ScreenOS Firewalls (NOT SRX)
Highlighted
ScreenOS Firewalls (NOT SRX)

unable to access DVR through ssg5

‎04-05-2019 02:21 PM

We are trying to port a dvr through the system to access the cameras and cannot see them  here is a copy og the config, hope you can show me where is issue is.

  the cameras are on port 3777 tcp 3778 udp  and also use port 80

 

thanks Michael

 

unset key protection enable
set clock ntp
set clock timezone -6
set vrouter trust-vr sharable
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
unset auto-route-export
exit
set service "cameras" protocol tcp src-port 37777-37780 dst-port 37777-37780
set service "cameras" + udp src-port 37778-37780 dst-port 37778-37780
set alg appleichat enable
unset alg appleichat re-assembly enable
set alg sctp enable
set auth-server "Local" id 0
set auth-server "Local" server-name "Local"
set auth default auth server "Local"
set auth radius accounting port 1646
set admin name 
set admin password 
set admin user "root" password "nNzlBrrTDZ1HcT4JLslDT6AttGJLdn" privilege "all"
set admin user "_netscreen" password "nDwXNrrEIBtJcJgJ1sKHjXOtv2H8kn" privilege "all"
set admin access lock-on-failure 10
set admin auth web timeout 10
set admin auth dial-in timeout 3
set admin auth server "Local"
set admin format dos
set zone "Trust" vrouter "trust-vr"
set zone "Untrust" vrouter "trust-vr"
set zone "DMZ" vrouter "trust-vr"
set zone "VLAN" vrouter "trust-vr"
set zone "Untrust-Tun" vrouter "trust-vr"
set zone "Trust" tcp-rst
set zone "Untrust" block
unset zone "Untrust" tcp-rst
set zone "MGT" block
unset zone "V1-Trust" tcp-rst
unset zone "V1-Untrust" tcp-rst
set zone "DMZ" tcp-rst
unset zone "V1-DMZ" tcp-rst
unset zone "VLAN" tcp-rst
set zone "Untrust" screen tear-drop
set zone "Untrust" screen syn-flood
set zone "Untrust" screen ping-death
set zone "Untrust" screen ip-filter-src
set zone "Untrust" screen land
set zone "V1-Untrust" screen tear-drop
set zone "V1-Untrust" screen syn-flood
set zone "V1-Untrust" screen ping-death
set zone "V1-Untrust" screen ip-filter-src
set zone "V1-Untrust" screen land
set interface "ethernet0/0" zone "Untrust"
set interface "ethernet0/1" zone "DMZ"
set interface "bgroup0" zone "Trust"
set interface "tunnel.1" zone "Untrust"
set interface "tunnel.2" zone "Trust"
set interface bgroup0 port ethernet0/2
set interface bgroup0 port ethernet0/3
set interface bgroup0 port ethernet0/4
set interface bgroup0 port ethernet0/5
set interface bgroup0 port ethernet0/6
unset interface vlan1 ip
set interface ethernet0/0 ip 72.24.30.166/30
set interface ethernet0/0 route
set interface bgroup0 ip 192.168.1.1/24
set interface bgroup0 nat
set interface tunnel.1 ip unnumbered interface ethernet0/0
set interface tunnel.2 ip unnumbered interface ethernet0/0
set interface ethernet0/0 gateway 72.24.30.165
set interface "ethernet0/0" pmtu ipv4
unset interface vlan1 bypass-others-ipsec
unset interface vlan1 bypass-non-ip
set interface ethernet0/0 ip manageable
set interface bgroup0 ip manageable
set interface ethernet0/0 manage ping
set interface ethernet0/0 manage ssh
set interface ethernet0/0 manage telnet
set interface ethernet0/0 manage snmp
set interface ethernet0/0 manage ssl
set interface ethernet0/0 manage web
set interface ethernet0/0 manage ident-reset
set interface bgroup0 manage mtrace
set interface ethernet0/0 vip interface-ip 37777 "cameras" 192.168.1.86
set interface bgroup0 vip 192.168.1.89
set interface bgroup0 dhcp server service
set interface bgroup0 dhcp server auto
set interface bgroup0 dhcp server option gateway 192.168.1.1
set interface bgroup0 dhcp server option netmask 255.255.255.0
set interface bgroup0 dhcp server option dns1 8.8.8.8
set interface bgroup0 dhcp server option dns2 24.116.2.50
set interface bgroup0 dhcp server option dns3 8.8.8.8
set interface bgroup0 dhcp server ip 192.168.1.100 to 192.168.1.150
unset interface bgroup0 dhcp server config next-server-ip
set interface "serial0/0" modem settings "USR" init "AT&F"
set interface "serial0/0" modem settings "USR" active
set interface "serial0/0" modem speed 115200
set interface "serial0/0" modem retry 3
set interface "serial0/0" modem interval 10
set interface "serial0/0" modem idle-time 10
set flow tcp-mss
unset flow tcp-syn-check
unset flow tcp-syn-bit-check
set flow reverse-route clear-text prefer
set flow reverse-route tunnel always
set pki authority default scep mode "auto"
set pki x509 default cert-path partial
set dns host dns1 24.116.0.53
set dns host dns2 8.8.8.8
set dns host dns3 8.8.4.4
set address "Trust" "192.168.1.0/24" 192.168.1.0 255.255.255.0
set address "Trust" "Dial-Up-VPN-Addr" 192.168.60.0 255.255.255.0
set address "Untrust" "192.168.0.0/24" 192.168.0.0 255.255.255.0
set ippool "vpn-ip-pool" 192.168.60.20 192.168.60.40
set user "L2TP" uid 10
set user "L2TP" type l2tp
set user "L2TP" remote ippool "vpn-ip-pool"
set user "L2TP" password "QFZa87v4NdmIYAsqIdCjpLkCmdnq/QJM7xr1g8vl+UeBO0TwNdTfBVQ="
unset user "L2TP" type auth
set user "L2TP" "enable"
set user-group "L2TP-vpn" id 10
set user-group "L2TP-vpn" user "L2TP"
set crypto-policy
exit
set ike gateway "Gateway for 192.168.0.0/24" address 12.28.157.114 Main outgoing-interface "ethernet0/0" preshare "T04ju3rWNFJT1MsKTTCEiFlcgXnAbjbZkg==" proposal "pre-g2-3des-sha" "pre-g2-aes128-sha"
set ike respond-bad-spi 1
set ike ikev2 ike-sa-soft-lifetime 60
unset ike ikeid-enumeration
unset ike dos-protection
unset ipsec access-session enable
set ipsec access-session maximum 5000
set ipsec access-session upper-threshold 0
set ipsec access-session lower-threshold 0
set ipsec access-session dead-p2-sa-timeout 0
unset ipsec access-session log-error
unset ipsec access-session info-exch-connected
unset ipsec access-session use-error-log
set vpn "VPN for 192.168.0.0/24" gateway "Gateway for 192.168.0.0/24" replay tunnel idletime 0 sec-level standard
set vpn "VPN for 192.168.0.0/24" monitor rekey
set vpn "VPN for 192.168.0.0/24" id 0x1 bind interface tunnel.1
set vpn "VPN for 192.168.0.0/24" dscp-mark 0
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
exit
set l2tp default dns1 8.8.8.8
set l2tp default ippool "vpn-ip-pool"
set l2tp default ppp-auth chap
set l2tp "YS_vpn" id 10 outgoing-interface ethernet0/0 keepalive 60
set l2tp "YS_vpn" remote-setting ippool "vpn-ip-pool" dns1 8.8.8.8
set url protocol websense
exit
set policy id 3 from "Untrust" to "Trust" "192.168.0.0/24" "192.168.1.0/24" "ANY" permit
set policy id 3
exit
set policy id 2 from "Trust" to "Untrust" "192.168.1.0/24" "192.168.0.0/24" "ANY" permit
set policy id 2
exit
set policy id 1 from "Trust" to "Untrust" "Any" "Any" "ANY" permit
set policy id 1
exit
set policy id 4 from "Trust" to "Untrust" "Any" "Any" "ANY" permit
set policy id 4
exit
set policy id 10 from "Untrust" to "Trust" "Dial-Up VPN" "Any" "ANY" tunnel l2tp "YS_vpn"
set policy id 10
exit
set policy id 11 name "Camera" from "Untrust" to "Trust" "Any" "VIP(192.168.1.89)" "cameras" permit
set policy id 11
exit
set policy id 12 name "Cameras Out" from "Trust" to "Untrust" "VIP(192.168.1.89)" "Any" "cameras" permit
set policy id 12 disable
set policy id 12
exit
set nsmgmt bulkcli reboot-timeout 60
set ssh version v2
set config lock timeout 5
unset license-key auto-update
unset telnet client enable
set ntp server "0.0.0.0"
set ntp server backup1 "0.0.0.0"
set ntp server backup2 "0.0.0.0"
set snmp port listen 161
set snmp port trap 162
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
unset add-default-route
set route 192.168.0.0/24 interface tunnel.1
set route 0.0.0.0/0 interface ethernet0/0 gateway 12.28.157.114 preference 20
exit
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
exit

 

 

11 REPLIES 11
ScreenOS Firewalls (NOT SRX)

Re: unable to access DVR through ssg5

‎04-05-2019 10:00 PM

Hi,

 

I see the below from your update:

 

"******the cameras are on port 3777 tcp 3778 udp and also use port 80

 

set service "cameras" protocol tcp src-port 37777-37780 dst-port 37777-37780
set service "cameras" + udp src-port 37778-37780 dst-port 37778-37780

set interface ethernet0/0 vip interface-ip 37777 "cameras" 192.168.1.86

set policy id 11 name "Camera" from "Untrust" to "Trust" "Any" "VIP(192.168.1.89)" "cameras" permit****"

 

1: Please modify your service to use any source port not only src-port 37777-37780 : https://kb.juniper.net/InfoCenter/index?page=content&id=KB4220&cat=SCREENOS&actp=LIST

 

2: Also, configure the correct  and only needed destination port.

 

Your service config should be something like below:

 

set service "cameras" protocol tcp src-port 1024-65535 dst-port 3777
set service "cameras" + udp src-port 1024-65535 dst-port 3778

 

Thanks,

Vikas

 

 

ScreenOS Firewalls (NOT SRX)

Re: unable to access DVR through ssg5

‎04-10-2019 09:57 AM

I have tried, but I do not see the folders in objects on my ssg5  6.2.0r5.0  am I doing something wrong?

ScreenOS Firewalls (NOT SRX)

Re: unable to access DVR through ssg5

‎04-11-2019 02:54 AM

If the menus are not visible try a different browser.  These older versions start displaying incorrectly on newer browsers at times.

 

or you can make the config change on the cli commands.

 

Steve Puluka BSEET - Juniper Ambassador
IP Architect - DQE Communications Pittsburgh, PA (Metro Ethernet & ISP)
http://puluka.com/home
ScreenOS Firewalls (NOT SRX)

Re: unable to access DVR through ssg5

‎04-11-2019 11:09 AM

tried 4 different browsers still no other options under options  is there a guide to using cli to accomplish this task?

 

thanks michael

ScreenOS Firewalls (NOT SRX)

Re: unable to access DVR through ssg5

‎04-13-2019 05:01 AM

I don't have a version to check to see if the menu options have changed from 6.2 to 6.3.  Do you have access to downloads to upgrade?

 

If not can we explore the menus looking for where custom applications are created?

Did you create that object and where?

Or do you have access to the cli to simply run the command above and change the port assignments for the source ports on the existing object?

 

Steve Puluka BSEET - Juniper Ambassador
IP Architect - DQE Communications Pittsburgh, PA (Metro Ethernet & ISP)
http://puluka.com/home
ScreenOS Firewalls (NOT SRX)

Re: unable to access DVR through ssg5

‎04-14-2019 08:21 AM

here is the current config  still not able to see the cameras  not aware of how to get latet version of the software

thanks Michael

unset key protection enable
set clock ntp
set clock timezone -6
set vrouter trust-vr sharable
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
unset auto-route-export
exit
set service "Cameras" protocol tcp src-port 1024-65535 dst-port 37777-37777
set service "Cameras" + udp src-port 1024-65535 dst-port 37778-37778
set alg appleichat enable
unset alg appleichat re-assembly enable
set alg sctp enable
set auth-server "Local" id 0
set auth-server "Local" server-name "Local"
set auth default auth server "Local"
set auth radius accounting port 1646
set admin name "netscreen"
set admin password 
set admin user "root" password "nNzlBrrTDZ1HcT4JLslDT6AttGJLdn" privilege "all"
set admin user "_netscreen" password "nDwXNrrEIBtJcJgJ1sKHjXOtv2H8kn" privilege "all"
set admin access lock-on-failure 10
set admin auth web timeout 10
set admin auth dial-in timeout 3
set admin auth server "Local"
set admin format dos
set zone "Trust" vrouter "trust-vr"
set zone "Untrust" vrouter "trust-vr"
set zone "DMZ" vrouter "trust-vr"
set zone "VLAN" vrouter "trust-vr"
set zone "Untrust-Tun" vrouter "trust-vr"
set zone "Trust" tcp-rst
set zone "Untrust" block
unset zone "Untrust" tcp-rst
set zone "MGT" block
unset zone "V1-Trust" tcp-rst
unset zone "V1-Untrust" tcp-rst
set zone "DMZ" tcp-rst
unset zone "V1-DMZ" tcp-rst
unset zone "VLAN" tcp-rst
set zone "Untrust" screen tear-drop
set zone "Untrust" screen syn-flood
set zone "Untrust" screen ping-death
set zone "Untrust" screen ip-filter-src
set zone "Untrust" screen land
set zone "V1-Untrust" screen tear-drop
set zone "V1-Untrust" screen syn-flood
set zone "V1-Untrust" screen ping-death
set zone "V1-Untrust" screen ip-filter-src
set zone "V1-Untrust" screen land
set interface "ethernet0/0" zone "Untrust"
set interface "ethernet0/1" zone "DMZ"
set interface "bgroup0" zone "Trust"
set interface "tunnel.1" zone "Untrust"
set interface "tunnel.2" zone "Trust"
set interface bgroup0 port ethernet0/2
set interface bgroup0 port ethernet0/3
set interface bgroup0 port ethernet0/4
set interface bgroup0 port ethernet0/5
set interface bgroup0 port ethernet0/6
unset interface vlan1 ip
set interface ethernet0/0 ip 72.24.30.166/30
set interface ethernet0/0 route
set interface bgroup0 ip 192.168.1.1/24
set interface bgroup0 nat
set interface tunnel.1 ip unnumbered interface ethernet0/0
set interface tunnel.2 ip unnumbered interface ethernet0/0
set interface ethernet0/0 gateway 72.24.30.165
set interface "ethernet0/0" pmtu ipv4
unset interface vlan1 bypass-others-ipsec
unset interface vlan1 bypass-non-ip
set interface ethernet0/0 ip manageable
set interface bgroup0 ip manageable
set interface ethernet0/0 manage ping
set interface ethernet0/0 manage ssh
set interface ethernet0/0 manage telnet
set interface ethernet0/0 manage snmp
set interface ethernet0/0 manage ssl
set interface ethernet0/0 manage web
set interface ethernet0/0 manage ident-reset
set interface bgroup0 manage mtrace
set interface ethernet0/0 vip interface-ip
set interface bgroup0 vip 192.168.1.89
set interface bgroup0 dhcp server service
set interface bgroup0 dhcp server auto
set interface bgroup0 dhcp server option gateway 192.168.1.1
set interface bgroup0 dhcp server option netmask 255.255.255.0
set interface bgroup0 dhcp server option dns1 8.8.8.8
set interface bgroup0 dhcp server option dns2 24.116.2.50
set interface bgroup0 dhcp server option dns3 8.8.8.8
set interface bgroup0 dhcp server ip 192.168.1.100 to 192.168.1.150
unset interface bgroup0 dhcp server config next-server-ip
set interface "serial0/0" modem settings "USR" init "AT&F"
set interface "serial0/0" modem settings "USR" active
set interface "serial0/0" modem speed 115200
set interface "serial0/0" modem retry 3
set interface "serial0/0" modem interval 10
set interface "serial0/0" modem idle-time 10
set flow tcp-mss
unset flow tcp-syn-check
unset flow tcp-syn-bit-check
set flow reverse-route clear-text prefer
set flow reverse-route tunnel always
set pki authority default scep mode "auto"
set pki x509 default cert-path partial
set dns host dns1 24.116.0.53
set dns host dns2 8.8.8.8
set dns host dns3 8.8.4.4
set address "Trust" "192.168.1.0/24" 192.168.1.0 255.255.255.0
set address "Trust" "Dial-Up-VPN-Addr" 192.168.60.0 255.255.255.0
set address "Untrust" "192.168.0.0/24" 192.168.0.0 255.255.255.0
set ippool "vpn-ip-pool" 192.168.60.20 192.168.60.40
set user "L2TP" uid 10
set user "L2TP" type l2tp
set user "L2TP" remote ippool "vpn-ip-pool"
set user "L2TP" password "QFZa87v4NdmIYAsqIdCjpLkCmdnq/QJM7xr1g8vl+UeBO0TwNdTfBVQ="
unset user "L2TP" type auth
set user "L2TP" "enable"
set user-group "L2TP-vpn" id 10
set user-group "L2TP-vpn" user "L2TP"
set crypto-policy
exit
set ike gateway "Gateway for 192.168.0.0/24" address 12.28.157.114 Main outgoing-interface "ethernet0/0" preshare "T04ju3rWNFJT1MsKTTCEiFlcgXnAbjbZkg==" proposal "pre-g2-3des-sha" "pre-g2-aes128-sha"
set ike respond-bad-spi 1
set ike ikev2 ike-sa-soft-lifetime 60
unset ike ikeid-enumeration
unset ike dos-protection
unset ipsec access-session enable
set ipsec access-session maximum 5000
set ipsec access-session upper-threshold 0
set ipsec access-session lower-threshold 0
set ipsec access-session dead-p2-sa-timeout 0
unset ipsec access-session log-error
unset ipsec access-session info-exch-connected
unset ipsec access-session use-error-log
set vpn "VPN for 192.168.0.0/24" gateway "Gateway for 192.168.0.0/24" replay tunnel idletime 0 sec-level standard
set vpn "VPN for 192.168.0.0/24" monitor rekey
set vpn "VPN for 192.168.0.0/24" id 0x1 bind interface tunnel.1
set vpn "VPN for 192.168.0.0/24" dscp-mark 0
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
exit
set l2tp default dns1 8.8.8.8
set l2tp default ippool "vpn-ip-pool"
set l2tp default ppp-auth chap
set l2tp "YS_vpn" id 10 outgoing-interface ethernet0/0 keepalive 60
set l2tp "YS_vpn" remote-setting ippool "vpn-ip-pool" dns1 8.8.8.8
set url protocol websense
exit
set policy id 11 from "Untrust" to "Trust" "Any" "VIP(192.168.1.89)" "Cameras" permit log
set policy id 11
exit
set policy id 3 from "Untrust" to "Trust" "192.168.0.0/24" "192.168.1.0/24" "ANY" permit
set policy id 3
exit
set policy id 2 from "Trust" to "Untrust" "192.168.1.0/24" "192.168.0.0/24" "ANY" permit
set policy id 2
exit
set policy id 1 from "Trust" to "Untrust" "Any" "Any" "ANY" permit
set policy id 1
exit
set policy id 4 from "Trust" to "Untrust" "Any" "Any" "ANY" permit
set policy id 4
exit
set policy id 10 from "Untrust" to "Trust" "Dial-Up VPN" "Any" "ANY" tunnel l2tp "YS_vpn"
set policy id 10
exit
set nsmgmt bulkcli reboot-timeout 60
set ssh version v2
set config lock timeout 5
unset license-key auto-update
unset telnet client enable
set ntp server "0.0.0.0"
set ntp server backup1 "0.0.0.0"
set ntp server backup2 "0.0.0.0"
set snmp port listen 161
set snmp port trap 162
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
unset add-default-route
set route 192.168.0.0/24 interface tunnel.1
set route 0.0.0.0/0 interface ethernet0/0 gateway 12.28.157.114 preference 20
exit
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
exit

ScreenOS Firewalls (NOT SRX)

Re: unable to access DVR through ssg5

‎04-14-2019 10:59 AM
Hi,
In new config, I see below :

set interface ethernet0/0 vip interface-ip

It doesn't have any reference of port/service etc.

Looks like a new service Cameras has been created to replace old "camera" . It's case sensitive I believe.

Please ensure, your VIP , service , security policies are configured correctly and then try.

If still doesn't work then we will need to debug using flow basic

Thanks,
Vikas
ScreenOS Firewalls (NOT SRX)

Re: unable to access DVR through ssg5

‎04-15-2019 04:22 PM

still with Issues. Is there a good reference to working with the OS on SSG5?

 

here is the new config

unset key protection enable
set clock ntp
set clock timezone -6
set vrouter trust-vr sharable
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
unset auto-route-export
exit
set service "Cameras" protocol tcp src-port 1024-65535 dst-port 37777-37777
set service "Cameras" + udp src-port 1024-65535 dst-port 37778-37778
set alg appleichat enable
unset alg appleichat re-assembly enable
set alg sctp enable
set auth-server "Local" id 0
set auth-server "Local" server-name "Local"
set auth default auth server "Local"
set auth radius accounting port 1646
set admin name "netscreen"
set admin password 
set admin user "root" password "nNzlBrrTDZ1HcT4JLslDT6AttGJLdn" privilege "all"
set admin user "_netscreen" password "nDwXNrrEIBtJcJgJ1sKHjXOtv2H8kn" privilege "all"
set admin access lock-on-failure 10
set admin auth web timeout 10
set admin auth dial-in timeout 3
set admin auth server "Local"
set admin format dos
set zone "Trust" vrouter "trust-vr"
set zone "Untrust" vrouter "trust-vr"
set zone "DMZ" vrouter "trust-vr"
set zone "VLAN" vrouter "trust-vr"
set zone "Untrust-Tun" vrouter "trust-vr"
set zone "Trust" tcp-rst
set zone "Untrust" block
unset zone "Untrust" tcp-rst
set zone "MGT" block
unset zone "V1-Trust" tcp-rst
unset zone "V1-Untrust" tcp-rst
set zone "DMZ" tcp-rst
unset zone "V1-DMZ" tcp-rst
unset zone "VLAN" tcp-rst
set zone "Untrust" screen tear-drop
set zone "Untrust" screen syn-flood
set zone "Untrust" screen ping-death
set zone "Untrust" screen ip-filter-src
set zone "Untrust" screen land
set zone "V1-Untrust" screen tear-drop
set zone "V1-Untrust" screen syn-flood
set zone "V1-Untrust" screen ping-death
set zone "V1-Untrust" screen ip-filter-src
set zone "V1-Untrust" screen land
set interface "ethernet0/0" zone "Untrust"
set interface "ethernet0/1" zone "DMZ"
set interface "bgroup0" zone "Trust"
set interface "tunnel.1" zone "Untrust"
set interface "tunnel.2" zone "Trust"
set interface bgroup0 port ethernet0/2
set interface bgroup0 port ethernet0/3
set interface bgroup0 port ethernet0/4
set interface bgroup0 port ethernet0/5
set interface bgroup0 port ethernet0/6
unset interface vlan1 ip
set interface ethernet0/0 ip 72.24.30.166/30
set interface ethernet0/0 route
set interface bgroup0 ip 192.168.1.1/24
set interface bgroup0 nat
set interface tunnel.1 ip unnumbered interface ethernet0/0
set interface tunnel.2 ip unnumbered interface ethernet0/0
set interface ethernet0/0 gateway 72.24.30.165
set interface "ethernet0/0" pmtu ipv4
unset interface vlan1 bypass-others-ipsec
unset interface vlan1 bypass-non-ip
set interface ethernet0/0 ip manageable
set interface bgroup0 ip manageable
set interface ethernet0/0 manage ping
set interface ethernet0/0 manage ssh
set interface ethernet0/0 manage telnet
set interface ethernet0/0 manage snmp
set interface ethernet0/0 manage ssl
set interface ethernet0/0 manage web
set interface ethernet0/0 manage ident-reset
set interface bgroup0 manage mtrace
set interface ethernet0/0 vip interface-ip 37777 "Cameras" 192.168.1.89
set interface bgroup0 vip 192.168.1.89
set interface bgroup0 dhcp server service
set interface bgroup0 dhcp server auto
set interface bgroup0 dhcp server option gateway 192.168.1.1
set interface bgroup0 dhcp server option netmask 255.255.255.0
set interface bgroup0 dhcp server option dns1 8.8.8.8
set interface bgroup0 dhcp server option dns2 24.116.2.50
set interface bgroup0 dhcp server option dns3 8.8.8.8
set interface bgroup0 dhcp server ip 192.168.1.100 to 192.168.1.150
unset interface bgroup0 dhcp server config next-server-ip
set interface "serial0/0" modem settings "USR" init "AT&F"
set interface "serial0/0" modem settings "USR" active
set interface "serial0/0" modem speed 115200
set interface "serial0/0" modem retry 3
set interface "serial0/0" modem interval 10
set interface "serial0/0" modem idle-time 10
set flow tcp-mss
unset flow tcp-syn-check
unset flow tcp-syn-bit-check
set flow reverse-route clear-text prefer
set flow reverse-route tunnel always
set pki authority default scep mode "auto"
set pki x509 default cert-path partial
set dns host dns1 24.116.0.53
set dns host dns2 8.8.8.8
set dns host dns3 8.8.4.4
set address "Trust" "192.168.1.0/24" 192.168.1.0 255.255.255.0
set address "Trust" "Dial-Up-VPN-Addr" 192.168.60.0 255.255.255.0
set address "Untrust" "192.168.0.0/24" 192.168.0.0 255.255.255.0
set ippool "vpn-ip-pool" 192.168.60.20 192.168.60.40
set user "L2TP" uid 10
set user "L2TP" type l2tp
set user "L2TP" remote ippool "vpn-ip-pool"
set user "L2TP" password "QFZa87v4NdmIYAsqIdCjpLkCmdnq/QJM7xr1g8vl+UeBO0TwNdTfBVQ="
unset user "L2TP" type auth
set user "L2TP" "enable"
set user-group "L2TP-vpn" id 10
set user-group "L2TP-vpn" user "L2TP"
set crypto-policy
exit
set ike gateway "Gateway for 192.168.0.0/24" address 12.28.157.114 Main outgoing-interface "ethernet0/0" preshare "T04ju3rWNFJT1MsKTTCEiFlcgXnAbjbZkg==" proposal "pre-g2-3des-sha" "pre-g2-aes128-sha"
set ike respond-bad-spi 1
set ike ikev2 ike-sa-soft-lifetime 60
unset ike ikeid-enumeration
unset ike dos-protection
unset ipsec access-session enable
set ipsec access-session maximum 5000
set ipsec access-session upper-threshold 0
set ipsec access-session lower-threshold 0
set ipsec access-session dead-p2-sa-timeout 0
unset ipsec access-session log-error
unset ipsec access-session info-exch-connected
unset ipsec access-session use-error-log
set vpn "VPN for 192.168.0.0/24" gateway "Gateway for 192.168.0.0/24" replay tunnel idletime 0 sec-level standard
set vpn "VPN for 192.168.0.0/24" monitor rekey
set vpn "VPN for 192.168.0.0/24" id 0x1 bind interface tunnel.1
set vpn "VPN for 192.168.0.0/24" dscp-mark 0
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
exit
set l2tp default dns1 8.8.8.8
set l2tp default ippool "vpn-ip-pool"
set l2tp default ppp-auth chap
set l2tp "YS_vpn" id 10 outgoing-interface ethernet0/0 keepalive 60
set l2tp "YS_vpn" remote-setting ippool "vpn-ip-pool" dns1 8.8.8.8
set url protocol websense
exit
set policy id 11 from "Untrust" to "Trust" "Any" "VIP(192.168.1.89)" "Cameras" permit log
set policy id 11
exit
set policy id 3 from "Untrust" to "Trust" "192.168.0.0/24" "192.168.1.0/24" "ANY" permit
set policy id 3
exit
set policy id 2 from "Trust" to "Untrust" "192.168.1.0/24" "192.168.0.0/24" "ANY" permit
set policy id 2
exit
set policy id 1 from "Trust" to "Untrust" "Any" "Any" "ANY" permit
set policy id 1
exit
set policy id 4 from "Trust" to "Untrust" "Any" "Any" "ANY" permit
set policy id 4
exit
set policy id 10 from "Untrust" to "Trust" "Dial-Up VPN" "Any" "ANY" tunnel l2tp "YS_vpn"
set policy id 10
exit
set nsmgmt bulkcli reboot-timeout 60
set ssh version v2
set config lock timeout 5
unset license-key auto-update
unset telnet client enable
set ntp server "0.0.0.0"
set ntp server backup1 "0.0.0.0"
set ntp server backup2 "0.0.0.0"
set snmp port listen 161
set snmp port trap 162
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
unset add-default-route
set route 192.168.0.0/24 interface tunnel.1
set route 0.0.0.0/0 interface ethernet0/0 gateway 12.28.157.114 preference 20
exit
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
exit

 

ScreenOS Firewalls (NOT SRX)

Re: unable to access DVR through ssg5

‎04-15-2019 06:02 PM
Is your camera access still not working ? How are you accessing the camera ? Any webpage etc, IP/port number ?

Please configure and enable the debug flow basic as in the document : https://kb.juniper.net/InfoCenter/index?page=content&id=KB12208 with ip/port filters , recreate the issue and capture the output of ‘ get db str”

Also, you can refer for the Concepts and Example guide for more details about the ScreenOS device.
https://www.juniper.net/documentation/software/screenos/screenos6.3.0/630_ce_all.pdf

Thanks and Regards
Vikas Singh
ScreenOS Firewalls (NOT SRX)

Re: unable to access DVR through ssg5

‎04-16-2019 03:34 PM

camera access still not working from the public ip  can see it fine on either end of the tunnel.  Using idmss lite to test  trying to reach the cameras on http://72.24.30.166 port 3777 which is standard for dvrs> I asked for permission to download the latest bios and was was told it is out of support I have five of these in production and more on the shelf. Will try the debug

thanks Michael 

ScreenOS Firewalls (NOT SRX)

Re: unable to access DVR through ssg5

‎04-21-2019 06:39 AM

Looking at your configuration it seems you have a typo in the port number for the VIP forwarding.

 

set interface ethernet0/0 vip interface-ip 37777 "Cameras" 192.168.1.89

 

37777 instead of 3777

 

Steve Puluka BSEET - Juniper Ambassador
IP Architect - DQE Communications Pittsburgh, PA (Metro Ethernet & ISP)
http://puluka.com/home