Juniper防火墙之ICMP-Ping

示例拓扑

穿越Ping流量,从Router-A-10.10.10.1-----------VSRX--------------20.20.20.1-Router-B

  1. 当Router-B没有回程路由时,此时从A到Ping到B,分析防火墙上的ICMP会话, 当对端无回包时,ICMP的Timeout是60秒。

root@vSRX> show security flow session protocol icmp |refresh 1 |no-more
Jul 25 07:03:10
—(refreshed at 2020-07-25 07:03:10 UTC)—
Total sessions: 0
Jul 25 07:03:11
—(refreshed at 2020-07-25 07:03:11 UTC)—
Total sessions: 0
Jul 25 07:03:12
—(refreshed at 2020-07-25 07:03:12 UTC)—
Session ID: 47, Policy name: 1/4, Timeout: 60, Valid
In: 10.10.10.1/0 --> 20.20.20.1/19478;icmp, If: ge-0/0/2.0, Pkts: 1, Bytes: 84
Out: 20.20.20.1/19478 --> 10.10.10.1/0;icmp, If: ge-0/0/3.0, Pkts: 0, Bytes: 0
Total sessions: 1
Jul 25 07:03:13
—(refreshed at 2020-07-25 07:03:13 UTC)—
Session ID: 47, Policy name: 1/4, Timeout: 58, Valid
In: 10.10.10.1/0 --> 20.20.20.1/19478;icmp, If: ge-0/0/2.0, Pkts: 1, Bytes: 84
Out: 20.20.20.1/19478 --> 10.10.10.1/0;icmp, If: ge-0/0/3.0, Pkts: 0, Bytes: 0

Note:Timout=60秒,可以通过以下的方式进行修改,

set applications application icmp-ping-test protocol icmp
set applications application icmp-ping-test icmp-type echo-request
set applications application icmp-ping-test inactivity-timeout 20

  1. 分析flow-traceoptions日志消息, ICMP类型8,代码0,请求回显,timeout=60s

Jul 25 07:03:12 07:03:11.978862:CID-0:RT:<10.10.10.1/0->20.20.20.1/19478;1> matched filter input:
Jul 25 07:03:12 07:03:11.979079:CID-0:RT: ge-0/0/2.0:10.10.10.1->20.20.20.1, icmp, (8/0)

Jul 25 07:03:12 07:03:11.979239:CID-0:RT:flow_first_policy_search: policy search from zone trust-> zone untrust (0x0,0x4c16,0x4c16)

Jul 25 07:03:12 07:03:11.979247:CID-0:RT:Policy lkup: vsys 0 zone(6:trust) -> zone(7:untrust) scope:0

Jul 25 07:03:12 07:03:11.979249:CID-0:RT: 10.10.10.1/2048 -> 20.20.20.1/4406 proto 1

Jul 25 07:03:12 07:03:11.979267:CID-0:RT: app 0, timeout 60s, curr ageout 60s

  1. 配置回程流量,分析会话及flow-traceoptions,当ping流量穿越防火墙时,穿越防火墙的timout=60秒,当对端回显回复时,SRX将ICMP的超时时间减少到4秒,快速超时,删除会话。

Session

Jul 25 07:27:27 07:27:26.1824331:CID-0:RT:<20.20.20.1/23->10.10.10.1/0;1> matched filter back-input:
Jul 25 07:27:27 07:27:26.1824346:CID-0:RT: ge-0/0/3.0:20.20.20.1->10.10.10.1, icmp, (0/0)

  1. 通过Wireshark抓包分析,在防火墙ge-0/0/2接口抓包

icmp-echo-request-type8-code0:

在这里插入图片描述

接口 ge-0/0/3接口, icmp-echo-request-type8-code0:

在这里插入图片描述

  1. 再回顾当前的策略配置及服务应用,如下所示:

root@vSRX# show security policies |display set

Jul 25 07:43:50
set security policies from-zone trust to-zone untrust policy 1 match source-address any
set security policies from-zone trust to-zone untrust policy 1 match destination-address any
set security policies from-zone trust to-zone untrust policy 1 match application icmp-ping-test
set security policies from-zone trust to-zone untrust policy 1 then permit
set security policies from-zone untrust to-zone trust policy 1 match source-address any
set security policies from-zone untrust to-zone trust policy 1 match destination-address any
set security policies from-zone untrust to-zone trust policy 1 match application icmp-reply
set security policies from-zone untrust to-zone trust policy 1 then permit

Application使用是自定义的icmp-request,其实与设备自带的junos-icmp-ping是一致的,如下所示:

###自定义配置###

root@vSRX# show applications |display set
Jul 25 07:43:58
set applications application icmp-ping-test protocol icmp
set applications application icmp-ping-test icmp-type echo-request
set applications application icmp-ping-test inactivity-timeout 20
set applications application icmp-reply protocol icmp
set applications application icmp-reply icmp-type echo-reply
set applications application icmp-reply inactivity-timeout 30

###设备内置icmp-ping###

root@vSRX# show groups junos-defaults | match icmp-ping|display set
Jul 25 07:44:21
set groups junos-defaults applications application junos-icmp-ping term t1 protocol icmp
set groups junos-defaults applications application junos-icmp-ping term t1 icmp-type echo-request

通常还有另外一种ICMP的Application,如下所示,在使用的时候还需作区分,只匹配icmp协议:

root@vSRX# show groups junos-defaults | match icmp-all |display set
Jul 25 07:46:52
set groups junos-defaults applications application junos-icmp-all term t1 protocol icmp

junos-ping and junos-icmp-all 两者在功能上完全一样,这两个应用的目标协议都是ICMP的所有类型,两者同时存在 的原因是为了配置的兼容性:

  1. junos-icmp-all被使用于J-Series和MX/T-Series的JUNOS平台
  2. junos-ping 则来源于NetScreen作为Junos-ES-OS的一部分
通常在网络ACL(访问控制列表)中采取禁拼(禁止Ping操作)措施,可通过配置ACL规则来阻止ICMP(Internet控制消息协议)的Echo请求和Echo应答报文,因为Ping命令主要使用这两种ICMP报文来测试网络连通性。 以下是在不同网络设备上配置ACL禁拼的示例: ### 思科设备 在思科路由器或交换机上,可使用如下命令配置ACL来禁止Ping操作: ```plaintext ! 创建一个编号为100的扩展访问控制列表 access-list 100 deny icmp any any echo access-list 100 deny icmp any any echo-reply access-list 100 permit ip any any ! 将ACL应用到接口的入站方向 interface GigabitEthernet0/1 ip access-group 100 in ``` 以上配置中,首先创建了一个扩展访问控制列表100,其中`deny icmp any any echo`和`deny icmp any any echo-reply`分别禁止了ICMP的Echo请求和Echo应答报文,`permit ip any any`允许其他所有IP流量通过。然后将该ACL应用到`GigabitEthernet0/1`接口的入站方向。 ### 华为设备 在华为路由器或交换机上,配置ACL禁拼的命令如下: ```plaintext # 创建一个编号为3000的高级ACL acl number 3000 rule 5 deny icmp source any destination any icmp-type echo rule 10 deny icmp source any destination any icmp-type echo-reply rule 15 permit ip source any destination any # 将ACL应用到接口的入站方向 interface GigabitEthernet0/0/1 traffic-filter inbound acl 3000 ``` 这里创建了一个高级ACL 3000,通过规则`rule 5`和`rule 10`分别禁止了ICMP的Echo请求和Echo应答报文,`rule 15`允许其他所有IP流量。最后将该ACL应用到`GigabitEthernet0/0/1`接口的入站方向。 ### Juniper设备 在Juniper设备上,配置ACL禁拼的示例如下: ```plaintext set firewall family inet filter block-ping term deny-ping from protocol icmp set firewall family inet filter block-ping term deny-ping from icmp-type echo-request set firewall family inet filter block-ping term deny-ping from icmp-type echo-reply set firewall family inet filter block-ping term deny-ping then discard set firewall family inet filter block-ping term allow-other then accept set interfaces ge-0/0/0 unit 0 family inet filter input block-ping ``` 上述配置创建了一个名为`block-ping`的防火墙过滤器,通过`term deny-ping`规则禁止了ICMP的Echo请求和Echo应答报文,`term allow-other`规则允许其他流量。最后将该过滤器应用到`ge-0/0/0`接口的入站方向。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值