Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation

ALG Descriptions

This topic describes the Application Layer Gateways (ALGs) supported by the Junos OS. ALG support includes managing pinholes and parent-child relationships for the supported all ALGs. This topic includes the following section:

Supported ALGs

Table 1 lists ALGs supported by the Junos OS.

Table 1: ALGs Supported by the Junos OS

ALGs Supported

v4 - v4

v4 - v6

v6 - v6

DS-Lite

Basic TCP ALG

Yes

Yes

Yes

Yes

Basic UPD ALG

Yes

Yes

Yes

Yes

BOOTP

Yes

No

No

No

DCE RPC Services

Yes

No

No

No

DNS

Yes

Yes

No

No

FTP

Yes

No

No

Yes

H323

Yes

No

No

No

ICMP

Yes

Yes

Yes

Yes

IIOP

Yes

No

No

No

IP

Yes

No

No

No

NETBIOS

Yes

No

No

No

NETSHOW

Yes

No

No

No

PPTP

Yes

No

No

Yes

REALAUDIO

Yes

No

No

No

Sun RPC and RPC Port Map Services

Yes

No

No

No

RTSP

Yes

No

No

Yes

SIP

Yes

No

No

No

SNMP

Yes

No

No

No

SQLNET

Yes

No

No

No

TFTP

Yes

No

No

Yes

Traceroute

Yes

Yes

No

Yes

Unix Remote Shell Service

Yes

No

No

No

WINFrame

Yes

No

No

No

ALG Support Details

This section includes details about the ALGs. It includes the following:

Basic TCP ALG

This ALG performs basic sanity checking on TCP packets. If it finds errors, it generates the following anomaly events and system log messages:

  • TCP source or destination port zero
  • TCP header length check failed
  • TCP sequence number zero and no flags are set
  • TCP sequence number zero and FIN/PSH/RST flags are set
  • TCP FIN/RST or SYN(URG|FIN|RST) flags are set

The TCP ALG performs the following steps:

  1. When the router receives a SYN packet, the ALG creates TCP forward and reverse flows and groups them in a conversation. It tracks the TCP three-way handshake.
  2. The SYN-defense mechanism tracks the TCP connection establishment state. It expects the TCP session to be established within a small time interval (currently 4 seconds). If the TCP three-way handshake is not established in that period, the session is terminated.
  3. A keepalive mechanism detects TCP sessions with nonresponsive endpoints.
  4. ICMP errors are allowed only if there is a flow that matches the selector information specified in the ICMP data.

Basic UDP ALG

This ALG performs basic sanity checking on UDP headers. If it finds errors,. it generates the following anomaly events and system log messages:

  • UDP source or destination port 0
  • UDP header length check failed

The UDP ALG performs the following steps:

  1. When it receives the first packet, the ALG creates bidirectional flows to accept forward and reverse UDP session traffic.
  2. If the session is idle for more than the maximum allowed idle time (the default is 30 seconds), the flows are deleted.
  3. ICMP errors are allowed only if there is a flow that matches the selector information specified in the ICMP data.

BOOTP

The Bootstrap Protocol (BOOTP) client retrieves its networking information from a server across the network. It sends out a general broadcast message to request the information, which is returned by the BOOTP server. For the protocol specification, see ftp://ftp.isi.edu/in-notes/rfc951.txt.

Stateful firewall support requires that you configure the BOOTP ALG on UDP server port 67 and client port 68. If the client sends a broadcast message, you should configure the broadcast address in the from statement of the service rule. Network Address Translation (NAT) is not performed on the BOOTP traffic, even if the NAT rule matches the traffic. If the BOOTP relay feature is activated on the router, the remote BOOTP server is assumed to assign addresses for clients masked by NAT translation.

DCE RPC Services

Distributed Computing Environment (DCE) Remote Procedure Call (RPC) services are mainly used by Microsoft applications. The ALG uses well-known TCP port 135 for port mapping services, and uses the universal unique identifier (UUID) instead of the program number to identify protocols. The main application-based DCE RPC is the Microsoft Exchange Protocol.

Support for stateful firewall and NAT services requires that you configure the DCE RPC portmap ALG on TCP port 135. The DCE RPC ALG uses the TCP protocol with application-specific UUIDs.

DNS

The Domain Name Service (DNS) ALG handles data associated with locating and translating domain names into IP addresses. The ALG typically runs on port 53. The ALG monitors DNS query and reply packets and supports only UDP traffic. The ALG does not support payload translations. The DNS ALG will only close the session when a reply is received or an idle timeout is reached.

FTP

FTP is the File Transfer Protocol, specified in RFC 959. In addition to the main control connection, data connections are also made for any data transfer between the client and the server; and the host, port, and direction are negotiated through the control channel.

For non-passive-mode FTP, the Junos OS stateful firewall service scans the client-to-server application data for the PORT command, which provides the IP address and port number to which the server connects. For passive-mode FTP, the Junos OS stateful firewall service scans the client-to-server application data for the PASV command and then scans the server-to-client responses for the 227 response, which contains the IP address and port number to which the client connects.

There is an additional complication: FTP represents these addresses and port numbers in ASCII. As a result, when addresses and ports are rewritten, the TCP sequence number might be changed, and thereafter the NAT service needs to maintain this delta in SEQ and ACK numbers by performing sequence NAT on all subsequent packets.

Support for stateful firewall and NAT services requires that you configure the FTP ALG on TCP port 21 to enable the FTP control protocol. The ALG performs the following tasks:

  • Automatically allocates data ports and firewall permissions for dynamic data connection
  • Creates flows for the dynamically negotiated data connection
  • Monitors the control connection in both active and passive modes
  • Rewrites the control packets with the appropriate NAT address and port information

H323

H323 is a suite of ITU protocols for audio and video conferencing and collaboration applications. H323 consists of H.225 call signaling protocols and H.245 control protocol for media communication. During H.225 negotiation, the endpoints create a call by exchanging call signaling messages on the control channel and negotiate a new control channel for H.245. A new control connection is created for H.245 messages. Messages are exchanged on the H.245 control channel to open media channels.

Stateful firewall monitors the H.225 control channel to open the H.245 control channel. After the H.245 channel is created, stateful firewall also monitors this channel for media channel information and allows the media traffic throught the firewall.

H323 ALG supports static destination, static and dynamic source NAT by rewriting the appropriate addresses and ports in the H.225 and H.245 messages.

ICMP

The Internet Control Message Protocol (ICMP) is defined in RFC 792. The Junos OS stateful firewall service allows ICMP messages to be filtered by specific type or specific type code value. ICMP error packets that lack a specifically configured type and code are matched against any existing flow in the opposite direction to check for the legitimacy of the error packet. ICMP error packets that pass the filter matching are subject to NAT translation.

The ICMP ALG always tracks ping traffic statefully using the ICMP sequence number. Each echo reply is forwarded only if there is an echo request with the corresponding sequence number. For any ping flow, only 20 echo requests can be forwarded without receiving an echo reply. When you configure dynamic NAT, the PING packet identifier is translated to allow additional hosts in the NAT pool to use the same identifier.

Support for stateful firewall and NAT services requires that you configure the ICMP ALG if the protocol is needed. You can configure the ICMP type and code for additional filtering.

IIOP

The Oracle Application Server NameServer Internet Inter-ORB Protocol (IIOP). This ALG is used in Common Object Request Broker Architecture (CORBA) based on distributed computing. Even though CORBA and IIOP are Object Management Group (OMG) standards, there is no fixed port assigned for IIOP. Each vendor implementing CORBA chooses a port. Java Virtual machine uses port 1975 by default, while ORBIX uses port 3075 as a default.

Stateful firewall and NAT require ALG IIOP be configured for TCP port 1975 for Java VM IIOP, and 3075 for CORBA applications ORBIX, a CORBA framework from Iona Technologies.

IP

NetBIOS

A NetBIOS ALG translates NetBIOS IP addresses and port numbers when NAT is used.

NetBIOS supports the TCP and UDP transport protocols. Support for stateful firewall and NAT services requires that you configure the NetBIOS ALG on UDP port 138 and TCP port 139.

NetShow

The Microsoft protocol ms-streaming is used by NetShow, the Microsoft media server. This protocol supports several transport protocols: TCP, UDP, and HTTP. The client starts a TCP connection on port 1755 and sends the PORT command to the server. The server then starts UDP on that port to the client. Support for stateful firewall and NAT services requires that you configure the NetShow ALG on UDP port 1755.

ONC RPC Services

Open Networks Computing (ONC) RPC services function similarly to DCE RCP services. However, the ONC RPC ALG uses TCP/UDP port 111 for port mapping services, and uses the program number to identify protocols rather than the UUID.

Support for stateful firewall and NAT services requires that you configure the ONC RPC portmap ALG on TCP port 111. The ONC RPC ALG uses the TCP protocol with application-specific program numbers.

PPTP

The Point-to-Point Tunneling Protocol (PPTP) ALG is a TCP-based ALG. PPTP allows the Point-to-Point Protocol (PPP) to be tunneled through an IP network. PPTP defines a client-server architecture, a PPTP Network Server, and a PPTP Access Concentrator. The PPTP ALG requires a control connection and a data tunnel. The control connection uses TCP to establish and disconnect PPP sessions, and runs on port 1723. The data tunnel carries PPP traffic in generic routing encapsulated (GRE) packets that are carried over IP.

RealAudio

Real Networks PNA protocol RealVideo is not a separate service. It is part of the RealPlayer and most likely uses another channel for video. The RealPlayer versions G2, 7, and 8 use PNA and RTSP. For this version to work, the ALG must allow both PNA(7070) and RTSP(554). For the media, the server selects from a range of UDP ports(6970 through 7170), or TCP port 7071, or HTTP. The client can be configured to use a particular port. The RealPlayer versions 4.0 and 5.0 use control channel 7070 media UDP ports 6970 through 7170, or TCP port 7071, or HTTP. RealAudio player version 3.0 uses control channel 7070 media, UDP ports 6770-7170, or TCP port 7071.

Real products use the ports and ranges of ports shown in Table 2.

Table 2: RealAudio Product Port Usage

Real Product

Port Usage

4.0 and 5.0 Servers/Players

Control channel (bidirectional) on TCP port 7070. Data channel from server to player on TCP port 7070 or UDP port 6970-7170.

4.0 and 5.0 Servers/Encoders

Control channel (bidirectional) on TCP port 7070. Data channel from encoder or server on TCP port 7070.

G2 Servers/Players

Control channel (bidirectional) on TCP port 80, 554, 7070, or 8080. Data channel from server to player on TCP port 80, 554, 7070, 8080 or UDP port 6970-32,000.

G2 Server/3.1, and 5.x Encoders

Control channel (bidirectional) on TCP port 7070. Data channel from encoder to server on TCP port 7070.

G2 Server/G2 Producer

Control channel (bidirectional) on TCP port 4040. Data channel from encoder to server on TCP port 4040 and UDP port 6970-32,000.

2 Server/G2 Producer (TCP ONLY)

Control channel (bidirectional) on TCP port 4040 Data channel from encoder to server on TCP port 4040. Note: TCP-ONLY option available in version 6.1 or above.

Note: RealAudio was the original protocol by RealPlayers. Newer versions of RealPlayer use RTSP. Stateful firewall and NAT require ALG RealAudio to be programmed on TCP port 7070.

Sun RPC and RPC Portmap Services

The Remote Procedure Call (RPC) ALG uses well-known ports TCP 111 and UDP 111 for port mapping, which dynamically assigns and opens ports for RPC services. The RPC Portmap ALG keeps track of port requests and dynamically opens the firewall for these requested ports. The RPC ALG can further restrict the RPC protocol by specifying allowed program numbers.

The ALG includes the RPC services listed in Table 3.

Table 3: Supported RPC Services

Name

Description

Comments

rpc-mountd

Network File Server (NFS) mount daemon; for details, see the UNIX man page for rpc.mountd(8).

The base support is RPC v2 and the port mapper service on port 111 (see RFC 1050).

rpc-nfsprog

Used as part of NFS. For details, see RFC 1094. See also RFC1813 for NFS v3.

The base support is RPC v2 and the port mapper service on port 111 (see RFC 1050).

rpc-nisplus

Network Information Service Plus (NIS+), designed to replace NIS; it is a default naming service for Sun Solaris and is not related to the old NIS. No protocol information is available.

The base support is RPC v2 and the port mapper service on port 111 (see RFC 1050).

rpc-nlockmgr

Network lock manager.

The base support is RPC v2 and the port mapper service on port 111 (see RFC 1050). Once the RPC program table is built, rpc-nlockmgr service can be allowed or blocked based on RPC program 100021.

rpc-pcnfsd

Kernel statistics server. For details, see the UNIX man pages for rstatd and rpc.rstatd.

The base support is RPC v2 and the port mapper service on port 111 (see RFC 1050). Once the RPC program table is built, rpc-rstat service can be allowed or blocked based on RPC program 150001.

rpc-rwall

Used to write a message to users; for details, see the UNIX man page for rpc.rwalld.

The base support is RPC v2 and the port mapper service on port 111 (see RFC 1050). Once the RPC program table is built, rpc-rwall service can be allowed or blocked based on RPC program 150008.

rpc-ypbind

NIS binding process. For details, see the UNIX man page for ypbind.

The base support is RPC v2 and the port mapper service on port 111 (see RFC 1050). Once the RPC program table is built, rpc-ypbind service can be allowed or blocked based on RPC program 100007.

rpc-yppasswd

NIS password server. For details, see the UNIX man page for yppasswd.

The base support is RPC v2 and the port mapper service on port 111 (see RFC 1050). Once the RPC program table is built, rpc-yppasswd service can be allowed or blocked based on RPC program 100009.

rpc-ypserv

NIS server. For details, see the UNIX man page for ypserv.

The base support is RPC v2 and the port mapper service on port 111 (see RFC 1050). Once the RPC program table is built, rpc-ypserv service can be allowed or blocked based on RPC program 100004.

rpc-ypupdated

Network updating tool.

The base support is RPC v2 and the port mapper service on port 111 (see RFC 1050). Once the RPC program table is built, rpc-ypupdated service can be allowed or blocked based on RPC program 100028.

rpc-ypxfrd

NIS map transfer server. For details, see the UNIX man page for rpc.ypxfrd.

The base support is RPC v2 and the port mapper service on port 111 (see RFC 1050). Once the RPC program table is built, rpc-ypxfrd service can be allowed or blocked based on RPC program 100069.

Support for stateful firewall and NAT services that use port mapping requires that you configure the RPC portmap ALG on TCP/UDP destination port 111 and the RPC ALG for both TCP and UDP. You can specify one or more rpc-program-number values to further restrict allowed RPC protocols.

RTSP

The Real-Time Streaming Protocol (RTSP) controls the delivery of data with real-time properties such as audio and video. The streams controlled by RTSP can use RTP, but it is not required. Media can be transmitted on the same RTSP control stream. This is an HTTP-like text-based protocol, but client and server maintain session information. A session is established using the SETUP message and terminated using the TEARDOWN message. The transport (the media protocol, address, and port numbers) is negotiated in the setup and the setup-response.

Support for stateful firewall and NAT services requires that you configure the RTSP ALG for TCP port 554.

The ALG monitors the control connection, opens flows dynamically for media (RTP/RTSP) streams, and performs NAT address and port rewrites.

SIP

The Session Initiation Protocol (SIP) is an application layer protocol that can establish, maintain, and terminate media sessions. It is a widely used voice over IP (VoIP) signaling protocol. The SIP ALG monitors SIP traffic and dynamically creates and manages pinholes on the signaling and media paths. The ALG only allows packets with the correct permissions. The SIP ALG also performs the following functions:

  • Manages parent-child session relationships.
  • Enforces security policies.
  • Manages pinholes for VoIP traffic.

Starting with Junos OS Release 11.4, the SIP ALG supports Network Address Translation (NAT) and stateful firewall configuration on JSF. The SIP ALG supports the following features:

  • Stateful firewall
  • Static source NAT
  • Dynamic address only source NAT
  • Network Address Port Translation (NAPT)

Note: The SIP ALG does not support destination NAT, class of service (CoS), multicast, or IP version 6 (IPv6).

At present, the SIP ALG does not support the following features:

  • Encryption and authentication of SIP messages
  • Transport of SIP messages over TCP

SNMP

SNMP is a communication protocol for managing TCP/IP networks, including both individual network devices and aggregated devices. The protocol is defined by RFC 1157. SNMP runs on top of UDP.

The Junos OS stateful firewall service implements the SNMP ALG to inspect the SNMP type. SNMP does not enforce stateful flow. Each SNMP type needs to be specifically enabled. Full SNMP support of stateful firewall services requires that you configure the SNMP ALG on UDP port 161. This enables the SNMP get and get-next commands, as well as their response traffic in the reverse direction: UDP port 161 enables the SNMP get-response command. If SNMP traps are permitted, you can configure them on UDP port 162, enabling the SNMP trap command.

SQLNet

The SQLNet protocol is used by Oracle SQL servers to execute SQL commands from clients, including load balancing and application-specific services.

Support of stateful firewall and NAT services requires that you configure the SQLNet ALG for TCP port 1521.

The ALG monitors the control packets, opens flows dynamically for data traffic, and performs NAT address and port rewrites.

TFTP

The Trivial File Transfer Protocol (TFTP) is specified in RFC 1350. The initial TFTP requests are sent to UDP destination port 69. Additional flows can be created to get or put individual files. Support of stateful firewall and NAT services requires that you configure the TFTP ALG for UDP destination port 69.

Traceroute

Traceroute is a tool for displaying the route that packets take to a network host. It uses the IP time-to-live (TTL) field to trigger ICMP time-exceeded messages from routers or gateways. It sends UDP datagrams to destination ports that are believed to be not in use; destination ports are numbered using the formula: + nhops – 1. The default base port is 33434. To support traceroute through the firewall, two types of traffic must be passed through:

  1. UDP probe packets (UDP destination port > 33000, IP TTL < 30)
  2. ICMP response packets (ICMP type time-exceeded)

When NAT is applied, the IP address and port within the ICMP error packet also must be changed.

Support of stateful firewall and NAT services requires you to configure the Traceroute ALG for UDP destination port 33434 to 33450. In addition, you can configure the TTL threshold to prevent UDP flood attacks with large TTL values.

UNIX Remote-Shell Services

Three protocols form the basis for UNIX remote-shell services:

  • Exec—Remote command execution; enables a user on the client system to execute a command on the remote system. The first command from client (rcmd) to server (rshd) uses well-known TCP port 512. A second TCP connection can be opened at the request of rcmd. The client port number for the second connection is sent to the server as an ASCII string.
  • Login—Better known as rlogin; uses well-known TCP port 513. For details, see RFC 1282. No special firewall processing is required.
  • Shell—Remote command execution; enables a user on the client system to execute a command on the remote system. The first command from client (rcmd) to server (rshd) uses well-known TCP port 514. A second TCP connection can be opened at the request of rcmd. The client port number for the second connection is sent to the server as an ASCII string.

Support of stateful firewall services requires that you configure the Exec ALG on TCP port 512, the Login ALG on TCP port 513, and the Shell ALG on TCP port 514. NAT remote-shell services require that any dynamic source port assigned be within the port range 512 to 1023. If you configure a NAT pool, this port range is reserved exclusively for remote shell applications.

Winframe

WinFrame application server software provides access to virtually any Windows application, across any type of network connection to any type of client.

This protocol is mainly used by Citrix Windows applications.

Stateful firewall and NAT require the ALG Winframe to be configured on TCP destination port 1494 and UDP port 1604.

Juniper Networks Defaults

applications {## File Transfer Protocol#application junos-ftp {application-protocol ftp;protocol tcp;destination-port 21;}## Trivial File Transfer Protocol#application junos-tftp {application-protocol tftp;protocol udp;destination-port 69;}## RPC portmapper on TCP#application junos-rpc-portmap-tcp {application-protocol rpc-portmap;protocol tcp;destination-port 111;}## RPC portmapper on UDP#application junos-rpc-portmap-udp {application-protocol rpc-portmap;protocol udp;destination-port 111;}## SNMP get#application junos-snmp-get {application-protocol snmp;protocol udp;destination-port 161;snmp-command get;}## SNMP get next#application junos-snmp-get-next {application-protocol snmp;protocol udp;destination-port 161;snmp-command get-next;}## SNMP response#application junos-snmp-response {application-protocol snmp;protocol udp;source-port 161;snmp-command get-response;}## SNMP trap#application junos-snmp-trap {application-protocol snmp;protocol udp;destination-port 162;snmp-command trap;}## remote exec#application junos-rexec {application-protocol exec;protocol tcp;destination-port 512;}## remote login#application junos-rlogin {application-protocol shell;protocol tcp;destination-port 513;}## remote shell#application junos-rsh {application-protocol shell;protocol tcp;destination-port 514;}## Real Time Streaming Protocol#application junos-rtsp {application-protocol rtsp;protocol tcp;destination-port 554;}## Citrix windows application server protocol# windows applications remotely on windows/non-windows clients## citrix needs udp 1604 to be open#application junos-citrix-winframe {application-protocol winframe;protocol tcp;destination-port 1494;}application junos-citrix-winframe-udp {protocol udp;destination-port 1604;}## Oracle SQL servers use this protocol to execute sql commands# from clients, load balance, use application-specific servers, etc#application junos-sqlnet {application-protocol sqlnet;protocol tcp;destination-port 1521;}## H.323 Protocol for audio/video conferencing#application junos-h323 {application-protocol h323;protocol tcp;destination-port 1720;}## Internet Inter-ORB Protocol - used for CORBA applications# The ORB protocol in Java virtual machines uses port 1975 as default#application junos-iiop-java {application-protocol iiop;protocol tcp;destination-port 1975;}## Internet Inter-ORB Protocol - used for CORBA applications# ORBIX is a CORBA framework from Iona Technologies that uses port# 3075 as default#application junos-iiop-orbix {application-protocol iiop;protocol tcp;destination-port 3075;}## Real players use this protocol for real time streaming# This was the original protocol for real players.# RTSP is more widely used by real players# but they still support realaudio.#application junos-realaudio {application-protocol realaudio;protocol tcp;destination-port 7070;}## traceroute application.#application junos-traceroute {application-protocol traceroute;protocol udp;destination-port 33435-33450;ttl-threshold 30;}## The full range of known RPC programs using UDP# The program numbers can be more specific to certain applications.#application junos-rpc-services-udp {application-protocol rpc;protocol udp;rpc-program-number 100000-400000;}## The full range of known RPC programs using TCP# The program numbers can be more specific to certain applications.#application junos-rpc-services-tcp {application-protocol rpc;protocol tcp;rpc-program-number 100000-400000;}## All ICMP traffic# This can be made to be more restrictive by specifying ICMP type# and code.#application junos-icmp-all {application-protocol icmp;}## Protocol used by Windows media server and windows media player#application junos-netshow {application-protocol netshow;protocol tcp;destination-port 1755;}## NetBIOS - networking protocol used on# Windows networks name service port, both UDP and TCP#application junos-netbios-name-udp {application-protocol netbios;protocol udp;destination-port 137;}application junos-netbios-name-tcp {protocol tcp;destination-port 137;}## NetBIOS - networking protocol used on# Windows networks datagram service port#application junos-netbios-datagram {application-protocol netbios;protocol udp;destination-port 138;}## NetBIOS - networking protocol used on# Windows networks session service port#application junos-netbios-session {protocol tcp;destination-port 139;}## DCE-RPC portmapper on TCP#application junos-dce-rpc-portmap {application-protocol dce-rpc-portmap;protocol tcp;destination-port 135;}## DCE-RPC application on TCP sample UUID# This application requires user to specify the UUID value## application junos-dcerpc {# application-protocol dce-rpc;# protocol tcp;## # UUID also needs to be defined as shown below# UUID 11223344 22334455 33445566 44556677;## }## ms-exchange needs these 3 UUIDs#application junos-dcerpc-endpoint-mapper-service {application-protocol dce-rpc;protocol tcp;uuid e1af8308-5d1f-11c9-91a4-08002b14a0fa;}application junos-dcerpc-msexchange-directory-rfr {application-protocol dce-rpc;protocol tcp;uuid 1544f5e0-613c-11d1-93df-00c04fd7bd09;}application junos-dcerpc-msexchange-information-store {application-protocol dce-rpc;protocol tcp;uuid a4f1db00-ca47-1067-b31f-00dd010662da;}application junos-ssh {protocol tcp;destination-port 22;}application junos-telnet {protocol tcp;destination-port 23;}application junos-smtp {protocol tcp;destination-port 25;}application junos-dns-udp {protocol udp;destination-port 53;}application junos-dns-tcp {protocol tcp;destination-port 53;}application junos-tacacs {protocol tcp;destination-port 49;}# TACACS Database Serviceapplication junos-tacacs-ds {protocol tcp;destination-port 65;}application junos-dhcp-client {protocol udp;destination-port 68;}application junos-dhcp-server {protocol udp;destination-port 67;}application junos-bootpc {protocol udp;destination-port 68;}application junos-bootps {protocol udp;destination-port 67;}application junos-finger {protocol tcp;destination-port 79;}application junos-http {protocol tcp;destination-port 80;}application junos-https {protocol tcp;destination-port 443;}application junos-pop3 {protocol tcp;destination-port 110;}application junos-ident {protocol tcp;destination-port 113;}application junos-nntp {protocol tcp;destination-port 119;}application junos-ntp {protocol udp;destination-port 123;}application junos-imap {protocol tcp;destination-port 143;}application junos-imaps {protocol tcp;destination-port 993;}application junos-bgp {protocol tcp;destination-port 179;}application junos-ldap {protocol tcp;destination-port 389;}application junos-snpp {protocol tcp;destination-port 444;}application junos-biff {protocol udp;destination-port 512;}# UNIX whoapplication junos-who {protocol udp;destination-port 513;}application junos-syslog {protocol udp;destination-port 514;}# line printer daemon, printer, spoolerapplication junos-printer {protocol tcp;destination-port 515;}# UNIX talkapplication junos-talk-tcp {protocol tcp;destination-port 517;}application junos-talk-udp {protocol udp;destination-port 517;}application junos-ntalk {protocol udp;destination-port 518;}application junos-rip {protocol udp;destination-port 520;}# INA sanctioned RADIUS port numbersapplication junos-radius {protocol udp;destination-port 1812;}application junos-radacct {protocol udp;destination-port 1813;}application junos-nfsd-tcp {protocol tcp;destination-port 2049;}application junos-nfsd-udp {protocol udp;destination-port 2049;}application junos-cvspserver {protocol tcp;destination-port 2401;}## Label Distribution Protocol#application junos-ldp-tcp {protocol tcp;destination-port 646;}application junos-ldp-udp {protocol udp;destination-port 646;}## JUNOScript and JUNOScope management#application junos-xnm-ssl {protocol tcp;destination-port 3220;}application junos-xnm-clear-text {protocol tcp;destination-port 3221;}## IPsec tunnel#application junos-ipsec-esp {protocol esp;}application junos-ike {protocol udp;destination-port 500;}## 'junos-algs-outbound' defines a set of all applications# requiring an ALG. Useful for defining rule to the the public# internet allowing private network users to use all JUNOS OS# supported ALGs initiated from the private network.## NOTE: the contents of this set might grow in future JUNOS OS versions.#application-set junos-algs-outbound {application junos-ftp;application junos-tftp;application junos-rpc-portmap-tcp;application junos-rpc-portmap-udp;application junos-snmp-get;application junos-snmp-get-next;application junos-snmp-response;application junos-snmp-trap;application junos-rexec;application junos-rlogin;application junos-rsh;application junos-rtsp;application junos-citrix-winframe;application junos-citrix-winframe-udp;application junos-sqlnet;application junos-h323;application junos-iiop-java;application junos-iiop-orbix;application junos-realaudio;application junos-traceroute;application junos-rpc-services-udp;application junos-rpc-services-tcp;application junos-icmp-all;application junos-netshow;application junos-netbios-name-udp;application junos-netbios-datagram;application junos-dcerpc-endpoint-mapper-service;application junos-dcerpc-msexchange-directory-rfr;application junos-dcerpc-msexchange-information-store;}## 'junos-management-inbound' represents the group of applications# that might need access the router from public network for# for management purposes.## Set is intended for a UI to display management choices.## NOTE: It is not recommended the user to use the entire set# directly in a firewall rule and open up firewall to all# of these applications. Also, the user should always# specify the source and destination prefixes when using# each application.## NOTE: the contents of this set may grow in future JUNOS versions.#application-set junos-management-inbound {application junos-snmp-get;application junos-snmp-get-next;application junos-snmp-response;application junos-snmp-trap;application junos-ssh;application junos-telnet;application junos-http;application junos-https;application junos-xnm-ssl;application junos-xnm-clear-text;}## 'junos-routing-inbound' represents routing protocols that might# need to access the router from public network.## Set is intended for a UI to display routing involvement choices.## NOTE: It is not recommended the user to use the entire set# directly in a firewall rule and open up firewall to all# of these applications. Also, the user should always# specify the source and destination prefixes when using# each application.## NOTE: the contents of this set might grow in future JUNOS OS versions.#application-set junos-routing-inbound {application junos-bgp;application junos-rip;application junos-ldp-tcp;application junos-ldp-udp;}}

Published: 2013-02-15

Published: 2013-02-15