码迷,mamicode.com
首页 > 其他好文 > 详细

    Junipersrx100防火墙配置指导

时间:2016-05-29 23:23:19      阅读:1465      评论:0      收藏:0      [点我收藏+]

标签:防火墙

                   Junipersrx100防火墙配置指导

 

#

一、初始化安装

1.1设备登录

Juniper SRX系列防火墙。开机之后,第一次必须通过console 口(通用超级终端缺省配置)连接SRX   , 输入root 用户名登陆,密码为空,进入到SRX设备之后可以开始加载基线配置。

  特别注意:SRX低端系列防火墙,在第一次登陆时,执行命令 “show configuration” 你会发现系统本身已经具备一些配置内容(包括DNS名称、DHCP服务器等),建议删除这些配置,重新配置。 Delete 删除

 

设备开机请直接通过console 连接到防火墙设备

 

Login : root

Password : /***初始化第一次登陆的时候,密码为空**/

 

Root% cli /**进入操作模式**/

Root>

Root> configure  /** 进入配置模式**/

Root# delete /***配置模式执行命令“delete” 全局删除所有的系统缺省配置***/

1.2 系统基线配置

Set system host-name  name

/***配置设备名称“name”***/

 

Set system time-zone Asia/Chongqing

/***配置系统时区***/

 

 

Set system root-authenticationplain-text-password  输入命令,回车

New password:   第一次输入新密码,

Retype new password  重新确认新密码

/***配置系统缺省根账号密码,不允许修改根账号名称“root” ***/

注意:root帐号不能用于telnet,但是可以用于web和ssh管理登录到设备

 

Set system login user topsciclass super-user authentication plain-text-password

Newpassword            输入密码

Retype newpassword      确认密码

 

/***创建一个系统本地账号“name“,

 

set systemservices ssh

set systemservices telnet

set systemservices web-management http interface all

set systhmservices web-management http port 81 interface all

set systemservices web-management https system-generated-certificate

set systemservices web-management https interface all

 

/***全局开启系统管理服务,ssh\telnet\http\https***/

 

setinterfacesge-0/0/2unit 0 family inet address 10.10.10.1/24

set securityzones security-zone trustinterfaces ge-0/0/2.0host-inbound-trafficsystem-services all

set securityzones security-zone trustinterfacesge-0/0/2.0host-inbound-traffic protocols all

/***定义内网接口同时定义安全区域并将接口加入到安全区域,接口的选择根据实际需求安排***/

至此系统的基线配置完成,你可以通过PC机连接到防火墙的ge-0/0/2端口配置同网段的IP地址,使用WEB界面或者telnet\SSH方式登录到防火墙,实施生产配置和进一步完善基线配置,比如配置NTP服务器、SYSLOG服务器、SNMP服务器、安全策略、路由协议、地址转换、UTM等功能。

 

二、应用场景——生产配置实施步骤

2.1 打开浏览器,输入http://Ip地址,输入用户名和密码,点击login进入到WEB管理。

技术分享

技术分享技术分享

2.2 配置接口IP地址

首先点击WEB界面顶端菜单栏的”Configure”按钮,然后点击并展开左边菜单栏的”interface”按钮,接下来点击ports,按钮,页面将展示系统在线的所有端口。

 

然后我们可以开始查看并配置相应的物理接口IP地址,在本应用场景中,我们将需要在WEB界面配置fe-0/0/0/端口(连接公网)ge-0/0/2端口由于属于内网接口,ge-0/0/2在之前基线配置中已经完成,因此WEB界面不再重新说明如何配置,配置方法与接下来的端口配置一致。

在此选择一个你想要配置的物理接口,点击右上角的”ADD”按钮下拉,然后再点击“logical interface”

 

技术分享当点击”logicalinterface”之后,系统会自动跳出一个对话框,让你配置接口IP地址、接口描述等信息。

必须填写一个unit数字,比如0(建议),这个unit是一个物理接口中逻辑接口的标识,没有特殊的意义,但是必须要配置。在描述信息中可以根据实际情况进行填写,一般建议取一个比较有意义易识别的简单拼音或英语。在ZONE此处可以暂时不选择,因为后面会配置。

VLAN ID也不需要配置,因为是三层接口,而并非VLAN接口,接下来就是需要配置一个通信IP地址和子网掩码。最后点击OK按钮,代表此接口配置结束,仅仅是结束并不是生效,后面我们需要根据步骤和系统右上角的”Actions”按钮会出现闪烁,提醒我们需要对刚刚完成的配置进行提交和保存,如下图,我们需要点击右上角的”Actions”按钮下拉,然后点击commmit按钮,提交和保存配置,如果配置校验检查失败,将会有告警提醒用户。

 

 

 

 

技术分享

 

三、配置安全区域

首先点击WEB界面顶端菜单栏的”Configure”按钮,然后点击并展开左边菜单栏的”security”按钮,接下来点击zone/screens,按钮,页面将展示已经存在的安全功能区域,如下图配置

技术分享

四、配置路由协议

首先点击WEB界面顶端菜单栏的”Configure”按钮,然后点击并展开左边菜单栏的”routing”按钮,接下来点击static routing,按钮,开始添加静态路由,点击右上角的ADD按钮,系统将自动弹出一个对话框完成静态路由的添加(本次配置缺省路由到公网),点击add按钮添加下一跳网关地址,完成静态路由的添加配置,最后点击右上角的actions按钮下拉commit并点击,完成静态路由配置的提交和保存。

 

五、配置NAT地址装换

首先点击WEB界面顶端菜单栏的”Configure”按钮,然后点击并展开左边菜单栏的”NAT”按钮,接下来点击Static NAT按钮,开始配置静态地址转换,在配置静态地址转换之前,还需要做一个与NAT相关的配置,那就是定义Proxy ARP,定义Proxy ARP是因为我们接下来使用的NAT公网地址并不是接口自身的IP地址。点击Proxy ARP按钮在NAT配置菜单里,点击add,系统自动弹出对话框要求填写NAT公网地址段、连接公网的接口。最后如下图:

 

接下来配置静态地址转换的规则,其中有两个部分内容需要填写,第一部分是rule-set,然后在rule-set里面定义真正的NAT 规则rulesrules由多个小的rule组成,比如下图中的右边部分就是rule配置,一个公网地址对应一个内部DMZ区域私网IP地址,实现一对一的静态地址转换。

 

下图就是在完成上图之后的结果展示,点击定义好的rule-set,可以看到相应的ruels资源。

 

 

接下来配置源地址转换的规则,内网地址转换到fe-0/0/0.0接口地址。实现内网地址访问公网。

打开 source nat,点击add,首先配置rule set,此时需要指定rule set name以及NAT的方向,比如从trust zone to untrust zone,接下来点击rules中的Add,开始添加rule,同样需要填写rule name、匹配的条件(源地址、目标地址必须,可选IP协议和目的端口号),然后在action部分选择引用inteface

技术分享

 

最后我们可以查看定义完之后的源地址rule-set对象并执行commit提交配置,最终结果展现如下:

 

 

 

技术分享

五、配置安全策略

本次应用场景一中的安全策略配置涉及三个方向,内网与外网之间的访问、、外网到内网之间的访问,在配置安全策略之前,我们需要提前配置与安全策略相关的策略元素,其中包括地址对象的自定义,服务对象的自定义等。

下面首先将介绍策略元素的自定义,地址对象与服务对象。首先点击WEB界面顶端菜单栏的”Configure”按钮,然后点击并展开左边菜单栏的”security”按钮,接下来点击policy elements按钮,然后再点击”address book”按钮,接着可以点击右上角的ADD按钮添加地址对象和地址组,地址对象菜单“address”地址组对象菜单”address sets”

技术分享

当我们完成地址对象和服务对象的自定义之后,接下来可以书写安全访问控制策略,首先点击WEB界面顶端菜单栏的”Configure”按钮,然后点击并展开左边菜单栏的”security”按钮,接下来点击policy按钮,最后点击apply policy按钮去创建区域与区域之间的安全策略。

技术分享

 

 

配置完成。可以利用内网地址,ping外网测试下。

 

六、应用场景一测试配置CLI(生产配置)

 

set version 12.1X44-D35.5

set system host-name juniper-fw-srx100

set system time-zone Asia/Chongqing

set system root-authenticationencrypted-password "$1$SL2B6zY9$bo.R3TbT4v0vO7sWgR7Vl."

set system login user topsci uid 2001

set system login user topsci classsuper-user

set system login user topsci authenticationencrypted-password "$1$EjN.ZIvT$YYy6M6qo5oTxvSnWqCFq2/"

set system services ssh

set system services telnet

set system services web-management httpport 6666

set system services web-management httpinterface all

set system services web-management httpssystem-generated-certificate

set system services web-management httpsinterface all

set system syslog file policy_session userinfo

set system syslog file policy_session matchRT_FLOW

set system syslog file policy_sessionarchive size 1000k

set system syslog file policy_sessionarchive world-readable

set system syslog file policy_sessionstructured-data

set interfaces fe-0/0/0 unit 0 family inetaddress 192.1685.1/24

set interfaces fe-0/0/2 unit 0 family inetaddress 10.10.10.1/24

set interfaces fe-0/0/7 unit 0 family inetaddress 192.168.1.1/24

set interfaces st0 unit 0 family inet

set routing-options static route 0.0.0.0/0next-hop 192.168.5.1

set routing-options static route168.192.0.0/16 next-hop 10.10.10.2

set routing-options static route172.16.0.0/24 next-hop st0.0

set routing-options static route192.168.0.0/16 next-hop st0.0

set security ike policy aike mode main

set security ike policy aike proposal-setstandard

set security ike policy aike pre-shared-keyascii-text "$9$WTu8-wkqf5z6k.5Fn9OBL                                                                            x7NwYgoJ"

set security ike gateway gw1 ike-policyaike

set security ike gateway gw1 address58.135.84.24

set security ike gateway gw1external-interface fe-0/0/0.0

set security ipsec policy ap2 proposal-setstandard

set security ipsec vpn vpn1 bind-interfacest0.0

set security ipsec vpn vpn1 ike gateway gw1

set security ipsec vpn vpn1 ikeipsec-policy ap2

set security ipsec vpn vpn1establish-tunnels immediately

set security nat source pool nap-pool1address 192.168.5.2/25 to 192.168.5.3                                                                            /24

set security nat source rule-set nat1 fromzone trust

set security nat source rule-set nat1 tozone untrue

set security nat source rule-set nat1 rulenat1 match source-address 168.192.0.0/16

set security nat source rule-set nat1 rulenat1 match source-address 10.10.10.0/24

set security nat source rule-set nat1 rulenat1 match destination-address 0.0.0.0/0

set security nat source rule-set nat1 rulenat1 then source-nat interface

set security nat static rule-set nat-1 fromzone untrue

set security nat static rule-set nat-1 rulerule1 match destination-address 192.168.5.1/32

set security nat static rule-set nat-1 rulerule1 match destination-port 80

set security nat static rule-set nat-1 rulerule1 then static-nat prefix 168.192.1.18/32

set security nat static rule-set nat-1 rulerule1 then static-nat prefix mapped-port 80

set security policies from-zone trustto-zone untrue policy trust-untrust match source-address 168.192

set security policies from-zone trustto-zone untrue policy trust-untrust match source-address 10.10

set security policies from-zone trustto-zone untrue policy trust-untrust match destination-address any

set security policies from-zone trustto-zone untrue policy trust-untrust match application any

set security policies from-zone trustto-zone untrue policy trust-untrust then permit

set security policies from-zone trustto-zone untrue policy trust-untrust then log session-init

set security policies from-zone trustto-zone untrue policy trust-untrust then log session-close

set security policies from-zone untrueto-zone trust policy untrust-trust match source-address any

set security policies from-zone untrueto-zone trust policy untrust-trust match destination-address 168.192

set security policies from-zone untrueto-zone trust policy untrust-trust match destination-address 10.10

set security policies from-zone untrueto-zone trust policy untrust-trust match application any

set security policies from-zone untrueto-zone trust policy untrust-trust then permit

set security policies from-zone untrueto-zone trust policy untrust-trust then log session-init

set security policies from-zone untrueto-zone trust policy untrust-trust then log session-close

set security policies from-zone untrueto-zone untrue policy untrue-untrue match source-address any

set security policies from-zone untrueto-zone untrue policy untrue-untrue match destination-address any

set security policies from-zone untrueto-zone untrue policy untrue-untrue match application any

set security policies from-zone untrueto-zone untrue policy untrue-untrue then permit

set security policies from-zone vpn to-zonetrust policy vpn-policy match source-address any

set security policies from-zone vpn to-zonetrust policy vpn-policy match destination-address any

set security policies from-zone vpn to-zonetrust policy vpn-policy match application any

set security policies from-zone vpn to-zonetrust policy vpn-policy then permit

set security policies from-zone trustto-zone vpn policy vpn-policy match source-address any

set security policies from-zone trustto-zone vpn policy vpn-policy match destination-address any

set security policies from-zone trustto-zone vpn policy vpn-policy match application any

set security policies from-zone trustto-zone vpn policy vpn-policy then permit

set security policies policy-rematch

set security zones security-zone trustaddress-book address 168.192 168.192.0.0/16

set security zones security-zone trustaddress-book address 10.10 10.10.10.0/24

set security zones security-zone trusthost-inbound-traffic system-services all

set security zones security-zone trusthost-inbound-traffic protocols all

set security zones security-zone trustinterfaces fe-0/0/2.0 host-inbound-traffic system-services all

set security zones security-zone trustinterfaces fe-0/0/2.0 host-inbound-traffic protocols all

set security zones security-zone trustinterfaces fe-0/0/7.0 host-inbound-traffic system-services all

set security zones security-zone trustinterfaces fe-0/0/7.0 host-inbound-traffic protocols all

set security zones security-zone untruehost-inbound-traffic system-services all

set security zones security-zone untruehost-inbound-traffic protocols all

set security zones security-zone untrueinterfaces fe-0/0/0.0 host-inbound-traffic system-services all

set security zones security-zone untrueinterfaces fe-0/0/0.0 host-inbound-traffic system-services ike

set security zones security-zone untrueinterfaces fe-0/0/0.0 host-inbound-traffic protocols all

set security zones security-zone vpninterfaces st0.0


本文出自 “我的linux学习之旅” 博客,请务必保留此出处http://dousi.blog.51cto.com/9827926/1784307

    Junipersrx100防火墙配置指导

标签:防火墙

原文地址:http://dousi.blog.51cto.com/9827926/1784307

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!