Dell PowerConnect J-SRX100 Hardware Guide - Page 89

Con basic security zones and bind them to traffic interfaces.

Page 89 highlights

Chapter 13: Performing Initial Software Configuration on the J-SRX100 Services Gateway 7. Commit the configuration to activate it on the device. [edit] root@# commit 8. Log in as the administrative user you configured in Step 6. 9. Configure the name of the device. If the name includes spaces, enclose the name in quotation marks (" "). configure [edit] admin@# set system host-name host-name 10. Configure the traffic interface. [edit] admin@# set interfaces fe-0/0/1 unit 0 family inet address address/prefix-length 11. Configure the default route. [edit] admin@# set routing-options static route 0.0.0.0/0 next-hop gateway 12. Configure basic security zones and bind them to traffic interfaces. [edit] admin@# set security zones security-zone untrust interfaces fe-0/0/1 13. Configure basic security policies. [edit] admin@# set security policies from-zone trust to-zone untrust policy policy-name match source-address any destination-address any application any root@# set security policies from-zone trust to-zone untrust policy policy-name then permit 14. Create a NAT rule for source translation of all Internet bound traffic. [edit] admin@# set security nat source rule-set interface-nat from zone trust admin@# set security nat source rule-set interface-nat to zone untrust admin@# set security nat source rule-set interface-nat rule rule1 match source-address 0.0.0.0/0 destination-address 0.0.0.0/0 admin@# set security nat source rule-set interface-nat rule rule1 then source-nat interface 15. Check the configuration for validity. [edit] admin@# commit check configuration check succeeds 16. Commit the configuration to activate it on the device. [edit] admin@# commit commit complete 17. Optionally, display the configuration to verify that it is correct. [edit] user@host# show 75

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158

7.
Commit the configuration to activate it on the device.
[edit]
root@#
commit
8.
Log in as the administrative user you configured in Step 6.
9.
Configure the name of the device. If the name includes spaces, enclose the name in
quotation marks (“ ”).
configure
[edit]
admin@#
set system host-name
host-name
10.
Configure the traffic interface.
[edit]
admin@#
set interfaces fe-0/0/1 unit 0 family inet address
address/prefix-length
11.
Configure the default route.
[edit]
admin@#
set routing-options static route 0.0.0.0/0 next-hop
gateway
12.
Configure basic security zones and bind them to traffic interfaces.
[edit]
admin@#
set security zones security-zone untrust interfaces fe-0/0/1
13.
Configure basic security policies.
[edit]
admin@#
set security policies from-zone trust to-zone untrust policy
policy-name
match source-address any destination-address any application any
root@#
set security policies from-zone trust to-zone untrust policy
policy-name
then
permit
14.
Create a NAT rule for source translation of all Internet bound traffic.
[edit]
admin@#
set security nat source rule-set interface-nat from zone trust
admin@#
set security nat source rule-set interface-nat to zone untrust
admin@#
set security nat source rule-set interface-nat rule rule1 match source-address
0.0.0.0/0 destination-address 0.0.0.0/0
admin@#
set security nat source rule-set interface-nat rule rule1 then source-nat
interface
15.
Check the configuration for validity.
[edit]
admin@#
commit check
configuration check succeeds
16.
Commit the configuration to activate it on the device.
[edit]
admin@#
commit
commit complete
17.
Optionally, display the configuration to verify that it is correct.
[edit]
user@host#
show
75
Chapter 13: Performing Initial Software Configuration on the J-SRX100 Services Gateway