screen /dev/ttyUSB0
root@hostname% whoami
--- JUNOS 11.2R4.3 built 2011-11-24 08:11:51 UTC
root
root@hostname% cli
root@hostname>
> show configuration system | display set
set system root-authentication encrypted-password ""
set system login user admin class super-user
set system login user admin authentication encrypted-password ""#run ping ya.rushow configureshow show configure services
services {
ssh;
telnet;
xnm-clear-text;
web-management {
management-url my-jweb;
http {
interface vlan.0;
}
https {
system-generated-certificate;
}
}
dhcp {
router {
192.168.8.1;
}
pool 192.168.8.0/24 {
address-range low 192.168.8.100 high 192.168.8.200;
}
propagate-settings vlan;
}
} show system services | display set
set system services ssh
set system services telnet
set system services xnm-clear-text
set system services web-management management-url my-jweb
set system services web-management http interface vlan.0
set system services web-management https system-generated-certificate
set system services dhcp router 192.168.8.1
set system services dhcp pool 192.168.8.0/24 address-range low 192.168.8.100
set system services dhcp pool 192.168.8.0/24 address-range high 192.168.8.200
set system services dhcp propagate-settings vlan
root @ trans-el-service # show security nat proxy-arp
interface vlan.0 {
address {
192.168.8.2/32;
192.168.8.201/32 to 192.168.8.210/32;
}
}
load merge terminal relativeset interfaces fe-0/0/1 unit 0 family inet address 11.11.187.104/25 primaryset interfaces fe-0/0/2 unit 0 family ethernet-switching vlan members vlan-trustset vlans vlan-trust vlan-id 3
set vlans vlan-trust l3-interface vlan.0
set interfaces vlan unit 0 family inet address 192.168.8.1/24show routing-options | display set
set routing-options static route 0.0.0.0/0 next-hop 11.11.187.1set system name-server 8.8.8.8
set system name-server 8.8.4.4 security-zone trust {
host-inbound-traffic {
system-services {
all;
}
protocols {
all;
}
}
interfaces {
vlan.0;
}
}
security-zone untrust {
screen untrust-screen;
host-inbound-traffic {
system-services {
ssh;
ike;
https;
ping;
}
}
interfaces {
fe-0/0 / 0.0 {
host-inbound-traffic {
system-services {
dhcp;
tftp;
}
}
}
fe-0/0 / 1.0;
}
}
show security policies
from-zone trust to-zone untrust {
policy trust-to-untrust {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}
}
}
source {
rule-set trust-to-untrust {
from zone trust;
to zone untrust;
rule source-nat-rule {
match {
source-address 0.0.0.0/0;
}
then {
source-nat {
interface;
}
}
}
}
Source: https://habr.com/ru/post/144218/
All Articles