Solved

Juniper blacklist not working

Posted on 2013-01-09
6
517 Views
Last Modified: 2013-04-23
Hi,

I'm trying for testing to blacklist ip 64.20.227.133 wich is public ip of the well known : http://mxtoolbox.com

I create an adress "blacklist" : 64.20.227.133/32 then i create a rule :

From Global to Global (to be sure) deny "blacklsite" on any services to any adress.

Problem, when i do a port scan to my public ip it's still seeing what is open...
So i suppose that nothing is dropped..

Can you help me please.
Thanks.
0
Comment
Question by:kishkool75
  • 3
  • 2
6 Comments
 
LVL 12

Expert Comment

by:DarinTCH
ID: 38758431
what kind of juniper device are we discussing?
Netscreen
SRX

is traffic originating from that IP into your device?
in order for you to be monitoring it....
0
 

Author Comment

by:kishkool75
ID: 38758480
This is a SSG140 netscreen OS.

Well here a small schema :

MXTOOLBOX (64.20.227.133) ---->PORT SCAN (25)----> JUNIPER SSG140 ---->Mail server
Result is that mxtoolbox see that port 25 is open and i get a log who says :

[Root]system-alert-00016: Port scan! From 64.20.227.133:65194 to XXXXXXX, proto TCP (zone Untrust, int ethernet0/0). Occurred 1 times.

Even with the rule of my previous post, it still see what port is open on the firewall.
0
 
LVL 12

Expert Comment

by:DarinTCH
ID: 38758623
Ok
1-you can perform global rules on netscreen devices....

2nd MXTOOLBOX is NOT a bad site
it actually checks legitimate sites to help in blacklisting--and other things

3rd - if that port is open - as it legitimately should ... then it will be seen available by any scan

4th that IP is not generating traffic into your org - it is just checking to 'see' if the port is available

5th your rule states what exactly - do not permit zzz?ALL traffic from src xxx to dest yyy - correct
 - is that rule even being hit
0
Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

 

Author Comment

by:kishkool75
ID: 38758732
Hi,

Yes i know it's a good site but it was just about testing purpose.
Maybe i'm wrong but if i says :
anything from this is ip must be drop by the FW then it should not be able to get any port scan result...
Same thing with smtp diag on mxtoolbox.
it's still working, it can test my smtp server and do some check but with a rule who say block anything from mxtoolbox IP then i would just receive an error from mxtoolbox.com interface... no?

How can i see if that rule is being hit?
To see current rule look attach picture. (zone : Untrust to Global)

Another thing, if i have a rule who stat : ALL IS PERMIT FROM ANY IP then if i do a rule who says PACKET DENY FROM XXX IP which IP is taking the order?

Thanks
blacklist.JPG
0
 
LVL 12

Expert Comment

by:DarinTCH
ID: 38758776
FW rules get processed in order
so the first it hits in this case

a port scan and fw rule are not necessarily related

fw rule says do not allow traffic from ?anywhere to reach my desktop

a port scan asks if x port is open on the firewall for traffic

so a port scan might get the answer without the traffic being allowed to traverse the firewall - head out the indicated interface and reach a final destination

you can monitor rules usage via - monitoring live or after the fact reports
of even looking at the rule to see if it has an indication it was hit

some of this might be more readily visible from a cmd line then a GUI
search how to monitor a firewall wall rule usage in net screen - there's alot out there
0
 
LVL 68

Accepted Solution

by:
Qlemo earned 500 total points
ID: 38824386
Create the rule as going from Untrust to Trust. IIRC Global to Global will not block traffic.
For testing you should always set the policy to log traffic at session begin. You can remove that later, if you are not interested in logging blocked traffic.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

In this tutorial I will show you with short command examples how to obtain a packet footprint of all traffic flowing thru your Juniper device running ScreenOS. I do not know the exact firmware requirement, but I think the fprofile command is availab…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now