Example: Configuring a Policy-Based Site-to-Site VPN using J-Web

Similar documents
Example: Configuring a Hub-and-Spoke VPN between 3 SRXs using J-Web

How to configure IPSec VPN between a Cradlepoint router and a SRX or J Series Juniper router

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Presenter John Baker

J Series / SRX Series Multipoint VPN Configuration with Next-Hop Tunnel Binding

Configuring Dynamic VPN

Configuring VPN from Proventia M Series Appliance to NetScreen Systems

Network Configuration Example

Network Configuration Example

Network Configuration Example

Configuring VPN from Proventia M Series Appliance to Proventia M Series Appliance

Cradlepoint to Palo Alto VPN Example. Summary. Standard IPSec VPN Topology. Global Leader in 4G LTE Network Solutions

Configuring Dynamic VPN v2.0 Junos 10.4 and above

How to Configure a Site-To-Site IPsec VPN to the Amazon AWS VPN Gateway

Configuration of an IPSec VPN Server on RV130 and RV130W

JUNOS Enhanced Services Route-Based VPN Configuration and Troubleshooting

How to Configure an IPsec VPN to an AWS VPN Gateway with BGP

VPN Auto Provisioning

How to Configure Forcepoint NGFW Route-Based VPN to AWS with BGP TECHNICAL DOCUMENT

Configuring a Hub & Spoke VPN in AOS

IPSec VPN Setup with IKE Preshared Key and Manual Key on WRVS4400N Router

Table of Contents 1 IKE 1-1

How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel

Virtual Private Networks

The EN-4000 in Virtual Private Networks

Set Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV016, RV042, RV042G and RV082 VPN Routers

How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel

Virtual Tunnel Interface

Juniper Exam JN0-696 Security Support, Professional (JNCSP-SEC) Version: 9.0 [ Total Questions: 71 ]

Configuration Guide. How to connect to an IPSec VPN using an iphone in ios. Overview

Configuring VPN from Proventia M Series Appliance to Symantec 5310 Systems

How to Configure an IKEv1 IPsec VPN to an AWS VPN Gateway with BGP

Chapter 6 Virtual Private Networking

Case 1: VPN direction from Vigor2130 to Vigor2820

How to Configure an IKEv1 IPsec VPN to an AWS VPN Gateway with BGP

QUICKSTART GUIDE FOR BRANCH SRX SERIES SERVICES GATEWAYS

A. Verify that the IKE gateway proposals on the initiator and responder are the same.

VPNC Scenario for IPsec Interoperability

Quick Note. Configure an IPSec VPN tunnel between a Digi TransPort LR router and a Digi Connect gateway. Digi Technical Support 20 September 2016

Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels

Windows 2000 Pre-shared IKE Dialup VPN Setup Procedures

Firepower Threat Defense Site-to-site VPNs

Internet. SonicWALL IP Cisco IOS IP IP Network Mask

HOW TO CONFIGURE AN IPSEC VPN

Google Cloud VPN Interop Guide

Site-to-Site VPN with SonicWall Firewalls 6300-CX

DFL-210, DFL-800, DFL-1600 How to setup IPSec VPN connection with DI-80xHV

VNS3 to Windows RRAS Instructions. Windows 2012 R2 RRAS Configuration Guide

Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI

How to Configure an IKEv1 IPsec Site-to-Site VPN to the Static Microsoft Azure VPN Gateway

Google Cloud VPN Interop Guide

Manual Key Configuration for Two SonicWALLs

Integration Guide. Oracle Bare Metal BOVPN

LAN to LAN IPsec Tunnel Between a Cisco VPN 3000 Concentrator and Router with AES Configuration Example

Configuring LAN-to-LAN IPsec VPNs

Implementing AutoVPN Network Design Using the SRX Series with ibgp as the Dynamic Routing Protocol

VPN Configuration Guide. Juniper Networks NetScreen / SSG / ISG Series

How to Configure an IPsec Site-to-Site VPN to a Windows Azure VPN Gateway

Proxicast IPSec VPN Client Example

Service Managed Gateway TM. How to Configure and Debug Generic Routing Encapsulation (GRE)

Quick Note 65. Configure an IPSec VPN tunnel between a TransPort WR router and an Accelerated SR router. Digi Technical Support 7 June 2018

Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP

Abstract. Avaya Solution & Interoperability Test Lab

How to configure IPSec VPN between a CradlePoint router and a Fortinet router

Use the IPSec VPN Wizard for Client and Gateway Configurations

Chapter 8 Lab Configuring a Site-to-Site VPN Using Cisco IOS

Digi Connect Family Application Guide How to Create a VPN between Digi and Juniper Netscreen

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Configuring VPNs in the EN-1000

Netscreen Remote VPN To Netscreen Device With XAuth

VPN Configuration Guide. NETGEAR FVG318 / FVS318G / FVS336G / FVS338 / DGFV338 FVX538 / SRXN3205 / SRX5308 / ProSecure UTM Series

How to Configure BGP over IKEv2 IPsec Site-to- Site VPN to an Google Cloud VPN Gateway

Configuration Example of ASA VPN with Overlapping Scenarios Contents

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide

Sample excerpt. Virtual Private Networks. Contents

How to create the IPSec VPN between 2 x RS-1200?

Proxy Protocol Support for Sophos UTM on AWS. Sophos XG Firewall How to Configure VPN Connections for Azure

BiGuard C01 BiGuard VPN Client Quick Installation Guide (BiGuard series VPN enabled devices) Secure access to Company Network

es T tpassport Q&A * K I J G T 3 W C N K V [ $ G V V G T 5 G T X K E G =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX *VVR YYY VGUVRCUURQTV EQO

JN Juniper JNCIS-SEC. JN0-331 Dumps JN0-331 Braindumps JN0-331 Real Questions JN0-331 Practice Test JN0-331 dumps free

Configuring an IPSec Tunnel Between a Cisco VPN 3000 Concentrator and a Checkpoint NG Firewall

ZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003

Configuring VPN Policies

S2S VPN with Azure Route Based

Configuration of Shrew VPN Client on RV042, RV042G and RV082 VPN Routers through Windows

Virtual Private Network. Network User Guide. Issue 05 Date

Mediant MSBR. Version 6.8. Security Setup. Configuration Guide. Version 6.8. Multi-Service Business Routers Product Series

Network Security 2. Module 4 Configure Site-to-Site VPN Using Pre-Shared Keys

VPN Configuration Guide. NETGEAR FVS318v3

IPsec Dead Peer Detection Periodic Message Option

Service Managed Gateway TM. Configuring IPSec VPN

VPN Tracker for Mac OS X

Configuring a VPN Using Easy VPN and an IPSec Tunnel, page 1

Greenbow VPN Client Example

Netscreen NS-5GT. TheGreenBow IPSec VPN Client. Configuration Guide.

Defining IPsec Networks and Customers

VNS3 IPsec Configuration. VNS3 to Cisco ASA ASDM 5.2

Chapter 5 Virtual Private Networking

ASA-to-ASA Dynamic-to-Static IKEv1/IPsec Configuration Example

Virtual Private Cloud. User Guide. Issue 03 Date

Transcription:

Example: Configuring a Policy-Based Site-to-Site VPN using J-Web Last updated: 7/2013 This configuration example shows how to configure a policy-based IPsec VPN to allow data to be securely transferred between a branch office and the corporate office using J-Web. This example includes: Topology Configuration steps for Corporate SRX Verifying the IKE Phase 1 Status Verifying the IPsec Phase 2 Status Reviewing Statistics and Errors for an IPsec Security Association Troubleshooting For this same example using the CLI, refer to www.juniper.net/techpubs/en_us/junos12.1x44/topics/example/ipsecpolicy-based-vpn-configuring.html. For VPN configuration help, refer to http://www.juniper.net/techpubs/en_us/junos12.1x44/informationproducts/pathway-pages/security/security-vpn-ipsec.html#configuration. Juniper Networks, Inc. 1

Topology The hierarchical steps and screen outputs in this document are based on the Junos 12.1X44 release. Juniper Networks, Inc. 2

Configuration steps for Corporate (Sunnyvale) SRX A. Configure LAN/WAN interface, static route, security zone, and address book information: NOTE: This section contains the prerequisite steps for the VPN configuration. If your LAN/WAN interfaces, static route, security zone, and local address book are already configured, then jump to the Section B to configure the VPN related configuration. 1. Configure LAN interface on Trust side. 1. Select Configure>Interfaces>Ports 2. Select ge-0/0/0 in the left pane 3. Click Add>logical interface. 4. In the Add Interface box, a. Add the following attributes: Unit: 0 b. Select IPv4 Address box>enable address configuration Click Add. Provide the address attributes: IPv4 Address: 10.10.10.1 Subnet: 24 5. Click OK 2. Configure WAN interface on Untrust side (Internet side). 1. Select Configure>Interfaces>Ports 2. Select ge-0/0/3 in the left pane 3. Click Add>logical interface. 4. In the Add Interface box, a. Add the following attributes: Unit: 0 b. Select IPv4 Address box>enable address configuration Click Add. Provide the address attributes: IPv4 Address: 1.1.1.2 Subnet: 30 5. Click OK 3. Configure static route (default route). 1. Select Routing>Static Routing 2. Click Add 3. In the Add Static Route box, a. Select IPv4 b. Add the following attributes: IP address: 0.0.0.0 Subnet mask: 0.0.0.0/0 c. under next-hop Click Add IP Address: 1.1.1.1 d. Click OK 4. Click OK Juniper Networks, Inc. 3

4. Configure the untrust security zone. 1. Select Security>Zones/Screens 2. Click Add 3. In the Add Zone box, a. Under Main TAB, provide the following details. Zone name: untrust Zone type : security 4. Assign an interface to the security zone. a. In the Add Zone box, Under Interfaces in this zone section: Select the interface ge-0/0/3.0 from the Available pool. b. After selecting interface click the right arrow key to move interface to selected column. 5. Configure the trust security zone. 1. Select Security>Zones/Screens 2. Click Add 3. In the Add Zone box, a. Under Main TAB, provide the following details. Zone name: trust Zone type : security 4. Assign an interface to the trust security zone. a. In the Add Zone box, Under Interfaces in this zone section: Select the interface ge-0/0/0.0 from the Available pool. b. After selecting interface click the right arrow key to move interface to selected column. 5. Specify allowed system services for the trust security zone a. In the Add Zone box, Under Host Inbound traffic Zone tab, Select the services all from the pool of Available services. Select the protocol all from the pool of Available protocols. Click OK 6. Configure an address book entry for the Sunnyvale network and attach a zone to it. 1. select Configure>Security>Address Book 2. Click Add 3. In the Add Address Book box, a. Add the following attributes: Address Book Name: book1 b. Click Address TAB and provide the following attributes : Address Name : Sunnyvale Address type : IP address Value : 10.10.10.0/24 c. Under Attach zone section, Select trust from the pool of Available zones. d. Click OK Juniper Networks, Inc. 4

B. Configure VPN related interface, security zone, and address book information: 1. Specify ike to be allowed under interface ge-0/0/3.0 under security zone untrust. 1. In the Add Zone box, a. Select Security>Zones/Screens b. Select security zone untrust and click Edit c. Under Host Inbound traffic Zone tab, Select the services ike from the pool of Available services. d. Click OK Important: Step 1 is mandatory because if IKE is not enabled on the external interface, then the SRX will not accept inbound ike packets. The IKE packets will be dropped, and IKE negotiations will not proceed further. 2. Configure address book entry for the remote network and attach a zone to it. 1. Select Configure>Security>Address Book 2. Click Add 3. In the Add Address Book box, a. Add the following attributes: Address Book Name: book2 b. Click Address TAB and provide the following attributes : Address Name : Chicago Address type : IP address Value : 192.168.168.0/24 c. Under Attach zone section, Select untrust from the pool of Available zones. d. Click OK C. Configure IKE: The IKE Phase 1 proposal, IKE policy, and IKE gateway are created in this section. Select IPSec VPN>Auto Tunnel> Phase 1 1. Create the IKE Phase 1 proposal. b. Under Proposal TAB, click Add. Provide the following attributes: name: ike-phase1-proposal authentication-method: pre-shared-keys dh-group: group2 authentication-algorithm: sha1 encryption-algorithm: aes-128-cbc c. Click OK Juniper Networks, Inc. 5

2. Create an IKE policy for main mode. Also specify the ike-phase1-proposal (created above) and preshared key auth method. a. Under Policy TAB, click Add. b. Under IKE Policy TAB Provide the following attributes: name : ike-phase1-policy mode: main Specify a reference to the IKE proposal: Under proposal section, select User Defined. Select ike-phase1-proposal from the list of Available proposals. After selecting ike-phase1-proposal, you must click the right arrow key to move interface to selected column. c. Click OK d. Define the IKE Phase 1 policy authentication method: Under IKE Policy options TAB Select pre-shared-key. Select Ascii text and enter in password that will be used by both VPN endpoints for the preshared key. e. Click OK 3. Create an IKE Phase 1 gateway. Specify the IKE policy (phase 1), external (outgoing interface), and the peer IP address/fqdn: a. Under Gateway TAB, click Add. Provide the following attributes: name : gw-chicago policy: ike-phase1-policy external-interface: ge-0/0/3.0 Address/FQDN : 2.2.2.2 Note: The address/fqdn should be the remote peer s public IP address. It is important also to specify the correct external interface. If either the peer address or external interface is incorrect, then the IKE gateway is not identified during phase 1 negotiation. Juniper Networks, Inc. 6

D. Configure IPsec: The IPsec Phase 2 proposal, IPsec policy, and IPsec VPN are created in this section. Select IPSec VPN>Auto Tunnel> Phase 2 1. Create the IPsec Phase 2 proposal. a. Under Proposal TAB, click Add. Provide the following attributes: name: ipsec-phase2-proposal protocol: esp authentication-algorithm: hmac-sha1-96 encryption-algorithm: aes-128-cbc 2. Create an IPSec policy and specify the IPSec Phase 2 proposal created above, along with perfect-forward-secrecy (PFS). a. Under IPSec Policy TAB, click Add. Provide the following attributes: name: ipsec-phase2-policy perfect-forward-secrecy: group2 Specify a reference to the IPSec proposal: Under proposal section, select User Defined. Select ike-phase2-proposal from the list of Available proposals. After selecting ike-phase2-proposal, you must click the right arrow key to move interface to selected column. 3. Create the IPSec VPN specifying the Remote gateway, IPsec policy, and tunnel interface. b. Under Auto Key VPN TAB, click Add. Provide the following attributes: name: ike-vpn-chicago Remote Gateway : gw-chicago Ipsec Policy : from the drop-down list select ipsec-phase2-policy b. Click OK Juniper Networks, Inc. 7

E. Configure Security Policies: The security policies are configured for tunnel traffic in both directions in this section. Note: The security policies include zone information configured in the previous steps. Select Security>Policy>Apply Policy 1. Create the security policy to permit traffic from the trust zone to the untrust zone. a. Click Add b. Under Add Policy Window, provide the following details : policy name: vpn-tr-untr c. Under policy context, From zone: from the drop-down list select trust To zone: from the drop-down list select untrust d. Under Source Address, Select Sunnyvale from the list of available Address-book entries. Under Destination Address, Select chicago from the list of available Address-book entries. e. Under Applications, Select any from the list of available Applications/Sets entries. f. Under Policy Action, select permit from the drop down list. g. Click OK h. Click Permit Action Under Tunnel window, i. Provide the name of IPSEC VPN Select ike-vpn-chicago from the list of available VPN entries. j. Under Pair Policy window, Provide the name of Pair Policy Pair Policy Name: vpn-untr-tr k. Click OK 2. Create the security policy to permit traffic from the untrust zone to the trust zone. a. Click Add b. Under Add Policy Window, provide the following details : policy name: vpn-untr-tr c. Under policy context, From zone: from the drop-down list select untrust To zone: from the drop-down list select trust d. Under Source Address, Select chicago from the list of available Address-book entries. Under Destination Address, Select Sunnyvale from the list of available Address-book entries. e. Under Applications, Select any from the list of available Applications/Sets entries. f. Under Policy Action, select permit from the drop down list. g. Click OK h. Click Permit Action Under Tunnel window, i. Provide the name of IPSEC VPN Select ike-vpn-chicago from the list of available VPN entries. Juniper Networks, Inc. 8

j. Under Pair Policy window, Provide the name of Pair Policy Pair Policy Name: vpn-tr-untr k. Click OK 3. Create the security policy to permit traffic from the trust zone to the untrust zone. a. Click Add b. Under Add Policy Window, provide the following details : policy name: permit-any c. Under policy context, From zone: from the drop-down list select trust To zone: from the drop-down list select untrust d. Under Source Address, Select any from the list of available Address-book entries. Under Destination Address, Select any from the list of available Address-book entries. e. Under Applications, Select any from the list of available Applications/Sets entries. f. Under Policy Action, select permit from the drop down list. g. Click OK 4. Reorder the security policies so that the vpn-tr-untr security policy is placed above the permit-any security policy. a. Under Security Policy Click on Policy from the list of available Policy entries. b. Click Move, Select Move up from the list of available Move entries. Configuration steps for Branch (Chicago) SRX To configure the Chicago SRX, follow the configuration steps for the Sunnyvale SRX, replacing the parameters from the topology. Juniper Networks, Inc. 9

Verifying the IKE Phase 1 Status For CLI : From operational mode, enter the show security IPSec security-associations command. user@host> show security ike security-associations Index Remote Address State Initiator cookie Responder cookie Mode 4708557 2.2.2.2 UP d77t81e85fe7e7e3 8bbae363d59cc85f Main For J-Web : The steps and tips to check the IKE Phase 1 status are below. (The steps to check the IPsec Phase 2 status are in the section that follows this.) 1. Click Monitor TAB 2. Select IPSec VPN>Phase 1 On the right hand side pane you will see the active IKE associations. This screen lists all the active IKE Phase 1 SAs. Each SA contains the following information: Index This value is unique for each IKE SA, which you can use the CLI command, show security ike securityassociations <index> detail, to get more information about the SA. Remote Address Verify that the remote IP address is correct. State o UP The Phase 1 SA has been established. o DOWN There was a problem establishing the Phase 1 SA. Mode Verify that the correct mode is being used. Juniper Networks, Inc. 10

Things to check: 1. In the show security ike security-associations command output, notice that the remote address is 2.2.2.2 and the state is UP. If the State shows DOWN or if there are no IKE security associations present, then there is a problem with phase 1 establishment. Confirm that the remote IP address, IKE policy, and external interfaces are all correct. Common errors include incorrect IKE policy parameters such as wrong mode type (Aggressive or Main) or mismatched preshared keys or phase 1 proposals (all must match on both peers). An incorrect external interface is another common mis-configuration. This interface must be the correct interface that receives the IKE packets. 2. If the configurations have been checked, then check the kmd log for any errors or use the traceoptions option. Note: KMD Logs can be downloaded via J-Web for viewing by going to Maintain Tab->Files->Click on Log Files. Locate KMD line and click on Download. For information about traceoptions, see Troubleshooting. Verifying the IPsec Phase 2 Status For CLI: From operational mode, enter the show security ipsec security-associations command. user@host> show security ipsec security-associations total configured sa: 2 ID Gateway Port Algorithm SPI Life:sec/kb Mon vsys <131073 2.2.2.2 500 ESP:aes-128/sha1 c20d30b2 3363/ unlim - 0 >131073 2.2.2.2 500 ESP:aes-128/sha1 dbb8bef1 3363/ unlim - 0 For J-Web: The steps and tips to check the IPsec Phase 2 status are below. 1. Click Monitor TAB 2. Select IPSec VPN>Phase 2 On the right hand side pane, click IPSec SA TAB. Juniper Networks, Inc. 11

This screen contains the following information: The ID number is 131073. Use this value with the CLI command show security ipsec securityassociations <index> to get more information about this particular SA. There is one IPsec SA pair using port 500, which indicates that no NAT-traversal is implemented. (NATtraversal uses port 4500 or another random high-number port.) The SPIs, lifetime (in seconds), and usage limits (or lifesize in KB) are shown for both directions. The 2862/ unlim value indicates that the Phase 2 lifetime expires in 2862 seconds, and that no lifesize has been specified, which indicates that it is unlimited. Phase 2 lifetime can differ from Phase 1 lifetime, as Phase 2 is not dependent on Phase 1 after the VPN is up. Things to check: 1. The local identity and remote identity make up the proxy ID for the SA. A proxy ID mismatch is one of the most common reasons for a Phase 2 failure. For policy-based VPNs, the proxy ID is derived from the security policy. The local address and remote address are derived from the address book entries, and the service is derived from the application configured for the policy. If Phase 2 fails because of a proxy ID mismatch, you can use the policy to confirm which address book entries are configured. Verify that the addresses match the information being sent. Check the service to ensure that the ports match the information being sent. Note: For some third-party vendors, the proxy ID must be manually entered to match. Juniper Networks, Inc. 12

2. If IPsec cannot complete, check the messages log, and look for any logs with the keyword KMD. This should typically show whether or not the SA came up or not. Example: Apr 19 11:47:54 rng kmd[1319]: IKE Phase-2: Completed negotiations, connection established with tunnel-id:131073 and lifetime 2992 seconds/0 KB - Local gateway: 172.22.135.251, Remote gateway: 24.6.221.146, Local Proxy ID: ipv4_subnet(any:0,[0..7]=0.0.0.0/0), Remote Proxy ID: ipv4_subnet(any:0,[0..7]=0.0.0.0/0), Protocol: ESP, Auth algo: sha1, Encryption algo: 3des-cbc, Direction: inbound, SPI: 93eb6df3, AUX-SPI: 0, Type: dynamic Note: Message Logs can be downloaded via J-Web for viewing by going to maintain Tab->Files->Click on Log Files. Locate MESSAGES line and click on Download. If the tunnel still fails to come UP, jump to the Troubleshooting section. Juniper Networks, Inc. 13

Reviewing Statistics and Errors for an IPsec Security Association 1. Click Monitor TAB 2. Select IPSec VPN>Phase 2 On the right hand side pane, click Statistics TAB. If you see packet loss issues across a VPN, you can adjust the refresh interval and then monitor the statistics to confirm that the encrypted and decrypted packet counters are incrementing. You should also check whether the other error counters are incrementing. Troubleshooting For step-by-step troubleshooting, refer to: KB10100 - Resolution Guide - How to Troubleshoot a VPN Tunnel that won't come up on a SRX Series device For help with configuring traceoptions for debugging and trimming output, refer to: http://kb.juniper.net/kb16108 Juniper Networks, Inc. 14