[j-nsp] different default for different vlans
Cord MacLeod
cordmacleod at gmail.com
Mon Mar 23 20:13:22 EDT 2009
Excellent options from everyone. I had thought of this before but I
simply was upset about the absence of an except term for the
firewall. Instead I simply used different terms for accepting packets
and policy routed packets.
On Mar 23, 2009, at 5:09 PM, Truman Boyes wrote:
> Hi,
>
> A simple example for FBF would look like this:
>
> lab at cs-m10i> show configuration groups tdb-fbf logical-routers
> manhattan routing-instances
> manhattan-alternate {
> instance-type forwarding;
> }
>
> lab at cs-m10i> show configuration groups tdb-fbf logical-routers
> manhattan routing-options
> interface-routes {
> rib-group inet if-route;
> family inet {
> import local-comm;
> }
> }
>
> rib-groups {
> if-route {
> import-rib [ inet.0 manhattan-alternate.inet.0 ];
> }
>
> And then a filter that puts the traffic into the correct routing
> instance:
>
> lab at cs-m10i> show configuration groups tdb-fbf firewall
> filter manhattan-fbf {
> term 1 {
> from {
> source-address {
> 1.1.1.1/32;
> }
> }
> then {
> logical-router manhattan routing-instance manhattan-
> alternate;
> }
> }
> term 2 {
> then accept;
> }
> }
>
>
> You can configure a different 0/0 static route inside the routing-
> instance ...
>
> Cheers,
> Truman
>
>
> On 24/03/2009, at 5:06 AM, Nilesh Khambal wrote:
>
>> Hi,
>>
>> Sorry, but I am not familiar with EX CLI. I presumed it would be
>> same as any other M/T/MX CLI. Please feel free to check with JTAC
>> on this.
>>
>> However, I still think you can achieve what you want using policy
>> based routing. In ingress filter (Layer3) on your LAN interface
>> will forward all the traffic from local VLAN to a routing-instance
>> (OR LR or VR) which hosts interface to your proxy server. This
>> routing-instance will also have other Layer3 interfaces on this EX
>> (protocol direct) via route redistribution using rib-groups. This
>> way if the traffic is for one of the locally attached subnet, it
>> will be routed locally using the redistributed direct routes, else
>> it will be routed out using the default route via proxy.
>>
>>
>> Thanks,
>> Nilesh.
>>
>>
>> Cord MacLeod wrote:
>>> I wish it were. This is all traffic except for local traffic.
>>> Any explanation for why the ex4200 doesn't have the except keyword?
>>> On Mar 20, 2009, at 6:55 PM, Nilesh Khambal wrote:
>>>> Are using proxy just for http and https? Is so, then can you be
>>>> specific in the filters with protocol and ports. You can add a
>>>> default accept at the end of the filter to accept all other
>>>> traffic that does not match http or https. Traffic accepted by
>>>> default accept will get routed using inet.0 routing table.
>>>>
>>>> This way you don't have to use "except" in filter terms.
>>>>
>>>> Thanks,
>>>> Nilesh
>>>>
>>>> Cord MacLeod wrote:
>>>>> That would be great, and I thought of it just after I sent the
>>>>> email. There's one big thing I'm missing though... except.
>>>>> From an m7:
>>>>> Possible completions:
>>>>> <[Enter]> Execute this command
>>>>> except Match address not in this prefix
>>>>> From an ex4200:
>>>>> <[Enter]> Execute this command
>>>>> In other words, all of my traffic would hit this proxy and it
>>>>> would break routing between the vlans if I use policy based
>>>>> routing and can't use except.
>>>>> On Mar 20, 2009, at 6:37 PM, Nilesh Khambal wrote:
>>>>>> Can you try policy based routing using input firewall filter
>>>>>> on EX? This was you can redirect the traffic to another
>>>>>> forwarding- instance where your proxy resides. You will also
>>>>>> have to take care of reverse routing from the proxy
>>>>>> forwarding instance back to inet.0 on EX so that return
>>>>>> traffic can go back to client VLANs.
>>>>>>
>>>>>> Thanks,
>>>>>> Nilesh.
>>>>>>
>>>>>> Cord MacLeod wrote:
>>>>>>> I feel silly for asking this, but apparently my brain isn't
>>>>>>> working today.
>>>>>>> I've got some machines in a public vlan, 100 and some RFC
>>>>>>> 1918 machines on another vlan, 120. I redistribute 0.0.0.0
>>>>>>> in ospf through my network down to these EX4200's that the
>>>>>>> machines are hanging off of. Is there a way for my RFC
>>>>>>> 1918 machines to default to different next hop (proxy
>>>>>>> machine) when not attempting to route between vlans so they
>>>>>>> can hit outside. The way we do it now is changing the
>>>>>>> default gateway on the machines. I'd like to perform this
>>>>>>> automatically on the ex4200s if possible.
>>>>>>> Any ideas?
>>>>>>> _______________________________________________
>>>>>>> juniper-nsp mailing list juniper-nsp at puck.nether.net
>>>>>>> https://puck.nether.net/mailman/listinfo/juniper-nsp
>>>>> .
>>> .
>> _______________________________________________
>> juniper-nsp mailing list juniper-nsp at puck.nether.net
>> https://puck.nether.net/mailman/listinfo/juniper-nsp
>>
>
More information about the juniper-nsp
mailing list