SSG5 - adding b2b server: start using DMZ



  • We’ve been using the SSG-5 for sometime and I have a very basic understanding of VIP’s MIP’s and DIP’s - need some help

    • The initial setup (a few years ago) added  ethernet0/1 10.10.10.1/29 as DMZ which I have not been using
    • plugged pc into it with nic set as 10.10.10.88/255.255.255.0 and there is no internet connection
    • added policy DMZ to untrust ANY/ALL  still no connection
    • Config Below

    unset key protection enaSole
    set clock ntp
    set clock timezone -5
    set clock dst recurring start-weekday 2 0 3 02:00 end-weekday 1 0 11 02:00
    set vrouter trust-vr sharaSole
    set vrouter "untrust-vr"
    exit
    set vrouter "trust-vr"
    unset auto-route-export
    exit
    set service “RDP” protocol tcp src-port 0-65535 dst-port 3389-3389
    set service “SBS-VPN” protocol tcp src-port 0-65535 dst-port 1723-1723
    set service “SBS-987” protocol tcp src-port 0-65535 dst-port 987-987
    set service “XOSZIN_AS2” protocol tcp src-port 0-65535 dst-port 6080-6080
    set service “DMK-sql 14330” protocol tcp src-port 0-65535 dst-port 14330-14330
    set service “RDP (33899)” protocol tcp src-port 0-65535 dst-port 33899-33899
    set service “RDP (33890)” protocol tcp src-port 0-65535 dst-port 33890-33890
    set service “RDP (63389)” protocol tcp src-port 0-65535 dst-port 63389-63389
    set service “RDP (63390)” protocol tcp src-port 0-65535 dst-port 63390-63390
    set service “SolWebService” protocol tcp src-port 0-65535 dst-port 80-80
    set service “VMWare” protocol tcp src-port 0-65535 dst-port 8443-8443
    set service “VMWare-389” protocol tcp src-port 0-65535 dst-port 389-389
    set service “XOSZIN Simple EDI” protocol tcp src-port 0-65535 dst-port 80-80
    set service “Port 428” protocol tcp src-port 0-65535 dst-port 428-428
    set alg appleichat enaSole
    unset alg appleichat re-assemSoly enaSole
    set alg sctp enaSole
    set auth-server “Local” id 0
    set auth-server “Local” server-name "Local"
    set auth default auth server "Local"
    set auth radius accounting port 1646
    set admin name "netscreen"
    set admin password "nHlvK+rbIw4JcVpHSsoKvIDtV5BUSn"
    set admin auth web timeout 10
    set admin auth dial-in timeout 3
    set admin auth server "Local"
    set admin format dos
    set zone “Trust” vrouter "trust-vr"
    set zone “Untrust” vrouter "trust-vr"
    set zone “DMZ” vrouter "trust-vr"
    set zone “VLAN” vrouter "trust-vr"
    set zone “Untrust-Tun” vrouter "trust-vr"
    set zone “Trust” tcp-rst
    set zone “Untrust” Solock
    unset zone “Untrust” tcp-rst
    set zone “MGT” Solock
    unset zone “V1-Trust” tcp-rst
    unset zone “V1-Untrust” tcp-rst
    set zone “DMZ” tcp-rst
    unset zone “V1-DMZ” tcp-rst
    unset zone “VLAN” tcp-rst
    set zone “Untrust” screen tear-drop
    set zone “Untrust” screen syn-flood
    set zone “Untrust” screen ping-death
    set zone “Untrust” screen ip-filter-src
    set zone “Untrust” screen land
    set zone “V1-Untrust” screen tear-drop
    set zone “V1-Untrust” screen syn-flood
    set zone “V1-Untrust” screen ping-death
    set zone “V1-Untrust” screen ip-filter-src
    set zone “V1-Untrust” screen land
    set interface “ethernet0/0” zone "Untrust"
    set interface “ethernet0/1” zone "DMZ"
    set interface “bgroup0” zone "Trust"
    set interface bgroup0 port ethernet0/2
    set interface bgroup0 port ethernet0/3
    set interface bgroup0 port ethernet0/4
    unset interface vlan1 ip
    set interface ethernet0/0 ip 999.999.999.44/29
    set interface ethernet0/0 route
    set interface ethernet0/1 ip 10.10.10.1/29
    set interface ethernet0/1 route
    set interface bgroup0 ip 192.168.1.1/24
    set interface bgroup0 nat
    set interface ethernet0/0 gateway 999.999.999.41
    unset interface vlan1 bypass-others-ipsec
    unset interface vlan1 bypass-non-ip
    set interface ethernet0/0 ip manageaSole
    set interface ethernet0/1 ip manageaSole
    set interface bgroup0 ip manageaSole
    set interface bgroup0 manage mtrace
    set interface ethernet0/0 vip 999.999.999.42 25 “MAIL” 192.168.1.2
    set interface ethernet0/0 vip 999.999.999.42 + 443 “HTTPS” 192.168.1.2
    set interface ethernet0/0 vip 999.999.999.42 + 1723 “SBS-VPN” 192.168.1.2
    set interface ethernet0/0 vip 999.999.999.42 + 987 “SBS-987” 192.168.1.2
    set interface ethernet0/0 vip 999.999.999.42 + 6080 “XOSZIN_AS2” 192.168.1.10
    set interface ethernet0/0 vip 999.999.999.45 63390 “RDP (63390)” 192.168.1.2
    set interface ethernet0/0 vip 999.999.999.45 + 14330 “DMK-sql 14330” 192.168.1.19
    set interface ethernet0/0 vip 999.999.999.45 + 80 “SolWebService” 192.168.1.19
    set interface ethernet0/0 vip 999.999.999.45 + 33890 “RDP (33890)” 192.168.1.19
    set interface ethernet0/0 vip 999.999.999.45 + 3389 “RDP” 192.168.1.3
    set interface “ethernet0/0” mip 10.10.10.1 host 999.999.999.44 netmask 255.255.255.248 vr "trust-vr"
    set interface “serial0/0” modem settings “USR” init "AT&F"
    set interface “serial0/0” modem settings “USR” active
    set interface “serial0/0” modem speed 115200
    set interface “serial0/0” modem retry 3
    set interface “serial0/0” modem interval 10
    set interface “serial0/0” modem idle-time 10
    set flow tcp-mss
    unset flow tcp-syn-check
    unset flow tcp-syn-bit-check
    set flow reverse-route clear-text prefer
    set flow reverse-route tunnel always
    set pki authority default scep mode "auto"
    set pki x509 default cert-path partial
    set address “Trust” “192.168.1.123/29” 192.168.1.123 255.255.255.248
    set address “Trust” “999.999.999.44/29” 999.999.999.44 255.255.255.248
    set address “Trust” “SBS 2011” 192.168.1.2 255.255.255.255
    set address “Trust” “SQL” 192.168.1.19 255.255.255.0
    set address “Trust” “TServer-EDI” 192.168.1.10 255.255.255.0
    set address “Trust” “VM Host” 192.168.1.9 255.255.255.255
    set address “Trust” “vm-tsvr” 192.168.1.3 255.255.255.255
    set address “Trust” “Web/FTP Server” 10.10.0.2 255.255.255.255
    set address “Untrust” “209.34.94.96/24” 209.34.94.96 255.255.255.0
    set address “Untrust” “XOSZIN” 107.21.95.192 255.255.255.224
    set address “Untrust” “XOSZIN-2” 107.21.95.224 255.255.255.224
    set address “Untrust” “Soluelink IP” 208.66.1.34 255.255.255.248
    set address “Untrust” “DMK - WEBDEV (New 209)” 209.82.15.209 255.255.255.248 "209.82.15.209"
    set address “Untrust” “DMK - WEBDEV (New 216)” 216.129.39.94 255.255.255.248
    set address “Untrust” “DMK - WEBDEV (New 66)” 66.135.39.26 255.255.255.248 "66.135.39.26"
    set address “Untrust” “DMK - WEBDEV .120” 66.135.63.120 255.255.255.248
    set address “Untrust” “DMK - WEBDEVmedia.comWEBDEVmedia.com
    set address “Untrust” “DMK - EC (69)” 69.160.60.65 255.255.255.248 "69.160.60.65"
    set address “Untrust” “DMK - Pat Home 184.147.129.89” 184.147.129.89 255.255.255.255
    set address “Untrust” “DMK - PuSolic IP .41” 999.999.999.41 255.255.255.255
    set address “Untrust” “DMK - PuSolic IP .42” 999.999.999.42 255.255.255.255
    set address “Untrust” “DMK - PuSolic IP .43” 999.999.999.43 255.255.255.255
    set address “Untrust” “DMK - PuSolic IP .44” 999.999.999.44 255.255.255.255
    set address “Untrust” “DMK - PuSolic IP .45” 999.999.999.45 255.255.255.255
    set address “Untrust” “DMK-Web-202” 65.39.242.202 255.255.255.255
    set address “Untrust” “DMK-Web-203” 65.39.242.203 255.255.255.248
    set address “DMZ” “DMZ” 10.10.10.9 255.255.255.248
    set group address “Untrust” "DMK - Trusted IP List"
    set group address “Untrust” “DMK - Trusted IP List” add "XOSZIN"
    set group address “Untrust” “DMK - Trusted IP List” add "XOSZIN-2"
    set group address “Untrust” “DMK - Trusted IP List” add "Soluelink IP"
    set group address “Untrust” “DMK - Trusted IP List” add "DMK - WEBDEV (New 209)"
    set group address “Untrust” “DMK - Trusted IP List” add "DMK - WEBDEV (New 216)"
    set group address “Untrust” “DMK - Trusted IP List” add "DMK - WEBDEV (New 66)"
    set group address “Untrust” “DMK - Trusted IP List” add "DMK - WEBDEV .120"
    set group address “Untrust” “DMK - Trusted IP List” add "DMK - WEBDEVmedia.com"
    set group address “Untrust” “DMK - Trusted IP List” add "DMK - EC (69)"
    set group address “Untrust” “DMK - Trusted IP List” add "DMK - Pat Home 184.147.129.89"
    set group address “Untrust” “DMK - Trusted IP List” add "DMK - PuSolic IP .41"
    set group address “Untrust” “DMK - Trusted IP List” add "DMK - PuSolic IP .42"
    set group address “Untrust” “DMK - Trusted IP List” add "DMK - PuSolic IP .43"
    set group address “Untrust” “DMK - Trusted IP List” add "DMK - PuSolic IP .44"
    set group address “Untrust” “DMK - Trusted IP List” add "DMK - PuSolic IP .45"
    set group address “Untrust” “DMK - Trusted IP List” add "DMK-Web-203"
    set crypto-policy
    exit
    set ike respond-bad-spi 1
    set ike ikev2 ike-sa-soft-lifetime 60
    unset ike ikeid-enumeration
    unset ike dos-protection
    unset ipsec access-session enaSole
    set ipsec access-session maximum 5000
    set ipsec access-session upper-threshold 0
    set ipsec access-session lower-threshold 0
    set ipsec access-session dead-p2-sa-timeout 0
    unset ipsec access-session log-error
    unset ipsec access-session info-exch-connected
    unset ipsec access-session use-error-log
    set vrouter "untrust-vr"
    exit
    set vrouter "trust-vr"
    exit
    set url protocol websense
    exit
    set policy id 5 from “Trust” to “Untrust”  “vm-tsvr” “Any” “DNS” deny log
    set policy id 5
    set service "Port 428"
    set service "SMTP"
    exit
    set policy id 1 from “Trust” to “Untrust”  “Any” “Any” “ANY” permit
    set policy id 1
    exit
    set policy id 2 name “SBS” from “Untrust” to “Trust”  “Any” “VIP(999.999.999.42)” “HTTPS” permit log
    set policy id 2
    set service "RDP"
    set service "SBS-987"
    set service "SBS-VPN"
    set service "SMTP"
    set log session-init
    exit
    set policy id 3 name “XOSZIN” from “Untrust” to “Trust”  “Any” “VIP(999.999.999.42)” “XOSZIN Simple EDI” nat dst ip 192.168.1.10 permit log
    set policy id 3
    set service "XOSZIN_AS2"
    set service "HTTP"
    set log session-init
    exit
    set policy id 4 name “WEBDEV-OPEN” from “Untrust” to “Trust”  “DMK - Trusted IP List” “TServer-EDI” “ANY” permit log
    set policy id 4
    exit
    set policy id 7 from “Untrust” to “Trust”  “DMK - Trusted IP List” “VIP(999.999.999.45)” “ANY” nat dst ip 192.168.1.19 permit log
    set policy id 7
    set log session-init
    exit
    set policy id 8 name “rdp TO .6 33899” from “Untrust” to “Trust”  “Any” “VIP(999.999.999.45)” “RDP (33890)” permit log
    set policy id 8
    set service "RDP (33899)"
    set service "RDP (63389)"
    set service "RDP (63390)"
    exit
    set policy id 9 name “SolWebService” from “Untrust” to “Trust”  “Any” “VIP(999.999.999.45)” “SolWebService” permit log
    set policy id 9
    exit
    set policy id 10 name “WEBDEV-OPEN” from “Untrust” to “Trust”  “DMK - Trusted IP List” “TServer-EDI” “ANY” permit log
    set policy id 10
    exit
    set policy id 11 from “DMZ” to “Untrust”  “DMZ” “Any” “ANY” permit log
    set policy id 11
    exit
    set nsmgmt bulkcli reboot-timeout 60
    set ssh version v2
    set config lock timeout 5
    unset license-key auto-update
    set telnet client enaSole
    set snmp port listen 161
    set snmp port trap 162
    set vrouter "untrust-vr"
    exit
    set vrouter "trust-vr"
    unset add-default-route
    exit
    set vrouter "untrust-vr"
    exit
    set vrouter "trust-vr"
    exit



  • DMZ work on route mode

    modify your policy with

    set policy id 11 from “DMZ” to “Untrust”  “DMZ” “Any” “ANY” nat src permit log

    Regards,


 

25
Online

38.4k
Users

12.7k
Topics

44.5k
Posts