How to use the virtual firewall feature on Juniper?

Using Juniper SSG 140, and it is in production right now. It is working as a 2-legged, with untrusted and trusted interfaces. Untrusted is WAN facing, using segment of registered public IPs - 210.24.28.128/28; trusted is office internal, using segment of 192.168.10/24. Now, we need to have one more (probably 2) firewall. This firewall needs to have 2 interfaces, untrusted for IPs - 210.24.28.128/28, and DMZ, using segment: 172.16.100.0/24;

I heard that we can make use of the virtual firewall feature, btw, how to do it? Any additional license has to purchase?

thanks,
LVL 1
MichaelBalackAsked:
Who is Participating?
 
Sanga CollinsConnect With a Mentor Systems AdminCommented:
Yes i can provide more details. THere is already an untrust-vr configured by default, so what I would do is create 2 new zone and make sure they are in the untrust-vr. The zones would be for example: ISP2 and LAN2

I would then go to the interfaces list and choose which interfaces I want for my new VR. Lets says eth0/2 and eth0/3

I would configure eth0/2 with ip = 172.16.100.0/24 and zone = LAN2
The configure eth0/3 with ip = 210.24.28.128/28 and zone = ISP2

I would then go to the route table and make a default route for the untrust-vr 0.0.0.0 -> eth0/3 gateway = 210.24.28.x

Finally A polict from LAN2 to ISP2 to allow internet traffic out of the secondary ISP.

~~~~
This is the very basics of how to implement a 2nd VR. Depending on what you want to happen you can create routes to send traffic from one VR to the other and you can also setup ISP failover.
0
 
Sanga CollinsSystems AdminCommented:
No additional licenses needed. All you have to do is use the virtual routers feature. I use this to configure secondary internet providers and guest networks inside my LAN. You can create multiple virtual routers if needed.

You can also (if a very simple setup is required) use custom zones to create and separate different networks.

Lastly although cumbersome at times because other network hardware comes into play: VLAN tags: These can also help make multiple networks viable. I am not a huge fan because you will need enterprise level switches to properly implement VLAN tgs
0
 
MichaelBalackAuthor Commented:
Hi Sangamc,

Do you have a more in-details information on how these virtual routers, security zones work together to achieve the objective?
0
 
MichaelBalackAuthor Commented:
Thanks sangamc, that give a brief idea on vr, together with zones works.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.