Chapter 12

Deploying Security with the SRX

In This Chapter

  • Setting up the SRX
  • Getting the basics on flow processing
  • Managing system security
  • Writing security policies
  • Configuring NAT Source Address Translation

Not too long ago, network administrators were not entirely convinced that a network required tight security measures. But when people began buying and selling everything from books to cars to stock portfolios over the Internet, the need to protect privacy, credit card information, and bank account details became obvious. The issue today is not whether a network requires security, but how much and how best to provide a secure environment for users.

This chapter looks at securing networks with a type of specialized equipment called the SRX. We look at how the system is set up and the key concept of flow processing. We then show you how to manage the system and write some security policies to prevent really bad things from happening on the protected network. Finally, we cover setting up NAT source address translation.

Get Junos® OS For Dummies®, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.