2.3.4 Ìí¼Ó²ßÂÔÅäÖþÙÀý
PolicyÅäÖ÷½·¨ÓëScreenOS»ù±¾Ò»Ö£¬½öÔÚÅäÖÃÃüÁîÉÏÓÐËùÇø±ð£¬ÆäÖвßÂÔµÄÔÊÐí/¾Ü¾øµÄ¶¯×÷£¨Action£©ÐèÒª¶îÍâÅäÖÃÒ»ÌõthenÓï¾ä(½«ScreenOSµÄÒ»Ìõ²ßÂÔ·Ö½â³ÉÁ½Ìõ¼°ÒÔÉÏÅäÖÃÓï¾ä)¡£PolicyÐèÒªÊÖ¶¯ÅäÖÃpolicy name£¬policy name¿ÉÒÔÊÇ×Ö·û´®£¬Ò²¿ÉÒÔÊÇÊý×Ö£¨ÓëScreenOSµÄpolicy IDÀàËÆ,Ö»²»¹ýÐèÒªÊÖ¹¤Ö¸¶¨£©¡£ Ê×ÏÈÐèҪעÒâϵͳȱʡ²ßÂÔÅäÖãº
root# show security policies default-policy ²é¿´µ±Ç°ÏµÍ³È±Ê¡²ßÂÔ¶¯×÷ root# set security policies default-policy ? ÉèÖÃϵͳȱʡ²ßÂÔ¶¯×÷ Possible completions:
deny-all Deny all traffic if no policy match permit-all Permit all traffic if no policy match
¸ù¾ÝʵÑéÍØÆË½øÐвßÂÔÅäÖþÙÀý˵Ã÷
set security zones security-zone trust address-book address pc1 20.1.1.200/32
set security zones security-zone untrust address-book address server1 192.168.1.200/32
/***ÓëScreenOSÒ»Ñù£¬ÔÚtrustºÍuntrust zoneÏ·ֱð¶¨Ò嵨ַ¶ÔÏó±ãÓÚ²ßÂÔµ÷Ó㬵ØÖ·¶ÔÏóµÄÃû³Æ¿ÉÒÔÊǵØÖ·/ÑÚÂëÐÎʽ***/
set security zones security-zone trust address-book address-set addr-group1 address pc1
/***ÔÚtrust zone϶¨ÒåÃû³ÆÎªadd-group1µÄµØÖ·×飬²¢½«pc1µØÖ··Åµ½¸ÃµØÖ·×éÖÐ***/
Set security policies from-zone trust to-zone untrust policy 001 match source-address addr-group1 destination-address server1 application any
set security policies from-zone trust to-zone untrust policy 001 then permit
/***¶¨Òå´Ótrust µ½untrust·½Ïòpermit²ßÂÔ£¬ÔÊÐíaddr-group1×éµÄÔ´µØÖ··ÃÎÊserver1µØÖ·any·þÎñ***/
set security policies from-zone trust to-zone untrust policy 001 then log session-init set security policies from-zone trust to-zone untrust policy 001 then log session-close set security policies from-zone trust to-zone untrust policy 001 then count
<¿ÉÑ¡ÅäÖÃ>/***¶¨Òå´Ótrust µ½untrust·½Ïò²ßÂÔ£¬Õë¶Ôµ±Ç°²ßÂԼǼÈÕÖ¾²¢Í³¼Æ²ßÂÔÁ÷Á¿
root# set security policies from-zone trust to-zone untrust policy 001 scheduler-name happy-time root# set security policies from-zone trust to-zone dmz policy 001 scheduler-name work-time
<¿ÉÑ¡ÅäÖÃ>/***¶¨Ò嵱ǰ²ßÂÔ£¬ÒýÓÃʱ¼äµ÷¶È¶ÔÏ󣬷ûºÏʱ¼äÌõ¼þ²ßÂÔÉúЧ£¬·ñÔò²ßÂÔ½«´¦Óڷǹ¤×÷״̬
root# set security policies from-zone trust to-zone untrust policy t-u then permit application-services ? Possible completions:
+ apply-groups Groups from which to inherit configuration data + apply-groups-SRXcept Don't inherit configuration data from these groups gprs-gtp-profile Specify GPRS Tunneling Protocol profile name idp Intrusion detection and prevention redirect-wx Set WX redirection reverse-redirect-wx Set WX reverse redirection uac-policy Enable unified access control enforcement of policy utm-policy Specify utm policy name [edit]
<¿ÉÑ¡ÅäÖÃ>/***¶¨Ò嵱ǰ²ßÂÔ£¬Ñ¡ÔñÊÇ·ñ¿ÍÆøIDP\\UAC\\UTMµÈ²Ù×÷,Èç¹ûÕë¶Ô²ßÂÔ¿ªÆôÏàÓ¦µÄ¼ì²é£¬ÇëÏȶ¨ÒåºÃÏàÓ¦µÄ¹¦ÄÜ¡£
µÚ 9 Ò³ ¹² 26 Ò³
2.3.5 ²ßÂÔɾ³ý
ɾ³ýSRX·À»ðǽ²ßÂÔÃüÁÔÚJUNOSϵͳÖÐɾ³ýÈ«²¿¶¼Ê¹ÓÃdeleteÃüÁÒò´Ëɾ³ý²ßÂÔµÄÃüÁîÈçÏ£º srx3400@root#delete security policies from trust to untrust policy 1 /*** ɾ³ý´Ótrustµ½ untrust ²ßÂÔIDΪ1µÄ²ßÂÔ ***/
ÃüÁîÈçÏ£ºsrx3400@root#delete security policies from zone-name to zone-name policy policy-id Zone-name:±íʾ×Ô¶¨Òå»òÕßÔ¤¶¨ÒåµÄzoneÃû×Ö¡£ÀýÈ磺trust¡¢untrust¡¢dmzµÈ Policy-id£º±íʾ²ßÂÔµÄIDºÅ£¬ÀýÈ磺1¡¢2¡¢3¡¢4¡¢n¡£
×¢Ò⣺Èç¹û²»¼Ó²ßÂÔID½«±íʾɾ³ý´ÓFrom-zone µ½ TO zone µÄÈ«²¿²ßÂÔ
2.3.6 µ÷Õû²ßÂÔ˳Ðò
SRX·À»ðǽµÄ²ßÂÔÖ´ÐÐ˳ÐòÊÇ×ÔÉ϶øÏ£¬ÖðÒ»¼ì²é½øÐÐÆ¥Åä¡£ÐÂÌí¼ÓµÄ²ßÂÔ½«ÅÅÁÐÔÚ²ßÂÔµÄ×îºóÒ»¸ö£¬Ä¬ÈϲßÂÔÊÇÈ«²¿×èÖ¹£¬Òò´ËÈç¹ûÇ°ÃæÓÐÄ£ºýÆ¥ÅäµÄ²ßÂÔ£¬¾«È·Æ¥Åä²ßÂÔ½«²»ÔÙÖ´ÐУ¬ËùÒÔÐèÒªµ÷Õû²ßÂÔ˳Ðò¡£ ÃüÁîÈçÏ£º(1) srx3400@root#insert security policies from trust to untrust policy 1 before policy 2
/*** ½«´ÓtrustÇøÓòµ½untrustÇøÓòµÄ²ßÂÔ1²åÈëµ½²ßÂÔ2µÄÇ°Ãæ ***/
(2) srx3400@root#insert security policies from trust to untrust policy 1 after policy 2
/*** ½«´ÓtrustÇøÓòµ½untrustÇøÓòµÄ²ßÂÔ1²åÈëµ½²ßÂÔ2µÄºóÃæ ***/
ÃüÁî¸ñʽ£ºsrx3400@root#insert security policies from zone-name to zone-name policy policy-id before
policy policy-id
srx3400@root#insert security policies from zone-name to zone-name policy policy-id after
policy policy-id
2.3.7 ²ßÂÔʧЧÓ뼤»î
ÔÚSRX·À»ðǽÖÐ×¼±¸ÔÝͣijÌõ²ßÂÔ£¬µÈ´ý²âÊÔ½áÊøºóÔÙ¼¤»îÆôÓã¬Ê¹ÓÃÈçÏÂÃüÁî½øÐÐÉèÖà ÃüÁîÈçÏ£º²ßÂÔʧЧ
(1) srx3400@root#deactive security policies from trust to untrust policy 1
/*** ½«´ÓtrustÇøÓòµ½untrustÇøÓòµÄ²ßÂÔ1 ÔÝʱͣÓà ***/ ²ßÂÔ¼¤»î
£¨2£©srx3400@root#active security policies from trust to untrust policy 1
/*** ½«´ÓtrustÇøÓòµ½untrustÇøÓòµÄ²ßÂÔ1 ¼¤»î ***/
¼¤»îºÍʧЧÅäÖÃÍê³Éºó¶¼Òª½øÐÐcommit²Ù×÷¡£ ÃüÁîÈçÏ£ºsrx3400@root#commit
2.4 µØÖ·×ª»»
SRX NAT½ÏScreenOSÔÚ¹¦ÄÜʵÏÖ·½Ãæ»ù±¾±£³ÖÒ»Ö£¬µ«ÔÚ¹¦ÄÜÅäÖÃÉÏÓнϴóÇø±ð£¬ÅäÖõÄÖ÷Òª²îÒìÔÚÓÚScreenOSµÄNATÓëpolicyÊǰ󶨵ģ¬ÎÞÂÛÊÇMIP/VIP/DIP»¹ÊÇ»ùÓÚ²ßÂÔµÄNAT£¬ÔÚpolicyÖоùÒªÌåÏÖ³öNATÄÚÈÝ£¨³ýÁËȱʡ»ùÓÚuntrust½Ó¿ÚµÄSouec-NATģʽÍ⣩£¬¶øSRX µÄNATÔò×÷ÎªÍøÂç²ãÃæ»ù´¡ÄÚÈݽøÐжÀÁ¢ÅäÖ㨶ÀÁ¢¶¨Ò嵨ַӳÉäµÄ·½Ïò¡¢Ó³Éä¹ØÏµ¼°µØÖ··¶Î§£©£¬PolicyÖв»ÔÙ°üº¬NATÏà¹ØÅäÖÃÐÅÏ¢£¬ÕâÑùµÄºÃ´¦ÊÇÒ×ÓÚÀí½â¡¢
µÚ 10 Ò³ ¹² 26 Ò³
¼ò»¯ÔËά£¬µ±ÍøÂçÍØÆÓºÍNATÓ³Éä¹ØÏµ·¢Éú¸Ä±äʱ£¬ÎÞÐèµ÷ÕûPolicyÅäÖÃÄÚÈÝ¡£
SRX NATºÍPolicyÖ´ÐÐÏȺó˳ÐòΪ£ºÄ¿µÄµØÖ·×ª»»£Ä¿µÄµØÖ·Â·ÓɲéÕÒ£Ö´ÐвßÂÔ¼ì²é£Ô´µØÖ·×ª»»£¬½áºÏÕâ¸öÖ´ÐÐ˳Ðò£¬ÔÚÅäÖÃPolicyʱÐè×¢Ò⣺PolicyÖÐÔ´µØÖ·Ó¦ÊÇת»»Ç°µÄÔ´µØÖ·£¬¶øÄ¿µÄµØÖ·Ó¦¸ÃÊÇת»»ºóµÄÄ¿µÄµØÖ·£¬»»¾ä»°Ëµ£¬PolicyÖеÄÔ´ºÍÄ¿µÄµØÖ·Ó¦¸ÃÊÇÔ´ºÍÄ¿µÄÁ½¶ËµÄÕæÊµIPµØÖ·£¬ÕâÒ»µãºÍScreenOS´æÔÚÇø±ð£¬ÐèÒª¼ÓÒÔ×¢Òâ¡£
SRXÖв»ÔÙʹÓÃMIP/VIP/DIPÕâЩ¸ÅÄÆäÖÐMIP±»Static¾²Ì¬µØÖ·×ª»»È¡´ú£¬Á½ÕßÔÚ¹¦ÄÜÉÏÍêȫһÖ£»DIP±»Source NATÈ¡´ú£»»ùÓÚPolicyµÄÄ¿µÄµØÖ·×ª»»¼°VIP±» Destination NATÈ¡´ú¡£ScreenOSÖлùÓÚUntrust zone½Ó¿ÚµÄÔ´µØÖ·×ª»»±»±£ÁôÏÂÀ´£¬µ«ÔÚSRXÖв»ÔÙÊÇȱʡģʽ£¨SRXÖÐTrust Zone½Ó¿ÚûÓÐNATģʽ¸ÅÄ£¬ÐèÒªÊÖ¹¤ÅäÖá£ÀàËÆScreenOS£¬StaticÊôÓÚË«ÏòNAT£¬ÆäËûÀàÐ;ùÊôÓÚµ¥ÏòNAT¡£
´ËÍ⣬SRX»¹¶àÁËÒ»¸öproxy-arp¸ÅÄÈç¹û¶¨ÒåµÄIP Pool£¨¿ÉÓÃÓÚÔ´»òÄ¿µÄµØÖ·×ª»»£©ÐèÅäÖÃSRX¶ÔÕâ¸öPoolÄڵĵØÖ·ÌṩARP´úÀí¹¦ÄÜ£¬ÕâÑù¶Ô¶ËÉ豸Äܹ»½âÎöµ½IP PoolµØÖ·µÄMACµØÖ·£¨Ê¹ÓýӿÚMACµØÖ·ÏìÓ¦¶Ô·½£©£¬ÒÔ±ãÓÚ·µ»Ø±¨ÎÄÄܹ»ËÍ´ïSRX¡£ÏÂÃæÊÇÅäÖþÙÀý¼°Ïà¹ØËµÃ÷£º
2.4.1 Interface based NAT »ùÓÚ½Ó¿ÚµÄÔ´µØÖ·×ª»»
ͼƬ½ö¹©²Î¿¼,ÏÂÁÐÅäÖòο¼ÊµÑéÍØÆË
NATÅäÖãº
set security nat source rule-set 1 from zone trust Ö¸¶¨Ô´ÇøÓò set security nat source rule-set 1 to zone untrust Ö¸¶¨Ä¿±êÇøÓò
set security nat source rule-set 1 rule rule1 match source-address 0.0.0.0/0 destination-address 0.0.0.0/0 Ö¸¶¨Ô´ºÍÄ¿±êÆ¥ÅäµÄµØÖ·»òÕßµØÖ·¶Î,0.0.0./0´ú±íËùÓÐ
set security nat source rule-set 1 rule rule1 then source-nat interface Ö¸¶¨Í¨¹ý½Ó¿ÚIP½øÐÐÔ´·Òë
ÉÏÊöÅäÖö¨ÒåNATÔ´µØÖ·Ó³É乿Ôò£¬´ÓTrust Zone·ÃÎÊUntrust ZoneµÄËùÓÐÁ÷Á¿ÓÃUntrust Zone½Ó¿ÚIP×öÔ´µØÖ·×ª»»¡£
PolicyÅäÖÃ:
set security policies from-zone trust to-zone untrust policy 1 match source-address pc-1 set security policies from-zone trust to-zone untrust policy 1 match destination-address any set security policies from-zone trust to-zone untrust policy 1 match application any set security policies from-zone trust to-zone untrust policy 1 then permit
ÉÏÊöÅäÖö¨ÒåPolicy²ßÂÔ£¬ÔÊÐíTrust zone 10.1.2.2µØÖ··ÃÎÊUntrust·½ÏòÈκεØÖ·£¬¸ù¾ÝÇ°ÃæµÄNATÅäÖã¬SRXÔÚ½¨Á¢sessionʱ×Ô¶¯Ö´ÐнӿÚÔ´µØÖ·×ª»»¡£ µÚ 11 Ò³ ¹² 26 Ò³
2.4.2 Pool based Source NAT»ùÓÚµØÖ·³ØµÄÔ´µØÖ·×ª»»
ͼƬ½ö¹©²Î¿¼,ÏÂÁÐÅäÖòο¼ÊµÑéÍØÆË
NATÅäÖãº
set security nat source pool pool-1 address 192.168.1.50 to 192.168.1.150 set security nat source rule-set 1 from zone trust set security nat source rule-set 1 to zone untrust
set security nat source rule-set 1 rule rule1 match source-address 0.0.0.0/0 destination-address 0.0.0.0/0
set security nat source rule-set 1 rule rule1 then source-nat pool pool-1
set security nat proxy-arp interface ge-0/0/0 address 192.168.1.50 to 192.168.1.150
ÉÏÊöÅäÖñíʾ´Ótrust·½Ïò£¨any£©µ½untrust·½Ïò(any)·ÃÎÊʱÌṩԴµØÖ·×ª»»£¬Ô´µØÖ·³ØÎªpool1(192.168.1.50-192.168.1.150)£¬Í¬Ê±fe-0/0/0½Ó¿ÚΪ´Ëpool IPÌṩARP´úÀí¡£ÐèҪעÒâµÄÊÇ£º¶¨ÒåPoolʱ²»ÐèÒªÓëZone¼°½Ó¿Ú½øÐйØÁª¡£ÅäÖÃproxy-arpÄ¿µÄÊÇÈ÷µ»Ø°üÄܹ»ËÍ´ïSRX£¬Èç¹ûPoolÓë³ö½Ó¿ÚIP²»ÔÚͬһ×ÓÍø£¬Ôò¶Ô¶ËÉ豸ÐèÒªÅäÖÃÖ¸Ïòfe-0/0/0½Ó¿ÚµÄPoolµØÖ·Â·ÓÉ¡£
Policy£º
set security policies from-zone trust to-zone untrust policy 1 match source-address pc-1 set security policies from-zone trust to-zone untrust policy 1 match destination-address any set security policies from-zone trust to-zone untrust policy 1 match application any set security policies from-zone trust to-zone untrust policy 1 then permit
ÉÏÊöÅäÖö¨ÒåPolicy²ßÂÔ£¬ÔÊÐíTrust zone 10.1.2.2µØÖ··ÃÎÊUntrust·½ÏòÈκεØÖ·£¬¸ù¾ÝÇ°ÃæµÄNATÅäÖã¬SRXÔÚ½¨Á¢sessionʱ×Ô¶¯Ö´ÐÐÔ´µØÖ·×ª»»¡£
2.4.3 Pool base destination NAT»ùÓÚµØÖ·³ØµÄÄ¿±êµØÖ·×ª»»
µÚ 12 Ò³ ¹² 26 Ò³