Hello,
I sure hope someone can lend a hand...
I have an SRX650 that I just did the basid setup on, and while running through the wizard, I found that I could not assign the gateway IP because it is on a different subnet.
So I left the GW blank and continued on.
After completing the default build, I added a static route, and I still have no luck.
I can ping the external IP of the SRX from the internet.
I can ping the internal IP of the SRX from the LAN side.
I cannot get traffic to cross.
IP info from ISP:
ISP serial: 65.153.72.73/30
Cust serial: 65.153.72.74/30
Cust IP Pool: 207.108.206.248/29
Here is the current config:
## Last changed: 2016-09-17 15:41:35 GMT-8
version 12.1X44.3;
system {
host-name FW;
time-zone GMT-8;
root-authentication {
encrypted-password "$1$3iJhZPKx$V8IxYC7j3AxO0vhknby3u.";
}
name-server {
205.171.3.65;
205.171.2.65;
208.67.222.222;
208.67.220.220;
}
name-resolution {
no-resolve-on-input;
}
login {
user xxxxxx {
uid 2000;
class super-user;
authentication {
encrypted-password "xxxxxx";
}
}
}
services {
ssh;
telnet;
web-management {
http {
interface ge-0/0/3.0;
}
https {
system-generated-certificate;
interface ge-0/0/3.0;
}
session {
idle-timeout 60;
}
}
}
syslog {
user * {
any emergency;
}
file messages {
any critical;
authorization info;
}
file interactive-commands {
interactive-commands error;
}
}
max-configurations-on-flash 5;
max-configuration-rollbacks 5;
license {
autoupdate {
url https://ae1.juniper.net/junos/key_retrieval;
}
}
ntp {
server us.ntp.pool.org;
}
}
interfaces {
ge-0/0/0 {
speed 1g;
link-mode full-duplex;
gigether-options {
auto-negotiation;
}
unit 0 {
family inet {
address 207.108.206.249/29;
}
}
}
ge-0/0/3 {
unit 0 {
family inet {
address 192.168.160.1/24;
}
}
}
}
routing-options {
static {
route 207.108.206.248/29 next-hop 65.153.72.74;
route 0.0.0.0/0 {
next-hop 65.153.72.74;
resolve;
}
}
}
security {
alg {
ike-esp-nat {
enable;
}
}
screen {
ids-option untrust-screen {
icmp {
ping-death;
}
ip {
source-route-option;
tear-drop;
}
tcp {
syn-flood {
alarm-threshold 1024;
attack-threshold 200;
source-threshold 1024;
destination-threshold 2048;
timeout 20;
}
land;
}
}
}
nat {
source {
rule-set nsw_srcnat {
from zone Internal;
to zone Internet;
rule nsw-src-interface {
match {
source-address 0.0.0.0/0;
destination-address 0.0.0.0/0;
}
then {
source-nat {
interface;
}
}
}
}
}
destination {
pool 192_168_160_9_443 {
address 192.168.160.9/32 port 443;
}
pool 192_168_160_9_80 {
address 192.168.160.9/32 port 80;
}
pool 192_168_160_9_143 {
address 192.168.160.9/32 port 143;
}
pool 192_168_160_9_110 {
address 192.168.160.9/32 port 110;
}
pool 192_168_160_9_25 {
address 192.168.160.9/32 port 25;
}
rule-set nsw_destnat {
from zone Internet;
rule 0_Web_Server--Internal_443 {
match {
source-address 0.0.0.0/0;
destination-address 207.108.206.249/32;
destination-port 443;
}
then {
destination-nat pool 192_168_160_9_443;
}
}
rule 0_Web_Server--Internal_80 {
match {
source-address 0.0.0.0/0;
destination-address 207.108.206.249/32;
destination-port 80;
}
then {
destination-nat pool 192_168_160_9_80;
}
}
rule 1_Mail_Server--Internal_143 {
match {
source-address 0.0.0.0/0;
destination-address 207.108.206.249/32;
destination-port 143;
}
then {
destination-nat pool 192_168_160_9_143;
}
}
rule 1_Mail_Server--Internal_110 {
match {
source-address 0.0.0.0/0;
destination-address 207.108.206.249/32;
destination-port 110;
}
then {
destination-nat pool 192_168_160_9_110;
}
}
rule 1_Mail_Server--Internal_25 {
match {
source-address 0.0.0.0/0;
destination-address 207.108.206.249/32;
destination-port 25;
}
then {
destination-nat pool 192_168_160_9_25;
}
}
}
}
}
policies {
from-zone Internet to-zone Internal {
policy Web_Server_Internet_Internal {
match {
source-address any;
destination-address any;
application [ junos-http junos-https ];
}
then {
permit;
}
}
policy Mail_Server_Internet_Internal {
match {
source-address any;
destination-address any;
application [ junos-smtp junos-imap junos-pop3 ];
}
then {
permit;
}
}
}
from-zone Internal to-zone Internet {
policy All_Internal_Internet {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}
}
}
}
zones {
security-zone Internal {
host-inbound-traffic {
system-services {
ping;
}
}
interfaces {
ge-0/0/3.0 {
host-inbound-traffic {
system-services {
ping;
http;
https;
ssh;
telnet;
}
}
}
}
}
security-zone Internet {
host-inbound-traffic {
system-services {
ping;
}
}
interfaces {
ge-0/0/0.0 {
host-inbound-traffic {
system-services {
ping;
}
}
}
}
}
security-zone junos-host;
}
}
I have also tried:
routing-options {
static {
route 207.108.206.249/32 next-hop 65.153.72.74;
route 0.0.0.0/0 {
next-hop 65.153.72.74;
resolve;
}
}
}
and I had no change.
What am I doing wrong? How can I get traffic to pass?
This is my first time with a 650. typically I use 240's but this is for a gig fiber connection that will have a lot of IPSEC on it, so I figured I would get a bigger box to handle the connection.
I did notice that the default route is being hidden/unusable in the route table.
xxxxxx@FW> show route
inet.0: 5 destinations, 5 routes (4 active, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both
192.168.160.0/24 *[Direct/0] 02:05:51
> via ge-0/0/3.0
192.168.160.1/32 *[Local/0] 02:05:58
Local via ge-0/0/3.0
207.108.206.248/29 *[Direct/0] 02:05:51
> via ge-0/0/0.0
207.108.206.249/32 *[Local/0] 02:05:58
Local via ge-0/0/0.0
xxxxxx@FW> show route hidden
inet.0: 5 destinations, 5 routes (4 active, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both
0.0.0.0/0 [Static/5] 02:06:57
Unusable