SRX

 View Only
last person joined: 3 days ago 

Ask questions and share experiences about the SRX Series, vSRX, and cSRX.
  • 1.  Deauthentication, reauthenticatio, authentication

    Posted 06-27-2025 22:25

    I'm wondering about the other parts of authentication. More specifically, deauthentication. I realize it must be an inherent part of authentication but I want to know if it is part of the command structure in the SRX series. Any and all commands can be discussed here. Maybe even parts where other commands might use this method. SYN is a part of this, but who knows exactly.



    ------------------------------
    Adrian Aguinaga
    B.S.C.M. I.T.T. Tech
    (Construction Management)
    A.A.S. I.T.T. Tech
    (Drafting & Design)
    ------------------------------



  • 2.  RE: Deauthentication, reauthenticatio, authentication

    Posted 08-09-2025 20:53

    Reviving post.



    ------------------------------
    Adrian Aguinaga
    B.S.C.M. I.T.T. Tech
    (Construction Management)
    A.A.S. I.T.T. Tech
    (Drafting & Design)
    ------------------------------



  • 3.  RE: Deauthentication, reauthenticatio, authentication

    Posted 08-24-2025 20:24

    Reviving post!



    ------------------------------
    Adrian Aguinaga
    B.S.C.M. I.T.T. Tech
    (Construction Management)
    A.A.S. I.T.T. Tech
    (Drafting & Design)
    ------------------------------



  • 4.  RE: Deauthentication, reauthenticatio, authentication

    Posted 08-26-2025 10:33

    Is this a follow-up post from another question?   I haven't seen another question, so this post needs more info to be answered.   What authentication process are you asking about?  Local users? VPNs?  



    ------------------------------
    JOHN WILLIAMSON
    ------------------------------



  • 5.  RE: Deauthentication, reauthenticatio, authentication

    Posted 08-28-2025 04:16

    I'm referring to "basic" authentication. It is the way all networking authenticates other parts of the whole network. This includes applications and pc's etc. Dot1x, radius, etc. Deauthentication is necessary because if you authenticate a part of the network, it must have a way to undo this. I'm interested in realm authentication and the possibility of undoing thus. Deauthentication. But other examples are great too. Thx for your replies.



    ------------------------------
    Adrian Aguinaga
    B.S.C.M. I.T.T. Tech
    (Construction Management)
    A.A.S. I.T.T. Tech
    (Drafting & Design)
    ------------------------------



  • 6.  RE: Deauthentication, reauthenticatio, authentication

    Posted 08-28-2025 10:15

    That's stuff like this:

    https://www.juniper.net/documentation/us/en/software/junos/user-access/topics/example/802-1x-pnac-single-supplicant-multiple-supplicant-configuring.html

    You may have  better luck in the EX community rather than SRX.



    ------------------------------
    Nikolay Semov
    ------------------------------



  • 7.  RE: Deauthentication, reauthenticatio, authentication

    Posted 08-28-2025 21:33

    Thank you Nik, I value your info. I want gateway stuff. This is because my network

    is isp and other types specific. EX would mean another empty switch right after the srx. This great but the authentication must be at the border gateway(srx300).

    Topology=

    isp(arris gateway)->srx300->wifi ap's->

    media bridge-->engineering area(switches)->etc.



    ------------------------------
    Adrian Aguinaga
    B.S.C.M. I.T.T. Tech
    (Construction Management)
    A.A.S. I.T.T. Tech
    (Drafting & Design)
    ------------------------------