Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Juniper blacklist not working

Posted on 2013-01-09
6
Medium Priority
?
535 Views
Last Modified: 2013-04-23
Hi,

I'm trying for testing to blacklist ip 64.20.227.133 wich is public ip of the well known : http://mxtoolbox.com

I create an adress "blacklist" : 64.20.227.133/32 then i create a rule :

From Global to Global (to be sure) deny "blacklsite" on any services to any adress.

Problem, when i do a port scan to my public ip it's still seeing what is open...
So i suppose that nothing is dropped..

Can you help me please.
Thanks.
0
Comment
Question by:kishkool75
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
6 Comments
 
LVL 12

Expert Comment

by:DarinTCH
ID: 38758431
what kind of juniper device are we discussing?
Netscreen
SRX

is traffic originating from that IP into your device?
in order for you to be monitoring it....
0
 

Author Comment

by:kishkool75
ID: 38758480
This is a SSG140 netscreen OS.

Well here a small schema :

MXTOOLBOX (64.20.227.133) ---->PORT SCAN (25)----> JUNIPER SSG140 ---->Mail server
Result is that mxtoolbox see that port 25 is open and i get a log who says :

[Root]system-alert-00016: Port scan! From 64.20.227.133:65194 to XXXXXXX, proto TCP (zone Untrust, int ethernet0/0). Occurred 1 times.

Even with the rule of my previous post, it still see what port is open on the firewall.
0
 
LVL 12

Expert Comment

by:DarinTCH
ID: 38758623
Ok
1-you can perform global rules on netscreen devices....

2nd MXTOOLBOX is NOT a bad site
it actually checks legitimate sites to help in blacklisting--and other things

3rd - if that port is open - as it legitimately should ... then it will be seen available by any scan

4th that IP is not generating traffic into your org - it is just checking to 'see' if the port is available

5th your rule states what exactly - do not permit zzz?ALL traffic from src xxx to dest yyy - correct
 - is that rule even being hit
0
Ready for your healthcare security check-up?

In the past few years, healthcare organizations have become a prime target for advanced attacks. Does your organization have what it needs to defend itself? Schedule your healthcare security check-up today and download our free Healthcare Security Resource Kit today!

 

Author Comment

by:kishkool75
ID: 38758732
Hi,

Yes i know it's a good site but it was just about testing purpose.
Maybe i'm wrong but if i says :
anything from this is ip must be drop by the FW then it should not be able to get any port scan result...
Same thing with smtp diag on mxtoolbox.
it's still working, it can test my smtp server and do some check but with a rule who say block anything from mxtoolbox IP then i would just receive an error from mxtoolbox.com interface... no?

How can i see if that rule is being hit?
To see current rule look attach picture. (zone : Untrust to Global)

Another thing, if i have a rule who stat : ALL IS PERMIT FROM ANY IP then if i do a rule who says PACKET DENY FROM XXX IP which IP is taking the order?

Thanks
blacklist.JPG
0
 
LVL 12

Expert Comment

by:DarinTCH
ID: 38758776
FW rules get processed in order
so the first it hits in this case

a port scan and fw rule are not necessarily related

fw rule says do not allow traffic from ?anywhere to reach my desktop

a port scan asks if x port is open on the firewall for traffic

so a port scan might get the answer without the traffic being allowed to traverse the firewall - head out the indicated interface and reach a final destination

you can monitor rules usage via - monitoring live or after the fact reports
of even looking at the rule to see if it has an indication it was hit

some of this might be more readily visible from a cmd line then a GUI
search how to monitor a firewall wall rule usage in net screen - there's alot out there
0
 
LVL 71

Accepted Solution

by:
Qlemo earned 1500 total points
ID: 38824386
Create the rule as going from Untrust to Trust. IIRC Global to Global will not block traffic.
For testing you should always set the policy to log traffic at session begin. You can remove that later, if you are not interested in logging blocked traffic.
0

Featured Post

Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I recently had the displeasure of buying a new firewall at one of the buildings I play Sys Admin at. I had to get a better firewall than the cheap one that I had there since I was reconnecting the main office to the satellite office via point-to-poi…
I found an issue or “bug” in the SonicOS platform (the firmware controlling SonicWALL security appliances) that has to do with renaming Default Service Objects, which then causes a portion of the system to become uncontrollable and unstable. BACK…
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…
Screencast - Getting to Know the Pipeline
Suggested Courses

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question