Quantcast
Channel: SRX Services Gateway topics
Viewing all articles
Browse latest Browse all 3959

Unable to HTTPS to the webgui thru a VPN st0

$
0
0

SRX-100 at our remote site.

When I try to HTTPS://192.168.203.1, I get the following error:

Access Error: 401 -- Unauthorized

Interface is not authorized for HTTP access

 

I am at the corporate office. We have the st0 up, and I can ssh.

 

 

set version 12.1X44-D35.5
set system host-name vpnloaner03
set system domain-name mass.com
set system time-zone EST
set system root-authentication encrypted-password ""
set system name-server 10.10.10.10
set system name-server 10.20.10.10
set system name-server 208.67.222.222
set system name-server 208.67.220.220
set system name-resolution no-resolve-on-input
set system login user admin full-name Administrator
set system login user admin uid 2000
set system login user admin class super-user
set system login user admin authentication encrypted-password ""
set system services ssh max-sessions-per-connection 32
set system services telnet
set system services netconf ssh
set system services web-management http interface vlan.1
set system services web-management https system-generated-certificate
set system services web-management https interface vlan.1
set system services web-management https interface fe-0/0/0.0
set system services web-management session idle-timeout 60
set system services dhcp option 161 string wyse.mass.com
set system services dhcp option 186 string wyse.mass.com
set system services dhcp pool 192.168.203.0/24 address-range low 192.168.203.50
set system services dhcp pool 192.168.203.0/24 address-range high 192.168.203.249
set system services dhcp pool 192.168.203.0/24 router 192.168.203.1
set system services dhcp propagate-settings fe-0/0/0
set system syslog archive size 100k
set system syslog archive files 3
set system syslog user * any emergency
set system syslog file messages any critical
set system syslog file messages authorization info
set system syslog file interactive-commands interactive-commands error
set system syslog file default-log-messages any info
set system syslog file default-log-messages match "(requested 'commit' operation)|(copying configuration to juniper.save)|(commit complete)|ifAdminStatus|(FRU power)|(FRU removal)|(FRU insertion)|(link UP)|transitioned|Transferred|transfer-file|(license add)|(license delete)|(package -X update)|(package -X delete)|(FRU Online)|(FRU Offline)|(plugged in)|(unplugged)|GRES|(AIS_DATA_AVAILABLE)"
set system syslog file default-log-messages structured-data
set system max-configurations-on-flash 5
set system max-configuration-rollbacks 5
set system license autoupdate url https://ae1.juniper.net/junos/key_retrieval
set system ntp server us.ntp.pool.org
set interfaces fe-0/0/0 unit 0 family inet dhcp
set interfaces fe-0/0/1 unit 0 family ethernet-switching vlan members vlan1
set interfaces fe-0/0/2 unit 0 family ethernet-switching vlan members vlan1
set interfaces fe-0/0/3 unit 0 family ethernet-switching vlan members vlan1
set interfaces fe-0/0/4 unit 0 family ethernet-switching vlan members vlan1
set interfaces fe-0/0/5 unit 0 family ethernet-switching vlan members vlan1
set interfaces fe-0/0/6 unit 0 family ethernet-switching vlan members vlan1
set interfaces fe-0/0/7 unit 0 family ethernet-switching vlan members vlan1
set interfaces st0 unit 0 family inet address 192.168.200.203/24
set interfaces vlan unit 1 family inet address 192.168.203.1/24
set snmp trap-group space targets 10.10.9.6
set routing-options static route 192.168.200.0/24 next-hop st0.0
set routing-options static route 10.0.0.0/8 next-hop st0.0
set routing-options static route 10.10.13.30/32 next-hop st0.0
set protocols stp
set security ike policy ike_pol_vpnloaner03 mode aggressive
set security ike policy ike_pol_vpnloaner03 proposal-set standard
set security ike policy ike_pol_vpnloaner03 pre-shared-key ascii-text "$9$5QnCtpBESe0BclKWdVqmPfFn/Ct1Ec"
set security ike gateway gw_vpnloaner03 ike-policy ike_pol_vpnloaner03
set security ike gateway gw_vpnloaner03 address 75.112.50.226
set security ike gateway gw_vpnloaner03 local-identity hostname vpnloaner03
set security ike gateway gw_vpnloaner03 external-interface fe-0/0/0.0
set security ipsec policy ipsec_pol_vpnloaner03 perfect-forward-secrecy keys group1
set security ipsec policy ipsec_pol_vpnloaner03 proposal-set standard
set security ipsec vpn vpnloaner03 bind-interface st0.0
set security ipsec vpn vpnloaner03 ike gateway gw_vpnloaner03
set security ipsec vpn vpnloaner03 ike ipsec-policy ipsec_pol_vpnloaner03
set security ipsec vpn vpnloaner03 establish-tunnels immediately
set security screen ids-option untrust-screen icmp ping-death
set security screen ids-option untrust-screen ip source-route-option
set security screen ids-option untrust-screen ip tear-drop
set security screen ids-option untrust-screen tcp syn-flood alarm-threshold 1024
set security screen ids-option untrust-screen tcp syn-flood attack-threshold 200
set security screen ids-option untrust-screen tcp syn-flood source-threshold 1024
set security screen ids-option untrust-screen tcp syn-flood destination-threshold 2048
set security screen ids-option untrust-screen tcp syn-flood timeout 20
set security screen ids-option untrust-screen tcp land
set security nat source rule-set nsw_srcnat from zone Internal
set security nat source rule-set nsw_srcnat to zone Internet
set security nat source rule-set nsw_srcnat rule nsw-src-interface match source-address 0.0.0.0/0
set security nat source rule-set nsw_srcnat rule nsw-src-interface match destination-address 0.0.0.0/0
set security nat source rule-set nsw_srcnat rule nsw-src-interface then source-nat interface
set security policies from-zone Internal to-zone Internet policy All_Internal_Internet match source-address any
set security policies from-zone Internal to-zone Internet policy All_Internal_Internet match destination-address any
set security policies from-zone Internal to-zone Internet policy All_Internal_Internet match application any
set security policies from-zone Internal to-zone Internet policy All_Internal_Internet then permit
set security policies from-zone Internal to-zone Internet policy policy_out_vpnloaner03 match source-address addr_192_168_203_0_24
set security policies from-zone Internal to-zone Internet policy policy_out_vpnloaner03 match destination-address addr_192_168_200_0_24
set security policies from-zone Internal to-zone Internet policy policy_out_vpnloaner03 match application any
set security policies from-zone Internal to-zone Internet policy policy_out_vpnloaner03 then permit
set security policies from-zone Internet to-zone Internal policy policy_in_vpnloaner03 match source-address addr_10_0_0_0_8
set security policies from-zone Internet to-zone Internal policy policy_in_vpnloaner03 match source-address addr_192_168_0_0_16
set security policies from-zone Internet to-zone Internal policy policy_in_vpnloaner03 match destination-address addr_192_168_203_0_24
set security policies from-zone Internet to-zone Internal policy policy_in_vpnloaner03 match application any
set security policies from-zone Internet to-zone Internal policy policy_in_vpnloaner03 then permit
set security zones security-zone Internal address-book address addr_192_168_203_0_24 192.168.203.0/24
set security zones security-zone Internal host-inbound-traffic system-services all
set security zones security-zone Internal interfaces vlan.1 host-inbound-traffic system-services ping
set security zones security-zone Internal interfaces vlan.1 host-inbound-traffic system-services dhcp
set security zones security-zone Internal interfaces vlan.1 host-inbound-traffic system-services http
set security zones security-zone Internal interfaces vlan.1 host-inbound-traffic system-services https
set security zones security-zone Internal interfaces vlan.1 host-inbound-traffic system-services ssh
set security zones security-zone Internal interfaces vlan.1 host-inbound-traffic system-services telnet
set security zones security-zone Internal interfaces vlan.1 host-inbound-traffic system-services snmp
set security zones security-zone Internet address-book address addr_192_168_0_0_16 192.168.0.0/16
set security zones security-zone Internet address-book address addr_10_0_0_0_8 10.0.0.0/8
set security zones security-zone Internet address-book address addr_192_168_200_0_24 192.168.200.0/24
set security zones security-zone Internet host-inbound-traffic system-services ike
set security zones security-zone Internet interfaces fe-0/0/0.0 host-inbound-traffic system-services ping
set security zones security-zone Internet interfaces fe-0/0/0.0 host-inbound-traffic system-services dhcp
set security zones security-zone Internet interfaces fe-0/0/0.0 host-inbound-traffic system-services https
set security zones security-zone Internet interfaces fe-0/0/0.0 host-inbound-traffic system-services ssh
set security zones security-zone Internet interfaces fe-0/0/0.0 host-inbound-traffic system-services ike
set security zones security-zone Internet interfaces fe-0/0/0.0 host-inbound-traffic system-services snmp
set security zones security-zone Internet interfaces st0.0 host-inbound-traffic system-services https
set security zones security-zone Internet interfaces st0.0 host-inbound-traffic system-services ping
set security zones security-zone Internet interfaces st0.0 host-inbound-traffic system-services ike
set security zones security-zone Internet interfaces st0.0 host-inbound-traffic system-services ssh
set security zones security-zone Internet interfaces st0.0 host-inbound-traffic system-services snmp
set vlans vlan1 vlan-id 3
set vlans vlan1 l3-interface vlan.1

 

 


Viewing all articles
Browse latest Browse all 3959

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>