首页
学习
活动
专区
圈层
工具
发布
社区首页 >问答首页 >Juniper SRX 240路由配置

Juniper SRX 240路由配置
EN

Network Engineering用户
提问于 2018-05-02 10:55:35
回答 1查看 856关注 0票数 3

我正在使用Juniper SRX 240作为聚合路由设备,它通过访问交换机端口将Desktop (工作站)环境连接到Cisco第2层交换机后面的多个服务器环境,这些交换机通过中继端口连接到Juniper SRX。因此

笔记本电脑<--访问端口--> Juniper SRX 240 <--主干端口--> Cisco Layer 2 <--主干端口--> Brocade交换机<--访问端口-->服务器

我已经为VLAN配置了必要的RVI,为VLAN配置了静态路由和安全策略以及主机-入站流量等等。我只可以从笔记本电脑到RVI,在Juniper CLI上可以平分笔记本电脑,也可以在Brocade交换机(通过Cisco交换机上的中继端口)上平服务器网关。

我的问题是,我不能从笔记本电脑切换到挂在织锦开关上的服务器。我不知道是什么导致了这一点,我是否需要为驻留在Brocade交换机上的不同VLAN提供另一种安全策略?

代码语言:javascript
复制
    version 12.1X45.5;
system {
    root-authentication {
        encrypted-password "encrypted-password"; ## SECRET-DATA
    }
    name-server {
        8.8.8.8;
        8.8.8.8;
    }
    services {
        ssh;
        telnet;
        xnm-clear-text;
        web-management {
            http {
                interface vlan.0;
            }
            https {
                system-generated-certificate;
                interface vlan.0;
            }
        }
        dhcp {
            router {
                192.168.1.1;
            }
            pool 192.168.1.0/24 {
                address-range low 192.168.1.2 high 192.168.1.254;
            }
            propagate-settings ge-0/0/0.0;
        }
    }
    syslog {
        archive size 100k files 3;
        user * {
            any emergency;
        }
        file messages {
            any critical;
            authorization info;
        }
        file interactive-commands {
            interactive-commands error;
        }
    }
    max-configurations-on-flash 5;
    max-configuration-rollbacks 5;
    license {
        autoupdate {
            url https://ae1.juniper.net/junos/key_retrieval;
        }
    }
}
interfaces {
    ge-0/0/0 {
        unit 0;
    }
    ge-0/0/1 {
        unit 0 {
            family ethernet-switching {
                port-mode access;
                vlan {
                    members LAPTOPS;
                }
            }
        }
    }
    ge-0/0/2 {
        unit 0 {
            family ethernet-switching {
                port-mode trunk;
                vlan {
                    members [ vlan-trust AREA0 ];
                }
            }
        }
    }
    ge-0/0/3 {
        unit 0 {
            family ethernet-switching {
                port-mode trunk;
                vlan {
                    members [ vlan-trust AREA1 ];
                }
            }
        }
    }
    ge-0/0/4 {
        unit 0 {
            family ethernet-switching {
                port-mode trunk;
                vlan {
                    members [ vlan-trust AREA2 ];
                }
            }
        }
    }
    ge-0/0/5 {
        unit 0 {
            family ethernet-switching {
                port-mode trunk;
                vlan {
                    members [ vlan-trust AREA3 ];
                }
            }
        }
    }
    ge-0/0/6 {
        unit 0 {
            family ethernet-switching {
                vlan {
                    members vlan-trust;
                }
            }
        }
    }
    ge-0/0/7 {
        unit 0 {
            family ethernet-switching {
                vlan {
                    members vlan-trust;
                }
            }
        }
    }
    ge-0/0/8 {
        unit 0 {
            family ethernet-switching {
                vlan {
                    members vlan-trust;
                }
            }
        }
    }
    ge-0/0/9 {
        unit 0 {
            family ethernet-switching {
                vlan {
                    members vlan-trust;
                }
            }
        }
    }
    ge-0/0/10 {
        unit 0 {
            family ethernet-switching {
                vlan {
                    members vlan-trust;
                }
            }
        }
    }
    ge-0/0/11 {
        unit 0 {
            family ethernet-switching {
                vlan {
                    members vlan-trust;
                }
            }
        }
    }
    ge-0/0/12 {
        unit 0 {
            family ethernet-switching {
                vlan {
                    members vlan-trust;
                }
            }
        }
    }
    ge-0/0/13 {
        unit 0 {
            family ethernet-switching {
                vlan {
                    members vlan-trust;
                }
            }
        }
    }
    ge-0/0/14 {
        unit 0 {
            family ethernet-switching {
                vlan {
                    members vlan-trust;
                }
            }
        }
    }
    ge-0/0/15 {
        unit 0 {
            family ethernet-switching {
                vlan {
                    members vlan-trust;
                }
            }
        }
    }
    vlan {
        unit 0 {
            family inet {
                address 192.168.1.1/24;
            }
        }
        unit 32 {
            family inet {
                address 192.168.32.1/24;
            }
        }
        unit 33 {
            family inet {
                address 192.168.33.1/24;
            }
        }
        unit 34 {
            family inet {
                address 192.168.34.1/24;
            }
        }
        unit 35 {
            family inet {
                address 192.168.35.1/24;
            }
        }
        unit 36 {
            family inet {
                address 192.168.36.1/24;
            }
        }
    }
}
routing-options {
    static {
        route 192.168.33.0/24 next-hop 192.168.33.2;
        route 192.168.208.0/24 next-hop 192.168.33.2;
    }
}
protocols {
    stp;
}
security {
    screen {
        ids-option untrust-screen {
            icmp {
                ping-death;
            }
            ip {
                source-route-option;
                tear-drop;
            }
            tcp {
                syn-flood {
                    alarm-threshold 1024;
                    attack-threshold 200;
                    source-threshold 1024;
                    destination-threshold 2048;
                    timeout 20;
                }
                land;
            }
        }
    }
    nat {
        source {
            rule-set trust-to-untrust {
                from zone trust;
                to zone untrust;
                rule source-nat-rule {
                    match {
                        source-address 0.0.0.0/0;
                    }
                    then {
                        source-nat {
                            interface;
                        }
                    }
                }
            }
        }
    }
    policies {
        from-zone trust to-zone untrust {
            policy trust-to-untrust {
                match {
                    source-address any;
                    destination-address any;
                    application any;
                }
                then {
                    permit;
                }
            }
        }
        from-zone Area to-zone Area {
            policy Area-to-Area {
                match {
                    source-address any;
                    destination-address any;
                    application any;
                }
                then {
                    permit;
                }
            }
        }
    }
    zones {
        security-zone trust {
            host-inbound-traffic {
                system-services {
                    all;
                }
                protocols {
                    all;
                }
            }
            interfaces {
                vlan.0;
            }
        }
        security-zone untrust {
            screen untrust-screen;
            interfaces {
                ge-0/0/0.0 {
                    host-inbound-traffic {
                        system-services {
                            dhcp;
                            tftp;
                        }
                    }
                }
            }
        }
        security-zone Area {
            host-inbound-traffic {
                system-services {
                    all;
                }
            }
            interfaces {
                vlan.32;
                vlan.33;
                vlan.34;
                vlan.35;
                vlan.36;
                ge-0/0/1.0 {
                    host-inbound-traffic {
                        system-services {
                            ping;
                        }
                    }
                }
                ge-0/0/2.0;
                ge-0/0/3.0;
                ge-0/0/4.0;
                ge-0/0/5.0;
            }
        }
    }
}
vlans {
    AREA0 {
        vlan-id 33;
        l3-interface vlan.33;
    }
    AREA1 {
        vlan-id 34;
        l3-interface vlan.34;
    }
    AREA2 {
        vlan-id 35;
        l3-interface vlan.35;
    }
    AREA3 {
        vlan-id 36;
        l3-interface vlan.36;
    }
    LAPTOPS {
        vlan-id 32;
        l3-interface vlan.32;
    }
    vlan-trust {
        vlan-id 3;
        l3-interface vlan.0;
    }
}
EN

回答 1

Network Engineering用户

回答已采纳

发布于 2018-05-03 23:56:59

所以我看到了一些奇怪的事情:

  • 您有一个静态路由(192.168.33.0/24)到同一直接连接子网(vlan.33)中的主机--删除它。
  • 您还在区域安全区(ge-0/0/1-5)下配置了L2接口,删除这些良好的安全区域只需要L3接口。

如果您的服务器位于192.168.208.0/24范围内,而在Brocade的另一端,则需要确保Brocade具有指向膝上型计算机VLAN 192.168.32.0/24的静态路由,返回流量下一跳为192.168.33.1。

票数 1
EN
页面原文内容由Network Engineering提供。腾讯云小微IT领域专用引擎提供翻译支持
原文链接:

https://networkengineering.stackexchange.com/questions/50232

复制
相关文章

相似问题

领券
问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档