안녕하세요.
오늘은 Juniper SRX에서 Site to Site VPN 설정에 대해서 알아보겠습니다.
EVE-NG에서 토폴로지는 아래와 같이 구성하였습니다.
위에 테스트 구성을 하기 위해서는 아래 글을 참고 부탁드립니다.
1. EVE_NG 설치
https://itblog-kr.tistory.com/11
[2024][EVE-NG #1] 네트워크 시뮬레이션 EVE-NG 설치하기(VMware Workstation)
안녕하세요. 오늘은 주제는 [2024][EVE-NG #1] 네트워크 시뮬레이션 EVE-NG 설치하기(VMware Workstation)입니다. EVE-NG를 설치하기 전에 EVE-NG가 무엇인지 궁금하신 분은 아래 블로그 글을 참조 부탁드립
itblog-kr.tistory.com
2. Router 설치
https://itblog-kr.tistory.com/6
[EVE-NG #6] vIOS cisco 라우터 설치하기
안녕하세요. 이번에는 EVE-NG안에 vIOS cisco라우터를 설치해보겠습니다. EVE-NG가 설치가 않되어져 있다면 아래 블로그를 참조하여 EVE-NG부터 설치하시길 바랍니다. VirtualBox(무료) 가상화 프로그램을
itblog-kr.tistory.com
3. SRX설치
https://itblog-kr.tistory.com/26
[2024][EVE-NG #14] Juniper SRX 방화벽 설치하기
안녕하세요. 오늘은 [2024][EVE-NG #14] Juniper SRX 방화벽 설치하기입니다. 1. eve-ng 공식 홈페이지 관련 내용입니다. https://www.eve-ng.net/index.php/documentation/howtos/howto-add-juniper-vsrx-ng-15-x-and-later/ Juniper vSR
itblog-kr.tistory.com
4. VPC설치
https://itblog-kr.tistory.com/59
[2024][EVE-NG #18] Virtual PC(VPCS)
안녕하세요. 이번에는 EVE-NG에서 VPC에 대해서 알아보도록 하겠습니다. 테스트 할때 간단하게 Ping을 위해서 PC를 만들고 싶을때가 있습니다. 그렇다고 라우터나 스위치 또는 윈도우 PC를 두기에
itblog-kr.tistory.com
실습 준비가 완료 되었으면 주니퍼 SRX site to site vpn를 테스트 하겠습니다.
1. Router 설정
Router# Router#conf t Router(config)#ho INT_R1 INT_R1(config)#int g0/2 INT_R1(config-if)#ip add 192.168.10.99 255.255.255.0 INT_R1(config-if)#no sh INT_R1(config-if)#int g0/0 INT_R1(config-if)#ip add 10.1.1.254 255.255.255.0 INT_R1(config-if)#no sh INT_R1(config-if)#int g0/1 INT_R1(config-if)#ip add 20.1.1.254 255.255.255.0 INT_R1(config-if)#no sh INT_R1(config-if)#end INT_R1#conf t INT_R1(config)#ip route 0.0.0.0 0.0.0.0 192.168.10.253 |
1-1 NAT 설정
INT_R1#conf t INT_R1(config)#access-list 1 permit any INT_R1(config)#int g0/2 INT_R1(config-if)#ip nat out INT_R1(config-if)#int g0/0 INT_R1(config-if)#ip nat inside INT_R1(config-if)#int g0/1 INT_R1(config-if)#ip nat inside INT_R1(config-if)#end INT_R1(config)#ip nat inside source list 1 interface g0/2 overload INT_R1(config)# |
1-2 Ping Test
INT_R1#show ip int brie Interface IP-Address OK? Method Status Protocol GigabitEthernet0/0 10.1.1.254 YES manual up up GigabitEthernet0/1 20.1.1.254 YES manual up up GigabitEthernet0/2 192.168.10.99 YES manual up up GigabitEthernet0/3 unassigned YES unset administratively down down NVI0 10.1.1.254 YES unset up up INT_R1# INT_R1#show ip route Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP a - application route + - replicated route, % - next hop override, p - overrides from PfR Gateway of last resort is 192.168.10.253 to network 0.0.0.0 S* 0.0.0.0/0 [1/0] via 192.168.10.253 10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks C 10.1.1.0/24 is directly connected, GigabitEthernet0/0 L 10.1.1.254/32 is directly connected, GigabitEthernet0/0 20.0.0.0/8 is variably subnetted, 2 subnets, 2 masks C 20.1.1.0/24 is directly connected, GigabitEthernet0/1 L 20.1.1.254/32 is directly connected, GigabitEthernet0/1 192.168.10.0/24 is variably subnetted, 2 subnets, 2 masks C 192.168.10.0/24 is directly connected, GigabitEthernet0/2 L 192.168.10.99/32 is directly connected, GigabitEthernet0/2 INT_R1# INT_R1# INT_R1#ping 8.8.8.8 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 8.8.8.8, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 5/6/10 ms INT_R1#ping 8.8.8.8 sou INT_R1#ping 8.8.8.8 source g0/0 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 8.8.8.8, timeout is 2 seconds: Packet sent with a source address of 10.1.1.254 !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 2/3/4 ms INT_R1#ping 8.8.8.8 source g0/1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 8.8.8.8, timeout is 2 seconds: Packet sent with a source address of 20.1.1.254 !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 2/3/8 ms INT_R1# |
2. SRX01 기본 설정
ge-0/0/0 - 10.1.1.1
ge-0/0/1 - 192.168.1.1
2-1 기본설정값을 모두 삭제
root@:~ # cli root> configure Entering configuration mode [edit] root# delete This will delete the entire configuration Delete everything under this level? [yes,no] (no) yes [edit] root# set system root-authentication plain-text-password New password: Retype new password: [edit] root# cin ^ unknown command. root# commit commit complete [edit] root# |
2-2 기본설정
set system host-name SRX01 set security zones security-zone trust host-inbound-traffic system-services all set security zones security-zone trust host-inbound-traffic protocols all set security zones security-zone trust interfaces ge-0/0/1.0 set security zones security-zone untrust host-inbound-traffic system-services all set security zones security-zone untrust host-inbound-traffic protocols all set security zones security-zone untrust interfaces ge-0/0/0.0 set interfaces ge-0/0/0 unit 0 family inet address 10.1.1.1/24 set interfaces ge-0/0/1 unit 0 family inet address 192.168.1.1/24 set routing-options static route 0.0.0.0/0 next-hop 10.1.1.254 |
2-3 방화벽 정책 설정
set security policies from-zone trust to-zone untrust policy trust_to_untrust match source-address any set security policies from-zone trust to-zone untrust policy trust_to_untrust match destination-address any set security policies from-zone trust to-zone untrust policy trust_to_untrust match application any set security policies from-zone trust to-zone untrust policy trust_to_untrust then permit |
2-4 NAT 설정
set security nat source rule-set SOURCE-NAT from zone trust set security nat source rule-set SOURCE-NAT to zone untrust set security nat source rule-set SOURCE-NAT rule PAT-INTERFACE match source-address 192.168.1.0/24 set security nat source rule-set SOURCE-NAT rule PAT-INTERFACE match destination-address 0.0.0.0/0 set security nat source rule-set SOURCE-NAT rule PAT-INTERFACE then source-nat interface |
2-5 확인
root@SRX01> show interfaces terse Interface Admin Link Proto Local Remote ge-0/0/0 up up ge-0/0/0.0 up up inet 10.1.1.1/24 gr-0/0/0 up up ip-0/0/0 up up lsq-0/0/0 up up lt-0/0/0 up up mt-0/0/0 up up sp-0/0/0 up up sp-0/0/0.0 up up inet inet6 sp-0/0/0.16383 up up inet ge-0/0/1 up up ge-0/0/1.0 up up inet 192.168.1.1/24 ge-0/0/2 up up dsc up up fti0 up up fxp0 up up gre up up ipip up up irb up up lo0 up up lo0.16384 up up inet 127.0.0.1 --> 0/0 lo0.16385 up up inet 10.0.0.1 --> 0/0 10.0.0.16 --> 0/0 128.0.0.1 --> 0/0 128.0.0.4 --> 0/0 128.0.1.16 --> 0/0 lo0.32768 up up lsi up up mtun up up pimd up up pime up up pp0 up up ppd0 up up ppe0 up up st0 up up tap up up vlan up down root@SRX01> show route inet.0: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden) + = Active Route, - = Last Active, * = Both 0.0.0.0/0 *[Static/5] 00:02:39 > to 10.1.1.254 via ge-0/0/0.0 10.1.1.0/24 *[Direct/0] 00:02:40 > via ge-0/0/0.0 10.1.1.1/32 *[Local/0] 00:02:40 Local via ge-0/0/0.0 192.168.1.0/24 *[Direct/0] 00:02:39 > via ge-0/0/1.0 192.168.1.1/32 *[Local/0] 00:02:39 Local via ge-0/0/1.0 inet6.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden) + = Active Route, - = Last Active, * = Both ff02::2/128 *[INET6/0] 00:07:11 MultiRecv root@SRX01> show security zones Security zone: trust Zone ID: 7 Send reset for non-SYN session TCP packets: Off Policy configurable: Yes Interfaces bound: 1 Interfaces: ge-0/0/1.0 Advanced-connection-tracking timeout: 1800 Unidirectional-session-refreshing: No Security zone: untrust Zone ID: 8 Send reset for non-SYN session TCP packets: Off Policy configurable: Yes Interfaces bound: 1 Interfaces: ge-0/0/0.0 Advanced-connection-tracking timeout: 1800 Unidirectional-session-refreshing: No Security zone: junos-host Zone ID: 2 Send reset for non-SYN session TCP packets: Off Policy configurable: Yes Interfaces bound: 0 Interfaces: Advanced-connection-tracking timeout: 1800 Unidirectional-session-refreshing: No root@SRX01> show security nat source summary Total pools: 0 Total rules: 1 Rule name Rule set From To Action PAT-INTERFACE SOURCE-NAT trust untrust interface root@SRX01> show security nat source rule all Total rules: 1 Total referenced IPv4/IPv6 ip-prefixes: 2/0 source NAT rule: PAT-INTERFACE Rule-set: SOURCE-NAT Rule-Id : 1 Rule position : 1 From zone : trust To zone : untrust Match Source addresses : 192.168.1.0 - 192.168.1.255 Destination addresses : 0.0.0.0 - 255.255.255.255 Action : interface Persistent NAT type : N/A Persistent NAT mapping type : address-port-mapping Inactivity timeout : 0 Max session number : 0 Translation hits : 10 Successful sessions : 10 Number of sessions : 0 root@SRX01> |
3. PC01 설정
VPCS> VPCS> ip 192.168.1.10/24 192.168.1.1 Checking for duplicate address... VPCS : 192.168.1.10 255.255.255.0 gateway 192.168.1.1 VPCS> save Saving startup configuration to startup.vpc . done VPCS> |
3-1 Ping 테스트
VPCS> VPCS> ping 192.168.1.1 84 bytes from 192.168.1.1 icmp_seq=1 ttl=64 time=471.943 ms 84 bytes from 192.168.1.1 icmp_seq=2 ttl=64 time=0.827 ms 84 bytes from 192.168.1.1 icmp_seq=3 ttl=64 time=0.941 ms 84 bytes from 192.168.1.1 icmp_seq=4 ttl=64 time=0.788 ms 84 bytes from 192.168.1.1 icmp_seq=5 ttl=64 time=0.803 ms ^C VPCS> ping 8.8.8.8 84 bytes from 8.8.8.8 icmp_seq=1 ttl=115 time=29.083 ms 84 bytes from 8.8.8.8 icmp_seq=2 ttl=115 time=5.006 ms 84 bytes from 8.8.8.8 icmp_seq=3 ttl=115 time=5.656 ms 84 bytes from 8.8.8.8 icmp_seq=4 ttl=115 time=5.298 ms 84 bytes from 8.8.8.8 icmp_seq=5 ttl=115 time=5.411 ms ^C VPCS> |
4. SRX02 설정
Ge-0/0/0 20.1.1.1/24
Ge-0/0/1 192.168.2.1/24
4-1 기본설정값 삭제
root> configure Entering configuration mode [edit] root# delete This will delete the entire configuration Delete everything under this level? [yes,no] (no) yes [edit] root# set system root-authentication plain-text-password New password: Retype new password: [edit] root# commit commit complete [edit] root# |
4-2 기본 설정
set system host-name SRX02 set security zones security-zone trust host-inbound-traffic system-services all set security zones security-zone trust host-inbound-traffic protocols all set security zones security-zone trust interfaces ge-0/0/1.0 set security zones security-zone untrust host-inbound-traffic system-services all set security zones security-zone untrust host-inbound-traffic protocols all set security zones security-zone untrust interfaces ge-0/0/0.0 set interfaces ge-0/0/0 unit 0 family inet address 20.1.1.1/24 set interfaces ge-0/0/1 unit 0 family inet address 192.168.2.1/24 set routing-options static route 0.0.0.0/0 next-hop 20.1.1.254 |
4-3 방화벽 정책 설정
set security policies from-zone trust to-zone untrust policy trust_to_untrust match source-address any set security policies from-zone trust to-zone untrust policy trust_to_untrust match destination-address any set security policies from-zone trust to-zone untrust policy trust_to_untrust match application any set security policies from-zone trust to-zone untrust policy trust_to_untrust then permit |
4-4 NAT 설정
set security nat source rule-set SOURCE-NAT from zone trust set security nat source rule-set SOURCE-NAT to zone untrust set security nat source rule-set SOURCE-NAT rule PAT-INTERFACE match source-address 192.168.2.0/24 set security nat source rule-set SOURCE-NAT rule PAT-INTERFACE match destination-address 0.0.0.0/0 set security nat source rule-set SOURCE-NAT rule PAT-INTERFACE then source-nat interface |
4-5 확인
root@SRX02> show interfaces terse Interface Admin Link Proto Local Remote ge-0/0/0 up up ge-0/0/0.0 up up inet 20.1.1.1/24 gr-0/0/0 up up ip-0/0/0 up up lsq-0/0/0 up up lt-0/0/0 up up mt-0/0/0 up up sp-0/0/0 up up sp-0/0/0.0 up up inet inet6 sp-0/0/0.16383 up up inet ge-0/0/1 up up ge-0/0/1.0 up up inet 192.168.2.1/24 ge-0/0/2 up up dsc up up fti0 up up fxp0 up up gre up up ipip up up irb up up lo0 up up lo0.16384 up up inet 127.0.0.1 --> 0/0 lo0.16385 up up inet 10.0.0.1 --> 0/0 10.0.0.16 --> 0/0 128.0.0.1 --> 0/0 128.0.0.4 --> 0/0 128.0.1.16 --> 0/0 lo0.32768 up up lsi up up mtun up up pimd up up pime up up pp0 up up ppd0 up up ppe0 up up st0 up up tap up up vlan up down root@SRX02> show route inet.0: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden) + = Active Route, - = Last Active, * = Both 0.0.0.0/0 *[Static/5] 00:01:44 > to 20.1.1.254 via ge-0/0/0.0 20.1.1.0/24 *[Direct/0] 00:01:45 > via ge-0/0/0.0 20.1.1.1/32 *[Local/0] 00:01:45 Local via ge-0/0/0.0 192.168.2.0/24 *[Direct/0] 00:01:44 > via ge-0/0/1.0 192.168.2.1/32 *[Local/0] 00:01:44 Local via ge-0/0/1.0 inet6.0: 1 destinations, 1 routes (1 active, 0 holddown, 0 hidden) + = Active Route, - = Last Active, * = Both ff02::2/128 *[INET6/0] 00:18:00 MultiRecv root@SRX02> root@SRX02> show security zones Security zone: trust Zone ID: 7 Send reset for non-SYN session TCP packets: Off Policy configurable: Yes Interfaces bound: 1 Interfaces: ge-0/0/1.0 Advanced-connection-tracking timeout: 1800 Unidirectional-session-refreshing: No Security zone: untrust Zone ID: 8 Send reset for non-SYN session TCP packets: Off Policy configurable: Yes Interfaces bound: 1 Interfaces: ge-0/0/0.0 Advanced-connection-tracking timeout: 1800 Unidirectional-session-refreshing: No Security zone: junos-host Zone ID: 2 Send reset for non-SYN session TCP packets: Off Policy configurable: Yes Interfaces bound: 0 Interfaces: Advanced-connection-tracking timeout: 1800 Unidirectional-session-refreshing: No root@SRX02> root@SRX02> show security zones terse Zone Type trust Security untrust Security junos-host Security root@SRX02> |
root@SRX02> ping 10.1.1.254 PING 10.1.1.254 (10.1.1.254): 56 data bytes 64 bytes from 10.1.1.254: icmp_seq=0 ttl=255 time=285.562 ms 64 bytes from 10.1.1.254: icmp_seq=1 ttl=255 time=4.858 ms 64 bytes from 10.1.1.254: icmp_seq=2 ttl=255 time=4.057 ms 64 bytes from 10.1.1.254: icmp_seq=3 ttl=255 time=3.332 ms 64 bytes from 10.1.1.254: icmp_seq=4 ttl=255 time=3.799 ms ^C --- 10.1.1.254 ping statistics --- 5 packets transmitted, 5 packets received, 0% packet loss round-trip min/avg/max/stddev = 3.332/60.322/285.562/112.621 ms root@SRX02> ping 8.8.8.8 PING 8.8.8.8 (8.8.8.8): 56 data bytes 64 bytes from 8.8.8.8: icmp_seq=0 ttl=116 time=5.710 ms 64 bytes from 8.8.8.8: icmp_seq=1 ttl=116 time=3.859 ms 64 bytes from 8.8.8.8: icmp_seq=2 ttl=116 time=4.569 ms 64 bytes from 8.8.8.8: icmp_seq=3 ttl=116 time=4.114 ms ^C --- 8.8.8.8 ping statistics --- 4 packets transmitted, 4 packets received, 0% packet loss round-trip min/avg/max/stddev = 3.859/4.563/5.710/0.709 ms |
4-6 PC2 설정
VPCS> 192.168.2.10/24 192.168.2.1 Bad command: "192.168.2.10/24 192.168.2.1". Use ? for help. VPCS> ip 192.168.2.10/24 192.168.2.1 Checking for duplicate address... VPCS : 192.168.2.10 255.255.255.0 gateway 192.168.2.1 VPCS> save Saving startup configuration to startup.vpc . done VPCS> ping 192.168.2.1 192.168.2.1 icmp_seq=1 timeout 84 bytes from 192.168.2.1 icmp_seq=2 ttl=64 time=0.764 ms 84 bytes from 192.168.2.1 icmp_seq=3 ttl=64 time=0.610 ms 84 bytes from 192.168.2.1 icmp_seq=4 ttl=64 time=0.833 ms 84 bytes from 192.168.2.1 icmp_seq=5 ttl=64 time=0.984 ms VPCS> ping 8.8.8.8 84 bytes from 8.8.8.8 icmp_seq=1 ttl=115 time=33.537 ms 84 bytes from 8.8.8.8 icmp_seq=2 ttl=115 time=6.485 ms 84 bytes from 8.8.8.8 icmp_seq=3 ttl=115 time=5.357 ms 84 bytes from 8.8.8.8 icmp_seq=4 ttl=115 time=6.767 ms ^C VPCS> |
5. SRX01 -> SRX02 WAN포트로 통신
SRX02 -> SRX01 WAN포트로 통신
root@SRX01> ping 20.1.1.1 PING 20.1.1.1 (20.1.1.1): 56 data bytes 64 bytes from 20.1.1.1: icmp_seq=0 ttl=63 time=5.115 ms 64 bytes from 20.1.1.1: icmp_seq=1 ttl=63 time=3.391 ms 64 bytes from 20.1.1.1: icmp_seq=2 ttl=63 time=3.597 ms 64 bytes from 20.1.1.1: icmp_seq=3 ttl=63 time=5.333 ms ^C --- 20.1.1.1 ping statistics --- 4 packets transmitted, 4 packets received, 0% packet loss round-trip min/avg/max/stddev = 3.391/4.359/5.333/0.871 ms root@SRX01> root@SRX02> ping 10.1.1.1 PING 10.1.1.1 (10.1.1.1): 56 data bytes 64 bytes from 10.1.1.1: icmp_seq=0 ttl=63 time=6.687 ms 64 bytes from 10.1.1.1: icmp_seq=1 ttl=63 time=7.102 ms 64 bytes from 10.1.1.1: icmp_seq=2 ttl=63 time=4.646 ms 64 bytes from 10.1.1.1: icmp_seq=3 ttl=63 time=2.458 ms 64 bytes from 10.1.1.1: icmp_seq=4 ttl=63 time=5.987 ms ^C --- 10.1.1.1 ping statistics --- 5 packets transmitted, 5 packets received, 0% packet loss round-trip min/avg/max/stddev = 2.458/5.376/7.102/1.680 ms root@SRX02> |
Full configration
SRX01
root@SRX01> show configuration | display set | no-more set version 21.3R1.9 set system host-name SRX01 set security nat source rule-set SOURCE-NAT from zone trust set security nat source rule-set SOURCE-NAT to zone untrust set security nat source rule-set SOURCE-NAT rule PAT-INTERFACE match source-address 192.168.1.0/24 set security nat source rule-set SOURCE-NAT rule PAT-INTERFACE match destination-address 0.0.0.0/0 set security nat source rule-set SOURCE-NAT rule PAT-INTERFACE then source-nat interface set security policies from-zone trust to-zone untrust policy trust_to_untrust match source-address any set security policies from-zone trust to-zone untrust policy trust_to_untrust match destination-address any set security policies from-zone trust to-zone untrust policy trust_to_untrust match application any set security policies from-zone trust to-zone untrust policy trust_to_untrust then permit set security zones security-zone trust host-inbound-traffic system-services all set security zones security-zone trust host-inbound-traffic protocols all set security zones security-zone trust interfaces ge-0/0/1.0 set security zones security-zone untrust host-inbound-traffic system-services all set security zones security-zone untrust host-inbound-traffic protocols all set security zones security-zone untrust interfaces ge-0/0/0.0 set interfaces ge-0/0/0 unit 0 family inet address 10.1.1.1/24 set interfaces ge-0/0/1 unit 0 family inet address 192.168.1.1/24 set routing-options static route 0.0.0.0/0 next-hop 10.1.1.254 |
SRX02
root@SRX02> show configuration | display set | no-more set version 21.3R1.9 set system host-name SRX02 set security nat source rule-set SOURCE-NAT from zone trust set security nat source rule-set SOURCE-NAT to zone untrust set security nat source rule-set SOURCE-NAT rule PAT-INTERFACE match source-address 192.168.2.0/24 set security nat source rule-set SOURCE-NAT rule PAT-INTERFACE match destination-address 0.0.0.0/0 set security nat source rule-set SOURCE-NAT rule PAT-INTERFACE then source-nat interface set security policies from-zone trust to-zone untrust policy trust_to_untrust match source-address any set security policies from-zone trust to-zone untrust policy trust_to_untrust match destination-address any set security policies from-zone trust to-zone untrust policy trust_to_untrust match application any set security policies from-zone trust to-zone untrust policy trust_to_untrust then permit set security zones security-zone trust host-inbound-traffic system-services all set security zones security-zone trust host-inbound-traffic protocols all set security zones security-zone trust interfaces ge-0/0/1.0 set security zones security-zone untrust host-inbound-traffic system-services all set security zones security-zone untrust host-inbound-traffic protocols all set security zones security-zone untrust interfaces ge-0/0/0.0 set interfaces ge-0/0/0 unit 0 family inet address 20.1.1.1/24 set interfaces ge-0/0/1 unit 0 family inet address 192.168.2.1/24 set routing-options static route 0.0.0.0/0 next-hop 20.1.1.254 root@SRX02> |
Router 설정
hostname INT_R1 ! boot-start-marker boot-end-marker ! ! ! no aaa new-model ! ! ! mmi polling-interval 60 no mmi auto-configure no mmi pvc mmi snmp-timeout 180 ! ! ! ! ! ! ! ! ! ! ! ip cef no ipv6 cef ! multilink bundle-name authenticated ! ! ! ! ! redundancy ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! interface GigabitEthernet0/0 ip address 10.1.1.254 255.255.255.0 ip nat inside ip virtual-reassembly in duplex auto speed auto media-type rj45 ! interface GigabitEthernet0/1 ip address 20.1.1.254 255.255.255.0 ip nat inside ip virtual-reassembly in duplex auto speed auto media-type rj45 ! interface GigabitEthernet0/2 ip address 192.168.10.99 255.255.255.0 ip nat outside ip virtual-reassembly in duplex auto speed auto media-type rj45 ! interface GigabitEthernet0/3 no ip address shutdown duplex auto speed auto media-type rj45 ! ip forward-protocol nd ! ! no ip http server no ip http secure-server ip nat inside source list 1 interface GigabitEthernet0/2 overload ip route 0.0.0.0 0.0.0.0 192.168.10.253 ! ipv6 ioam timestamp ! ! access-list 1 permit any |
지금까지 [2025][Juniper SRX #22] site to site vpn - S2S VPN - 기본 설정 글을 읽어주셔서 감사합니다.
다음글을 Juniper SRX S2S VPN 설정 하겠습니다.
'JUNIPER > SRX 방화벽' 카테고리의 다른 글
[2025][Juniper SRX #24] site to site vpn - S2S VPN - OSPF (0) | 2025.02.07 |
---|---|
[2025][Juniper SRX #23] site to site vpn - S2S VPN - static route (0) | 2025.02.07 |
[2025][Juniper SRX #21] ip monitor - ip sla (0) | 2025.02.06 |
[2024][Juniper SRX #20] License Install - J-Web (0) | 2025.02.05 |
[2024][Juniper SRX #19] J-Web (0) | 2025.02.05 |