Quantcast
Channel: All SRX Services Gateway posts
Viewing all articles
Browse latest Browse all 17645

Re: New config for SRX240

$
0
0

Then you simply need to tag all interfaces with both VLAN's, except for ge-0/0/0 which takes the ISP handoff. An RVI for VLAN 99 is configured to accept a DHCP address from the provider. Assuming you want outbound internet from the trust zone I added an outbound NAT. Your inbound traffic to the three internal IP's will not work unless you configure static inbound NAT to them.

 

system {
    host-name fw_FilipVDAQS;
    domain-name filipvda.qs;
    time-zone GMT;
    no-multicast-echo;
    no-redirects;
    no-ping-record-route;
    no-ping-time-stamp;
    internet-options {
        path-mtu-discovery;
    }
    ports {
        console log-out-on-disconnect;
    }
    root-authentication {
        encrypted-password "$1$fXoIUNLJ$5tTd.F0vmX0BsyoXL/6O1."; ## SECRET-DATA
    }
    name-server {
        208.67.222.222;
        208.67.220.220;
        195.130.131.11;
        195.130.130.11;
    }
    name-resolution {
        no-resolve-on-input;
    }
    login {
        class super-user-local {
            idle-timeout 15;
            login-alarms;
            permissions all;
        }
        user FilipVDA {
            full-name FilipVDA;
            uid 2000;
            class super-user;
            authentication {
                encrypted-password "$1$hFuEFe5.$zrNVUYBRxaWO51dNMbkS/1"; ## SECRET-DATA
            }
        }
    }
    services {
        ssh;
        telnet;
        xnm-clear-text;
        web-management {
            http {
                interface vlan.3;
            }
            https {
                system-generated-certificate;
                interface vlan.3;
            }
        }
        dhcp {
            router {
                172.25.50.254;
            }
            pool 172.25.50.0/24 {
                address-range low 172.25.50.200 high 172.25.50.254;
                router {
                    172.25.50.254;
                }
            }
            static-binding 80:1f:02:ef:d1:6e {
                fixed-address {
                    172.25.50.205;
                }
                host-name pi;
            }
            static-binding b4:21:8a:f8:30:8e {
                fixed-address {
                    172.25.50.201;
                }
                host-name Aquadino_LAN;
            }
            static-binding b4:21:8a:f0:30:8e {
                fixed-address {
                    172.25.50.200;
                }
                host-name Aquadino_WiFi;
            }
            propagate-settings vlan.99;
        }
    }
    syslog {
        archive size 100k files 3;
        user * {
            any emergency;
        }
        file messages {
            any critical;
            authorization info;
        }
        file interactive-commands {
            interactive-commands error;
        }
    }
    max-configurations-on-flash 5;
    max-configuration-rollbacks 5;
    license {
        autoupdate {
            url https://ae1.juniper.net/junos/key_retrieval;
        }
    }
}
interfaces {
    ge-0/0/0 {
	description "Handoff from ISP";
        unit 0 {
            family ethernet-switching {
                port-mode access;
                vlan {
                    members vlan-telenet;
                }
            }
        }
    ge-0/0/1 {
        unit 0 {
            family ethernet-switching {
                port-mode trunk;
                vlan {
                    members [ vlan-trust vlan-telenet ];
                }
            }
        }
    }
    ge-0/0/2 {
        unit 0 {
            family ethernet-switching {
                port-mode trunk;
                vlan {
                    members [ vlan-trust vlan-telenet ];
                }
            }
        }
    ge-0/0/3 {
        unit 0 {
            family ethernet-switching {
                port-mode trunk;
                vlan {
                    members [ vlan-trust vlan-telenet ];
                }
            }
        }
    ge-0/0/4 {
        unit 0 {
            family ethernet-switching {
                port-mode trunk;
                vlan {
                    members [ vlan-trust vlan-telenet ];
                }
            }
        }
    ge-0/0/5 {
        unit 0 {
            family ethernet-switching {
                port-mode trunk;
                vlan {
                    members [ vlan-trust vlan-telenet ];
                }
            }
        }
    ge-0/0/6 {
        unit 0 {
            family ethernet-switching {
                port-mode trunk;
                vlan {
                    members [ vlan-trust vlan-telenet ];
                }
            }
        }
    ge-0/0/7 {
        unit 0 {
            family ethernet-switching {
                port-mode trunk;
                vlan {
                    members [ vlan-trust vlan-telenet ];
                }
            }
        }
    ge-0/0/8 {
        unit 0 {
            family ethernet-switching {
                port-mode trunk;
                vlan {
                    members [ vlan-trust vlan-telenet ];
                }
            }
        }
    ge-0/0/9 {
        unit 0 {
            family ethernet-switching {
                port-mode trunk;
                vlan {
                    members [ vlan-trust vlan-telenet ];
                }
            }
        }
    ge-0/0/10 {
        unit 0 {
            family ethernet-switching {
                port-mode trunk;
                vlan {
                    members [ vlan-trust vlan-telenet ];
                }
            }
        }
    ge-0/0/11 {
        unit 0 {
            family ethernet-switching {
                port-mode trunk;
                vlan {
                    members [ vlan-trust vlan-telenet ];
                }
            }
        }
    ge-0/0/12 {
        unit 0 {
            family ethernet-switching {
                port-mode trunk;
                vlan {
                    members [ vlan-trust vlan-telenet ];
                }
            }
        }
    ge-0/0/13 {
        unit 0 {
            family ethernet-switching {
                port-mode trunk;
                vlan {
                    members [ vlan-trust vlan-telenet ];
                }
            }
        }
    ge-0/0/14 {
        unit 0 {
            family ethernet-switching {
                port-mode trunk;
                vlan {
                    members [ vlan-trust vlan-telenet ];
                }
            }
        }
    ge-0/0/15 {
        unit 0 {
            family ethernet-switching {
                port-mode trunk;
                vlan {
                    members [ vlan-trust vlan-telenet ];
                }
            }
        }
    vlan {
        unit 3 {
            family inet {
                address 172.25.50.254/24;
            }
        }
        unit 99 {
            family inet {
                dhcp;
            }
        }
    }
}
snmp {
    description srx240;
    contact filipvda;
    view jweb-view-all {
        oid .1 include;
    }
    community filipvda_ro {
        authorization read-only;
    }
    community filipvda_rw {
        view jweb-view-all;
        authorization read-write;
    }
    trap-group target {
        categories {
            authentication;
            chassis;
            link;
            remote-operations;
            routing;
            startup;
            rmon-alarm;
            vrrp-events;
            configuration;
        }
        targets {
            172.25.50.102;
        }
    }
    health-monitor {
        interval 300;
        rising-threshold 90;
        falling-threshold 80;
    }
}
protocols {
    stp;
}
policy-options {
    prefix-list manager-ips {
        172.25.50.0/24;
    }
}
security {
    screen {
        ids-option untrust-screen {
            icmp {
                ping-death;
            }
            ip {
                source-route-option;
                tear-drop;
            }
            tcp {
                syn-flood {
                    alarm-threshold 1024;
                    attack-threshold 200;
                    source-threshold 1024;
                    destination-threshold 2048;
                    timeout 20;
                }
                land;
            }
        }
    }
    nat {
        source {
            rule-set external-nat {
                from zone vlan-trust;
                to zone vlan-telenet;
                rule external-rule1 {
                    match {
                        source-address 0.0.0.0/0;
                        destination-address 0.0.0.0/0;
                    }
                    then {
                        source-nat {
                            interface;
                        }
                    }
                }
            }
        }
    }
    policies {
        from-zone Internal to-zone Internet {
            policy trust-to-untrust {
                match {
                    source-address any;
                    destination-address any;
                    application any;
                }
                then {
                    permit;
                }
            }
        }
        from-zone Internet to-zone Internal {
            policy www2ats {
                match {
                    source-address any;
                    destination-address ats;
                    application [ junos-http junos-https ];
                }
                then {
                    permit;
                }
            }
            policy rdp2bellerophon {
                match {
                    source-address any;
                    destination-address bellerophon;
                    application any;
                }
                then {
                    permit;
                }
            }
            policy ftp2storage {
                match {
                    source-address any;
                    destination-address storage;
                    application junos-ftp;
                }
                then {
                    permit;
                }
            }
        }
    }
    zones {
        security-zone Internal {
            address-book {
                address ats 172.25.50.100/32;
                address bellerophon 172.25.50.210/32;
                address storage 172.25.50.250/32;
            }
            interfaces {
                vlan.3 {
                    host-inbound-traffic {
                        system-services {
                            all;
                        }
                        protocols {
                            all;
                        }
                    }
                }
            }
        }
        security-zone Internet {
            screen untrust-screen;
            interfaces {
                vlan.99 {
                    host-inbound-traffic {
                        system-services {
                            dhcp;
                            tftp;
                            ping;
                            https;
                            ssh;
                        }
                        protocols {
                            all;
                        }
                    }
                }
            }
        }
    }
}
vlans {
    vlan-trust {
        vlan-id 3;
        l3-interface vlan.3;
    }
    vlan-telenet {
        vlan-id 99;
        l3-interface vlan.99;
    }
}

Viewing all articles
Browse latest Browse all 17645

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>