Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Juniper srx Firewall NAT configuration

2025-03-14 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

1. Basic operation instructions:

1. Equipment resumes ex-factory

Root# load factory-default

Root# set system root-authentication plain-text-password

Root# commit

Root > request system reboot

2. Basic configuration

2.1 configure Hostname

Root# set system host-name SRX1400

2.2 set time zone

Root@SRX1400# set system time-zoneAsia/Shanghai

2.3 setting time

Root@SRX1400# run set date 201508011549.21

2.4Setting dns

Root@SRX1400# set system name-server202.l06.0.20

2.5 set the interface IP

Root@SRX1400# set interfaces ge-0/0/0 unit0 family inet address 10.0.0.10/24

2.6 set default rout

Root@SRX1400# set routing-options staticroute 0.0.0.0/0 next-hop 10.0.0.254

2.7 create a login user

Root@SRX1400# set system login user adminclass super-user authentication plain-text-password

2.8Create secure Zone

Root@SRX1400# set security zonessecurity-zone untrust

2.9 API to join zone

Root@SRX1400# set security zones security-zoneuntrust interfaces ge-0/0/0.0

2.10 Service Port release icmp

Root@SRX1400#set security zones security-zone untrust interfaces ge-0/0/0.0 host-inbound-traffic system-services ping

Note: by default, the business port other than the management port cannot ping, so you need to release icmp.

II. Juniper srx nat

1. Type of NAT

1.1 source nat: interface

1.2 source nat: pool

1.3 destination nat

1.4 static nat

2. Configure the instance

2.1 Interface-based source nat

Root@SRX1400# set security nat sourcerule-set 1 from zone trust

Root@SRX1400# set security nat sourcerule-set 1 to zone untrust

Root@SRX1400# set security nat sourcerule-set 1 rule rule1 match source-address 0.0.0.0/0 destination-address 0.0.0.0/0

Root@SRX1400# set security nat sourcerule-set 1 rule rule1 then source-nat interface

Default police

Policy default-permit {

Match {

Source-address any

Destination-address any

Application any

}

Then {

Permit

}

}

2.2 source nat based on address pool

Root@SRX1400# set security nat source poolisp address 10.0.0.20 to 10.0.30

Root@SRX1400# set security nat sourcerule-set 1 from zone trust

Root@SRX1400# set security nat sourcerule-set 1 to zone untrust

Root@SRX1400# set security nat sourcerule-set 1 rule rule1 match source-address 0.0.0.0/0 destination-address 0.0.0.0/0

Root@SRX1400# set security nat sourcerule-set 1 rule rule1 then source-nat pool isp

Root@SRX1400# set security nat proxy-arpinterface ge-0/0/0 address 10.0.0.20 to 10.0.0.30

2.3 destination nat configuration

Root@SRX1400# set security nat destinationpool dst-nat-pool-1 address 172.16.1.1/32

Root@SRX1400# set security nat destinationpool dst-nat-pool-1 address port 80

Root@SRX1400# set security nat destinationrule-set rs1 from zone untrust

Root@SRX1400# set security nat destinationrule-set rs1 rule 1 match destination-address 10.0.0.100/32

Root@SRX1400# set security nat destinationpool dst-nat-pool-1 address port 80

Root@SRX1400# set security nat proxy-arpinterface ge-0/0/0.0 address 10.0.0.100/32

Root@SRX1400# set security address-bookglobal address web 172.16.1.1/32

Root@SRX1400# set security nat destinationrule-set rs1 rule 1 then destination-nat pool dst-nat-pool-1

Root@SRX1400# set security policiesfrom-zone untrust to-zone trust policy web match source-address any

Root@SRX1400# set security policiesfrom-zone untrust to-zone trust policy web match destination-address web match application any

Root@SRX1400# set security policiesfrom-zone untrust to-zone trust policy

Root@SRX1400# set security policiesfrom-zone untrust to-zone trust policy web then permit

Root@SRX1400# insert security policiesfrom-zone untrust to-zone trust policy web before policy default-deny

2.4 static nat configuration

Root@SRX1400# set security nat staticrule-set rs1 from zone untrust

Root@SRX1400# set security nat staticrule-set rs1 rule r1 match destination-address 10.0.0.100/32

Root@SRX1400# set security nat staticrule-set rs1 rule r1 then static-nat prefix 172.16.1.1/32

Root@SRX1400# set security nat proxy-arpinterface ge-0/0/0.0 address 10.0.0.100/32

Root@SRX1400# set security address-bookglobal address web 172.16.1.1/32

Root@SRX1400# set security policiesfrom-zone untrust to-zone untrust web match source-address any destination-addressweb application any

Root@SRX1400# set security policiesfrom-zone untrust to-zone trust policy web then permit

Root@SRX1400# insert security policiesfrom-zone untrust to-zone trust web before policy default-deny

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report