Solved

Configure Juniper SSG5 for PPPOE with bellsouth router

Posted on 2010-09-03
4
3,327 Views
1 Endorsement
Last Modified: 2012-05-10
I have a SSG5 juniper router and a Bellsouth Motorola DSL Wifi router. Bellsouth tells me it is running PPPOE for internet authentication and I need to put it in Ethernet Bridged mode to pass the internet traffic through the Juniper. I have the phone line into the DSL router (obviously), the ethernet line into eth0/0 on the Juniper and then eth0/2 (Trusted Zone) plugged into the switch.
Bellsouth geve me the steps to put the router in bridged mode, I did those. I configured a PPPOE name for the Juniper connection and once the router was in bridged mode the firewall did get the bellsouth IP address, it auto assigned a route from 0.0.0.0 to a public gateway 72.x.x.x, and the PPPOE connection said connected....
No internet access?
I added a blanket policy from untrust to trust ANY/ANY and trust to untrust ANY/ANY
Still no internet?
There was a PPPOE time out message in the event screen, I think it said PADI time out... I think it was PADI? fuzzy on that message.
I called juniper and they told me the router was PPPOA and I needed an ADSL firewall (SSG20). I have spoken to bellsouth again and they said it was in fact PPPOE. what can I look for to tell who is right/wrong, and get this internet connection working? If more info is needed just let me know what is needed and I will give it a shot.
1
Comment
Question by:350ztn
  • 2
  • 2
4 Comments
 
LVL 24

Expert Comment

by:rfc1180
ID: 33603883
How was the Bellsouth modem configured before (PPPoE?), if so, then the SSG5 will need to be configured with a PPPoE Client and the Bellsouth modem configured in bridge mode. You will find that if Bellsouth has explained the auth is via PPPoE I would take their word for it (You can always escalate the issue with s supervisor).

However,

bellsouth IP address, it auto assigned a route from 0.0.0.0 to a public gateway 72.x.x.x, and the PPPOE connection said connected....
No internet access?

Authentication is working; are you able to post the config for the Juniper SSG5?

I added a blanket policy from untrust to trust ANY/ANY and trust to untrust ANY/ANY
ensure you are using NAT too!

Post the config and I am sure one of is will be able to assist

Billy

0
 

Accepted Solution

by:
350ztn earned 0 total points
ID: 33608671
The bellsouth router as far as I know has always been pppoe. We just want to insert a firewall for vpn and security filtering.

Below is the config of the ssg5 firewall. the route 0.0.0.0 to Gateway 72.x.x.x is no longer in the routing rules as it was auto configured when connected to the clients network. I don't have the firewall plugged into the clients network currently so I can show that route.

If a config of the bellsouth router is needed, I might be able to capture that...

set clock timezone 0
set vrouter trust-vr sharable
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
unset auto-route-export
exit
set auth-server "Local" id 0
set auth-server "Local" server-name "Local"
set auth default auth server "Local"
set auth radius accounting port 1646
set admin name "netscreen"
set admin password "nFA4MtrhD2jIcYmGhsRMGzMthMJRxn"
set admin user "ifst-root" password "nMduLFrzAEoMcTrJbsRPgfKtFsBrhn" privilege "all"
set admin auth timeout 10
set admin auth server "Local"
set admin format dos
set zone "Trust" vrouter "trust-vr"
set zone "Untrust" vrouter "trust-vr"
set zone "DMZ" vrouter "trust-vr"
set zone "VLAN" vrouter "trust-vr"
set zone "Untrust-Tun" vrouter "trust-vr"
set zone "Trust" tcp-rst
set zone "Untrust" block
unset zone "Untrust" tcp-rst
set zone "DMZ" tcp-rst
set zone "VLAN" block
unset zone "VLAN" tcp-rst
set zone "Untrust" screen tear-drop
set zone "Untrust" screen syn-flood
set zone "Untrust" screen ping-death
set zone "Untrust" screen ip-filter-src
set zone "Untrust" screen land
set zone "V1-Untrust" screen tear-drop
set zone "V1-Untrust" screen syn-flood
set zone "V1-Untrust" screen ping-death
set zone "V1-Untrust" screen ip-filter-src
set zone "V1-Untrust" screen land
set interface "ethernet0/0" zone "Untrust"
set interface "ethernet0/1" zone "DMZ"
set interface "bgroup0" zone "Trust"
set interface bgroup0 port ethernet0/2
set interface bgroup0 port ethernet0/3
set interface bgroup0 port ethernet0/4
set interface bgroup0 port ethernet0/5
set interface bgroup0 port ethernet0/6
unset interface vlan1 ip
set interface ethernet0/0 ip 68.222.229.215/32
set interface ethernet0/0 route
set interface bgroup0 ip 192.168.1.253/24
set interface bgroup0 nat
unset interface vlan1 bypass-others-ipsec
unset interface vlan1 bypass-non-ip
set interface ethernet0/0 ip manageable
set interface bgroup0 ip manageable
set interface ethernet0/0 manage ping
set interface ethernet0/0 manage ssh
set interface ethernet0/0 manage telnet
set interface ethernet0/0 manage snmp
set interface ethernet0/0 manage ssl
set interface ethernet0/0 manage web
set interface bgroup0 dhcp server service
set interface bgroup0 dhcp server auto
set interface bgroup0 dhcp server option gateway 192.168.1.253
set interface bgroup0 dhcp server option netmask 255.255.255.0
set interface bgroup0 dhcp server option dns1 205.152.150.23
set interface bgroup0 dhcp server option dns2 205.152.132.23
set interface bgroup0 dhcp server ip 192.168.1.100 to 192.168.1.126
unset interface bgroup0 dhcp server config next-server-ip
set interface "serial0/0" modem settings "USR" init "AT&F"
set interface "serial0/0" modem settings "USR" active
set interface "serial0/0" modem speed 115200
set interface "serial0/0" modem retry 3
set interface "serial0/0" modem interval 10
set interface "serial0/0" modem idle-time 10
set flow tcp-mss
set flow all-tcp-mss 1304
unset flow no-tcp-seq-check
set flow tcp-syn-check
set pki authority default scep mode "auto"
set pki x509 default cert-path partial
set dns host dns1 192.168.1.5 src-interface bgroup0
set dns host dns2 205.152.150.23 src-interface ethernet0/0
set dns host dns3 205.152.132.23 src-interface ethernet0/0
set ike respond-bad-spi 1
unset ike ikeid-enumeration
unset ike dos-protection
unset ipsec access-session enable
set ipsec access-session maximum 5000
set ipsec access-session upper-threshold 0
set ipsec access-session lower-threshold 0
set ipsec access-session dead-p2-sa-timeout 0
unset ipsec access-session log-error
unset ipsec access-session info-exch-connected
unset ipsec access-session use-error-log
set url protocol websense
exit
set policy id 1 from "Trust" to "Untrust"  "Any" "Any" "ANY" permit
set policy id 1
exit
set policy id 2 from "Untrust" to "Trust"  "Any" "Any" "ANY" permit
set policy id 2
exit
set pppoe name "EVG"
unset pppoe name "EVG" auth PAP
set pppoe name "EVG" username "evergrn@bellsouth.net" password "stcsYTSKN9YGkRsottCafleP1snEe2b0IQ=="
set pppoe name "EVG" interface ethernet0/0
set nsmgmt bulkcli reboot-timeout 60
set ssh version v2
set config lock timeout 5
set snmp port listen 161
set snmp port trap 162
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
unset add-default-route
exit
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
exit
0
 

Author Comment

by:350ztn
ID: 33608683
one other question on the NAT - is that NAT for untrust interface or trust interface? Currently NAT is just on trust interface.
0
 
LVL 24

Expert Comment

by:rfc1180
ID: 33608722
>set interface bgroup0 nat
nat is enabled, so you are set.

>the route 0.0.0.0 to Gateway 72.x.x.x is no longer in the routing rules as it was auto configured when connected to the clients network

this even further proves that the PPPoE is working; the config looks good. You you connect it to the clients network, basic troubleshooting will need to be done: ping trust gateway, ping ISP default gateway, etc.  What are you able to ping, etc.  

Billy

0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

In this tutorial I will show you with short command examples how to obtain a packet footprint of all traffic flowing thru your Juniper device running ScreenOS. I do not know the exact firmware requirement, but I think the fprofile command is availab…
Occasionally, we encounter connectivity issues that appear to be isolated to cable internet service.  The issues we typically encountered were reset errors within Internet Explorer when accessing web sites or continually dropped or failing VPN conne…
This tutorial demonstrates a quick way of adding group price to multiple Magento products.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now