8/6/2019 Netscreen Ce VPN
1/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
1HW6FUHHQ &RQFHSW ([DPSOHV
6FUHHQ26 5HIHUHQFH *XLGH
9HUVLRQ
3 1
5HY %
8/6/2019 Netscreen Ce VPN
2/569
http://www.netscreen.com/8/6/2019 Netscreen Ce VPN
3/569
8/6/2019 Netscreen Ce VPN
4/569
1HW6FUHHQ &RQFHSWV ([DPSOHV LY
the exclusions and limitations of incidental, consequential orspecial damages, so the above exclusions and limitations may notapply to you.
8. Export Law Assurance. You understand that the Software issubject to export control laws and regulations. YOU MAY NOTDOWNLOAD OR OTHERWISE EXPORT OR RE-EXPORT THESOFTWARE OR ANY UNDERLYING INFORMATION ORTECHNOLOGY EXCEPT IN FULL COMPLIANCE WITH ALL UNITEDSTATES AND OTHER APPLICABLE LAWS AND REGULATIONS.
9. U.S. Government Restricted Rights. If this Product is beingacquired by the U.S. Government, the Product and related
documentation is commercial computer Product anddocumentation developed exclusively at private expense, and (a) ifacquired by or on behalf of civilian agency, shall be subject to theterms of this computer Software, and (b) if acquired by or onbehalf of units of the Department of Defense (DoD) shall besubject to terms of this commercial computer Software licenseSupplement and its successors.
10. Tax Liability. You agree to be responsible for the payment ofany sales or use taxes imposed at any time whatsoever on thistransaction.
11. General. If any provisions of this Agreement are held invalid,the remainder shall continue in full force and effect. The laws ofthe State of California, excluding the application of its conflicts oflaw rules shall govern this License Agreement. This Agreementwill not be governed by the United Nations Convention on theContracts for the International Sale of Goods. This Agreement isthe entire agreement between the parties as to the subject matterhereof and supersedes any other Technologies, advertisements,or understandings with respect to the Software anddocumentation. This Agreement may not be modified or altered,except by written amendment, which expressly refers to thisAgreement and which, is duly executed by both parties.
You acknowledge that you have read this Agreement, understandit, and agree to be bound by its terms and conditions.
8/6/2019 Netscreen Ce VPN
5/569
8/6/2019 Netscreen Ce VPN
6/569
8/6/2019 Netscreen Ce VPN
7/569
8/6/2019 Netscreen Ce VPN
8/569
8/6/2019 Netscreen Ce VPN
9/569
8/6/2019 Netscreen Ce VPN
10/569
8/6/2019 Netscreen Ce VPN
11/569
8/6/2019 Netscreen Ce VPN
12/569
&RQWHQWV
1HW6FUHHQ &RQFHSWV ([DPSOHV [LL
QHWVFUHHQ6FKHGXOH 9 QHWVFUHHQ5HVRXUFH 9
QHWVFUHHQ,S 9
$SSHQGL[ % *ORVVDU\
,QGH[
8/6/2019 Netscreen Ce VPN
13/569
1HW6FUHHQ &RQFHSWV ([DPSOHV [LLL
3UHIDFH
NetScreen devices are ASIC-based, ICSA-certified 1 Internet security appliances that integrate firewall, virtual privatenetworking (VPN), and traffic-shaping features to provide complete protection of your local area network (LAN)when connecting to the Internet.
Firewall: A firewall screens traffic crossing the boundary between a private LAN and the public network,such as the Internet.
VPN: A VPN provides a secure communications channel between two or more remote network appliances. Traffic Shaping: Traffic shaping functionality allows administrative monitoring and control of traffic passing
across the NetScreen firewall to maintain a networks quality-of-service (QoS) level.
1. The Internet Computer Security Association (ICSA) is an organization focused on all types of network security for Internet-connected companies. Among itsmany functions, ICSA provides product certification for several kinds of security products such as virus protection, firewall, PKI, intrusion detection, IPSec,and cryptography. ICSA has certified all NetScreen products for firewall and IPSec.
Note: For information on NetScreen compliance with Federal Information Processing Standards (FIPS) and for instructions on setting a FIPS-compliant NetScreen device in FIPS mode, see the NetScreen-100 Cryptographic
Module Security Policy on the documentation CD-ROM .
8/6/2019 Netscreen Ce VPN
14/569
1HW6FUHHQ &RQFHSWV ([DPSOHV [LY
NetScreen ScreenOS version 3.0.0 is the operating system that provides all the features needed to set up andmanage any NetScreen security appliance or system. The NetScreen Concepts & Examples ScreenOS Reference Guide provides a useful reference guide for configuring and managing a NetScreen appliance through theScreenOS.
VPNs: Securecommunication tunnelsbetween sites for traffic
passing through the Internet
Firewall: Screening trafficbetween the protected LAN
and the Internet
LAN LAN
LAN
Traffic Shaping: Efficientprioritization of traffic as it
traverses the firewall
8/6/2019 Netscreen Ce VPN
15/569
1HW6FUHHQ 'RFXPHQWDWLRQ
1HW6FUHHQ &RQFHSWV ([DPSOHV [Y
1 (76&5((1 ' 2&80(17$7,21
In addition to the NetScreen Concepts & Examples ScreenOS Reference Guide guide , there are other technicalpublications available from NetScreen. These publications are as follows:
Whats New in ScreenOS 3.0.0?
This manual describes all new features in ScreenOS 3.0.0. In addition, it lists all commands that have been removedsince version 2.6.1 and all commands that have remained the same. It also presents full descriptions of all newcommands, and all commands that have undergone modification.
NetScreen WebUI Reference Guide This manual presents a brief introduction to the WebUI management application, with a glossary of importanttechnical terms, and general instructions on how to use the application.
NetScreen CLI Reference Guide
This manual provides descriptions of all command line interface (CLI) commands. Each command descriptionpresents the commands syntax and basic elements, including options, parameters, switches, and element
dependencies. The descriptions also provide practical examples of command execution.NetScreen-5XP Installers Guide, NetScreen-10 Installers Guide, NetScreen-25 Installers Guide, NetScreen-50 Installers Guide
These manuals provide instructions for connecting a NetScreen-5XP, -10, -25, and -50 device respectively to anetwork, and performing an initial configuration. The instructions explain how to set up the device in Transparent,NAT, or Route mode, how to configure an access policy permitting outbound traffic only, and how to change theadmins login name and password. Each manual also provides an overview of the hardware for each specificplatform.
8/6/2019 Netscreen Ce VPN
16/569
1HW6FUHHQ 'RFXPHQWDWLRQ
1HW6FUHHQ &RQFHSWV ([DPSOHV [YL
NetScreen-100 Installers Guide, NetScreen-204/208 Installers Guide, NetScreen-500 Installers Guide, and NetScreen-1000 Installers Guide
These manuals provide instructions for connecting a NetScreen-100, -204/208, -500, and -1000 device respectivelyto a network, and performing an initial configuration. The instructions explain how to set up the device inTransparent, NAT, or Route mode, how to configure an access policy permitting outbound traffic only, and how tochange the admins login name and password. The manual also provides an overview of the hardware, and cablingand configuration instructions for single appliances and redundant appliances using High Availability (HA).
NetScreen-Remote Administrators Guide
This manual provides instructions for installing and using the NetScreen-Remote client software, which allows aremote user to connect with a NetScreen security device through a virtual private network (VPN) tunnel.
NetScreen Message Log Reference Guide
This manual documents the log messages that appear in ScreenOS 3.0.0. Each log message entry includes themessage text, its meaning, and any recommended action to take upon receiving the message.
If you find any errors or omissions in the content of this or any other NetScreen manual, please contact us at the
e-mail address below:[email protected]
mailto:[email protected]:[email protected]8/6/2019 Netscreen Ce VPN
17/569
&RQFHSWV ([DPSOHV 0DQXDO 2UJDQL]DWLRQ
1HW6FUHHQ &RQFHSWV ([DPSOHV [YLL
&21&(376 (;$03/(6 0 $18$/ 25*$1,=$7,21
The following are summaries of each of the chapters in the NetScreen Concepts & Examples ScreenOS Reference Guide :
Chapter 1 , Universal Security Gateway Architecture presents the fundamental elements of USGAthearchitecture presented in ScreenOS 3.1.0and concludes with a four-part example illustrating an enterprise-basedconfiguration incorporating most of those elements. In this and all subsequent chapters, each concept isaccompanied by illustrative examples.
Chapter 2 , Zones explains security zones, tunnel zones, and function zones.
Chapter 3 , Interfaces describes the various physical, logical, and virtual interfaces on NetScreen devices, explainsthe concepts behind Transparent, Network Address Translation (NAT), and Route operational modes, and includesinformation on various firewall attacks and the attack blocking options that NetScreen provides.
Chapter 4 , System Parameters presents the concepts behind Domain Name System (DNS) addressing; usingDynamic Host Configuration Protocol (DHCP) to assign or relay TCP/IP settings; URL filtering; downloading anduploading system configurations and software; and setting the system clock.
Chapter 5 , Administration explains the different means available for managing a NetScreen device both locallyand remotely. This chapter also explains the privileges pertaining to each of the four levels of network administratorsthat can be defined. Finally, it explains how to secure local and remote administrative traffic.
Chapter 6 , Monitoring NetScreen Devices explains various monitoring methods and provides guidance ininterpreting monitoring output.
Chapter 7 , Virtual Routers presents the concept of a virtual router and explains how to configure the virtual routers
on the NetScreen device. It also contains information on routing table entries.Chapter 8 , Building Blocks for Access Policies and VPNs discusses the elements used for creating accesspolicies and virtual private networks (VPNs): addresses (including VIP addresses), users, and services. It alsopresents several example configurations support for the H.323 protocol.
Chapter 9 , Access Policies explores the components and functions of access policies and offers guidance on theircreation and application.
8/6/2019 Netscreen Ce VPN
18/569
&RQFHSWV ([DPSOHV 0DQXDO 2UJDQL]DWLRQ
1HW6FUHHQ &RQFHSWV ([DPSOHV [YLLL
Chapter 10 , IPSec provides background information bout IPSec, presents a flow sequence for Phase 1 in IKEnegotiations in Aggressive and Main modes, and concludes with information regarding NAT-Traversal.
Chapter 11 , Public Key Cryptography provides information on how to obtain and load digital certificates andcertificate revocation lists (CRLs).
Chapter 12 , Routing-Based VPNs provides extensive examples of routing-based VPN configurations, includinghub-and-spoke and back-to-back tunnel designs.
Chapter 13 , Policy-Based VPNs provides extensive examples of policy-based VPN configurations for LAN-to-LANand client-to-LAN communication using Manual Key and AutoKey IKE mechanisms. It also details how to make use
of tunnel interfaces to provide policy-based NAT to traffic flowing through VPN tunnels between sites that havetrusted networks with an overlapping address space.
Chapter 14 , L2TP explains the Layer 2 Tunneling Protocol (L2TP), its use alone and in conjunction with IPSec(L2TP-over-IPSec).
Chapter 15 , Policy-Based NAT explains how to provide NAT services for network traffic at the policy level.
Chapter 16 , Traffic Shaping explains how you can manage bandwidth at the interface and Access Policy levels
and prioritize services.Chapter 17 , Virtual Systems presents the concepts of virtual systems and virtual local area networks (VLANs),and explains how to set up virtual systems and create virtual system administrators.
Chapter 18 , High Availability explains how to cable, configure, and manage two or more NetScreen-100, -204/208,-500, or -1000 devices in a redundant group to provide high availability.
Appendix A , SNMP MIB Files lists and briefly describes the Management Information Base (MIB) files available for
MIB compilers.Appendix B , Glossary provides a reference for the terms and acronyms used in the Security and Firewall field.
8/6/2019 Netscreen Ce VPN
19/569
&RQYHQWLRQV
1HW6FUHHQ &RQFHSWV ([DPSOHV [L[
&219(17,216
This book presents two management methods for configuring a NetScreen device: the Web user interface (WebUI)and the command line interface (CLI). The conventions used for both are introduced below.
:HE8, 1DYLJDWLRQ &RQYHQWLRQVThroughout this book, a double chevron ( >> ) is used to indicate navigation through the WebUI by clicking buttons,tabs, and links.
([DPSOH 3ROLF\ !! ,QFRPLQJ !! 1HZ 3ROLF\To access the Policy Configuration dialog box to create an incoming Access Policy, do the following:
1. Click the Policy button in the menu column.2. Click the Incoming tab.3. Click the New Policy link.
The Policy Configuration dialog box appears.
&/, &RQYHQWLRQVThe CLI conventions are as follows:
A parameter inside [ ] (square brackets) is optional. A parameter inside { } (braces) is required. Anything inside < > is a variable. If there is more than one choice for a parameter inside [ ] and { }, they are separated by a pipe ( | ). For
example, [auth {md5 | sha-1}] means choose either MD5 or SHA-1 as your authentication method. IP addresses are represented by and . A subnet mask is represented by .
8/6/2019 Netscreen Ce VPN
20/569
&RQYHQWLRQV
1HW6FUHHQ &RQFHSWV ([DPSOHV [[
For example, when entering a route to the route table for the IP address 2.2.2.2/32 via the untrusted interface, usethe following syntax:
set route interface { trust | untrust | dmz | mgt | tunnel/ } [ gateway ] [ metric ]
to produce this command:
set route 2.2.2.2 255.255.255.255 interface untrust
Because the gateway IP address and the metric 2 are optionalthese arguments are presented within brackets [ ]you can omit them from the command. In this example, the gateway IP address would be that of a router on theuntrusted side through which you want to route traffic bound for 2.2.2.2/32. By not specifying a router, the defaultrouter for the untrusted interface is used .
If you want to see the options following part of a command, press the SPACE key and then type ? (question mark).
For example, typing set interface ? displays the following options: trust, untrust, dmz, mgt, ha1, ha2, tunnelwhichare the available options that you can enter after typing set interface .
2. The metric argument specifies the number of hops between the NetScreen-500 and the specified gateway. In this example, you do not specifya gateway; consequently, you do not specify a metric for it. However, even if you do specify a gateway, specifying a metric is optional.
Note: When typing a key word, you only have to type enough letters to identify the word uniquely. For example,typing set in t n is enough to enter the command set interface trust nat .
8/6/2019 Netscreen Ce VPN
21/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
8 u h r
8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUHNetScreen ScreenOS 3.1.0 introduces Universal Security Gateway Architecture (USGA), an architecture that offersgreat flexibility in designing the layout of your network security. On NetScreen devices with multiple interfaces, youcan create numerous security zones and configure access policies to regulate traffic between them. You can bindone or more interfaces to each zone and enable a unique set of management and firewall attack screening optionson a per-interface basis. Essentially, USGA allows you to create the number of zones your network environmentrequires, assign the number of interfaces each zone requires, and design each interface to your specifications.
This chapter presents an overview of USGA, covering the following key components:
Multiple Security Zones on page 2 Security Zone Interfaces on page 3 Virtual Routers on page 5 Access Policies on page 7 VPNs on page 8 Virtual Systems on page 10
Furthermore, to better understand the ScreenOS mechanism for processing traffic, you can see the flow sequencefor an incoming packet in Packet Flow Sequence on page 13 .
The chapter concludes with a four-part example that illustrates a basic configuration for a NetScreen device usingScreenOS 3.1.0 with USGA.
Example (Part 1): Enterprise with Six Zones on page 15 Example (Part 2): Interfaces for Six Zones on page 17 Example (Part 3): Enterprise with Two Routing Domains on page 22 Example (Part 4): Access Policies for an Enterprise with Six Zones on page 25
8/6/2019 Netscreen Ce VPN
22/569
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 0XOWLSOH 6HFXUL
1HW6FUHHQ &RQFHSWV ([DPSOHV
0 8/7,3/( 6(&85,7< =21(6A security zone is a collection of one 1 or more network segments requiring the regulation of inbound and outboundtraffic via access policies. You can define multiple security zones, the exact number of which you determine basedon your network needs. In addition to user-defined zones, you can also use the three predefined zones: trust,untrust, and DMZ. In fact, if you upgrade from an earlier version of ScreenOS, all your configurations for the trust,untrust, and DMZ zones remain intact. If you like, you can continue using just the predefined zones. You can alsodelete all predefined zones 2 and use user-defined zones exclusively. Optionally, you can use both kinds of zonespredefined and user-definedside by side. USGA provides the flexibility for you to use and define security zones tobest suit your specific needs.
1. The one security zone that requires no network segment is the global zone. (For more information, see Global zone Global Zone on page 33 .) Additionally,any zone without an interface bound to it nor any address book entries can also be said not to contain any network segments.
2. If you delete a security zone, you also automatically delete all addresses configured for that zone.
PolicyEngine
DMZ
Untrust
Trust
Finance
Eng
A network configured with 5 securityzones3 default zones (Trust,
Untrust, DMZ), and 2 user-definedzones
(Finance, Eng)
Traffic (indicated by black lines)passes from one security zone
to another only if a policypermits it.
NetScreen device
8/6/2019 Netscreen Ce VPN
23/569
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 6HFXULW\ =RQH ,QW
1HW6FUHHQ &RQFHSWV ([DPSOHV
6(&85,7< =21( ,17(5)$&(6An interface for a security zone can be thought of as a doorway through which TCP/IP traffic can pass between thatzone and any other zone.
Through the access policies you define, you can permit traffic between zones to flow in one direction or in both 3.With the routes that you define, you specify the interfaces that traffic from one zone to another must use. Becauseyou can bind multiple interfaces to a zone, the routes you chart are important for directing traffic to the interfaces ofyour choice.
To provide a zone with a doorway, you bind an interface to the zone andfor an interface in Route or NAT mode
assign an IP address to the interface. Such interfaces can be of two types: physical interfaces andfor thosedevices with virtual system supportsubinterfaces (that is, a layer 2 substantiation of a physical interface).
3K\VLFDO ,QWHUIDFHVA physical interface is identified by the position of an interface module and an ethernet port on that module. Forexample, on the NetScreen-500, the interface ethernet1/2 designates the interface module in the first bay (ethernet 1 /2) and the second port (ethernet1/ 2 ) on that module. A physical interface relates to components thatare physically present on the NetScreen device.
3. For traffic to flow between interfaces bound to the same zone, no policy is required because both interfaces have security equivalency. ScreenOS requirespolicies for traffic between zones, not within a zone.
1/1 1/2 3/1 3/2
2/1 2/2 4/1 4/2
Physical Interface Assignments
8/6/2019 Netscreen Ce VPN
24/569
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 6HFXULW\ =RQH ,QW
1HW6FUHHQ &RQFHSWV ([DPSOHV
6XELQWHUIDFHVOn devices that support virtual systems, you can logically divide a physical interface into several virtualsubinterfaces, each of which borrows the bandwidth it needs from the physical interface from which it stems. Asubinterface is an abstraction that functions identically to an interface for a physically present port and isdistinguished by 802.1Q VLAN tagging 4. The NetScreen device directs traffic to and from a zone with a subinterfacevia its IP address and VLAN tag. For convenience, administrators usually assign a VLAN tag that is the same as theinterface number. For example, an interface using VLAN tag 3 and named ethernet1/2.3 refers to the interfacemodule in the first bay, the second port on that module, and interface number 3 (ethernet1/2. 3 ) .
Note that although a subinterface shares part of its identity with a physical interface, the zone to which you bind it is
not dependent on the zone to which you bind the physical interface. You can bind the subinterface ethernet1/2.3 toa different zone than that to which you bind the physical interface ethernet1/2 , or to which you bind ethernet1/2.2 .Similarly, there are no restrictions in terms of IP address assignments. The term subinterface does not imply that itsaddress be in a subnet of the address space of the physical interface.
4. 802.1Q is an IEEE standard that defines the mechanisms for the implementation of virtual bridged LANs and the ethernet frame formats used to indicateVLAN membership via VLAN tagging.
Note: For more information on interfaces, see Universal Security Gateway Architecture on page 1 .
1/1 1/2 3/1 3/2
2/1 2/2 4/1 4/2
Subinterface Assignments
1/1.11/1.2
1/2.11/2.2
2/1.12/1.2
2/2.12/2.2
4/1.14/1.2
4/2.14/2.2
3/1.13/1.23/1.3
3/2.13/2.23/2.3
8/6/2019 Netscreen Ce VPN
25/569
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 9LUWXDO
1HW6FUHHQ &RQFHSWV ([DPSOHV
9 ,578$/ 5287(56A virtual router (VR) functions identically to a nonvirtual router. It has its own interfaces and its own routing table. InUSGA, a NetScreen device supports two virtual routers. This allows the NetScreen device to maintain two separaterouting tables and conceal the routing information in one virtual router from the other. For example, virtual router 1,which is typically used for communication with untrusted parties, does not contain any routing information for any ofthe protected zones, which is maintained by virtual router 2. Thus, no internal network information can be gleaned bythe surreptitious extraction of routes from virtual router 1.
Note: To create additional VRs, you must first obtain and load a virtual router software key on the NetScreen device.
Untrust-VR Routing DomainVR1
Route Redistribution
Finance
Trust
Eng
Untrust
DMZ
Trust-VR Routing Domain
Note: The castle icon represents an interface for a security zone.
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 9LUWXDO
8/6/2019 Netscreen Ce VPN
26/569
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 9LUWXDO
1HW6FUHHQ &RQFHSWV ([DPSOHV
5RXWH 5HGLVWULEXWLRQEach virtual router (VR) maintains a routing table with unique entries for its routing domain. That is, the entries inVR1 are completely different from those maintained in VR2. Because the routing table entries in VR2 cannot befound in VR1, the VR1 routing table must include a route pointing to VR2 for any routes that it does not have andthat you want to make accessible for traffic from VR1. (Likewise, the reverse is required for traffic in the otherdirection; that is, from VR2 to VR1.) The term for this link between the two virtual routers is route redistribution.
Note: For more information about virtual routers, see Chapter 7 , Virtual Routers .
eth1/1
eth1/2
eth2/1eth4/1
eth3/1To Use
10.10.1.0/24 eth1/1
10.10.2.0/24 eth1/2
10.10.3.0/24 eth2/10.0.0.0/0 VR1
Finance10.10.1.0/24
Trust10.10.2.0/24
Engineering10.10.3.0/24
Untrust210.10.1.0/24
DMZ210.10.2.0/24
To Use
210.10.1.0/24 eth3/1
210.10.2.0/24 eth4/1
10.10.0.0/16 VR20.0.0.0/0 eth3/1
Trust-VR (VR2) Routing Domain Untrust-VR (VR1) Routing Domain
Route Redistribution
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH $FFHVV 3RO
8/6/2019 Netscreen Ce VPN
27/569
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH $FFHVV 3RO
1HW6FUHHQ &RQFHSWV ([DPSOHV
$ &&(66 32/,&,(6Every time a packet attempts to pass from one zone to another, the NetScreen device checks its access control list(ACL) for a policy that permits such traffic. To allow traffic to pass from one security zone to anotherfor example,from zone A to zone Byou must configure an access policy that permits zone A to send traffic to zone B. To allowtraffic to flow the other way, you must configure another policy permitting traffic from zone B to zone A. For anytraffic to pass from one zone to another, there must be an access policy that permits it.
Note: For information about access policies, see Chapter 9 , Access Policies .
PolicyEngine
Finance
Trust
Eng
Untrust
DMZNote: The black lines represent traffic
between security zones.
Route Redistribution
Untrust-VR Routing DomainTrust-VR Routing Domain
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 93
8/6/2019 Netscreen Ce VPN
28/569
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 93
1HW6FUHHQ &RQFHSWV ([DPSOHV
931 6USGA supports several VPN configuration options, some of which allow the separation of virtual private network(VPN) tunnels and access policies 5. Once configured, such tunnels exist as available resources for securing trafficen route between one security zone and another.
The main steps for configuring a VPN tunnel independent of any access policy are as follows:
1. While configuring the VPN tunnel (for example, vpn-to-SF , where SF is the destination or end entity),specify a physical or subinterface on the local device. (The IP address for this interface is what the remotepeer must use when configuring its remote gateway.)
2. Create a tunnel interface (for example, tunnel.1 ), and bind it to a security zone6
.3. Bind the tunnel interface tunnel.1 to the VPN tunnel vpn-to-SF .4. To direct traffic through this tunnel, set up a route stating that traffic to SF must use tunnel.1 .
At this point, the tunnel is ready for traffic bound for SF . You can now set up access policies to permit or block trafficfrom a specified source to that destination.
5. In earlier versions of ScreenOS, a VPN policy must explicitly specify tunneling and name a specific VPN tunnel. You can still configure VPN policies this wayin ScreenOS 3.1.0. However, you can also configure policies that only permit or deny traffic between two security zones. If permitted, that traffic is tunneledif the route to the specified destination points to an interface bound to a VPN tunnel.
6. You do not have to bind the tunnel interface to the same zone from which VPN traffic originates locally. Traffic from any zone can access a tunnel interfaceif a route points to that interface.
RoutingTable
------------------------------------------------
VPN tunnel Destination ZoneSource Zone Tunnel
Interface
Packet sent
Policy
Engine
Packet arrives
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 93
8/6/2019 Netscreen Ce VPN
29/569
&KDSWHU 8QLYHUVDO 6HFXULW\ DWHZD\ $UFKLWHFWXUH 93
1HW6FUHHQ &RQFHSWV ([DPSOHV
Zone: Financeeth1/110.10.1.1/24
VPN Tunnelvpn-to-SF
To Reach Use
10.20.2.0/24 tunnel.1
10.10.1.0/24 eth1/1
0.0.0.0/0 VR1
SF LAN10.20.2.0/24
To Reach Use
210.10.1.0 eth3/10.0.0.0/0 210.10.1.2/24
Local Device
Traffic from security zone Finance to SF LAN in security zone Untrust is routed to thetunnel interface tunnel.1. Because tunnel.1 is bound to VPN tunnel vpn-to-SF, the trafficis sent through that tunnel to the remote gateway at SF LAN.
Zone: Untrusteth3/1210.10.1.1/24
Interface:tunnel.1
VR1: Untrust Virtual Router
VR2: Trust Virtual Router
Default Gateway:210.10.1.2
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 9LUWXDO 6
8/6/2019 Netscreen Ce VPN
30/569
Q $
1HW6FUHHQ &RQFHSWV ([DPSOHV
9 ,578$/ 6
8/6/2019 Netscreen Ce VPN
31/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
=RQHV LQ D 9LUWXDO 6\VWHPWhen a root-level admin creates a virtual system, the following zones are automatically inherited or created:
Shared Untrust Zone (inherited from the root system) Shared Null Zone (inherited from the root system) Trust- Zone Untrust-Tun- Zone Self- Zone Global- Zone
All virtual systems share the untrust and null zones with the root system. Note that because the root system and allvirtual systems share the untrust zone, they also share the address book for the untrust zone.
All other zones in a vsys are owned by that vsys.
In addition, a root-level admin can create one user-defined zone for each virtual system.
,QWHUIDFHVA virtual system can have any of the following three types of interfaces bound to the untrust zone:
One or more vsys can share the physical interface that is bound to the untrust zone with the root system. A vsys can have its own subinterface bound to the untrust zone, and use VLAN tagging as the means for
trunking 8 inbound and outbound traffic. A vsys can have its own physical interface bound to the untrust zone or to trust- zone.
You can bind one, two, or all three of the above interface types to the untrust zone concurrently. You can also bindmultiple interfaces of each type to the untrust zone.
Note: For information on each of these zone types, see Chapter 2 , Zones .
8. VLAN trunking allows one physical interface to support multiple logical subinterfaces, each of which must be identified by a unique VLAN tag. The VLANidentifier (tag) on an incoming ethernet frame indicates its intended subinterfaceand hence the virtual systemto which it is destined.
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 9LUWXDO 6
8/6/2019 Netscreen Ce VPN
32/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
You can bind either a subinterface (with VLAN tagging to trunk traffic) or a physical interface to thetrust- zone. You can also bind multiple interfaces of each type to these zones.
9LUWXDO 5RXWHUVWhen a root-level admin creates a virtual system, the vsys automatically has the following two virtual routersavailable for its use:
A shared virtual router: untrust-vr In the same way that a vsys and the root system share the untrust zone,they also share untrust-vr, which maintains the routing information for that zone.
Its own virtual router: -vr This is a vsys-specific virtual router that, by default, maintains therouting table for the trust- zone.
If you, as a root-level administrator, want all of the vsys zones to be in the untrust-vr routing domainfor example, ifall the interfaces bound to the vsys-trust zone are in Route modeyou can dispense with the trust-vr by changingthe zone bindings from the trust-vr to the untrust-vr. For more information on virtual routers, see Chapter 7 , VirtualRouters .
Note: ScreenOS 3.1.0 does not support user-defined virtual routers within a vsys.
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 3DFNHW )ORZ 6HTX
8/6/2019 Netscreen Ce VPN
33/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
3 $&.(7 )/2: 6(48(1&(In USGA, the flow sequence of an incoming packet progresses as illustrated below.
2
If network traffic, sourcezone = security zone towhich interface orsubinterface is bound.
If VPN traffic to tunnelinterface bound to VPNtunnel, source zone =security zone in whichtunnel interface isconfigured
If VPN traffic to tunnelinterface in a tunnelzone, source zone =carrier zone
SourceZone
IncomingInterface
MIP/VIPHost IP
RouteLookup
Route Table10.10.10.0/24 eth1/10.0.0.0/0 untrust-vr
PolicyLookup
ACLsrc dst service action
( ) Src AddrTranslation( )
DestinationInterface and
Destination Zone
Permit = Forward packetDeny = Drop packetTunnel = Use specifiedtunnel for VPN encryption
1 3 4 5
If destination zone = security zone,use that zone for policy lookup.
If destination zone = tunnel zone, useits carrier zone for policy lookup
Incoming Packet
SecurityZones
TunnelZone
6
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 3DFNHW )ORZ 6HTX
8/6/2019 Netscreen Ce VPN
34/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
1. The interface module identifies the incoming interface and, consequently, the source zone to which theinterface is bound.
The source zone determination is based on the following criteria: If the packet is not encapsulated, the source zone is the security zone to which the incoming interface
or subinterface is bound. If the packet is encapsulated and the tunnel interface is bound to a VPN tunnel, the source zone is the
security zone in which the tunnel interface is configured. If the packet is encapsulated and the tunnel interface is in a tunnel zone, the source zone is the
corresponding carrier zone (a security zone that carries a tunnel zone) for that tunnel zone.
2. If a mapped IP (MIP) or virtual IP (VIP) address is used, the address-mapping module resolves the MIP orVIP so that the routing table can search for the actual host address.
3. The route table lookup finds the destination interface that leads to the destination address. In so doing, theinterface module identifies the destination zone to which that interface is bound.
The destination zone determination is based on the following criteria:
If the destination zone is a security zone, that zone is used for the policy lookup.
If the destination zone is a tunnel zone, the corresponding carrier zone is used for the policy lookup.4. The policy engine searches the access control list (ACL) for a policy between the addresses in the identified
source and destination zones.
The action configured in the policy determines what the NetScreen firewall does with the packet:
If the action is permit , the firewall determines to forward the packet to its destination. If the action is deny , the firewall determines to drop the packet.
If the action is tunnel , the firewall determines to forward the packet to the VPN module, whichencapsulates the packet and transmits it using the specified VPN tunnel settings.
5. If source address translation is specified (either interface-based NAT or policy-based NAT), the NAT moduletranslates the source address before forwarding it either to its destination or to the VPN module.
6. The NetScreen device performs the action specified in the access policy.
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 3DFNHW )ORZ 6HTX
8/6/2019 Netscreen Ce VPN
35/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
([DPSOH 3DUW (QWHUSULVH ZLWK 6L[ =RQHVThis is the first part of an ongoing example. For the next part, in which the interfaces for each zone are set, see
Example (Part 2): Interfaces for Six Zones on page 17 . Here you configure the following six zones for anenterprise:
The zones Trust, Untrust, and DMZ are preconfigured. You must configure the zones Finance, Eng, and Mail. Bydefault, a user-configured zone is placed in the virtual router trust-vr. Thus, you do not have to specify a virtual routerfor the Finance and Eng zones. However, in addition to configuring the Mail zone, you must also specify that it be inthe virtual router untrust-vr 9. For both the DMZ and the Mail zones, you enable intra-zone blocking.
Finance Trust
Eng Mail
Untrust DMZ
9. For more information on virtual routers and their routing domains, see Chapter 7 , Virtual Routers .
Finance
Trust
Eng
Untrust
DMZ
Trust-VR RoutingDomain
Untrust-VR RoutingDomain
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 3DFNHW )ORZ 6HTX
8/6/2019 Netscreen Ce VPN
36/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
:HE8,
1. Zone >> New Entry: Enter the following, and then click OK :
Name: Finance
Virtual Router Name: trust-vr
Zone Type: Regular: (select)
2. Zone >> New Entry: Enter the following, and then click OK :
Name: Eng
Virtual Router Name: trust-vrZone Type: Regular: (select)
3. Zone >> New Entry: Enter the following, and then click OK :
Name: Mail
Intra-Zone Blocking: (select)
Virtual Router Name: untrust-vr
Zone Type: Regular: (select)
4. Zone >> Edit (for DMZ): Select Intra-Zone Blocking , and then click OK .
&/,
1. set zone name finance
2. set zone name eng3. set zone name mail4. set zone mail vrouter untrust-vr5. set zone mail block6. set zone dmz block7. save
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 3DFNHW )ORZ 6HTX
8/6/2019 Netscreen Ce VPN
37/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
([DPSOH 3DUW ,QWHUIDFHV IRU 6L[ =RQHVThis is the second part of an ongoing example. For the first part, in which zones are configured, see
Example (Part 1): Enterprise with Six Zones on page 15 . For the next part, in which virtual routers areconfigured, see Example (Part 3): Enterprise with Two Routing Domains on page 22 . This part of theexample demonstrates how to configure interfaces and bind them to zones.
Finance10.10.1.1/24
eth3/2.1
Trust10.10.2.1/24
eth3/2
Eng10.10.3.1/24
eth3/1
DMZ210.10.4.1/24
eth2/2
Untrust210.10.3.1/24eth1/2
210.10.1.1/24eth1/1
210.10.2.2/24eth1/1.2
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 3DFNHW )ORZ 6HTX
8/6/2019 Netscreen Ce VPN
38/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
:HE8,
,QWHUIDFH HWKHUQHW
1. Interface >> Physical >> Edit (for ethernet3/2): Enter the following, and then click Save :
IP Address: 10.10.2.1
Netmask: 255.255.255.0
Zone Name: Trust
Interface Mode: NAT (select)
Management Services: WebUI, Telnet, SNMP, SCS (select)
Other Services: Ping (select)
,QWHUIDFH HWKHUQHW
2. Interface >> Physical >> New Sub-i/f (for ethernet3/2): Enter the following, and then click Save :
Interface Name: ethernet3/2.: 1
IP Address: 10.10.1.1Netmask: 255.255.255.0
VLAN Tag: 1
Zone Name: Finance
Interface Mode: NAT (select)
Other Services: Ping (select),QWHUIDFH HWKHUQHW
3. Interface >> Physical >> Edit (for ethernet3/1): Enter the following, and then click Save :
IP Address: 10.10.3.1
Netmask: 255.255.255.0
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 3DFNHW )ORZ 6HTX
8/6/2019 Netscreen Ce VPN
39/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
Zone Name: Eng
Interface Mode: NAT (select)
Other Services: Ping (select),QWHUIDFH HWKHUQHW
4. Interface >> Physical >> Edit (for ethernet1/1): Enter the following, and then click Save :
IP Address: 210.10.1.1
Netmask: 255.255.255.0
Zone Name: Mail,QWHUIDFH HWKHUQHW
5. Interface >> Physical >> Sub-i/f (for ethernet1/1): Enter the following, and then click Save :
Interface Name: ethernet1/1.: 2
IP Address: 210.10.2.2
Netmask: 255.255.255.0VLAN Tag: 2
Zone Name: Mail
,QWHUIDFH HWKHUQHW
6. Interface >> Physical >> Edit (for ethernet1/2): Enter the following, and then click Save :
IP Address: 210.10.3.1Netmask: 255.255.255.0
Zone Name: Untrust
Management Services: SNMP (select)
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 3DFNHW )ORZ 6HTX
8/6/2019 Netscreen Ce VPN
40/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
,QWHUIDFH HWKHUQHW
7. Interface >> Physical >> Edit (for ethernet2/2): Enter the following, and then click Save :
IP Address: 210.10.4.1Netmask: 255.255.255.0
Zone Name: DMZ
&/,
,QWHUIDFH HWKHUQHW
8. set interface eth3/2 zone trust9. set interface eth3/2 ip 10.10.2.1/2410. set interface eth3/2 nat11. set interface eth3/2 manage ping12. set interface eth3/2 manage webui
13. set interface eth3/2 manage telnet14. set interface eth3/2 manage snmp15. set interface eth3/2 manage scs
,QWHUIDFH HWKHUQHW
1. set interface eth3/2.1 zone finance2. set interface eth3/2.1 ip 10.10.1.1/24 tag 13. set interface eth3/2.1 nat4. set interface eth3/2.1 manage ping
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 3DFNHW )ORZ 6HTX
8/6/2019 Netscreen Ce VPN
41/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
,QWHUIDFH HWKHUQHW
5. set interface eth3/1 zone eng
6. set interface eth3/1 ip 10.10.3.1/247. set interface eth3/1 nat8. set interface eth3/1 manage ping
,QWHUIDFH HWKHUQHW
9. set interface eth1/1 zone mail10. set interface eth1/1 ip 210.10.1.1/24
,QWHUIDFH HWKHUQHW
11. set interface eth1/1.1 zone mail12. set interface eth1/1.1 ip 210.10.2.2 /24 tag 2
,QWHUIDFH HWKHUQHW
13. set interface eth1/2 zone untrust14. set interface eth1/2 ip 210.10.3.1/2415. set interface eth1/2 manage snmp
,QWHUIDFH HWKHUQHW
16. set interface eth2/2 zone dmz17. set interface eth2/2 ip 210.10.4.1/2418. save
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 3DFNHW )ORZ 6HTX
8/6/2019 Netscreen Ce VPN
42/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
([DPSOH 3DUW (QWHUSULVH ZLWK 7ZR 5RXWLQJ 'RPDLQVThis is the third part of an ongoing example. For the previous part, in which interfaces for the various security zones
are defined, see Example (Part 2): Interfaces for Six Zones on page 17 . For the next part, in which the accesspolices are set, see Example (Part 4): Access Policies for an Enterprise with Six Zones on page 25 . In thisexample, you only have to configure a route for the default gateway to the internet. The other routes areautomatically created by the NetScreen device when you create the interface IP addresses.
Finance10.10.1.1/24
eth3/2.1, NAT
Trust10.10.2.1/24eth3/2, NAT
Eng10.10.3.1/24eth3/1, NAT
Untrust210.10.3.1/24eth1/2, Route
DMZ210.10.4.1/24eth2/2, Route
210.10.3.254
ToInternet
210.10.1.1/24eth1/1, Route
210.10.2.2/24eth1/1.2, Route
RouteRedistribution
Trust-VR Routing Domain Untrust-VR Routing Domain
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 3DFNHW )ORZ 6HTX
8/6/2019 Netscreen Ce VPN
43/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
:HE8,
1. Routing >> Route Table >> New Entry: Enter the following, and then click OK :
Virtual Router Name: untrust-vr
Network Address: 0.0.0.0
Netmask: 0.0.0.0
Gateway IP Address: 210.10.2.254
Interface: ethernet1/2(untrust-vr)
&/,
1. set vrouter untrust-vr route 0.0.0.0/0 interface eth1/2 gateway 210.10.1.2542. save
To see the route table entries for the ongoing example, look at the tables on the next page.
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 3DFNHW )ORZ 6HTX
8/6/2019 Netscreen Ce VPN
44/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
The NetScreen device automatically creates the following routes (in black):
To Reach: Use Interface: Use Gateway:0.0.0.0/0 n/a Untrust-VR
10.10.3.0/24 eth3/1 0.0.0.0
10.10.2.0/24 eth3/2 0.0.0.0
10.10.1.0/24 eth3/2.1 0.0.0.0
To Reach: Use Interface: Use Gateway:
210.10.4.0/24 eth2/2 0.0.0.0
210.10.3.0/24 eth1/2 0.0.0.0
210.10.2.0/24 eth1/1.2 0.0.0.0
210.10.1.0/24 eth1/1 0.0.0.0
0.0.0.0/0 eth1/2 210.10.3.254 Note: This is the only user-configured entry.
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 3DFNHW )ORZ 6HTX
8/6/2019 Netscreen Ce VPN
45/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
([DPSOH 3DUW $FFHVV 3ROLFLHV IRU DQ (QWHUSULVH ZLWK 6L[ =RQHVThis is the last part of an ongoing example. The previous part is Example (Part 3): Enterprise with Two Routing
Domains on page 22 . This part of the example demonstrates how to configure new access policies.
For the purpose of this example, before you begin configuring new access policies, you need to create new servicegroups.
Note: When you create a zone, the NetScreen device automatically creates the address Any for all hosts within that zone. This example makes use of the address Any for the hosts.
Finance
Trust
Eng DMZ
Untrust
PolicyEngine
Route Redistribution
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 3DFNHW )ORZ 6HTX
8/6/2019 Netscreen Ce VPN
46/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
:HE8,
6HUYLFH *URXSV
1. Service >> Custom >> New Group: Enter the following, and then click OK.
Group Name: Mail-Pop3
Group Members > Custom >> New Group: Enter the following, and then click OK.Group Name: HTTP-FTPGet
Group Members > New Policy: Enter the following, and then click OK:
Source Address: Any
Destination Address: Any
Service: Mail-Pop3
Action: Permit
4. Policy (From Zone: Trust, To Zone: Mail) >> New Policy: Enter the following, and then click OK:
Source Address: Any
Destination Address: Any
Service: Mail-Pop3
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 3DFNHW )ORZ 6HTX
8/6/2019 Netscreen Ce VPN
47/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
Action: Permit
5. Policy (From Zone: Eng, To Zone: Mail) >> New Policy: Enter the following, and then click OK:
Source Address: AnyDestination Address: Any
Service: Mail-Pop3
Action: Permit
6. Policy (From Zone: Untrust, To Zone: Mail) >> New Policy: Enter the following, and then click OK:
Source Address: Any
Destination Address: Any
Service: Mail
Action: Permit
7. Policy (From Zone: Finance, To Zone: Untrust) >> New Policy: Enter the following, and then click OK:
Source Address: Any
Destination Address: AnyService: HTTP-FTPGet
Action: Permit
8. Policy (From Zone: Finance, To Zone: DMZ) >> New Policy: Enter the following, and then click OK:
Source Address: Any
Destination Address: AnyService: HTTP-FTPGet
Action: Permit
9. Policy (From Zone: Trust, To Zone: Untrust) >> New Policy: Enter the following, and then click OK:
Source Address: Any
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 3DFNHW )ORZ 6HTX
8/6/2019 Netscreen Ce VPN
48/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
Destination Address: Any
Service: HTTP-FTPGet
Action: Permit10. Policy (From Zone: Trust, To Zone: DMZ) >> New Policy: Enter the following, and then click OK:
Source Address: Any
Destination Address: Any
Service: HTTP-FTPGet
Action: Permit
11. Policy (From Zone: Eng, To Zone: DMZ) >> New Policy: Enter the following, and then click OK:
Source Address: Any
Destination Address: Any
Service: HTTP-FTPGet
Action: Permit
12. Policy (From Zone: Eng, To Zone: DMZ) >> New Policy: Enter the following, and then click OK:Source Address: Any
Destination Address: Any
Service: FTP-Put
Action: Permit
13. Policy (From Zone: Untrust, To Zone: DMZ) >> New Policy: Enter the following, and then click OK:Source Address: Any
Destination Address: Any
Service: HTTP-FTPGet
Action: Permit
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 3DFNHW )ORZ 6HTX
8/6/2019 Netscreen Ce VPN
49/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
&/,
6HUYLFH *URXSV
1. set group service mail-pop3 add mail2. set group service mail-pop3 add pop33. set group service http-ftpget add http4. set group service http-ftpget add ftpget
$FFHVV 3ROLFLHV
5. set policy from finance to mail any any mail-pop3 permit6. set policy from trust to mail any any mail-pop3 permit7. set policy from eng to mail any any mail-pop3 permit8. set policy from untrust to mail any any mail permit9. set policy from finance to untrust any any http-ftpget permit10. set policy from finance to dmz any any http-ftpget permit
11. set policy from trust to untrust any any http-ftpget permit12. set policy from trust to dmz any any http-ftpget permit13. set policy from eng to untrust any any http-ftpget permit14. set policy from eng to dmz any any http-ftpget permit15. set policy from eng to dmz any any ftp-put permit16. set policy from untrust to dmz any any http-ftpget permit
17. save
&KDSWHU 8QLYHUVDO 6HFXULW\ *DWHZD\ $UFKLWHFWXUH 3DFNHW )ORZ 6HTX
8/6/2019 Netscreen Ce VPN
50/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
8/6/2019 Netscreen Ce VPN
51/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
8 u h r !
=RQHVA zone can be a segment of network space to which security measures are applied (a security zone), a logicalsegment to which a VPN tunnel interface is bound (a tunnel zone), or either a physical or logical entity that performsa specific function (a function zone). This chapter examines each type of zone, with particular emphasis given to thesecurity zone, and is organized into the following sections:
Security Zones on page 33 Tunnel Zones on page 34 Function Zones on page 37
When you first boot up a NetScreen device, you can see a number of preconfigured zones. In the WebUI, click Zone in the menu column on the left. In the CLI, use the get zone command.
&KDSWHU =RQHV
The output of the get zone command:
8/6/2019 Netscreen Ce VPN
52/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
The output of the get zone command:
The preconfigured zones shown above can be grouped into three different types:Security Zones: Untrust, Trust, DMZ, Global, V1-Untrust, V1-Trust, V1-DMZ
Tunnel Zone: Untrust-Tun
Function Zones: Null, Self, MGT, HA
These zones providebackward compatibility when
upgrading to ScreenOS3.1.0the top 3 for devices in
NAT or Route mode, thebottom 3 for devices in
Transparent mode.
ns500-> get zoneTotal of 12 zones in vsys root------------------------------------------------------------------------Id Name Type Attr VR Default-If vsys0 Null Null Shared trust-vr null Root1 Untrust Reg Shared untrust-vr ethernet1/2 Root2 Trust Reg trust-vr ethernet3/2 Root3 DMZ Reg untrust-vr ethernet2/2 Root
4 Self Reg trust-vr self Root5 MGT Reg trust-vr mgt Root6 HA Reg trust-vr ha1 Root10 Global Reg trust-vr null Root11 V1-Untrust L2 trust-vr v1-untrust Root12 V1-Trust L2 trust-vr v1-trust Root13 V1-DMZ L2 trust-vr v1-dmz Root16 Untrust-Tun Tun trust-vr tunnel Root------------------------------------------------------------------------
The root and virtual systems
share these zones.
These zones do not andcannot have an interface.
By default, VPN tunnel interfaces are bound to the Untrust-Tunzone, whose carrier zone is the Untrust zone. (When upgrading to
ScreenOS 3.1.0, existing tunnels are bound to the Untrust-Tun zone.)
Zone ID numbers 79 and 1415are reserved for future use.
&KDSWHU =RQHV 6HFXULW\ =RQHV
6(&85 7< =21(6
8/6/2019 Netscreen Ce VPN
53/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
6(&85,7< =21(6On a single NetScreen device, you can configure multiple security zones, sectioning the network into segments to
which you can apply various security options to satisfy the needs of each segment. At a minimum, you must definetwo security zones, basically to protect one area of the network from the other. You can also define many securityzones, bringing finer granularity to your network security design and without deploying multiple securityappliances to do so.
*OREDO =RQHYou can identify a security zone because it has an address book and can be referenced in access policies. Theglobal zone satisfies these criteria. However, it does not have one element that all other security zones do haveaninterface. The global zone serves as a storage area for mapped IP (MIP) and virtual IP (VIP) addresses. Becausetraffic going to these addresses is mapped to other addresses, the global zone does not require an interface fortraffic to flow through it.
Note: When configuring a policy for a MIP or VIP, you can specify the global zone as the destination zone. If you specify the security zone to which the MIP or VIP maps the traffic it receives as the destination, the policy engine
automatically changes it to global.
&KDSWHU =RQHV 7XQQHO =RQHV
7811(/ =21(6
8/6/2019 Netscreen Ce VPN
54/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
7811(/ =21(6A tunnel zone is a logical segment that hosts one or more tunnel interfaces. A tunnel zone is associated with a
security zone that acts as its carrier. The NetScreen device uses the routing information for the carrier zone to directtraffic to the tunnel endpoint. The default tunnel zone is Untrust-Tun, and it is associated with the Untrust zone. Youcan create other tunnel zones and bind them to other security zones, with a maximum of one tunnel zone per carrierzone per virtual system 1.
By default, a tunnel zone is in the Trust-VR routing domain, but you can also move a tunnel zone into anotherrouting domain.
&UHDWLQJ D 6HFXULW\ =RQHTo create a security zone or tunnel zone, do either of the following:
:HE8,
Zone >> New Entry: Enter the following, and then click OK :
Name: Type a name for the zone.
Block Intra-Zone Traffic: Select this if you want to block traffic between hostswithin the same security zone. By default, intra-zone blocking is disabled.
Virtual Router Name: Select the virtual router in whose routing domain youwant to place the zone.
Zone Type: Select Regular to create a zone to which you can bind interfacesin NAT or Route mode. Select Layer 2 to create a zone to which you canbind interfaces in Transparent mode. Select Tunnel Out Zone whencreating a tunnel zone and binding it to a carrier zone, and then select aspecific carrier zone from the drop-down list.
1. The root system and all virtual systems can share the Untrust zone. However, each system has its own separate Untrust-Tun zone.
&KDSWHU =RQHV 7XQQHO =RQHV
&/,
8/6/2019 Netscreen Ce VPN
55/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
&/,
set zone name [ l2 | tunnel ]
set zone blockset zone vrouter
0RGLI\LQJ D 6HFXULW\ =RQHTo modify the ID number or name of a security zone or tunnel zone, you must first delete the zone 2, and then createit again with the new name. To change the intra-zone blocking option or to change the virtual router, you can modifythose settings on the existing zone.
:HE8,
0RGLI\LQJ WKH =RQH 1DPH
1. Zone: Click Remove (for the zone whose ID number or name you want to modify).2. When the prompt appears, asking for confirmation of the removal, click Yes .3. Zone >> New Entry: Enter the zone settings, modifying the ID number or name, and then click OK .
&KDQJLQJ WKH ,QWUD =RQH %ORFNLQJ 2SWLRQ RU 9LUWXDO 5RXWHU
1. Zone >> Edit (for the zone that you want to modify): Enter the following, and then click OK :
Intra-Zone Blocking: To enable, select the check box. To disable, clear it.
Virtual Router Name: From the drop-down list, select the virtual router intowhose routing domain you want to move the zone.
2. Before you can remove a zone, you must first unbind all interfaces bound to it.
&KDSWHU =RQHV 7XQQHO =RQHV
&/,
8/6/2019 Netscreen Ce VPN
56/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
,
0RGLI\LQJ WKH =RQH 1DPH
1. unset zone 2. set zone name [ l2 | tunnel ]
&KDQJLQJ WKH ,QWUD =RQH %ORFNLQJ 2SWLRQ RU 9LUWXDO 5RXWHU
{ set | unset } zone block
set zone vrouter
'HOHWLQJ D 6HFXULW\ =RQHTo delete a security zone or tunnel zone, do either of the following 3:
:HE8,
1. Zone: Click Remove (for the zone you want to delete).2. When the prompt appears, asking for confirmation of the removal, click Yes .
&/,
unset zone
3. Before you can remove a zone, you must first unbind all interfaces bound to it.
&KDSWHU =RQHV )XQFWLRQ =RQHV
) 81&7 21 =21(6
8/6/2019 Netscreen Ce VPN
57/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
) 81&7,21 21(6The four function zones are Null, MGT, HA, and Self. Each zone exists for a single purpose, as explained below.
1XOO =RQHThis zone serves as temporary storage for any interfaces that are not bound to any other zone.
0*7 =RQHThis zone hosts the out-of-band management interface, MGT.
+$ =RQHThis zone hosts the high availability interfaces, HA1 and HA2.
6HOI =RQHThis zone hosts the interface for remote management connections. When you connect to the NetScreen device viaHTTP, SCS, or Telnet, you connect to the Self zone.
Note: Although you can set interfaces for the MGT and HA zones, the zones themselves are not configurable.
&KDSWHU =RQHV )XQFWLRQ =RQHV
8/6/2019 Netscreen Ce VPN
58/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
8 u h r "
8/6/2019 Netscreen Ce VPN
59/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
,QWHUIDFHV
Creating an interface is the next step following the creation of a zone. You must create an interface and bind it to azone to allow traffic to flow in and out of the zone. Then, you must set routes and configure access policies to allowtraffic to pass from interface to interface . Physical interfaces and subinterfaces, like doorways, allow traffic to enterand exit a zone. You can assign multiple interfaces to a zone, but an interface can only be assigned to one zone.
For more information on configuring access policies, see Access Policies on page 241 , and Policy-Based VPNson page 375 for VPN tunnels. For more information on configuring routes, see Virtual Routers on page 165 .The great flexibility of USGA enables you to set DHCP service and firewall options on a per interface basis.
This chapter contains the following sections:
Interface Types on page 40 Interface Settings and Operational Modes on page 45
Secondary IP Addresses on page 63 Management Services Options on page 65 Interface Services Options on page 66 Firewall Options on page 67 Configuring an interface on page 72
&KDSWHU ,QWHUIDFHV ,QWHUIDFH 7\SHV
,17(5)$&( 7
8/6/2019 Netscreen Ce VPN
60/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
, ( ) ( (This section describes physical interfaces, subinterfaces, and tunnel interfaces. For information on how to view a
table of all these interfaces, see Viewing interfaces on page 42 .
6HFXULW\ =RQH ,QWHUIDFHVThe purpose of physical interfaces and subinterfaces is to provide an opening through which network traffic canpass between zones.
3K\VLFDOEach port on your NetScreen device represents a physical interface, and the name of the interface ispredefined. The name of a physical interface is composed of the media type, slot number (for someNetScreen devices), and port number, for example, ethernet3/2 or ethernet2 (see also Security ZoneInterfaces on page 3 ). For backward compatibility, certain interfaces can still be named Trust, Untrust, andDMZ as in the old version of ScreenOS. You can bind a physical interface to any security zone where it actsas a doorway through which traffic enters and exits the zone. Without an interface, no traffic can access the
zone or leave it.Three of the physical ethernet interfaces are pre-bound to specific zonesTrust, Untrust, or DMZ andwhich interface is bound to which zone is specific to each platform. For more information on the Trust,Untrust, and DMZ zones, see Multiple Security Zones on page 2 .
6XELQWHUIDFH
A subinterface, like a physical interface, acts as a doorway through which traffic enters and exits a securityzone. You can logically divide a physical interface into several virtual subinterfaces. Each virtualsubinterface borrows the bandwidth it needs from the physical interface from which it stems, thus its name isan extension of the physical interface name, for example, ethernet3/2.1 or ethernet2.1 (see also SecurityZone Interfaces on page 3 ).
&KDSWHU ,QWHUIDFHV ,QWHUIDFH 7\SHV
You can bind a subinterface to any zone. You can bind a subinterface to the same zone as its physicalinterface or you can bind it to a different zone
8/6/2019 Netscreen Ce VPN
61/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
interface, or you can bind it to a different zone.
)XQFWLRQ =RQH ,QWHUIDFHVFunction zone interfaces, such as Management and HA, each serve a special purpose.
0DQDJHPHQW ,QWHUIDFHOn some NetScreen devices, you can manage the device through a separate physical interfacetheManagement (MGT) interfacemoving administrative traffic outside the regular network user traffic.Separating administrative traffic from network user traffic greatly increases security and assures constantmanagement bandwidth.
+$ ,QWHUIDFH
With NetScreen devices with dedicated High Availability (HA) interfaces, you can link two or more devicestogether to form a redundant group, or cluster. In a redundant group, one unit acts as the master, performingthe network firewall, VPN, and traffic-shaping functions, while the other units act as backups, basicallywaiting to take over the firewall functions should the master unit fail. The HA interface is a physical port usedexclusively for HA functions.
9LUWXDO +$ ,QWHUIDFH
On NetScreen devices without a dedicated HA interface, a Virtual High Availability (HA) interfaceprovides the same functionality. Because there is no separate physical port exclusively used for HAtraffic, the Virtual HA interface must be bound to one of the physical portstrusted, untrusted, or DMZ.
Note: For information on configuring the device for administration, see Administration on page 111 .
&KDSWHU ,QWHUIDFHV ,QWHUIDFH 7\SHV
7XQQHO ,QWHUIDFHV
8/6/2019 Netscreen Ce VPN
62/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
A tunnel interface acts as a doorway to a VPN tunnel. Traffic enters and exits a VPN tunnel via a tunnel interface.
By binding a tunnel interface to a VPN, you can separate the policy from the VPN tunnel. This way, you canconfigure one tunnel, and define multiple policies to regulate the traffic that flows through that tunnel. When there isno tunnel interface bound to a VPN tunnel, only one policy can be defined per VPN tunnel.
You can perform policy-based NAT on outgoing or incoming traffic using a pool of dynamic IP (DIP) addresses in thesame subnet as the tunnel interface. A typical reason for using policy-based NAT on a tunnel interface is to avoid IPaddress conflicts between the two sites on either end of the VPN tunnel. You can use the same tunnel interface andDIP pool for more than one VPN tunnel.
In USGA, you can bind a tunnel interface to any zone. For more information on tunnel interfaces, see TunnelInterfaces on page 42 .
9LHZLQJ LQWHUIDFHVYou can view a table that lists all interfaces on your NetScreen device. Because they are predefined,physical interfaces are listed regardless of whether or not you configure them. Subinterfaces and tunnelinterfaces are only listed once you create and configure them.
To view the interface table in the WebUI, click Interface in the menu column on the left, and to view it in theCLI, use the get interface command. In the CLI, the get interface command includes tunnel interfaces. Inthe WebUI, tunnel interfaces are separated from other interfaces. To view them, click Interface >> Tunnel .
,QWHUIDFH 7DEOHThe interface table displays the following information on each interface:
Name: This field identifies the name of the interface. IP/Netmask: This field identifies the IP address and netmask address of the interface.
Note: For information on how to configure an interface, see Configuring an interface on page 72 .
&KDSWHU ,QWHUIDFHV ,QWHUIDFH 7\SHV
Zone: This field identifies the zone to which the interface is bound.Link: This field identifies whether the interface is active (Up) or inactive (Down)
8/6/2019 Netscreen Ce VPN
63/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
Link: This field identifies whether the interface is active (Up) or inactive (Down). Configure: This field allows you configure and modify interfaces through these options:
Edit: Configure a physical interface for the first time, or modify an existing configuration.
New Sub-i/f: Create a new subinterface, or click Edit to modify an existing configuration.
Remove: Click to delete an interface.
MIP: Create a mapped IP address.
DIP: Create a dynamic IP address pool.
2IP: Create a secondary IP address.
VIP: Create a virtual IP address.
Screen: Select Network Attack Blocking Engine (Screen) options to counter network attacks suchas the ones listed in the Firewall Options on page 67 .
Note: In the WebUI, in the physical interfaces and subinterfaces table, yellow rows identify physical interfaces, and green rows identify subinterfaces (see WebUI Interface Table on page 44 ). In the CLI,you can distinguish a subinterface from a physical interface by its VLAN tag (see CLI Interface Table on page 44 ).
&KDSWHU ,QWHUIDFHV ,QWHUIDFH 7\SHV
WebUI Interface Table
8/6/2019 Netscreen Ce VPN
64/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
CLI Interface Table
VLAN Tag VLAN Tag
&KDSWHU ,QWHUIDFHV ,QWHUIDFH 6HWWLQJV DQG 2SHUDWLRQDO 0R
,17(5)$&( 6(77,1*6 $1' 23(5$7,21$/ 02'(6
8/6/2019 Netscreen Ce VPN
65/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
Interfaces can operate in three different modes: Network Address Translation (NAT), Route, and Transparent
modes. You select an operational mode when you configure an interface.
7UDQVSDUHQW 0RGHWhen an interface is in a Transparent mode, the NetScreen device filters packets traversing the firewall withoutmodifying any of the source or destination information in the IP packet header. All interfaces behave as though theyare part of the same network, with the NetScreen device acting much like a layer-2 switch or bridge. In Transparentmode, the IP addresses of interfaces are set at 0.0.0.0, making the presence of the NetScreen device invisible, ortransparent, to users.
ExternalRouter
Public AddressSpace
Switch
209.122.30.1
209.122.30.2209.122.30.3
209.122.30.4
209.122.30.5
Trust Zone
Untrust Zone
To Internet
&KDSWHU ,QWHUIDFHV ,QWHUIDFH 6HWWLQJV DQG 2SHUDWLRQDO 0R
Transparent mode is a convenient means for protecting Web servers, or any other kind of server that mainlyreceives traffic from untrusted sources. Using Transparent mode offers the following benefits:
8/6/2019 Netscreen Ce VPN
66/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
No need to reconfigure the IP settings of routers or protected servers
No need to create Mapped or Virtual IP addresses for incoming traffic to reach protected servers
,QWHUIDFH 6HWWLQJVInterfaces in transparent mode can only be managed through the VLAN1 interface. By default, ScreenOS alwayscreates a VLAN1 interface, and three VLAN1 zones: V1-Trust, V1-Untrust, V1-DMZ.
9/$1 ,QWHUIDFH
While ScreenOS creates the VLAN1 interface, you need to configure it before you can use it to manage anyinterface. The VLAN1 interface has in fact two main purposes: one is to provide an address for managingthe device, and the other is to terminate VPN traffic when the device is in transparent mode. The VLAN1interface has the same configuration and management abilities as a physical interface.
You can configure the VLAN1 interface to permit hosts in the VLAN1 zones to manage it, in which case, youmust set the VLAN1 interface IP to be in the same subnet as the hosts.
The VLAN1 interface IP overrides the system IP and the manage IP. When the VLAN1 interface isconfigured, neither the system IP nor the manage IP have any effect on interfaces in transparent mode.
9/$1 =RQHV
VLAN1 zones are also referred to as Layer 2 zones because they share the same layer 2 domain. Whenyou configure an interface in one of the VLAN1 zones, it gets added to the layer 2 domain shared by allinterfaces in all the VLAN1 zones.
By default the following physical interfaces are bound to the VLAN1 zones:
Zone NetScreen 200 Series Interface NetScreen 500 Interface
V1-Trust ethernet1 ethernet3/2
V1-DMZ ethernet2 ethernet2/2
&KDSWHU ,QWHUIDFHV ,QWHUIDFH 6HWWLQJV DQG 2SHUDWLRQDO 0R
V1 Untrust ethernet3 ethernet1/2
Zone NetScreen 200 Series Interface NetScreen 500 Interface
8/6/2019 Netscreen Ce VPN
67/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
All hosts in the VLAN1 zones must be on the same subnet to communicate, and you must define policies toallow hosts to communicate between zones. For more information on how to set policies, see AccessPolicies on page 241 .
([DPSOH +RZ WR VHW 9/$1 ,QWHUIDFHThis example demonstrates how to set an IP address for the VLAN1 interface, management options, and a route toenable traffic to flow to and from the NetScreen device.
:HE8,
1. Interface >> Physical >> Edit (for the VLAN1 interface): Enter the following, and then click OK.
IP Address: 209.122.30.254
Netmask: 255.255.255.0
Management Services: WebUI, Telnet, SCS (select)Other Services: Ping (select)
&/,
1. set interface vlan1 ip 209.122.30.254/242. set interface vlan1 manage webui telnet scs ping3. save
V1-Untrust ethernet3 ethernet1/2
&KDSWHU ,QWHUIDFHV ,QWHUIDFH 6HWWLQJV DQG 2SHUDWLRQDO 0R
([DPSOH 7UDQVSDUHQW 0RGHTh f ll i l ill t t b i fi ti f i l LAN t t d b N tS d i i
8/6/2019 Netscreen Ce VPN
68/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
The following example illustrates a basic configuration for a single LAN protected by a NetScreen device inTransparent mode. Access policies permit outgoing traffic for all four hosts in the Trust zone, incoming mail for themail server, and incoming FTP for the FTP server. The device is managed through its VLAN1 IP address.
:HE8,
1. Interface >> Physical >> Edit (for the VLAN1 interface): Enter the following, and then click Apply :
IP Address: 209.122.17.252
Netmask: 255.255.255.0Management Services: WebUI, Telnet, SCS (select)
Other Services: Ping (select)
2. Admin >> Web: Enter the following, and then click Apply :
HTTP Port: 5555 1
Internet
NetScreen Device
Router209.122.17.253/24
VLAN1 IP209.122.17.252
Port 5555
Mail Server209.122.17.249/24
FTP Server209.122.17.250/24
PC #1209.122.17.1/24
PC #2209.122.17.2/24
Trust Zone
&KDSWHU ,QWHUIDFHV ,QWHUIDFH 6HWWLQJV DQG 2SHUDWLRQDO 0R
3. Interface >> Physical >> Edit (for ethernet1): Enter the following, and then click Save :
IP Address: 0.0.0.0
8/6/2019 Netscreen Ce VPN
69/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
Netmask: 0.0.0.0
Manage IP: 0.0.0.0
Traffic Bandwidth: 0
Zone Name: Trust
4. Interface >> Physical >> Edit (for ethernet3): Enter the following, and then click Save .
IP Address: 0.0.0.0
Netmask: 0.0.0.0Manage IP: 0.0.0.0
Traffic Bandwidth: 0
Zone Name: Untrust
5. Address >> Address (under the New column for the Trust zone): Enter the following and then click OK:
Address Name: Mail ServerIP Address/Domain Name: 209.122.17.249
Netmask: 255.255.255.255
6. Address >> Address (under the New column for the Trust zone): Enter the following and then click OK:
Address Name: FTP Server
IP Address/Domain Name: 209.122.17.250
Netmask: 255.255.255.255
7. Policy >> From Zone: Trust, To Zone: Untrust >> New Policy: Enter the following and then click OK:
Source Address: Any
1. The default port number is 80. Changing this to any number between 1024 and 32,767 is advised for discouraging unauthorized access to the configuration.When logging in to manage the device later, enter the following in the URL field of your Web browser: http://209.122.17.252:5555.
&KDSWHU ,QWHUIDFHV ,QWHUIDFH 6HWWLQJV DQG 2SHUDWLRQDO 0R
Destination Address: Any
Service: Any
8/6/2019 Netscreen Ce VPN
70/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
Action: Permit
8. Policy >> From Zone: Untrust, To Zone: Trust >> New Policy: Enter the following and then click OK:
Source Address: Any
Destination Address: Mail Server
Service: Mail
Action: Permit
9. Policy >> From Zone: Untrust, To Zone: Trust >> New Policy: Enter the following and then click OK:
Source Address: Any
Destination Address: FTP ServerService: FTP
Action: Permit
Note: To get the Mail Server address, it must already exist in the address list. You can create this address by selecting Address >> Address (under the New column for the appropriate zone) and specifying the mail servers name and IP address.
Note: Because PC #1 and PC #2 are not specified in an access policy, they do not need to be added to the address book. The term Any applies to any device connected to the interface in the Trust zone.
&KDSWHU ,QWHUIDFHV ,QWHUIDFH 6HWWLQJV DQG 2SHUDWLRQDO 0R
&/,
1 set vlan1 ip 209 122 17 252
8/6/2019 Netscreen Ce VPN
71/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
1. set vlan1 ip 209.122.17.252
2. set admin port 55552
3. set interface ethernet1 zone trust4. set interface ethernet1 ip 0.0.0.0/05. set interface ethernet3 zone untrust6. set interface ethernet3 ip 0.0.0.0/07. set address trust Mail_Server 209.122.17.249/24
8. set address trust FTP_Server 209.122.17.250/249. set policy from trust to untrust any any any permit10. set policy from untrust to trust any 209.122.17.250/24 mail permit11. set policy from untrust to trust any 209.122.17.249/24 ftp permit12. save
2. When logging in to manage the device later, enter the following in the URL field of your Web browser: http://209.122.17.252:5555
&KDSWHU ,QWHUIDFHV ,QWHUIDFH 6HWWLQJV DQG 2SHUDWLRQDO 0R
1HWZRUN $GGUHVV 7UDQVODWLRQ 0RGHWhen an interface is in Network Address Translation (NAT) mode, the NetScreen device, acting like a layer-3 switch
8/6/2019 Netscreen Ce VPN
72/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
When an interface is in Network Address Translation (NAT) mode, the NetScreen device, acting like a layer 3 switch(or router), translates two components in the header of an outgoing IP packet traversing the firewall across aninterface in NAT mode: its source IP address and source port number. The NetScreen device replaces the source IPaddress of the host that sent the packet with the IP address of the interface of the destination zone. Also, it replacesthe source port number with another random port number generated by the NetScreen device.
When the reply packet arrives at the NetScreen device, the device translates two components in the IP header ofthe incoming packet: the destination address and port number, which are translated back to the original numbers.The packet is then forwarded to its destination.
NAT adds a level of security not provided in Transparent mode: The addresses of hosts connected to the trustedport are never exposed to the network in the Untrust or DMZ zones.
Private AddressSpace
Trust Zone
Untrust Zone
172.16.20.1
172.16.20.2 172.16.20.3 172.16.20.4
172.16.20.5
Trust ZoneInterface
172.16.20.10
Untrust ZoneInterface
209.122.30.10
Internet
&KDSWHU ,QWHUIDFHV ,QWHUIDFH 6HWWLQJV DQG 2SHUDWLRQDO 0R
Also, NAT preserves the use of Internet-routable IP addresses. With only one public, Internet-routable IP addressthat of the interface in the Untrust zonethe LAN in the Trust zone, or any other zone using NAT services, can havea vast number of hosts with private IP addresses. The following IP address ranges are reserved for private IP
8/6/2019 Netscreen Ce VPN
73/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
p g g pnetworks and must not get routed on the Internet:
10.0.0.0 - 10.255.255.255172.16.0.0 - 172.31.255.255192.168.0.0 - 192.168.255.255
A host in a zone sending traffic through an interface in NAT mode can initiate outbound traffic to another zone if anaccess policy permits it, but it cannot receive traffic from another zone unless a Mapped IP (MIP), Virtual IP (VIP), orVPN tunnel is set up for it.
Note: For more about MIPs, see Mapped IP on page 468 . For more about VIPs, see Virtual IP on page 190 .
&KDSWHU ,QWHUIDFHV ,QWHUIDFH 6HWWLQJV DQG 2SHUDWLRQDO 0R
,QWHUIDFH 6HWWLQJVFor NAT mode, define the following interface settings, where and represent numbers in an
8/6/2019 Netscreen Ce VPN
74/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
IP address, represents the numbers in a netmask, represents the number of a VLAN tag, represents the name of a zone, and represents the bandwidth size in kbps:
([DPSOH 1$7 0RGHThe following example illustrates a simple configuration for a LAN with a single subnet in the Trust zone. The LAN isprotected by a NetScreen device in NAT mode. Access policies permit outgoing traffic for all three hosts in the Trustzone and incoming mail for the mail server. The incoming mail is routed to the mail server through a Virtual IPaddress.
Zone Interfaces Settings Zone Subinterfaces
Trust and User-Defined Zones using NAT IP: Netmask: Manage IP*: Traffic Bandwidth:
NAT: (select)
* You can set the manage IP address on a per interface basis. Its primary purpose is to provide an address for accessing a specificdevice when it is in a high availability configuration. You can also use the manage IP address for management purposes when using
the NetScreen device as a single security appliance.
Optional setting for traffic shaping.
Selecting NAT defines the interface mode as NAT. Selecting Route defines the interface mode as Route.
IP: Netmask: VLAN Tag: Zone Name:
NAT : (select)Untrust and DMZ IP:
Netmask: Manage IP *: Traffic Bandwidth :
IP: Netmask: VLAN Tag: Zone Name:
Note: Compare this example with that for Route mode on page 60 .
&KDSWHU ,QWHUIDFHV ,QWHUIDFH 6HWWLQJV DQG 2SHUDWLRQDO 0R
Router200 2 2 1/24
Mail ServerVIP 209.2.2.3
8/6/2019 Netscreen Ce VPN
75/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
:HE8,
1. Admin >> Settings: Enter the following, and then click Apply .
System IP Address: 0.0.0.01. Interface >> Physical >> Edit (for ethernet1): Enter the following, and then click Save :
IP Address: 172.16.10.1
Netmask: 255.255.255.0
Manage IP: 0.0.0.0
Traffic Bandwidth: 0Zone Name: Trust
NAT: 3 (select)
3. Selecting NAT determines that the NetScreen device performs NAT on traffic entering and exiting the Trust zone.
200.2.2.1/24NAT 172.16.10.253
NetScreen Device
Workstation #1172.16.10.20/24 Workstation #2172.16.10.30/24
Internet
Trust ZoneInterface
172.16.10.1/24
Untrust ZoneInterface
200.2.2.2/24
Trust Zone
Untrust Zone
&KDSWHU ,QWHUIDFHV ,QWHUIDFH 6HWWLQJV DQG 2SHUDWLRQDO 0R
2. Interface >> Physical >> Edit (for ethernet3): Enter the following, and then click Save :
IP Address 4: 200.2.2.2
N k 255 255 255 0
8/6/2019 Netscreen Ce VPN
76/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
Netmask: 255.255.255.0
Manage IP: 0.0.0.0
Traffic Bandwidth: 0
Zone Name: Untrust
3. Interface >> Physical >> VIP (for ethernet3) >> New Entry: Enter the following, and then click OK :
Virtual IP Address: 200.2.2.3
4. Interface >> Physical >> VIP (for ethernet3) >> Services: Enter the following, and then click OK :Virtual Port: 25
Service: Mail
Map to IP: 172.16.10.253
5. Policy >> From Zone: Trust, To Zone: Untrust >> New Policy: Enter the following, and then click OK :
Source Address: AnyDestination Address: Any
Service: Any
Action: Permit
6. Policy >> From Zone: Untrust, To Zone: Trust >> New Policy: Enter the following and then click OK :
Source Address: Any
Destination Address: VIP(200.2.2.3)
Service: Mail
Action: Permit
4. If the IP address in the Untrust zone on the NetScreen device is dynamically assigned by an ISP, leave the IP address and netmask fields empty and selectDHCP. If the ISP uses Point-to-Point Protocol over Ethernet, select PPPoE and enter the name and password.
&KDSWHU ,QWHUIDFHV ,QWHUIDFH 6HWWLQJV DQG 2SHUDWLRQDO 0R
&/,
1. set admin sys-ip 0.0.0.0
8/6/2019 Netscreen Ce VPN
77/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
2. set interface ethernet1 zone trust3. set interface ethernet1 ip 172.16.10.1 255.255.255.04. set interface ethernet1 NAT 5
5. set interface ethernet3 zone untrust 6 6. set interface ethernet3 ip 200.2.2.2 255.255.255.07. set interface ethernet3 ip 0.0.0.0 0.0.0.0
8. set vip ethernet3 200.2.2.3 25 mail 172.16.10.2539. set policy from trust to untrust any any any permit10. set policy from untrust to trust any vip 200.2.2.3 mail permit11. save
5. The set interface ethernet nat command determines that the NetScreen device operates in NAT mode.
6. If the IP address in the Untrust zone on the NetScreen device is dynamically assigned by an ISP, use the following command: set interface untrust dhcp .If the ISP uses Point-to-Point Protocol over Ethernet, use the set pppoe and exec pppoe commands. For more information, see the NetScreen CLIReference Guide.
&KDSWHU ,QWHUIDFHV ,QWHUIDFH 6HWWLQJV DQG 2SHUDWLRQDO 0R
5RXWH 0RGHWhen an interface is in Route mode, the NetScreen device routes traffic between different zones without performingNAT th t i th dd d t b i th IP k t h d i h g d it t th
8/6/2019 Netscreen Ce VPN
78/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
NAT; that is, the source address and port number in the IP packet header remain unchanged as it traverses theNetScreen device. Unlike NAT, you do not need to establish Mapped and Virtual IP addresses on an interface inRoute mode to allow inbound sessions to reach hosts. Unlike Transparent mode, the interfaces in the Trust zoneand the interfaces in the Untrust zone are on different subnets.
Instead of applying NAT at the interface level so that all source addresses initiating outgoing traffic get translated tothe IP address of the destination interface, when an interface operates in Route mode, you can perform NATselectively at the policy level. You can determine which network and VPN traffic to route and on which traffic toperform NAT by creating access policies that enable NAT for specified source addresses on either incoming or
Private AddressSpace
Trust Zone
Untrust Zone
212.45.30.1
212.45.30.2 212.45.30.3 212.45.30.4
212.45.30.5
Trust ZoneInterface
212.45.30.10
Untrust ZoneInterface
209.122.30.10
Internet
&KDSWHU ,QWHUIDFHV ,QWHUIDFH 6HWWLQJV DQG 2SHUDWLRQDO 0R
outgoing traffic. For network traffic, you can perform NAT using the IP address or addresses of the destination zoneinterface from a Dynamic IP (DIP) pool, which is in the same subnet as the destination zone interface. For VPNtraffic, you can perform NAT using the destination zone interface IP address or an address from its associated DIPpool or a tunnel interface IP address or an address from its associated DIP pool
8/6/2019 Netscreen Ce VPN
79/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
pool, or a tunnel interface IP address or an address from its associated DIP pool.
3DFNHW )ORZ 6HTXHQFHFor information and examples on packet flow sequence, see Packet Flow Sequence on page 13 .
,QWHUIDFH 6HWWLQJVFor Route mode, define the following interface settings, where and represent numbers inan IP address, represents the numbers in a netmask, represents the number of a VLAN tag, represents the name of a zone, and represents the bandwidth size in kbps:
Note: For more information about configuring policy-based NAT, see Chapter 15 , Policy-Based NAT on page 463 .
Zone Interfaces Settings Zone Subinterfaces
Trust and User-Defined Zones using NAT IP:
Netmask: Manage IP*: Traffic Bandwidth: Route: (select)
* You can set the manage IP address on a per interface basis. Its primary purpose is to provide an address for accessing a specificdevice when it is in a high availability configuration. You can also use the manage IP address for management purposes when usingthe NetScreen device as a single security appliance.
Optional setting for traffic shaping.
Selecting NAT defines the interface mode as NAT. Selecting Route defines the interface mode as Route.
IP:
Netmask: VLAN Tag: Zone Name: Route : (select)
Untrust and DMZ IP: Netmask: Manage IP *:
Traffic Bandwidth :
IP: Netmask: VLAN Tag:
Zone Name:
&KDSWHU ,QWHUIDFHV ,QWHUIDFH 6HWWLQJV DQG 2SHUDWLRQDO 0R
([DPSOH 5RXWH 0RGHIn the previous example, Example: NAT Mode on page 54 , the hosts in the Trust zone LAN have private IPaddresses and a Mapped IP for the mail server In the following example of the same network protected by a
8/6/2019 Netscreen Ce VPN
80/569
1HW6FUHHQ &RQFHSWV ([DPSOHV
addresses and a Mapped IP for the mail server. In the following e
Top Related