I need to allow OPC DA, OPC HDA, OPC A&E which is based on Windows DCOM, through SRX320 Junos firewalls.
Is it fully supported on Juniper firewall? How can I define access rules?
DCOM uses MS-RPC and you can allow it by configuring your security-policies with one of the predefined MS-RPC applications like junos-ms-rpc-tcp or junos-ms-rpc-any. In order to permit MS-RPC communications, the SRX leverages its MS-RPC ALG; you can find more information on the following document:
Here I attach another document that will help you in case the SRX doesnt recognized the UUIDs used by the hosts in your network:
I hope this helps.
There is no information on OPC Data Access, OPC Histoical Data Access, OPC Alarm&Events, these protocols are used in industrial environment for data exchange.
Maybe I need to allow the following services to work
But in this case I am not sure how many ports it will keep open between clients and servers. Appreciate if you could share more info if available.
As you already stated, those standards use DCOM to transport data and this can also be confirmed in the following link:
"Similar to the OPC Data Access specification, OPC Historical Data Access also uses Microsoft's DCOM to transport data"
Also I explained that DCOM uses MS-RPC to transfer data between hosts, so at the end what we care about is to allow MS-RPC traffic across the SRX. Here I attach a small explanation about MS-RPC
"MS-RPC is used by windows devices to communicate processes running on different devices; these remote processes are identified by UUIDs.
The device acting as the client will first establish a connection via port 135 and will ask for the dynamic port on which a specific service (UUID) is listening on the remote end. The device acting as the server will provide this information and the client will open a new session on that dynamic port (a high random port). Ideally we dont configure security-policies that permit traffic on all ports so when you reference the ms-rpc application on a security-policy it only permits port 135 and the SRX listens to the communications between the client the server in order to determine what is the high random port that will be used next, and the SRX allows communications from the client on that port only, blocking traffic on any other non-negotiated port. Thats pretty much the funtionality of the MS-RPC ALG. However is very common that from specific zones we dont need that much of security and sometimes we can have a security-policy allowing all the traffic from a specific zone to another zone."
In summary, the MS-RPC ALG will be listening to comunications on port 135 (known as EPM) and will be in charge of dynamically allow only the ports that were negotiated between the client and the server devices.
To conclude, if I allow the following services, OPC application should work right?