设为首页 收藏本站
查看: 2189|回复: 0

[经验分享] juniper巡检命令行

[复制链接]

尚未签到

发表于 2015-11-5 13:43:58 | 显示全部楼层 |阅读模式
1. CPU利用率核查 show chassis routing-engine
2. MEM利用率核查 show chassis routing-engine
3. OSPF邻居关系核查 show ospf neighbor
4. LDP端口状态检查 show ldp interface
5. ISIS邻居关系检查 show isis adjacency
6. BGP邻居关系检查 show bgp neighbor
7. HSRP信息检查 show vrrp extensive
8. 生成树STP信息检查
9. 电源状态核查 show chassis environment pem
10. 风扇状态核查 show chassis environment
11. 单板告警核查 show chassis alarms
12. 单板状态核查 show chassis fpc/show chassis fpc pic-status
13. 单板温度核查 show chassis fpc/show chassis fpc pic-status
14. 单板固件版本信息检查 show chassis fpc detail
15. 接口配置核查 show configuration interfaces
16. 接口描述规范性核查 show interface descriptions
17. AAA认证检查 show configuration system
18. 引擎板冗余状态检查 show configuration chassis redundancy
19. NTP状态核查 show ntp associations
20. SYSLOG配置指向检查 show configuration system syslog
21. TRAP配置指向检查
22. Telnet安全登录配置检查 show configuration system login
23. DNS配置检查 show configuration system name-server
  24. 补丁版本核查 show version
  
1.  安全域(zone)和接口1.1接口配置 由于在内网启用了3个vlan,而且每个vlan的网关都在防火墙上,所以在内网接口启用了tagging ,ge-0/0/1为内网接口,划分出3个子接口,子接口1对应vlan10(192.68.100.0/24网段),子接口2对应vlan2(192.168.1.0/24网段),子接口3对应vlan3(172.16.1.0/24网段)。 Ge-0/0/0为外网接口,无须启用tagging。 set interfaces ge-0/0/1 vlan-tagging   set interfaces ge-0/0/1 unit 1 vlan-id 10set interfaces ge-0/0/1 unit 1 family inet address 192.168.100.1/24set interfaces ge-0/0/1 unit 2 vlan-id 2set interfaces ge-0/0/1 unit 2 family inet address 192.168.1.1/24set interfaces ge-0/0/1 unit 3 vlan-id 3set interfaces ge-0/0/1 unit 3 family inet address 172.16.1.1/24set interfaces ge-0/0/2 unit 0 family inet address 192.168.2.1/24set interfaces ge-0/0/3 vlan-tagging   set interfaces ge-0/0/3 unit 1 vlan-id 4set interfaces ge-0/0/3 unit 1 family inet address 192.168.4.1/24set interfaces ge-0/0/3 unit 2 vlan-id 5set interfaces ge-0/0/3 unit 2 family inet address 192.168.5.1/24set interfaces ge-0/0/0 unit 0 family inet address 113.106.95.115/28 1.2创建安全zone 根据需要,内网划分了3个zone,trust为内部员工所在zone(192.168.100.0/24),server为服务器所在zone(192.168.1.0/24),guest为外来人员所在zone(172.16.1.0/24)。set security zones security-zone trust host-inbound-traffic system-services allset security zones security-zone trust host-inbound-traffic protocols allset security zones security-zone untrust screen untrust-screenset security zones security-zone server host-inbound-traffic system-services allset security zones security-zone server host-inbound-traffic protocols allset security zones security-zone guest host-inbound-traffic system-services allset security zones security-zone guest host-inbound-traffic protocols all 1.3将相应接口划入到对应的zone里,并配置接口的管理方式set security zones security-zone trust interfaces ge-0/0/2.0 host-inbound-traffic system-services dhcpset security zones security-zone trust interfaces ge-0/0/2.0 host-inbound-traffic system-services httpset security zones security-zone trust interfaces ge-0/0/2.0 host-inbound-traffic system-services pingset security zones security-zone trust interfaces ge-0/0/2.0 host-inbound-traffic system-services telnetset security zones security-zone trust interfaces ge-0/0/1.1 host-inbound-traffic system-services dhcpset security zones security-zone trust interfaces ge-0/0/1.1 host-inbound-traffic system-services pingset security zones security-zone trust interfaces ge-0/0/1.1 host-inbound-traffic system-services telnetset security zones security-zone trust interfaces ge-0/0/1.1 host-inbound-traffic system-services http set security zones security-zone untrust interfaces ge-0/0/0.0 host-inbound-traffic system-services dhcpset security zones security-zone untrust interfaces ge-0/0/0.0 host-inbound-traffic system-services pingset security zones security-zone untrust interfaces ge-0/0/0.0 host-inbound-traffic system-services httpset security zones security-zone untrust interfaces ge-0/0/0.0 host-inbound-traffic system-services httpsset security zones security-zone untrust interfaces ge-0/0/0.0 host-inbound-traffic system-services sshset security zones security-zone untrust interfaces ge-0/0/0.0 host-inbound-traffic system-services telnet set security zones security-zone server interfaces ge-0/0/1.2 host-inbound-traffic system-services dhcpset security zones security-zone server interfaces ge-0/0/1.2 host-inbound-traffic system-services pingset security zones security-zone server interfaces ge-0/0/1.2 host-inbound-traffic system-services telnetset security zones security-zone server interfaces ge-0/0/1.2 host-inbound-traffic system-services http set security zones security-zone guest interfaces ge-0/0/1.3 host-inbound-traffic system-services dhcp2 安全策略设置每一个安全zone包含一个address book。在两个zone之间建立policys之前必须定义zone’s的address book的地址。然后再在policys里调用该address book。 2.1 设置地址池(address books)set security zones security-zone server address-book address server250 192.168.1.250/32set security zones security-zone server address-book address server249 192.168.1.249/32set security zones security-zone server address-book address server248 192.168.1.248/32   2.2设置应用服务(application)此次实施中,无须新建应用,调用系统默认的SSH应用即可(junos-ssh)2.3 安全策略(security policy) 目前定义的规则如下:内网用户区域(Trust)、服务器区域(server)、外来人员区域(guest)访问外网区域(untrust)是允许访问的; 内网用户区域(Trust)和服务器区域(server)之间互相访问是允许的; 外网区域(untrust)访问服务器区域(server)的3台服务器(192.168.1.248 – 250)的SSH应用是允许的。 此外,防火墙默认开启了一条允许Trust 到 Trust 访问的策略。 而除此以外的策略防火墙默认是禁止的,也就是说其他数据流将被阻止访问。 允许内网用户区域(Trust)访问外网区域(untrust);set security policies from-zone trust to-zone untrust policy trust-to-untrust match source-address anyset security policies from-zone trust to-zone untrust policy trust-to-untrust match destination-address anyset security policies from-zone trust to-zone untrust policy trust-to-untrust match application anyset security policies from-zone trust to-zone untrust policy trust-to-untrust then permit         允许服务器区域(server)访问外网区域(untrust);set security policies from-zone server to-zone untrust policy server-to-untrust match source-address anyset security policies from-zone server to-zone untrust policy server-to-untrust match destination-address anyset security policies from-zone server to-zone untrust policy server-to-untrust match application anyset security policies from-zone server to-zone untrust policy server-to-untrust then permit 允许外来人员区域(guest)访问外网区域(untrust);set security policies from-zone guest to-zone untrust policy guest-to-untrust match source-address anyset security policies from-zone guest to-zone untrust policy guest-to-untrust match destination-address anyset security policies from-zone guest to-zone untrust policy guest-to-untrust match application anyset security policies from-zone guest to-zone untrust policy guest-to-untrust then permit 允许内网用户区域(Trust)和服务器区域(server)之间互相访问set security policies from-zone trust to-zone server policy trust-to-server match source-address anyset security policies from-zone trust to-zone server policy trust-to-server match destination-address anyset security policies from-zone trust to-zone server policy trust-to-server match application anyset security policies from-zone trust to-zone server policy trust-to-server then permitset security policies from-zone server to-zone trust policy server-to-trust match source-address anyset security policies from-zone server to-zone trust policy server-to-trust match destination-address anyset security policies from-zone server to-zone trust policy server-to-trust match application anyset security policies from-zone server to-zone trust policy server-to-trust then permit 允许外网区域(untrust)访问服务器区域(server)的3台服务器(192.168.1.248 – 250)的SSH应用。set security policies from-zone untrust to-zone server policy untrust-to-server match source-address anyset security policies from-zone untrust to-zone server policy untrust-to-server match destination-address server250set security policies from-zone untrust to-zone server policy untrust-to-server match destination-address server249set security policies from-zone untrust to-zone server policy untrust-to-server match destination-address server248set security policies from-zone untrust to-zone server policy untrust-to-server match application junos-sshset security policies from-zone untrust to-zone server policy untrust-to-server then permit     3 NAT设置3.1源NAT (Source NAT)当内网服务器访问外网时,需要将原地址做NAT,一般为了节省公网地址考虑,这个NAT地址使用外网接口地址,因此也叫做Interface NAT 对于Trust zone(内部员工区域)我们定义了源NAT的规则trust-to-untrust,使所有来自trust zone (192.168.100.0/24)到 untrust zone(外网区域)的数据包做源NAT,将其源地址映射为公网接口地址。set security nat source rule-set trust-to-untrust from zone trustset security nat source rule-set trust-to-untrust to zone untrustset security nat source rule-set trust-to-untrust rule source-nat-rule match source-address 192.168.100.0/24set security nat source rule-set trust-to-untrust rule source-nat-rule then source-nat interface 对于server zone(服务器区域)我们定义了源NAT的规则server-to-untrust,使所有来自server zone(服务器区域)到 untrust zone(外网区域)的数据包做源NAT,将其源地址映射为公网接口地址set security nat source rule-set server-to-untrust from zone serverset security nat source rule-set server-to-untrust to zone untrustset security nat source rule-set server-to-untrust rule server-source-nat-rule match source-address 192.168.1.0/24set security nat source rule-set server-to-untrust rule server-source-nat-rule then source-nat interface 对于guest zone(外来人员区域)我们定义了源NAT的规则guest-to-untrust,使所有来自guest zone(外来人员区域)到 untrust zone(外网区域)的数据包做源NAT,将其源地址映射为公网接口地址 set security nat source rule-set guest-to-untrust from zone guestset security nat source rule-set guest-to-untrust to zone untrustset security nat source rule-set guest-to-untrust rule guest-source-nat-rule match source-address 172.16.1.0/24set security nat source rule-set guest-to-untrust rule guest-source-nat-rule then source-nat interface3.2目的NAT(Destination NAT)此次项目中,需要在外网访问内网服务器的SSH应用,所以就使用到了Destination NAT,也就是端口映射。我们将113.106.95.114的 22端口映射到内网的192.168.1.250 的22端口;将113.106.95.114的 202端口映射到内网的192.168.1.249 的22端口;113.106.95.114的 221端口映射到内网的192.168.1.248 的22端口. 定义地址池(address book)设置地址池,也就是映射后内网服务器的IP地址和端口,在此项目中,目前设置了3个,分别名为:250、249、248.set security nat destination pool 250 address 192.168.1.250/32set security nat destination pool 250 address port 22set security nat destination pool 249 address 192.168.1.249/32set security nat destination pool 249 address port 22set security nat destination pool 248 address 192.168.1.248/32set security nat destination pool 248 address port 22定义规则(rule)设置Destination NAT的规则,设置了3个NAT规则,分别名为250、249、248: set security nat destination rule-set 1 from zone untrust     (定义来自哪个区域)set security nat destination rule-set 1 rule 250 match source-address 0.0.0.0/0   (匹配原地址段,0.0.0.0/0表示不限制源地址)set security nat destination rule-set 1 rule 250 match destination-address 113.106.95.114/32(匹配目的地址,此项目中,我们使用了地址113.106.95.114)set security nat destination rule-set 1 rule 250 match destination-port 22(匹配目标端口为22)set security nat destination rule-set 1 rule 250 then destination-nat pool 250(当匹配了以上条件后,执行Destination NAT规则,将访问113.106.95.114的22端口的数据包的映射到地址池250, 即将目的地址映射为192.168.1.250,目标端口映射为22)  另外2个规则和 规则250一样set security nat destination rule-set 1 rule 249 match source-address 0.0.0.0/0set security nat destination rule-set 1 rule 249 match destination-address 113.106.95.114/32set security nat destination rule-set 1 rule 249 match destination-port 220set security nat destination rule-set 1 rule 249 then destination-nat pool 249 set security nat destination rule-set 1 rule 248 match source-address 0.0.0.0/0set security nat destination rule-set 1 rule 248 match destination-address 113.106.95.114/32set security nat destination rule-set 1 rule 248 match destination-port 221set security nat destination rule-set 1 rule 248 then destination-nat pool 248  定义ARP 代理(arp-proxy)set security nat proxy-arp interface ge-0/0/0.0 address 113.106.95.114/32为了使外网访问113.106.95.114时,能够到达防火墙,必须使用ARP代理,将113.106.95.114绑定在外网接口ge-0/0/0上。 定义外网区域(untrust)到服务器区域(server)的策略此策略在2.3 节已经设置了,就无须再设置。
  

运维网声明 1、欢迎大家加入本站运维交流群:群②:261659950 群⑤:202807635 群⑦870801961 群⑧679858003
2、本站所有主题由该帖子作者发表,该帖子作者与运维网享有帖子相关版权
3、所有作品的著作权均归原作者享有,请您和我们一样尊重他人的著作权等合法权益。如果您对作品感到满意,请购买正版
4、禁止制作、复制、发布和传播具有反动、淫秽、色情、暴力、凶杀等内容的信息,一经发现立即删除。若您因此触犯法律,一切后果自负,我们对此不承担任何责任
5、所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其内容的准确性、可靠性、正当性、安全性、合法性等负责,亦不承担任何法律责任
6、所有作品仅供您个人学习、研究或欣赏,不得用于商业或者其他用途,否则,一切后果均由您自己承担,我们对此不承担任何法律责任
7、如涉及侵犯版权等问题,请您及时通知我们,我们将立即采取措施予以解决
8、联系人Email:admin@iyunv.com 网址:www.yunweiku.com

所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其承担任何法律责任,如涉及侵犯版权等问题,请您及时通知我们,我们将立即处理,联系人Email:kefu@iyunv.com,QQ:1061981298 本贴地址:https://www.yunweiku.com/thread-135470-1-1.html 上篇帖子: 如何得到juniper的 下篇帖子: juniper SRX dhcp 设置
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

扫码加入运维网微信交流群X

扫码加入运维网微信交流群

扫描二维码加入运维网微信交流群,最新一手资源尽在官方微信交流群!快快加入我们吧...

扫描微信二维码查看详情

客服E-mail:kefu@iyunv.com 客服QQ:1061981298


QQ群⑦:运维网交流群⑦ QQ群⑧:运维网交流群⑧ k8s群:运维网kubernetes交流群


提醒:禁止发布任何违反国家法律、法规的言论与图片等内容;本站内容均来自个人观点与网络等信息,非本站认同之观点.


本站大部分资源是网友从网上搜集分享而来,其版权均归原作者及其网站所有,我们尊重他人的合法权益,如有内容侵犯您的合法权益,请及时与我们联系进行核实删除!



合作伙伴: 青云cloud

快速回复 返回顶部 返回列表