• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/14

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

14 Cards in this Set

  • Front
  • Back
What does a traffic log show?
The time each connection is closed as well as what service and what address was used with the connection
What code do you use to set up traffic logging?
set policy <zone or src-add> to <zone or dst-add> log
What code do you use to view the traffic logs?
get log traffic
What do traffic counters allow?
Allows you to view a graphical view of traffic that matches the policy.
What code do you use to set up traffic counters?
set policy <zone or src-addr> to <zone or dst addr> count
What code do you use to view the traffic counters?
get counter policy <policy ID#> <time> <parameters>
What does scheduling allow you to do?
Scheduling allows you to enable or disable policies based on time.
What is recommend to be configured if you are going to use policy scheduling and why?
Network Time Protocol (NTP) because policy scheduling relies on time and with NTP set up all devices connected to the Juniper Device will have the same time.
What code do you use to configure scheduling in the CLI?
set scheduler <name> recurrent <day> start <time> stop <time>
What does authentication require users to do before traffic will be permitted to pass through the firewall?
Supply a username and password
What does a user have to do to trigger webauth?
Browse to a specific IP address
What steps must be completed for user authentication to take place?
1) create a user database
2)configure authentication policy
3) configure webauth IP address (only if using webauth.)
What code do you use to add a user to the user database through the CLI?
set user <name> password <password>
What code is used to configure an Authentication policy?
set policy (from <zone or src-add> to <zone or dst-add> <service> <action>) Auth