Quantcast
Channel: All SRX Services Gateway posts
Viewing all 17645 articles
Browse latest View live

Re: SRX BGP/NAT question about putting another FW in the SRX's "outside"

$
0
0

That is pretty much it, your SRX will be the GW router for the other firewall. What i do suggest is rather use /31 or /30 of that publick block on the interface to the other FW therefore preserving the rest of the public which might be already NAT. You can also go as far as adding firewall filters with packetmode  so anything to and from the other firewall will be stateless through the SRX so it will become just a router.


Re: SRX210 Jweb interface page errors - Browser version?

$
0
0

Thanks, this displays on multiple pages within Jweb interface, not just maintain -> Software. just wanted to verify that all functionality of Jweb interface should be working if I see this error.

SRX4100 cluster commit fails with error: init: write failed: No space left on device error: commit failed: daemon file propagation failed

$
0
0

Oberseved issues:

  1. root@*******-SRX41-HA# commit
    error: init: write failed: No space left on device
    error: commit failed: daemon file propagation failed
  2. request system storage cleanup on both nodes does not clear issue.
  3. show system storage reveals that /dev/md1 320M 320M -25.5M 109% /mfs is over calpacity on Node0
    node0:
    --------------------------------------------------------------------------
    Filesystem Size Used Avail Capacity Mounted on
    /dev/vtbd0s1a 501M 361M 99M 78% /
    devfs 1.0K 1.0K 0B 100% /dev
    /dev/md0 1.0G 1.0G 0B 100% /junos
    /cf 501M 361M 99M 78% /junos/cf
    devfs 1.0K 1.0K 0B 100% /junos/dev/
    procfs 4.0K 4.0K 0B 100% /proc
    /dev/vtbd1s1e 1.6G 206K 1.4G 0% /config
    /dev/vtbd1s1f 14G 270M 13G 2% /var
    /dev/vtbd3s2 91M 940K 90M 1% /var/host
    /dev/md1 320M 320M -25.5M 109% /mfs
    /var/jail 14G 270M 13G 2% /jail/var
    /var/jails/rest-api 14G 270M 13G 2% /web-api/var
    /var/log 14G 270M 13G 2% /jail/var/log
    devfs 1.0K 1.0K 0B 100% /jail/dev
    192.168.1.1:/var/tmp/corefiles 119G 254M 113G 0% /var/crash/corefiles
    192.168.1.1:/var/volatile 31G 4.0K 31G 0% /var/log/host
    192.168.1.1:/var/log 119G 254M 113G 0% /var/log/hostlogs
    192.168.1.1:/var/traffic-log 119G 254M 113G 0% /var/traffic-log
    192.168.1.1:/var/local 119G 254M 113G 0% /var/db/host
    192.168.1.1:/var/db/aamwd 119G 254M 113G 0% /var/db/aamwd
    192.168.1.1:/var/db/secinteld 119G 254M 113G 0% /var/db/secinteld
    192.168.1.1:/app_disk 14M 136K 13M 1% /var/install_disk
    192.168.1.1:/var/log 119G 254M 113G 0% /var/host-mnt/var/log

    node1:
    --------------------------------------------------------------------------
    Filesystem Size Used Avail Capacity Mounted on
    /dev/vtbd0s1a 501M 359M 102M 78% /
    devfs 1.0K 1.0K 0B 100% /dev
    /dev/md0 1.0G 1.0G 0B 100% /junos
    /cf 501M 359M 102M 78% /junos/cf
    devfs 1.0K 1.0K 0B 100% /junos/dev/
    procfs 4.0K 4.0K 0B 100% /proc
    /dev/vtbd1s1e 1.6G 108K 1.4G 0% /config
    /dev/vtbd1s1f 14G 124M 13G 1% /var
    /dev/vtbd3s2 91M 940K 90M 1% /var/host
    /dev/md1 320M 21M 274M 7% /mfs
    /var/jail 14G 124M 13G 1% /jail/var
    /var/jails/rest-api 14G 124M 13G 1% /web-api/var
    /var/log 14G 124M 13G 1% /jail/var/log
    devfs 1.0K 1.0K 0B 100% /jail/dev
    192.168.1.1:/var/tmp/corefiles 119G 255M 113G 0% /var/crash/corefiles
    192.168.1.1:/var/volatile 31G 4.0K 31G 0% /var/log/host
    192.168.1.1:/var/log 119G 255M 113G 0% /var/log/hostlogs
    192.168.1.1:/var/traffic-log 119G 255M 113G 0% /var/traffic-log
    192.168.1.1:/var/local 119G 255M 113G 0% /var/db/host
    192.168.1.1:/var/db/aamwd 119G 255M 113G 0% /var/db/aamwd
    192.168.1.1:/var/db/secinteld 119G 255M 113G 0% /var/db/secinteld
    192.168.1.1:/app_disk 14M 136K 13M 1% /var/install_disk
    192.168.1.1:/var/log 119G 255M 113G 0% /var/host-mnt/var/log

  4. Log in as root run the following command in shell sh -c 'find / -size +10485760c 2> /dev/null' | xargs du -h | sort -nr  on both nodes
  5. Node0
    355M /cf/packages/junos-srxjcp-15.1X49-D100.6-domestic
    309M /mfs/var/etc/resolv.conf
    32K /var/db/userid/__db.003
    29M /modules/bcmsdk_5_9_x.ko
    22M /usr/lib/dd/libjkernel-dd.tlv
    21M /usr/sbin/rpd
    20M /var/db/da_data_geo/database/log.0000000001
    20M /var/db/da_data/database/log.0000000001
    19M /usr/sbin/ipfd
    17M /modules/bcmsdk_5_6_1.ko
    15M /var/rundb/schema.db
    14M /usr/share/icu/4.6/icudt46l.dat
    14M /usr/sbin/chassisd
    14M /usr/sbin/authd
    14M /usr/lib/dd/libjroute-dd.tlv
    13M /usr/sbin/jpppd
    13M /usr/sbin/aamwd
    12M /usr/sbin/kmd
    12M /usr/sbin/jdhcpd
    10M /var/db/appid/bins/libqmprotocols.so.amd64
    10M /usr/lib/libidp-compiler.so.0
  6. Node1
    355M /cf/packages/junos-srxjcp-15.1X49-D100.6-domestic
    32K /var/db/userid/__db.003
    29M /modules/bcmsdk_5_9_x.ko
    22M /usr/lib/dd/libjkernel-dd.tlv
    21M /usr/sbin/rpd
    20M /var/db/da_data_geo/database/log.0000000001
    20M /var/db/da_data/database/log.0000000001
    19M /usr/sbin/ipfd
    17M /modules/bcmsdk_5_6_1.ko
    15M /var/rundb/schema.db
    14M /usr/share/icu/4.6/icudt46l.dat
    14M /usr/sbin/chassisd
    14M /usr/sbin/authd
    14M /usr/lib/dd/libjroute-dd.tlv
    13M /usr/sbin/jpppd
    13M /usr/sbin/aamwd
    12M /usr/sbin/kmd
    12M /usr/sbin/jdhcpd
    10M /var/db/appid/bins/libqmprotocols.so.amd64
    10M /usr/lib/libidp-compiler.so.0
  7. We see that file /mfs/var/etc/resolv.conf at 309M does not match on Node1 and is consuming to much space.

Solution:

  1. In shell on Node0 used rm -f /{filepath}/[filename] to remove the file. Run sh -c 'find / -size +10485760c 2> /dev/null' | xargs du -h | sort -nr  for a second time to confirm the file has been removed, if it is renamed delete it a second time.
  2. In configuration mode run commit full and the configuration will commit to both nodes correctly.

 

 

destination nat for 1 public IP to 2 local host that use the same service port 443 (web application server)

$
0
0

Hi Guys,

will it work in destination nat if we use 1 public IP to 2 private IP that use the same service port 443? one is configured to port forward 8443(public) to port 443(private) then the other one is 443 to 443. the two local host were same web application server. below is the config of destination nat that i created:


edit security nat destination
pool 10_154_252_240 {
address 10.154.252.240/32;
}
pool 10_104_64_5 {
address 10.104.64.5/32;
}
rule-set NAT_for_server {
from zone UNTRUST;
rule DNAT-64_5 {
match {
destination-address 1.1.1.1/32;
destination-port {
443;
}
}
then {
destination-nat {
pool {
10_104_64_5;
}
}
}
}
rule DNAT-252_240 {
match {
destination-address 1.1.1.1/32;
destination-port {
8443;
}
}
then {
destination-nat {
pool {
10_154_252_240;
}

How to create multiple different local web filtering on SRX

$
0
0

Hi All

I need to create some different types of web filtering (local - as we don't have web filtering license)

example:

      Policy 1: block abc.com, def.com and permit all other

     Policy 2: block XYZ.net, TUV.net and permit all other

     Policy 3: block ghi.org, mnv.org and permit all other

But as I did research and check on our SRX220H2, there is only 1 method is to use Global option Blacklist, but if I use Global, there is only 1 collection of url blocking.

Last time, when using SSG we can do easily

If possible, could you please guide me how to create multiple different web filtering on SRX

Many thanks

 

Disable cluster mode on SRX300 firewall

$
0
0

Hi All

 

I have two SRX300 firewall that configured in cluster mode.  Now, i want to disable the cluster mode. If disabled, will it keep the other configuration? eg. static route, NAT , RULEs 

 

THANKSSSSSSSSSSSS

Re: Disable cluster mode on SRX300 firewall

$
0
0
It will keep the configuration, but you need to change interfaces from reth to ge-

Re: Disable cluster mode on SRX300 firewall

$
0
0

Sorry i am new with juniper. How to change interfaces from reth to ge-. Thanks


Re: Disable cluster mode on SRX300 firewall

$
0
0

Use the following commands to remove reth interfaces:

 

delete interfaces reth0
delete interfaces reth1 (and so on)
delete chassis cluster

 

Then configure individual interfaces as necessary: 

 

set interface ge-x/x/x unit x ...... 

 

And then assign these ge-interfaces to relevant security zones. 

 

Anand

Re: SRX BGP/NAT question about putting another FW in the SRX's "outside"

$
0
0

If the existing SRX is running as a firewall for the rest of the network, then packet mode is not an option here.  Packet mode is a device level configuration you can be either a router or a firewall you cannot mix the two on the same device.

 

Re: Disable cluster mode on SRX300 firewall

$
0
0

The process will be slightly complicated.  There is interface configuration on these are redundant interfaces (reth) that take two physical interfaces, one on each of the two devices in matching positions, and make them a failover pair.

 

So the process will be:

 

on specific ge interface: remove the reth membership

copy from reth interaface configuration

change name to lower number ge interface of the pair and apply to this interface

delete the reth interface connection

delete all the ge-1/x/x interfaces as they are on the second device

 

I would pull a copy of the entire interface stanza as is:

 

show configuration interface | display set | no-more

 

Save this in a text only file

 

example existing reth1 pair

set interfaces ge-0/0/0 gigether-options redundant-parent reth1

set interfaces ge-1/0/0 gigether-options redundant-parent reth1

set interfaces reth1 redundant-ether-options redundancy-group 1
set interfaces reth1 unit 0 family inet address 10.10.0.1/29

 

changes

delete interfaces ge-0/0/0

set interfaces ge-0/0/0 unit 0 family inet address 10.10.0.1/29

delete interfaces reth1

delete interfaces ge-1/0/0

 

peform this for all reth interface sets

 

 

Re: destination nat for 1 public IP to 2 local host that use the same service port 443 (web application server)

$
0
0

THe pool used for the 8443 forward has to include also changing the destination port in addition to the address to hit the server 443 port.

 

pool 10_154_252_240 {
address 10.154.252.240/32 port 443;
}

 

Re: Any one already try fxp0 in the mgmt_junos Routing Instance on Chassis Cluster?

$
0
0

Hi all,

 

are there any news on this feature related to SRX compatibility?

I was trying to set this up on a SRX345 Cluster, bit i don't get any connections on the fxp0 interfaces. mgmt_junos routing-table is empty.

 

Thanks.

 

Fight with ASA - Alternative to 5505 and 5506 - Different between suggested alternative srx2xx or srx3xx

$
0
0

Hi,

I re-searched and understand some different features matrix between these "fights" for cisco and juniper.

I like more Juniper in this moment and I'd like to suggest a specific closer alternative to Cisco.

The main question is that I found SRX2xx as good alternative to ASA-5505, but I don't know why, from the configuration tools the price is realy different and unexpected, I mean:

- SRX-320: less than 2.000$

- SRX-220: more than 2.000$

?!?!?!

Why this different, if the model 3xx should be better?!

 

I checked also features, throuputs and so on... but everythings seems to be better on 320... and the price is cheaper?! :-\

 

- Maybe some licenses needed more on srx-320 not included?

- Maybe.... boh.. :-)

 

What would be the suggested model for firewall against 5505 asa with Poe, VPN and gigabit ports?

 

Anyone can help me?

 

regards

Re: Fight with ASA - Alternative to 5505 and 5506 - Different between suggested alternative srx2xx or srx3xx

$
0
0

SRX EOL Information

 

the srx220is EOL ( as is nearly the complete 100 and 200 series due to ROHS compliance)

unfortunately it can be still found in the srx comparison matrix  SRX Compare Products

So IMHO you should not consider the srx220 anymore

it is replaced by newer SRX typically the 300 series

 

regards

alexander


Re: Fight with ASA - Alternative to 5505 and 5506 - Different between suggested alternative srx2xx or srx3xx

$
0
0

Thanks for fast reply.

Ah! ok... Finding not updates tables I found some mistake about all of these information. thanks once again! 

 

Then... I'm looking for srx-3xx with 8 gigabit port and poe for match my requirement.

Not easy BTW... cause srx-2xx all have integrated rj-45.... srx-3xx only 6...

 

let's see.

 

regards

Re: SRX240 Security zone & VR limitation

$
0
0

.. it wasnt ASAP Smiley Happy

 

Below is the right command.

 

run show log nsd_chk_only | match "max "
Max Policy = 4096
Max Policy Context = 256
Max Policy per Context = 4096
Max Statistics Counter = 256
Max Address per Policy = 1024
Max Applications per Policy = 128
Max Role per Policy = 128
Max Scheduler = 128
Max Security Zones = 32
Max Security Address Books = 32

 

Unable to get SNMP working remotley

$
0
0

Hi All

 

I'm having getting SNMP data from remote servers to my SRX 1500. Locally on the decive snmpwalk works fine. Below are the 2 config settings I have inplace.  On the remote servers its timing out. The server I'm coming from also have a access rule policy allowing it into the firewall. I'm stuck on how to troubleshoot this further.

 

firewall {
    filter protect-re {
		term snmp {
            from {
                prefix-list {
                    snmp-hosts;
                }
                port snmp;
				protocol udp;
				}
            then {
                accept;
            }
        }
        term accept-all {
            then accept;
        }
    }
}
snmp {
    community public4ASD21 {
        authorization read-only;
        clients {
			63.17.248.2/32;
                        44.240.68.11/32;
			172.40.0.181/32;
			172.40.0.161/32;
        }
    }
    trap-group snmp-trap-group1 {
        version v2;
        categories {
            authentication;
            chassis;
            link;
            remote-operations;
            routing;
            startup;
            rmon-alarm;
            configuration;
            services;
            chassis-cluster;
        }
        targets {
            44.240.68.11;
	    172.40.0.181;
	    172.40.0.161;
        }
    }
}

Re: Unable to get SNMP working remotley

$
0
0

Hi

Could you check if you have reachability from your NMS/Server to this device? Check if the NMS is able discover this node?

If yes, enable SNMP traceoptions and try to fetch data from the server & then see what clue does the traceoption debug log gives you.

 

set snmp traceoptions file snmpd.log
set snmp traceoptions file size 100m
set snmp traceoptions file files 5
set snmp traceoptions flag all

 

 

Analog Security Screen features in CISCO ISR 4xxx

$
0
0

Hello!

I want to consider CISCO ISR 4xxx Series routers for remote branch, but for now i don't know if they have basic DoS Protection like security screens in Juniper SRX for preventing basic DoS atacks.

If anyone has been working with CISCO ISR and Juniper SRX can you tell me - Does the CISCO ISR 4xxx series have this basic security functionality?

Viewing all 17645 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>