Hi
i have one srx and i have to do one configuration of nat, with source and destination to connect 2 firewall with static route and i use this config. some could i tell me it is fine or wath kind of config need, i attached a image and the config
system {
root-authentication {
encrypted-password "$1$MWqB3AIL$rFcjs7TLvtLWs3R.umGjJ/"; ## SECRET-DATA
}
name-server {
208.67.222.222;
208.67.220.220;
}
services {
ssh;
telnet;
xnm-clear-text;
web-management {
http {
interface vlan.0;
}
https {
system-generated-certificate;
interface vlan.0;
}
}
dhcp {
router {
192.168.1.1;
}
pool 192.168.1.0/24 {
address-range low 192.168.1.2 high 192.168.1.254;
}
propagate-settings fe-0/0/0.0;
}
}
syslog {
archive size 100k files 3;
user * {
any emergency;
}
file messages {
any critical;
authorization info;
}
file interactive-commands {
interactive-commands error;
}
}
max-configurations-on-flash 5;
max-configuration-rollbacks 5;
license {
autoupdate {
url https://ae1.juniper.net/junos/key_retrieval;
}
}
}
interfaces {
fe-0/0/0 {
unit 0 {
family inet {
address 172.16.12.121/24;
}
}
}
fe-0/0/2 {
unit 0 {
family inet {
address 10.10.20.2/16;
}
}
}
fe-0/0/3 {
unit 0 {
family inet {
address 10.10.30.2/16;
}
}
}
fe-0/0/5 {
unit 0 {
family inet {
address 192.168.3.1/24;
}
}
}
}
routing-options {
static {
route 0.0.0.0/0 next-hop 100.10.20.2;
}
}
protocols {
stp;
}
security {
nat {
source {
rule-set R2 {
from zone outside;
to zone inside;
rule R2-1 {
match {
source-address 10.10.20.0/16;
}
then {
source-nat {
interface;
}
}
}
}
rule-set R1 {
from zone inside;
to zone outside;
rule R1-1 {
match {
source-address 10.10.30.0/16;
}
then {
source-nat {
interface;
}
}
}
}
}
}
policies {
from-zone inside to-zone outside {
policy default {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}
}
}
from-zone outside to-zone inside {
policy default {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}
}
}
}
zones {
security-zone outside {
interfaces {
fe-0/0/2.0 {
host-inbound-traffic {
system-services {
all;
}
}
}
}
}
security-zone inside {
interfaces {
fe-0/0/3.0 {
host-inbound-traffic {
system-services {
all;
}
}
}
}
}
}
}