[j-nsp] NAT on SRX with routed IP range
Paul Stewart
paul at paulstewart.org
Sat Feb 7 14:27:10 EST 2015
That's been my experience .... proxy arp only on the external.
Paul
-----Original Message-----
From: juniper-nsp [mailto:juniper-nsp-bounces at puck.nether.net] On Behalf Of
Jonathan Call
Sent: Friday, February 6, 2015 3:00 PM
To: Tyler Christiansen
Cc: juniper-nsp at puck.nether.net
Subject: Re: [j-nsp] NAT on SRX with routed IP range
I've been reading the Juniper documentation and confirmed that the proxy-arp
statement is only needed when the NAT IP falls within the subnet range of
the external IP address of the egress interface. It will automatically
proxy-arp for all else. It also doesn't matter if it is a source, a
destination or a static NAT.
In my case, the problem turned out to be a missing route on a third party
device preventing the traffic from even reaching the SRX.
Thanks!Date: Wed, 4 Feb 2015 14:16:02 -0800
Subject: Re: [j-nsp] NAT on SRX with routed IP range
From: tyler at adap.tv
To: lordsith49 at hotmail.com
CC: juniper-nsp at puck.nether.net
Nope. It's been a while, but I just reviewed our configuration, we removed
proxy-arp at some point. Suppose it turns out proxy-arp wasn't needed.
We also have security policy configuration like this:
> show configuration security policies from-zone untrust to-zone trust
> policy <name> {
match { source-address <Allowed external address>;
destination-address <internal RFC1918 IP>; application [ <list of
ports/applications> ]; } then { permit; }}
If you want to make the NAT work for any outside source, you could just set
source-address to any.
On Wed, Feb 4, 2015 at 2:00 PM, Jonathan Call <lordsith49 at hotmail.com>
wrote:
I'm in the process of rewriting it all as a static NAT right now.
Are you applying any IP from routed block to your external interface?
Reading the rules of proxy-arp suggests that IP range needs to reside on the
external interface.
Thanks,
JonathanDate: Wed, 4 Feb 2015 13:52:00 -0800
Subject: Re: [j-nsp] NAT on SRX with routed IP range
From: tyler at adap.tv
To: lordsith49 at hotmail.com
CC: juniper-nsp at puck.nether.net
Ah, sorry, I misunderstood. We're using static NAT. Here's a short
example.
> show configuration security nat static rule-set static-NATs from zone
untrust;rule <name> { match { destination-address <external routed
destination>; destination-port <external port>; } then {
static-nat { prefix { <real host>;
mapped-port <real port>; } } }}
On Wed, Feb 4, 2015 at 1:08 PM, Jonathan Call <lordsith49 at hotmail.com>
wrote:
I added a proxy-arp enty:
source {rule-set my-lab-internal {from zone lab-internal;to zone
untrust;rule my-lab-inet {match {source-address192.168.2.0/26;}then
{source-nat {interface;}}}}}destination {pool lab-plasma {address
192.168.2.2/32 port 8080;}rule-set lab-nats {from zone untrust;rule
lab-plasma-1 {match {destination-address 4.5.32.16/32;destination-port
8080;} then {destination-nat pool lab-plasma;}}}}proxy-arp {interface
reth0.0 {address {4.5.32.16/32;}}}
The translation hit counter from 'show security nat destination rule all'
does not increment so I'm still not hitting the NAT rule. I have the
appropriate security policy rules between the untrust and lab-internal zones
to allow 8080 inbound and anything outbound.
Jonathan
Date: Wed, 4 Feb 2015 11:45:26 -0800
Subject: Re: [j-nsp] NAT on SRX with routed IP range
From: tyler at adap.tv
To: lordsith49 at hotmail.com
CC: juniper-nsp at puck.nether.net
We use routed ranges to NAT a few hosts. The key for us was configuring
proxy-arp on the untrust interface for the IPs.
On Wed, Feb 4, 2015 at 11:24 AM, Jonathan Call <lordsith49 at hotmail.com>
wrote:
I've seen plenty of examples of a static NAT where the SRX has a public IP
range on the untrusted interface. I have not found a good one for when the
SRX has an IP range routed to it.
SRX Public IP: 4.5.6.60/30Routed IP range (via the public interface)
4.5.32.16/28Trusted zone: 192.168.2.1/26
show configuration security nat (hopefully this will display properly)
source { rule-set my-lab-internal { from zone lab-internal;
to zone untrust; rule my-lab-inet { match {
source-address 192.168.2.0/26; } then {
source-nat { interface; } }
} }}destination { pool lab-plasma { address 192.168.2.2/32 port
8080; } rule-set lab-nats { from zone untrust; rule
lab-plasma-1 { match { destination-address
4.5.32.16/32; destination-port 8080; }
then { destination-nat pool lab-plasma; } }
}}
The result of this configuration is that no NAT occurs. But if I change the
destination-address to the SRX's external IP (4.5.6.60) it works just fine.
Jonathan
_______________________________________________
juniper-nsp mailing list juniper-nsp at puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp
_______________________________________________
juniper-nsp mailing list juniper-nsp at puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp
_______________________________________________
juniper-nsp mailing list juniper-nsp at puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp
More information about the juniper-nsp
mailing list