11-03-2010 07:08 AM
I am new to the forum, but I did search for a few days and haven't seen anything like this.
My situation is as follows:
SSG-550M with ScreenOS 6.2.0r7.0
Public IP range (ex. 188.8.131.52/24) - Gateway is 184.108.40.206 - NAT is strictly prohibitted. All devices must have registered, routeable (Public) IP addresses.
I tried to set the Untrust interface as 220.127.116.11 and the Trust interface as 18.104.22.168 but received the overlapping subnet error. I tried the "Set interface [interface] no-subnet-conflict-check" command on both eth0/0 and eth0/2 but apparently it is not a known keyword in this version.
I have also tried to set the eth0/0 as 192.168.1.1 and installed another SSG-550M with its eth0/2 address as 192.168.1.5 and the eth0/0 address as 22.214.171.124. Set the default routes to 192.168.1.1 on the 2nd firewall and 126.96.36.199 on the 1st firewall.
For testing purposes I set both devices to allow ANY address, ANY port and ANY service in and out. No devices behind the firewall can get to the internet. I am not sure, but I would venture to guess that no devices upstream can get to me either.
I would greatly appreceiate any assistance in getting this to work.
Solved! Go to Solution.
11-03-2010 07:19 AM
If you are not allowed to do NAT, I would put the firewall into layer-2 (transparent) mode. There is quite a good deal of information in the user guide about transparent mode, but the basic steps are to put all of the physical interfaces into L2 security zones, and then reboot the device. Once that is done, the box will be running in transparent mode.
11-03-2010 09:49 AM - edited 11-03-2010 09:56 AM
Google is your friend, but here's one manual: http://www.debianadmin.com/howto-set-netscreen-ssg-model-firewall-into-transparent-mode.html
Other option is that you could ask your operator to route that public network with other small network. Which you will use as link-network and then you can set public addresses in your LAN-port -voila!
11-04-2010 01:09 AM
Network overlapping is possible and this works fine. But it should be configured on the VR and not on the interfaces:
set vrouter <name> ignore-subnet-conflict
Sure, both interfaces with overlapping addressing should be mapped to the same VR.
You can also try to configure Untrust interface with a private IP and create a proxy arp entry on this interface: set interface interface proxy-arp-entry 188.8.131.52. 184.108.40.206 . The FW will be responding the ARP requests from the router for these IPs.
Additionally you need a static arp entry for the ISP router's IP: set arp ip_addr mac_addr interface. Otherwise the FW will not be able to find it's default gateway.
I did not test this solution but it should work.
But the best solution would be to change addressing both on the FW and ISP router, provided that your ISP is flexible enough.
What I would not recommend is switching to the transparent mode. This is a different world full of limitations and bad surprices. I only use the L2 if the FW must be put into the middle of an existing and complex productive infrastructure.
11-04-2010 03:11 AM
Thank you all for your assistance. My Basic guide never mentioned transparent mode.
@Edouard - I have no control on the premise router and like you said, that is exactly why I needed to put the FW in L2 in line between it and my network.
11-04-2010 03:44 AM
This control is not required if the first solution (set vrouter <name> ignore-subnet-conflict) is used. But if you have already switched to the L2 mode it's OK.