Quantcast
Channel: All SRX Services Gateway posts
Viewing all articles
Browse latest Browse all 17645

Route problem from trust VLAN to external gateway

$
0
0

I have vlan.3 in my trust zone, and hosts in vlan.3 get an IP from the vlan.3 DHCP server just fine, and they can even ping the public IP I've assigned to the untrust interface on my SRX-210B. However, members of trust zone cannot ping the gateway of my public IP. With my public IP being 1.1.1.71, trust members can ping 1.1.1.71, but they cannot ping 1.1.1.1. The SRX itself can ping anything.

 

Example configuration:

trust zone, vlan.3: 10.0.3.0/24

untrust zone, vlan.2: 1.1.1.71/24 (using all 1s instead of my real public IP)

 

If I ping 8.8.8.8 from the SRX, I get a response:

 

will@gw1> ping 8.8.8.8
PING 8.8.8.8 (8.8.8.8): 56 data bytes
64 bytes from 8.8.8.8: icmp_seq=0 ttl=59 time=10.983 ms
^C
--- 8.8.8.8 ping statistics ---
1 packets transmitted, 1 packets received, 0% packet loss
round-trip min/avg/max/stddev = 10.983/10.983/10.983/0.000 ms

will@gw1> ping 8.8.8.8 source 1.1.1.71
PING 8.8.8.8 (8.8.8.8): 56 data bytes
64 bytes from 8.8.8.8: icmp_seq=0 ttl=59 time=18.858 ms
^C
--- 8.8.8.8 ping statistics ---
1 packets transmitted, 1 packets received, 0% packet loss
round-trip min/avg/max/stddev = 18.858/18.858/18.858/0.000 ms

If I ping 8.8.8.8 from my vlan.3 router, I get nothing:

 

will@gw1> ping 8.8.8.8 source 10.0.3.1
PING 8.8.8.8 (8.8.8.8): 56 data bytes
^C
--- 8.8.8.8 ping statistics ---
11 packets transmitted, 0 packets received, 100% packet loss

My VLAN config:

will@gw1> show configuration vlans
vlan-trust {
    vlan-id 3;
    l3-interface vlan.3;
}
vlan-untrust {
    vlan-id 2;
    l3-interface vlan.2;
}

 

 

Here's my DHCP config:

 

address-assignment {
    pool vlan3pool {
        family inet {
            network 10.0.3.0/24;
            range DHCPCLIENTS {
                low 10.0.3.100;
                high 10.0.3.199;
            }
            dhcp-attributes {
               router {
                    10.0.3.1;
                }
                propagate-settings vlan.3;
            }
        }
    }
}

 

Here are my interface settings:

 

will@gw1# show interfaces
fe-0/0/4 {
    unit 0 {
        family ethernet-switching {
            vlan {
                members vlan-trust;
            }
        }
    }
}
fe-0/0/6 {
    fastether-options {
        802.3ad ae0;
    }
}
fe-0/0/7 {
    fastether-options {
        802.3ad ae0;
    }
}
ae0 {
    aggregated-ether-options {
        lacp {
            active;
            periodic slow;
        }
    }
    unit 0 {
        family ethernet-switching {
            port-mode trunk;
            vlan {
                members vlan-untrust;
            }
            native-vlan-id 2;
        }
    }
}
vlan {
    unit 2 {
        family inet {
            address 1.1.1.71/24;
        }
    }
    unit 3 {
        family inet {
            address 10.0.3.1/24;
        }
    }
}

 

 

I have a default static route:

 

will@gw1> show configuration routing-options
static {
    route 0.0.0.0/0 next-hop 1.1.1.1;
}

 

 

will@gw1> show route

inet.0: 7 destinations, 7 routes (7 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both

0.0.0.0/0          *[Static/5] 4d 02:36:18
                    > to 1.1.1.1 via vlan.2
10.0.3.0/24        *[Direct/0] 2d 01:30:23> via vlan.3
10.0.3.1/32        *[Local/0] 5d 01:42:21
                      Local via vlan.3
10.0.3.11/32       *[Access-internal/12] 00:17:39> to 10.0.3.1 via vlan.3
10.0.3.100/32      *[Access-internal/12] 5d 01:41:50> to 10.0.3.1 via vlan.3
1.1.1.0/24    *[Direct/0] 4d 02:36:18> via vlan.2
1.1.1.71/32   *[Local/0] 5d 01:42:21
                      Local via vlan.2

 

 

And relevant interface output:

 

will@gw1# run show interfaces terse
Interface               Admin Link Proto    Local                 Remote
ge-0/0/0                up    up
ge-0/0/0.0              up    up   aenet    --> ae1.0
fe-0/0/4                up    up
fe-0/0/4.0              up    up   eth-switch
fe-0/0/6                up    up
fe-0/0/6.0              up    up   aenet    --> ae0.0
fe-0/0/7                up    down
fe-0/0/7.0              up    down aenet    --> ae0.0
ae0                     up    up
ae0.0                   up    up   eth-switch
vlan                    up    up
vlan.2                  up    up   inet     1.1.1.71/24
vlan.3                  up    up   inet     10.0.3.1/24

 

 

Perhaps something is wrong in my forwarding table?

will@gw1> show route forwarding-table
Routing table: default.inet
Internet:
Destination        Type RtRef Next hop           Type Index NhRef Netif
default            user     1 0:0:c:7:ac:9a      ucst  1338     4 vlan.2
default            perm     0                    rjct    36     1
0.0.0.0/32         perm     0                    dscd    34     1
10.0.3.0/24        intf     0                    rslv  1320     1 vlan.3
10.0.3.0/32        dest     0 10.0.3.0           recv  1318     1 vlan.3
10.0.3.1/32        intf     0 10.0.3.1           locl  1319     2
10.0.3.1/32        dest     0 10.0.3.1           locl  1319     2
10.0.3.9/32        dest     0 0:1e:4f:14:aa:5c   ucst  1328     1 vlan.3
10.0.3.10/32       dest     0 0:1d:9:29:1:7c     ucst  1348     1 vlan.3
10.0.3.11/32       dest     0 0:c:29:53:3d:7a    ucst  1329     1 vlan.3
10.0.3.100/32      dest     0 0:23:ae:14:72:3    ucst  1336     1 vlan.3
10.0.3.255/32      dest     0 10.0.3.255         bcst  1317     1 vlan.3
1.1.1.0/24    intf     0                    rslv  1316     1 vlan.2
1.1.1.0/32    dest     0 1.1.1.0       recv  1314     1 vlan.2
1.1.1.1/32    dest     0 0:0:c:7:ac:9a      ucst  1338     4 vlan.2
1.1.1.71/32   intf     0 1.1.1.71      locl  1315     2
1.1.1.71/32   dest     0 1.1.1.71      locl  1315     2
1.1.1.117/32  dest     0 0:d0:68:c:c2:4f    ucst  1352     1 vlan.2
1.1.1.251/32  dest     0 0:1d:e5:a6:d6:46   ucst  1342     1 vlan.2
1.1.1.252/32  dest     0 0:23:ea:c0:55:c6   ucst  1346     1 vlan.2
1.1.1.253/32  dest     0 0:e0:81:32:5f:c3   ucst  1340     1 vlan.2
1.1.1.255/32  dest     0 1.1.1.255     bcst  1313     1 vlan.2
224.0.0.0/4        perm     0                    mdsc    35     1
224.0.0.1/32       perm     0 224.0.0.1          mcst    31     1
255.255.255.255/32 perm     0                    bcst    32     1

Relevant security zones:

will@gw1> show configuration security zones
security-zone trust {
    host-inbound-traffic {
        system-services {
            all;
        }
        protocols {
            all;
        }
    }
    interfaces {
        vlan.3;
    }
}
security-zone untrust {
    screen untrust-screen;
    host-inbound-traffic {
        system-services {
            ping;
            ssh;
            ftp;
        }
    }
    interfaces {
        vlan.2;
    }
}

Relevant security policy:

will@gw1> show configuration security policies
from-zone trust to-zone untrust {
    policy trust-to-untrust {
        match {
            source-address any;
            destination-address any;
            application any;
        }
        then {
            permit;
        }
    }
}
from-zone trust to-zone trust {
    policy intra-zone {
        match {
            source-address any;
            destination-address any;
            application any;
        }
        then {
            permit;
        }
    }
}
from-zone trust to-zone junos-host {
    policy mgmt-trust {
        match {
            source-address any;
            destination-address any;
            application any;
        }
        then {
            permit;
        }
    }
}
from-zone untrust to-zone trust {
    policy mgmt-untrust {
        match {
            source-address allowed_admins;
            destination-address any;
            application any;
        }
        then {
            permit;
            log {
                session-init;
                session-close;
            }
        }
    }
    policy denyall {
        match {
            source-address any;
            destination-address any;
            application any;
        }
        then {
            deny;
            log {
                session-init;
            }
        }
    }
}
from-zone untrust to-zone junos-host {
    policy mgmt-untrust {
        match {
            source-address allowed_admins;
            destination-address any;
            application any;
        }
        then {
            permit;
            log {
                session-init;
                session-close;
            }
        }
    }
    policy ping-untrust {
        match {
            source-address any;
            destination-address any;
            application junos-icmp-all;
        }
        then {
            permit;
            log {
                session-init;
                session-close;
            }
        }
    }
    policy denyall {
        match {
            source-address any;
            destination-address any;
            application any;
        }
        then {
            deny;
            log {
                session-init;
            }
        }
    }
}

Pings from the host plugged into fe-0/0/4:

C:\Users\Owner>ping 10.0.3.10

Pinging 10.0.3.10 with 32 bytes of data:
Reply from 10.0.3.10: bytes=32 time=1ms TTL=64

Ping statistics for 10.0.3.10:
    Packets: Sent = 1, Received = 1, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 1ms, Maximum = 1ms, Average = 1ms
Control-C
^C
C:\Users\Owner>ping 10.0.3.1

Pinging 10.0.3.1 with 32 bytes of data:
Reply from 10.0.3.1: bytes=32 time=1ms TTL=64
Ping statistics for 10.0.3.1:
    Packets: Sent = 1, Received = 1, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 1ms, Maximum = 1ms, Average = 1ms
Control-C
^C
C:\Users\Owner>ping 1.1.1.71

Pinging 1.1.1.71 with 32 bytes of data:
Reply from 1.1.1.71: bytes=32 time=2ms TTL=64
Ping statistics for 1.1.1.71:
    Packets: Sent = 1, Received = 1, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 2ms, Maximum = 2ms, Average = 2ms
Control-C
^C
C:\Users\Owner>ping 1.1.1.1

Pinging 1.1.1.1 with 32 bytes of data:
Request timed out.
Request timed out.

Ping statistics for 1.1.1.1:
    Packets: Sent = 2, Received = 0, Lost = 2 (100% loss)
Control-C
^C
C:\Users\Owner>ping 8.8.8.8

Pinging 8.8.8.8 with 32 bytes of data:
Request timed out.
Ping statistics for 8.8.8.8:
    Packets: Sent = 1, Received = 0, Lost = 1 (100% loss)
Control-C
^C

 

 

I can't for the life of me find out why nothing on 10.0.3.0/24 can get past 1.1.1.71!!

 


Viewing all articles
Browse latest Browse all 17645

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>