Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Juniper SSG-20 Redundancy of two untrusted connections and RDP connectivity

Posted on 2011-10-20
3
Medium Priority
?
2,206 Views
Last Modified: 2012-08-14
Hi, New to Juniper IOS and had a question on how to best setup an automatic fail-over of two internet connections.
I also cannot get RDP to connect to a trusted server through either internet connection or address.. Not sure what I'm missing.
Config Below.
I  
unset key protection enable
set clock ntp
set clock timezone -5
set clock dst recurring start-weekday 2 0 3 02:00 end-weekday 1 0 11 02:00
set vrouter trust-vr sharable
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
unset auto-route-export
exit
set service "RDP" protocol tcp src-port 3389-3389 dst-port 3389-3389
set service "RDP" + udp src-port 3389-3389 dst-port 3389-3389
set service "VPN" protocol tcp src-port 1723-1723 dst-port 1723-1723
set service "VPN" + udp src-port 1723-1723 dst-port 1723-1723
set alg appleichat enable
unset alg appleichat re-assembly enable
set alg sctp enable
set auth-server "Local" id 0
set auth-server "Local" server-name "Local"
set auth default auth server "Local"
set auth radius accounting port 1646
set admin name "netscreen"
set admin password "nKVUM2rwMUzPcrkG5sWIHdCtqkAibn"
set admin auth web timeout 10
set admin auth dial-in timeout 3
set admin auth server "Local"
set admin format dos
set zone "Trust" vrouter "trust-vr"
set zone "Untrust" vrouter "trust-vr"
set zone "DMZ" vrouter "trust-vr"
set zone "VLAN" vrouter "trust-vr"
set zone id 100 "XO T-1"
set zone "XO T-1" vrouter "untrust-vr"
set zone "Untrust-Tun" vrouter "trust-vr"
set zone "Trust" tcp-rst
set zone "Untrust" block
unset zone "Untrust" tcp-rst
set zone "MGT" block
unset zone "V1-Trust" tcp-rst
unset zone "V1-Untrust" tcp-rst
set zone "DMZ" tcp-rst
unset zone "V1-DMZ" tcp-rst
unset zone "VLAN" tcp-rst
unset zone "XO T-1" tcp-rst
set zone "Untrust" screen tear-drop
set zone "Untrust" screen syn-flood
set zone "Untrust" screen ping-death
set zone "Untrust" screen ip-filter-src
set zone "Untrust" screen land
set zone "V1-Untrust" screen tear-drop
set zone "V1-Untrust" screen syn-flood
set zone "V1-Untrust" screen ping-death
set zone "V1-Untrust" screen ip-filter-src
set zone "V1-Untrust" screen land
set interface "ethernet0/0" zone "Untrust"
set interface "ethernet0/1" zone "Untrust"
set interface "bgroup0" zone "Trust"
set interface bgroup0 port ethernet0/2
set interface bgroup0 port ethernet0/3
set interface bgroup0 port ethernet0/4
unset interface vlan1 ip
set interface ethernet0/0 ip 50.XX.XX.33/29
set interface ethernet0/0 nat
set interface ethernet0/1 ip 66.xx.XX.66/30
set interface ethernet0/1 route
set interface bgroup0 ip 10.1.25.1/24
set interface bgroup0 nat
set interface ethernet0/0 gateway 50.73.85.38
unset interface vlan1 bypass-others-ipsec
unset interface vlan1 bypass-non-ip
set interface ethernet0/0 ip manageable
unset interface ethernet0/1 ip manageable
set interface bgroup0 ip manageable
set interface ethernet0/1 manage ping
set interface bgroup0 manage mtrace
set interface ethernet0/0 monitor track-ip ip
set interface ethernet0/0 monitor track-ip ip 4.2.2.2 interval 5
set interface ethernet0/0 monitor track-ip ip 4.2.2.2 threshold 2
unset interface ethernet0/0 monitor track-ip dynamic
set interface "ethernet0/0" mip 50.73.85.33 host 10.1.25.2 netmask 255.255.255.255 vr "trust-vr"
set interface "ethernet0/0" mip 50.XX.XX.34 host 10.1.25.3 netmask 255.255.255.255 vr "trust-vr"
set interface "serial0/0" modem settings "USR" init "AT&F"
set interface "serial0/0" modem settings "USR" active
set interface "serial0/0" modem speed 115200
set interface "serial0/0" modem retry 3
set interface "serial0/0" modem interval 10
set interface "serial0/0" modem idle-time 10
set flow tcp-mss
unset flow tcp-syn-check
unset flow tcp-syn-bit-check
set flow reverse-route clear-text prefer
set flow reverse-route tunnel always
set pki authority default scep mode "auto"
set pki x509 default cert-path partial
set dns host dns1 75.75.75.75
set dns host dns2 0.0.0.0
set dns host dns3 0.0.0.0
set address "Trust" "ATL-DC-01" 10.1.25.2 255.255.255.255
set address "Trust" "ATL-NAS-01" 10.1.25.3 255.255.255.255
set address "Trust" "Video Conference" 10.1.25.21 255.255.255.0
set crypto-policy
exit
set ike respond-bad-spi 1
set ike ikev2 ike-sa-soft-lifetime 60
unset ike ikeid-enumeration
unset ike dos-protection
unset ipsec access-session enable
set ipsec access-session maximum 5000
set ipsec access-session upper-threshold 0
set ipsec access-session lower-threshold 0
set ipsec access-session dead-p2-sa-timeout 0
unset ipsec access-session log-error
unset ipsec access-session info-exch-connected
unset ipsec access-session use-error-log
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
exit
set url protocol websense
exit
set policy id 1 from "Trust" to "Untrust"  "Any" "Any" "ANY" permit
set policy id 1
exit
set policy id 2 name "RDP to DC-01 Comcast" from "Untrust" to "Trust"  "Any" "MIP(50.XX.XX.33)" "RDP" permit
set policy id 2
exit
set policy id 3 name "VPN to ATL-DC-01" from "Untrust" to "Trust"  "Any" "MIP(50.XX.XX.33)" "VPN" permit
set policy id 3
exit
set policy id 4 name "HTTP to ATL-DC-01" from "Untrust" to "Trust"  "Any" "MIP(50.73.85.33)" "HTTP" permit
set policy id 4
exit
set policy id 5 name "RDP to ATL-DC-01" from "Untrust" to "Trust"  "Any" "MIP(50.XX.XX.34)" "RDP" permit
set policy id 5
exit
set policy id 6 from "Untrust" to "Trust"  "Any" "ATL-DC-01" "RDP" permit
set policy id 6
exit
set nsmgmt bulkcli reboot-timeout 60
set ssh version v2
set config lock timeout 5
unset license-key auto-update
set telnet client enable
set snmp port listen 161
set snmp port trap 162
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
unset add-default-route
set route 0.0.0.0/0 interface ethernet0/1 gateway 66.XX.XX.65 preference 20 metric 30
set route 10.5.25.0/24 gateway 10.1.25.254
exit
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
exit
0
Comment
Question by:Mzucchi
  • 2
3 Comments
 
LVL 18

Accepted Solution

by:
Sanga Collins earned 1000 total points
ID: 37001390
to setup internet failover, what you want to do is create a custom zone in the untrust-vr (call it ISP2 for example) you can then assign the backup internet interface to this zone.

Now in the routing table for untrust-vr make sure you configure your default gateway for the backup internet connection. then also configure a route for your primary LAN pointing to the trust-vr (this is so traffic from backup internet knows its way back to primary LAN)

In trust-vr create a 2nd default route with metric of 10 pointing to untrust-vr. what this does is make the route inactive unless your 1st default route goes down (IE internet service interruption) If service is interrupted default route is disabled and route with metric 10 becomes active sending traffic to the untrust-vr and out the backup internet connection

Big step now is to setup monitoring on primary internet interface. by editing the interface you can set conditions for failure. On my juniper i setup ping to ip 8.8.8.8 google dns and 209.x.x.x my data center. If both these ips can not be pinged from internet connection 1, the interface is marked as down and the default route becomes inactive sending my internet traffic through the backup in untrust-vr
0
 

Author Comment

by:Mzucchi
ID: 37005906
Thanks for the explanation. Can you provide and example config for the above?
Also, any idea (based on listed config) why I cant access my server via RDP from the WAN?
0
 
LVL 18

Expert Comment

by:Sanga Collins
ID: 37005996
In your RDP custom service defenition i believe the source port is too restrictive (src-port 3389-3389) since when initiating an outbound connection to RDP, the client doesnt always use port 3389 as its outbound port but usually some random port is used.

This may be why RDP from outside and also from inside is not working :)

here is my custom service defenition for RDP

set service "RDP" protocol tcp src-port 0-65535 dst-port 3389-3389
0

Featured Post

The Firewall Audit Checklist

Preparing for a firewall audit today is almost impossible.
AlgoSec, together with some of the largest global organizations and auditors, has created a checklist to follow when preparing for your firewall audit. Simplify risk mitigation while staying compliant all of the time!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

We sought a budget ($5,000) firewall solution that would provide all the performance we needed with no single point of failure.  Hosting a SAAS web application in our datacenter, it was critical that we find a way to keep connectivity up and inbound…
Imagine you have a shopping list of items you need to get at the grocery store. You have two options: A. Take one trip to the grocery store and get everything you need for the week, or B. Take multiple trips, buying an item at a time, to achieve t…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
With just a little bit of  SQL and VBA, many doors open to cool things like synchronize a list box to display data relevant to other information on a form.  If you have never written code or looked at an SQL statement before, no problem! ...  give i…
Suggested Courses
Course of the Month14 days, 6 hours left to enroll

581 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question