收藏 分享(赏)

Juniper_SRX配置手册.doc

上传人:HR专家 文档编号:11373748 上传时间:2020-04-07 格式:DOC 页数:25 大小:253.95KB
下载 相关 举报
Juniper_SRX配置手册.doc_第1页
第1页 / 共25页
Juniper_SRX配置手册.doc_第2页
第2页 / 共25页
Juniper_SRX配置手册.doc_第3页
第3页 / 共25页
Juniper_SRX配置手册.doc_第4页
第4页 / 共25页
Juniper_SRX配置手册.doc_第5页
第5页 / 共25页
点击查看更多>>
资源描述

1、 Juniper SRX防火墙配置手册一、JUNOS操作系统介绍 1.1 层次化配置结构 JUNOS采用基于FreeBSD内核的软件模块化操作系统,支持CLI命令行和WEBUI两种接口配置方式,本文主要对CLI命令行方式进行配置说明。JUNOS CLI使用层次化配置结构,分为操作(operational)和配置(configure)两类模式,在操作模式下可对当前配置、设备运行状态、路由及会话表等状态进行查看及设备运维操作,并通过执行config或edit命令进入配置模式,在配置模式下可对各相关模块进行配置并能够执行操作模式下的所有命令(run)。在配置模式下JUNOS采用分层分级模块下配置结构

2、,如下图所示,edit命令进入下一级配置(类似unix cd命令),exit命令退回上一级,top命令回到根级。1.2 JunOS配置管理 JUNOS通过set语句进行配置,配置输入后并不会立即生效,而是作为候选配置(Candidate Config)等待管理员提交确认,管理员通过输入commit命令来提交配置,配置内容在通过SRX语法检查后才会生效,一旦commit通过后当前配置即成为有效配置(Active config)。另外,JUNOS允许执行commit命令时要求管理员对提交的配置进行两次确认,如执行commit confirmed 2命令要求管理员必须在输入此命令后2分钟内再次输入c

3、ommit以确认提交,否则2分钟后配置将自动回退,这样可以避免远程配置变更时管理员失去对SRX的远程连接风险。在执行commit命令前可通过配置模式下show命令查看当前候选配置(Candidate Config),在执行commit后配置模式下可通过run show config命令查看当前有效配置(Active config)。此外可通过执行show | compare比对候选配置和有效配置的差异。 SRX上由于配备大容量硬盘存储器,缺省按先后commit顺序自动保存50份有效配置,并可通过执行rolback和commit命令返回到以前配置(如rollback 0/commit可返回到前一

4、commit配置);也可以直接通过执行save configname.conf手动保存当前配置,并执行load override configname.conf / commit调用前期手动保存的配置。执行load factory-default / commit命令可恢复到出厂缺省配置。 SRX可对模块化配置进行功能关闭与激活,如执行deactivate security nat/comit命令可使NAT相关配置不生效,并可通过执行activate security nat/commit使NAT配置再次生效。 SRX通过set语句来配置防火墙,通过delete语句来删除配置,如delete

5、security nat和edit security nat / delete一样,均可删除security防火墙层级下所有NAT相关配置,删除配置和ScreenOS不同,配置过程中需加以留意。1.3 SRX主要配置内容 部署SRX防火墙主要有以下几个方面需要进行配置: System:主要是系统级内容配置,如主机名、管理员账号口令及权限、时钟时区、Syslog、SNMP、系统级开放的远程管理服务(如telnet)等内容。 Interface:接口相关配置内容。 Security: 是SRX防火墙的主要配置内容,安全相关部分内容全部在Security层级下完成配置,如NAT、Zone、Polic

6、y、Address-book、Ipsec、Screen、Idp等,可简单理解为ScreenOS防火墙安全相关内容都迁移至此配置层次下,除了Application自定义服务。 Application:自定义服务单独在此进行配置,配置内容与ScreenOS基本一致。 routing-options: 配置静态路由或router-id等系统全局路由属性配置。二、SRX防火墙配置对照说明 策略处理流程图2.1 初始安装 2.1.1 登陆 Console口(通用超级终端缺省配置)连接SRX,root用户登陆,密码为空 login: root Password: - JUNOS 9.5R1.8 built

7、 2009-07-16 15:04:30 UTC root% cli / /进入操作模式root root configure /进入配置模式 edit Root# 2.1.2 设置root用户口令 设置root用户口令 root# set system root-authentication plain-text-password root# new password : root123 root# retype new password: root123 editroot# set system login class super-user idle-timeout 3 设置当前用户超时时

8、间密码将以密文方式显示 root# show system root-authentication encrypted-password $1$xavDeUe6$fNM6olGU.8.M7B62u05D6.; # SECRET-DATA注意:强烈建议不要使用其它加密选项来加密root和其它user口令(如encrypted-password加密方式),此配置参数要求输入的口令应是经加密算法加密后的字符串,采用这种加密方式手工输入时存在密码无法通过验证风险。 2.1.3 设置远程登陆管理用户 root# set system login user lab class super-user aut

9、hentication plain-text-password /创建用户labroot# new password : lab123 /配置用户lab密码root# retype new password: lab123 注:此lab用户拥有超级管理员权限,可用于console和远程管理访问,另也可自行灵活定义其它不同管理权限用户。2.1.4 管理SRX相关配置rootshow system uptime /查看时间root#run set date YYYYMMDDhhmm.ss /设置系统时钟root#set system time-zone Asia/beijing /设置时区为北京r

10、oot#set system host-name SRX3400-A /设置主机名root#set system name-server 1.1.1.1 /设置DNS服务器root#set system ntp server 202.120.2.101 /设置NTP服务器rootshow ntp associations rootshow ntp status /查看NTProotshow security alg status /查看ALG状态ALG Status : DNS : Enabled FTP : Enabled H323 : Enabled MGCP : Enabled MSRP

11、C : Enabled PPTP : Enabled RSH : Enabled RTSP : Enabled SCCP : Enabled SIP : Enabled SQL : Enabled SUNRPC : Enabled TALK : Enabled TFTP : Enabled IKE-ESP : Disabledroot#set system services ftp root#set system services telnet root#set system services web-management http /在系统级开启ftp/telnet/http远程接入管理服务

12、rootrequest system reboot /重启系统rootrequest system power-off / 关闭系统rootshow version /查看版本信息Model: srx210bJUNOS Software Release 10.4R5.5rootshow system uptime /查看系统启动时间 Current time: 2011-08-11 05:09:15 UTCSystem booted: 2011-08-11 01:12:48 UTC (03:56:27 ago)Protocols started: 2011-08-11 01:15:28 UTC

13、 (03:53:47 ago)Last configured: 2011-08-11 03:11:08 UTC (01:58:07 ago) by root 5:09AM up 3:56, 1 user, load averages: 0.01, 0.02, 0.00rootShow chassis haredware /查看硬件板卡及序列号 Hardware inventory:Item Version Part number Serial number DescriptionChassis AC5210AA0079 SRX210bRouting Engine REV 40 750-0217

14、78 AACN5249 RE-SRX210BFPC 0 FPC PIC 0 2x GE, 6x FE, 1x 3GPower Supply 0root show chassis environment /查看硬件板卡当前状态 Class Item Status MeasurementTemp Routing Engine OK 52 degrees C / 125 degrees F Routing Engine CPU Absent Fans SRX210 Chassis fan OK Spinning at normal speedPower Power Supply 0 OK roots

15、how chassis routing-engine /查看主控板(RE)资源使用及状态Routing Engine status: Temperature 52 degrees C / 125 degrees F Total memory 512 MB Max 415 MB used ( 81 percent) Control plane memory 336 MB Max 306 MB used ( 91 percent) Data plane memory 176 MB Max 107 MB used ( 61 percent) CPU utilization: User 4 perce

16、nt Background 0 percent Kernel 5 percent Interrupt 0 percent Idle 91 percent Model RE-SRX210B Serial ID AACN5249 Start time 2011-08-11 01:12:47 UTC Uptime 4 hours, 17 minutes, 57 seconds Last reboot reason 0x200:chassis control reset Load averages: 1 minute 5 minute 15 minute 0.09 0.05 0.01rootshow

17、system license /查看授权License usage: Licenses Licenses Licenses Expiry Feature name used installed needed ax411-wlan-ap 0 2 0 permanentrootshow system processes extensive /查看系统利用率last pid: 1968; load averages: 0.01, 0.03, 0.00 up 0+04:20:28 05:32:46111 processes: 17 running, 83 sleeping, 11 waitingMem

18、: 120M Active, 87M Inact, 231M Wired, 30M Cache, 61M Buf, 1356K FreeSwap:PID USERNAME THR PRI NICE SIZE RES STATE C TIME WCPU COMMAND 1097 root 4 76 0 194M 34836K select 0 298:05 98.44% flowd_octeon 22 root 1 171 52 0K 16K RUN 0 203:47 84.96% idle: cpu0 24 root 1 -20 -139 0K 16K RUN 0 5:42 0.00% swi

19、7: clock 21 root 1 171 52 0K 16K RUN 1 2:21 0.00% idle: cpu1 5 root 1 -84 0 0K 16K rtfifo 0 1:02 0.00% rtfifo_kern_recv 1109 root 1 76 0 9724K 3796K select 0 0:46 0.00% rtlogd 868 root 1 76 0 7004K 2588K select 0 0:37 0.00% eventd 52 root 1 -8 0 0K 16K mdwait 0 0:34 0.00% md0 1085 root 1 76 0 16984K

20、 10676K select 0 0:29 0.00% snmpd 1088 root 1 76 0 14288K 4788K select 0 0:23 0.00% l2ald 1090 root 2 76 0 20124K 6476K select 0 0:22 0.00% pfed 1115 root 1 76 0 4180K 1104K select 0 0:19 0.00% license-check 1087 root 1 4 0 39620K 20172K kqread 0 0:15 0.00% rpd 23 root 1 -40 -159 0K 16K WAIT 0 0:15

21、0.00% swi2: net-(more 39%)-rootmonitor interface ge-0/0/0 /动态统计接口数据包转发信息Interface: ge-0/0/0.0, Enabled, Link is UpFlags: SNMP-TrapsEncapsulation: ENET2Local statistics: Current delta Input bytes: 2986416 4121 Output bytes: 47303 90 Input packets: 47631 64 Output packets: 969 1Remote statistics: Inpu

22、t bytes: 94404820 (1896 bps) 6685 Output bytes: 9553700 (952 bps) 2078 Input packets: 111689 (4 pps) 50 Output packets: 59369 (2 pps) 29Traffic statistics: Input bytes: 97391236 Output bytes: , 10806 Next=n, Quit=q or ESC, Freeze=f, Thaw=t, Clear=c, Interface=irootmonitor traffic interface ge-0/0/0

23、/ 动态报文抓取verbose output suppressed, use or for full protocol decodeAddress resolution is ON. Use to avoid any reverse lookup delay.Address resolution timeout is 4s.Listening on ge-0/0/0.0, capture size 96 bytesReverse lookup for 172.56.1.23 failed (check DNS reachability).Other reverse lookup failure

24、s will not be reported.Use to avoid reverse lookups on IP addresses.05:41:02.773631 In arp who-has 172.56.1.23 tell 172.56.1.2405:41:02.783007 In arp who-has 172.56.1.21 tell 172.56.1.2405:41:02.787524 In arp who-has 172.56.6.135 tell 172.56.7.305:41:02.884849 In IPX 00000000.00:13:8f:74:bc:19.0455

25、00000000.ff:ff:ff:ff:ff:ff.0455: ipx-netbios 5005:41:03.437039 In arp who-has 172.56.7.41 tell 172.56.1.2405:41:03.509837 Out IP truncated-ip - 10 bytes missing! 172.56.3.34.55730 .domain: 51866+|domain05:41:03.568547 In STP 802.1d, Config, Flags none, bridge-id 8000.00:06:53:48:8a:80.8010, length 4

26、305:41:03.678096 In IPX 00000000.00:13:8f:74:bc:19.0455 00000000.ff:ff:ff:ff:ff:ff.0455: ipx-netbios 502.1.5 接口的初始化接口说明:root% cli /进入操作模式root root show interfaces /查看接口状态调整输出详细程度rootshow intefaces terserootshow interfaces briefrootshow interfaces detailrootshow interfaces extensive /由上到下查看接口的信息越来越详细

27、rootshow interfaces detail | match fe-0/0/0 /使用管道符匹配特定关键字roothelp reference security policy-security /查看配置参考信息root help apropos security /帮助搜索关键字相关的操作命令root configure /进入配置模式 edit root# root# show interfaces /查看接口配置状态为接口配置IP地址的两种方法:set配置:root#set interfaces ge-0/0/0.0 family inet address 1.1.1.1/24

28、/为接口配置IP地址root#show interfaces ge-0/0/0.0 family inet /查看接口配置address 1.1.1.1./24edit 配置直接指定到某个层级:edit root#edit interfaces ge-0/0/0.0 family inet /在该层级下为接口配置 edit interfaces ge-0/0/0.0 family inetroot#set address 1.1.1.1/24 /配置IP地址edit interfaces ge-0/0/0.0 family inetroot#up /返回上一级,一层一层的退出(也可以使用exi

29、t和top退出到edit)edit interfacesRoot#showroot # set system syslog file monitor-log any any /创建名字为monitor-log的日志 root # set system syslog file monitor-log match 172.56.3.34 /监控接口root # run monitor start monitor-log /开始监控root #run monitor stop /停止监控删除配置:root#delete interfaces ge-0/0/0.0 /普通删除配置命令root#wild

30、card delete interfaces fe-0* /通配符匹配删除配置命令matched:fe-0/0/0matched:fe-0/0/1 matched:fe-0/0/2matched:fe-0/0/3matched:fe-0/0/4matched:fe-0/0/5matched:fe-0/0/6matched:fe-0/0/7delete 8 objecgts?yes,no(no)yes配置address-book (address-book就是为地址命名,以便调用)editroot# edit security zones security-zone outside / 配置ou

31、tside区域address-bookedit security zones security-zone outsideroot# set address-book address out-address 172.56.3.0/16 /把接口IP放入地址薄out-addressedit security zones security-zone outsideroot# up edit security zonesroot#edit security-zone inside /配置inside区域address-bookedit security zones security-zone insi

32、deroot# set address-book address in-address 10.1.1.0/24 /把接口IP放入地址薄in -addressedit security zones security-zone insideroot# exit edit security zonesroot# exit配置applicationeditroot# edit applications application tcp-1752 /定义服务名字edit applications application tcp-1752root# set protocol tcp source-port

33、1752 destination-port 1752 /定义协议及端口号editroot# show applications application tcp-1752 protocol tcp; source-port 1752; destination-port 1752;配置application-seteditroot# set applications application-set web-mgt application junos-ssh /配置应用服务集web-mgteditroot# set applications application-set web-mgt appli

34、cation junos-pingeditroot# set applications application-set web-mgt application junos- pc-anywhereeditroot# set applications application-set web-mgt application junos-httpeditroot# set applications application-set web-mgt application junos-ftproot# show applications /查看applicationsapplication-set we

35、b-mgt application junos-ssh; application junos-ping; application junos-pc-anywhere; application junos-http; application junos-ftp; 替换配置:root#set interfaces ge-0/0/0.0 family inet address 1.1.1.1/24 root# show interfaces ge-0/0/0ge-0/0/0 unit 0 family inet address 1.1.1.1/24root#replace pattern ge-0/

36、0/0 with ge-0/0/1 /一个接口取代另一个接口的配置root# show interfaces ge-0/0/1ge-0/0/1 unit 0 family inet address 1.1.1.1/24复制配置:root#set interfaces ge-0/0/0.0 family Ethernet-swithing vlanroot#copy interfaces ge-0/0/0.0 to ge-0/0/1.0 /复制接口配置配置模式下的showroot#show /查看配置root#show | display set / 查看set格式的配置set version

37、10.4R5.5set system time-zone asia/beijingset system root-authentication encrypted-password $1$XyydlG84$f46l82dR8C/JHUvzFuq9o.set system name-server 202.96.134.133set system login user lab uid 2002set system login user lab class super-userset system login user lab authentication encrypted-password $1

38、$Y0X8gbap$GZNvirOuGhW.4ZAq4xwHF.set system services sshset system services telnetset system services web-management http interface vlan.0set system services web-management http interface ge-0/0/1.0set system services web-management http interface vlan.3set system services web-management http interface ge-0/0/0.0set system services web-management http interface fe-0/0/4.0set system services web-management https system-generated-certificateset system services web-management https interface vlan.0set system se

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 网络科技 > 计算机原理

本站链接:文库   一言   我酷   合作


客服QQ:2549714901微博号:道客多多官方知乎号:道客多多

经营许可证编号: 粤ICP备2021046453号世界地图

道客多多©版权所有2020-2025营业执照举报