Skip to Content
JUNOS Enterprise Switching
book

JUNOS Enterprise Switching

by Harry Reynolds, Doug Marschke
July 2009
Intermediate to advanced
752 pages
23h 19m
English
O'Reilly Media, Inc.
Content preview from JUNOS Enterprise Switching

Firewall Filters

In order to protect the switch and the network, packet filters can be deployed to allow only certain traffic into the switch’s control plane (routing engine, or RE) or to transmit the switch out of a Packet Forwarding Engine (PFE) interface. These filters have different names on each switch OS, but they operate in the same stateless manner. On a Cisco device these filters are called access lists, and on a Juniper switch they are called firewall filters. These filters look very similar to the policy we discussed in the previous section; however, firewall filters operate on the actual data forwarding plane. Table 8-1 gives a comparison of the two features.

Table 8-1. Firewall filters versus routing policies

Feature

Firewall filter

Routing policy

Operates in…

Forwarding plane

Control plane

Match keyword

from

from

Action keyword

then

then

Match attributes

Packet fields

Route attributes

Default action

Discard

Depends on default policy

Applied to…

Interfaces

Routing protocols/tables

Named terms required

Yes

No

Chains allowed

Yes

Yes

Absence of from

Match all

Match all

Firewall filter syntax takes a human-friendly, intuitive form:

firewall {
    family inet {
        filter filter-1 {
            term term-1 {
                from {
                    protocol tcp;
                    destination-port telnet;
                }
                then {
                    accept;
                }
            }
        }
    }
}

This filter matches on Telnet traffic and accepts the packets. As you can see, the syntax is very similar to a routing policy with the match conditions in the from term and the actions specified in a then term.

In the EX Series switches, firewall filters ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

JUNOS Enterprise Routing

JUNOS Enterprise Routing

Doug Marschke, Harry Reynolds
JUNOS High Availability

JUNOS High Availability

James Sonderegger, Orin Blomberg, Kieran Milne, Senad Palislamovic
Junos Security

Junos Security

Rob Cameron, Brad Woodberg, Patricio Giecco, Timothy Eberhard, James Quinn

Publisher Resources

ISBN: 9780596804244Errata Page