View difference between Paste ID: bjnMbdyf and M9fKLnNJ
SHOW: | | - or go back to the newest paste.
1
#Delete the entire configuration (not factory default, wipe config)
2
delete
3
4
#Copy/Paste Configuration
5
load override terminal - http://kb.juniper.net/InfoCenter/index?page=content&id=KB16622
6
7
#Software Installation/Upgrade (firmware)
8
http://kb.juniper.net/InfoCenter/index?page=content&id=KB16652
9
10
#Save (commit) changes
11
commit
12
13
#Check that commit will work and is not missing any necessary statements (this does not mean that it will work for getting online)
14
commit check
15
16
#Have commit rollback in x (5 minutes) if another commit is not performed, x can be any number
17
commit confirmed 5
18
19
#Set hostname on device
20
set system host-name
21
22
#Set root password
23
set system root-authentication plain-text-password
24
25
#Create a new admin user ([name] in most cases will or should be admin)
26
set system login user [name] class super-user authentication plain-text-password
27
28
#Set IP on fe0/0/0 [check x.x.x.x/x against their current firewall, if its one IP most likely /24 actually but the subnet tends to be 255.255.255.0 on current firewalls]
29
set interfaces fe-0/0/0 unit 0 family inet address x.x.x.x/x [probably /24 unless its a /29 or /30]
30
31
#Set IP on VLAN (internal/trusted network - check x.x.x.x/x against their current firewall) (MAKE SURE that you delete the default vlan network off if you add one as well)
32
set interfaces vlan unit 0 family inet address x.x.x.x/x
33
34
#Set default gateway [check x.x.x.x against what the current firewall gateway is set to]
35
set routing-options static route 0.0.0.0/0 next-hop x.x.x.x
36
37
#Delete DHCP (ONLY IF DHCP IS NOT BEING DONE BY PREVIOUS/CURRENT FIREWALL)
38
delete system services dhcp
39
40
#Save Rescue Config (eliminates orange alarm light as well, to be ran when finished with config and you don't run it from configure mode)
41
request system configuration rescue save
42
43
#Application for Firewall rules (example for tcp636 application, the tcp636 portion is the name that is created for the application below)
44
set applications application tcp636 protocol tcp
45
set applications application tcp636 destination-port 636
46
47
set applications application tcp3389 protocol tcp
48
set applications application tcp3389 destination-port 3389
49
50
#Firewall rules - Incoming/Inbound (the NAT portion) (keep source 0.0.0.0/0 and then lockdown in security policy portion) (pool name for example is name of server and address is /32 of 
51
52
server for that one address) (destination-address is always going to be a /32 even if the external wan interface is a /29 for example, take what that single IP is listed and put it as 
53
54
a /32 unless otherwise noted)
55
set security nat destination pool [poolname] address x.x.x.x/x
56
set security nat destination rule-set inbound-nat rule from zone untrust
57
58
set security nat destination rule-set inbound-nat rule [namehere] match source-address 0.0.0.0/0
59
set security nat destination rule-set inbound-nat rule [namehere] match destination-address x.x.x.x/32
60
set security nat destination rule-set inbound-nat rule [namehere] match destination-port xx
61
set security nat destination rule-set inbound-nat rule [namehere] then destination-nat pool [poolname]
62
63
#Firewall rules - Security Policies Incoming/Inbound (the opening and lockdown portion)
64
set security policies from-zone untrust to-zone trust policy xxxx-in[ex http-in] match source-address any
65
set security policies from-zone untrust to-zone trust policy xxxx-in[ex http-in] match destination-address [trusted address-book address, going from source to this trusted address]
66
set security policies from-zone untrust to-zone trust policy xxxx-in[ex http-in] match application junos-xxx
67
set security policies from-zone untrust to-zone trust policy xxxx-in[ex http-in] then permit
68
69
#Firewall rules - Outgoing/Outbound (rules other than the default listed aren't on every firewall, default posted)
70
set security policies from-zone trust to-zone untrust policy trust-to-untrust match source-address any
71
set security policies from-zone trust to-zone untrust policy trust-to-untrust match destination-address any
72
set security policies from-zone trust to-zone untrust policy trust-to-untrust match application any
73
set security policies from-zone trust to-zone untrust policy trust-to-untrust then permit
74
75
#Create an Address (this is an example of a trusted/internal computer or server)
76
set security zones security-zone trust address-book address trust-net 10.1.1.0/24
77
set security zones security-zone trust address-book address Bob-PC 10.1.1.1/32
78
79
#Create an Address Set (Groups) (this is an example of trusted/internal computers or servers clusters or groups)
80
set security zones security-zone trust address-book address-set All10 address trust-net
81
set security zones security-zone trust address-book address-set All10 address Bob-PC
82
83
#Create an Address (this is an example of a untrusted/external computer or server)
84
set security zones security-zone untrust address-book address example1 x.x.x.x/32
85
set security zones security-zone untrust address-book address example2 x.x.x.x/32
86
87
#Create an Address Set (Groups) (this is an example of untrusted/external computers or servers like example3 [example1/example2]) (NEEDS ADDRESS ABOVE MADE)
88
set security zones security-zone untrust address-book address-set example3 address example1
89
set security zones security-zone untrust address-book address-set example3 address example2
90
91
#Bridge Interfaces (cleans up config, fyi will need to run "delete interfaces f0/0/X" after this to truly clean them up)
92
set interfaces interface-range interfaces-trust member fe-0/0/1
93
set interfaces interface-range interfaces-trust member fe-0/0/2
94
set interfaces interface-range interfaces-trust member fe-0/0/3
95
set interfaces interface-range interfaces-trust member fe-0/0/4
96
set interfaces interface-range interfaces-trust member fe-0/0/5
97
set interfaces interface-range interfaces-trust member fe-0/0/6
98
set interfaces interface-range interfaces-trust member fe-0/0/7
99
set interfaces interface-range interfaces-trust unit 0 family ethernet-switching vlan members vlan-trust
100
101
#For Pulse IPsec VPN (aka mobile user vpn) make sure IKE is running on external interface
102
set security zones security-zone untrust interfaces fe-0/0/0.0 host-inbound-traffic system-services ike
103
104
#Download Junos Pulse Client - or check ftp under Juniper
105
http://www.juniper.net/support/products/pulse/2.1/#sw
106
107
#Show MAC address table (do this from the enable line not configure)
108
show ethernet-switching table brief
109
110
#Remote Management Lockdown (should be cookie cutter) (make sure you add internal lan subnet as well)
111
set system services web-management https interface fe-0/0/0.0
112
set security zones security-zone untrust interfaces fe-0/0/0.0 host-inbound-traffic system-services ssh
113
set security zones security-zone untrust interfaces fe-0/0/0.0 host-inbound-traffic system-services https
114
set system services ssh rate-limit 3
115
set system services ssh root-login deny
116
117
set firewall family inet filter local_acl term remote_mgmt from address X.X.X.X/24 (THIS IS THE NETWORK YOU ARE GOING TO ALLOW ADD AS MANY AS NECESSARY)
118
set firewall family inet filter local_acl term remote_mgmt from protocol tcp
119
set firewall family inet filter local_acl term remote_mgmt from port ssh
120
set firewall family inet filter local_acl term remote_mgmt from port https
121
set firewall family inet filter local_acl term remote_mgmt then accept
122
set firewall family inet filter local_acl term remote_mgmt_denied from protocol tcp
123
set firewall family inet filter local_acl term remote_mgmt_denied from port ssh
124
set firewall family inet filter local_acl term remote_mgmt_denied from port https
125
set firewall family inet filter local_acl term remote_mgmt_denied then log
126
set firewall family inet filter local_acl term remote_mgmt_denied then discard
127
128
set firewall family inet filter local_acl term default-term then accept
129
set interfaces lo0 unit 0 family inet filter input local_acl
130
set interfaces lo0 unit 0 family inet address 127.0.0.1/32
131
132
#If you do an IKE VPN you'll need to make these changes
133
delete firewall family inet filter local_acl term remote_mgmt from port https
134
delete firewall family inet filter local_acl term remote_mgmt_denied from port https
135
136
#Resource cleanup
137
delete security zones security-zone untrust interfaces fe-0/0/0.0 host-inbound-traffic system-services dhcp
138
delete security zones security-zone untrust interfaces fe-0/0/0.0 host-inbound-traffic system-services tftp
139
set security zones security-zone untrust interfaces fe-0/0/0.0 host-inbound-traffic system-services ping
140
141
#Further lockdown and security cleanup (remove the ability to connect to https externally also to not interfere with SSL VPN)
142
delete system services web-management https interface fe-0/0/0.0
143
144
#Set inactivity-timeout
145
set applications application junos-[xxxx] inactivity-timeout [seconds]