Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
14 Cards in this Set
- Front
- Back
What does a traffic log show?
|
The time each connection is closed as well as what service and what address was used with the connection
|
|
What code do you use to set up traffic logging?
|
set policy <zone or src-add> to <zone or dst-add> log
|
|
What code do you use to view the traffic logs?
|
get log traffic
|
|
What do traffic counters allow?
|
Allows you to view a graphical view of traffic that matches the policy.
|
|
What code do you use to set up traffic counters?
|
set policy <zone or src-addr> to <zone or dst addr> count
|
|
What code do you use to view the traffic counters?
|
get counter policy <policy ID#> <time> <parameters>
|
|
What does scheduling allow you to do?
|
Scheduling allows you to enable or disable policies based on time.
|
|
What is recommend to be configured if you are going to use policy scheduling and why?
|
Network Time Protocol (NTP) because policy scheduling relies on time and with NTP set up all devices connected to the Juniper Device will have the same time.
|
|
What code do you use to configure scheduling in the CLI?
|
set scheduler <name> recurrent <day> start <time> stop <time>
|
|
What does authentication require users to do before traffic will be permitted to pass through the firewall?
|
Supply a username and password
|
|
What does a user have to do to trigger webauth?
|
Browse to a specific IP address
|
|
What steps must be completed for user authentication to take place?
|
1) create a user database
2)configure authentication policy 3) configure webauth IP address (only if using webauth.) |
|
What code do you use to add a user to the user database through the CLI?
|
set user <name> password <password>
|
|
What code is used to configure an Authentication policy?
|
set policy (from <zone or src-add> to <zone or dst-add> <service> <action>) Auth
|