From the course: Juniper Security Policies Fundamentals
Unlock the full course today
Join today to access over 24,800 courses taught by industry experts.
Best practices
From the course: Juniper Security Policies Fundamentals
Best practices
- [Instructor] Security policies are easy to configure. In a large enterprise over time as access requirements change, security policies keep building up and reaches a point where it becomes hard to manage them. These best practices will help you build a set of policies that are easy to manage and troubleshoot. Follow a good naming convention. Over time, as your security policies keep building up, it becomes difficult to track and identify them. Having a good naming convention will help you quickly identify the purpose of the policy. These are some ways to name your policies. ALLOW-ICMP-TRUST-UNTRUST, BLOCK-TELNET-EXTERNAL-INTERNAL, ALLOW-WEB-TRUST-UNTRUST. Using uppercase to name your policies will make it easier to spot them. Use least privilege. Design your firewall policies to be as tight as possible. Only permit traffic that is needed. This will ensure that the attack surface is minimum and you have tight control over the traffic that is flowing in your network. Place specific…