Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

Allowing SSH and Ping to a Public Subnet

date_range 27-May-23

Allowing SSH and Ping to a Public Subnet

In this topic, learn how to configure the IBM Cloud™ Juniper vSRX Virtual Firewall Standard with a new interface, zone, and address-book. As the default action for all traffic is to drop, this guide shows how to set up traffic flows that allow all traffic within the new zone, all traffic from the new zone to the internet, and allow only SSH and ping from the internet to one subnet on the new VLAN.

In this example, the values used are - Public vlan: 1523 Public subnet: 169.47.211.152/29.

Note:

This step-by-step assumes that a high-availability deployment of the vSRX Virtual Firewall, with a single Public VLAN and subnet.

Follow the steps listed to configure the service:

Task

Description

Create a new interface, zone, and address-book subnet

Create the tagged interface unit and security zone for the new VLAN.

Creating your new traffic flows

Create the new traffic flows to allow inbound pinging and SSH.

Confirming the output and committing the changes

Check the output to confirm what will be committed to the active configuration.

footer-navigation