Well i have done everything and still nothing , have even try to do exactly as the juniper says but still nothing.
set pool dst-nat-pool-1 address 192.168.1.100 port 80
set rule-set rs1 from zone untrust set rule-set rs1 rule r1 match destination-address 1.1.1.100
set rule-set rs1 rule r1 match destination-port 80
set rule-set rs1 rule r1 then destination-nat pool dst-nat-pool-1
set proxy-arp interface ge-0/0/2.0 address 1.1.1.100 that it's not possible to be set up do to mask overlap it's already set up as interface.
set zones security-zone trust address-book address server-1 192.168.1.100/32
set policy server-access match source-address any destination-address [server-1] application any
set policy server-access then permit
set zones security-zone trust address-book address server-1 192.168.1.100/32
set policy server-access match source-address any destination-address [server-1] application any set policy server-access then permit
And here is the full CLI config.
## Last commit: 2018-12-21 04:15:19 GMT+2 by root
version 12.1X46-D30.2;
system {
host-name firewall;
time-zone GMT+2;
root-authentication {
encrypted-password "$1$L7X5V7Q5$X98YIsFqItWMeb7DFKPPr0";
}
name-server {
208.67.222.222;
208.67.220.220;
}
name-resolution {
no-resolve-on-input;
}
services {
telnet;
web-management {
http {
interface ge-0/0/1.0;
}
session {
idle-timeout 60;
}
}
dhcp {
pool 192.168.1.0/24 {
address-range low 192.168.1.2 high 192.168.1.254;
router {
192.168.1.1;
}
}
}
}
syslog {
archive size 100k files 3;
user * {
any emergency;
}
file messages {
any critical;
authorization info;
}
file interactive-commands {
interactive-commands error;
}
}
max-configurations-on-flash 5;
max-configuration-rollbacks 5;
license {
autoupdate {
url https://ae1.juniper.net/junos/key_retrieval;
}
}
ntp {
server us.ntp.pool.org;
}
}
interfaces {
ge-0/0/0 {
unit 0 {
family inet {
address 93.109.249.46/24;
}
}
}
ge-0/0/1 {
unit 0 {
family inet {
address 192.168.1.1/24;
}
}
}
}
routing-options {
static {
route 0.0.0.0/0 next-hop 93.109.249.45;
}
}
security {
screen {
ids-option untrust-screen {
icmp {
ping-death;
}
ip {
source-route-option;
tear-drop;
}
tcp {
syn-flood {
alarm-threshold 1024;
attack-threshold 200;
source-threshold 1024;
destination-threshold 2048;
timeout 20;
}
land;
}
}
}
nat {
source {
rule-set nsw-srcnat {
from zone Trust;
to zone Untrust;
rule nsw-src-interface {
match {
source-address 0.0.0.0/0;
destination-address 0.0.0.0/0;
}
then {
source-nat {
interface;
}
}
}
}
}
destination {
pool dst-nat-pool-1 {
routing-instance {
default;
}
address 192.168.1.1/32 port 80;
}
rule-set r1 {
from zone Untrust;
rule r2 {
match {
destination-address 93.109.249.46/32;
destination-port 80;
}
then {
destination-nat {
pool {
dst-nat-pool-1;
}
}
}
}
}
}
}
policies {
from-zone Trust to-zone Untrust {
policy Internet {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}
}
}
from-zone Untrust to-zone Trust {
policy Telnet {
match {
source-address any;
destination-address Server1;
application any;
}
then {
permit;
}
}
}
}
zones {
security-zone Trust {
address-book {
address Server1 192.168.1.1/32;
}
interfaces {
ge-0/0/1.0 {
host-inbound-traffic {
system-services {
ping;
dhcp;
http;
telnet;
}
}
}
}
}
security-zone Untrust {
interfaces {
ge-0/0/0.0 {
host-inbound-traffic {
system-services {
ping;
telnet;
}
}
}
}
}
}
}
Is there any possiblity , firewall to be defective or malfunction.