane
The __________ is a vertical panel usually located on the left or right side of the J-Web interface. It offers quick access to different categories or groups of configuration options, making it easier for administrators to find specific settings.
J-Web Side Pane
The__________ is the central area of the J-Web interface. It displays the content related to the selected configuration or monitoring task. Administrators can configure settings or view information in this section.
J-Web Main Pane
__________ are interactive step-by-step guides available in the J-Web interface. They assist administrators in performing complex configuration tasks by breaking them down into manageable steps and guiding them through the process.
J-Web Workflow Wizards
The __________ is a customizable overview page that provides real-time monitoring information and system status. It may include widgets, charts, and graphs representing key performance indicators (KPIs) and system health metrics.
J-Web Dashboard
This section in J-Web allows administrators to monitor the status and statistics of network interfaces, including traffic throughput, errors, and link status.
Monitor Interfaces
This section allows administrators to monitor and view the DHCP server bindings, showing the IP addresses assigned to clients dynamically.
Monitor DHCP Server Bindings
In this section, administrators can monitor the status and statistics of IPsec VPN tunnels, such as active connections and data transfer rates.
Monitor IPsec VPN
The Monitor Session feature enables administrators to monitor the sessions passing through the firewall, providing information about source and destination IP addresses, protocols, and session duration.
Monitor Session
The __________ feature enables administrators to monitor the sessions passing through the firewall, providing information about source and destination IP addresses, protocols, and session duration.
Monitor Session
This section provides information about detected threats and attacks, including intrusion attempts, malware activity, and other security events.
Monitor Threats
In this section, administrators can monitor the web filtering activity on the firewall, tracking user access to various websites and web categories.
Monitor Web Filtering
ATP monitoring allows administrators to track and analyze advanced security threats, such as zero-day exploits and targeted attacks.
Monitor ATP (Advanced Threat Protection)
This section provides an overview of the VPN (Virtual Private Network) connections and status, including site-to-site VPNs and remote access VPNs
Monitor VPN
In this section, administrators can view a comprehensive list of all events and activities logged by the firewall, including security alerts, system events, and user activities.
Monitor All Events
The Monitor System section allows administrators to monitor the overall health and performance of the SRX Series Firewall, including CPU usage, memory utilization, and system status.
Monitor System
This section provides information about alarms and events generated by the firewall, allowing administrators to quickly identify and troubleshoot issues.
Monitor Alarms
The __________ feature allows administrators to create graphical representations of network data and statistics, such as traffic maps and threat maps.
Maps and Charts
This feature displays a graphical representation of network traffic flows, helping administrators visualize data traffic patterns.
Monitor Traffic Map
The __________ provides a visual representation of detected threats and attack sources, helping administrators identify potential security risks.
Monitor Threats Map
Monitor Threats Map
Monitor Application
Monitor Application
Monitor Users
This section provides information about the effectiveness of threat prevention mechanisms, such as IPS and antivirus, in blocking malicious activities.
Monitor Threat Prevention
The Monitor Users feature allows administrators to track and manage user activities on the network, including login/logout times and data usage.
Monitor Users
In this section, administrators can monitor and manage application traffic and usage on the network.
Monitor Application
These sections provide detailed information about the phase I and phase II negotiations of VPN connections, including encryption parameters and authentication details.
Monitor VPN Phase I and Monitor VPN Phase I
The DNS Security section monitors DNS-related activities, such as DNS queries, responses, and potential security threats.
Monitor DNS Security
This feature provides insights and statistics on encrypted traffic passing through the firewall, helping administrators detect potential threats hidden within encrypted connections.
Monitor Encrypted Traffic Insights
The Reports - Overview section provides a summary of various network and security reports available on the firewall.
Reports - Overview
__________ offer detailed analysis and insights into security threats and vulnerabilities present in the network.
Threat Assessment Reports
This report provides information about application usage and user activities on the network.
Application and User Usage
__________ reports highlight the top network devices consuming the most bandwidth on the network.
Top Talkers
This report provides an overview of the current threat environment and the activities blocked by the IPS (Intrusion Prevention System).
IPS Threat Environment
This report lists the viruses and malware that have been successfully blocked by the firewall’s security measures.
Viruses Blocked
__________ show the URLs accessed by users and the categories to which they belong.
URL Reports
URL Reports show the URLs accessed by users and the categories to which they belong.
URL Reports
Virus: Top Blocked
This report displays the top viruses and malware blocked by the firewall.
This report displays the top viruses and malware blocked by the firewall.
Virus: Top Blocked
Virus: Top Blocked
This report displays the top viruses and malware blocked by the firewall.
Virus: Top Blocked
Top Firewall Events report provides details about the most significant firewall events and activities.
Top Firewall Events
This report highlights the destinations that have been denied the most by the firewall’s policies.
Top Firewall Deny Destinations
__________ report provides information on the most frequent denied connections and attempts.
Top Firewall Denies
This report presents the most significant intrusion prevention events and activities.
Top IPS Events
__________ report lists the most common spam and junk email messages detected and blocked.
Top Anti-spam Detected
This report identifies the top sources of network attacks and threats.
Top Screen Attackers
__________ report shows the devices or hosts most frequently targeted by attacks.
Top Screen Victims
This report provides details about the most frequent ScreenOS attacks.
Top Screen Hits
__________ report displays the firewall rules with the most activity or matches.
Top Firewall Rules
This report shows the top sources that have been denied by the firewall’s policies.
Top Firewall Deny Sources
This report lists the top sources of detected intrusion attempts and attacks.
Top IPS Attack Sources
__________ report shows the most targeted destinations of intrusion attempts and attacks.
Top IPS Attack Destinations
This report highlights the intrusion prevention rules with the most triggered actions.
Top IPS Rules
This report displays the web applications that are most frequently accessed by users.
Top Web Apps
__________ report shows the applications that have been blocked the most.
Top Applications Blocked
This report presents the URLs accessed by individual users or devices.
Top URLs by User
This report highlights the zones generating the highest amount of traffic.
Top Source Zone by Volume
__________ report displays the applications used by individual users.
Top Applications by User
Top Applications by User report displays the applications used by individual users.
Top Applications by User
This report lists the top botnet threats and their sources detected through IDP (Intrusion Detection and Prevention) logs.
Top Botnet Threats by Source Address via IDP Logs
This report shows the top destinations targeted by botnet threats detected through IDP logs.
Top Botnet Threats by Destination Address via IDP Logs
This report categorizes botnet threats based on their severity as detected through IDP logs.
Top Botnet Threats by Threat Severity via IDP Logs
This report categorizes botnet threats based on their severity as detected through IDP logs.
Top Botnet Threats by Threat Severity via IDP Logs
This report lists the top malware threats and their sources detected through IDP logs.
Top Malware Threats by Source Address via IDP Logs
This report shows the top destinations targeted by malware threats detected through IDP logs.
Top Malware Threats by Destination Address via IDP Logs
This report categorizes malware threats based on their severity as detected through IDP logs.
Top Malware Threats by Threat Severity via IDP Logs
This report displays the applications that have been blocked the most by the web filtering feature.
Top Blocked Applications via Webfilter Logs
This report lists the permitted application subcategories based on traffic volume through web filtering logs.
Top Permitted Application Subcategories by Volume via Webfilter Logs
This report shows the permitted application subcategories based on the number of allowed connections through web filtering logs.
Top Permitted Application Subcategories by Count via Webfilter Logs
Cluster (High Availability) Setup refers to the configuration of multiple SRX Series Firewalls in a high availability cluster to provide redundancy and failover capabilities.
Cluster (HA) Setup
A __________ is a collection of interfaces or services that are grouped together for redundancy purposes in a high availability cluster.
Redundancy Group
__________ management involves creating and managing user accounts and assigning different roles to control their level of access and permissions within the J-Web interface.
User & Roles
A __________ represents an individual or administrator who can access and interact with the J-Web GUI.
User
A __________ defines a set of permissions and access rights granted to a user. Different roles can have different levels of access to various configuration and monitoring features.
Role
__________ is a feature that allows the SRX Series Firewall to be logically divided into multiple independent virtual firewalls or security domains, each serving a separate customer or department while sharing the same physical hardware.
Multi-Tenancy
A __________ is a configuration that defines the resource limits and quotas for each tenant in a multi-tenancy environment.
Resource Profile
__________ are physical interfaces used for communication between nodes in a high availability cluster.
Interconnect Ports
__________ are virtual interfaces used for tunneling and encapsulating traffic between sites.
LT Logical Tunnel (LT) Interfaces
__________ enable the creation of multiple isolated routing and security instances on a single physical firewall, allowing different tenants or customers to have their own dedicated virtual firewalls.
Logical Systems
__________ represent individual customers, departments, or organizations in a multi-tenancy environment, each with its own isolated network and security policies.
Tenants
__________ are digital files used for secure authentication, encryption, and communication in a network.
Certificates
A __________ is a digital certificate used for authenticating and securing communication with the SRX Series Firewall.
Device Certificate
A Device Certificate is a digital certificate used for authenticating and securing communication with the SRX Series Firewall.
Device Certificate
Let’s Encrypt is a certificate authority that provides free SSL/TLS certificates. A Device Certificate obtained from Let’s Encrypt can be used for secure communication.
Device Certificate (Let’s Encrypt)
A Local Self-Signed Device Certificate is a certificate generated by the SRX Series Firewall itself for internal use.
Device Certificate (Local Self-Signed)
Simple Certificate Enrollment Protocol (SCEP) allows the SRX Series Firewall to obtain a certificate from a certificate authority automatically.
Device Certificate (SCEP)
ACME (Automated Certificate Management Environment) is a protocol used to automate the process of obtaining and managing SSL/TLS certificates.
Device Certificate (ACME)
__________ is used for certificate enrollment and management.
Device Certificate (CMPv2) / Certificate Management Protocol version 2 (CMPv2)
__________ is a message sent to a certificate authority to request a digital certificate.
Device Certificate (CSR) / Certificate Signing Request (CSR)
An __________ is a certificate generated by a third-party certificate authority and imported into the SRX Series Firewall.
Device Certificate (Externally Generated)
A __________ is a trusted entity that issues and manages digital certificates.
Certificate Authority (CA)
The __________ is a list of certificates installed on the SRX Series Firewall, including device certificates and CA certificates.
Certificates Table
The Certificates Table is a list of certificates installed on the SRX Series Firewall, including device certificates and CA certificates.
Certificates Table
A CA Certificate is a certificate issued by a Certificate Authority, used to verify the authenticity of other certificates.
CA Certificate
A Certificate Authority Group is a collection of CA certificates used for certificate verification.
Certificate Authority Group
CA Group is an abbreviation for Certificate Authority Group
CA Group
A Trusted CA Group is a subset of the Certificate Authority Group, consisting of CA certificates that are explicitly trusted for certificate verification.
Trusted CA Group
A Trusted CA Group is a subset of the Certificate Authority Group, consisting of CA certificates that are explicitly trusted for certificate verification.
Trusted CA Group
The __________ is a list of CA Groups configured on the SRX Series Firewall.
Certificate Authority Group Table
__________ involves managing the software licenses for different features and functionalities on the SRX Series Firewall.
License Management
__________ are unique codes used to activate specific features or software licenses on the SRX Series Firewall.
License Keys
__________ refer to the licenses that have been activated and are currently in use on the SRX Series Firewall.
Installed Licenses
Installed Licenses refer to the licenses that have been activated and are currently in use on the SRX Series Firewall.
Installed Licenses
Software Feature Licenses are licenses that enable specific functionalities or features on the SRX Series Firewall.
Software Feature Licenses
Trial Licenses allow users to evaluate certain features or functionalities for a limited time before making a purchase decision.
Trial Licenses
Security Package Management involves managing and updating security-related components, such as IPS signatures, application signatures, URL categories, and antivirus profiles.
Security Package Management
The IPS Signatures Package contains a collection of intrusion prevention signatures used to detect and prevent known attacks and threats.
IPS Signatures Package
IPS Signatures are specific patterns or rules used to identify and block known intrusion attempts and malicious activities.
IPS Signatures
The Application Signatures Package includes a set of signatures used to identify and control various applications on the network.
Application Signatures Package
The Application Signatures Package includes a set of signatures used to identify and control various applications on the network.
Application Signatures Package
The __________ contains a database of web categories used for web filtering and control.
URL Category Package
__________ are classifications of websites based on their content and purpose.
URL Category
__________ is a cloud-based threat intelligence service that provides advanced security analytics and insights to detect and prevent cyber threats.
Juniper ATP Cloud
The __________ allows administrators to schedule the reboot of the SRX Series Firewall at specific times for maintenance or updates.
Reboot Schedule
__________ are backups or images of the SRX Series Firewall’s configuration and system state, which can be used for recovery and restoration.
System Snapshots
__________ refer to the firmware images used to update or upgrade the operating system and features on the SRX Series Firewall.
Software Packages
__________ involves managing and maintaining the firewall’s configuration, including backups, rollbacks, and rescue configurations.
Configuration Management
The __________ is a backup configuration that can be used to recover the SRX Series Firewall in case of a critical configuration issue.
Rescue Configuration
__________ involves handling and responding to system alarms and events generated by the SRX Series Firewall.
Alarm Management
This section allows administrators to monitor and manage alarms related to the overall health and status of the firewall’s chassis.
Monitor Chassis Alarm
A __________ is an event or condition that triggers an alarm related to the physical components and health of the firewall.
Chassis Alarm