Screen OS

last person joined: 8 months ago 

This is a legacy community with limited Juniper monitoring.
  • 1.  SSG5 VIP Access to Multiple Subnets

    Posted 03-11-2014 09:21

    I've deployed an SSG5 with 3 routed subnets in the Trust zone (x.x.1.0, x.x.20.0, x.x.101.0). I created several VIP services on the public interface in the Untrust zone and created a policy that allows that traffic from the UnTrust to the Trust zone. VIP services that are located in the x.x.20.0 subnet work as advertised. The one VIP service that points to x.x.101.0 does not work.

    The SSG5 is the default gateway for all IPs in all subnets. I can ping all resources in the Trust zone so IntraZone routing is functioning. What have I missed, or misunderstood about VIP Services? The failing VIP Service is Custom_RDP below.

     

    My Configuration for reference:

     

    unset key protection enable
    set clock timezone 0
    set vrouter trust-vr sharable
    set vrouter "untrust-vr"
    exit
    set vrouter "trust-vr"
    unset auto-route-export
    exit
    set service "Custom_RDP" protocol tcp src-port 38339-38339 dst-port 38339-38339
    set alg appleichat enable
    unset alg appleichat re-assembly enable
    set alg sctp enable
    set auth-server "Local" id 0
    set auth-server "Local" server-name "Local"
    set auth default auth server "Local"
    set auth radius accounting port 1646
    set admin name "administrator"
    set admin password --exluded pwd intentionally
    set admin port 8080
    set admin http redirect
    set admin auth web timeout 10
    set admin auth dial-in timeout 3
    set admin auth server "Local"
    set admin format dos
    set zone "Trust" vrouter "trust-vr"
    set zone "Untrust" vrouter "trust-vr"
    set zone "DMZ" vrouter "trust-vr"
    set zone "VLAN" vrouter "trust-vr"
    set zone "Untrust-Tun" vrouter "trust-vr"
    set zone "Trust" tcp-rst
    set zone "Untrust" block
    unset zone "Untrust" tcp-rst
    set zone "MGT" block
    unset zone "V1-Trust" tcp-rst
    unset zone "V1-Untrust" tcp-rst
    set zone "DMZ" tcp-rst
    unset zone "V1-DMZ" tcp-rst
    unset zone "VLAN" tcp-rst
    set zone "Untrust" screen tear-drop
    set zone "Untrust" screen syn-flood
    set zone "Untrust" screen ping-death
    set zone "Untrust" screen ip-filter-src
    set zone "Untrust" screen land
    set zone "V1-Untrust" screen tear-drop
    set zone "V1-Untrust" screen syn-flood
    set zone "V1-Untrust" screen ping-death
    set zone "V1-Untrust" screen ip-filter-src
    set zone "V1-Untrust" screen land
    set interface "ethernet0/0" zone "Untrust"
    set interface "ethernet0/1" zone "DMZ"
    set interface "bgroup0" zone "Trust"
    set interface "bgroup1" zone "Trust"
    set interface "bgroup2" zone "Trust"
    set interface bgroup1 port ethernet0/2
    set interface bgroup0 port ethernet0/3
    set interface bgroup0 port ethernet0/4
    set interface bgroup0 port ethernet0/5
    set interface bgroup2 port ethernet0/6
    unset interface vlan1 ip
    set interface ethernet0/0 ip 70.89.210.169/29
    set interface ethernet0/0 route
    set interface bgroup0 ip 192.168.1.1/24
    set interface bgroup0 nat
    set interface bgroup1 ip 192.168.20.254/24
    set interface bgroup1 nat
    set interface bgroup2 ip 192.168.101.254/24
    set interface bgroup2 nat
    unset interface vlan1 bypass-others-ipsec
    unset interface vlan1 bypass-non-ip
    set interface ethernet0/0 ip manageable
    set interface bgroup0 ip manageable
    set interface bgroup1 ip manageable
    set interface bgroup2 ip manageable
    set interface ethernet0/0 manage ping
    set interface bgroup0 manage mtrace
    unset interface bgroup2 manage ssh
    unset interface bgroup2 manage telnet
    unset interface bgroup2 manage snmp
    unset interface bgroup2 manage ssl
    set interface ethernet0/0 vip interface-ip 25 "MAIL" 192.168.20.241
    set interface ethernet0/0 vip interface-ip 80 "HTTP" 192.168.20.235
    set interface ethernet0/0 vip interface-ip 443 "HTTPS" 192.168.20.235
    set interface ethernet0/0 vip interface-ip 143 "IMAP" 192.168.20.235
    set interface ethernet0/0 vip interface-ip 38339 "Custom_RDP" 192.168.101.251
    set interface ethernet0/0 vip interface-ip 21 "FTP" 192.168.20.253
    set interface "serial0/0" modem settings "USR" init "AT&F"
    set interface "serial0/0" modem settings "USR" active
    set interface "serial0/0" modem speed 115200
    set interface "serial0/0" modem retry 3
    set interface "serial0/0" modem interval 10
    set interface "serial0/0" modem idle-time 10
    set flow tcp-mss
    unset flow tcp-syn-check
    unset flow tcp-syn-bit-check
    set flow reverse-route clear-text prefer
    set flow reverse-route tunnel always
    set pki authority default scep mode "auto"
    set pki x509 default cert-path partial
    set address "Trust" "Classroom_NET" 192.168.101.0 255.255.255.0 "Classroom Subnet"
    set address "Trust" "Corp_NET" 192.168.20.0 255.255.255.0 "Corporate Subnet"
    set address "Trust" "gfiMailFilter" 192.168.20.241 255.255.255.255 "Pluto Server "
    set ippool "vpnclient" 192.168.21.1 192.168.21.25
    set user "robr" uid 2
    set user "robr" type xauth
    set user "robr" password "uhz2SXwRNGlf6isikdCXTBsK2enR+ekGqQ=="
    unset user "robr" type auth
    set user "robr" "enable"
    set user "vpnclient_ph1id" uid 1
    set user "vpnclient_ph1id" ike-id fqdn "client.nhspokane.com" share-limit 1
    set user "vpnclient_ph1id" type ike
    set user "vpnclient_ph1id" "enable"
    set user-group "vpnclient_group" id 1
    set user-group "vpnclient_group" user "vpnclient_ph1id"
    set crypto-policy
    exit
    set ike gateway "vpnclient_gateway" dialup "vpnclient_group" Aggr local-id "vpngw.nhspokane.com" outgoing-interface "ethernet0/0" preshare "s8myu6uANWExMPsRwVC4SCAwTqnv/H95iw==" proposal "pre-g2-3des-sha" "pre-g2-3des-md5" "pre-g2-aes128-sha" "pre-g2-aes128-md5"
    set ike gateway "vpnclient_gateway" dpd-liveness interval 30
    unset ike gateway "vpnclient_gateway" nat-traversal udp-checksum
    set ike gateway "vpnclient_gateway" nat-traversal keepalive-frequency 20
    set ike gateway "vpnclient_gateway" xauth server "Local"
    unset ike gateway "vpnclient_gateway" xauth do-edipi-auth
    set ike respond-bad-spi 1
    set ike ikev2 ike-sa-soft-lifetime 60
    unset ike ikeid-enumeration
    unset ike dos-protection
    unset ipsec access-session enable
    set ipsec access-session maximum 5000
    set ipsec access-session upper-threshold 0
    set ipsec access-session lower-threshold 0
    set ipsec access-session dead-p2-sa-timeout 0
    unset ipsec access-session log-error
    unset ipsec access-session info-exch-connected
    unset ipsec access-session use-error-log
    set xauth default ippool "vpnclient"
    set xauth default dns1 192.168.20.237
    set xauth default dns2 192.168.20.242
    set vpn "vpnclient_tunnel" gateway "vpnclient_gateway" replay tunnel idletime 0 proposal "nopfs-esp-3des-sha"  "nopfs-esp-3des-md5"  "nopfs-esp-aes128-sha"  "nopfs-esp-aes128-md5"
    set url protocol websense
    exit
    set policy id 3 name "OutboundSMTP" from "Trust" to "Untrust"  "gfiMailFilter" "Any" "SMTP" permit
    set policy id 3
    exit
    set policy id 4 name "Deny SMTP to Others" from "Trust" to "Untrust"  "Any" "Any" "SMTP" deny
    set policy id 4
    exit
    set policy id 5 name "Corporate Outbound" from "Trust" to "Untrust"  "Any" "Any" "ANY" permit
    set policy id 5
    exit
    set policy id 7 name "vpnclient_inbound" from "Untrust" to "Trust"  "Dial-Up VPN" "Corp_NET" "ANY" tunnel vpn "vpnclient_tunnel" id 0x1 log
    set policy id 7
    exit
    set policy id 8 name "CustomRDP" from "Untrust" to "Trust"  "Any" "VIP(ethernet0/0)" "Custom_RDP" permit
    set policy id 8
    set service "FTP"
    set service "HTTP"
    set service "HTTPS"
    set service "IMAP"
    set service "SMTP"
    exit
    set nsmgmt bulkcli reboot-timeout 60
    set ssh version v2
    set config lock timeout 5
    unset license-key auto-update
    set telnet client enable
    set ssl port 4443
    set snmp port listen 161
    set snmp port trap 162
    set snmpv3 local-engine id "0162062010000398"
    set vrouter "untrust-vr"
    exit
    set vrouter "trust-vr"
    unset add-default-route
    set route 0.0.0.0/0 interface ethernet0/0 gateway 70.89.210.174 permanent
    exit
    set vrouter "untrust-vr"
    exit
    set vrouter "trust-vr"
    exit



  • 2.  RE: SSG5 VIP Access to Multiple Subnets

    Posted 03-11-2014 21:14

    Whenever I have multiple servers on a single VIP I have always created multiple policies per server.

     

    It looks like it should work based on your config, but can you try a second policy for the RDP service?



  • 3.  RE: SSG5 VIP Access to Multiple Subnets
    Best Answer

     
    Posted 03-11-2014 23:54

    Hi,

     

    Do you have control over the source port?

     

    If not, try modifying the source port to 0-65535 from 38339-38339

     



  • 4.  RE: SSG5 VIP Access to Multiple Subnets

    Posted 03-12-2014 09:56

    Doh! I pulled a Homer. Wow that was a big faux pas. Thanks for spotting that for me. I got too hung up on the piece I felt most unsure of.



  • 5.  RE: SSG5 VIP Access to Multiple Subnets

     
    Posted 03-12-2014 20:49

    Cool...glad it is fixed now 🙂