Quantcast
Channel: ScreenOS Firewalls (NOT SRX) topics
Viewing all 763 articles
Browse latest View live

ISG2000 High Availability issue

$
0
0

Hello experts,

We have a deployment of CoreFirewalls ISG2000 x 2 in HA. recently i observed that the backup unit is giving RED indication of HA LED. I don't know much about the HA config but it seems like something wrong with the HA and this light should be GREEN in colour normaly.

My question is

What does it mean and how could i troubleshoot this? so that it turns GREEN ?

Any troubleshooting commands?

 


Routing change from tunnel to a direct link issue

$
0
0

Hi All,

 

Existing setting:

HQ and the remote office are using site-to-site VPN to communicate. 96.0/20 traffic are routed via eth1/3.1 via the tunnel to remote site office.

192.168.96.0/20  <NS eth1/3.1> <ISP>......Site-to-Site VPN.....<ISP><eth0/2 NS> 192.168.130.0/24

 

New Setting:

We have added a new link (Fiber) and want to reroute those VPN traffic to the new Fiber.

192.168.96.0/20   <NS eth1/3.1><ISP>.........................................<ISP><eth0/2 NS> 192.168.130.0/24

                                <NS eth1/5><ISP>....................Fiber................<ISP><eth0/1 NS> 192.168.130.0/24

 

Issue:

HQ has implementated PBR with a 192.168.0.0/16. I added a more specific route 192.168.130.0/24 before this. HQ traffic cannot ping to the remote site after disable the tunnel.

 

1. Confirm the new link interface can be pinged on both netscreen.

2. HQ PC (192.168.98.82) cannot ping to FW new interface 192.168.230.1 and remote site interface 192.168.230.2.

3. RS PC (192.168.130.121) can ping to new interface 192.168.230.2 and remote site interface 192.168.230.1.

4. Tried to put the policy before pol-trust No 10 and found traffic were routed to Internet. (by tracroute)

5. Tried to put the policy after pol-trust No 10 and before 40, traffic are only shown '*' (by traceroute)

6. Tried to add a static route 192.168.130.0/24 next hop 192.168.230.2/29

7. Confirmed VPN tunnel is down when we were doing the re-route.

 

Site-to-site VPN between 3 locations (hairpin NAT)

$
0
0

Want to connect the VPN between 3 sites like below

BranchA(SSG140) <-> HA(SSG140) <-> BranchB(Palo Alto PA-820)

The VPN between the branch and HA were establish. Problem is how to make Branch A and B communicate through HA.

Found a link from Cisco website which demonstrate this situation.

https://community.cisco.com/t5/security-documents/how-to-configure-site-to-site-vpn-with-hairpinning-on-cisco-asa/ta-p/3157388

It mention "hairpin NAT" which I never heard of it before. My existing VPN no need any NAT policy.

Is the "hairpin NAT" a necessary setting for this situation?

Authentication window does not work in a world of "Let's Encrypt"

$
0
0

This is on an SSG5:

 

For years, I have been limiting Internet access from a couple subnets via the authentication option.  The users would have to enter a valid local userid & password to get out.

 

But now in the world of "Let's Encrypt", all the sites my users go to are https which does not trigger the authentication.  And the nice browsers substitute just the url (if entered) with https://url.

 

I just upgraded to the latest firmware:  6.3.0r26 and still no https support for authentication.

 

I followed

 

https://forums.juniper.net/t5/ScreenOS-Firewalls-NOT-SRX/AUthentication-Window-does-not-pop-up/m-p/4335#M1797

 

And made a service group including https and http (and ftp and telnet and...) and still no authentication window.

 

So what can I do other than to find a new site that has not switched to https (yet) and have the users go there first?

 

Selective NATing

$
0
0

I recently changed my ISP such that now my SSG5 needs to do the NATing function for the private IP addresses.

 

I have a /28 block of public addresses behind my ISP access gateway (that only NATs the private addresses of the one subnet it supports).  I have successfully set up the public address block in a zone in the untrust-vr routing domain with all my internal private addresses in the trust-vr routing domain.  There is a static route for 0.0.0.0 from trust-vr to untrust-vr

 

set vrouter "trust-vr"
unset add-default-route
set route 0.0.0.0/0 vrouter "untrust-vr" preference 20 metric 1

 

and a default gateway in untrust-vr to the public address of

 

set vrouter "untrust-vr"

set route 0.0.0.0/0 interface ethernet0/2 gateway 23.123.122.158

 

This is the public address assigned to the ISP access gateway.

 

all the interfaces handling zones for trust zones are set to nat (e.g.)

 

set interface ethernet0/1 ip 192.168.192.1/24
set interface ethernet0/1 nat

 

this works with one fault.  NATing is applied to access any server in my public block.  I would rather not.  I can put static routes on those systems to handle my private address blocks bhind the SSG5.

 

So the question:

 

How might I set things up so that connections from my trust domain to my public addressed servers in my untrust domain are not nated, while connections from my trust domain, THROUGH my public subnet to the Internet, are nated.

 

thanks

 

SSL ciphersuite

$
0
0

On my SSG5, I am running 6.3.0r26, which I believe is the most current.

 

The most current SSL cipher shown in the GUI is 3DES-SHA1.  the config has:

 

set ssl encrypt 3des sha-1

 

My browser does not support this old cipher, which it considers depricated. I have had to turn off SSL for the webGUI.

 

Is there a way to get SSL on the SSG5 to use a more modern cipher?

Netscreen with MIP configured to internal host uses egress interface IP for SNAT and not MIP IP.

$
0
0

Hi I've got a MIP configured on a netscreen (v6.3) firewall, the inbound traffic works fine but when traffic from the internal host leaves to the internet, it doesn't use the MIP external IP Address but the WAN egress interface IP.

 

I thought that MIPs were bidirectional and i've made sure to have policies in both directions. I've tried other policy combinations that result in the main DIP being used. 

 

I've Included some output below:

 

#### Inbound Policy ####
set interface "loopback.2" mip 80.100.133.185 host 10.21.0.241 netmask 255.255.255.255 vr "trust"
set policy id 28 name "IPSec-80-100-133-185" from "untrust" to "trust" "Any" "MIP(80.100.133.185)" "IPSec" permit log
set policy id 28
set service "UDP-4500"
set service "UDP-500"
set log session-init
exit

### Outbound Policy ###
set policy id 63 name "IPSec-Any-DST" from "trust" to "untrust" "10.21.0.241/32" "Any" "IPSec" permit log
set policy id 63
set service "UDP-4500"
set service "UDP-500"
exit


### Interfaces ###
set interface ethernet0/8.1 ip 10.66.65.246/29
set interface ethernet0/8.1 nat
set interface ethernet0/9.1 ip 23.20.152.244/31
set interface ethernet0/9.1 route
set interface ethernet0/9.1 mtu 1500


### Flow Basic ###

****** 60353039.0: <trust/ethernet0/8.1> packet received [212]******
ipid = 15211(3b6b), @1d680118
packet passed sanity check.
flow_decap_vector IPv4 process
ethernet0/8.1:10.21.0.241/500->50.60.253.153/500,17<Root>
no session found
flow_first_sanity_check: in <ethernet0/8.1>, out <N/A>
chose interface ethernet0/8.1 as incoming nat if.
flow_first_routing: in <ethernet0/8.1>, out <N/A>
search route to (ethernet0/8.1, 10.21.0.241->50.60.253.153) in vr trust for vsd-0/flag-0/ifp-null
cached route 0 for 50.60.253.153
add route 20 for 50.60.253.153 to route cache table
[ Dest] 20.route 50.60.253.153->23.20.152.245, to ethernet0/9.1
routed (x_dst_ip 50.60.253.153) from ethernet0/8.1 (ethernet0/8.1 in 0) to ethernet0/9.1
policy search from zone 101-> zone 102
policy_flow_search policy search nat_crt from zone 101-> zone 102
RPC Mapping Table search returned 0 matched service(s) for (vsys Root, ip 50.60.253.153, port 500, proto 17)
No SW RPC rule match, search HW rule
*** swrs_search_ip: policy matched id/idx/action = 63/23/0xd ***
*** Permitted by policy 63 ***
*** interface-nat dip id = 2, 10.21.0.241/500->23.20.152.244/3241 ***
choose interface ethernet0/9.1 as outgoing phy if
check nsrp pak fwd: in_tun=0xffffffff, VSD 0 for out ifp ethernet0/9.1
vsd 0 is active
no loop on ifp ethernet0/9.1.
session application type 54, name None, nas_id 0, timeout 60sec
ALG vector is not attached
service lookup identified service 0.
flow_first_final_check: in <ethernet0/8.1>, out <ethernet0/9.1>
existing vector list 221-2cee614.
Session (id:27141) created for first pak 221
flow_first_install_session======>
route to 23.20.152.245
cached arp entry with MAC 000000000000 for 23.20.152.245
arp entry found for 23.20.152.245
ifp2 ethernet0/9.1, out_ifp ethernet0/9.1, flag 10800804, tunnel ffffffff, rc 1
outgoing wing prepared, ready
handle cleartext reverse route
search route to (ethernet0/9.1, 50.60.253.153->10.21.0.241) in vr trust for vsd-0/flag-3000/ifp-ethernet0/8.1
cached route 0 for 10.21.0.241
add route 5 for 10.21.0.241 to route cache table
[ Dest] 5.route 10.21.0.241->10.66.65.241, to ethernet0/8.1
route to 10.66.65.241
cached arp entry with MAC 000000000000 for 10.66.65.241
add arp entry with MAC 00000c9ff5f3 for 10.66.65.241 to cache table
arp entry found for 10.66.65.241
ifp2 ethernet0/8.1, out_ifp ethernet0/8.1, flag 00800805, tunnel ffffffff, rc 1
flow got session.
flow session id 27141
flow_main_body_vector in ifp ethernet0/8.1 out ifp ethernet0/9.1
flow vector index 0x221, vector addr 0x2cee614, orig vector 0x2cee614
vsd 0 is active
post addr xlation: 23.20.152.244->50.60.253.153.
update policy out counter info.
packet send out to 0017dffe7000 through ethernet0/9.1


****** Traffic from source continues to use Internet Interface IP. There is no 'DIP 2' configured.... ********

 

 

Any help would be appreciated with the behaviour of this. 

 

 

SSG 520 Physical Bandwidth on Interface

$
0
0

Hello,

I have an interface on our SSG 520 device that has a physical bandwidth set to 100Mb.  The other interfaces are 1000 and we are increasing the speed of the circuit on this interface and need to get it to 1000mb.  How can I change this or is it automatically detected?  I have checked through the forums and google and haven't seemed to find a solid answer.

Thanks!

interface.PNG


How to show response time of each ping

$
0
0

Seems that the default ping is rapid style. Give me 5 "!" in a blink of an eye.

Is that possible to make it show like the ping result in Windows. Which show the bytes, time and TTL for each ping.

Also, can it be slow down? Now is 5 "!" 100% success in just 1 second.

Network setup change

$
0
0

Currently, we have IPSEC VPN tunnels between juniper devices.  I have a  SSG5 as the firewall. 

We are moving to AT&T MPLS with a cloud-based firewall.  I will be keeping the old circuit alive for 2 sites as the MPLS doesn't do IPSEC VPN. 

 

I have the idea that SSG5 will still be default gateway and traffic for the 2 IPSEC subnets routed via static routing through the old ISP and traffic for other subnets routed to the MPLS AVPN.  Internet traffic would also route via MPLS AVPN.

 

Assuming all my config is right, does this sound like it would work?

No VPN Traffic Flows for 3 Minutes after Phase 2 ReKey

$
0
0

I have a couple of small business customers that are still using NS5GTs.  One of them has an Office in CA and another Office in Florida.  Both Offices have a static public IP and an NS5GT with a site-to-site policy-based VPN connecting them.  When the Phase 2 lifetime expires, both sides renegotiate the connection and it is back up in a second so all looks normal.  However, no traffic will pass over the VPN for almost exactly 3 minutes and then it resumes as normal.

Here are the event logs for one side:

2019-02-28 11:06:13 system info 00536 IKE<104.4.xxx.xxx> Phase 2 msg ID <112a9154>: Completed negotiations with SPI <c5ed3164>, tunnel ID <1>, and lifetime <86400> seconds/<0> KB.
2019-02-28 11:06:13 system info 00536 IKE<104.4.xxx.xxx> Phase 2 msg ID <112a9154>: Responded to the peer's first message.
2019-02-28 11:06:13 system info 00536 IKE<104.4.xxx.xxx> Phase 1: Completed Main mode negotiations with a <28800>-second lifetime.
2019-02-28 11:06:13 system info 00536 IKE<104.4.xxx.xxx> Phase 1: Responder starts MAIN mode negotiations.

The lifetime looks funny here because we changed it to one day to verify the problem occurs when the Phase 2 lifetime expires.

We also setup a ping test from a server on one side to a device on the other side and enabled logging on the policy to verify that traffic was actually being sent across the VPN:

2019-02-28 11:07:27 Encrypt 10.0.0.20:48782 10.0.1.8:14 59 sec 78 0 ICMP
2019-02-28 11:07:23 Encrypt 10.0.0.20:48781 10.0.1.8:14 60 sec 78 0 ICMP
2019-02-28 11:07:19 Encrypt 10.0.0.20:48780 10.0.1.8:14 61 sec 78 0 ICMP
2019-02-28 11:07:13 Encrypt 10.0.0.20:48779 10.0.1.8:14 59 sec 78 0 ICMP
2019-02-28 11:06:17 Encrypt 10.0.0.20:48778 10.0.1.8:14 4 sec 78 78 ICMP
2019-02-28 11:06:15 Encrypt 10.0.0.20:48776 10.0.1.8:14 4 sec 78 78 ICMP
2019-02-28 11:06:13 Encrypt 10.0.0.20:48777 10.0.1.8:14 1 sec 78 78 ICMP

The ICMP 78 bytes sent / 0 received continue for 3 minutes and then the pings start going through again (as does other traffic).

We also turned Heartbeats on and it shows no problems with the VPN.

The logs from the other side looks exactly the same with no problems except for the traffic stopping for 3 minutes after the rekey.

Any ideas?

Connect 2 Juniper SSG5 one after the other

$
0
0

Hello, I apologize first for my English. It is not my language.


I want to set up a network in my office as follows:


A fiber router connected to the Internet, connected to this router I have a Juniper SSG5 through the interface eth0/0 which has several computers, printer and NAS connected (192.168.1.1/24) connected to this Juniper SSG5 I have another one for the eth0/6 from the first to the eth0/0 of the second. The second is in the range of 192.168.100.1/24. This second network has access to Internet without problem and they see the printer, computers, NAS of the network 192.168.1.1/24 but the computers that are in the network 192.168.1.1/24 do not see the computers, servers that are in the network 192.168.100.1/24.

EsquemaRed.jpg

 

 

A greeting and thanks for the help.

Routing to trusted subnet

$
0
0

Dear Community,

I hope you can give a a little help.

We inherited a network with an old SSG 5 (will be replaced in some weeks). This SSG 5 is connected to LAN (via bridge0) and WAN. 

A primary (192.168.45.250) and secondary IP (10.100.30.254) are assigned to the bridge-Interface. The SSG 5 is Standard-Gateway for all Clients in the LAN-Network.

Next to the SSG 5 there is a VLAN-Router in the same network (IP 10.100.30.245) which is used to connect the VLAN 10.100.40.0/24 to the rest of the network.

 

The VLAN-Router also acts as DHCP-Server for clients in the VLAN. Default Route of VLAN-Router points to SSG 5, Standard-Gateway for VLAN-Clients is the VLAN-Router.

In the SSG 5, I added a route back to the VLAN: 10.100.40.0/24 -> 10.100.30.245. The 10.100.40.0/24 network has also been added as trusted zone (same trust zone as 10.100.30/24) in the SSG 5.

 

The problem is, that there is no communication possibile between 10.100.40.0/24 and 10.100.30.0/24. Do I have to add addiotional policies to allow inter-zone routing?

 

Thanks a lot & best regards,

MIchael

 

SSG5 no VPN connection possible

$
0
0

Hello,

I have been trying to establish a vpn tunnel with my ssg5 device by means of Shrew Soft app.

I followed this tutorial:

https://www.shrew.net/support/Howto_Juniper_SSG

I cannot tell how many times everything has been checked, but the connection still does not work.

Strangely enough the logs on the router have only good infos in store:

2019-03-19 09:42:41 info IKE 46.xxx24 Phase 1: Retransmission limit has been reached.
2019-03-19 09:41:52 info IKE 46.xxx24 phase 1:The symmetric crypto key has been generated successfully.
2019-03-19 09:41:52 info IKE 46.xxx24 Phase 1: Responder starts AGGRESSIVE mode negotiations.

and that is about it.

Help!!!

I am even unable to establish ssh connection, the only access I have is the webgui (I know it shoult be a separate thread).

Would be grateful for any help on that! I need vpn and any working solution would be appreciated.

Thank you in advance!

Pass multiple subnets through the SSG-20?

$
0
0

I have an SSG-20 with multiple public subnets. One is external, the others are internal. Substitution addresses here for convenience.

 

Eth 0/0 - 1.1.1.1/28

Bgroup0 - 192.168.250.1/24

Subnets  behind SSG - 2.2.2.1/28, 3.3.3.1/28, 4.4.4.1/28

 

We have the routes on the trust-vr to the 2, 3, 4 networks.

We can ping the routes from the SSG and anything internally.

The ISP is routing all of the networks to us successfully. I created a policy - any -> 2.2.2.1/28 allowed with logging - and I see all of the traffic, but none of it passes through.

If I attempt to ping the internal address from Eth 0/0 it fails.

There are firewalls and routers which own those subnets below the SSG.

 

So, how does one pass multiple subnets through the SSG? 


SRX to SRX VPN with self signed certificates

$
0
0
Hi,

I’m looking to create a VPN between 2 SRX devices. I want to use self signed certificates to authenticate the VPN.

Does anyone know the procedure for this?

SRX to SRX VPN with self signed certificates

I want to change the Interface of a zone from 1G to 10G port

$
0
0

Dear All,

 

I have a ISG-2000 in production, and need to move a tagged interface for zone ABC tagged under interface "ethernet4/2.826" to a 10G port. How can I do this with minimum service affect?

The Zone currently has vrouter, Address elements, Group Address elements and Policies defined.

What is the easiet way i can achive this?

Basically beed to change from interface "ethernet4/2.826" to ethernet2/2.826 for example... retaining all the configuration related to this zone?

Regards,

Riz

SSG5 Site to Site VPN Won't come up Inactive/Inactive

$
0
0

New member to the forum  have an issue with new vpn tunnel new install do not know what my issue is. s the config flawed or is the isp blocking my vpn?  Thanks Michael

 

cfg files as follows

cfg1

unset key protection enable
set clock ntp
set clock timezone -6
set vrouter trust-vr sharable
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
unset auto-route-export
exit
set service "cameras" protocol tcp src-port 0-65535 dst-port 80-80
set service "cameras" + tcp src-port 0-65535 dst-port 2000-2000
set service "cameras" + udp src-port 0-65535 dst-port 80-80
set service "cameras" + udp src-port 0-65535 dst-port 2000-2000
set alg appleichat enable
unset alg appleichat re-assembly enable
set alg sctp enable
set auth-server "Local" id 0
set auth-server "Local" server-name "Local"
set auth default auth server "Local"
set auth radius accounting port 1646
set admin name "netscreen"
set admin password
set admin user "root" password "nNzlBrrTDZ1HcT4JLslDT6AttGJLdn" privilege "all"
set admin user "_netscreen" password "nDwXNrrEIBtJcJgJ1sKHjXOtv2H8kn" privilege "all"
set admin auth web timeout 10
set admin auth dial-in timeout 3
set admin auth server "Local"
set admin format dos
set zone "Trust" vrouter "trust-vr"
set zone "Untrust" vrouter "trust-vr"
set zone "DMZ" vrouter "trust-vr"
set zone "VLAN" vrouter "trust-vr"
set zone "Untrust-Tun" vrouter "trust-vr"
set zone "Trust" tcp-rst
set zone "Untrust" block
unset zone "Untrust" tcp-rst
set zone "MGT" block
unset zone "V1-Trust" tcp-rst
unset zone "V1-Untrust" tcp-rst
set zone "DMZ" tcp-rst
unset zone "V1-DMZ" tcp-rst
unset zone "VLAN" tcp-rst
set zone "Untrust" screen tear-drop
set zone "Untrust" screen syn-flood
set zone "Untrust" screen ping-death
set zone "Untrust" screen ip-filter-src
set zone "Untrust" screen land
set zone "V1-Untrust" screen tear-drop
set zone "V1-Untrust" screen syn-flood
set zone "V1-Untrust" screen ping-death
set zone "V1-Untrust" screen ip-filter-src
set zone "V1-Untrust" screen land
set interface "ethernet0/0" zone "Untrust"
set interface "ethernet0/1" zone "DMZ"
set interface "bgroup0" zone "Trust"
set interface "tunnel.1" zone "Untrust"
set interface "tunnel.2" zone "Trust"
set interface bgroup0 port ethernet0/2
set interface bgroup0 port ethernet0/3
set interface bgroup0 port ethernet0/4
set interface bgroup0 port ethernet0/5
set interface bgroup0 port ethernet0/6
unset interface vlan1 ip
set interface ethernet0/0 ip 72.24.30.166/30
set interface ethernet0/0 route
set interface bgroup0 ip 192.168.1.1/24
set interface bgroup0 nat
set interface tunnel.1 ip unnumbered interface ethernet0/0
set interface tunnel.2 ip unnumbered interface ethernet0/0
set interface ethernet0/0 gateway 72.24.30.165
set interface "ethernet0/0" pmtu ipv4
unset interface vlan1 bypass-others-ipsec
unset interface vlan1 bypass-non-ip
set interface ethernet0/0 ip manageable
set interface bgroup0 ip manageable
set interface ethernet0/0 manage ping
set interface ethernet0/0 manage ssh
set interface ethernet0/0 manage telnet
set interface ethernet0/0 manage snmp
set interface ethernet0/0 manage ssl
set interface ethernet0/0 manage web
set interface ethernet0/0 manage ident-reset
set interface bgroup0 manage mtrace
set interface bgroup0 dhcp server service
set interface bgroup0 dhcp server auto
set interface bgroup0 dhcp server option gateway 192.168.1.1
set interface bgroup0 dhcp server option netmask 255.255.255.0
set interface bgroup0 dhcp server option dns1 8.8.8.8
set interface bgroup0 dhcp server option dns2 24.116.2.50
set interface bgroup0 dhcp server option dns3 8.8.8.8
set interface bgroup0 dhcp server ip 192.168.1.100 to 192.168.1.150
unset interface bgroup0 dhcp server config next-server-ip
set interface "serial0/0" modem settings "USR" init "AT&F"
set interface "serial0/0" modem settings "USR" active
set interface "serial0/0" modem speed 115200
set interface "serial0/0" modem retry 3
set interface "serial0/0" modem interval 10
set interface "serial0/0" modem idle-time 10
set flow tcp-mss
unset flow tcp-syn-check
unset flow tcp-syn-bit-check
set flow reverse-route clear-text prefer
set flow reverse-route tunnel always
set pki authority default scep mode "auto"
set pki x509 default cert-path partial
set dns host dns1 24.116.0.53
set dns host dns2 24.116.2.50
set dns host dns3 0.0.0.0
set address "Trust" "192.168.1.0/24" 192.168.1.0 255.255.255.0
set address "Trust" "Dial-Up-VPN-Addr" 192.168.60.0 255.255.255.0
set address "Untrust" "192.168.0.0/24" 192.168.0.0 255.255.255.0
set ippool "vpn-ip-pool" 192.168.60.20 192.168.60.40
set user "L2TP" uid 10
set user "L2TP" type l2tp
set user "L2TP" remote ippool "vpn-ip-pool"
set user "L2TP" password "QFZa87v4NdmIYAsqIdCjpLkCmdnq/QJM7xr1g8vl+UeBO0TwNdTfBVQ="
unset user "L2TP" type auth
set user "L2TP" "enable"
set user-group "L2TP-vpn" id 10
set user-group "L2TP-vpn" user "L2TP"
set crypto-policy
exit
set ike gateway "Gateway for 192.168.0.0/24" address 12.28.157.114 Main outgoing-interface "ethernet0/0" preshare "T04ju3rWNFJT1MsKTTCEiFlcgXnAbjbZkg==" proposal "pre-g2-3des-sha" "pre-g2-aes128-sha"
set ike respond-bad-spi 1
set ike ikev2 ike-sa-soft-lifetime 60
unset ike ikeid-enumeration
unset ike dos-protection
unset ipsec access-session enable
set ipsec access-session maximum 5000
set ipsec access-session upper-threshold 0
set ipsec access-session lower-threshold 0
set ipsec access-session dead-p2-sa-timeout 0
unset ipsec access-session log-error
unset ipsec access-session info-exch-connected
unset ipsec access-session use-error-log
set vpn "VPN for 192.168.0.0/24" gateway "Gateway for 192.168.0.0/24" replay tunnel idletime 0 sec-level standard
set vpn "VPN for 192.168.0.0/24" monitor rekey
set vpn "VPN for 192.168.0.0/24" id 0x1 bind interface tunnel.1
set vpn "VPN for 192.168.0.0/24" dscp-mark 0
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
exit
set l2tp default dns1 8.8.8.8
set l2tp default ippool "vpn-ip-pool"
set l2tp default ppp-auth chap
set l2tp "YS_vpn" id 10 outgoing-interface ethernet0/0 keepalive 60
set l2tp "YS_vpn" remote-setting ippool "vpn-ip-pool" dns1 8.8.8.8
set url protocol websense
exit
set policy id 3 from "Untrust" to "Trust" "192.168.0.0/24" "192.168.1.0/24" "ANY" permit
set policy id 3
exit
set policy id 2 from "Trust" to "Untrust" "192.168.1.0/24" "192.168.0.0/24" "ANY" permit
set policy id 2
exit
set policy id 1 from "Trust" to "Untrust" "Any" "Any" "ANY" permit
set policy id 1
exit
set policy id 4 from "Trust" to "Untrust" "Any" "Any" "ANY" permit
set policy id 4
exit
set policy id 10 from "Untrust" to "Trust" "Dial-Up VPN" "Any" "ANY" tunnel l2tp "YS_vpn"
set policy id 10
exit
set nsmgmt bulkcli reboot-timeout 60
set ssh version v2
set config lock timeout 5
unset license-key auto-update
unset telnet client enable
set ntp server "0.0.0.0"
set ntp server backup1 "0.0.0.0"
set ntp server backup2 "0.0.0.0"
set snmp port listen 161
set snmp port trap 162
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
unset add-default-route
set route 192.168.0.0/24 interface tunnel.1
set route 0.0.0.0/0 interface ethernet0/0 gateway 12.28.157.114 preference 20
exit
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
exit

cfg2 

unset key protection enable
set clock ntp
set clock timezone -6
set vrouter trust-vr sharable
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
unset auto-route-export
exit
set service "cameras" protocol tcp src-port 0-65535 dst-port 80-80
set service "cameras" + tcp src-port 0-65535 dst-port 2000-2000
set service "cameras" + udp src-port 0-65535 dst-port 80-80
set service "cameras" + udp src-port 0-65535 dst-port 2000-2000
set alg appleichat enable
unset alg appleichat re-assembly enable
set alg sctp enable
set auth-server "Local" id 0
set auth-server "Local" server-name "Local"
set auth default auth server "Local"
set auth radius accounting port 1646
set admin name "netscreen"
set admin password
set admin user "root" password "nNzlBrrTDZ1HcT4JLslDT6AttGJLdn" privilege "all"
set admin user "_netscreen" password "nDwXNrrEIBtJcJgJ1sKHjXOtv2H8kn" privilege "all"
set admin auth web timeout 10
set admin auth dial-in timeout 3
set admin auth server "Local"
set admin format dos
set zone "Trust" vrouter "trust-vr"
set zone "Untrust" vrouter "trust-vr"
set zone "DMZ" vrouter "trust-vr"
set zone "VLAN" vrouter "trust-vr"
set zone "Untrust-Tun" vrouter "trust-vr"
set zone "Trust" tcp-rst
set zone "Untrust" block
unset zone "Untrust" tcp-rst
set zone "MGT" block
unset zone "V1-Trust" tcp-rst
unset zone "V1-Untrust" tcp-rst
set zone "DMZ" tcp-rst
unset zone "V1-DMZ" tcp-rst
unset zone "VLAN" tcp-rst
set zone "Untrust" screen tear-drop
set zone "Untrust" screen syn-flood
set zone "Untrust" screen ping-death
set zone "Untrust" screen ip-filter-src
set zone "Untrust" screen land
set zone "V1-Untrust" screen tear-drop
set zone "V1-Untrust" screen syn-flood
set zone "V1-Untrust" screen ping-death
set zone "V1-Untrust" screen ip-filter-src
set zone "V1-Untrust" screen land
set interface "ethernet0/0" zone "Untrust"
set interface "ethernet0/1" zone "DMZ"
set interface "bgroup0" zone "Trust"
set interface "tunnel.1" zone "Untrust"
set interface "tunnel.2" zone "Trust"
set interface bgroup0 port ethernet0/2
set interface bgroup0 port ethernet0/3
set interface bgroup0 port ethernet0/4
set interface bgroup0 port ethernet0/5
set interface bgroup0 port ethernet0/6
unset interface vlan1 ip
set interface ethernet0/0 ip 12.28.157.114/29
set interface ethernet0/0 route
set interface bgroup0 ip 192.168.0.1/24
set interface bgroup0 nat
set interface tunnel.1 ip unnumbered interface ethernet0/0
set interface tunnel.2 ip unnumbered interface ethernet0/0
set interface ethernet0/0 gateway 12.28.157.113
set interface "ethernet0/0" pmtu ipv4
unset interface vlan1 bypass-others-ipsec
unset interface vlan1 bypass-non-ip
set interface ethernet0/0 ip manageable
set interface bgroup0 ip manageable
set interface ethernet0/0 manage ping
set interface ethernet0/0 manage ssh
set interface ethernet0/0 manage telnet
set interface ethernet0/0 manage snmp
set interface ethernet0/0 manage ssl
set interface ethernet0/0 manage web
set interface ethernet0/0 manage ident-reset
set interface bgroup0 manage mtrace
set interface bgroup0 dhcp server service
set interface bgroup0 dhcp server auto
set interface bgroup0 dhcp server option gateway 192.168.0.1
set interface bgroup0 dhcp server option netmask 255.255.255.0
set interface bgroup0 dhcp server option dns1 8.8.8.8
set interface bgroup0 dhcp server option dns2 8.8.4.4
set interface bgroup0 dhcp server option dns3 68.105.28.16
set interface bgroup0 dhcp server ip 192.168.0.100 to 192.168.0.150
unset interface bgroup0 dhcp server config next-server-ip
set interface "serial0/0" modem settings "USR" init "AT&F"
set interface "serial0/0" modem settings "USR" active
set interface "serial0/0" modem speed 115200
set interface "serial0/0" modem retry 3
set interface "serial0/0" modem interval 10
set interface "serial0/0" modem idle-time 10
set flow tcp-mss
unset flow tcp-syn-check
unset flow tcp-syn-bit-check
set flow reverse-route clear-text prefer
set flow reverse-route tunnel always
set pki authority default scep mode "auto"
set pki x509 default cert-path partial
set dns host dns1 8.8.8.8
set dns host dns2 8.8.4.4
set dns host dns3 0.0.0.0
set address "Trust" "192.168.0.0/24" 192.168.0.0 255.255.255.0
set address "Trust" "Dial-Up-VPN-Addr" 192.168.60.0 255.255.255.0
set address "Untrust" "192.168.1.0/24" 192.168.1.0 255.255.255.0
set ippool "vpn-ip-pool" 192.168.60.20 192.168.60.40
set user "L2TP" uid 10
set user "L2TP" type l2tp
set user "L2TP" remote ippool "vpn-ip-pool"
set user "L2TP" password "QFZa87v4NdmIYAsqIdCjpLkCmdnq/QJM7xr1g8vl+UeBO0TwNdTfBVQ="
unset user "L2TP" type auth
set user "L2TP" "enable"
set user-group "L2TP-vpn" id 10
set user-group "L2TP-vpn" user "L2TP"
set crypto-policy
exit
set ike gateway "Gateway for 192.168.1.0/24" address 72.24.30.166 Main outgoing-interface "ethernet0/0" preshare "T04ju3rWNFJT1MsKTTCEiFlcgXnAbjbZkg==" proposal "pre-g2-3des-sha" "pre-g2-aes128-sha"
set ike respond-bad-spi 1
set ike ikev2 ike-sa-soft-lifetime 60
unset ike ikeid-enumeration
unset ike dos-protection
unset ipsec access-session enable
set ipsec access-session maximum 5000
set ipsec access-session upper-threshold 0
set ipsec access-session lower-threshold 0
set ipsec access-session dead-p2-sa-timeout 0
unset ipsec access-session log-error
unset ipsec access-session info-exch-connected
unset ipsec access-session use-error-log
set vpn "VPN for 192.168.1.0/24" gateway "Gateway for 192.168.1.0/24" replay tunnel idletime 0 sec-level standard
set vpn "VPN for 192.168.1.0/24" monitor rekey
set vpn "VPN for 192.168.1.0/24" id 0x1 bind interface tunnel.1
set vpn "VPN for 192.168.1.0/24" dscp-mark 0
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
exit
set l2tp default dns1 8.8.8.8
set l2tp default ippool "vpn-ip-pool"
set l2tp default ppp-auth chap
set l2tp "YS_vpn" id 10 outgoing-interface ethernet0/0 keepalive 60
set l2tp "YS_vpn" remote-setting ippool "vpn-ip-pool" dns1 8.8.8.8
set url protocol websense
exit
set policy id 3 from "Untrust" to "Trust" "192.168.1.0/24" "192.168.0.0/24" "ANY" permit
set policy id 3
exit
set policy id 2 from "Trust" to "Untrust" "192.168.0.0/24" "192.168.1.0/24" "ANY" permit
set policy id 2
exit
set policy id 1 from "Trust" to "Untrust" "Any" "Any" "ANY" permit
set policy id 1
exit
set policy id 4 from "Trust" to "Untrust" "Any" "Any" "ANY" permit
set policy id 4
exit
set policy id 10 from "Untrust" to "Trust" "Dial-Up VPN" "Any" "ANY" tunnel l2tp "YS_vpn"
set policy id 10
exit
set nsmgmt bulkcli reboot-timeout 60
set ssh version v2
set config lock timeout 5
unset license-key auto-update
unset telnet client enable
set ntp server "0.0.0.0"
set ntp server backup1 "0.0.0.0"
set ntp server backup2 "0.0.0.0"
set snmp port listen 161
set snmp port trap 162
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
unset add-default-route
set route 192.168.1.0/24 interface tunnel.1
set route 0.0.0.0/0 interface ethernet0/0 gateway 72.24.30.166 preference 20
exit
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
exit

 

 

ISG2000 6.3.0r16b.0 firmware update to 6.3.0r26

$
0
0

Hi all,

 

I have a Juniper ISG2000 (No IDP) with the version 6.3.0r16b.0, I would like to upgrade the firewall firmware to : 6.3.0r26. 

 

What are the changes in the new version?

 

What are the open points?

 

Thanks

Viewing all 763 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>