Quantcast
Channel: All SRX Services Gateway posts
Viewing all articles
Browse latest Browse all 17645

Default Gateway not on the same subnet

$
0
0

Hello,

I sure hope someone can lend a hand...

I have an SRX650 that I just did the basid setup on, and while running through the wizard, I found that I could not assign the gateway IP because it is on a different subnet.

So I left the GW blank and continued on.

After completing the default build, I added a static route, and I still have no luck.

I can ping the external IP of the SRX from the internet.

I can ping the internal IP of the SRX from the LAN side.

I cannot get traffic to cross.

IP info from ISP:

ISP serial: 65.153.72.73/30

Cust serial: 65.153.72.74/30

Cust IP Pool: 207.108.206.248/29

 

Here is the current config:


## Last changed: 2016-09-17 15:41:35 GMT-8
version 12.1X44.3;
system {
host-name FW;
time-zone GMT-8;
root-authentication {
encrypted-password "$1$3iJhZPKx$V8IxYC7j3AxO0vhknby3u.";
}
name-server {
205.171.3.65;
205.171.2.65;
208.67.222.222;
208.67.220.220;
}
name-resolution {
no-resolve-on-input;
}
login {
user xxxxxx {
uid 2000;
class super-user;
authentication {
encrypted-password "xxxxxx";
}
}
}
services {
ssh;
telnet;
web-management {
http {
interface ge-0/0/3.0;
}
https {
system-generated-certificate;
interface ge-0/0/3.0;
}
session {
idle-timeout 60;
}
}
}
syslog {
user * {
any emergency;
}
file messages {
any critical;
authorization info;
}
file interactive-commands {
interactive-commands error;
}
}
max-configurations-on-flash 5;
max-configuration-rollbacks 5;
license {
autoupdate {
url https://ae1.juniper.net/junos/key_retrieval;
}
}
ntp {
server us.ntp.pool.org;
}
}
interfaces {
ge-0/0/0 {
speed 1g;
link-mode full-duplex;
gigether-options {
auto-negotiation;
}
unit 0 {
family inet {
address 207.108.206.249/29;
}
}
}
ge-0/0/3 {
unit 0 {
family inet {
address 192.168.160.1/24;
}
}
}
}
routing-options {
static {
route 207.108.206.248/29 next-hop 65.153.72.74;
route 0.0.0.0/0 {
next-hop 65.153.72.74;
resolve;
}
}
}
security {
alg {
ike-esp-nat {
enable;
}
}
screen {
ids-option untrust-screen {
icmp {
ping-death;
}
ip {
source-route-option;
tear-drop;
}
tcp {
syn-flood {
alarm-threshold 1024;
attack-threshold 200;
source-threshold 1024;
destination-threshold 2048;
timeout 20;
}
land;
}
}
}
nat {
source {
rule-set nsw_srcnat {
from zone Internal;
to zone Internet;
rule nsw-src-interface {
match {
source-address 0.0.0.0/0;
destination-address 0.0.0.0/0;
}
then {
source-nat {
interface;
}
}
}
}
}
destination {
pool 192_168_160_9_443 {
address 192.168.160.9/32 port 443;
}
pool 192_168_160_9_80 {
address 192.168.160.9/32 port 80;
}
pool 192_168_160_9_143 {
address 192.168.160.9/32 port 143;
}
pool 192_168_160_9_110 {
address 192.168.160.9/32 port 110;
}
pool 192_168_160_9_25 {
address 192.168.160.9/32 port 25;
}
rule-set nsw_destnat {
from zone Internet;
rule 0_Web_Server--Internal_443 {
match {
source-address 0.0.0.0/0;
destination-address 207.108.206.249/32;
destination-port 443;
}
then {
destination-nat pool 192_168_160_9_443;
}
}
rule 0_Web_Server--Internal_80 {
match {
source-address 0.0.0.0/0;
destination-address 207.108.206.249/32;
destination-port 80;
}
then {
destination-nat pool 192_168_160_9_80;
}
}
rule 1_Mail_Server--Internal_143 {
match {
source-address 0.0.0.0/0;
destination-address 207.108.206.249/32;
destination-port 143;
}
then {
destination-nat pool 192_168_160_9_143;
}
}
rule 1_Mail_Server--Internal_110 {
match {
source-address 0.0.0.0/0;
destination-address 207.108.206.249/32;
destination-port 110;
}
then {
destination-nat pool 192_168_160_9_110;
}
}
rule 1_Mail_Server--Internal_25 {
match {
source-address 0.0.0.0/0;
destination-address 207.108.206.249/32;
destination-port 25;
}
then {
destination-nat pool 192_168_160_9_25;
}
}
}
}
}
policies {
from-zone Internet to-zone Internal {
policy Web_Server_Internet_Internal {
match {
source-address any;
destination-address any;
application [ junos-http junos-https ];
}
then {
permit;
}
}
policy Mail_Server_Internet_Internal {
match {
source-address any;
destination-address any;
application [ junos-smtp junos-imap junos-pop3 ];
}
then {
permit;
}
}
}
from-zone Internal to-zone Internet {
policy All_Internal_Internet {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}
}
}
}
zones {
security-zone Internal {
host-inbound-traffic {
system-services {
ping;
}
}
interfaces {
ge-0/0/3.0 {
host-inbound-traffic {
system-services {
ping;
http;
https;
ssh;
telnet;
}
}
}
}
}
security-zone Internet {
host-inbound-traffic {
system-services {
ping;
}
}
interfaces {
ge-0/0/0.0 {
host-inbound-traffic {
system-services {
ping;
}
}
}
}
}
security-zone junos-host;
}
}

 

 

I have also tried:

routing-options {
static {
route 207.108.206.249/32 next-hop 65.153.72.74;
route 0.0.0.0/0 {
next-hop 65.153.72.74;
resolve;
}
}
}

and I had no change.

What am I doing wrong? How can I get traffic to pass?

This is my first time with a 650. typically I use 240's but this is for a gig fiber connection that will have a lot of IPSEC on it, so I figured I would get a bigger box to handle the connection. 

I did notice that the default route is being hidden/unusable in the route table.

xxxxxx@FW> show route

inet.0: 5 destinations, 5 routes (4 active, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both

192.168.160.0/24 *[Direct/0] 02:05:51
> via ge-0/0/3.0
192.168.160.1/32 *[Local/0] 02:05:58
Local via ge-0/0/3.0
207.108.206.248/29 *[Direct/0] 02:05:51
> via ge-0/0/0.0
207.108.206.249/32 *[Local/0] 02:05:58
Local via ge-0/0/0.0

xxxxxx@FW> show route hidden

inet.0: 5 destinations, 5 routes (4 active, 0 holddown, 1 hidden)
+ = Active Route, - = Last Active, * = Both

0.0.0.0/0 [Static/5] 02:06:57
Unusable


Viewing all articles
Browse latest Browse all 17645

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>