Quantcast
Channel: All SRX Services Gateway posts
Viewing all articles
Browse latest Browse all 17645

Re: SRX240 setup problems

$
0
0

OK, here is the configuration.  This is what I tried to set up as a permissive policy with the Internet from the cable modem coming in on chassis port 0, then a reserved DMZ on chassis port 1 which I am not doing anything with for now, and then chassis ports 2-15 set up for Internal. Right now most computers connect to the internet fine. My bitcoin miners have static addresses and seem to be working ok. The problem is that I cannot connect with a PS4 (either auto config using DHCP, or manually setting an address in the 192.168.1.* subdomain fails) , and also cannot connect a Nighthawk router that has been put into AP mode - it does not seem to get assigned an IP in the 192.168.1.* subdomain, but appears to be sitting out there at 10.0.0.1.

 

Any help you can give me is greatly appreciated!

 

</code>

## Last commit: 2018-05-11 03:53:21 GMT by root
version 12.1X44-D35.5;
system {
host-name JupiterRouter;
time-zone GMT;
root-authentication {
encrypted-password "**********************"; ## SECRET-DATA
}
name-server {
208.67.220.220;
8.8.8.8;
208.67.222.222;
}
name-resolution {
no-resolve-on-input;
}
login {
user fredc {
uid 2000;
class super-user;
authentication {
encrypted-password "*********************"; ## SECR ET-DATA
}
}
}
services {
ssh;
telnet;
web-management {
http {
interface vlan.1;
}
https {
system-generated-certificate;
interface vlan.1;
}
session {
idle-timeout 60;
}
}
dhcp {
pool 192.168.1.0/24 {
address-range low 192.168.1.2 high 192.168.1.254;
name-server {
208.67.220.220;
8.8.8.8;
}
router {
192.168.1.1;
}
}
propagate-settings ge-0/0/0;
}
}
syslog {
archive size 100k files 3;
user * {
any emergency;
}
file messages {
any critical;
authorization info;
}
file interactive-commands {
interactive-commands error;
}
}
max-configurations-on-flash 5;
max-configuration-rollbacks 5;
license {
autoupdate {
url https://ae1.juniper.net/junos/key_retrieval;
}
}
ntp {
server us.ntp.pool.org;
}
}
interfaces {
ge-0/0/0 {
unit 0 {
family inet {
dhcp;
}
}
}
ge-0/0/1 {
unit 0 {
family inet {
address 192.168.1.100/24;
}
}
}
ge-0/0/2 {
unit 0 {
family ethernet-switching {
vlan {
members vlan1;
}
}
}
}
ge-0/0/3 {
unit 0 {
family ethernet-switching {
vlan {
members vlan1;
}
}
}
}
ge-0/0/4 {
unit 0 {
family ethernet-switching {
vlan {
members vlan1;
}
}
}
}
ge-0/0/5 {
unit 0 {
family ethernet-switching {
vlan {
members vlan1;
}
}
}
}
ge-0/0/6 {
unit 0 {
family ethernet-switching {
vlan {
members vlan1;
}
}
}
}
ge-0/0/7 {
unit 0 {
family ethernet-switching {
vlan {
members vlan1;
}
}
}
}
ge-0/0/8 {
unit 0 {
family ethernet-switching {
vlan {
members vlan1;
}
}
}
}
ge-0/0/9 {
unit 0 {
family ethernet-switching {
vlan {
members vlan1;
}
}
}
}
ge-0/0/10 {
unit 0 {
family ethernet-switching {
vlan {
members vlan1;
}
}
}
}
ge-0/0/11 {
unit 0 {
family ethernet-switching {
vlan {
members vlan1;
}
}
}
}
ge-0/0/12 {
unit 0 {
family ethernet-switching {
vlan {
members vlan1;
}
}
}
}
ge-0/0/13 {
unit 0 {
family ethernet-switching {
vlan {
members vlan1;
}
}
}
}
ge-0/0/14 {
unit 0 {
family ethernet-switching {
vlan {
members vlan1;
}
}
}
}
ge-0/0/15 {
unit 0 {
family ethernet-switching {
vlan {
members vlan1;
}
}
}
}
vlan {
unit 1 {
family inet {
address 192.168.1.1/24;
}
}
}
}
protocols {
stp;
}
security {
utm {
utm-policy All_Internet_DMZ {
anti-virus {
http-profile junos-av-defaults;
ftp {
upload-profile junos-av-defaults;
download-profile junos-av-defaults;
}
smtp-profile junos-av-defaults;
pop3-profile junos-av-defaults;
imap-profile junos-av-defaults;
}
##
## Warning: requires 'anti_spam_key_sbl' license
##
anti-spam {
smtp-profile junos-as-defaults;
}
}
utm-policy All_Internet_Internal {
anti-virus {
http-profile junos-av-defaults;
ftp {
upload-profile junos-av-defaults;
download-profile junos-av-defaults;
}
smtp-profile junos-av-defaults;
pop3-profile junos-av-defaults;
imap-profile junos-av-defaults;
}
##
## Warning: requires 'anti_spam_key_sbl' license
##
anti-spam {
smtp-profile junos-as-defaults;
}
}
}
screen {
ids-option untrust-screen {
icmp {
ping-death;
}
ip {
source-route-option;
tear-drop;
}
tcp {
syn-flood {
alarm-threshold 1024;
attack-threshold 200;
source-threshold 1024;
destination-threshold 2048;
timeout 20;
}
land;
}
}
}
nat {
source {
rule-set nsw_srcnat {
from zone [ DMZ Internal ];
to zone Internet;
rule nsw-src-interface {
match {
source-address 0.0.0.0/0;
destination-address 0.0.0.0/0;
}
then {
source-nat {
interface;
}
}
}
}
}
}
policies {
from-zone Internet to-zone DMZ {
policy All_Internet_DMZ {
match {
source-address any;
destination-address any;
application any;
}
then {
permit {
application-services {
utm-policy All_Internet_DMZ;
}
}
}
}
}
from-zone DMZ to-zone Internet {
policy All_Internet_DMZ {
match {
source-address any;
destination-address any;
application any;
}
then {
permit {
application-services {
utm-policy All_Internet_DMZ;
}
}
}
}
}
from-zone Internet to-zone Internal {
policy All_Internet_Internal {
match {
source-address any;
destination-address any;
application any;
}
then {
permit {
application-services {
utm-policy All_Internet_Internal;
}
}
}
}
}
from-zone Internal to-zone Internet {
policy All_Internet_Internal {
match {
source-address any;
destination-address any;
application any;
}
then {
permit {
application-services {
utm-policy All_Internet_Internal;
}
}
}
}
}
from-zone Internal to-zone DMZ {
policy All_Internal_DMZ {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}
}
}
from-zone DMZ to-zone Internal {
policy All_Internal_DMZ {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}
}
}
}
zones {
security-zone Internal {
host-inbound-traffic {
system-services {
all;
}
protocols {
all;
}
}
interfaces {
vlan.1 {
host-inbound-traffic {
system-services {
ping;
dhcp;
http;
https;
ssh;
telnet;
}
protocols {
all;
}
}
}
}
}
security-zone DMZ {
interfaces {
ge-0/0/1.0 {
host-inbound-traffic {
system-services {
ping;
}
}
}
}
}
security-zone Internet {
host-inbound-traffic {
system-services {
all;
}
protocols {
all;
}
}
interfaces {
ge-0/0/0.0 {
host-inbound-traffic {
system-services {
all;
}
protocols {
all;
}
}
}
}
}
}
}
vlans {
vlan1 {
vlan-id 3;
l3-interface vlan.1;
}
}

</code>


Viewing all articles
Browse latest Browse all 17645

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>