[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 3528
  • Last Modified:

Configure Juniper SSG5 for PPPOE with bellsouth router

I have a SSG5 juniper router and a Bellsouth Motorola DSL Wifi router. Bellsouth tells me it is running PPPOE for internet authentication and I need to put it in Ethernet Bridged mode to pass the internet traffic through the Juniper. I have the phone line into the DSL router (obviously), the ethernet line into eth0/0 on the Juniper and then eth0/2 (Trusted Zone) plugged into the switch.
Bellsouth geve me the steps to put the router in bridged mode, I did those. I configured a PPPOE name for the Juniper connection and once the router was in bridged mode the firewall did get the bellsouth IP address, it auto assigned a route from 0.0.0.0 to a public gateway 72.x.x.x, and the PPPOE connection said connected....
No internet access?
I added a blanket policy from untrust to trust ANY/ANY and trust to untrust ANY/ANY
Still no internet?
There was a PPPOE time out message in the event screen, I think it said PADI time out... I think it was PADI? fuzzy on that message.
I called juniper and they told me the router was PPPOA and I needed an ADSL firewall (SSG20). I have spoken to bellsouth again and they said it was in fact PPPOE. what can I look for to tell who is right/wrong, and get this internet connection working? If more info is needed just let me know what is needed and I will give it a shot.
1
350ztn
Asked:
350ztn
  • 2
  • 2
1 Solution
 
rfc1180Commented:
How was the Bellsouth modem configured before (PPPoE?), if so, then the SSG5 will need to be configured with a PPPoE Client and the Bellsouth modem configured in bridge mode. You will find that if Bellsouth has explained the auth is via PPPoE I would take their word for it (You can always escalate the issue with s supervisor).

However,

bellsouth IP address, it auto assigned a route from 0.0.0.0 to a public gateway 72.x.x.x, and the PPPOE connection said connected....
No internet access?

Authentication is working; are you able to post the config for the Juniper SSG5?

I added a blanket policy from untrust to trust ANY/ANY and trust to untrust ANY/ANY
ensure you are using NAT too!

Post the config and I am sure one of is will be able to assist

Billy

0
 
350ztnAuthor Commented:
The bellsouth router as far as I know has always been pppoe. We just want to insert a firewall for vpn and security filtering.

Below is the config of the ssg5 firewall. the route 0.0.0.0 to Gateway 72.x.x.x is no longer in the routing rules as it was auto configured when connected to the clients network. I don't have the firewall plugged into the clients network currently so I can show that route.

If a config of the bellsouth router is needed, I might be able to capture that...

set clock timezone 0
set vrouter trust-vr sharable
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
unset auto-route-export
exit
set auth-server "Local" id 0
set auth-server "Local" server-name "Local"
set auth default auth server "Local"
set auth radius accounting port 1646
set admin name "netscreen"
set admin password "nFA4MtrhD2jIcYmGhsRMGzMthMJRxn"
set admin user "ifst-root" password "nMduLFrzAEoMcTrJbsRPgfKtFsBrhn" privilege "all"
set admin auth timeout 10
set admin auth server "Local"
set admin format dos
set zone "Trust" vrouter "trust-vr"
set zone "Untrust" vrouter "trust-vr"
set zone "DMZ" vrouter "trust-vr"
set zone "VLAN" vrouter "trust-vr"
set zone "Untrust-Tun" vrouter "trust-vr"
set zone "Trust" tcp-rst
set zone "Untrust" block
unset zone "Untrust" tcp-rst
set zone "DMZ" tcp-rst
set zone "VLAN" block
unset zone "VLAN" tcp-rst
set zone "Untrust" screen tear-drop
set zone "Untrust" screen syn-flood
set zone "Untrust" screen ping-death
set zone "Untrust" screen ip-filter-src
set zone "Untrust" screen land
set zone "V1-Untrust" screen tear-drop
set zone "V1-Untrust" screen syn-flood
set zone "V1-Untrust" screen ping-death
set zone "V1-Untrust" screen ip-filter-src
set zone "V1-Untrust" screen land
set interface "ethernet0/0" zone "Untrust"
set interface "ethernet0/1" zone "DMZ"
set interface "bgroup0" zone "Trust"
set interface bgroup0 port ethernet0/2
set interface bgroup0 port ethernet0/3
set interface bgroup0 port ethernet0/4
set interface bgroup0 port ethernet0/5
set interface bgroup0 port ethernet0/6
unset interface vlan1 ip
set interface ethernet0/0 ip 68.222.229.215/32
set interface ethernet0/0 route
set interface bgroup0 ip 192.168.1.253/24
set interface bgroup0 nat
unset interface vlan1 bypass-others-ipsec
unset interface vlan1 bypass-non-ip
set interface ethernet0/0 ip manageable
set interface bgroup0 ip manageable
set interface ethernet0/0 manage ping
set interface ethernet0/0 manage ssh
set interface ethernet0/0 manage telnet
set interface ethernet0/0 manage snmp
set interface ethernet0/0 manage ssl
set interface ethernet0/0 manage web
set interface bgroup0 dhcp server service
set interface bgroup0 dhcp server auto
set interface bgroup0 dhcp server option gateway 192.168.1.253
set interface bgroup0 dhcp server option netmask 255.255.255.0
set interface bgroup0 dhcp server option dns1 205.152.150.23
set interface bgroup0 dhcp server option dns2 205.152.132.23
set interface bgroup0 dhcp server ip 192.168.1.100 to 192.168.1.126
unset interface bgroup0 dhcp server config next-server-ip
set interface "serial0/0" modem settings "USR" init "AT&F"
set interface "serial0/0" modem settings "USR" active
set interface "serial0/0" modem speed 115200
set interface "serial0/0" modem retry 3
set interface "serial0/0" modem interval 10
set interface "serial0/0" modem idle-time 10
set flow tcp-mss
set flow all-tcp-mss 1304
unset flow no-tcp-seq-check
set flow tcp-syn-check
set pki authority default scep mode "auto"
set pki x509 default cert-path partial
set dns host dns1 192.168.1.5 src-interface bgroup0
set dns host dns2 205.152.150.23 src-interface ethernet0/0
set dns host dns3 205.152.132.23 src-interface ethernet0/0
set ike respond-bad-spi 1
unset ike ikeid-enumeration
unset ike dos-protection
unset ipsec access-session enable
set ipsec access-session maximum 5000
set ipsec access-session upper-threshold 0
set ipsec access-session lower-threshold 0
set ipsec access-session dead-p2-sa-timeout 0
unset ipsec access-session log-error
unset ipsec access-session info-exch-connected
unset ipsec access-session use-error-log
set url protocol websense
exit
set policy id 1 from "Trust" to "Untrust"  "Any" "Any" "ANY" permit
set policy id 1
exit
set policy id 2 from "Untrust" to "Trust"  "Any" "Any" "ANY" permit
set policy id 2
exit
set pppoe name "EVG"
unset pppoe name "EVG" auth PAP
set pppoe name "EVG" username "evergrn@bellsouth.net" password "stcsYTSKN9YGkRsottCafleP1snEe2b0IQ=="
set pppoe name "EVG" interface ethernet0/0
set nsmgmt bulkcli reboot-timeout 60
set ssh version v2
set config lock timeout 5
set snmp port listen 161
set snmp port trap 162
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
unset add-default-route
exit
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
exit
0
 
350ztnAuthor Commented:
one other question on the NAT - is that NAT for untrust interface or trust interface? Currently NAT is just on trust interface.
0
 
rfc1180Commented:
>set interface bgroup0 nat
nat is enabled, so you are set.

>the route 0.0.0.0 to Gateway 72.x.x.x is no longer in the routing rules as it was auto configured when connected to the clients network

this even further proves that the PPPoE is working; the config looks good. You you connect it to the clients network, basic troubleshooting will need to be done: ping trust gateway, ping ISP default gateway, etc.  What are you able to ping, etc.  

Billy

0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

  • 2
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now