Routing
Highlighted
Routing

SSG-5 Adding a Second IP Block to Primary Interface Ethernet 0/0

‎03-12-2009 12:56 PM

I could do with some assistance here and fairly new to some aspects of the SSG5.

 

My ISP has given me the following:

Only ONE IP for the Router interface and then a separate CIDR block for additional use.

We will be using these additional IP's for HTTPS etc.

 

Interconnect block: 69.196.64.136/30
Subnet mask: 255.255.255.252
SBS router: 69.196.64.137
Customer router: 69.196.64.138

IP block: 64.141.83.176/29

Subnet mask: 255.255.255.248

 

I have done the basic setup and all is working fine with the initial Router and Gateway IP's as provided above.

As follows:

 

set interface ethernet0/0 ip 69.196.64.138/30
set interface ethernet0/0 route
set interface ethernet0/0 gateway 69.196.64.137


Now HOW do I add The IP Block 64.141.83.176/29 to interface ethernet 0/0 ?

 

I did add this entry (using the Web GUI) but I don't know if it is correct:

"set route 64.141.83.176/29 interface ethernet0/0 gateway 69.196.64.137 "

 

 

Your assistance will really be appreciated.

 

Ahhh - also - here is my existing config:

 

set clock timezone -8
set vrouter trust-vr sharable
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
unset auto-route-export
exit
set auth-server "Local" id 0
set auth-server "Local" server-name "Local"
set auth default auth server "Local"
set auth radius accounting port 1646
set admin name "kiewitadmin"
set admin password "nOsnIQrII9IEcqkDdsKHgGOtMQFion"
set admin user "admiller" password "nP7/P8rxFT3BcC7E/s/EvoAtrtJgJn" privilege "all"
set admin user "hinzadmin" password "nJrZH1r2D1cJcJ3LksfEL5MtUBP4Zn" privilege "all"
set admin user "operator" password "nHfTIurnHhePcCWGzsUBAWItpLEqjn" privilege "read-only"
set admin http redirect
set admin auth timeout 0
set admin auth server "Local"
set admin auth banner console login "Restricted access!"
set admin format dos
set zone "Trust" vrouter "trust-vr"
set zone "Untrust" vrouter "trust-vr"
set zone "DMZ" vrouter "trust-vr"
set zone "VLAN" vrouter "trust-vr"
set zone "Untrust-Tun" vrouter "trust-vr"
set zone "Trust" tcp-rst
set zone "Untrust" block
unset zone "Untrust" tcp-rst
set zone "DMZ" tcp-rst
set zone "VLAN" block
unset zone "VLAN" tcp-rst
set zone "Untrust" screen tear-drop
set zone "Untrust" screen syn-flood
set zone "Untrust" screen ping-death
set zone "Untrust" screen ip-filter-src
set zone "Untrust" screen land
set zone "V1-Untrust" screen tear-drop
set zone "V1-Untrust" screen syn-flood
set zone "V1-Untrust" screen ping-death
set zone "V1-Untrust" screen ip-filter-src
set zone "V1-Untrust" screen land
set interface "ethernet0/0" zone "Untrust"
set interface "ethernet0/1" zone "Untrust"
set interface "bgroup0" zone "Trust"
set interface "bgroup1" zone "DMZ"
set interface bgroup0 port ethernet0/2
set interface bgroup0 port ethernet0/3
set interface bgroup0 port ethernet0/4
set interface bgroup1 port ethernet0/5
set interface bgroup1 port ethernet0/6
unset interface vlan1 ip
set interface ethernet0/0 ip 69.196.64.138/30
set interface ethernet0/0 route
set interface ethernet0/1 ip 68.179.94.201/28
set interface ethernet0/1 route
set interface bgroup0 ip 10.101.10.1/24
set interface bgroup0 route
set interface bgroup1 ip 10.101.9.1/24
set interface bgroup1 route
set interface ethernet0/0 gateway 69.196.64.137
set interface ethernet0/1 gateway 68.179.94.206
set interface bgroup0 proxy dns
set interface vlan1 bypass-others-ipsec
unset interface vlan1 bypass-non-ip
set interface ethernet0/0 ip manageable
set interface ethernet0/1 ip manageable
set interface bgroup0 ip manageable
set interface bgroup1 ip manageable
set interface ethernet0/0 manage ping
set interface ethernet0/0 manage telnet
set interface ethernet0/0 manage ssl
set interface ethernet0/0 manage web
set interface ethernet0/1 manage ping
set interface ethernet0/1 manage telnet
set interface ethernet0/1 manage ssl
set interface ethernet0/1 manage web
set interface bgroup0 manage mtrace
set interface bgroup1 manage telnet
set interface bgroup1 manage snmp
set interface bgroup1 manage ssl
set interface bgroup1 manage web
set interface ethernet0/2 monitor track-ip weight 1
unset interface ethernet0/2 monitor track-ip dynamic
set interface ethernet0/0 backup interface ethernet0/1 type track-ip
set interface ethernet0/0 backup activation-delay 10
set interface ethernet0/0 backup deactivation-delay 10
set interface "serial0/0" modem settings "USR" init "AT&F"
set interface "serial0/0" modem settings "USR" active
set interface "serial0/0" modem speed 115200
set interface "serial0/0" modem retry 3
set interface "serial0/0" modem interval 10
set interface "serial0/0" modem idle-time 10
set flow tcp-mss
unset flow tcp-syn-check
set hostname HAR-SSG5
set pki authority default scep mode "auto"
set pki x509 default cert-path partial
set dns host dns1 207.54.98.193 src-interface ethernet0/1
set dns host dns2 66.244.223.130 src-interface ethernet0/0
set dns host dns3 64.251.87.194 src-interface ethernet0/0
set dns host schedule 02:28
set dns proxy
set dns proxy enable
set dns server-select domain * outgoing-interface ethernet0/1 primary-server 207.54.98.193 secondary-server 66.244.223.130 tertiary-server 64.251.87.194 failover
set address "Trust" "Local LAN" 10.101.10.0 255.255.255.0
set ippool "vpnclient" 10.101.10.215 10.101.10.219
set user "Test.User" uid 1
set user "Test.User" ike-id fqdn "Test.User" share-limit 1
set user "Test.User" type  ike
set user "Test.User" "enable"
set user "hinz.admin" uid 3
set user "hinz.admin" ike-id fqdn "hinz.admin" share-limit 1
set user "hinz.admin" type  ike
set user "hinz.admin" "enable"
set user "joe" uid 8
set user "joe" type  xauth
set user "joe" password "POrIFp6kNz0ghesipOCLy/d+7Un6XPHe4A=="
unset user "joe" type auth
set user "joe" "enable"
set user "kiewit.admin" uid 5
set user "kiewit.admin" ike-id fqdn "kiewit.admin" share-limit 1
set user "kiewit.admin" type  ike
set user "kiewit.admin" "enable"
set user "rhi.admin" uid 4
set user "rhi.admin" ike-id fqdn "rhi.admin" share-limit 1
set user "rhi.admin" type  ike
set user "rhi.admin" "enable"
set user "vpnclient_ph1id" uid 7
set user "vpnclient_ph1id" ike-id fqdn "client.shrew.net" share-limit 2
set user "vpnclient_ph1id" type  ike
set user "vpnclient_ph1id" "enable"
set user-group "vpnclient_group" id 2
set user-group "vpnclient_group" user "vpnclient_ph1id"
set ike gateway "Test.UserP1" dialup "Test.User" Aggr outgoing-interface "ethernet0/1" preshare "pY3HYJkSNW6WPTs4JjCqRCu1V/nz8MUlDQ==" proposal "pre-g2-des-md5"
set ike gateway "Test.UserP1" cert peer-ca all
unset ike gateway "Test.UserP1" nat-traversal
set ike gateway "rhi.adminP1" dialup "rhi.admin" Aggr outgoing-interface "ethernet0/1" preshare "a+Gd2QHNNQVx/hs7UQCJ4Cz6DqnC0sY5SQ==" proposal "pre-g2-des-md5"
set ike gateway "rhi.adminP1" cert peer-ca all
unset ike gateway "rhi.adminP1" nat-traversal
set ike gateway "kiewit.adminP1" dialup "kiewit.admin" Main outgoing-interface "ethernet0/1" preshare "2Su6L3baNpDkj3sR1xCRHBp5oxnzD9nhpg==" proposal "pre-g2-des-md5"
set ike gateway "kiewit.adminP1" cert peer-ca all
unset ike gateway "kiewit.adminP1" nat-traversal
set ike gateway "hinz.adminP1" dialup "hinz.admin" Main outgoing-interface "ethernet0/1" preshare "koExeqyDNMCFU3sy6uCGbPRrXznZ1LMYhg==" proposal "pre-g2-des-md5"
unset ike gateway "hinz.adminP1" nat-traversal
set ike gateway "vpnclient_gateway" dialup "vpnclient_group" Main local-id "vpngw.shrew.net" outgoing-interface "ethernet0/1" preshare "5f1RtDizNxXICQsQ7HCaNFLqOFn+I53EUw==" proposal "pre-g2-des-md5"
unset ike gateway "vpnclient_gateway" nat-traversal udp-checksum
set ike gateway "vpnclient_gateway" nat-traversal keepalive-frequency 20
set ike gateway "vpnclient_gateway" xauth server "Local"
unset ike gateway "vpnclient_gateway" xauth do-edipi-auth
set ike gateway "vpnclient_gateway" dpd interval 20
set ike respond-bad-spi 1
unset ike ikeid-enumeration
unset ike dos-protection
unset ipsec access-session enable
set ipsec access-session maximum 5000
set ipsec access-session upper-threshold 0
set ipsec access-session lower-threshold 0
set ipsec access-session dead-p2-sa-timeout 0
unset ipsec access-session log-error
unset ipsec access-session info-exch-connected
unset ipsec access-session use-error-log
set xauth default ippool "vpnclient"
set xauth default dns1 10.101.10.1
set vpn "Test.UserP2" gateway "Test.UserP1" replay tunnel idletime 0 proposal "g2-esp-des-md5"
set vpn "rhi.adminP2" gateway "rhi.adminP1" replay tunnel idletime 0 proposal "g2-esp-des-md5"
set vpn "kiewit.adminP2" gateway "kiewit.adminP1" replay tunnel idletime 0 proposal "g2-esp-des-md5"
set vpn "hinz.adminP2" gateway "hinz.adminP1" no-replay tunnel idletime 0 proposal "g2-esp-des-md5"
set vpn "vpnclient_tunnel" gateway "vpnclient_gateway" no-replay tunnel idletime 0 proposal "nopfs-esp-des-md5"
set url protocol websense
exit
set anti-spam profile ns-profile
 set sbl default-server enable
exit
set policy id 35 from "Trust" to "Untrust"  "Local LAN" "Any" "ANY" nat src permit
set policy id 35
exit
set policy id 36 from "Trust" to "DMZ"  "Any" "Any" "ANY" permit
set policy id 36 disable
set policy id 36
exit
set policy id 37 from "Untrust" to "Trust"  "Dial-Up VPN" "Local LAN" "ANY" tunnel vpn "Test.UserP2" id 2
set policy id 37
exit
set policy id 40 name "rhi.admin" from "Untrust" to "Trust"  "Dial-Up VPN" "Local LAN" "ANY" tunnel vpn "rhi.adminP2" id 5
set policy id 40
exit
set policy id 41 name "kiewit.admin" from "Untrust" to "Trust"  "Dial-Up VPN" "Local LAN" "ANY" tunnel vpn "kiewit.adminP2" id 6
set policy id 41
exit
set policy id 42 name "hinz.admin" from "Untrust" to "Trust"  "Dial-Up VPN" "Local LAN" "ANY" tunnel vpn "hinz.adminP2" id 7
set policy id 42
exit
set policy id 43 name "vpnclient_in" from "Untrust" to "Trust"  "Dial-Up VPN" "Local LAN" "ANY" tunnel vpn "vpnclient_tunnel" id 8 log
set policy id 43
exit
set nsmgmt bulkcli reboot-timeout 60
set ssh version v2
set config lock timeout 5
set ntp server "0.0.0.0"
set ntp server backup1 "0.0.0.0"
set ntp server backup2 "0.0.0.0"
set snmp community "public" Read-Write Trap-on  traffic version any
set snmp host "public" 10.101.10.0 255.255.255.0 src-interface bgroup0
set snmp host "public" 10.101.9.0 255.255.255.0 src-interface bgroup1
set snmp name "HAR-SSG5"
set snmp port listen 161
set snmp port trap 162
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
unset add-default-route
set route 64.141.83.176/29 interface ethernet0/0 gateway 69.196.64.137 preference 20 permanent
exit
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
exit

 

 

 

 

 

 

 

3 REPLIES 3
Highlighted
Routing

Re: SSG-5 Adding a Second IP Block to Primary Interface Ethernet 0/0

‎03-15-2009 07:26 AM

Hi,

 

Can u please tell me whats the exact purpose of 64.141.83.176/29 block? If u r using this block for ur internal servers then ur isp should add a route destination 64.141.83.176/29 then nexthop ur ssg. u dont need to do any thing else on ssg.

 

Thanks

 

 

Kashif Rana
JNCIE-SEC, JNCIE-ENT, JNCIE-SP, JNCIS(FWV,SSL),JNCIA(IDP,AC,WX),BIG IP-F5-LTM, CCNP
----------------------------------------------------------------------------------------------------------------------------------------

If this post was helpful, please mark this post as an "Accepted Solution".Kudos are always appreciated!
Highlighted
Routing

Re: SSG-5 Adding a Second IP Block to Primary Interface Ethernet 0/0

‎03-16-2009 01:17 PM

Thanks Kashif,

 

The purpose of the IP's in block is to attach to http and https on servers behind the firewall - I will be using one-to-one mapping of public to private IP's to do this.

 

Yes, my ISP has/will add the route destination and nexthop to the SSG5 IP address - this is part of their service.

Highlighted
Routing

Re: SSG-5 Adding a Second IP Block to Primary Interface Ethernet 0/0

‎03-17-2009 03:01 AM
Just use the address of the new range in MIP's and you'll be fine! Outbound traffic will get the IP of the MIP.
best regards,

Screenie.
Juniper Ambassador, Instructor,JNCIP
If this worked for you please flag my post as an "Accepted Solution" so others can benefit. A kudo would be cool if you think I earned it.
Feedback