In this example, you configure devices for typical Intranet traffic flowing between private WAN interfaces. In this case, end-to-end forwarding is packet-based and the traffic bypasses flow-based forwarding completely.
Figure 15 shows a network topology that is used in this example.
Figure 15: Intranet Traffic Using End-to-End Packet-Based Services
Your company’s branch offices are connected with each other via private WAN. For this internal traffic, packet forwarding is required because security is not an issue. Hence for this traffic, you decide to configure selective stateless packet-based services to bypass flow-based forwarding. The remaining traffic, to and from the Internet, uses flow-based forwarding.
To bypass flow-based processing on Internal traffic, you configure interfaces on devices R0, R1, R2, and R3 used in this configuration. Next, configure the following on device R1:
In this example, you configure the filter bypass-flow-filter with terms bypass-flow-term-1 and bypass-flow-term-2 that match the traffic between internal interfaces ge-0/0/1 and ge-0/0/2 and contain the packet-mode action modifier. You configure the next term accept-rest to match the remaining traffic and not contain the packet-mode action modifier. Next, you apply this filter on internal interfaces (not on the external interface). As a result, all internal traffic bypasses flow-based forwarding and the traffic to and from the Internet does not bypass flow-based forwarding.
This section includes the following topics:
To configure selective stateless packet-based services for end-to-end packet-based forwarding:
On device R0:
On device R1:
- user@R1# set interfaces description “Internal
1” ge-0/0/1 unit 0 family inet address 10.1.1.1/24
- user@R1# set interfaces description “Internal
2” ge-0/0/2 unit 0 family inet address 10.2.1.1/24
- user@R1# set interfaces description “Internet”
ge-0/0/3 unit 0 family inet address 1.1.1.1/30
On device R2:
On device R3:
On device R0:
On device R1:
On device R2:
On device R3:
- user@R1# set security policies from-zone trust to-zone
untrust policy Internet-traffic match source-address any destination-address
any application any
- user@R1# set security policies from-zone trust to-zone
untrust policy Internet-traffic then permit
- user@R1# set security policies from-zone untrust to-zone
trust policy Incoming-traffic match source-address any destination-address
any application any
- user@R1# set security policies from-zone untrust to-zone
trust policy Incoming-traffic then permit
- user@R1# set security policies from-zone trust to-zone
trust policy Intrazone-traffic match source-address any destination-address
any application any
- user@R1# set security policies from-zone trust to-zone
trust policy Intrazone-traffic then permit
- user@R1# set firewall family inet filter bypass-flow-filter
term bypass-flow-term-1 from source-address 10.1.1.0/24
- user@R1# set firewall family inet filter bypass-flow-filter
term bypass-flow-term–1 from destination-address 10.2.1.0/24
- user@R1# set firewall family inet filter bypass-flow-filter
term bypass-flow-term-1 then packet-mode
- user@R1# set firewall family inet filter bypass-flow-filter
term bypass-flow-term-2 from source-address 10.2.1.0/24
- user@R1# set firewall family inet filter bypass-flow-filter
term bypass-flow-term-2 from destination-address 10.1.1.0/24
- user@R1# set firewall family inet filter bypass-flow-filter
term bypass-flow-term-2 then packet-mode
For more information about the configuration statements used in this example, see the JUNOS Policy Framework Configuration Guide.