EasyManua.ls Logo

Juniper SRX550 - Table 54: Security Policies; Table 55: NAT Rule

Juniper SRX550
246 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table 53: Default Interface Configuration for the Services
Gateway (continued)
Address
DHCP
State
Security
ZoneConnectorInterfacePort Label
192.168.4.1/24ServerTrustRJ-45ge-0/0/40/4
192.168.5.1/24ServerTrustRJ-45ge-0/0/50/5
No default configurationge-0/0/60/6
ge-0/0/70/7
ge-0/0/80/8
ge-0/0/90/9
NOTE: If chassis clustering is enabled, we recommend using the port labeled
0/0 port as the management port (fxp0) and using the 0/1 port (if used) as
the control port (fxp1). The fxp0 and fxp1 ports are created only when chassis
clustering is enabled. You can use the other ports as fabric ports.
By default, the security policies and NAT rules in Table 54 on page 126 and
Table 55 on page 126 are created on the SRX Series security policies.
Table 54: Security Policies
Policy ActionDestination ZoneSource Zone
PermitUntrustTrust
Table 55: NAT Rule
NAT ActionDestination ZoneSource Zone
Source NAT to untrust zone
interface
UntrustTrust
For example, a common default firewall configuration includes the following assumptions:
The protected network is connected to the interfaces ge-0/0/1 (port 0/1) through
interface ge-0/0/5 (port 0/5) in the trust zone.
Connectivity to the Internet is through the interface ge-0/0/0 (port 0/0) in the untrust
zone.
The IP address of the ge-0/0/0 interface is assigned through DHCP.
Copyright © 2016, Juniper Networks, Inc.126
SRX550 High Memory Services Gateway Hardware Guide

Table of Contents

Other manuals for Juniper SRX550

Related product manuals