[j-nsp] Destination NAT

Per Westerlund p1 at westerlund.se
Thu Nov 28 03:56:14 EST 2013


I am sorry to say that I think it is almost correct. The policy rules are evaluated after destination NAT handling, where the destination port has already been translated. You should probably exchange:

> set security policies from-zone untrust to-zone trust policy DNAT_POLICY match application TELNET_DNAT

for:

set security policies from-zone untrust to-zone trust policy DNAT_POLICY match application junos-telnet

/Per


28 nov 2013 kl. 09:48 skrev Asad Raza <asadgardezi at gmail.com>:

> Actually your NAT pool config need changes as well. Following is the correct config with changes highlighted:
> 
> Assumption:
> 
> Real (private) IP of server: x.x.x.x:23
> Public (NAT) IP of server : y.y.y.y:3333
> 
> set security zones security-zone trust address-book address SERVER
> x.x.x.x/32
> 
> set applications application TELNET_DNAT protocol tcp
> set applications application TELNET_DNAT destination-port 3333
> 
> set security nat destination pool DNAT_POOL address x.x.x.x/32
> set security nat destination pool DNAT_POOL address port 23
> 
> set security nat destination rule-set DNAT_RULE from zone untrust
> 
> set security nat destination rule-set DNAT_RULE rule rule1 match
> destination-address y.y.y.y/32
> set security nat destination rule-set DNAT_RULE rule rule1 match
> destination-port 3333
> set security nat destination rule-set DNAT_RULE rule rule1 then
> destination-nat pool DNAT_POOL
> 
> set security policies from-zone untrust to-zone trust policy DNAT_POLICY
> match source-address any
> set security policies from-zone untrust to-zone trust policy DNAT_POLICY
> match destination-address SERVER
> set security policies from-zone untrust to-zone trust policy DNAT_POLICY
> match application TELNET_DNAT
> set security policies from-zone untrust to-zone trust policy DNAT_POLICY
> then permit
> 
> Hope it works now :)
> 
> Regards,
> 
> Asad



More information about the juniper-nsp mailing list