允许从外部发起的连接

允许从外部发起的连接

我有一台旧的 Juniper SSG5,运行的是 ScreenOS 5.4.0r6.0。它每天会随机丢包一次,频率约为 5-10%。我们目前通过简单地重启设备解决了这个问题,之后它又恢复了正常工作。

由于此错误已开始随机出现,且没有任何配置或硬件更改,我假设我的一个老化单元即将发生故障。因此,我有一个运行 ScreenOS 6.0 的替换 SSG5。我已将 5.4 上的配置转储并将其导入到干净的 6.0 中,它似乎很乐意接受它,并且我的所有配置似乎都很好。

但是,连接新设备后,所有外部发起的连接似乎都被阻止了。如果我从内部浏览我们的外部 IP,一切都会正常运作,不仅仅是端口 80、SSH、Crashplan - 我们所有的策略都能正确路由。从内部发起的所有正常网络也都能正常运作。另一方面,如果我从外部浏览我们的外部 IP,一切都会被阻止。除了 ScreenOS 5.4 和 6.0 之间的差异外,配置是相同的。

是否有某个设置可以定义是否允许外部/内部发起的连接?

unset key protection enable
set clock timezone 1
set vrouter trust-vr sharable
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
unset auto-route-export
exit
set service "MyVOIP_UDP4569" protocol udp src-port 0-65535 dst-port 4569-4569 
set service "MyVOIP_TCP22" protocol tcp src-port 0-65535 dst-port 22-22 
set service "MyRDP" protocol tcp src-port 0-65535 dst-port 3389-3389 
set service "MyRsync" protocol tcp src-port 0-65535 dst-port 873-873 
set service "NZ_FTP" protocol tcp src-port 0-65535 dst-port 40000-41000 
set service "NZ_FTP" + tcp src-port 0-65535 dst-port 21-21 
set service "PPTP-VPN" protocol 47 src-port 2048-2048 dst-port 2048-2048 
set service "PPTP-VPN" + tcp src-port 1024-65535 dst-port 1723-1723 
set service "NZ_FMS_1935" protocol tcp src-port 0-65535 dst-port 1935-1935 
set service "NZ_FMS_1935" + udp src-port 0-65535 dst-port 1935-1935 
set service "NZ_FMS_8080" protocol tcp src-port 0-65535 dst-port 8080-8080 
set service "CrashPlan Server" protocol tcp src-port 0-65535 dst-port 4280-4280 
set service "CrashPlan Console" protocol tcp src-port 0-65535 dst-port 4282-4282 
unset alg sip enable
set alg appleichat enable
unset alg appleichat re-assembly enable
set alg sctp enable
set auth-server "Local" id 0
set auth-server "Local" server-name "Local"
set auth default auth server "Local"
set auth radius accounting port 1646
set admin name "netscreen"
set admin password "XXX"
set admin auth web timeout 10
set admin auth dial-in timeout 3
set admin auth server "Local"
set admin format dos
set vip multi-port
set zone "Trust" vrouter "trust-vr"
set zone "Untrust" vrouter "trust-vr"
set zone "DMZ" vrouter "trust-vr"
set zone "VLAN" vrouter "trust-vr"
set zone "Untrust-Tun" vrouter "trust-vr"
set zone "Trust" tcp-rst 
set zone "Untrust" block 
unset zone "Untrust" tcp-rst 
set zone "MGT" block 
unset zone "V1-Trust" tcp-rst 
unset zone "V1-Untrust" tcp-rst 
set zone "DMZ" tcp-rst 
unset zone "V1-DMZ" tcp-rst 
unset zone "VLAN" tcp-rst 
set zone "Untrust" screen tear-drop
set zone "Untrust" screen syn-flood
set zone "Untrust" screen ping-death
set zone "Untrust" screen ip-filter-src
set zone "Untrust" screen land
set zone "V1-Untrust" screen tear-drop
set zone "V1-Untrust" screen syn-flood
set zone "V1-Untrust" screen ping-death
set zone "V1-Untrust" screen ip-filter-src
set zone "V1-Untrust" screen land
set interface ethernet0/0 phy full 100mb
set interface ethernet0/3 phy full 100mb
set interface ethernet0/4 phy full 100mb
set interface ethernet0/5 phy full 100mb
set interface ethernet0/6 phy full 100mb
set interface "ethernet0/0" zone "Untrust"
set interface "ethernet0/1" zone "Null"
set interface "bgroup0" zone "Trust"
set interface "bgroup1" zone "Trust"
set interface "bgroup2" zone "Trust"
set interface bgroup2 port ethernet0/2
set interface bgroup0 port ethernet0/3
set interface bgroup0 port ethernet0/4
set interface bgroup1 port ethernet0/5
set interface bgroup1 port ethernet0/6
unset interface vlan1 ip
set interface ethernet0/0 ip 215.173.182.18/29
set interface ethernet0/0 route
set interface bgroup0 ip 192.168.1.1/24
set interface bgroup0 nat
set interface bgroup1 ip 192.168.2.1/24
set interface bgroup1 nat
set interface bgroup2 ip 192.168.3.1/24
set interface bgroup2 nat
set interface ethernet0/0 gateway 215.173.182.17
unset interface vlan1 bypass-others-ipsec
unset interface vlan1 bypass-non-ip
set interface ethernet0/0 ip manageable
set interface bgroup0 ip manageable
set interface bgroup1 ip manageable
set interface bgroup2 ip manageable
set interface bgroup0 manage mtrace
unset interface bgroup1 manage ssh
unset interface bgroup1 manage telnet
unset interface bgroup1 manage snmp
unset interface bgroup1 manage ssl
unset interface bgroup1 manage web
unset interface bgroup2 manage ssh
unset interface bgroup2 manage telnet
unset interface bgroup2 manage snmp
unset interface bgroup2 manage ssl
unset interface bgroup2 manage web
set interface ethernet0/0 vip 215.173.182.19 2048 "PPTP-VPN" 192.168.1.131
set interface ethernet0/0 vip 215.173.182.19 + 4280 "CrashPlan Server" 192.168.1.131
set interface ethernet0/0 vip 215.173.182.19 + 4282 "CrashPlan Console" 192.168.1.131
set interface ethernet0/0 vip 215.173.182.22 22 "MyVOIP_TCP22" 192.168.2.127
set interface ethernet0/0 vip 215.173.182.22 + 4569 "MyVOIP_UDP4569" 192.168.2.127
set interface ethernet0/0 vip 215.173.182.22 + 3389 "MyRDP" 192.168.2.202
set interface ethernet0/0 vip 215.173.182.22 + 873 "MyRsync" 192.168.2.201
set interface ethernet0/0 vip 215.173.182.22 + 80 "HTTP" 192.168.2.202
set interface ethernet0/0 vip 215.173.182.22 + 2048 "PPTP-VPN" 192.168.2.201
set interface ethernet0/0 vip 215.173.182.22 + 8080 "NZ_FMS_8080" 192.168.2.216
set interface ethernet0/0 vip 215.173.182.22 + 1935 "NZ_FMS_1935" 192.168.2.216
set interface bgroup0 dhcp server service
set interface bgroup1 dhcp server service
set interface bgroup2 dhcp server service
set interface bgroup0 dhcp server auto
set interface bgroup1 dhcp server auto
set interface bgroup2 dhcp server auto
set interface bgroup0 dhcp server option domainname companyalan 
set interface bgroup0 dhcp server option dns1 192.168.1.131 
set interface bgroup1 dhcp server option domainname companyblan 
set interface bgroup1 dhcp server option dns1 192.168.2.202 
set interface bgroup2 dhcp server option dns1 8.8.8.8 
set interface bgroup2 dhcp server option wins1 8.8.4.4 
set interface bgroup0 dhcp server ip 192.168.1.2 to 192.168.1.116 
set interface bgroup1 dhcp server ip 192.168.2.2 to 192.168.2.116 
set interface bgroup2 dhcp server ip 192.168.3.2 to 192.168.3.126 
unset interface bgroup0 dhcp server config next-server-ip
unset interface bgroup1 dhcp server config next-server-ip
unset interface bgroup2 dhcp server config next-server-ip
set interface "ethernet0/0" mip 215.173.182.21 host 192.168.2.202 netmask 255.255.255.255 vr "trust-vr"
set interface "serial0/0" modem settings "USR" init "AT&F"
set interface "serial0/0" modem settings "USR" active
set interface "serial0/0" modem speed 115200
set interface "serial0/0" modem retry 3
set interface "serial0/0" modem interval 10
set interface "serial0/0" modem idle-time 10
set flow tcp-mss
unset flow tcp-syn-check
unset flow tcp-syn-bit-check
set flow reverse-route clear-text prefer
set flow reverse-route tunnel always
set pki authority default scep mode "auto"
set pki x509 default cert-path partial
set pki x509 dn name "[email protected]"
set dns host dns1 0.0.0.0
set dns host dns2 0.0.0.0
set dns host dns3 0.0.0.0
set address "Trust" "192.168.1.0/24" 192.168.1.0 255.255.255.0
set address "Trust" "192.168.2.0/24" 192.168.2.0 255.255.255.0
set address "Trust" "192.168.3.0/24" 192.168.3.0 255.255.255.0
set crypto-policy
exit
set ike respond-bad-spi 1
set ike ikev2 ike-sa-soft-lifetime 60
unset ike ikeid-enumeration
unset ike dos-protection
unset ipsec access-session enable
set ipsec access-session maximum 5000
set ipsec access-session upper-threshold 0
set ipsec access-session lower-threshold 0
set ipsec access-session dead-p2-sa-timeout 0
unset ipsec access-session log-error
unset ipsec access-session info-exch-connected
unset ipsec access-session use-error-log
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
exit
set l2tp default ppp-auth chap
set url protocol websense
exit
set policy id 1 from "Trust" to "Untrust"  "Any" "Any" "ANY" permit 
set policy id 1
exit
set policy id 2 from "Untrust" to "Trust"  "Any" "VIP(215.173.182.19)" "PPTP-VPN" permit traffic
set policy id 2
exit
set policy id 3 from "Untrust" to "Trust"  "Any" "VIP(215.173.182.22)" "HTTP" permit log 
set policy id 3
set service "MyRDP"
set service "MyRsync"
set service "MyVOIP_TCP22"
set service "MyVOIP_UDP4569"
exit
set policy id 6 from "Trust" to "Trust"  "192.168.1.0/24" "192.168.2.0/24" "ANY" deny 
set policy id 6
exit
set policy id 7 from "Trust" to "Trust"  "192.168.2.0/24" "192.168.1.0/24" "ANY" deny 
set policy id 7
exit
set policy id 8 from "Trust" to "Trust"  "192.168.3.0/24" "192.168.1.0/24" "ANY" deny 
set policy id 8
exit
set policy id 9 from "Trust" to "Trust"  "192.168.3.0/24" "192.168.2.0/24" "ANY" deny 
set policy id 9
exit
set policy id 10 from "Untrust" to "Trust"  "Any" "MIP(215.173.182.21)" "NZ_FTP" permit 
set policy id 10
exit
set policy id 11 from "Untrust" to "Trust"  "Any" "VIP(215.173.182.22)" "PPTP-VPN" permit 
set policy id 11
exit
set policy id 12 from "Untrust" to "Trust"  "Any" "VIP(215.173.182.22)" "NZ_FMS_1935" permit 
set policy id 12
set service "NZ_FMS_8080"
exit
set policy id 13 from "Untrust" to "Trust"  "Any" "VIP(215.173.182.19)" "CrashPlan Console" permit 
set policy id 13
set service "CrashPlan Server"
exit
set nsmgmt bulkcli reboot-timeout 60
set ssh version v2
set config lock timeout 5
unset license-key auto-update
set telnet client enable
set snmp port listen 161
set snmp port trap 162
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
unset add-default-route
exit
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
exit

请注意,我之前发布过类似的问题(涉及相同的设备和替换,但最终由开关故障引起,从而掩盖了当前的问题): MIP/VIPped 服务器的出站流量被阻止 (Juniper SSG5)

相关内容