Hi everybody,
I'm new to juniper environment, i'm actually deploying an SRX240H2 and i have a tiny issue which annoy me a lot.
Let me show you first my environment, i have 1 connected adress block ( xxx.11.132.8/30 ) & 1 assigned public ip block (
xxx.43.224.0/27 ), everything works fine except that when i'm "surfing" my detected public ip adress is actually my getaway and not one of my assigned ip block.
I dont need any private lan behind my srx just need him to act like a switch and not like a proxy.
I'm sure it's a tiny detail, if anyone can help me on this, i would appreciate.
Regards,
--
## Last changed: 2014-03-03 15:45:10 UTC
version 11.4R9.4;
system {
host-name j-cf9-co;
root-authentication {
encrypted-password « -« ; ## SECRET-DATA
}
name-server {
xx;
xx;
}
services {
ssh;
telnet;
xnm-clear-text;
web-management {
http {
interface [ vlan.0 vlan.4 ];
}
https {
system-generated-certificate;
interface [ vlan.0 vlan.4 ];
}
}
dhcp {
name-server {
xx;
xx;
}
pool 192.168.1.0/24 {
address-range low 192.168.1.2 high 192.168.1.254;
router {
192.168.1.1;
}
}
pool xx.43.224.0/27 {
address-range low xx.43.224.2 high xx.43.224.30;
router {
xx.43.224.1;
}
}
static-binding e0:2f:6d:75:32:2a {
fixed-address {
xx.43.224.2;
}
name-server {
xx;
xx;
}
router {
xx.43.224.1;
}
}
}
}
syslog {
archive size 100k files 3;
user * {
any emergency;
}
file messages {
any critical;
authorization info;
}
file interactive-commands {
interactive-commands error;
}
}
max-configurations-on-flash 5;
max-configuration-rollbacks 5;
license {
autoupdate {
url https://ae1.juniper.net/junos/key_retrieval;
}
}
}
interfaces {
ge-0/0/0 {
unit 0 {
family ethernet-switching {
vlan {
members wiz-vlan-4;
}
}
}
}
ge-0/0/1 {
unit 0 {
family ethernet-switching {
vlan {
members wiz-vlan-4;
}
}
}
}
ge-0/0/2 {
unit 0 {
family ethernet-switching {
vlan {
members wiz-vlan-4;
}
}
}
}
ge-0/0/3 {
unit 0 {
family ethernet-switching {
vlan {
members wiz-vlan-4;
}
}
}
}
ge-0/0/4 {
unit 0 {
family ethernet-switching {
vlan {
members wiz-vlan-4;
}
}
}
}
ge-0/0/5 {
unit 0 {
family ethernet-switching {
vlan {
members wiz-vlan-4;
}
}
}
}
ge-0/0/6 {
unit 0 {
family ethernet-switching {
vlan {
members wiz-vlan-4;
}
}
}
}
ge-0/0/7 {
unit 0 {
family ethernet-switching {
vlan {
members wiz-vlan-4;
}
}
}
}
ge-0/0/8 {
unit 0 {
family ethernet-switching {
vlan {
members wiz-vlan-4;
}
}
}
}
ge-0/0/9 {
unit 0 {
family ethernet-switching {
vlan {
members wiz-vlan-4;
}
}
}
}
ge-0/0/10 {
unit 0 {
family ethernet-switching {
vlan {
members wiz-vlan-4;
}
}
}
}
ge-0/0/11 {
unit 0 {
family ethernet-switching {
vlan {
members wiz-vlan-4;
}
}
}
}
ge-0/0/12 {
unit 0 {
family ethernet-switching {
vlan {
members wiz-vlan-4;
}
}
}
}
ge-0/0/13 {
unit 0 {
family ethernet-switching {
vlan {
members wiz-vlan-4;
}
}
}
}
ge-0/0/14 {
unit 0 {
family ethernet-switching {
vlan {
members wiz-vlan-4;
}
}
}
}
ge-0/0/15 {
unit 0 {
family ethernet-switching {
vlan {
members vlan-trust;
}
}
}
}
ge-4/0/0 {
unit 0 {
family inet {
address xx.11.132.10/30;
}
}
}
vlan {
unit 0 {
family inet {
address 192.168.1.1/24;
}
}
unit 4 {
family inet {
address xx.43.224.1/27;
}
}
}
}
routing-options {
static {
route 0.0.0.0/0 next-hop xx.11.132.9;
}
}
protocols {
stp;
}
security {
screen {
ids-option untrust-screen {
icmp {
ping-death;
}
ip {
source-route-option;
tear-drop;
}
tcp {
syn-flood {
alarm-threshold 1024;
attack-threshold 200;
source-threshold 1024;
destination-threshold 2048;
timeout 20;
}
land;
}
}
}
nat {
source {
rule-set trust-to-untrust {
from zone trust;
to zone untrust;
rule source-nat-rule {
match {
source-address 0.0.0.0/0;
}
then {
source-nat {
interface;
}
}
}
}
}
}
policies {
from-zone trust to-zone untrust {
policy trust-to-untrust {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}
}
}
from-zone untrust to-zone trust {
policy untrust-to-trust {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}
}
}
}
zones {
security-zone trust {
host-inbound-traffic {
system-services {
all;
}
protocols {
all;
}
}
interfaces {
vlan.4;
vlan.0;
}
}
security-zone untrust {
screen untrust-screen;
host-inbound-traffic {
system-services {
all;
}
protocols {
all;
}
}
interfaces {
ge-4/0/0.0;
}
}
}
}
vlans {
vlan-trust {
vlan-id 3;
l3-interface vlan.0;
}
wiz-vlan-4 {
vlan-id 4;
l3-interface vlan.4;
}
}