Hello everyone,
I'm trying to configure my first srx, and I'm stuck with one problem - I can't reach the internet from my LAN... I can access everything internaly (everything on my IP range) but nothing outside my network. I think that I'm missing something in my config because i can reach the internet from my srx so something is not correct or I'm not allowing something.
Could you possibly check my config and advise me what I need to do to make it work?
Many thanks
My config:
## Last changed: 2015-04-06 22:09:53 BST
version 12.1X44-D35.5;
system {
host-name srx;
time-zone Europe/London;
root-authentication {
encrypted-password "******************************"; ## SECRET-DATA
}
name-server {
208.67.222.222;
208.67.220.220;
}
login {
user access {
uid 2000;
class super-user;
authentication {
encrypted-password "*********************"; ## SECRET-DATA
}
}
}
services {
ssh;
telnet;
xnm-clear-text;
web-management {
http {
interface vlan.0;
}
https {
system-generated-certificate;
interface [ vlan.0 ge-0/0/1.0 ];
}
}
}
syslog {
archive size 100k files 3;
user * {
any emergency;
}
file messages {
any critical;
authorization info;
}
file interactive-commands {
interactive-commands error;
}
}
max-configurations-on-flash 5;
max-configuration-rollbacks 5;
license {
autoupdate {
url https://ae1.juniper.net/junos/key_retrieval;
}
}
ntp {
server 176.58.109.199;
}
}
interfaces {
ge-0/0/0 {
description internet;
unit 0 {
family inet {
address 5.2*.***.54/29;
}
}
}
ge-0/0/1 {
description lan;
unit 0 {
family inet {
address 10.0.1.1/24;
}
}
}
ge-0/0/2 {
description DMZ;
unit 0 {
family inet {
address 10.0.2.1/24;
}
}
}
vlan {
unit 0 {
family inet {
address 192.168.1.1/24;
}
}
}
}
routing-options {
static {
route 0.0.0.0/0 next-hop 5.2*.***.53;
}
}
protocols {
stp;
}
security {
screen {
ids-option untrust-screen {
icmp {
ping-death;
}
ip {
source-route-option;
tear-drop;
}
tcp {
syn-flood {
alarm-threshold 1024;
attack-threshold 200;
source-threshold 1024;
destination-threshold 2048;
timeout 20;
}
land;
}
}
}
nat {
source {
rule-set trust-to-untrust {
from zone trust;
to zone untrust;
rule source-nat-rule {
match {
source-address 0.0.0.0/0;
}
then {
source-nat {
interface;
}
}
}
}
rule-set lan-to-internet {
from zone lan;
to zone internet;
rule lan-to-internet-r1 {
match {
source-address 0.0.0.0/0;
}
then {
source-nat {
interface;
}
}
}
}
rule-set dmz-to-internet {
from zone DMZ;
to zone internet;
rule dmz-to-internet-r1 {
match {
source-address 0.0.0.0/0;
}
then {
source-nat {
interface;
}
}
}
}
}
proxy-arp {
interface ge-0/0/0.0 {
address {
5.2*.***.55/32;
5.2*.***.56/32;
5.2*.***.57/32;
}
}
}
}
policies {
from-zone trust to-zone untrust {
policy trust-to-untrust {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}
}
}
}
zones {
security-zone trust {
host-inbound-traffic {
system-services {
all;
}
protocols {
all;
}
}
interfaces {
vlan.0;
}
}
security-zone untrust {
screen untrust-screen;
}
security-zone internet {
interfaces {
ge-0/0/0.0;
}
}
security-zone lan {
host-inbound-traffic {
system-services {
all;
}
protocols {
all;
}
}
interfaces {
ge-0/0/1.0;
}
}
security-zone DMZ {
interfaces {
ge-0/0/2.0;
}
}
}
}
vlans {
vlan-trust {
vlan-id 3;
l3-interface vlan.0;
}
}