{"id":460,"date":"2015-12-30T10:31:29","date_gmt":"2015-12-30T10:31:29","guid":{"rendered":"http:\/\/www.safekom.pl\/blog\/?p=460"},"modified":"2015-12-30T10:42:22","modified_gmt":"2015-12-30T10:42:22","slug":"juniper-ograniczenie-dostepu-do-managmentu","status":"publish","type":"post","link":"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/","title":{"rendered":"Juniper &#8211; ograniczenie dost\u0119pu do managmentu"},"content":{"rendered":"<p>Poni\u017cej przedstawiam jak ograniczy\u0107 dost\u0119p dla wybranej listy sieci oraz host\u00f3w do ssh i https dla urz\u0105dze\u0144 Juniper.<\/p>\n<ol>\n<li>Definiujemy grup\u0119 kt\u00f3ra b\u0119dzie mia\u0142a dost\u0119p do ssh i https\n<pre class=\"lang:sh decode:true\">set policy-options prefix-list management-hosts 10.0.0.0\/8 \r\nset policy-options prefix-list management-hosts 172.16.0.0\/12 \r\nset policy-options prefix-list management-hosts sie\u0107_public\/24<\/pre>\n<\/li>\n<li>Definiujemy filtr\u00a0kt\u00f3ry blokuje dost\u0119p do ssh oraz https z wykluczeniem grup management-hosts\n<pre class=\"lang:sh decode:true\">set firewall family inet filter filter-management term block_unauthorised from source-address 0.0.0.0\/0 \r\nset firewall family inet filter filter-management term block_unauthorised from source-prefix-list management-hosts except                           \r\nset firewall family inet filter filter-management term block_unauthorised from protocol tcp \r\nset firewall family inet filter filter-management term block_unauthorised from destination-port ssh \r\nset firewall family inet filter filter-management term block_unauthorised from destination-port https \r\nset firewall family inet filter filter-management term block_unauthorised then discard \r\nset firewall family inet filter filter-management term accept_default then accept<\/pre>\n<\/li>\n<li>\u00a0 Przypinamy filtr do interfejsu loopback 0\n<pre class=\"lang:sh decode:true \">set interfaces lo0 unit 0 family inet filter input filter-management<\/pre>\n<p>Po tym zabiegu mamy ograniczony dost\u0119p do urz\u0105dzenia. W kolejnym wpisie przedstawi\u0119 jak <a href=\"http:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-ike\/\">ograniczy\u0107 dost\u0119p do us\u0142ugi IKE<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Poni\u017cej przedstawiam jak ograniczy\u0107 dost\u0119p dla wybranej listy sieci oraz host\u00f3w do ssh i https dla urz\u0105dze\u0144 Juniper. Definiujemy grup\u0119 kt\u00f3ra b\u0119dzie mia\u0142a dost\u0119p do ssh i https set policy-options prefix-list management-hosts 10.0.0.0\/8 set policy-options prefix-list management-hosts 172.16.0.0\/12 set policy-options prefix-list management-hosts sie\u0107_public\/24 Definiujemy filtr\u00a0kt\u00f3ry blokuje dost\u0119p do ssh oraz https z wykluczeniem grup management-hosts [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":463,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"enabled":false},"version":2}},"categories":[5],"tags":[69,120,124,70,73,122,75,121,123],"class_list":["post-460","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-juniper","tag-ex","tag-filter","tag-filtr","tag-juniper","tag-junos","tag-lo0","tag-srx","tag-ssh","tag-term"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Juniper - ograniczenie dost\u0119pu do managmentu - SafeKom Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Juniper - ograniczenie dost\u0119pu do managmentu - SafeKom Blog\" \/>\n<meta property=\"og:description\" content=\"Poni\u017cej przedstawiam jak ograniczy\u0107 dost\u0119p dla wybranej listy sieci oraz host\u00f3w do ssh i https dla urz\u0105dze\u0144 Juniper. Definiujemy grup\u0119 kt\u00f3ra b\u0119dzie mia\u0142a dost\u0119p do ssh i https set policy-options prefix-list management-hosts 10.0.0.0\/8 set policy-options prefix-list management-hosts 172.16.0.0\/12 set policy-options prefix-list management-hosts sie\u0107_public\/24 Definiujemy filtr\u00a0kt\u00f3ry blokuje dost\u0119p do ssh oraz https z wykluczeniem grup management-hosts [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/\" \/>\n<meta property=\"og:site_name\" content=\"SafeKom Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/safekompl\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-30T10:31:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-12-30T10:42:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/12\/Junos_sw_logo.jpg?fit=300%2C189&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"189\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Micha\u0142 Iwa\u0144czuk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@MIwaczuk\" \/>\n<meta name=\"twitter:site\" content=\"@MIwaczuk\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"Micha\u0142 Iwa\u0144czuk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuta\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/\"},\"author\":{\"name\":\"Micha\u0142 Iwa\u0144czuk\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/fd4cc931b624af4b7353d36d92ba7181\"},\"headline\":\"Juniper &#8211; ograniczenie dost\u0119pu do managmentu\",\"datePublished\":\"2015-12-30T10:31:29+00:00\",\"dateModified\":\"2015-12-30T10:42:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/\"},\"wordCount\":85,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/12\/Junos_sw_logo.jpg?fit=300%2C189&ssl=1\",\"keywords\":[\"EX\",\"filter\",\"filtr\",\"Juniper\",\"Junos\",\"lo0\",\"srx\",\"ssh\",\"term\"],\"articleSection\":[\"Juniper\"],\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/\",\"url\":\"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/\",\"name\":\"Juniper - ograniczenie dost\u0119pu do managmentu - SafeKom Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/12\/Junos_sw_logo.jpg?fit=300%2C189&ssl=1\",\"datePublished\":\"2015-12-30T10:31:29+00:00\",\"dateModified\":\"2015-12-30T10:42:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/12\/Junos_sw_logo.jpg?fit=300%2C189&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/12\/Junos_sw_logo.jpg?fit=300%2C189&ssl=1\",\"width\":300,\"height\":189},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.safekom.pl\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Juniper &#8211; ograniczenie dost\u0119pu do managmentu\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#website\",\"url\":\"https:\/\/www.safekom.pl\/blog\/\",\"name\":\"SafeKom Blog\",\"description\":\"Notatki Architekta i in\u017cyniera zwi\u0105zanego rozwi\u0105zaniami on-prem\",\"publisher\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.safekom.pl\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#organization\",\"name\":\"SafeKom Blog\",\"url\":\"https:\/\/www.safekom.pl\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/05\/cropped-logo.png?fit=512%2C512&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/05\/cropped-logo.png?fit=512%2C512&ssl=1\",\"width\":512,\"height\":512,\"caption\":\"SafeKom Blog\"},\"image\":{\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/safekompl\",\"https:\/\/x.com\/MIwaczuk\",\"https:\/\/www.linkedin.com\/in\/michaliwanczuk\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/fd4cc931b624af4b7353d36d92ba7181\",\"name\":\"Micha\u0142 Iwa\u0144czuk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g\",\"caption\":\"Micha\u0142 Iwa\u0144czuk\"},\"description\":\"Pasjonat komputerowy od zawsze oraz maniak w zakresie sieci, wirtualizacji oraz bezpiecze\u0144stwa IT. Kompetentny in\u017cynier z du\u017cym do\u015bwiadczeniem w realizacji projekt\u00f3w informatycznych i telekomunikacyjnych. Wieloletni administrator IT, kt\u00f3ry utrzymuje systemy informatyczne dostosowuj\u0105c je do wymog\u00f3w biznesowych z zapewnieniem dost\u0119pno\u015bci 24\/7\/365.\",\"url\":\"https:\/\/www.safekom.pl\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Juniper - ograniczenie dost\u0119pu do managmentu - SafeKom Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/","og_locale":"pl_PL","og_type":"article","og_title":"Juniper - ograniczenie dost\u0119pu do managmentu - SafeKom Blog","og_description":"Poni\u017cej przedstawiam jak ograniczy\u0107 dost\u0119p dla wybranej listy sieci oraz host\u00f3w do ssh i https dla urz\u0105dze\u0144 Juniper. Definiujemy grup\u0119 kt\u00f3ra b\u0119dzie mia\u0142a dost\u0119p do ssh i https set policy-options prefix-list management-hosts 10.0.0.0\/8 set policy-options prefix-list management-hosts 172.16.0.0\/12 set policy-options prefix-list management-hosts sie\u0107_public\/24 Definiujemy filtr\u00a0kt\u00f3ry blokuje dost\u0119p do ssh oraz https z wykluczeniem grup management-hosts [&hellip;]","og_url":"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/","og_site_name":"SafeKom Blog","article_publisher":"https:\/\/www.facebook.com\/safekompl","article_published_time":"2015-12-30T10:31:29+00:00","article_modified_time":"2015-12-30T10:42:22+00:00","og_image":[{"width":300,"height":189,"url":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/12\/Junos_sw_logo.jpg?fit=300%2C189&ssl=1","type":"image\/jpeg"}],"author":"Micha\u0142 Iwa\u0144czuk","twitter_card":"summary_large_image","twitter_creator":"@MIwaczuk","twitter_site":"@MIwaczuk","twitter_misc":{"Napisane przez":"Micha\u0142 Iwa\u0144czuk","Szacowany czas czytania":"1 minuta"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/#article","isPartOf":{"@id":"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/"},"author":{"name":"Micha\u0142 Iwa\u0144czuk","@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/fd4cc931b624af4b7353d36d92ba7181"},"headline":"Juniper &#8211; ograniczenie dost\u0119pu do managmentu","datePublished":"2015-12-30T10:31:29+00:00","dateModified":"2015-12-30T10:42:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/"},"wordCount":85,"commentCount":0,"publisher":{"@id":"https:\/\/www.safekom.pl\/blog\/#organization"},"image":{"@id":"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/12\/Junos_sw_logo.jpg?fit=300%2C189&ssl=1","keywords":["EX","filter","filtr","Juniper","Junos","lo0","srx","ssh","term"],"articleSection":["Juniper"],"inLanguage":"pl-PL","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/","url":"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/","name":"Juniper - ograniczenie dost\u0119pu do managmentu - SafeKom Blog","isPartOf":{"@id":"https:\/\/www.safekom.pl\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/#primaryimage"},"image":{"@id":"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/12\/Junos_sw_logo.jpg?fit=300%2C189&ssl=1","datePublished":"2015-12-30T10:31:29+00:00","dateModified":"2015-12-30T10:42:22+00:00","breadcrumb":{"@id":"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/#primaryimage","url":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/12\/Junos_sw_logo.jpg?fit=300%2C189&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/12\/Junos_sw_logo.jpg?fit=300%2C189&ssl=1","width":300,"height":189},{"@type":"BreadcrumbList","@id":"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-managmentu\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.safekom.pl\/blog\/"},{"@type":"ListItem","position":2,"name":"Juniper &#8211; ograniczenie dost\u0119pu do managmentu"}]},{"@type":"WebSite","@id":"https:\/\/www.safekom.pl\/blog\/#website","url":"https:\/\/www.safekom.pl\/blog\/","name":"SafeKom Blog","description":"Notatki Architekta i in\u017cyniera zwi\u0105zanego rozwi\u0105zaniami on-prem","publisher":{"@id":"https:\/\/www.safekom.pl\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.safekom.pl\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/www.safekom.pl\/blog\/#organization","name":"SafeKom Blog","url":"https:\/\/www.safekom.pl\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/05\/cropped-logo.png?fit=512%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/05\/cropped-logo.png?fit=512%2C512&ssl=1","width":512,"height":512,"caption":"SafeKom Blog"},"image":{"@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/safekompl","https:\/\/x.com\/MIwaczuk","https:\/\/www.linkedin.com\/in\/michaliwanczuk\/"]},{"@type":"Person","@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/fd4cc931b624af4b7353d36d92ba7181","name":"Micha\u0142 Iwa\u0144czuk","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/www.safekom.pl\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cc6dda4ee8d21d1f254147e5ee6f5e38881b88a4a12a5774ca42380597e52014?s=96&d=mm&r=g","caption":"Micha\u0142 Iwa\u0144czuk"},"description":"Pasjonat komputerowy od zawsze oraz maniak w zakresie sieci, wirtualizacji oraz bezpiecze\u0144stwa IT. Kompetentny in\u017cynier z du\u017cym do\u015bwiadczeniem w realizacji projekt\u00f3w informatycznych i telekomunikacyjnych. Wieloletni administrator IT, kt\u00f3ry utrzymuje systemy informatyczne dostosowuj\u0105c je do wymog\u00f3w biznesowych z zapewnieniem dost\u0119pno\u015bci 24\/7\/365.","url":"https:\/\/www.safekom.pl\/blog\/author\/admin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/12\/Junos_sw_logo.jpg?fit=300%2C189&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p7i9ri-7q","jetpack-related-posts":[{"id":465,"url":"https:\/\/www.safekom.pl\/blog\/juniper\/juniper-ograniczenie-dostepu-do-ike\/","url_meta":{"origin":460,"position":0},"title":"Juniper &#8211; Ograniczenie dost\u0119pu do IKE","author":"Micha\u0142 Iwa\u0144czuk","date":"30.12.2015","format":false,"excerpt":"Co zrobi\u0107 aby na urz\u0105dzeniu na kt\u00f3rym jest uruchomiona us\u0142uga IKE na skanach bezpiecze\u0144stwa nie pojawia\u0142o si\u0119 \u017ce jest w\u0142\u0105czony aggressive mode. Najszybciej b\u0119dzie za\u0142o\u017cenie filtru kt\u00f3ry b\u0119dzie nam dopuszcza\u0142 wybrane adresy peer\u00f3w do us\u0142ugi IKE i ESP Definiujemy grup\u0119 w kt\u00f3rej b\u0119dzie lista adres\u00f3w IP i sieci kt\u00f3re b\u0119d\u0105\u2026","rel":"","context":"In &quot;Juniper&quot;","block_context":{"text":"Juniper","link":"https:\/\/www.safekom.pl\/blog\/category\/juniper\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2657,"url":"https:\/\/www.safekom.pl\/blog\/vmware\/nsx\/nsx-t-evpn\/","url_meta":{"origin":460,"position":1},"title":"NSX-T EVPN","author":"Micha\u0142 Iwa\u0144czuk","date":"28.04.2020","format":false,"excerpt":"W poprzednim wpisie pokaza\u0142em jak skonfigurowa\u0107 DVS z NSX-t, dzi\u015b przedstawi\u0119 bardzo ciekaw\u0105 now\u0105 funkcjonalno\u015b\u0107 w NSX-T 3.0 jest to EVPN. W dokumentacji VMWare na czas pisania tego wpisu nie znalaz\u0142em za du\u017co informacji o konfiguracji, kt\u00f3r\u0105 poczyni\u0142em poni\u017cej. Mam nadziej\u0119, \u017ce przyda si\u0119 Wam ta wiedza. Co to jest\u2026","rel":"","context":"In &quot;Juniper&quot;","block_context":{"text":"Juniper","link":"https:\/\/www.safekom.pl\/blog\/category\/juniper\/"},"img":{"alt_text":"nsx-t logo","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2020\/04\/vmware-nsx-t.jpg?fit=551%2C218&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2020\/04\/vmware-nsx-t.jpg?fit=551%2C218&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2020\/04\/vmware-nsx-t.jpg?fit=551%2C218&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":739,"url":"https:\/\/www.safekom.pl\/blog\/juniper\/lab-juniper-vmx-15-1f4-pierwsze-uruchomienie\/","url_meta":{"origin":460,"position":2},"title":"Lab &#8211; Juniper vMX 15.1F4 pierwsze uruchomienie","author":"Micha\u0142 Iwa\u0144czuk","date":"12.04.2016","format":false,"excerpt":"Po d\u0142u\u017cszym czasie nie pracowania na Juniperach postanowi\u0142em do nich wr\u00f3ci\u0107, na warsztat wzi\u0105\u0142em nowe tw\u00f3r Juniper wirtualny router z serii MX. Na chwil\u0119 obecn\u0105 publicznie dost\u0119pna jest wersja\u00a015.1F4. Ze wzgl\u0119du na to, \u017ce Juniper na chwil\u0119 obecn\u0105 nie udost\u0119pnia plik\u00f3w OVA tylko gotowe dyski VMDK kt\u00f3re trzeba samemu pod\u0142\u0105czy\u0107\u2026","rel":"","context":"In &quot;Juniper&quot;","block_context":{"text":"Juniper","link":"https:\/\/www.safekom.pl\/blog\/category\/juniper\/"},"img":{"alt_text":"vmx","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/04\/vmx.png?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/04\/vmx.png?resize=350%2C200 1x, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/04\/vmx.png?resize=525%2C300 1.5x"},"classes":[]},{"id":610,"url":"https:\/\/www.safekom.pl\/blog\/cisco\/asav-pierwsze-uruchomienie-w-labie\/","url_meta":{"origin":460,"position":3},"title":"ASAv &#8211; pierwsze uruchomienie w labie","author":"Micha\u0142 Iwa\u0144czuk","date":"06.03.2016","format":false,"excerpt":"Pierwsze uruchomienie Cisco ASAv w Labie. Pokazuj\u0119 podstawow\u0105 konfiguracj\u0119 od importu po zalogowanie si\u0119 po ssh lub asdm.","rel":"","context":"In &quot;Cisco&quot;","block_context":{"text":"Cisco","link":"https:\/\/www.safekom.pl\/blog\/category\/cisco\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2015\/09\/cisco-logo.png?fit=400%2C300&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1107,"url":"https:\/\/www.safekom.pl\/blog\/juniper\/junos-jak-zabezpieczyc-konfiguracje\/","url_meta":{"origin":460,"position":4},"title":"Junos jak zabezpieczy\u0107 konfiguracj\u0119","author":"Micha\u0142 Iwa\u0144czuk","date":"06.08.2016","format":false,"excerpt":"Ostatnio du\u017co siedzia\u0142em na now\u0105 wersja SRX'a w wersji wirtualnej i odkry\u0142em mo\u017cliwo\u015b\u0107 blokowania konfiguracji poszczeg\u00f3lnych opcji, poni\u017cej przedstawi\u0119 jak zabezpieczy\u0107 jaki\u015b segment konfiguracji. Do zabezpieczenia konfiguracji s\u0142u\u017cy polecenie protect root# protect ? Possible completions: > access Network access configuration > access-profile Access profile for this instance > accounting-options Accounting\u2026","rel":"","context":"In &quot;Juniper&quot;","block_context":{"text":"Juniper","link":"https:\/\/www.safekom.pl\/blog\/category\/juniper\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":519,"url":"https:\/\/www.safekom.pl\/blog\/cisco\/lab-cisco-ise-aaa-dla-junipera\/","url_meta":{"origin":460,"position":5},"title":"Lab &#8211; Cisco ISE &#8211; AAA dla Junosa","author":"Micha\u0142 Iwa\u0144czuk","date":"09.02.2016","format":false,"excerpt":"W poprzednich wpisach opisa\u0142em jak zainstalowa\u0107 oraz jak pod\u0142\u0105czy\u0107 do AD ISE. Poni\u017cej opisz\u0119 jak wykorzysta\u0107 ISE jak radius kt\u00f3ry b\u0119dzie serwowa\u0107 u\u017cytkownik\u00f3w do logowania po ssh i www dla urz\u0105dze\u0144 Juniper pod systemem Junos. Jak centralne repozytorium u\u017cytkownik\u00f3w b\u0119dzie s\u0142u\u017cy\u0107 AD. Mam nadziej\u0119 \u017ce komu\u015b si\u0119 przyda. Bierzemy si\u0119\u2026","rel":"","context":"In &quot;Cisco&quot;","block_context":{"text":"Cisco","link":"https:\/\/www.safekom.pl\/blog\/category\/cisco\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/02\/Juniper-Networks-and-Cisco-Systems.png?fit=712%2C534&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/02\/Juniper-Networks-and-Cisco-Systems.png?fit=712%2C534&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/02\/Juniper-Networks-and-Cisco-Systems.png?fit=712%2C534&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.safekom.pl\/blog\/wp-content\/uploads\/2016\/02\/Juniper-Networks-and-Cisco-Systems.png?fit=712%2C534&ssl=1&resize=700%2C400 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/posts\/460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/comments?post=460"}],"version-history":[{"count":0,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/posts\/460\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/media\/463"}],"wp:attachment":[{"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/media?parent=460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/categories?post=460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.safekom.pl\/blog\/wp-json\/wp\/v2\/tags?post=460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}