IPV6 – BÀI SỐ 2: NEIGHBOR DISCOVERY PROTOCOL

Trong bài viết trước, chúng ta đã cùng nhau trao đổi về những đặc điểm khái quát của địa chỉ IPv6, cấu trúc địa chỉ IPv6 cũng như cách cấu hình địa chỉ IPv6 trên các interface của thiết bị mạng Cisco. Trong bài viết tuần này, chúng ta sẽ cùng nhau trao đổi một vài nét về một giao thức nền tảng rất quan trọng được sử dụng cho IPv6 là giao thứcNDP – Neighbor Discovery Protocol.

Continue reading

IPV6 – BÀI SỐ 1: GIỚI THIỆU VỀ IPV6

Như đã đề cập đến trong các bài viết trước, hiện nay không gian IPv4 trên toàn cầu đã cạn kiệt. Vào tháng 02/2011, IANA (Internet Assigned Numbers Authority) – tổ chức quản lý địa chỉ IP và số hiệu mạng trên toàn thế giới đã công bố rằng địa chỉ IPv4 đã được cấp phát hết. Dải IPv4 còn sử dụng đến ngày nay đều nằm trong kho IP của các cơ quan quản lý IP cấp vùng hoặc các ISP; không còn IP mới để cấp phát. Việc sử dụng IPv4 hiện nay đều được các ISP quy hoạch hết sức cẩn thận để không gây lãng phí một tài nguyên mạng đã cạn kiệt. Continue reading

Glossary of Network Terms

A
Access control – Limiting the data flow from the resources of a system to only authorized persons, programs, processes, or other systems in a network. Access control rule sets in Cisco routers are referred to as access control lists or ACLs.

Agent – Refers to the software in the managed element (the router, hub, other device) that can report on or change the behavior of the element.
ASN 1 – Abstract Syntax Notation One is a formal language developed and standardized by the CCITT that SNMP uses to query nodes for information about data in another node.
Attack signature – A system of flagging malicious activity on the network by carefully examining incoming information packets for similar logarithmic patterns.
Authentication, authorization, and accounting (AAA)- Security elements usually used to provide secure access to resources:
Authentication: The act of validating the identity of an end user or a device such as a host, server, switch, or router. 
Authorization: The means of granting network access rights to a user, groups of users, system, or program. 
Accounting: The process by which one can establish who or what performed a certain action, such as tracking a user’s data connection and logging system users. 
Authentication header – The IPsec header used to verify that the contents of a packet have not been altered in transit.
B
Backbone – The primary connectivity mechanism of a hierarchical distributed system. All systems that have connectivity to the backbone are assured of connectivity to each other. This does not prevent systems from setting up private arrangements with each other to bypass the backbone for reasons of cost, performance, or security.
Backward Explicit Congestion Notification (BECN) – A BECN is sent to the sender of Frame Relay traffic to indicate that congestion was detected. It is the sender’s responsibility to implement congestion avoidance procedures.
Boundary Routers – Routers deployed around the “periphery” of a network to take care of connecting small sites without getting involved in global routing issues.
Broadband – A method of transmission in which data flows from source to destination in a different form that existed at the source.
Broadcast – A specially addressed packet that is received by all stations in the same domain.
Burst Rate – Some frame relay offerings include both a committed rate and the ability to “burst” over that rate for a certain amount of time. The telecommunications carrier does not guarantee this circuit rate but will attempt to use it if possible, letting the customer gain extra performance.
C
CCITT – English translation of the original French acronym: International Consultative Committee for Telegraphy and Telephony. A unit of the International Telecommunications Union, the CCITT produces technical standards or “recommendations” for all public carriers.
Cells – Similar to packets, they contain control and addressing information. The major difference is that all cells are the same length for ATM it is 53 bytes. Fixed-length cells have a constant delay when transmitting network devices, making it easier to prioritize traffic.
Certificate – A message, signed digitally with the private key of a trusted third party (see certificate authority), declaring that a specific public key belongs to someone or something with a specified name and set of attributes.
Certificate Authority (CA) – An entity trusted to sign digital certificates and, therefore, attest to the identity of other authorized users.
Challenge Handshake Authentication Protocol (CHAP) – An authentication protocol that prevents unauthorized access. CHAP authenticates and identifies the remote end. The router or access server then determines whether the user is allowed access.
Channels – Virtual circuits inside “paths”. The objective behind paths and channels is to “gang” channels together and get quick switching at lower cost.
Committed Information Rate (CIR) – you can buy virtual circuits with a guaranteed CIR. Your provider guarantees that this rate will be available as needed. Common CIRs include: 32 Kbps, 64 Kbps, 128 kbps, and 256 Kbps. If you transmit over this speed, you’re in danger of losing packets and data. If the carrier’s service is not working well, it may show congestion and packet loss, even if you are under your CIR.
Collision – Occurs when more than one station attempts to access an Ethernet LAN simultaneously.
Compromise – In the context of security, to assault or strike at a network by getting around its security procedures.
Computer Emergency Response Team (CERT) – A formal organization of system administrators whose members provide services that address issues related primarily to computer and network security.
Console – The user interface to a reporting/analysis package that allows you to control the elements you’re polling, rate of polling, and frequency of reporting.
Context – Based Access Control (CBAC) This feature, built into the Cisco IOS software, allows advanced packet session filtering to all routable traffic. By configuring ACLs, traffic can be permitted or denied from being processed and forwarded.
Core Routers – Routers deployed as part of the network backbone.
Cyclic Redundancy Check (CRC) – A mathematical calculation on a frame or cell that is used for error detection. It is added to the traffic, and the receiver performs the same calculation. If the two CRCs do not match, an error has occurred.
Cryptographic Key – A digital code that can be used to encrypt, decrypt, and sign information.
Cryptography – The science of writing or reading coded messages.
Cut-through – An approach that minimizes queuing delay by starting the forwarding decision while the traffic is still being received.
D
Data Confidentiality – The means of ensuring that only the entities allowed to see the information packets can see it in an easily accessible format.
Data Encryption Standard (DES) – A secret key cryptographic design standardized by the National Institute of Standards and Technology (See NIST and Triple DES).
Data Integrity – The process of guaranteeing data has not been modified or destroyed during transit through the network.
Data Privacy – The process of protecting network data from eavesdropping or tampering. In some cases, data separation using tunneling technologies, such as generic routing encapsulation (GRE) or Layer 2 Tunneling Protocol (L2TP), provides effective data privacy. Often, however, additional privacy requirements call for the use of digital encryption technology and protocols such as IPsec-especially when implementing VPNs.
Denial-of-Service (DoS) – Attack Any malicious action that prevents any part of a network or host system from functioning in accordance with its intended purpose. This can be compared to someone continually dialing in and tying up phone lines.
Dynamic Host Configuration Protocol (DHCP) – A technology allowing TCP/IP address, subnet mask, gateway and other parameters to be assigned to a workstation automatically.
Diffie Hellman – A public key-based management system that allows two users or network devices to exchange public keys over an unsecured medium.
Digital Signature – A string of bits affixed to an electronic message (encrypted hash) that provides authentication and data integrity.
Digital Signature Standard (DSS) – A digital signature algorithm developed by the National Security Agency (see NSA).
Discard Eligible – Senders can mark some packets or cells as discard eligible – they will be discarded first if congestion occurs, preserving higher priority traffic flows.
Disk Fragmentation – Frequent file modifications cause fragmentation, which is when the file is spread across many disk areas. This degrades performance. Tools to consolidate disk space improve performance.
Disk Thrashing – When a lot of disk I/O (reads and writes to the disk) is taking place without any real work occurring as a result. For example, a poorly designed file system could require lots of access to directories before the data is retrieved.
DNS (Domain Name Server) – The DNS is a general purpose distributed, replicated, data query service. The principal use is the lookup of host IP addresses based on host names. The style of host names now used in the Internet is called “domain name”, because they are the style of names used to look up anything in the DNS. Some important domains are: .COM (commercial), .EDU (educational), .NET (network operations), .GOV (U.S. government), and .MIL (U.S. military). Most countries also have a domain. For example, .US (United States), .UK (United Kingdom), .AU (Australia). It is defined in STD 13, RFCs 1034 and 1035.
DSU/CSU – Digital Service Unit that is a component of customer premise equipment used to interface to a digital circuit such as a T1. Combined with a Channel Service Unit, it converts a customer’s data stream into the format for transmission.
DSL (Digital Subscriber Line) – A method for moving data over regular phone lines. A DSL circuit is much faster than a regular phone connection, and the wires coming into the subscriber’s premises are the same (copper) wires used for regular phone service. A DSL circuit must be configured to connect two specific locations, similar to a leased line. A commonly discussed configuration of DSL allows downloads at speeds of up to 1.544 megabits (not megabytes) per second, and uploads at speeds of 128 kilobits per second. This arrangement is called ADSL: “Asymmetric” Digital Subscriber Line. Another common configuration is symmetrical: 384 Kilobits per second in both directions. In theory ADSL allows download speeds of up to 9 megabits per second and upload speeds of up to 640 kilobits per second.
DSL is now a popular alternative to Leased Lines and ISDN, being faster than ISDN and less costly than traditional Leased Lines.
E
Encryption – The process of scrambling data in such a way that it is not readable by anyone except the intended recipient and only after it has been properly decrypted. The means of ensuring that only the entities allowed to see the information packets can see it in an easily accessible format.
Exceptions – Events or occurrences that are not considered normal and require further attention.
F
Fast Ethernet – 100 Megabit Ethernet system, newly deployed.
Filtering – A process for screening network traffic for certain characteristics, such as source address, destination address, or protocol, and determining whether to forward or discard that traffic based on the established criteria.
Firewall – A system, based on either hardware or software, used to govern traffic between two networks.
(FECN) Forward Explicit Congestion Notification – a FECN is added to a received frame, letting the receiver know that congestion is occurring. Although it is the sender’s responsibility, the receiver can inform the sender to implement congestion avoidance procedures. See also BECN, discard eligible.
Frame – Used interchangeably with “packet”.
Full Duplex – Ability to send traffic in both directions at the same time. WAN links and extended Ethernet can operate this way.
G
Generic Routing Encapsulation (GRE) – Tunneling protocol developed by Cisco that can encapsulate a wide variety of protocol packet types inside IP tunnels, creating a virtual point-to-point link to Cisco routers at remote points over an IP internetwork.
Giant – An Ethernet packet greater than 1,512 bytes.
Gigabit Ethernet – 1,000 Megabit Ethernet system, next generation.
Grouping – Setting up “views” with a related set of elements such as core routers, all the servers in a department, and so forth. Extremely useful in performance reporting to enable you to better match reports to your existing business processes.
H
Hack – The process of gaining illegal, unauthorized access to a network to misappropriate confidential material, or merely for self-gratification.
Half Duplex – Communicating in only one direction at a time.
Hop – Each time a packet or cell is relayed, it undergoes a hop. More hops between sender and receiver may increase delays.
Hot Standby Router Protocol (HSRP) – Provides a way for IP workstations to keep communicating on the internetwork even if their default routers become unavailable, thereby providing high network availability and transparent topology changes.
I
IPsec – A set of security standards used to provide privacy and authentication services at the Internet Protocol (IP) layer.
Identity – The accurate and positive identification of network users, hosts, applications, services, and resources. New technologies such as digital certificates, smart cards, and directory services are beginning to play increasingly important roles in identity solutions.
Index – A pointer within a MIB to data relating to a particular interface.
Installation & Configuration – MC Info engineers are certified by the manufacturers of products we provide to install, configure and implement their hardware and software. Training is a never ending mission at MC Info, which assures that we are fully aware of changes in technology and products.
Integrity – The means of ensuring that the data has not been altered except by people who are explicitly intended to modify it. When used as “network integrity,” it can be considered as the means of ensuring that the network is not permitting services or activities that are against its policies.
Internet – The worldwide network of networks connected to each other using the TCP/IP protocol suite.
Internet Engineering Task Force (IETF) – A standards organization whose charter is to design protocols for use in the Internet. Its publications are called Request for Comments (RFCs).
Internet Protocol (IP) – A packet-based protocol used to exchange data over computer networks.
Internet Security Association and Key Management Protocol (ISAKMP) – A key management protocol for IPsec that is a required part of the complete IPsec implementation; also referred to as the Internet Key Management Protocol (IKE).
Intrusion Detection System (IDS) – A real-time security sentry (like a motion sensor) that protects the network perimeter, extranets, and the increasingly vulnerable internal network. IDS systems analyze the network datastream in search of attack or activity signatures that have been deemed unauthorized, and then alarm and react to the activity. Tunneling protocol developed by Cisco that can encapsulate a wide variety of protocol packet types inside IP tunnels, creating a virtual point-to-point link to Cisco routers at remote points over an IP internetwork.
ISDN (Integrated Services Digital Network) – Integrated Services Digital Network. A system that provides simultaneous voice and high-speed data transmission through a single channel to the user’s premises. ISDN is an international standard for end-to-end digital transmission of voice, data, and signaling.
J
K
Kerberos – A secret key network authentication protocol developed at the Massachusetts Institute of Technology (MIT), using the DES cryptographic algorithm for encryption and a centralized key database for authentication.
L
LAN – A network system that provides a relatively small area with high-speed data transmission at a low error rate. May include PCs, printers, minicomputers, and mainframes linked by a transmission medium such as a coaxial cable or twisted pair wiring.
LAN Emulation – A means of interconnecting LANs using ATM as a “bridge”. Requires creating virtual circuits across the ATM backbone.
Layer 2 Forwarding Protocol (L2F) – A protocol that supports the creation of secure virtual private dialup networks over the Internet.
Layer 2 Tunneling Protocol (L2TP) – An IETF standard that combines aspects of Cisco Layer 2 Forwarding Protocol (L2F) and Microsoft’s Point-to-Point Tunneling Protocol (PPTP) for implementing VPNs.
Layer 2 Tunneling Protocol over IPsec (L2TP/IPsec) – Windows 2000 VPN protocol combining remote access (L2TP) and security (IPsec).
M
MAN Metropolitan Area Network – network that extends over a wider area than a LAN, typically 10-100 Km on a fiber ring.
Map – Visual representation of the network topology. Different platforms display maps in different levels of detail.
MIB-Walker/browser – A GUI that allows you to visually look at a MIB and pick the variables you want to collect data on, poll at a specified rate, and use the data for diagnostic purposes.
Message Digest 5 (MD5) – A hash algorithm used for data authentication and to verify integrity of the communication.
Mid-level Manager – A network management platform that improves scalability by collecting information from a set of agents and passing the results to a central manager.
Memory Thrashing – High rates of page or process swapping without productive work resulting – a problem of memory capacity or management.
Mirroring – Process by which data is duplicated on separate disk systems. Benefits include faster access and fault tolerance in case of a disk system failure.
(MPOA) Multi-Protocol Over ATM – Interconnects LANs using ATM backbones as a virtual router. Provides more control and uses quality of Service of ATM.
N
National Institute of Standards and Technology (NIST) – A United States government agency that establishes national technical standards.
National Security Agency (NSA) – A United States government agency reportedly responsible for monitoring and decoding all foreign communications of interest to the security of the United States.
Network Address Translation (NAT) – The method of converting one IP address to another IP address; primarily used to connect a network which has an internal address space that is on a different standard than another network, such as the Internet.
Network Analysis – The next step following the network audit is the analysis. Data gathered from the audit is thoroughly analyzed utilizing various methodologies. In addition, MC Info will perform a complete future needs analysis to determine the best direction for the customer.
Network Audit – MC Info’s team of trained network engineers can be your one-stop network mechanics. Using the latest in diagnostic equipment, they are capable of performing high-level network audits. Able to examine every node attached to your network, MC Info can pinpoint any performance bottleneck. In addition, the company is able to identify peak users, CPU utilization, peak usage times and a can perform a variety of other useful tests. With the worlds best equipment and network expertise, MC Info is your solution for network audits.
Network Design – MC Info will assist in the design of unbiased networks that focus on maximizing performance, helping the client achieve their goal, and includes the cutting edge in technology. MC Info’s network design begins with a thorough requirements study which includes a current and future needs assessment as well as forecasting. MC Info will then recommend a backbone technology (topology) and specific products. Research is conducted with a senior engineering team at the client site. The net result is a network design that will meet your needs as you expand your business.
Node – An addressable device attached to a computer network; also a station, device, or system is used to mean the same thing.
Nonrepudiation – A property of a cryptographic system that prevents a sender from denying later that he or she sent a message or performed a certain action.
Novell Directory Services (NDS) – A global naming system for Novell environments containing information about a network, including the objects in that network.
O
(OIDs) Object Identifiers – Used in SNMP to identify specific elements by type and vendor. Used to gather more detailed information.
P
Packet – Also known as a “frame,” each packet contains addressing and control information. Packets are variable length, up to a maximum size. Packets for different technologies usually have a minimum and maximum size allowed. For example, Ethernet has a minimum of 64 bytes and a maximum length of 1,500 Bytes. The variable length of frames also means variable delays when traversing a network device.
Packet Discards – Occur when a received packet has transmission or format errors or when the device does not have any storage for it.
Packet Filtering – The capability of performing a packet-by-packet inspection of all routable traffic.
Paging – A method of managing virtual memory. When a requested page is not found in main memory, an interrupt occurs. The paging device machine then transfers the requested inactive page to memory. High rates of page swapping can degrade performance.
Partitions – Breaking the disk space into areas that are assigned and managed independently. Each application may have appropriate space assigned.
Password Authentication Protocol (PAP) – An authentication protocol that allows PPP peers to authenticate one another. The remote router attempting to connect to the local router is required to send an authentication request. Unlike CHAP, PAP passes the password and host name or username in the clear (unencrypted). PAP determines whether a password is valid.
Paths – Within an ATM network you have paths that are virtual pipes from one location to another and carry a number of channels.
Ping – A command used to determine the presence and operational nature of another device.
Ping of Death – A denial-of-service attack where an attacker sends an oversized ping packet intended to cause the receiving machines to crash when they attempt to reassemble the large data packet.
Point-to-Point Protocol (PPP) – A standardized Internet encapsulation of IP over point-to-point links.
Point-to-Point Tunneling Protocol (PPTP) – A Microsoft-sponsored IETF draft standard for implementing VPNs from the Windows 95/98 operating system to a VPN gateway.
Poller – A piece of software that sends a periodic request to an agent for management data. For example, the poller sends a message to a router agent asking it to send back particular variables. The agent sends the variables back to the poller.
Port Several usages – (1) The identifier used by protocols to distinguish among multiple, simultaneous connections to a single destination host. Some applications are identified by “well-known” port numbers, for example. (2) A physical connection on a network device.
Private Key – A digital code used to decrypt data and verify digital signatures. This key is kept secret, and is known only to its owner.
Problem Isolation – Today there are dozens of manufacturers of networking related products. Setting up a network may require a combination of products which are sometimes incompatible or require modifications to work within the entire system. It is not uncommon for major network designs to create problems such as driver incompatibility, protocol problems and user errors that often cause finger pointing among manufacturers. MC Info brings a one-stop solution to these types of issues. With an expertise in all major manufactured networking products and advanced testing equipment, MC Info will isolate the source of your problem and suggest corrective action.
Project Management – MC Info’s staff is skilled in relocation, new building networking and the design of new networks. Able to lead massive development projects or serve as a liaison between the customer, contractors and subcontractors, MC Info will take responsibility for your network projects’ life cycle. MC Info’s team of engineers have the leadership skills to manage projects that may last for a weekend or for many years.
Protocol – A formal description of message formats and the rules two or more systems must follow to exchange those messages. Protocols define procedures for negotiating connections, recovering from errors, and controlling traffic volumes. All protocols recognize that network errors occur, and they have means to recover from them. Some will use an “acknowledgment” to indicate properly received messages. Others send a “negative” to indicate the need for retransmission, while others depend on a time-out to trigger corrective action.
Protocol Analyzers – Special tools that break captured packets or cells into their fields for troubleshooting and statistics collection.
Proxy – A device that performs a function on behalf of another device. When referring to firewalls, proxy is a process used to run a number of application checks on the incoming traffic. This process can negatively impact firewall performance.
PSTN (Public Switched Telephone Network) – The international telephone system based on copper wires carrying analog voice data. This is in contrast to newer telephone networks base on digital technologies, such as ISDN and FDDI. Telephone service carried by the PSTN is often called plain old telephone service or POTS.
Public Key – A digital code used to decrypt data and verify digital signatures, and it can be made widely available.
Public Key Infrastructure (PKI) – A trusted and efficient key and certificate management system.
Q
Quality of Service (QoS) – A guaranteed level of performance, often part of a service level agreement between a network service provider and end user.
Queuing Delay – The delay that occurs when frames or cells wait in a device before being forwarded. Often a major component of latency.
R
(RAID) Redundant Array of Inexpensive Drives – RAID technology turns several inexpensive drives into one, big drive to address the gap between processor performance and input/output rates. The RAID controller manipulates drives to share the work on file reads and writes for large files or performing multiple, simultaneous reads or writes of small files.
Redundancy – Having additional elements, devices, servers, links, and others so that single failures do not cause a complete loss of service.
Remote Access – Whether you require remote control, remote access or a remote node, MC Info can provide you with the complete remote solution. In addition, MC Info specializes in connecting business to business, branch to home office, branch to corporate office or tele-workers to the office. Furthermore, MC Info offers complete Internet Service Provider (ISP) design and set-up. With expertise in dial-up (digital or analog) and leased line solutions, MC Info can handle all of your remote needs.
Remote Access Dial-In User Service (RADIUS) – A network protocol developed by Livingston Enterprises, Inc., as an access server authentication and accounting protocol.
Request for Comments (RFCs) – See IETF
Risk Analysis – The process of identifying security risks, determining their impact, and identifying areas requiring protection.
Rivest, Shamir, Adelman (RSA) – A public key cryptographic algorithm that can encrypt or decrypt data and can apply or verify a digital signature.
Router & Switching Configuration – MC Info is fully equipped to provide all of your LAN and WAN needs with an expertise in current and emerging router and switching technology. MC Info’s technicians are fully trained in all router protocols, subneting and masking, manufacturer differences and platform compatibility issues. In addition, MC Info is capable of designing and installing networks with Ethernet, FDDI, ATM, Fast Ethernet, Gigabit Ethernet and/or Fibre Channel.
S
SNMP Trap – A message from an agent indicating a situation that requires immediate attention. Also known as an alarm or an alert. Administrators select a threshold that determines when a trap will be sent.
Scanner – An enterprise-class software application that allows the user to identify and fix network security holes before the hacker finds them.
Security – The dramatic growth of the Internet has expanded revenue through on-line commerce and has created the need for much more stringent security. More than ever, companies are establishing Intra and Extranets that are critical to their efficient operation. The threat of loss of valuable data is a paramount issue to any company. In response to the demand for greater network security, MC Info has established a group of network security experts who’s sole purpose is to provide solutions to minimize the threat of such a loss. With expertise in user authentication, resource authorization, encryption, firewalls, penetration testing, security audits, training and security policies, MC Info can help protect your most valuable resource — your data.
Secure Hash Algorithm (SHA) – A hash algorithm used for data authentication and to verify integrity of the communication.
Security Monitoring – The process of securing the network by regular tests and Security Posture Assessments (SPAs).
Security Perimeter – The boundary at which security controls are placed to protect network assets.
Security Policy – A set of high-level directives that control the deployment of network services along with the ongoing maintenance and auditing of these security policies.
Shunning – The act of a Cisco router dynamically reconfiguring its ACLs to terminate a detected attack and to block the attacking IP address from future transmissions through the router for a set period of time.
SMURF Attack – A malicious attack where the hacker sends a large number of spoofed ping packets to broadcast addresses, with the intent that these packets will be magnified and sent to the spoofed addresses. This has exponential possibilities, depending on how many hosts respond.
Spoofing – An attempt to gain access to a networked device by posing as an authorized user, device, or program.
Store and Forward – The normal means for forwarding traffic through a network device. The received traffic is stored until it can be forwarded. See queuing delays.
Swap Device – A storage device, typically a hard drive that accommodates the virtual memory process of swapping and paging.
Swapping – Another method of managing memory. Entire processes are swapped as needed to keep the active processes in memory. Swapping can add delays if large processes are swapped frequently.
System & Network Management – Understanding the needs of each user and their specific devices is a very complex process that can be overcome through outsourcing such responsibilities to MC Info. MC Info can manage your network through the design,installation, setup stages and will utilize platform independent network management applications.
T
T1 – A type of digital carrier/system transmitting voice or data at 1.5 Mbps. A T1 carrier can handle up to 24 multiplexed 64 Kbps digital voice or data channels.
TCP Reset – A potential response to a hacking attack by a Cisco Secure IDS Sensor or Cisco IOS Firewall-loaded router in which the device issues a command to terminate the connection that is acting as a conduit to the attack, forcing the attacker to reestablish the connection.
TCP/IP – The internetworking protocols developed by the U.S. government’s Advanced Research Project Agency (ARPA). Widely adopted and supported by computer and software manufacturers as a standard computer networking protocol.
Terminal Access Controller Access Control System Plus (TACACS+) – The AAA protocol used primarily for dialup connection management.
Token – A specially formatted message that gives the receiving node permission to use the network.
Training – Fully certified with a broad range of network manufacturers, MC Info offers on-site training for groups of 1 to one hundred. Training area’s include SNMP, ATM, HP Openview, Network Associates, Sniffer, routing, switching and security.
Trend – A pattern over time. Used to project future loads and potential problem areas.
Triple DES – An algorithm that uses DES and either one, two, or three keys to encrypt/decrypt/encrypt packets of information.
Tunnel – A secure encrypted connection between two points through a public or third-party network.
U
Unicast – Transmission across a network addressed to a single node.
Uplink – A high-speed connection for aggregating traffic. For example, a work group switch with several 10 Mbps ports usually will have a 100 Mbps uplink to a backbone switch or a server.
V
VOIP Voice – Over Internet Protocol; a type of phone system.
VPN Concentrator – A purpose-built hardware platform used to establish secure, end-to-end private network connections over a public networking infrastructure for remote access or site-to-site connectivity.
VPN-Enabled Router – A router for the customer premises that incorporates VPN functionality and is tuned for optimal VPN performance across a range of media types and port densities.
Virtual Circuit – A connection that acts (and appears to the end user) as a dedicated point-to-point circuit, though an indirect physical path might be used. Generally faster and cheaper than dedicated lines.
Virtual Memory – A way to provide large memory spaces to processes. Virtual memory usually exceeds the actual memory capacity. Virtual memory is broken into pages for ease of management. Active pages are in memory, while the rest are on a disk.
Virtual Private Network (VPN) – Enables IP traffic to possess and ensure secure connectivity over a public TCP/IP network by encrypting all traffic from one network to another. A VPN uses tunneling to encrypt all information at the IP level.
VPN Virtual Router Redundancy Protocol (VRRP) – Manages automatic switchover from one platform to another in a redundant installation.
Vulnerability – A weakness in security procedures, network design, or implementation, that can be exploited to violate a corporate security policy.
W
X
Y
Z

Hướng dẫn cài đặt và cấu hình CSF chống DoS, chống Hack

Config Server Firewall (or CSF) is a free and advanced firewall for most Linux distributions and Linux based VPS. In addition to the basic functionality of a firewall – filtering packets – CSF includes other security features, such as login/intrusion/flood detections. CSF includes UI integration for cPanel, DirectAdmin and Webmin, but this tutorial only covers the command line usage. CSF is able to recognize many attacks, such as port scans, SYN floods, and login brute force attacks on many services. It is configured to temporarily block clients who are detected to be attacking the cloud server.

The full list of supported operating systems and features can be found on ConfigServer’s website.
This tutorial is written for Debian based VPS, such as Debian and Ubuntu. The commands should be executed with root permissions, by logging in as root, or initiating a root shell with the following command if sudo is installed:
sudo su
Features
Config Server Firewall offers a wide range of protections for your VPS.
Login authentication failure daemon:
CSF checks the logs for failed login attempts at regular time interval, and is able to recognize most unauthorized attempts to gain access to your cloud server. You can define the desired action CSF takes and after how many attempts in the configuration file.
The following applications are supported by this feature:
Courier imap, Dovecot, uw-imap, Kerio
openSSH
cPanel, WHM, Webmail (cPanel servers only)
Pure-ftpd, vsftpd, Proftpd
Password protected web pages (htpasswd)
Mod_security failures (v1 and v2)
Suhosin failures
Exim SMTP AUTH
In addition to these, you are able define your own login files with regular expression matching. This can be helpful if you have an application which logs failed logins, but does block the user after specific number of attempts.
Process tracking
CSF can be configured to track processes in order to detect suspicious processes or open network ports, and send an email to the system administrator if any is detected. This may help you to identify and stop a possible exploit on your VPS.
Directory watching
Directory watching monitors the /temp and other relevant folders for malicious scripts, and sends an email to the system administrator when one is detected.
Messenger service
Enabling this feature allows CSF to send a more informative message to the client when a block is applied. This feature has both pros and cons. On one hand, enabling it provides more information to the client, and thus may cause less frustration for instance in case of failed logins. On the other hand, this provides more information, which might make it easier for an attacker to attack your VPS.
Port flood protection
This setting provides protection against port flood attacks, such as denial of service (DoS) attacks. You may specify the amount of allowed connections on each port within time period of your liking. Enabling this feature is recommended, as it may possibly prevent an attacker forcing your services down. You should pay attention to what limits you set, as too restrictive settings will drop connections from normal clients. Then again, too permissive settings may allow an attacker to succeed in a flood attack.
Port knocking
Port knocking allows clients to establish connections a server with no ports open. The server allows clients connect to the main ports only after a successful port knock sequence. You may find this useful if you offer services which are available to only limited audience.
Read more about port knocking
Connection limit protection
This feature can be used to limit the number concurrent of active connections from an IP address to each port. When properly configured, this may prevent abuses on the server, such as DoS attacks. 
Port/IP address redirection
CSF can be configured to redirect connections to an IP/port to another IP/port. Note: After redirection, the source address of the client will be the server’s IP address. This is not an equivalent to network address translation (NAT).
UI integration
In addition to command line interface, CSF also offers UI integration for cPanel and Webmin. If you are not familiar with Linux command line, you might find this feature helpful.
IP block lists
This feature allows CSF to download lists of blocked IP addresses automatically from sources defined by you.
Installing ConfigServer Firewall
Step 1: Downloading
Config Server Firewall is not currently available in Debian or Ubuntu repositories, and has to be downloaded from the ConfigServer’s website.
This will download CSF to your current working directory.
Step 2: Uncompressing
The downloaded file is a compressed from of tar package, and has to be uncompressed and extracted before it can be used.
tar -xzf csf.tgz
Step 3: Installing
If you are using another firewall configuration scripts, such as UFW, you should disable it before proceeding. Iptables rules are automatically removed.
UFW can be disabled by running the following command:
ufw disable
Now it is time to execute the CSF’s installer script.
cd csf
sh install.sh
The firewall is now installed, but you should check if the required iptables modules are available.
perl /usr/local/csf/bin/csftest.pl
The firewall will work if no fatal errors are reported.
Note: Your IP address was added to the whitelist if possible. In addition, the SSH port has been opened automatically, even if it uses custom port. The firewall was also configured to have testing mode enabled, which means that the iptables rules will be automatically removed five minutes after starting CSF. This should be disabled once you know that your configuration works, and you will not be locked out.
Basic Configuration
CSF can be configured by editing its configuration file csf.conf in /etc/csf:
nano /etc/csf/csf.conf
The changes can be applied with command:
csf -r
Step 1: Configuring ports
The less access there is to your VPS, the more secure your server is. However, not all ports can be closed as the clients must be able to use your services. 
The ports opened by default are the following:
TCP_IN = “20,21,22,25,53,80,110,143,443,465,587,993,995”
TCP_OUT = “20,21,22,25,53,80,110,113,443”
UDP_IN = “20,21,53”
UDP_OUT = “20,21,53,113,123”
Services using the open ports:
Port 20: FTP data transfer
Port 21: FTP control
Port 22: Secure shell (SSH)
Port 25: Simple mail transfer protocol (SMTP)
Port 53: Domain name system (DNS)
Port 80: Hypertext transfer protocol (HTTP)
Port 110: Post office protocol v3 (POP3)
Port 113: Authentication service/identification protocol
Port 123: Network time protocol (NTP)
Port 143: Internet message access protocol (IMAP)
Port 443: Hypertext transfer protocol over SSL/TLS (HTTPS)
Port 465: URL Rendesvous Directory for SSM (Cisco)
Port 587: E-mail message submission (SMTP)
Port 993: Internet message access protocol over SSL (IMAPS)
Port 995: Post office protocol 3 over TLS/SSL (POP3S)
It is possible that you are not using all of these services, so you can close the ports that are not used. I would recommend closing all ports (removing port number form the list), and then adding the ports you need.
Below are port sets that should be opened if you are running the listed service:
On any server:
TCP_IN: 22,53
TCP_OUT: 22,53,80,113,443
UPD_IN: 53
UPD_OUT: 53,113,123
Apache:
TCP_IN: 80,443
FTP server:
TCP_IN: 20,21
TCP_OUT: 20,21
UPD_IN: 20,21
UPD_OUT:20,21
Mail server:
TCP_IN: 25,110,143,587,993,995
TCP_OUT: 25,110
MySQL server (if remote access is required)
TCP_IN: 3306
TCP_OUT: 3306
Note: If you are using IPv6 for your services, you should also configure TCP6_IN, TCP6_OUT, UPD6_IN, and UPD6_OUT similarly to how IPv4 ports were configured earlier.
You can find a comprehensive list of TCP and UDP ports on Wikipedia. You should open the ports of all the services you use.
Step 2: Additional settings
CSF offers a vast number of different options in its configuration files. Some of the most commonly used settings are explained below.
ICMP_IN
Setting ICMP_IN to 1 allows ping to your server and 0 refuses are such requests. If you are hosting any public services, it is recommended to allow ICMP requests, as these can be used to determine whether or not your service is available.
ICMP_IN_LIMIT
Sets the number of ICMP (ping) requests allowed from one IP address within a specified amount of time. There is usually no need to change the default value (1/s)
DENY_IP_LIMIT
Sets the number of blocked IP addresses CSF keeps track of. It is recommended to limit the number of denied IP addresses as having too many blocks may slow down the server performance.
DENY_TEMP_IP_LIMIT
Same as above, but for temporary IP address blocks.
PACKET_FILTER
Filter invalid, unwanted and illegal packets.
SYNFLOOD, SUNFLOOD_RATE and SYNFLOOD_BURST
This offers protection against SYN flood attacks. This slows down the initialization of every connection, so you should enable this only if you know that your server is under attack.
CONNLIMIT
Limits the number of concurrent active connections on port.
Value:
22;5;443;20
would allow 5 concurrent connections on port 22 and 20 concurrent connections on port 443.
PORTFLOOD
Limits the number of connections per time interval that new connections can be made to specific ports. Value:
22;tcp;5;250
would limit block the IP address if more than 5 connections are established on port 22 using TCP protocol within 250 seconds. The block is removed once 250 seconds have passed after the last packet sent by the client to this port. You may add more ports by separating them by commas like described below.
port1;protocol1;connection_count1;time1,port2;protocol2;connection_count2;time2
More settings
CSF offers a wide range of settings which are not covered in this tutorial. The default values are generally good, and can be used on almost any server. The default settings are configured to prevent most flood attacks, port scans and unauthorized access attempts.
If you would, however, like to adjust the configuration in more detail, please read the comments in /etc/csf/csf.conf and edit them as you like. 
Step 3: Applying the Changes
Whenever you are altering the settings in csf.conf, you should save the files and restart CSF in order for the changes to take effect. Once you are ready with the configuration, close the file by pressing Ctrl + X. When you are asked whether to save the changes or not, press Y to save the changes.
After this, you should apply the changes by restarting CSF with command:
csf -r
If everything went like planned, and you are still able to access the server, open the configuration file once more:
nano /etc/csf/csf.conf
and change setting TESTING at the beginning of the configuration file to 0 as shown below:
TESTING = “0”
Save the file, and apply the changes with command:
csf -r
Blocking and Allowing IP Addresses
One of the most basic features of a firewall is the ability to block certain IP addresses. You may deny (blacklist), allow (whitelist) or ignore IP addresses by editing the configuration files csf.deny, csf.allow and csf.ignore.
Blocking IP addresses
If you would like to block an IP address or range, open csf.deny.
nano /etc/csf/csf.deny
Blocked IP addresses or ranges all reserve one line in csf.deny file. If you would like to block IP address 1.2.3.4 as well as IP range 2.3.*.*, you should add the following lines to the file:
1.2.3.4
2.3.0.0/16
IP ranges are represented using the CIDR notation
Allowing IP addresses
If you would like an IP address or range to be excluded from all blocks and filters, you may add them to csf.allow file. Please note that allowed IP addresses are allowed even if they are explicitly blocked in csf.deny file.
Allowing IP addresses works similarly to blocking them. The only difference is that you should edit /etc/csf/csf.allow instead of csf.deny.
nano /etc/csf/csf.allow
Ignoring IP addresses
CSF also offers ability to exclude IP addresses from the firewall filters. IP addresses in csf.ignore will bypass the firewall filters, and can only be blocked if listed in csf.deny file.
nano /etc/csf/csf.ignore
In order to changes take effect, you should restart CSF after editing any of the files described above with command:
csf -r

How to reset a Netscreen back to factory default

In order to reset a Netscreen back to factory default you will need to first connect via the console connection. This is because you will lose IP connectivity once you reset the devices configuration.

You will then need to obtain the devices serial number from either of the device itself or from the CLI,

netscreen-> get system | i serial
Serial Number: 0122012008234038, Control Number: 00000000

Then using the serial number at the login prompt enter the serial number for both the user name and password.

The device will then be restored to factory default and the previous configuration wiped. To log back into the device once it has been reset use the username/password credentials of netscreen/netscreen.

Netscreen – Basic Config

Below is how to set up the basic configuration on a Netscreen firewall.
Also bear in mind that if you are setting up a NSRP cluster, be sure to set the management IP to a different IP to the management interface.

set hostname myfirewall
set ssh enable

set admin name root
set admin password mypassword
set admin manager-ip 192.168.1.1

set clock 10/07/2008 18:14
set clock timezone 0
set clock dst-off

set interface eth0/2 ip manageable
set interface eth0/2 manage-ip 10.1.1.10
set interface eth0/2 manage ssh
set interface eth0/2 manage ssl
set interface eth0/2 manage web

unset interface eth0/2 telnet
unset interface eth0/2 snmp
unset interface eth0/2 ping

set interface eth0/2 ip 10.1.1.10
set route 0.0.0.0/0 gateway 10.1.1.100

save

Router – Port Forwarding

You will need to have already set your interfaces to inside and outside using the commands,

ip nat ouside
ip nat inside

Once done you can add the command below. This would allow the IP 10.8.8.8 to be accessed on port 23 via the IP address of the interface fa 0/0 using port 2333.

ip nat inside source static tcp 10.8.8.8 23 interface fastEthernet 0/0 2333

Note !! Rember that in the case above the syntax is for NAT`ing the source but also works the other way round, i.e NATs the destination.

IP Version 6 (IPv6)

IPv4 is the current protocol used for sending data over the internet. The main issue with IPv4 is its limited address space. With the amount of available IPv4 address rapidly shrinking IPv6 overcomes this by introducing 128 bit addresses and a much larger address space to that of IPv4.

1. Changes Introduced by IPv6

Summary

  • Addressing
  • Header formatting
  • Flow
  • Extensions and options
  • Authentication and privacy

Changes

  • The addressing changes from the previous IPv4 32bits to IPv6 128bits.
  • IPv6 introduces anycast but removes broadcast addresses.
  • IPv6 address space equals 340 trillion trillion trillion addresses.
  • IPv4 headers contain (at a min) 12 fields which can vary from 30 to 60 bytes in length.
  • IPv6 uses a fixed header size of 8 fields and a fixed header length of 40 bytes. This allows for more efficient network routing.
  • IPv6 changes the fragmentation principle by enabling fragmentation to be conducted by the source nodes only.
  • The checksum field is removed as IPv6 focuses on the routing of packets and leaves the checksum checking to the higher-level protocols such as UDP or TCP.
  • IPv4 processes each packet individually at intermediate routers. These routers do not record packet details for future handling or similar packets. IPv6 uses a concept called flow. A flow is a series of packets that require special handling. Such as a stream of real-time video data.
  • IPv4 adds options to the end of the IP header, as IPv6 adds them to separate extension headers. Meaning the option header is processed only when the packet contains options.

2. IPv6 Addressing

In IPv4 addressing each address comprises of 4 octets (X.X.X.X). With each octet being 8 bits which can be assigned a value between 0-255 using decimal notation. An IPv6 address is represented via 8 octets. With each octet being 16 bits in length and addressable via 4 Hex characters. For example:

2a00:1450:8006:0000:0000:0000:0000:0093

To make the reading of IPv6 addresses easier there are 2 rules that can be applied:

Rule 1 – The first rule is that consecutive zeros can be omitted with a “::”. This can though, be done only once. Below is an example:

2a00:1450:8006:0000:0000:0000:0000:93 > 2a00:1450:8006::93

Rule 2 – The second rule permits the removal of leading zeros from within each octet.

2a00:1450:8006:0000:0000:0000:0000:93 > 2a00:1450:8006:0:0:0:0:93

3. Subnetting

IPv6 subnetting concepts are based on VLSM (Variable Length Subnet Masking) and Classless Inter-Domain Routing methodology.

[global routing prefix][subnet ID][interface ID]

Each address consists of 128 bits. Organisations are often assigned a /48 (48 bit) block of address space. With 48 bits being assigned to the global routing prefix the remaining 80 bits are assigned to either the subnet ID or interface ID bits.

Example : Based on splitting a /48 down into smaller subnets, a total of 65536 64bit subnets could be obtained. This is calculated using the following values:

  • 48bits – Global routing prefix
  • 16bits – for the subnet ID
  • 64bits – Interface ID

Note : It is worth mentioning that IPv6`s auto configuration requires an interface ID of 64 bits. This is because auto configuration assigns a EUI-64 (64-bit) address to the Interface ID. EUI-64 addresses are explained in more depth later on within this article.

4. Address Types

Previous with IPv4 there were 3 types of addresses: Unicast, Multicast and Broadcast. This is where IPv6 differs. With IPv6 there are 3 types of addresses. They are:

  • Unicast – One to One
  • Multicast – One to Many
  • Anycast – One to closest

“Broadcasts” have now been moved into the role of the multicast address type. Any device needing to send multiple packets to multiple devices can now do so by transmitting a multicast packet with the necessary scope ID set.

4.1 Unicast

Unicast addresses are addresses that are associated exclusively to an interface. Just like IPv4 the address can be split into 2 parts; the subnet prefix and the interface ID. The subnet prefix is used to route the packet and the interface ID identifies the network associated with the target IPv6 interface.

Global Addresses are conventional, publicly routable address, just like conventional IPv4 publicly routable addresses.
Link-local Addresses are automatically generated by the client and can be thought of as much the same to previous APIPA (169.254.x.x) addresses within IPv4.  Address always begin with FE80 (10bits) followed by 54 bits of zeros. The remaining 64 bits (Interface ID) is then populated with the devices EUI-64 address. The following is an example of a Link-local address : fe80::210:dbff:fe67:f372/64
Nodes use link-local addresses to communicate with neighbour nodes on the same network link. They are also used for Neighbour Discovery protocol transmissions.
Site Local Addresses were previously used to transmit messages to nodes within the same site and were not accessible to nodes on external sites. These addresses have now been excluded from IPv6.
Special Addresses are loopback addresses, IPv4-address mapped spaces, and 6-to-4 addresses for crossing from an IPv4 network to an IPv6 network.
Transition IPv6 addresses – To help with the transition from IPv4 to IPv6 the following addresses are defined:

  • IPv4-mapped addresses are IPv4 addresses that have been mapped to an IPv6 addressable format. The address consists of zeros for the first 5 octets, followed by one octet of all ones, then the IPv4 address. An example of an IPv4-mapped address would be 0:0:0:0:0:FFFF:192.168.1.100
  • 6to4 addresses allows for the communication between IPv6 nodes over the internet using IPv4. This is achieved by the encapsulation of the IPv6 packet within a IPv4 header. 6to4 addresses consist of 2001::/16 prefix. This is followed by the IPv4 address in hexadecimal notation. For example the IPv4 address 10.20.30.40 would equate to an IPv6 address of 2002:0A14:1E28::/48.
  • IPv4-compatible addresses allow for the communication between IPv6 nodes over a IPv4 infrastructure. This is achieved by the encapsulation of the IPv6 packet within a IPv4 header. An example of a IPv4-compatible address is 0:0:0:0:0:0:4.2.2.2.

4.2 Multicast

This allows multiple interfaces to all receive the same packet. Packets sent to a multicast address are sent to all interfaces linked to that address. IPv6 multicast address consist of four fields.

Field Name Description Bits
Indicator The first 8 bits are always set to all 1`s and defines that this is a multicast packet. 8
Flags Defines whether the multicast type is permanently assigned address. 4
Scope ID Defines the scope of the multicast address group. 4
Group ID Defines a particular group within each scope level. 112

4.3 Anycast

An anycast address is a single address assigned to multiple nodes. A packet sent to an anycast address is then delivered to the first available node. This is a slick way to provide both load-balancing and automatic failover. The idea of anycast has been around for a long time; it was proposed for inclusion in IPv4 but it never happened.

5. EUI-64 Addresses

EUI-64 addresses are used in the automatic address configuration process. EUI-64 addresses are created by amending the existing host MAC address (48-bits) to form a 64-bit address.

This is achieved via inserting a 16-bit Hex value (0xFFFE) into the middle of the MAC address, then followed by the changing of the 7th bit to a 1.

6. Neighbour Discovery

IPv6 Neighbour Discovery incorporates ARP, ICMP Router Discovery and ICMP redirects.
ND uses 5 informational message types:

  1. Router Solicitation – Sent by hosts to routers in order to discover the presence and properties of on-link-routers.
  2. Router Advertisement – Sent by a router to on-link hosts periodically or in response to a RS request from another host.
  3. Neighbour Solicitation – Used to request the IP address for a certain MAC address.
  4. Neighbour Advertisement – Used in response to the Neighbour Solicitation to provide the request MAC address.
  5. Redirect – Used to provide a router of a more efficient route for the routing of their traffic.

7. Interface Modes

IPv6 allows for 2 types of interface Modes; Host mode and Router mode.

Host Mode – When an interface is configured for Host mode, it functions as an IPv6 host. The interface accepts Router Advertisement (RA) messages from other devices and broadcasts Router Solicitation (RS) messages to other devices.
Router Mode – If you configure the interface for Router mode, it functions as an IPv6 router. This allows on-link hosts to perform address auto configuration by sending RS messages to the interface and receiving RA messages in reply. The hosts use the parameters in the RAs to generate IPv6 addresses and to perform other auto configuration tasks.

8. Auto Configuration

One of the main benefits (other than address space) to IPv6 is auto configuration. Auto configuration provides state-less address auto configuration (SLAAC) to your hosts using ICMP6 Router Solicitation and Router Advertisement messages. Depending on the mode type auto configuration works in one of two ways:

Host – Host mode devices send a Router Solicitation message in order to obtain the network prefix from the on-link router. Once it receives the required configuration parameters it uses (along with the EUI-64 address) to auto configure the IP address of the interface.
Router – For a node operating in Router mode, the network prefix (global routing prefix and subnet ID) is set along with the option for auto configuration. Auto configuration then auto completes the (Interface ID) address using the interfaces EUI-64 address.

SRX Dynamic VPN – No proposal chosen

Issue

When connecting trying to connect via Dynamic VPN your client displays the following error:

IKE Negotiations FailedWithin the output of the IKE debug logs you see the following error:

Jul 26 11:35:46 ike_st_i_n: Start, doi = 1, protocol = 1, code = No proposal chosen (14), spi[0..0] = 00000000 00000000 …, data[0..0] = 00000000 00000000 …
Jul 26 11:35:46 8.1.2.3:500 (Responder) 9.1.2.3:13820 { 00fe74bf 0a35dc4b – 6b54adf2 f3b80138 [0] / 0x96a65592 } Info; Received notify err = No proposal chosen (14) to isakmp sa, delete it

Solution

This can occur when users do not correctly logout of the VPN client. The corresponding IKE cookie is not then correctly removed. As the IKE cookie contains the IP address and user name of the client, the user can then not connect via their same IP address.

To ensure the IKE cookie is removed a idle-timeout setting (of 5 minutes) is defined.

root# set security ipsec vpn ike idle-time 300
root# commit

How do I upgrade a Juniper SRX Series gateway

Within this tutorial we will be providing the steps required to upgrade your Juniper SRX firewall.

Copy Image

First of all we copy the image over to the SRX via the use of scp. In this case I have used putty’s pscp.

C:\Windows\System32>pscp “C:\Users\admin\Downloads\junos-srxsme-11.4R1.6-domestic.tgz” root@[SRX IP]:/mfs

Confirm Hash

Next we confirm that the file is complete and is not corrupted by clarifying the MD5 hash of the file. The MD5 files can be obtained from the same page as the image files from within Junipers download section.

root@srx100> start shell
root@srx100% md5 /mfs/junos-srxsme-11.4R1.6-domestic.tgz
MD5 (/mfs/junos-srxsme-11.4R1.6-domestic.tgz) = 1a98b252c4b74f4de0ff8a87bf95194f

Upgrade

The device is then upgraded by issuing the following command.

root@srx100> request system software add no-copy validate /mfs/junos-srxsme-11.4R1.6-domestic.tgz
Formatting alternate root (/dev/da0s2a)…
/dev/da0s2a: 298.0MB (610284 sectors) block size 16384, fragment size 2048
using 4 cylinder groups of 74.50MB, 4768 blks, 9600 inodes.
super-block backups (for fsck -b #) at:
32, 152608, 305184, 457760
Checking compatibility with configuration
Initializing…
Verified manifest signed by PackageProduction_11_1_0
Verified junos-11.1R1.10-domestic signed by PackageProduction_11_1_0
Using junos-11.4R1.6-domestic from /altroot/cf/packages/install-tmp/junos-11.4R1.6-domestic
Copying package …
Verified manifest signed by PackageProduction_11_4_0
Hardware Database regeneration succeeded
Validating against /config/juniper.conf.gz
cp: /cf/var/validate/chroot/var/etc/resolv.conf and /etc/resolv.conf are identical (not copied).
cp: /cf/var/validate/chroot/var/etc/hosts and /etc/hosts are identical (not copied).
mgd: commit complete
Validation succeeded
Validating against /config/rescue.conf.gz
mgd: commit complete
Validation succeeded
rm: /cf/var/validate/chroot/cf/opt/bin: Directory not empty
rm: /cf/var/validate/chroot/cf/opt/etc: Directory not empty
rm: /cf/var/validate/chroot/cf/opt: Directory not empty
rm: /cf/var/validate/chroot/cf: Directory not empty
rm: /cf/var/validate/chroot: Directory not empty
Installing package ‘/altroot/cf/packages/install-tmp/junos-11.4R1.6-domestic’ …
Verified junos-boot-srxsme-11.4R1.6.tgz signed by PackageProduction_11_4_0
Verified junos-srxsme-11.4R1.6-domestic signed by PackageProduction_11_4_0
JUNOS 11.4R1.6 will become active at next reboot
WARNING: A reboot is required to load this software correctly
WARNING:     Use the ‘request system reboot’ command
WARNING:         when software installation is complete
Saving state for rollback …

Confirm

Once the device has been rebooted via the use of ‘request system reboot’ the new version can be verified.

root@srx100> show version
Hostname: srx100
Model: srx100h
JUNOS Software Release [11.4R1.6]

Issues

In the event of the upgrade reporting errors relating to disk space the following commands can be used to clear disk space.

request system storage cleanup
request system software delete-backup

Rollback

To roll back the following command can be used.

request system software rollback