[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Juniper netscreen-25

Posted on 2011-03-18
4
Medium Priority
?
836 Views
Last Modified: 2013-11-16
Hello,

I am trying to pass a port through from 1025 from the outside to 25 on the inside.  I'm trying this either from the CLI or GUI.

Thanks
0
Comment
Question by:mahrens007
  • 2
  • 2
4 Comments
 
LVL 71

Expert Comment

by:Qlemo
ID: 35168299
You need to create a custom service for port 1025, then go into your Untrust interface and add a VIP service with that custom port, the private IP and the mapped port (25).
Then create a "permit" policy Untrust->Trust having "VIP" as destination and "any" as service (or choose the custom service for 1025 if you like).
0
 
LVL 6

Author Comment

by:mahrens007
ID: 35168577
Do you have a screen shot or an example I can follow?
0
 
LVL 71

Accepted Solution

by:
Qlemo earned 2000 total points
ID: 35171713
Sorry, I was wrong with my previous post, regarding having to use a custom service.

Here is a simplified example for CLI. eth0/2 is the Untrust interface, 192.168.1.1 your internal server:
set interface ethernet0/2 vip interface-ip 1025 "SMTP" 192.168.1.1 manual
set policy top name "SMTP in"  from Untrust to Trust "Any-IPv4" "VIP(ethernet0/2)" any permit log count

Open in new window

That will allow any VIP service you create to connect (because of the "any" in the policy). That is more flexible, since you would only have to add another VIP service to your interface to get access.
If you want a more restricted setup, which is not necessary here, you would have to define a custom service for 1025, and provide that one instead of "any" service in the policy.

Doing above in the WebGUI is straightforward, since you can almost exactly follow the command from left to right when going thru the WebGUI menus and dialogs.
0
 
LVL 6

Author Closing Comment

by:mahrens007
ID: 35184088
Thanks for you help
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Problem Description:   Couple of months ago we upgraded the ADSL line at our branch office from Home to Business line. The purpose of transforming the service to have static public IP’s. We were in need for public IP’s to publish our web resour…
The Cisco RV042 router is a popular small network interfacing device that is often used as an internet gateway. Network administrators need to get at the management interface to make settings, change passwords, etc. This access is generally done usi…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question