Quantcast
Channel: All SRX Services Gateway posts
Viewing all articles
Browse latest Browse all 17645

Query abaut 2 ISP actives with SNAT and DNAT rules and failover

$
0
0

Hi guys, I need to guide me...

I have this scenary:

JPasd.jpeg

 

Topology Assumptions

TASA zone ge-0/0/0: 200.55.93.210/29, 200.55.93.211/29, 200.55.93.212/29, 200.55.93.211/29
IPLAN zone ge-0/0/1: 200.61.125.149/24, 200.61.153.149/24, 200.61.125.154/24, 200.61.125.156/24, 200.61.125.222/24, 
DMZ zone ge-0/0/2: 172.16.0.254/24

TASA zone gateway: 200.55.93.209
IPLAN zone gateway: 200.61.125.254

 

DMZ/PROXY is a proxy web server w/auth

DMZ/RELAY is a mail relay server

DMZ/REVERSO is a http reverse proxy

DMZ/WEBSRV is a web server

DMZ/APPSRV is a multiple application server



Requirements

  • DMZ/WEBSRV should egress out TASA/200.55.93.210 with source-nat. Failover IPLAN/200.61.125.149
  • DMZ/RELAY should egress out TASA/200.55.93.211 with source-nat. Failover IPLAN/200.61.125.153
  • DMZ/PROXY should egress out TASA/200.55.93.212 with source-nat. Failover IPLAN/200.61.125.154
  • DMZ/REVERSO should egress out TASA/200.55.93.213 with source-nat. Failover IPLAN/200.61.125.156
  • DMZ/APPSRV should egress out IPLAN/200.61.125.222 with source-nat. No Failover
  • If TASA interface goes down, then DMZ zones should egress out IPLAN instead with source-nat.
  • If TASA interface returns, then DMZ zones should revert back to using TASA again.
  • TASA must allow destination NAT for:
    DMZ/WEBSRV ports 80, 443 tcp from TASA/200.55.93.210. Same rules from IPLAN/200.61.125.149
    DMZ/RELAY ports 25, 80, 143, 445, 587 tcp from TASA/200.55.93.211. Same rules from IPLAN/200.61.125.153
    DMZ/PROXY port 1194 udp from TASA/200.55.93.212. Same rules from IPLAN/200.61.125.156
    DMZ/REVERSO port 53 udp/tcp and 80, 443 tcp from TASA/200.55.93.213. Same rules from IPLAN/200.61.125.153
    DMZ/APPSRV ports 25, 80, 143 tcp and 53 udp/tcp from IPLAN/200.61.125.222. No other ISP incomming.
  • When both ISPs are up, destination NAT addresses should be available from both ISPs for both servers.
  • I don't require Load Balance, but if used, out rules must be respected.

 


I have this configuration:

------------------------------------------------------------------------------------------------

### Iface config
set interfaces ge-0/0/0 description "TASA"
set interfaces ge-0/0/0 unit 0 family inet address 200.55.93.210/29
set interfaces ge-0/0/0 unit 0 family inet address 200.55.93.211/29
set interfaces ge-0/0/0 unit 0 family inet address 200.55.93.212/29
set interfaces ge-0/0/0 unit 0 family inet address 200.55.93.213/29
set interfaces ge-0/0/1 description "IPLAN"
set interfaces ge-0/0/1 unit 0 family inet address 200.61.125.149/24
set interfaces ge-0/0/1 unit 0 family inet address 200.61.125.153/24
set interfaces ge-0/0/1 unit 0 family inet address 200.61.125.154/24
set interfaces ge-0/0/1 unit 0 family inet address 200.61.125.156/24
set interfaces ge-0/0/1 unit 0 family inet address 200.61.125.222/24
set interfaces ge-0/0/2 description "DMZ"
set interfaces ge-0/0/2 unit 0 family inet address 172.16.0.254/24

### Static Route with preference
set routing-options static route 0.0.0.0/0 next-hop 200.55.93.209 preference 5
set routing-options static route 0.0.0.0/0 qualified-next-hop 200.61.125.254 preference 7

### Addresses books
set security zones security-zone DMZ address-book address APPSRV 172.16.0.57/32
set security zones security-zone DMZ address-book address PROXY 172.16.0.253/32
set security zones security-zone DMZ address-book address WEBSRV 172.16.0.1/32
set security zones security-zone DMZ address-book address REVERSO 172.16.0.250/32
set security zones security-zone DMZ address-book address RELAY 172.16.0.251/32


### Security Nat pool for TASA
set security nat source pool IP210 address 200.55.93.210/32
set security nat source pool IP211 address 200.55.93.211/32
set security nat source pool IP212 address 200.55.93.212/32
set security nat source pool IP213 address 200.55.93.213/32

### Security Nat pool for IPLAN
set security nat source pool IP149 address 200.61.125.149/32
set security nat source pool IP153 address 200.61.125.153/32
set security nat source pool IP154 address 200.61.125.154/32
set security nat source pool IP156 address 200.61.125.156/32
set security nat source pool IP222 address 200.61.125.222/32

### Set security zones
set security zones security-zone TASA interfaces ge-0/0/0.0
set security zones security-zone IPLAN interfaces ge-0/0/1.0
set security zones security-zone DMZ interfaces ge-0/0/2.0

### Set rule set DMZ to TASA
set security nat source rule-set DMZ-to-TASA from zone DMZ
set security nat source rule-set DMZ-to-TASA to zone TASA

### Set rule set DMZ to IPLAN
set security nat source rule-set DMZ-to-IPLAN from zone DMZ
set security nat source rule-set DMZ-to-IPLAN to zone IPLAN

### Seteo rule set egress out TASA
set security nat source rule-set DMZ-to-TASA rule R-IP211 match source-address 172.16.0.250/32
set security nat source rule-set DMZ-to-TASA rule R-IP211 match destination-address 0.0.0.0/0
set security nat source rule-set DMZ-to-TASA rule R-IP211 then source-nat pool IP211
set security nat source rule-set DMZ-to-TASA rule R-IP211 match source-address 172.16.0.251/32
set security nat source rule-set DMZ-to-TASA rule R-IP211 match destination-address 0.0.0.0/0
set security nat source rule-set DMZ-to-TASA rule R-IP211 then source-nat pool IP211
set security nat source rule-set DMZ-to-TASA rule R-IP212 match source-address 172.16.0.253/32
set security nat source rule-set DMZ-to-TASA rule R-IP212 match destination-address 0.0.0.0/0
set security nat source rule-set DMZ-to-TASA rule R-IP212 then source-nat pool IP212

### Set rule set egress out IPLAN
set security nat source rule-set DMZ-to-IPLAN rule R-IP222 match source-address 172.16.0.56/32
set security nat source rule-set DMZ-to-IPLAN rule R-IP222 match destination-address 0.0.0.0/0
set security nat source rule-set DMZ-to-IPLAN rule R-IP222 then source-nat pool IP222

### Security Policy from DMZ to TASA:
# RELAY
set security policies from-zone DMZ to-zone TASA policy permit-RELAY match source-address RELAY
set security policies from-zone DMZ to-zone TASA policy permit-RELAY match destination-address any
set security policies from-zone DMZ to-zone TASA policy permit-RELAY match application junos-dns-tcp
set security policies from-zone DMZ to-zone TASA policy permit-RELAY match application junos-dns-udp
set security policies from-zone DMZ to-zone TASA policy permit-RELAY match application junos-http
set security policies from-zone DMZ to-zone TASA policy permit-RELAY match application junos-https
set security policies from-zone DMZ to-zone TASA policy permit-RELAY match application junos-ping
set security policies from-zone DMZ to-zone TASA policy permit-RELAY match application junos-mail
set security policies from-zone DMZ to-zone TASA policy permit-RELAY then permit

# REVERSO
set security policies from-zone DMZ to-zone TASA policy permit-REVERSO match source-address REVERSO
set security policies from-zone DMZ to-zone TASA policy permit-REVERSO match destination-address any
set security policies from-zone DMZ to-zone TASA policy permit-REVERSO match application junos-dns-tcp
set security policies from-zone DMZ to-zone TASA policy permit-REVERSO match application junos-dns-udp
set security policies from-zone DMZ to-zone TASA policy permit-REVERSO match application junos-http
set security policies from-zone DMZ to-zone TASA policy permit-REVERSO match application junos-https
set security policies from-zone DMZ to-zone TASA policy permit-REVERSO match application junos-ping
set security policies from-zone DMZ to-zone TASA policy permit-REVERSO then permit


# PROXY
set applications application custom-rdp term TCP protocol tcp
set applications application custom-rdp term TCP destination-port 3389

set security policies from-zone DMZ to-zone TASA policy permit-PROXY match source-address PROXY
set security policies from-zone DMZ to-zone TASA policy permit-PROXY match destination-address any
set security policies from-zone DMZ to-zone TASA policy permit-PROXY match application junos-dns-tcp
set security policies from-zone DMZ to-zone TASA policy permit-PROXY match application junos-dns-udp
set security policies from-zone DMZ to-zone TASA policy permit-PROXY match application junos-http
set security policies from-zone DMZ to-zone TASA policy permit-PROXY match application junos-https
set security policies from-zone DMZ to-zone TASA policy permit-PROXY match application junos-ping
set security policies from-zone DMZ to-zone TASA policy permit-PROXY match application custom-ssh
set security policies from-zone DMZ to-zone TASA policy permit-PROXY then permit

 

### Security policy from DMZ to IPLAN:
set security policies from-zone DMZ to-zone IPLAN policy permit-APPSRV match source-address APPSRV
set security policies from-zone DMZ to-zone IPLAN policy permit-APPSRV match destination-address any
set security policies from-zone DMZ to-zone IPLAN policy permit-APPSRV match application junos-dns-tcp
set security policies from-zone DMZ to-zone IPLAN policy permit-APPSRV match application junos-dns-udp
set security policies from-zone DMZ to-zone IPLAN policy permit-APPSRV match application junos-http
set security policies from-zone DMZ to-zone IPLAN policy permit-APPSRV match application junos-https
set security policies from-zone DMZ to-zone IPLAN policy permit-APPSRV match application junos-ping
set security policies from-zone DMZ to-zone IPLAN policy permit-APPSRV then permit


### DNAT OpenVPN to PROXY
# Set custom app
set applications application custom-ovpn term UDP protocol udp
set applications application custom-ovpn term UDP destination-port 1194

# DNAT Pool
set security nat destination pool DNATPOOL-PROXY-OVPN address 172.16.0.253/32
set security nat destination pool DNATPOOL-PROXY-OVPN address port 1194

# DNAT rule
set security nat destination rule-set DNAT-FROM-TASA from zone TASA
set security nat destination rule-set DNAT-FROM-TASA rule R-PROXY-OVPN match destination-address 200.55.93.213/32
set security nat destination rule-set DNAT-FROM-TASA rule R-PROXY-OVPN match destination-port 1194
set security nat destination rule-set DNAT-FROM-TASA rule R-PROXY-OVPN match protocol udp
set security nat destination rule-set DNAT-FROM-TASA rule R-PROXY-OVPN then destination-nat pool DNATPOOL-PROXY-OVPN

# Security Polices
set security policies from-zone TASA to-zone DMZ policy TASA-to-DMZ match source-address any
set security policies from-zone TASA to-zone DMZ policy TASA-to-DMZ match destination-address PROXY
set security policies from-zone TASA to-zone DMZ policy TASA-to-DMZ match application custom-ovpn
set security policies from-zone TASA to-zone DMZ policy TASA-to-DMZ then permit


### DNAT OpenVPN to WEBSRV
# DNAT Pool
set security nat destination pool DNATPOOL-WEBSRV address 172.16.0.1/32
set security nat destination pool DNATPOOL-WEBSRV address port 80

# DNAT rule
set security nat destination rule-set DNAT-FROM-TASA from zone TASA
set security nat destination rule-set DNAT-FROM-TASA rule R-WEBSRV match destination-address 200.55.93.212/32
set security nat destination rule-set DNAT-FROM-TASA rule R-WEBSRV match destination-port 80
set security nat destination rule-set DNAT-FROM-TASA rule R-WEBSRV match protocol tcp
set security nat destination rule-set DNAT-FROM-TASA rule R-WEBSRV then destination-nat pool DNATPOOL-WEBSRV

# Security Polices
set security policies from-zone TASA to-zone DMZ policy TASA-to-DMZ match source-address any
set security policies from-zone TASA to-zone DMZ policy TASA-to-DMZ match destination-address WEBSRV
set security policies from-zone TASA to-zone DMZ policy TASA-to-DMZ match application junos-http
set security policies from-zone TASA to-zone DMZ policy TASA-to-DMZ then permit


### DNAT OpenVPN to WEBSRV
# DNAT Pool
set security nat destination pool DNATPOOL-APPSRV address 172.16.0.56/32
set security nat destination pool DNATPOOL-APPSRV address port 80

# DNAT rule
set security nat destination rule-set DNAT-FROM-IPLAN from zone IPLAN
set security nat destination rule-set DNAT-FROM-IPLAN rule R-APPSRV match destination-address 200.51.125.222/32
set security nat destination rule-set DNAT-FROM-IPLAN rule R-APPSRV match destination-port 80
set security nat destination rule-set DNAT-FROM-IPLAN rule R-APPSRV match protocol tcp
set security nat destination rule-set DNAT-FROM-IPLAN rule R-APPSRV then destination-nat pool DNATPOOL-APPSRV

# Security Polices
set security policies from-zone IPLAN to-zone DMZ policy IPLAN-to-DMZ match source-address any
set security policies from-zone IPLAN to-zone DMZ policy IPLAN-to-DMZ match destination-address WEBSRV
set security policies from-zone IPLAN to-zone DMZ policy IPLAN-to-DMZ match application junos-http
set security policies from-zone IPLAN to-zone DMZ policy IPLAN-to-DMZ then permit

(...)
------------------------------- AND OTHER RULES -----------------------------------


What should I do? I was reading about Virtual Router and Routing Instances with FBF, but I'm not sure what I should do!

Tanks 4 the help! Smiley Happy
 

 

 

 


Viewing all articles
Browse latest Browse all 17645

Latest Images

Trending Articles



Latest Images

<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>