Network Configuration Example

Similar documents
Network Configuration Example

Network Configuration Example

Network Configuration Example

Network Configuration Example

Network Configuration Example

Network Configuration Example

QUICKSTART GUIDE FOR BRANCH SRX SERIES SERVICES GATEWAYS

Network Configuration Example

Network Configuration Example

Network Configuration Example

Network Configuration Example

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Network Configuration Example

Configuring Dynamic VPN

Network Configuration Example

Example: Configuring a Hub-and-Spoke VPN between 3 SRXs using J-Web

Example: Configuring a Policy-Based Site-to-Site VPN using J-Web

Network Configuration Example

Network Configuration Example

Network Configuration Example

Network Configuration Example

Network Configuration Example

Network Configuration Example

Integrating WX WAN Optimization with Netscreen Firewall/VPN

Configuring Dynamic VPN v2.0 Junos 10.4 and above

Network Configuration Example

Juniper Exam JN0-696 Security Support, Professional (JNCSP-SEC) Version: 9.0 [ Total Questions: 71 ]

Network Configuration Example

How to configure IPSec VPN between a Cradlepoint router and a SRX or J Series Juniper router

Network Configuration Example

Presenter John Baker

Junos OS Release 12.1X47 Feature Guide

Network Configuration Example

J Series / SRX Series Multipoint VPN Configuration with Next-Hop Tunnel Binding

CBA850 3G/4G/LTE Wireless WAN Bridge Application Guide

Network Configuration Example

Network Configuration Example

Network Configuration Example

Network Configuration Example

Junos OS Multiple Instances for Label Distribution Protocol Feature Guide Release 11.4 Published: Copyright 2011, Juniper Networks, Inc.

Technology Overview. Retrieving VLAN Information Using SNMP on an EX Series Ethernet Switch. Published:

Cluster Upgrade. SRX Series Services Gateways for the Branch Upgrade Junos OS with Minimal Traffic Disruption and a Single Command APPLICATION NOTE

Network Configuration Example

Network Configuration Example

Juniper Sky Enterprise

Network Configuration Example

How to Set Up Your SRX320 Services Gateway

Network Configuration Example

Implementing AutoVPN Network Design Using the SRX Series with ibgp as the Dynamic Routing Protocol

Network Configuration Example

Network Configuration Example

Deployment Guide for SRX Series Services Gateways in Chassis Cluster Configuration

Using IPsec with Multiservices MICs on MX Series Routers

Juniper Secure Analytics

CONFIGURING THE CX111 FOR THE SSG SERIES

Juniper Sky ATP Getting Started

Junos Security (JSEC)

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ

A. Verify that the IKE gateway proposals on the initiator and responder are the same.

Junos OS. RSVP LSP Tunnels Feature Guide. Release Published: Copyright 2011, Juniper Networks, Inc.

Network Configuration Example

Network Configuration Example

Junos Security. Chapter 4: Security Policies Juniper Networks, Inc. All rights reserved. Worldwide Education Services

How to Set Up Your SRX300 Services Gateway

Junos Security. Rob Cameron, Brad Woodberg, Patricio Giecco, O'REILLY. Tim Eberhard, andjames Quinn INFORMATIQNSBIBLIOTHEK UNIVERSITATSBIBLIOTHEK

Configuring VPN from Proventia M Series Appliance to NetScreen Systems

Technology Overview. Frequently Asked Questions: MX Series 3D Universal Edge Routers Quality of Service. Published:

Network Configuration Example

J-series High Availability

Junos Security. Chapter 11: High Availability Clustering Implementation

Junos OS. Designing and Implementing a Junos Node Unifier Network. Release 1.4J1. Published: Copyright 2015, Juniper Networks, Inc.

How to Set Up Your SRX340 Services Gateway

How to Set Up Your SRX550 High Memory Services Gateway

JN Juniper JNCIS-SEC. JN0-331 Dumps JN0-331 Braindumps JN0-331 Real Questions JN0-331 Practice Test JN0-331 dumps free

Virtual Private Networks

BRANCH SRX SERIES AND J SERIES CHASSIS CLUSTERING

Juniper Networks M Series and J Series Routers

Network Configuration Example

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date

CONFIGURING AND DEPLOYING THE AX411 WIRELESS ACCESS POINT

Cradlepoint to Palo Alto VPN Example. Summary. Standard IPSec VPN Topology. Global Leader in 4G LTE Network Solutions

CONFIGURING THE CX111 FOR THE SSG SERIES

GRE and DM VPNs. Understanding the GRE Modes Page CHAPTER

VPN Auto Provisioning

Network Configuration Example

Firepower Threat Defense Site-to-site VPNs

VPN Configuration Guide. Juniper Networks NetScreen / SSG / ISG Series

Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels

Network Configuration Example

Flow Monitoring Feature Guide for EX9200 Switches

High Availability Synchronization PAN-OS 5.0.3

Network Configuration Example

Network Configuration Example

Solution Guide. Infrastructure as a Service: EVPN and VXLAN. Modified: Copyright 2016, Juniper Networks, Inc.

Digi Connect Family Application Guide How to Create a VPN between Digi and Juniper Netscreen

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Cisco Group Encrypted Transport VPN

es T tpassport Q&A * K I J G T 3 W C N K V [ $ G V V G T 5 G T X K E G =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX *VVR YYY VGUVRCUURQTV EQO

Subscriber Traffic Redirection

Juniper Networks M-series and J-series Routers. M10i. Solution Brochure J4350. Internet. Regional Office/ Medium Central Site. Branch Office J2320

Transcription:

Network Configuration Example Configuring a Single SRX Series Device in a Branch Office Modified: 2017-01-23

Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Network Configuration Example Configuring a Single SRX Series Device in a Branch Office All rights reserved. The information in this document is current as of the date on the title page. YEAR 2000 NOTICE Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036. END USER LICENSE AGREEMENT The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks software. Use of such software is subject to the terms and conditions of the End User License Agreement ( EULA ) posted at http://www.juniper.net/support/eula.html. By downloading, installing or using such software, you agree to the terms and conditions of that EULA. ii

Table of Contents Chapter 1 Configuring a Single SRX Series Device in a Branch Office............... 5 About This Network Configuration Example............................... 5 Distributed Enterprise Connectivity Architecture Design Considerations........ 5 Device and Link Redundancy Overview................................... 7 Branch Office Chassis Cluster Design Considerations....................... 8 Understanding Chassis Clusters........................................ 11 Example: Configuring a Single SRX Series Device in a Branch Office........... 12 iii

Configuring a Single SRX Series Device in a Branch Office iv

CHAPTER 1 Configuring a Single SRX Series Device in a Branch Office About This Network Configuration Example on page 5 Distributed Enterprise Connectivity Architecture Design Considerations on page 5 Device and Link Redundancy Overview on page 7 Branch Office Chassis Cluster Design Considerations on page 8 Understanding Chassis Clusters on page 11 Example: Configuring a Single SRX Series Device in a Branch Office on page 12 About This Network Configuration Example This document provides a step-by-step example for configuring a single SRX Series device in a branch office as part of a high availability enterprise network. No security or unified threat management (UTM) features are detailed in this document. This document is intended for security and IT engineers, as well as network architects. Distributed Enterprise Connectivity Architecture Design Considerations This topic discusses how the Juniper Networks enterprise reference architecture applies to distributed enterprises and all its major locations such as the campus, branch offices, and data centers. Figure 1 on page 6 depicts a high-level view of Juniper Networks distributed enterprise connectivity architecture. This topic presents the design details that are specific to each of the redundancy levels and technologies covering all the branch office profiles. Network infrastructure at branch offices normally contains a relatively small amount of computing resources when compared to central facilities or headquarters. Branch offices typically are located where customer interactions occur, which means there is increased demand for supporting applications and assuring application performance, and increased demand for security and availability. Because remote locations usually lack the presence of local IT staff, the equipment hosted at these facilities must not only be cost effective, feature-rich, and highly reliable, but must also offer centralized management capabilities. 5

Configuring a Single SRX Series Device in a Branch Office Figure 1: Distributed Enterprise Connectivity Architecture Juniper Networks offers a set of compelling solutions to meet the needs of distributed enterprise deployments. The distributed enterprise connectivity architecture addresses the concerns of enterprises in each of the areas of connectivity, security, end-user performance, visibility, and manageability. Enterprises require a completely new approach in branch office networking to avoid services disruption, which also impairs productivity in the branches and in turn negatively impacts business. These requirements define a new product category known as services gateways, which simplifies branch networking and lowers total cost of ownership (TCO) by unifying multiple services such as security, voice, data, and access servers into one remotely manageable platform. The Juniper Networks enterprise reference architecture builds a model that addresses the needs of the enterprises as well as the number of users at a particular branch office location. Branch office architectures are classified into three common profiles, which is small office home office (SOHO), remote office, and medium-to-large branch office. The different branch design profiles that use Juniper Networks SRX Series Services Gateways and run the Junos operating system (Junos OS) address the requirements of today s distributed enterprise locations. This enables businesses to gain efficiencies in capital and operational expenses. 6

Chapter 1: Configuring a Single SRX Series Device in a Branch Office The designs outlined in this topic are built to address the different levels of high availability required for different branch profiles and the current as well as future demands of high-performance businesses. Finally, implementing these designs using all the branch platforms, including services gateways and local switches running Junos OS, on all the branch network elements allows enterprises to simplify the branch office networking infrastructure, provide unified network management, and realize significant savings in operational expenditures. Related Documentation Device and Link Redundancy Overview on page 7 Branch Office Chassis Cluster Design Considerations on page 8 Understanding Chassis Clusters on page 11 Example: Configuring a Single SRX Series Device in a Branch Office on page 12 Device and Link Redundancy Overview Because there are various levels of high availability that can be deployed in enterprise branch offices, you need to identify the level you want to achieve. You can then deploy the appropriate level of device and link redundancy that supports your high availability requirements. Link-level redundancy essentially requires two links to operate in an active/active or active/backup setting so that if one link fails, the other can take over and restore traffic forwarding that had been previously sent over the failed link. Failure on any given access link should not result in a loss of connectivity. This applies only to branch offices with at least two upstream links that are connected either to a private network or to the Internet. Another level of high availability is device-level redundancy, effectively doubling up on devices to ensure that a backup device can take over in the event of a failed device. Typically, link redundancy and device redundancy are coupled, which means that if one fails, the other fails. With this strategy, no single device failure should result in a loss of connectivity from the branch office to the data centers. A true high availability design that provides assured connectivity to business-critical enterprises and branch offices employs a combination of link and device redundancy that connects the branch office to dual data centers. Traffic from the branch office is dual-homed to each data center so that in the event of a complete failure in one of the data centers, traffic can be rerouted to a backup data center. Whenever failures occur (link, device, or data center), traffic should be rerouted in less than 30 seconds. Within this period of time, packet loss might occur. However, sessions are maintained if the user applications can withstand these failover times. Branch offices with redundant devices should provide session persistence so that in the event of a failure, established sessions are not dropped, even if the failed device was forwarding traffic. Distributed Enterprise Connectivity Architecture Design Considerations on page 5 provides information about link-level as well as device-level high availability deployment for each of the branch office network profiles in a distributed enterprise environment. 7

Configuring a Single SRX Series Device in a Branch Office Related Documentation Understanding Chassis Clusters on page 11 Distributed Enterprise Connectivity Architecture Design Considerations on page 5 Branch Office Chassis Cluster Design Considerations on page 8 Example: Configuring a Single SRX Series Device in a Branch Office on page 12 Branch Office Chassis Cluster Design Considerations Because most enterprises employ more users in distributed enterprise locations than at headquarters in the same location as data centers, they need a network infrastructure in the branch offices that performs as well as the one in the centralized headquarters with high availability and minimized disruption. Since there are multiple branch profiles that require various levels of high availability, enterprises need to identify what level they want to achieve for each specific branch office and then deploy the appropriate level of device and link redundancy that supports the high availability requirements. In common scenarios, most branch offices connect directly to data centers through either a private WAN link, provided by service providers in the form of managed services, MPLS Layer 2 or Layer 3 virtual private network (VPN), ATM or Frame Relay links, or an IPsec VPN over the Internet. In many cases, enterprises prefer to deploy IPsec VPNs over private WAN links to add encryption and security on sensitive traffic because the private WAN networks that most service providers offer are not exclusive but actually are shared among many customers. Figure 2 on page 9 shows a high-level view of Juniper Networks distributed enterprise high availability network design. 8

Chapter 1: Configuring a Single SRX Series Device in a Branch Office Figure 2: Distributed Enterprise High Availability Network Design There are two types of high availability designs at most distributed enterprise locations. Each of these design profiles is discussed in detail below. Link-level redundancy This uses a single SRX Series device and either a single or dual private WAN or Internet connection, as seen in many small branch offices. The SRX Series device provides integrated LAN switching capability with 8 to 16 Ethernet ports. Figure 3 on page 10 shows a small office home office (SOHO) or retail store link-level high availability architecture. 9

Configuring a Single SRX Series Device in a Branch Office Figure 3: SOHO or Retail Store Link-Level High Availability Architecture For connecting more devices, LAN connectivity in branch offices that use only link-level high availability can be implemented with a single fixed configuration of a Juniper Networks EX2200 Ethernet Switch or EX3200 Ethernet Switch. These Ethernet switches offer cost-efficient, complete Layer 2 and Layer 3 switching capabilities; 10/100/1000BASE-T copper port connectivity with either full or partial Power over Ethernet (PoE); and the full Junos OS feature set. Figure 4 on page 10 shows the remote office link-level high availability architecture. Figure 4: Remote Office Link-Level High Availability Architecture Device-level redundancy This consists of two SRX Series devices. One connects to a private WAN or a managed services connection, while the other connects to the Internet, as seen in many medium-to-large branch offices. Device redundancy is achieved through a chassis cluster and redundant Ethernet groups. LAN redundancy is implemented with an EX4200 Ethernet Switch connected to both of the edge devices to provide a high 10

Chapter 1: Configuring a Single SRX Series Device in a Branch Office availability configuration. Figure 5 on page 11 shows a medium-to-large branch office device-level high availability architecture. Figure 5: Medium-to-Large Branch Office Device-Level High Availability Architecture The solution profile types and the services they provide are derived from a basic reference architecture in which the connectivity between distributed enterprise locations (branch/campus) and data centers is provided using the public network (Internet) and private WAN/MAN networks (either using point-to-point lines, metro Ethernet, managed services, or MPLS Layer 2-/Layer 3-based VPNs). Related Documentation Understanding Chassis Clusters on page 11 Distributed Enterprise Connectivity Architecture Design Considerations on page 5 Device and Link Redundancy Overview on page 7 Example: Configuring a Single SRX Series Device in a Branch Office on page 12 Understanding Chassis Clusters Chassis clustering, also known as the Junos Services Redundancy Protocol (JSRP), provides network node redundancy by grouping a pair of the same kind of supported Juniper Networks secure routers or SRX Series Services Gateways into a cluster. The devices must be running Junos OS with enhanced services. The two nodes back up each other with one node acting as the primary and the other as the secondary, ensuring stateful failover of processes and services in the event of system 11

Configuring a Single SRX Series Device in a Branch Office or hardware failure. If the primary node fails, the secondary node takes over processing of traffic. Nodes in a cluster are interconnected over Ethernet links and synchronize configuration, kernel, and session state across the cluster to facilitate high availability of interfaces and services. The chassis cluster functionality includes: Resilient system architecture, with a single active control plane for the entire cluster and multiple Packet Forwarding Engines, presents a single services gateway view of the cluster. Synchronization of configuration and dynamic runtime states between nodes within a cluster. Monitoring of physical interfaces and failover if the failure parameters cross a configured threshold. Related Documentation Device and Link Redundancy Overview on page 7 Branch Office Chassis Cluster Design Considerations on page 8 Distributed Enterprise Connectivity Architecture Design Considerations on page 5 Example: Configuring a Single SRX Series Device in a Branch Office on page 12 Example: Configuring a Single SRX Series Device in a Branch Office This example provides a step-by-step procedure for configuring and commands for verifying a chassis cluster on a single SRX Series device in a branch office. Requirements on page 12 Overview on page 12 Configuration on page 14 Requirements This example uses the following hardware and software components: SRX240 Services Gateways Junos OS Release 12.1 or later NOTE: This configuration example has been tested using the software release listed and is assumed to work on all later releases. Overview To implement a link-level high availability deployment, each branch office requires two WAN connections and two IPsec virtual private network (VPN) tunnels for each data center. Traffic is load-balanced across each pair of tunnels. Whenever traffic is directed to a given data center, sessions are load-balanced in a round-robin fashion across each 12

Chapter 1: Configuring a Single SRX Series Device in a Branch Office IPsec tunnel going to that data center. In turn, the tunnels are configured in such a way that each tunnel uses a different egress link, resulting in a balance of the upstream links for VPN traffic. Topology Figure 6 on page 13 shows a link-level redundancy configuration with connection to a data center. Note that even though multiple data centers might be used, from the branch high availability perspective, the configuration is identical. Only the IPsec tunnel configurations and their route settings change. For simplicity, only the IPsec configuration to one of the data centers is shown. A sample configuration for setting up redundant IPsec VPN tunnels on an SRX Series device is shown. Figure 6: Link-Level Redundant WAN Connectivity Architecture Figure 7 on page 14 shows the zone configuration. VPN tunnels are part of a separate zone named the VPN zone. Also when designing security policies, the VPN tunnels must be formed as part of a separate zone because traffic that goes to the data centers (or other branches) exits through this zone. 13

Configuring a Single SRX Series Device in a Branch Office Figure 7: Security Zones On An SRX Series Device IPsec to Data Center A IPsec to Data Center A Configuration Configuring Redundant IPsec VPN Tunnels on an SRX Series Device Step-by-Step Procedure To configure redundant IPsec VPN tunnels: 1. Specify global VPN settings. [edit] user@host# set security ipsec vpn-monitor-options interval 5 user@host# set security ipsec vpn-monitor-options threshold 5 2. Configure the IKE policy for main mode, predefined standard proposal set, and preshared key. [edit] user@host# set security ike policy preshared mode main user@host# set security ike policy preshared proposal-set standard user@host# set security ike policy preshared pre-shared-key ascii-text "$9$5Q69tuORcypuxNVwg469CA1RvWL" user@host# set security ike policy preshared_2 mode main user@host# set security ike policy preshared_2 proposal-set standard user@host# set security ike policy preshared_2 pre-shared-key ascii-text "$9$-9V24JGDkmfZGCt0BEh24oaikFn/" 3. Configure the IKE gateways with a peer IP address, an IKE policy, and an outgoing interface. [edit] user@host# set security ike gateway DCA_1 ike-policy preshared user@host# set security ike gateway DCA_1 address 4.4.4.2 user@host# set security ike gateway DCA_1 external-interface ge-0/0/4.0 14

Chapter 1: Configuring a Single SRX Series Device in a Branch Office user@host# set security ike gateway DCA_2 ike-policy preshared_2 user@host# set security ike gateway DCA_2 address 5.5.5.2 user@host# set security ike gateway DCA_2 external-interface ge-0/0/5.0 4. Configure the IPsec policy and the binding for tunnel interface st0.0 In this example, use the standard proposal set. However, you can create a unique proposal and then specify it in the IPsec policy, if needed. [edit] user@host# set security ipsec policy std proposal-set standard user@host# set security ipsec vpn DCA_1 bind-interface st0.0 user@host# set security ipsec vpn DCA_1 vpn-monitor optimized user@host# set security ipsec vpn DCA_1 ike gateway DCA_1 user@host# set security ipsec vpn DCA_1 ike no-anti-replay user@host# set security ipsec vpn DCA_1 ike proxy-identity local 0.0.0.0/0 user@host# set security ipsec vpn DCA_1 ike proxy-identity remote 0.0.0.0/0 user@host# set security ipsec vpn DCA_1 ike proxy-identity service any user@host# set security ipsec vpn DCA_1 ike ipsec-policy std user@host# set security ipsec vpn DCA_1 establish-tunnels immediately 5. Configure the binding for the tunnel interface st0.1 [edit] user@host# set security ipsec vpn DCA_2 bind-interface st0.1 user@host# set security ipsec vpn DCA_2 vpn-monitor optimized user@host# set security ipsec vpn DCA_2 ike gateway DCA_2 user@host# set security ipsec vpn DCA_2 ike no-anti-replay user@host# set security ipsec vpn DCA_2 ike proxy-identity local 0.0.0.0/0 user@host# set security ipsec vpn DCA_2 ike proxy-identity remote 0.0.0.0/0 user@host# set security ipsec vpn DCA_2 ike proxy-identity service any user@host# set security ipsec vpn DCA_2 ike ipsec-policy std user@host# set security ipsec vpn DCA_2 establish-tunnels immediately 6. Configure both st0.0 and st0.1 interface multipoints. [edit] user@host# set interfaces st0 unit 0 multipoint user@host# set interfaces st0 unit 0 family inet mtu 1500 user@host# set interfaces st0 unit 0 family inet address 10.255.1.5/24 user@host# set interfaces st0 unit 1 multipoint user@host# set interfaces st0 unit 1 family inet mtu 1500 user@host# set interfaces st0 unit 1 family inet address 10.255.2.5/24 7. Configure the static route for both the tunnel interfaces. [edit] user@host# set routing-options static route 0.0.0.0/0 next-hop 10.204.115.254 user@host# set routing-options static route 172.16.0.0/24 next-hop 10.255.1.254 user@host# set routing-options static route 172.16.0.0/24 next-hop 10.255.2.254 user@host# set routing-options forwarding-table export load-balancing-policy user@host# set policy-options policy-statement load-balancing-policy then load-balance per-packet 8. Configure the management zone. [edit] user@host# set security zones functional-zone management interfaces ge-0/0/2.0 15

Configuring a Single SRX Series Device in a Branch Office user@host# set security zones functional-zone management host-inbound-traffic system-services all user@host# set security zones functional-zone management host-inbound-traffic protocols all 9. Configure the trust zone. [edit] user@host# set security zones security-zone trust address-book address 0.0.0.0/0 0.0.0.0/0 user@host# set security zones security-zone trust host-inbound-traffic system-services any-service user@host# set security zones security-zone trust host-inbound-traffic protocols all 10. Configure the untrust zone. [edit] user@host# set security zones security-zone untrust host-inbound-traffic system-services all user@host# set security zones security-zone untrust host-inbound-traffic protocols all user@host# set security zones security-zone untrust interfaces ge-0/0/0.0 host-inbound-traffic system-services any-service user@host# set security zones security-zone untrust interfaces ge-0/0/0.0 host-inbound-traffic protocols all user@host# set security zones security-zone untrust interfaces lo0.0 user@host# set security zones security-zone untrust interfaces ge-0/0/1.0 user@host# set security zones security-zone untrust interfaces ge-0/0/4.0 user@host# set security zones security-zone untrust interfaces ge-0/0/5.0 user@host# set security zones security-zone VPN host-inbound-traffic system-services all 11. Configure security zones by assigning interfaces and host-inbound services. [edit] user@host# set security zones security-zone VPN host-inbound-traffic system-services all user@host# set security zones security-zone VPN host-inbound-traffic protocols all user@host# set security zones security-zone VPN interfaces st0.0 user@host# set security zones security-zone VPN interfaces st0.1 Verification Confirm that the configuration is working properly. Verifying the Tunnel Interfaces on page 16 Verifying the IKE Status on page 17 Verifying IPsec Security Associations on page 17 Verifying the Route Entries on page 18 Verifying the Tunnel Interfaces Purpose Verify that the tunnel interfaces configuration is working properly. 16

Chapter 1: Configuring a Single SRX Series Device in a Branch Office Action From operational mode, enter the show interfaces terse match st command. user@host>show interfaces terse match st st0 up up st0.0 up up inet 10.255.1.5/24 st0.1 up up inet 10.255.2.5/24 Meaning The show interfaces terse match st command displays the status of the tunnel interfaces. Verifying the IKE Status Purpose Verify the IKE status. Action From operational mode, enter the show security ike sa command. user@host>show security ike sa Index State Initiator cookie Responder cookie Mode Remote Address 1898257 UP c3cc256b779db5ec 258300201eaba783 Main 5.5.5.2 1898255 UP ca13acf3daceb369 0921e2e7abf91a05 Main 4.4.4.2 Meaning The show security ike sa command lists all active IKE Phase 1 SAs. If no SAs are listed, there was a problem with Phase 1 establishment. Check the IKE policy parameters and external interface settings in your configuration. If SAs are listed, review the following information: Index This value is unique for each IKE SA, which you can use in the show security ike security-associations index detail command to get more information about the SA. Remote Address Verify that the remote IP address is correct. State UP The Phase 1 SA has been established. DOWN There was a problem establishing the Phase 1 SA. Mode Verify that the correct mode is being used. Verifying IPsec Security Associations Purpose Verify IPsec security associations. Action From operational mode, enter the show security ipsec sa command. user@host>show security ipsec sa Total active tunnels: 2 ID Algorithm SPI Life:sec/kb Mon vsys Port Gateway 17

Configuring a Single SRX Series Device in a Branch Office <131073 ESP:3des/sha1 3ca3386b 2492/ unlim U root 500 4.4.4.2 >131073 ESP:3des/sha1 be66b350 2492/ unlim U root 500 4.4.4.2 <131074 ESP:3des/sha1 84080019 2491/ unlim U root 500 5.5.5.2 >131074 ESP:3des/sha1 deabdb54 2491/ unlim U root 500 5.5.5.2 Meaning The output indicates that: There is a configured IPsec SA pair available. The port number 500 indicates that a standard IKE port is used. Otherwise, it is Network Address Translation-Traversal (NAT-T), 4500, or random high port. The security parameter index (SPI) is used for both directions. The lifetime or usage limits of the SA is expressed either in seconds or in kilobytes. In the output, 2492/ unlim indicates Phase 2 lifetime is set to expire in 2492 seconds and there is no specified lifetime size. The ID number shows the unique index value for each IPsec SA. Verifying the Route Entries Purpose Verify the route entries in the routing table. Action From operational mode, enter the show route command. user@host>show route inet.0: 19 destinations, 19 routes (19 active, 0 holddown, 0 hidden) + = Active Route, - = Last Active, * = Both 0.0.0.0/0 *[Static/5] 10w5d 22:23:53 > to 10.204.115.254 via ge-0/0/0.0 4.4.4.0/30 *[Direct/0] 00:18:45 > via ge-0/0/4.0 4.4.4.1/32 *[Local/0] 00:18:45 Local via ge-0/0/4.0 5.5.5.0/30 *[Direct/0] 00:18:45 > via ge-0/0/5.0 5.5.5.1/32 *[Local/0] 00:18:45 Local via ge-0/0/5.0 10.10.99.1/32 *[Local/0] 10w5d 22:24:03 Reject 10.204.115.0/24 *[Direct/0] 10w5d 22:23:53 > via ge-0/0/0.0 10.204.115.166/32 *[Local/0] 10w5d 22:24:04 Local via ge-0/0/0.0 10.255.1.0/24 *[Direct/0] 00:18:40 > via st0.0 10.255.1.5/32 *[Local/0] 4d 02:50:20 Local via st0.0 10.255.2.0/24 *[Direct/0] 00:18:40 > via st0.1 10.255.2.5/32 *[Local/0] 4d 02:50:20 Local via st0.1 20.20.20.0/24 *[Direct/0] 03:46:19 > via ge-0/0/2.0 20.20.20.1/32 *[Local/0] 03:46:19 18

Chapter 1: Configuring a Single SRX Series Device in a Branch Office Local via ge-0/0/2.0 30.30.30.0/24 *[Direct/0] 03:46:19 > via ge-0/0/0.0 30.30.30.1/32 *[Local/0] 03:46:19 Local via ge-0/0/0.0 172.16.0.0/24 *[Static/5] 00:18:40 > to 10.255.1.254 via st0.0 to 10.255.2.254 via st0.1 172.16.1.0/24 *[Direct/0] 00:15:55 > via lo0.0 172.16.1.1/32 *[Local/0] 00:15:55 Local via lo0.0 Meaning The output indicates that there are 19 routes and all the routes are active. Results From operational mode, confirm your configuration by entering the show configuration no-more command. If the output does not display the intended configuration, repeat the instructions in this example to correct the configuration. user@host>show configuration no-more ## Last commit: 2013-05-28 20:10:49 UTC by root version 12.1R5.5; system { root-authentication { encrypted-password "$1$ltXYoZky$Gg3OHOmBGCBKwPET6ijPw0"; ## SECRET-DATA name-server { 8.8.8.8; services { web-management { http; syslog { file default-message { any any; interfaces { ge-0/0/0 { unit 0 { family inet { address 10.204.115.166/24; address 30.30.30.1/24; ge-0/0/1 { unit 0 { family inet { address 10.10.99.1/30; 19

Configuring a Single SRX Series Device in a Branch Office ge-0/0/2 { unit 0 { family inet { address 20.20.20.1/24; ge-0/0/4 { unit 0 { family inet { address 4.4.4.1/30; ge-0/0/5 { unit 0 { family inet { address 5.5.5.1/30; lo0 { unit 0 { family inet { address 172.16.1.1/24; st0 { unit 0 { multipoint; family inet { mtu 1500; address 10.255.1.5/24; unit 1 { multipoint; family inet { mtu 1500; address 10.255.2.5/24; routing-options { static { route 0.0.0.0/0 next-hop 10.204.115.254; route 172.16.0.0/24 next-hop [ 10.255.1.254 10.255.2.254 ]; forwarding-table { export load-balancing-policy; 20

Chapter 1: Configuring a Single SRX Series Device in a Branch Office policy-options { policy-statement load-balancing-policy { then { load-balance per-packet; security { ike { policy preshared { mode main; proposal-set standard; pre-shared-key ascii-text "$9$5Q69tuORcypuxNVwg469CA1RvWL"; ## SECRET-DATA policy preshared_2 { mode main; proposal-set standard; pre-shared-key ascii-text "$9$-9V24JGDkmfZGCt0BEh24oaikFn/"; ## SECRET-DATA gateway DCA_1 { ike-policy preshared; address 4.4.4.2; external-interface ge-0/0/4.0; gateway DCA_2 { ike-policy preshared_2; address 5.5.5.2; external-interface ge-0/0/5.0; ipsec { vpn-monitor-options { interval 5; threshold 5; policy std { proposal-set standard; vpn DCA_1 { bind-interface st0.0; vpn-monitor { optimized; ike { gateway DCA_1; no-anti-replay; proxy-identity { local 0.0.0.0/0; remote 0.0.0.0/0; service any; ipsec-policy std; 21

Configuring a Single SRX Series Device in a Branch Office establish-tunnels immediately; vpn DCA_2 { bind-interface st0.1; vpn-monitor { optimized; ike { gateway DCA_2; no-anti-replay; proxy-identity { local 0.0.0.0/0; remote 0.0.0.0/0; service any; ipsec-policy std; establish-tunnels immediately; policies { default-policy { permit-all; zones { functional-zone management { interfaces { ge-0/0/2.0; host-inbound-traffic { system-services { all; protocols { all; security-zone untrust { host-inbound-traffic { system-services { all; protocols { all; interfaces { ge-0/0/0.0 { host-inbound-traffic { system-services { any-service; protocols { all; 22

Chapter 1: Configuring a Single SRX Series Device in a Branch Office lo0.0; ge-0/0/1.0; ge-0/0/4.0; ge-0/0/5.0; security-zone trust { address-book { address 0.0.0.0/0 0.0.0.0/0; host-inbound-traffic { system-services { any-service; protocols { all; security-zone VPN { host-inbound-traffic { system-services { all; protocols { all; interfaces { st0.0; st0.1; Related Documentation Branch Office Chassis Cluster Design Considerations on page 8 Distributed Enterprise Connectivity Architecture Design Considerations on page 5 Understanding Chassis Clusters on page 11 23

Configuring a Single SRX Series Device in a Branch Office 24