Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Example: Controlling Management Access on SRX Series Devices

    This example shows how to control management access on SRX Series devices.

    Requirements

    No special configuration beyond device initialization is required before configuring this feature.

    Overview

    By default, any host on the trusted interface can manage a security device. To limit the IP addresses that can manage a device, you can configure a firewall filter to deny all, with the exception of the IP address or addresses to which you want to grant management access. This example shows how to limit management access to a specific IP addresses to allow it to manage SRX Series devices.

    Configuration

    Configuring an IP Address List to Restrict Management Access to a Device

    CLI Quick Configuration

    To quickly configure this example, copy the following commands, paste them into a text file, remove any line breaks, change any details necessary to match your network configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy level.

    set policy-options prefix-list manager-ip 192.168.4.254/32set policy-options prefix-list manager-ip 10.0.0.0/8set firewall filter manager-ip term block_non_manager from source-address 0.0.0.0/0set firewall filter manager-ip term block_non_manager from source-prefix-list manager-ip exceptset firewall filter manager-ip term block_non_manager from protocol tcpset firewall filter manager-ip term block_non_manager from destination-port sshset firewall filter manager-ip term block_non_manager from destination-port httpsset firewall filter manager-ip term block_non_manager from destination-port telnetset firewall filter manager-ip term block_non_manager from destination-port httpset firewall filter manager-ip term block_non_manager then discardset firewall filter manager-ip term accept_everything_else then acceptset interfaces lo0 unit 0 family inet filter input manager-ip

    Step-by-Step Procedure

    The following example requires you to navigate various levels in the configuration hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration Mode.

    1. Define a set of host addresses, called "manager-ip",that are allowed to manage the device.
      [edit policy-options]user@host# set prefix-list manager-ip 192.168.4.254/32user@host# set prefix-list manager-ip 10.0.0.0/8

      Note: The configured list is referenced in the actual filter, where you can change your defined set of addresses.

    2. Configure a firewall filter to deny traffic from all IP addresses except the IP addresses defined in the "manager-ip" list. Management traffic that uses any of the listed destination ports is rejected when the traffic comes from an address in the list.
      [edit firewall filter]user@host# set manager-ip term block_non_manager from source-address 0.0.0.0/0user@host# set manager-ip term block_non_manager from source-prefix-list manager-ip exceptuser@host# set manager-ip term block_non_manager from protocol tcpuser@host# set manager-ip term block_non_manager from destination-port sshuser@host# set manager-ip term block_non_manager from destination-port httpsuser@host# set manager-ip term block_non_manager from destination-port telnetuser@host# set manager-ip term block_non_manager from destination-port httpuser@host# set manager-ip term block_non_manager then discarduser@host# set manager-ip term accept_everything_else then accept
    3. Apply stateless firewall filters to the loopback interface to filter the packets originating from the hosts to which you are granting management access.
      [edit interfaces lo0 unit 0 ]user@host# set family inet filter input manager-ip

      Note: This configuration applies to traffic that terminates at the device. For traffic that terminates at the device interface (such as IPsec, OSPF, RIP, or BGP), you must also include the management IP addresses in the manager-ip prefix-list.

    Results

    From configuration mode, confirm your configuration by entering show configuration command. If the output does not display the intended configuration, repeat the configuration instructions in this example to correct it.

    user@host# show configuration policy-optionsprefix-list manager-ip {10.0.0.0/8;192.168.4.254/32;}
    user@host# show configuration firewallfilter manager-ip {term block_non_manager {from {source-address {0.0.0.0/0;}source-prefix-list {manager-ip except;}protocol tcp;destination-port [ ssh https telnet http ];}then {discard;}}term accept_everything_else {then accept;}}
    user@host# show configuration interfaces
    lo0 {unit 0 {family inet {filter {input manager-ip;}}}}
    user@host# show configuration interfaces lo0
    unit 0 {family inet {filter {input manager-ip;}}}

    If you are done configuring the device, enter commit from configuration mode.

    Verification

    Confirm that the configuration is working properly.

    Verifying Interfaces

    Purpose

    Verify if the interfaces are configured correctly.

    Action

    From operational mode, enter the following commands:

    • show policy-options
    • show firewall
    • show interfaces

    Modified: 2016-07-01

    Supported Platforms

    Modified: 2016-07-01