Hi Wayne,

Thanks for this - that's actually a really good solution I hadn't even 
considered - I can take it a step further and use wildcards on the zone to 
solve my multiple address-book on a single zone request:

set groups HQ-UNTRUST-HOSTS security zones security-zone <*> address-book 
address U-HOST1 200.1.1.1/32
set groups HQ-UNTRUST-HOSTS security zones security-zone <*> address-book 
address U-HOST2 200.1.1.2/32
set groups HQ-UNTRUST-HOSTS security zones security-zone <*> address-book 
address U-HOST3 200.1.1.3/32

set groups HQ-DMZ-HOSTS security zones security-zone <*> address-book address 
D-HOST1 100.1.1.1/32
set groups HQ-DMZ-HOSTS security zones security-zone <*> address-book address 
D-HOST2 100.1.1.2/32
set groups HQ-DMZ-HOSTS security zones security-zone <*> address-book address 
D-HOST3 100.1.1.3/32

set security zones security-zone WAN apply-groups [HQ-UNTRUST-HOSTS 
HQ-DMZ-HOSTS]

Neat!

On 12/06/2012, at 12:49 PM, Wayne Tucker wrote:

> On Mon, Jun 11, 2012 at 5:04 PM, Ben Dale <bd...@comlinx.com.au> wrote:
> What would really help though is if Junos allowed multiple address-books to 
> be bound to a single zone - that way, SRXs buried deeper in your network 
> would have access to all address-book entries on a single upstream zone with 
> very little configuration management.  I'm sure this concept would make tools 
> like Space and NSM easier to use as well - Juniper SRX PLMs are you listening 
> out there?  SAVE US!
> 
> 
> It takes some getting used to, but this can be accomplished through 
> configuration groups:
> 
> Here's a vanilla address book on a Junos 10.4 box:
> 
> # show security zones security-zone trust address-book 
> address ironman 192.168.0.16/32;
> address knife 192.168.0.8/32;
> 
> Create a couple of groups and apply them:
> 
> # set groups group1 security zones security-zone trust address-book address 
> address1 192.168.0.1/32 
> # set groups group2 security zones security-zone trust address-book address 
> address2 192.168.0.1/32    
> # set apply-groups [ group1 group2 ] 
> 
> And now the address book contains the additional entries:
> 
> # show security zones security-zone trust address-book | display inheritance 
> address ironman 192.168.0.16/32;
> address knife 192.168.0.8/32;
> address inet6:sandman 2001:470:ea7c:0:221:6aff:fe66:bdcc/128;
> ##
> ## 'address1' was inherited from group 'group1'
> ## '192.168.0.1/32' was inherited from group 'group1'
> ##
> address address1 192.168.0.1/32;
> ##
> ## 'address2' was inherited from group 'group2'
> ## '192.168.0.1/32' was inherited from group 'group2'
> ##
> address address2 192.168.0.1/32;
> 
> An added bonus of having the address book (or almost other configuration) in 
> a group is that you can use "load replace" (or the equivalent in the XML API) 
> to keep it consistent when you distribute it around.  Add a few more layers 
> and you could have a fully fledged system for managing any configuration bits 
> on a device.
> 
> :w
> 
> 
> 

_______________________________________________
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Reply via email to