Screen OS

last person joined: 8 months ago 

This is a legacy community with limited Juniper monitoring.
  • 1.  Why does source address translation not work?

    Posted 09-03-2008 08:48

    Hi,

     

    I'm new to juniper devices and i'm trying to setup an active/passive config with two SSG 140's. I'm happy with the fact that I succeeded in setting it up but for some reason all traffic from for example interface red1.5 is not being source translated as it goes out to the untrust interface although red1.5 is set to NAT. I also have a default route 0.0.0.0/0 defined. I checked the translation using the policy logs and there it show that the translated address is the same as the original.

     

    I'm probably missing something here and I hope one of you clever guys can shed some light on this?

     

    Hereby the config of both firewalls:

     

    FIREWALL 2

     

    set clock ntp
    set clock timezone 1
    set clock dst recurring start-weekday 2 0 3 02:00 end-weekday 1 0 11 02:00
    set vrouter trust-vr sharable
    set vrouter "untrust-vr"
    exit
    set vrouter "trust-vr"
    unset auto-route-export
    exit
    set auth-server "Local" id 0
    set auth-server "Local" server-name "Local"
    set auth default auth server "Local"
    set auth radius accounting port 1646
    set admin name "netscreen"
    set admin password "nKVUM2rwMUzPcrkG5sWIHdCtqkAibn"
    set admin auth timeout 10
    set admin auth server "Local"
    set admin format dos
    set zone "Trust" vrouter "trust-vr"
    set zone "Untrust" vrouter "trust-vr"
    set zone "DMZ" vrouter "trust-vr"
    set zone "VLAN" vrouter "trust-vr"
    set zone id 100 "Infrastructure Management"
    set zone "Untrust-Tun" vrouter "trust-vr"
    set zone "Trust" tcp-rst
    set zone "Untrust" block
    unset zone "Untrust" tcp-rst
    set zone "MGT" block
    set zone "DMZ" tcp-rst
    set zone "VLAN" block
    unset zone "VLAN" tcp-rst
    set zone "Infrastructure Management" tcp-rst
    set zone "Untrust" screen tear-drop
    set zone "Untrust" screen syn-flood
    set zone "Untrust" screen ping-death
    set zone "Untrust" screen ip-filter-src
    set zone "Untrust" screen land
    set zone "V1-Untrust" screen tear-drop
    set zone "V1-Untrust" screen syn-flood
    set zone "V1-Untrust" screen ping-death
    set zone "V1-Untrust" screen ip-filter-src
    set zone "V1-Untrust" screen land
    set interface "redundant1" zone "Null"
    set interface "ethernet0/0" zone "Trust"
    set interface "ethernet0/1" zone "DMZ"
    set interface "ethernet0/2" zone "HA"
    set interface "ethernet0/3" zone "HA"
    set interface "ethernet0/4" zone "Untrust"
    set interface ethernet0/8 group redundant1
    set interface ethernet0/9 group redundant1
    set interface "redundant1.5" tag 5 zone "Infrastructure Management"
    set interface ethernet0/0 ip 192.168.1.1/24
    set interface ethernet0/0 nat
    unset interface vlan1 ip
    set interface ethernet0/4 ip 10.140.10.200/24
    set interface ethernet0/4 route
    set interface redundant1.5 ip 10.5.10.254/24
    set interface redundant1.5 nat
    unset interface vlan1 bypass-others-ipsec
    unset interface vlan1 bypass-non-ip
    set interface redundant1.5 manage-ip 10.5.10.252
    set interface ethernet0/0 ip manageable
    unset interface ethernet0/4 ip manageable
    unset interface redundant1.5 ip manageable
    set interface ethernet0/4 manage ping
    set interface redundant1.5 manage ping
    set interface redundant1.5 manage web
    unset flow no-tcp-seq-check
    set flow tcp-syn-check
    unset flow tcp-syn-bit-check
    set flow reverse-route clear-text prefer
    set flow reverse-route tunnel always
    set pki authority default scep mode "auto"
    set pki x509 default cert-path partial
    set nsrp cluster id 1
    set nsrp vsd-group id 0 priority 100
    set nsrp monitor interface redundant1
    set nsrp monitor interface ethernet0/4
    set ike respond-bad-spi 1
    unset ike ikeid-enumeration
    unset ike dos-protection
    unset ipsec access-session enable
    set ipsec access-session maximum 5000
    set ipsec access-session upper-threshold 0
    set ipsec access-session lower-threshold 0
    set ipsec access-session dead-p2-sa-timeout 0
    unset ipsec access-session log-error
    unset ipsec access-session info-exch-connected
    unset ipsec access-session use-error-log
    set vrouter "untrust-vr"
    exit
    set vrouter "trust-vr"
    exit
    set url protocol websense
    exit
    set policy id 1 from "Infrastructure Management" to "Untrust"  "Any" "Any" "ANY" permit log
    set policy id 1
    exit
    set nsmgmt bulkcli reboot-timeout 60
    set ssh version v2
    set config lock timeout 5
    unset license-key auto-update
    set ntp server "pool.ntp.org"
    set ntp server src-interface "ethernet0/4"
    set snmp port listen 161
    set snmp port trap 162
    set vrouter "untrust-vr"
    exit
    set vrouter "trust-vr"
    unset add-default-route
    set route 0.0.0.0/0 interface ethernet0/4 gateway 10.140.10.254 preference 20
    exit
    set vrouter "untrust-vr"
    exit
    set vrouter "trust-vr"
    exit

    FIREWALL 2

     

    set clock ntp
    set clock timezone 1
    set clock dst recurring start-weekday 2 0 3 02:00 end-weekday 1 0 11 02:00
    set vrouter trust-vr sharable
    set vrouter "untrust-vr"
    exit
    set vrouter "trust-vr"
    unset auto-route-export
    exit
    set auth-server "Local" id 0
    set auth-server "Local" server-name "Local"
    set auth default auth server "Local"
    set auth radius accounting port 1646
    set admin name "netscreen"
    set admin password "nKVUM2rwMUzPcrkG5sWIHdCtqkAibn"
    set admin auth timeout 10
    set admin auth server "Local"
    set admin format dos
    set zone "Trust" vrouter "trust-vr"
    set zone "Untrust" vrouter "trust-vr"
    set zone "DMZ" vrouter "trust-vr"
    set zone "VLAN" vrouter "trust-vr"
    set zone id 100 "Infrastructure Management"
    set zone "Untrust-Tun" vrouter "trust-vr"
    set zone "Trust" tcp-rst
    set zone "Untrust" block
    unset zone "Untrust" tcp-rst
    set zone "MGT" block
    set zone "DMZ" tcp-rst
    set zone "VLAN" block
    unset zone "VLAN" tcp-rst
    set zone "Infrastructure Management" tcp-rst
    set zone "Untrust" screen tear-drop
    set zone "Untrust" screen syn-flood
    set zone "Untrust" screen ping-death
    set zone "Untrust" screen ip-filter-src
    set zone "Untrust" screen land
    set zone "V1-Untrust" screen tear-drop
    set zone "V1-Untrust" screen syn-flood
    set zone "V1-Untrust" screen ping-death
    set zone "V1-Untrust" screen ip-filter-src
    set zone "V1-Untrust" screen land
    set interface "redundant1" zone "Null"
    set interface "ethernet0/0" zone "Trust"
    set interface "ethernet0/1" zone "DMZ"
    set interface "ethernet0/2" zone "HA"
    set interface "ethernet0/3" zone "HA"
    set interface "ethernet0/4" zone "Untrust"
    set interface ethernet0/8 group redundant1
    set interface ethernet0/9 group redundant1
    set interface "redundant1.5" tag 5 zone "Infrastructure Management"
    set interface ethernet0/0 ip 192.168.1.1/24
    set interface ethernet0/0 nat
    unset interface vlan1 ip
    set interface ethernet0/4 ip 10.140.10.200/24
    set interface ethernet0/4 route
    set interface redundant1.5 ip 10.5.10.254/24
    set interface redundant1.5 nat
    unset interface vlan1 bypass-others-ipsec
    unset interface vlan1 bypass-non-ip
    set interface redundant1.5 manage-ip 10.5.10.253
    set interface ethernet0/0 ip manageable
    unset interface ethernet0/4 ip manageable
    unset interface redundant1.5 ip manageable
    set interface ethernet0/4 manage ping
    set interface redundant1.5 manage ping
    set interface redundant1.5 manage web
    unset flow no-tcp-seq-check
    set flow tcp-syn-check
    unset flow tcp-syn-bit-check
    set flow reverse-route clear-text prefer
    set flow reverse-route tunnel always
    set pki authority default scep mode "auto"
    set pki x509 default cert-path partial
    set nsrp cluster id 1
    set nsrp vsd-group id 0 priority 100
    set nsrp monitor interface redundant1
    set nsrp monitor interface ethernet0/4
    set ike respond-bad-spi 1
    unset ike ikeid-enumeration
    unset ike dos-protection
    unset ipsec access-session enable
    set ipsec access-session maximum 5000
    set ipsec access-session upper-threshold 0
    set ipsec access-session lower-threshold 0
    set ipsec access-session dead-p2-sa-timeout 0
    unset ipsec access-session log-error
    unset ipsec access-session info-exch-connected
    unset ipsec access-session use-error-log
    set vrouter "untrust-vr"
    exit
    set vrouter "trust-vr"
    exit
    set url protocol websense
    exit
    set policy id 1 from "Infrastructure Management" to "Untrust"  "Any" "Any" "ANY" permit log
    set policy id 1
    exit
    set nsmgmt bulkcli reboot-timeout 60
    set ssh version v2
    set config lock timeout 5
    unset license-key auto-update
    set ntp server "pool.ntp.org"
    set ntp server src-interface "ethernet0/4"
    set snmp port listen 161
    set snmp port trap 162
    set vrouter "untrust-vr"
    exit
    set vrouter "trust-vr"
    unset add-default-route
    set route 0.0.0.0/0 interface ethernet0/4 gateway 10.140.10.254 preference 20
    exit
    set vrouter "untrust-vr"
    exit
    set vrouter "trust-vr"
    exit

     



  • 2.  RE: Why does source address translation not work?

    Posted 09-03-2008 13:47

    Hi,

     

    With interhface based NAT translation only happens when traffic is going between Trust to Untrust or DMZ to Untrust.

     

    Since your Red interface is in a customer zone interface NAT will not work. This is just a limitation of the ScreenOS software. To get NAT to work you need to use NAT on the policy.

     

    Go to the policy that you have configured from Infrastructure Management to Untrust edit it and go into the advance section. Check the box for source NAT and make sure it says 'use egress ip'

     

    Hope this helps

     

    Regards

     

    Andy



  • 3.  RE: Why does source address translation not work?
    Best Answer

    Posted 09-04-2008 00:06
    That's it... now it works! Really simpel but you need to know... thx!