Solved

Server Access Security

Posted on 2011-09-25
7
246 Views
Last Modified: 2012-05-12

I have netscreen 25 Juniper
I need to add additional (security layer) in juniper like username and password


in fact
I need access to DB Server with 2 password
(Database password and additional password)
if any idea please help
  netscreen 25
0
Comment
Question by:AymanOZ
  • 4
  • 3
7 Comments
 
LVL 10

Expert Comment

by:ujitnos
Comment Utility
You can create local authentication in Juniper for a rule.

Suppose brach users want to access the oracle server, then create a rule in juniper;

Branch Zone to Oracle Zone --> Allow req port and in the advanced option select local authentication.

Now for this you will need to create local users in juniper. so when this rule is hit, user will be prompted for a username and password (from Juniper). once authenticated, traffic will continue to the oracle server, else it will be denied.
0
 

Author Comment

by:AymanOZ
Comment Utility
I am so sorry for delay .

Dear Ujitnos its working... But if the user access first time he can access next time without password
so how I can make the password question every time try to access
0
 
LVL 10

Expert Comment

by:ujitnos
Comment Utility
Go to

Configuration > Auth > Auth Servers > Local

and try the timeout options.
0
How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

 

Author Comment

by:AymanOZ
Comment Utility
Not working probably ......thanks
0
 
LVL 10

Accepted Solution

by:
ujitnos earned 500 total points
Comment Utility
In the cli there is a command called "clear auth" but this is to do it manually.
0
 

Author Comment

by:AymanOZ
Comment Utility
i am late again!
0
 

Author Comment

by:AymanOZ
Comment Utility
@ujitnos
no automatic command
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now