2024年2月19日发(作者:)

Juniper SRX防火墙Virtual Router配置实例

实例拓扑图:

一 虚拟路由器(记住来流量入口);

需求:

外网用户访问防火墙的外网接口3389端口NAT到内网服务器192.168.3.5:3389,流量按原路返回;

放行所有外网用户到主机192.168.3.5的3389端口;(双线接入) 配置:

set routing-instances Tel instance-type virtual-router

set routing-instances Tel interface ge-0/0/4.0

set routing-instances Tel routing-options interface-routes rib-group inet Big-rib

set routing-instances Tel routing-options static route 0.0.0.0/0 next-hop 192.168.4.2

set routing-instances CNC instance-type virtual-router

set routing-instances CNC interface ge-0/0/5.0

set routing-instances CNC routing-options interface-routes rib-group inet Big-rib

set routing-instances CNC routing-options static route 0.0.0.0/0 next-hop 192.168.5.2

set interfaces ge-0/0/3 unit 0 family inet address 192.168.3.1/24

set interfaces ge-0/0/4 unit 0 family inet address 192.168.4.1/24

set interfaces ge-0/0/5 unit 0 family inet address 192.168.5.1/24

set interfaces ge-0/0/6 unit 0 family inet address 10.10.30.189/24

set routing-options interface-routes rib-group inet Big-rib

set routing-options static route 10.0.0.0/8 next-hop 10.10.30.1

set routing-options static route 0.0.0.0/0 next-hop 192.168.4.2

set routing-options static route 0.0.0.0/0 install

set routing-options static route 0.0.0.0/0 no-readvertise

set routing-options rib-groups Big-rib import-rib inet.0

set routing-options rib-groups Big-rib import-rib .0

set routing-options rib-groups Big-rib import-rib .0

set security nat destination pool 111 address 192.168.3.5/32

set security nat destination rule-set 1 from zone Tel-trust

set security nat destination rule-set 1 rule 111 match source-address 0.0.0.0/0

set security nat destination rule-set 1 rule 111 match destination-address 192.168.4.1/32

set security nat destination rule-set 1 rule 111 match destination-port 3389

set security nat destination rule-set 1 rule 111 then destination-nat pool 111

set security nat destination rule-set 2 from zone CNC-trust

set security nat destination rule-set 2 rule 222 match source-address 0.0.0.0/0

set security nat destination rule-set 2 rule 222 match destination-address 192.168.5.1/32

set security nat destination rule-set 1 rule 111 match destination-port 3389

set security nat destination rule-set 2 rule 222 then destination-nat pool 111

set applications application tcp_3389 protocol tcp

set applications application tcp_3389 destination-port 3389

set security zones security-zone trust address-book address H_192.168.3.5 192.168.3.5/32

set security policies from-zone Tel-trust to-zone trust policy default-permit match source-address any

set security policies from-zone Tel-trust to-zone trust policy default-permit match destination-address

H_192.168.3.5

set security policies from-zone Tel-trust to-zone trust policy default-permit match application tcp_3389

set security policies from-zone Tel-trust to-zone trust policy default-permit then permit

set security policies from-zone CNC-trust to-zone trust policy default-permit match source-address any

set security policies from-zone CNC-trust to-zone trust policy default-permit match destination-address

H_192.168.3.5

set security policies from-zone CNC-trust to-zone trust policy default-permit match application tcp_3389

set security policies from-zone CNC-trust to-zone trust policy default-permit then permit

set security zones security-zone trust host-inbound-traffic system-services all

set security zones security-zone trust host-inbound-traffic protocols all

set security zones security-zone trust interfaces ge-0/0/3.0

set security zones security-zone Tel-trust host-inbound-traffic system-services all

set security zones security-zone Tel-trust host-inbound-traffic protocols all

set security zones security-zone Tel-trust interfaces ge-0/0/4.0

set security zones security-zone CNC-trust host-inbound-traffic system-services all

set security zones security-zone CNC-trust host-inbound-traffic protocols all

set security zones security-zone CNC-trust interfaces ge-0/0/5.0

set security zones security-zone MGT host-inbound-traffic system-services all

set security zones security-zone MGT host-inbound-traffic protocols all

set security zones security-zone MGT interfaces ge-0/0/6.0

验证:

root@SRX-Ipsec-A> show security flow session

Session ID: 9696, Policy name: default-permit/5, Timeout: 1794, Valid

In: 192.168.100.211/57408 --> 192.168.5.1/3389;tcp, If: ge-0/0/5.0, Pkts: 2, Bytes: 112

Out: 192.168.3.5/3389 --> 192.168.100.211/57408;tcp, If: ge-0/0/3.0, Pkts: 1, Bytes: 60

============================================================================ root@SRX-Ipsec-A> show security flow session

Session ID: 9697, Policy name: default-permit/4, Timeout: 1796, Valid

In: 192.168.100.211/57409 --> 192.168.4.1/3389;tcp, If: ge-0/0/4.0, Pkts: 2, Bytes: 112

Out: 192.168.3.5/3389 --> 192.168.100.211/57409;tcp, If: ge-0/0/3.0, Pkts: 1, Bytes: 60

配置解析:

set routing-instances Tel instance-type virtual-router //创建虚拟VR Tel

set routing-instances Tel interface ge-0/0/4.0 //把逻辑接口加入虚拟VR

set routing-instances Tel routing-options interface-routes rib-group inet Big-rib //定义新增的路由表属于路由组“Big-rib”

set routing-instances Tel routing-options static route 0.0.0.0/0 next-hop 192.168.4.2 //为Tel路由表配置路由

set routing-instances CNC instance-type virtual-router set routing-instances CNC interface ge-0/0/5.0

set routing-instances CNC routing-options interface-routes rib-group inet Big-rib

set routing-instances CNC routing-options static route 0.0.0.0/0 next-hop 192.168.5.2 //配置路由表CNC相关信息 set

interfaces ge-0/0/3 unit 0 family inet address 192.168.3.1/24

set interfaces ge-0/0/4 unit 0 family inet address 192.168.4.1/24

set interfaces ge-0/0/5 unit 0 family inet address 192.168.5.1/24

set interfaces ge-0/0/6 unit 0 family inet address 10.10.30.189/24 //配置逻辑接口的IP地址

set routing-options interface-routes rib-group inet Big-rib //定义路由表组,并把接口路由加入到Big-rib路由组中 set

routing-options static route 10.0.0.0/8 next-hop 10.10.30.1

set routing-options static route 0.0.0.0/0 next-hop 192.168.4.2 //配置全局路由表路由信息

set routing-options static route 0.0.0.0/0 install //把路由表安装到转发表

set routing-options static route 0.0.0.0/0 no-readvertise //

set routing-options rib-groups Big-rib import-rib inet.0

set routing-options rib-groups Big-rib import-rib .0

set routing-options rib-groups Big-rib import-rib .0 //导入三张路由表之间的直连路由到路由表组

set security nat destination pool 111 address 192.168.3.5/32 //定义目的NAT后的内部服务器的IP地址

set security nat destination rule-set 1 from zone Tel-trust

set security nat destination rule-set 1 rule 111 match source-address 0.0.0.0/0

set security nat destination rule-set 1 rule 111 match destination-address 192.168.4.1/32

set security nat destination rule-set 1 rule 111 match destination-port 3389

set security nat destination rule-set 1 rule 111 then destination-nat pool 111 //配置ZONE Tel-trust的目的NAT

set security nat destination rule-set 2 from zone CNC-trust

set security nat destination rule-set 2 rule 222 match source-address 0.0.0.0/0

set security nat destination rule-set 2 rule 222 match destination-address 192.168.5.1/32

set security nat destination rule-set 1 rule 111 match destination-port 3389

set security nat destination rule-set 2 rule 222 then destination-nat pool 111 //配置ZONE CNC-trust的目的NAT set

applications application tcp_3389 protocol tcp

set applications application tcp_3389 destination-port 3389

set security zones security-zone trust address-book address H_192.168.3.5 192.168.3.5/32 //自定义端口和配置地址表

set security policies from-zone Tel-trust to-zone trust policy default-permit match source-address any

set security policies from-zone Tel-trust to-zone trust policy default-permit match destination-address H_192.168.3.5 set security

policies from-zone Tel-trust to-zone trust policy default-permit match application tcp_3389

set security policies from-zone Tel-trust to-zone trust policy default-permit then permit //配置Tel-trust到trust策略

set security policies from-zone CNC-trust to-zone trust policy default-permit match source-address any

set security policies from-zone CNC-trust to-zone trust policy default-permit match destination-address H_192.168.3.5

set security policies from-zone CNC-trust to-zone trust policy default-permit match application tcp_3389

set security policies from-zone CNC-trust to-zone trust policy default-permit then permit //配置CNC-trust到trust策略

set security zones security-zone trust host-inbound-traffic system-services all

set security zones security-zone trust host-inbound-traffic protocols all

set security zones security-zone trust interfaces ge-0/0/3.0

set security zones security-zone Tel-trust host-inbound-traffic system-services all

set security zones security-zone Tel-trust host-inbound-traffic protocols all

set security zones security-zone Tel-trust interfaces ge-0/0/4.0

set security zones security-zone CNC-trust host-inbound-traffic system-services all

set security zones security-zone CNC-trust host-inbound-traffic protocols all

set security zones security-zone CNC-trust interfaces ge-0/0/5.0

set security zones security-zone MGT host-inbound-traffic system-services all

set security zones security-zone MGT host-inbound-traffic protocols all

set security zones security-zone MGT interfaces ge-0/0/6.0 //定义逻辑接口到ZONE,并开放所有的协议及服务来访问防火墙的直连接口

二 虚拟路由器(多链路负载冗余);

需求:

内网用户访问端口22.3389.8080,走电信,其他所有流量走CNC;

所有内网访问外网的流量NAT为对应外网接口IP地址;

实现负载冗余的功能;

放行所有服务;(双线接入)

配置:

set routing-instances Tel instance-type virtual-router

set routing-instances Tel interface ge-0/0/4.0

set routing-instances Tel routing-options interface-routes rib-group inet Big-rib

set routing-instances Tel routing-options static route 0.0.0.0/0 next-hop 192.168.4.2

set routing-instances Tel routing-options static route 0.0.0.0/0 qualified-next-hop 192.168.5.2 preference 100

set routing-instances CNC instance-type virtual-router set routing-instances CNC interface ge-0/0/5.0

set routing-instances CNC routing-options interface-routes rib-group inet Big-rib

set routing-instances CNC routing-options static route 0.0.0.0/0 next-hop 192.168.5.2

set routing-instances CNC routing-options static route 0.0.0.0/0 qualified-next-hop 192.168.4.2 preference 100

set interfaces ge-0/0/3 unit 0 family inet address 192.168.3.1/24

set interfaces ge-0/0/4 unit 0 family inet address 192.168.4.1/24

set interfaces ge-0/0/5 unit 0 family inet address 192.168.5.1/24

set interfaces ge-0/0/6 unit 0 family inet address 10.10.30.189/24

set routing-options interface-routes rib-group inet Big-rib

set routing-options static route 10.0.0.0/8 next-hop 10.10.30.1

set routing-options static route 0.0.0.0/0 qualified-next-hop 192.168.5.2 preference 100

set routing-options static route 0.0.0.0/0 qualified-next-hop 192.168.4.2 preference 10

set routing-options static route 0.0.0.0/0 install

set routing-options static route 0.0.0.0/0 no-readvertise

set routing-options rib-groups Big-rib import-rib inet.0

set routing-options rib-groups Big-rib import-rib .0

set routing-options rib-groups Big-rib import-rib .0

set security nat source rule-set Soure-NAT-Policy from zone trust

set security nat source rule-set Soure-NAT-Policy to zone Tel-trust

set security nat source rule-set Soure-NAT-Policy rule Source-nat-1 match source-address 192.168.3.0/24

set security nat source rule-set Soure-NAT-Policy rule Source-nat-1 match destination-address 0.0.0.0/0

set security nat source rule-set Soure-NAT-Policy rule Source-nat-1 then source-nat interface

set security zones security-zone trust address-book address Net_192.168.3.0 192.168.3.0/24

set security policies from-zone trust to-zone Tel-trust policy 1 match source-address Net_192.168.3.0

set security policies from-zone trust to-zone Tel-trust policy 1 match destination-address any

set security policies from-zone trust to-zone Tel-trust policy 1 match application any

set security policies from-zone trust to-zone Tel-trust policy 1 then permit

set security policies from-zone trust to-zone Tel-trust policy 1 then log session-init

set security policies from-zone trust to-zone Tel-trust policy 1 then log session-close

set security nat source rule-set Soure-NAT-Policy-2 from zone trust

set security nat source rule-set Soure-NAT-Policy-2 to zone CNC-trust

set security nat source rule-set Soure-NAT-Policy-2 rule Source-nat-2 match source-address 192.168.3.0/24

set security nat source rule-set Soure-NAT-Policy-2 rule Source-nat-2 match destination-address 0.0.0.0/0

set security nat source rule-set Soure-NAT-Policy-2 rule Source-nat-2 then source-nat interface

set security policies from-zone trust to-zone CNC-trust policy 2 match source-address Net_192.168.3.0

set security policies from-zone trust to-zone CNC-trust policy 2 match destination-address any

set security policies from-zone trust to-zone CNC-trust policy 2 match application any

set security policies from-zone trust to-zone CNC-trust policy 2 then permit

set security policies from-zone trust to-zone CNC-trust policy 2 then log session-init

set security policies from-zone trust to-zone CNC-trust policy 2 then log session-close

set interfaces ge-0/0/3 unit 0 family inet filter input filter-1

set firewall filter filter-1 term term-1 from destination-port 22

set firewall filter filter-1 term term-1 from destination-port 3389

set firewall filter filter-1 term term-1 from destination-port 8080

set firewall filter filter-1 term term-1 then routing-instance Tel

set firewall filter filter-1 term default then routing-instance CNC

set security zones security-zone trust host-inbound-traffic system-services all

set security zones security-zone trust host-inbound-traffic protocols all

set security zones security-zone trust interfaces ge-0/0/3.0

set security zones security-zone Tel-trust host-inbound-traffic system-services all

set security zones security-zone Tel-trust host-inbound-traffic protocols all

set security zones security-zone Tel-trust interfaces ge-0/0/4.0

set security zones security-zone CNC-trust host-inbound-traffic system-services all

set security zones security-zone CNC-trust host-inbound-traffic protocols all

set security zones security-zone CNC-trust interfaces ge-0/0/5.0

set security zones security-zone MGT host-inbound-traffic system-services all

set security zones security-zone MGT host-inbound-traffic protocols all

set security zones security-zone MGT interfaces ge-0/0/6.0

验证:

基于目标端口路由验证:

Session ID: 9693, Policy name: 1121/6, Timeout: 1790, Valid

In: 192.168.3.5/52562 --> 192.168.100.211/3389;tcp, If: ge-0/0/3.0, Pkts: 2, Bytes: 112

Out: 192.168.100.211/3389 --> 192.168.4.1/28262;tcp, If: ge-0/0/4.0, Pkts: 1, Bytes: 60

Session ID: 9703, Policy name: 1121/7, Timeout: 2, Valid

In: 192.168.3.5/6252 --> 192.168.100.211/1;icmp, If: ge-0/0/3.0, Pkts: 1, Bytes: 60

Out: 192.168.100.211/1 --> 192.168.5.1/4217;icmp, If: ge-0/0/5.0, Pkts: 1, Bytes: 60

查看当前路由表: root@SRX-Ipsec-A> show route

双线冗余验证:

root@SRX-Ipsec-A> show security flow session

Session ID: 10321, Policy name: 1121/7, Timeout: 48, Valid

In: 192.168.3.2/188 --> 192.168.100.211/59209;icmp, If: ge-0/0/3.0, Pkts: 1, Bytes: 84

Out: 192.168.100.211/59209 --> 192.168.5.1/13586;icmp, If: ge-0/0/5.0, Pkts: 0, Bytes: 0

Session ID: 10322, Policy name: 1121/6, Timeout: 50, Valid

手动拔掉CNC广域网线路(模拟CNC线路故障)

In: 192.168.3.2/189 --> 192.168.100.211/59209;icmp, If: ge-0/0/3.0, Pkts: 1, Bytes: 84

Out: 192.168.100.211/59209 --> 192.168.4.1/19350;icmp, If: ge-0/0/4.0, Pkts: 0, Bytes: 0 Session ID: 10330, Policy name: 1121/6,

Timeout: 2, Valid

In: 192.168.3.2/197 --> 192.168.100.211/59209;icmp, If: ge-0/0/3.0, Pkts: 1, Bytes: 84

Out: 192.168.100.211/59209 --> 192.168.4.1/3661;icmp, If: ge-0/0/4.0, Pkts: 1, Bytes: 84

配置解析:

set routing-instances Tel instance-type virtual-router set routing-instances Tel interface ge-0/0/4.0

set routing-instances Tel routing-options interface-routes rib-group inet Big-rib

set routing-instances Tel routing-options static route 0.0.0.0/0 next-hop 192.168.4.2

set routing-instances CNC routing-options static route 0.0.0.0/0 qualified-next-hop 192.168.5.2 preference 100 //配置Tel路由表并配置相关信息,通过优先级来实现双广域网冗余,优先级值越小,优先级越高

set routing-instances CNC instance-type virtual-router set routing-instances CNC interface ge-0/0/5.0

set routing-instances CNC routing-options interface-routes rib-group inet Big-rib

set routing-instances CNC routing-options static route 0.0.0.0/0 next-hop 192.168.5.2

set routing-instances CNC routing-options static route 0.0.0.0/0 qualified-next-hop 192.168.4.2 preference 100 //配置CNC路由表并配置相关信息

set interfaces ge-0/0/3 unit 0 family inet address 192.168.3.1/24

set interfaces ge-0/0/4 unit 0 family inet address 192.168.4.1/24

set interfaces ge-0/0/5 unit 0 family inet address 192.168.5.1/24

set interfaces ge-0/0/6 unit 0 family inet address 10.10.30.189/24 //配置逻辑接口对应IP地址

set routing-options interface-routes rib-group inet Big-rib //定义路由表组,并把接口路由加入到Big-rib路由组中 set

routing-options static route 10.0.0.0/8 next-hop 10.10.30.1

set routing-options static route 0.0.0.0/0 qualified-next-hop 192.168.5.2 preference 100

set routing-options static route 0.0.0.0/0 qualified-next-hop 192.168.4.2 preference 10 //配置全局路由表路由信息,通过指定优先级来实现双广域网的冗余

set routing-options static route 0.0.0.0/0 install //把路由表安装到转发表

set routing-options static route 0.0.0.0/0 no-readvertise //

set routing-options rib-groups Big-rib import-rib inet.0

set routing-options rib-groups Big-rib import-rib .0

set routing-options rib-groups Big-rib import-rib .0 //导入三张路由表之间的直连路由到路由表组

set security nat source rule-set Soure-NAT-Policy from zone trust

set security nat source rule-set Soure-NAT-Policy to zone Tel-trust

set security nat source rule-set Soure-NAT-Policy rule Source-nat-1 match source-address 192.168.3.0/24

set security nat source rule-set Soure-NAT-Policy rule Source-nat-1 match destination-address 0.0.0.0/0

set security nat source rule-set Soure-NAT-Policy rule Source-nat-1 then source-nat interface //配置ZONE Tel-trust基于接口的源NAT

set security zones security-zone trust address-book address Net_192.168.3.0 192.168.3.0/24 //定义地址表

set security policies from-zone trust to-zone Tel-trust policy 1 match source-address Net_192.168.3.0

set security policies from-zone trust to-zone Tel-trust policy 1 match destination-address any

set security policies from-zone trust to-zone Tel-trust policy 1 match application any

set security policies from-zone trust to-zone Tel-trust policy 1 then permit

set security policies from-zone trust to-zone Tel-trust policy 1 then log session-init

set security policies from-zone trust to-zone Tel-trust policy 1 then log session-close //根据需求配置策略并记录LOG信息

set security nat source rule-set Soure-NAT-Policy-2 from zone trust

set security nat source rule-set Soure-NAT-Policy-2 to zone CNC-trust

set security nat source rule-set Soure-NAT-Policy-2 rule Source-nat-2 match source-address 192.168.3.0/24

set security nat source rule-set Soure-NAT-Policy-2 rule Source-nat-2 match destination-address 0.0.0.0/0

set security nat source rule-set Soure-NAT-Policy-2 rule Source-nat-2 then source-nat interface //配置ZONE CNC-trust基于接口的源NAT

set security policies from-zone trust to-zone CNC-trust policy 2 match source-address Net_192.168.3.0

set security policies from-zone trust to-zone CNC-trust policy 2 match destination-address any

set security policies from-zone trust to-zone CNC-trust policy 2 match application any

set security policies from-zone trust to-zone CNC-trust policy 2 then permit

set security policies from-zone trust to-zone CNC-trust policy 2 then log session-init

set security policies from-zone trust to-zone CNC-trust policy 2 then log session-close //根据需求配置策略并记录LOG信息

set interfaces ge-0/0/3 unit 0 family inet filter input filter-1 //从接口ge-0/0/3进入的数据进行包过滤操作,并定义名称” filter-1”

set firewall filter filter-1 term term-1 from destination-port 22

set firewall filter filter-1 term term-1 from destination-port 3389

set firewall filter filter-1 term term-1 from destination-port 8080 //对符合包过滤名称”filter-1”的且符合目标端口22,3389,8080数据进行打标记,标记为term-1 set firewall filter filter-1 term term-1 then routing-instance Tel //定义标记为term-1的数据,使用Tel路由表来转发数据

set firewall filter filter-1 term default then routing-instance CNC //定义符合标记default数据使用CNC路由表来转发数据(default为自定义标记的名称,根据习惯随便取,如果没有指定符合条件则代表所有流量都匹配)

set security zones security-zone trust host-inbound-traffic system-services all

set security zones security-zone trust host-inbound-traffic protocols all

set security zones security-zone trust interfaces ge-0/0/3.0

set security zones security-zone Tel-trust host-inbound-traffic system-services all

set security zones security-zone Tel-trust host-inbound-traffic protocols all set security zones security-zone Tel-trust interfaces ge-0/0/4.0

set security zones security-zone CNC-trust host-inbound-traffic system-services all

set security zones security-zone CNC-trust host-inbound-traffic protocols all set security zones security-zone CNC-trust interfaces

ge-0/0/5.0

set security zones security-zone MGT host-inbound-traffic system-services all

set security zones security-zone MGT host-inbound-traffic protocols all

set security zones security-zone MGT interfaces ge-0/0/6.0 //定义逻辑接口到ZONE,并开放所有的协议及服务来访问防火墙的直连接口

三 虚拟路由器(双线接入);

需求:

ZONE trust访问目标端口为22.3389.8080,走Tel;

ZONE trust主机192.168.3.2的所有流量走Tel;

所有未明确的指定的流量走CNC;

ZONE trust主机192.168.3.5对外发布远程桌面应用Tel-trust(192.168.4.5),CNC-trust(192.168.5.5)

实现从哪家运行商来的流量从哪家运行商返回;(主动发起的流量)

放行ZONE trust所有主机访问外网的流量;

放行所有从外网来访问内网主机192.168.3.5的远程桌面服务;

实现负载冗余;

配置:

set interfaces ge-0/0/3 unit 0 family inet address 192.168.3.1/24

set interfaces ge-0/0/4 unit 0 family inet address 192.168.4.1/24

set interfaces ge-0/0/5 unit 0 family inet address 192.168.5.1/24

set interfaces ge-0/0/6 unit 0 family inet address 10.10.30.189/24

set routing-options interface-routes rib-group inet Big-rib

set routing-options static route 10.0.0.0/8 next-hop 10.10.30.1

set routing-options static route 0.0.0.0/0 next-hop 192.168.4.2

set routing-options static route 0.0.0.0/0 install

set routing-options static route 0.0.0.0/0 no-readvertise

set routing-options rib-groups Big-rib import-rib inet.0

set routing-options rib-groups Big-rib import-rib .0

set routing-options rib-groups Big-rib import-rib .0

set security nat destination pool 111 address 192.168.3.5/32

set security nat destination rule-set 1 from zone Tel-trust

set security nat destination rule-set 1 rule 111 match source-address 0.0.0.0/0

set security nat destination rule-set 1 rule 111 match destination-address 192.168.4.5/32

set security nat destination rule-set 1 rule 111 match destination-port 3389

set security nat destination rule-set 1 rule 111 then destination-nat pool 111

set security nat destination rule-set 2 from zone CNC-trust

set security nat destination rule-set 2 rule 222 match source-address 0.0.0.0/0

set security nat destination rule-set 2 rule 222 match destination-address 192.168.5.5/32

set security nat destination rule-set 2 rule 222 match destination-port 3389

set security nat destination rule-set 2 rule 222 then destination-nat pool 111

set security zones security-zone trust address-book address Net_192.168.3.0 192.168.3.0/24

set security zones security-zone trust address-book address H_192.168.3.5 192.168.3.5/32

set applications application tcp_3389 protocol tcp

set applications application tcp_3389 destination-port 3389

set security nat proxy-arp interface ge-0/0/4.0 address 192.168.4.5/32

set security nat proxy-arp interface ge-0/0/5.0 address 192.168.5.5/32

set security policies from-zone Tel-trust to-zone trust policy default-permit match source-address any

set security policies from-zone Tel-trust to-zone trust policy default-permit match destination-address

H_192.168.3.5 set security policies from-zone Tel-trust to-zone trust policy default-permit match application

tcp_3389

set security policies from-zone Tel-trust to-zone trust policy default-permit then permit

set security policies from-zone CNC-trust to-zone trust policy default-permit-2 match source-address any

set security policies from-zone CNC-trust to-zone trust policy default-permit-2 match destination-address

H_192.168.3.5

set security policies from-zone CNC-trust to-zone trust policy default-permit-2 match application tcp_3389

set security policies from-zone CNC-trust to-zone trust policy default-permit-2 then permit

set security policies from-zone trust to-zone Tel-trust policy 1121 match source-address Net_192.168.3.0

set security policies from-zone trust to-zone Tel-trust policy 1121 match destination-address any

set security policies from-zone trust to-zone Tel-trust policy 1121 match application any

set security policies from-zone trust to-zone Tel-trust policy 1121 then permit

set security policies from-zone trust to-zone CNC-trust policy 1122 match source-address Net_192.168.3.0

set security policies from-zone trust to-zone CNC-trust policy 1122 match destination-address any

set security policies from-zone trust to-zone CNC-trust policy 1122 match application any

set security policies from-zone trust to-zone CNC-trust policy 1122 then permit

set security zones security-zone trust host-inbound-traffic system-services all

set security zones security-zone trust host-inbound-traffic protocols all

set security zones security-zone trust interfaces ge-0/0/3.0

set security zones security-zone Tel-trust host-inbound-traffic system-services all

set security zones security-zone Tel-trust host-inbound-traffic protocols all

set security zones security-zone Tel-trust interfaces ge-0/0/4.0

set security zones security-zone CNC-trust host-inbound-traffic system-services all

set security zones security-zone CNC-trust host-inbound-traffic protocols all

set security zones security-zone CNC-trust interfaces ge-0/0/5.0

set security zones security-zone MGT host-inbound-traffic system-services all

set security zones security-zone MGT host-inbound-traffic protocols all

set security zones security-zone MGT interfaces ge-0/0/6.0

set routing-options static route 0.0.0.0/0 qualified-next-hop 192.168.5.2 preference 100

set routing-options static route 0.0.0.0/0 qualified-next-hop 192.168.4.2 preference 10

set security nat source rule-set Soure-NAT-Policy from zone trust

set security nat source rule-set Soure-NAT-Policy to zone Tel-trust

set security nat source rule-set Soure-NAT-Policy rule Source-nat-1 match source-address 192.168.3.0/24

set security nat source rule-set Soure-NAT-Policy rule Source-nat-1 match destination-address 0.0.0.0/0

set security nat source rule-set Soure-NAT-Policy rule Source-nat-1 then source-nat interface

set security policies from-zone trust to-zone Tel-trust policy 1 match source-address Net_192.168.3.0

set security policies from-zone trust to-zone Tel-trust policy 1 match destination-address any

set security policies from-zone trust to-zone Tel-trust policy 1 match application any

set security policies from-zone trust to-zone Tel-trust policy 1 then permit

set security policies from-zone trust to-zone Tel-trust policy 1 then log session-init

set security policies from-zone trust to-zone Tel-trust policy 1 then log session-close

set security nat source rule-set Soure-NAT-Policy-2 from zone trust

set security nat source rule-set Soure-NAT-Policy-2 to zone CNC-trust

set security nat source rule-set Soure-NAT-Policy-2 rule Source-nat-2 match source-address 192.168.3.0/24

set security nat source rule-set Soure-NAT-Policy-2 rule Source-nat-2 match destination-address 0.0.0.0/0

set security nat source rule-set Soure-NAT-Policy-2 rule Source-nat-2 then source-nat interface

set security policies from-zone trust to-zone CNC-trust policy 2 match source-address Net_192.168.3.0

set security policies from-zone trust to-zone CNC-trust policy 2 match destination-address any

set security policies from-zone trust to-zone CNC-trust policy 2 match application any

set security policies from-zone trust to-zone CNC-trust policy 2 then permit

set security policies from-zone trust to-zone CNC-trust policy 2 then log session-init

set security policies from-zone trust to-zone CNC-trust policy 2 then log session-close

set interfaces ge-0/0/3 unit 0 family inet filter input filter-1

set firewall filter filter-1 term term-1 from destination-port 22

set firewall filter filter-1 term term-1 from destination-port 3389

set firewall filter filter-1 term term-1 from destination-port 8080

set firewall filter filter-1 term term-1 from source-address 192.168.3.2/32

set firewall filter filter-1 term term-1 then routing-instance Tel

set firewall filter filter-1 term sour-add from source-address 192.168.3.2/32

set firewall filter filter-1 term sour-add then routing-instance Tel

set firewall filter filter-1 term default from source-address 0.0.0.0/0

set firewall filter filter-1 term default then routing-instance CNC

验证:

验证主机192.168.3.2流量

Session ID: 19710, Policy name: 1121/6, Timeout: 4, Valid

In: 192.168.3.2/4101 --> 192.168.100.211/1;icmp, If: ge-0/0/3.0, Pkts: 1, Bytes: 60

Out: 192.168.100.211/1 --> 192.168.4.1/1160;icmp, If: ge-0/0/4.0, Pkts: 1, Bytes: 60 Session ID: 19715, Policy name: 1121/6,

Timeout: 1798, Valid

In: 192.168.3.2/49329 --> 192.168.100.211/3389;tcp, If: ge-0/0/3.0, Pkts: 2, Bytes: 92

Out: 192.168.100.211/3389 --> 192.168.4.1/11322;tcp, If: ge-0/0/4.0, Pkts: 1, Bytes: 52

验证基于端口的流量

Session ID: 19732, Policy name: 1121/6, Timeout: 1796, Valid

In: 192.168.3.5/49331 --> 192.168.100.211/3389;tcp, If: ge-0/0/3.0, Pkts: 2, Bytes: 92

Out: 192.168.100.211/3389 --> 192.168.4.1/29111;tcp, If: ge-0/0/4.0, Pkts: 1, Bytes: 52 Session ID: 19733, Policy name: 1122/8,

Timeout: 2, Valid

In: 192.168.3.5/4131 --> 192.168.100.211/1;icmp, If: ge-0/0/3.0, Pkts: 1, Bytes: 60

Out: 192.168.100.211/1 --> 192.168.5.1/8663;icmp, If: ge-0/0/5.0, Pkts: 1, Bytes: 60

验证外网从哪个口来从哪个口回

Session ID: 19777, Policy name: default-permit/4, Timeout: 1796, Valid

In: 192.168.100.211/51313 --> 192.168.4.5/3389;tcp, If: ge-0/0/4.0, Pkts: 2, Bytes: 112

Out: 192.168.3.5/3389 --> 192.168.100.211/51313;tcp, If: ge-0/0/3.0, Pkts: 1, Bytes: 60

Session ID: 19778, Policy name: default-permit-2/5, Timeout: 1798, Valid

In: 192.168.100.211/51318 --> 192.168.5.5/3389;tcp, If: ge-0/0/5.0, Pkts: 2, Bytes: 112

Out: 192.168.3.5/3389 --> 192.168.100.211/51318;tcp, If: ge-0/0/3.0, Pkts: 1, Bytes: 60

注意点:

1如果使用FBF(filter base forward),则必须在接口开启filter功能;

set interfaces ge-0/0/3 unit 0 family inet filter input filter-1

2 注意filter中term的先后顺序问题;(从上往下匹配)

修改顺序:insert firewall filter filter-1 term sour-add before term term-1

确认顺序:show configuration |display set 确认term顺序(从上往下匹配)

3 接口开启filter功能后,必须对所有的流量进行标记,默认情况下没有标记的流量将无法正常转发;

4 指定term标记的时候匹配的条件类型必须是一致的;

如:set firewall filter filter-1 term term-1 from destination-port 22 则term为term-1的标记的条件只能是destination-port,不能是其他的条件如:set firewall filter filter-1 term term-1 from source-address等,如果需要额外指定基于源地址的可以再创建一个term

5 在有开启filter功能的接口标记流量使用全局路由表;

set firewall filter filter-1 term globle-term from destination-address 10.168.0.0/22 set firewall filter dmz-out term globle-term then

accept

7 开启filter功能的接口,处理数据包的顺序:(待验证!!!!!!!!!!) 检查是否符合打标记的要求(N)丢弃 检查是否符合打标记的要求(Y)查看防火墙的会话表(Y) 按照会话表记录处理(如会话表使用Tel路由表则使用Tel路由表来转发流量) 检查是否符合打标记的要求(Y)查看防火墙的会话表(N)

转发

8 FBF常见的问题及处理步骤;(注意term的先后顺序) 配置好term,但是数据包没有按照配置需求转发数据; A:检查是否在数据进入接口开启filter功能; B:检查term中是否一个term中包含多种类型的数据流,如基于destination-port和source-addres等 配置好term,指定的特定流量按照指定的线路传输,但是其他未明确的流量全部丢弃;(如PING不通网关) A:确认是否为所有未明确指定的流量打上标记并指定使用那张路由表; B:如果没有需求使用特殊路由表,确认是否配置使用全局路由表的属性; 配置好term后直连主机PING不通网关地址(防火墙接口IP) A: A:确认此台主机流量是否明确指定标记并指定使用那张路由表; B:如果没有需求使用特殊路由表,确认此台主机是否使用配置使用全局路由表的属性;

按照标记选择路由表来进行相应流量