Starting with Junos OS 11.4 Juniper introduced junos-host zone. So long awaited functionality that helps fine tune the security parameters for host inbound traffic. But how is it working?
Route based VPN uses routes to forward traffic on secure tunnel interface (therefore the name “st”) to VPN. In most cases a single tunnel is created between two endpoints. The solution is ideal for example in scenarios when you need to create dynamic routing adjacency between two remote sites, or simply securely interconnect two remote sites.
Debugging IPsec logs can be time consuming operation. It’s like looking for a needle in a haystack. We offer you standard errors and example log outputs for the most common configuration errors in IPsec.
The long time awaited book is finally here, released just this June. The book is complete field guide, authorized by Juniper Networks. For everyone interested in or working with Junos SRX devices is a must to have in library. Perfect hands-on reference for deploying, configuring, and operating Juniper’s SRX Series networking device. Authors Brad Woodberg and Rob Cameron provide field-tested best practices for getting the most out of SRX deployments, based on their extensive field experience.